{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T10:23:26Z","timestamp":1772792606430,"version":"3.50.1"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319653396","type":"print"},{"value":"9783319653402","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65340-2_2","type":"book-chapter","created":{"date-parts":[[2017,8,8]],"date-time":"2017-08-08T11:49:29Z","timestamp":1502192969000},"page":"15-27","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Agents Shaping Networks Shaping Agents: Integrating Social Network Analysis and Agent-Based Modeling in Computational Crime Research"],"prefix":"10.1007","author":[{"given":"Nicola","family":"Lettieri","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Altamura","sequence":"additional","affiliation":[]},{"given":"Delfina","family":"Malandrino","sequence":"additional","affiliation":[]},{"given":"Valentina","family":"Punzo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,9]]},"reference":[{"key":"2_CR1","unstructured":"Akers, R.L.: Deviant behavior: a social learning approach (Wadsworth, Belmont, 1977). An upper level text written from a cultural transmission perspective. Evaluates major theories of deviance and examines a wide variety of deviant activities (1973)"},{"key":"2_CR2","unstructured":"Balke, T., Cranefield, S., Di Tosto, G., Mahmoud, S., Paolucci, M., Savarimuthu, B.T.R., Verhagen, H.: Simulation and NorMAS. In: Dagstuhl Follow-Ups, vol. 4. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik (2013)"},{"issue":"5","key":"2_CR3","doi-asserted-by":"publisher","first-page":"1251","DOI":"10.1890\/1051-0761(2000)010[1251:ROTEKA]2.0.CO;2","volume":"10","author":"F Berkes","year":"2000","unstructured":"Berkes, F., Colding, J., Folke, C.: Rediscovery of traditional ecological knowledge as adaptive management. Ecol. Appl. 10(5), 1251\u20131262 (2000)","journal-title":"Ecol. Appl."},{"key":"2_CR4","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780198242796.001.0001","volume-title":"Individualism in Social Science: Forms and Limits of a Methodology","author":"R Bhargava","year":"1992","unstructured":"Bhargava, R.: Individualism in Social Science: Forms and Limits of a Methodology. Clarendon Press, Oxford (1992)"},{"issue":"1","key":"2_CR5","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1186\/s40163-017-0063-3","volume":"6","author":"G Bichler","year":"2017","unstructured":"Bichler, G., Malm, A., Cooper, T.: Drug supply networks: a systematic review of the organizational structure of illicit drug trade. Crime Sci. 6(1), 2 (2017)","journal-title":"Crime Sci."},{"issue":"1","key":"2_CR6","first-page":"51","volume":"3","author":"T Bosse","year":"2010","unstructured":"Bosse, T., Elffers, H., Gerritsen, C., et al.: Simulating the dynamical interaction of offenders, targets and guardians. Crime Patterns Anal. 3(1), 51\u201366 (2010)","journal-title":"Crime Patterns Anal."},{"key":"2_CR7","unstructured":"Bosse, T., Gerritsen, C., Klein, M.C.: Agent-based simulation of social learning in criminology. In: ICAART, pp. 5\u201313 (2009)"},{"key":"2_CR8","unstructured":"Brantingham, P., Groff, E.: The future of agent-based simulation in environmental criminology. American Society of Criminology, Nashville (2004)"},{"issue":"3","key":"2_CR9","doi-asserted-by":"publisher","first-page":"939","DOI":"10.1111\/j.0020-6598.2004.00292.x","volume":"45","author":"A Calv\u00f3-Armengol","year":"2004","unstructured":"Calv\u00f3-Armengol, A., Zenou, Y.: Social networks and crime decisions: the role of social structure in facilitating delinquent behavior. Int. Econ. Rev. 45(3), 939\u2013958 (2004)","journal-title":"Int. Econ. Rev."},{"issue":"2","key":"2_CR10","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1103\/RevModPhys.81.591","volume":"81","author":"C Castellano","year":"2009","unstructured":"Castellano, C., Fortunato, S., Loreto, V.: Statistical physics of social dynamics. Rev. Modern Phys. 81(2), 591 (2009)","journal-title":"Rev. Modern Phys."},{"issue":"3","key":"2_CR11","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1002\/wics.95","volume":"2","author":"C Cioffi-Revilla","year":"2010","unstructured":"Cioffi-Revilla, C.: Computational social science. Wiley Interdiscip. Rev.: Comput. Stat. 2(3), 259\u2013271 (2010)","journal-title":"Wiley Interdiscip. Rev.: Comput. Stat."},{"key":"2_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-5661-1","volume-title":"Introduction to Computational Social Science: Principles and Applications","author":"C Cioffi-Revilla","year":"2013","unstructured":"Cioffi-Revilla, C.: Introduction to Computational Social Science: Principles and Applications. Springer Science & Business Media, London (2013). doi:10.1007\/978-1-4471-5661-1"},{"key":"2_CR13","doi-asserted-by":"publisher","first-page":"588","DOI":"10.2307\/2094589","volume":"44","author":"LE Cohen","year":"1979","unstructured":"Cohen, L.E., Felson, M.: Social change and crime rate trends: a routine activity approach. Am. Sociol. Rev. 44, 588\u2013608 (1979)","journal-title":"Am. Sociol. Rev."