Structural Hole Theory in Social Network Analysis: A Review
Social networks now connect billions of people around the world, where individuals occupying different positions often represent different social roles and show different characteristics in their behaviors. The structural hole (SH) theory demonstrates that users occupying the bridging positions betw...
        Saved in:
      
    
          | Published in | IEEE transactions on computational social systems Vol. 9; no. 3; pp. 724 - 739 | 
|---|---|
| Main Authors | , , , , , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
        Piscataway
          IEEE
    
        01.06.2022
     The Institute of Electrical and Electronics Engineers, Inc. (IEEE)  | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 2329-924X 2373-7476  | 
| DOI | 10.1109/TCSS.2021.3070321 | 
Cover
| Abstract | Social networks now connect billions of people around the world, where individuals occupying different positions often represent different social roles and show different characteristics in their behaviors. The structural hole (SH) theory demonstrates that users occupying the bridging positions between different communities have advantages since they control the key information diffusion paths. Users of this type, known as SH spanners, are important when it comes to assimilating social network structures and user behaviors. In this article, we review the use of SHs theory in social network analysis, where SH spanners take advantage of both information and control benefits. We investigate the existing algorithms of SH spanner detection and classify them into information flow-based algorithms and network centrality-based algorithms. For practitioners, we further illustrate the applications of SH theory in various practical scenarios, including enterprise settings, information diffusion in social networks, software development, mobile applications, and machine learning (ML)-based social prediction. Our review provides a comprehensive discussion on the foundation, detection, and practical applications of SHs. The insights can facilitate researchers and service providers to better apply the theory and derive value-added tools with advanced ML techniques. To inspire follow-up research, we identify potential research trends in this area, especially on the dynamics of networks. | 
    
|---|---|
| AbstractList | Social networks now connect billions of people around the world, where individuals occupying different positions often represent different social roles and show different characteristics in their behaviors. The structural hole (SH) theory demonstrates that users occupying the bridging positions between different communities have advantages since they control the key information diffusion paths. Users of this type, known as SH spanners, are important when it comes to assimilating social network structures and user behaviors. In this article, we review the use of SHs theory in social network analysis, where SH spanners take advantage of both information and control benefits. We investigate the existing algorithms of SH spanner detection and classify them into information flow-based algorithms and network centrality-based algorithms. For practitioners, we further illustrate the applications of SH theory in various practical scenarios, including enterprise settings, information diffusion in social networks, software development, mobile applications, and machine learning (ML)-based social prediction. Our review provides a comprehensive discussion on the foundation, detection, and practical applications of SHs. The insights can facilitate researchers and service providers to better apply the theory and derive value-added tools with advanced ML techniques. To inspire follow-up research, we identify potential research trends in this area, especially on the dynamics of networks. | 
    
| Author | Gong, Qingyuan Chen, Yang Zhang, Yuwei Ding, Aaron Yi Lin, Zihang Oksanen, Atte  | 
    
| Author_xml | – sequence: 1 givenname: Zihang orcidid: 0000-0003-4262-6354 surname: Lin fullname: Lin, Zihang email: zihanglin18@fudan.edu.cn organization: School of Computer Science, Fudan University, Shanghai, China – sequence: 2 givenname: Yuwei orcidid: 0000-0003-2110-1858 surname: Zhang fullname: Zhang, Yuwei email: zhangyuwei18@fudan.edu.cn organization: School of Computer Science, Fudan University, Shanghai, China – sequence: 3 givenname: Qingyuan surname: Gong fullname: Gong, Qingyuan email: gongqingyuan@fudan.edu.cn organization: School of Computer Science, Fudan University, Shanghai, China – sequence: 4 givenname: Yang orcidid: 0000-0003-4749-3060 surname: Chen fullname: Chen, Yang email: chenyang@fudan.edu.cn organization: School of Computer Science, Fudan University, Shanghai, China – sequence: 5 givenname: Atte orcidid: 0000-0003-4143-5580 surname: Oksanen fullname: Oksanen, Atte email: atte.oksanen@tuni.fi organization: Faculty of Social Sciences, Tampere University, Tampere, Finland – sequence: 6 givenname: Aaron Yi orcidid: 0000-0003-4173-031X surname: Ding fullname: Ding, Aaron Yi email: aaron.ding@tudelft.nl organization: Department of Engineering Systems and Services, TU Delft, Delft, The Netherlands  | 
    
