{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T20:51:17Z","timestamp":1675111877047},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2006,8,30]],"date-time":"2006-08-30T00:00:00Z","timestamp":1156896000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Comput Math Organiz Theor"],"published-print":{"date-parts":[[2006,11,8]]},"DOI":"10.1007\/s10588-006-9009-0","type":"journal-article","created":{"date-parts":[[2006,8,29]],"date-time":"2006-08-29T18:23:46Z","timestamp":1156875826000},"page":"63-87","source":"Crossref","is-referenced-by-count":9,"title":["On effectiveness of wiretap programs in mapping social networks"],"prefix":"10.1007","volume":"13","author":[{"given":"Maksim","family":"Tsvetovat","sequence":"first","affiliation":[]},{"given":"Kathleen M.","family":"Carley","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,8,30]]},"reference":[{"key":"9009_CR1","unstructured":"Al-Quaeda (2001) Al Quaeda Training Manual: Declaration of Jihad Against Unholy Tyrants. URL: http:\/\/www.usdoj.gov\/ag\/trainingmanual.htm"},{"key":"9009_CR2","doi-asserted-by":"crossref","unstructured":"Alberts D, Garstka J, Stein F (1999) Network Centric Warfare: Developing and Leveraging Information Superiority. CCRP Publication Series","DOI":"10.21236\/ADA406255"},{"key":"9009_CR3","unstructured":"Ashworth M (2003) Identifying Key Contributors to Performance in Organizations: The Case for Knowledge-Based Measures. CASOS Working Paper"},{"key":"9009_CR4","unstructured":"Ashworth M, Carley KM (2002) Identifying Critical Human Capital in Organizations. CASOS Working Paper"},{"issue":"5439","key":"9009_CR5","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"A-L Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si A-L, Albert R (1999) Emergence of Scaling in Random Networks. Sci 286(5439):509\u2013512","journal-title":"Sci"},{"key":"9009_CR6","unstructured":"Berry N (2001) The International Islamic Terrorist Network. CDI Terrorism Project"},{"issue":"2","key":"9009_CR7","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1177\/004912418101000205","volume":"10","author":"P Biernacki","year":"1981","unstructured":"Biernacki P, Waldorf D (1981) Snowball samplong. Problems and techniques of chain referral sampling. Sociol Meth Res 10(2):141\u2013163","journal-title":"Sociol Meth Res"},{"key":"9009_CR8","unstructured":"Borgatti S, Carley K, Krackhardt D (2004) On the Robust-ness of Centrality Measures under Conditions of Imperfect Data. http:\/\/www.casos.cs.cmu.edu\/publications\/papers\/CentralityRobustness5b.pdf"},{"issue":"3","key":"9009_CR9","first-page":"79","volume":"24","author":"K Carley","year":"2002","unstructured":"Carley K, Lee J, Krackhardt D (2002) Destabilizing networks. Connections 24(3):79\u201392","journal-title":"Connections"},{"key":"9009_CR10","first-page":"206","volume-title":"The handbook of new media","author":"KM Carley","year":"2002","unstructured":"Carley KM (2002) Smart Agents and Organizations of the Future. In: Lievrouw L, Livingstone S (eds) The handbook of new media. Sage, Thousand Oaks, CA, Chapt. 12, pp 206\u2013220"},{"key":"9009_CR11","unstructured":"Carley KM (2003a) Dynamic Network Analysis. Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers. In: Breiger R, Carley KM, Pattison P (eds) Comittee on Human Factors and National Research Council edition, pp 133\u2013145"},{"key":"9009_CR12","unstructured":"Carley KM (2003b) Dynamic Network Analysis. In: Breiger KCR, Pattison P (eds) Dynamic social network modeling and analysis: workshop summary and papers. Committee on Human Factors, National Research Council, pp 361\u2013370"},{"key":"9009_CR13","unstructured":"Carley KM, Dombroski M, Tsvetovat M, Reminga J, Kamneva N (2003) Destabilizing Dynamic Covert Networks. In: Proceedings of the 8th international command and control research and technology symposium"},{"key":"9009_CR14","unstructured":"Carley KM, Ren Y (2001) Tradeoffs Between Performance and Adaptability for C3I architectures. In: Proceedings of the 2000 International Symposium on Command and Control Research and Technology"},{"key":"9009_CR15","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/S0378-8733(03)00012-1","volume":"25","author":"E Costenbader","year":"2003","unstructured":"Costenbader E, Valente T (2003) The stability of centrality measures when networks are sampled. Social Networks 25:283\u2013307","journal-title":"Social Networks"},{"key":"9009_CR16","first-page":"1761","volume":"5","author":"R\u00e9nyi Erd\u00f6s","year":"1960","unstructured":"Erd\u00f6s R\u00e9nyi (1960) On the evolution of random graphs. Public of Math Inst Hungian Acad Sci 5:1761","journal-title":"Public of Math Inst Hungian Acad Sci"},{"key":"9009_CR17","doi-asserted-by":"crossref","unstructured":"Erickson BH (1981) Secret societies and social structure. Social Forces 60(1):188\u2013210","DOI":"10.1093\/sf\/60.1.188"},{"key":"9009_CR18","doi-asserted-by":"crossref","unstructured":"Lorrain F, White H (1971) Structural Equivalence of Individuals in Social Networks. J Math Sociol 1","DOI":"10.1080\/0022250X.1971.9989788"},{"key":"9009_CR19","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","volume":"1","author":"LC Freeman","year":"1979","unstructured":"Freeman LC (1979) Centrality in social networks: conceptual clarication. Social Networks 1:215\u2013239","journal-title":"Social