{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T05:38:21Z","timestamp":1768196301864,"version":"3.49.0"},"reference-count":113,"publisher":"Oxford University Press (OUP)","issue":"4","license":[{"start":{"date-parts":[[2022,6,29]],"date-time":"2022-06-29T00:00:00Z","timestamp":1656460800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,29]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Networks are resilient to internal failures or external attacks. The resiliency is often beneficial, but there are scenarios where the collapse of a network would benefit society, such as the dismantlement of terrorist, rebel or organized crime groups. In this article, we develop a method to estimate the effect of knockouts and apply our method to the Islamic State recruitment network. Using our novel application, we demonstrate how coordinated attacks against recruiters might reduce the Islamic State\u2019s ability to mobilize new fighters. This analysis has direct implications for research on network resilience and terrorist recruitment.<\/jats:p>","DOI":"10.1093\/comnet\/cnac017","type":"journal-article","created":{"date-parts":[[2022,5,9]],"date-time":"2022-05-09T19:11:32Z","timestamp":1652123492000},"source":"Crossref","is-referenced-by-count":4,"title":["Resilience to stress in bipartite networks: application to the Islamic State recruitment network"],"prefix":"10.1093","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4358-5382","authenticated-orcid":false,"given":"Selena","family":"Wang","sequence":"first","affiliation":[{"name":"Department of Psychology, The Ohio State University , Columbus, OH 43210, USA"}]},{"given":"Jared","family":"Edgerton","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas , TX, USA 75083"}]}],"member":"286","published-online":{"date-parts":[[2022,7,21]]},"reference":[{"key":"2022072114204955100_B1","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1038\/35019019","article-title":"Error and attack tolerance of complex networks","volume":"406","author":"Albert,","year":"2000","journal-title":"Nature"},{"key":"2022072114204955100_B2","doi-asserted-by":"crossref","first-page":"219802","DOI":"10.1103\/PhysRevLett.87.219802","article-title":"Cohen, Erez, Ben-Avraham, and Havlin reply","volume":"87","author":"Cohen,","year":"2001","journal-title":"Phys. Rev. Lett."},{"key":"2022072114204955100_B3","doi-asserted-by":"crossref","first-page":"188701","DOI":"10.1103\/PhysRevLett.94.188701","article-title":"Stability and topology of scale-free networks under attack and defense strategies","volume":"94","author":"Gallos,","year":"2005","journal-title":"Phys. Rev. Lett."},{"key":"2022072114204955100_B4","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1038\/nature16948","article-title":"Universal resilience patterns in complex networks","volume":"530","author":"Gao,","year":"2016","journal-title":"Nature"},{"key":"2022072114204955100_B5","doi-asserted-by":"crossref","first-page":"042313","DOI":"10.1103\/PhysRevE.97.042313","article-title":"Resilience of networks to environmental stress: from regular to random networks","volume":"97","author":"Eom,","year":"2018","journal-title":"Phys. Rev. E"},{"key":"2022072114204955100_B6","first-page":"609","article-title":"Measuring and improving the core resilience of networks","volume-title":"Proceedings of the 2018 World Wide Web Conference","author":"Laishram,","year":"2018"},{"key":"2022072114204955100_B7","doi-asserted-by":"crossref","first-page":"8673","DOI":"10.1073\/pnas.1814982116","article-title":"Scale-free resilience of real traffic jams","volume":"116","author":"Zhang,","year":"2019","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"2022072114204955100_B8","doi-asserted-by":"crossref","first-page":"4626","DOI":"10.1103\/PhysRevLett.85.4626","article-title":"Resilience of the internet to random breakdowns","volume":"85","author":"Cohen,","year":"2000","journal-title":"Phys. Rev. Lett."},{"key":"2022072114204955100_B9","first-page":"1","article-title":"Resilience of the world wide web: a longitudinal two-mode network analysis","volume":"6","author":"Barnett,","year":"2016","journal-title":"Soc. Netw. Anal. Mining"},{"key":"2022072114204955100_B10","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1109\/MCOM.2014.6957154","article-title":"Assessing and safeguarding network resilience to nodal attacks","volume":"52","author":"Chen,","year":"2014","journal-title":"IEEE Commun. Mag."