{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T00:36:01Z","timestamp":1777509361838,"version":"3.51.4"},"reference-count":81,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T00:00:00Z","timestamp":1673568000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T00:00:00Z","timestamp":1673568000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100010459","name":"Fundaci\u00f3n para el futuro de Colombia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100010459","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000765","name":"University College London","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000765","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Netw Sci"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>\n                    This study aims to improve our understanding of criminal accomplice selection by studying the evolution of co-offending networks\u2014i.e., networks that connect those who commit crimes together. To this end, we tested four growth mechanisms (popularity, reinforcement, reciprocity, and triadic closure) on three components observed in a network connecting criminal investigations (\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$$M = 286$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mrow>\n                            <mml:mi>M<\/mml:mi>\n                            <mml:mo>=<\/mml:mo>\n                            <mml:mn>286<\/mml:mn>\n                          <\/mml:mrow>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    K) with adult offenders (\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$$N = 274$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mrow>\n                            <mml:mi>N<\/mml:mi>\n                            <mml:mo>=<\/mml:mo>\n                            <mml:mn>274<\/mml:mn>\n                          <\/mml:mrow>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    K) in Bogot\u00e1 (Colombia) between 2005 and 2018. The first component had 4286 offenders (component \u2018A\u2019), the second 227 (\u2018B\u2019), and the third component 211 (\u2018C\u2019). The evolution of these components was examined using temporal information in tandem with discrete choice models and simulations to understand the mechanisms that could explain how these components grew. The results show that they evolved differently during the period of interest. Popularity yielded negative statistically significant coefficients for \u2018A\u2019, suggesting that having more connections reduced the odds of connecting with incoming offenders in this network. Reciprocity and reinforcement yielded mixed results as we observed negative statistically significant coefficients in \u2018C\u2019 and positive statistically significant coefficients in \u2018A\u2019. Moreover, triadic closure produced positive, statistically significant coefficients in all the networks. The results suggest that a combination of growth mechanisms might explain how co-offending networks grow, highlighting the importance of considering offenders\u2019 network-related characteristics when studying accomplice selection. Besides adding evidence about triadic closure as a universal property of social networks, this result indicates that further analyses are needed to understand better how accomplices shape criminal careers.\n                  <\/jats:p>","DOI":"10.1007\/s41109-023-00531-0","type":"journal-article","created":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T07:05:00Z","timestamp":1673593500000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Examining the importance of existing relationships for co-offending: a temporal network analysis in Bogot\u00e1, Colombia (2005\u20132018)"],"prefix":"10.1007","volume":"8","author":[{"given":"Alberto","family":"Nieto","sequence":"first","affiliation":[]},{"given":"Toby","family":"Davies","sequence":"additional","affiliation":[]},{"given":"Herv\u00e9","family":"Borrion","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,13]]},"reference":[{"issue":"2","key":"531_CR1","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/0191-2607(85)90022-6","volume":"19","author":"M Ben-Akiva","year":"1985","unstructured":"Ben-Akiva M, Litinas N, Tsunokawa K (1985) Continuous spatial choice: the continuous logit model and distributions of trips and urban densities. Transp Res Part A: General 19(2):119\u2013154. https:\/\/doi.org\/10.1016\/0191-2607(85)90022-6","journal-title":"Transp Res Part A: General"},{"key":"531_CR2","doi-asserted-by":"crossref","unstructured":"Bichler G, Malm A (2018) Social network analysis. In: Wortley R, Sidebottom A, Tilley N, Laycock G (eds). Routledge","DOI":"10.4324\/9780203431405-16"},{"issue":"1","key":"531_CR3","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1111\/1745-9133.12353","volume":"17","author":"AA Braga","year":"2018","unstructured":"Braga AA, Weisburd D, Turchan B (2018) Focused deterrence strategies and crime control: an updated systematic review and metaanalysis of the empirical evidence. Criminol Public Policy 17(1):205\u2013250","journal-title":"Criminol Public Policy"},{"key":"531_CR4","doi-asserted-by":"crossref","unstructured":"Brantingham PL, Ester M, Frank R, Gl\u00e4sser U, Tayebi MA (2011) Co-offending network mining. In: Counterterrorism and open source intelligence. Springer, pp 73\u2013102","DOI":"10.1007\/978-3-7091-0388-3_6"},{"key":"531_CR5","doi-asserted-by":"publisher","unstructured":"Bright D (2015) Disrupting and dismantling dark networks: lessons from social network analysis and law enforcement simulations. In: Gerdes LM (ed), Illuminating dark networks: the study of clandestine groups and organizations. Cambridge University Press, pp 39-51. https:\/\/doi.org\/10.1017\/CBO9781316212639.004","DOI":"10.1017\/CBO9781316212639.004"},{"issue":"2\u20133","key":"531_CR6","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1080\/17440572.2013.787927","volume":"14","author":"D Bright","year":"2013","unstructured":"Bright D, Delaney JJ (2013) Evolution of a drug trafficking network: mapping changes in network structure and function across time. Global Crime 14(2\u20133):238\u2013260","journal-title":"Global Crime"},{"issue":"2","key":"531_CR7","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10940-018-9379-8","volume":"35","author":"D Bright","year":"2019","unstructured":"Bright D, Koskinen J, Malm A (2019) Illicit network dynamics: the formation and evolution of a drug trafficking network. J Quant Criminol 35(2):237\u2013258","journal-title":"J Quant Criminol"},{"key":"531_CR8","doi-asserted-by":"publisher","DOI":"10.4324\/9781315522579","volume-title":"Organised crime and law enforcement: a network perspective","author":"D Bright","year":"2020","unstructured":"Bright D, Whelan C (2020) Organised crime and law enforcement: a network perspective. Routledge, London"},{"key":"531_CR9","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780199249145.001.0001","volume-title":"Brokerage and closure: an introduction to social capital","author":"RS Burt","year":"2005","unstructured":"Burt RS (2005) Brokerage and closure: an introduction to social capital. Oxford University Press, Oxford"},{"key":"531_CR10","unstructured":"Campana P, Varese F (2020) Studying organized crime networks: data sources, boundaries and the limits of structural measures. Social networks"},{"key":"531_CR11","doi-asserted-by":"publisher","first-page":"277","DOI":"10.3138\/cjcrim.44.3.277","volume":"44","author":"PJ Carrington","year":"2002","unstructured":"Carrington PJ (2002) Group crime in Canada. Can J Criminol 44:277","journal-title":"Can J Criminol"},{"key":"531_CR12","doi-asserted-by":"publisher","unstructured":"Carrington PJ (2014) Co-offending. In: Bruinsma G, Weisburd D (eds), Encyclopedia of criminology and criminal justice. Springer New York, pp 548\u2013558. https:\/\/doi.org\/10.1007\/978-1-4614-5690-2_108","DOI":"10.1007\/978-1-4614-5690-2_108"},{"key":"531_CR13","doi-asserted-by":"crossref","unstructured":"Cavallaro L, Ficara A, De Meo P, Fiumara G, Catanese S, Bagdasar O, Liotta A (2020) Disrupting resilient criminal networks through data analysis: the case of Sicilian Mafia. Plos one 15(8):e0236476","DOI":"10.1371\/journal.pone.0236476"},{"key":"531_CR14","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.socnet.2016.12.005","volume":"51","author":"Y Charette","year":"2017","unstructured":"Charette Y, Papachristos AV (2017) The network dynamics of cooffending careers. Soc Netw 