| BookMark | eNp9kE1LAzEQhoNUsNb-APGy4Hnr5GOTjZ5KUSsUBbeCt5DGLKaum5rsWvrv3aXFgwdPMwzvMzM8p2hQ-9oidI5hgjHIq-WsKCYECJ5QEEAJPkJDQgVNBRN80PdEppKw1xM0jnENAJhkmSAwRDdFE1rTtEFXydxXNlm-Wx92iauTwhvXTR9ts_XhI5nWutpFF6-TafJsv53dnqHjUlfRjg91hF7ubpezebp4un-YTRepIZI2KdZAeUlXkmSUMyNzLYWR2Zu1qyzLV1xrEMQSYKXBDHPGabkS2AqRG5HnnNIRutzv3QT_1drYqLVvQ_dOVIQLIJCzDLoU3qdM8DEGW6pNcJ867BQG1WtSvSbVa1IHTR0j_jDGNbpxvm6CdtW_5MWedNba30uSAccyoz9FMHR9 | 
    
| CODEN | ITCSGL | 
    
| CitedBy_id | crossref_primary_10_4018_IRMJ_349977 crossref_primary_10_1016_j_inffus_2024_102797 crossref_primary_10_1080_23742917_2024_2400729 crossref_primary_10_1007_s13132_023_01219_7 crossref_primary_10_23919_JSC_2022_0018 crossref_primary_10_1016_j_patter_2023_100839 crossref_primary_10_1186_s12961_025_01303_1 crossref_primary_10_1111_exsy_13451 crossref_primary_10_1016_j_knosys_2024_111929 crossref_primary_10_1186_s12906_024_04564_5 crossref_primary_10_1109_ACCESS_2023_3345219 crossref_primary_10_1109_TEM_2023_3295813 crossref_primary_10_1049_2024_8846233 crossref_primary_10_1080_09537325_2023_2269267 crossref_primary_10_1109_TKDE_2021_3091503 crossref_primary_10_3390_jmse11081585 crossref_primary_10_3390_e26040315 crossref_primary_10_3390_sym15010211 crossref_primary_10_1016_j_eswa_2024_124513 crossref_primary_10_1016_j_heliyon_2023_e13192 crossref_primary_10_1142_S0129183124502322 crossref_primary_10_1155_2022_2036370 crossref_primary_10_1080_15256480_2024_2443440 crossref_primary_10_1016_j_ssci_2024_106766 crossref_primary_10_1177_20539517241270714 crossref_primary_10_3390_agriculture14050649 crossref_primary_10_1016_j_conbuildmat_2024_139647 crossref_primary_10_1016_j_heliyon_2024_e33966 crossref_primary_10_3390_agriculture14050683 crossref_primary_10_1007_s10479_024_06119_w crossref_primary_10_1109_ACCESS_2023_3287214 crossref_primary_10_1007_s00607_022_01125_x crossref_primary_10_1016_j_heliyon_2024_e36658 crossref_primary_10_1109_ACCESS_2023_3281412  | 
    
| Cites_doi | 10.1002/job.1994 10.1146/annurev-psych-113011-143828 10.2307/1914185 10.1086/667856 10.1016/S0378-8733(97)00005-1 10.1016/j.socnet.2020.07.009 10.1007/978-3-030-01129-1_29 10.1145/2187836.2187907 10.1109/TEM.2020.2972347 10.1137/0201010 10.1016/j.knosys.2016.07.007 10.5465/amd.2015.0108 10.1086/225469 10.1016/j.physa.2020.124944 10.1109/MC.2016.166 10.1007/s00026-005-0237-z 10.1145/2806416.2806468 10.1086/421787 10.1145/2488388.2488461 10.1007/s11628-013-0184-z 10.1609/aaai.v30i1.10003 10.1145/1368088.1368161 10.1016/j.socnet.2009.11.002 10.4159/9780674029095 10.1145/2124295.2124382 10.1109/ASONAM.2018.8508292 10.1186/s40649-020-00079-4 10.1145/3086695 10.1016/j.knosys.2020.105916 10.1145/3342280.3342319 10.1016/j.techsoc.2014.08.001 10.1145/1386790.1386835 10.1109/TKDE.2015.2453956 10.1007/s00168-008-0245-8 10.1016/j.ins.2019.07.072 10.1146/annurev-soc-081309-150054 10.1145/2746230 10.1016/j.socnet.2015.04.008 10.1109/ICC.2019.8761301 10.1016/j.comnet.2020.107336 10.1609/aaai.v32i1.11257 10.1145/2806416.2806431 10.1109/TKDE.2015.2477304 10.1016/j.ijintrel.2010.08.001 10.1109/ACCESS.2017.2758353 10.1109/ICDM.2011.48 10.1145/3341161.3342881 10.1145/956755.956769 10.1145/2441776.2441781 10.1109/TKDE.2017.2651825 10.1109/TNN.2008.2005605 10.24963/ijcai.2018/288 10.1080/00207540701224582 10.1137/1.9781611975321.37 10.1145/2939672.2939807 10.1145/2795235 10.1109/ICME.2018.8486450 10.1007/978-3-030-18576-3_31 10.1016/j.chb.2016.08.021 10.1109/ICDM.2019.00082  | 
    
