AUC PHILOSOPHICA ET HISTORICA
AUC PHILOSOPHICA ET HISTORICA

AUC Philosophica et Historica (Acta Universitatis Carolinae Philosophica et Historica) is a multidisciplinary academic journal focused on the humanities with more than 50 years of tradition.

The journal is indexed in CEEOL, DOAJ, and EBSCO.

AUC PHILOSOPHICA ET HISTORICA, Vol 2018 No 2 (2018), 115–135

Sinister connections: How to analyse organised crime with social network analysis?

Tomáš Diviák

DOI: https://doi.org/10.14712/24647055.2018.7
published online: 18. 04. 2018

abstract

Networks have recently become ubiquitous in many scientific fields. In criminology, social network analysis (SNA) provides a potent tool for analysis of organized crime. This paper introduces basic network terms and measures as well as advanced models and reviews their application in criminological research. The centrality measures – degree and betweenness – are introduced as means to describe relative importance of actors in the network. The centrality measures are useful also in determining strategically positioned actors within the network or providing efficient targets for disruption of criminal networks. The cohesion measures, namely density, centralization, and average geodesic distance are described and their relevance is related to the idea of efficiency-security trade-off. As the last of the basic measures, the attention is paid to subgroup identification algorithms such as cliques, k-plexes, and factions. Subgroups are essential in the discussion on the cell-structure in criminal networks. The following part of the paper is a brief overview of more sophisticated network models. Models allow for theory testing, distinguishing systematic processes from randomness, and simplification of complex network structures. Quadratic assignment procedure, blockmodels, exponential random graph models, and stochastic actor-oriented models are covered. Some important research examples include similarities in co-offending, core-periphery structures, closure and brokerage, and network evolution. Subsequently, the paper reflects the three biggest challenges for application of SNA to criminal settings – data availability, proper formulation of theories and adequate methods application. In conclusion, readers are referred to books and journals combining SNA and criminology as well as to software suitable to carry out SNA.

keywords: social network analysis; network models; criminal networks; covert networks; organized crime

references (72)

1. Athey, N. C., & Bouchard, M. (2013). The BALCO scandal: the social structure of a steroid distribution network. Global Crime, 14(2/3), 216–237. CrossRef

2. Batagelj, V., Doreian, P., & Ferligoj, A. (2011). Positions and Roles. In J. Scott & P. J. Carrington (Eds.), The SAGE Handbook of Social Network Analysis (pp. 434–447). SAGE.

3. Batagelj, V., & Mrvar, A. (1996). Pajek – Program for Large Network Analysis. Retrieved from http://vlado.fmf.uni-lj.si/pub/networks/pajek/

4. Bellotti, E. (2014). Qualitative Networks. London: Routledge.

5. Bichler, G., & Malm, A. (2015). Disrupting Criminal Networks. Boulder; London: Lynne Rienner Publishers.

6. Borgatti, S. (2005). Centrality and network flow. Social Networks, 27(1). Retrieved from https://works.bepress.com/steveborgatti/3/ CrossRef

7. Borgatti, S. P., & Everett, M. G. (1999). Models of core/periphery structures. Social Networks, 21(4), 375–395. CrossRef

8. Borgatti, S. P., Everett, M. G., & Freeman, L. C. (2002). UCINET 6 for Windows: Software for Social Network Analysis. Harvard: Analytic Technologies.

9. Borgatti, S. P., Everett, M. G., & Johnson, J. C. (2013). Analyzing Social Networks. SAGE publications.

10. Bright, D., Hughes, C., & Chalmers, J. (2012). Illuminating dark networks: a social network analysis of an Australian drug trafficking syndicate. Crime, Law & Social Change, 57(2), 151–176. CrossRef

11. Bright, D. A., Greenhill, C., Ritter, A., & Morselli, C. (2015). Networks within networks: using multiple link types to examine network structure and identify key actors in a drug trafficking operation. Global Crime, 16(3), 219–237. CrossRef

12. Bright, David A. (2015). Disrupting and Dismantling Dark Networks. In L. M. Gerdes (Ed.), Illuminating Dark Networks: The Study of Clandestine Groups and Organizations (pp. 39–52). Cambridge: Cambridge University Press. CrossRef

13. Bright, David A., Malm, A., Koskinen, J., & O'Connor, A. (2014). Criminal network dynamics: The formation and evolution of a drug trafficking network. Presented at the Illicit Networks Workshop, Adelaide.

14. Calderoni, F. (2012). The structure of drug trafficking mafias: the 'Ndrangheta and cocaine. Crime, Law & Social Change, 58(3), 321–349. CrossRef

15. Calderoni, F., Brunetto, D., & Piccardi, C. (2017). Communities in criminal networks: A case study. Social Networks, 48, 116–125. CrossRef

16. Campana, P., & Varese, F. (2013). Cooperation in criminal organizations: Kinship and violence as credible commitments. Rationality and Society, 25(3), 263–289. CrossRef

17. Campana, Paolo. (2016). Explaining criminal networks: Strategies and potential pitfalls. Methodological Innovations, 9, 2059799115622748. CrossRef

18. Carley, K. M., Lee, J.-S., & Krackhardt, D. (2002). Destabilizing Networks. Connections, 24(3), 79–92. Carrington, P. J. (2011). Crime and Social Network Analysis. In The SAGE Handbook of Social Network Analysis (Vol. 2011, pp. 236–255).