},{"key":"2022072114204955100_B11","doi-asserted-by":"crossref","first-page":"6911","DOI":"10.1073\/pnas.1801588115","article-title":"Resilience of networks with community structure behaves as if under an external field","volume":"115","author":"Dong,","year":"2018","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"2022072114204955100_B12","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1007\/s11067-014-9256-4","article-title":"Spatial autocorrelation in spatial interactions models: geographic scale and resolution implications for network resilience and vulnerability","volume":"15","author":"Griffith,","year":"2015","journal-title":"Netw. Spatial Econ."},{"key":"2022072114204955100_B13","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1177\/0004867412471437","article-title":"Is depression contagious? The importance of social networks and the implications of contagion theory","volume":"47","author":"Bastiampillai,","year":"2013","journal-title":"Aust. N. Z. J. Psychiatry"},{"key":"2022072114204955100_B14","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/j.neuroimage.2015.08.020","article-title":"Neural correlates of psychological resilience and their relation to life satisfaction in a sample of healthy young adults","volume":"123","author":"Kong,","year":"2015","journal-title":"Neuroimage"},{"key":"2022072114204955100_B15","doi-asserted-by":"crossref","first-page":"7156","DOI":"10.1073\/pnas.1311231111","article-title":"Controllability in protein interaction networks","volume":"111","author":"Wuchty,","year":"2014","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"2022072114204955100_B16","doi-asserted-by":"crossref","first-page":"4426","DOI":"10.1073\/pnas.1818013116","article-title":"Evolution of resilience in protein interactomes across the tree of life","volume":"116","author":"Zitnik,","year":"2019","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"2022072114204955100_B17","doi-asserted-by":"crossref","first-page":"15","DOI":"10.5751\/ES-01462-110115","article-title":"Toward a network perspective of the study of resilience in social-ecological systems","volume":"11","author":"Janssen,","year":"2006","journal-title":"Ecol. Soc."},{"key":"2022072114204955100_B18","doi-asserted-by":"crossref","first-page":"13708","DOI":"10.1073\/pnas.1604401113","article-title":"Multiplex social ecological network analysis reveals how social changes affect community robustness more than resource depletion","volume":"113","author":"Baggio,","year":"2016","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"2022072114204955100_B19","doi-asserted-by":"crossref","first-page":"1172","DOI":"10.1111\/ele.12648","article-title":"Navigating the complexity of ecological stability","volume":"19","author":"Donohue,","year":"2016","journal-title":"Ecol. Lett."},{"key":"2022072114204955100_B20","doi-asserted-by":"crossref","first-page":"r2","DOI":"10.5751\/ES-01396-1001r02","article-title":"Network structure, diversity, and proactive resilience building: a response to Tompkins and Adger","volume":"10","author":"Newman,","year":"2005","journal-title":"Ecol. Soc."},{"key":"2022072114204955100_B21","doi-asserted-by":"crossref","first-page":"6595","DOI":"10.1073\/pnas.1404770112","article-title":"A natural experiment of social network formation and dynamics","volume":"112","author":"Phan,","year":"2015","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"2022072114204955100_B22","doi-asserted-by":"crossref","first-page":"1488","DOI":"10.3390\/ijerph14121488","article-title":"Social networks, engagement and resilience in university students","volume":"14","author":"Fern\u00e1ndez-Mart\u00ednez,","year":"2017","journal-title":"Int. J. Environ. Res. Public Health"},{"key":"2022072114204955100_B23","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1080\/12265934.2016.1166979","article-title":"Evaluation of the resilience of air transportation network with adaptive capacity","volume":"20(sup1)","author":"Yoo,","year":"2016","journal-title":"Int. J. Urban Sci."},{"key":"2022072114204955100_B24","doi-asserted-by":"crossref","first-page":"11883","DOI":"10.1073\/pnas.1810630115","article-title":"Quantifying resilience of humans and other animals","volume":"115","author":"Scheffer,","year":"2018","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"2022072114204955100_B25","first-page":"589","article-title":"Microgrids for enhancing the power grid resilience in extreme conditions","volume":"8","author":"Liu,","year":"2016","journal-title":"IEEE Trans. Smart Grid"},{"key":"2022072114204955100_B26","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1016\/j.tree.2006.03.013","article-title":"Network structure and the biology of populations","volume":"21","author":"May.,","year":"2006","journal-title":"Trends Ecol. Evol."