-
3
-
-
84923618755
-
The social organisation of conspiracy: illegal networks in the heavy electric equipment industry
-
Baker W., Faulkner R. The social organisation of conspiracy: illegal networks in the heavy electric equipment industry. American Sociological Review 1993, 58(6):837-860.
-
(1993)
American Sociological Review
, vol.58
, Issue.6
, pp. 837-860
-
-
Baker, W.1
Faulkner, R.2
-
4
-
-
0040432531
-
Networks and political process
-
Manchester University Press, Manchester, J.-C. Mitchell (Ed.)
-
Barnes J. Networks and political process. Social Networks in Urban Situations 1971, 51-74. Manchester University Press, Manchester. J.-C. Mitchell (Ed.).
-
(1971)
Social Networks in Urban Situations
, pp. 51-74
-
-
Barnes, J.1
-
5
-
-
0038024282
-
Leaderless resistance
-
Beam L. Leaderless resistance. The Seditionist 1992, 12. http://www.louisbeam.com/leaderless.htm.
-
(1992)
The Seditionist
, vol.12
-
-
Beam, L.1
-
6
-
-
77957784343
-
An examination of suffragette violence
-
Bearman C. An examination of suffragette violence. English Historical Review 2005, CXX(486):365-397.
-
(2005)
English Historical Review
, vol.120
, Issue.486
, pp. 365-397
-
-
Bearman, C.1
-
7
-
-
84872372976
-
Confronting the suffragette mythology
-
February
-
Bearman C. Confronting the suffragette mythology. BBC History Magazine 2007, February:16-18.
-
(2007)
BBC History Magazine
, pp. 16-18
-
-
Bearman, C.1
-
8
-
-
36148930249
-
An army without discipline
-
Bearman C. An army without discipline. The Historical Journal 2007, 50(4):861-889.
-
(2007)
The Historical Journal
, vol.50
, Issue.4
, pp. 861-889
-
-
Bearman, C.1
-
9
-
-
33646505420
-
-
Analytic Technologies, Harvard, MA
-
Borgatti S.P., Everett M.G., Freeman L.C. Ucinet for Windows 2002, Analytic Technologies, Harvard, MA.
-
(2002)
Ucinet for Windows
-
-
Borgatti, S.P.1
Everett, M.G.2
Freeman, L.C.3
-
11
-
-
84934454255
-
Free riders and zealots: the role of social networks
-
Coleman J. Free riders and zealots: the role of social networks. Sociological Theory 1988, 6(1):52-57.
-
(1988)
Sociological Theory
, vol.6
, Issue.1
, pp. 52-57
-
-
Coleman, J.1
-
14
-
-
34247675826
-
Police, prisons and prisoners: the view from the home office
-
Crawford E. Police, prisons and prisoners: the view from the home office. Women's History Review 2005, 14(3 and 4):487-506.
-
(2005)
Women's History Review
, vol.14
, Issue.3-4
, pp. 487-506
-
-
Crawford, E.1
-
16
-
-
85044884499
-
Social networks and extra-parliamentary politics
-
Crossley N. Social networks and extra-parliamentary politics. Sociology Compass 2007, 1(1):222-236.
-
(2007)
Sociology Compass
, vol.1
, Issue.1
, pp. 222-236
-
-
Crossley, N.1
-
18
-
-
84872374988
-
Infectious innovations? The diffusion of tactical innovation in social movement networks, the case of suffragette militancy
-
forthcoming.
-
Edwards, G. Infectious innovations? The diffusion of tactical innovation in social movement networks, the case of suffragette militancy. Social Movement Studies, forthcoming.
-
Social Movement Studies
-
-
Edwards, G.1
-
19
-
-
70749139346
-
Measures and meanings: exploring the ego-net of Helen Kirkpatrick Watts, militant suffragette
-
Edwards G., Crossley N. Measures and meanings: exploring the ego-net of Helen Kirkpatrick Watts, militant suffragette. Methodological Innovations On-Line 2009, 4:37-61.
-
(2009)
Methodological Innovations On-Line
, vol.4
, pp. 37-61
-
-
Edwards, G.1
Crossley, N.2
-
20
-
-
33847103814
-
Rational terrorists and optimal network structure
-
Enders W., Su X. Rational terrorists and optimal network structure. The Journal of Conflict Resolution 2007, 51(1):33-57.
-
(2007)
The Journal of Conflict Resolution
, vol.51
, Issue.1
, pp. 33-57
-
-
Enders, W.1
Su, X.2
-
21
-
-
84925928641
-
Secret societies and social structure
-
Erikson B. Secret societies and social structure. Social Forces 1981, 60(1):188-210.