Networks"},{"key":"9009_CR20","unstructured":"Goolsby R (2003) Combating Terrorist Networks: An Evolutionary Approach. In: Proceedings of the 8th international command and control research and technology symposium. Evidence Based Research Vienna VA"},{"key":"9009_CR21","doi-asserted-by":"crossref","first-page":"1267","DOI":"10.1086\/226224","volume":"81","author":"M Granovetter","year":"1976","unstructured":"Granovetter M (1976) Network sampling: some first steps. Am J Sociology 81:1267\u20131303","journal-title":"Am J Sociology"},{"key":"9009_CR22","unstructured":"Group IC (2002) Indonesia Backgrounder: how the Jemaah Islamiyaa Terrorist Network operates. Asia Paper (43)"},{"key":"9009_CR23","doi-asserted-by":"crossref","DOI":"10.7312\/guna12692","volume-title":"Inside Al Quaeda: Global Network of Terror","author":"R Gunaratna","year":"2002","unstructured":"Gunaratna R (2002) Inside Al Quaeda: Global Network of Terror. New York University Press, New York, NY"},{"issue":"3","key":"9009_CR24","first-page":"43","volume":"24","author":"VE Krebs","year":"2001","unstructured":"Krebs VE (2001) Mapping Networks of Terrorist Cells. Connections 24(3):43\u201352","journal-title":"Connections"},{"key":"9009_CR25","unstructured":"Langton, C. (1989) Artificial Life, pp. 1\u201347, SFI Studies in the Sciences of Complexity. Addison-Wesley, Redwood City, CA"},{"key":"9009_CR26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2307\/2391211","volume":"12","author":"P Lawrence","year":"1967","unstructured":"Lawrence P, Lorsch J (1967) Differentiation and Integration in Complex Organizations. Adm Sci Quart (12):1\u201347","journal-title":"Adm Sci Quart"},{"key":"9009_CR27","unstructured":"Lightblau E, Risen J (2005) Spy Agency Mined Vast Data Trove, Officials Report. New York Times"},{"key":"9009_CR28","doi-asserted-by":"crossref","unstructured":"Lin Z, Carley KM (2003) Designing Stress Resistant Organizations: Computational Theorizing and Crisis Applications. Kluwer Boston, MA","DOI":"10.1007\/978-1-4757-3703-5"},{"key":"9009_CR29","volume-title":"Computation: finite and infinite machines, Prentice-Hall Series in Automatic Computation","author":"ML Minsky","year":"1967","unstructured":"Minsky ML (1967) Computation: finite and infinite machines, Prentice-Hall Series in Automatic Computation. Prentice-Hall, Englewood Cliffs, NJ"},{"key":"9009_CR30","unstructured":"Risen J, Lichtblau E (2005) Bush lets U.S. spy on callers without courts. New York Times"},{"key":"9009_CR31","doi-asserted-by":"crossref","unstructured":"Ronfeldt D, Arquilla J (2001) Networks, Netwars and the Fight for the Future. First Monday 6(10)","DOI":"10.5210\/fm.v6i10.889"},{"issue":"3","key":"9009_CR32","first-page":"36","volume":"24","author":"R Rothenberg","year":"2002","unstructured":"Rothenberg R (2002) From Whole Cloth: Making up the terrorist netwrok. Connections 24(3):36\u201342","journal-title":"Connections"},{"key":"9009_CR33","doi-asserted-by":"crossref","unstructured":"Sageman M (2004) Understanding Terror Networks. University of Pennsylvania Press","DOI":"10.9783\/9780812206791"},{"key":"9009_CR34","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1109\/TSMC.1983.6313167","volume":"13","author":"A Sanfeliu","year":"1983","unstructured":"Sanfeliu A, Fu K (1983) A Distance Measure Between Attributed Relational Graphs for Pattern Recognition. IEEE Trans Syst Man, Cybern 13:353\u2013362","journal-title":"IEEE Trans Syst Man, Cybern"},{"key":"9009_CR35","unstructured":"Senate U (2001) Joint Resolution 23: Authorization for Use of Military Force.?"},{"key":"9009_CR36","unstructured":"Tsvetovat M, Carley K (2004) Modeling Complex Socio-technical Systems using Multi-Agent Simulation Methods. Kunstliche Intelligenz (Artificial Intelligence Journal) Special Issue on Applications of Intelligent Agents (2)"},{"key":"9009_CR37","doi-asserted-by":"crossref","unstructured":"Tsvetovat M, Carley K (2005a) Generation of Realistic Social Network Datasets for Testing of Analysis and Simulation Tools. Technical Report CMU-ISRI-05\u2013130, Carnegie Mellon University, School of Computer Science, Institute for Software Research International","DOI":"10.2139\/ssrn.2729296"},{"key":"9009_CR38","unstructured":"Tsvetovat M, Carley KM (2005b) Structural Knowledge and Success of Anti- Terrorist Activity: The Downside of Structural Equivalence. J Soc Structure ( www.joss.org ) forthcoming"},{"key":"9009_CR39","unstructured":"Tsvetovat M, Carley KM (2006) Simulation of Human Systems Requires Multiple Levels of Complexity. IEEE Proceedings on System, Man and Cybernetics to appear."}],"container-title":["Computational and Mathematical Organization Theory"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-006-9009-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10588-006-9009-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-006-9009-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T11:36:20Z","timestamp":1559302580000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10588-006-9009-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,8,30]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2006,11,8]]}},"alternative-id":["9009"],"URL":"https:\/\/doi.org\/10.1007\/s10588-006-9009-0","relation":{},"ISSN":["1381-298X","1572-9346"],"issn-type":[{"value":"1381-298X","type":"print"},{"value":"1572-9346","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,8,30]]}}}