-
4
-
-
32544439820
-
On the robustness of centrality measures under conditions of imperfect data
-
Borgatti SP, Carley KM, Krackhardt D (2006) On the robustness of centrality measures under conditions of imperfect data. Soc Networks 28: 124-136.
-
(2006)
Soc Networks
, vol.28
, pp. 124-136
-
-
Borgatti, S.P.1
Carley, K.M.2
Krackhardt, D.3
-
6
-
-
4043062215
-
Criminal groups and transnational markets: A more detailed examination on the basis of social network theory
-
Bruinsma GJN, Bernasco W (2004) Criminal groups and transnational markets: A more detailed examination on the basis of social network theory. Crime Law & Soc Chang 41: 79-94.
-
(2004)
Crime Law & Soc Chang
, vol.41
, pp. 79-94
-
-
Bruinsma, G.J.N.1
Bernasco, W.2
-
8
-
-
35448990973
-
The network structure of social capital
-
R. I. Sutton and B. M. Staw (Eds.), Greenwich, CT: JAI Press
-
Burt RS (2000) The network structure of social capital. In: Sutton RI, Staw BM (eds) Res in organ behavior. JAI Press, Greenwich, CT.
-
(2000)
Res in Organ Behavior
-
-
Burt, R.S.1
-
9
-
-
0013174918
-
Structural holes versus network closure capital
-
N. Lin, K. S. Cook, and R. S. Burt (Eds.), NY: Aldine de Gruyter
-
Burt RS (2001) Structural holes versus network closure capital. In: Lin N, Cook KS, Burt RS (eds) Social capital: theory and research. Aldine de Gruyter, NY.
-
(2001)
Social Capital: Theory and Research
-
-
Burt, R.S.1
-
13
-
-
27844503021
-
It's not who you know - it's what you know about people you don't know that counts
-
Chattoe E, Hamill H (2005) It's not who you know - it's what you know about people you don't know that counts. Br J of Criminol 45: 860-876.
-
(2005)
Br J of Criminol
, vol.45
, pp. 860-876
-
-
Chattoe, E.1
Hamill, H.2
-
16
-
-
0035618638
-
It's not what you know - it's who you know that counts: Analysing serious crime groups as social networks
-
Coles N (2001) It's not what you know - it's who you know that counts: Analysing serious crime groups as social networks. Br J of Criminol 41: 580-594.
-
(2001)
Br J of Criminol
, vol.41
, pp. 580-594
-
-
Coles, N.1
-
17
-
-
33745707904
-
Using multi-theoretical multi-level (MTML) models to study adversarial networks
-
R. Breiger, K. Carley, and P. Pattison (Eds.), Washington DC: The Natl Acad Press
-
Contractor NS, Monge PR (2003) Using multi-theoretical multi-level (MTML) models to study adversarial networks. In: Breiger R, Carley K, Pattison P (eds) Dynamic social network modeling and analysis: Workshop summary and papers. The Natl Acad Press, Washington DC.
-
(2003)
Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers
-
-
Contractor, N.S.1
Monge, P.R.2
-
18
-
-
84905293684
-
Two approaches to social structure: Exchange theory and network analysis
-
Cook KS, Whitmeyer JM (1992) Two approaches to social structure: Exchange theory and network analysis. Annu Rev of Sociol 18: 109-127.
-
(1992)
Annu Rev of Sociol
, vol.18
, pp. 109-127
-
-
Cook, K.S.1
Whitmeyer, J.M.2
-
19
-
-
84887775609
-
Network analysis, culture, and the problem of agency
-
Emirbayer M, Goodwin J (1994) Network analysis, culture, and the problem of agency. Am J of Sociol 99(6): 1411-1454.
-
(1994)
Am J of Sociol
, vol.99
, Issue.6
, pp. 1411-1454
-
-
Emirbayer, M.1
Goodwin, J.2
-
22
-
-
34247960076
-
The strength of weak ties
-
Granovetter M (1973) The strength of weak ties. Am J of Sociol 78: 1360-1380.
-
(1973)
Am J of Sociol
, vol.78
, pp. 1360-1380
-
-
Granovetter, M.1
-
23
-
-
0003780715
-
-
Reading, MA: Addison-Wesley
-
Harary F (1969) Graph theory. Addison-Wesley, Reading, MA.
-
(1969)
Graph Theory
-
-
Harary, F.1
-
24
-
-
0016494374
-
The application of link analysis to police intelligence
-
Harper WR, Harris DH (1975) The application of link analysis to police intelligence. Human Factors 17(2): 157-164.
-
(1975)
Human Factors
, vol.17
, Issue.2
, pp. 157-164
-
-
Harper, W.R.1
Harris, D.H.2
-
26
-
-
85048922864
-
Social behavior as exchange
-
Homans GC (1958) Social behavior as exchange. Am J of Sociol 63: 597-606.
