Research Article  Open Access
XueGuang Wang, "An Algorithm for Critical Nodes Problem in Social Networks Based on Owen Value", The Scientific World Journal, vol. 2014, Article ID 414717, 8 pages, 2014. https://doi.org/10.1155/2014/414717
An Algorithm for Critical Nodes Problem in Social Networks Based on Owen Value
Abstract
Discovering critical nodes in social networks has many important applications. For finding out the critical nodes and considering the widespread community structure in social networks, we obtain each node’s marginal contribution by Owen value. And then we can give a method for the solution of the critical node problem. We validate the feasibility and effectiveness of our method on two synthetic datasets and six real datasets. At the same time, the result obtained by using our method to analyze the terrorist network is in line with the actual situation.
1. Introduction
It is a basic process that happened in the network for the spread, diffusion, and cascade behavior of information. Considering that we plan to introduce new products, we can use the network feature which is called “wordofmouth” or “viral marketing.” That is, we may find out some individuals with influence and let them recommend the product to their friends so that such a cascade spreads by the greatest extent in the people. How to choose these influential individuals is called critical node problem (CNP). An effective solution for the problem has an important practical value [1]. For example, we can find out the leaders quickly in the criminal relationship network; in the power network, we can protect important circuit breakers and power units for effectively preventing largescale blackouts caused by cascading failure; in the disease network, we can specifically isolate the source of the disease and block its spread and diffusion; we can discover the initiators and avoid the butterfly effect in the rumor network.
This paper gives a solution for the CNP, which assigns a marginal contribution for every node in a community of social networks using the solution concept and union concept of cooperative games. Then we sort all nodes by their contribution and obtain critical nodes according to some rules. The rest of the paper is organized as follows. Section 2 introduces two basic diffusion models and related background knowledge. An algorithm based on Owen value is presented in Section 3 and validated in Section 4. We conclude the paper in Section 5.
2. Backgrounds
2.1. Diffusion Models
The models for information propagation on networks have been widely studied [2–4]. We consider two basic models in this paper: independent cascade model (ICM) and linear threshold model (LTM) [5]. Some necessary definitions and hypotheses are firstly given.
A network is modeled as a graph with vertices in modeling the individuals in the network and edges in modeling the relationship between individuals, where and . A vertex has two states: active and inactive, which means whether a product or idea is accepted by individuals or not. Assume that a vertex can only change from inactive to active and not vice versa; an inactive vertex can be activated by its active neighbor vertices and an active vertex can activate its inactive neighbors; the increment of activated vertices represents the dissemination of information.
2.1.1. ICM
In this model, a propagation probability is given for each edge ; that is, vertex is activated with probability by . When an initial set of active vertices is given, the diffusion process spreads up according to the following randomized rule. When a vertex is activated at timestep , it has a single chance for activating its neighbor with . If succeeds, will become active at timestep . Here, if has multiple parent vertices that become active at timestep for the first time, then their activation attempts are sequenced in an arbitrary order. Whether or not succeeds, it cannot make any further attempts to activate in subsequent steps. The process runs until no more activation is possible.
2.1.2. LTM
In this model, vertex is influenced by each neighbor according to a weight such that . Each vertex has a predefined threshold , which is chosen uniformly at random. When an initial set with active vertices is given, the diffusion process unfolds according to the following randomized rule. All activated vertices at timestep still keep active at timestep . Whether or not any inactivated vertex is activated is determined by its neighbors’ weights such that . The process runs until no more activation is possible.
The difference between ICM and LTM is that each attempt of activation is independent of the attempts by all the other active individuals while in the later model each inactive individual is influenced by the aggregated weight of all its active neighbors.
2.2. Problem Description
Given , influence spread model , and a positive integer , the critical node problem (CNP) is to find vertices which maximize the extent of spread initiated by these vertices under the current model . That is, where denotes the expected size of the set of vertices activated by an initial set ; denotes any set with vertices in .
