{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T08:38:29Z","timestamp":1769157509987,"version":"3.49.0"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,7,2]],"date-time":"2015-07-02T00:00:00Z","timestamp":1435795200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1007\/s13278-015-0265-1","type":"journal-article","created":{"date-parts":[[2015,7,1]],"date-time":"2015-07-01T02:55:38Z","timestamp":1435719338000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Measuring UK crime gangs: a social network problem"],"prefix":"10.1007","volume":"5","author":[{"given":"Giles","family":"Oatley","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5196-9389","authenticated-orcid":false,"given":"Tom","family":"Crick","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,2]]},"reference":[{"issue":"1","key":"265_CR1","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1103\/RevModPhys.74.47","volume":"74","author":"R Albert","year":"2002","unstructured":"Albert R, Barab\u00e1si AL (2002) Statistical mechanics of complex networks. Rev Mod Phys 74(1):47\u201391","journal-title":"Rev Mod Phys"},{"key":"265_CR2","doi-asserted-by":"crossref","unstructured":"Albert R, Albert I, Nakarado GL (2004) Structural vulnerability of the North American Power Grid. Phys Rev E 69(2)","DOI":"10.1103\/PhysRevE.69.025103"},{"key":"265_CR3","unstructured":"Aldridge J, Medina-Ariza J, Ralphs R (2008) Street Gangs, Migration and Ethnicity, Willan, chap Dangers and Problems of Doing \u2019Gang\u2019 Research in the UK, pp 31\u201346"},{"key":"265_CR4","doi-asserted-by":"crossref","unstructured":"Andamic LA, Lukose RM, Huberman B (2003) Handbook of graphs and networks: from the genome to the internet, chap Local Search in Unstructured Networks, Wiley pp 295\u2013317","DOI":"10.1002\/3527602755.ch13"},{"issue":"3","key":"265_CR5","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/0378-8733(93)90008-9","volume":"15","author":"SW Baron","year":"1993","unstructured":"Baron SW, Tindall DB (1993) Network structure and delinquent attitudes within a Juvenile Gang. Soc Netw 15(3):255\u2013273","journal-title":"Soc Netw"},{"issue":"4","key":"265_CR6","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1111\/j.1745-9133.2009.00585.x","volume":"8","author":"J Barrows","year":"2009","unstructured":"Barrows J, Huff CR (2009) Gangs and Public Policy: Constructing and Deconstructing Gang Databases. Criminol Public Policy 8(4):675\u2013703","journal-title":"Criminol Public Policy"},{"issue":"4","key":"265_CR7","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1177\/0264550509346501","volume":"56","author":"S Batchelor","year":"2009","unstructured":"Batchelor S (2009) Girls, gangs and violence: Assessing the evidence. Probat J 56(4):399\u2013414","journal-title":"Probat J"},{"key":"265_CR8","unstructured":"BBC News (2003) Gangs and guns - who takes the rap? http:\/\/www.bbc.co.uk\/manchester\/have_your_say\/2003\/01\/06\/gun_crime.shtml . Accessed 01 May 2015"},{"key":"265_CR9","unstructured":"BBC News (2004) Gun gang members \u2018die by age 24\u2019. http:\/\/news.bbc.co.uk\/1\/hi\/england\/manchester\/3907049.stm . Accessed 01 May 2015"},{"key":"265_CR10","unstructured":"BBC News (2010) Greater Manchester gun crime down by 20%. http:\/\/www.bbc.co.uk\/news\/uk-england-manchester-11563463 . Accessed 01 May 2015"},{"issue":"1","key":"265_CR11","doi-asserted-by":"crossref","first-page":"37","DOI":"10.2307\/1143999","volume":"86","author":"B Bjerregaard","year":"1995","unstructured":"Bjerregaard B, Lizotte AJ (1995) Gun ownership and gang membership. J Crim Law Criminol 86(1):37\u201358","journal-title":"J Crim Law Criminol"},{"issue":"4","key":"265_CR12","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1016\/S0378-8733(99)00019-2","volume":"21","author":"SP Borgatti","year":"2000","unstructured":"Borgatti SP, Everett MG (2000) Models of core\/periphery structures. Soc Netw 21(4):375\u2013395","journal-title":"Soc Netw"},{"key":"265_CR13","unstructured":"Bricknell S (2008) Criminal use of handguns in Australia. Australian Institute of Criminology, no, Trends and Issues in Crime and Criminal Justice, p 361"},{"key":"265_CR14","doi-asserted-by":"crossref","unstructured":"Bullock K, Tilley N (2002) Shootings, gangs and violent incidents in manchester: developing a crime reduction strategy. Crime Reduction Research Series CRRS13, UK Home