Dynamics and disruption: Structural and individual changes in two Dutch Jihadi networks after police interventions

Longitudinal studies of criminal networks are rare yet necessary to assess the adaptation and recovery of criminal networks after disruptions. We study the structural and individual effects of law enforcement disruption on criminal networks using longitudinal data on two Dutch jihadi networks (n1 = ...

Full description

Saved in:
Bibliographic Details
Published inSocial networks Vol. 70; pp. 364 - 374
Main Authors Diviák, Tomáš, van Nassau, Casper S., Dijkstra, Jan Kornelis, Snijders, Tom A.B.
Format Journal Article
LanguageEnglish
Published Amsterdam Elsevier B.V 01.07.2022
Elsevier Science Ltd
Subjects
Online AccessGet full text
ISSN0378-8733
1879-2111
1879-2111
DOI10.1016/j.socnet.2022.04.001

Cover

Abstract Longitudinal studies of criminal networks are rare yet necessary to assess the adaptation and recovery of criminal networks after disruptions. We study the structural and individual effects of law enforcement disruption on criminal networks using longitudinal data on two Dutch jihadi networks (n1 = 57; n2 = 26). We expect that actors in criminal networks under disruption seek security and to remain concealed as much as possible. We argue how the structural properties of networks as well as mechanisms operating at the actor level might change after a disruption. We used descriptive measures of network cohesion together with core-periphery model fit and modularity to analyse the structural changes in the networks. To obtain the actor-level tendencies, we used undirected stochastic actor oriented models. At the structural level, both networks display opposite tendencies – the larger one is becoming less cohesive after the disruption, whereas the smaller network counter-intuitively becomes structurally more cohesive. Despite the structural differences, the actor-level mechanisms are similar in both studied networks with actors being inclined towards triadic closure and reliance on pre-existing ties. Our study demonstrates the importance of considering the analytical levels of networks and actors by showing that a disruption may disrupt the network at the structural level, while triggering contradictory unintended consequences by increasing individual-level connectivity as in the case of our second network. •Network structure and actor-level mechanisms in criminal networks changes after a disruption.•We analyse longitudinal data about two disrupted Dutch jihadi networks.•While the structure of network 1 was dismantled after the disruption, the cohesion of network 2 increased.•Te found triadic closure operating in both networks accompanied by pre-existing ties translation in network 1.
AbstractList Longitudinal studies of criminal networks are rare yet necessary to assess the adaptation and recovery of criminal networks after disruptions. We study the structural and individual effects of law enforcement disruption on criminal networks using longitudinal data on two Dutch jihadi networks (n1 = 57; n2 = 26). We expect that actors in criminal networks under disruption seek security and to remain concealed as much as possible. We argue how the structural properties of networks as well as mechanisms operating at the actor level might change after a disruption. We used descriptive measures of network cohesion together with core-periphery model fit and modularity to analyse the structural changes in the networks. To obtain the actor-level tendencies, we used undirected stochastic actor oriented models. At the structural level, both networks display opposite tendencies – the larger one is becoming less cohesive after the disruption, whereas the smaller network counter-intuitively becomes structurally more cohesive. Despite the structural differences, the actor-level mechanisms are similar in both studied networks with actors being inclined towards triadic closure and reliance on pre-existing ties. Our study demonstrates the importance of considering the analytical levels of networks and actors by showing that a disruption may disrupt the network at the structural level, while triggering contradictory unintended consequences by increasing individual-level connectivity as in the case of our second network.
Longitudinal studies of criminal networks are rare yet necessary to assess the adaptation and recovery of criminal networks after disruptions. We study the structural and individual effects of law enforcement disruption on criminal networks using longitudinal data on two Dutch jihadi networks (n1 = 57; n2 = 26). We expect that actors in criminal networks under disruption seek security and to remain concealed as much as possible. We argue how the structural properties of networks as well as mechanisms operating at the actor level might change after a disruption. We used descriptive measures of network cohesion together with core-periphery model fit and modularity to analyse the structural changes in the networks. To obtain the actor-level tendencies, we used undirected stochastic actor oriented models. At the structural level, both networks display opposite tendencies – the larger one is becoming less cohesive after the disruption, whereas the smaller network counter-intuitively becomes structurally more cohesive. Despite the structural differences, the actor-level mechanisms are similar in both studied networks with actors being inclined towards triadic closure and reliance on pre-existing ties. Our study demonstrates the importance of considering the analytical levels of networks and actors by showing that a disruption may disrupt the network at the structural level, while triggering contradictory unintended consequences by increasing individual-level connectivity as in the case of our second network. •Network structure and actor-level mechanisms in criminal networks changes after a disruption.•We analyse longitudinal data about two disrupted Dutch jihadi networks.•While the structure of network 1 was dismantled after the disruption, the cohesion of network 2 increased.•Te found triadic closure operating in both networks accompanied by pre-existing ties translation in network 1.
Author van Nassau, Casper S.
Dijkstra, Jan Kornelis
Snijders, Tom A.B.
Diviák, Tomáš
Author_xml – sequence: 1
  givenname: Tomáš
  surname: Diviák
  fullname: Diviák, Tomáš
  email: tomas.diviak@manchester.ac.uk
  organization: Department of Sociology, University of Groningen, and Interuniversity Center for Social Science Theory and Methodology, The Netherlands
– sequence: 2
  givenname: Casper S.
  surname: van Nassau
  fullname: van Nassau, Casper S.
  organization: Research and Documentation Centre, Ministry of Justice and Security, The Netherlands
– sequence: 3
  givenname: Jan Kornelis
  surname: Dijkstra
  fullname: Dijkstra, Jan Kornelis
  organization: Department of Sociology, University of Groningen, and Interuniversity Center for Social Science Theory and Methodology, The Netherlands
– sequence: 4
  givenname: Tom A.B.
  surname: Snijders
  fullname: Snijders, Tom A.B.