19. Coleman, J. (1990). Foundations of Social Theory. Cambridge, MA: Belnap Press.

20. Crossley, N., Edwards, G., Harries, E., & Stevenson, R. (2012). Covert social movement networks and the secrecy-efficiency trade off: The case of the UK suffragettes (1906–1914). Social Networks, 34(4), 634–644. CrossRef

21. Décary-Hétu, D., & Dupont, B. (2012). The social network of hackers. Global Crime, 13(3), 160–175. CrossRef

22. Diviák, T. (2017). Ekvivalence a blokové modelování v analýze sociálních sítí – praktický úvod. Naše Společnost, (forthcoming).

23. Diviák, T., Dijkstra, J. K., & Snijders, T. A. B. (2017). Structure, Multiplexity, and Centrality in a Corruption Network: The Czech Rath Affair. Trends in Organized Crime, (under review).

24. Domínguez, S., & Hollstein, B. (2014). Mixed Methods Social Networks Research. Cambridge: Cambridge University Press. CrossRef

25. Doreian, P., Batagelj, V., & Ferligoj, A. (2004). Generalized Blockmodeling. Cambridge ; New York: Cambridge University Press. CrossRef

26. Duijn, P. A. C., Kashirin, V., & Sloot, P. M. A. (2014). The Relative Ineffectiveness of Criminal Network Disruption. Scientific Reports, 4.

27. Everton, S. F. (2012). Disrupting Dark Networks. Cambridge: Cambridge University Press. CrossRef

28. Fortunato, S. (2010). Community detection in graphs. Physics Reports, 486(3–5), 75–174. CrossRef

29. Freeman, L. C. (1978). Centrality in social networks conceptual clarification. Social Networks, 1(3), 215–239. CrossRef

30. Gerdes, L. M. (2015). Illuminating Dark Networks: The Study of Clandestine Groups and Organizations. Cambridge: Cambridge University Press. CrossRef

31. Grund, T. U., & Densley, J. A. (2012). Ethnic heterogeneity in the activity and structure of a Black street gang. European Journal of Criminology, 9(4), 388–406. CrossRef

32. Grund, T. U., & Densley, J. A. (2014). Ethnic Homophily and Triad Closure: Mapping Internal Gang Structure Using Exponential Random Graph Models. Journal of Contemporary Criminal Justice, 1043986214553377.

33. Handcock, M. S., Hunter, D. R., Butts, C. T., Goodreau, S. M., & Morris, M. (2003). statnet: Software tools for the Statistical Modeling of Network Data. Retrieved from http://statnetproject.org

34. Hanneman, R., & Riddle, M. (2005). Introduction to Social Network Methods. Retrieved April 3, 2016, from http://faculty.ucr.edu/~hanneman/nettext/

35. Hedström, P. (2005). Dissecting the Social: On the Principles of Analytical Sociology (1st edition). Cambridge: Cambridge University Press. CrossRef

36. Hedström, P., & Bearman, P. (Eds.). (2011). The Oxford Handbook of Analytical Sociology (1 edition). Oxford; New York: Oxford University Press.

37. Helfstein, S., & Wright, D. (2011). Covert or Convenient? Evolution of Terror Attack Networks. Journal of Conflict Resolution. CrossRef

38. Hofmann, D. C., & Gallupe, O. (2015). Leadership protection in drug-trafficking networks. Global Crime, 16(2), 123–138. CrossRef

39. Hollstein, B. (2014). Mixed Methods for Social Networks Research: An Introduction. In S. Domínguez & B. Hollstein (Eds.), Mixed Methods Social Networks Research (pp. 3–35). Cambridge: Cambridge University Press. CrossRef

40. Krebs, V. (2002). Uncloaking Terrorist Networks. First Monday, 7(4). Retrieved from http://firstmonday.org/ojs/index.php/fm/article/view/941 CrossRef

41. Le, V. (2012). Organised Crime Typologies: Structure, Activities and Conditions. International Journal of Criminology and Sociology, 1(0), 121–131. CrossRef

42. Lorrain, F., & White, H. C. (1971). Structural equivalence of individuals in social networks. The Journal of Mathematical Sociology, 1(1), 49–80. CrossRef

43. Luke, D. A. (2015). A User's Guide to Network Analysis in R. New York: Springer International Publishing. Lusher, D., Koskinen, J., & Robins, G. (Eds.). (2013). Exponential random graph models for social networks: theory, methods, and applications. Cambridge: Cambridge University Press.