Office","DOI":"10.1037\/e468362008-001"},{"issue":"4","key":"265_CR15","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1093\/police\/pap032","volume":"3","author":"K Bullock","year":"2009","unstructured":"Bullock K, Tilley N (2009) Evidence-based policing and crime reduction. Policing 3(4):381\u2013387","journal-title":"Policing"},{"issue":"1","key":"265_CR16","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1007\/s13278-014-0206-4","volume":"4","author":"P Burnap","year":"2014","unstructured":"Burnap P, Williams ML, Sloan L, Rana OF, Housley W, Edwards A, Knight V, Procter R, Voss A (2014) Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack. Soc Netw Anal Mining 4(1):206","journal-title":"Soc Netw Anal Mining"},{"issue":"3","key":"265_CR17","doi-asserted-by":"crossref","first-page":"939","DOI":"10.1111\/j.0020-6598.2004.00292.x","volume":"45","author":"A Calv\u00f3-Armengol","year":"2004","unstructured":"Calv\u00f3-Armengol A, Zenou Y (2004) Social networks and crime decisions: the role of social structure in facilitating delinquent behavior. Int Econ Rev 45(3):939\u2013958","journal-title":"Int Econ Rev"},{"issue":"1\u20132","key":"265_CR18","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/j.jpubeco.2006.05.011","volume":"91","author":"A Calv\u00f3-Armengol","year":"2007","unstructured":"Calv\u00f3-Armengol A, Verdier T, Zenou Y (2007) Strong and weak ties in employment and crimes. J Pub Econ 91(1\u20132):203\u2013233","journal-title":"J Pub Econ"},{"issue":"4","key":"265_CR19","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1137\/070710111","volume":"51","author":"A Clauset","year":"2009","unstructured":"Clauset A, Shalizi CR, Newman MEJ (2009) Power-law distributions in empirical data. SIAM Rev 51(4):661\u2013703","journal-title":"SIAM Rev"},{"issue":"1","key":"265_CR20","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1080\/00018730601170527","volume":"56","author":"LF Costa","year":"2007","unstructured":"Costa LF, Rodrigues FA, Travieso G, Villas Boas PR (2007) Characterization of complex networks: a survey of measurements. Adv Phys 56(1):167\u2013242","journal-title":"Adv Phys"},{"key":"265_CR21","doi-asserted-by":"crossref","unstructured":"Duijn PAC, Kashirin V, Sloot PMA (2014) The relative ineffectiveness of criminal network disruption. Sci Reports 4(4238). doi: 10.1038\/srep04238","DOI":"10.1038\/srep04238"},{"issue":"13","key":"265_CR22","doi-asserted-by":"crossref","first-page":"5733","DOI":"10.1016\/j.eswa.2014.03.024","volume":"41","author":"E Ferrara","year":"2014","unstructured":"Ferrara E, De Meo P, Catanese S, Fiumara G (2014) Detecting criminal organizations in mobile phone networks. Exp Syst Appl 41(13):5733\u20135750","journal-title":"Exp Syst Appl"},{"key":"265_CR23","unstructured":"Golding B, McClory J (2008) Getting to the point\u2014Reducing gun and knife crime in Britain: lessons from abroad. Tech. rep, Policy Exchange. ISBN 978-1-906097-39-4"},{"issue":"2","key":"265_CR24","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1140\/epjb\/e2004-00316-5","volume":"41","author":"ML Goldstein","year":"2004","unstructured":"Goldstein ML, Morris SA, Yen GG (2004) Problems with fitting to the power-law distribution. Eur Phys J B Conden Matter Comp Syst 41(2):255\u2013258","journal-title":"Eur Phys J B Conden Matter Comp Syst"},{"key":"265_CR25","unstructured":"Hales G, Lewis C, Silverstone D (2006) Gun Crime: the market in and use of illegal firearms. Home Office Research Study 298, UK Home Office"},{"issue":"3","key":"265_CR26","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1177\/1748895809336386","volume":"9","author":"S Hallsworth","year":"2009","unstructured":"Hallsworth S, Silverstone D (2009) \u2018That\u2019s life innit\u2019 A British perspective on guns, crime and social order. Criminol Crim Just 9(3):359\u2013377","journal-title":"Criminol Crim Just"},{"issue":"1","key":"265_CR27","first-page":"134","volume":"6","author":"LL Hansen","year":"2005","unstructured":"Hansen LL (2005) Girl \u201cCrew\u201d members doing gender, boy \u201ccrew\u201d members doing violence: an ethnographic and network analysis of Maria Hinojosa\u2019s New York gangs. West Crim Rev 6(1):134\u2013144","journal-title":"West Crim Rev"},{"key":"265_CR28","unstructured":"Hill KG, Lui C, Hawkins JD (2001) Early precursors of gang membership: a study of Seattle Youth. Juvenile Justice Bulletin"},{"issue":"2","key":"265_CR29","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1177\/1043986204272875","volume":"21","author":"LA