<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article article-type="research-article" dtd-version="2.3" xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Big Data</journal-id>
<journal-title>Frontiers in Big Data</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Big Data</abbrev-journal-title>
<issn pub-type="epub">2624-909X</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">652913</article-id>
<article-id pub-id-type="doi">10.3389/fdata.2021.652913</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Big Data</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Quantifying the Importance of Firms by Means of Reputation and Network Control</article-title>
<alt-title alt-title-type="left-running-head">Zhang and Schweitzer</alt-title>
<alt-title alt-title-type="right-running-head">Quantifying the Importance of Firms</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Zhang</surname>
<given-names>Yan</given-names>
</name>
<uri xlink:href="https://loop.frontiersin.org/people/1052131/overview"/>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Schweitzer</surname>
<given-names>Frank</given-names>
</name>
<xref ref-type="corresp" rid="c001">&#x2a;</xref>
<uri xlink:href="https://loop.frontiersin.org/people/783006/overview"/>
</contrib>
</contrib-group>
<aff>Chair of Systems Design, ETH Zurich, <addr-line>Zurich</addr-line>, <country>Switzerland</country>
</aff>
<author-notes>
<fn fn-type="edited-by">
<p>
<bold>Edited by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/896060/overview">Michele Coscia</ext-link>, IT University of Copenhagen, Denmark</p>
</fn>
<fn fn-type="edited-by">
<p>
<bold>Reviewed by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/857874/overview">Giacomo Livan</ext-link>, University College London, United&#x20;Kingdom</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1157236/overview">Carolina Mattsson</ext-link>, Leiden University, Netherlands</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1221811/overview">Fabrizio Lillo</ext-link>, University of Bologna, Italy</p>
</fn>
<corresp id="c001">&#x2a;Correspondence: Frank Schweitzer, <email>fschweitzer@ethz.ch</email>
</corresp>
<fn fn-type="other">
<p>This article was submitted to Big Data Networks, a section of the journal Frontiers in Big&#x20;Data</p>
</fn>
</author-notes>
<pub-date pub-type="epub">
<day>16</day>
<month>06</month>
<year>2021</year>
</pub-date>
<pub-date pub-type="collection">
<year>2021</year>
</pub-date>
<volume>4</volume>
<elocation-id>652913</elocation-id>
<history>
<date date-type="received">
<day>14</day>
<month>01</month>
<year>2021</year>
</date>
<date date-type="accepted">
<day>03</day>
<month>05</month>
<year>2021</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#xa9; 2021 Zhang and Schweitzer.</copyright-statement>
<copyright-year>2021</copyright-year>
<copyright-holder>Zhang and Schweitzer</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these&#x20;terms.</p>
</license>
</permissions>
<abstract>
<p>As recently argued in the literature, the reputation of firms can be channeled through their ownership structure. We use this relation to model reputation spillovers between transnational companies and their participated companies in an ownership network core of 1,318 firms. We then apply concepts of network controllability to identify minimum sets of driver nodes (MDSs) of 314 firms in this network. The importance of these driver nodes is classified according to their control contribution, their operating revenue, and their reputation. The latter two are also taken as proxies for the access costs when utilizing firms as driver nodes. Using an enrichment analysis, we find that firms with high reputation maintain the controllability of the network but rarely become top drivers, whereas firms with medium reputation most likely become top driver nodes. We further show that MDSs with lower access costs can be used to control the reputation dynamics in the whole network.</p>
</abstract>
<kwd-group>
<kwd>network analysis</kwd>
<kwd>reputation</kwd>
<kwd>companies/firms</kwd>
<kwd>ownership</kwd>
<kwd>controllability</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<title>1 Introduction</title>
<p>Reputation is a precious value for social and economic actors, such as, individuals, organizations, or firms. Building up reputation may take a long time, but it can be destroyed very quickly. This asymmetry between growth and decay needs to be taken into account when we wish to model reputation dynamics (<xref ref-type="bibr" rid="B42">Zhang and Schweitzer, 2019</xref>; <xref ref-type="bibr" rid="B30">Schweitzer et&#x20;al., 2020</xref>). In order to achieve such a model, we first need to think about ways to quantify reputation. In this article, we focus on the reputation of <italic>firms</italic>. Traditionally, a corporate reputation is evaluated via surveys. This often results in reputation rankings (<xref ref-type="bibr" rid="B11">Fombrun et&#x20;al., 2015</xref>), that is, a comparison of relative, rather than absolute, reputation. This approach makes it quite difficult to compare the reputation of firms at a large scale, for instance, across different industrial sectors. Further, classical reputation rankings do not allow addressing the important problem of <italic>reputation spillover</italic>, that is, the increase/decrease of a firm&#x2019;s reputation based on the increase/decrease of the reputation of other firms it depends&#x20;on.</p>
<p>To overcome the problems of measuring reputation and quantifying reputation spillovers, we turn to a recently proposed framework that quantifies reputation by using information about the ownership structure (<xref ref-type="bibr" rid="B42">Zhang and Schweitzer, 2019</xref>). Because ownership relations can channel reputation spillovers between shareholders and the invested companies, we have constructed the ownership network and proposed a reputation dynamics on it. The main ideas of our reputation dynamics are further summarized in <xref ref-type="sec" rid="s2-2">Section 2.2</xref>. Here, we build on this framework to address a more ambitious question, namely, how to <italic>control</italic> the reputation of firms. This requires us to first clarify what we mean by control. Nowadays, already the attempt to &#x201c;control&#x201d; social or economic actors raises ethical or legal concerns. We do not enter such discussions here. Instead, we point to two established research directions, network interventions and network controllability, which we also utilize in our article. Following these concepts, control means to influence a system such that it obtains a &#x201c;better&#x201d; state. In the socioeconomic realm, this can be a more resilient state for infrastructure networks, a state with higher capital per capita for countries, or a state of higher trust between individuals.</p>
<p>Systems design distinguishes two approaches to obtain such improvements (<xref ref-type="bibr" rid="B31">Schweitzer et&#x20;al., 2019</xref>). The <italic>top-down</italic> approach tries to optimize boundary conditions, for example, tax rates or legal frameworks for <italic>all</italic> firms, to enable a positive development. The <italic>bottom-up</italic> approach, on the other hand, focuses on system elements, for example, <italic>single</italic> firms, that can be targeted as seeds for a positive development. In this study, we are interested in the second approach to improve the state of a system of firms, which means we want to influence <italic>individual</italic> firms, to obtain a better <italic>systemic</italic> outcome.</p>
<p>Already the classical game theory discusses the option to change either the payoff matrix or the available information such that a particular strategy, for example, cooperation, becomes more attractive to players. The concept of <italic>nudging</italic> has been built on this, subtly influencing the decision of social or economic actors in favor of a preferred outcome (<xref ref-type="bibr" rid="B32">Sugden, 2009</xref>). Network interventions further leverage this idea by using the interaction network as an amplifier (<xref ref-type="bibr" rid="B34">Valente, 2012</xref>; <xref ref-type="bibr" rid="B35">Valente, 2017</xref>). For example, changing the utility function of a single firm, or a user, impacts other firms and users directly or indirectly via the network (<xref ref-type="bibr" rid="B6">Casiraghi et&#x20;al., 2020</xref>). This has proven to be an effective and a cost-efficient way to obtain an outcome that is more desirable from the perspective of a social planner (<xref ref-type="bibr" rid="B19">Leone Sciabolazza et&#x20;al., 2020</xref>). This way, for instance, the resilience of social networks could be improved (<xref ref-type="bibr" rid="B5">Casiraghi and Schweitzer, 2020</xref>).</p>
<p>The concept of network interventions requires to know and to monitor the system state that should be achieved. This is very often hard to quantify. Here, the more abstract concept of <italic>network controllability</italic> comes into play (<xref ref-type="bibr" rid="B20">Liu et&#x20;al., 2011</xref>; <xref ref-type="bibr" rid="B38">Wang et&#x20;al., 2012</xref>; <xref ref-type="bibr" rid="B7">Cornelius et&#x20;al., 2013</xref>). It derives from the <italic>control theory</italic>, originally developed in engineering and operations research. Network controllability focuses on the question what part of a network can be controlled if we steer a particular node, or a set of nodes, which are called <italic>driver nodes</italic>. Control means here that this part of the network can be driven into <italic>any</italic> possible state that is compatible with the assumed network structure and dynamics. Similar to network interventions, <italic>not</italic> all nodes in a network shall be targeted; ideally, the set of driver nodes is rather small. But different from network interventions, we do not need to specify the desired system state. Instead, the principal ability to influence (part of) the network is investigated.</p>
<p>Following this framework, in our article, we can assign each node in the network a &#x201c;capacity&#x201d; to influence the network. But not all nodes qualify as driver nodes. Hence, in a first step, we have to identify the set of driver nodes. To solve this problem, we need to know (i) the network structure and (ii) the dynamics that couples the nodes, which is the dynamics of <italic>reputation spillover</italic>.</p>
