Skip to main content
Erschienen in: Social Network Analysis and Mining 1/2022

01.12.2022 | Original Article

Strong ties and where to find them: or, why Neville and Bellatrix might be more important than Harry and Tom

verfasst von: Sean Everton, Tara Everton, Aaron Green, Cassie Hamblin, Robert Schroeder

Erschienen in: Social Network Analysis and Mining | Ausgabe 1/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In recent years, analysts began to extensively draw on social network analysis to analyze dark networks (i.e., covert and illegal networks). In this article, we draw on network methods to explore the effect of tie strength on two “dark networks” found in the Harry Potter novels—Dumbledore’s Army and Voldemort’s Death Eaters. We are not the first to draw on social network analysis to analyze a narrative. Network approaches are increasingly being used to analyze narratives and other texts. They can help identify key actors and events, highlight semantic structures, and uncover underlying meanings and mental models. Our analysis finds that several secondary characters play roles as important, or almost as important, as Harry Potter and Lord Voldemort. Moreover, our comparison of the topographical structure of the two networks suggests that if the fictional world of Harry Potter remotely mirrors reality, Dumbledore’s Army is built to withstand stress and uncertainty, while the Death Eaters is not, suggesting that J. K. Rowling has an intuitive understanding of a key difference between networks built on trust and those built on fear. The former live to fight another day; the latter do not.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
This is largely due to Valdis Krebs’s (2002) highly influential analysis of the 9/11 hijacker network and Sageman’s (2003, 2004) subsequent analysis of what he calls the “global Salafi jihad.”
 
2
Ties between actors can reflect other types of interactions, such as co-appearance in one or more scenes (Knuth 1994; Newman and Girvan 2004), engaging in one or more conversations (Elson et al. 2010), or enemies facing off in combat (Rossman 2017).
 
3
John Arquilla, an expert in irregular war (see, e.g., Arquilla 2009; Arquilla and Ronfeldt 2001b), remarked that he learned as much about irregular war from William Goldman’s classic, The Princess Bride (1973), as he did from historical events (personal communication).
 
4
Warning: We do discuss the novels in enough detail that we may spoil them for those that have not read them or watched the movies.
 
10
A path is a walk (i.e., a sequence of actors and ties) in which no actor between the first and last actor of the walk occurs more than once, and the path distance between two actors is the number of steps between them.
 
11
Two nodes are connected if they can directly or indirectly reach one another by passing through one or more ties.
 
12
All figures included in this paper were generated with the R package sna (Butts 2016).
 
13
Although degree centralization can range from 0.00 to 1.00, it seldom gets much higher than 0.60 (Oliver et al. 2014).
 
14
At a minimum tie strength of one, Harry’s degree centrality equals 28, which indicates he has a tie to everyone else in the DA. At a minimum tie strength of two, it equals 27.
 