},{"key":"2022072114204955100_B27","article-title":"Destabilizing terrorist networks","volume-title":"NAACSOS Conference Proceedings","author":"Carley,","year":"2003"},{"key":"2022072114204955100_B28","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/s10588-006-7083-y","article-title":"Destabilization of covert networks","volume":"12","author":"Carley,","year":"2006","journal-title":"Comput. Math. Org. Theory"},{"key":"2022072114204955100_B29","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MIS.2007.4338493","article-title":"Modeling and simulating terrorist networks in social and geospatial dimensions","volume":"22","author":"Moon,","year":"2007","journal-title":"IEEE Intell. Syst."},{"key":"2022072114204955100_B30","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1162\/ISEC_a_00075","article-title":"Targeting top terrorists: how leadership decapitation contributes to counterterrorism","volume":"36","author":"Price,","year":"2012","journal-title":"Int. Secur."},{"key":"2022072114204955100_B31","article-title":"Testing the snake head strategy: does killing or capturing its leaders reduce a terrorist group\u2019s activity","volume":"9","author":"Mannes,","year":"2008","journal-title":"J. Int. Policy Solut."},{"key":"2022072114204955100_B32","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1080\/03050629.2020.1719406","article-title":"Too central to fail? terror networks and leadership decapitation","volume":"46","author":"Milton,","year":"2020","journal-title":"Int. Interact."},{"key":"2022072114204955100_B33","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1177\/0738894217724135","article-title":"Lasting peace or temporary calm? Rebel group decapitation and civil war outcomes","volume":"37","author":"Ryckman,","year":"2020","journal-title":"Conflict Manag. Peace Sci."},{"key":"2022072114204955100_B34","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1111\/j.1468-2486.2005.00536.x","article-title":"The limits of terrorism: a network perspective","volume":"7","author":"Matthew,","year":"2005","journal-title":"Int. Stud. Rev."},{"key":"2022072114204955100_B35","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1016\/j.ijlcj.2009.10.003","article-title":"Criminal organizations and resilience","volume":"37","author":"Ayling,","year":"2009","journal-title":"Int. J. Law, Crime Justice"},{"key":"2022072114204955100_B36","first-page":"43","article-title":"Mapping networks of terrorist cells","volume":"24","author":"Krebs,","year":"2002","journal-title":"Connections"},{"key":"2022072114204955100_B37","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1080\/09636410903369068","article-title":"When heads roll: assessing the effectiveness of leadership decapitation","volume":"18","author":"Jordan,","year":"2009","journal-title":"Secur. Stud."},{"key":"2022072114204955100_B38","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1515\/9781400841356.183","article-title":"Graph structure in the web","volume-title":"The Structure and Dynamics of Networks","author":"Broder,","year":"2011"},{"key":"2022072114204955100_B39","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1038\/35019019","article-title":"Attack and error tolerance of complex networks","volume":"406","author":"Albert,","year":"2000","journal-title":"Nature"},{"key":"2022072114204955100_B40","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1038\/35075138","article-title":"Lethality and centrality in protein networks","volume":"411","author":"Jeong,","year":"2001","journal-title":"Nature"},{"key":"2022072114204955100_B41","doi-asserted-by":"crossref","first-page":"12917","DOI":"10.1073\/pnas.192407699","article-title":"Food-web structure and network theory: the role of connectance and size","volume":"99","author":"Dunne,","year":"2002","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"2022072114204955100_B42","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1080\/09546550701246817","article-title":"Introducing the global terrorism database","volume":"19","author":"LaFree,","year":"2007","journal-title":"Terror. Polit. Violence"},{"key":"2022072114204955100_B43","doi-asserted-by":"crossref","first-page":"1090","DOI":"10.1198\/016214502388618906","article-title":"Latent space approaches to social network analysis","volume":"97","author":"Hoff,","year":"2002","journal-title":"J. Am. Stat. Assoc."