  organization: Department of Sociology, University of Groningen, and Interuniversity Center for Social Science Theory and Methodology, The Netherlands
BookMark eNqNkM1O3DAUha2KSh2mvEEXkbqe1D9JnMwCCc20BYTEAlhbjnPNeBrsYDszmrfHQ7piAayu7vU5R8ffKTqxzgJCPwjOCSbVr20enLIQc4opzXGRY0y-oBmpebOghJATNMOM14uaM_YNnYawxRhXnNQz5NcHK5-MCpm0XdaZ4MchGmeX2V30o4qjl_3rk7Gd2ZluTKvaSPsIIZ2yuHfZeoxqk12bjexMllrsnf-X4nQEnw2uNwqSMi07sMfk8B191bIPcPZ_ztHDn9_3q8vFze3fq9XFzUKxGsdUvNVVAwWrKEhKuWaaFbokrK7qtmmqpuIac123bQtUNZpSVWqVvkiSvClbNkfllDvaQR72su_F4M2T9AdBsDiCE1sxgRNHcAIXIoFLvp-Tb_DueYQQxdaN3qaqgnJaVgXFHCdVMamUdyF40J8NX76xKRPlkUv00vQfmc8nMyRsOwNeBGXAKuiMBxVF58z7AS_DRq47
CitedBy_id crossref_primary_10_3390_math10162929
crossref_primary_10_1007_s13278_022_00947_z
crossref_primary_10_1007_s12117_023_09513_1
crossref_primary_10_1007_s11292_023_09563_z
crossref_primary_10_1007_s41109_023_00531_0
crossref_primary_10_1371_journal_pone_0298273
crossref_primary_10_1177_14773708231207559
Cites_doi 10.1111/1745-9125.12203
10.1017/CBO9781316212639.004
10.1080/1057610X.2016.1142241
10.1007/s12117-008-9056-7
10.21307/joss-2019-030
10.1093/oxfordhb/9780190228217.013.10
10.1111/j.2044-8317.2011.02022.x
10.1016/j.socnet.2018.11.001
10.1146/annurev.soc.34.040507.134743
10.1007/s13644-015-0240-3
10.1146/annurev.soc.27.1.415
10.1086/228943
10.1086/427322
10.1016/j.socnet.2012.07.004
10.1016/S0378-8733(99)00019-2
10.1126/science.1217330
10.1177/0049124103256096
10.1002/asi.4630270505
10.2307/2577940
10.1016/j.socnet.2009.02.004
10.1177/0049124113494573
10.1016/j.socnet.2006.05.001
10.1038/s41562-017-0290-3
10.1126/science.286.5439.509
10.1177/0003122416650149
10.1080/14742837.2013.832622
10.1103/PhysRevE.69.026113
10.5553/TvC/0165182X2016058002004
10.1080/17440572.2013.787927
10.1080/17440570701362208
10.1016/j.socnet.2017.01.005
ContentType Journal Article
Copyright 2022 The Authors
Copyright Elsevier Science Ltd. Jul 2022
Copyright_xml – notice: 2022 The Authors
– notice: Copyright Elsevier Science Ltd. Jul 2022
DBID 6I.
AAFTH
AAYXX
CITATION
7U4
8BJ
BHHNA
DWI
FQK
JBE
WZK
ADTOC
UNPAY
DOI 10.1016/j.socnet.2022.04.001
DatabaseName ScienceDirect Open Access Titles
Elsevier:ScienceDirect:Open Access
CrossRef
Sociological Abstracts (pre-2017)
International Bibliography of the Social Sciences (IBSS)
Sociological Abstracts
Sociological Abstracts
International Bibliography of the Social Sciences
International Bibliography of the Social Sciences
Sociological Abstracts (Ovid)
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
Sociological Abstracts (pre-2017)
International Bibliography of the Social Sciences (IBSS)
Sociological Abstracts
DatabaseTitleList Sociological Abstracts (pre-2017)

Database_xml – sequence: 1
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Sociology & Social History
Social Sciences (General)
EISSN 1879-2111
EndPage 374
ExternalDocumentID 10.1016/j.socnet.2022.04.001
10_1016_j_socnet_2022_04_001
S0378873322000430
GroupedDBID --K
--M
-~X
.~1
0R~
123
1B1
1OL
1RT
1~.
1~5
4.4
457
4G.
53G
5VS
6I.
7-5
71M
8P~
9JO
AACTN
AAEDT
AAEDW
AAFJI
AAFTH
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
ABAOU
ABFNM
ABIVO
ABJNI
ABMAC
ABMMH
ABXDB
ABYKQ
ACAZW
ACDAQ
ACGFS
ACHQT
ACNCT
ACRLP
ADBBV
ADEZE
ADGUI
ADIYS
ADMUD
AEBSH
AEKER
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
AKYCK
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOMHK
ARUGR
ASPBG
AVARZ
AVWKF
AXJTR
AZFZN
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
HMY
HVGLF
HZ~
IHE
J1W
K-O
KOM
LPU
M3Y
M41
MHUIS
MO0
N9A
O-L
O9-
OAUVE
OHT
OZT
P-8
P-9
P2P
PC.
PRBVW
Q38
R2-
RIG
ROL
RPZ
SCC
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SSB
SSO
SSS
SSW
SSZ
T5K
TN5
UHS
WH7
WUQ
XSW
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADMHG
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
7U4
8BJ
AGCQF
BHHNA
DWI
FQK
JBE
WZK
ADTOC
UNPAY
ID FETCH-LOGICAL-c380t-21bf69e4362ea227f3f34f513868b996967f07f8bbbe2c9f22c5fc8731ea295b3
IEDL.DBID UNPAY
ISSN 0378-8733
1879-2111
IngestDate Wed Aug 20 00:20:31 EDT 2025
Sun Sep 07 03:14:15 EDT 2025
Wed Oct 01 02:15:51 EDT 2025
Thu Apr 24 22:53:44 EDT 2025
Fri Feb 23 02:40:30 EST 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords Intervention
Network mechanisms
Stochastic actor-oriented models
Criminal networks
Terrorist networks
Language English
License This is an open access article under the CC BY license.
cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c380t-21bf69e4362ea227f3f34f513868b996967f07f8bbbe2c9f22c5fc8731ea295b3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
OpenAccessLink https://proxy.k.utb.cz/login?url=https://doi.org/10.1016/j.socnet.2022.04.001
PQID 2725642070
PQPubID 2039991
PageCount 11
ParticipantIDs unpaywall_primary_10_1016_j_socnet_2022_04_001
proquest_journals_2725642070
crossref_primary_10_1016_j_socnet_2022_04_001
crossref_citationtrail_10_1016_j_socnet_2022_04_001
elsevier_sciencedirect_doi_10_1016_j_socnet_2022_04_001
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate July 2022
2022-07-00
20220701
PublicationDateYYYYMMDD 2022-07-01
PublicationDate_xml – month: 07
  year: 2022
  text: July 2022
PublicationDecade 2020
PublicationPlace Amsterdam
PublicationPlace_xml – name: Amsterdam
PublicationTitle Social networks
PublicationYear 2022
Publisher Elsevier B.V
Elsevier Science Ltd
Publisher_xml – name: Elsevier B.V
– name: Elsevier Science Ltd
References Lindenberg (bib34) 2008; 30
Roberts, Everton (bib45) 2011; 12
Stevenson, Crossley (bib55) 2014; 13
Duijn, Kashirin, Sloot (bib21) 2014; 4
Malthaner (bib35) 2018; 12
Snijders, T.A. B. 2013. Network Dynamics. In
Sageman (bib47) 2004
Ripley, Tom, Boda, Vörös, Preciado (bib43) 2019
Bright, Koskinen, Malm (bib9) 2018
Robins, Pattison, Woolcock (bib46) 2005; 110
Everton (bib24) 2016; 58
Felson (bib27) 2009; 12
Borgatti, Martin, Linton (bib3) 2002
De Bie, J.L. (2016). How jihadist networks operate: A grounded understanding of changing organizational structures, activities, and involvement mechanisms of jihadist networks in the Netherlands.
