Dynamics and disruption: Structural and individual changes in two Dutch Jihadi networks after police interventions
Longitudinal studies of criminal networks are rare yet necessary to assess the adaptation and recovery of criminal networks after disruptions. We study the structural and individual effects of law enforcement disruption on criminal networks using longitudinal data on two Dutch jihadi networks (n1 = ...
Saved in:
Published in | Social networks Vol. 70; pp. 364 - 374 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Amsterdam
Elsevier B.V
01.07.2022
Elsevier Science Ltd |
Subjects | |
Online Access | Get full text |
ISSN | 0378-8733 1879-2111 1879-2111 |
DOI | 10.1016/j.socnet.2022.04.001 |
Cover
Abstract | Longitudinal studies of criminal networks are rare yet necessary to assess the adaptation and recovery of criminal networks after disruptions. We study the structural and individual effects of law enforcement disruption on criminal networks using longitudinal data on two Dutch jihadi networks (n1 = 57; n2 = 26). We expect that actors in criminal networks under disruption seek security and to remain concealed as much as possible. We argue how the structural properties of networks as well as mechanisms operating at the actor level might change after a disruption. We used descriptive measures of network cohesion together with core-periphery model fit and modularity to analyse the structural changes in the networks. To obtain the actor-level tendencies, we used undirected stochastic actor oriented models. At the structural level, both networks display opposite tendencies – the larger one is becoming less cohesive after the disruption, whereas the smaller network counter-intuitively becomes structurally more cohesive. Despite the structural differences, the actor-level mechanisms are similar in both studied networks with actors being inclined towards triadic closure and reliance on pre-existing ties. Our study demonstrates the importance of considering the analytical levels of networks and actors by showing that a disruption may disrupt the network at the structural level, while triggering contradictory unintended consequences by increasing individual-level connectivity as in the case of our second network.
•Network structure and actor-level mechanisms in criminal networks changes after a disruption.•We analyse longitudinal data about two disrupted Dutch jihadi networks.•While the structure of network 1 was dismantled after the disruption, the cohesion of network 2 increased.•Te found triadic closure operating in both networks accompanied by pre-existing ties translation in network 1. |
---|---|
AbstractList | Longitudinal studies of criminal networks are rare yet necessary to assess the adaptation and recovery of criminal networks after disruptions. We study the structural and individual effects of law enforcement disruption on criminal networks using longitudinal data on two Dutch jihadi networks (n1 = 57; n2 = 26). We expect that actors in criminal networks under disruption seek security and to remain concealed as much as possible. We argue how the structural properties of networks as well as mechanisms operating at the actor level might change after a disruption. We used descriptive measures of network cohesion together with core-periphery model fit and modularity to analyse the structural changes in the networks. To obtain the actor-level tendencies, we used undirected stochastic actor oriented models. At the structural level, both networks display opposite tendencies – the larger one is becoming less cohesive after the disruption, whereas the smaller network counter-intuitively becomes structurally more cohesive. Despite the structural differences, the actor-level mechanisms are similar in both studied networks with actors being inclined towards triadic closure and reliance on pre-existing ties. Our study demonstrates the importance of considering the analytical levels of networks and actors by showing that a disruption may disrupt the network at the structural level, while triggering contradictory unintended consequences by increasing individual-level connectivity as in the case of our second network. Longitudinal studies of criminal networks are rare yet necessary to assess the adaptation and recovery of criminal networks after disruptions. We study the structural and individual effects of law enforcement disruption on criminal networks using longitudinal data on two Dutch jihadi networks (n1 = 57; n2 = 26). We expect that actors in criminal networks under disruption seek security and to remain concealed as much as possible. We argue how the structural properties of networks as well as mechanisms operating at the actor level might change after a disruption. We used descriptive measures of network cohesion together with core-periphery model fit and modularity to analyse the structural changes in the networks. To obtain the actor-level tendencies, we used undirected stochastic actor oriented models. At the structural level, both networks display opposite tendencies – the larger one is becoming less cohesive after the disruption, whereas the smaller network counter-intuitively becomes structurally more cohesive. Despite the structural differences, the actor-level mechanisms are similar in both studied networks with actors being inclined towards triadic closure and reliance on pre-existing ties. Our study demonstrates the importance of considering the analytical levels of networks and actors by showing that a disruption may disrupt the network at the structural level, while triggering contradictory unintended consequences by increasing individual-level connectivity as in the case of our second network. •Network structure and actor-level mechanisms in criminal networks changes after a disruption.•We analyse longitudinal data about two disrupted Dutch jihadi networks.•While the structure of network 1 was dismantled after the disruption, the cohesion of network 2 increased.•Te found triadic closure operating in both networks accompanied by pre-existing ties translation in network 1. |
