[go: up one dir, main page]

Academia.eduAcademia.edu
On Measuring Personal Connections and the Extent of Social Networks∗ Prasanta K. Pattanaik Department of Economics, University of California Riverside, CA 92521-0427, U.S.A. Phone: 909 787 5037, Ext. 1592 Fax: 909 787 5685 E-mail: ppat@ucrac1.ucr.edu Yongsheng Xu Department of Economics Andrew Young School of Policy Studies Georgia State University, Atlanta, GA 30303, U.S.A. Phone: 404 651 2769 Fax: 404 651 4985 E-mail: yxu3@gsu.edu This version: July 7, 2003 ∗ We are indebted to Thomas Kelly and Sunder Ramaswamy for introducing us to the literature on social capital. For helpful comments we are grateful to Marlies Ahlert, Kaushik Basu, Rajat Deb, Wulf Gaertner, Michael Jones, Marc Kilgour, and Joyashree Roy. Abstract. The notions of personal connection and social networks are key ingredients of the increasingly important concept of social capital in social sciences in general and in economics in particular. This paper discusses the problem of measuring personal connection and the extent of social networks that may exist in a society. For this purpose we develop several conceptual and analytical frameworks. In the process, we axiomatically characterize several measures of personal connection and social networks. JEL Classification Numbers: D0,O0, Z0 Keywords: Social network, personal connection, social capital, message transmission, aggregation 1 Introduction The purpose of this paper is to develop measures of the extent of social networks that may exist in a society. In the process, we also develop measures of the degree of personal connection between two individuals, the notion of personal connection between individuals being the conceptual basis of our notion of social networks. The concept of social networks is one of three key concepts, trust, norms and networks, which have been the focus of a number of important contributions by sociologists (see, among others, Putnam (1993, 1995) and Coleman (1990, 2000)) and economists (see, for example, Stiglitz (2000) and Dasgupta (2000)) in the recent literature on ‘social capital’. While it is not entirely clear that ‘social capital’ is the most appropriate term for describing collectively these three elements, there seems to be general agreement that they have important consequences for the functioning of a society. For example, social networks may make a person’s life richer and happier (thus serving as a ‘consumption good’). They can facilitate transactions and cooperative ventures by building trust, and can serve as conduits for the flow of information. They can also serve as a type of informal insurance insofar as one may fall back on one’s personal connections in the case of certain emergencies. Of course, social networks need not always play a benign role: social networks can be used to oppress those outside the network and to promote factionalism. Despite the increasing attention that the concept of social networks as a component of social capital has recently received, there does not seem to be much formal treatment of the issue of measuring the extent of social networks.1 In this paper, we develop an approach to the problem of measuring social networks. In doing so, we also derive measures of personal connection between individuals. Since our focus is the problem of measuring personal connection between individuals and the extent of social networks that already exist in a society, we take these connection and networks as given and do not discuss how they come into existence (for a discussion of how social networks evolve, see, among others, Dutta and Jackson (2001)). It 1 There have been a number contributions investigating conceptually and empirically the relevance of social capital to economics and the measurement of trust and trustworthiness– two key components of social capital. See, for example, Bowles and Gintis (2002), Durlauf (2002), Glaeser, Laibson and Sacerdote (2002), Glaeser, Laibson, Scheinkman and Soutter (2000), Knack and Keefer (1997), LaPorta, Lopez-de-Salanes, Shleifer and Vishny (1997). 1 may be worth noting that, our measures of personal connection and social networks are ‘descriptive’ in character: they do not involve any judgement about whether personal connection and social networks promote individual and/or social welfare. Our analysis proceeds in two stages. First, we discuss the problem of measuring personal connection between two individuals. In our framework, this is necessary for measuring the extent of social networks. As Scott (1991, p.3) observes, the analysis of social network must be based on relational data, “the contacts, ties and connections, the group attachments which relate one individual to another, and so cannot be reduced to the properties of the individual agents themselves”. Intuitively, our notion of personal connection between two individuals reflects the friendly relation that may exist between the two individuals directly or indirectly: the two individuals may have a direct friendly relation or they may have friends who know of each other through their friends. Either way, one can think of a benign chain of friends linking these two individuals. From this perspective, the measurement of the degree of personal connection between two individuals involves an examination of the set of all benign chains between them. Using this intuition, we first axiomatically characterize two measures of the degree of personal connection between two individuals based on the length of the shortest benign chains between them (as we note in Remark 2.2 below, our notion of a shortest benign chain is closely related to the notion of a geodesic in the literature on social networks, though the two concepts are not identical). These measures have an interesting feature: the degree of personal connection between two individuals is (weakly) inversely related to the length of the shortest benign chains. We then characterize several other measures of personal connection, using the specific interpretation of personal connection as a means of transmitting messages. These other measures capture the idea that benign chains are conduits of messages from one person to another and that, when a message is transmitted indirectly from one person to another via a benign chain, it gets diluted at each successive stage in the transmission process. In the second stage of our analysis, we develop measures of social networks, using personal connections between individuals as building blocks. We view the problem of measuring social networks as a problem of aggregation, namely the aggregation of personal connections for all pairs of distinct individuals in the society. This procedure fits in well with some suggestions for the measurement of social networks that one finds in the