{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:00:07Z","timestamp":1725570007542},"publisher-location":"Wiesbaden","reference-count":50,"publisher":"VS Verlag f\u00fcr Sozialwissenschaften","isbn-type":[{"type":"print","value":"9783531158082"},{"type":"electronic","value":"9783531925752"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-531-92575-2_64","type":"book-chapter","created":{"date-parts":[[2010,11,13]],"date-time":"2010-11-13T21:11:59Z","timestamp":1289682719000},"page":"725-738","source":"Crossref","is-referenced-by-count":2,"title":["Relationale Methoden in der Erforschung, Ermittlung und Pr\u00e4vention von Kriminalit\u00e4t"],"prefix":"10.1007","author":[{"given":"Jana","family":"Diesner","sequence":"first","affiliation":[]},{"given":"Kathleen M.","family":"Carley","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"64_CR1","first-page":"1","volume-title":"Networks and Netwars: The Future of Terror, Crime, and Militancy","author":"John Arquilla","year":"2001","unstructured":"Arquilla, John und David F. Ronfeldt, 2001: The Advent of Netwar (Revisited). S. 1\u201325 in: John Arquilla und David F. Ronfeldt (Hg.), Networks and Netwars: The Future of Terror, Crime, and Militancy. Santa Monica, CA: RAND."},{"issue":"6","key":"64_CR2","doi-asserted-by":"publisher","first-page":"837","DOI":"10.2307\/2095954","volume":"58","author":"Wayne E. Baker","year":"1993","unstructured":"Baker, Wayne E. und Robert F. Faulkner, 1993: The Social Organization of Conspiracy: Illegal Networks in the Heavy Electrical Equipment Industry. American Sociological Review 58(6): 837\u2013860.","journal-title":"American Sociological Review"},{"key":"64_CR3","volume-title":"Nations Hospitable to Organized Crime and Terrorism","author":"Laverle Berry","year":"2003","unstructured":"Berry, Laverle, Glenn E. Curtis, John N. Gibbs, Rex A. Hudson, T. Karacan, N. Kollars und R. Miro, 2003: Nations Hospitable to Organized Crime and Terrorism. Washington D.C.: Library of Congress."},{"issue":"1","key":"64_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/S0272-4944(05)80212-9","volume":"13","author":"Patricia L. Brantingham","year":"1993","unstructured":"Brantingham, Patricia L. und Paul J. Brantingham, 1993: Nodes, Paths and Edges: Considerations on the Complexity of Crime and the Physical Environment. Journal of Environmental Psychology 13(1): 3\u201328.","journal-title":"Journal of Environmental Psychology"},{"issue":"4","key":"64_CR5","doi-asserted-by":"publisher","first-page":"1324","DOI":"10.1016\/j.dss.2006.04.003","volume":"43","author":"Kathleen M. Carley","year":"2007","unstructured":"Carley, Kathleen M., Jana Diesner, Jeffrey Reminga und Maksim Tsvetovat, 2007: Toward an interoperable dynamic network analysis toolkit. Decision Support Systems. 43(4): 1324\u20131347.","journal-title":"Decision Support Systems"},{"issue":"3","key":"64_CR6","first-page":"31","volume":"24","author":"Kathleen M. Carley","year":"2001","unstructured":"Carley, Kathleen M., Ju Sung Lee und David Krackhardt, 2001: Destabilizing networks. Connections 24(3): 31\u201334.","journal-title":"Connections"},{"key":"64_CR7","unstructured":"Carley, Kathleen M. und Dan T. Maxwell, 2006: Understanding taxpayer behavior and assessing potential IRS interventions using multiagent dynamic-network simulations. Proc. of Internal Revenue Service (IRS) Research Conference, Washington D.C.."