Author | van Nassau, Casper S. Dijkstra, Jan Kornelis Snijders, Tom A.B. Diviák, Tomáš |
Author_xml | – sequence: 1 givenname: Tomáš surname: Diviák fullname: Diviák, Tomáš email: tomas.diviak@manchester.ac.uk organization: Department of Sociology, University of Groningen, and Interuniversity Center for Social Science Theory and Methodology, The Netherlands – sequence: 2 givenname: Casper S. surname: van Nassau fullname: van Nassau, Casper S. organization: Research and Documentation Centre, Ministry of Justice and Security, The Netherlands – sequence: 3 givenname: Jan Kornelis surname: Dijkstra fullname: Dijkstra, Jan Kornelis organization: Department of Sociology, University of Groningen, and Interuniversity Center for Social Science Theory and Methodology, The Netherlands – sequence: 4 givenname: Tom A.B. surname: Snijders fullname: Snijders, Tom A.B. organization: Department of Sociology, University of Groningen, and Interuniversity Center for Social Science Theory and Methodology, The Netherlands |
BookMark | eNqNkM1O3DAUha2KSh2mvEEXkbqe1D9JnMwCCc20BYTEAlhbjnPNeBrsYDszmrfHQ7piAayu7vU5R8ffKTqxzgJCPwjOCSbVr20enLIQc4opzXGRY0y-oBmpebOghJATNMOM14uaM_YNnYawxRhXnNQz5NcHK5-MCpm0XdaZ4MchGmeX2V30o4qjl_3rk7Gd2ZluTKvaSPsIIZ2yuHfZeoxqk12bjexMllrsnf-X4nQEnw2uNwqSMi07sMfk8B191bIPcPZ_ztHDn9_3q8vFze3fq9XFzUKxGsdUvNVVAwWrKEhKuWaaFbokrK7qtmmqpuIac123bQtUNZpSVWqVvkiSvClbNkfllDvaQR72su_F4M2T9AdBsDiCE1sxgRNHcAIXIoFLvp-Tb_DueYQQxdaN3qaqgnJaVgXFHCdVMamUdyF40J8NX76xKRPlkUv00vQfmc8nMyRsOwNeBGXAKuiMBxVF58z7AS_DRq47 |
CitedBy_id | crossref_primary_10_3390_math10162929 crossref_primary_10_1007_s13278_022_00947_z crossref_primary_10_1007_s12117_023_09513_1 crossref_primary_10_1007_s11292_023_09563_z crossref_primary_10_1007_s41109_023_00531_0 crossref_primary_10_1371_journal_pone_0298273 crossref_primary_10_1177_14773708231207559 |
Cites_doi | 10.1111/1745-9125.12203 10.1017/CBO9781316212639.004 10.1080/1057610X.2016.1142241 10.1007/s12117-008-9056-7 10.21307/joss-2019-030 10.1093/oxfordhb/9780190228217.013.10 10.1111/j.2044-8317.2011.02022.x 10.1016/j.socnet.2018.11.001 10.1146/annurev.soc.34.040507.134743 10.1007/s13644-015-0240-3 10.1146/annurev.soc.27.1.415 10.1086/228943 10.1086/427322 10.1016/j.socnet.2012.07.004 10.1016/S0378-8733(99)00019-2 10.1126/science.1217330 10.1177/0049124103256096 10.1002/asi.4630270505 10.2307/2577940 10.1016/j.socnet.2009.02.004 10.1177/0049124113494573 10.1016/j.socnet.2006.05.001 10.1038/s41562-017-0290-3 10.1126/science.286.5439.509 10.1177/0003122416650149 10.1080/14742837.2013.832622 10.1103/PhysRevE.69.026113 10.5553/TvC/0165182X2016058002004 10.1080/17440572.2013.787927 10.1080/17440570701362208 10.1016/j.socnet.2017.01.005 |
ContentType | Journal Article |
Copyright | 2022 The Authors Copyright Elsevier Science Ltd. Jul 2022 |
Copyright_xml | – notice: 2022 The Authors – notice: Copyright Elsevier Science Ltd. Jul 2022 |
DBID | 6I. AAFTH AAYXX CITATION 7U4 8BJ BHHNA DWI FQK JBE WZK ADTOC UNPAY |
DOI | 10.1016/j.socnet.2022.04.001 |
DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef Sociological Abstracts (pre-2017) International Bibliography of the Social Sciences (IBSS) Sociological Abstracts Sociological Abstracts International Bibliography of the Social Sciences International Bibliography of the Social Sciences Sociological Abstracts (Ovid) Unpaywall for CDI: Periodical Content Unpaywall |
DatabaseTitle | CrossRef Sociological Abstracts (pre-2017) International Bibliography of the Social Sciences (IBSS) Sociological Abstracts |
DatabaseTitleList | Sociological Abstracts (pre-2017) |
Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Sociology & Social History Social Sciences (General) |
EISSN | 1879-2111 |
EndPage | 374 |
ExternalDocumentID | 10.1016/j.socnet.2022.04.001 10_1016_j_socnet_2022_04_001 S0378873322000430 |
GroupedDBID | --K --M -~X .~1 0R~ 123 1B1 1OL 1RT 1~. 1~5 4.4 457 4G. 53G 5VS 6I. 7-5 71M 8P~ 9JO AACTN AAEDT AAEDW AAFJI AAFTH AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO ABAOU ABFNM ABIVO ABJNI ABMAC ABMMH ABXDB ABYKQ ACAZW ACDAQ ACGFS ACHQT ACNCT ACRLP ADBBV ADEZE ADGUI ADIYS ADMUD AEBSH AEKER AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AIEXJ AIKHN AITUG AJBFU AJOXV AKYCK ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOMHK ARUGR ASPBG AVARZ AVWKF AXJTR AZFZN BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA HMY HVGLF HZ~ IHE J1W K-O KOM LPU M3Y M41 MHUIS MO0 N9A O-L O9- OAUVE OHT OZT P-8 P-9 P2P PC. PRBVW Q38 R2- RIG ROL RPZ SCC SDF SDG SDP SES SEW SPC SPCBC SSB SSO SSS SSW SSZ T5K TN5 UHS WH7 WUQ XSW ~G- AATTM AAXKI AAYWO AAYXX ABWVN ACLOT ACRPL ACVFH ADCNI ADMHG ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD 7U4 8BJ AGCQF BHHNA DWI FQK JBE WZK ADTOC UNPAY |
ID | FETCH-LOGICAL-c380t-21bf69e4362ea227f3f34f513868b996967f07f8bbbe2c9f22c5fc8731ea295b3 |
IEDL.DBID | UNPAY |
ISSN | 0378-8733 1879-2111 |