},{"key":"2022072114204955100_B44","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1080\/00401706.2021.1952900","article-title":"Anomaly detection in large scale networks with latent space models","volume":"64","author":"Lee,","year":"2019","journal-title":"Technometrics"},{"key":"2022072114204955100_B45","doi-asserted-by":"crossref","first-page":"6629","DOI":"10.1073\/pnas.1606295113","article-title":"Interlocking directorates in irish companies using a latent space model for bipartite networks","volume":"113","author":"Friel,","year":"2016","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"2022072114204955100_B46","first-page":"1145","article-title":"Dynamic social network analysis using latent space models","volume-title":"Advances in Neural Information Processing Systems","author":"Sarkar,","year":"2005"},{"key":"2022072114204955100_B47","doi-asserted-by":"crossref","first-page":"1646","DOI":"10.1080\/01621459.2014.988214","article-title":"Latent space models for dynamic networks","volume":"110","author":"Sewell,","year":"2015","journal-title":"J. Am. Stat. Assoc."},{"key":"2022072114204955100_B48","doi-asserted-by":"crossref","first-page":"1217","DOI":"10.1214\/16-AOAS955","article-title":"Latent space models for multiview network data","volume":"11","author":"Salter-Townshend,","year":"2017","journal-title":"Ann. Appl. Stat."},{"key":"2022072114204955100_B49","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1111\/j.1467-985X.2007.00471.x","article-title":"Model-based clustering for social networks","volume":"170","author":"Handcock,","year":"2007","journal-title":"J. R. Stat. Soc."},{"key":"2022072114204955100_B50","first-page":"420","article-title":"A latent space approach to dynamic embedding of co-occurrence data","volume-title":"Proceedings of the Eleventh International Conference on Artificial Intelligence and Statistics","author":"Sarkar,","year":"2007"},{"key":"2022072114204955100_B51","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1017\/pan.2018.50","article-title":"Inferential approaches for network analysis: amen for latent factor models","volume":"27","author":"Minhas,","year":"2019","journal-title":"Polit. Anal."},{"key":"2022072114204955100_B52","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1086\/706459","article-title":"Networks of violence: predicting conflict in Nigeria","volume":"82","author":"Dorff,","year":"2020","journal-title":"J. Polit."},{"key":"2022072114204955100_B53","article-title":"Joint latent space model for social networks with multivariate attributes","author":"Wang,","year":"2021"},{"key":"2022072114204955100_B54","first-page":"657","article-title":"Modeling homophily and stochastic equivalence in symmetric relational data","volume-title":"Advances in Neural Information Processing Systems","author":"Hoff,","year":"2008"},{"key":"2022072114204955100_B55","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1111\/j.2044-8317.1991.tb00949.x","article-title":"Statistical modelling of one-mode and two-mode networks: simultaneous analysis of graphs and bipartite graphs","volume":"44","author":"Wasserman,","year":"1991","journal-title":"Br. J. Math. Stat. Psychol."},{"key":"2022072114204955100_B56","doi-asserted-by":"crossref","first-page":"026126","DOI":"10.1103\/PhysRevE.67.026126","article-title":"Mixing patterns in networks","volume":"67","author":"Newman,","year":"2003","journal-title":"Phys. Rev. E"},{"key":"2022072114204955100_B57","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1162\/ISEC_a_00076","article-title":"Does decapitation work? Assessing the effectiveness of leadership targeting in counterinsurgency campaigns","volume":"36","author":"Johnston,","year":"2012","journal-title":"Int. Secur."},{"key":"2022072114204955100_B58","first-page":"7","article-title":"Leadership decapitation and the impact on terrorist groups","volume":"11","author":"Yaoren,","year":"2019","journal-title":"Counter Terror. Trends Anal."},{"key":"2022072114204955100_B59","article-title":"Docs appear to reveal info on dozens of isis recruits","year":"2019","journal-title":"CBS News Online"},{"key":"2022072114204955100_B60","article-title":"The ISIS files: We unearthed thousands of internal documents that help explain how the islamic state stayed in power so long","author":"Callimachi,","year":"2018"},{"key":"2022072114204955100_B61","first-page":"13","article-title":"Unemployment and violent extremism: evidence from daesh foreign recruits","author":"Abdel-Jelil,","year":"2015"},{"key":"2022072114204955100_B62","article-title":"The Islamic State\u2019s veterans: contrasting the cohorts with Jihadi experience in Libya and Afghanistan","volume-title":"Technical Report","author":"Sterman,","year":"2018"},{"key":"2022072114204955100_B63","article-title":"Saudi foreign fighters: analysis of leaked Islamic State entry documents","volume-title":"Technical Report","author":"bin Khaled Al-Saud,","year":"2019"},{"key":"2022072114204955100_B64","doi-asserted-by":"crossref","DOI":"10.7249\/RR1192","volume-title":"Foundations of the Islamic State: Management, Money, and Terror in Iraq, 2005-2010","author":"Johnston,","year":"2016"},{"key":"2022072114204955100_B65","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1093\/isq\/sqaa012","article-title":"Who wants to be a suicide bomber? Evidence from Islamic state recruits","volume":"64","author":"Morris,","year":"2020","journal-title":"Int. Stud. Q."