Skip to main content
Journal cover image

False-name-proofness in social networks

Publication ,  Conference
Conitzer, V; Immorlica, N; Letchford, J; Munagala, K; Wagman, L
Published in: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
December 1, 2010

In mechanism design, the goal is to create rules for making a decision based on the preferences of multiple parties (agents), while taking into account that agents may behave strategically. An emerging phenomenon is to run such mechanisms on a social network; for example, Facebook recently allowed its users to vote on its future terms of use. One significant complication for such mechanisms is that it may be possible for a user to participate multiple times by creating multiple identities. Prior work has investigated the design of false-name-proof mechanisms, which guarantee that there is no incentive to use additional identifiers. Arguably, this work has produced mostly negative results. In this paper, we show that it is in fact possible to create good mechanisms that are robust to false-name-manipulation, by taking the social network structure into account. The basic idea is to exclude agents that are separated from trusted nodes by small vertex cuts. We provide key results on the correctness, optimality, and computational tractability of this approach. © 2010 Springer-Verlag.

Duke Scholars

Published In

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

DOI

EISSN

1611-3349

ISSN

0302-9743

ISBN

9783642175718

Publication Date

December 1, 2010

Volume

6484 LNCS

Start / End Page

209 / 221

Related Subject Headings

  • Artificial Intelligence & Image Processing
  • 46 Information and computing sciences
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Conitzer, V., Immorlica, N., Letchford, J., Munagala, K., & Wagman, L. (2010). False-name-proofness in social networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6484 LNCS, pp. 209–221). https://doi.org/10.1007/978-3-642-17572-5_17
Conitzer, V., N. Immorlica, J. Letchford, K. Munagala, and L. Wagman. “False-name-proofness in social networks.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6484 LNCS:209–21, 2010. https://doi.org/10.1007/978-3-642-17572-5_17.
Conitzer V, Immorlica N, Letchford J, Munagala K, Wagman L. False-name-proofness in social networks. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2010. p. 209–21.
Conitzer, V., et al. “False-name-proofness in social networks.” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6484 LNCS, 2010, pp. 209–21. Scopus, doi:10.1007/978-3-642-17572-5_17.
Conitzer V, Immorlica N, Letchford J, Munagala K, Wagman L. False-name-proofness in social networks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2010. p. 209–221.
Journal cover image

Published In

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

DOI

EISSN

1611-3349

ISSN

0302-9743

ISBN

9783642175718

Publication Date

December 1, 2010

Volume

6484 LNCS

Start / End Page

209 / 221

Related Subject Headings

  • Artificial Intelligence & Image Processing
  • 46 Information and computing sciences