| Literature DB >> 27703198 |
Jonathan Mellon1,2, Jordan Yoder1,3, Daniel Evans1.
Abstract
Social networks have well documented effects at the individual and aggregate level. Consequently it is often useful to understand how an attempt to influence a network will change its structure and consequently achieve other goals. We develop a framework for network modification that allows for arbitrary objective functions, types of modification (e.g. edge weight addition, edge weight removal, node removal, and covariate value change), and recovery mechanisms (i.e. how a network responds to interventions). The framework outlined in this paper helps both to situate the existing work on network interventions but also opens up many new possibilities for intervening in networks. In particular use two case studies to highlight the potential impact of empirically calibrating the objective function and network recovery mechanisms as well as showing how interventions beyond node removal can be optimised. First, we simulate an optimal removal of nodes from the Noordin terrorist network in order to reduce the expected number of attacks (based on empirically predicting the terrorist collaboration network from multiple types of network ties). Second, we simulate optimally strengthening ties within entrepreneurial ecosystems in six developing countries. In both cases we estimate ERGM models to simulate how a network will endogenously evolve after intervention.Entities:
Mesh:
Year: 2016 PMID: 27703198 PMCID: PMC5050406 DOI: 10.1038/srep34613
Source DB: PubMed Journal: Sci Rep ISSN: 2045-2322 Impact factor: 4.379
Applied Examples of network interventions.
| Network Intervention | Classrooms | Investment community | Workplace | Criminal network |
|---|---|---|---|---|
| Strengthening and creating ties | Assigning children to work on a joint project | Facilitating a joint venture between two stakeholders | Assigning partners | Having an informant introduce two criminals |
| Weakening and breaking ties | Separating two children in a classroom | Removing support for a co-venture | Changing the command structure to avoid communication between certain positions in an organization | Sowing distrust between two criminals |
| Removing nodes | Moving a child to a different classroom | Shutting down a particular business | Firing or transferring an employee | Arresting a criminal |
| Adding nodes | Introducing a child from another classroom | Encouraging a new stakeholder to enter the community | Hiring a new employee | Having an informant infiltrate the network |
| Changing covariate values | Giving a child a rank in the class | Giving a grant to a stakeholder | Promoting an employee | Put on most wanted list |
| Aims of intervention | Increasing educational attainment | Increasing investment returns | Increasing employee retention | Decreasing number of violent crimes |
| Decreasing social segregation | Increasing new business formation | Increasing team output | Decreasing drug production |
Figure 1An example of a network where greedy optimization will not find the optimal solution.
Note that all ties can be removed if j and k are removed but that i has the most edge weight in the first round.
MRQAP table predicting the terrorist collaboration network.
| Estimate | Pr(≥ | ||
|---|---|---|---|
| Intercept | −6.6235 | — | — |
| Communication | 1.3219 | 0.035 | * |
| Education | 1.0567 | 0.065 | . |
| Organization | 0.3727 | 0.147 | |
| Signif. codes: 0 “***’’ 0.001 “**’’ 0.01 “*’’ 0.05 “.” 0.1 | |||
ERGM model of Noordin terrorist network communications.
| Estimate | Std. Error | ||
|---|---|---|---|
| Organization co-affiliation | 0.5558 | 0.1299 | *** |
| Shared Education | 0.7868 | 0.1636 | *** |
| Edges | −5.6099 | 0.3294 | *** |
| Isolates | −1.3231 | 0.5472 | * |
| GWESP ( | 2.2379 | 0.2475 | *** |
| Signif. codes: 0 ‘***’ 0.001 ‘**’ 0.01 ‘*’ 0.05 ‘.’ 0.1 ‘ ’ 1 | |||
Figure 2The number of expected attacks as a function of total removals allowed for the greedy and a heuristic algorithm.
Figure 3The simulated number of expected attacks as a function of social time.
Lower is better. Observe that the greedy strategy consistently outperforms the heuristic strategy.
Edge weights for all entrepreneurial ecosystems in the EntrepEco dataset.
| Node A | Node B | Addis Ababa | Dar es Salaam | Kampala | Lusaka | Monrovia |
|---|---|---|---|---|---|---|
| Govt. Rep | Social Network | 0 | 0 | 3 | 0 | 0 |
| Incubator | Social Network | 9 | 0 | 29 | 24 | 16 |
| Incubator | Professional | 8 | 0 | 18 | 26 | 10 |
| Investor | Social Network | 0 | 26 | 0 | 0 | 0 |
| Investor | Professional | 0 | 13 | 0 | 0 | 0 |
| Social Network | Professional | 33 | 11 | 0 | 0 | 24 |
Figure 4Average optimization score for Monrovia (left) and Addis Ababa (right) across 1000 Monte Carlo Replicates for the evolution of the random metric of the proposed network originating from two methods: blue is do nothing and red is greedy.
Figure 5Average percentage improvement (in terms of similarity to Accra) over doing nothing as simulated through the evolution of 1000 draws from an ERGM model tracked through 1000 units of social time.