<p>In <xref ref-type="sec" rid="s2-2">Section 2.2</xref>, we summarize this dynamics for the <italic>reputation of firms</italic>. We also introduce the network that we want to leverage for influencing firms, which is their <italic>ownership network</italic>. Here, we build on a recent study that quantifies the relation between corporate reputation and ownership (<xref ref-type="bibr" rid="B42">Zhang and Schweitzer, 2019</xref>). Eventually, in <xref ref-type="sec" rid="s2-3">Section 2.3</xref>, we summarize the algorithmic procedure to identify the set of driver nodes, following the concept of network controllability.</p>
<p>In <xref ref-type="sec" rid="s3">Section 3</xref>, we present the results of our study. Our focus is on the question how the control contribution (<xref ref-type="bibr" rid="B41">Zhang et&#x20;al., 2019</xref>) of firms, that is, their ability to steer the network dynamics, is related to their reputation, as measured by our framework. Naively, one could assume that the most influential firms, as measured by their control contribution, are the firms with the highest reputation. This would imply that utilizing such firms as drivers may become a costly endeavor because of their pronounced economic value. Our major finding is that this, in fact, does not hold. Instead, we could identify a larger number of less reputed firms to drive the network. This insight can open new ways to influence such economic systems.</p>
</sec>
<sec id="s2">
<title>2 Material and Methods</title>
<sec id="s2-1">
<title>2.1 Data Set of Transnational Firms</title>
<p>The availability of large-scale data sets about firms has boosted research about <italic>economic networks</italic> in the recent decade (<xref ref-type="bibr" rid="B29">Schweitzer et&#x20;al., 2009</xref>). To construct such networks, different types of interactions between firms have been analyzed, for example, knowledge transfer (<xref ref-type="bibr" rid="B27">Reagans and McEvily, 2003</xref>; <xref ref-type="bibr" rid="B33">Vaccario et&#x20;al., 2018</xref>), financial relations (<xref ref-type="bibr" rid="B1">Battiston et&#x20;al., 2012</xref>; <xref ref-type="bibr" rid="B26">Nanumyan et&#x20;al., 2015</xref>), supply chains and trade networks (<xref ref-type="bibr" rid="B14">Garlaschelli and Loffredo, 2005</xref>; <xref ref-type="bibr" rid="B10">Fagiolo et&#x20;al., 2010</xref>; <xref ref-type="bibr" rid="B25">Mizgier et&#x20;al., 2013</xref>; <xref ref-type="bibr" rid="B4">Burkholz and Schweitzer, 2019</xref>), or ownership (<xref ref-type="bibr" rid="B15">Glattfelder and Battiston, 2009</xref>; <xref ref-type="bibr" rid="B37">Vitali et&#x20;al., 2011</xref>; <xref ref-type="bibr" rid="B23">Mani and Moody, 2014</xref>; <xref ref-type="bibr" rid="B13">Garcia-Bernardo et&#x20;al., 2017</xref>).</p>
<p>In this article, we build on the latter, by reusing a data set about the global ownership relations among firms (<xref ref-type="bibr" rid="B37">Vitali et&#x20;al., 2011</xref>; <xref ref-type="bibr" rid="B15">Glattfelder and Battiston, 2009</xref>; <xref ref-type="bibr" rid="B42">Zhang and Schweitzer, 2019</xref>) obtained from the Orbis database of 2007.<xref ref-type="fn" rid="fn1">
<sup>1</sup>
</xref> This reports information about the share firm <italic>A</italic> holds on firm <italic>B</italic>, that is, links in the ownership network are <italic>directed</italic> and <italic>weighed</italic>. Further information about the operating revenue of each firm is also available in this database. This data set has been previously analyzed to quantify corporate control (<xref ref-type="bibr" rid="B15">Glattfelder and Battiston, 2009</xref>; <xref ref-type="bibr" rid="B37">Vitali et&#x20;al., 2011</xref>).</p>
<p>Similar to the mentioned works, in the following, we focus on&#x20;<italic>transnational companies</italic> (TNCs) which, according to definition by the Organization for Economic Co-operation and Development (OECD), operate in more than one country. They are known to form the backbone on the ownership network (<xref ref-type="bibr" rid="B15">Glattfelder and Battiston, 2009</xref>). These TNCs directly or indirectly participate in other firms, called <italic>participated companies</italic> (PCs) which are mostly direct or indirect subsidiaries of TNCs.</p>
<p>Starting from the list of TNCs, we recursively include all companies that are participated by TNCs, or companies that are shareholders of TNCs, directly or indirectly. With this procedure, we end up with a large network that contains 600,508 economic entities connected by 1,006,987 ownership relations.</p>
<p>Our analysis is focused on the very small, but densely, connected core, that is, a strongly connected component, of this network (<xref ref-type="bibr" rid="B37">Vitali et&#x20;al., 2011</xref>), which is also visualized in <xref ref-type="fig" rid="F1">Figure&#x20;1</xref>. It comprises 1,318 firms that are connected by 12,184 ownership relations; that is, on average, each firm is connected to 20 other firms, and there is at least one directed path from any firm to other firm in this core. The overall operating revenue for firms in this core accounts for 20% of the operating revenue by all firms in the global ownership network. So, we are looking here at the heart of the global economy.</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption>
<p>Visualization of the densely connected core of the global ownership network of 1,318 firms. Transnational companies (TNCs) are shown in orange, and participated companies (PCs) are shown in light green nodes. The size of each node is scaled according to the operating revenue of the firm. Note that for a visualization purpose, we only keep 33% of the edges with the largest weight.</p>
</caption>
<graphic xlink:href="fdata-04-652913-g001.tif"/>
</fig>
<p>We will use this ownership network to later explore the network controllability by identifying the set of driver nodes. For this, we also need to specify the dynamics that connect these&#x20;firms.</p>
</sec>
<sec id="s2-2">
<title>2.2 Dynamics of Reputation</title>
<p>The ownership relations between firms do not only determine corporate influence but they also influence <italic>reputation</italic> (<xref ref-type="bibr" rid="B12">Fombrun and Shanley, 1990</xref>; <xref ref-type="bibr" rid="B3">Brammer and Pavelin, 2006</xref>; <xref ref-type="bibr" rid="B9">Delgado-Garc&#xed;a et&#x20;al., 2010</xref>). For example, with sample data of selected firms at the country level, <xref ref-type="bibr" rid="B12">Fombrun and Shanley (1990</xref>); <xref ref-type="bibr" rid="B3">Brammer and Pavelin (2006</xref>); <xref ref-type="bibr" rid="B9">Delgado-Garc&#xed;a et&#x20;al. (2010</xref>) reported that features of the ownership structure, such as the concentration of ownership in institutional investors, are correlated with corporate reputation. Further, <xref ref-type="bibr" rid="B17">Kang (2008</xref>) found that because of independent and active monitoring, institutional shareholders can greatly reduce the likelihood of negative reputation spillover.</p>
<p>Following the previous line of research, in a recent article (<xref ref-type="bibr" rid="B42">Zhang and Schweitzer, 2019</xref>), we have distinguished two phases, which differ in the directionality for the reputation spillover. In an initial phase, the reputation of the owners, that is, the firms investing into a newly founded company, largely determines the reputation of this firm because with their reputation, early shareholders signal trust to invest in this yet unknown&#x20;firm.</p>
<p>In the second phase, the reputation of the invested firm can feed back on the reputation of its stakeholders, both in positive and negative ways. We have seen many scandals that have shaken the business world because reputed stakeholders, who also represent a considerable corporate control, have been made responsible for the malfunction of their firms. For example, in Germany, the emission scandal of the car-building company Volkswagen led to a negative reputation spillover to its largest shareholder, Porsche SE, for neglecting its supervisory obligations. But investors also use the positive reputation of firms, for example, in the green energy sector, to brush up their own reputation&#x2014;as the recent debate on ethical investments witnesses (<xref ref-type="bibr" rid="B22">Mallin et&#x20;al., 1995</xref>; <xref ref-type="bibr" rid="B24">Michelson et&#x20;al., 2004</xref>).</p>
<p>Thus, it is justified to discuss the reputation dynamics of firms by utilizing their ownership network. In the following paragraphs, we focus on the core of the ownership network, which represents a mature economy of established firms. This allows us to consider the second phase, where the directionality of the ownership links is opposite to the directionality of the reputation spillover, that is, reputation spills over from the invested firm to its shareholders.</p>
<p>To quantify reputation, we assign to each firm a scalar value, <italic>x</italic>
<sub>
<italic>i</italic>
</sub>(<italic>t</italic>), that changes with time according to the following dynamics (<xref ref-type="bibr" rid="B41">Zhang et&#x20;al., 2019</xref>):<disp-formula id="e1">
<mml:math id="m1">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mover accent="true">
<mml:mi>x</mml:mi>
<mml:mo>&#x2d9;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:munder>
<mml:mstyle displaystyle="true">
<mml:mo>&#x2211;</mml:mo>
</mml:mstyle>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:munder>
</mml:mrow>
<mml:mi>N</mml:mi>
</mml:mover>
</mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3d5;</mml:mi>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
<label>(1)</label>
</disp-formula>The variables <inline-formula id="inf1">
<mml:math id="m2">
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>log</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>c</mml:mi>
<mml:msub>
<mml:mi>w</mml:mi>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> capture the key assumption that the reputation spillover from firm <italic>j</italic> to firm <italic>i</italic> via the ownership link, where <italic>w</italic>
<sub>
<italic>ij</italic>
</sub> is the reported share firm <italic>i</italic> holds in firm <italic>j</italic> and <italic>c</italic> is a normalization constant such that <italic>a</italic>
<sub>
<italic>ji</italic>
</sub> is always equal or larger than 1. The second term in <xref ref-type="disp-formula" rid="e1">Eq. 1</xref> captures the assumption that reputation fades out exponentially at a rate <italic>&#x3d5;</italic> if it is not maintained (<xref ref-type="bibr" rid="B21">Lundgren, 2011</xref>).</p>
<p>This dynamics has been also applied to model the reputation dynamics in online social networks (<xref ref-type="bibr" rid="B30">Schweitzer et&#x20;al., 2020</xref>). For application scenarios, it is more convenient to use relative reputation values <inline-formula id="inf2">
<mml:math id="m3">
<mml:mrow>
<mml:msub>
<mml:mi>r</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>/</mml:mo>
<mml:mrow>
