Hostname: page-component-76fb5796d-skm99 Total loading time: 0 Render date: 2024-04-27T13:27:07.370Z Has data issue: false hasContentIssue false

Historical and Comparative Research on Social Diffusion: Mechanisms, Methods, and Data

Published online by Cambridge University Press:  18 January 2022

Sean F. Everton
Affiliation:
University of Washington
Steven Pfaff*
Affiliation:
University of Washington
*
Email: pfaff@uw.edu

Abstract

Historical and comparative social scientists are increasingly interested in explaining the spread of innovations—which social scientists commonly refer to as diffusion and, broadly conceived, can include the spread of new ideas, behaviors, technologies, and institutions. However, in spite of the profusion of studies, researchers do not always specify a diffusion model or its underlying causal mechanisms. Whereas many studies document spatial diffusion, not all specify a vector, model flows of influence and information, or show how people and places are connected (tied) to one another. In reviewing some of the most important work on the spread of religion, violent conflict, and social movements over the last few decades, it is clear to us that social network analysis has revolutionized the historical study of diffusion. Even so, many studies have yet to embrace concepts, methods, and measures from social network analysis. Nevertheless, we are convinced that the combination of historical perspectives on change and innovation, new methods of historical data collection and analysis, and growing sophistication in the application of network concepts and models is shedding light on a host of historical questions and contributing to our general understanding of diffusion.

Type
Special Section Article
Copyright
© The Author(s), 2022. Published by Cambridge University Press on behalf of the Social Science History Association

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Abrahamson, E., and Rosenkopf, L. (1997) “Social network effects on the extent of innovation diffusion: A computer simulation.Organization Science 8 (3): 289309.Google Scholar
Almquist, Z. W., and Bagozzi, B. E. (2017) “Using radical environmentalist texts to uncover network structure and network features.Sociological Methods & Research 48 (4): 905–60.CrossRefGoogle Scholar
Andrews, K. T., and Biggs, M. (2006) “The dynamics of protest diffusion: Movement organizations, social networks, and news media in the 1960 sit-ins.” American Sociological Review (71): 752–77.CrossRefGoogle Scholar
Arquilla, J. (2012) “The Big Kill: Sorry, Steven Pinker, the world isn’t getting less violent.” Foreign Policy (December 12), https://foreignpolicy.com/2012/12/03/the-big-kill/ (accessed October 30, 2020).Google Scholar
Arquilla, J., and Ronfeldt, D. (2001) “The advent of netwar (revisited),” in Arquilla, J. and Ronfeldt, D. (eds.) Networks and Netwars. RAND, 125.Google Scholar
Asal, V., and Rethemeyer, R. K. (2008) “The nature of the beast: Organizational structures and the lethality of terrorist attacks.The Journal of Politics 70 (2): 437–49.CrossRefGoogle Scholar
Audretsch, D. B., and Feldman, M. P. (1996) “R&D spillovers and the geography of innovation and production.The American Economic Review 86 (3): 630–40.Google Scholar
Bagnall, R. S. (1982) “Religious conversion and onomastic change in early Byzantine Egypt.” Bullentin of the American Society of Papyrologists (19): 105–24.Google Scholar
Baker, W. E., and Faulkner, R. R. (1993) “The social-organization of conspiracy: Illegal networks in the heavy electrical-equipment industry.American Sociological Review 58 (6): 837–60.CrossRefGoogle Scholar
Bakker, R. M., Raab, J., and Milward, H. B. (2011) “A preliminary theory of dark network resilience.Journal of Policy Analysis and Management 31 (1): 3362.Google Scholar
Barabási, A.-L. (2002) Linked: The New Science of Networks. Perseus Publishing.Google Scholar
Barabási, A.-L., Albert, R., and Jeong, H. (1999) “Mean-field theory for scale-free random networks.” Physica A (272): 173–87.CrossRefGoogle Scholar
Becker, S. O., Hornung, E., and Woessmann, L. (2011) “Education and catch-up in the Industrial Revolution.American Economic Journal: Macroeconomics 3 (3): 91126.Google Scholar
Becker, S. O., Hsiao, Y., Pfaff, S., and Rubin, J. (2020) “Multiplex ties and the spatial diffusion of radical innovations: Martin Luther’s leadership in the Early Reformation.American Sociological Review 85 (5): 857–94.CrossRefGoogle Scholar
Becker, S. O., Pfaff, S., and Rubin, J. (2016) “Causes and consequences of the Protestant Reformation.” Explorations in Economic History (62): 1–25.CrossRefGoogle Scholar
Becker, S. O., and Woessmann, L. (2009) “Was Weber wrong? A human capital theory of Protestant economic history.The Quarterly Journal of Economics 124 (2): 532–96.CrossRefGoogle Scholar
Beissinger, M. (2007) “Structure and example in modular political phenomena: The diffusion of bulldozer/rose/orange/tulip revolutions.Perspectives on Politics 5 (2): 259–76.CrossRefGoogle Scholar
