Dynamic elicited priors for updating covert networks

Jeff Gill, John R Freeman

Research output: Contribution to journalArticlepeer-review

8 Scopus citations

Abstract

The study of covert networks is plagued by the fact that individuals conceal their attributes and associations. To address this problem, we develop a technology for eliciting this information from qualitative subject-matter experts to inform statistical social network analysis. We show how the information from the subjective probability distributions can be used as input to Bayesian hierarchical models for network data. In the spirit of “proof of concept the results of a test of the technology are reported. Our findings show that human subjects can use the elicitation tool effectively, supplying attribute and edge information to update a network indicative of a covert one.

Original languageEnglish (US)
Pages (from-to)68-94
Number of pages27
JournalNetwork Science
Volume1
Issue number1
DOIs
StatePublished - Jan 1 2013

Keywords

  • Bayesian elicitation
  • covert networks
  • link prediction

Fingerprint

Dive into the research topics of 'Dynamic elicited priors for updating covert networks'. Together they form a unique fingerprint.

Cite this