15
There is, of course, the prophecy, but it does not say how long after the other is killed, the victor will live.
 
16
At a minimum tie strength of one, she ranks second behind Harry in terms of degree centrality.
 
17
Recall that at a minimum tie strength of four, every member of the DA can reach at least one other.
 
Literatur
Zurück zum Zitat Arquilla J (2009) Aspects of Netwar and the Conflict with al Qaeda Information Operations Center, Naval Postgraduate School, Monterey, CA Arquilla J (2009) Aspects of Netwar and the Conflict with al Qaeda Information Operations Center, Naval Postgraduate School, Monterey, CA
Zurück zum Zitat Arquilla J, Ronfeldt D (1996) The advent of netwar. RAND, Santa Monica Arquilla J, Ronfeldt D (1996) The advent of netwar. RAND, Santa Monica
Zurück zum Zitat Arquilla J, Ronfeldt D (2001a) The advent of netwar (revisited). In: Arquilla J, Ronfeldt D (eds) Networks and netwars. RAND, Santa Monica, CA, pp 1–25 Arquilla J, Ronfeldt D (2001a) The advent of netwar (revisited). In: Arquilla J, Ronfeldt D (eds) Networks and netwars. RAND, Santa Monica, CA, pp 1–25
Zurück zum Zitat Arquilla J, Ronfeldt D (eds) (2001b) Networks and Netwars. RAND, Santa Monica, CA Arquilla J, Ronfeldt D (eds) (2001b) Networks and Netwars. RAND, Santa Monica, CA
Zurück zum Zitat Baker WE, Faulkner RR (1993) The social-organization of conspiracy: illegal networks in the heavy electrical-equipment industry. Am Sociol Rev 58:837–860 Baker WE, Faulkner RR (1993) The social-organization of conspiracy: illegal networks in the heavy electrical-equipment industry. Am Sociol Rev 58:837–860
Zurück zum Zitat Bakker RM, Raab J, Milward HB (2011) A preliminary theory of dark network resilience. J Policy Anal Manag 31:33–62 Bakker RM, Raab J, Milward HB (2011) A preliminary theory of dark network resilience. J Policy Anal Manag 31:33–62
Zurück zum Zitat Barabási A-L, Albert R (1999) Emergence of scaling in random networks. Science 286:509–512MathSciNetMATH Barabási A-L, Albert R (1999) Emergence of scaling in random networks. Science 286:509–512MathSciNetMATH
Zurück zum Zitat Bearman PS, Faris R, Moody J (1999) Blocking the future: new solutions for old problems in historical social science. Soc Sci Hist 23:501–533 Bearman PS, Faris R, Moody J (1999) Blocking the future: new solutions for old problems in historical social science. Soc Sci Hist 23:501–533
Zurück zum Zitat Boivan R (2014) Drug trafficking networks in the world economy. In: Morselli C (ed) Crime and networks. Routledge, London, pp 182–194 Boivan R (2014) Drug trafficking networks in the world economy. In: Morselli C (ed) Crime and networks. Routledge, London, pp 182–194
Zurück zum Zitat Bonacich P (1972) Factoring and weighting approaches to status scores and clique identification. J Math Sociol 2:113–120 Bonacich P (1972) Factoring and weighting approaches to status scores and clique identification. J Math Sociol 2:113–120
Zurück zum Zitat Borgatti SP (2006) Identifying sets of key players in a social network. Comput Math Organ Theory 12:21–34MATH Borgatti SP (2006) Identifying sets of key players in a social network. Comput Math Organ Theory 12:21–34MATH
Zurück zum Zitat Bossaert G, Meidert N (2013) “We are only as strong as we are united, as weak as we are divided” a dynamic analysis of the peer support networks in the Harry Potter Books. Open J Appl Sci 3:174–185 Bossaert G, Meidert N (2013) “We are only as strong as we are united, as weak as we are divided” a dynamic analysis of the peer support networks in the Harry Potter Books. Open J Appl Sci 3:174–185
Zurück zum Zitat Carley KM (1994) Extracting culture through cultural analysis. Poetics 22:291–312 Carley KM (1994) Extracting culture through cultural analysis. Poetics 22:291–312
Zurück zum Zitat Carley KM, Lee J-S, Krackhardt D (2002) Destabilizing networks. Connections 24:79–92 Carley KM, Lee J-S, Krackhardt D (2002) Destabilizing networks. Connections 24:79–92