Bellotti, E. (2014) Qualitative Networks: Mixed Methods in Sociological Research. Routledge.CrossRefGoogle Scholar
Biggs, M. (2005) “Strikes as forest fires: Chicago and Paris in the late nineteenth century.American Journal of Sociology 110 (6): 16841714.Google Scholar
Blaikie, P. (1978) “The theory of the spatial diffusion of innovations: A spacious cul-de-sac.Progress in Human Geography 2 (2): 268–95.CrossRefGoogle Scholar
Bonacich, P. (1987) “Power and centrality: A family of measures.American Journal of Sociology 92 (5): 1170–82.CrossRefGoogle Scholar
Borgatti, S. P., Carley, K. M., and Krackhardt, D. (2006) “On the robustness of centrality measures under conditions of imperfect data.” Social Networks (28): 124–36.CrossRefGoogle Scholar
Borgatti, S. P., Everett, M. G., and Johnson, J. C. (2018) Analyzing Social Networks, 2nd ed. SAGE Publications.Google Scholar
Brockmann, D., and Helbing, D. (2013) “The hidden geometry of complex, network-driven contagion phenomena.Science 342 (6164): 1337.CrossRefGoogle ScholarPubMed
Broodbank, C. (1993) “Ulysses without sails: Trade, distance, knowledge and power in the early cyclades.World Archaeology 24 (3): 315–31.CrossRefGoogle Scholar
Brooke, S., and Ketchley, N. (2018) “Social and institutional origins of political Islam.American Political Science Review 112 (2): 376–94.CrossRefGoogle Scholar
Brughmans, T., Collar, A., and Coward, F., eds. (2016) The Connected Past: Challenges to Network Studies in Archaeology and History. Oxford University Press.Google Scholar
Brughmans, T., Keay, S., and Earl, G. (2014) “Introducing exponential random graph models for visibility networks.” Journal of Archaeological Science (49): 442–54.CrossRefGoogle Scholar
Burt, R. S. (1987) “Social contagion and innovation: Cohesion versus structural equivalence.American Journal of Sociology 92 (6): 1287–335.Google Scholar
Carley, K. M., Lee, J.-S., and Krackhardt, D. (2002) “Destabilizing networks.Connections 24 (3): 7992.Google Scholar
Carrington, P. J. (2011) “Crime and social network analysis,” in Scott, J. and Carrington, P. J. (eds.) The SAGE Handbook of Social Network Analysis. SAGE Publications: 236–69.Google Scholar
Cartwright, D., and Harary, F. (1956) “Structural balance: A generalization of Heider’s theory.” Psychological Review (63): 277–92.Google Scholar
Casterline, J., ed. (2001) Diffusion Processes in Fertility Transition. National Academy Press.Google Scholar
Cavallaro, L., Ficara, A., De Meo, P., Fiumara, G., Catanese, S., Bagdasar, O., Song, W., and Liotta, A.. (2020) “Disrupting resilient criminal networks through data analysis: The case of Sicilian Mafia.PLoS ONE 15 (8): e0236476.CrossRefGoogle ScholarPubMed
Centola, D. (2015) “The social origins of networks and diffusion.American Journal of Sociology 120 (5): 1295–338.CrossRefGoogle Scholar
Centola, D. (2018) How Behavior Spreads: The Science of Complex Contagions. Princeton University Press.Google Scholar
Centola, D., and Macy, M. (2007) “Complex contagions and the weakness of long ties.American Journal of Sociology 113 (3): 702–34.CrossRefGoogle Scholar
Chaves, M. (1996) “Ordaining women: The diffusion of an organizational innovation.American Journal of Sociology 101 (4): 840–73.CrossRefGoogle Scholar
Chaves, M. (1997) Ordaining Women: Culture and Conflict in Religious Organizations. Harvard University Press.Google Scholar
Christakis, N. A., and Fowler, J. H. (2010) “Social network sensors for early detection of contagious outbreaks.PLoS ONE 5 (9): e12948.CrossRefGoogle ScholarPubMed
Christakis, N. A., and Fowler, J. H. (2013) “Social contagion theory: Examining dynamic social networks and human behavior.Statistics in Medicine 32 (4): 556–77.CrossRefGoogle ScholarPubMed
Coleman, J. S., Katz, E., and Menzel, H. (1957) “The diffusion of an innovation among physicians.” Sociometry (20): 253–69.CrossRefGoogle Scholar
Coleman, J. S., Katz, E., and Menzel, H. (1966) Medical Innovation: A Diffusion Study. Vol. 20. Bobbs Merrill.Google Scholar
Collar, A. (2013a) “Re-thinking Jewish ethnicity through social network analysis,” in Knappett, C. (ed.) Network Analysis in Archeology. Oxford University Press: 223–45.Google Scholar
Collar, A. (2013b) Religious Networks in the Roman Empire. Cambridge University Press.CrossRefGoogle Scholar
Collins, R. (2008) Violence: A Micro-Sociological Theory. Princeton University Press.Google Scholar
Conroy, M., Elo, K., Rehbein, M., and von Keyserlingk, L. (2020) “Visualizing the evolution of networks using graphs and vertices.” Humanities Commons. https://doi.org/10.17613/jcd0-vt59.CrossRefGoogle Scholar
Crabtree, C., Darmofal, D., and Kern, H. L. (2015) “A spatial analysis of the impact of West German television on protest mobilization during the East German revolution.Journal of Peace Research 52 (3): 269–84.CrossRefGoogle Scholar
