{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T23:55:01Z","timestamp":1762300501354,"version":"3.37.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc Choice Welf"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1007\/s00355-023-01493-z","type":"journal-article","created":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T09:02:36Z","timestamp":1698829356000},"page":"321-344","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Cost intervention in delinquent networks"],"prefix":"10.1007","volume":"62","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6159-8072","authenticated-orcid":false,"given":"Yifan","family":"Xiong","sequence":"first","affiliation":[]},{"given":"Youze","family":"Lang","sequence":"additional","affiliation":[]},{"given":"Ziyan","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,1]]},"reference":[{"issue":"5","key":"1493_CR1","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1111\/j.1468-0262.2006.00709.x","volume":"74","author":"C Ballester","year":"2006","unstructured":"Ballester C, Calv\u00f3-Armengol A, Zenou Y (2006) Who\u2019s who in networks. Wanted: The key player. Econometrica 74(5):1403\u20131417","journal-title":"Econometrica"},{"issue":"1","key":"1493_CR2","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1162\/jeea.2010.8.1.34","volume":"8","author":"C Ballester","year":"2010","unstructured":"Ballester C, Calv\u00f3-Armengol A, Zenou Y (2010) Delinquent networks. J Eur Econ Assoc 8(1):34\u201361","journal-title":"J Eur Econ Assoc"},{"key":"1493_CR3","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1162\/qjec.2009.124.1.105","volume":"124","author":"P Bayer","year":"2009","unstructured":"Bayer P, Hjalmarsson R, Pozen D (2009) Building criminal capital behind bars: peer effects in juvenile corrections. Quart J Econ 124:105\u2013147","journal-title":"Quart J Econ"},{"issue":"3","key":"1493_CR4","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.jmateco.2018.10.001","volume":"79","author":"M Belhaj","year":"2018","unstructured":"Belhaj M, Dero\u00efan F (2018) Targeting the key player: an incentive-based approach. J Math Econ 79(3):57\u201364","journal-title":"J Math Econ"},{"issue":"3","key":"1493_CR5","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.geb.2019.08.003","volume":"118","author":"M Belhaj","year":"2019","unstructured":"Belhaj M, Dero\u00efan F (2019) Group targeting under networked synergies. Games Econom Behav 118(3):29\u201346","journal-title":"Games Econom Behav"},{"key":"1493_CR6","doi-asserted-by":"publisher","first-page":"357","DOI":"10.3982\/TE1742","volume":"11","author":"M Belhaj","year":"2016","unstructured":"Belhaj M, Bervoets S, Dero\u00efan F (2016) Efficient networks in games with local complementarities. Theor Econ 11:357\u2013380","journal-title":"Theor Econ"},{"issue":"1","key":"1493_CR7","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1257\/app.20170249","volume":"11","author":"S Billings","year":"2019","unstructured":"Billings S, Deming D, Ross S (2019) Partners in Crime. Am Econ J Appl Econ 11(1):126\u2013150","journal-title":"Am Econ J Appl Econ"},{"issue":"5","key":"1493_CR8","doi-asserted-by":"publisher","first-page":"1170","DOI":"10.1086\/228631","volume":"92","author":"P Bonacich","year":"1987","unstructured":"Bonacich P (1987) Power and centrality: a family of measures. Am J Sociol 92(5):1170\u20131182","journal-title":"Am J Sociol"},{"issue":"602","key":"1493_CR9","first-page":"959","volume":"127","author":"L Corno","year":"2016","unstructured":"Corno L (2016) Homelessness and crime: Do your friends matter? Econ J 127(602):959\u2013995","journal-title":"Econ J"},{"issue":"6","key":"1493_CR10","doi-asserted-by":"publisher","first-page":"1806","DOI":"10.1257\/aer.104.6.1806","volume":"104","author":"A Damm","year":"2014","unstructured":"Damm A, Dustmann C (2014) Does growing up in a high crime neighborhood affect youth criminal behavior? Am Econ Rev 104(6):1806\u201332","journal-title":"Am Econ Rev"},{"key":"1493_CR11","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.geb.2017.07.004","volume":"105","author":"G Demange","year":"2017","unstructured":"Demange G (2017) Optimal targeting strategies in a network under complementarities. Games Econ Behav 105:84\u2013103","journal-title":"Games Econ Behav"},{"issue":"6","key":"1493_CR12","doi-asserted-by":"publisher","first-page":"2445","DOI":"10.3982\/ECTA16173","volume":"88","author":"A Galeotti","year":"2020","unstructured":"Galeotti A, Golub B, Goyal S (2020) Targeting interventions in networks. Econometrica 88(6):2445\u20132471","journal-title":"Econometrica"},{"key":"1493_CR13","first-page":"508","volume":"111","author":"E Glaser","year":"1996","unstructured":"Glaser E, Sacerdote B, Scheinkman J (1996) Crime