<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>0124-0579</journal-id>
<journal-title><![CDATA[Estudios Socio-Jurídicos]]></journal-title>
<abbrev-journal-title><![CDATA[Estud. Socio-Juríd]]></abbrev-journal-title>
<issn>0124-0579</issn>
<publisher>
<publisher-name><![CDATA[Universidad del Rosario]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S0124-05792021000200273</article-id>
<article-id pub-id-type="doi">10.12804/revistas.urosario.edu.co/sociojuridicos/a.9359</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[La teoría de redes en las investigaciones jurídicas: una revisión de la literatura]]></article-title>
<article-title xml:lang="en"><![CDATA[The Network Theory in Legal Investigations: A Review of the Literature]]></article-title>
<article-title xml:lang="pt"><![CDATA[A teoria das redes em investigações jurídicas: uma revisão da literatura]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[CASTAÑEDA GUERRERO]]></surname>
<given-names><![CDATA[DIANA ALEXANDRA]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Nacional de Colombia  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Colombia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2021</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2021</year>
</pub-date>
<volume>23</volume>
<numero>2</numero>
<fpage>273</fpage>
<lpage>301</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S0124-05792021000200273&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S0124-05792021000200273&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S0124-05792021000200273&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[RESUMEN La investigación jurídica contemporánea se enfrenta al reto de incorporar metodologías utilizadas en otras ciencias sociales, es en ese escenario que aparece la teoría de redes como un instrumento que aporta herramientas para el abordaje del estudio del derecho. Existen tres aplicaciones del análisis de redes: las redes de normas, las redes jurisprudenciales y las redes textuales para analizar la estructura interna de una norma. Luego de presentar las tres perspectivas como una forma de acercar a otros investigadores al uso de las redes en las ciencias jurídicas, se manifiesta que la potencialidad de las redes en el manejo de grandes cantidades de información puede convertirse en una limitación por la incapacidad de observar los detalles de los objetos de estudio.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[ABSTRACT Contemporary legal research faces the challenge of incorporating methodologies used in other social sciences; it is in this scenario that Network Theory appears as an instrument that provides tools in the approach to the study of law. There are three applications for network analysis, norm networks, jurisprudential networks, and textual networks to analyze the internal structure of a norm. After presenting the three perspectives as a way to bring other researchers closer to the use of networks in legal sciences, they state that the potential of networks in handling large amounts of information can become a limitation due to the inability to observe the details of the objects of study.]]></p></abstract>
<abstract abstract-type="short" xml:lang="pt"><p><![CDATA[RESUMO A pesquisa jurídica contemporânea enfrenta o desafio de incorporar metodologias utilizadas em outras ciências sociais, e é neste cenário que a Teoria das Redes surge como um instrumento que fornece ferramentas na abordagem para o estudo do direito. Existem três aplicações que foram dadas à análise de redes, redes de normas, redes jurisprudenciais e redes textuais para analisar a estrutura interna de uma norma. Após apresentar as três perspectivas como forma de aproximar outros pesquisadores ao uso de redes nas ciências jurídicas, afirma-se que o potencial das redes em lidar com grandes quantidades de informação pode se tornar uma limitação pela impossibilidade de observar os detalhes dos objetos de estudo.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[teoría de redes]]></kwd>
<kwd lng="es"><![CDATA[redes legales]]></kwd>
<kwd lng="es"><![CDATA[redes jurisprudenciales]]></kwd>
<kwd lng="en"><![CDATA[Network theory]]></kwd>
<kwd lng="en"><![CDATA[legal networks]]></kwd>
<kwd lng="en"><![CDATA[jurisprudential networks]]></kwd>
<kwd lng="pt"><![CDATA[teoria das redes]]></kwd>
<kwd lng="pt"><![CDATA[redes jurídicas]]></kwd>
<kwd lng="pt"><![CDATA[redes jurisprudenciais]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Agnoloni]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Pagallo]]></surname>
<given-names><![CDATA[U]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The case law of the Italian Constitutional Court between network theory and philosophy of information]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Winkels]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Lettieri]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<source><![CDATA[Second International Workshop on Network Analysis in Law]]></source>
<year>2014</year>
<page-range>11-38</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ajani]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Boella]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Lesmo]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Mazzei]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Radicioni]]></surname>
<given-names><![CDATA[D. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Rossi]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Legal taxonomy syllabus: Handling multilevel legal ontologies]]></article-title>
<source><![CDATA[Proceedings of Lang Tech]]></source>
<year>2008</year>
<page-range>3-6</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arjona Sánchez]]></surname>
<given-names><![CDATA[M. J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[El derecho en red: una aproximación desde el derecho europeo]]></article-title>
<source><![CDATA[Videtur Quod, Anuario del Pensamiento Crítico]]></source>
<year>2010</year>
<numero>2</numero>
<issue>2</issue>
<page-range>1-183</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ashley]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Ferrell]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Potter]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Guclu]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Savelka]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Grabmai]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Statutory network analysis plus information retrieval]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Winkels]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Lettieri]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<source><![CDATA[Second International Workshop on Network Analysis in Law]]></source>
<year>2014</year>
<page-range>1-7</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Augsberg]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The relevance of network models within the juridic discourse empirical, sociological , and epistemological perspectives]]></article-title>
<source><![CDATA[German Law Journal]]></source>
<year>2009</year>
<volume>10</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>383-94</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bench-Capon]]></surname>
<given-names><![CDATA[T. J. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Dunne]]></surname>
<given-names><![CDATA[P. E. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Staniford]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Modelling legal documents as graphs]]></article-title>
