-
1
-
-
84923618755
-
The social organization of conspiracy: illegal networks in the heavy electrical equipment industry
-
Baker WE, Faulkner RR (1993) The social organization of conspiracy: illegal networks in the heavy electrical equipment industry. Am Sociol Rev 58(6): 837-860.
-
(1993)
Am Sociol Rev
, vol.58
, Issue.6
, pp. 837-860
-
-
Baker, W.E.1
Faulkner, R.R.2
-
2
-
-
84965751750
-
Designing organizational structures to cope with communication breakdowns: a simulation model
-
Carley KM (1991) Designing organizational structures to cope with communication breakdowns: a simulation model. Organization & Environment 5(1): 19-57.
-
(1991)
Organization & Environment
, vol.5
, Issue.1
, pp. 19-57
-
-
Carley, K.M.1
-
3
-
-
0010359310
-
Smart agents and organizations of the future
-
L. Lievrouw and S. Livingstone (Eds.), Thousand Oaks: Sage
-
Carley KM (2002) Smart agents and organizations of the future. In: Lievrouw L, Livingstone S (eds) The handbook of new media: social shaping and consequences of ICTs. Sage, Thousand Oaks, pp 206-220.
-
(2002)
The Handbook of New Media: Social Shaping and Consequences of ICTs
, pp. 206-220
-
-
Carley, K.M.1
-
4
-
-
84859569277
-
-
Carnegie Mellon University, School of Computer Science, Institute for Software Research, CMU-ISR-11-108
-
Carley KM, Columbus D, Bigrigg M, Kunkel F (2011a) AutoMap User's guide 2011. Carnegie Mellon University, School of Computer Science, Institute for Software Research, CMU-ISR-11-108.
-
(2011)
AutoMap User's guide 2011
-
-
Carley, K.M.1
Columbus, D.2
Bigrigg, M.3
Kunkel, F.4
-
5
-
-
34547683560
-
Toward an interoperable dynamic network analysis toolkit
-
Special Issue Cyberinfrastructure for Homeland Security
-
Carley KM, Diesner J, Reminga J, Tsvetovat M (2007) Toward an interoperable dynamic network analysis toolkit. Decis Support Syst 43(4): 1324-1347. Special Issue Cyberinfrastructure for Homeland Security.
-
(2007)
Decis Support Syst
, vol.43
, Issue.4
, pp. 1324-1347
-
-
Carley, K.M.1
Diesner, J.2
Reminga, J.3
Tsvetovat, M.4
-
6
-
-
84865437921
-
-
Paper presented at the HSCB Focus 2011: Integrating Social Science Theory and Analytic Methods for Operational Use
-
Carley KM, Lanham M, Martin M, Morgon G, Schmerl B, van Holt T, Bigrigg MW, Garlan D, Johnson J, Kunkel F (2011b) Rapid ethnographic assessment: data to model. Paper presented at the HSCB Focus 2011: Integrating Social Science Theory and Analytic Methods for Operational Use.
-
(2011)
Rapid ethnographic assessment: Data to model
-
-
Carley, K.M.1
Lanham, M.2
Martin, M.3
Morgon, G.4
Schmerl, B.5
van Holt, T.6
Bigrigg, M.W.7
Garlan, D.8
Johnson, J.9
Kunkel, F.10
-
7
-
-
84859569277
-
-
Carnegie Mellon University, School of Computer Science, Institute for Software Research, CMU-ISR-11-107
-
Carley KM, Reminga J, Storrick J, Columbus D (2011c) ORA User's guide 2011. Carnegie Mellon University, School of Computer Science, Institute for Software Research, CMU-ISR-11-107.
-
(2011)
ORA User's guide 2011
-
-
Carley, K.M.1
Reminga, J.2
Storrick, J.3
Columbus, D.4
-
9
-
-
84958640217
-
-
QI. Z. 168. 04. Ahmad Zerfaoui. Security Council Committee pursuant to resolutions 1267 (1999) and 1989
-
Committee SC QI. Z. 168. 04. Ahmad Zerfaoui. Security Council Committee pursuant to resolutions 1267 (1999) and 1989 (2011) concerning Al-Qaida and associated individuals and entities. http://www. un. org/sc/committees/1267/NSQI16804E. shtml.
-
(2011)
Concerning Al-Qaida and associated individuals and entities
-
-
Committee, S.C.1
-
10
-
-
0000319513
-
Network analysis of message content
-
Danowski JA (1993) Network analysis of message content. Prog Commun Sci 12: 198-221.
-
(1993)
Prog Commun Sci
, vol.12
, pp. 198-221
-
-
Danowski, J.A.1
-
12
-
-
31044446654
-
Revealing social structure from texts: meta-matrix text analysis as a novel method for network text analysis
-
V. K. Narayanan and D. J. Armstrong (Eds.), Harrisburg: Idea Group Publishing
-
Diesner J, Carley KM (2005) Revealing social structure from texts: meta-matrix text analysis as a novel method for network text analysis. In: Narayanan VK, Armstrong DJ (eds) Causal mapping for information systems and technology research: approaches, advances, and illustrations. Idea Group Publishing, Harrisburg, pp 81-108.
-
(2005)
Causal Mapping for Information Systems and Technology Research: Approaches, Advances, and Illustrations
, pp. 81-108
-
-
Diesner, J.1
Carley, K.M.2
-
13
-
-
47649131049
-
Conditional random fields for entity extraction and ontological text coding
-
Diesner J, Carley KM (2008) Conditional random fields for entity extraction and ontological text coding. J Comput Math Organ Theory 14: 248-262.