<mml:msup>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mi>max</mml:mi>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, instead of absolute values <italic>x</italic>
<sub>
<italic>i</italic>
</sub>. But in this article, we are only interested in the reputation <italic>ranking</italic> of firms; therefore, we use&#x20;<italic>x</italic>
<sub>
<italic>i</italic>
</sub>.</p>
<p>In matrix form, the previous linear dynamics can be conveniently expressed as follows:<disp-formula id="e2">
<mml:math id="m4">
<mml:mrow>
<mml:mrow>
<mml:mover accent="true">
<mml:mi mathvariant="bold">X</mml:mi>
<mml:mo>&#x2d9;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msup>
<mml:mi mathvariant="bold">A</mml:mi>
<mml:mi>T</mml:mi>
</mml:msup>
<mml:mi mathvariant="bold">X</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3d5;</mml:mi>
<mml:mi mathvariant="bold">X</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
<label>(2)</label>
</disp-formula>The matrix <bold>A</bold>
<sup>
<italic>T</italic>
</sup> contains the information about the network topology, and the vector <inline-formula id="inf3">
<mml:math id="m5">
<mml:mrow>
<mml:mi>X</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>[</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>N</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mo>]</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> contains the reputation values of all&#x20;firms.</p>
<p>We set <italic>&#x3d5;</italic> as the largest eigenvalue of <bold>A</bold>. This allows the dynamics of <xref ref-type="disp-formula" rid="e2">Eq. 2</xref> to converge to an equilibrium with only positive entries, which are then used for the ranking. Here, we emphasize that with this configuration, we do not look at the time scale of the model, and we only use the equilibrium values.</p>
<p>Once we have identified the set of driver nodes, as described in the following section, we have to consider a control signal, that is, an induced change that modifies the reputation of only the driver nodes. The resulting linear dynamics can be then expressed as follows:<disp-formula id="e3">
<mml:math id="m6">
<mml:mrow>
<mml:mrow>
<mml:mover accent="true">
<mml:mi mathvariant="bold">X</mml:mi>
<mml:mo>&#x2d9;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msup>
<mml:mi mathvariant="bold">A</mml:mi>
<mml:mi>T</mml:mi>
</mml:msup>
<mml:mi mathvariant="bold">X</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3d5;</mml:mi>
<mml:mi mathvariant="bold">X</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2b;</mml:mo>
<mml:mi mathvariant="bold">BU</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
<label>(3)</label>
</disp-formula>The vector <inline-formula id="inf4">
<mml:math id="m7">
<mml:mrow>
<mml:mi mathvariant="bold">U</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2208;</mml:mo>
<mml:msup>
<mml:mi>&#x211d;</mml:mi>
<mml:mrow>
<mml:msub>
<mml:mi>N</mml:mi>
<mml:mi>c</mml:mi>
</mml:msub>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula> contains <inline-formula id="inf5">
<mml:math id="m8">
<mml:mrow>
<mml:msub>
<mml:mi>N</mml:mi>
<mml:mi>c</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> control signals <inline-formula id="inf6">
<mml:math id="m9">
<mml:mrow>
<mml:msub>
<mml:mi>u</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> <inline-formula id="inf7">
<mml:math id="m10">
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>N</mml:mi>
<mml:mi>c</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, and the matrix <inline-formula id="inf8">
<mml:math id="m11">
<mml:mrow>
<mml:mi mathvariant="bold">B</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:msup>
<mml:mi>&#x211d;</mml:mi>
<mml:mrow>
<mml:mi>N</mml:mi>
<mml:mo>&#xd7;</mml:mo>
<mml:msub>
<mml:mi>N</mml:mi>
<mml:mi>c</mml:mi>
</mml:msub>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula> determines which firms are influenced directly by control signals, which means the elements <inline-formula id="inf9">
<mml:math id="m12">
<mml:mrow>
<mml:msub>
<mml:mi>b</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2260;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula> if control signal <inline-formula id="inf10">
<mml:math id="m13">
<mml:mrow>
<mml:msub>
<mml:mi>u</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is applied to firm <italic>i</italic>. To apply the concept of network controllability, we are still left with determining the set of driver&#x20;nodes.</p>
</sec>
<sec id="s2-3">
<title>2.3 Identification and Classification of Driver Nodes</title>
<p>The recent framework of structural controllability for complex networks (<xref ref-type="bibr" rid="B20">Liu et&#x20;al., 2011</xref>) allows to identify minimum sets of driver nodes, that is, a small number of nodes that can be utilized to control the whole network. This method can be applied to directed networks. Because we cannot repeat all details of the method here, we summarize the respective steps and refer to the literature for subsequent information (<xref ref-type="bibr" rid="B38">Wang et&#x20;al., 2012</xref>; <xref ref-type="bibr" rid="B7">Cornelius et&#x20;al., 2013</xref>; <xref ref-type="bibr" rid="B40">Zhang et&#x20;al., 2016</xref>; <xref ref-type="bibr" rid="B41">Zhang et&#x20;al., 2019</xref>).</p>
<p>A complex network of <italic>N</italic> nodes can be controlled by different sets of driver nodes. MDS denotes the <italic>minimum</italic> set of drivers to control the <italic>whole</italic> network, and the size of this set is <inline-formula id="inf11">
<mml:math id="m14">
<mml:mrow>
<mml:msub>
<mml:mi>N</mml:mi>
<mml:mi>d</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>. It is computationally infeasible to enumerate all the possible MDSs. Therefore, in our article, we use two randomly chosen MDSs for the visualization, as shown in <xref ref-type="fig" rid="F2">Figure&#x20;2</xref>, and calculate our control-related measures based on 10.000 random samples. These samples are generated using a sophisticated random sampling procedure, as described in <xref ref-type="bibr" rid="B16">Jia and Barab&#xe1;si (2013</xref>). Note that for a given network, all of its MDSs are of the same size&#x20;<italic>N</italic>
<sub>
<italic>d</italic>
</sub>.</p>
<fig id="F2" position="float">
<label>FIGURE 2</label>
<caption>
<p>Visualizations of two MDSs in the ownership network. The node size is scaled proportional to the operating revenue of the firm. Transnational companies (TNCs) are shown in orange and in red, if they are also driver nodes. Participated companies (PCs) are shown in light green and in dark green, if they are also driver&#x20;nodes.</p>
</caption>
<graphic xlink:href="fdata-04-652913-g002.tif"/>
</fig>
<p>In different MDSs, we usually find different nodes, but some of them appear in every MDS. The probability <italic>P</italic>(<italic>D</italic>
<sub>
<italic>i</italic>
</sub>) that a given node <italic>i</italic> appears in an MDS is also known as control capacity <inline-formula id="inf12">
<mml:math id="m15">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="script">K</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> (<xref ref-type="bibr" rid="B16">Jia and Barab&#xe1;si, 2013</xref>). Further, each driver <italic>i</italic> controls a non-overlapping part of the network of size <italic>N</italic>
<sub>
<italic>i</italic>
</sub>. The probability that a given node is in the subnetwork controlled by node <italic>i</italic> is given by <italic>P</italic>(<italic>N</italic>
<sub>
<italic>i</italic>
</sub>). We combine these two pieces of information in the conditional probability <inline-formula id="inf13">
<mml:math id="m16">
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>N</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x7c;</mml:mo>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> that a given node is part of the subnetwork controlled by <italic>i</italic>, given that <italic>i</italic> is a driver node. The upper bound of this probability is also known as <italic>control range</italic>, <inline-formula id="inf14">
<mml:math id="m17">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="normal">&#x211b;</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> (<xref ref-type="bibr" rid="B38">Wang et&#x20;al., 2012</xref>).</p>
<p>To eventually combine the control range and control capacity, we have proposed a new measure, <italic>controzl contribution</italic> <inline-formula id="inf15">
<mml:math id="m18">
<mml:mrow>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi mathvariant="script">K</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:msub>
<mml:mi mathvariant="normal">&#x211b;</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> (<xref ref-type="bibr" rid="B41">Zhang et&#x20;al., 2019</xref>). This node-based measure gives us the probability for any node in a network to be controlled by node <italic>i</italic> joint with the probability that <italic>i</italic> becomes a driver. Larger <inline-formula id="inf16">
<mml:math id="m19">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="script">C</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> indicates that node <italic>i</italic> is more important in driving the whole network to a desired state. Concrete values for <inline-formula id="inf17">
<mml:math id="m20">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="script">C</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> can only be obtained algorithmically. (For an illustrative calculation and an algorithm, we refer to Reference <xref ref-type="bibr" rid="B41">Zhang et&#x20;al. (2019)</xref>.) There, it was also demonstrated that control contribution is better suitable than the control range or control capacity to classify the importance of nodes in controlling a network.</p>
<p>Applying the methods described earlier, we now have three different types of information for each firm in the ownership network: (i) its operating revenue <inline-formula id="inf18">
<mml:math id="m21">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3a9;</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, (ii) its reputation <italic>x</italic>
<sub>
<italic>i</italic>
</sub> (which takes the weighted ownership relations <italic>w</italic>
<sub>
<italic>ji</italic>
</sub> into account), and (iii) its control capacity <inline-formula id="inf19">
<mml:math id="m22">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="script">K</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, control range <inline-formula id="inf20">
<mml:math id="m23">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="normal">&#x211b;</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, and control contribution <inline-formula id="inf21">