Crabtree, C., Kern, H. L., and Pfaff, S. (2018) “Mass media and the diffusion of collective action in authoritarian regimes: The June 1953 East German uprising.” International Studies Quarterly (62): 301–14.CrossRefGoogle Scholar
Crossley, N., Bellotti, E., Edwards, G., Everett, M. G., Koskinen, J., and Tranmer, M. (2015) Social Network Analysis for Ego-Nets. SAGE Publications.CrossRefGoogle Scholar
Crossley, N., Edwards, G., Harries, E., and Stevenson, R. (2012) “Covert social movement networks and the secrecy-efficiency trade off: The case of the UK suffragettes (1906–1914).” Social Networks (34): 634–44.CrossRefGoogle Scholar
Cunningham, D., Everton, S. F., and Murphy, P. J. (2016) Understanding Dark Networks: A Strategic Framework for the Use of Social Network Analysis. Rowman and Littlefield.Google Scholar
Czachesz, I. (2011) “Women, charity, and mobility in early Christianity: Weak links and the historical transformation of religions,” in Czachesz, I. (ed.) Changing Minds: Religion and Cognition through the Ages. Peeters: 129–54.Google Scholar
Davis, J. A. (1967) “Clustering and structural balance in graphs.Human Relations 20 (2): 181–87.CrossRefGoogle Scholar
de Nooy, W., Mrvar, A., and Batagelj, V. (2018) Exploratory Social Network Analysis with Pajek, 3rd ed. Cambridge University Press.Google Scholar
de Tarde, G. (1903) The Laws of Imitation. H. Holt and Company.Google Scholar
della Porta, D. (2013) Clandestine Political Violence. Cambridge University Press.CrossRefGoogle Scholar
Desjardins, J. (2018) “The rising speed of technological adoption.” Visual Capitalist, https://www.visualcapitalist.com/rising-speed-technological-adoption/ (accessed February 7, 2020).Google Scholar
DiMaggio, P. J., and Powell, W. W. (1983) “The iron cage revisited: Institutional isomorphism and collective rationality in organizational fields.American Sociological Review 48 (2): 147–60.CrossRefGoogle Scholar
Duling, D. C. (2013) “Paul’s Aegean network: The strength of strong ties.Biblical Theology Bulletin 43 (3): 135–54. https://doi.org/10.1177/0146107913493564.CrossRefGoogle Scholar
Ehrman, B. D. (2018) The Triumph of Christianity: How a Forbidden Religion Swept the World. Simon & Schuster.Google Scholar
Erikson, E. (2013) “Formalist and relationalist theory in social network analysis.Sociological Theory 31 (3): 219–42.CrossRefGoogle Scholar
Erikson, E., and Occhiuto, N. (2017) “Social networks and macrosocial change.” Annual Review of Sociology (43): 229–48.CrossRefGoogle Scholar
Evans, T. (2017) “Which network model should I use? Toward a quantitative comparison of spatial network models in archaeology,” in Brughmans, T., Collar, A., and Coward, F. (eds.) The Connected Past. Oxford University Press: 149–73.Google Scholar
Everton, S. F. (2012) Disrupting Dark Networks. Cambridge University Press.CrossRefGoogle Scholar
Everton, S. F. (2016) “Social networks and religious violence.Review of Religious Research 58 (2): 191217. https://doi.org/10.1007/s13644-015-0240-3.CrossRefGoogle Scholar
Everton, S. F. (2018) Networks and Religion: Ties the Bind, Loose, Build-up, and Tear Down. Cambridge University Press.Google Scholar
Everton, S. F., and Cunningham, D. T. (2015) “Dark network resilience in a hostile environment: Optimizing centralization and density.Journal of Criminology, Criminal Justice, Law & Society 16 (1): 120.Google Scholar
Everton, S. F., and Cunningham, D. T. (2020) “The quest for the gist of Jesus: The Jesus seminar, Dale Allison, and improper linear models.Journal for the Study of the Historical Jesus 18 (2): 156–89.CrossRefGoogle Scholar
Festinger, L., Schachter, S., and Back, K. (1950) Social Pressures in Informal Groups. MIT Press.CrossRefGoogle Scholar
Finke, R., and Stark, R. (2005) The Churching of America, 1776–2005: Winners and Losers in Our Religious Economy. Rutgers University Press.Google Scholar
Flache, A. (2018) “Between monoculture and cultural polarization: Agent-based models of the interplay of social influence and cultural diversity.Journal of Archaeological Method and Theory 25 (4): 9961023. https://doi.org/10.1007/s10816-018-9391-1 CrossRefGoogle Scholar
Fousek, J., Kaše, V., Mertel, A., Výtvarová, E., and Chalupa, A. (2018) “Spatial constraints on the diffusion of religious innovations: The case of Early Christianity in the Roman Empire.PLoS ONE 13 (12): e0208744. https://doi.org/10.1371/journal.pone.0208744.CrossRefGoogle ScholarPubMed
Fowler, J., and Christakis, N. (2008) “Dynamic spread of happiness in a large social network: Longitudinal analysis over 20 years in the Framingham Heart Study.British Medical Journal (337): a2338. https://doi.org/10.1136/bmj.a2338.CrossRefGoogle Scholar
Fowler, J., and Christakis, N. (2010) “Cooperative behavior cascades in human social networks.Proceedings of the National Academy of Sciences 107 (12): 5334. https://doi.org/10.1073/pnas.0913149107.CrossRefGoogle ScholarPubMed
