{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T01:14:45Z","timestamp":1768353285703,"version":"3.49.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,8,2]],"date-time":"2016-08-02T00:00:00Z","timestamp":1470096000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s13278-016-0365-6","type":"journal-article","created":{"date-parts":[[2016,8,2]],"date-time":"2016-08-02T10:26:14Z","timestamp":1470133574000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["A computational approach for the experimental study of EU case law: analysis and implementation"],"prefix":"10.1007","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6342-3252","authenticated-orcid":false,"given":"Nicola","family":"Lettieri","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Altamura","sequence":"additional","affiliation":[]},{"given":"Armando","family":"Faggiano","sequence":"additional","affiliation":[]},{"given":"Delfina","family":"Malandrino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,2]]},"reference":[{"issue":"3","key":"365_CR1","doi-asserted-by":"crossref","first-page":"590","DOI":"10.1016\/S0378-4371(02)00736-7","volume":"311","author":"AL Barab\u00e2si","year":"2002","unstructured":"Barab\u00e2si AL, Jeong H, N\u00e9da Z, Ravasz E, Schubert A, Vicsek T (2002) Evolution of the social network of scientific collaborations. Phys A Stat Mech Its Appl 311(3):590\u2013614","journal-title":"Phys A Stat Mech Its Appl"},{"issue":"1","key":"365_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/17579961.2015.1052642","volume":"7","author":"R Brownsword","year":"2015","unstructured":"Brownsword R (2015) In the year 2061: from law to technological management. Law Innov Technol 7(1):1\u201351","journal-title":"Law Innov Technol"},{"issue":"1","key":"365_CR3","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/s10610-010-9118-7","volume":"16","author":"F Calderoni","year":"2010","unstructured":"Calderoni F (2010) Morselli, Carlo: inside criminal networks. Eur J Crim Policy Res 16(1):69\u201370","journal-title":"Eur J Crim Policy Res"},{"key":"365_CR4","unstructured":"Cook KA, Thomas JJ (2005) Illuminating the path: the research and development agenda for visual analytics. Tech. rep., Pacific Northwest National Laboratory (PNNL), Richland, WA, USA"},{"key":"365_CR5","doi-asserted-by":"crossref","unstructured":"Duarte EF, Oliveira Jr E, C\u00f4go FR, Pereira R (2015) Dico: a conceptual model to support the design and evaluation of advanced search features for exploratory search. In: Human\u2013computer interaction. Springer, Berlin, pp 87\u2013104","DOI":"10.1007\/978-3-319-22723-8_8"},{"issue":"13","key":"365_CR6","doi-asserted-by":"crossref","first-page":"5733","DOI":"10.1016\/j.eswa.2014.03.024","volume":"41","author":"E Ferrara","year":"2014","unstructured":"Ferrara E, De Meo P, Catanese S, Fiumara G (2014) Detecting criminal organizations in mobile phone networks. Expert Syst Appl 41(13):5733\u20135750","journal-title":"Expert Syst Appl"},{"issue":"1","key":"365_CR7","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.socnet.2007.05.001","volume":"30","author":"JH Fowler","year":"2008","unstructured":"Fowler JH, Jeon S (2008) The authority of supreme court precedent. Soc Netw 30(1):16\u201330","journal-title":"Soc Netw"},{"issue":"3","key":"365_CR8","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1093\/pan\/mpm011","volume":"15","author":"JH Fowler","year":"2007","unstructured":"Fowler JH, Johnson TR, Spriggs JF, Jeon S, Wahlbeck PJ (2007) Network analysis and the law: measuring the legal importance of precedents at the us supreme court. Polit Anal 15(3):324\u2013346","journal-title":"Polit Anal"},{"issue":"11","key":"365_CR9","doi-asserted-by":"crossref","first-page":"1129","DOI":"10.1002\/spe.4380211102","volume":"21","author":"TMJ Fruchterman","year":"1991","unstructured":"Fruchterman TMJ, Reingold EM (1991) Graph drawing by force-directed placement. Softw Pract Exp 21(11):1129\u20131164","journal-title":"Softw Pract Exp"},{"key":"365_CR10","volume-title":"Citation indexing: its theory and application in science, technology, and humanities","author":"E Garfield","year":"1979","unstructured":"Garfield E, Merton RK (1979) Citation indexing: its theory and application in science, technology, and humanities, vol 8. Wiley, New York"},{"key":"365_CR11","unstructured":"Golbeck J (2013) Analyzing the social web. Newnes"},{"issue":"1585","key":"365_CR12","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1098\/rspb.2005.3354","volume":"273","author":"MD Humphries","year":"2006","unstructured":"Humphries MD, Gurney K, Prescott TJ (2006) The brainstem reticular formation is a small-world, not scale-free, network. Proc R Soc Lond B Biol Sci 273(1585):503\u2013511","journal-title":"Proc R Soc Lond B Biol Sci"},{"issue":"1","key":"365_CR13","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/s10588-009-9060-8","volume":"16","author":"CE Hutchins","year":"2010","unstructured":"Hutchins CE, Benham-Hutchins M (2010) Hiding in plain sight: criminal network analysis. Comput Math Organ Theory 16(1):89\u2013111","journal-title":"Comput Math Organ Theory"},{"issue":"6","key":"365_CR14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1371\/journal.pone.0098679","volume":"9","author":"M Jacomy","year":"2014","unstructured":"Jacomy M, Venturini T, Heymann S, Bastian M (2014) ForceAtlas2, a continuous graph layout algorithm for handy network visualization designed for the Gephi software. PLoS One 9(6):1\u201312","journal-title":"PLoS One"},{"issue":"4","key":"365_CR15","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1007\/s10506-014-9160-8","volume":"22","author":"DM