Newman, Girvan (bib40) 2004; 69
Crossley, Edwards, Harries, Stevenson (bib12) 2012; 34
Krause, Huisman, Snijders (bib32) 2018; no. 1
Huisman, Snijders (bib30) 2003; 32
Morselli, Petit (bib39) 2007; 8
Felson, Marcus. 2006. The Ecosystem for Organized Crime. HEUNI 25th Anniversary Lecture.
.
Morselli (bib37) 2009; Vol. 8
Schweinberger (bib48) 2012; 65
Solla Price (bib54) 1976; 27
Duxbury, Haynie (bib22) 2019
Waniek, Tomasz, Wooldridge, Rahwan (bib58) 2018; 2
Ouellet, Marie, Martin Bouchard, Mackenzie Hart. 2017. Criminal Collaboration and Risk: The Drivers of Al Qaedas Network Structure before and after 9/11. Social Networks. https://doi.org/10.1016/j.socnet.2017.01.005.
Kenney (bib31) 2007
Rivera, Soderstrom, Uzzi (bib44) 2010; 36
Borgatti, Martin (bib2) 1999; 21
Borgatti, Martin, Jeffrey (bib4) 2013
edited by Rafael Wittek, T.A. B. Snijders, and Victor Nee, 252–280. Stanford, California: Stanford Social Sciences, an imprint of Stanford University Press.
Morselli, Giguère, Petit (bib38) 2007; 29
Wikström, Bouhana (bib59) 2017
Bouchard, Morselli (bib5) 2014
Diviák, Dijkstra, Snijders (bib19) 2019; 21
Ünal (bib56) 2019; 57
Valente (bib57) 2012; 337
Everton, Cunningham (bib25) 2014
Erickson (bib23) 1981; 60
Bright, David A. 2015. Disrupting and Dismantling Dark Networks. In Illuminating Dark Networks: The Study of Clandestine Groups and Organizations, edited by Luke M. Gerdes, 39–52. Cambridge: Cambridge University Press.
Diviák (bib18) 2019
Snijders, van de Bunt, Steglich (bib51) 2010; 32
Csardi, Gabor, Tamas Nepusz. 2006. The igraph Software Package for Complex Network Research. http://igraph.sf.net.
Barabási, Albert (bib1) 1999; 286
De Bie, De Poot (bib16) 2016; 39
Hedström (bib29) 2005
Snijders, Tom A.B., and Mark Pickup. 2017. Stochastic Actor Oriented Models for Network Dynamics. The Oxford Handbook of Political Networks, September.
Grund, Densley (bib28) 2014
Coleman (bib11) 1988; 94
Snijders, Steglich (bib53) 2015; 44
Prell (bib42) 2011
Bright, Delaney (bib8) 2013; 14
Smith, Papachristos (bib49) 2016; 81
Krebs (bib33) 2002; 24
Boudon (bib6) 1982
Diviák (bib20) 2020
de Bie, de Poot (bib17) 2016; 58
McPherson, Smith-Lovin, Cook (bib36) 2001; 27
Coleman (bib10) 1990
Cunningham, Daniel, Sean Everton, Philip Murphy. 2016. Understanding Dark Networks: A Strategic Framework for the Use of Social Network Analysis. Reprint edition. Lanham: Rowman & Littlefield Publishers.
Krebs (10.1016/j.socnet.2022.04.001_bib33) 2002; 24
Waniek (10.1016/j.socnet.2022.04.001_bib58) 2018; 2
De Bie (10.1016/j.socnet.2022.04.001_bib16) 2016; 39
Borgatti (10.1016/j.socnet.2022.04.001_bib3) 2002
Hedström (10.1016/j.socnet.2022.04.001_bib29) 2005
Diviák (10.1016/j.socnet.2022.04.001_bib19) 2019; 21
Coleman (10.1016/j.socnet.2022.04.001_bib10) 1990
Diviák (10.1016/j.socnet.2022.04.001_bib20) 2020
Grund (10.1016/j.socnet.2022.04.001_bib28) 2014
Krause (10.1016/j.socnet.2022.04.001_bib32) 2018; no. 1
Duijn (10.1016/j.socnet.2022.04.001_bib21) 2014; 4
Stevenson (10.1016/j.socnet.2022.04.001_bib55) 2014; 13
Barabási (10.1016/j.socnet.2022.04.001_bib1) 1999; 286
Smith (10.1016/j.socnet.2022.04.001_bib49) 2016; 81
10.1016/j.socnet.2022.04.001_bib26
Sageman (10.1016/j.socnet.2022.04.001_bib47) 2004
Robins (10.1016/j.socnet.2022.04.001_bib46) 2005; 110
McPherson (10.1016/j.socnet.2022.04.001_bib36) 2001; 27
Coleman (10.1016/j.socnet.2022.04.001_bib11) 1988; 94
Wikström (10.1016/j.socnet.2022.04.001_bib59) 2017
Snijders (10.1016/j.socnet.2022.04.001_bib51) 2010; 32
Morselli (10.1016/j.socnet.2022.04.001_bib39) 2007; 8
Newman (10.1016/j.socnet.2022.04.001_bib40) 2004; 69
Borgatti (10.1016/j.socnet.2022.04.001_bib2) 1999; 21
Diviák (10.1016/j.socnet.2022.04.001_bib18) 2019
Solla Price (10.1016/j.socnet.2022.04.001_bib54) 1976; 27
Roberts (10.1016/j.socnet.2022.04.001_bib45) 2011; 12
Borgatti (10.1016/j.socnet.2022.04.001_bib4) 2013
de Bie (10.1016/j.socnet.2022.04.001_bib17) 2016; 58
Rivera (10.1016/j.socnet.2022.04.001_bib44) 2010; 36
10.1016/j.socnet.2022.04.001_bib15
10.1016/j.socnet.2022.04.001_bib14
10.1016/j.socnet.2022.04.001_bib13
Erickson (10.1016/j.socnet.2022.04.001_bib23) 1981; 60
Morselli (10.1016/j.socnet.2022.04.001_bib37) 2009; Vol. 8
Lindenberg (10.1016/j.socnet.2022.04.001_bib34) 2008; 30
10.1016/j.socnet.2022.04.001_bib52
Everton (10.1016/j.socnet.2022.04.001_bib24) 2016; 58
10.1016/j.socnet.2022.04.001_bib50
Valente (10.1016/j.socnet.2022.04.001_bib57) 2012; 337
Bright (10.1016/j.socnet.2022.04.001_bib9) 2018
Kenney (10.1016/j.socnet.2022.04.001_bib31) 2007
Duxbury (10.1016/j.socnet.2022.04.001_bib22) 2019
Schweinberger (10.1016/j.socnet.2022.04.001_bib48) 2012; 65
Bright (10.1016/j.socnet.2022.04.001_bib8) 2013; 14
Boudon (10.1016/j.socnet.2022.04.001_bib6) 1982
Everton (10.1016/j.socnet.2022.04.001_bib25) 2014
Prell (10.1016/j.socnet.2022.04.001_bib42) 2011
Malthaner (10.1016/j.socnet.2022.04.001_bib35) 2018; 12
Crossley (10.1016/j.socnet.2022.04.001_bib12) 2012; 34
10.1016/j.socnet.2022.04.001_bib41
Ünal (10.1016/j.socnet.2022.04.001_bib56) 2019; 57
Bouchard (10.1016/j.socnet.2022.04.001_bib5) 2014
Morselli (10.1016/j.socnet.2022.04.001_bib38) 2007; 29
Ripley (10.1016/j.socnet.2022.04.001_bib43) 2019
Huisman (10.1016/j.socnet.2022.04.001_bib30) 2003; 32
Snijders (10.1016/j.socnet.2022.04.001_bib53) 2015; 44
Felson (10.1016/j.socnet.2022.04.001_bib27) 2009; 12
10.1016/j.socnet.2022.04.001_bib7
References_xml – start-page: 288
  year: 2014
  end-page: 302
  ident: bib5
  article-title: Opportunistic Structures of Organized Crime
  publication-title: The Oxford Handbook of Organized Crime, edited by Letizia Paoli
– year: 2019
  ident: bib18
  article-title: Key aspects of covert networks data collection: problems, challenges, and opportunities
  publication-title: Soc. Netw.