Fraga, S. (2016) “Methodological and ethical challenges in violence research.Porto Biomedical Journal 1 (2): 7780.CrossRefGoogle ScholarPubMed
Freeman, L. C. (1977) “A set of measures of centrality based on betweenness.” Sociometry (40): 35–41.CrossRefGoogle Scholar
Freeman, L. C. (1979) “Centrality in social networks: Conceptual clarification.” Social Networks (1): 215–39.Google Scholar
Givan, R. K., Roberts, K. M., and Soule, S., eds. (2010) The Diffusion of Social Movements: Actors, Mechanisms, and Political Effects. Cambridge University Press.CrossRefGoogle Scholar
Gladwell, M. (2000) The Tipping Point: How Little Things Can Make a Big Difference. Little, Brown and Company.Google Scholar
Golder, S. A., & Macy, M. W. (2014) Digital Footprints: Opportunities and Challenges for Online Social Research. Annual Review of Sociology 40 (1): 129–52.CrossRefGoogle Scholar
Gould, R. V. (1991) “Multiple networks and mobilization in the Paris commune, 1871.” American Sociological Review (56): 716–29.CrossRefGoogle Scholar
Gould, R. V. (1995) Insurgent Identities: Class, Community and Protest in Paris from 1848 to the Commune. University of Chicago Press.Google Scholar
Gould, R. V. (2003) Collision of Wills: How Ambiguity of Social Rank Breeds Conflict. University of Chicago Press.CrossRefGoogle Scholar
Granovetter, M. (1973) “The strength of weak ties.American Journal of Sociology 73 (6): 1360–80.CrossRefGoogle Scholar
Granovetter, M. (1978) “Threshold models of collective behavior.” American Journal of Sociology (83): 1420–43.CrossRefGoogle Scholar
Granovetter, M. (2005) “The impact of social structure on economic outcomes.Journal of Economic Perspectives 19 (1): 3350.CrossRefGoogle Scholar
Green, B., Horel, T., and Papachristos, A. V. (2017) “Modeling contagion through social networks to explain and predict gunshot violence in Chicago, 2006 to 2014.JAMA Internal Medicine 177 (3): 326–33.CrossRefGoogle ScholarPubMed
Hafner-Burton, E. M., Kahler, M., and Montgomery, A. H. (2009) “Network analysis for international relations.International Organization 63 (3): 559–92.CrossRefGoogle Scholar
Hafner-Burton, E. M., and Montgomery, A. H. (2012) “War, trade, and distrust: Why trade agreements don’t always keep the peace.Conflict Management and Peace Science 29 (3): 257–78.CrossRefGoogle Scholar
Hägerstrand, T. (1965) “A Monte Carlo approach to diffusion.European Journal of Sociology/Archives Européennes de Sociologie/Europäisches Archiv für Soziologie 6 (1): 4367.Google Scholar
Hägerstrand, T. (1967) Innovation Diffusion as a Spatial Process. Translated by Pred, Allan. University of Chicago Press.Google Scholar
Hale, H. (2013) “Regime change cascades: What we have learned from the 1848 revolutions to the 2011 Arab Spring uprisings.” Annual Review of Political Science (16): 331–53.CrossRefGoogle Scholar
Hall, B. W. (2004) “Innovation and diffusion.” NBER Working Paper 10212, http://www.nber.org/papers.w10212 (accessed February 7, 2020).Google Scholar
Hassanpour, N. (2017) Leading from the Periphery and Network Collective Action. Cambridge University Press.CrossRefGoogle Scholar
Haynie, D. L. (2001) “Delinquent peers revisited: Does network structure matter?American Journal of Sociology 106 (4): 1013–57.CrossRefGoogle Scholar
Hedström, P. (1994) “Contagious collectivities: On the spatial diffusion of Swedish trade unions, 1890–1940.American Journal of Sociology 99 (5): 1157–79.CrossRefGoogle Scholar
Hedström, P., Sandell, R., and Stern, C. (2000) “Mesolevel networks and the diffusion of social movements: The case of the Swedish Social Democratic Party.American Journal of Sociology 106 (1): 145–72.CrossRefGoogle Scholar
Heider, F. (1946) “Attitudes and cognitive organization.” Journal of Psychology (21): 107–12.CrossRefGoogle Scholar
Hilbert, M. (2015) Diffusion of Innovations through Social Networks. University of California, Davis, =https://www.youtube.com/watch?v=yDltiyH1Hxw (accessed February 7, 2020).Google Scholar
Hironaka, A. (2005) Neverending Wars: The International Community, Weak States, and the Perpetuation of Civil War. Harvard University Press.CrossRefGoogle Scholar
Hotson, H., and Wallnig, T., eds. (2019) Reassembling the Republic of Letters in the Digital Age. Göttingen University Press.CrossRefGoogle Scholar
Howard, P. N. (2010) The Digital Origins of Dictatorship and Democracy: Information Technology and Political Islam. Oxford University Press.CrossRefGoogle Scholar
Hussain, M. M., and Howard, P. N. (2013) Democracy’s Fourth Wave? Digital Media and the Arab Spring. Oxford University Press.Google Scholar
Jordan, J., Mañas, F. M., and Horsburgh, N. (2008) “Strengths and weaknesses of grassroot Jihadist networks: The Madrid bombings.” Studies in Conflict & Terrorism (31): 17–21.CrossRefGoogle Scholar
Kenney, M. (2018) Radicalization and Resilience in an Activist Network. Cambridge University Press.Google Scholar
Kern, H. L. (2011) “Foreign media and protest diffusion in authoritarian regimes: The case of the 1989 East German Revolution.Comparative Political Studies 44 (9): 11791205.CrossRefGoogle Scholar