-
(2008)
J Comput Math Organ Theory
, vol.14
, pp. 248-262
-
-
Diesner, J.1
Carley, K.M.2
-
14
-
-
33645311516
-
Reality mining: sensing complex social systems
-
Eagle N, Pentland A (2006) Reality mining: sensing complex social systems. Pers Ubiquitous Comput 10(4): 255-268.
-
(2006)
Pers Ubiquitous Comput
, vol.10
, Issue.4
, pp. 255-268
-
-
Eagle, N.1
Pentland, A.2
-
16
-
-
33847103814
-
Rational terrorists and optimal network structure
-
Enders W, Su X (2007) Rational terrorists and optimal network structure. J Confl Resolut 51(1): 33-57.
-
(2007)
J Confl Resolut
, vol.51
, Issue.1
, pp. 33-57
-
-
Enders, W.1
Su, X.2
-
17
-
-
84925928641
-
Secret societies and social structure
-
Erickson B (1981) Secret societies and social structure. Soc Forces 60: 188-210.
-
(1981)
Soc Forces
, vol.60
, pp. 188-210
-
-
Erickson, B.1
-
18
-
-
33845632678
-
Visualizing social networks
-
Freeman L (2000) Visualizing social networks. J Soc Struct 1(1). Available: http://www. cmu. edu/joss/content/articles/volume1/Freeman. html.
-
(2000)
J Soc Struct
, vol.1
, Issue.1
-
-
Freeman, L.1
-
19
-
-
43249165040
-
Conflict and cooperation in an actors' network of Chechnya based on event data
-
Hämmerli A, Gattiker R, Weyermann R (2006) Conflict and cooperation in an actors' network of Chechnya based on event data. J Confl Resolut 50(2): 159-175.
-
(2006)
J Confl Resolut
, vol.50
, Issue.2
, pp. 159-175
-
-
Hämmerli, A.1
Gattiker, R.2
Weyermann, R.3
-
20
-
-
36549000451
-
Analytical investigative techniques: tools for complex criminal investigations
-
Howlett J (1980) Analytical investigative techniques: tools for complex criminal investigations. Police Chief 47(12): 42-45.
-
(1980)
Police Chief
, vol.47
, Issue.12
, pp. 42-45
-
-
Howlett, J.1
-
21
-
-
22944491796
-
Natural resources, conflict, and conflict resolution
-
Humphreys M (2005) Natural resources, conflict, and conflict resolution. J Confl Resolut 49(4): 508-537.
-
(2005)
J Confl Resolut
, vol.49
, Issue.4
, pp. 508-537
-
-
Humphreys, M.1
-
22
-
-
0242465495
-
The network paradigm applied to criminal organizations: theoretical nitpicking or a relevant doctrine for investigators
-
Klerks P (2001) The network paradigm applied to criminal organizations: theoretical nitpicking or a relevant doctrine for investigators. Connections 24(3): 53-65.
-
(2001)
Connections
, vol.24
, Issue.3
, pp. 53-65
-
-
Klerks, P.1
-
23
-
-
0000429141
-
Cognitive social structures
-
Krackhardt D (1987) Cognitive social structures. Soc Netw 9: 109-134.
-
(1987)
Soc Netw
, vol.9
, pp. 109-134
-
-
Krackhardt, D.1
-
25
-
-
77956088142
-
Social network and distance correlates of criminal associates involved in illicit drug production
-
Malm A, Kinney J, Pollard N (2008) Social network and distance correlates of criminal associates involved in illicit drug production. Security J 21(1-2): 77-94.
-
(2008)
Security J
, vol.21
, Issue.1-2
, pp. 77-94
-
-
Malm, A.1
Kinney, J.2
Pollard, N.3
-
26
-
-
0002687371
-
The small world problem
-
Milgram S (1967) The small world problem. Psychol Today 2(1): 60-67.
-
(1967)
Psychol Today
, vol.2
, Issue.1
, pp. 60-67
-
-
Milgram, S.1
-
28
-
-
33745799739
-
-
National Research Council CoNSfFAA, Washington: National Academies Press
-
National Research Council CoNSfFAA (2005) Network science. National Academies Press, Washington.
-
(2005)
Network Science
-
-
-
29
-
-
33845546728
-
Countering terrorism through information and privacy protection technologies
-
Popp R, Poindexter J (2006) Countering terrorism through information and privacy protection technologies. IEEE Secur Priv 4(6): 18-27.
-
(2006)
IEEE Secur Priv
, vol.4
, Issue.6
, pp. 18-27
-
-
Popp, R.1
Poindexter, J.2
-
30
-
-
0003159590
-
The diffusion of hybrid seed corn in two Iowa communities
-
Ryan B, Gross N (1943) The diffusion of hybrid seed corn in two Iowa communities. Rural Soc 8(1): 15-24.
-
(1943)
Rural Soc
, vol.8
, Issue.1
, pp. 15-24
-
-
Ryan, B.1
Gross, N.2
-
31
-
-
84865406325
-
-
Paper presented at the PRIO/Uppsala University/DECRG high-level scientific conference on identifying wars: systematic conflict research and its utility in conflict resolution and prevention, Uppsala, Sweden, 8-9 June
-
Schrodt P, Simpson E, Gerner D (2001) Monitoring conflict using automated coding of newswire reports: a comparison of five geographical regions. Paper presented at the PRIO/Uppsala University/DECRG high-level scientific conference on identifying wars: systematic conflict research and its utility in conflict resolution and prevention, Uppsala, Sweden, 8-9 June.
-
(2001)
Monitoring conflict using automated coding of newswire reports: A comparison of five geographical regions
-
-
Schrodt, P.1
Simpson, E.2
Gerner, D.3
|