-
(1958)
Am J of Sociol
, vol.63
, pp. 597-606
-
-
Homans, G.C.1
-
27
-
-
0036168596
-
The motivational foundation of social networks
-
Kadushin C (2002) The motivational foundation of social networks. Soc Networks 24(1): 77-91.
-
(2002)
Soc Networks
, vol.24
, Issue.1
, pp. 77-91
-
-
Kadushin, C.1
-
29
-
-
0242465495
-
The network paradigm applied to criminal organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands
-
Klerks P (2001) The network paradigm applied to criminal organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands. Connections 24(3): 53-65.
-
(2001)
Connections
, vol.24
, Issue.3
, pp. 53-65
-
-
Klerks, P.1
-
30
-
-
33748497129
-
A social network analysis of Jemaah Islamiyah: The applications to counterterrorism and intelligence
-
Koschade S (2006) A social network analysis of Jemaah Islamiyah: The applications to counterterrorism and intelligence. Stud in Confl & Terror 29: 589-605.
-
(2006)
Stud in Confl & Terror
, vol.29
, pp. 589-605
-
-
Koschade, S.1
-
31
-
-
0003296443
-
Simmelian Tie: Super Strong and Sticky
-
In: Kramer RM, Neale M (Eds), Thousand Oaks, CA: Sage
-
Krackhardt D (1998) Simmelian tie: Super strong and sticky In: Kramer RM, Neale M (eds), Power and influence in organizations. Sage, Thousand Oaks, CA.
-
(1998)
Power and Influence in Organizations
-
-
Krackhardt, D.1
-
32
-
-
0038401985
-
Mapping networks of terrorist cells
-
Krebs V (2002) Mapping networks of terrorist cells. Connections 24(3): 43-52.
-
(2002)
Connections
, vol.24
, Issue.3
, pp. 43-52
-
-
Krebs, V.1
-
34
-
-
0041648272
-
Social resources theory
-
In Borgatta EF, Borgatta ML (Eds), NY, Vol
-
Lin N (1992) Social resources theory. In Borgatta EF, Borgatta ML (eds): Encyclopedia of Sociol. NY, vol. 4: 1936-1942.
-
(1992)
Encyclopedia of Sociol
, vol.4
, pp. 1936-1942
-
-
Lin, N.1
-
37
-
-
33745640675
-
Visualizing complexity in networks: Seeing both the forest and the trees
-
McGrath C, Krackhardt D, Blythe J (2003) Visualizing complexity in networks: Seeing both the forest and the trees. Connections 25(1): 37-47.
-
(2003)
Connections
, vol.25
, Issue.1
, pp. 37-47
-
-
McGrath, C.1
Krackhardt, D.2
Blythe, J.3
-
38
-
-
0031206085
-
The effect of spatial arrangement on judgments and errors in interpreting graphs
-
McGrath C, Blythe J, Krackhardt D (1997) The effect of spatial arrangement on judgments and errors in interpreting graphs. Soc Networks 19(3): 223-242.
-
(1997)
Soc Networks
, vol.19
, Issue.3
, pp. 223-242
-
-
McGrath, C.1
Blythe, J.2
Krackhardt, D.3
-
39
-
-
0033233607
-
Organized crime: A social network approach
-
McIllwain JS (1999) Organized crime: A social network approach. Crime Law & Soc Chang 32: 301-323.
-
(1999)
Crime Law & Soc Chang
, vol.32
, pp. 301-323
-
-
McIllwain, J.S.1
-
40
-
-
33745033390
-
Use of social network analysis (SNA) in the examination of an outlaw motorcycle gang
-
McNally D, Alston J (2006) Use of social network analysis (SNA) in the examination of an outlaw motorcycle gang. J of Gang Res 13(3): 1-25.
-
(2006)
J of Gang Res
, vol.13
, Issue.3
, pp. 1-25
-
-
McNally, D.1
Alston, J.2
-
43
-
-
33750711413
-
Legitimate strengths in criminal networks
-
Morselli C, Giguère C (2006) Legitimate strengths in criminal networks. Crime Law & Soc Chang 45(3): 185-200.
-
(2006)
Crime Law & Soc Chang
, vol.45
, Issue.3
, pp. 185-200
-
-
Morselli, C.1
Giguère, C.2
-
44
-
-
34249319104
-
Law enforcement disruption of a drug importation network
-
Morselli C, Petit K (2007) Law enforcement disruption of a drug importation network. Global Crime 8(2): 109-130.