},{"key":"2022072114204955100_B66","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.socnet.2021.10.005","article-title":"Suicide bomber mobilization and kin and peer ties","volume":"70","author":"Edgerton,","year":"2022","journal-title":"Soc. Netw."},{"key":"2022072114204955100_B67","first-page":"15","article-title":"The ties that bind: how terrorists exploit family bonds","volume":"9","author":"Hafez,","year":"2016","journal-title":"CTC Sentinel"},{"key":"2022072114204955100_B68","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1080\/09546553.2016.1272456","article-title":"Social network analysis of German foreign fighters in Syria and Iraq","volume":"31","author":"Reynolds,","year":"2019","journal-title":"Terror. Polit. Violence"},{"key":"2022072114204955100_B69","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1145\/2757401.2757408","article-title":"Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks","volume-title":"Proceedings of the 16th annual International Conference on Digital Government Research","author":"Chatfield,","year":"2015"},{"key":"2022072114204955100_B70","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/978-94-6265-099-2_6","article-title":"The emerging role of social media in the recruitment of foreign fighters","volume-title":"Foreign Fighters under International Law and Beyond","author":"Weimann,","year":"2016"},{"key":"2022072114204955100_B71","doi-asserted-by":"crossref","first-page":"16","DOI":"10.12924\/johs2020.16010016","article-title":"Hypertargeting facebook profiles vulnerable to isis recruitment with \u201cbreaking the isis brand counter narrative video clips\" in multiple Facebook campaigns","volume":"16","author":"Speckhard,","year":"2020","journal-title":"J. Hum. Security"},{"key":"2022072114204955100_B72","doi-asserted-by":"crossref","first-page":"83","DOI":"10.11610\/Connections.15.3.07","article-title":"The mobilization and recruitment of foreign fighters: the case of Islamic state, 2012\u20132014","volume":"15","author":"Orozobekova,","year":"2016","journal-title":"Connections"},{"key":"2022072114204955100_B73","doi-asserted-by":"crossref","DOI":"10.1017\/9781108241700","volume-title":"Deadly Clerics: Blocked Ambition and the Paths to Jihad","author":"Nielsen,","year":"2017"},{"key":"2022072114204955100_B74","first-page":"1","article-title":"Analyzing the Dabiq magazine: the language and the propaganda structure of ISIS","volume-title":"International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation","author":"Bisgin,","year":"2019"},{"key":"2022072114204955100_B75","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1080\/1057610X.2019.1568008","article-title":"Recruitment and incitement to violence in the Islamic States online propaganda: comparative analysis of Dabiq and Rumiyah","volume":"44","author":"Lakomy,","year":"2021","journal-title":"Stud. Conflict Terror."},{"key":"2022072114204955100_B76","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815478","volume-title":"Social Network Analysis: Methods and Applications","author":"Wasserman,","year":"1994"},{"key":"2022072114204955100_B77","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1080\/00223980.1946.9917275","article-title":"Attitudes and cognitive organization","volume":"21","author":"Heider,","year":"1946","journal-title":"J. Psychol."},{"key":"2022072114204955100_B78","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1198\/016214504000001015","article-title":"Bilinear mixed-effects models for dyadic data","volume":"100","author":"Hoff,","year":"2005","journal-title":"J. Am. Stat. Assoc."},{"key":"2022072114204955100_B79","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1007\/978-3-540-69304-8_50","article-title":"Retracted: detecting hidden hierarchy in terrorist networks: some case studies","volume-title":"International Conference on Intelligence and Security Informatics","author":"Memon,","year":"2008"},{"key":"2022072114204955100_B80","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/978-3-7091-0388-3_5","article-title":"Understanding terrorist network topologies and their resilience against disruption","volume-title":"Counterterrorism and Open Source Intelligence","author":"Lindelauf,","year":"2011"},{"key":"2022072114204955100_B81","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1057\/sj.2012.21","article-title":"Social network analysis: a case study of the Islamist terrorist network","volume":"27","author":"Medina,","year":"2014","journal-title":"Secur. J."