<mml:math id="m24">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="script">C</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>. These measures reflect different dimensions to describe the importance of firms in an economic network, namely, their economic activity, their dependence on other firms, and their influence on other firms. Therefore, we can now address research questions that link these different dimensions, for instance, are firms with a high operating revenue or firms with a high reputation also most influential in network control?</p>
<p>To quantify such relations, we perform an <italic>enrichment analysis</italic>, a statistical method which is commonly used to identify genes or proteins that are overrepresented (<xref ref-type="bibr" rid="B39">Wuchty, 2014</xref>). To illustrate the idea, suppose there are <italic>N</italic> balls characterized by colors <italic>s</italic> and types <italic>t</italic>. We have three colors, that is, <italic>s</italic>: (white, black, and grey) and two types <italic>t</italic>: (heavy and light). Enrichment analysis can, for example, tell whether heavy balls are more likely to be white balls or not. To do so, we need to compare the number of heavy balls whose color is also white, <inline-formula id="inf22">
<mml:math id="m25">
<mml:mrow>
<mml:msubsup>
<mml:mi>N</mml:mi>
<mml:mi>l</mml:mi>
<mml:mi>s</mml:mi>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula>, and the number of heavy balls <inline-formula id="inf23">
<mml:math id="m26">
<mml:mrow>
<mml:msubsup>
<mml:mi>N</mml:mi>
<mml:mi>l</mml:mi>
<mml:mi>R</mml:mi>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula>, if we randomly sample <italic>N</italic>/3&#x20;balls.</p>
<p>Here, we apply this analysis to the firms that are part of the driver set of size <italic>N</italic>
<sub>
<italic>d</italic>
</sub>. Our &#x201c;colors,&#x201d; or categories, are now reputation values, that is, <inline-formula id="inf24">
<mml:math id="m27">
<mml:mrow>
<mml:mi>s</mml:mi>
<mml:mo>:</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> (low, medium, and high) reputation. To define these groups, we first calculate the reputation <italic>x</italic>
<sub>
<italic>i</italic>
</sub> using <xref ref-type="disp-formula" rid="e1">Eqn. (1)</xref> and then rank firms according to their reputation values in equilibrium. Note that this reputation ranking is also produced in <xref ref-type="bibr" rid="B42">Zhang and Schweitzer (2019</xref>) with the same dynamics and assumptions. Here, we further split the ranked set into three groups of equal size&#x20;<italic>N</italic>
<sub>
<italic>d</italic>
</sub>/3.</p>
<p>Second, we specify which types <italic>l</italic> we are interested in, for example, whether firms have a low, medium, or high control contribution <italic>C</italic>
<sub>
<italic>i</italic>
</sub>. <inline-formula id="inf25">
<mml:math id="m28">
<mml:mrow>
<mml:msubsup>
<mml:mi>N</mml:mi>
<mml:mi>l</mml:mi>
<mml:mtext>s</mml:mtext>
</mml:msubsup>
<mml:mo>&#x2264;</mml:mo>
<mml:msub>
<mml:mi>N</mml:mi>
<mml:mi>d</mml:mi>
</mml:msub>
<mml:mo>/</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula> then denotes the number of firms which are in the reputation group <italic>s and</italic> have a type <italic>l</italic> regarding their control contribution, which means, instead of just looking into correlations across all firms, we define groups of firms with certain features and then address the question whether firms with these features appear more frequently than expected in each reputation&#x20;group.</p>
<p>For this comparison, we need a random set R that has the same size <italic>N</italic>
<sub>
<italic>d</italic>
</sub>/3 but is sampled from all <italic>N</italic> firms with respect to the feature <italic>l</italic>. <inline-formula id="inf26">
<mml:math id="m29">
<mml:mrow>
<mml:msubsup>
<mml:mi>N</mml:mi>
<mml:mi>l</mml:mi>
<mml:mtext>R</mml:mtext>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula> is the number of firms in the random set with, for example, medium control contribution. The random sampling is performed 10.000 times, to obtain a distribution for the values <inline-formula id="inf27">
<mml:math id="m30">
<mml:mrow>
<mml:msubsup>
<mml:mi>N</mml:mi>
<mml:mi>l</mml:mi>
<mml:mi>R</mml:mi>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula>, from which we can calculate the mean <inline-formula id="inf28">
<mml:math id="m31">
<mml:mrow>
<mml:mi>&#x3bc;</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msubsup>
<mml:mi>N</mml:mi>
<mml:mi>l</mml:mi>
<mml:mi>R</mml:mi>
</mml:msubsup>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> and the standard deviation <inline-formula id="inf29">
<mml:math id="m32">
<mml:mrow>
<mml:mi>&#x3c3;</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msubsup>
<mml:mi>N</mml:mi>
<mml:mi>l</mml:mi>
<mml:mi>R</mml:mi>
</mml:msubsup>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>. For the comparison between the category <italic>s</italic> and the type <italic>L</italic>, we then use the <italic>z</italic>-score:<disp-formula id="e4">
<mml:math id="m33">
<mml:mrow>
<mml:msubsup>
<mml:mi>z</mml:mi>
<mml:mi>l</mml:mi>
<mml:mi>s</mml:mi>
</mml:msubsup>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:msubsup>
<mml:mi>N</mml:mi>
<mml:mi>l</mml:mi>
<mml:mi>s</mml:mi>
</mml:msubsup>
<mml:mo>&#xa0;</mml:mo>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3bc;</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msubsup>
<mml:mi>N</mml:mi>
<mml:mi>l</mml:mi>
<mml:mi>R</mml:mi>
</mml:msubsup>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c3;</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msubsup>
<mml:mi>N</mml:mi>
<mml:mi>l</mml:mi>
<mml:mi>R</mml:mi>
</mml:msubsup>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
<label>(4)</label>
</disp-formula>
</p>
<p>Obviously, a positive <italic>z</italic>-score shows an enrichment of the given category <italic>s</italic> in the type <italic>l</italic>. Enrichment means that firms with a given type <italic>l</italic> appear more frequently in the category <italic>s</italic> than expected at random. Additionally, we report the probability <italic>p</italic> in which <inline-formula id="inf30">
<mml:math id="m34">
<mml:mrow>
<mml:msubsup>
<mml:mi>N</mml:mi>
<mml:mi>l</mml:mi>
<mml:mi>s</mml:mi>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula> is larger (smaller) than <inline-formula id="inf31">
<mml:math id="m35">
<mml:mrow>
<mml:msubsup>
<mml:mi>N</mml:mi>
<mml:mi>l</mml:mi>
<mml:mi>R</mml:mi>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula> when the <italic>z</italic>-score is positive (negative).</p>
</sec>
</sec>
<sec id="s3">
<title>3 Results</title>
<sec id="s3-1">
<title>3.1 Driver Nodes and Access Costs</title>
<p>To classify firms as driver nodes, we first need to determine the size of the MDS. We find that from the 1,318 firms in the ownership network, we need to control a minimum number of <italic>N</italic>
<sub>
<italic>d</italic>
</sub> &#x3d; 341 firms directly in order to control the whole network. Note that the size of the MDS is mainly determined by characteristics of the network topology, such as the degree distribution. Then, out of the large number of possible MDSs with the same size, we have to generate 10.000 random samples, on which our further analysis is&#x20;based.</p>
<p>As an illustration, <xref ref-type="fig" rid="F2">Figure&#x20;2</xref> presents visualizations of two random MDSs embedded in the ownership network shown in <xref ref-type="fig" rid="F1">Figure&#x20;1</xref>. We notice that both MDSs only have a few driver nodes in common. Further, the right MDS contains more TNCs with high operating revenue as driver nodes, whereas the left contains mostly PCs with lower operating revenue.</p>
<p>To further quantify these differences, we first investigate how many TNCs are present in a randomly sampled MDS. The distribution obtained from 10.000 MDS is shown in <xref ref-type="fig" rid="F3">Figure&#x20;3A</xref>. We find that on average, about 26 TNCs are present in an MDS of size 341, that is, &#x3c;10%. One could naively assume that because of their economic importance, TNCs would also be the most important driver nodes and thus should appear more often. Interestingly, this is not the case. Even more, the average of 26&#xa0;TNCs, which corresponds to 8.7% of all TNCs in the core of the ownership network, is far below the <italic>expected</italic> number of TNCs obtained from a <italic>random sample</italic> of firms, which is 28.8%. This leads to the conclusion that TNCs are statistically underrepresented in the sets of driver&#x20;nodes.</p>
<fig id="F3" position="float">
<label>FIGURE 3</label>
<caption>
<p>Distribution of <bold>(B)</bold> the number of TNCs, and <bold>(B)</bold> their total operating revenue (in trillion USD) sampled from 10.000 MDSs.</p>
</caption>
<graphic xlink:href="fdata-04-652913-g003.tif"/>
</fig>
<p>Further, the distribution is well-formed between a minimum of 17 and a maximum of 34 TNCs, which means we can find indeed MDSs in which the number of TNCs is only about 5%. Why is this of interest? These MDSs because of the different number of TNCs also represent a very different economic value, as proxied by the operating revenue <inline-formula id="inf32">
<mml:math id="m36">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3a9;</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> of their TNCs. <xref ref-type="fig" rid="F3">Figure&#x20;3B</xref> shows the distribution of <inline-formula id="inf33">
<mml:math id="m37">
<mml:mrow>
<mml:mi>&#x3a3;</mml:mi>
<mml:msub>
<mml:mi>&#x3a9;</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> of all TNCs in the 10.000 sampled MDSs. On average, the TNCs in an MDS hold a total operating revenue of 720 trillion USD, which accounts for 9.6% of the amount held by all firms in the network. But these values can be as low as 350 or as high as 1,300 trillion USD. So, we have a remarkable number of &#x201c;cheap&#x201d; MDS available.</p>
<p>We remind that all MDS fulfill the same purpose, namely, to control the <italic>whole</italic> network. But a &#x201c;cheap&#x201d; MDS, as proxied by the total operating revenue, with a low number of TNCs would potentially be more easily accessible. Remember that network controllability requires us to apply a control signal to a firm, which means we need to consider some sort of <italic>access cost</italic> to utilize a given firm as a driver node. It is likely more expensive to access a TNCs of high operating revenue than a PC of low operating revenue. Because we have no way to directly quantify the access cost, in the following, we take the operating revenue <inline-formula id="inf34">
<mml:math id="m38">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3a9;</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> as a proxy of this access&#x20;cost.</p>