literature. Indeed, as Marsden (1990) indicates, network range, the strength of personal 2 connections, network size and density are some of the indicators of the extent of social networks. Many of these indicators are incorporated in our procedure of measuring the degree of personal connections for each pair of distinct individuals in the society and then aggregating these personal connections to arrive at a measure of social networks. We show that, under certain plausible conditions, the extent of social networks existing in a society is the simple sum of the degrees of personal connections for all pairs of distinct individuals in the society. The plan of our paper is as follows. In Section 2, we present the basic notation and definitions. In Section 3, we axiomatically characterize some measures of the degree of personal connections between two individuals. Section 4 proposes and axiomatically characterizes some measures of the extent of social networks in a given society. We conclude in Section 5. Proofs of our results are organized in Appendices A, B, and C. 2 Basic Notation and Definitions Let N = {1, 2, · · · , n} be a community of n ≥ 3 individuals. Let R and R(−) be two binary relations defined over N , such that: (i) R is reflexive and symmetric; (ii) R(−) is irreflexive and symmetric; and (iii) for all i and j in N , iRj implies not[iR(−)j].2 For reasons that will be obvious from the interpretations attached to R and R(−), R and R(−) are not assumed to be either necessarily connected or necessarily transitive. The interpretation of R is as follows. For all i and j in N , iRj denotes “i has a good relation with 2 The two binary relations, R and R(−), constitute the basic building blocks of our formal model. It has been suggested to us that some of the things that we do in terms of R and R(−) could be couched in the language of graph theory. However, we have not followed this suggestion for two reasons. First, we found that, by using the graph-theoretic language, we would not gain much in terms of economy in our exposition. Secondly, we felt that, compared to an exposition in terms of graph theory, our present exposition may have the advantage of being accessible to a wider group of social scientists. 3 j”3 . Similarly, iR(−)j denotes that i has a hostile relation with j.4 Note that, under our specification, not(iRj) does not necessarily imply iR(−)j: two individuals i and j may have neither a good relation nor a hostile relation between them. When iRj, i and j have a direct (benign) personal connection. However, even if i may not have any direct personal connection with j, i may have a good relation with someone who, in turn, may have a good relation with j. Indeed, in general, one can think of a “good relation chain” linking i and j through a series of individuals functioning as intermediaries between i and j.5 In the absence of a direct personal connection between i and j, “such a good relation chain” or indirect personal connection can, to some extent, serve some of the desirable or undesirable purposes that a direct (benign) personal connection does. An indirect personal connection can enrich a person’s life, though to a lesser extent than a direct personal connection. An indirect personal connection can also promote trust and facilitate economic transactions. It can also act as a conduit for the flow of information, though it would, presumably be a less effective conduit than a direct personal connection. Finally, in case of necessity, one can also appeal to another individual for help, using an indirect personal connection. These considerations provide the motivation for our next definition. Definition 2.1: For all distinct i and j, we say that there exists a benign chain from i to j iff there exists a positive integer t (t ≤ n) such that, for some m(1), · · · , m(t) in N , we have: (2.1.1) m(1) = i, m(t) = j; (2.1.2) m(1), ..., m(t) are all distinct; 3 Some of our colleagues have occasionally raised questions about the symmetry of the relation “has a good relation with”. It has been pointed out to us that a ‘similar’ binary relation, “is in love with” is not necessarily symmetric. While symmetry is certainly an assumption of doubtful validity in the case of the binary relation “is in love with”, the situation seems to be very different for the binary relation “has a good relation with”. The assumption that, if i has a good relation with j, then j must have a good relation with i, seems very plausible to us. Similarly, we find it compelling to assume that the binary relation “has a hostile relation with” is symmetric. 4 The data relating to our two binary relations, R and R(−), can be collected by the Moreno (1934) procedure, familiar in social network analysis. Moreno (1934) used a form of his sociometric experiment to record not only friendship but enmity as well. 5 In our more formal definition (Definition 2.1) of a “benign chain”, we require that no two individuals involved in the chain should have a hostile relation. 4 (2.1.3) for every positive integer k < t, m(k)Rm(k + 1); (2.1.4) for all i′ and j ′ in {m(1), ..., m(t)}, not[i′ R(−)j ′ ]. Given such m(1), · · · , m(t), we call the finite sequence (m(1), · · · , m(t)) a benign chain from i to j, and we define the length of the chain to be (t − 1) (i.e., the number of “elementary links” in the chain). A shortest benign chain from i to j is a benign chain from i to j that has the smallest length. Remark 2.2: The notion of a shortest benign chain is similar to, though not identical with, the notion of a geodesic in the literature on social networks. The main difference between the two concepts lies in the fact that our definition of a benign chain requires that no two individuals involved in the ’chain’ should have a hostile relation, while this requirement is not incorporated in the notion of a path, on which the notion of a geodesic is based. It may be worth noting that the geodesic is an important concept in the literature on social networks: it is often taken as a measure of how far apart two individuals are; it has been used in several of the centrality measures in social network analysis; it is an important factor for constructing some particular social networks; and, in some writings on communication networks, it has been assumed that the message betweeen two individuals is transmitted through a geodesic between them. (See Wasserman and Faust (1994) for a discussions of the importance of geodesics in social network analysis.) Remark 2.3: It can be checked that: (i) if (m(1), · · · , m(t)) is a benign chain from i to j, then (m(t), · · · , m(1)) must be a benign chain from j to i; (ii) the length of a benign chain from i to j cannot exceed n − 1; and (iii) the smallest length that a benign chain from i to j can possibly have is 1 (this happens when iRj). When there is a benign chain from i to j, we say that i and j are linked ; otherwise, we say that i is isolated from j. 3 Personal Connections In this section, we discuss some measures of the closeness of the favourable direct or indirect relation that may exist between two distinct individuals i and j. Let Z be the class of all two-element subsets of N . 