51:3\u201313. https:\/\/doi.org\/10.1016\/j.socnet.2016.12.005","journal-title":"Soc Netw"},{"key":"531_CR15","doi-asserted-by":"publisher","first-page":"S95","DOI":"10.1086\/228943","volume":"94","author":"JS Coleman","year":"1988","unstructured":"Coleman JS (1988) Social capital in the creation of human capital. Am J Sociol 94:S95\u2013S120. https:\/\/doi.org\/10.1086\/228943","journal-title":"Am J Sociol"},{"key":"531_CR16","doi-asserted-by":"crossref","unstructured":"Cordeiro M, Sarmento RP, Brazdil P, Gama J (2018) Evolving networks and social network analysis methods and techniques. Soc Media J: Trends Connect Implications 101(2)","DOI":"10.5772\/intechopen.79041"},{"key":"531_CR17","unstructured":"Cornish DB, Clarke RV (2002) Crime as a rational choice. Bridging the past to the future. Criminological theories, pp 77\u201396"},{"key":"531_CR18","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1016\/j.socnet.2022.04.001","volume":"70","author":"T Divi\u00e1k","year":"2022","unstructured":"Divi\u00e1k T, van Nassau CS, Dijkstra JK, Snijders TA (2022) Dynamics and disruption: structural and individual changes in two dutch jihadi networks after police interventions. Soc Netw 70:364\u2013374","journal-title":"Soc Netw"},{"key":"531_CR19","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511761942","volume-title":"Networks, crowds, and markets","author":"D Easley","year":"2010","unstructured":"Easley D, Kleinberg J (2010) Networks, crowds, and markets, vol 8. Cambridge University Press, Cambridge"},{"key":"531_CR20","doi-asserted-by":"publisher","first-page":"24","DOI":"10.11114\/ijsss.v5i5.2351","volume":"5","author":"A Englefield","year":"2017","unstructured":"Englefield A, Ariel B (2017) Searching for influencing actors in cooffending networks: the recruiter. Int\u2019l J Soc Sci Stud 5:24","journal-title":"Int\u2019l J Soc Sci Stud"},{"key":"531_CR21","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1146\/annurev-criminol-011518-024701","volume":"2","author":"K Faust","year":"2019","unstructured":"Faust K, Tita GE (2019) Social networks and crime: pitfalls and promises for advancing the field. Annu Rev Criminol 2:99\u2013122","journal-title":"Annu Rev Criminol"},{"key":"531_CR22","doi-asserted-by":"crossref","unstructured":"Feinberg F, Bruch E, Braun M, Falk BH, Fefferman N, Feit EM, et al (2020) Choices in networks: a research framework. Mark Lett 31(4):349\u2013359","DOI":"10.1007\/s11002-020-09541-9"},{"key":"531_CR23","doi-asserted-by":"crossref","unstructured":"Felbab-Brown V (2013) Focused deterrence, selective targeting, drug trafficking and organised crime: concepts and practicalities. Selective targeting, drug trafficking and organised crime: concepts and practicalities","DOI":"10.2139\/ssrn.2290302"},{"issue":"5","key":"531_CR24","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1086\/227352","volume":"86","author":"SL Feld","year":"1981","unstructured":"Feld SL (1981) The focused organization of social ties. Am J Sociol 86(5):1015\u20131035","journal-title":"Am J Sociol"},{"key":"531_CR81","first-page":"149","volume":"16","author":"M Felson","year":"2003","unstructured":"Felson M (2003) The process of co-offending. Crime Prev Stud 16:149\u2013168","journal-title":"Crime Prev Stud"},{"issue":"5","key":"531_CR25","doi-asserted-by":"publisher","first-page":"123","DOI":"10.3390\/fi14050123","volume":"14","author":"A Ficara","year":"2022","unstructured":"Ficara A, Fiumara G, Catanese S, De Meo P, Liu X (2022) The whole is greater than the sum of the parts: a multilayer approach on criminal networks. Future Internet 14(5):123","journal-title":"Future Internet"},{"key":"531_CR26","doi-asserted-by":"crossref","unstructured":"Ficara A, Fiumara G, Meo PD, Catanese S (2021) Multilayer network analysis: the identification of key actors in a Sicilian Mafia operation. In: International conference on future access enablers of ubiquitous and intelligent infrastructures, pp 120\u2013134","DOI":"10.1007\/978-3-030-78459-1_9"},{"key":"531_CR27","unstructured":"Gambetta D (2011) Codes of the underworld. In: Codes of the underworld. Princeton University Press, Princeton"},{"issue":"2","key":"531_CR28","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/376284.375665","volume":"30","author":"J