},{"issue":"8","key":"64_CR8","doi-asserted-by":"publisher","first-page":"1347","DOI":"10.1002\/asi.20838","volume":"59","author":"Hsinchun Chen","year":"2008","unstructured":"Chen, Hsinchun, Wingyan Chung, Jialun Qin, Edna Reid, Marc Sageman und Gabriel Weimann, 2008: Uncovering the Dark Web: A case study of Jihad on the Web. Journal of the American Society for Information Science and Technology 59(8): 1347\u20131359.","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"64_CR9","doi-asserted-by":"crossref","first-page":"155","DOI":"10.4018\/978-1-59140-872-7.ch008","volume-title":"Digital Crime and Forensic Science in Cyberspace","author":"Caroline Chibelushi","year":"2006","unstructured":"Chibelushi, Caroline, Bernadette Sharp und Hanifa Shah, 2006: ASKARI: A Crime Text Mining Approach. S. 155\u2013174 in: Panagiotis Kanellis, Evangelos Kiountouzis, Nicholas Kolokotronis und Drakoulis Martakos (Hg.), Digital Crime and Forensic Science in Cyberspace. Hershey, PA: Idea Group."},{"key":"64_CR10","volume-title":"The Nexus among Terrorists, Narcotics Traffickers, Weapons Proliferators, and Organized Crime Networks in Western Europe","author":"Glenn E. Curtis","year":"2002","unstructured":"Curtis, Glenn E. und Tara Karacan, 2002: The Nexus among Terrorists, Narcotics Traffickers, Weapons Proliferators, and Organized Crime Networks in Western Europe. Washington, D.C.: Library of Congress."},{"issue":"12","key":"64_CR11","first-page":"11","volume":"50","author":"Roger H. Davis","year":"1981","unstructured":"Davis, Roger H., 1981: Social network analysis: An aid in conspiracy investigations. FBI Law Enforcement Bulletin 50(12): 11\u201319.","journal-title":"FBI Law Enforcement Bulletin"},{"key":"64_CR12","volume-title":"The selfish gene","author":"Richard Dawkins","year":"2006","unstructured":"Dawkins, Richard, 2006: The selfish gene. Oxford: Oxford University Press."},{"key":"64_CR13","first-page":"239","volume-title":"Networks and Netwars: The Future of Terror, Crime, and Militancy","author":"Dorothy E. Denning","year":"2001","unstructured":"Denning, Dorothy E., 2001: Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy. S. 239\u2013288 in: John Arquilla and David F. Ronfeldt (Hg.), Networks and Netwars: The Future of Terror, Crime, and Militancy. Santa Monica, CA: RAND."},{"issue":"3","key":"64_CR14","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s10588-005-5377-0","volume":"11","author":"Jana Diesner","year":"2005","unstructured":"Diesner, Jana, Terrill Frantz, und Kathleen M. Carley, 2005: Communication Networks from the Enron Email Corpus \u201cIt's Always About the People. Enron is no Different\u201d. Journal of Computational and Mathematical Organization Theory, 11(3): 201\u2013228.","journal-title":"Journal of Computational and Mathematical Organization Theory"},{"issue":"1","key":"64_CR15","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1177\/0022002706296155","volume":"51","author":"Walter Enders","year":"2007","unstructured":"Enders, Walter und Xuejuan Su, 2007: Rational Terrorists and Optimal Network Structure. Journal of Conflict Resolution 51(1): 33\u201357.","journal-title":"Journal of Conflict Resolution"},{"key":"64_CR16","doi-asserted-by":"publisher","first-page":"188","DOI":"10.2307\/2577940","volume":"60","author":"Bonnie H. Erickson","year":"1981","unstructured":"Erickson, Bonnie H., 1981: Secret Societies and Social Structure. Social Forces 60: 188\u2013210.","journal-title":"Social Forces"},{"key":"64_CR17","volume-title":"Simulation for the Social Scientist","author":"Gilbert Nigel","year":"2005","unstructured":"Gilbert Nigel und Klaus G. Troitzsch, 2005: Simulation for the Social Scientist. Maidenhead: Open University Press."