– year: 2005
  ident: bib29
  publication-title: Dissecting the Social: On the Principles of Analytical Sociology
– year: 2014
  ident: bib28
  article-title: Ethnic homophily and triad closure: mapping internal gang structure using exponential random graph models
  publication-title: J. Contemp. Crim. Justice, Oct.
– volume: 12
  year: 2018
  ident: bib35
  article-title: Spaces, Ties, and Agency: The Formation of Radical Networks
  publication-title: Perspect. Terror.
– volume: 286
  start-page: 509
  year: 1999
  end-page: 512
  ident: bib1
  article-title: Emergence of scaling in random networks
  publication-title: Science
– year: 2004
  ident: bib47
  publication-title: Understanding Terror Networks
– year: 2020
  ident: bib20
  publication-title: Criminal networks: Actors, mechanisms, and structures
– reference: De Bie, J.L. (2016). How jihadist networks operate: A grounded understanding of changing organizational structures, activities, and involvement mechanisms of jihadist networks in the Netherlands.
– volume: 21
  start-page: 1
  year: 2019
  end-page: 23
  ident: bib19
  article-title: Poisonous connections: a case study on a czech counterfeit alcohol distribution network
  publication-title: Glob. Crime.
– volume: 32
  start-page: 253
  year: 2003
  end-page: 287
  ident: bib30
  article-title: Statistical analysis of longitudinal network data with changing composition
  publication-title: Sociol. Methods Res.
– volume: 27
  start-page: 292
  year: 1976
  end-page: 306
  ident: bib54
  article-title: A general theory of bibliometric and other cumulative advantage processes
  publication-title: J. Am. Soc. Inf. Sci.
– volume: 81
  start-page: 617
  year: 2016
  end-page: 643
  ident: bib49
  article-title: Trust thy crooked neighbor multiplexity in chicago organized crime networks
  publication-title: Am. Sociol. Rev.
– volume: 29
  start-page: 143
  year: 2007
  end-page: 153
  ident: bib38
  article-title: The Efficiency/Security Trade-off in Criminal Networks
  publication-title: Soc. Netw.
– year: 2013
  ident: bib4
  publication-title: Analyzing Social Networks
– volume: 36
  start-page: 91
  year: 2010
  end-page: 115
  ident: bib44
  article-title: Dynamics of dyads in social networks: assortative, relational, and proximity mechanisms
  publication-title: Annu. Rev. Sociol.
– year: 2002
  ident: bib3
  article-title: UCINET 6 for Windows: Software for Social Network Analysis
– volume: 60
  start-page: 188
  year: 1981
  end-page: 210
  ident: bib23
  article-title: Secret societies and social structure
  publication-title: Soc. Forces
– year: 2007
  ident: bib31
  article-title: From Pablo to Osama: Trafficking and Terrorist
  publication-title: Networks, Government Bureaucracies, and Competitive Adaptation
– volume: 69
  year: 2004
  ident: bib40
  article-title: Finding and evaluating community structure in networks
  publication-title: Phys. Rev. E
– reference: Ouellet, Marie, Martin Bouchard, Mackenzie Hart. 2017. Criminal Collaboration and Risk: The Drivers of Al Qaedas Network Structure before and after 9/11. Social Networks. https://doi.org/10.1016/j.socnet.2017.01.005.
– volume: 337
  start-page: 49
  year: 2012
  end-page: 53
  ident: bib57
  article-title: Network interventions
  publication-title: Science
– volume: 94
  start-page: S95
  year: 1988
  end-page: S120
  ident: bib11
  article-title: Social capital in the creation of human capital
  publication-title: Am. J. Sociol.
– start-page: 287
  year: 2014
  end-page: 309
  ident: bib25
  article-title: Terrorist Network Adaptation to a Changing Environment
  publication-title: In
– reference: Felson, Marcus. 2006. The Ecosystem for Organized Crime. HEUNI 25th Anniversary Lecture.
– volume: 110
  year: 2005
  ident: bib46
  article-title: Small and other worlds: global network structures from local processes
  publication-title: Am. J. Sociol.
– year: 2018
  ident: bib9
  article-title: Illicit network dynamics: the formation and evolution of a drug trafficking network
  publication-title: J. Quant. Criminol.
– volume: 24
  start-page: 43
  year: 2002
  end-page: 52
  ident: bib33
  article-title: Mapping networks of terrorist cells
  publication-title: Connections
– volume: 44
  start-page: 222
  year: 2015
  end-page: 271
  ident: bib53
  article-title: Representing micro–macro linkages by actor-based dynamic network models
  publication-title: Sociol. Methods Res.
– volume: 34
  start-page: 634
  year: 2012
  end-page: 644
  ident: bib12
  article-title: Covert social movement networks and the secrecy-efficiency trade off: The case of the UK Suffragettes (1906–1914)
  publication-title: Soc. Netw.