5 Let ℘ be the collection of all (R, R(−)) such that R and R(−) are two binary relations defined over N with the properties specified in Section 2. The elements in ℘ will be denoted as R, R′ , etc. An R ∈ ℘ is said to be without hostility iff there exists no {i, j} ∈ Z such that iR(−)j. Let R ∈ ℘ be without hostility. If, under R, (m(1) = i, · · · , m(t) = j) is a shortest benign chain from i to j, then for all positive integers i′ and j ′ with 1 ≤ i′ < j ′ ≤ t, (m(i′ ), · · · , m(j ′ )) is a shortest benign chain from m(i′ ) to m(j ′ ). Let d : ℘ × Z → (−∞, +∞) be a function from ℘ × Z to the real line. The intended interpretation of the d function can be explained as follows: For a given R and any two distinct individuals i and j in N , d(R, {i, j}) denotes the degree of personal connection between i and j, or the extent of the favourable (direct or indirect) relation that may exist between i and j, given R. Therefore, for a given R, for all {i, j} and {p, q} in Z, d(R, {i, j}) ≥ d(R, {p, q}) will be interpreted as meaning that, given R, the degree of the personal connection between i and j is at least as great as the degree of the personal connection between p and q. 3.1 Some General Properties of Personal Connections In this subsection, we discuss some general properties of the d(·, ·) function. For this purpose, we consider the following properties imposed on d(·, ·). Definition 3.1 d(·, ·) satisfies: (3.1.1) Simple Domination (I) iff, for all R, R′ ∈ ℘, all {i, j}, {p, q} ∈ Z, if [iRj or p is isolated from q under R′ ] then d(R, {i, j}) ≥ d(R′ , {p, q}); (3.1.2) Simple Domination (II) iff, for all R, R′ ∈ ℘, all {i, j}, {p, q} ∈ Z, if [iRj and not(pR′ q)] or [i is linked with j under R, and p is isolated from q under R′ ] then d(R, {i, j}) > d(R′ , {p, q}); (3.1.3) Weak Simple Domination (II) iff, for all R, R′ ∈ ℘, all {i, j}, {p, q} ∈ Z, if [iRj and not(pR′ q)] or [i is linked with j under R and p is isolated from q under R′ ] then d(R, {i, j}) ≥ d(R′ , {p, q}); (3.1.4) Independence iff, for all R, R′ ∈ ℘, all {i, j} ∈ Z be such that R and R′ are without hostility, if (m(1) = i, · · · , m(s), m(s + 1) = j) is the 6 unique benign chain from i to j under R, (m′ (1) = i, · · · , m′ (t), m′ (t + 1) = j) is the unique benign chain from i to j under R′ , then, d(R, {i, j}) ≥ d(R′ , {i, j}) ⇔ d(R, {i, m(s)}) ≥ d(R′ , {i, m′ (t)}); (3.1.5) Weak Independence iff, for all R, R′ ∈ ℘, all {i, j} ∈ Z be such that R and R′ are without hostility, if (m(1) = i, · · · , m(s), m(s+1) = j) is the unique benign chain from i to j under R, (m′ (1) = i, · · · , m′ (t), m′ (t + 1) = j) is the unique benign chain from i to j under R′ , then, d(R, {i, j}) ≥ d(R′ , {i, j}) ⇒ d(R1 , {i, m(s)}) ≥ d(R′1 , {i, m′ (t)}); (3.1.6) Neutrality iff, for all R, R′ ∈ ℘ and for all {i, j} ∈ Z, if the set of all benign chains from i to j under R is the same as the set of all benign chains from i to j under R′ , then d(R, {i, j}) = d(R′ , {i, j}); (3.1.7) Anonymity iff, for all R, R′ ∈ ℘, and all one-to-one function σ from N to N , if, for all i, j ∈ N, [(iRj) iff σ(i)R′ σ(j)] and [iR(−)j iff σ(i)R′ (−)σ(j)], then, for all {i, j} ∈ Z, d(R, {i, j}) = d(R′ , {σ(i), σ(j)}); (3.1.8) Monotonicity iff, for all R, R′ ∈ ℘ and all {i, j} ∈ Z, if every benign chain from i to j under R′ is a benign chain from i to j under R, then d(R, {i, j}) ≥ d(R′ , {i, j}); (3.1.9) Dominance iff, for all R, R′ , R′′ ∈ ℘ and all {i, j} ∈ Z, if [the set of all benign chains from i to j under R′′ is the union of the set of all benign chains from i to j under R and the set of all benign chains from i to j under R′ ] and [d(R, {i, j}) ≥ d(R′ , {i, j})], then d(R, {i, j}) ≥ d(R′′ , {i, j}). Simple Domination (I) requires that, if i and j are directly connected under R or p and q are isolated from each other under R′ , then the degree of personal connection between i and j under R is at least as great as the degree of personal connection between p and q under R′ . It is a plausible axiom, but it may be worth noting that Simple Domination (I) rules out certain types of intuition. Suppose iRj but (i, j) is the only benign chain between i and j. On the other hand, suppose not[i′ Rj ′ ] but there exist 100 distinct individuals, p1, ..., p100 , such that, for t = 1, ..., 100, (i′ , pt , j ′ ) constitutes a 7 benign chain from i′ to j ′ . Then, for some intuitive purposes, the connection between i′ and j ′ may be considered closer than the connection between i and j. For example, if i′ wants to induce j ′ to do something for him, then i′ can get 100 different individuals to intercede with j ′ for him, and that may be even more effective than the persuasive influence that i can exert on j through his direct friendly relation with j. Thus, intuitively, one may like to admit the possibility that d(R, {i′ , j ′ }) > d(R, {i, j}) in this case. However, this is not permissible under Simple Domination (I). Simple Domination (II) extends the intuition embedded in Simple Domination (I) further by requiring that the degree of personal connection between i and j under R is greater than the degree of personal connection between p and q under R′ if either i is directly connected with j under R and p is not directly connected with q under R′ , or i is linked with j under R while p is isolated from q under R′ . In our current framework, Simple Domination (II) seems plausible as well, but the reservation that we noted in the case of Simple Domination (I) also applies to Simple Domination (II). Weak Simple Domination (II) is a weaker requirement than Simple Domination (II). It should also be noted that Simple Domination (I) implies Weak Simple Domination (II). Independence requires the following. Suppose R and R′ are without hostility. Suppose there is a unique benign chain from i to j under each of R and R′ . Let k be the individual immediately before j in the benign chain from i to j under R, and let k ′ be the individual immediately before j in the benign chain from i to j under R′ . Then Independence requires that the ranking of the degree of personal connection between i and k under R and the degree of personal connection between i and k ′ under R′ must be analogous to the ranking of the degree of personal connection between i and j under R and the ranking of the personal connection between i and j under R′ . Weak Independence is a weaker version of independence. Essentially, Neutrality stipulates that the