Zurück zum Zitat Chwe MS-Y (2001) Rational ritual: culture, coordination, and common knowledge. Princeton University Press, Princeton, Oxford Chwe MS-Y (2001) Rational ritual: culture, coordination, and common knowledge. Princeton University Press, Princeton, Oxford
Zurück zum Zitat Cornwell B (2015) Social sequence analysis: methods and applications. Cambridge University Press, New York Cornwell B (2015) Social sequence analysis: methods and applications. Cambridge University Press, New York
Zurück zum Zitat Cronin AK (2009) How terrorism ends: understanding the decline and demise of terrorist campaigns. Princeton University Press, Princeton, Oxford Cronin AK (2009) How terrorism ends: understanding the decline and demise of terrorist campaigns. Princeton University Press, Princeton, Oxford
Zurück zum Zitat Crossley N, Edwards G, Harries E, Stevenson R (2012) Covert social movement networks and the secrecy-efficiency trade off: the case of the UK Suffragettes (1906–1914). Soc Netw 34:634–644 Crossley N, Edwards G, Harries E, Stevenson R (2012) Covert social movement networks and the secrecy-efficiency trade off: the case of the UK Suffragettes (1906–1914). Soc Netw 34:634–644
Zurück zum Zitat Cunningham D, Everton SF, Murphy PJ (2016) Understanding dark networks: a strategic framework for the use of social network analysis. Rowman and Littlefield, Lanham Cunningham D, Everton SF, Murphy PJ (2016) Understanding dark networks: a strategic framework for the use of social network analysis. Rowman and Littlefield, Lanham
Zurück zum Zitat Cunningham D, Everton SF, Murphy PJ (2015) Casting more light on dark networks: a stochastic actor-oriented longitudinal analysis of the Noordin top terrorist network. In: Gerdes LM (ed) Illuminating dark networks: the study of clandestine groups and organizations. Cambridge University Press, Cambridge, New York, pp 171–185 Cunningham D, Everton SF, Murphy PJ (2015) Casting more light on dark networks: a stochastic actor-oriented longitudinal analysis of the Noordin top terrorist network. In: Gerdes LM (ed) Illuminating dark networks: the study of clandestine groups and organizations. Cambridge University Press, Cambridge, New York, pp 171–185
Zurück zum Zitat de Nooy W, Mrvar A, Batagelj V (2018) Exploratory social network analysis with Pajek: revised and expanded edition for updated software, 3rd edn. Cambridge University Press, Cambridge de Nooy W, Mrvar A, Batagelj V (2018) Exploratory social network analysis with Pajek: revised and expanded edition for updated software, 3rd edn. Cambridge University Press, Cambridge
Zurück zum Zitat Diesner J (2015) Words and networks: how reliable are network data constructed from text data? In: Bertino E, Matai SA (eds) Roles, trust, and reputation in social media knowledge markets: theory and methods. Springer, New York, pp 81–89 Diesner J (2015) Words and networks: how reliable are network data constructed from text data? In: Bertino E, Matai SA (eds) Roles, trust, and reputation in social media knowledge markets: theory and methods. Springer, New York, pp 81–89
Zurück zum Zitat Diesner J, Carley KM (2011) Semantic networks. In: Barnett GA (ed) Encyclopedia of social networks. SAGE, Thousand Oaks, pp 767–769 Diesner J, Carley KM (2011) Semantic networks. In: Barnett GA (ed) Encyclopedia of social networks. SAGE, Thousand Oaks, pp 767–769
Zurück zum Zitat Diesner J, Carley KM, Tambayong L (2012) Extracting socio-cultural networks of the Sudan from open-source, large-scale text data. Comput Math Organ Theory 18:328–339 Diesner J, Carley KM, Tambayong L (2012) Extracting socio-cultural networks of the Sudan from open-source, large-scale text data. Comput Math Organ Theory 18:328–339
Zurück zum Zitat Dietz T, Ostrom E, Stern PC (2003) The struggle to govern the commons. Science 302:1907–1912 Dietz T, Ostrom E, Stern PC (2003) The struggle to govern the commons. Science 302:1907–1912
