{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T07:03:00Z","timestamp":1720422180735},"reference-count":57,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Social Networks"],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1016\/j.socnet.2022.08.003","type":"journal-article","created":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T09:40:00Z","timestamp":1662025200000},"page":"22-34","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":4,"special_numbering":"C","title":["Assessing harmfulness and vulnerability in global bipartite networks of terrorist-target relationships"],"prefix":"10.1016","volume":"72","author":[{"given":"Alessandro","family":"Spelta","sequence":"first","affiliation":[]},{"given":"Nicol\u00f3","family":"Pecora","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0215-4092","authenticated-orcid":false,"given":"Paolo","family":"Pagnottoni","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.socnet.2022.08.003_b1","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1257\/000282806777211847","article-title":"Poverty, political freedom, and the roots of terrorism","volume":"96","author":"Abadie","year":"2006","journal-title":"Amer. Econ. Rev."},{"issue":"1","key":"10.1016\/j.socnet.2022.08.003_b2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.euroecorev.2007.08.005","article-title":"Terrorism and the world economy","volume":"52","author":"Abadie","year":"2008","journal-title":"Eur. Econ. Rev."},{"issue":"3","key":"10.1016\/j.socnet.2022.08.003_b3","doi-asserted-by":"crossref","first-page":"751","DOI":"10.1111\/rssa.12233","article-title":"Statistical modelling of a terrorist network","volume":"180","author":"Aitkin","year":"2017","journal-title":"J. R. Stat. Soc.: Ser. A (Stat. Soc.)"},{"key":"10.1016\/j.socnet.2022.08.003_b4","doi-asserted-by":"crossref","DOI":"10.1016\/j.jfs.2022.100989","article-title":"The drivers of cyber risk","volume":"60","author":"Aldasoro","year":"2022","journal-title":"J. Financ. Stab."},{"issue":"1","key":"10.1016\/j.socnet.2022.08.003_b5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41467-018-03740-9","article-title":"Optimal diversification strategies in the networks of related products and of related research areas","volume":"9","author":"Alshamsi","year":"2018","journal-title":"Nature Commun."},{"issue":"5","key":"10.1016\/j.socnet.2022.08.003_b6","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1038\/s41562-020-01024-1","article-title":"Evolutionary dynamics of higher-order interactions in social networks","volume":"5","author":"Alvarez-Rodriguez","year":"2021","journal-title":"Nat. Hum. Behav."},{"key":"10.1016\/j.socnet.2022.08.003_b7","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.socnet.2020.07.009","article-title":"Identifying individuals associated with organized criminal networks: a social network analysis","volume":"64","author":"Basu","year":"2021","journal-title":"Social Networks"},{"key":"10.1016\/j.socnet.2022.08.003_b8","series-title":"2012 European Intelligence and Security Informatics Conference","first-page":"297","article-title":"Detecting key players in terrorist networks","author":"Berzinji","year":"2012"},{"issue":"5","key":"10.1016\/j.socnet.2022.08.003_b9","doi-asserted-by":"crossref","first-page":"1007","DOI":"10.1016\/j.jmoneco.2004.04.001","article-title":"The macroeconomic consequences of terrorism","volume":"51","author":"Blomberg","year":"2004","journal-title":"J. Monetary Econ."},{"issue":"3","key":"10.1016\/j.socnet.2022.08.003_b10","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/S0378-8733(01)00038-7","article-title":"Eigenvector-like measures of centrality for asymmetric relations","volume":"23","author":"Bonacich","year":"2001","journal-title":"Social Networks"},{"issue":"1","key":"10.1016\/j.socnet.2022.08.003_b11","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/s10588-006-7084-x","article-title":"Identifying sets of key players in a social network","volume":"12","author":"Borgatti","year":"2006","journal-title":"Comput. Math. Org. Theor."},{"issue":"1\u20137","key":"10.1016\/j.socnet.2022.08.003_b12","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/S0169-7552(98)00110-X","article-title":"The anatomy of a large-scale hypertextual web search engine","volume":"30","author":"Brin","year":"1998","journal-title":"Comput. Netw. ISDN Syst."},{"issue":"4","key":"10.1016\/j.socnet.2022.08.003_b13","first-page":"246","article-title":"The effect of terrorism on employment and consumer sentiment: Evidence from successful and failed terror attacks","volume":"10","author":"Brodeur","year":"2018","journal-title":"Am. Econ. J.: Appl. Econ."