{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T16:32:01Z","timestamp":1759941121199},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T00:00:00Z","timestamp":1409702400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comput Math Organ Theory"],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1007\/s10588-014-9175-4","type":"journal-article","created":{"date-parts":[[2014,9,2]],"date-time":"2014-09-02T07:33:48Z","timestamp":1409643228000},"page":"24-47","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Generalized key player problem"],"prefix":"10.1007","volume":"21","author":[{"given":"Janghoon","family":"Yang","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,3]]},"reference":[{"key":"9175_CR1","doi-asserted-by":"crossref","unstructured":"Arroyo DO, Hussain DMA (2008) An information theory approach to identify sets of key players, intelligence and security informatics. Lecture notes in computer science, vol. 5376, pp 15\u201326","DOI":"10.1007\/978-3-540-89900-6_5"},{"key":"9175_CR2","unstructured":"Ashworth MJ (2003) Identifying key contributors to performance in organizations: the case for knowledge-based measures. In: Proceedings of the first annual conference of the North American association for computational social and organizational science, 22\u201325 June, 2003, Pittsburgh, PA, USA"},{"issue":"5","key":"9175_CR3","doi-asserted-by":"crossref","first-page":"1403","DOI":"10.1111\/j.1468-0262.2006.00709.x","volume":"74","author":"C Ballester","year":"2006","unstructured":"Ballester C, Calvo-Armengol A, Zenou Y (2006) Who\u2019s who in networks. Wanted: the key player. Econometrica 74(5):1403\u20131417","journal-title":"Econometrica"},{"key":"9175_CR4","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/S0378-8733(01)00038-7","volume":"23","author":"P Bonacich","year":"2001","unstructured":"Bonacich P, Lloyd P (2001) Eigenvector-like measures of centrality for asymmetric relations. Soc Netw 23:191\u2013201","journal-title":"Soc Netw"},{"key":"9175_CR5","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/j.socnet.2004.01.001","volume":"26","author":"P Bonacich","year":"2004","unstructured":"Bonacich P, Holdren AC, Johnston M (2004) Hyper-edges and multidimensional centrality. Soc Netw 26:189\u2013203","journal-title":"Soc Netw"},{"key":"9175_CR6","unstructured":"Borgatti, SP (2003) The Key Player Problem. In Breiger R, Carley K, Pattison P (eds.) Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers. National Academy of Sciences Press, pp. 241\u2013252"},{"key":"9175_CR7","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.socnet.2004.11.008","volume":"27","author":"SP Borgatti","year":"2005","unstructured":"Borgatti SP (2005) Centrality and network flow. Soc Netw 27:55\u201371","journal-title":"Soc Netw"},{"key":"9175_CR8","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/s10588-006-7084-x","volume":"12","author":"SP Borgatti","year":"2006","unstructured":"Borgatti SP (2006) Identifying sets of key players in a social network. J Comput Math Organ Theory 12:21\u201334","journal-title":"J Comput Math Organ Theory"},{"key":"9175_CR9","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1159\/000094195","volume":"3","author":"G Canright","year":"2006","unstructured":"Canright G, Monsen KE (2006) Spreading on networks: a topographic view. Complexus 3:131\u2013146","journal-title":"Complexus"},{"key":"9175_CR10","doi-asserted-by":"crossref","unstructured":"Carreras I, Miorandi D, Canright GS, Monsen KE (2007) Eigenvector centrality in highly partitioned mobile networks: principles and applications. In: Advances in biologically inspired information systems, vol. 69, pp 125\u2013147","DOI":"10.1007\/978-3-540-72693-7_7"},{"key":"9175_CR11","unstructured":"Davidsen SA (2009) Sampling\/misinformation effect on centrality measures in complex networks. http:\/\/www.atmakuridavidsen.com\/soren\/pubs\/cis3-report-final.pdf . Accessed 2009"},{"key":"9175_CR13","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","volume":"1","author":"LC Freeman","year":"1979","unstructured":"Freeman LC (1979) Centrality in networks: conceptual clarification. Soc Netw 1:215\u2013239","journal-title":"Soc Netw"},{"key":"9175_CR14","unstructured":"Hamill JT (2006) Analysis of layered social networks. Dissertation, Air Force Institute of Technology"},{"key":"9175_CR15","doi-asserted-by":"crossref","unstructured":"Hussain