Gehrke","year":"2001","unstructured":"Gehrke J, Korn F, Srivastava D (2001) On computing correlated aggregates over continual data streams. ACM SIGMOD Rec 30(2):13\u201324","journal-title":"ACM SIGMOD Rec"},{"key":"531_CR29","doi-asserted-by":"crossref","unstructured":"Gouldner AW (1960) The norm of reciprocity: a preliminary statement. Am Soc Rev, pp 161\u2013178","DOI":"10.2307\/2092623"},{"issue":"6","key":"531_CR30","doi-asserted-by":"publisher","first-page":"1360","DOI":"10.1086\/225469","volume":"78","author":"MS Granovetter","year":"1973","unstructured":"Granovetter MS (1973) The strength of weak ties. Am J Sociol 78(6):1360\u20131380","journal-title":"Am J Sociol"},{"key":"531_CR31","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.socnet.2017.03.008","volume":"51","author":"T Grund","year":"2017","unstructured":"Grund T, Morselli C (2017) Overlapping crime: stability and specialization of co-offending relationships. Soc Netw 51:14\u201322","journal-title":"Soc Netw"},{"issue":"3","key":"531_CR32","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1177\/1043986214553377","volume":"31","author":"TU Grund","year":"2015","unstructured":"Grund TU, Densley JA (2015) Ethnic homophily and triad closure: mapping internal gang structure using exponential random graph models. J Contemp Crim Justice 31(3):354\u2013370","journal-title":"J Contemp Crim Justice"},{"key":"531_CR33","doi-asserted-by":"crossref","unstructured":"Hedstr\u00f6m P, Swedberg R (1998) Social mechanisms: an introductory essay. Social mechanisms: an analytical approach to social theory, pp 1\u201331","DOI":"10.1017\/CBO9780511663901.001"},{"key":"531_CR34","doi-asserted-by":"publisher","unstructured":"Hochstetler A (2014) Co-offending and offender decision-making. In: Bruinsma G, Weisburd D (eds) Encyclopedia of criminology and criminal justice. Springer New York, pp 570\u2013581. https:\/\/doi.org\/10.1007\/978-1-4614-5690-2_111","DOI":"10.1007\/978-1-4614-5690-2_111"},{"issue":"2","key":"531_CR35","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1177\/104649647100200201","volume":"2","author":"PW Holland","year":"1971","unstructured":"Holland PW, Leinhardt S (1971) Transitivity in structural models of small groups. Comp Group Stud 2(2):107\u2013124","journal-title":"Comp Group Stud"},{"key":"531_CR36","doi-asserted-by":"publisher","DOI":"10.1002\/9781118548387","volume-title":"Applied logistic regression","author":"DW Hosmer Jr","year":"2013","unstructured":"Hosmer DW Jr, Lemeshow S, Sturdivant RX (2013) Applied logistic regression, vol 398. Wiley, London"},{"key":"531_CR37","unstructured":"INPEC (2021) Registro de la poblaci\u00f3n privada de la libertad. Retrieved 17-05-2021, from https:\/\/www.inpec.gov.co\/registro-de-la-poblacion-privada-de-la-libertad"},{"key":"531_CR38","unstructured":"Iwanski N, Frank R (2013) The evolution of a drug co-arrest network. In: Crime and networks. Routledge, pp 64\u201392"},{"issue":"2","key":"531_CR39","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1093\/oxfordjournals.pan.a004868","volume":"9","author":"G King","year":"2001","unstructured":"King G, Zeng L (2001) Logistic regression in rare events data. Polit Anal 9(2):137\u2013163","journal-title":"Polit Anal"},{"issue":"3","key":"531_CR40","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1093\/comnet\/cnu016","volume":"2","author":"M Kivel\u00e4","year":"2014","unstructured":"Kivel\u00e4 M, Arenas A, Barthelemy M, Gleeson JP, Moreno Y, Porter MA (2014) Multilayer networks. J Complex Netw 2(3):203\u2013271. https:\/\/doi.org\/10.1093\/comnet\/cnu016","journal-title":"J Complex Netw"},{"issue":"2","key":"531_CR41","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1177\/0022427810391535","volume":"48","author":"A Malm","year":"2011","unstructured":"Malm A, Bichler G (2011) Networks of collaborating criminals: assessing the structural vulnerability of drug markets. J Res Crime Delinq 48(2):271\u2013297. https:\/\/doi.org\/10.1177\/0022427810391535","journal-title":"J Res Crime Delinq"},{"issue":"3","key":"531_CR42","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.1353\/sof.2001.0027","volume":"79","author":"B McCarthy","year":"2001","unstructured":"McCarthy