| ContentType | Journal Article | 
    
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 | 
    
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 | 
    
| DBID | 97E RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D  | 
    
| DOI | 10.1109/TCSS.2021.3070321 | 
    
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts  Academic Computer and Information Systems Abstracts Professional  | 
    
| DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional  | 
    
| DatabaseTitleList | Computer and Information Systems Abstracts  | 
    
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Social Sciences (General) | 
    
| EISSN | 2373-7476 | 
    
| EndPage | 739 | 
    
| ExternalDocumentID | 10_1109_TCSS_2021_3070321 9406195  | 
    
| Genre | orig-research | 
    
| GrantInformation_xml | – fundername: TU Delft Safety & Security Institute – fundername: iSafe project – fundername: “PCL Future Greater-Bay Area Network Facilities for Large-Scale Experiments and Applications” grantid: LZC0019 – fundername: National Natural Science Foundation of China grantid: 62072115; 71731004; 61602122 funderid: 10.13039/501100001809  | 
    
| GroupedDBID | 0R~ 4.4 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD IFIPE IPLJI JAVBF M43 OCL PQQKQ RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D  | 
    
| ID | FETCH-LOGICAL-c293t-1a036f3b925364c98a97c95deeb558b6aa072e204fc1416463fb71e778c788633 | 
    
| IEDL.DBID | RIE | 
    
| ISSN | 2329-924X | 
    
| IngestDate | Mon Jun 30 05:25:07 EDT 2025 Thu Apr 24 22:58:43 EDT 2025 Tue Oct 07 10:03:08 EDT 2025 Wed Aug 27 02:36:16 EDT 2025  | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| Issue | 3 | 
    
| Language | English | 
    
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037  | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-c293t-1a036f3b925364c98a97c95deeb558b6aa072e204fc1416463fb71e778c788633 | 
    
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14  | 
    
| ORCID | 0000-0003-4143-5580 0000-0003-4262-6354 0000-0003-4749-3060 0000-0003-2110-1858 0000-0003-4173-031X  | 
    
| PQID | 2670208450 | 
    
| PQPubID | 2040411 | 
    
| PageCount | 16 | 
    
| ParticipantIDs | crossref_primary_10_1109_TCSS_2021_3070321 crossref_citationtrail_10_1109_TCSS_2021_3070321 proquest_journals_2670208450 ieee_primary_9406195  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2022-06-01 | 
    
| PublicationDateYYYYMMDD | 2022-06-01 | 
    
| PublicationDate_xml | – month: 06 year: 2022 text: 2022-06-01 day: 01  | 
    
| PublicationDecade | 2020 | 
    
| PublicationPlace | Piscataway | 
    
| PublicationPlace_xml | – name: Piscataway | 
    
| PublicationTitle | IEEE transactions on computational social systems | 
    
| PublicationTitleAbbrev | TCSS | 
    
| PublicationYear | 2022 | 
    
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE)  | 
    
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)  | 
    
| References | ref13 ref57 ref12 ref56 ref15 ref59 ref14 ref58 ref53 ref52 ref11 ref55 ref10 ref54 ref17 ref16 ref19 ref18 ref51 ref50 Krebs (ref2) 2002; 24 ref46 ref45 ref48 ref47 ref42 ref41 ref44 ref43 ref49 ref8 ref7 ref9 ref4 ref3 ref6 ref5 Borgatti (ref32) 1998; 21 ref40 Katz (ref30) 1955 ref35 ref34 ref37 ref36 ref31 ref33 ref1 ref39 ref38 Stovel (ref29) 2012; 38 ref24 ref23 ref26 ref25 ref20 ref63 ref22 ref21 ref28 ref27 ref60 ref62 ref61  | 
    
