Sic transit gloria mundi virtuali?: promise and peril in the computational social science of clandestine organizing
暂无分享,去创建一个
Jaideep Srivastava | Noshir S. Contractor | Muhammad Aurangzeb Ahmad | Brian Keegan | Dmitri Williams
[1] W. Baker,et al. THE SOCIAL ORGANIZATION OF CONSPIRACY: ILLEGAL NETWORKS IN THE HEAVY ELECTRICAL EQUIPMENT INDUSTRY* , 1993 .
[2] Kevin Crowston,et al. Validity Issues in the Use of Social Network Analysis with Digital Trace Data , 2011, J. Assoc. Inf. Syst..
[3] Vili Lehdonvirta,et al. Virtual Worlds Don't Exist: Questioning the Dichotomous Approach in MMO Studies , 2010, Game Stud..
[4] A. Pentland,et al. Life in the network: The coming age of computational social science: Science , 2009 .
[5] Richard Heeks. Current Analysis and Future Research Agenda on “Gold Farming”: Real-World Production in Developing Countries for the Virtual Economies of Online Games , 2008 .
[6] Dmitri Williams,et al. The Mapping Principle, and a Research Framework for Virtual Worlds , 2010 .
[7] Garry Robins,et al. An introduction to exponential random graph (p*) models for social networks , 2007, Soc. Networks.
[8] Martina Morris,et al. ergm: A Package to Fit, Simulate and Diagnose Exponential-Family Models for Networks. , 2008, Journal of statistical software.
[9] M. Dupelj. [On the theories of communication]. , 1966, Neuropsihijatrija.
[10] Peng Wang,et al. Recent developments in exponential random graph (p*) models for social networks , 2007, Soc. Networks.
[11] Gueorgi Kossinets. Effects of missing data in social networks , 2006, Soc. Networks.
[12] Klaus von Lampe,et al. Organized Crime and Trust:: On the conceptualization and empirical relevance of trust in the context of criminal networks , 2004 .
[14] Malcolm K. Sparrow,et al. The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .
[15] M. Kenney. The Architecture of Drug Trafficking: Network Forms of Organisation in the Colombian Cocaine Trade , 2007 .
[16] John Skvoretz,et al. 8. Comparing Networks across Space and Time, Size and Species , 2002 .
[17] Garry Robins,et al. Understanding individual behaviors within covert networks: the interplay of individual qualities, psychological predispositions, and network effects , 2009 .
[18] Jaideep Srivastava,et al. Mining for Gold Farmers: Automatic Detection of Deviant Players in MMOGs , 2009, 2009 International Conference on Computational Science and Engineering.
[19] Edward Castronova,et al. As real as real? Macroeconomic behavior in a large-scale virtual world , 2009, New Media Soc..
[20] Carlo Morselli,et al. Law-Enforcement Disruption of a Drug Importation Network , 2006 .
[21] Carlo Morselli,et al. The Efficiency/Security Trade-Off in Criminal Networks , 2007, Soc. Networks.
[22] Stanley Wasserman,et al. Testing Multitheoretical, Multilevel Hypotheses About Organizational Networks: An Analytic Framework and Empirical Example , 2006 .
[23] Byron Reeves,et al. Total Engagement: Using Games and Virtual Worlds to Change the Way People Work and Businesses Compete , 2009 .
[24] Julian Dibbell. Play Money: Or, How I Quit My Day Job and Made Millions Trading Virtual Loot , 2006 .
[25] J. Raab,et al. Dark Networks as Organizational Problems: Elements of a Theory 1 , 2006 .
[26] Edward Castronova,et al. Exodus to the Virtual World: How Online Fun Is Changing Reality , 2007 .
[27] Carlo Morselli,et al. Inside Criminal Networks , 2008 .
[28] Peter R. Monge,et al. Theories of Communication Networks , 2003 .
[29] Karen Page,et al. Network Forms of Organization , 1998 .
[30] Vili Lehdonvirta,et al. Knowledge Map of the Virtual Economy: Converting the Virtual Economy into Development Potential , 2011 .
[31] William Sims Bainbridge,et al. The Warcraft Civilization: Social Science in a Virtual World , 2010 .
[32] Jaideep Srivastava,et al. Dark Gold: Statistical Properties of Clandestine Networks in Massively Multiplayer Online Games , 2010, 2010 IEEE Second International Conference on Social Computing.
[33] Mia Consalvo,et al. Cheating: Gaining Advantage in Videogames , 2007 .
[34] C. Stohl,et al. Networks of Terror: Theoretical Assumptions and Pragmatic Consequences , 2007 .
[35] Martina Morris,et al. statnet: Software Tools for the Representation, Visualization, Analysis and Simulation of Network Data. , 2008, Journal of statistical software.
[36] Jaideep Srivastava,et al. Trust Amongst Rogues? A Hypergraph Approach for Comparing Clandestine Trust Networks in MMOGs , 2011, ICWSM.