degree of personal connection between two individuals depends only on the set of benign chains between those two individuals. If, in switching from R to R′ , the set of benign chains from i to j remains the same, then the degree of personal connection between i and i′ will remain unchanged. Anonymity rules out the possibility that some people may be more “effective” in a benign chain as compared to other people. Monotonicity reflects the intuition that the degree of personal connection between any two individuals does not decrease when additional benign chains between them come into existence. Dominance has a very different type of 8 underlying intuition. Let R and R′ be such that the degree of personal connection between i and j under R is at least as great as the degree of personal connection between i and j under R′ , and let R′′ be such that the set of benign chains between i and j under R′′ is simply the union of the two sets of benign chains between i and j under R and R′ . Now compare the degrees of personal connection between i and j under R and R′′ . Note that, in going from R to R′′ , we are merging with the set of already existing benign chains between i and j another set of benign chains (namely, those that exist under R′ ), which is not ‘superior’ to or ‘more effective’ than the set of already existing benign chains (we know this since the degree of personal connection between i and j is no greater under R′ than under R). Given this, Dominance requires that the degree of personal connection between i and j should not increase when we make the transition from R to R′′ . How sound is this intuition? Suppose the sole purpose for which a benign chain may be used is to convey messages from the person at the beginning of the chain to the person at the end of the chain, and that in sending a message to another person, the originator of the message chooses only one chain. Then, it is reasonable to assume that the value of a set of benign chains is simply the value of those individual benign chains in the set, which are most effective for this purpose. In that case, it is reasonable to postulate that, given our specifications of R, R′ , and R′′ , there is no gain in terms of the degree of personal connection between i and j when we switch from R to R′′ . However, one can think of alternative scenarios where one’s intuitiuon may go in a different direction. Suppose, as in the counterexample that we considered in the case of Simple Domination (I), benign chains are used to exert influence on other individuals. In that case, merging the set of benign chains between i and j under R′ with the set of benign chains between them under R will provide i with an opportunity to exert more persuasive influence on j, even though, considered separately, the former set of benign chains was no more effective than the latter set of benign chains. In that case, Dominance can be violated. Thus, as in the case of Simple Domination (I), and Simple Domination (II), the appeal of Dominance depends on how we visualize the purpose of benign chains. In this paper, our main emphsis is on the use of benign chains simply to transmit messages. In this specific context, Dominance, as well as Simple Domination (I) and Simple Domination (II), seems to have considerable appeal. With the help of the above properties imposed on d, we are ready to present the following results. Their proofs can be found in Appendix A. 9 Theorem 3.2. d satisfies Simple Domination (I), Simple Domination (II), Neutrality, Anonymity, Independence, Monotonicity and Dominance iff, for all R, R′ ∈ ℘ and all {i, j}, {p, q} ∈ Z, d(R, {i, j}) ≥ d(R′ , {p, q}) iff ([t ≤ s] or [p is isolated from q under R′ ]) (1) where t is the length of a smallest benign chain from i to j under R and s is the length of a smallest benign chain from p to q under R′ . Theorem 3.3. d satisfies Simple Domination (I), Neutrality, Anonymity, Weak Independence, Monotonicity and Dominance if and only if for all R, R′ ∈ ℘, all {i, j}, {p, q} ∈ Z, [t ≤ s] or [p is isolated from q under R′ ] ⇒ d(R, {i, j}) ≥ d(R′ , {p, q}) where t is the length of the shortest benign chain from i to j under R, and s is the length of the shortest benign chain from p to q under R′ . 3.2 Personal Connections Interpreted in Terms of Message Transmission In the preceding section, we developed a general measure of the degree of personal connection: we showed that certain axioms characterize the ranking of degrees of personal connection on the basis of the length of the shortest benign chains involved. In the rest of Section 3, we develop some other measures of personal connection, using the specific interpretation of personal connection as a means of transmitting messages. Under this interpretation, benign chains will be viewed as conduits of messages from one person to another. A central idea in our context is that when a message is transmitted from i to j via a benign chain, if the message has to go through other individual(s) to reach j, the message will be diluted in the process of transmission. Throughout this subsection, we make the following assumption: Normalization. For all R ∈ ℘ and all {i, j} ∈ Z, if iRj then d(R, {i, j}) = 1 and if i is isolated from j under R, then d(R, {i, j}) = 0. Let R = (R, R(−)) ∈ ℘ be given. Let {i, j} ∈ Z and let C = (m(1) = i, · · · , m(t + 1) = j) be a benign chain from i to j with t ≥ 1. We now introduce the notion of C being used as a message channel from i to j. 10 Suppose i = m(1) sends a message of volume 1 to j = m(t + 1), using C as a message channel. Then: (i) for every k ∈ {2, · · · , t + 1}, m(k) receives a message in the amount of am(k) [C] (am(k) [C] ≥ 0) from m(k − 1), the predecessor of m(k) in the benign chain (the amount of the message received by m(k) is the same as the amount of the message sent by m(k − 1) to m(k)); (ii) for every k ∈ {2, · · · , t}, an amount aLm(k) [C] (aLm(k) [C] ≥ 0) of the message received by m(k) is lost; and (iii) for every k ∈ {3, · · · , t + 1}, am(k) [C] = am(k−1) [C] − aLm(k−1) [C]. Let R ∈ ℘ be given. The next property concerns the efficiency of message channels. Given our interpretation of benign chains as potential message channels, it seems natural to assume that the maximum amount of a unit message, which can be transmitted from i to j, constitutes a measure of the personal connection between i and j. This is the intuition underlying the following assumption. Assumption 3.4. For all R ∈ ℘ and all {i, j} in Z, if, according to R, there is a benign chain from i to j, then, for some benign chain C = (m(1) = i, · · · , m(t + 1) = j) with t ≥ 1 from i to j, d(R, {i, j}) is the amount of message received by j from her predecessor m(t), when i uses C to send a message of volume 1 to j. When transmitting messages indirectly from i to j, our message channel may contain noise: some portion of the message may get lost at each stage of transmission. The lost amount of the message may be regarded as reflecting frictions for a given society. We distinguish two scenarios here. In the first scenario, the amount of the message that gets lost at each stage of the transmission process is exogenously given. In the second scenario, the amount of the message that is lost at each stage is endogenously determined. 