Encyclopedia of Social Network Analysis and Mining

2018 Edition
| Editors: Reda Alhajj, Jon Rokne

Game Theory and Social Networks

Reference work entry
DOI: https://doi.org/10.1007/978-1-4939-7131-2_175

Synonyms

Glossary

Bayesian Games

Games with incomplete information about characteristics of other players

Ex Ante Payoff

It means “before the event.” It means, in Bayesian games, the expected payoff value before certain information is revealed

Ex Post Payoff

It means “actual.” It means, in Bayesian games, the expected payoff value after certain information is revealed

Extended Form Games

A way to describe a game in a treelike structure representing sequential moves of players

Mixed Strategy

A player’s strategy choices with a probability value associated with each choice

Nash Equilibrium

A lock-in strategy profile of a game in which none of the players can benefit by changing their strategies unilaterally while others keep their chosen strategies

Normal Form Games

A way to describe games in a matrix form representing simultaneous plays

Positive/Negative Externalities

Activities that would...

This is a preview of subscription content, log in to check access.

References

  1. Altman E, Boulogne T, El-Azouzi R, Jiménez T, Wynter L (2006) A survey on networking games in telecommunications. Comput Oper Res 33(2):286–311.  https://doi.org/10.1016/j.cor.2004.06.005MathSciNetCrossRefMATHGoogle Scholar
  2. Axelrod R (1984) The evolution of cooperation. Basic Books, New YorkMATHGoogle Scholar
  3. Axelrod R (1986) An evolutionary approach to norms. Am Polit Sci Rev 80:1095–1111CrossRefGoogle Scholar
  4. Berwanger D, Kaiser L (2010) Information tracking in games on graphs. J Log Lang Inf 19(4):395–412MathSciNetMATHCrossRefGoogle Scholar
  5. Buchanan J, Stubblebine WC (1962) Externality. Economica 29(116):371–384CrossRefGoogle Scholar
  6. Bulow JI, Geanakoplos JD, Klemperer PD (1985) Multimarket oligopoly: strategic substitutes and complements. J Polit Econ 93(3):488–511CrossRefGoogle Scholar
  7. Christodoulou G, Koutsoupias E (2005) The price of anarchy of finite congestion games. In: Proceedings of the thirty-seventh annual ACM symposium on theory of computing, STOC’05, Maryland. ACM, New York, S 67–73Google Scholar
  8. Dimand RW, Dimand MA (1992) The early history of the theory of strategic games from waldegrave to borel. Hist Polit Econ 24(5):15–27. http://ideas.repec.org/a/hop/hopeec/v24y1992i5p15-27.htmlMathSciNetMATHCrossRefGoogle Scholar
  9. Erdos P, Renyi A (1960) On the evolution of random graphs. Publ Math Inst Hung Acad Sci 5:17–61MathSciNetMATHGoogle Scholar
  10. Galan J, Latek M, Rizi S (2011) Axelrod’s metanorm games on networks. PLoS One 6(5):e20474CrossRefGoogle Scholar
  11. Galeotti A, Goyal S, Jackson MO, Vega-Redondo F, Yariv L (2010) Network games. Rev Econ Stud 77(1):218–244MathSciNetMATHCrossRefGoogle Scholar
  12. Goyal S (2007) Connections. Princeton University Press, PrincetonMATHGoogle Scholar
  13. Goyal S, Kearns M (2012) Competitive contagion in networks. STOC, New York, S 759–774MATHGoogle Scholar
  14. Grimmett G (1999) Percolation. Springer, HeidelbergMATHCrossRefGoogle Scholar
  15. Harsanyi JC (1975) The tracing procedure: a Bayesian approach to defining a solution for n-person noncooperative games. Int J Game Theory 4:61–94MathSciNetMATHCrossRefGoogle Scholar
  16. Harsanyi JC (2004) Games with incomplete information played by Bayesian players, i–iii. Manag Sci 50(12 Suppl):1804–1817CrossRefGoogle Scholar
  17. Hayrapetyan A, Tardos É, Wexler T (2007) A network pricing game for selfish traffic. Distrib Comput 19(4):255–266MATHCrossRefGoogle Scholar
  18. Jackson MO (2008) Social and economic networks. Princeton University Press, PrincetonMATHGoogle Scholar
  19. Kleinberg JM, Suri S, Tardos É, Wexler T (2008) Strategic network formation with structural holes. SIGecom Exch 7(3):1–4CrossRefGoogle Scholar
  20. Leyton-Brown K, Shoham Y (2008) Essentials of game theory: a concise multidisciplinary introduction. Synthesis lectures on artificial intelligence and machine learning. Morgan & Claypool, San RafaelMATHGoogle Scholar
