This study focuses on SME networks of design and high-tech companies in Southeast Netherland. By highlighting the personal networks of members across design and high-tech industries, the study attempts to identify the main brokers in this dynamic environment. In addition, we investigate whether specific characteristics are associated with these brokers. The main contribution of the paper lies in the fact that, in contrast to most other work, it is quantitative and that it focuses on brokers identified in an actual network (based on both suppliers and users of the knowledge infrastructure). Studying the phenomenon of brokerage provides us with clear insights into the concept of brokerage regarding SME networks in different fields. In particular we highlight how third parties contribute to the transfer and development of knowledge. Empirical results show, among others that the most influential brokers are found in the nonprofit and science sector and have a long track record in their branch.
DOCUMENT
Hacktivism represents the promotion in the cyber landscape of ideo-logically motivated agendas using hacking techniques. Despiteresearch on the topic has provided some clues on how hacktivistnetworks develop, the processes behind their evolution remain mostlyunknown. This gap in the literature prompted us to research the role ofonline/offline social relationships and of the offender convergencesettings in the creation, recruitment process and development ofhacktivist networks. This study is based on 30 interviews with hackti-vists, and it uses the social opportunity structures framework to ana-lyze the development of 21 hacktivist networks. The results show thatsaid networks can be divided in sub-categories based on the type ofconnections used to create them. Online social relationships andonline convergence settings (particularly social media platforms andIRC channels) seem to play a key role in the development of hacktivistnetworks, while offline contacts are limited. For the recruitment pro-cess, hacktivists use comparable strategies to any organization, butthree different categories were identified when discussing the level ofsophistication applied to the selection of new candidates.
DOCUMENT
The adoption of new technologies requires people to work differently and adopt new ways of thinking. This, however, is complicated because social conventions in professional disciplines are deeply rooted and have a long history. An extreme case as an exemplar was studied to investigate social change in a maintenance network. With concepts from stewardship theory and entrepreneurship literature, the case study is used to develop a preliminary model for managing social change in maintenance networks. The model presented is a first attempt to link stewardship theory to the practice of maintenance management. It will be refined and validated in future research and can complement other theories, such as agency theory and transaction cost economics, in explaining socio-technical phenomena in construction management. The practical contribution of this research to the construction management field is that it deepens our understanding of the clients’ leadership role.
DOCUMENT
This article examines the network structure, criminal cooperation, and external interactions of cybercriminal networks. Its contribution is empirical and inductive. The core of this study involved carrying out 10 case analyses on closed cybercrime investigations – all with financial motivations on the part of the offenders - in the UK and beyond. Each analysis involved investigator interview and access to unpublished law enforcement files. The comparison of these cases resulted in a wide range of findings on these cybercriminal networks, including: a common division between the scam/attack components and the money components; the presence of offline/local elements; a broad, and sometimes blurred, spectrum of cybercriminal behaviour and organisation. An overarching theme across the cases that we observe is that cybercriminal business models are relatively stable.
DOCUMENT
Crowdfunding is gaining popularity as a viable means to raise financial capital for good causes, cultural goods, new products, and ventures. Little empirical research has been done to understand crowdfunding and basic academic knowledge of its dynamics is still lacking. By data mining the crowdfunding platform Kickstarter.com and Facebook we collected a large dataset of crowdfunding projects and the ego networks of the entrepreneurs. We study the relation of the success of the Kickstarter project to his social network and to media activities and find a scaling law that predicts the number of clicks on the project website required for a successful project. Examining the results of the social network analysis we concluded that successful initiators on Kickstarter have more friends but a sparser network. Unsuccessful entrepreneurs on the other hand have a higher average degree suggesting a denser network. Our analyses suggest that sparse, and thus diverse networks are beneficial for the success of a project.