},{"key":"64_CR18","doi-asserted-by":"crossref","unstructured":"Golbeck, Jennifer, Aaron Mannes und James Hendler, 2006: Semantic Web Technologies for Terrorist Network Analysis. S. 125\u2013137 in: Robert L. Popp und John Yen (Hg.), Emergent Information Technologies and Enabling Policies for Counter-Terrorism. Wiley-IEEE Press.","DOI":"10.1002\/047178656X.ch6"},{"issue":"6","key":"64_CR19","doi-asserted-by":"publisher","first-page":"1360","DOI":"10.1086\/225469","volume":"78","author":"Mark S. Granovetter","year":"1973","unstructured":"Granovetter, Mark S., 1973: The Strength of Weak Ties. American Journal of Sociology 78(6): 1360\u20131380.","journal-title":"American Journal of Sociology"},{"issue":"2","key":"64_CR20","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1177\/001872087501700206","volume":"17","author":"Walter R. Harper","year":"1975","unstructured":"Harper, Walter R. und Douglas H. Harris, 1975: The application of link analysis to police intelligence. Human Factors 17(2): 157\u2013164.","journal-title":"Human Factors"},{"key":"64_CR21","first-page":"42","volume":"47","author":"James B. Howlett","year":"1980","unstructured":"Howlett, James B., 1980: Analytical Investigative Techniques: Tools for Complex Criminal Investigations. Police Chief 47: 42\u201345.","journal-title":"Police Chief"},{"key":"64_CR22","volume-title":"A Family Business: Kinship and Social Control in Organized Crime","author":"Francis Ianni","year":"1972","unstructured":"Ianni, Francis und Elizabeth Reuss-Ianni, 1972: A Family Business: Kinship and Social Control in Organized Crime. New York, NY: Russell Sage Foundation."},{"issue":"5","key":"64_CR23","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1080\/105761001750434231","volume":"24","author":"Alison Jamieson","year":"2001","unstructured":"Jamieson, Alison, 2001: Transnational Organized Crime: A European Perspective. Studies in Conflict and Terrorism 24(5): 377\u2013387.","journal-title":"Studies in Conflict and Terrorism"},{"issue":"1","key":"64_CR24","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1177\/002242786700400105","volume":"4","author":"Malcolm W. Klein","year":"1967","unstructured":"Klein, Malcolm W. und Lois Y. Crawford, 1967: Groups, Gangs, and Cohesiveness. Journal of Research in Crime and Delinquency 4(1): 63\u201375.","journal-title":"Journal of Research in Crime and Delinquency"},{"issue":"3","key":"64_CR25","first-page":"53","volume":"24","author":"Peter Klerks","year":"2001","unstructured":"Klerks, Peter, 2001: The network paradigm applied to criminal organizations: theoretical nitpicking or a relevant doctrine for investigators. Connections 24(3): 53\u201365.","journal-title":"Connections"},{"issue":"3","key":"64_CR26","first-page":"43","volume":"24","author":"Valdis Krebs","year":"2002","unstructured":"Krebs, Valdis, 2002: Mapping networks of terrorist cells. Connections 24(3): 43\u201352.","journal-title":"Connections"},{"issue":"1-2","key":"64_CR27","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1057\/palgrave.sj.8350069","volume":"21","author":"Aili Malm","year":"2008","unstructured":"Malm, Aili, Brian Kinney und Nahanni Pollard, 2008: Social Network and Distance Correlates of Criminal Associates Involved in Illicit Drug Production. Security Journal 21(1-2): 77\u201394.","journal-title":"Security Journal"},{"key":"64_CR28","volume-title":"Street Gangs and Interventions: Innovative Problem Solving with Network Analysis","author":"Jean M. McGloin","year":"2005","unstructured":"McGloin, Jean M., 2005: Street Gangs and Interventions: Innovative Problem Solving with Network Analysis. Washington, D.C.: US Department of Justice, Office of Community Oriented Policing Services."