  21. Lima SL (1989) Iterated prisoner’s dilemma: an approach to evolutionarily stable cooperation. Am Nat 134:828–834CrossRefGoogle Scholar
  22. López-Pintado D (2008) Diffusion in complex social networks. Games Econ Behav 62(2):573–590MathSciNetMATHCrossRefGoogle Scholar
  23. Maynard Smith J, Price GR (1973) The logic of animal conflict. Nature 246(5427):15–18MATHCrossRefGoogle Scholar
  24. Menache I, Ozdaglar AE (2011) Network games: theory, models, and dynamics. Synthesis lectures on communication networks. Morgan & Claypool, San RafaelMATHGoogle Scholar
  25. Mesterton-Gibbons M (1991) An escape from the prisoner’s dilemma. J Math Biol 29:251–269MathSciNetMATHCrossRefGoogle Scholar
  26. Myerson RB (1997) Game theory – analysis of conflict. Harvard University Press, CambridgeMATHGoogle Scholar
  27. Nisan N, Roughgarden T, Tardos E, Vazirani VV (2007) Algorithmic game theory. Cambridge University Press, New YorkMATHCrossRefGoogle Scholar
  28. Nowak M, May RM (1992) Evolutionary games and spatial chaos. Nature 359:826–929CrossRefGoogle Scholar
  29. Oh JC (2000) Promoting cooperation using ‘kin’ biased conditional strategy in the iterated prisoner’s dilemma game. Inf Sci 133(3–4):149–164MathSciNetMATHGoogle Scholar
  30. Oh JC (2001) Cooperating search agents explore more than defecting search agents in the internet information access. In: IEEE (ed) Congress on evolutionary computation 2001 (CEC 2001), SeoulGoogle Scholar
  31. Ohtsuki H, Nowak M (2008) Evolutionary stability on graphs. J Theor Biol 251(4):698–707MathSciNetCrossRefGoogle Scholar
  32. Oliphant M (1994) Evolving cooperation in the non-iterated prisoner’s dilemma: the importance of spatial organization. In: Langton CG (Hrsg) Artificial life IV. Addison-Wesley, Reading, S 349–352Google Scholar
  33. Osborne M, Rubinstein A (1994) A course in game theory. MIT, CambridgeMATHGoogle Scholar
  34. Prietula MJ, Conway D (2009) The evolution of metanorms: quis custodiet ipsos custodes? Comput Math Organ Theory 15(3):147–168CrossRefGoogle Scholar
  35. Riolo RL (1997) The effects of tag-mediated selection of partners in evolving populations playing the iterated prisoner’s dilemma. Working paper 97–02-016, Santa Fe InstituteGoogle Scholar
  36. Roughgarden T, Tardos E (2002) How bad is selfish routing? J ACM 49(2):236–259MathSciNetMATHCrossRefGoogle Scholar
  37. Saad W, Han Z, Debbah M, Hjørungnes A (2008) Network formation games for distributed uplink tree construction in IEEE 802.16j networks. In: GLOBECOM, New Orleans, pp 5165–5169Google Scholar
  38. Stanley EA, Ashlock D, Testfatsion L (1994) Iterated prisoner’s dilemma with choice and refusal of partners. In: Langton CG (Hrsg) Artificial life IV. Addison-Wesley, Reading, S 131–176Google Scholar
  39. Stauffer D, Aharonyk A (1994) Introduction to percolation theory. CRC, London. http://www.amazon.com/Introduction-Percolation-Theory-Dietrich-Stauffer/dp/0748402535
  40. Szabó G, Fáth G (2007) Evolutionary games on graphs. Phys Rep 446(4–6):97–216MathSciNetCrossRefGoogle Scholar
  41. Valiant G, Roughgarden T (2010) Braess’s paradox in large random graphs. Random Struct Algorithm 37(4):495–515MathSciNetMATHCrossRefGoogle Scholar
  42. von Neumann J, Morgenstern O (1944) Theory of games and economic behavior. Princeton University Press, PrincetonMATHGoogle Scholar
  43. Weibull J (1995) Evolutionary game theory. MIT, CambridgeMATHGoogle Scholar
  44. Woo J, Son J, Chen H (2011) An sir model for violent topic diffusion in social media. In: IEEE international conference on intelligence and security informatics (ISI) 2011, Beijing, pp 15–19Google Scholar

Copyright information

© Springer Science+Business Media LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Electrical Engineering and Computer ScienceSyracuse UniversitySyracuseUSA

Section editors and affiliations

  • Irwin King
    • 1
  • Jie Tang
    • 2
  1. 1.Department of Computer Science and EngineeringThe Chinese University of Hong KongShatinHong Kong
  2. 2.Department of Computer Science and TechnologyTsinghua UniversityBeijingChina