<p>One could still argue that firms from a &#x201c;cheap&#x201d; MDS are less likely to be chosen as driver nodes because they are more often PCs. Again, this reflects the underlying assumption that TNCs should be more important as driver nodes and therefore should also be more often present in different MDSs. To refute this argument, we have investigated the distribution of the control capacities <inline-formula id="inf35">
<mml:math id="m39">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="script">K</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, which give the probability that a firm is chosen as a driver node. The results are shown in <xref ref-type="fig" rid="F4">Figure&#x20;4</xref> both for TNCs and for PCs. We find that most firms, despite belonging to an MDS, only have a very low probability to be chosen as driver nodes. This holds for both TNCs and PCs. Then, there is a very broad distribution of <inline-formula id="inf36">
<mml:math id="m40">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="script">K</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> values, which is largely dominated by PCs. Firms with a control capacity close to 1 are always present in any MDS. We find that these firms are&#x20;PCs.</p>
<fig id="F4" position="float">
<label>FIGURE 4</label>
<caption>
<p>Distribution of control capacities <inline-formula id="inf37">
<mml:math id="m41">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="script">K</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> for TNCs (red) and PCs (yellow).</p>
</caption>
<graphic xlink:href="fdata-04-652913-g004.tif"/>
</fig>
<p>Thus, in conclusion, firms that are PCs are most often present as driver nodes. Second, their access cost should be considerably lower than for TNCs. Therefore, we can safely choose &#x201c;cheap&#x201d; MDSs with a high fraction of PCs, to reach an efficient control of the whole network. This is an important insight because it links network controllability to economic measures and allows for policy advice.</p>
</sec>
<sec id="s3-2">
<title>3.2 Different Roles of Nodes</title>
<p>So far, we have mainly explored the economic and control properties of the firms that are part of the sets of driver nodes. Now, we focus on the different <italic>types l</italic> of nodes, specifically the <italic>roles</italic> of firms in (a) maintaining controllability and (b) controlling the network. We start from our reputation ranking of firms, which lead to the formation of groups of size <italic>N</italic>
<sub>
<italic>d</italic>
</sub>/3 with <italic>s</italic>: (low, medium, and high) reputation, as described in <xref ref-type="sec" rid="s2-3">Section&#x20;2.3</xref>.</p>
<p>We first analyze how these groups to correlate with the roles of firms in <italic>maintaining</italic> control. This requires us to specify the node types <italic>l</italic> accordingly. Maintaining control means that the set of driver nodes is still able to fully control the network, if a respective node <italic>i</italic> would be isolated. Following <xref ref-type="bibr" rid="B36">Vinayagam et&#x20;al. (2016</xref>), we can then distinguish three types <italic>l</italic> of driver nodes: nolistsep.<list list-type="simple">
<list-item>
<p>(a) node is <italic>indispensable</italic> if after its isolation, <italic>more</italic> driver nodes are needed to control the rest of the network;</p>
</list-item>
<list-item>
<p>(b) node is redundant if its isolation does not change the required number of driver nodes;</p>
</list-item>
<list-item>
<p>(c) node is dispensable if after its isolation, the network is controllable with fewer driver&#x20;nodes.</p>
</list-item>
</list>
</p>
<p>Based on this classification, to identify the role <italic>l</italic> of firm <italic>i</italic> in maintaining controllability, we need to calculate the minimum number of driver nodes if <italic>i</italic> is isolated and compare it with the minimum number of driver nodes if <italic>i</italic> is not isolated. We have to keep in mind that isolating a node implies changing its local ownership relations, which definitely impacts the size of the minimum set of drivers. An MDS of size 341 only holds for the non-perturbed network. Also, different from <xref ref-type="bibr" rid="B36">Vinayagam et&#x20;al. (2016</xref>) in which a protein can be knocked out, we cannot remove a firm from the ownership network even it is bankrupt. Instead, we can isolate a firm by removing all its ownership relations.</p>
<p>The results are shown in <xref ref-type="fig" rid="F5">Figure&#x20;5A</xref> in terms of the <italic>z</italic>-score defined in <xref ref-type="disp-formula" rid="e4">Eq. 4</xref>. Firms in each group with low, medium, and high reputation do contain all three types of driver nodes, indispensable, redundant, and dispensable. But the <italic>z</italic>-score tells us whether such roles are enriched in a particular group. We see that <italic>indispensable</italic> nodes are most enriched (<italic>p</italic>&#x20;&#x3d; 100%) in the set of high-reputation firms; this is in accordance with our expectation that the most reputable firms channel control signals through the ownership network. Interestingly, indispensable nodes are mostly underrepresented (<italic>p</italic>&#x20;&#x3d; 99.8%) in the group with medium reputation, instead of low reputation. This can be partly explained from the fact that the ownership network forms a strongly connected component. Therefore, the isolation of a low-degree node, which is likely a firm of medium to low reputation, may leave some nodes with no incoming links, which have to be controlled directly with additional drivers. In conclusion, this analysis shows the importance of firms with high reputation in <italic>maintaining</italic> controllability.</p>
<fig id="F5" position="float">
<label>FIGURE 5</label>
<caption>
<p>Enrichment analysis for firms classified according to their reputation value. <bold>(A)</bold> Role of firms in maintaining control and <bold>(B)</bold> role of firms with respect to control contribution, <inline-formula id="inf38">
<mml:math id="m42">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="script">C</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
</caption>
<graphic xlink:href="fdata-04-652913-g005.tif"/>
</fig>
<p>Second, we analyze how the three reputation groups correlate with the role of firms in <italic>controlling</italic> the network. In this case, we have to specify the types <italic>l</italic> of nodes with respect to their control contribution <inline-formula id="inf39">
<mml:math id="m43">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="script">C</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, introduced in <xref ref-type="sec" rid="s2-3">Section 2.3</xref>. We remind that <inline-formula id="inf40">
<mml:math id="m44">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="script">C</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> captures the probability for a firm to become a driver node, joint with the probability for any firm to be controlled by this firm. Hence, firms with a high control contribution are top drivers. We use the values of <inline-formula id="inf41">
<mml:math id="m45">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="script">C</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> to distinguish three groups of equal size <italic>N</italic>
<sub>
<italic>d</italic>
</sub>/3 with low, medium, and high control contribution.</p>
<p>The results are shown in <xref ref-type="fig" rid="F5">Figure&#x20;5B</xref> in terms of <italic>z</italic>-score defined in <xref ref-type="disp-formula" rid="e4">Eq. 4</xref>. We find that the top driver nodes are mostly firms with <italic>medium</italic> reputation, not with high reputation, which is a very interesting result. Firms with high reputation are strongly embedded into the ownership network and connected to other firms with high reputation. Consequently, to utilize such firms as driver nodes would imply a considerable access cost. But this is not needed. Instead, network controllability can be best achieved with firms of medium reputation.</p>
<p>In <xref ref-type="table" rid="T1">Table&#x20;1</xref>, we also list the top 10 driver nodes with respect to their control contribution <italic>C</italic>
<sub>
<italic>i</italic>
</sub> and provide their reputation rank. We observe that none of these firms has a high reputation, and only one of them is a TNC. This confirms that the top drivers are likely not firms with high reputation in the ownership network.</p>
<table-wrap id="T1" position="float">
<label>TABLE 1</label>
<caption>
<p>List of the firms that are the top 10 driver nodes ranked by their control contributions, <inline-formula id="inf42">
<mml:math id="m46">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="script">C</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>. <inline-formula id="inf43">
<mml:math id="m47">
<mml:mrow>
<mml:msub>
<mml:mi>O</mml:mi>
<mml:mi mathvariant="script">C</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> denotes the respective&#x20;rank.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">
<inline-formula id="inf44">
<mml:math id="m48">
<mml:mrow>
<mml:msub>
<mml:mi>O</mml:mi>
<mml:mi mathvariant="script">C</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>
</th>
<th align="center">Name</th>
<th align="center">Type</th>
<th align="center">Country</th>
<th align="center">
<inline-formula id="inf45">
<mml:math id="m49">
<mml:mrow>
<mml:msub>
<mml:mi>O</mml:mi>
<mml:mi>x</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>
</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">1</td>
<td align="left">CAISSE REGIONALE DE CREDIT AGRICOLE MUTUEL DE LA TOURAINE ET DU POITOU</td>
<td align="left">TNC</td>
<td align="left">FR</td>
<td align="char" char=".">592</td>
</tr>
<tr>
<td align="left">2</td>
<td align="left">BBVA CARTERA SICAV SA</td>
<td align="left">PC</td>
<td align="left">ES</td>
<td align="char" char=".">1,202</td>
</tr>
<tr>
<td align="left">3</td>
<td align="left">BIOTECNET I MAS D SDAD ANONIMA</td>
<td align="left">PC</td>
<td align="left">ES</td>
<td align="char" char=".">1 198</td>
</tr>
<tr>
<td align="left">4</td>
<td align="left">INVERPASTOR SA SIMCAV.</td>
<td align="left">PC</td>
<td align="left">ES</td>
<td align="char" char=".">1,206</td>
</tr>
<tr>
<td align="left">5</td>
<td align="left">INVERSIONES HERRERO SICAV SA</td>
<td align="left">PC</td>
<td align="left">ES</td>
<td align="char" char=".">1,201</td>
</tr>
<tr>
<td align="left">6</td>
<td align="left">BOLS HISPANIA SA SIMCAV.</td>
<td align="left">PC</td>
<td align="left">ES</td>
<td align="char" char=".">1,206</td>
</tr>
<tr>
<td align="left">7</td>