},{"key":"2_CR14","doi-asserted-by":"publisher","first-page":"668","DOI":"10.3389\/fpsyg.2014.00668","volume":"5","author":"R Conte","year":"2014","unstructured":"Conte, R., Paolucci, M.: On agent based modelling and computational social science. Front. Psychol. 5, 668 (2014)","journal-title":"Front. Psychol."},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"De Prisco, R., Esposito, A., Lettieri, N., Malandrino, D., Pirozzi, D., Zaccagnino, G., Zaccagnino, R.: Music plagiarism at a glance: metrics of similarity and visualizations. In: 21th International Conference Information Visualisation, IV 2017. London South Bank University, London (2017)","DOI":"10.1109\/iV.2017.49"},{"key":"#cr-split#-2_CR16.1","doi-asserted-by":"crossref","unstructured":"De Prisco, R., Zaccagnino, G., Zaccagnino, R.: A multi-objective differential evolution algorithm for 4-voice compositions. In: 2011 IEEE Symposium on Differential Evolution, SDE 2011, Paris, France, 11-15 April 2011, pp. 65-72 (2011)","DOI":"10.1109\/SDE.2011.5952053"},{"key":"#cr-split#-2_CR16.2","doi-asserted-by":"crossref","unstructured":"De Prisco, R., Zaccagnino, G., Zaccagnino, R.: A genetic algorithm for dodecaphonic compositions. In: Di Chio, C., et al. (eds.) EvoApplications 2011, Part II. LNCS, vol. 6625, pp. 244-253. Springer, Heidelberg (2011)","DOI":"10.1007\/978-3-642-20520-0_25"},{"issue":"3","key":"2_CR17","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1080\/17440572.2012.702523","volume":"13","author":"D D\u00e9cary-H\u00e9tu","year":"2012","unstructured":"D\u00e9cary-H\u00e9tu, D., Dupont, B.: The social network of hackers. Global Crime 13(3), 160\u2013175 (2012)","journal-title":"Global Crime"},{"key":"2_CR18","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511801938","volume-title":"Approaches and Methodologies in the Social Sciences: A Pluralist Perspective","author":"D Della Porta","year":"2008","unstructured":"Della Porta, D., Keating, M.: Approaches and Methodologies in the Social Sciences: A Pluralist Perspective. Cambridge University Press, Cambridge (2008)"},{"issue":"4","key":"2_CR19","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1177\/0010414098031004006","volume":"31","author":"H Eckstein","year":"1998","unstructured":"Eckstein, H.: Unfinished business reflections on the scope of comparative politics. Comp. Polit. Stud. 31(4), 505\u2013534 (1998)","journal-title":"Comp. Polit. Stud."},{"key":"2_CR20","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/3374.001.0001","volume-title":"Growing Artificial Societies: Social Science From the Bottom Up","author":"JM Epstein","year":"1996","unstructured":"Epstein, J.M., Axtell, R.: Growing Artificial Societies: Social Science From the Bottom Up. Brookings Institution Press, Washington, DC (1996)"},{"key":"2_CR21","unstructured":"Felson, M., Clarke, R.V.: Opportunity makes the thief (1998)"},{"issue":"13","key":"2_CR22","doi-asserted-by":"publisher","first-page":"5733","DOI":"10.1016\/j.eswa.2014.03.024","volume":"41","author":"E Ferrara","year":"2014","unstructured":"Ferrara, E., De Meo, P., Catanese, S., Fiumara, G.: Detecting criminal organizations in mobile phone networks. Expert Syst. Appl. 41(13), 5733\u20135750 (2014)","journal-title":"Expert Syst. Appl."},{"issue":"3","key":"2_CR23","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","volume":"1","author":"LC Freeman","year":"1978","unstructured":"Freeman, L.C.: Centrality in social networks conceptual clarification. Soc. Netw. 1(3), 215\u2013239 (1978)","journal-title":"Soc. Netw."},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Furtado, V., Melo, A., Coelho, A.L., Menezes, R., Belchior, M.: Simulating crime against properties using swarm intelligence and social networks. In: Artificial Crime Analysis Systems, pp. 300\u2013318 (2008)","DOI":"10.4018\/978-1-59904-591-7.ch015"},{"key":"2_CR25","volume-title":"Simulation for the Social Scientist","author":"N Gilbert","year":"2005","unstructured":"Gilbert, N., Troitzsch, K.: Simulation for the Social Scientist. McGraw-Hill Education, New York (2005)"},{"issue":"3","key":"2_CR26","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/s11292-008-9058-0","volume":"4","author":"E Groff","year":"2008","unstructured":"Groff, E., Mazerolle, L.: Simulated experiments and their potential role in criminology and criminal justice. Exp. Criminol. 4(3), 187\u2013193 (2008)","journal-title":"Exp. Criminol."},{"issue":"2","key":"2_CR27","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s10940-006-9021-z","volume":"23","author":"ER Groff","year":"2007","unstructured":"Groff, E.R.: Simulation for theory testing and experimentation: an example using routine activity theory and street robbery. J. Quant. Criminol. 23(2), 75\u2013103 (2007)","journal-title":"J. Quant. Criminol."