Zurück zum Zitat Drieger P (2013) Semantic network analysis as a method for visual text analysis. Procedia Soc Behav Sci 79:4–17 Drieger P (2013) Semantic network analysis as a method for visual text analysis. Procedia Soc Behav Sci 79:4–17
Zurück zum Zitat Elson DK, Dames N, McKeown KR (2010) Extracting social networks from literary fiction. In: Proceedings of the 48th annual meeting of the association for computational linguistics, pp 138–147 Elson DK, Dames N, McKeown KR (2010) Extracting social networks from literary fiction. In: Proceedings of the 48th annual meeting of the association for computational linguistics, pp 138–147
Zurück zum Zitat Enders W, Jindapon P (2010) Network externalities and the structure of terror networks. J Conflict Resolut 54:262–280 Enders W, Jindapon P (2010) Network externalities and the structure of terror networks. J Conflict Resolut 54:262–280
Zurück zum Zitat Erickson BH (2001) Social networks. In: Judith Blau (ed) Blackwell companion to sociology, vol 102, vol 1. Blackwell Publishing, Ltd., Oxford, pp 314–326 Erickson BH (2001) Social networks. In: Judith Blau (ed) Blackwell companion to sociology, vol 102, vol 1. Blackwell Publishing, Ltd., Oxford, pp 314–326
Zurück zum Zitat Everton SF (2012a) Disrupting dark networks. Cambridge University Press, Cambridge, New York Everton SF (2012a) Disrupting dark networks. Cambridge University Press, Cambridge, New York
Zurück zum Zitat Everton SF (2012b) Network topography, key players and terrorist networks. Connections 31:12–19 Everton SF (2012b) Network topography, key players and terrorist networks. Connections 31:12–19
Zurück zum Zitat Everton SF, Cunningham D (2015) Dark network resilience in a hostile environment: optimizing centralization and density. J Criminol Crim Just Law Soc 16:1–20 Everton SF, Cunningham D (2015) Dark network resilience in a hostile environment: optimizing centralization and density. J Criminol Crim Just Law Soc 16:1–20
Zurück zum Zitat Everton SF, Cunningham DT (2020) The Quest for the Gist of Jesus: The Jesus Seminar, Dale Allison, and improper linear models. J Study Hist Jesus 18:156–189 Everton SF, Cunningham DT (2020) The Quest for the Gist of Jesus: The Jesus Seminar, Dale Allison, and improper linear models. J Study Hist Jesus 18:156–189
Zurück zum Zitat Everton SF, Cunningham D (2013) Terrorist network adaptation to a changing environment. In: Morselli C (ed) Crime and networks. Routledge, London, pp 287–308 Everton SF, Cunningham D (2013) Terrorist network adaptation to a changing environment. In: Morselli C (ed) Crime and networks. Routledge, London, pp 287–308
Zurück zum Zitat Finke R, Stark R (2005) The churching of America, 1776–2005: winners and losers in our religious economy, 2nd edn. Rutgers University Press, New Brunswick Finke R, Stark R (2005) The churching of America, 1776–2005: winners and losers in our religious economy, 2nd edn. Rutgers University Press, New Brunswick
Zurück zum Zitat Franzosi RP (2004) From words to numbers: narrative, data, and social science. Cambridge University Press, Cambridge Franzosi RP (2004) From words to numbers: narrative, data, and social science. Cambridge University Press, Cambridge
Zurück zum Zitat Franzosi RP (2010a) Quantitative narrative analysis. SAGE Publishing Inc, Thousand Oaks Franzosi RP (2010a) Quantitative narrative analysis. SAGE Publishing Inc, Thousand Oaks
Zurück zum Zitat Franzosi RP (2010b) Sociology, narrative, and the quality versus quantity debate (Goethe versus Newton): can computer-assisted story grammars help us understand the rise of Italian Fascism (1919–1922)?". Theory Soc 39:593–629 Franzosi RP (2010b) Sociology, narrative, and the quality versus quantity debate (Goethe versus Newton): can computer-assisted story grammars help us understand the rise of Italian Fascism (1919–1922)?". Theory Soc 39:593–629