3.2.1 Exogenously Determined Message Loss There are two plausible ways of looking at the indirect transmission of a message from i to j when the loss of message at each stage of indirect transmission is exogenously determined. In the first instance, one may assume that, when a message is indirectly transmitted through a benign chain, at each stage of this indirect transmission, an exogenously given fraction of the received message is lost and the rest is transmitted to the next stage. Alternatively, one may assume that, when a message is indirectly transmitted 11 through a benign chain, at each stage of this indirect transmission, an exogenously given absolute amount is lost and the rest is transmitted to the next stage. We shall consider both ways and derive some implications. The proofs of our results in this subsection can be found in Appendix B. Exogenously Determined Proportional Message Loss. We say that the process of message transmission is characterized by exogenously determined proportional message loss iff there exists ψ ∈ (0, 1) such that, for every R ∈ ℘, all {i, j} ∈ Z, and every benign chain C = (m(1) = i, m(2), · · · , m(t + 1) = j) from i to j under R, if i sends a message of volume 1 to j through the message channel C, then aLm(k) [C] = ψam(k−1) [C], for all k ∈ {3, · · · , t + 1}. Exogenously Determined Absolute Message Loss. We say that the process of message transmission is characterized by exogenously determined absolute message loss iff there exists α > 0, such that, for every R ∈ ℘, all {i, j} ∈ Z, and every benign chain C = (m(1) = i, m(2), · · · , m(t + 1) = j) from i to j under R, if i sends a message of volume 1 to j through the message channel C, then aLm(k) [C] = max{min{am(k−1) [C] − α, α}, 0}, for all k ∈ {3, · · · , t + 1}. Theorem 3.5. Suppose Normalization and Assumption 3.4 are satisfied and the process of message transmission is characterized by exogenously determined proportional message loss, where the fraction of message lost at each stage is given by ψ. Then d(·, ·) satisfies Simple Domination (II), Neutrality, Anonymity, Independence, Monotonicity and Dominance iff, for all R ∈ ℘ and all {i, j} in Z, we have: (i) d(R, {i, j}) = 0, if i and j are isolated under R; (ii) d(R, {i, j}) = 1 if iRj, and (iii) d(R, {i, j}) = (1 − ψ)t , where t ≥ 1 and t + 1 is the length of a shortest benign chain from i to j under R. Theorem 3.6. Suppose Normalization and Assumption 3.4 are satisfied and the process of message transmission is characterized by exogenously determined absolute message loss, where the absolute amount of message lost 12 at each stage is given by α > 0. Then, d(·, ·) satisfies Weak Simple Domination (II), Weak Independence, Neutrality, Anonymity, Monotocity and Dominance iff, for all R ∈ ℘ and all {i, j} in Z, we have: (i) d(R, {i, j}) = 0, if i and j are isoloated under R; (ii) d(R, {i, j}) = 1 if iRj, and (iii) d(R, {i, j}) = max{1 − tα, 0}, where t ≥ 1 and t + 1 is the length of a shortest benign chain from i to j under R. 3.2.2 Endogenously Determined Message Loss In this subsection, we consider the possibility that the amount of message loss at each stage of indirect transimission is determined endogenously. Endogenously Determined Message Loss. We say that the process of message transmission is characterized by endogenously determined message loss iff, for every R ∈ ℘, all {i, j} ∈ Z, and every benign chain C = (m(1) = i, m(2), · · · , m(t + 1) = j) from i to j under R, when i sends a message of volume 1 to j through C, we have aLm(k) [C] = aLm(k+1) [C] = am(k) for every k ∈ {2, · · · , t}, that is, the same amount of the message is lost at each stage of indirect transmission and j receives the same amount of the message as is lost by m(t). The following theorem summarizes the implication of the framework with endogenously determined message loss. The proof of the theorem can be found in Appendix B. Theorem 3.7. Suppose Normalization and Assumption 3.4 are satisfied and the process of message transmission is characterized by endogenously determined message loss. Then, d(·, ·) satisfies Simple Domination (II), Neutrality, Anonymity, Independence, Monotonicity and Dominance iff, for all R ∈ ℘ and all {i, j} in Z, (i) d(R, {i, j}) = 0 if i and j are isolated; (ii) d(R, {i, j}) = 1 if iRj; and (iii) d(R, {i, j}) = 1/t where t ≥ 1 and t is the length of a smallest benign chain from i to j under R. 13 4 The Extent of Social Networks In this section, we discuss the issue of measuring the extent of social networks for different societies. For a given R ∈ ℘, intuitively, the extent of networks in R can be thought of as a function of the degrees of benign connections for all two distinct {i, j} in Z. We use ω(R) to denote the extent of social networks in the society given by R. Consider the following axioms to be imposed on ω(·). Definition 4.1. ω is said to satisfy (4.1.1) Marginal Contribution iff, for all R, R′ ∈ ℘, for all {i, j} ∈ Z, if for all {p, q} ∈ Z, and [d(R, {p, q}) ≥ d(R, {i, j}), ] [{p, q} 6= {i, j} ⇒ ((pRq ⇔ pR′ q) and (pR(−)q ⇔ pR′ (−)q))], [iR′ (−)jand not(iR(−)j)], then ω(R) − ω(R′ ) = d(R, {i, j}); (4.1.2) ω-Normalization iff, for all R ∈ ℘, if for all {i, j} ∈ Z, not(iRj), then ω(R) = 0. ω-Normalization is simply a convention and does not impose any significant restriction on the extent of social networks. Marginal Contribution stipulates that, if the only difference between R and R′ is that two individuals, i and j, are non-hostile and have the “weakest” link under R and are hostile and have no link under R′ , then the change in the extent of social networks when we switch from R′ to R is captured by the degree of the personal connection between these two individuals under R: after all, there is absolutely no benign chain from i to j under R′ and hence the degree of the personal connection between them under R′ is zero. We now state our results in this section. Their proofs can be found in Appendix C. Theorem 4.2. Suppose d satisfies Simple Domination (I), Simple Domination (II), Neutrality, Anonymity, Independence, Monotonicity and Dominance, and ω satisfies Marginal Contritution and ω-Normalization. Then, X for all R ∈ ℘, ω(R) = d(R, {i, j}), {i,j}∈Z 14 where d(·, ·) has the property given in Theorem 3.2. Theorem 4.3. Suppose d satisfies Simple Domination (I), Neutrality, Anonymity, Weak Independence, Monotonicity and Dominance, and ω satisfies Marginal Contritution and ω-Normalization. Then, X for all R ∈ ℘, ω(R) = d(R, {i, j}), {i,j}∈Z where d(·, ·) has the property given in Theorem 3.3. For illustrative purpose, we consider the following example. Example 4.4. Let N = {1, 2, 3, 4}. For the purpose of comparison, in each of the following social structures, I, II, III, IV and V, we assume that (a) for all i, j ∈ N , there exists a benign chain from i to j; and (b) there exist no i, j ∈ N such that i and j are hostile: I. 1R2, 1R3, 1R4, 2R3, 2R4 and 3R4; II. 1R2, 1R3, 2R3, 2R4 and 3R4; III. 1R2, 1R3, 2R4 and 3R4; IV. 1R2, 1R3 and 1R4; V. 1R2, 2R3, 3R4. These five structures are illustrated in Figure 1. [Figure 1 About Here] Structure V can be regarded as an extreme hierarchy, IV as a variant of hierarchies, III as a type of corporations, and II and I are variants of horizontal structure. For all i, j ∈ N , let t be the length of a shortest benign chain from i to j. Let f (t) be the degree of personal connection between two individuals for t. Clearly, f (1) ≥ f (2) ≥ f (3). For all s ∈ {I, II, III, IV, V }, let ω(s) be the extent of social networks under structure s. Then, we obtain the following: ω(I) = 6f (1) ω(II) = 5f (1) + f (2) ω(III) = 4f (1) + 2f (2) ω(IV ) = 3f (1) + 3f (2) ω(V ) = 3f (1) + 2f (2) + f (3) 15 It is then clear that ω(I) ≥ ω(II) ≥ ω(III) ≥ ω(IV ) ≥ ω(V ). Thus, if one uses the extent of social networks to measure the amount of social capital in a society, then, in our example, the extreme hiearchy offers the least amount of social capital. This is in line with the findings of, for example, Putnam (1983) and La Porta, Lopez-de-Silanes, Shleifer, and Vishny (1997). By Theorems 4.2 and 4.3, from Theorems 3.5, 3.6 and 3.7, the following results are immediate. Corollary 4.5. Suppose Normalization and Assumption 3.4 are satisfied. Suppose further that d satisfies Simple Domination (II), Neutrality, Anonymity, Independence, Monotonicity and Dominance, and ω satisfies Marginal Contritution and ω-Normalization. 4.5.1. If the process of message transmission is characterized by exogenously determined proportional message loss, where the fraction of message lost at each stage is given by ψ, then X for all R ∈ ℘, ω(R) = d(R, {i, j}), {i,j}∈Z where d(·, ·) has the property given in Theorem 3.5. 4.5.2. If the process of message transmission is characterized by endogenously determined message loss, then X for all R ∈ ℘, ω(R) = d(R, {i, j}), {i,j}∈Z where d(·, ·) has the property given in Theorem 3.7. Corollary 4.6. Suppose Normalization and Assumption 3.4 are satisfied. Suppose further that d satisfies Simple Domination (I), Simple Weak Domination (II), Neutrality, Anonymity, Weak Independence, Monotonicity and Dominance, and ω satisfies Marginal Contritution and ω-Normalization. 16 4.6.1. If the process of message transmission is characterized by exogenously determined absolute message loss, where the absolute amount of message lost at each stage is given by α, then X for all R ∈ ℘, ω(R) = d(R, {i, j}), {i,j}∈Z where d(·, ·) has the property given in Theorem 3.6. 5 Concluding Remarks In this paper, we have axiomatically developed measures of the personal connection between two individuals and also measures of the extent of social networks in a society. Our analysis suggests several directions for further exploration. First, in introducing the binary relation R (“having a good relation with”) over the set of all individuals, we did not distinguish the varying strengths of a (direct) good relation -“close friendship”, “ordinary friendship”, “a mildly friendly relation”, and so on. Intuitively, the strengths of the (direct) good relations involved in benign chains between two individuals would seem to be relevant in assessing the degree of (direct or indirect) personal connection between them. We have not discussed this issue in our paper. It is an issue that deserves separate investigation. Secondly, in discussing our axioms, we have referred to contexts where some of our axioms may not be very plausible. For example, each benign chain from p to q may serve as a valuable channel through which p can exert persuasive influence on q when the occasion requires it, and the benign chain may retain this value no matter how many other benign chains may be available . In that case, in assessing the degree of personal connection between p and q, it may not be possible to identify the effectiveness of a set of benign chains between p and q with the effectiveness of any single benign chain in the set. Also, in such cases, there may be possible tradeoffs between the range of benign chains available and the consideration of the lengths of these benign chains. We have not incorporated these aspects in our analysis; again, these aspects deserve separate investigation. 17 References Bowles, S. and Gintis, H. (2002), “Social capital and community governance”, Economic Journal, 112, F419-F436. Coleman, J. S. (1990), Foundations of Social Theory (Cambridge, Mass.: Harvard University Press). Coleman, J. S. (2000), “Social capital in the creation of human capital”, in P. Dasgupta and I. Serageldin (eds.), Social Capital (Washington, D.C.: World Bank). Dasgupta, P. (2000), “Economic progress and the idea of social capital” in P. Dasgupta and I. Serageldin (eds.), Social Capital (Washington, D.C.: World Bank). Durlauf, S. N. (2002), “On the empirics of social capital”, Economic Journal, 112, F459-479. Dutta, B. and Jackson, M. O. (2001) “On the formation of networks and groups,” forthcoming in Models of the Strategic Formation of Networks and Groups, B. Dutta and M. O. Jackson (eds.), Springer-Verlag. Glaeser, E. L., Laibson, D. and Sacerdote, B. (2002), “An economic approach to social capital”, Economic Journal, 112, F437-458. Glaeser, E. L., Laibson, D., Scheinkman, D., and Soutter, C. (2000), “Measuring trust”, Quarterly Journal of Economics, 115, 811-846. Knack, S. and Keefer, P. (1997), “Does social capital have an economic payoff? A cross-country investigation”, Quarter Journal of Economics, 112, 1251-1288. La Porta, R., Lopez-de-Silanes, F., Shleifer, A., and Vishny, R. W. (1997), “Trust in large organizations”, American Economic Review: Papers and Proceedings, 87, 333-338. Marsden. P. V. (1990), “Network data and measurement”, Annual Review of Sociology, 16, 435-463. 