B, Hagan J (2001) When crime pays: capital, competence, and criminal success. Soc Forces 79(3):1035\u20131060","journal-title":"Soc Forces"},{"issue":"1","key":"531_CR43","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1093\/sf\/77.1.155","volume":"77","author":"B McCarthy","year":"1998","unstructured":"McCarthy B, Hagan J, Cohen LE (1998) Uncertainty, cooperation, and crime: understanding the decision to co-offend. Soc Forces 77(1):155\u2013184. https:\/\/doi.org\/10.1093\/sf\/77.1.155","journal-title":"Soc Forces"},{"key":"531_CR44","first-page":"105","volume-title":"Frontiers in econometrics","author":"D McFadden","year":"1974","unstructured":"McFadden D (1974) Conditional logit analysis of qualitative choice behavior. In: Zarembka P (ed) Frontiers in econometrics. Academic Press, New York, pp 105\u2013142"},{"key":"531_CR45","unstructured":"McFadden D (1981) Econometric models of probabilistic choice. Structural analysis of discrete data with econometric applications, 198272"},{"issue":"2","key":"531_CR46","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1111\/j.1745-9125.2011.00266.x","volume":"50","author":"JM McGloin","year":"2012","unstructured":"McGloin JM, Nguyen H (2012) It was my idea: considering the instigation of co-offending. Criminology 50(2):463\u2013494","journal-title":"Criminology"},{"issue":"1","key":"531_CR47","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1177\/0022427809348905","volume":"47","author":"JM McGloin","year":"2010","unstructured":"McGloin JM, Piquero AR (2010) On the relationship between co-offending network redundancy and offending versatility. J Res Crime Delinq 47(1):63\u201390","journal-title":"J Res Crime Delinq"},{"issue":"1","key":"531_CR48","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1111\/j.1745-9125.2008.00105.x","volume":"46","author":"JM McGloin","year":"2008","unstructured":"McGloin JM, Sullivan CJ, Piquero AR, Bacon S (2008) Investigating the stability of co-offending and co-offenders among a sample of youthful offenders. Criminology 46(1):155\u2013188","journal-title":"Criminology"},{"issue":"3","key":"531_CR49","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1111\/1745-9125.12111","volume":"54","author":"JM McGloin","year":"2016","unstructured":"McGloin JM, Thomas KJ (2016) Incentives for collective deviance: group size and changes in perceived risk, cost, and reward. Criminology 54(3):459\u2013486","journal-title":"Criminology"},{"issue":"2","key":"531_CR50","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1080\/15427951.2004.10129088","volume":"1","author":"M Mitzenmacher","year":"2004","unstructured":"Mitzenmacher M (2004) A brief history of generative models for power law and lognormal distributions. Internet Math 1(2):226\u2013251","journal-title":"Internet Math"},{"key":"531_CR51","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511570919","volume-title":"Coercive power in social exchange","author":"LD Molm","year":"1997","unstructured":"Molm LD (1997) Coercive power in social exchange. Cambridge University Press, Cambridge"},{"key":"531_CR52","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-09526-4","volume-title":"Inside criminal networks","author":"C Morselli","year":"2009","unstructured":"Morselli C (2009) Inside criminal networks, vol 8. Springer, Berlin"},{"issue":"1","key":"531_CR53","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.socnet.2006.05.001","volume":"29","author":"C Morselli","year":"2007","unstructured":"Morselli C, Gigu\u00e8re C, Petit K (2007) The efficiency\/security trade-off in criminal networks. Soc Netw 29(1):143\u2013153. https:\/\/doi.org\/10.1016\/j.socnet.2006.05.001","journal-title":"Soc Netw"},{"issue":"2","key":"531_CR54","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1080\/17440570701362208","volume":"8","author":"C Morselli","year":"2007","unstructured":"Morselli C, Petit K (2007) Law-enforcement disruption of a drug importation network. Global Crime 8(2):109\u2013130","journal-title":"Global Crime"},{"key":"531_CR55","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198805090.001.0001","volume-title":"Networks","author":"M Newman","year":"2018","unstructured":"Newman M (2018) Networks. Oxford University