Zurück zum Zitat Franzosi RP, De Fazio G, Vicari S (2012) Ways of measuring agency: an application of quantitative narrative analysis to lynchings in Georgia (1875–1930). Sociol Methodol 42:1–42 Franzosi RP, De Fazio G, Vicari S (2012) Ways of measuring agency: an application of quantitative narrative analysis to lynchings in Georgia (1875–1930). Sociol Methodol 42:1–42
Zurück zum Zitat Freeman LC (1977) A set of measures of centrality based on betweenness. Sociometry 40:35–41 Freeman LC (1977) A set of measures of centrality based on betweenness. Sociometry 40:35–41
Zurück zum Zitat Freeman LC (1979) Centrality in social networks: conceptual clarification. Social Networks 1:215–239 Freeman LC (1979) Centrality in social networks: conceptual clarification. Social Networks 1:215–239
Zurück zum Zitat Goldman W (1973) The princess bride. Harcourt Brace Jovanovich, New York Goldman W (1973) The princess bride. Harcourt Brace Jovanovich, New York
Zurück zum Zitat Granovetter M (1973) The strength of weak ties. Am J Sociol 73:1360–1380 Granovetter M (1973) The strength of weak ties. Am J Sociol 73:1360–1380
Zurück zum Zitat Granovetter M (1983) The strength of weak ties: a network theory revisited. Sociol Theory 1:201–233 Granovetter M (1983) The strength of weak ties: a network theory revisited. Sociol Theory 1:201–233
Zurück zum Zitat Granovetter M (2005) The impact of social structure on economic outcomes. J Econ Persp 19:33–50 Granovetter M (2005) The impact of social structure on economic outcomes. J Econ Persp 19:33–50
Zurück zum Zitat Griffin LJ (1993) Narrative, event-structure analysis, and causal interpretation in historical sociology. Am J Sociol 98:1094–1133 Griffin LJ (1993) Narrative, event-structure analysis, and causal interpretation in historical sociology. Am J Sociol 98:1094–1133
Zurück zum Zitat Han S-K (2009) The other ride of paul revere. Mobil Int J 14:143–162 Han S-K (2009) The other ride of paul revere. Mobil Int J 14:143–162
Zurück zum Zitat Harris JK (2014) An introduction to exponential random graph modelling. Quantitative applications in the social sciences. SAGE, Los Angeles Harris JK (2014) An introduction to exponential random graph modelling. Quantitative applications in the social sciences. SAGE, Los Angeles
Zurück zum Zitat Kemokai SN, Gebhardt RB (2013) Żegota network: a SOF UW Campaign design approach. Special Warfare January–March, pp16–21 Kemokai SN, Gebhardt RB (2013) Żegota network: a SOF UW Campaign design approach. Special Warfare January–March, pp16–21
Zurück zum Zitat Knuth DE (1994) The stanford GraphBase: a platform for combinatorial computing. ACM Press, New YorkMATH Knuth DE (1994) The stanford GraphBase: a platform for combinatorial computing. ACM Press, New YorkMATH
Zurück zum Zitat Krackhardt D (1994) Graph theoretical dimensions of informal organizations. In: Carley KM, Prietula MJ (eds) Computational organization theory. L. Erlbaum Associates, Hillsdale, pp 89–111 Krackhardt D (1994) Graph theoretical dimensions of informal organizations. In: Carley KM, Prietula MJ (eds) Computational organization theory. L. Erlbaum Associates, Hillsdale, pp 89–111
Zurück zum Zitat Krackhardt D (1992) The strength of strong ties: the importance of philos in organizations. In: Nohria N, Eccles RG (eds) Networks and organizations: structure, form and action. Harvard University Press, Boston, pp 216–239 Krackhardt D (1992) The strength of strong ties: the importance of philos in organizations. In: Nohria N, Eccles RG (eds) Networks and organizations: structure, form and action. Harvard University Press, Boston, pp 216–239
Zurück zum Zitat Krebs V (2002) Mapping networks of terrorist. Cells Connect 24:43–52 Krebs V (2002) Mapping networks of terrorist. Cells Connect 24:43–52