},{"key":"64_CR29","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1146\/annurev.soc.27.1.415","volume":"27","author":"Miller McPherson","year":"2001","unstructured":"McPherson, Miller, Lynn S. Lovin und James M. Cook, 2001: Birds of a Feather: Homophily in Social Networks. Annual Review of Sociology 27: 415\u2013444.","journal-title":"Annual Review of Sociology"},{"key":"64_CR30","volume-title":"Protecting Individual Privacy in the Struggle Against Terrorists","author":"National Research Council","year":"2008","unstructured":"National Research Council, 2008: Protecting Individual Privacy in the Struggle Against Terrorists. Washington, D.C.: The National Academies Press."},{"key":"64_CR31","doi-asserted-by":"crossref","DOI":"10.30709\/978-3-86113-092-5","volume-title":"Die Implementation der Rasterfahndung: Eine Empirische Untersuchung zur Anwendung, Umsetzung und Wirkung der Gesetzlichen Regelungen zur Operativen Informationserhebung durch Rasterfahndung","author":"Dirk Pehl","year":"2008","unstructured":"Pehl, Dirk, 2008: Die Implementation der Rasterfahndung: Eine Empirische Untersuchung zur Anwendung, Umsetzung und Wirkung der Gesetzlichen Regelungen zur Operativen Informationserhebung durch Rasterfahndung. Berlin: Max-Planck-Institut."},{"issue":"3","key":"64_CR32","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/971617.971642","volume":"47","author":"Robert L. Popp","year":"2004","unstructured":"Popp, Robert L., Thomas Armour, Ted Senator und Kristen Numrych, 2004: Countering terrorism through information technology. Communications of the ACM 47(3): 36\u201343.","journal-title":"Communications of the ACM"},{"key":"64_CR33","doi-asserted-by":"crossref","unstructured":"Popp, Robert L. und John Yen (Hg.) (2006), Emergent Information Technologies and Enabling Policies for Counter-Terrorism. Wiley-IEEE Press.","DOI":"10.1002\/047178656X"},{"key":"64_CR34","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1086\/449145","volume":"10","author":"Albert J. Reiss","year":"1988","unstructured":"Reiss, Albert J., 1988: Co-offending and Criminal Careers. Crime and Justice 10: 117\u2013170.","journal-title":"Crime and Justice"},{"key":"64_CR35","unstructured":"Ressler, Steve, 2006: Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research. Homeland Security Affairs 2(2)."},{"key":"64_CR36","unstructured":"Rodr\u00edguez, Jose A., 2004: The March 11th Terrorist Network. Paper presented at VIII Congreso Espa\u00f1ol de Sociolog\u00eda, September 2004, Alicante, Spanien."},{"key":"64_CR37","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511489310","volume-title":"Delinquent Networks: Youth Co-Offending in Stockholm","author":"Jerzy Sarnecki","year":"2001","unstructured":"Sarnecki, Jerzy, 2001: Delinquent Networks: Youth Co-Offending in Stockholm. Cambridge, UK: Cambridge University Press."},{"key":"64_CR38","unstructured":"Schwartz, Matthias, 2008: The Trolls Among Us. The New York Times, August 03, 2008, S. MM24."},{"key":"64_CR39","doi-asserted-by":"publisher","first-page":"1249","DOI":"10.1142\/S0218202508003029","volume":"18","author":"Martin B. Short","year":"2008","unstructured":"Short, Martin B., Maria R. D'Orsogna, Virginia B. Pasour, George E. Tita, Paul J. Brantingham, Andrea L. Bertozzi und Lincoln B. Chayes, 2008: A Statistical Model of Criminal Behavior. Mathematical Models and Methods in Applied Science 18: 1249\u20131267.","journal-title":"Mathematical Models and Methods in Applied Science"},{"key":"64_CR40","first-page":"256","volume-title":"Soziologie. Untersuchungen \u00fcber die Formen der Vergesellschaftung, Leipzig","author":"Georg Simmel","year":"1908","unstructured":"Simmel, Georg, 1908: Das Geheimnis und die geheime Gesellschaft. S. 256\u2013304 in: Georg Simmel, Soziologie. Untersuchungen \u00fcber die Formen der Vergesellschaftung, Leipzig, Berlin: Duncker & Humblot."},{"key":"64_CR41","doi-asserted-by":"publisher","DOI":"10.1201\/9781420074000","volume-title":"Knowledge Discovery for Counterterrorism and Law Enforcement","author":"David Skillicorn","year":"2008","unstructured":"Skillicorn, David, 2008: Knowledge Discovery for Counterterrorism and Law Enforcement. Boca Raton und andere: CRC Press."