– volume: 58
  start-page: 191
  year: 2016
  end-page: 217
  ident: bib24
  article-title: Social networks and religious violence
  publication-title: Rev. Relig. Res.
– volume: 12
  start-page: 159
  year: 2009
  end-page: 165
  ident: bib27
  article-title: The natural history of extended co-offending
  publication-title: Trends Organ. Crime.
– volume: 14
  start-page: 238
  year: 2013
  end-page: 260
  ident: bib8
  article-title: Evolution of a drug trafficking network: mapping changes in network structure and function across time
  publication-title: Glob. Crime.
– reference: Snijders, T.A. B. 2013. Network Dynamics. In
– reference: Csardi, Gabor, Tamas Nepusz. 2006. The igraph Software Package for Complex Network Research. http://igraph.sf.net.
– volume: no. 1
  start-page: 33
  year: 2018
  end-page: 57
  ident: bib32
  article-title: Multiple imputation for longitudinal network data
  publication-title: Ital. J. Appl. Stat.
– volume: 2
  start-page: 139
  year: 2018
  end-page: 147
  ident: bib58
  article-title: Hiding Individuals and Communities in a Social Network
  publication-title: Nat. Hum. Behav.
– year: 2019
  ident: bib43
  article-title: Manual for SIENA Version 4.0 (Version February 21, 2019)
– volume: Vol. 8
  year: 2009
  ident: bib37
  article-title: Inside Criminal Networks
  publication-title: Studies of Organized Crime. New York, NY
– volume: 27
  start-page: 415
  year: 2001
  end-page: 444
  ident: bib36
  article-title: Birds of a Feather: Homophily in Social Networks
  publication-title: Annu. Rev. Sociol.
– volume: 8
  start-page: 109
  year: 2007
  end-page: 130
  ident: bib39
  article-title: Law-enforcement disruption of a drug importation network
  publication-title: Glob. Crime.
– volume: 13
  start-page: 70
  year: 2014
  end-page: 91
  ident: bib55
  article-title: Change in covert social movement networks: the “inner circle” of the provisional irish republican army
  publication-title: Soc. Mov. Stud.
– volume: 30
  year: 2008
  ident: bib34
  article-title: Social rationality, semi-modularity and goal-framing: what is it all about?
  publication-title: Anal. Krit.
– year: 1990
  ident: bib10
  article-title: Foundations of Social Theory
– volume: 12
  start-page: 1
  year: 2011
  end-page: 32
  ident: bib45
  article-title: Strategies for combating dark networks
  publication-title: J. Soc. Struct.
– volume: 58
  start-page: 54
  year: 2016
  end-page: 75
  ident: bib17
  article-title: Organisatiestructuren van jihadistischenetwerken in Nederland: Verschillen en overeenkomsten tussen 2000 en 2013
  publication-title: Tijdschrift voor Criminologie
– reference: , edited by Rafael Wittek, T.A. B. Snijders, and Victor Nee, 252–280. Stanford, California: Stanford Social Sciences, an imprint of Stanford University Press.
– reference: Snijders, Tom A.B., and Mark Pickup. 2017. Stochastic Actor Oriented Models for Network Dynamics. The Oxford Handbook of Political Networks, September.
– volume: 57
  start-page: 1
  year: 2019
  end-page: 17
  ident: bib56
  article-title: Do terrorists make a difference in criminal networks? An empirical analysis on illicit drug and narco-terror networks in their prioritization between security and efficiency
  publication-title: Soc. Netw.
– reference: .
– reference: Cunningham, Daniel, Sean Everton, Philip Murphy. 2016. Understanding Dark Networks: A Strategic Framework for the Use of Social Network Analysis. Reprint edition. Lanham: Rowman & Littlefield Publishers.
– volume: 4
  year: 2014
  ident: bib21
  article-title: The relative ineffectiveness of criminal network disruption
  publication-title: Sci. Rep.
– start-page: 175
  year: 2017
  end-page: 186
  ident: bib59
  article-title: Analyzing Radicalization and Terrorism: A Situational Action Theory
  publication-title: The Handbook of the Criminology of Terrorism
– volume: 39
  start-page: 580
  year: 2016
  end-page: 601
  ident: bib16
  article-title: Studying police files with grounded theory methods to understand
  publication-title: Stud. Confl. Terror.
– year: 2019
  ident: bib22
  article-title: Criminal network security: an agent-based approach to evaluating network resilience
  publication-title: Criminol.
– year: 2011
  ident: bib42
  article-title: Social Network Analysis
– year: 1982
  ident: bib6
  article-title: The Unintended Consequences of Social Action
– volume: 65
  start-page: 263
  year: 2012
  end-page: 281
  ident: bib48
  article-title: Statistical Modelling of Network Panel Data: Goodness of Fit: Statistical Modelling of Network Panel Data: Goodness of Fit
  publication-title: Br. J. Math. Stat. Psychol.
– reference: Bright, David A. 2015. Disrupting and Dismantling Dark Networks. In Illuminating Dark Networks: The Study of Clandestine Groups and Organizations, edited by Luke M. Gerdes, 39–52. Cambridge: Cambridge University Press.
– volume: 32
  start-page: 44
  year: 2010
  end-page: 60
  ident: bib51
  article-title: Introduction to Stochastic Actor-Based Models for Network Dynamics
  publication-title: Soc. Netw., Dyn. Soc. Netw.
– volume: 21
  start-page: 375
  year: 1999
  end-page: 395
  ident: bib2
  article-title: Models of core/periphery structures
  publication-title: Soc. Netw.
– year: 2002
  ident: 10.1016/j.socnet.2022.04.001_bib3
– ident: 10.1016/j.socnet.2022.04.001_bib15
– year: 2019
  ident: 10.1016/j.socnet.2022.04.001_bib22
  article-title: Criminal network security: an agent-based approach to evaluating network resilience
  publication-title: Criminol.
  doi: 10.1111/1745-9125.12203
– volume: no. 1
  start-page: 33
  issue: April
  year: 2018
  ident: 10.1016/j.socnet.2022.04.001_bib32
  article-title: Multiple imputation for longitudinal network data
  publication-title: Ital. J. Appl. Stat.
