Sic transit gloria mundi virtuali?: promise and peril in the computational social science of clandestine organizing

Massively multiplayer online games (MMOGs) maintain archival databases of all player actions and attributes including activity by accounts engaged in illicit behavior. If individuals in online worlds operate under similar social and psychological motivations and constraints as the offline world, online behavioral data could inform theories about offline behavior. We examine high risk trading relationships in a MMOG to illuminate the structures online clandestine organizations employ to balance security with efficiency and compare this to an offline drug trafficking network. This data offers the possibility of performing social research on a scale that would be unethical or impracticable to do in the offline world. However, analyzing and generalizing from clandestine behavior in online settings raises complex epistemological and methodological questions about the validity of such mappings and what methods and metrics are appropriate in these contexts. We conclude by discussing how computational social science can be applied to online and offline criminological concerns and highlight the "dual use" implications of these technologies.

[1]  W. Baker,et al.  THE SOCIAL ORGANIZATION OF CONSPIRACY: ILLEGAL NETWORKS IN THE HEAVY ELECTRICAL EQUIPMENT INDUSTRY* , 1993 .

[2]  Kevin Crowston,et al.  Validity Issues in the Use of Social Network Analysis with Digital Trace Data , 2011, J. Assoc. Inf. Syst..

[3]  Vili Lehdonvirta,et al.  Virtual Worlds Don't Exist: Questioning the Dichotomous Approach in MMO Studies , 2010, Game Stud..

[4]  A. Pentland,et al.  Life in the network: The coming age of computational social science: Science , 2009 .

[5]  Richard Heeks Current Analysis and Future Research Agenda on “Gold Farming”: Real-World Production in Developing Countries for the Virtual Economies of Online Games , 2008 .

[6]  Dmitri Williams,et al.  The Mapping Principle, and a Research Framework for Virtual Worlds , 2010 .

[7]  Garry Robins,et al.  An introduction to exponential random graph (p*) models for social networks , 2007, Soc. Networks.

[8]  Martina Morris,et al.  ergm: A Package to Fit, Simulate and Diagnose Exponential-Family Models for Networks. , 2008, Journal of statistical software.

[9]  M. Dupelj [On the theories of communication]. , 1966, Neuropsihijatrija.

[10]  Peng Wang,et al.  Recent developments in exponential random graph (p*) models for social networks , 2007, Soc. Networks.

[11]  Gueorgi Kossinets Effects of missing data in social networks , 2006, Soc. Networks.

[12]  Klaus von Lampe,et al.  Organized Crime and Trust:: On the conceptualization and empirical relevance of trust in the context of criminal networks , 2004 .

[14]  Malcolm K. Sparrow,et al.  The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .

[15]  M. Kenney The Architecture of Drug Trafficking: Network Forms of Organisation in the Colombian Cocaine Trade , 2007 .

[16]  John Skvoretz,et al.  8. Comparing Networks across Space and Time, Size and Species , 2002 .

[17]  Garry Robins,et al.  Understanding individual behaviors within covert networks: the interplay of individual qualities, psychological predispositions, and network effects , 2009 .

[18]  Jaideep Srivastava,et al.  Mining for Gold Farmers: Automatic Detection of Deviant Players in MMOGs , 2009, 2009 International Conference on Computational Science and Engineering.

[19]  Edward Castronova,et al.  As real as real? Macroeconomic behavior in a large-scale virtual world , 2009, New Media Soc..

[20]  Carlo Morselli,et al.  Law-Enforcement Disruption of a Drug Importation Network , 2006 .

[21]  Carlo Morselli,et al.  The Efficiency/Security Trade-Off in Criminal Networks , 2007, Soc. Networks.

[22]  Stanley Wasserman,et al.  Testing Multitheoretical, Multilevel Hypotheses About Organizational Networks: An Analytic Framework and Empirical Example , 2006 .

[23]  Byron Reeves,et al.  Total Engagement: Using Games and Virtual Worlds to Change the Way People Work and Businesses Compete , 2009 .

[24]  Julian Dibbell Play Money: Or, How I Quit My Day Job and Made Millions Trading Virtual Loot , 2006 .

[25]  J. Raab,et al.  Dark Networks as Organizational Problems: Elements of a Theory 1 , 2006 .

[26]  Edward Castronova,et al.  Exodus to the Virtual World: How Online Fun Is Changing Reality , 2007 .

[27]  Carlo Morselli,et al.  Inside Criminal Networks , 2008 .

[28]  Peter R. Monge,et al.  Theories of Communication Networks , 2003 .

[29]  Karen Page,et al.  Network Forms of Organization , 1998 .

[30]  Vili Lehdonvirta,et al.  Knowledge Map of the Virtual Economy: Converting the Virtual Economy into Development Potential , 2011 .

[31]  William Sims Bainbridge,et al.  The Warcraft Civilization: Social Science in a Virtual World , 2010 .

[32]  Jaideep Srivastava,et al.  Dark Gold: Statistical Properties of Clandestine Networks in Massively Multiplayer Online Games , 2010, 2010 IEEE Second International Conference on Social Computing.

[33]  Mia Consalvo,et al.  Cheating: Gaining Advantage in Videogames , 2007 .

[34]  C. Stohl,et al.  Networks of Terror: Theoretical Assumptions and Pragmatic Consequences , 2007 .

[35]  Martina Morris,et al.  statnet: Software Tools for the Representation, Visualization, Analysis and Simulation of Network Data. , 2008, Journal of statistical software.

[36]  Jaideep Srivastava,et al.  Trust Amongst Rogues? A Hypergraph Approach for Comparing Clandestine Trust Networks in MMOGs , 2011, ICWSM.