| References_xml | – ident: ref18 doi: 10.1002/job.1994 – ident: ref27 doi: 10.1146/annurev-psych-113011-143828 – volume-title: Personal Influence, The Part Played by People in the Flow of Mass Communications year: 1955 ident: ref30 – ident: ref62 doi: 10.2307/1914185 – ident: ref42 doi: 10.1086/667856 – ident: ref60 doi: 10.1016/S0378-8733(97)00005-1 – ident: ref3 doi: 10.1016/j.socnet.2020.07.009 – ident: ref52 doi: 10.1007/978-3-030-01129-1_29 – ident: ref36 doi: 10.1145/2187836.2187907 – ident: ref19 doi: 10.1109/TEM.2020.2972347 – ident: ref43 doi: 10.1137/0201010 – volume: 21 start-page: 27 issue: 2 year: 1998 ident: ref32 article-title: Network measures of social capital publication-title: Connections – ident: ref44 doi: 10.1016/j.knosys.2016.07.007 – ident: ref15 doi: 10.5465/amd.2015.0108 – ident: ref8 doi: 10.1086/225469 – ident: ref54 doi: 10.1016/j.physa.2020.124944 – ident: ref23 doi: 10.1109/MC.2016.166 – ident: ref41 doi: 10.1007/s00026-005-0237-z – ident: ref11 doi: 10.1145/2806416.2806468 – ident: ref28 doi: 10.1086/421787 – ident: ref7 doi: 10.1145/2488388.2488461 – ident: ref26 doi: 10.1007/s11628-013-0184-z – ident: ref22 doi: 10.1609/aaai.v30i1.10003 – ident: ref25 doi: 10.1145/1368088.1368161 – ident: ref48 doi: 10.1016/j.socnet.2009.11.002 – ident: ref6 doi: 10.4159/9780674029095 – ident: ref39 doi: 10.1145/2124295.2124382 – ident: ref50 doi: 10.1109/ASONAM.2018.8508292 – ident: ref45 doi: 10.1186/s40649-020-00079-4 – ident: ref57 doi: 10.1145/3086695 – ident: ref35 doi: 10.1016/j.knosys.2020.105916 – ident: ref61 doi: 10.1145/3342280.3342319 – ident: ref4 doi: 10.1016/j.techsoc.2014.08.001 – ident: ref37 doi: 10.1145/1386790.1386835 – ident: ref14 doi: 10.1109/TKDE.2015.2453956 – ident: ref20 doi: 10.1007/s00168-008-0245-8 – ident: ref9 doi: 10.1016/j.ins.2019.07.072 – volume: 38 start-page: 139 year: 2012 ident: ref29 article-title: Brokerage publication-title: Annu. Rev. Sociol. doi: 10.1146/annurev-soc-081309-150054 – ident: ref58 doi: 10.1145/2746230 – ident: ref31 doi: 10.1016/j.socnet.2015.04.008 – ident: ref59 doi: 10.1109/ICC.2019.8761301 – ident: ref55 doi: 10.1016/j.comnet.2020.107336 – ident: ref47 doi: 10.1609/aaai.v32i1.11257 – ident: ref12 doi: 10.1145/2806416.2806431 – ident: ref56 doi: 10.1109/TKDE.2015.2477304 – ident: ref1 doi: 10.1016/j.ijintrel.2010.08.001 – ident: ref21 doi: 10.1109/ACCESS.2017.2758353 – ident: ref38 doi: 10.1109/ICDM.2011.48 – ident: ref51 doi: 10.1145/3341161.3342881 – volume: 24 start-page: 43 issue: 3 year: 2002 ident: ref2 article-title: Mapping networks of terrorist cells publication-title: Connections – ident: ref40 doi: 10.1145/956755.956769 – ident: ref49 doi: 10.1145/2441776.2441781 – ident: ref13 doi: 10.1109/TKDE.2017.2651825 – ident: ref63 doi: 10.1109/TNN.2008.2005605 – ident: ref46 doi: 10.24963/ijcai.2018/288 – ident: ref5 doi: 10.1080/00207540701224582 – ident: ref34 doi: 10.1137/1.9781611975321.37 – ident: ref10 doi: 10.1145/2939672.2939807 – ident: ref24 doi: 10.1145/2795235 – ident: ref53 doi: 10.1109/ICME.2018.8486450 – ident: ref33 doi: 10.1007/978-3-030-18576-3_31 – ident: ref17 doi: 10.1016/j.chb.2016.08.021 – ident: ref16 doi: 10.1109/ICDM.2019.00082  | 
    