– ident: 10.1016/j.socnet.2022.04.001_bib7
  doi: 10.1017/CBO9781316212639.004
– volume: 39
  start-page: 580
  issue: 7–8
  year: 2016
  ident: 10.1016/j.socnet.2022.04.001_bib16
  article-title: Studying police files with grounded theory methods to understand Jihadist networks
  publication-title: Stud. Confl. Terror.
  doi: 10.1080/1057610X.2016.1142241
– volume: 12
  start-page: 159
  issue: 2
  year: 2009
  ident: 10.1016/j.socnet.2022.04.001_bib27
  article-title: The natural history of extended co-offending
  publication-title: Trends Organ. Crime.
  doi: 10.1007/s12117-008-9056-7
– volume: 12
  start-page: 1
  issue: 1
  year: 2011
  ident: 10.1016/j.socnet.2022.04.001_bib45
  article-title: Strategies for combating dark networks
  publication-title: J. Soc. Struct.
  doi: 10.21307/joss-2019-030
– ident: 10.1016/j.socnet.2022.04.001_bib52
  doi: 10.1093/oxfordhb/9780190228217.013.10
– volume: 21
  start-page: 1
  issue: 1
  year: 2019
  ident: 10.1016/j.socnet.2022.04.001_bib19
  article-title: Poisonous connections: a case study on a czech counterfeit alcohol distribution network
  publication-title: Glob. Crime.
– volume: 65
  start-page: 263
  issue: 2
  year: 2012
  ident: 10.1016/j.socnet.2022.04.001_bib48
  article-title: Statistical Modelling of Network Panel Data: Goodness of Fit: Statistical Modelling of Network Panel Data: Goodness of Fit
  publication-title: Br. J. Math. Stat. Psychol.
  doi: 10.1111/j.2044-8317.2011.02022.x
– volume: 57
  start-page: 1
  issue: May
  year: 2019
  ident: 10.1016/j.socnet.2022.04.001_bib56
  article-title: Do terrorists make a difference in criminal networks? An empirical analysis on illicit drug and narco-terror networks in their prioritization between security and efficiency
  publication-title: Soc. Netw.
  doi: 10.1016/j.socnet.2018.11.001
– start-page: 288
  year: 2014
  ident: 10.1016/j.socnet.2022.04.001_bib5
  article-title: Opportunistic Structures of Organized Crime
– year: 2020
  ident: 10.1016/j.socnet.2022.04.001_bib20
– volume: 36
  start-page: 91
  issue: 1
  year: 2010
  ident: 10.1016/j.socnet.2022.04.001_bib44
  article-title: Dynamics of dyads in social networks: assortative, relational, and proximity mechanisms
  publication-title: Annu. Rev. Sociol.
  doi: 10.1146/annurev.soc.34.040507.134743
– start-page: 175
  year: 2017
  ident: 10.1016/j.socnet.2022.04.001_bib59
  article-title: Analyzing Radicalization and Terrorism: A Situational Action Theory
– volume: 58
  start-page: 191
  issue: 2
  year: 2016
  ident: 10.1016/j.socnet.2022.04.001_bib24
  article-title: Social networks and religious violence
  publication-title: Rev. Relig. Res.
  doi: 10.1007/s13644-015-0240-3
– volume: 27
  start-page: 415
  year: 2001
  ident: 10.1016/j.socnet.2022.04.001_bib36
  article-title: Birds of a Feather: Homophily in Social Networks
  publication-title: Annu. Rev. Sociol.
  doi: 10.1146/annurev.soc.27.1.415
– year: 2011
  ident: 10.1016/j.socnet.2022.04.001_bib42
– volume: 94
  start-page: S95
  year: 1988
  ident: 10.1016/j.socnet.2022.04.001_bib11
  article-title: Social capital in the creation of human capital
  publication-title: Am. J. Sociol.
  doi: 10.1086/228943
– year: 1990
  ident: 10.1016/j.socnet.2022.04.001_bib10
– year: 2018
  ident: 10.1016/j.socnet.2022.04.001_bib9
  article-title: Illicit network dynamics: the formation and evolution of a drug trafficking network
  publication-title: J. Quant. Criminol.
– ident: 10.1016/j.socnet.2022.04.001_bib14
– volume: 110
  issue: 4
  year: 2005
  ident: 10.1016/j.socnet.2022.04.001_bib46
  article-title: Small and other worlds: global network structures from local processes
  publication-title: Am. J. Sociol.
  doi: 10.1086/427322
– year: 2007
  ident: 10.1016/j.socnet.2022.04.001_bib31
  article-title: From Pablo to Osama: Trafficking and Terrorist
– volume: 34
  start-page: 634
  issue: 4
  year: 2012
  ident: 10.1016/j.socnet.2022.04.001_bib12
  article-title: Covert social movement networks and the secrecy-efficiency trade off: The case of the UK Suffragettes (1906–1914)
  publication-title: Soc. Netw.
  doi: 10.1016/j.socnet.2012.07.004
– year: 2019
  ident: 10.1016/j.socnet.2022.04.001_bib18
  article-title: Key aspects of covert networks data collection: problems, challenges, and opportunities
  publication-title: Soc. Netw.
– year: 1982
  ident: 10.1016/j.socnet.2022.04.001_bib6
– volume: 21
  start-page: 375
  issue: 4
  year: 1999
  ident: 10.1016/j.socnet.2022.04.001_bib2
  article-title: Models of core/periphery structures
  publication-title: Soc. Netw.
  doi: 10.1016/S0378-8733(99)00019-2
– volume: 337
  start-page: 49
  issue: 6090
  year: 2012
  ident: 10.1016/j.socnet.2022.04.001_bib57
  article-title: Network interventions
  publication-title: Science
  doi: 10.1126/science.1217330
– volume: 12
  issue: 2
  year: 2018
  ident: 10.1016/j.socnet.2022.04.001_bib35
  article-title: Spaces, Ties, and Agency: The Formation of Radical Networks
  publication-title: Perspect. Terror.
– volume: 32
  start-page: 253
  issue: 2
  year: 2003
  ident: 10.1016/j.socnet.2022.04.001_bib30
  article-title: Statistical analysis of longitudinal network data with changing composition
  publication-title: Sociol. Methods Res.
  doi: 10.1177/0049124103256096
– volume: 27
  start-page: 292
  issue: 5
  year: 1976
  ident: 10.1016/j.socnet.2022.04.001_bib54
  article-title: A general theory of bibliometric and other cumulative advantage processes
  publication-title: J. Am. Soc. Inf. Sci.
  doi: 10.1002/asi.4630270505
– volume: 60
  start-page: 188
  issue: 1
  year: 1981
  ident: 10.1016/j.socnet.2022.04.001_bib23
  article-title: Secret societies and social structure
  publication-title: Soc. Forces
  doi: 10.2307/2577940
– volume: 32
  start-page: 44
  issue: 1
  year: 2010
  ident: 10.1016/j.socnet.2022.04.001_bib51
  article-title: Introduction to Stochastic Actor-Based Models for Network Dynamics
  publication-title: Soc. Netw., Dyn. Soc. Netw.
  doi: 10.1016/j.socnet.2009.02.004
– volume: 44
  start-page: 222
  issue: 2
  year: 2015
  ident: 10.1016/j.socnet.2022.04.001_bib53
  article-title: Representing micro–macro linkages by actor-based dynamic network models
  publication-title: Sociol. Methods Res.
  doi: 10.1177/0049124113494573
– volume: 30
  issue: 2
  year: 2008
  ident: 10.1016/j.socnet.2022.04.001_bib34
  article-title: Social rationality, semi-modularity and goal-framing: what is it all about?
  publication-title: Anal. Krit.