DMA (2010) Investigation of key-player problem in terrorist networks using Bayes conditional probability. In: Handbook of social network technologies and applications Part 4, pp 523\u2013547","DOI":"10.1007\/978-1-4419-7142-5_24"},{"key":"9175_CR16","unstructured":"Kolaczyk ED, Chua D, Barthelemy BM (2007) Co-betweenness: a pairwise notion of centrality. CoRR abs\/0709.3420"},{"issue":"4","key":"9175_CR17","first-page":"223","volume":"7","author":"V Krebs","year":"2002","unstructured":"Krebs V (2002) Uncloaking terrorist network. First Monday 7(4):223","journal-title":"Uncloaking terrorist network. First Monday"},{"key":"9175_CR18","volume-title":"Big data: the next frontier for innovation, competition, and productivity","author":"J Manyika","year":"2011","unstructured":"Manyika J, Chui M, Brown B, Bughin J, Dobbs R, Roxburgh C, Bayers AH (2011) Big data: the next frontier for innovation, competition, and productivity. McKinsey Global Institute, New York"},{"key":"9175_CR19","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/978-1-4419-7572-0_3","volume-title":"Median problems in networks. Foundations of location analysis","author":"V Marianov","year":"2011","unstructured":"Marianov V, Serra D (2011) Median problems in networks. Foundations of location analysis. Springer, New York, pp 39\u201360"},{"key":"9175_CR20","unstructured":"McGuire RM (2011) Weighted key player problem for social network analysis. Dissertation, Air Force Institute of Technology"},{"key":"9175_CR21","volume-title":"Who shall survive? A new approach to the problem of human interrelations","author":"JL Moreno","year":"1953","unstructured":"Moreno JL (1953) Who shall survive? A new approach to the problem of human interrelations. Beacon House Inc., Beacon"},{"key":"9175_CR22","unstructured":"Renfro RS (2001) Modeling and analysis of social networks. Dissertation, Air Force Institute of Technology"},{"key":"9175_CR23","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27:379\u2013423","journal-title":"Bell Syst Tech J"},{"key":"9175_CR24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0378-8733(89)90016-6","volume":"11","author":"K Stephenson","year":"1989","unstructured":"Stephenson K, Zelen M (1989) Rethinking centrality: methods and examples. Soc Netw 11:1\u201337","journal-title":"Soc Netw"},{"key":"9175_CR25","unstructured":"Tsvetovat M (2005) Social structure simulation and inference using artificial intelligence techniques. Dissertation, Carnegie Mellon University"},{"key":"9175_CR26","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/j.socnet.2006.10.001","volume":"29","author":"F Tutzauer","year":"2007","unstructured":"Tutzauer F (2007) Entropy as a measure of centrality in networks characterized by path-transfer flow. Soc Netw 29:249\u2013265","journal-title":"Soc Netw"},{"key":"9175_CR27","unstructured":"Wikipedia (2013) http:\/\/en.wikipedia.org\/wiki\/World\u2019s_busiest_airports_by_passenger_traffic"},{"key":"9175_CR28","doi-asserted-by":"crossref","unstructured":"Wu A, Garland YM, Ham J (2004) Mining scale-free networks using geodesic clustering. In: Proceedings of the tenth ACM SIGKDD international conference on knowledge discovery and data mining, 22\u201325 Aug, 2004, Seattle, WA, USA","DOI":"10.1145\/1014052.1014146"},{"key":"9175_CR29","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MCOM.2011.5741144","volume":"49","author":"G Wu","year":"2011","unstructured":"Wu G, Talwar S, Johnsson K, Himayat N, Johnson KD (2011) M2M: from mobile to embedded internet. IEEE Commun Mag 49:36\u201343","journal-title":"IEEE Commun Mag"}],"container-title":["Computational and Mathematical Organization Theory"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-014-9175-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10588-014-9175-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-014-9175-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T11:32:36Z","timestamp":1565782356000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10588-014-9175-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,3]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,3]]}},"alternative-id":["9175"],"URL":"https:\/\/doi.org\/10.1007\/s10588-014-9175-4","relation":{},"ISSN":["1381-298X","1572-9346"],"issn-type":[{"value":"1381-298X","type":"print"},{"value":"1572-9346","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,9,3]]}}}