| SSID | ssj0001255720 | 
    
| Score | 2.4552345 | 
    
| SecondaryResourceType | review_article | 
    
| Snippet | Social networks now connect billions of people around the world, where individuals occupying different positions often represent different social roles and... | 
    
| SourceID | proquest crossref ieee  | 
    
| SourceType | Aggregation Database Enrichment Source Index Database Publisher  | 
    
| StartPage | 724 | 
    
| SubjectTerms | Algorithms Applications Applications programs Bridges Classification algorithms Heuristic algorithms Information dissemination Information flow Machine learning machine learning (ML) Measurement Mobile applications Mobile computing Network analysis Social network analysis Social networking (online) Social networks Software Software development structural hole (SH) theory User behavior  | 
    
| Title | Structural Hole Theory in Social Network Analysis: A Review | 
    
| URI | https://ieeexplore.ieee.org/document/9406195 https://www.proquest.com/docview/2670208450  | 
    
| Volume | 9 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 2373-7476 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001255720 issn: 2329-924X databaseCode: RIE dateStart: 20140101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFH_Mnbz4NcXplBw8qNitaZqm0dMYjiHMyxzsVpL0FUTZhG0X_3qbNB1-Id56yIPw3kvf9-8BXDAjVRojDbD0loM4yXWgUeQBkywXQqOSbmnf-DEZTeOHGZ814GYzC4OIrvkMu_bT1fLzhVnbVFlPWusj-RZsiTSpZrU-5VM4F1FduKSh7D0NJpMyAIxo1-l1RL-YHrdL5ccP2FmV4S6M6_tUzSQv3fVKd837N6jG_154D3a8e0n6lT7sQwPnB9CuZnCJf8dLcunBpq9acDdxALIWfIOMFq9IqmF98jwnnuqxahQnNXzJLemTqqJwCNPh_dNgFPiFCoEprfoqoKq0VwXTMuIsiY1MlRRG8hxRc57qRKlQRBiFcWFobIHHWKEFRSFSU0bKCWNH0Jwv5ngMhCkjqYkVF6wM8BRTecFliEVSUFFQnrYhrHmdGY82bpdevGYu6ghlZsWTWfFkXjxtuN6QvFVQG38dbll2bw56TrehUws0849xmUWJsKtIYx6e_E51CtuRnWpwyZUONEvG41npa6z0uVOyD2ybzwQ | 
    
| linkProvider | IEEE | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED7xGGDhjShPDwyASIljO45hQghUHu3SIrFFtnOREKhFoiz8emLHqXgJsWXwSdbdOff-DmCfWaUzjjTCyluOeFqYyKAsIqZYIaVBrfzSvm4v7dzzmwfxMAXHk1kYRPTNZ9h2n76WX4zsm0uVnShnfZSYhlnBORf1tNanjIoQMmlKlzRWJ4OLfr8KARPa9pqd0C_Gx29T-fEL9nblahG6zY3qdpKn9tvYtO37N7DG_155CRaCg0nOa41YhikcrkCrnsIl4SW_koMAN324Cmd9DyHr4DdIZ_SMpB7XJ49DEqh6das4aQBMTsk5qWsKa3B_dTm46ERhpUJkK7s-jqiuLFbJjEoES7lVmVbSKlEgGiEyk2odywSTmJeWcgc9xkojKUqZ2SpWThlbh5nhaIgbQJi2ilquhWRViKeZLkqhYizTksqSiqwFccPr3Aa8cbf24jn3cUesciee3IknD-JpwdGE5KUG2_jr8Kpj9-Rg4HQLthuB5uE5vuZJKt0yUi7izd-p9mCuM-je5XfXvdstmE_cjINPtWzDTCUE3Kk8j7HZ9Qr3AXCu0lE | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Structural+Hole+Theory+in+Social+Network+Analysis%3A+A+Review&rft.jtitle=IEEE+transactions+on+computational+social+systems&rft.au=Lin%2C+Zihang&rft.au=Zhang%2C+Yuwei&rft.au=Gong%2C+Qingyuan&rft.au=Chen%2C+Yang&rft.date=2022-06-01&rft.pub=IEEE&rft.eissn=2373-7476&rft.volume=9&rft.issue=3&rft.spage=724&rft.epage=739&rft_id=info:doi/10.1109%2FTCSS.2021.3070321&rft.externalDocID=9406195 | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2329-924X&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2329-924X&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2329-924X&client=summon |