18 Moreno, J. L. (1934), Who Shall Survive? Foundations of Sociometry, Group Psychotherapy, and Sociodrama (Washington D. C.: Nervous and Mental Disease Publishing Co. Reprinted in 1953 (Second Edition) and in 1978 (Third Edition) by Beacon House, Inc., Beacon, NY.) Putnam, R.D. (1993), Making Democracy Work: Civic Traditions in Modern Italy (Priceton: Princeton University Press). Putnam, R.D. (1995), “Bowling alone: America’s declining social capital”, Journal of Democracy, 6, 65-78. Scott, J. (1991), Social Network Analysis: A Handbook (Thousand Oaks: Sage). Stiglitz, J.E. (2000), “Formal and informal institutions” in P. Dasgupta and I. Serageldin (eds.), Social Capital (Washington, D.C.: World Bank). Wasserman, S. and Faust, K. (1994), Social Network Analysis (New York: Cambridge University Press). 19 Appendix A Proof of Theorem 3.2. It can be checked that if (1) holds for all {i, j}, {p, q} ∈ Z and all R, R′ ∈ ℘, then d satisfies Simple Domination (I), Simple Domination (II), Neutrality, Anonymity, Independence, Monotonicity and Dominance. We now show that if d satisfies Simple Domination (I), Simple Domination (II), Neutrality, Anonymity, Independence, Monotonicity and Dominance, then for all {i, j}, {p, q} ∈ Z and all R, R′ ∈ ℘, (1) holds. Let d satisfy Simple Domination (I), Simple Domination (II), Neutrality, Anonymity, Independence, Monotonicity and Dominance. First, we note that, by Simple Domination (I), for all R, R′ ∈ ℘ and all {i, j}, {p, q} ∈ Z, if i is isoloated from j under R and p is isolated from q under R′ , then d(R, {i, j}) = d(R′ , {p, q}) (2) and if iRj and pR′ q, then d(R, {i, j}) = d(R′ , {p, q}). (3) Next, by Domination (II), for all R, R′ ∈ ℘ and all {i, j}, {p, q} ∈ Z, if [iRj and notpR′ q] or [i is linked with j under R and p is isolated from q under R′ , then d(R, {i, j}) > d(R′ , {p, q}). (4) We now show that, Claim 1: For all R, R′ ∈ ℘ such that R and R′ are without hostility, for all {i, j} ∈ Z, if (m(1) = i, m(2), · · · , m(t + 1) = j) is the unique benign chain from i to j under R and (m′ (1) = i, m′ (2), · · · , m′ (s + 1) = j) is the unique benign chain from i to j under R′ , then d(R, {i, j}) ≥ d(R′ , {i, j}) ⇔ t ≤ s. 20 Consider first that s = t. If s = t = 1, then, by (3), d(R, {i, j}) = d(R′ , {i, j}) follow immediately. Suppose s = t > 1. Then, by the successive use of Independence, we obtain d(R, {i, j}) ≥ d(R′ , {i, j}) iff d(R, {i, m(2)}) ≥ d(R′ , {i, m′ (2)}). From (3), d(R, {i, m(2)}) = d(R′ , {i, m′ (2)}). Therefore, d(R, {i, j}) = d(R′ , {i, j}) follows immediately. Consider now that s > t. Let s = t + h. It should be noted that for all k = t + 1, · · · , s, (m′ (1) = i, · · · , m′ (k)) is the unique benign chain from i to m′ (k) under R′ . By the successive use of Independence, we obtain d(R, {i, j}) ≥ d(R′ , {i, m′ (t + 2)}) iff d(R, {i, m(2)}) ≥ d(R′ , {i, m′ (3)}). From (4), clearly, d(R, {i, m(2)}) > d(R′ , {i, m′ (3)}). Hence, d(R, {i, j}) > d(R′ , {i, m′ (t + 2)}). Similarly, we can show that d(R′ , {i, m′ (t + 2)}) > d(R′ , {i, m′ (t + 3)}), · · · , d(R′ , {i, m′ (s)}) > d(R′ , {i, m′ (s + 1) = j}). Therefore, d(R, {i, j}) > d(R′ , {i, j}). This completes the proof for Claim 1. With Claim 1, we are now ready to show the following: Claim 2: For all R, R′ ∈ ℘ and all {i, j} ∈ Z such that R′ is without hostility, if the length of a shortest benign chain from i to j under R is t ≥ 1 and m(1) = i, m(2), · · · , m(t + 1) = j is the unique benign chain from i to j under R′ , then d(R, {i, j}) = d(R′ , {i, j}). Let {C1 , · · · , Ch } be the set of all benign chains from i to j under R. For k = 1, · · · , h, let tk be the length of the benign chain in Ck . Without loss of generality, let t = t1 ≤ t2 ≤ · · · ≤ th . Consider R1 , · · · , Rh ∈ ℘ such that, each and every one of R1 , · · · , Rh is without hostility and for all k = 1, · · · , h, Ck is the unique benign chain from i to j under Rk . From Claim 1 and the construction of R1 , · · · , Rh , noting that t1 ≤ · · · ≤ th , we have d(R1 , {i, j}) ≥ d(R2 , {i, j}) ≥ · · · ≥ d(Rh , {i, j}). (5) For g = 2, · · · , h, let Rg be such that the set of all benign chains from i to j under Rg is {C1 , · · · , Cg }. Clearly, the set of all benign chains from i to j under Rh is {C1 , · · · , Ch }, which is the same as the set of all benign chains from i to j under R. By Neutrality, therefore, d(R, {i, j}) = d(Rh , {i, j}). (6) Then, by Dominance, noting that the set of all benign chains from i to j under R2 is the union of the sets of all benign chains from i to j under R1 21 and under R2 and d(R1 , {i, j}) ≥ d(R2 , {i, j}), we obtain d(R1 , {i, j}) ≥ d(R2 , {i, j}). Similarly, by Dominance, noting that the set of all benign chains from i to j under R3 is the union of the sets of all benign chains from i to j under R2 and under R3 and d(R1 , {i, j}) ≥ d(R2 , {i, j}) ≥ d(R3 , {i, j}), we obtain d(R1 , {i, j}) ≥ d(R2 , {i, j}) ≥ d(R3 , {i, j}). By the repeated use of the above, from Dominance, we obtain d(R1 , {i, j}) ≥ d(R2 , {i, j}) ≥ · · · ≥ d(Rh , {i, j}) By Monotonicity, however, we have d(Rh , {i, j}) ≥ d(R1 , {i, j}). Therefore, d(Rh , {i, j}) = d(R1 , {i, j}). (6) now imlies d(R, {i, j}) = d(R1 , {i, j}). (7) On the other hand, from Claim 1, d(R′ , {i, j}) = d(R1 , {i, j}). Therefore, d(R, {i, j}) = d(R′ , {i, j}). Note that the length of a shortest benign chain from i to j under R is t1 = t, which is the length of the unique benign chain from i to j under R′ . Thus, Claim 2 is proved. By Claims 1 and 2, we obtain the following: Claim 3: For all R, R′ ∈ ℘ and all {i, j} ∈ Z, if t is the length of a shortest benign chain from i to j under R and s is the length of a shortest benign chain from i to j under R′ , then d(R, {i, j}) ≥ d(R′ , {i, j}) ⇔ t ≤ s. To see that Claim 3 is true, consider R1 , R2 ∈ ℘ such that both R1 , R2 are without hostility, (m(1) = i, m(2), · · · , m(t + 1) = j) is the unique benign chain from i to j under R1 and (m′ (1) = i, m′ (2), · · · , m′ (s + 1) = j) is the unique benign chain from i to j under R2 . By Claim 1, d(R1 , {i, j}) ≥ d(R2 , {i, j}) ⇔ t ≤ s. By Claim 2, d(R1 , {i, j}) = d(R, {i, j}) and d(R2 , {i, j}) = d(R′ , {i, j}). Therefore, d(R, {i, j}) ≥ d(R′ , {i, j}) iff t ≤ s. Finally, we are ready to show (1). Let R, R′ ∈ ℘ and {i, j}, {p, q} ∈ Z. If i and j are isolated under R, and p and q are isolated under R′ , then from 22 (2), d(R, {i, j}) = d(R′ , {p, q}). If i is linked with j under R, and p and q are isolated under R′ , then by (4), d(R, {i, j}) > d(R′ , {p, q}). Suppose now that i and j are linked under R, and p and q are linked under R′ . Let (m(1) = i, m(2), · · · , m(t + 1) = j) be a shortest benign chain from i to j under R, and (m′ (1) = p, m′ (2), · · · , m′ (s + 1) = q) be a shortest benign chain from p to q under R′ . If {i, j} = {p, q}, then, by Claim 3, (1) follows immediately. We therefore consider two cases: (i = p and j 6= q), and ({i, j} ∩ {p, q} = ∅). The cases in which (i = q and j 6= p), (j = p and i 6= q), and (j = q and i 6= p) are similar to the case in which (i = p and j 6= q). Consider first that (i = p and j 6= q). Consider R1 , R2 ∈ ℘ such that: (m(1) = i, m(2), · · · , m(t) = q, m(t + 1) = j) is the unique benign chain from i to j