<source><![CDATA[Information &amp; Communications Technology Law]]></source>
<year>1997</year>
<volume>6</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>103-20</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Boella]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[di Caro]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Violato]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Robaldo]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<source><![CDATA[Exploiting networks in Law]]></source>
<year>2014</year>
<conf-name><![CDATA[ International Conference on Language Resources and Evaluation (LREC)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1654-8</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bommarito]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Katz]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A mathematical approach to the study of the United States Code]]></article-title>
<source><![CDATA[Physica A]]></source>
<year>2010</year>
<volume>389</volume>
<numero>19</numero>
<issue>19</issue>
<page-range>4195-200</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Boulet]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Mazzega]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Bourcier]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Network analysis of the French Enviromental Code. AI Approaches to the Complexity of Legal Systems. Complex Systems, the Semantic Web, Ontologies, Argumentation, and Dialogue]]></article-title>
<source><![CDATA[Lecture Notes in Computer Science]]></source>
<year>2010</year>
<volume>6237</volume>
<page-range>39-53</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Boulet]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Mazzega]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Bourcier]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A network approach to the French system of legal codes-part I: Analysis of a dense network]]></article-title>
<source><![CDATA[Artificial Intelligence and Law]]></source>
<year>2011</year>
<volume>19</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>333-55</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bourcier]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Mazzega]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<source><![CDATA[Codification, law article and graphs]]></source>
<year>2007</year>
<conf-name><![CDATA[ Legal Knowledge and Information Systems, JIJRIX 2007: The Twentieth Annual Conference]]></conf-name>
<conf-loc> </conf-loc>
<page-range>29-38</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cairns]]></surname>
<given-names><![CDATA[J. W]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Watson, Walton, and the history of legal transplants]]></article-title>
<source><![CDATA[Georgia Journal of International and Comparative Law]]></source>
<year>2013</year>
<volume>41</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>637-96</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Caldarelli]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Catanzaro]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Redes: Una breve introducción]]></source>
<year>2012</year>
<publisher-name><![CDATA[Alianza]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dawson]]></surname>
<given-names><![CDATA[J. P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Review: The making of the civil law. Alan Watson. Harvard University Press, Cambridge, 1981]]></article-title>
<source><![CDATA[Chicago Law Review]]></source>
<year>1982</year>
<volume>1</volume>
<numero>49</numero>
<issue>49</issue>
<page-range>595-604</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fitzgerald]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Network analysis as an aid to legal interpretation can counting and drawing rules help lawyers understand the context of those rules?]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Winkels]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Lettieri]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<source><![CDATA[Second International Workshop on Network Analysis in Law]]></source>
<year>2014</year>
<page-range>72-82</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fowler]]></surname>
<given-names><![CDATA[J. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Johnson]]></surname>
<given-names><![CDATA[T. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Spriggs]]></surname>
<given-names><![CDATA[J. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Jeon]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Wahlbeck]]></surname>
<given-names><![CDATA[P. J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Network analysis and the law: Measuring the legal importance of precedents at the U.S. Supreme Court]]></article-title>
<source><![CDATA[Political Analysis]]></source>
<year>2007</year>
<volume>15</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>324-46</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Garbarino]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A model of legal systems as evolutionary networks: Normative complexity and self-organization of clusters of rule]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Winkels]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Lettieri]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<source><![CDATA[Second International Workshop on Network Analysis in Law]]></source>
<year>2014</year>
<page-range>138-59</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gultemen]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[van Engers]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Graph-based linking and visualization for legislation documents (GLVD)]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Winkels]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Lettieri]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Faro]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Network analysis in law]]></source>
<year>2014</year>
<page-range>137-56</page-range><publisher-name><![CDATA[Edizione Scientifiche Italiane]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hamdaqa]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hamou-Lhadj]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An approach based on citation analysis to support effective handling of regulatory compliance]]></article-title>
<source><![CDATA[Future Generation Computer Systems]]></source>
<year>2011</year>
<volume>27</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>395-410</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hoekstra]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A network analysis of Dutch regulations using the metal-ex document server]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Winkels]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Lettieri]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Faro]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Network analysis in law]]></source>
<year>2014</year>
<page-range>95-112</page-range><publisher-name><![CDATA[Edizione Scientifiche Italiane]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Karstens]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Koolen]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Dari-Mattiacci]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Bod]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Ginsburg]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Reference structures of national constitutions]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Winkels]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Lettieri]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<source><![CDATA[Second International Workshop on Network Analysis in Law]]></source>