Zurück zum Zitat Laumann EO, Marsden PV, Prensky D (1983) The boundary-specification problem in network analysis. In: Burt RS, Minor M (eds) Applied network analysis. SAGE, Beverly Hills, pp 18–34 Laumann EO, Marsden PV, Prensky D (1983) The boundary-specification problem in network analysis. In: Burt RS, Minor M (eds) Applied network analysis. SAGE, Beverly Hills, pp 18–34
Zurück zum Zitat Lindelauf R, Borm P, Hamers H (2009) The influence of secrecy on the communication structure of covert networks. Soc Netw 31:126–137 Lindelauf R, Borm P, Hamers H (2009) The influence of secrecy on the communication structure of covert networks. Soc Netw 31:126–137
Zurück zum Zitat Lusher D, Koskinen JH, Robins GL (eds) (2013) Exponential random graph models for social networks. Structural analysis in the social sciences. Cambridge University Press, New York, Cambridge Lusher D, Koskinen JH, Robins GL (eds) (2013) Exponential random graph models for social networks. Structural analysis in the social sciences. Cambridge University Press, New York, Cambridge
Zurück zum Zitat Martin D (2014) The wizarding network of Harry Potter. GitHub, San Francisco Martin D (2014) The wizarding network of Harry Potter. GitHub, San Francisco
Zurück zum Zitat Matthews LJ, Edmonds J, Wildman W, Nunn C (2013) Cultural inheritance or cultural diffusion of religious violence? A quantitative case study of the radical reformation. Religion Brain Behav 3:3–15 Matthews LJ, Edmonds J, Wildman W, Nunn C (2013) Cultural inheritance or cultural diffusion of religious violence? A quantitative case study of the radical reformation. Religion Brain Behav 3:3–15
Zurück zum Zitat McAdam D (1999 [1982]) Political process and the development of black insurgency, 1930–1970. 2nd edn. University of Chicago Press, Chicago McAdam D (1999 [1982]) Political process and the development of black insurgency, 1930–1970. 2nd edn. University of Chicago Press, Chicago
Zurück zum Zitat McCormick G, Owen G (2000) Security and coordination in a clandestine organization. Math Comput Model 31:175–192 McCormick G, Owen G (2000) Security and coordination in a clandestine organization. Math Comput Model 31:175–192
Zurück zum Zitat McCulloh I, Armstrong H, Johnson A (2013) Social network analysis with applications. Wiley, New York McCulloh I, Armstrong H, Johnson A (2013) Social network analysis with applications. Wiley, New York
Zurück zum Zitat Milward HB, Raab J (2006) Dark networks as organizational problems: elements of a theory. Int Public Manag J 9:333–360 Milward HB, Raab J (2006) Dark networks as organizational problems: elements of a theory. Int Public Manag J 9:333–360
Zurück zum Zitat Morselli C (2009) Inside criminal networks. Springer, New York Morselli C (2009) Inside criminal networks. Springer, New York
Zurück zum Zitat Oliver K, Crossley N, Edwards G, Koskinen J, Everett MG (2014) Covert networks: structures, processes, and types. Mitchell Centre working paper Oliver K, Crossley N, Edwards G, Koskinen J, Everett MG (2014) Covert networks: structures, processes, and types. Mitchell Centre working paper
Zurück zum Zitat Padgett JF (2018) Faulkner’s assembly of memories into history: narrative networks in multiple times. Am J Sociol 124:406–478 Padgett JF (2018) Faulkner’s assembly of memories into history: narrative networks in multiple times. Am J Sociol 124:406–478
Zurück zum Zitat Padgett JF, Ansell CK (1993) Robust action and the rise of the Medici, 1400–1434. Am J Sociol 98:1259–1319 Padgett JF, Ansell CK (1993) Robust action and the rise of the Medici, 1400–1434. Am J Sociol 98:1259–1319
Zurück zum Zitat Raab J, Milward HB (2003) Dark networks as problems. J Public Adm Res Theory 13:413–439 Raab J, Milward HB (2003) Dark networks as problems. J Public Adm Res Theory 13:413–439
Zurück zum Zitat Rossman G (2017) Glory and gore. Contexts 16:42–47 Rossman G (2017) Glory and gore. Contexts 16:42–47
