Cooperation, the power of the weak

Collaborative strategy among Indian villages Collaborative strategy among Indian villages Jaime Iranzo, Javier M. Buldú and Jacobo Aguirre

A collaborative strategy among weaker communities leads to a more beneficial overall outcome than submission to the strongest community. In addition, the weaker competitors in a network of networks hold the fate of the group in their hands, independently of the actions of the most powerful. This is the finding of a study recently published in the journal Nature Communications. Microcredit networks among the peoples of India, collaboration among groups for Ebola research, or conservation of fragmented habitats such as that of the Pyrenean brown bear are just some examples in which this model is applicable.


"Imagine three or four different work groups. One of them will be stronger than the others. To increase in importance, the weak have only two options: ally themselves with the strong or cooperate with one another. Mathematics tells us that cooperation is usually the best strategy for the weak and, interestingly, that it is also the most beneficial for all. In addition, any of the weaker ones alone can force this situation, a power that the strong lack." Jacobo Aguirre, a scientist at the Centro Nacional de Biotecnología of the CSIC (CNB-CSIC), thus explains his most recent study published in the journal Nature Communications with Jaime Iranzo of the NIH (USA) and Javier M. Buldú of the Universidad Rey Juan Carlos and Center for Biomedical Technology (UPM).

The study focusses on understanding the relationships between communities in the form of networks that compete to achieve importance (what researchers term a network of networks). In their study, the authors combine game theory (known for the studies that brought the Nobel prize to John F. Nash) and the science of complex networks.

In this game, there are only two stable solutions: cooperation or submission. The first is beneficial for weak competitors and the second is positive for the strongest. The results of the study clearly show that the first option is also the best for the whole.

But it is more surprising that each of the weaker communities can cause a transition from a system of submission to the powerful to a cooperative system. "Any weak competitor has the power to induce an overall strategy change no matter what the actions of the strong competitor, who is unable to change the situation. This is the great power of the defenseless. They have the fate of the whole in their hands", explains Javier M. Buldú.

According to the authors, this line of work arose when they studied evolutionary processes in RNA sequences, but the theory is applicable to a multitude of games and real-life situations. For this study, the scientists analyzed real examples of economics, biology and social relationships.

Microcredit in India

In a first example, the paper analyzes a network of interactions among three southern Indian villages in the context of a microcredit programme. The study shows how the authorities in one of the smaller villages could promote connections with neighboring communities to minimize the financial risks associated with insect pests or weather phenomena that could affect the plantations on which the village depended.

The dilemma arises when deciding with whom to form alliances. They can choose to associate with the most important city in the region, a model in which the main beneficiary would be the latter. The alternative option, that is, association between weak populations, would allow them to surpass the strong city. "The result of our work is clear: this is the best option from the global point of view", explain the authors.

Ebola research

Several research groups around the world are working to unravel the mysteries of the Ebola virus. This is the second example the authors highlight in their work.

The study analyses the potential collaborations of virologists at Oxford University with other European centres. In this scenario, the university would have to decide what strategy is best for them to back, i.e., with whom to associate. "We believe that the theory we present in our study can help research centres to take the best possible decision when seeking collaborations," they indicate.

Connecting fragmented habitats: conservation of the brown bear

For decades, efforts to conserve the brown bear in the Pyrenees have been coordinated by Spain, France and Andorra. Each country has its own reserve areas; ecological corridors are established between them, through which the bears can move from one reserve to another. This is a good example of how, to benefit a protected species, three or more administrations must often coordinate to establish routes between their protected areas. The new study sheds light on the most efficient way of establishing such corridors, optimizing movement and recovery of the species.

Ultimately, the authors conclude, "the broad applicability of this model makes the 'power of the weak' a concept to be considered from now on in the modeling of technological, biological and social systems."

 

  • Jaime Iranzo, Javier M. Buldú and Jacobo Aguirre. Competition among networks highlights the power of the weak. (2016) Nature Communications DOI: 10.1038/ncomms13272

NOTE! This site uses cookies and similar technologies.

If you continue browsing or do not change browser settings, we consider your acepptance for using. Learn more

I understand

COOKIES POLICY

A cookie is a text file that is stored on your computer or mobile device via a web server and only that server will be able to retrieve or read the contents of the cookie and allow the Web site remember browser preferences and navigate efficiently. Cookies make the interaction between the user and the website faster and easier.

