Strategic Social Network Analysis
نویسندگان
چکیده
How can individuals and communities protect their privacy against social network analysis tools? How do criminals or terrorists organizations evade detection by such tools? Under which conditions can these tools be made strategy proof? These fundamental questions have attracted little attention in the literature to date, as most social network analysis tools are built around the assumption that individuals or groups in a network do not act strategically to evade such tools. With this in mind, we outline in this paper a new paradigm for social network analysis, whereby the strategic behaviour of network actors is explicitly modeled. Addressing this research challenge has various implications. For instance, it may allow two individuals to keep their relationship secret or private. It may also allow members of an activist group to conceal their membership, or even conceal the existence of their group from authoritarian regimes. Furthermore, it may assist security agencies and counter terrorism units in understanding the strategies that covert organizations use to escape detection, and give rise to new strategy-proof countermeasures. Introduction Many problems in social network analysis (SNA) have received considerable attention in recent years across various disciplines, including Artificial Intelligence and MultiAgent Systems (Sabater and Sierra 2002; Nguyen, Kowalczyk, and Chen 2009). Scientists, developers, and analysts have focused on improving the performance of various SNA tools, such as centrality measures (Koschützki et al. 2005), community-detection algorithms (Orman and Labatut 2009) or link-prediction algorithms (Getoor and Diehl 2005) just to name a few. Unfortunately, while such tools have many legitimate applications, they can be also used to invade privacy or even undermine security of individuals and groups. For instance, by analysing Facebook’s topology as well as the attributes of some users, it is possible to infer attributes of other users (Mislove et al. 2010). Furthermore, such an “attribute inference attack” (Zheleva and Getoor 2009) can be strengthened if it is preceded by a “link prediction attack” which aims at revealing the links that appear to be missing—either deliberately or otherwise—from the topology of the social network. ∗Both first authors contributed equally to this paper. Copyright c © 2017, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Naturally, various countermeasures supporting privacy and security that have been proposed including strict legal controls (EU: 2015), algorithmic solutions (Kearns et al. 2016), and market-like mechanisms with which the participants are able to monetize their personal information (Lane et al. 2014). They are, however, difficult to implement in practice, especially at a global scale. For instance, it is highly unlikely that legal privacy-protection mechanisms will be enforced by authoritarian regimes who typically censor internet content including social media (King et al. 2013). Against this background, we ask the following question: How can members of a social network strategically manipulate their online data in an attempt to evade SNA tools? Addressing this question may help members of the general public to better protect their online privacy and security. It may also help activists groups in avoiding censorship. Furthermore, it may assist security agencies and counter-terrorism units in understanding the strategies that covert organizations use to escape detection. In particular, recent findings on covert organizations—especially with respect to the techsavvy ISIS—clearly demonstrate their ability to neutralize counter-terrorism efforts by the authorities. The known evasion techniques used by ISIS range from changing aliases and keeping personal profiles private (Nordrum 2016) to using encrypted communication platforms (such as Telegraf (Khayat 2015)) and staging the disappearance of an entire group from social media only to pop up again in a different place under alternative aliases (Nordrum 2016). In fact, it is believed that the evasion capabilities of ISIS significantly increased after Edward Snowden’s disclosure of classified information on the SNA techniques used by US intelligence (Scarborough 2014). Unfortunately, neither do we have sufficient understanding of such evasion techniques nor do existing SNA tools have the ability to internalize them. This is because most SNA tools were built around the assumption that individuals or groups in a network do not act strategically to evade those tools. Even the more advanced tools that are especially designed for analysing covert networks (Perliger and Pedahzur 2011) typically assume that the network under investigation is not subject to strategic manipulation. Given this, we believe that the literature has now reached a point where serious attention should be directed towards the strategic evasion of SNA tools and building new strategy-proof tools.
منابع مشابه
Exploring the Knowledge Network of Strategic Alliance Research: A Co-citation Analysis
This study is to describe the knowledge network of strategic alliance studies embedded in the leading articles and to explore the key research themes in this field between 1999 and 2008. A total of 521 articles with 21,493 cited references were extracted from the Social Science Citation Index and the Science Citation Index. By using bibliometric methods, the citation and co-citation counts obta...
متن کاملInvestigation of Strategic Changes Using Patent Co-Inventor Network Analysis: The Case of Samsung Electronics
The aim of this paper is to propose a method to investigate a firm’s strategic changes. Technologies or technological capabilities are a major resource for achieving competitive advantages, so a firm’s R&D effort to improve capabilities on specific technologies is aligned with strategic direction. Therefore, this research analyzes changes in R&D efforts by identifying key R&D personnel using pa...
متن کاملAnalytic Network Process Based Strategic Planning for Iran's Trade Promotion Organization
Strategic planning in each organization identifies its orientation and coming priorities as all decisions to be adopted respect to the ensuing outcomes. Strategic decisions considering crucial and irreversible results should not be based on experience and judgments. This paper uses analytic network process (ANP) method for prioritization in strategic planning. ANP is mostly analogous to analyti...
متن کاملApplying an Influence Measurement Framework to Large Social Network
Predicting influential users is one of the important research problems on social network analysis. It helps to understand many complicated phenomena including information dissemination. It can be employed in many real world applications such as viral marketing. Influential users can influence social network users using their attributes, strategic locations or expertises. In this paper, we tackl...
متن کاملCan Social Contagion Help Global Health ‘Jump the Shark’?; Comment on “How to Facilitate Social Contagion?”
The instrumental use of social networks has become a central tenet of international health policy and advocacy since the Millennium project. In asking, ‘How to facilitate social contagion?’, Karl Blanchet of the London School of Hygiene and Tropical Medicine therefore reflects not only on the recent success, but also hints to growing challenges; the tactics of partnerships, alliances and platfo...
متن کاملStrategic Group Analysis of the Social Media Landscape for SMEs
Consumer use of Web 2.0 and social media is well documented. However, the use of such technologies by SMEs has received relatively little attention and the literature has focused on the major social media platforms such as Facebook and Twitter. In this paper the focus is on a different type of social media website, which is termed SME Social Media Platforms. These are websites designed specific...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017