<year>2014</year>
<page-range>50-60</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kelsen]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<source><![CDATA[Teoría pura del derecho]]></source>
<year>1982</year>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Koniaris]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Anagnostopoulos]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Vassiliou]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Network analysis in the legal domain: A complex model for European Union legal sources]]></article-title>
<source><![CDATA[Journal of Complex Networks]]></source>
<year>2015</year>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kuppevelt]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[van Dijck]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Answering legal research questions about Dutch case law with network analysis and visualization]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Wyner]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Casini]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<source><![CDATA[Legal knowledge and information systems]]></source>
<year>2017</year>
<page-range>95-100</page-range><publisher-name><![CDATA[IOS Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lettieri]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Faro]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Vicidomini]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Altamura]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Nets of legal information connecting and displaying heterogeneous legal source]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Winkels]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Lettieri]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<source><![CDATA[Second International Workshop on Network Analysis in Law]]></source>
<year>2014</year>
<month>a</month>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lettieri]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Malandrino]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Spinelli]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Rinaldi]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[From structure to function. Exploring the use of text and social network analysis in criminal investigations]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Winkels]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Lettieri]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Faro]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Network analysis in law]]></source>
<year>2014</year>
<month>b</month>
<page-range>79-94</page-range><publisher-name><![CDATA[Edizione Scientifiche Italiane]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lettieri]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Malandrino]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Vicidomini]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Document-enhacement and network analisys for criminal investigation: An holistic approach]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Winkels]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Lettieri]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<source><![CDATA[Second International Workshop on Network Analysis in Law]]></source>
<year>2014</year>
<month>c</month>
<page-range>16-38</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Losano]]></surname>
<given-names><![CDATA[M. G]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Derecho turbulento: En busca de nuevos paradigmas en las relaciones entre derechos nacionales y normativas supraestatales]]></article-title>
<source><![CDATA[DOXA. Cuadernos de Filosofía del Derecho]]></source>
<year>2005</year>
<numero>28</numero>
<issue>28</issue>
<page-range>159-82</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Martin Katz]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Bommarito]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Network analysis and law tutorial]]></source>
<year>2011</year>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mazzega]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Bourcier]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Boulet]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<source><![CDATA[The network of French legal codes.]]></source>
<year>2009</year>
<conf-name><![CDATA[ Proceedings of the 12th International Conference on Artificial Intelligence and Law (ICAIL '09)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>236-7</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mimouni]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Nazarenko]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Salotti]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An approach for searching and browsing a network of legal documents]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Winkels]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Lettieri]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Faro]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Network analysis in law]]></source>
<year>2014</year>
<page-range>183-208</page-range><publisher-name><![CDATA[Edizione Scientifiche Italiane]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Newman]]></surname>
<given-names><![CDATA[M. E. J]]></given-names>
</name>
</person-group>
<source><![CDATA[Networks an introduction]]></source>
<year>2010</year>
<publisher-name><![CDATA[Oxford University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ost]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[van de Kerchoven]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[De la pyramide au réseau? Pour une théorie dialectique du droit]]></source>
<year>2002</year>
<publisher-name><![CDATA[Publications des Facultés universitaires Saint-Louis]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Panagis]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Tarissan]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Giving every case its (legal) due. The contribution of citation networks and text similarity techniques to legal studies of European Union law]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Wyner]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Casini]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<source><![CDATA[Legal knowledge and information systems]]></source>
<year>2017</year>
<page-range>59-68</page-range><publisher-name><![CDATA[IOS Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[T. A. C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The web of law]]></article-title>
<source><![CDATA[San Diego Legal Studies Research Paper]]></source>
<year>2005</year>
<volume>6</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>1-39</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sweeney]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Bjerke]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Network analysis of manually-encoded state laws and prospects for automation]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Potter]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Guclu]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Keane]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Ashley]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Grabmair]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Winkels]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Lettieri]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Faro]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Network analysis in law]]></source>