Kerschbaumer, F., von Keyserlingk-Rehbein, L., Stark, M., and Düring, M. (2020) The Power of Networks: Prospects for Historical Network Research. Routledge.CrossRefGoogle Scholar
Kim, H., and Pfaff, S. (2012) “Structure and dynamics of religious insurgency: Students and the spread of the Reformation.American Sociological Review 77 (2): 188215.CrossRefGoogle Scholar
King, G., Pan, J., and Roberts, M. E. (2013) “How censorship in China allows government criticism but silences collective expression.American Political Science Review 107 (2): 326–43.CrossRefGoogle Scholar
Kitts, J. (2000) “Mobilizing in black boxes: Social networks and participation in social movement organizations.” Mobilization 5 (2): 241–57.CrossRefGoogle Scholar
Kleinberg, J. (1999) “Authoritative sources in a hyperlinked environment.Journal of the ACM 46 (5): 604–32.CrossRefGoogle Scholar
Klerks, P. (2001) “The network paradigm applied to criminal organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands.Connections 24 (3): 5365.Google Scholar
Knappett, C. (2013) Network Analysis in Archeology: New Approaches to Regional Interaction. Oxford University Press.CrossRefGoogle Scholar
Krebs, V. (2002) “Mapping Networks of Terrorist Cells.Connections 24 (3): 4352.Google Scholar
Krug, E. G., Dahlberg, L. L., Mercy, J. A., Zwi, A. B., and Lozano, R., eds. (2002) World Report on Violence and Health. World Health Organization.CrossRefGoogle ScholarPubMed
Kuran, T. (1991) “Now out of never: The element of surprise in the East European revolutions of 1989.World Politics 44 (1): 748.CrossRefGoogle Scholar
Lengyel, B., Clemente, R. D., Kertész, J., and González, M. C. (2018) “The role of geography in the complex diffusion of innovations.” arXiv:1804.01349v2 [physics.soc-ph].Google Scholar
Levy, J. S. (1988) “Domestic politics and war.The Journal of Interdisciplinary History 18 (4): 653–73. https://doi.org/10.2307/204819.CrossRefGoogle Scholar
Lofland, J., and Stark, R. (1965) “Becoming a world-saver: A theory of conversion to a deviant perspective.” American Sociological Review (30): 862–75.CrossRefGoogle Scholar
Lohmann, S. (1994) “The dynamics of informational cascades: The Monday demonstrations in Leipzig, East Germany, 1989–1991.World Politics 47 (1): 42101.CrossRefGoogle Scholar
Lucas, R. E. (2009) “Trade and the diffusion of the Industrial Revolution.American Economic Journal: Macroeconomics 1 (1): 125.Google Scholar
Lyons, R. (2011) “The spread of evidence-poor medicine via flawed social-network analysis.” Statistics, Politics and Policy 2 (1): Article 2, http://www.bepress.com/spp/vol2/iss1/2/.CrossRefGoogle Scholar
Macy, M. W. (1990) “Learning-theory and the logic of critical mass.American Sociological Review 55 (6): 809–26.CrossRefGoogle Scholar
Macy, M. W. (1991) “Chains of cooperation: Threshold effects in collective action.American Sociological Review 56 (6): 730–47.CrossRefGoogle Scholar
Mahoney, J., and Thelen, K. (2015) Advances in Comparative and Historical Analysis. Cambridge University Press.CrossRefGoogle Scholar
Manzo, G., Gabbrielini, S., Roux, V., and M’Mbogosi, F. N. (2018) “Complex contagions and the diffusion of innovations: Evidence from a small-n study.Journal of Archaeological Method and Theory 25 (4): 1109–54.CrossRefGoogle Scholar
Maoz, Z. (2011) Networks of Nations: The Evolution, Structure, and Impact of International Networks, 1816–2001. Cambridge University Press.Google Scholar
Maoz, Z. (2012) “How network analysis can inform the study of international relations.Conflict Management and Peace Science 29 (3): 247–56.CrossRefGoogle Scholar
Maoz, Z., Kuperman, R. D., Terris, L. G., and Talmud, I. (2006) “Structural equivalence and international conflict: A social networks analysis.The Journal of Conflict Resolution 50 (5): 664–89.CrossRefGoogle Scholar
Maoz, Z., Terris, L. G., Kuperman, R. D., and Talmud, I. (2007) “What is the enemy of my enemy? Causes and consequences of imbalanced international relations, 1816–2001.The Journal of Politics 69 (1): 100–15.CrossRefGoogle Scholar
Marwell, G., and Oliver, P. E. (1993) The Critical Mass in Collective Action: A Micro-Social Theory. Cambridge University Press.CrossRefGoogle Scholar
Massey, J. L., and Krohn, M. D. (1986) “A longitudinal examination of an integrated social-process model of deviant-behavior.Social Forces 65 (1): 106–34.CrossRefGoogle Scholar
Matsueda, R. L. (2006) “Differential social organization, collective action, and crime.Crime, Law and Social Change 46 (1): 333.CrossRefGoogle Scholar
Matthews, L. J., Edmonds, J., Wildman, W., and Nunn, C. (2013) “Cultural inheritance or cultural diffusion of religious violence? A quantitative case study of the radical reformation.Religion, Brain & Behavior 3 (1): 315.CrossRefGoogle Scholar
