'Six Degrees of Immunization' Strategy Proposed

Join Our Community of Science Lovers!


On supporting science journalism

If you're enjoying this article, consider supporting our award-winning journalism by subscribing. By purchasing a subscription you are helping to ensure the future of impactful stories about the discoveries and ideas shaping our world today.


In the game Six Degrees of Kevin Bacon, the actor is linked to other actors both living and dead through film appearances; most performers can be associated with Bacon in just three steps. The pastime highlights a defining characteristic of social networks: whereas most people have a few links to other people in the network, some individuals, such as Bacon, possess a large number of links. A report published in the December 12 issue of Physical Review Letters describes a vaccination strategy that exploits this phenomenon.

Reuven Cohen of Bar-Ilan University in Israel and his colleagues note that random immunization programs require that a large fraction of the population, typically 80 to 90 percent, be protected in order to stop the spread of disease. Alternatively, if enough information about the network and its connections is known, targeted immunization of the most highly connected individuals--so-called super-spreaders, who have the potential to infect a high number of people--can be effective. Unfortunately, such information is difficult to acquire. The researchers instead propose a tactic known as acquaintance immunization. In it, a percentage of the population is selected at random and asked to identify a friend. Those friends, in turn, are vaccinated. According to the team's calculations, because super-spreaders know so many people, there is a high probability that they will be named at least once. As a result, immunization of a much smaller fraction of the population can successfully halt disease transmission. In addition, the authors note that their approach "can be used even before the epidemic starts spreading, since it does not require any knowledge of the chain of infection."

The new approach could be helpful in regions in the developing world where there aren't enough vaccines to treat the entire population. In addition, Cohen and his colleagues note that the technique is relevant to other types of networks, including terrorist ones. "For terrorist networks," they write, "our findings suggest that an efficient way to disintegrate the network is to focus more on removing individuals whose name is obtained from another member of the network."

It’s Time to Stand Up for Science

If you enjoyed this article, I’d like to ask for your support. Scientific American has served as an advocate for science and industry for 180 years, and right now may be the most critical moment in that two-century history.

I’ve been a Scientific American subscriber since I was 12 years old, and it helped shape the way I look at the world. SciAm always educates and delights me, and inspires a sense of awe for our vast, beautiful universe. I hope it does that for you, too.

If you subscribe to Scientific American, you help ensure that our coverage is centered on meaningful research and discovery; that we have the resources to report on the decisions that threaten labs across the U.S.; and that we support both budding and working scientists at a time when the value of science itself too often goes unrecognized.

In return, you get essential news, captivating podcasts, brilliant infographics, can't-miss newsletters, must-watch videos, challenging games, and the science world's best writing and reporting. You can even gift someone a subscription.

There has never been a more important time for us to stand up and show why science matters. I hope you’ll support us in that mission.

Thank you,

David M. Ewalt, Editor in Chief, Scientific American

Subscribe