An analysis of herding behavior in security analysts’ networks