McAdam, D. (1995) “Initator and spin-off movements: Diffusion proceses in protest cycles,” in Traugott, M. (ed.) Repertoires and Cycles of Collective Action. Duke Univeristy Press: 217–39.Google Scholar
McAdam, D., Tarrow, S., and Tilly, C. (2001) Dynamics of Contention. Cambridge University Press.CrossRefGoogle Scholar
McDaniel, C. A., Jr. (2007) “Violent yearnings for the Kingdom of God: Münster’s militant anabaptism,” in Wellman, J. K. (ed.) Belief and Bloodshed. Rowman and Littlefield: 6380.Google Scholar
McLaughlin, J. M. (2015) Factors of Religious Violence and a Path to Peace. Master of Science, Defense Analysis. Naval Postgraduate School, Department of Defense Analysis.Google Scholar
Merton, R. K. (1968) “The Matthew Effect in science.Science 159 (3810): 5663.CrossRefGoogle Scholar
Meyer, J. W., Boli, J., Thomas, G. M., and Ramirez, F. O. (1997) “World society and the nation-state.American Journal of Sociology 103 (1): 144–81.CrossRefGoogle Scholar
Meyer, J. W., and Rowan, B. (1977) “Institutionalized organizations: Formal structure as myth and ceremony.American Journal of Sociology 83 (2): 340–63.CrossRefGoogle Scholar
Meyers, D. J. (2000) “The diffusion of collective violence: Infectiousness, susceptibility, and mass media networks.” American Journal of Sociology 106 (1): 173208.CrossRefGoogle Scholar
Midgley, D. F., and Dowling, G. R. (1978) “Innovativeness: The concept and its measurement.Journal of Consumer Research 4 (4): 229–42.CrossRefGoogle Scholar
Mills, B. J., Clark, J. J., Peeples, M. A., Haas, W. R. Jr., Roberts, J. M. Jr., Hill, J. B., Huntley, D. L., Borck, L., Breiger, R. L., Clauset, A., and Shackley, M. S. (2013) “Transformation of social networks in the late pre-Hispanic Southwest.” Proceedings of the National Academy of Sciences of the United States of America (110): 5785–90.CrossRefGoogle Scholar
Mizoguchi, K. (2009) “Nodes and edges: A network approach to hierarchisation and state formation in Japan.” Journal of Anthropological Archaeology (28): 14–26.CrossRefGoogle Scholar
Moody, J. (2005) “Fighting a hydra: A note on the network embeddedness of the war on terror.Structure and Dynamics 1 (2): 15.Google Scholar
Moody, J. (2009) “Network dynamics,” in Hedström, P. and Bearman, P. (eds.) The Oxford Handbook of Analytical Sociology. Oxford University Press: 447–74.Google Scholar
Morris, A. D. (1986) The Origins of the Civil Rights Movement. Free Press.Google Scholar
Morselli, C., Giguère, C., and Petit, K. (2007) “The efficiency/security trade-off in criminal networks.Social Networks 29 (143–53): 7198.CrossRefGoogle Scholar
Oliver, K. (2014) “Covert networks: Structures, processes, and types.” Mitchell Centre Working Paper, https://hummedia.manchester.ac.uk/schools/soss/research/mitchell/covertnetworks/wp/working_paper1.pdf (accessed February 7, 2020).Google Scholar
Oliver, P. E., and Marwell, G. (2001) “Whatever happended to critical mass theory? A retrospection and assessment.Sociological Theory 19 (3): 292311.CrossRefGoogle Scholar
Opsahl, T., Agneessens, F., and Skvoretz, J. (2010) “Node centrality in weighted networks: Generalizing degree and shortest paths.Social Networks 32 (3): 245–51.CrossRefGoogle Scholar
Palloni, A. (2001) “Diffusion in sociological analysis,” in Casterline, J. (ed.) Diffusion Processes in Fertility Transition. National Academies Press, ch. 3.Google Scholar
Papachristos, A. V. (2009) “Murder by structure: Dominance relations and the social structure of gang homicide.American Journal of Sociology 115 (1): 74128.CrossRefGoogle ScholarPubMed
Papachristos, A. V., Hureau, D. M., and Braga, A. A. (2013) “The corner and the crew: The influence of geography and social networks on gang violence.American Sociological Review 78 (3): 417–47.CrossRefGoogle Scholar
Papachristos, A.V., Braga, A. A., and Hureau, D. M. (2012) “Social networks and the risk of gunshot injury.Journal of Urban Health: Bulletin of the New York Academy of Medicine 89 (6): 9921003.CrossRefGoogle ScholarPubMed
Pedahzur, A., and Perliger, A. (2006) “The changing nature of suicide attacks: A social network perspective.Social Forces 84 (4): 19872008.CrossRefGoogle Scholar
Peeples, M. A., Mills, B. J., Haas, W. R. Jr., Clark, J. J., and Roberts, J. M. Jr. (2016) “Analytical challenges for the application of social network analysis in archaeology,” in Brughmans, T., Collar, A., and Coward, F. (eds.) The Connected Past. Oxford University Press: 5984.Google Scholar
Perry, B. L., Borgatti, S. P., and Pescosolido, B. A. (2018) Egocentric Network Analysis. Cambridge University Press.CrossRefGoogle Scholar
Pinker, S. (2011) The Better Angels of Our Nature: Why Violence Has Declined. Viking.Google Scholar
Powell, W. W., and DiMaggio, P.J., eds. (1991) The New Institutionalism in Organizational Analysis. University of Chicago Press.CrossRefGoogle Scholar
Raab, J., and Milward, H. B. (2003) “Dark networks as problems.Journal of Public Administration Research and Theory 13 (4): 413–39.CrossRefGoogle Scholar