– volume: 29
  start-page: 143
  issue: 1
  year: 2007
  ident: 10.1016/j.socnet.2022.04.001_bib38
  article-title: The Efficiency/Security Trade-off in Criminal Networks
  publication-title: Soc. Netw.
  doi: 10.1016/j.socnet.2006.05.001
– ident: 10.1016/j.socnet.2022.04.001_bib13
– volume: Vol. 8
  year: 2009
  ident: 10.1016/j.socnet.2022.04.001_bib37
  article-title: Inside Criminal Networks
– volume: 2
  start-page: 139
  issue: 2
  year: 2018
  ident: 10.1016/j.socnet.2022.04.001_bib58
  article-title: Hiding Individuals and Communities in a Social Network
  publication-title: Nat. Hum. Behav.
  doi: 10.1038/s41562-017-0290-3
– year: 2013
  ident: 10.1016/j.socnet.2022.04.001_bib4
– year: 2005
  ident: 10.1016/j.socnet.2022.04.001_bib29
– volume: 286
  start-page: 509
  issue: 5439
  year: 1999
  ident: 10.1016/j.socnet.2022.04.001_bib1
  article-title: Emergence of scaling in random networks
  publication-title: Science
  doi: 10.1126/science.286.5439.509
– volume: 24
  start-page: 43
  issue: 3
  year: 2002
  ident: 10.1016/j.socnet.2022.04.001_bib33
  article-title: Mapping networks of terrorist cells
  publication-title: Connections
– volume: 81
  start-page: 617
  issue: 4
  year: 2016
  ident: 10.1016/j.socnet.2022.04.001_bib49
  article-title: Trust thy crooked neighbor multiplexity in chicago organized crime networks
  publication-title: Am. Sociol. Rev.
  doi: 10.1177/0003122416650149
– start-page: 287
  year: 2014
  ident: 10.1016/j.socnet.2022.04.001_bib25
  article-title: Terrorist Network Adaptation to a Changing Environment
– year: 2004
  ident: 10.1016/j.socnet.2022.04.001_bib47
– volume: 13
  start-page: 70
  issue: 1
  year: 2014
  ident: 10.1016/j.socnet.2022.04.001_bib55
  article-title: Change in covert social movement networks: the “inner circle” of the provisional irish republican army
  publication-title: Soc. Mov. Stud.
  doi: 10.1080/14742837.2013.832622
– volume: 69
  issue: 2
  year: 2004
  ident: 10.1016/j.socnet.2022.04.001_bib40
  article-title: Finding and evaluating community structure in networks
  publication-title: Phys. Rev. E
  doi: 10.1103/PhysRevE.69.026113
– volume: 58
  start-page: 54
  issue: 2
  year: 2016
  ident: 10.1016/j.socnet.2022.04.001_bib17
  article-title: Organisatiestructuren van jihadistischenetwerken in Nederland: Verschillen en overeenkomsten tussen 2000 en 2013
  publication-title: Tijdschrift voor Criminologie
  doi: 10.5553/TvC/0165182X2016058002004
– volume: 14
  start-page: 238
  issue: 2/3
  year: 2013
  ident: 10.1016/j.socnet.2022.04.001_bib8
  article-title: Evolution of a drug trafficking network: mapping changes in network structure and function across time
  publication-title: Glob. Crime.
  doi: 10.1080/17440572.2013.787927
– year: 2014
  ident: 10.1016/j.socnet.2022.04.001_bib28
  article-title: Ethnic homophily and triad closure: mapping internal gang structure using exponential random graph models
  publication-title: J. Contemp. Crim. Justice, Oct.
– ident: 10.1016/j.socnet.2022.04.001_bib26
– ident: 10.1016/j.socnet.2022.04.001_bib50
– volume: 8
  start-page: 109
  issue: 2
  year: 2007
  ident: 10.1016/j.socnet.2022.04.001_bib39
  article-title: Law-enforcement disruption of a drug importation network
  publication-title: Glob. Crime.
  doi: 10.1080/17440570701362208
– ident: 10.1016/j.socnet.2022.04.001_bib41
  doi: 10.1016/j.socnet.2017.01.005
– volume: 4
  issue: February
  year: 2014
  ident: 10.1016/j.socnet.2022.04.001_bib21
  article-title: The relative ineffectiveness of criminal network disruption
  publication-title: Sci. Rep.
– year: 2019
  ident: 10.1016/j.socnet.2022.04.001_bib43
SSID ssj0006718
Score 2.4148066
Snippet Longitudinal studies of criminal networks are rare yet necessary to assess the adaptation and recovery of criminal networks after disruptions. We study the...