},{"key":"2022072114204955100_B82","doi-asserted-by":"crossref","DOI":"10.1108\/AJIM-11-2012-0089","article-title":"Exploring political discussions by korean twitter users: a look at opinion leadership and homophily phenomenon","author":"Choi,","year":"2014","journal-title":"Aslib J. Inf. Manag."},{"key":"2022072114204955100_B83","doi-asserted-by":"crossref","first-page":"2047","DOI":"10.1140\/epjst\/e2015-50319-0","article-title":"Homophily and polarization in the age of misinformation","volume":"225","author":"Bessi,","year":"2016","journal-title":"Eur. Phys. J. Special Topics"},{"key":"2022072114204955100_B84","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1111\/pops.12337","article-title":"The social structure of political echo chambers: variation in ideological homophily in online networks","volume":"38","author":"Boutyline,","year":"2017","journal-title":"Polit. Psychol."},{"key":"2022072114204955100_B85","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1086\/687533","article-title":"Political homophily in social relationships: evidence from online dating behavior","volume":"79","author":"Huber,","year":"2017","journal-title":"J. Polit."},{"key":"2022072114204955100_B86","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1353\/sof.0.0227","article-title":"Cross-talk: the role of homophily and elite bias in civic associations","volume":"88","author":"Weare,","year":"2009","journal-title":"Soc. Forces"},{"key":"2022072114204955100_B87","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1111\/jcom.12084","article-title":"Echo chamber or public sphere? Predicting political orientation and measuring political homophily in twitter using big data","volume":"64","author":"Colleoni,","year":"2014","journal-title":"J. Commun."},{"key":"2022072114204955100_B88","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1016\/j.ssresearch.2015.08.007","article-title":"Homophily in the career mobility of China\u2019s political elite","volume":"54","author":"Opper,","year":"2015","journal-title":"Soc. Sci. Res."},{"key":"2022072114204955100_B89","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1177\/1043463112473734","article-title":"Homophily, networks, and critical mass: solving the start-up problem in large group collective action","volume":"25","author":"Centola,","year":"2013","journal-title":"Rational. Soc."},{"key":"2022072114204955100_B90","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/pra2.2016.14505301109","article-title":"Information diffusion and opinion change during the Gezi park protests: homophily or social influence?","volume":"53","author":"Dincelli,","year":"2016","journal-title":"Proc. Assoc. Inf. Sci. Technol."},{"key":"2022072114204955100_B91","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1177\/0738894212443344","article-title":"Preferential attachment, homophily, and the structure of international networks, 1816\u20132003","volume":"29","author":"Maoz,","year":"2012","journal-title":"Conflict Manag. Peace Sci."},{"key":"2022072114204955100_B92","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1017\/nws.2020.44","article-title":"A network approach to measuring state preferences","volume":"9","author":"Gallop,","year":"2021","journal-title":"Netw. Sci."},{"key":"2022072114204955100_B93","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/10576100701759988","article-title":"Connecting terrorist networks","volume":"31","author":"Magouirk,","year":"2008","journal-title":"Stud. Conflict Terror."},{"key":"2022072114204955100_B94","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1111\/ajps.12282","article-title":"Ethnic networks","volume":"61","author":"Larson,","year":"2017","journal-title":"Am. J. Polit. Sci."},{"key":"2022072114204955100_B95","doi-asserted-by":"crossref","first-page":"871","DOI":"10.1017\/S0020818318000243","article-title":"Rumors, kinship networks, and rebel group formation","volume":"72","author":"Larson,","year":"2018","journal-title":"Int. Org."},{"key":"2022072114204955100_B96","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1146\/annurev-polisci-041719-102523","article-title":"Networks of conflict and cooperation","volume":"24","author":"Larson,","year":"2021","journal-title":"Annu. Rev. Polit. Sci."},{"key":"2022072114204955100_B97","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1037\/h0055425","article-title":"Social perception and phenomenal causality","volume":"51","author":"Heider,","year":"1944","journal-title":"Psychol. Rev."},{"key":"2022072114204955100_B98","author":"Norman,","journal-title":"Structural Models: An Introduction to the Theory of Directed Graphs"},{"key":"2022072114204955100_B99","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1146\/annurev.soc.27.1.415","article-title":"Birds of a feather: homophily in social networks","volume":"27","author":"McPherson,","year":"2001","journal-title":"Annu. Rev. Sociol."