},{"key":"2_CR28","unstructured":"Hofstadter, D.R.: G\u00f6del, escher, bach. Un eterno y gr\u00e1cil bucle (1980)"},{"key":"2_CR29","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s12117-016-9284-1","volume":"20","author":"N Lettieri","year":"2017","unstructured":"Lettieri, N., Malandrino, D., Vicidomini, L.: By investigation, I mean computation. Trends Organ. Crime 20, 31\u201354 (2017)","journal-title":"Trends Organ. Crime"},{"issue":"1","key":"2_CR30","first-page":"263","volume":"22","author":"N Lettieri","year":"2013","unstructured":"Lettieri, N., et al.: Text and (social) network analysis as investigative tools: a case study. Inform. Diritt. 22(1), 263\u2013280 (2013)","journal-title":"Inform. Diritt."},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Liu, L.: Artificial crime analysis systems: using computer simulations and geographic information systems: using computer simulations and geographic information systems. IGI Global (2008)","DOI":"10.4018\/978-1-59904-591-7"},{"key":"2_CR32","doi-asserted-by":"publisher","first-page":"627","DOI":"10.2307\/2578186","volume":"59","author":"BH Mayhew","year":"1981","unstructured":"Mayhew, B.H.: Structuralism versus individualism: Part II, ideological and other obfuscations. Soc. Forces 59, 627\u2013648 (1981)","journal-title":"Soc. Forces"},{"issue":"2","key":"2_CR33","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/s11299-009-0058-1","volume":"8","author":"P Ormerod","year":"2009","unstructured":"Ormerod, P., Wiltshire, G.: \u2018Binge\u2019 drinking in the UK: a social network phenomenon. Mind Soc. 8(2), 135 (2009)","journal-title":"Mind Soc."},{"key":"2_CR34","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-319-23938-5_10","volume-title":"New Frontiers in the Study of Social Phenomena","author":"V Punzo","year":"2016","unstructured":"Punzo, V.: How crime spreads through imitation in social networks: a simulation model. In: Cecconi, F. (ed.) New Frontiers in the Study of Social Phenomena, pp. 169\u2013190. Springer, Cham (2016). doi:10.1007\/978-3-319-23938-5_10"},{"issue":"3","key":"2_CR35","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1177\/0951692800012003005","volume":"12","author":"R Sil","year":"2000","unstructured":"Sil, R.: The foundations of eclecticism the epistemological status of agency, culture, and structure in social theory. J. Theor. Polit. 12(3), 353\u2013387 (2000)","journal-title":"J. Theor. Polit."},{"issue":"1","key":"2_CR36","first-page":"1","volume":"2","author":"F Squazzoni","year":"2008","unstructured":"Squazzoni, F.: The micro-macro link in social simulation. Sociologica 2(1), 1\u201326 (2008)","journal-title":"Sociologica"},{"key":"2_CR37","volume-title":"Principles of Criminology","author":"EH Sutherland","year":"1947","unstructured":"Sutherland, E.H., Cressey, D.R.: Principles of Criminology. Lippincott, Philadelphia (1947)"},{"key":"2_CR38","volume-title":"Foundations of Mixed Methods Research: Integrating Quantitative and Qualitative Approaches in the Social and Behavioral Sciences","author":"C Teddlie","year":"2009","unstructured":"Teddlie, C., Tashakkori, A.: Foundations of Mixed Methods Research: Integrating Quantitative and Qualitative Approaches in the Social and Behavioral Sciences. Sage, Thousand Oaks (2009)"},{"key":"2_CR39","doi-asserted-by":"crossref","unstructured":"Wikstr\u00f6m, P.O.H.: Individuals, settings, and acts of crime: situational mechanisms and the explanation of crime. The explanation of crime: context, mechanisms and development, pp. 61\u2013107 (2006)","DOI":"10.1017\/CBO9780511489341.004"},{"issue":"6","key":"2_CR40","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1145\/1064830.1064834","volume":"48","author":"J Xu","year":"2005","unstructured":"Xu, J., Chen, H.: Criminal network analysis and visualization. Commun. ACM 48(6), 100\u2013107 (2005)","journal-title":"Commun. ACM"},{"issue":"6","key":"2_CR41","doi-asserted-by":"publisher","first-page":"1150","DOI":"10.1016\/j.physa.2010.11.027","volume":"390","author":"T Zhou","year":"2011","unstructured":"Zhou, T., L\u00fc, L.: Link prediction in complex networks: a survey. Phys. A: Stat. Mech. Appl. 390(6), 1150\u20131170 (2011)","journal-title":"Phys. A: Stat. Mech. Appl."}],"container-title":["Lecture Notes in Computer Science","Progress in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65340-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T07:50:24Z","timestamp":1772783424000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-65340-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319653396","9783319653402"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65340-2_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"9 August 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EPIA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"EPIA Conference on Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Porto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"epia2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/web.fe.up.pt\/~epia2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}