IngestDate | Wed Aug 20 00:20:31 EDT 2025 Sun Sep 07 03:14:15 EDT 2025 Wed Oct 01 02:15:51 EDT 2025 Thu Apr 24 22:53:44 EDT 2025 Fri Feb 23 02:40:30 EST 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Intervention Network mechanisms Stochastic actor-oriented models Criminal networks Terrorist networks |
Language | English |
License | This is an open access article under the CC BY license. cc-by |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c380t-21bf69e4362ea227f3f34f513868b996967f07f8bbbe2c9f22c5fc8731ea295b3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
OpenAccessLink | https://proxy.k.utb.cz/login?url=https://doi.org/10.1016/j.socnet.2022.04.001 |
PQID | 2725642070 |
PQPubID | 2039991 |
PageCount | 11 |
ParticipantIDs | unpaywall_primary_10_1016_j_socnet_2022_04_001 proquest_journals_2725642070 crossref_primary_10_1016_j_socnet_2022_04_001 crossref_citationtrail_10_1016_j_socnet_2022_04_001 elsevier_sciencedirect_doi_10_1016_j_socnet_2022_04_001 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | July 2022 2022-07-00 20220701 |
PublicationDateYYYYMMDD | 2022-07-01 |
PublicationDate_xml | – month: 07 year: 2022 text: July 2022 |
PublicationDecade | 2020 |
PublicationPlace | Amsterdam |
PublicationPlace_xml | – name: Amsterdam |
PublicationTitle | Social networks |
PublicationYear | 2022 |
Publisher | Elsevier B.V Elsevier Science Ltd |
Publisher_xml | – name: Elsevier B.V – name: Elsevier Science Ltd |
References | Lindenberg (bib34) 2008; 30 Roberts, Everton (bib45) 2011; 12 Stevenson, Crossley (bib55) 2014; 13 Duijn, Kashirin, Sloot (bib21) 2014; 4 Malthaner (bib35) 2018; 12 Snijders, T.A. B. 2013. Network Dynamics. In Sageman (bib47) 2004 Ripley, Tom, Boda, Vörös, Preciado (bib43) 2019 Bright, Koskinen, Malm (bib9) 2018 Robins, Pattison, Woolcock (bib46) 2005; 110 Everton (bib24) 2016; 58 Felson (bib27) 2009; 12 Borgatti, Martin, Linton (bib3) 2002 De Bie, J.L. (2016). How jihadist networks operate: A grounded understanding of changing organizational structures, activities, and involvement mechanisms of jihadist networks in the Netherlands. Newman, Girvan (bib40) 2004; 69 Crossley, Edwards, Harries, Stevenson (bib12) 2012; 34 Krause, Huisman, Snijders (bib32) 2018; no. 1 Huisman, Snijders (bib30) 2003; 32 Morselli, Petit (bib39) 2007; 8 Felson, Marcus. 2006. The Ecosystem for Organized Crime. HEUNI 25th Anniversary Lecture. . Morselli (bib37) 2009; Vol. 8 Schweinberger (bib48) 2012; 65 Solla Price (bib54) 1976; 27 Duxbury, Haynie (bib22) 2019 Waniek, Tomasz, Wooldridge, Rahwan (bib58) 2018; 2 Ouellet, Marie, Martin Bouchard, Mackenzie Hart. 2017. Criminal Collaboration and Risk: The Drivers of Al Qaedas Network Structure before and after 9/11. Social Networks. https://doi.org/10.1016/j.socnet.2017.01.005. Kenney (bib31) 2007 Rivera, Soderstrom, Uzzi (bib44) 2010; 36 Borgatti, Martin (bib2) 1999; 21 Borgatti, Martin, Jeffrey (bib4) 2013 edited by Rafael Wittek, T.A. B. Snijders, and Victor Nee, 252–280. Stanford, California: Stanford Social Sciences, an imprint of Stanford University Press. Morselli, Giguère, Petit (bib38) 2007; 29 Wikström, Bouhana (bib59) 2017 Bouchard, Morselli (bib5) 2014 Diviák, Dijkstra, Snijders (bib19) 2019; 21 Ünal (bib56) 2019; 57 Valente (bib57) 2012; 337 Everton, Cunningham (bib25) 2014 Erickson (bib23) 1981; 60 Bright, David A. 2015. Disrupting and Dismantling Dark Networks. In Illuminating Dark Networks: The Study of Clandestine Groups and Organizations, edited by Luke M. Gerdes, 39–52. Cambridge: Cambridge University Press. Diviák (bib18) 2019 Snijders, van de Bunt, Steglich (bib51) 2010; 32 Csardi, Gabor, Tamas Nepusz. 2006. The igraph Software Package for Complex Network Research. http://igraph.sf.net. Barabási, Albert (bib1) 1999; 286 De Bie, De Poot (bib16) 2016; 39 Hedström (bib29) 2005 Snijders, Tom A.B., and Mark Pickup. 2017. Stochastic Actor Oriented Models for Network Dynamics. The Oxford Handbook of Political Networks, September. Grund, Densley (bib28) 2014 Coleman (bib11) 1988; 94 Snijders, Steglich (bib53) 2015; 44 Prell (bib42) 2011 Bright, Delaney (bib8) 2013; 14 Smith, Papachristos (bib49) 2016; 81 Krebs (bib33) 2002; 24 Boudon (bib6) 1982 Diviák (bib20) 2020 de Bie, de Poot (bib17) 2016; 58 McPherson, Smith-Lovin, Cook (bib36) 2001; 27 Coleman (bib10) 1990 Cunningham, Daniel, Sean Everton, Philip Murphy. 2016. Understanding Dark Networks: A Strategic Framework for the Use of Social Network Analysis. Reprint edition. Lanham: Rowman & Littlefield Publishers. Krebs (10.1016/j.socnet.2022.04.001_bib33) 2002; 24 Waniek (10.1016/j.socnet.2022.04.001_bib58) 2018; 2 De Bie (10.1016/j.socnet.2022.04.001_bib16) 2016; 39 Borgatti (10.1016/j.socnet.2022.04.001_bib3) 2002 Hedström (10.1016/j.socnet.2022.04.001_bib29) 2005 Diviák (10.1016/j.socnet.2022.04.001_bib19) 2019; 21 Coleman (10.1016/j.socnet.2022.04.001_bib10) 1990 Diviák (10.1016/j.socnet.2022.04.001_bib20) 2020 Grund (10.1016/j.socnet.2022.04.001_bib28) 2014 Krause (10.1016/j.socnet.2022.04.001_bib32) 2018; no. 1 Duijn (10.1016/j.socnet.2022.04.001_bib21) 2014; 4 Stevenson (10.1016/j.socnet.2022.04.001_bib55) 2014; 13 Barabási (10.1016/j.socnet.2022.04.001_bib1) 1999; 286 Smith (10.1016/j.socnet.2022.04.001_bib49) 2016; 81 10.1016/j.socnet.2022.04.001_bib26 Sageman (10.1016/j.socnet.2022.04.001_bib47) 2004 Robins (10.1016/j.socnet.2022.04.001_bib46) 2005; 110 McPherson (10.1016/j.socnet.2022.04.001_bib36) 2001; 27 Coleman (10.1016/j.socnet.2022.04.001_bib11) 1988; 94 Wikström (10.1016/j.socnet.2022.04.001_bib59) 2017 Snijders (10.1016/j.socnet.2022.04.001_bib51) 2010; 32 Morselli (10.1016/j.socnet.2022.04.001_bib39) 