2.3. Related Works
Many statistical properties for social network analysis have been presented in the complex network theory, such as degree, clustering coefficient, and betweenness [6]. PageRank algorithm [3] and HITS algorithm [4] use the eigenvector centrality for ranking web pages; White and Smyth compute the node’s relative importance by Markov centrality [7]; Shetty and Adibi discover the important nodes from the email network through graph entropy [5]; Li et al. identify influential Bloggers by artificial neural network [8]; Li et al. find out the Effectors by tree structure based on direct graph and dynamic linear programming [9]. Some scholars mine critical nodes for social networks based on specific network information [10–15].
Domingos and Richardson firstly studied the CNP as an algorithmic problem [16, 17]. Kempe et al. formulated the problem as the discrete optimization problem, proved that the problem is an NPhard, and presented a greedy approximation algorithm (see Algorithm 1) which approximates the optimum within a factor of [18, 19].

There is a key problem how to compute the value of in Algorithm 1. Currently, we have not any efficient method to get its exact solution. However, we can use MonteCarlo method to simulate the process of influence spread for obtaining approximate results by high probability. Assuming that every vertex run the process of times, and computing time of is , then the overall complexity for this greedy algorithm is .
However, the method’s efficiency severely restricts its scalability. Leskovec et al. proposed an optimized method referred to as the costeffective lazy forward (CELF), which can speed up the above greedy algorithm [20]. Chen et al. did not improve the greedy algorithm itself but focused on computing mutual influence between the individuals in local network structure. They present a degree discount algorithm for ICM, which achieves almost matching influence thread with the greedy algorithm and is less than onemillionth of time of the greedy algorithm [21]. After that, they design a maximum influence arborescence model for the general ICM by restricting computations on the local influence regions of nodes [22] and a local directed acyclic graph algorithm for the general LTM [23] to solve the CNP. They also study the CNP in social networks when negative opinions may emerge and propagate [23].
3. A New Algorithm Based on Owen Value
3.1. Cooperative Game and Owen Value
Given a finite set of players , cooperative game with transferable utility is a pair , characteristic function , and . For , if payoff vector satisfies and , then it is called an allocation of . The solution of cooperative game is a kind of allocation rule and the allocated payoff for every player denotes a method to measure the negotiation strength of the players in the game. Shapely presented a solution concept which finds out the only allocation distribution scheme from the solutions with different property; that is, it assigns the player’s payoff according to the importance of every player for the game [24]. The Shapely value of the player in the game is where and .
However, the Shapely value does not consider the impact of coalition structure and Owen extends it [25]. Each union obtains its payoff from the game between the unions, and then the payoff is allocated by the internal game among the members of the union. All the payoffs are computed by the Shapely value.
Assume that and ; a partition is a coalition structure on . Let be a union and . When , . For , denotes the index of the union containing player , so is defined by the relation . For and , the game is defined by where .
The game is defined by ; then the Owen value of the player in the game is .
3.2. The Critical Node Discovery Algorithm Based on Owen Value
The idea of the greedy algorithm is to find a node with the greatest influence during an iteration based on the diffusion model of social networks. In nature, the node with the maximum marginal contribution is chosen. Because the community structure is prevalent in the social networks [26], we, respectively, consider the community’s influence on the information diffusion and every node’s influence in the community. We take the nodes in the social network as the players in the cooperative game and information diffusion as coalition formulation. Thus, we can define an appropriate cooperative game for mapping the information diffusion in the social network and identify the critical nodes through the node’s marginal contribution.
A network is a list of which pairs of players are linked to each other. The network structure is the key determinant of the level of productivity or utility to the society of players involved. A network game consists of a set of players and a value function. The value function assigns a real value to each possible network on all players. An allocation rule is a way to allocate the real value generated by a set of players and has to take into account the marginal value of a player. If we take the value function as the characteristic function, then network game can be seen as the cooperative game with transferable utility [27].
We define the cooperative game where is the set of nodes in the social network and the characteristic function , is the set of all subsets of . For each , if all the nodes in are initially activated, then represents the expected number of active nodes at the end of the diffusion process; that is, .