Hughes","year":"2005","unstructured":"Hughes LA (2005) Studying youth gangs: alternative methods and conclusions. J Contemp Crim Justice 21(2):98\u2013119","journal-title":"J Contemp Crim Justice"},{"issue":"1","key":"265_CR30","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/s10588-009-9060-8","volume":"16","author":"CE Hutchins","year":"1995","unstructured":"Hutchins CE, Benham-Hutchins M (1995) Hiding in plain sight: criminal network analysis. Comput Math Organ Theory 16(1):89\u2013111","journal-title":"Comput Math Organ Theory"},{"key":"265_CR31","doi-asserted-by":"crossref","unstructured":"Jackson MO (2010) Social and economic networks. Princeton University Press","DOI":"10.2307\/j.ctvcm4gh1"},{"issue":"4","key":"265_CR32","doi-asserted-by":"crossref","first-page":"705","DOI":"10.1111\/j.1745-9133.2009.00586.x","volume":"8","author":"JB Jacobs","year":"2009","unstructured":"Jacobs JB (2009) Gang databases: context and questions. Criminol Public Policy 8(4):705\u2013709","journal-title":"Criminol Public Policy"},{"issue":"3","key":"265_CR33","first-page":"53","volume":"24","author":"P Klerks","year":"2001","unstructured":"Klerks P (2001) The network paradigm applied to criminal organizations. Connections 24(3):53\u201365","journal-title":"Connections"},{"key":"265_CR34","doi-asserted-by":"crossref","unstructured":"Liu W, Pellegrini M, Wang X (2014) Detecting communities based on network topology. Sci Reports 4(5739)","DOI":"10.1038\/srep05739"},{"issue":"3","key":"265_CR35","first-page":"556","volume":"52","author":"TW Lo","year":"2011","unstructured":"Lo TW (2011) Triadization of youth gangs in Hong Kong. Br J Criminol 52(3):556\u2013576","journal-title":"Br J Criminol"},{"issue":"2","key":"265_CR36","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1137\/S003614450342480","volume":"45","author":"MEJ Newman","year":"2003","unstructured":"Newman MEJ (2003) The structure and function of complex networks. SIAM Rev 45(2):167\u2013256","journal-title":"SIAM Rev"},{"key":"265_CR37","doi-asserted-by":"crossref","unstructured":"Oatley G, Crick T (2014a) Changing faces: identifying complex behavioural profiles. In: Proceedings of 2nd International Conference on Human Aspects of Information Security, Privacy and Trust (HAS 2014), Springer, Lecture Notes in Computer Science, vol 8533, pp 282\u2013293","DOI":"10.1007\/978-3-319-07620-1_25"},{"key":"265_CR38","doi-asserted-by":"crossref","unstructured":"Oatley G, Crick T (2014b) Exploring UK Crime Networks. In: 2014 International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI 2014), IEEE Press","DOI":"10.1109\/ASONAM.2014.6921658"},{"key":"265_CR39","doi-asserted-by":"crossref","unstructured":"Oatley G, Crick T (2014c) Measuring UK Crime Gangs. In: 2014 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014), IEEE Press","DOI":"10.1109\/ASONAM.2014.6921592"},{"key":"265_CR40","doi-asserted-by":"crossref","unstructured":"Oatley G, Zeleznikow J, Leary R, Ewart B (2005) From links to meaning: a Burglary Data Case Study. In: Proceedings of the 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2005), Springer, Lecture Notes in Computer Science, vol 3684, pp 813\u2013822","DOI":"10.1007\/11554028_114"},{"issue":"1\u20132","key":"265_CR41","first-page":"35","volume":"14","author":"G Oatley","year":"2006","unstructured":"Oatley G, Ewart B, Zeleznikow J (2006a) Decision support systems for police: lessons from the application of data mining techniques to \u201csoft\u201d forensic evidence. Artif Intel Law 14(1\u20132):35\u2013100","journal-title":"Artif Intel Law"},{"issue":"3","key":"265_CR42","first-page":"2440","volume":"12","author":"G Oatley","year":"2006","unstructured":"Oatley G, McGarry K, Ewart B (2006b) Offender network metrics. WSEAS Trans Inform Sci and Appl 12(3):2440\u20132448","journal-title":"WSEAS Trans Inform Sci and Appl"},{"key":"265_CR43","unstructured":"Oatley G, Crick T, Howell R (2015) Data exploration with GIS viewsheds and social network analysis. In: Proceedings of 23rd GIS Research UK Conference (GISRUK 2015)"},{"key":"265_CR44","unstructured":"Orman G, Labatut V, Cherifi H (2011a) On accuracy of community structure discovery algorithms. J Converg Inform Technol 6(11)"},{"key":"265_CR45","doi-asserted-by":"crossref","unstructured":"Orman G, Labatut V, Cherifi H (2011b) Qualitative Comparison of Community Detection Algorithms. Digital Information and Communication Technology and Its Applications. Springer, Communications in Computer