<td align="left">BANQUE POPULAIRE LOIRE ET LYONNAIS</td>
<td align="left">PC</td>
<td align="left">FR</td>
<td align="char" char=".">551</td>
</tr>
<tr>
<td align="left">8</td>
<td align="left">CAISSE REGIONALE DE CREDIT AGRICOLE MUTUEL DE NORMANDIE-SEINE</td>
<td align="left">PC</td>
<td align="left">FR</td>
<td align="char" char=".">578</td>
</tr>
<tr>
<td align="left">9</td>
<td align="left">BANQUE POPULAIRE BOURGOGNE</td>
<td align="left">PC</td>
<td align="left">FR</td>
<td align="char" char=".">530</td>
</tr>
<tr>
<td align="left">10</td>
<td align="left">FRANCHE-COMTE</td>
<td align="left">PC</td>
<td align="left">FR</td>
<td align="char" char=".">542</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn>
<p>
<inline-formula id="inf46">
<mml:math id="m50">
<mml:mrow>
<mml:msub>
<mml:mi>O</mml:mi>
<mml:mi>x</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> denotes the rank of the same firm with respect to the reputation <italic>x</italic>.</p>
</fn>
</table-wrap-foot>
</table-wrap>
<p>A summary our findings from the two enrichment analyses is given as follows: (a) firms with high reputation maintain the controllability of the network but are unlikely to become top driver nodes and (b) firms with medium reputation are most likely to become top driver nodes, but they are also dispensable for maintaining controllability.</p>
</sec>
</sec>
<sec id="s4">
<title>4 Discussion</title>
<p>Our analysis makes two major contributions to the state of the art in network science: (i) we provide new ways of quantifying the importance of firms and (ii) we link two strands of research that are so far largely disconnected: network controllability and economic networks. In the following, we comment on these achievements.</p>
<p>Starting from network science, the importance of nodes in a network should capture the fact that networks serve a purpose, links have a meaning, and nodes have an intrinsic dynamics. This is reflected in different centrality measures (<xref ref-type="bibr" rid="B2">Borgatti, 2005</xref>; <xref ref-type="bibr" rid="B18">Landherr et&#x20;al., 2010</xref>; <xref ref-type="bibr" rid="B8">Das et&#x20;al., 2018</xref>), which have been recently extended also to temporal networks (<xref ref-type="bibr" rid="B28">Scholtes et&#x20;al., 2016</xref>). There is no general &#x201c;importance&#x201d; but importance with respect to a given process that we want to describe. Our application scenario is <italic>reputation spillover</italic>. This requires us to quantify (a) the reputation of firms and (b) the process of reputation spillover. For this, we have utilized a recent framework to model reputation dynamics (<xref ref-type="bibr" rid="B30">Schweitzer et&#x20;al., 2020</xref>). But, to become relevant and applicable, this approach needs an <italic>economic</italic> interpretation. This problem was also solved in a recent study that links reputation spillovers to ownership relations (<xref ref-type="bibr" rid="B42">Zhang and Schweitzer, 2019</xref>), which means at this point, we have a new way to quantify the importance of firms by means of a reputation value that reflects ownership relations. This complements other importance measures for firms, such as their operating revenue.</p>
<p>In this study, we go one step further by linking these importance measures to the role of firms in network control. Using the <italic>topology</italic> of the ownership network and the <italic>dynamics</italic> of reputation spillover, we can apply the recent concept of network controllability (<xref ref-type="bibr" rid="B20">Liu et&#x20;al., 2011</xref>; <xref ref-type="bibr" rid="B7">Cornelius et&#x20;al., 2013</xref>). It allows identifying those firms that can become <italic>driver nodes</italic> to steer the reputation dynamics. We find that out of the 1,318 firms that form the core of the ownership network, an MDS of only 341 firms, that is, 26%, about one-quarter, is needed to control the dynamics of the <italic>whole</italic> network. To characterize the control contribution of each firm, we have calculated a new measure <inline-formula id="inf47">
<mml:math id="m51">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="script">C</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> (<xref ref-type="bibr" rid="B41">Zhang et&#x20;al., 2019</xref>). It combines two pieces of information, the probability of a firm to become a driver and the probability that other firms are controlled by firm&#x20;<italic>i</italic>.</p>
<p>Hence, we now have two importance measures, in addition to the operating revenue <inline-formula id="inf48">
<mml:math id="m52">
<mml:mrow>
<mml:msub>
<mml:mtext>&#x3a9;</mml:mtext>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, the reputation value <italic>x</italic>
<sub>
<italic>i</italic>
</sub>, and the control contribution <inline-formula id="inf49">
<mml:math id="m53">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="script">C</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>. Each of these measures reflects a different dimension: economic activity, dependence on other firms, and influence on other firms. This eventually enables us to better characterize those firms that are most important in controlling the reputation dynamics.</p>
<p>Precisely, our enrichment analysis tells whether firms of low, medium, or high reputation are more often than expected involved in maintaining or exerting control. Again, one could naively expect that large firms with high operating revenue, such as TNCs, or firms with the highest reputation play the most important role. As our analysis shows, this is not the case. TNCs are underrepresented in the minimum sets of driver nodes, which are dominated by PCs. And firms with a high reputation are less likely to become top driver nodes. Instead, we find that firms with medium reputation play the most important role as top drivers.</p>
<p>This is not an abstract insight and it can be given an economic interpretation, this way linking network controllability and economic networks. The nodes of our network are not abstract entities; they are economic actors characterized by their ownership structure, <inline-formula id="inf50">
<mml:math id="m54">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3c9;</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and their operating revenue, <inline-formula id="inf51">
<mml:math id="m55">
<mml:mrow>
<mml:msub>
<mml:mtext>&#x3a9;</mml:mtext>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>. This enables us to distinguish between transnational companies (TNCs) and participated companies (PCs). This information can be used to argue about <italic>access costs</italic>, that is, the potential costs if one wants to use specific firms as driver&#x20;nodes.</p>
<p>Network controllability implies that control signals need to be applied to certain nodes. Hence, in an economic setting, there are costs involved, not only for the control signal but also for accessing the node. As we demonstrate, among the various sets of driver nodes that control the whole network, there are many MDSs composed of PCs of lower total operating revenue. If operating revenue is taken as a proxy for the access cost, these MDS would be quite &#x201c;cheap&#x201d; to access, while still allowing for full control. A similar argument holds for firms with high reputation, which are likely TNCs with high operating revenue. As we have shown, firms of a medium reputation play a major role in controlling the network. These are mostly PCs with lower operating revenue and, hence, with a lower access&#x20;cost.</p>
<p>In conclusion, using these economic criteria, we can select sets of driver nodes that are less costly to access but still allow for a full control of the network. Here, we emphasize that while our finding opens new ways of discussing the <italic>economic importance</italic> of firms, it should be carefully interpreted within the scope where &#x201c;control&#x201d; and &#x201c;reputation&#x201d; are defined the same. It also paves the way for possible future works: One direction is to build up agent-based models in which economic agents are utilized as drivers to influence the reputation of other agents. This may further provide posteriors that can help interpret our current results. Another direction is to explore how particular economic structures and dynamics influence controllability.</p>
</sec>
</body>
<back>
<sec id="s5">
<title>Data Availability Statement</title>
<p>The data analyzed in this study are subject to the following licenses/restrictions: We used a commercial data set from the ORBIS data base (Bureau van Dyck). Requests to access these datasets should be directed to <email>zurich@bvdinfo.com</email>
</p>
</sec>
<sec id="s6">
<title>Author Contributions</title>
<p>FS and YZ designed the study and wrote the manuscript. YZ did the data analysis and the numerical calculations.</p>
</sec>
<sec sec-type="COI-statement" id="s7">
<title>Conflict of Interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<fn-group>
<fn id="fn1">
<label>1</label>
<p>
<ext-link ext-link-type="uri" xlink:href="https://orbis.bvdinfo.com/">https://orbis.bvdinfo.com/</ext-link>
</p>
</fn>
</fn-group>
<ref-list>
<title>References</title>
<ref id="B1">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Battiston</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Puliga</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Kaushik</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Tasca</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Caldarelli</surname>
<given-names>G.</given-names>
</name>
</person-group> (<year>2012</year>). <article-title>DebtRank: Too Central to Fail? Financial Networks, the FED and Systemic Risk</article-title>. <source>Sci. Rep.</source> <volume>2</volume> (<issue>1</issue>), <fpage>541</fpage>. <pub-id pub-id-type="doi">10.1038/srep00541</pub-id> </citation>
</ref>
<ref id="B2">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Borgatti</surname>
<given-names>S. P.</given-names>
</name>
</person-group> (<year>2005</year>). <article-title>Centrality and Network Flow</article-title>. <source>Social Networks</source>. <volume>27</volume> (<issue>1</issue>), <fpage>55</fpage>&#x2013;<lpage>71</lpage>. <pub-id pub-id-type="doi">10.1016/j.socnet.2004.11.008</pub-id> </citation>
</ref>
<ref id="B3">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Brammer</surname>
<given-names>S. J.</given-names>
</name>
<name>
<surname>Pavelin</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2006</year>). <article-title>Corporate Reputation and Social Performance: The Importance of Fit</article-title>. <source>J.&#x20;Management Stud.</source> <volume>43</volume>, <fpage>435</fpage>&#x2013;<lpage>455</lpage>. <pub-id pub-id-type="doi">10.1111/j.1467-6486.2006.00597.x</pub-id> </citation>