So, we can use the Owen value to obtain the marginal contribution of every node. Because the Owen value can be seen as a twostep procedure in which the Shapely value is applied twice, we firstly compute a node’s Shapely value.
Given a node and a subset such that , the marginal contribution of node is , . Consider the set of all possible permutations on , let , and define to be the set of all nodes appearing before node in the permutation . So, the average marginal contribution of node to the given coalitional game is
Note that this method must work with permutations and its computational complexity is [28]. Therefore, we give the approximate method for computing Shapely value. Randomly generate a set with permutations; let and denotes the th node in the permutation. The number of activated nodes after running the diffusion model when the node is activated is the contribution of . Next, we consider the node . If becomes active after is activated, then the contribution of is 0. Otherwise, the contribution of is the number of activated nodes by . Therefore, we can get the contributions of . For , repeat the above process times. Then the average contribution of each node in the diffusion process can be calculated. We can obtain the topk nodes sorted by the greatest influence and ensure that they are not adjacent to each other. See Algorithms 2 and 3.


According to the description in Section 3.1, we give the calculation method of the Owen value. Roger Guimerà et al. study node roles in the community according to withinmodule degree and participation coefficient , which are divided into seven categories, [29]. We consider two types of the roles: nonhub connector node ( and , ) and connector hub ( and , ). Most of the nodes which belong to these two roles connect to other communities.
We use the CNM algorithm [30] to divide the network into communities and assign the role for every node in the community. Let , define as community game network. So, we can obtain the Shapely value of every node in the network and take the sum of the Shapely values of all nodes in the same community as the community’s payoff. Then we treat a community as a separate network and calculate the Shapely value of every node in the community. The node’s Owen value is assigned according to the normalized Shapely value of the node in the community and the community’s payoff. So, we can get the critical nodes by Algorithm 3.
3.3. The Computational Complexity
We consider the computational complexity for based on Shapely value. In Algorithm 2, we compute the marginal contribution of every node and its complexity is ; the cost of ranking the contributions and selecting nodes is . Therefore, the overall running time of Shapely valuebased algorithm is . Because it is reasonable to assume that for the realworld graphs and the Owen value can be seen as a twostep procedure in which the Shapely value is applied twice, the computational complexity of Owen valuebased algorithm for is , where is a polynomial in .
4. Evaluation
We validate our method on two synthetic datasets and six real network datasets. All experiments are executed in the PC with 3.2 GHz CPU, 4 G memory, and Windows 7. The development tools are MATLAB 2009 and Microsoft Visual Studio 2010.
We compare our method (the Ov algorithm) with the Shapley valuebased algorithm (the Sv algorithm), the greedy algorithm (the greedy algorithm), and the degreeheuristic algorithm (the degree algorithm). The greedy algorithm is as a benchmark for measuring other algorithms; the degree algorithm selects nodes with the greatest degree from the network as the initial set. In order to obtain the accurate influence of every algorithm, we use the average number of the activated nodes after running ICM and LTM 10000 times for every initial set. In ICM, the propagation probability is set to 0.05; in LTM, the edge weight of a node is the reciprocal of the node’s degree. The size of the initial set is, respectively, set from 1 to 20. The in the Ov and Sv algorithms is shown in Table 1. In the experiments, we only discuss the case of using the ICM because we obtain the same conclusions for ICM and LTM.

4.1. Performance Comparison in Synthetic Networks
We consider the influence of community structure on the Ov algorithm.
We use BA model [31] and the forest fire model [32] to generate two synthetic datasets with 5000 nodes. The BA model takes the powerlaw distribution as two important features: growth and preferential attachment. The model can generate a scalefree network whose power exponent is 3 and community structure is not obvious. The forest fire model can generate a network with degree power law, densification law, shrinking diameter, and obvious community structure.