},{"issue":"3","key":"64_CR42","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0378-8733(91)90008-H","volume":"13","author":"Malcolm K. Sparrow","year":"1991","unstructured":"Sparrow, Malcolm K., 1991: The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects. Social Networks 13(3): 251\u2013274.","journal-title":"Social Networks"},{"key":"64_CR43","volume-title":"Business Dynamics: Systems Thinking and Modeling for a Complex World","author":"John Sterman","year":"2000","unstructured":"Sterman, John, 2000: Business Dynamics: Systems Thinking and Modeling for a Complex World. Homewood, IL: Irwin\/ McGraw-Hill."},{"issue":"5","key":"64_CR44","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"Latanya Sweeney","year":"2002","unstructured":"Sweeney, Latanya, 2002: k-Anonymity: A Model for Protecting Privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5): 557\u2013570.","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"issue":"2","key":"64_CR45","first-page":"1","volume":"5","author":"Kim A. Taipale","year":"2003","unstructured":"Taipale, Kim A., 2003: Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data. Columbia Science and Technology Law Review 5(2): 1\u201383.","journal-title":"Columbia Science and Technology Law Review"},{"issue":"3","key":"64_CR46","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/971617.971618","volume":"47","author":"Gang Wang","year":"2004","unstructured":"Wang, Gang, Hsinchun Chen und Homa Atabakhsh, 2004: Automatically detecting deceptive criminal identities. Communications of the ACM 47(3):70\u201376.","journal-title":"Communications of the ACM"},{"key":"64_CR47","first-page":"31","volume-title":"Crime & Social Organization","author":"Elin Waring","year":"2002","unstructured":"Waring, Elin, 2002: Co-Offending as a Network Form of Social Organization. S. 31\u201347 in: Elin Waring und David Weisburd (Hg.), Crime & Social Organization, New Brunswick, NJ: Transactions Publishers."},{"key":"64_CR48","first-page":"61","volume-title":"Networks and Netwars: The Future of Terror, Crime, and Militancy","author":"Phil Williams","year":"2001","unstructured":"Williams, Phil, 2001: Transnational Criminal Networks. S. 61\u201397 in: John Arquilla und David F. Ronfeldt (Hg.), Networks and Netwars: The Future of Terror, Crime, and Militancy. Santa Monica, CA: RAND."},{"issue":"6","key":"64_CR49","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1145\/1064830.1064834","volume":"48","author":"Jennifer Xu","year":"2005","unstructured":"Xu, Jennifer und Hsinchun Chen, 2005: Criminal network analysis and visualization. Communications of the ACM 48(6): 100\u2013107.","journal-title":"Communications of the ACM"},{"key":"64_CR50","unstructured":"Zanini, Michelle und Sean Edwards, 2001: The Networking of Terror in the Information Age. S. 29\u201360 in: John Arquilla und David F. Ronfeldt (Hg.), Networks and Netwars: The Future of Terror, Crime, and Militancy, Santa Monica, CA: RAND. Software: Analyst's Notebook ( www.i2.co.uk\/products\/analysts_notebook ) NetMap ( www.altaanalytics.com )"}],"container-title":["Handbuch Netzwerkforschung"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-531-92575-2_64.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:27:57Z","timestamp":1605760077000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-531-92575-2_64"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783531158082","9783531925752"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-531-92575-2_64","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}