</ref>
<ref id="B4">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Burkholz</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Schweitzer</surname>
<given-names>F.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>International Crop Trade Networks: The Impact of Shocks and Cascades</article-title>. <source>Environ. Res. Lett.</source> <volume>14</volume>, <fpage>114013</fpage>. <pub-id pub-id-type="doi">10.1088/1748-9326/ab4864</pub-id> </citation>
</ref>
<ref id="B5">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Casiraghi</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Schweitzer</surname>
<given-names>F.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Improving the Robustness of Online Social Networks: A Simulation Approach of Network Interventions</article-title>. <source>Front. Robot. AI</source>. <volume>7</volume>, <fpage>57</fpage>. <pub-id pub-id-type="doi">10.3389/frobt.2020.00057</pub-id> </citation>
</ref>
<ref id="B6">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Casiraghi</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Schweitzer</surname>
<given-names>F.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Intervention Scenarios to Enhance Knowledge Transfer in a Network of Firms</article-title>. <source>Front. Phys.</source> <volume>8</volume>, <fpage>382</fpage>. <pub-id pub-id-type="doi">10.3389/fphy.2020.00382</pub-id> </citation>
</ref>
<ref id="B7">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cornelius</surname>
<given-names>S. P.</given-names>
</name>
<name>
<surname>Kath</surname>
<given-names>W. L.</given-names>
</name>
<name>
<surname>Motter</surname>
<given-names>A. E.</given-names>
</name>
</person-group> (<year>2013</year>). <article-title>Realistic Control of Network Dynamics</article-title>. <source>Nat. Commun.</source> <volume>4</volume>, <fpage>1942</fpage>. <pub-id pub-id-type="doi">10.1038/ncomms2939</pub-id> </citation>
</ref>
<ref id="B8">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Das</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Samanta</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Pal</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>Study on Centrality Measures in Social Networks: a Survey</article-title>. <source>Soc. Netw. Anal. Min.</source> <volume>8</volume> (<issue>1</issue>), <fpage>13</fpage>. <pub-id pub-id-type="doi">10.1007/s13278-018-0493-2</pub-id> </citation>
</ref>
<ref id="B9">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Delgado-Garc&#xed;a</surname>
<given-names>J.&#x20;B.</given-names>
</name>
<name>
<surname>De Quevedo-Puente</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>De La Fuente-Sabat&#xe9;</surname>
<given-names>J.&#x20;M.</given-names>
</name>
</person-group> (<year>2010</year>). <article-title>The Impact of Ownership Structure on Corporate Reputation: Evidence from Spain</article-title>. <source>Corporate Governance: Int. Rev.</source> <volume>18</volume>, <fpage>540</fpage>&#x2013;<lpage>556</lpage>. <pub-id pub-id-type="doi">10.1111/j.1467-8683.2010.00818.x</pub-id> </citation>
</ref>
<ref id="B10">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Fagiolo</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Reyes</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Schiavo</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2010</year>). <article-title>The Evolution of the World Trade Web: a Weighted-Network Analysis</article-title>. <source>J.&#x20;Evol. Econ.</source> <volume>20</volume> (<issue>4</issue>), <fpage>479</fpage>&#x2013;<lpage>514</lpage>. <pub-id pub-id-type="doi">10.1007/s00191-009-0160-x</pub-id> </citation>
</ref>
<ref id="B11">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Fombrun</surname>
<given-names>C. J.</given-names>
</name>
<name>
<surname>Ponzi</surname>
<given-names>L. J.</given-names>
</name>
<name>
<surname>Newburry</surname>
<given-names>W.</given-names>
</name>
</person-group> (<year>2015</year>). <article-title>Stakeholder Tracking and Analysis: The RepTrak System for Measuring Corporate Reputation</article-title>. <source>Corp Reputation Rev.</source> <volume>18</volume> (<issue>1</issue>), <fpage>3</fpage>&#x2013;<lpage>24</lpage>. <pub-id pub-id-type="doi">10.1057/crr.2014.21</pub-id> </citation>
</ref>
<ref id="B12">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Fombrun</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Shanley</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>1990</year>). <article-title>What&#x27;s in a Name? Reputation Building and Corporate Strategy</article-title>. <source>Amj</source>. <volume>33</volume> (<issue>2</issue>), <fpage>233</fpage>&#x2013;<lpage>258</lpage>. <pub-id pub-id-type="doi">10.5465/256324</pub-id> </citation>
</ref>
<ref id="B13">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Garcia-Bernardo</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Fichtner</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Takes</surname>
<given-names>F. W.</given-names>
</name>
<name>
<surname>Heemskerk</surname>
<given-names>E. M.</given-names>
</name>
</person-group> (<year>2017</year>). <article-title>Uncovering Offshore Financial Centers: Conduits and Sinks in the Global Corporate Ownership Network</article-title>. <source>Sci. Rep.</source> <volume>7</volume> (<issue>1</issue>), <fpage>6246</fpage>&#x2013;<lpage>6310</lpage>. <pub-id pub-id-type="doi">10.1038/s41598-017-06322-9</pub-id> </citation>
</ref>
<ref id="B14">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Garlaschelli</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Loffredo</surname>
<given-names>M. I.</given-names>
</name>
</person-group> (<year>2005</year>). <article-title>Structure and Evolution of the World Trade Network</article-title>. <source>Physica A: Stat. Mech. its Appl.</source> <volume>355</volume> (<issue>1</issue>), <fpage>138</fpage>&#x2013;<lpage>144</lpage>. <pub-id pub-id-type="doi">10.1016/j.physa.2005.02.075</pub-id> </citation>
</ref>
<ref id="B15">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Glattfelder</surname>
<given-names>J.&#x20;B.</given-names>
</name>
<name>
<surname>Battiston</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2009</year>). <article-title>Backbone of Complex Networks of Corporations: The Flow of Control</article-title>. <source>Phys. Rev. E</source>. <volume>80</volume> (<issue>3</issue>), <fpage>36104</fpage>. <pub-id pub-id-type="doi">10.1103/physreve.80.036104</pub-id> </citation>
</ref>
<ref id="B16">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Jia</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Barab&#xe1;si</surname>
<given-names>A.-L.</given-names>
</name>
</person-group> (<year>2013</year>). <article-title>Control Capacity and a Random Sampling Method in Exploring Controllability of Complex Networks</article-title>. <source>Sci. Rep.</source> <volume>3</volume>, <fpage>2354</fpage>. <pub-id pub-id-type="doi">10.1038/srep02354</pub-id> </citation>
</ref>
<ref id="B17">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kang</surname>
<given-names>E.</given-names>
</name>
</person-group> (<year>2008</year>). <article-title>Director Interlocks and Spillover Effects of Reputational Penalties from Financial Reporting Fraud</article-title>. <source>Amj</source>. <volume>51</volume> (<issue>3</issue>), <fpage>537</fpage>&#x2013;<lpage>555</lpage>. <pub-id pub-id-type="doi">10.5465/amj.2008.32626007</pub-id> </citation>
</ref>
<ref id="B18">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Landherr</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Friedl</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Heidemann</surname>
<given-names>J.</given-names>
</name>
</person-group> (<year>2010</year>). <article-title>A Critical Review of Centrality Measures in Social Networks</article-title>. <source>Bus Inf. Syst. Eng.</source> <volume>2</volume> (<issue>6</issue>), <fpage>371</fpage>&#x2013;<lpage>385</lpage>. <pub-id pub-id-type="doi">10.1007/s12599-010-0127-3</pub-id> </citation>
</ref>
<ref id="B19">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Leone Sciabolazza</surname>
<given-names>V.</given-names>
</name>
<name>
<surname>Vacca</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>McCarty</surname>
<given-names>C.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Connecting the Dots: Implementing and Evaluating a Network Intervention to foster Scientific Collaboration and Productivity</article-title>. <source>Soc. Networks</source>. <volume>61</volume>, <fpage>181</fpage>&#x2013;<lpage>195</lpage>. <pub-id pub-id-type="doi">10.1016/j.socnet.2019.11.003</pub-id> </citation>
</ref>
<ref id="B20">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Liu</surname>
<given-names>Y.-Y.</given-names>
</name>
<name>
<surname>Slotine</surname>
<given-names>J.-J.</given-names>
</name>
<name>
<surname>Barab&#xe1;si</surname>
<given-names>A.-L.</given-names>
</name>
</person-group> (<year>2011</year>). <article-title>Controllability of Complex Networks</article-title>. <source>Nature</source>. <volume>473</volume> (<issue>7346</issue>), <fpage>167</fpage>&#x2013;<lpage>173</lpage>. <pub-id pub-id-type="doi">10.1038/nature10011</pub-id> </citation>
</ref>
<ref id="B21">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Lundgren</surname>
<given-names>T.</given-names>
</name>
</person-group> (<year>2011</year>). <article-title>A Microeconomic Model of Corporate Social Responsibility</article-title>. <source>Metroeconomica</source>. <volume>62</volume> (<issue>1</issue>), <fpage>69</fpage>&#x2013;<lpage>95</lpage>. <pub-id pub-id-type="doi">10.1111/j.1467-999x.2010.04087.x</pub-id> </citation>
</ref>
<ref id="B22">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Mallin</surname>
<given-names>C. A.</given-names>
</name>
<name>
<surname>Saadouni</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Briston</surname>
<given-names>R. J.</given-names>
</name>
</person-group> (<year>1995</year>). <article-title>The Financial Performance of Ethical Investment Funds</article-title>. <source>J.&#x20;Bus Fin Acc.</source> <volume>22</volume> (<issue>4</issue>), <fpage>483</fpage>&#x2013;<lpage>496</lpage>. <pub-id pub-id-type="doi">10.1111/j.1468-5957.1995.tb00373.x</pub-id> </citation>
</ref>
<ref id="B23">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Mani</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Moody</surname>
<given-names>J.</given-names>
</name>
</person-group> (<year>2014</year>). <article-title>Moving beyond Stylized Economic Network Models: The Hybrid World of the Indian Firm Ownership Network</article-title>. <source>Am. J.&#x20;Sociol.</source> <volume>119</volume> (<issue>6</issue>), <fpage>1629</fpage>&#x2013;<lpage>1669</lpage>. <pub-id pub-id-type="doi">10.1086/676040</pub-id> </citation>