We, respectively, compute the Shapely value and Owen value of every node in the BA and FF datasets and obtain the initial set and the number of activated nodes after running the ICM. The process is repeated 100 times and the average number of the nodes activated by the initial set with different size is drawn in Figure 1. The Sv algorithm is almost the same as the Ov algorithm on BA dataset with unobvious community structure (Figure 1(a)). In contrast, the Ov algorithm is significantly better than the Sv algorithm on FF dataset with obvious community structure (Figure 1(b)). In Figure 1, the number of activated nodes by the initial set from the Ov algorithm is almost the same as the greedy algorithm.
(a) BA
(b) FF
4.2. Performance Comparison in Real Networks
The real datasets used by the paper include DBLP, Facebook, Enron, Youtube, AS, and PG, where the former four datasets have obvious community structure and the latter two datasets have not. The DBLP dataset [33] constructs a coauthor network with 143276 nodes and 359812 edges according to the papers published in the important conferences and journals of computer field from 1997 to 2006. The Facebook dataset [34] builds the friendship network of the New Orleans area with 60567 users and 583766 connections obtained from January 1, 2007, to December 31, 2008. The Enron dataset [35] is an Email network with 36692 nodes and 367662 edges. The YouTube dataset [36] consists of 35468 nodes and 261191 edges obtained from January 1, 2007, and January 15, 2007. The AS dataset [37] with 11456 nodes and 32759 edges is from the topology of autonomous systems on the Internet. The PG dataset [38] with 4941 nodes and 6594 edges is from the North American power grid.
We, respectively, use the greedy, Ov, Sv, and degree algorithms to find out the initial sets from above six real datasets. Figure 2 describes the number of the nodes activated by the initial set with different size based on ICM. From Figure 2, we see that whether on the networks with obvious community (Figures 2(a), 2(b), 2(c), and 2(d)) or on the ones with unobvious community (Figures 2(e) and 2(f)), the accuracy of the Ov algorithm is similar to the greedy algorithm, sometimes even better than it (Figure 2(b)). Compared with the Sv and degree algorithms, the Ov algorithm has a large advantage.
(a) DBLP
(b) Facebook
(c) Enron
(d) YouTube
(e) AS
(f) PG
4.3. The Time Efficiency Comparison
We discuss our method’s time efficiency.
We generate three datasets FF_{0.35,0.2} (sparse graph), FF_{0.37,0.32} (densifying graph), and FF_{0.38,0.35} (dense graph) with 1000 nodes using the FF model with three groups of parameters. Then we find out the top20 critical nodes on these datasets by the Ov and greedy algorithms and plot the running times in Figure 3. We note that the Ov algorithm obtains a speedup of dozens of times over the greedy algorithm on these datasets.
4.4. An Example
We give an example of the Ov algorithm.
Krebs studied the terrorist network in the event of September 11, 2001. Figure 4 and Table 2 show the trusted contacts among 19 hijackers [39]. Table 2 gives the names and airlines of these hijackers, and the squares in Figure 4 denote the critical nodes. We use the Ov algorithm to analyze the dataset and find out the sequence of critical nodes in which the first four people are Nawaf Alhamzi, Ziad Jarrah, Abdulaziz Alomari, and Mohald Alshehri. These four people are just on four different airlines which show that the Ov algorithm is effective to some extent.

5. Conclusions
For solving the CNP, this paper presents a method based on the Owen value from cooperative game, which considers the widespread community structure in social networks. We validate the proposed method on two synthetic datasets and the results show that our method is more suitable for the networks with community structure. Compared with other algorithms on six real datasets, our method is more effective. How to further improve the time efficiency of the Ov algorithm needs to be studied.
Conflict of Interests
The author declares that there is no conflict of interests regarding the publication of this paper.
Acknowledgment
This work is supported by the National Social Science Foundation of China (nos. 11BFX125 and 13CFX049).
