Skip to main content
Article thumbnail
Location of Repository

Strategic Network Disruption and Defense

By Britta Hoyer and Kris De Jaegher


Networks are one of the essential building blocks of society. Not only do firms cooperate in R&D networks, but firms themselves may be seen as networks of information-exchanging workers. Social movements increasingly make use of networks to exchange information, just as on the negative side criminal and terrorist networks use them. However, the literature on networks has mainly focused on the cooperative side of networks and has so far neglected the competition side of networks. Networks themselves may face competition from actors with opposing interests to theirs. Several R&D networks may compete with one another. The firm as a network of employees obviously faces competition. In particular, given the importance of connectivity for networks, competing networks may try to disrupt each other, by trying to convince key players in competing networks to defect, or to stop sponsoring key links (strategic network disruption). In response, networks that face competition will adapt their structure, and will avoid vulnerable network structures. Such network competition is what our paper is concerned with.Strategic Network Disruption, Strategic Network Design, Noncooperative Network Games

OAI identifier:

Suggested articles


  1. (2000). A noncooperative model of network formation.
  2. (1996). A strategic model of social and economic networks.
  3. (2001). A theory of buyer-seller networks.
  4. (2006). Application of accessibility based methods for vulnerability analysis of strategic road networks.
  5. (2001). Birds of a feather: Homophily in social networks. Annual Review of Sociology,
  6. (2006). Choosing what to protect: Strategic defensive allocation against an unknown attacker.
  7. (2002). Coalitions and networks in industrial organization.
  8. (2003). Competing transport networks.
  9. (2009). Connections: An Introduction to the Economics of Networks.
  10. (1995). Connectivity and Network Flows,
  11. (1987). Contracts as a barrier to entry.
  12. (2009). Divide and conquer. Working Paper.
  13. (2007). Employee poaching, predatory hiring, and covenants not to compete.
  14. (2009). Enhancing transportation security against terrorist attacks. Working Paper,
  15. (1999). Equilibria in networks.
  16. (2006). Firms behaving badly: International regulations of anticompetitive behavior. Working Paper, Tinbergen Institute.
  17. (2005). Graph Theory.
  18. (2008). Hacking-proofness and stability in a model of information security networks. Working Paper,
  19. (2008). How to organize crime.
  20. (1977). Introductory Graph Theory. Dover Publication,
  21. (2009). Lowering the bar or setting the standard? deutsche telekom’s u.s. labor practices. Technical report, American Rights at Work Education Fund.
  22. (2010). Network externalities and the structure of terror networks.
  23. (1985). Network externalities, competition, and compatibility.
  24. (2006). Network formation with heterogeneous players.
  25. (2004). Network robustness and graph topology.
  26. (2006). Network warfare operations: Unleashing the potential.
  27. (1983). Raising rivals’ costs.
  28. (2007). Rational terrorists and optimal network structure.
  29. (2010). Raytheon bbn technologies demos disruption-tolerant network.,
  30. (2009). Robust networks. Working Paper,
  31. (2003). Robustness and vulnerability of scale-free random graphs.
  32. (2008). Social and Economic Networks.
  33. (2008). Strategic network formation with structural holes.
  34. (2007). Structural holes in social networks.
  35. (1992). Structural Holes.
  36. (2004). Successful Monopolization Through Predation: The National Cash Register Company,
  37. (1960). The Strategy of Conflict.
  38. (1988). Vertical mergers and market foreclosure.
  39. (2006). Who’s who in networks. wanted: The key player.
  40. (1927). Zur allgemeinen kurventheorie.

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.