<year>2014</year>
<page-range>53-78</page-range><publisher-name><![CDATA[Edizione Scientifiche Italiane]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Szöke]]></surname>
<given-names><![CDATA[Á.]]></given-names>
</name>
<name>
<surname><![CDATA[Mácsár]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Strausz]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Knowledge extraction framework for analyzing legal documents]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Winkels]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Lettieri]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Faro]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Network Analysis in Law]]></source>
<year>2014</year>
<page-range>113-36</page-range><publisher-name><![CDATA[Edizione Scientifiche Italiane]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tamme]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Vohandu]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Task]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A method to compare the complexity of legal acts]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Winkels]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Lettieri]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<source><![CDATA[Second International Workshop on Network Analysis in Law]]></source>
<year>2014</year>
<page-range>105-14</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Täsk]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Vohandu]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Lohk]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Liiv]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An experiment to find the deep structure of Estonian legislation]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Atkinson]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<source><![CDATA[Legal knowledge and information systems]]></source>
<year>2011</year>
<page-range>93-102</page-range><publisher-name><![CDATA[IOS Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Watson]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Legal change : Sources of law and legal culture]]></article-title>
<source><![CDATA[University of Pennsylvania Law Review]]></source>
<year>1983</year>
<month>a</month>
<volume>131</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>1121-57</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Watson]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Legal transplant: An approach to comparative law]]></source>
<year>1993</year>
<publisher-name><![CDATA[University of Georgia Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Watson]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Society and legal change]]></source>
<year>2001</year>
<month>a</month>
<publisher-name><![CDATA[Temple University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Watson]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[The evolution of western private law]]></source>
<year>2001</year>
<month>b</month>
<publisher-name><![CDATA[The Jonhns Hopkins University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Watson]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Comparative law: Law, reality and society]]></source>
<year>2007</year>
<publisher-name><![CDATA[Vandeplas Publishing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Watts]]></surname>
<given-names><![CDATA[D. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Strogatz]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Collective dynamics of "small-world" networks]]></article-title>
<source><![CDATA[Nature]]></source>
<year>1998</year>
<numero>393</numero>
<issue>393</issue>
<page-range>440-2</page-range></nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Whalen]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bad law before it goes bad: Citation networks and the life cycle of overruled supreme court precedent]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Winkels]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Lettieri]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Faro]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Network analysis in law]]></source>
<year>2014</year>
<month>a</month>
<page-range>1-22</page-range><publisher-name><![CDATA[Edizione Scientifiche Italiane]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Whalen]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Citation networks and the life cycle of overruled Supreme Court precedent]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Radbound Winkels]]></surname>
<given-names><![CDATA[L. Nicola]]></given-names>
</name>
<name>
<surname><![CDATA[Faro]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Network analysis in law]]></source>
<year>2014</year>
<month>b</month>
<page-range>1-22</page-range><publisher-name><![CDATA[Edizioni Scientifiche Italiane]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Winkels]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Boer]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Finding and visualizing Dutch legislative context networks]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Winkels]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Lettieri]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Faro]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Network analysis in law]]></source>
<year>2014</year>
<page-range>157-82</page-range><publisher-name><![CDATA[Edizione Scientifiche Italiane]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Winkels]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[de Ruyter]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Kroese]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Determining authority of Dutch case law]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Atkinson]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<source><![CDATA[Legal knowledge and information systems]]></source>
<year>2011</year>
<page-range>103-12</page-range><publisher-name><![CDATA[IOS Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Silver]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Wasson]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Steiner]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Saharma]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Knowledge network based on legal issues.]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Radboud Winkels]]></surname>
<given-names><![CDATA[N. Lettieri]]></given-names>
</name>
<name>
<surname><![CDATA[Faro]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Network analysis in law]]></source>
<year>2014</year>
<page-range>23-52</page-range><publisher-name><![CDATA[Edizione Scientifiche Italiane]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zweigert]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Kötz]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<source><![CDATA[An introduction to comparative law]]></source>
<year>1998</year>
<publisher-name><![CDATA[Oxford University Press]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