</ref>
<ref id="B24">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Michelson</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Wailes</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Van Der Laan</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Frost</surname>
<given-names>G.</given-names>
</name>
</person-group> (<year>2004</year>). <article-title>Ethical Investment Processes and Outcomes</article-title>. <source>J.&#x20;Business Ethics</source>. <volume>52</volume> (<issue>1</issue>), <fpage>1</fpage>&#x2013;<lpage>10</lpage>. <pub-id pub-id-type="doi">10.1023/b:busi.0000033103.12560.be</pub-id> </citation>
</ref>
<ref id="B25">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Mizgier</surname>
<given-names>K. J.</given-names>
</name>
<name>
<surname>J&#xfc;ttner</surname>
<given-names>M. P.</given-names>
</name>
<name>
<surname>Wagner</surname>
<given-names>S. M.</given-names>
</name>
</person-group> (<year>2013</year>). <article-title>Bottleneck Identification in Supply Chain Networks</article-title>. <source>Int. J.&#x20;Prod. Res.</source> <volume>51</volume> (<issue>5</issue>), <fpage>1477</fpage>&#x2013;<lpage>1490</lpage>. <pub-id pub-id-type="doi">10.1080/00207543.2012.695878</pub-id> </citation>
</ref>
<ref id="B26">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Nanumyan</surname>
<given-names>V.</given-names>
</name>
<name>
<surname>Garas</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Schweitzer</surname>
<given-names>F.</given-names>
</name>
</person-group> (<year>2015</year>). <article-title>The Network of Counterparty Risk: Analysing Correlations in OTC Derivatives</article-title>. <source>PLOS ONE</source>. <volume>10</volume>, <fpage>e0136638</fpage>. <pub-id pub-id-type="doi">10.1371/journal.pone.0136638</pub-id> </citation>
</ref>
<ref id="B27">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Reagans</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>McEvily</surname>
<given-names>B.</given-names>
</name>
</person-group> (<year>2003</year>). <article-title>Network Structure and Knowledge Transfer: The Effects of Cohesion and Range</article-title>. <source>Administrative Sci. Q.</source> <volume>48</volume> (<issue>2</issue>), <fpage>240</fpage>&#x2013;<lpage>267</lpage>. <pub-id pub-id-type="doi">10.2307/3556658</pub-id> </citation>
</ref>
<ref id="B28">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Scholtes</surname>
<given-names>I.</given-names>
</name>
<name>
<surname>Wider</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Garas</surname>
<given-names>A.</given-names>
</name>
</person-group> (<year>2016</year>). <article-title>Higher-Order Aggregate Networks in the Analysis of Temporal Networks: Path Structures and Centralities</article-title>. <source>Eur. Phys. J.&#x20;B</source> <volume>89</volume> (<issue>3</issue>), <fpage>1</fpage>&#x2013;<lpage>15</lpage>. <pub-id pub-id-type="doi">10.1140/epjb/e2016-60663-0</pub-id> </citation>
</ref>
<ref id="B29">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Schweitzer</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Fagiolo</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Sornette</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Redondo</surname>
<given-names>F. V.</given-names>
</name>
<name>
<surname>White</surname>
<given-names>D. R.</given-names>
</name>
</person-group> (<year>2009</year>). <article-title>Economic Networks: What Do We Know and what Do We Need to Know?</article-title> <source>Adv. Complex Syst.</source> <volume>12</volume> (<issue>04</issue>), <fpage>407</fpage>&#x2013;<lpage>422</lpage>. <pub-id pub-id-type="doi">10.1142/s0219525909002337</pub-id> </citation>
</ref>
<ref id="B30">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Schweitzer</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Mavrodiev</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Seufert</surname>
<given-names>A. M.</given-names>
</name>
<name>
<surname>Garcia</surname>
<given-names>D.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Modeling User Reputation in Online Social Networks: The Role of Costs, Benefits, and Reciprocity</article-title>. <source>Entropy</source> <volume>22</volume> (<issue>10</issue>), <fpage>1073</fpage>. <pub-id pub-id-type="doi">10.3390/e22101073</pub-id> </citation>
</ref>
<ref id="B31">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Schweitzer</surname>
<given-names>F.</given-names>
</name>
</person-group> (<year>2019</year>). &#x201c;<article-title>The Bigger Picture: Complexity Meets Systems Design</article-title>,&#x201d; in <source>Design. Tales of Science and Innovation</source>. Editors <person-group person-group-type="editor">
<name>
<surname>Folkers</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Schmid</surname>
<given-names>M.</given-names>
</name>
</person-group> (<publisher-loc>Zurich</publisher-loc>: <publisher-name>Chronos Verlag</publisher-name>), <fpage>77</fpage>&#x2013;<lpage>86</lpage>. <isbn>978-3-0340-1525-7</isbn> </citation>
</ref>
<ref id="B32">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Sugden</surname>
<given-names>R.</given-names>
</name>
</person-group> (<year>2009</year>). <article-title>On Nudging: A Review ofNudge: Improving Decisions about Health, Wealth and Happinessby Richard H. Thaler and Cass R. Sunstein</article-title>. <source>Int. J.&#x20;Econ. Business</source>. <volume>16</volume> (<issue>3</issue>), <fpage>365</fpage>&#x2013;<lpage>373</lpage>. <pub-id pub-id-type="doi">10.1080/13571510903227064</pub-id> </citation>
</ref>
<ref id="B33">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Vaccario</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Tomasello</surname>
<given-names>M. V.</given-names>
</name>
<name>
<surname>Tessone</surname>
<given-names>C. J.</given-names>
</name>
<name>
<surname>Schweitzer</surname>
<given-names>F.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>Quantifying Knowledge Exchange in R&#x26;D Networks: a Data-Driven Model</article-title>. <source>J.&#x20;Evol. Econ.</source> <volume>28</volume> (<issue>3</issue>), <fpage>461</fpage>&#x2013;<lpage>493</lpage>. <pub-id pub-id-type="doi">10.1007/s00191-018-0569-1</pub-id> </citation>
</ref>
<ref id="B34">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Valente</surname>
<given-names>T. W.</given-names>
</name>
</person-group> (<year>2012</year>). <article-title>Network Interventions</article-title>. <source>Science</source>. <volume>337</volume> (<issue>6090</issue>), <fpage>49</fpage>&#x2013;<lpage>53</lpage>. <pub-id pub-id-type="doi">10.1126/science.1217330</pub-id> </citation>
</ref>
<ref id="B35">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Valente</surname>
<given-names>T. W.</given-names>
</name>
</person-group> (<year>2017</year>). <article-title>Putting the Network in Network Interventions</article-title>. <source>Proc. Natl. Acad. Sci. USA</source>. <volume>114</volume> (<issue>36</issue>), <fpage>9500</fpage>&#x2013;<lpage>9501</lpage>. <pub-id pub-id-type="doi">10.1073/pnas.1712473114</pub-id> </citation>
</ref>
<ref id="B36">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Vinayagam</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Gibson</surname>
<given-names>T. E.</given-names>
</name>
<name>
<surname>Lee</surname>
<given-names>H. J.</given-names>
</name>
<name>
<surname>Yilmazel</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Roesel</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Hu</surname>
<given-names>Y.</given-names>
</name>
<etal/>
</person-group> (<year>2016</year>). <article-title>Controllability Analysis of the Directed Human Protein Interaction Network Identifies Disease Genes and Drug Targets</article-title>. <source>Proc. Natl. Acad. Sci. U.S.A.</source> <volume>113</volume>, <fpage>4976</fpage>&#x2013;<lpage>4981</lpage>. <pub-id pub-id-type="doi">10.1073/pnas.1603992113</pub-id> </citation>
</ref>
<ref id="B37">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Vitali</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Glattfelder</surname>
<given-names>J.&#x20;B.</given-names>
</name>
<name>
<surname>Battiston</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2011</year>). <article-title>The Network of Global Corporate Control</article-title>. <source>PLoS ONE</source>. <volume>6</volume> (<issue>10</issue>), <fpage>e25995</fpage>. <pub-id pub-id-type="doi">10.1371/journal.pone.0025995</pub-id> </citation>
</ref>
<ref id="B38">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Gao</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Gao</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2012</year>). <article-title>Control Range: a Controllability-Based index for Node Significance in Directed Networks</article-title>. <source>J.&#x20;Stat. Mech.</source> <volume>2012</volume>, <fpage>P04011</fpage>. <pub-id pub-id-type="doi">10.1088/1742-5468/2012/04/p04011</pub-id> </citation>
</ref>
<ref id="B39">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wuchty</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2014</year>). <article-title>Controllability in Protein Interaction Networks</article-title>. <source>Proc. Natl. Acad. Sci.</source> <volume>111</volume>, <fpage>7156</fpage>&#x2013;<lpage>7160</lpage>. <pub-id pub-id-type="doi">10.1073/pnas.1311231111</pub-id> </citation>
</ref>
<ref id="B40">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Garas</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Schweitzer</surname>
<given-names>F.</given-names>
</name>
</person-group> (<year>2016</year>). <article-title>Value of Peripheral Nodes in Controlling Multilayer Scale-free Networks</article-title>. <source>Phys. Rev. E</source>. <volume>93</volume>, <fpage>012309</fpage>. <pub-id pub-id-type="doi">10.1103/PhysRevE.93.012309</pub-id> </citation>
</ref>
<ref id="B41">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Garas</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Schweitzer</surname>
<given-names>F.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Control Contribution Identifies Top Driver Nodes in Complex Networks</article-title>. <source>Adv. Complex Syst.</source> <volume>22</volume> (<issue>7&#x26;8</issue>), <fpage>1950014</fpage>. <pub-id pub-id-type="doi">10.1142/s0219525919500140</pub-id> </citation>
</ref>
<ref id="B42">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Schweitzer</surname>
<given-names>F.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>The Interdependence of Corporate Reputation and Ownership: A Network Approach to Quantify Reputation</article-title>. <source>R. Soc. Open Sci.</source> <volume>6</volume>, <fpage>190570</fpage>. <pub-id pub-id-type="doi">10.1098/rsos.190570</pub-id> </citation>
</ref>
</ref-list>
</back>
</article>