-
(2007)
Global Crime
, vol.8
, Issue.2
, pp. 109-130
-
-
Morselli, C.1
Petit, K.2
-
45
-
-
41649085854
-
Brokerage qualifications in ringing operations
-
Morselli C, Roy J (2008) Brokerage qualifications in ringing operations. Criminol 46(1): 71-98.
-
(2008)
Criminol
, vol.46
, Issue.1
, pp. 71-98
-
-
Morselli, C.1
Roy, J.2
-
46
-
-
33846275533
-
The efficiency/security trade-off in criminal networks
-
Morselli C, Giguère C, Petit K (2007) The efficiency/security trade-off in criminal networks. Soc Networks 29: 143-153.
-
(2007)
Soc Networks
, vol.29
, pp. 143-153
-
-
Morselli, C.1
Giguère, C.2
Petit, K.3
-
47
-
-
27844497886
-
Understanding the structure of a drug trafficking organization: A conversational analysis
-
Natarajan M (2000) Understanding the structure of a drug trafficking organization: A conversational analysis. Crime Prevention Stud 11: 273-298.
-
(2000)
Crime Prevention Stud
, vol.11
, pp. 273-298
-
-
Natarajan, M.1
-
48
-
-
33745987636
-
Understanding the structure of a large heroin distribution network: A quantitative analysis of qualitative data
-
Natarajan M (2006) Understanding the structure of a large heroin distribution network: A quantitative analysis of qualitative data. J of Quant Criminol 22: 171-192.
-
(2006)
J of Quant Criminol
, vol.22
, pp. 171-192
-
-
Natarajan, M.1
-
49
-
-
0032331809
-
Social capital: Its origins and applications in modern sociology
-
Portes A (1998) Social capital: Its origins and applications in modern sociology. Annu Rev of Sociol 24(1): 1-24.
-
(1998)
Annu Rev of Sociol
, vol.24
, Issue.1
, pp. 1-24
-
-
Portes, A.1
-
50
-
-
0242718155
-
From whole cloth: Making up the terrorist network
-
Rothenberg R (2002) From whole cloth: Making up the terrorist network. Connections 24(3): 36-42.
-
(2002)
Connections
, vol.24
, Issue.3
, pp. 36-42
-
-
Rothenberg, R.1
-
52
-
-
84873532912
-
Targeting criminal networks: Using social network analysis to develop enforcement and intelligence priorities
-
Schwartz DM, Rouselle DA (2008) Targeting criminal networks: Using social network analysis to develop enforcement and intelligence priorities. IALEIA J 18(1): 18-44.
-
(2008)
IALEIA J
, vol.18
, Issue.1
, pp. 18-44
-
-
Schwartz, D.M.1
Rouselle, D.A.2
-
55
-
-
34249341486
-
Network vulnerabilities and strategic intelligence in law enforcement
-
Sparrow MK (1991a) Network vulnerabilities and strategic intelligence in law enforcement. J of Intell and Counterintell 5(3): 255-274.
-
(1991)
J of Intell and Counterintell
, vol.5
, Issue.3
, pp. 255-274
-
-
Sparrow, M.K.1
-
56
-
-
0012254042
-
The application of network analysis to criminal intelligence: An assessment of the prospects
-
Sparrow MK (1991b) The application of network analysis to criminal intelligence: An assessment of the prospects. Soc Networks 13: 251-274.
-
(1991)
Soc Networks
, vol.13
, pp. 251-274
-
-
Sparrow, M.K.1
-
58
-
-
33750990189
-
On effectiveness of wiretap programs in mapping social networks
-
Tsvetovat M, Carley KM (2007) On effectiveness of wiretap programs in mapping social networks. J of Comput and Math Organ Theory 13(1): 63-87.
-
(2007)
J of Comput and Math Organ Theory
, vol.13
, Issue.1
, pp. 63-87
-
-
Tsvetovat, M.1
Carley, K.M.2
-
59
-
-
10844281465
-
Email as spectroscopy: Automated discovery of community structure within organizations
-
Tyler JR, Wilkinson DM, Huberman BA (2003) Email as spectroscopy: Automated discovery of community structure within organizations. Communities and Technol 81-96.
-
(2003)
Communities and Technol
, pp. 81-96
-
-
Tyler, J.R.1
Wilkinson, D.M.2
Huberman, B.A.3
-
62
-
-
27844472177
-
Transnational criminal networks
-
In: Arquilla J, Ronfeldt D (eds), Rand Corporation, Santa Monica
-
Williams (2001) Transnational criminal networks. In: Arquilla J, Ronfeldt D (eds) Networks and netwars: The future of terror, crime and militancy. Rand Corporation, Santa Monica.
-
(2001)
Networks and netwars: The future of terror, crime and militancy
-
-
Williams1
|