References
 N. He, D. Y. Li, W. Y. Gan, and X. Zhu, “Mining vital nodes in complex networks,” Computer Science, vol. 34, no. 12, pp. 1–5, 2007. View at: Google Scholar
 E. EvenDar and A. Shapira, “A note on maximizing the spread of influence in social networks,” in Proceedings of the International Workshop on Internet and Network Economics (WINE '07), vol. 4858 of Lecture Notes in Computer Science, pp. 281–286. View at: Google Scholar
 S. Brin, “The anatomy of a largescale hypertextual Web search engine 1,” Computer Networks, vol. 30, no. 1–7, pp. 107–117, 1998. View at: Google Scholar
 J. M. Kleinberg, “Authoritative sources in a hyperlinked environment,” Journal of the ACM, vol. 46, no. 5, pp. 604–632, 1999. View at: Google Scholar
 J. Shetty and J. Adibi, “Discovering important nodes through graph entropy the case of enron email database,” in Proceedings of the 3rd International Workshop on Link Discovery, pp. 74–81, Chicago, Ill, USA. View at: Google Scholar
 L. D. F. Costa, F. A. Rodrigues, G. Travieso, and P. R. V. Boas, “Characterization of complex networks: a survey of measurements,” Advances in Physics, vol. 56, no. 1, pp. 167–242, 2007. View at: Publisher Site  Google Scholar
 S. White and P. Smyth, “Algorithms for estimating relative importance in networks,” in Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '03), pp. 266–275, Washington, DC, USA, August 2003. View at: Publisher Site  Google Scholar
 Y.M. Li, C.Y. Lai, and C.W. Chen, “Identifying bloggers with marketing influence in the blogosphere,” in Proceedings of the 11th International Conference on Electronic Commerce (ICEC '09), pp. 335–340, Taipei, Taiwan, August 2009. View at: Publisher Site  Google Scholar
 Y.M. Li, C.Y. Lai, and C.H. Lin, “Discovering influential nodes for viral marketing,” in Proceedings of the 42nd Annual Hawaii International Conference on System Sciences (HICSS '), Waikoloa, Hawaii, USA, January 2009. View at: Publisher Site  Google Scholar
 T. Lappas, E. Terzi, D. Gunopulos, and H. Mannila, “Finding effectors in social networks,” in Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '10), pp. 1059–1068, Washington, DC, USA, July 2010. View at: Publisher Site  Google Scholar
 A. Java, P. Kolari, T. Finin, and T. Oates, “Modeling the spread of influence on the blogosphere,” in Proceedings of the 15th International World Wide Web Conference, Edinburgh, UK, 2006. View at: Google Scholar
 D. M. Akbar Hussain, “Terrorist networks analysis through argument driven hypotheses model,” in Proceedings of the 2nd International Conference on Availability, Reliability and Security (ARES '07), pp. 480–487, Vienna, Austria, April 2007. View at: Publisher Site  Google Scholar
 Z. Zhai, H. Xu, and P. Jia, “Identifying opinion leaders in BBS,” in Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops, pp. 398–401, Sydney, Australia, December 2008. View at: Publisher Site  Google Scholar
 M. Kargar and A. An, “Discovering topk teams of experts with/without a leader in social networks,” in Proceedings of the 20th ACM Conference on Information and Knowledge Management (CIKM '11), pp. 985–994, Scotland, UK, October 2011. View at: Publisher Site  Google Scholar
 Y. Zhang, J. Zhou, and J. Cheng, “Preferencebased topK influential nodes mining in social networks,” in Proceedings of the IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1512–1518, Changsha, China, November 2011. View at: Publisher Site  Google Scholar
 P. Domingos and M. Richardson, “Mining the network value of customers,” in Proceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '01), pp. 57–66, San Francisco, Calif, USA, August 2001. View at: Google Scholar
 M. Richardson and P. Domingos, “Mining knowledgesharing sites for viral marketing,” in Proceedings of the 8ht ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '02), pp. 61–70, Edmonton, Canada, July 2002. View at: Google Scholar
 D. Kempe, J. Kleinberg, and É. Tardos, “Maximizing the spread of influence through a social network,” in Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '03), pp. 137–146, Washington, DC, USA, August 2003. View at: Publisher Site  Google Scholar
