Fig. 3From: Developing a typology of network alteration strategies for implementation: a scoping review and iterative synthesisNetwork alteration strategiesBack to article page