{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:09:01Z","timestamp":1761610141490,"version":"build-2065373602"},"reference-count":15,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T00:00:00Z","timestamp":1375056000000},"content-version":"vor","delay-in-days":4227,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Electronic Notes in Theoretical Computer Science"],"published-print":{"date-parts":[[2002,1]]},"DOI":"10.1016\/s1571-0661(04)00303-2","type":"journal-article","created":{"date-parts":[[2004,2,5]],"date-time":"2004-02-05T05:34:35Z","timestamp":1075959275000},"page":"21-33","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":4,"special_numbering":"C","title":["A Category-Theoretic Approach to Social Network Analysis"],"prefix":"10.1016","volume":"61","author":[{"given":"Anthony H.","family":"Dekker","sequence":"first","affiliation":[]}],"member":"78","reference":[{"year":"1990","series-title":"\u201cCategory Theory for Computing Science,\u201d","author":"Barr","key":"10.1016\/S1571-0661(04)00303-2_NEWBIB1"},{"year":"1979","series-title":"\u201cModel Theory for Modal Logic,\u201d","author":"Bowen","key":"10.1016\/S1571-0661(04)00303-2_NEWBIB2"},{"year":"1999","series-title":"\u201cInto the Storm: A Study in Command,\u201d","author":"Clancy","key":"10.1016\/S1571-0661(04)00303-2_NEWBIB3"},{"key":"10.1016\/S1571-0661(04)00303-2_NEWBIB4","unstructured":"Dekker, Anthony H., Social Network Analysis in Military Headquarters using CAVALIER, Proceedings of 5th International Command & Control Research & Technology Symposium, Canberra, Australia, October 24\u201326, 2000. Available at http:\/\/www.dodccrp.org\/2000ICCRTS\/cd\/papers\/Track6\/039.pdf."},{"key":"10.1016\/S1571-0661(04)00303-2_NEWBIB5","unstructured":"Dekker, Anthony H., C3PO: a Tool for Automatic Sound Cryptographic Protocol Analysis, Proceedings of 13th IEEE Computer Security Foundations Workshop, Cambridge, England, July 3\u20135, 2000. Available electronically at http:\/\/www.acm.org\/~dekker\/c3po.pdf."},{"year":"1983","series-title":"\u201cProof Methods for Modal and Intuitionistic Logics,\u201d","author":"Fitting","key":"10.1016\/S1571-0661(04)00303-2_NEWBIB6"},{"year":"1985","series-title":"\u201cAlgorithmic Graph Theory,\u201d","author":"Gibbons","key":"10.1016\/S1571-0661(04)00303-2_NEWBIB7"},{"year":"1995","series-title":"\u201cDesert Warrior: A Personal View of the Gulf War by the Joint Forces Commander,\u201d","author":"bin Sultan","key":"10.1016\/S1571-0661(04)00303-2_NEWBIB8"},{"key":"10.1016\/S1571-0661(04)00303-2_NEWBIB9","series-title":"\u201cComputational Organization Theory\u201d","first-page":"89","article-title":"Graph Theoretical Dimensions of Informal Organizations","author":"Krackhardt","year":"1994"},{"year":"1986","series-title":"\u201cIntroduction to Higher Order Categorical Logic,\u201d","author":"Lambek","key":"10.1016\/S1571-0661(04)00303-2_NEWBIB10"},{"key":"10.1016\/S1571-0661(04)00303-2_NEWBIB11","first-page":"242","article-title":"Epistemic Logic for Computer Science: A Tutorial (Parts 1 and 2)","volume":"44","author":"Meyer","year":"1991","journal-title":"EATCS Bulletin"},{"year":"1986","series-title":"\u201cDenotational Semantics: A Methodology for Language Development,\u201d","author":"Schmidt David","key":"10.1016\/S1571-0661(04)00303-2_NEWBIB12"},{"year":"1990","series-title":"\u201cAutomated Deduction in Nonclassical Logics,\u201d","author":"Wallen","key":"10.1016\/S1571-0661(04)00303-2_NEWBIB13"},{"year":"1994","series-title":"\u201cSocial Network Analysis: Methods and Applications,\u201d","author":"Wasserman","key":"10.1016\/S1571-0661(04)00303-2_NEWBIB14"},{"key":"10.1016\/S1571-0661(04)00303-2_NEWBIB15","unstructured":"Dekker, Anthony H., C4ISR Architectures, Social Network Analysis and the FINC Methodology: An Experiment in Military Organisational Structure, to appear. Available at http:\/\/www.acm.org\/~dekker\/FINCX\/."}],"container-title":["Electronic Notes in Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104003032?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104003032?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:04:15Z","timestamp":1761609855000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1571066104003032"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,1]]},"references-count":15,"alternative-id":["S1571066104003032"],"URL":"https:\/\/doi.org\/10.1016\/s1571-0661(04)00303-2","relation":{},"ISSN":["1571-0661"],"issn-type":[{"type":"print","value":"1571-0661"}],"subject":[],"published":{"date-parts":[[2002,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A Category-Theoretic Approach to Social Network Analysis","name":"articletitle","label":"Article Title"},{"value":"Electronic Notes in Theoretical Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/S1571-0661(04)00303-2","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"converted-article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2002 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}