Zurück zum Zitat Rowling JK (2000) Harry Potter and the goblet of fire. Bloombury, London Rowling JK (2000) Harry Potter and the goblet of fire. Bloombury, London
Zurück zum Zitat Rowling JK (2003) Harry Potter and the order of the phoenix. Bloombury, London Rowling JK (2003) Harry Potter and the order of the phoenix. Bloombury, London
Zurück zum Zitat Rowling JK (2005) Harry Potter and the half-blood prince. Bloombury, London Rowling JK (2005) Harry Potter and the half-blood prince. Bloombury, London
Zurück zum Zitat Rowling JK (2007) Harry Potter and the deathly hallows. Bloombury, London Rowling JK (2007) Harry Potter and the deathly hallows. Bloombury, London
Zurück zum Zitat Rowling JK (1997–2007) Harry Potter. Bloombury, London Rowling JK (1997–2007) Harry Potter. Bloombury, London
Zurück zum Zitat Sack GA (2011) Bleak house and weak social networks. Paper presented at the Stanford Literary Laboratory, Stanford California Sack GA (2011) Bleak house and weak social networks. Paper presented at the Stanford Literary Laboratory, Stanford California
Zurück zum Zitat Sageman M (2004) Understanding Terror Networks. University of Pennsylvania Press, Philadelphia, PA Sageman M (2004) Understanding Terror Networks. University of Pennsylvania Press, Philadelphia, PA
Zurück zum Zitat Silge J, Robinson D (2017) Text mining with R: a tidy approach. O’Reilly Media Inc, Sebastopol Silge J, Robinson D (2017) Text mining with R: a tidy approach. O’Reilly Media Inc, Sebastopol
Zurück zum Zitat Smith CM, Papachristos AV (2016) Trust thy crooked neighbor: multiplexity in Chicago organized crime networks. Am Sociol Rev 81:644–667 Smith CM, Papachristos AV (2016) Trust thy crooked neighbor: multiplexity in Chicago organized crime networks. Am Sociol Rev 81:644–667
Zurück zum Zitat Snijders TAB, Bunt GGVD, Steglich C (2010) Introduction to stochastic actor-based models for network dynamics. Social Networks 32:44–60 Snijders TAB, Bunt GGVD, Steglich C (2010) Introduction to stochastic actor-based models for network dynamics. Social Networks 32:44–60
Zurück zum Zitat Stevenson R, Crossley N (2014) Change in covert social movement networks: the “inner circle” of the provisional irish republic army. Soc Mov Stud 13:70–91 Stevenson R, Crossley N (2014) Change in covert social movement networks: the “inner circle” of the provisional irish republic army. Soc Mov Stud 13:70–91
Zurück zum Zitat Tomaszewski I, Webowski T (2010) Code name: Żegota: rescuing jews in occupied Poland, 1942–45: the most dangerous conspiracy in wartime Europe, Rev. Praeger, Santa Barbara Tomaszewski I, Webowski T (2010) Code name: Żegota: rescuing jews in occupied Poland, 1942–45: the most dangerous conspiracy in wartime Europe, Rev. Praeger, Santa Barbara
Zurück zum Zitat Uzzi B (1996) The sources and consequences of embeddedness for the economic performance of organizations: the network effect. Am Sociol Rev 61:674–698 Uzzi B (1996) The sources and consequences of embeddedness for the economic performance of organizations: the network effect. Am Sociol Rev 61:674–698
Zurück zum Zitat Uzzi B, Spiro J (2005) Collaboration and creativity: the small world problem. Am J Sociol 111:447–504 Uzzi B, Spiro J (2005) Collaboration and creativity: the small world problem. Am J Sociol 111:447–504
Zurück zum Zitat Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, CambridgeMATH Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, CambridgeMATH
Metadaten
Titel
Strong ties and where to find them: or, why Neville and Bellatrix might be more important than Harry and Tom
verfasst von
Sean Everton
Tara Everton
Aaron Green
Cassie Hamblin
Robert Schroeder
Publikationsdatum
01.12.2022
Verlag
Springer Vienna
Erschienen in
Social Network Analysis and Mining / Ausgabe 1/2022
Print ISSN: 1869-5450
Elektronische ISSN: 1869-5469
DOI
https://doi.org/10.1007/s13278-022-00947-z

Weitere Artikel der Ausgabe 1/2022

Social Network Analysis and Mining 1/2022 Zur Ausgabe

Premium Partner