Ritchie, H., and Roser, M. (2019) “Technology adoption.” Our World in Data, https://ourworldindata.org/technology-adoption (accessed February 7, 2020).Google Scholar
Rivers, R. (2017) “Can archeological models always fulfil our prejudices?” in Brughmans, T., Collar, A., and Coward, F. (eds.) The Connected Past. Oxford University Press: 123–47.Google Scholar
Roberts, N., and Everton, S. F. (2011) “Strategies for combating dark networks.Journal of Social Structure 12 (2), http://www.cmu.edu/joss/content/articles/volume12//RobertsEverton.pdf (accessed February 7, 2020).CrossRefGoogle Scholar
Roberts, N., and Everton, S. F. (2016) “Monitoring and disrupting dark networks: A bias toward the center and what it costs us,” in Dawoody, A. R. (ed.) Eradicating Terrorism from the Middle East. Springer: 2942.CrossRefGoogle Scholar
Robins, G. L. (2011) “Exponential random graph models for social networks,” in Scott, J. and Carrington, P. J. (eds.) The SAGE Handbook of Social Network Analysis. SAGE Publications: 484500.Google Scholar
Robins, G. L. (2015) Doing Social Network Research. SAGE.Google Scholar
Robins, G. L., Pattison, P. E., Kalish, Y., and Lusher, D. (2007) “An introduction to exponential random graph (P*) models for social networks.” Social Networks (29): 173–91.CrossRefGoogle Scholar
Rogers, E. M. (2003) Diffusion of Innovations, 5th ed. The Free Press.Google Scholar
Roscigno, V. J., and Danaher, W. F. (2001) “Media and mobilization: The case of radio and southern textile worker insurgency, 1929–1934.” American Sociological Review 66 (1): 2148.CrossRefGoogle Scholar
Roux, V., and Manzo, G. (2018) “Social boundaries and networks in the diffusion of innovations: A short introduction.Journal of Archaeological Method and Theory 25 (4): 967–73.CrossRefGoogle Scholar
Rubin, J. (2014) “Printing and Protestants: An empirical test of the role of printing in the Reformation.” Review of Economics and Statistics 96 (2): 270–86.CrossRefGoogle Scholar
Russett, B., and Oneal, J. (2001) Triangulating Peace: Democracy, Interdependence, and International Organization. Norton.Google Scholar
Ryan, B., and Gross, N. C. (1943) “The diffusion of hybrid seed corn in two Iowa communities.Rural Sociology 8 (1): 1524.Google Scholar
Saal, J. (2019) “The dark social capital of religious radicals: Jihadi mobilization and social networks in Germany, Austria, and Switzerland, 1998–2018.” PhD diss., University of Lucerne, Switzerland.Google Scholar
Sagalnik, M. J. (2017). Bit by Bit: Social Research in the Digital Age. Princeton Univeristy Press.Google Scholar
Sageman, M. (2004) Understanding Terror Networks. University of Pennsylvania Press.CrossRefGoogle Scholar
Şakin, E. (2016) “Diffusion of Islam in the United States: Comparative personal conversion social networks.International Review of Social Research 6 (4): 221–32.Google Scholar
Sampson, R. J., and Groves, W. J. (1989) “Community structure and crime: Testing social-disorganization theory.American Journal of Sociology 94 (4): 774802.CrossRefGoogle Scholar
Schelling, T. C. (1978) Micromotives and Macrobehavior. Norton.Google Scholar
Schor, A. M. (2009) “Conversion by the numbers: Benefits and pitfalls of quantitative modelling in the study of early Christian growth.Journal of Religious History 33 (4): 472–98.CrossRefGoogle Scholar
Shalizi, C. R., and Thomas, A. C. (2011) “Homophily and contagion are generically confounded in observational social network studies.Sociological Methods & Research 40 (2): 211–39.CrossRefGoogle ScholarPubMed
Siegel, D. A. (2009) “Social networks and collective action.American Journal of Political Science 53 (1): 122–38.CrossRefGoogle Scholar
Siegel, D. A. (2011) “When does repression work? Collective action in social networks.Journal of Politics 73 (4): 9931010.CrossRefGoogle Scholar
Smith, C. M., and Papachristos, A. V. (2016) “Trust thy crooked neighbor: Multiplexity in Chicago organized crime networks.American Sociological Review 81 (4): 644–67.CrossRefGoogle Scholar
Smith, J. A., and Moody, J. (2013) “Structural effects of network sampling coverage I: Nodes missing at random.Social Networks 35 (4): 652–68.CrossRefGoogle Scholar
Smith, J. A., Moody, J., and Morgan, J. H. (2017) “Network sampling coverage II: The effect of non-random missing data on network measurement.” Social Networks (48): 78–99.CrossRefGoogle Scholar
Sparrow, M. K. (1991) “The application of network analysis to criminal intelligence: An assessment of the prospects.” Social Networks (13): 251–74.CrossRefGoogle Scholar
Stark, R. (1996a) The Rise of Christianity: A Sociologist Reconsiders History. Princeton University Press.CrossRefGoogle Scholar
Stark, R. (1996b) “So far, so good: A brief assessment of Mormon membership projections.Review of Religious Research 38 (2): 175–78.CrossRefGoogle Scholar
Stark, R. (2006) Cities of God: The Real Story of How Christianity Became an Urban Movement and Conquered Rome. Harper.Google Scholar