 G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher, “An analysis of approximations for maximizing submodular set functionsI,” Mathematical Programming, vol. 14, no. 1, pp. 265–294, 1978. View at: Publisher Site  Google Scholar
 J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. Vanbriesen, and N. Glance, “Costeffective outbreak detection in networks,” in Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '07), pp. 420–429, San Jose, Calif, USA, August 2007. View at: Publisher Site  Google Scholar
 W. Chen, Y. Wang, and S. Yang, “Efficient influence maximization in social networks,” in Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '09), pp. 199–207, Paris, France, July 2009. View at: Publisher Site  Google Scholar
 W. Chen, C. Wang, and Y. Wang, “Scalable influence maximization for prevalent viral marketing in largescale social networks,” in Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '10), pp. 1029–1038, Washington, DC, USA, July 2010. View at: Publisher Site  Google Scholar
 W. Chen, Y. Yuan, and L. Zhang, “Scalable influence maximization in social networks under the linear threshold model,” in Proceedings of the 10th IEEE International Conference on Data Mining (ICDM '10), pp. 88–97, Sydney, Australia, December 2010. View at: Publisher Site  Google Scholar
 L. S. Shapley, “A value for nperson games,” in Contributions to the Theory of Games II, H. W. Kuhn and A. W. Tucker, Eds., pp. 307–317, Princeton University Press, 1953. View at: Google Scholar
 G. Owen, “Values of games with a priori unions,” in Essays in Mathematical Economics and Game Theory, R. Henn and O. Moeschlin, Eds., pp. 76–88, Springer, Berlin, Germany, 1977. View at: Google Scholar
 J. Scott, Social Network Analysis: A Handbook, Sage, London, UK, 2nd edition, 2000.
 J.F. Caulier, “Network Games as TU Cooperative Games: The Core, the Shapley Value and Simple Network Games,” 2009, http://centres.fusl.ac.be/CEREC/document/seminars/caulier_cerec_feb2009.pdf. View at: Google Scholar
 T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms, MIT Press, Cambridge, Mass, USA, 2nd edition, 2001.
 R. Guimerà and L. A. N. Amaral, “Functional cartography of complex metabolic networks,” Nature, vol. 433, no. 7028, pp. 895–900, 2005. View at: Publisher Site  Google Scholar
 A. Clauset, M. E. J. Newman, and C. Moore, “Finding community structure in very large networks,” Physical Review E, vol. 70, no. 6, Article ID 066111, 6 pages, 2004. View at: Publisher Site  Google Scholar
 A.L. Barabási and R. Albert, “Emergence of scaling in random networks,” Science, vol. 286, no. 5439, pp. 509–512, 1999. View at: Publisher Site  Google Scholar
 J. Leskovec, J. Kleinberg, and C. Faloutsos, “Graphs over time: densification laws, shrinking diameters and possible explanations,” in Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '05), pp. 177–187, Chicago, Ill, USA, August 2005. View at: Publisher Site  Google Scholar
 http://dblp.unitrier.de/.
 B. Viswanath, A. Mislove, M. Cha, and K. P. Gummadi, “On the evolution of user interaction in Facebook,” in Proceedings of the 2nd ACM SIGCOMM Workshop on Social Networks (WOSN '09), pp. 37–42, Barcelona, Spain, 2009. View at: Google Scholar
 http://www.cs.cmu.edu/.
 A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee, “Measurement and analysis of online social networks,” in Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement Conference (IMC '07), pp. 29–42, San Diego, Calif, USA, October 2007. View at: Publisher Site  Google Scholar
 Q. Chen, H. Chang, R. Govindan, S. Jamin, S. J. Shenker, and W. Willinger, “The origin of power laws in Internet topologies revisited,” in Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 608–617, Los Alamitos, Calif, USA, 2002. View at: Google Scholar
 D. J. Watts and S. H. Strogatz, “Collective dynamics of 'smallworld9 networks,” Nature, vol. 393, no. 6684, pp. 440–442, 1998. View at: Google Scholar
 V. Krebs, “Mapping networks of terrorist cells,” Connection, vol. 24, no. 3, pp. 43–52, 2002. View at: Google Scholar
Copyright
Copyright © 2014 XueGuang Wang. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.