44. McGloin, J. M., & Kirk, D. S. (2010). An Overview of Social Network Analysis. Journal of Criminal Justice Education. CrossRef

45. McIlwain, J. S. (1999). Organized crime: A social network approach. Crime, Law & Social Change, 32, 301–323. CrossRef

46. Milward, H. B., & Raab, J. (2006). Dark Networks as Organizational Problems: Elements of a Theory. International Public Management Journal, 9(3), 333–360. CrossRef

47. Moreno, J. L. (1934). Who Shall Survive? Washington, D.C.: Nervous and Mental Disease Publishing Company.

48. Morselli, C. (2010). Assessing Vulnerable and Strategic Positions in a Criminal Network. Journal of Contemporary Criminal Justice, 26(4), 382–392. CrossRef

49. Morselli, C. (2009). Inside Criminal Networks (Vol. 8). New York, NY: Springer New York. Morselli, C. (2014a). Crime and Networks. New York: Routledge. CrossRef

50. Morselli, C. (2014b). Introduction. In Crime and Networks (pp. 1–9). Routledge.

51. Morselli, C. Giguère, C., & Petit, K. (2007). The efficiency/security trade-off in criminal networks. Social Networks, 29(1), 143–153. CrossRef

52. Morselli, C., & Roy, J. (2008). BROKERAGE QUALIFICATIONS IN RINGING OPERATIONS*. Criminology, 46(1), 71–98. CrossRef

53. Mrvar, A., de Nooy, W., & Batagelj, V. (2005). Exploratory Social Network Analysis with Pajek. Cambridge: Cambridge University Press.

54. Newman, M. (2010). Networks: An Introduction (1 edition). Oxford ; New York: Oxford University Press. Newman, M. E. J., & Park, J. (2003). Why social networks are different from other types of networks. Physical Review E, 68(3). CrossRef

55. Oliver, K., Crossley, N., Everett, M. G., Edwards, G., & Koskinen, J. (2014). Covert networks: structures, processes and types. The Mitchell Center for Social Network Analysis working paper. Retrieved from http://www.socialsciences.manchester.ac.uk/medialibrary/research/mitchell/covertnetworks/wp/working_paper1.pdf

56. Papachristos, A. V. (2014). The Network Structure of Crime.

57. Robins, G. (2009). Understanding individual behaviors within covert networks: the interplay of individual qualities, psychological predispositions, and network effects. Trends in Organized Crime, 12(2), 166–187. CrossRef

58. Robins, G. (2015). Doing Social Network Research. London: SAGE publications.

59. Robins, G., Pattison, P., Kalish, Y., & Lusher, D. (2007). An introduction to exponential random graph (p*) models for social networks. Social Networks, 29(2), 173–191. CrossRef

60. Sageman, M. (2004). Understanding Terror Networks (1St Edition edition). Philadelphia: University of Pennsylvania Press.

61. Smith, C. M., & Papachristos, A. V. (2016). Trust Thy Crooked Neighbor Multiplexity in Chicago Organized Crime Networks. American Sociological Review, 0003122416650149. CrossRef

62. Snijders, T. A. B. (2011, July 8). Statistical Models for Social Networks [review-article]. Retrieved December 10, 2016, from http://www.annualreviews.org/doi/abs/10.1146/annurev.soc.012809.102709

63. Snijders, T. A. B., van de Bunt, G. G., & Steglich, C. E. G. (2010). Introduction to stochastic actorbased models for network dynamics. Social Networks, 32(1), 44–60 CrossRef

64. Sparrow, M. K. (1991). The application of network analysis to criminal intelligence: An assessment of the prospects. Social Networks, 13(3), 251–274. CrossRef

65. Stevenson, R., & Crossley, N. (2014). Change in Covert Social Movement Networks: The "Inner Circle" of the Provisional Irish Republican Army. Social Movement Studies, 13(1), 70–91. CrossRef

66. van der Hulst, R. C. (2009). Introduction to Social Network Analysis (SNA) as an investigative tool. Trends in Organized Crime, 12(2), 101–121. CrossRef

67. van der Hulst, Renée C. (2011). Terrorist Networks: The Threat of Connectivity. In The SAGE Handbook of Social Network Analysis (pp. 256–270).

68. Varese, F. (2012). The Structure and the Content of Criminal Connections: The Russian Mafia in Italy. European Sociological Review, jcs067.

69. von Lampe, K. (2009). Human capital and social capital in criminal networks: introduction to the special issue on the 7th Blankensee Colloquium. Trends in Organized Crime, 12(2), 93–100. CrossRef

70. Wasserman, S., & Faust, K. (1994). Social Network Analysis: Methods and Applications (1 edition). Cambridge ; New York: Cambridge University Press. CrossRef

71. Wood, G. (2017). The structure and vulnerability of a drug trafficking collaboration network. Social Networks, 48, 1–9. CrossRef

72. Xu, J., & Chen, H. (2008). The topology of dark networks. Communications of the ACM, 51(10), 58. CrossRef

Creative Commons License
Sinister connections: How to analyse organised crime with social network analysis? is licensed under a Creative Commons Attribution 4.0 International License.


periodicity: 2 x per year
ISSN: 0567-8293
E-ISSN: 2464-7055

Download