{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T17:51:50Z","timestamp":1740160310598,"version":"3.37.3"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,9,25]],"date-time":"2021-09-25T00:00:00Z","timestamp":1632528000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,25]],"date-time":"2021-09-25T00:00:00Z","timestamp":1632528000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s13278-021-00796-2","type":"journal-article","created":{"date-parts":[[2021,9,25]],"date-time":"2021-09-25T12:02:41Z","timestamp":1632571361000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Copresence networks: criminals in their environment"],"prefix":"10.1007","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0605-4029","authenticated-orcid":false,"given":"D. B.","family":"Skillicorn","sequence":"first","affiliation":[]},{"given":"C.","family":"Leuprecht","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,25]]},"reference":[{"key":"796_CR1","doi-asserted-by":"crossref","unstructured":"Bichler G, Malm A, Cooper T (2017) Drug supply networks: a systematic review of the organizational structure of illicit drug trade. Crime Science 6(2)","DOI":"10.1186\/s40163-017-0063-3"},{"key":"796_CR2","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-319-04147-6_2","volume-title":"Networks and Network Analysis for Defence and Security","author":"F Calderoni","year":"2014","unstructured":"Calderoni F (2014) Identifying mafia bosses from meeting attendance. In: Masys A (ed) Networks and Network Analysis for Defence and Security. Springer, Berlin, pp 27\u201348"},{"key":"796_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.socnet.2016.12.005","volume":"51","author":"Y Charette","year":"2017","unstructured":"Charette Y, Papachristos AV (2017) The network dynamics of co-offending careers. Soc Netw 51:3\u201313","journal-title":"Soc Netw"},{"key":"796_CR4","doi-asserted-by":"crossref","unstructured":"Chung FRK (1997) Spectral graph theory. Number 92 in CBMS Regional Conference Series in Mathematics. American Mathematical Society, ??? (1997)","DOI":"10.1090\/cbms\/092"},{"key":"796_CR5","unstructured":"Gl\u00e4ser U, Tayebi M, Brantingham PL, Brantingham PJ (2012) Estimating possible criminal organizations from co-offending data. Technical Report\u00a029, Public Safety Canada (2012)"},{"issue":"3","key":"796_CR6","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1001\/jamainternmed.2016.8245","volume":"177","author":"B Green","year":"2017","unstructured":"Green B, Horel T, Papachristos AV (2017) Modeling contagion through social networks to explain and predict gunshot violence in Chicago, 2006\u20132014. JAMA Intern Med 177(3):326\u2013333","journal-title":"JAMA Intern Med"},{"issue":"5","key":"796_CR7","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1177\/0022427815576754","volume":"52","author":"B Lantz","year":"2015","unstructured":"Lantz B, Hutchison R (2015) Co-offender ties and the criminal career: The relationship between co-offender group structure and the individual offender. J Res Crime Delinq 52(5):658\u2013690","journal-title":"J Res Crime Delinq"},{"key":"796_CR8","doi-asserted-by":"crossref","unstructured":"Leuprecht C, Hall K (2014) Why terror networks are dissimilar: how structure relates to function. In: Networks and Network Analysis for Defence and Security, pp 83\u2013120","DOI":"10.1007\/978-3-319-04147-6_5"},{"issue":"4","key":"796_CR9","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/s11222-007-9033-z","volume":"17","author":"U Luxburg","year":"2007","unstructured":"Luxburg U (2007) A tutorial on spectral clustering. Stat Comput 17(4):395\u2013416","journal-title":"Stat Comput"},{"key":"796_CR10","doi-asserted-by":"crossref","unstructured":"Nick B, Lee C, Cunningham P, Brandes U (2013) Simmelian backbones: Amplifying hidden homophily in Facebook networks. In: Proceedings of Advances in Social Network Analysis and Modelling ASONAM, ACM & IEEE","DOI":"10.1145\/2492517.2492569"},{"issue":"4","key":"796_CR11","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1111\/1745-9125.12091","volume":"53","author":"AV Papachristos","year":"2015","unstructured":"Papachristos AV, Braga AA, Piza E, Grossman LS (2015) The company you keep? the spillover effects of gang membership on individual gunshot victimization in a co-offending network. Criminology 53(4):624\u2013649","journal-title":"Criminology"},{"key":"796_CR12","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.socscimed.2014.01.056","volume":"125","author":"AV Papachristos","year":"2015","unstructured":"Papachristos AV, Wildeman C, Roberto E (2015) Tragic, but not random: The social contagion of nonfatal gunshot injuries. Soc Sci Med 125:139\u2013150","journal-title":"Soc Sci Med"},{"key":"796_CR13","doi-asserted-by":"crossref","unstructured":"Papachristos AV, Braga AA, Hureau DM (2012) Social networks and the risk of gunshot injury. Journal of Urban Health 89(6)","DOI":"10.1007\/s11524-012-9703-9"},{"key":"796_CR14","first-page":"49","volume":"31","author":"DB Skillicorn","year":"2015","unstructured":"Skillicorn DB, Calderoni F (2015) Inductive discovery of criminal group structure using spectral embedding. Inform Secur 31:49\u201366","journal-title":"Inform Secur"},{"key":"796_CR15","doi-asserted-by":"crossref","unstructured":"Skillicorn DB, Spezzano F, Subrahmanian VS, Garber M (2014) Understanding South Asian violent extremist group-group interactions. In: FOSINT 2014 at ASONAM 2014","DOI":"10.1109\/ASONAM.2014.6921660"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-021-00796-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13278-021-00796-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-021-00796-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,20]],"date-time":"2021-11-20T14:32:47Z","timestamp":1637418767000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13278-021-00796-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,25]]},"references-count":15,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["796"],"URL":"https:\/\/doi.org\/10.1007\/s13278-021-00796-2","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"type":"print","value":"1869-5450"},{"type":"electronic","value":"1869-5469"}],"subject":[],"published":{"date-parts":[[2021,9,25]]},"assertion":[{"value":"26 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 December 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 September 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"85"}}