2007; 8 Newman (10.1016/j.socnet.2022.04.001_bib40) 2004; 69 Borgatti (10.1016/j.socnet.2022.04.001_bib2) 1999; 21 Diviák (10.1016/j.socnet.2022.04.001_bib18) 2019 Solla Price (10.1016/j.socnet.2022.04.001_bib54) 1976; 27 Roberts (10.1016/j.socnet.2022.04.001_bib45) 2011; 12 Borgatti (10.1016/j.socnet.2022.04.001_bib4) 2013 de Bie (10.1016/j.socnet.2022.04.001_bib17) 2016; 58 Rivera (10.1016/j.socnet.2022.04.001_bib44) 2010; 36 10.1016/j.socnet.2022.04.001_bib15 10.1016/j.socnet.2022.04.001_bib14 10.1016/j.socnet.2022.04.001_bib13 Erickson (10.1016/j.socnet.2022.04.001_bib23) 1981; 60 Morselli (10.1016/j.socnet.2022.04.001_bib37) 2009; Vol. 8 Lindenberg (10.1016/j.socnet.2022.04.001_bib34) 2008; 30 10.1016/j.socnet.2022.04.001_bib52 Everton (10.1016/j.socnet.2022.04.001_bib24) 2016; 58 10.1016/j.socnet.2022.04.001_bib50 Valente (10.1016/j.socnet.2022.04.001_bib57) 2012; 337 Bright (10.1016/j.socnet.2022.04.001_bib9) 2018 Kenney (10.1016/j.socnet.2022.04.001_bib31) 2007 Duxbury (10.1016/j.socnet.2022.04.001_bib22) 2019 Schweinberger (10.1016/j.socnet.2022.04.001_bib48) 2012; 65 Bright (10.1016/j.socnet.2022.04.001_bib8) 2013; 14 Boudon (10.1016/j.socnet.2022.04.001_bib6) 1982 Everton (10.1016/j.socnet.2022.04.001_bib25) 2014 Prell (10.1016/j.socnet.2022.04.001_bib42) 2011 Malthaner (10.1016/j.socnet.2022.04.001_bib35) 2018; 12 Crossley (10.1016/j.socnet.2022.04.001_bib12) 2012; 34 10.1016/j.socnet.2022.04.001_bib41 Ünal (10.1016/j.socnet.2022.04.001_bib56) 2019; 57 Bouchard (10.1016/j.socnet.2022.04.001_bib5) 2014 Morselli (10.1016/j.socnet.2022.04.001_bib38) 2007; 29 Ripley (10.1016/j.socnet.2022.04.001_bib43) 2019 Huisman (10.1016/j.socnet.2022.04.001_bib30) 2003; 32 Snijders (10.1016/j.socnet.2022.04.001_bib53) 2015; 44 Felson (10.1016/j.socnet.2022.04.001_bib27) 2009; 12 10.1016/j.socnet.2022.04.001_bib7 |
References_xml | – start-page: 288 year: 2014 end-page: 302 ident: bib5 article-title: Opportunistic Structures of Organized Crime publication-title: The Oxford Handbook of Organized Crime, edited by Letizia Paoli – year: 2019 ident: bib18 article-title: Key aspects of covert networks data collection: problems, challenges, and opportunities publication-title: Soc. Netw. – year: 2005 ident: bib29 publication-title: Dissecting the Social: On the Principles of Analytical Sociology – year: 2014 ident: bib28 article-title: Ethnic homophily and triad closure: mapping internal gang structure using exponential random graph models publication-title: J. Contemp. Crim. Justice, Oct. – volume: 12 year: 2018 ident: bib35 article-title: Spaces, Ties, and Agency: The Formation of Radical Networks publication-title: Perspect. Terror. – volume: 286 start-page: 509 year: 1999 end-page: 512 ident: bib1 article-title: Emergence of scaling in random networks publication-title: Science – year: 2004 ident: bib47 publication-title: Understanding Terror Networks – year: 2020 ident: bib20 publication-title: Criminal networks: Actors, mechanisms, and structures – reference: De Bie, J.L. (2016). How jihadist networks operate: A grounded understanding of changing organizational structures, activities, and involvement mechanisms of jihadist networks in the Netherlands. – volume: 21 start-page: 1 year: 2019 end-page: 23 ident: bib19 article-title: Poisonous connections: a case study on a czech counterfeit alcohol distribution network publication-title: Glob. Crime. – volume: 32 start-page: 253 year: 2003 end-page: 287 ident: bib30 article-title: Statistical analysis of longitudinal network data with changing composition publication-title: Sociol. Methods Res. – volume: 27 start-page: 292 year: 1976 end-page: 306 ident: bib54 article-title: A general theory of bibliometric and other cumulative advantage processes publication-title: J. Am. Soc. Inf. Sci. – volume: 81 start-page: 617 year: 2016 end-page: 643 ident: bib49 article-title: Trust thy crooked neighbor multiplexity in chicago organized crime networks publication-title: Am. Sociol. Rev. – volume: 29 start-page: 143 year: 2007 end-page: 153 ident: bib38 article-title: The Efficiency/Security Trade-off in Criminal Networks publication-title: Soc. Netw. – year: 2013 ident: bib4 publication-title: Analyzing Social Networks – volume: 36 start-page: 91 year: 2010 end-page: 115 ident: bib44 article-title: Dynamics of dyads in social networks: assortative, relational, and proximity mechanisms publication-title: Annu. Rev. Sociol. – year: 2002 ident: bib3 article-title: UCINET 6 for Windows: Software for Social Network Analysis – volume: 60 start-page: 188 year: 1981 end-page: 210 ident: bib23 article-title: Secret societies and social structure publication-title: Soc. Forces – year: 2007 ident: bib31 article-title: From Pablo to Osama: Trafficking and Terrorist publication-title: Networks, Government Bureaucracies, and Competitive Adaptation – volume: 69 year: 2004 ident: bib40 article-title: Finding and evaluating community structure in networks publication-title: Phys. Rev. E – reference: Ouellet, Marie, Martin Bouchard, Mackenzie Hart. 2017. Criminal Collaboration and Risk: The Drivers of Al Qaedas Network Structure before and after 9/11. Social Networks. https://doi.org/10.1016/j.socnet.2017.01.005. – volume: 337 start-page: 49 year: 2012 end-page: 53 ident: bib57 article-title: Network interventions publication-title: Science – volume: 94 start-page: S95 year: 1988 end-page: S120 ident: bib11 article-title: Social capital in the creation of human capital publication-title: Am. J. Sociol. – start-page: 287 year: 2014 end-page: 309 ident: bib25 article-title: Terrorist Network Adaptation to a Changing Environment publication-title: In – reference: Felson, Marcus. 