DOCUMENT
Because social workers respond to local contexts, it is often said that social work is not a global profession. Indeed, social workers adapt their practices to local conditions. However, these local practices are recognised globally. The exchange of these practices and methods enriches social workers, inspires them and strengthens the further development of the profession. To facilitate this exchange, social work has had several international associations and networks for almost a century, which have enabled the sharing of local practices and educational programs. Today, social work works within a basic international framework that guides both professional practice and education. This descriptive article will take the reader through the history of international social work, by mentioning some global social work associations and networks and their achievements. Furthermore, the article will address internationalisation of the social work curriculum and will mention the added values and disadvantages of an international experience abroad. (Includes an abstract in the Slovakian language)
MULTIFILE
In most models on terrorism, interaction with other radicals is a key factor. However, systematic empirical evidence that radical ties affect behaviour is scarce. Our access to detailed police information allows us to apply Social Network Analysis (SNA) on a Dutch Salafi-Jihadi network and analyse the social relationships and network positions of 80 actors, out of whom 20 turned to terrorist acts. The results suggest that ties to leaders and terrorist offenders, co-attendance of radicalising settings and greater structural embeddedness relate to the likelihood of individual actors turning to acts of terrorism. However, we also find some individual attributes that may offer competing explanations. In this paper we discuss our findings and address how future research may provide further insights into an important issue for agencies involved in countering terrorism: which radical actors, if any, are more likely to turn to acts of terrorism?
DOCUMENT
Our study elucidates collaborative value creation and private value capture in collaborative networks in a context of sustainability. Collaborative networks that focus on innovative solutions for grand societal challenges are characterized by a multiplicity and diversity of actors that increase the complexity and coordination costs of collective action. These types of inter-organizational arrangements have underlying tensions as partners cooperate to create collaborative value and compete to capture or appropriate value on a private or organizational level, resulting in potential and actual value flows that are highly diffuse and uncertain among actors. We also observe that network participants capture value differentially, often citing the pro-social (e.g. community, belonging, importance) and extrinsic benefits of learning and reputation as valuable, but found it difficult to appropriate economic or social benefits from that value. Differential and asymmetric value appropriation among participants threatens continued network engagement and the potential collective value creation of collaborative networks. Our data indicates that networked value creation and capture requires maintaining resource complementarity and interdependency among network participants as the network evolves. We develop a framework to assess the relational value of collaborative networks and contribute to literature by unpacking the complexities of networked value creation and private value capture in collaborative networks for sustainability.
DOCUMENT
Presentation by Rutger Leukfeldt on Financially motivated cybercriminal networks, during workshop on Cybercrime Offenders. Cybercrime perpetrators are as diverse and complex as the cybercrime that they commit. For example, they come from different backgrounds and have different (egotistical, technical, monetary, ideological, political, professional, vengeful, sexual or other) motivations. They may or may not be professional criminals, and individuals or part of organised groups or networks (example of Advanced Persistent Threats). Some may commit crime on their own account or make their services available to others, and some may be supported by or be state actors. A better understanding of the types of perpetrators and their motivations and techniques can be instrumental for the prevention of cybercrime and for a more effective criminal justice response. The aim of this workshop is to contribute to such a better understanding and to initiate steps towards a typology of offenders.
DOCUMENT
The organizational aspects of hacktivist networks are seldom studied, withresearch mainly focused on exploratory and descriptive case studies. Tonarrow the gap, we have used the sociological model for the social organiza-tion of deviants developed by Best and Luckenbill (1994). Said model illus-trates how hacktivist networks are organized and contributes to a clear-cutcategorization useful when dealing with hacktivism. Our study uses a richdataset obtained from 32 semi-structured qualitative interviews conductedwithin 23 different networks. By expanding on past research on cybercrim-inal and hacktivist networks, the results show that hacktivists operate atvarying levels of sophistication, favoring small, well-organized teams whereroles and tasks are clearly divided. While there are differences among net-works, our analysis reveals the importance of individual actions within largeroperations: being affiliated with like-minded people, the existence of internalrules, and the importance of hacking skills to determine, if not hierarchies,then who is the most influential. Most of the networks analyzed wereclassified as “peers” or “teams,” although the landscape shows considerableheterogeneity. Compared to other cybercriminal networks, hacktivists seemto have lower level of sophistication, while embracing the hacking subcul-ture that places importance on the role of the individual within the network.
DOCUMENT