Press, Oxford"},{"key":"531_CR56","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/j.socnet.2022.02.013","volume":"70","author":"A Nieto","year":"2022","unstructured":"Nieto A, Davies T, Borrion H (2022) \u201cOffending with the accomplices of my accomplices\u2019\u2019: evidence and implications regarding triadic closure in co-offending networks. Soc Netw 70:325\u2013333","journal-title":"Soc Netw"},{"key":"531_CR57","unstructured":"Opsahl T, Hogan B (2011) Modeling the evolution of continuously-observed networks: communication in a facebook-like community. arXiv preprint arXiv:1010.2141"},{"key":"531_CR58","doi-asserted-by":"crossref","unstructured":"Overgoor J, Benson AR, Ugander J (2019) Choosing to grow a graph: modeling network formation as discrete choice. The World Wide Web Conference","DOI":"10.1145\/3308558.3313662"},{"key":"531_CR59","doi-asserted-by":"crossref","unstructured":"Overgoor J, Pakapol Supaniratisai G, Ugander J (2020) Scaling choice models of relational social data. In: Proceedings of the 26th ACM SIGKDD international conference on knowledge discovery and data mining, pp 1990\u20131998","DOI":"10.1145\/3394486.3403250"},{"key":"531_CR60","first-page":"101","volume":"17","author":"AV Papachristos","year":"2011","unstructured":"Papachristos AV (2011) The coming of a networked criminology. Adv Criminol Theory 17:101\u2013140","journal-title":"Adv Criminol Theory"},{"issue":"3","key":"531_CR61","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1016\/j.socnet.2007.01.007","volume":"29","author":"G Plickert","year":"2007","unstructured":"Plickert G, C\u00f4t\u00e9 RR, Wellman B (2007) It\u2019s not who you know, it\u2019s how you know them: who exchanges what with whom? Soc Netw 29(3):405\u2013429","journal-title":"Soc Netw"},{"key":"531_CR62","unstructured":"Reiss AJ (1986) Co-offending influences on criminal careers. Criminal careers and career criminals"},{"key":"531_CR63","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1086\/449145","volume":"10","author":"AJ Reiss","year":"1988","unstructured":"Reiss AJ (1988) Co-offending and criminal careers. Crime Justice 10:117\u2013170. https:\/\/doi.org\/10.1086\/449145","journal-title":"Crime Justice"},{"issue":"2","key":"531_CR64","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/s12117-008-9059-4","volume":"12","author":"G Robins","year":"2009","unstructured":"Robins G (2009) Understanding individual behaviors within covert networks: the interplay of individual qualities, psychological predispositions, and network effects. Trends Organized Crime 12(2):166\u2013187. https:\/\/doi.org\/10.1007\/s12117-008-9059-4","journal-title":"Trends Organized Crime"},{"key":"531_CR65","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511489310","volume-title":"Delinquent networks: youth co-offending in Stockholm","author":"J Sarnecki","year":"2001","unstructured":"Sarnecki J (2001) Delinquent networks: youth co-offending in Stockholm. Cambridge University Press, Cambridge"},{"issue":"11","key":"531_CR66","doi-asserted-by":"publisher","first-page":"1208","DOI":"10.1038\/s41562-020-0912-z","volume":"4","author":"U Simonsohn","year":"2020","unstructured":"Simonsohn U, Simmons JP, Nelson LD (2020) Specification curve analysis. Nat Hum Behav 4(11):1208\u20131214","journal-title":"Nat Hum Behav"},{"issue":"3","key":"531_CR67","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1177\/002224379202900301","volume":"29","author":"I Simonson","year":"1992","unstructured":"Simonson I, Tversky A (1992) Choice in context: tradeoff contrast and extremeness aversion. J Mark Res 29(3):281\u2013295","journal-title":"J Mark Res"},{"key":"531_CR68","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcrimjus.2020.101755","volume":"73","author":"TB Smith","year":"2021","unstructured":"Smith TB (2021) Gang crackdowns and offender centrality in a countywide co-offending network: a networked evaluation of operation triple beam. J Crim Just 73:101755","journal-title":"J Crim Just"},{"issue":"1","key":"531_CR69","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.socnet.2009.02.004","volume":"32","author":"TA Snijders","year":"2010","unstructured":"Snijders TA, Van de Bunt GG, Steglich CE (2010) Introduction to stochastic actor-based