2006. The Ecosystem for Organized Crime. HEUNI 25th Anniversary Lecture. – volume: 110 year: 2005 ident: bib46 article-title: Small and other worlds: global network structures from local processes publication-title: Am. J. Sociol. – year: 2018 ident: bib9 article-title: Illicit network dynamics: the formation and evolution of a drug trafficking network publication-title: J. Quant. Criminol. – volume: 24 start-page: 43 year: 2002 end-page: 52 ident: bib33 article-title: Mapping networks of terrorist cells publication-title: Connections – volume: 44 start-page: 222 year: 2015 end-page: 271 ident: bib53 article-title: Representing micro–macro linkages by actor-based dynamic network models publication-title: Sociol. Methods Res. – volume: 34 start-page: 634 year: 2012 end-page: 644 ident: bib12 article-title: Covert social movement networks and the secrecy-efficiency trade off: The case of the UK Suffragettes (1906–1914) publication-title: Soc. Netw. – volume: 58 start-page: 191 year: 2016 end-page: 217 ident: bib24 article-title: Social networks and religious violence publication-title: Rev. Relig. Res. – volume: 12 start-page: 159 year: 2009 end-page: 165 ident: bib27 article-title: The natural history of extended co-offending publication-title: Trends Organ. Crime. – volume: 14 start-page: 238 year: 2013 end-page: 260 ident: bib8 article-title: Evolution of a drug trafficking network: mapping changes in network structure and function across time publication-title: Glob. Crime. – reference: Snijders, T.A. B. 2013. Network Dynamics. In – reference: Csardi, Gabor, Tamas Nepusz. 2006. The igraph Software Package for Complex Network Research. http://igraph.sf.net. – volume: no. 1 start-page: 33 year: 2018 end-page: 57 ident: bib32 article-title: Multiple imputation for longitudinal network data publication-title: Ital. J. Appl. Stat. – volume: 2 start-page: 139 year: 2018 end-page: 147 ident: bib58 article-title: Hiding Individuals and Communities in a Social Network publication-title: Nat. Hum. Behav. – year: 2019 ident: bib43 article-title: Manual for SIENA Version 4.0 (Version February 21, 2019) – volume: Vol. 8 year: 2009 ident: bib37 article-title: Inside Criminal Networks publication-title: Studies of Organized Crime. New York, NY – volume: 27 start-page: 415 year: 2001 end-page: 444 ident: bib36 article-title: Birds of a Feather: Homophily in Social Networks publication-title: Annu. Rev. Sociol. – volume: 8 start-page: 109 year: 2007 end-page: 130 ident: bib39 article-title: Law-enforcement disruption of a drug importation network publication-title: Glob. Crime. – volume: 13 start-page: 70 year: 2014 end-page: 91 ident: bib55 article-title: Change in covert social movement networks: the “inner circle” of the provisional irish republican army publication-title: Soc. Mov. Stud. – volume: 30 year: 2008 ident: bib34 article-title: Social rationality, semi-modularity and goal-framing: what is it all about? publication-title: Anal. Krit. – year: 1990 ident: bib10 article-title: Foundations of Social Theory – volume: 12 start-page: 1 year: 2011 end-page: 32 ident: bib45 article-title: Strategies for combating dark networks publication-title: J. Soc. Struct. – volume: 58 start-page: 54 year: 2016 end-page: 75 ident: bib17 article-title: Organisatiestructuren van jihadistischenetwerken in Nederland: Verschillen en overeenkomsten tussen 2000 en 2013 publication-title: Tijdschrift voor Criminologie – reference: , edited by Rafael Wittek, T.A. B. Snijders, and Victor Nee, 252–280. Stanford, California: Stanford Social Sciences, an imprint of Stanford University Press. – reference: Snijders, Tom A.B., and Mark Pickup. 2017. Stochastic Actor Oriented Models for Network Dynamics. The Oxford Handbook of Political Networks, September. – volume: 57 start-page: 1 year: 2019 end-page: 17 ident: bib56 article-title: Do terrorists make a difference in criminal networks? An empirical analysis on illicit drug and narco-terror networks in their prioritization between security and efficiency publication-title: Soc. Netw. – reference: . – reference: Cunningham, Daniel, Sean Everton, Philip Murphy. 2016. Understanding Dark Networks: A Strategic Framework for the Use of Social Network Analysis. Reprint edition. Lanham: Rowman & Littlefield Publishers. – volume: 4 year: 2014 ident: bib21 article-title: The relative ineffectiveness of criminal network disruption publication-title: Sci. Rep. – start-page: 175 year: 2017 end-page: 186 ident: bib59 article-title: Analyzing Radicalization and Terrorism: A Situational Action Theory publication-title: The Handbook of the Criminology of Terrorism – volume: 39 start-page: 580 year: 2016 end-page: 601 ident: bib16 article-title: Studying police files with grounded theory methods to understand publication-title: Stud. Confl. Terror. – year: 2019 ident: bib22 article-title: Criminal network security: an agent-based approach to evaluating network resilience publication-title: Criminol. – year: 2011 ident: bib42 article-title: Social Network Analysis – year: 1982 ident: bib6 article-title: The Unintended Consequences of Social Action – volume: 65 start-page: 263 year: 2012 end-page: 281 ident: bib48 article-title: Statistical Modelling of Network Panel Data: Goodness of Fit: Statistical Modelling of Network Panel Data: Goodness of Fit publication-title: Br. J. Math. Stat. Psychol. – reference: Bright, David A. 2015. Disrupting and Dismantling Dark Networks. In Illuminating Dark Networks: The Study of Clandestine Groups and Organizations, edited by Luke M. Gerdes, 39–52. Cambridge: Cambridge University Press. – volume: 32 start-page: 44 year: 2010 end-page: 60 ident: bib51 article-title: Introduction to Stochastic Actor-Based Models for Network Dynamics publication-title: Soc. Netw., Dyn. Soc. Netw. – volume: 21 start-page: 375 year: 1999 end-page: 395 ident: bib2 article-title: Models of core/periphery structures publication-title: Soc. Netw. – year: 2002 ident: 10.1016/j.socnet.2022.04.001_bib3 – ident: 10.1016/j.socnet.2022.04.001_bib15 – year: 2019 ident: 10.1016/j.socnet.2022.04.001_bib22 article-title: Criminal network security: an agent-based approach to evaluating network resilience publication-title: Criminol. doi: 10.1111/1745-9125.12203 – volume: no. 1 start-page: 33 issue: April year: 2018 ident: 10.1016/j.socnet.2022.04.001_bib32 article-title: Multiple imputation for longitudinal network data publication-title: Ital. J. Appl. Stat. – ident: 10.1016/j.socnet.2022.04.001_bib7 doi: 10.1017/CBO9781316212639.004 – volume: 39 start-page: 580 issue: 7–8 year: 2016 ident: 10.1016/j.socnet.2022.04.001_bib16 article-title: Studying police files with grounded theory methods to understand Jihadist networks publication-title: Stud. Confl. Terror. doi: 10.1080/1057610X.2016.1142241 – volume: 12 start-page: 159 issue: 2 year: 2009 ident: 10.1016/j.socnet.2022.04.001_bib27 article-title: The natural history of extended co-offending publication-title: Trends Organ. Crime. doi: 10.1007/s12117-008-9056-7 – volume: 12 start-page: 1 issue: 1 year: 2011 ident: 10.1016/j.socnet.2022.04.001_bib45 article-title: Strategies for combating dark networks publication-title: J. Soc. Struct. doi: 10.21307/joss-2019-030 – ident: 10.1016/j.socnet.2022.04.001_bib52 doi: 10.1093/oxfordhb/9780190228217.013.10 – volume: 21 start-page: 1 issue: 1 year: 2019 ident: 10.1016/j.socnet.2022.04.001_bib19 article-title: Poisonous connections: a case study on a czech counterfeit alcohol distribution network publication-title: Glob. Crime. – volume: 65 start-page: 263 issue: 2 year: 2012 ident: 10.1016/j.socnet.2022.04.001_bib48 article-title: Statistical Modelling of Network Panel Data: Goodness of Fit: Statistical Modelling of Network Panel Data: Goodness of Fit publication-title: Br. J. Math. Stat. Psychol. doi: 10.1111/j.2044-8317.2011.02022.x – volume: 57 start-page: 1 issue: May year: 2019 ident: 10.1016/j.socnet.2022.04.001_bib56 article-title: Do terrorists make a difference in criminal networks? An empirical analysis on illicit drug and narco-terror networks in their prioritization between security and efficiency publication-title: Soc. Netw. doi: 10.1016/j.socnet.2018.11.001 – start-page: 288 year: 2014 ident: 10.1016/j.socnet.2022.04.001_bib5 article-title: Opportunistic Structures of Organized Crime – year: 2020 ident: 10.1016/j.socnet.2022.04.001_bib20 – volume: 36 start-page: 91 issue: 1 year: 2010 ident: 10.1016/j.socnet.2022.04.001_bib44 article-title: Dynamics of dyads in social networks: assortative, relational, and proximity mechanisms publication-title: Annu. Rev. Sociol. doi: 10.1146/annurev.soc.34.040507.134743 – start-page: 175 year: 2017 ident: 10.1016/j.socnet.2022.04.001_bib59 article-title: Analyzing Radicalization and Terrorism: A Situational Action Theory – volume: 58 start-page: 191 issue: 2 year: 2016 ident: 10.1016/j.socnet.2022.04.001_bib24 article-title: Social networks and religious violence publication-title: Rev. Relig. Res. doi: 10.1007/s13644-015-0240-3 – volume: 27 start-page: 415 year: 2001 ident: 10.1016/j.socnet.2022.04.001_bib36 article-title: Birds of a Feather: Homophily in Social Networks publication-title: Annu. Rev. Sociol. doi: 10.1146/annurev.soc.27.1.415 – year: 2011 ident: 10.1016/j.socnet.2022.04.001_bib42 – volume: 94 start-page: S95 year: 1988 ident: 10.1016/j.socnet.2022.04.001_bib11 article-title: Social capital in the creation of human capital publication-title: Am. J. Sociol. doi: 10.1086/228943 – year: 1990 ident: 10.1016/j.socnet.2022.04.001_bib10 – year: 2018 ident: 10.1016/j.socnet.2022.04.001_bib9 article-title: Illicit network dynamics: the formation and evolution of a drug trafficking network publication-title: J. Quant. Criminol. – ident: 10.1016/j.socnet.2022.04.001_bib14 – volume: 110 issue: 4 year: 2005 ident: 10.1016/j.socnet.2022.04.001_bib46 article-title: Small and other worlds: global network structures from local processes publication-title: Am. J. Sociol. doi: 10.1086/427322 – year: 2007 ident: 10.1016/j.socnet.2022.04.001_bib31 article-title: From Pablo to Osama: Trafficking and Terrorist – volume: 34 start-page: 634 issue: 4 year: 2012 ident: 10.1016/j.socnet.2022.04.001_bib12 article-title: Covert social movement networks and the secrecy-efficiency trade off: The case of the UK Suffragettes (1906–1914) publication-title: Soc. Netw. doi: 10.1016/j.socnet.2012.07.004 – year: 2019 ident: 10.1016/j.socnet.2022.04.001_bib18 article-title: Key aspects of covert networks data collection: problems, challenges, and opportunities publication-title: Soc. Netw. – year: 1982 ident: 10.1016/j.socnet.2022.04.001_bib6 – volume: 21 start-page: 375 issue: 4 year: 1999 ident: 10.1016/j.socnet.2022.04.001_bib2 article-title: Models of core/periphery structures publication-title: Soc. Netw. doi: 10.1016/S0378-8733(99)00019-2 – volume: 337 start-page: 49 issue: 6090 year: 2012 