Katz","year":"2014","unstructured":"Katz DM, Bommarito MJ II (2014) Measuring the complexity of the law: the United States code. Artif Intell Law 22(4):337\u2013374","journal-title":"Artif Intell Law"},{"key":"365_CR16","doi-asserted-by":"crossref","unstructured":"Keim DA, Kohlhammer J, Ellis G, Mansmann F (2010) Mastering the information age-solving problems with visual analytics. Florian Mansmann","DOI":"10.1007\/978-0-387-39940-9_1122"},{"issue":"4es","key":"365_CR17","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/345966.345982","volume":"31","author":"JM Kleinberg","year":"1999","unstructured":"Kleinberg JM (1999) Hubs, authorities, and communities. ACM Comput Surv (CSUR) 31(4es):5","journal-title":"ACM Comput Surv (CSUR)"},{"key":"365_CR18","unstructured":"Koniaris M, Anagnostopoulos I, Vassiliou Y (2015) Network analysis in the legal domain: a complex model for european union legal sources. arXiv preprint arXiv:1501.05237"},{"issue":"3","key":"365_CR19","first-page":"43","volume":"24","author":"VE Krebs","year":"2002","unstructured":"Krebs VE (2002) Mapping networks of terrorist cells. Connections 24(3):43\u201352","journal-title":"Connections"},{"key":"365_CR20","unstructured":"Lettieri N, Vicidomini V, Altamura A, Faro S (2014) Nets of legal information connecting and displaying heterogeneous legal sources. In: International workshop on network analysis in law. In conjunction with Jurix\u201914, 27th international conference on legal knowledge and information systems"},{"key":"365_CR21","doi-asserted-by":"publisher","unstructured":"Lettieri N, Malandrino D, Vicidomini L (2016) By investigation, I mean computation. A framework to investigate the societal dimension of crime. Trends Organ Crime. doi: 10.1007\/s12117-016-9284-1","DOI":"10.1007\/s12117-016-9284-1"},{"key":"365_CR22","unstructured":"Malmgren S (2011) Toward a theory of jurisprudential relevance ranking. Using link analysis on EU case law, Graduate thesis, Stockholm University 1"},{"issue":"4","key":"365_CR23","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/1121949.1121979","volume":"49","author":"G Marchionini","year":"2006","unstructured":"Marchionini G (2006) Exploratory search: from finding to understanding. Commun ACM 49(4):41\u201346","journal-title":"Commun ACM"},{"key":"365_CR24","doi-asserted-by":"crossref","unstructured":"Memon N, Larsen HL (2006) Notice of violation of ieee publication principles practical approaches for analysis, visualization and destabilizing terrorist networks. In: First international conference on availability, reliability and security (ARES\u201906). IEEE, p 8","DOI":"10.1109\/ARES.2006.95"},{"key":"365_CR25","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1086\/468085","volume":"29","author":"DG Post","year":"2000","unstructured":"Post DG, Eisen MB (2000) How long is the coastline of law? Thoughts on the fractal nature of legal systems. J Legal Stud 29:545","journal-title":"J Legal Stud"},{"key":"365_CR26","volume-title":"From whole cloth: making up the terrorist network","author":"R Rothenberg","year":"2001","unstructured":"Rothenberg R (2001) From whole cloth: making up the terrorist network. New York Times, New York"},{"key":"365_CR27","first-page":"309","volume":"44","author":"TA Smith","year":"2007","unstructured":"Smith TA (2007) Web of law, the. San Diego L Rev 44:309","journal-title":"San Diego L Rev"},{"issue":"2","key":"365_CR28","first-page":"10","volume":"2","author":"T Stewart","year":"2001","unstructured":"Stewart T (2001) Six degrees of Mohamed Atta. Business 2(2):10","journal-title":"Business"},{"key":"365_CR29","unstructured":"Winkels R, Boer A (2013) Finding and visualizing context in dutch legislation. In: Proceedings of NAiL, vol 2013"},{"key":"365_CR30","unstructured":"Winkels R, Lettieri N, Faro S (2014) Network analysis in law. Edizioni Scientifiche Italiane"},{"issue":"5","key":"365_CR31","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MCG.2004.39","volume":"24","author":"PC Wong","year":"2004","unstructured":"Wong PC, Thomas J (2004) Visual analytics. IEEE Comput Graph Appl 24(5):20\u201321","journal-title":"IEEE Comput Graph Appl"},{"key":"365_CR32","doi-asserted-by":"crossref","unstructured":"Xu J, Chen H (2005a) Criminal network analysis and visualization. Commun ACM 48(6):100\u2013107","DOI":"10.1145\/1064830.1064834"},{"key":"365_CR33","doi-asserted-by":"crossref","unstructured":"Xu JJ, Chen H (2005b) Crimenet explorer: a framework for criminal network knowledge discovery. ACM Trans Inf Syst (TOIS) 23(2):201\u2013226","DOI":"10.1145\/1059981.1059984"}],"updated-by":[{"DOI":"10.1007\/s13278-017-0477-7","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2017,11,23]],"date-time":"2017-11-23T00:00:00Z","timestamp":1511395200000}}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-016-0365-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13278-016-0365-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-016-0365-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-016-0365-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T18:42:35Z","timestamp":1656960155000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13278-016-0365-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,2]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["365"],"URL":"https:\/\/doi.org\/10.1007\/s13278-016-0365-6","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s13278-017-0477-7","asserted-by":"object"}]},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"value":"1869-5450","type":"print"},{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,2]]},"article-number":"56"}}