Stark, R., and Bainbridge, W. S. (1980) “Networks of faith: Interpersonal bonds and recruitment to cults and sects.American Journal of Sociology 85 (6): 1376–95.CrossRefGoogle Scholar
Stayer, J. M. (1979) Anabaptists and the Sword. Coronado Press.Google Scholar
Steglich, C., Snijders, T. A. B., and Pearson, M. (2010) “Dynamic networks and behavior: Separating selection from influence.” Sociological Methodology (40): 329–93.CrossRefGoogle Scholar
Strang, D., and Tuma, N. B. (1993) “Spatial and temporal heterogeneity in diffusion.American Journal of Sociology 99 (3): 614–39.CrossRefGoogle Scholar
Sunstein, C. R. (2002) “The law of group polarization.” The Journal of Political Philosophy (10): 175–95.CrossRefGoogle Scholar
Tarrow, S. (1989) Democracy and Disorder: Protest and Politics in Italy, 1965–1975. Oxford University Press.Google Scholar
Tarrow, S. (1994) Power in Movement: Social Movements, Collective Action and Politics. Cambridge University Press.Google Scholar
Tarrow, S. (2010) “Dynamics of diffusion: Mechanisms, institutions, and scale shift,” in Givan, R. K., Roberts, K. M., and Soule, S. (eds.) The Diffusion of Social Movements: Actors, Mechanisms, and Political Effects. Cambridge University Press: 204–20.CrossRefGoogle Scholar
Terrell, J. E. (1997) “Geographic systems and human diversity in the North Solomons.World Archaeology 9 (1): 6281.CrossRefGoogle Scholar
Terrell, J. E. (2010) “Language and material culture on the Sepik Coast of Papua New Guinea.” Journal of Island and Coastal Archaeology (5): 3–32.CrossRefGoogle Scholar
Tilly, C. (1978) From Mobilization to Revolution. McGraw Hill.Google Scholar
Toole, J. L., Cha, M., and González, M. C. (2012) “Modeling the adoption of innovations in the presence of geographic and media influences.PLoS ONE 7 (1): e29528.CrossRefGoogle ScholarPubMed
Traugott, M., ed. (1995) Repertoires and Cycles of Collective Action. Duke Univeristy Press.Google Scholar
Travers, J., and Milgram, S. (1969) “An experimental study of the small world problem.Sociometry 32 (4): 425–43.CrossRefGoogle Scholar
Valente, T. W. (1995) Network Models of the Diffusion of Innovations. Hampton Press.Google Scholar
Valente, T. W. (2005) “Network models and methods for studying the diffusion of innovations,” in Carrington, P. J., Scott, J., and Wasserman, S. (eds.) Models and Methods in Social Network Analysis. Cambridge University Press: 98–116.Google Scholar
Valente, T. W. (2017) “Putting the network in network interventions.” Proceedings of the National Academy of Sciences 114 (36): 95009501.CrossRefGoogle Scholar
Van Bavel, B. J. P., Curtis, D. E., Hannaford, M. J., Moatsos, M., Roonsen, J., and Soens, T. (2019) “Climate and society in long-term perspective: Opportunities and pitfalls in the use of historical datasets.” WIREs Climate Change (10): e611.CrossRefGoogle Scholar
van der Hulst, R. C. (2011) “Terrorist networks: The threat of connectivity,” in Scott, J. and Carrington, P. J. (eds.) The Sage Handbook of Social Network Analysis. SAGE Publications Ltd.: 256–70.Google ScholarPubMed
Ward, M. D., Stovel, K., and Sacks, A. (2011) “Network analyis in political science.” Annual Review of Political Science (14): 25–64.Google Scholar
Warren, T. C. (2016) “Modeling the coevolution of international and domestic institutions: Alliances, democracy, and the complex path to peace.Journal of Peace Research 53 (3): 424–41.CrossRefGoogle Scholar
Wasserman, S., and Faust, K. (1994) Social Network Analysis: Methods and Applications. Cambridge University Press.CrossRefGoogle Scholar
Watkins, S. C. (1991) From Provinces into Nations: The Demographic Integration of Europe, 18701960. Princeton University Press.Google Scholar
Watts, D. J. (1999) “Networks, dynamics, and the small-world phenomenon.American Journal of Sociology 105 (2): 493527.CrossRefGoogle Scholar
Watts, D. J., and Strogatz, S. H. (1998) “Collective dynamics of ‘small world’ networks.” Nature (393): 409–10.CrossRefGoogle Scholar
Weidmann, N. B. (2015) “Communication, technology, and political conflict.Journal of Peach Research 52 (3): 263–8.CrossRefGoogle Scholar
Weyland, K. (2012) “The Arab Spring: Why the surprising similarities with the revolutionary wave of 1848?Perspectives on Politics 10 (4): 917–34.CrossRefGoogle Scholar
Whyte, W. F. (1943) Street Corner Society. University of Chicago Press.Google Scholar
Williams, G. H. (1975) The Radical Reformation. Westminster Press.Google Scholar
Wurpts, B., Corcoran, K. E., and Pfaff, S. (2018) “The diffusion of Protestantism in Northern Europe: Historical embeddedness and complex contagions in the adoption of the Reformation.Social Science History 42 (2): 213–44.CrossRefGoogle Scholar
Xu, J., and Chen, H. (2008) “The topology of dark networks.Communications of the ASM 51 (10): 5865.Google Scholar
Young, H. P. (2009) “Innovation diffusion in heterogeneous populations: Contagion, social influence, and social learning.American Economic Review 99 (5): 1899–924.CrossRefGoogle Scholar