-
(1981)
Social Forces
, vol.60
, Issue.1
, pp. 188-210
-
-
Erikson, B.1
-
22
-
-
84925930275
-
The focused organisation of social ties
-
Feld S. The focused organisation of social ties. American Journal of Sociology 1981, 86:1015-1035.
-
(1981)
American Journal of Sociology
, vol.86
, pp. 1015-1035
-
-
Feld, S.1
-
23
-
-
84862026231
-
Social structural determinants of similarity among associates
-
Feld S. Social structural determinants of similarity among associates. American Sociological Review 1982, 47:797-801.
-
(1982)
American Sociological Review
, vol.47
, pp. 797-801
-
-
Feld, S.1
-
24
-
-
84933487124
-
Why did suffragettes attack works of art?
-
Fowler R. Why did suffragettes attack works of art?. Journal of Women's History 1991, 2(3):109-124.
-
(1991)
Journal of Women's History
, vol.2
, Issue.3
, pp. 109-124
-
-
Fowler, R.1
-
25
-
-
7644231652
-
Leaderless resistance today
-
Garfinkel S. Leaderless resistance today. First Monday 2003, 8(3). http://firstmoday.org/.
-
(2003)
First Monday
, vol.8
, Issue.3
-
-
Garfinkel, S.1
-
27
-
-
0004136986
-
-
University of Pennsylvania Press, Philadelphia
-
Goffman E. Strategic Interaction 1969, University of Pennsylvania Press, Philadelphia.
-
(1969)
Strategic Interaction
-
-
Goffman, E.1
-
29
-
-
0000917844
-
The strength of weak ties revisited
-
Granovetter M. The strength of weak ties revisited. Sociological Theory 1983, 1:201-233.
-
(1983)
Sociological Theory
, vol.1
, pp. 201-233
-
-
Granovetter, M.1
-
30
-
-
1942418195
-
-
Hodder and Stougton, London
-
Harnden T. Bandit Country 1998, Hodder and Stougton, London.
-
(1998)
Bandit Country
-
-
Harnden, T.1
-
31
-
-
1942418195
-
-
Hodder and Stroughton, London
-
Harnden T. Bandit Country 1999, Hodder and Stroughton, London.
-
(1999)
Bandit Country
-
-
Harnden, T.1
-
32
-
-
0346808559
-
-
Cambridge University Press, Cambridge
-
Holton S. Feminism and Democracy 1988, Cambridge University Press, Cambridge.
-
(1988)
Feminism and Democracy
-
-
Holton, S.1
-
33
-
-
84872403048
-
-
Home Office, Suffragettes, Index of Names of Persons Arrested, 1906-1914, National Archives, Reference: HO45/24665/253239.
-
Home Office, 1922. Suffragettes, Index of Names of Persons Arrested, 1906-1914, National Archives, Reference: HO45/24665/253239.
-
(1922)
-
-
-
34
-
-
0001594260
-
Resource mobilisation theory and the study of social movements
-
Jenkins C. Resource mobilisation theory and the study of social movements. Annual Review of Sociology 1983, 9:527-553.
-
(1983)
Annual Review of Sociology
, vol.9
, pp. 527-553
-
-
Jenkins, C.1
-
36
-
-
0242465495
-
The network paradigm applied to criminal organisations
-
Klerks P. The network paradigm applied to criminal organisations. Connections 2001, 24(3):53-65.
-
(2001)
Connections
, vol.24
, Issue.3
, pp. 53-65
-
-
Klerks, P.1
-
37
-
-
33748497129
-
A social network analysis of Jemaah Islamiyah
-
Koschade S. A social network analysis of Jemaah Islamiyah. Studies in Conflict and Terrorism 2006, 29:559-575.
-
(2006)
Studies in Conflict and Terrorism
, vol.29
, pp. 559-575
-
-
Koschade, S.1
-
38
-
-
0038401985
-
Mapping networks of terrorist cells
-
Krebs V. Mapping networks of terrorist cells. Connections 2001, 24(3):43-52.
-
(2001)
Connections
, vol.24
, Issue.3
, pp. 43-52
-
-
Krebs, V.1
-
39
-
-
7644224668
-
Uncloaking terrorist networks
-
(accessed 22.06.09)
-
Krebs V. Uncloaking terrorist networks. First Monday 2002, 4(1). (accessed 22.06.09). http://131.193.153.231/www/issues/issue7_4/krebs/index.html.
-
(2002)
First Monday
, vol.4
, Issue.1
-
-
Krebs, V.1
-
40
-
-
62549142647
-
The influence of secrecy on the communication structure of covert networks
-
Lindelauf R., Borm P., Hamers H. The influence of secrecy on the communication structure of covert networks. Social Networks 2009, 31:126-137.