},{"issue":"1","key":"10.1016\/j.socnet.2022.08.003_b14","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1177\/0022002706296157","article-title":"On the frequency of severe terrorist events","volume":"51","author":"Clauset","year":"2007","journal-title":"J. Confl. Resolut."},{"issue":"8","key":"10.1016\/j.socnet.2022.08.003_b15","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0070726","article-title":"Measuring the intangibles: A metrics for the economic complexity of countries and products","volume":"8","author":"Cristelli","year":"2013","journal-title":"PLoS One"},{"issue":"3","key":"10.1016\/j.socnet.2022.08.003_b16","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1504\/IJRAM.2008.019743","article-title":"Copulae and operational risks","volume":"9","author":"Dalla\u00a0Valle","year":"2008","journal-title":"Int. J. Risk Assess. Manag."},{"key":"10.1016\/j.socnet.2022.08.003_b17","first-page":"1","article-title":"Better to stay apart: asset commonality, bipartite network centrality, and investment strategies","author":"Flori","year":"2019","journal-title":"Ann. Oper. Res."},{"issue":"3","key":"10.1016\/j.socnet.2022.08.003_b18","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","article-title":"Centrality in social networks conceptual clarification","volume":"1","author":"Freeman","year":"1978","journal-title":"Social Networks"},{"issue":"1","key":"10.1016\/j.socnet.2022.08.003_b19","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevE.78.015101","article-title":"Maximum likelihood: Extracting unbiased information from complex networks","volume":"78","author":"Garlaschelli","year":"2008","journal-title":"Phys. Rev. E"},{"issue":"3","key":"10.1016\/j.socnet.2022.08.003_b20","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevLett.102.038701","article-title":"Generalized bose-fermi statistics and structural correlations in weighted networks","volume":"102","author":"Garlaschelli","year":"2009","journal-title":"Phys. Rev. Lett."},{"key":"10.1016\/j.socnet.2022.08.003_b21","series-title":"2016 European Intelligence and Security Informatics Conference (EISIC)","first-page":"112","article-title":"Key player identification in terrorism-related social media networks using centrality measures","author":"Gialampoukidis","year":"2016"},{"issue":"5","key":"10.1016\/j.socnet.2022.08.003_b22","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1002\/qre.655","article-title":"Modelling operational losses: a Bayesian approach","volume":"20","author":"Giudici","year":"2004","journal-title":"Qual. Reliab. Eng. Int."},{"key":"10.1016\/j.socnet.2022.08.003_b23","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.jfs.2017.11.001","article-title":"How vulnerable are international financial markets to terrorism? An empirical study based on terrorist incidents worldwide","volume":"33","author":"Goel","year":"2017","journal-title":"J. Financ. Stab."},{"key":"10.1016\/j.socnet.2022.08.003_b24","series-title":"Global terrorism index 2020: Measuring the impact of terrorism","author":"GTI","year":"2020"},{"issue":"26","key":"10.1016\/j.socnet.2022.08.003_b25","doi-asserted-by":"crossref","first-page":"10570","DOI":"10.1073\/pnas.0900943106","article-title":"The building blocks of economic complexity","volume":"106","author":"Hidalgo","year":"2009","journal-title":"Proc. Natl. Acad. Sci."},{"issue":"5837","key":"10.1016\/j.socnet.2022.08.003_b26","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1126\/science.1144581","article-title":"The product space conditions the development of nations","volume":"317","author":"Hidalgo","year":"2007","journal-title":"Science"},{"key":"10.1016\/j.socnet.2022.08.003_b27","doi-asserted-by":"crossref","DOI":"10.1016\/j.physa.2019.123113","article-title":"Identifying the global terror hubs and vulnerable motifs using complex network dynamics","volume":"540","author":"Husain","year":"2020","journal-title":"Physica A"},{"key":"10.1016\/j.socnet.2022.08.003_b28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.socnet.2015.02.003","article-title":"Ranking terrorists in networks: A sensitivity analysis of Al Qaeda\u2019s 9\/11 attack","volume":"42","author":"Husslage","year":"2015","journal-title":"Social Networks"},{"issue":"1","key":"10.1016\/j.socnet.2022.08.003_b29","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/BF02289026","article-title":"A new status index derived from sociometric analysis","volume":"18","author":"Katz","year":"1953","journal-title":"Psychometrika"},{"issue":"1","key":"10.1016\/j.socnet.2022.08.003_b30","doi-asserted-by":"crossref","first-page":"707","DOI":"10.1111\/j.1465-7295.2012.00469.x","article-title":"Common drivers of transnational terrorism: Principal component analysis","volume":"51","author":"Khusrav","year":"2013","journal-title":"Econ. Inq."