SourceID unpaywall
proquest
crossref
elsevier
SourceType Open Access Repository
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 364
SubjectTerms Center and periphery
Criminal law
Criminal networks
Disruption
Individual differences
Intervention
Law enforcement
Longitudinal studies
Modularity
Network mechanisms
Police
Stochastic actor-oriented models
Stochastic models
Structural models
Terrorist networks
SummonAdditionalLinks – databaseName: ScienceDirect Freedom Collection 2013
  dbid: .~1
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PS8MwFA7Di15Ep-J0Sg4ieohrk7ZJvclUZKCXKXgLSZtgZdRhN8SLf7v51TlBUDw2fS0h7-W91_R73wPgSOooErmIEY0ERUmZEpSnKUaYFFozLZhwRxe3d9nNQzJ6TB87YNjWwlhYZfD93qc7bx1GBmE1B9OqGowjS4VOibFI9z_Lfrdb9i9j02cfXzCPjLozPiuMrHRbPucwXmYBamURlRg7wtPQGuaH8LSUfq7O66l4fxOTyVIkut4A6yGFhBd-lpugo-ou6Pk6Wxj2agNPAqH0aRfsLapS4DEMcp4e5H0LvF76nvQNFHUJy6p5nTsvcg7HjlrW0nK4W9WidAv6auHGDMHZ2wu8nBvVw1H1JMoK1h5Xbl5nu49D2wSiULBaglY22-Dh-up-eINCIwZUEBbNEI6lznKVmGCnBMZUE00SncaEZUzmll-H6ohqJqVUuMg1xoWFhlESG_E8lWQHrNQvtdoFsCiNqGKSxLFMYlWIVLNSkTQppWJKZT1A2vXnRWApt80yJryFoz1zrzVutcajxKLyegAtnpp6lo5f5GmrWv7N2rgJJL882W8tgYfd3nBMTeKYYOM9e-BsYR1_msnev2eyD9bslYcO98GKsQl1YBKkmTx0O-ATJEYQ6Q
  priority: 102
  providerName: Elsevier
Title Dynamics and disruption: Structural and individual changes in two Dutch Jihadi networks after police interventions
URI https://dx.doi.org/10.1016/j.socnet.2022.04.001
https://www.proquest.com/docview/2725642070
https://doi.org/10.1016/j.socnet.2022.04.001
UnpaywallVersion publishedVersion
Volume 70
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier)
  customDbUrl:
  eissn: 1879-2111
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0006718
  issn: 1879-2111
  databaseCode: GBLVA
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier ScienceDirect Freedom Collection Journals
  customDbUrl:
  eissn: 1879-2111
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0006718
  issn: 1879-2111
  databaseCode: ACRLP
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals [SCFCJ]
  customDbUrl:
  eissn: 1879-2111
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0006718
  issn: 1879-2111
  databaseCode: AIKHN
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: ScienceDirect Freedom Collection 2013
  customDbUrl:
  eissn: 1879-2111
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0006718
  issn: 1879-2111
  databaseCode: .~1
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVLSH
  databaseName: Elsevier Journals
  customDbUrl:
  mediaType: online
  eissn: 1879-2111
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0006718
  issn: 1879-2111
  databaseCode: AKRWK
  dateStart: 19950101
  isFulltext: true
  providerName: Library Specific Holdings
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1RT9swED5B-7An2NimFbHKD2japKVK7CR29laNocJENQkqsSfLdmwRqAIirRB72G-fHTtVh4SA1-RsOb6zfRd_9x3AvjRxLAqRRDQWNErLjERFluEIE2UMM4KJ9tfFyTSfzNLj8-x8A752uTD_3d-3OCw7SBuk20gO45aU1CVr9XN3ndSD_mz6a_y7vSiwwRCjbeV4Vz87snFN0mXKPdLNYyfRmqf5alnfiPs7MZ-vHTqH23DSDddjTa5Gy4UcqT8PmByf-z2vYSt4n2jszeUNbOh6BwY-RReFZd6gz4GL-ssO7K4SWtAnFOQ8s8j9W7g98OXsGyTqEpVVc7tsN6Bv6LRlpXWMHu2rapX1hXyicWMfocXdNTpYWqtBx9WFKCtUe0i67c4VLkeufoTSqFpDZTbvYHb44-z7JAo1HCJFWLywepAmL3Rqz0ktMKaGGJKaLCEsZ7Jw1DzUxNQwKaXGqjAYK4cqoySx4kUmyXvo1de1_gBIlVZUM0mSRKaJViIzrNQkS0upmdb5AEinT64CwbmrszHnHZLtkvvJ527yeZw6QN8AolWrG0_w8YQ87UyFByfFOx_cqvqJlnudZfGwUTQcU-tzpthuvAMYraztWSPZfWmDPehZ7euP1otayCFsjv4mQ-iPj35OpsOwlP4BvHod8g
linkProvider Unpaywall
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1La9wwEBZhc0gvJU1bunm0OpTSHtS19bDk3kIebF57SQK5CcmWqMviLPEuIf8-etlsoZDQqzUyQjOaGcvffAPAV22zTJUqRzxTHNGaEVQyhhEmlbXCKqHC1cXVrJje0vM7drcBjvpaGA-rTL4_-vTgrdOTSdrNyaJpJteZp0LnxFlk-J_lvts3KXM-eQQ2D88uprPBIRc8XPN5eeQn9BV0Aebl9qA1HlSJceA8Td1h_hGh1jLQrVW7UE-Paj5fC0an2-BtyiLhYVzoO7Bh2h0wjqW2MB3XDn5PnNI_dsDuUJgCv8EkFxlCnt6Dh-PYlr6Dqq1h3XQPq-BIfsHrwC7rmTnCUDNUb8FYMNy5R3D5eA-PV0778Lz5reoGthFa7l7nG5BD3weiMrBZQ1d2H8Dt6cnN0RSlXgyoIiJbIpxrW5SGunhnFMbcEkuoZTkRhdClp9jhNuNWaK0NrkqLceXRYZzkTrxkmnwEo_a-NZ8ArGonaoQmea5pbirFrKgNYbTWRhhTjAHp919Wiajc98uYyx6R9kdGrUmvNZlRD8wbAzTMWkSijhfkea9a-ZfBSRdLXpi531uCTAe-k5i73JFi50DH4OdgHa9aye5_r-QL2JreXF3Ky7PZxR5440cikngfjJx9mAOXLy3153QengHxsBUi
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1RSxwxEB7kfOiTtlbpiZY8lFKhe-wmu5ts36RWRFAK7YE-hSSb0NVjFfcOsb_eySZ7nAXRvu5OQjYzSWY233wD8Em7NFWVyhKeKp7kdcGSqihoQplxTjglVP_r4uy8PJnmpxfFxRp8HXJhntzf9zgsHCQG6RjJUdqTkvpkrfXSXyeNYH16_vPwsr8owGBI8L5yvK-fnWBckw2Zcs9089xJtOJpvlm0t-rhXs1mK4fO8SacDcMNWJPryWKuJ-bvP0yOr_2et7ARvU9yGMzlHazZdgvGIUWXxGXekS-Ri_pgC3aXCS3kM4lygVnk4T3cHYVy9h1RbU3qprtb9BvQN_KrZ6X1jB79q2aZ9UVConGHj8j8_oYcLdBqyGnzR9UNaQMkHbvzhcuJrx9hLGlWUJndNkyPf_z-fpLEGg6JYSKdox60Kyub4zlpFaXcMcdyV2RMlEJXnpqHu5Q7obW21FSOUuNRZZxlKF4Vmu3AqL1p7QcgpkZRKzTLMp1n1qjCidqyIq-1FdaWY2CDPqWJBOe-zsZMDki2KxkmX_rJl2nuAX1jSJatbgPBxwvyfDAVGZ2U4HxIVPULLfcGy5Jxo-gk5ehz5hQ33jFMltb2qpHs_m-DPRih9u0-elFz_TEunkcwehtm
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Dynamics+and+disruption%3A+Structural+and+individual+changes+in+two+Dutch+Jihadi+networks+after+police+interventions&rft.jtitle=Social+networks&rft.au=Divi%C3%A1k%2C+Tom%C3%A1%C5%A1&rft.au=van+Nassau%2C+Casper+S.&rft.au=Dijkstra%2C+Jan+Kornelis&rft.au=Snijders%2C+Tom+A.B.&rft.date=2022-07-01&rft.issn=0378-8733&rft.volume=70&rft.spage=364&rft.epage=374&rft_id=info:doi/10.1016%2Fj.socnet.2022.04.001&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_socnet_2022_04_001
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0378-8733&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0378-8733&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0378-8733&client=summon