-
(2009)
Social Networks
, vol.31
, pp. 126-137
-
-
Lindelauf, R.1
Borm, P.2
Hamers, H.3
-
45
-
-
33846275533
-
The efficiency/security trade-off in criminal networks
-
Morselli C., Giguère C., Petit K. The efficiency/security trade-off in criminal networks. Social Networks 2007, 29:143-153.
-
(2007)
Social Networks
, vol.29
, pp. 143-153
-
-
Morselli, C.1
Giguère, C.2
Petit, K.3
-
47
-
-
84937299982
-
The prison experiences of the suffragettes in Edwardian Britain
-
Purvis J. The prison experiences of the suffragettes in Edwardian Britain. Women's History Review 1995, 4(1):103-133.
-
(1995)
Women's History Review
, vol.4
, Issue.1
, pp. 103-133
-
-
Purvis, J.1
-
48
-
-
84872383196
-
Deeds not words
-
Routledge, London, J. Purvis, S. Holton (Eds.)
-
Purvis J. Deeds not words. Votes for Women 2000, 135-158. Routledge, London. J. Purvis, S. Holton (Eds.).
-
(2000)
Votes for Women
, pp. 135-158
-
-
Purvis, J.1
-
51
-
-
0002065913
-
-
Victorian (and Modern) History Bookclub, Newton Abbott
-
Raeburn A. The Militant Suffragettes 1973, Victorian (and Modern) History Bookclub, Newton Abbott.
-
(1973)
The Militant Suffragettes
-
-
Raeburn, A.1
-
52
-
-
84872388929
-
Weakness and strengths of terrorist networks: The Madrid March 11 Attacks
-
Paper presented at the Annual Meeting of the American Sociological Association. Available at
-
Rodriguez, J., 2009. Weakness and strengths of terrorist networks: The Madrid March 11 Attacks. Paper presented at the Annual Meeting of the American Sociological Association. Available at http://www.allacademic.com/meta/p243052_index.html.
-
(2009)
-
-
Rodriguez, J.1
-
53
-
-
5844281188
-
-
Routledge and Kegan Paul, London
-
Rosen A. Rise Up Women! 1974, Routledge and Kegan Paul, London.
-
(1974)
Rise Up Women!
-
-
Rosen, A.1
-
54
-
-
84936628774
-
Social movements and network analysis
-
Rosenthal N., Fingritd M., Ethier M., Karant R., McDonald D. Social movements and network analysis. American Journal of Sociology 1985, 90:1022-1054.
-
(1985)
American Journal of Sociology
, vol.90
, pp. 1022-1054
-
-
Rosenthal, N.1
Fingritd, M.2
Ethier, M.3
Karant, R.4
McDonald, D.5
-
56
-
-
84904455188
-
-
University of Pennsylvania Press, Philadelphia
-
Sageman M. Leaderless Jihad 2008, University of Pennsylvania Press, Philadelphia.
-
(2008)
Leaderless Jihad
-
-
Sageman, M.1
-
57
-
-
0003263480
-
The sociology of secrecy and secret societies
-
Simmel G. The sociology of secrecy and secret societies. American Journal of Sociology 1906, 11(4):441-498.
-
(1906)
American Journal of Sociology
, vol.11
, Issue.4
, pp. 441-498
-
-
Simmel, G.1
-
59
-
-
0012254042
-
The application of network analysis to criminal intelligence
-
Sparrow M. The application of network analysis to criminal intelligence. Social Networks 1991, 13:251-274.
-
(1991)
Social Networks
, vol.13
, pp. 251-274
-
-
Sparrow, M.1
-
61
-
-
84872384649
-
Covert social movement networks in context: exploring change in the inner circle of the Provisional Irish Republican Army
-
forthcoming.
-
Stevenson, R., Crossley, N. Covert social movement networks in context: exploring change in the inner circle of the Provisional Irish Republican Army. Social Movement Studies, forthcoming.
-
Social Movement Studies
-
-
Stevenson, R.1
Crossley, N.2
-
62
-
-
47249120329
-
Networks, terrorists and criminals
-
Stohl M. Networks, terrorists and criminals. Crime, Law and Social Change 2008, 50:59-72.
-
(2008)
Crime, Law and Social Change
, vol.50
, pp. 59-72
-
-
Stohl, M.1
-
63
-
-
85044913143
-
Structural Knowledge and Success of Anti-Terrorist Activity
-
Tsvetovat M., Carley M. Structural Knowledge and Success of Anti-Terrorist Activity. Journal of Social Structure 2005, 6(2).
-
(2005)
Journal of Social Structure
, vol.6
, Issue.2
-
-
Tsvetovat, M.1
Carley, M.2
|