},{"issue":"5","key":"10.1016\/j.socnet.2022.08.003_b31","doi-asserted-by":"crossref","first-page":"604","DOI":"10.1145\/324133.324140","article-title":"Authoritative sources in a hyperlinked environment","volume":"46","author":"Kleinberg","year":"1999","journal-title":"J. ACM"},{"issue":"5","key":"10.1016\/j.socnet.2022.08.003_b32","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1111\/j.1467-9876.2011.00768.x","article-title":"New findings from terrorism data: Dirichlet process random-effects models for latent groups","volume":"60","author":"Kyung","year":"2011","journal-title":"J. R. Stat. Soc. Ser. C. Appl. Stat."},{"key":"10.1016\/j.socnet.2022.08.003_b33","doi-asserted-by":"crossref","first-page":"103854","DOI":"10.1109\/ACCESS.2019.2929798","article-title":"Analysis of the terrorist organization alliance network based on complex network theory","volume":"7","author":"Li","year":"2019","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.socnet.2022.08.003_b34","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1016\/j.ejor.2013.02.032","article-title":"Cooperative game theoretic centrality analysis of terrorist networks: The cases of jemaah islamiyah and al qaeda","volume":"229","author":"Lindelauf","year":"2013","journal-title":"European J. Oper. Res."},{"issue":"3","key":"10.1016\/j.socnet.2022.08.003_b35","doi-asserted-by":"crossref","first-page":"803","DOI":"10.1111\/rssa.12323","article-title":"Autologistic models for benchmark risk or vulnerability assessment of urban terrorism outcomes","volume":"181","author":"Liu","year":"2018","journal-title":"J. R. Stat. Soc.: Ser. A (Stat. Soc.)"},{"key":"10.1016\/j.socnet.2022.08.003_b36","doi-asserted-by":"crossref","DOI":"10.1016\/j.physa.2019.123769","article-title":"Identifying influential nodes of global terrorism network: A comparison for skeleton network extraction","volume":"545","author":"Malang","year":"2020","journal-title":"Physica A"},{"issue":"4","key":"10.1016\/j.socnet.2022.08.003_b37","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1111\/j.1468-2486.2005.00536.x","article-title":"The limits of terrorism: a network perspective","volume":"7","author":"Matthew","year":"2005","journal-title":"Int. Stud. Rev."},{"issue":"3","key":"10.1016\/j.socnet.2022.08.003_b38","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1007\/s10940-019-09426-9","article-title":"Dynamic patterns of terrorist networks: Efficiency and security in the evolution of eleven islamic extremist attack networks","volume":"36","author":"McMillan","year":"2020","journal-title":"J. Quant. Criminol."},{"key":"10.1016\/j.socnet.2022.08.003_b39","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1016\/j.socnet.2018.05.008","article-title":"Peer influence, friend selection, and gender: How network processes shape adolescent smoking, drinking, and delinquency","volume":"55","author":"McMillan","year":"2018","journal-title":"Social Networks"},{"issue":"5594","key":"10.1016\/j.socnet.2022.08.003_b40","doi-asserted-by":"crossref","first-page":"824","DOI":"10.1126\/science.298.5594.824","article-title":"Network motifs: simple building blocks of complex networks","volume":"298","author":"Milo","year":"2002","journal-title":"Science"},{"issue":"1","key":"10.1016\/j.socnet.2022.08.003_b41","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-017-14603-6","article-title":"On economic complexity and the fitness of nations","volume":"7","author":"Morrison","year":"2017","journal-title":"Sci. Rep."},{"issue":"2","key":"10.1016\/j.socnet.2022.08.003_b42","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1016\/j.ejor.2019.11.035","article-title":"Detecting a most closeness-central clique in complex networks","volume":"283","author":"Nasirian","year":"2020","journal-title":"European J. Oper. Res."},{"issue":"4","key":"10.1016\/j.socnet.2022.08.003_b43","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1057\/s41288-020-00171-w","article-title":"Analysis of the impact of cyber events for cyber insurance","volume":"45","author":"Palsson","year":"2020","journal-title":"Geneva Pap. Risk Insur.-Issues Pract."