and Information Science, pp 265\u2013279","DOI":"10.1007\/978-3-642-22027-2_23"},{"key":"265_CR46","unstructured":"Papachristos AV (2006) Studying Youth Gangs, chap Social Network Analysis and Gang Research: Theory and Methods, AltaMira Press"},{"issue":"1","key":"265_CR47","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1086\/597791","volume":"115","author":"AV Papachristos","year":"2009","unstructured":"Papachristos AV (2009) Murder by structure: dominance relations and the social structure of Gang Homicide. Am J Sociol 115(1):74\u2013128","journal-title":"Am J Sociol"},{"issue":"2","key":"265_CR48","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1016\/j.euroecorev.2007.09.002","volume":"52","author":"E Patacchini","year":"2008","unstructured":"Patacchini E, Zenou Y (2008) The strength of weak ties in crime. Eur Econ Rev 52(2):209\u2013236","journal-title":"Eur Econ Rev"},{"key":"265_CR49","unstructured":"Pitts J (2007) Reluctant Gangsters: Youth Gangs in Waltham Forest. University of Bedfordshire, Tech. rep"},{"key":"265_CR50","unstructured":"Pitts J (2008) Reluctant Gangsters: the changing face of youth crime. Willan"},{"issue":"4","key":"265_CR51","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1080\/10439463.2013.780223","volume":"23","author":"R Procter","year":"2013","unstructured":"Procter R, Crump J, Karstedt S, Voss A, Cantijoch M (2013) Reading the riots: what were the police doing on Twitter? Polic Soc 23(4):413\u2013436","journal-title":"Polic Soc"},{"issue":"1","key":"265_CR52","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1137\/120881683","volume":"74","author":"M Rombach","year":"2014","unstructured":"Rombach M, Porter MA, Fowler JH, Mucha PJ (2014) Core-Periphery structure in networks. SIAM J Appl Math 74(1):167\u2013190","journal-title":"SIAM J Appl Math"},{"issue":"1","key":"265_CR53","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1140\/epjst\/e2010-01179-1","volume":"178","author":"M Rosvall","year":"2010","unstructured":"Rosvall M, Axelsson D, Bergstrom CT (2010) The map equation. Eur Phys J Spec Topics 178(1):13\u201323","journal-title":"Eur Phys J Spec Topics"},{"key":"265_CR54","unstructured":"Walsh P (2005) Gang War: the inside story of the Manchester Gangs. Milo Books"},{"key":"265_CR55","unstructured":"Watts DJ (2003) Small Worlds: the dynamics of networks between order and randomness. Princeton University Press"},{"issue":"6684","key":"265_CR56","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"DJ Watts","year":"1998","unstructured":"Watts DJ, Strogatz SH (1998) Collective dynamics of \u2018small-world\u2019 networks. Nature 393(6684):440\u2013442","journal-title":"Nature"},{"issue":"3","key":"265_CR57","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1177\/1057567711418825","volume":"21","author":"VJ Webb","year":"2011","unstructured":"Webb VJ, Ren L, Zhao J, He N, Marshall IH (2011) A comparative study of youth gangs in china and the United States: definition, offending, and victimization. Int Crim Just Rev 21(3):225\u2013242","journal-title":"Int Crim Just Rev"},{"key":"265_CR58","unstructured":"Wright JD (2005) The constitutional failure of gang databases. Stanford J Civil Rights Civil Liberties"},{"issue":"6","key":"265_CR59","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1145\/1064830.1064834","volume":"48","author":"J Xu","year":"2005","unstructured":"Xu J, Chen H (2005) Criminal network analysis and visualization. Commun ACM 48(6):100\u2013107","journal-title":"Commun ACM"},{"key":"265_CR60","doi-asserted-by":"crossref","unstructured":"Yan B, Gregory S (2012) Detecting community structure in networks using edge prediction methods. J Stat Mech 2012(P09008):","DOI":"10.1088\/1742-5468\/2012\/09\/P09008"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-015-0265-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13278-015-0265-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-015-0265-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T17:50:50Z","timestamp":1566928250000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13278-015-0265-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,2]]},"references-count":60,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["265"],"URL":"https:\/\/doi.org\/10.1007\/s13278-015-0265-1","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"value":"1869-5450","type":"print"},{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,7,2]]},"article-number":"33"}}