},{"key":"2022072114204955100_B100","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1080\/1057610X.2012.648156","article-title":"Connections can be toxic: terrorist organizational factors and the pursuit of CBRN weapons","volume":"35","author":"Asal,","year":"2012","journal-title":"Stud. Conflict Terror."},{"key":"2022072114204955100_B101","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1177\/0022002712468726","article-title":"Allying to kill: terrorist intergroup cooperation and the consequences for lethality","volume":"58","author":"Horowitz,","year":"2014","journal-title":"J. Conflict Resolut."},{"key":"2022072114204955100_B102","doi-asserted-by":"crossref","DOI":"10.9783\/9780812295023","volume-title":"Why Terrorist Groups Form International Alliances","author":"Bacon,","year":"2018"},{"key":"2022072114204955100_B103","doi-asserted-by":"crossref","first-page":"2071","DOI":"10.1177\/0022002719826234","article-title":"Networks of cooperation: rebel alliances in fragmented civil wars","volume":"63","author":"Kalah Gade,","year":"2019","journal-title":"J. Conflict Resolut."},{"key":"2022072114204955100_B104","doi-asserted-by":"crossref","first-page":"997","DOI":"10.1080\/1057610X.2018.1431365","article-title":"Terrorist group rivalries and alliances: testing competing explanations","volume":"42","author":"Phillips,","year":"2019","journal-title":"Stud. Conflict Terror."},{"key":"2022072114204955100_B105","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/10967494.2015.1027431","article-title":"With friends like these\u2026 why terrorist organizations ally","volume":"191","author":"Asal,","year":"2016","journal-title":"Int. Public Manag. J."},{"key":"2022072114204955100_B106","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1016\/j.socnet.2009.04.001","article-title":"Representing degree distributions, clustering, and homophily in social networks with latent cluster random effects models","volume":"31","author":"Krivitsky,","year":"2009","journal-title":"Soc. Netw."},{"key":"2022072114204955100_B107","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780199939459.001.0001","volume-title":"Foreign Fighters: Transnational Identity in Civil Conflicts","author":"Malet,","year":"2013"},{"key":"2022072114204955100_B108","volume-title":"Radicalisation and Terrorist Recruitment among Kenya\u2019s Youth","author":"Hellsten,","year":"2016"},{"key":"2022072114204955100_B109","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1057\/9781137001931_5","article-title":"Who becomes a terrorist today","volume-title":"The Ethics and Efficacy of the Global War on Terrorism","author":"Atran,","year":"2011"},{"key":"2022072114204955100_B110","doi-asserted-by":"crossref","first-page":"773289","DOI":"10.3389\/fpsyg.2021.773289","article-title":"Recent integrations of latent variable network modeling with psychometric models","volume":"12","author":"Wang,","year":"2021","journal-title":"Front. Psychol."},{"key":"2022072114204955100_B111","article-title":"Latent space generative model for bipartite networks","author":"O\u2019Neale.","year":"2019"},{"key":"2022072114204955100_B112","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1353\/fch.2007.0003","article-title":"Identity politics and political perception in the european settlement of Tunisia: the French colony versus the Italian colony","volume":"8","author":"Choate,","year":"2007","journal-title":"French Colonial History"},{"key":"2022072114204955100_B113","volume-title":"The Making of Modern Libya: State Formation, Colonization, and Resistance, 1830\u20131932","author":"Ahmida,","year":"1994"}],"container-title":["Journal of Complex Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/comnet\/article-pdf\/10\/4\/cnac017\/45042673\/cnac017.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/comnet\/article-pdf\/10\/4\/cnac017\/45042673\/cnac017.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,21]],"date-time":"2022-07-21T14:27:30Z","timestamp":1658413650000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comnet\/article\/doi\/10.1093\/comnet\/cnac017\/6647930"}},"subtitle":[],"editor":[{"given":"Philipp","family":"Hoevel","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2022,6,29]]},"references-count":113,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,6,29]]}},"URL":"https:\/\/doi.org\/10.1093\/comnet\/cnac017","relation":{},"ISSN":["2051-1329"],"issn-type":[{"value":"2051-1329","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2022,8,1]]},"published":{"date-parts":[[2022,6,29]]},"article-number":"cnac017"}}