},{"issue":"6","key":"10.1016\/j.socnet.2022.08.003_b44","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevE.93.062314","article-title":"Leveraging percolation theory to single out influential spreaders in networks","volume":"93","author":"Radicchi","year":"2016","journal-title":"Phys. Rev. E"},{"issue":"2","key":"10.1016\/j.socnet.2022.08.003_b45","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.socnet.2006.08.003","article-title":"Recent developments in exponential random graph (p*) models for social networks","volume":"29","author":"Robins","year":"2007","journal-title":"Social Networks"},{"issue":"2","key":"10.1016\/j.socnet.2022.08.003_b46","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1016\/j.ejpoleco.2003.12.007","article-title":"An economic perspective on transnational terrorism","volume":"20","author":"Sandler","year":"2004","journal-title":"Eur. J. Political Econ."},{"issue":"1","key":"10.1016\/j.socnet.2022.08.003_b47","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/srep10595","article-title":"Randomizing bipartite networks: the case of the World Trade Web","volume":"5","author":"Saracco","year":"2015","journal-title":"Sci. Rep."},{"issue":"1","key":"10.1016\/j.socnet.2022.08.003_b48","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-017-09101-8","article-title":"A complex network analysis of ethnic conflicts and human rights violations","volume":"7","author":"Sharma","year":"2017","journal-title":"Sci. Rep."},{"issue":"4","key":"10.1016\/j.socnet.2022.08.003_b49","article-title":"Randomizing world trade I. A binary network analysis","volume":"84","author":"Squartini","year":"2011","journal-title":"Phys. Rev. E"},{"issue":"4","key":"10.1016\/j.socnet.2022.08.003_b50","article-title":"Randomizing world trade II. A weighted network analysis","volume":"84","author":"Squartini","year":"2011","journal-title":"Phys. Rev. E"},{"issue":"8","key":"10.1016\/j.socnet.2022.08.003_b51","doi-asserted-by":"crossref","DOI":"10.1088\/1367-2630\/13\/8\/083001","article-title":"Analytical maximum-likelihood method to detect patterns in real networks","volume":"13","author":"Squartini","year":"2011","journal-title":"New J. Phys."},{"issue":"2","key":"10.1016\/j.socnet.2022.08.003_b52","doi-asserted-by":"crossref","DOI":"10.1088\/1367-2630\/17\/2\/023052","article-title":"Unbiased sampling of network ensembles","volume":"17","author":"Squartini","year":"2015","journal-title":"New J. Phys."},{"issue":"1","key":"10.1016\/j.socnet.2022.08.003_b53","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/srep03357","article-title":"Early-warning signals of topological collapse in interbank networks","volume":"3","author":"Squartini","year":"2013","journal-title":"Sci. Rep."},{"issue":"1","key":"10.1016\/j.socnet.2022.08.003_b54","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/srep00723","article-title":"A new metrics for countries\u2019 fitness and products\u2019 complexity","volume":"2","author":"Tacchella","year":"2012","journal-title":"Sci. Rep."},{"issue":"8","key":"10.1016\/j.socnet.2022.08.003_b55","doi-asserted-by":"crossref","first-page":"1683","DOI":"10.1016\/j.jedc.2013.04.006","article-title":"Economic complexity: conceptual grounding of a new metrics for global competitiveness","volume":"37","author":"Tacchella","year":"2013","journal-title":"J. Econom. Dynam. Control"},{"issue":"5","key":"10.1016\/j.socnet.2022.08.003_b56","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevE.97.052306","article-title":"Higher-order clustering in networks","volume":"97","author":"Yin","year":"2018","journal-title":"Phys. Rev. E"},{"issue":"21","key":"10.1016\/j.socnet.2022.08.003_b57","doi-asserted-by":"crossref","DOI":"10.1073\/pnas.2019994118","article-title":"Topological clustering of multilayer networks","volume":"118","author":"Yuvaraj","year":"2021","journal-title":"Proc. Natl. Acad. Sci."}],"container-title":["Social Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0378873322000685?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0378873322000685?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,2,12]],"date-time":"2023-02-12T16:46:45Z","timestamp":1676220405000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0378873322000685"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1]]},"references-count":57,"alternative-id":["S0378873322000685"],"URL":"https:\/\/doi.org\/10.1016\/j.socnet.2022.08.003","relation":{},"ISSN":["0378-8733"],"issn-type":[{"value":"0378-8733","type":"print"}],"subject":[],"published":{"date-parts":[[2023,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Assessing harmfulness and vulnerability in global bipartite networks of terrorist-target relationships","name":"articletitle","label":"Article Title"},{"value":"Social Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.socnet.2022.08.003","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}