ident: 10.1016/j.socnet.2022.04.001_bib57 article-title: Network interventions publication-title: Science doi: 10.1126/science.1217330 – volume: 12 issue: 2 year: 2018 ident: 10.1016/j.socnet.2022.04.001_bib35 article-title: Spaces, Ties, and Agency: The Formation of Radical Networks publication-title: Perspect. Terror. – volume: 32 start-page: 253 issue: 2 year: 2003 ident: 10.1016/j.socnet.2022.04.001_bib30 article-title: Statistical analysis of longitudinal network data with changing composition publication-title: Sociol. Methods Res. doi: 10.1177/0049124103256096 – volume: 27 start-page: 292 issue: 5 year: 1976 ident: 10.1016/j.socnet.2022.04.001_bib54 article-title: A general theory of bibliometric and other cumulative advantage processes publication-title: J. Am. Soc. Inf. Sci. doi: 10.1002/asi.4630270505 – volume: 60 start-page: 188 issue: 1 year: 1981 ident: 10.1016/j.socnet.2022.04.001_bib23 article-title: Secret societies and social structure publication-title: Soc. Forces doi: 10.2307/2577940 – volume: 32 start-page: 44 issue: 1 year: 2010 ident: 10.1016/j.socnet.2022.04.001_bib51 article-title: Introduction to Stochastic Actor-Based Models for Network Dynamics publication-title: Soc. Netw., Dyn. Soc. Netw. doi: 10.1016/j.socnet.2009.02.004 – volume: 44 start-page: 222 issue: 2 year: 2015 ident: 10.1016/j.socnet.2022.04.001_bib53 article-title: Representing micro–macro linkages by actor-based dynamic network models publication-title: Sociol. Methods Res. doi: 10.1177/0049124113494573 – volume: 30 issue: 2 year: 2008 ident: 10.1016/j.socnet.2022.04.001_bib34 article-title: Social rationality, semi-modularity and goal-framing: what is it all about? publication-title: Anal. Krit. – volume: 29 start-page: 143 issue: 1 year: 2007 ident: 10.1016/j.socnet.2022.04.001_bib38 article-title: The Efficiency/Security Trade-off in Criminal Networks publication-title: Soc. Netw. doi: 10.1016/j.socnet.2006.05.001 – ident: 10.1016/j.socnet.2022.04.001_bib13 – volume: Vol. 8 year: 2009 ident: 10.1016/j.socnet.2022.04.001_bib37 article-title: Inside Criminal Networks – volume: 2 start-page: 139 issue: 2 year: 2018 ident: 10.1016/j.socnet.2022.04.001_bib58 article-title: Hiding Individuals and Communities in a Social Network publication-title: Nat. Hum. Behav. doi: 10.1038/s41562-017-0290-3 – year: 2013 ident: 10.1016/j.socnet.2022.04.001_bib4 – year: 2005 ident: 10.1016/j.socnet.2022.04.001_bib29 – volume: 286 start-page: 509 issue: 5439 year: 1999 ident: 10.1016/j.socnet.2022.04.001_bib1 article-title: Emergence of scaling in random networks publication-title: Science doi: 10.1126/science.286.5439.509 – volume: 24 start-page: 43 issue: 3 year: 2002 ident: 10.1016/j.socnet.2022.04.001_bib33 article-title: Mapping networks of terrorist cells publication-title: Connections – volume: 81 start-page: 617 issue: 4 year: 2016 ident: 10.1016/j.socnet.2022.04.001_bib49 article-title: Trust thy crooked neighbor multiplexity in chicago organized crime networks publication-title: Am. Sociol. Rev. doi: 10.1177/0003122416650149 – start-page: 287 year: 2014 ident: 10.1016/j.socnet.2022.04.001_bib25 article-title: Terrorist Network Adaptation to a Changing Environment – year: 2004 ident: 10.1016/j.socnet.2022.04.001_bib47 – volume: 13 start-page: 70 issue: 1 year: 2014 ident: 10.1016/j.socnet.2022.04.001_bib55 article-title: Change in covert social movement networks: the “inner circle” of the provisional irish republican army publication-title: Soc. Mov. Stud. doi: 10.1080/14742837.2013.832622 – volume: 69 issue: 2 year: 2004 ident: 10.1016/j.socnet.2022.04.001_bib40 article-title: Finding and evaluating community structure in networks publication-title: Phys. Rev. E doi: 10.1103/PhysRevE.69.026113 – volume: 58 start-page: 54 issue: 2 year: 2016 ident: 10.1016/j.socnet.2022.04.001_bib17 article-title: Organisatiestructuren van jihadistischenetwerken in Nederland: Verschillen en overeenkomsten tussen 2000 en 2013 publication-title: Tijdschrift voor Criminologie doi: 10.5553/TvC/0165182X2016058002004 – volume: 14 start-page: 238 issue: 2/3 year: 2013 ident: 10.1016/j.socnet.2022.04.001_bib8 article-title: Evolution of a drug trafficking network: mapping changes in network structure and function across time publication-title: Glob. Crime. doi: 10.1080/17440572.2013.787927 – year: 2014 ident: 10.1016/j.socnet.2022.04.001_bib28 article-title: Ethnic homophily and triad closure: mapping internal gang structure using exponential random graph models publication-title: J. Contemp. Crim. Justice, Oct. – ident: 10.1016/j.socnet.2022.04.001_bib26 – ident: 10.1016/j.socnet.2022.04.001_bib50 – volume: 8 start-page: 109 issue: 2 year: 2007 ident: 10.1016/j.socnet.2022.04.001_bib39 article-title: Law-enforcement disruption of a drug importation network publication-title: Glob. Crime. doi: 10.1080/17440570701362208 – ident: 10.1016/j.socnet.2022.04.001_bib41 doi: 10.1016/j.socnet.2017.01.005 – volume: 4 issue: February year: 2014 ident: 10.1016/j.socnet.2022.04.001_bib21 article-title: The relative ineffectiveness of criminal network disruption publication-title: Sci. Rep. – year: 2019 ident: 10.1016/j.socnet.2022.04.001_bib43 |
SSID | ssj0006718 |
Score | 2.4148066 |
Snippet | Longitudinal studies of criminal networks are rare yet necessary to assess the adaptation and recovery of criminal networks after disruptions. We study the... |
SourceID | unpaywall proquest crossref elsevier |
SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 364 |