General information

This Website uses cookies. Cookies are small text files generated by the web pages you visit, which contain the session data that can be useful later in the website. In this way this Web remembers information about your visit, which can facilitate your next visit and make the website more useful.

How do cookies?

Cookies can only store text, usually always anonymous and encrypted. No personal information is ever stored in a cookie, or can be associated with identified or identifiable person.

The data allow this website to keep your information between the pages, and also to discuss how to interact with the website. Cookies are safe because they can only store information that is put there by the browser, which is information the user entered in the browser or included in the page request. You can not run the code and can not be used to access your computer. If a website encrypts cookie data, only the website can read the information.

What types of cookies used?

The cookies used by this website can be distinguished by the following criteria:

1. Types of cookies as the entity that manages:

Depending on who the entity operating the computer or domain where cookies are sent and treat the data obtained, we can distinguish:

- Own cookies: are those that are sent to the user's terminal equipment from a computer or domain managed by the editor itself and from which provides the service requested by the user.

- Third party cookies: these are those that are sent to the user's terminal equipment from a machine or domain that is not managed by the publisher, but by another entity data is obtained through cookies.

In the event that the cookies are installed from a computer or domain managed by the editor itself but the information collected by these is managed by a third party can not be considered as party cookies.

2. Types of cookies as the length of time that remain active:

Depending on the length of time that remain active in the terminal equipment can be distinguished:

- Session cookies: cookies are a type designed to collect and store data while the user accesses a web page. Are usually used to store information that only worth preserving for the service requested by the user at any one time (eg a list of products purchased).

- Persistent cookies: cookies are a type of data which are stored in the terminal and can be accessed and treated for a period defined by the head of the cookie, and can range from a few minutes to several years.

3. Cookies types according to their purpose:

Depending on the purpose for which the data are processed through cookies, we can distinguish between:

- Technical cookies: these are those that allow the user to navigate through a web page or application platform and the use of different options or services it exist as, for example, control traffic and data communication, identify the session, access to restricted access parts, remember the elements of an order, make the buying process an order, make an application for registration or participation in an event, use security features while browsing store content for dissemination videos or sound or share content via social networks.

- Customization cookies: these are those that allow the user to access the service with some general characteristics based on a predefined set of criteria in the user terminal would eg language, the type of browser through which you access the service, the locale from which you access the service, etc.

- Analysis cookies: they are those that allow the responsible for them, monitoring and analyzing the behavior of users of the web sites that are linked. The information gathered through such cookies are used in measuring the activity of web sites, application or platform and for the profiling of user navigation of such sites, applications and platforms, in order to make improvements function data analysis how users use the service.

Management tool cookies

This Website uses Google Analytics.

Google Analytics is a free tool from Google that primarily allows website owners know how users interact with your website. Also, enable cookies in the domain of the site in which you are and uses a set of cookies called "__utma" and "__utmz" to collect information anonymously and reporting of website trends without identifying individual users..

For statistics of use of this website use cookies in order to know the level of recurrence of our visitors and more interesting content. This way we can concentrate our efforts on improving the most visited areas and make the user more easily find what they are looking for. On this site you can use the information from your visit for statistical evaluations and calculations anonymous data and to ensure the continuity of service or to make improvements to their websites. For more details, see the link below privacy policy [http://www.google.com/intl/en/policies/privacy/]

How to manage cookies on your computer: disabling and deleting cookies

All Internet browsers allow you to limit the behavior of a cookie or disable cookies within settings or browser settings. The steps for doing so are different for each browser, you can find instructions in the help menu of your browser.

If you decline the use of cookies, since it is possible thanks to the preferences menu of your browser or settings, reject, this website will continue to function properly without the use of the same.

Can you allow, block or delete cookies installed on your computer by setting your browser options installed on your computer:

- For more information about Internet Explorer click here.
- For more information on Chrome click here.
- For more information about Safari click here.
- For more information about Firefox click here.

Through your browser, you can also view the cookies that are on your computer, and delete them as you see fit. Cookies are text files, you can open and read the contents. The data within them is almost always encrypted with a numeric key corresponding to an Internet session so often has no meaning beyond the website who wrote it.

Informed consent

The use of this website on the other hand, implies that you paid your specific consent to the use of cookies, on the terms and conditions provided in this Cookies Policy, without prejudice to the measures of deactivation and removal of cookies that you can take, and mentioned in the previous section.