and social interactions. Quart J Econ 111:508\u2013548","journal-title":"Quart J Econ"},{"key":"1493_CR14","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.geb.2017.07.010","volume":"105","author":"T Hiller","year":"2017","unstructured":"Hiller T (2017) Peer effects in endogenous networks. Games Econom Behav 105:349\u2013367","journal-title":"Games Econom Behav"},{"key":"1493_CR15","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1111\/jpet.12177","volume":"18","author":"S Joshi","year":"2016","unstructured":"Joshi S, Mahmud A (2016) Network formation under multiple sources of externalities. J Public Econ Theory 18:148\u2013167","journal-title":"J Public Econ Theory"},{"key":"1493_CR16","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/BF02289026","volume":"18","author":"L Katz","year":"1953","unstructured":"Katz L (1953) A new status index derived from sociometric analysis. Psychometrika 18:39\u201343","journal-title":"Psychometrika"},{"issue":"3","key":"1493_CR17","doi-asserted-by":"publisher","first-page":"695","DOI":"10.3982\/TE1348","volume":"9","author":"MD K\u00f6nig","year":"2014","unstructured":"K\u00f6nig MD, Tessone J, Zenou Y (2014) Nestedness in networks: a theoretical model and some applications. Theor Econ 9(3):695\u2013752","journal-title":"Theor Econ"},{"key":"1493_CR18","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1016\/j.geb.2023.04.010","volume":"140","author":"X Li","year":"2023","unstructured":"Li X (2023) Designing weighted and directed networks under complementarities. Games Econom Behav 140:556\u2013574","journal-title":"Games Econom Behav"},{"key":"1493_CR19","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1162\/00335530151144122","volume":"116","author":"J Ludwig","year":"2001","unstructured":"Ludwig J, Greg D, Hirschfield P (2001) Urban poverty and juvenile crime: evidence from a randomized housing-mobility experiment. Quart J Econ 116:655\u2013679","journal-title":"Quart J Econ"},{"key":"1493_CR20","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/BF01588971","volume":"14","author":"G Nemhauser","year":"1978","unstructured":"Nemhauser G, Wolsey LA, Fisher ML (1978) An analysis of approximations for maximizing submodular set functions\u2014I. Math Program 14:265\u2013294","journal-title":"Math Program"},{"key":"1493_CR21","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.euroecorev.2007.09.002","volume":"52","author":"E Patacchini","year":"2008","unstructured":"Patacchini E, Zenou Y (2008) The strength of weak ties in crime. Eur Econ Rev 52:209\u2013236","journal-title":"Eur Econ Rev"},{"issue":"4","key":"1493_CR22","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1137\/1016079","volume":"16","author":"G Poole","year":"1974","unstructured":"Poole G, Boullion T (1974) A survey on M-matrices. SIAM Rev 16(4):419\u2013427","journal-title":"SIAM Rev"},{"issue":"1","key":"1493_CR23","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1162\/rest_a_00860","volume":"103","author":"B Stuart","year":"2021","unstructured":"Stuart B, Talor E (2021) The effect of social connectedness on crime: evidence from the great migration. Rev Econ Stat 103(1):18\u201333","journal-title":"Rev Econ Stat"},{"key":"1493_CR24","doi-asserted-by":"publisher","DOI":"10.1111\/iere.12639","author":"Y Sun","year":"2023","unstructured":"Sun Y, Zhao W, Zhou J (2023) Structural interventions in networks. Int Econ Rev. https:\/\/doi.org\/10.1111\/iere.12639","journal-title":"Int Econ Rev"},{"key":"1493_CR25","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.jet.2015.01.005","volume":"157","author":"J Zhou","year":"2015","unstructured":"Zhou J, Chen Y (2015) Key leaders in social networks. J Econ Theory 157:212\u2013235","journal-title":"J Econ Theory"}],"container-title":["Social Choice and Welfare"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00355-023-01493-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00355-023-01493-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00355-023-01493-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,5]],"date-time":"2024-03-05T17:03:23Z","timestamp":1709658203000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00355-023-01493-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,1]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["1493"],"URL":"https:\/\/doi.org\/10.1007\/s00355-023-01493-z","relation":{},"ISSN":["0176-1714","1432-217X"],"issn-type":[{"type":"print","value":"0176-1714"},{"type":"electronic","value":"1432-217X"}],"subject":[],"published":{"date-parts":[[2023,11,1]]},"assertion":[{"value":"7 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 August 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 November 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}