SubjectTerms | Center and periphery Criminal law Criminal networks Disruption Individual differences Intervention Law enforcement Longitudinal studies Modularity Network mechanisms Police Stochastic actor-oriented models Stochastic models Structural models Terrorist networks |
SummonAdditionalLinks | – databaseName: ScienceDirect Freedom Collection 2013 dbid: .~1 link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PS8MwFA7Di15Ep-J0Sg4ieohrk7ZJvclUZKCXKXgLSZtgZdRhN8SLf7v51TlBUDw2fS0h7-W91_R73wPgSOooErmIEY0ERUmZEpSnKUaYFFozLZhwRxe3d9nNQzJ6TB87YNjWwlhYZfD93qc7bx1GBmE1B9OqGowjS4VOibFI9z_Lfrdb9i9j02cfXzCPjLozPiuMrHRbPucwXmYBamURlRg7wtPQGuaH8LSUfq7O66l4fxOTyVIkut4A6yGFhBd-lpugo-ou6Pk6Wxj2agNPAqH0aRfsLapS4DEMcp4e5H0LvF76nvQNFHUJy6p5nTsvcg7HjlrW0nK4W9WidAv6auHGDMHZ2wu8nBvVw1H1JMoK1h5Xbl5nu49D2wSiULBaglY22-Dh-up-eINCIwZUEBbNEI6lznKVmGCnBMZUE00SncaEZUzmll-H6ohqJqVUuMg1xoWFhlESG_E8lWQHrNQvtdoFsCiNqGKSxLFMYlWIVLNSkTQppWJKZT1A2vXnRWApt80yJryFoz1zrzVutcajxKLyegAtnpp6lo5f5GmrWv7N2rgJJL882W8tgYfd3nBMTeKYYOM9e-BsYR1_msnev2eyD9bslYcO98GKsQl1YBKkmTx0O-ATJEYQ6Q priority: 102 providerName: Elsevier |
Title | Dynamics and disruption: Structural and individual changes in two Dutch Jihadi networks after police interventions |
URI | https://dx.doi.org/10.1016/j.socnet.2022.04.001 https://www.proquest.com/docview/2725642070 https://doi.org/10.1016/j.socnet.2022.04.001 |
UnpaywallVersion | publishedVersion |
Volume | 70 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
journalDatabaseRights | – providerCode: PRVESC databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier) customDbUrl: eissn: 1879-2111 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0006718 issn: 1879-2111 databaseCode: GBLVA dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier ScienceDirect Freedom Collection Journals customDbUrl: eissn: 1879-2111 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0006718 issn: 1879-2111 databaseCode: ACRLP dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals [SCFCJ] customDbUrl: eissn: 1879-2111 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0006718 issn: 1879-2111 databaseCode: AIKHN dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: ScienceDirect Freedom Collection 2013 customDbUrl: eissn: 1879-2111 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0006718 issn: 1879-2111 databaseCode: .~1 dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVLSH databaseName: Elsevier Journals customDbUrl: mediaType: online eissn: 1879-2111 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0006718 issn: 1879-2111 databaseCode: AKRWK dateStart: 19950101 isFulltext: true providerName: Library Specific Holdings |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1RT9swED5B-7An2NimFbHKD2japKVK7CR29laNocJENQkqsSfLdmwRqAIirRB72G-fHTtVh4SA1-RsOb6zfRd_9x3AvjRxLAqRRDQWNErLjERFluEIE2UMM4KJ9tfFyTSfzNLj8-x8A752uTD_3d-3OCw7SBuk20gO45aU1CVr9XN3ndSD_mz6a_y7vSiwwRCjbeV4Vz87snFN0mXKPdLNYyfRmqf5alnfiPs7MZ-vHTqH23DSDddjTa5Gy4UcqT8PmByf-z2vYSt4n2jszeUNbOh6BwY-RReFZd6gz4GL-ssO7K4SWtAnFOQ8s8j9W7g98OXsGyTqEpVVc7tsN6Bv6LRlpXWMHu2rapX1hXyicWMfocXdNTpYWqtBx9WFKCtUe0i67c4VLkeufoTSqFpDZTbvYHb44-z7JAo1HCJFWLywepAmL3Rqz0ktMKaGGJKaLCEsZ7Jw1DzUxNQwKaXGqjAYK4cqoySx4kUmyXvo1de1_gBIlVZUM0mSRKaJViIzrNQkS0upmdb5AEinT64CwbmrszHnHZLtkvvJ527yeZw6QN8AolWrG0_w8YQ87UyFByfFOx_cqvqJlnudZfGwUTQcU-tzpthuvAMYraztWSPZfWmDPehZ7euP1otayCFsjv4mQ-iPj35OpsOwlP4BvHod8g |
linkProvider | Unpaywall |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1La9wwEBZhc0gvJU1bunm0OpTSHtS19bDk3kIebF57SQK5CcmWqMviLPEuIf8-etlsoZDQqzUyQjOaGcvffAPAV22zTJUqRzxTHNGaEVQyhhEmlbXCKqHC1cXVrJje0vM7drcBjvpaGA-rTL4_-vTgrdOTSdrNyaJpJteZp0LnxFlk-J_lvts3KXM-eQQ2D88uprPBIRc8XPN5eeQn9BV0Aebl9qA1HlSJceA8Td1h_hGh1jLQrVW7UE-Paj5fC0an2-BtyiLhYVzoO7Bh2h0wjqW2MB3XDn5PnNI_dsDuUJgCv8EkFxlCnt6Dh-PYlr6Dqq1h3XQPq-BIfsHrwC7rmTnCUDNUb8FYMNy5R3D5eA-PV0778Lz5reoGthFa7l7nG5BD3weiMrBZQ1d2H8Dt6cnN0RSlXgyoIiJbIpxrW5SGunhnFMbcEkuoZTkRhdClp9jhNuNWaK0NrkqLceXRYZzkTrxkmnwEo_a-NZ8ArGonaoQmea5pbirFrKgNYbTWRhhTjAHp919Wiajc98uYyx6R9kdGrUmvNZlRD8wbAzTMWkSijhfkea9a-ZfBSRdLXpi531uCTAe-k5i73JFi50DH4OdgHa9aye5_r-QL2JreXF3Ky7PZxR5440cikngfjJx9mAOXLy3153QengHxsBUi |
linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1RSxwxEB7kfOiTtlbpiZY8lFKhe-wmu5ts36RWRFAK7YE-hSSb0NVjFfcOsb_eySZ7nAXRvu5OQjYzSWY233wD8Em7NFWVyhKeKp7kdcGSqihoQplxTjglVP_r4uy8PJnmpxfFxRp8HXJhntzf9zgsHCQG6RjJUdqTkvpkrfXSXyeNYH16_vPwsr8owGBI8L5yvK-fnWBckw2Zcs9089xJtOJpvlm0t-rhXs1mK4fO8SacDcMNWJPryWKuJ-bvP0yOr_2et7ARvU9yGMzlHazZdgvGIUWXxGXekS-Ri_pgC3aXCS3kM4lygVnk4T3cHYVy9h1RbU3qprtb9BvQN_KrZ6X1jB79q2aZ9UVConGHj8j8_oYcLdBqyGnzR9UNaQMkHbvzhcuJrx9hLGlWUJndNkyPf_z-fpLEGg6JYSKdox60Kyub4zlpFaXcMcdyV2RMlEJXnpqHu5Q7obW21FSOUuNRZZxlKF4Vmu3AqL1p7QcgpkZRKzTLMp1n1qjCidqyIq-1FdaWY2CDPqWJBOe-zsZMDki2KxkmX_rJl2nuAX1jSJatbgPBxwvyfDAVGZ2U4HxIVPULLfcGy5Jxo-gk5ehz5hQ33jFMltb2qpHs_m-DPRih9u0-elFz_TEunkcwehtm |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Dynamics+and+disruption%3A+Structural+and+individual+changes+in+two+Dutch+Jihadi+networks+after+police+interventions&rft.jtitle=Social+networks&rft.au=Divi%C3%A1k%2C+Tom%C3%A1%C5%A1&rft.au=van+Nassau%2C+Casper+S.&rft.au=Dijkstra%2C+Jan+Kornelis&rft.au=Snijders%2C+Tom+A.B.&rft.date=2022-07-01&rft.issn=0378-8733&rft.volume=70&rft.spage=364&rft.epage=374&rft_id=info:doi/10.1016%2Fj.socnet.2022.04.001&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_socnet_2022_04_001 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0378-8733&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0378-8733&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0378-8733&client=summon |