under R1 , and (m′ (1) = p, m′ (2), · · · , m′ (s) = j, m′ (s + 1) = q) is the unique benign chain from p to q under R2 . By Claim 3, d(R, {i, j}) = d(R1 , {i, j}) and d(R′ , {p, q}) = d(R2 , {p, q}). (8) Consider the one-to-one function σ from N to N such that: for all k ∈ N − {j, q}, σ(k) = k and σ(j) = q, σ(q) = j. Let R3 ∈ ℘ be such that, for all k, h ∈ N, kR2 h iff σ(k)R3 σ(h), and kR2 (−)h iff σ(k)R3 (−)σ(h). It is clear that (σ(m′ (1)) = i, σ(m′ (2)), · · · , σ(m′ (s)) = σ(j) = q, σ(m′ (s + 1)) = σ(q) = j) be the unique benign chain from i to j under R3 . By Claim 3, we have: d(R1 , {i, j}) ≥ d(R3 , {i, j}) ⇔ t ≤ s. (9) And by Anonymity, we obtain d(R2 , {p, q}) = d(R3 , {i, j}). (10) Therefore, from (10), (9) and (8), we obtain d(R, {i, j}) ≥ d(R′ , {p, q}) ⇔ t ≤ s. Hence, (1) holds in this case. When {i, j} ∩ {p, q} = ∅, consider the one-to-one function σ ′ from N to N such that for all k ∈ N − {i, j, p, q}, σ ′ (k) = k, σ ′ (i) = p and σ ′ (j) = q. Let R4 ∈ ℘ be such that for all k, h ∈ N , kR′ h iff σ ′ (k)R4 σ ′ (h) and kR′ (−)h iff σ ′ (k)R4 (−)σ ′ (h). Then, by Anonymity, d(R′ , {p, q}) = d(R4 , {i, j}). (11) d(R, {i, j}) ≥ d(R4 , {i, j}) ⇔ t ≤ s. (12) By Claim 3, ′ By (11) and (12), we obtain d(R, {i, j}) ≥ d(R , {p, q}) ⇔ t ≤ s. Therefore, (1) holds for this case. Proof of Theorem 3.3. The proof is similar to that of Theorem 3.2 and we omit it. 23 Appendix B Proof of Theorem 3.5. The “if” part of the theorem can be checked. We now prove the “only if” part. Let ψ ∈ (0, 1) and the process of message transmission be characterized by exogenously determined proportional message loss. Let d satisfy the axioms specified in Theorem 3.5. From Theorem 3.2, we need only to show that, for all R ∈ ℘ and all {i, j} ∈ Z, if C = (m(1) = i, m(2), · · · , m(t + 2) = j) is the unique benign chain from i to j under R with t ≥ 1, then d(R, {i, j}) = (1 − ψ)t . Since the process of message transmission is characterized by exogenously determined proportional message loss, we have the following: am(2) [C] = 1, aLm(2) = 1 · ψ; am(3) [C] = 1 − ψ, aLm(3) [C] = ψ(1 − ψ); · · ·; am(t+1) [C] = (1 − ψ)t−1 , aLm(t+1) [C] = ψ(1 − ψ)t−1 ; am(t+2) [C] = (1 − ψ)t−1 − ψ(1 − ψ)t−1 = (1 − ψ)t . Therefore, d(R, {i, j}) = (1 − ψ)t . Proof of Theorem 3.6. The “if” part of the theorem can be checked. We now prove the “only if” part. Let α > 0 and the process of message transmission be characterized by exogenously determined absolute message loss. Let d satisfy the axioms specified in Theorem 3.6. From Theorem 3.3, we need only to show that, for R ∈ ℘ and all {i, j} ∈ Z, if C = (m(1) = i, m(2), · · · , m(t + 2) = j) is the unique benign chain from i to j under R with t ≥ 1, then d(R, {i, j}) = max{1 − αt, 0}. By Assumption 3.4, d(R, {i, j}) = am(t+2) [C]. Since the process of message transmission is characterized by exgogenously determined absolute message loss, we have am(2) [C] = 1, aLm(2) = α; am(3) [C] = max{1 − α, 0}, aLm(3) [C] = max{min{am(3) [C] − α, α}m, 0}; · · ·; am(t+1) [C] = max{1 − α(t − 1), 0}, aLm(t+1) [C] = max{min{am(t+1) [C] − α, α}, 0}; am(t+2) [C] = aLm(t+1) [C] = max{am(t+1) [C] − α, 0} = max{1 − αt, 0}. Therefore, d(R, {i, j}) = max{1 − tα, 0}. Proof of Theorem 3.7. The “if” part of the theorem can be checked. We now prove the “only if” part. Let d satisfy the axioms specified in Theorem 24 3.7. Suppose the process of message transmission is characterized by endogenously determined message loss. By Theorem 3.2, we need only to show that, for all R ∈ ℘ and all {i, j} ∈ Z, if C = (m(1) = i, · · · , m(t + 1) = j) is the unique benign chain from i to j under R where t > 1, then d(R, {i, j}) = 1/t. By Assumption 3.4, d(R, {i, j}) = am(t+1) [C]. Since the process of message transmission is characterized by endogenously determined message loss, we have am(t+1) [C] = aLm(t) [C] = am(t) [C], am(t) [C] + aLm(t) [C] = am(t−1) [C], aLm(t−1) [C] = am(t−1) [C], am(t−1) [C] + aLm(t−1) [C] = am(t−2) [C], ···, am(2) [C] = aLm(2) [C] am(2) + aLm(2) = 1. Therefore, d(R, {i, j}) = 1/t. Appendix C Proof of Theorem 4.2. Suppose d satisfies the axioms specified in Theorem 4.2, and ω satisfies Marginal Contritution and ω-Normalization. Then, by Theorem 3.1, for all {i, j}, {p, q} ∈ Z, all R, R′ ∈ ℘, d(R, {i, j}) ≥ d(R′ , {p, q}) iff ([t ≤ s] or [p is isolated from q under R′ ]) where t is the length of a shortest benign chain from i to j under R and s is the length of a shortest benign chain from p to q under R′ . Let R ∈ ℘ be given. If for all {i′ , j ′ } ∈ Z, not(i′ Rj ′ ), then, by ωNormalization, ω(R) = 0. Assume, therefore, that i′ Rj ′ for some {i′ , j ′ } ∈ Z under R. For all {i, j} ∈ Z and all R′ ∈ ℘, let s(R′ , ij) be the length of a shortest benign chain from i to j under R′ . Let {i1 , j 1 } ∈ Z be such that s(R, i1 j 1 ) ≥ s(R, ij) for all {i, j} ∈ Z. Consider R1 such that: for all {p, q} ∈ Z with {p, q} 6= {i1 , j 1 }, [(pRq ⇔ pR1 q) and (pR(−)q ⇔ pR1 (−)q)], and i1 R1 (−)j 1 . Given that there is at least one benign chain from i1 to j 1 under R, clearly, not(i1 R(−)j 1 ). Since {i1 , j 1 } is such that s(R, i1 j 1 ) ≥ s(R, ij) for all {i, j} ∈ Z, for all {p, q} ∈ Z with {i1 , j 1 } 6= {p, q}, a shortest benign chain from p to q under R does not go through i1 and j 1 . Therefore, when the only change from R to R1 involving switching not(iR(−)j) to iR1 (−)j, 25 we must have: for all {p, q} ∈ Z with {p, q} 6= {i1 , j 1 }, [(pRq ⇔ pR1 q) and (pR(−)q ⇔ pR1 (−)q)], and the set of all shortest benign chains from p to q under R is the set of all shortest benign chains from p to q under R1 . It is then clear that R1 ∈ ℘ and d(R, {p, q}) = d(R1 , {p, q}) for all {p, q} ∈ Z with {p, q} 6= {i1 , j 1 }. By Marginal Contribution, we must have ω(R) − ω(R1 ) = d(R, {i1 , j 1 }). (13) Clearly, there is no benign chain from i1 to j 1 under R1 . If for all {i, j} ∈ Z, there is no benign chain from i to j under R1 , then by ω-Normalization, ω(R1 ) = 0, and the conclusion of Theorem 4.2 follows easily from (13). Let {i2 , j 2 } ∈ Z be such that s(R1 , i2 j 2 ) ≥ s(R1 , ij) for all {i, j} ∈ Z. Consider R2 such that: for all {p, q} ∈ Z with {p, q} 6= {i2 , j 2 }, [(pR1 q ⇔ pR2 q) and (pR1 (−)q ⇔ pR2 (−)q)], and i2 R2 (−)j 2 . Following a similar argument for R and R1 , we can show that R2 ∈ ℘ and d(R1 , {p, q}) = d(R2 , {p, q}) for all {p, q} ∈ Z with {p, q} 6= {i2 , j 2 }. By Marginal Contribution again, we obtain ω(R1 ) − ω(R2 ) = d(R1 , {i2 , j 2 }). (14) Note that d(R1 , {i2 , j 2 }) = d(R, {i2 , j 2 }). Therefore, ω(R) = ω(R2 ) + d(R, {i1 , j 1 }) + d(R, {i2 , j 2 }). (15) By repeating the above procedures and from the repeated use of Marginal Contribution, since Z contains a finite number of elements, we can obtain X ω(R) = d(R, {i, j}). {i,j}∈Z Proof of Theorem 4.3. The proof is similar to that of Theorem 4.2 and we omit it. 26