models for network dynamics. Soc Netw 32(1):44\u201360","journal-title":"Soc Netw"},{"issue":"14","key":"531_CR70","doi-asserted-by":"publisher","first-page":"318","DOI":"10.15195\/v4.a14","volume":"4","author":"C Stadtfeld","year":"2017","unstructured":"Stadtfeld C, Block P (2017) Interactions, actors, and time: dynamic network actor models for relational events. Sociol Sci 4(14):318\u2013352. https:\/\/doi.org\/10.15195\/v4.a14","journal-title":"Sociol Sci"},{"key":"531_CR71","unstructured":"Thrasher FM (1963) The gang: a study of 1313 gangs in Chicago. University of Chicago Press"},{"key":"531_CR72","volume-title":"Discrete choice methods with simulation","author":"KE Train","year":"2009","unstructured":"Train KE (2009) Discrete choice methods with simulation. Cambridge University Press, Cambridge"},{"key":"531_CR73","doi-asserted-by":"crossref","unstructured":"Tremblay P (1993) Searching for suitable co-offenders. Routine activity and rational choice, vol. 5, pp 17\u201336","DOI":"10.4324\/9781315128788-2"},{"key":"531_CR74","doi-asserted-by":"publisher","unstructured":"van Mastrigt SB (2017) Co-offending and co-offender selection. The Oxford handbook of offender decision making, 6, 338. https:\/\/doi.org\/10.1093\/oxfordhb\/9780199338801.013.21","DOI":"10.1093\/oxfordhb\/9780199338801.013.21"},{"issue":"2","key":"531_CR75","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1080\/07418825.2010.482535","volume":"28","author":"SB Van Mastrigt","year":"2011","unstructured":"Van Mastrigt SB, Farrington DP (2011) Prevalence and characteristics of co-offending recruiters. Justice Q 28(2):325\u2013359","journal-title":"Justice Q"},{"issue":"1","key":"531_CR76","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1111\/j.1745-9125.1996.tb01193.x","volume":"34","author":"M Warr","year":"1996","unstructured":"Warr M (1996) Organization and instigation in delinquent groups. Criminology 34(1):11\u201337","journal-title":"Criminology"},{"key":"531_CR77","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511803956","volume-title":"Companions in crime: the social aspects of criminal conduct","author":"M Warr","year":"2002","unstructured":"Warr M (2002) Companions in crime: the social aspects of criminal conduct. Cambridge University Press, Cambridge"},{"key":"531_CR78","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478","volume-title":"Social network analysis: methods and applications","author":"S Wasserman","year":"1994","unstructured":"Wasserman S, Faust K (1994) Social network analysis: methods and applications, vol 8. Cambridge University Press, Cambridge"},{"issue":"2","key":"531_CR79","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1093\/bjc\/43.2.398","volume":"43","author":"FM Weerman","year":"2003","unstructured":"Weerman FM (2003) Co-offending as social exchange: explaining characteristics of co-offending. Br J Criminol 43(2):398\u2013416. https:\/\/doi.org\/10.1093\/bjc\/43.2.398","journal-title":"Br J Criminol"},{"key":"531_CR80","doi-asserted-by":"publisher","unstructured":"Weerman FM (2014) Theories of co-offending. Encyclopedia of criminology and criminal justice 5173\u20135184. https:\/\/doi.org\/10.1007\/978-1-4614-5690-2_110","DOI":"10.1007\/978-1-4614-5690-2_110"}],"container-title":["Applied Network Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-023-00531-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41109-023-00531-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-023-00531-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T12:49:32Z","timestamp":1701694172000},"score":1,"resource":{"primary":{"URL":"https:\/\/appliednetsci.springeropen.com\/articles\/10.1007\/s41109-023-00531-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,13]]},"references-count":81,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["531"],"URL":"https:\/\/doi.org\/10.1007\/s41109-023-00531-0","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-2217762\/v1","asserted-by":"object"}]},"ISSN":["2364-8228"],"issn-type":[{"value":"2364-8228","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,13]]},"assertion":[{"value":"30 October 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 January 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"4"}}