{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:52:01Z","timestamp":1750308721333,"version":"3.41.0"},"reference-count":22,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2013,6,1]],"date-time":"2013-06-01T00:00:00Z","timestamp":1370044800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Omar N. Bradley Foundation and Fellowship"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Intell. Syst. Technol."],"published-print":{"date-parts":[[2013,6]]},"abstract":"<jats:p>\n            This article considers the nonlethal targeting assignment problem in the counterinsurgency in Afghanistan, the problem of deciding on the people whom U.S. forces should engage through outreach, negotiations, meetings, and other interactions in order to ultimately win the support of the population in their area of operations. We propose two models: (1) the Afghan counterinsurgency (COIN) social influence model, to represent how attitudes of local leaders are affected by repeated interactions with other local leaders, insurgents, and counterinsurgents, and (2) the nonlethal targeting model, a NonLinear Programming (NLP) optimization formulation that identifies a strategy for assigning\n            <jats:italic>k<\/jats:italic>\n            U.S. agents to produce the greatest arithmetic mean of the expected long-term attitude of the population. We demonstrate in an experiment the merits of the optimization model in nonlethal targeting, which performs significantly better than both doctrine-based and random methods of assignment in a large network.\n          <\/jats:p>","DOI":"10.1145\/2483669.2483685","type":"journal-article","created":{"date-parts":[[2013,7,1]],"date-time":"2013-07-01T12:27:28Z","timestamp":1372681648000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Optimization-based influencing of village social networks in a counterinsurgency"],"prefix":"10.1145","volume":"4","author":[{"given":"Benjamin W.K.","family":"Hung","sequence":"first","affiliation":[{"name":"United States Military Academy, Thayer Road, West Point, NY"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stephan E.","family":"Kolitz","sequence":"additional","affiliation":[{"name":"Charles Stark Draper Laboratory, Cambridge, MA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Asuman","family":"Ozdaglar","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2013,7]]},"reference":[{"volume-title":"Contributions to Mathematical Psychology","author":"Abelson R.","key":"e_1_2_1_1_1"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.geb.2010.01.005"},{"key":"e_1_2_1_3_1","first-page":"1537","article-title":"Opinion fluctuations and persistent disagreement in social networks","volume":"21","author":"Acemoglu D.","year":"2010","journal-title":"Ann. Appl. Probab."},{"volume-title":"Afghanistan.","year":"1959","author":"Afghanistan Rrc (Research Reachback Center","key":"e_1_2_1_4_1"},{"key":"e_1_2_1_5_1","unstructured":"Altai Consulting. 2005. Afghan media\u2014Three years after: National media evaluation project. http:\/\/www.altaiconsulting.com\/docs\/media\/2005\/III-4.Baghlan.pdf.  Altai Consulting. 2005. Afghan media\u2014Three years after: National media evaluation project. http:\/\/www.altaiconsulting.com\/docs\/media\/2005\/III-4.Baghlan.pdf."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-006-7084-x"},{"volume-title":"Proceedings of the Annual Meeting of the Central Eurasian Studies Society.","year":"2008","author":"Brick J.","key":"e_1_2_1_7_1"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0219525900000078"},{"key":"e_1_2_1_9_1","first-page":"4","article-title":"How can extremism prevail&quest; A study on the relative agreement interaction model","volume":"5","author":"Deffuant G.","year":"2002","journal-title":"J. Artif. Soc. Social Simul."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1974.10480137"},{"key":"e_1_2_1_11_1","unstructured":"Department of the Army. 2006. Counterinsurgency Field Manual. No. 3--24 CosimoReports New York.  Department of the Army. 2006. Counterinsurgency Field Manual. No. 3--24 CosimoReports New York."},{"key":"e_1_2_1_12_1","first-page":"1","article-title":"Social influence networks and opinion change","volume":"16","author":"Friedkin N.","year":"1999","journal-title":"Adv. Group Process."},{"key":"e_1_2_1_13_1","first-page":"1","article-title":"Opinion dynamics and bounded confidence models: Analysis and simulation","volume":"5","author":"Hegselmann R.","year":"2002","journal-title":"J. Artif. Soc. Social Simul."},{"key":"e_1_2_1_14_1","unstructured":"Howard N. 2011. Finding optimal strategies for influencing social networks in two player games. Masters thesis Operations Research Center MIT.  Howard N. 2011. Finding optimal strategies for influencing social networks in two player games. Masters thesis Operations Research Center MIT."},{"key":"e_1_2_1_15_1","unstructured":"Hung B. 2010. Optimization-based selection of influential agents in a rural afghan social network. Masters thesis Operations Research Center MIT.  Hung B. 2010. Optimization-based selection of influential agents in a rural afghan social network. Masters thesis Operations Research Center MIT."},{"key":"e_1_2_1_16_1","unstructured":"Jackson M. 2008. Social and Economic Networks. Princeton University Press Princeton NJ.   Jackson M. 2008. Social and Economic Networks. Princeton University Press Princeton NJ."},{"key":"e_1_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Kalyvas S. 2006. The Logic of Violence in Civil War. Cambridge University Press.  Kalyvas S. 2006. The Logic of Violence in Civil War. Cambridge University Press.","DOI":"10.1017\/CBO9780511818462"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_2_1_19_1","unstructured":"Mcchrystal S. and Hall M. 2009. ISAF commanders counterinsurgency guidance. http:\/\/www.nato.int\/isaf\/docu\/official_texts\/counterinsurgency_guidance.pdf.  Mcchrystal S. and Hall M. 2009. ISAF commanders counterinsurgency guidance. http:\/\/www.nato.int\/isaf\/docu\/official_texts\/counterinsurgency_guidance.pdf."},{"key":"e_1_2_1_20_1","unstructured":"Oberson J. 2002. Khans and warlords: Political alignment leadership and the state in pashtun society. Masters thesis Institute for Ethnology Berne Switzerland.  Oberson J. 2002. Khans and warlords: Political alignment leadership and the state in pashtun society. Masters thesis Institute for Ethnology Berne Switzerland."},{"key":"e_1_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Petersen R. 2001. Resistance and Rebellion: Lessons from Eastern Europe. Cambridge University Press Cambridge UK.  Petersen R. 2001. Resistance and Rebellion: Lessons from Eastern Europe. Cambridge University Press Cambridge UK.","DOI":"10.1017\/CBO9780511612725"},{"volume-title":"The Politics of Social Transformation in Afghanistan, Iran, and Pakistan","author":"Ruben B.","key":"e_1_2_1_22_1"}],"container-title":["ACM Transactions on Intelligent Systems and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2483669.2483685","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2483669.2483685","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:14:36Z","timestamp":1750277676000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2483669.2483685"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["10.1145\/2483669.2483685"],"URL":"https:\/\/doi.org\/10.1145\/2483669.2483685","relation":{},"ISSN":["2157-6904","2157-6912"],"issn-type":[{"type":"print","value":"2157-6904"},{"type":"electronic","value":"2157-6912"}],"subject":[],"published":{"date-parts":[[2013,6]]},"assertion":[{"value":"2011-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2012-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}