Using social network analysis to study crime: Navigating the challenges of criminal justice records

[1]  M. Bouchard,et al.  The Search for Suitable Homicide Co-Offenders Among Gang Members , 2015, CrimRxiv.

[2]  C. Leuprecht,et al.  Guns for hire: North America’s intra-continental gun trafficking networks , 2014, Russian Journal of Economics and Law.

[3]  A.V.Bakshi,et al.  Network Analysis , 2005, Operations Research.

[4]  David A. Bright,et al.  Illicit Network Dynamics: The Formation and Evolution of a Drug Trafficking Network , 2019 .

[5]  Gisela Bichler,et al.  The Impact of Civil Gang Injunctions on Networked Violence Between the Bloods and the Crips , 2019 .

[6]  Hernan Mondani,et al.  Organizing on two wheels: uncovering the organizational patterns of Hells Angels MC in Sweden , 2019 .

[7]  Katherine Faust,et al.  Social Networks and Crime: Pitfalls and Promises for Advancing the Field , 2019, Annual Review of Criminology.

[8]  Tyler Reese,et al.  A mixed methods social network analysis of a cross-border drug network: the Fernando Sanchez organization (FSO) , 2018, Trends in Organized Crime.

[9]  David A. Bright,et al.  On the Durability of Terrorist Networks: Revealing the Hidden Connections between Jihadist Cells , 2018, Studies in Conflict & Terrorism.

[10]  C. Vandeviver,et al.  Integrating police-recorded crime data and DNA data to study serial co-offending behaviour , 2018 .

[11]  M. Bouchard,et al.  The 40 Members of the Toronto 18: Group Boundaries and the Analysis of Illicit Networks , 2018, Deviant Behavior.

[12]  Paolo Campana,et al.  Out of Africa: The organization of migrant smuggling across the Mediterranean , 2018 .

[13]  Martin Bouchard,et al.  On to the next one? Using social network data to inform police target prioritization , 2017, Policing: An International Journal of Police Strategies & Management.

[14]  Andrea Giménez-Salinas Framis,et al.  Static and Dynamic Approaches of a Drug Trafficking Network , 2017 .

[15]  Jenny Chalmers,et al.  Social network analysis of Australian poly-drug trafficking networks: How do drug traffickers manage multiple illicit drugs? , 2017, Soc. Networks.

[16]  Catherine S. Greenhill,et al.  Criminal network vulnerabilities and adaptations , 2017 .

[17]  Jacopo Costa Networks and illicit associations in corrupt exchanges: representing a gelatinous system in Italy , 2017 .

[18]  Travis J. Meyers Examining the network components of a Medicare fraud scheme: the Mirzoyan-Terdjanian organization , 2017 .

[19]  B. Ariel,et al.  Searching For Influential Actors in Co-Offending Networks: The Recruiter , 2017 .

[20]  Russell Brewer Controlling crime through networks , 2017 .

[21]  Gisela Bichler,et al.  Uncovering the Social Pecking Order in Gang Violence , 2017 .

[22]  Aili Malm,et al.  Social Network Analysis and Its Contribution to Research on Crime and Criminal Justice , 2016 .

[23]  Andrew V. Papachristos,et al.  Trust Thy Crooked Neighbor , 2016 .

[24]  Erin Denton,et al.  Anatomy of Offending: Human Trafficking in the United States, 2006–2011 , 2016 .

[25]  Pasquale De Meo,et al.  Network Structure and Resilience of Mafia Syndicates , 2015, Inf. Sci..

[26]  Paolo Campana The Structure of Human Trafficking: Lifting the Bonnet on a Nigerian Transnational Network , 2016 .

[27]  Anthony A. Braga,et al.  THE COMPANY YOU KEEP? THE SPILLOVER EFFECTS OF GANG MEMBERSHIP ON INDIVIDUAL GUNSHOT VICTIMIZATION IN A CO‐OFFENDING NETWORK , 2015 .

[28]  Joshua D. Freilich,et al.  Exploring the crime‒terror nexus in the United States: a social network analysis of a Hezbollah network involved in trade diversion , 2015 .

[29]  Catherine S. Greenhill,et al.  The Use of Actor-Level Attributes and Centrality Measures to Identify Key Actors , 2015 .

[30]  Thomas Grund,et al.  Ethnic Homophily and Triad Closure , 2015 .

[31]  Catherine S. Greenhill,et al.  Networks within networks: using multiple link types to examine network structure and identify key actors in a drug trafficking operation , 2015 .

[32]  Hernan Mondani,et al.  The Complexity of Crime Network Data: A Case Study of Its Consequences for Crime Control and the Study of Networks , 2015, PloS one.

[33]  David C. Hofmann,et al.  Leadership protection in drug-trafficking networks , 2015 .

[34]  C. Whelan,et al.  Social network analysis and small group ‘dark’ networks: an analysis of the London bombers and the problem of ‘fuzzy’ boundaries , 2015 .

[35]  Kathleen M. Carley,et al.  Open-Source Exploitation for Understanding Covert Networks , 2015 .

[36]  F. Calderoni Predicting Organized Crime Leaders , 2015 .

[37]  Luke M. Gerdes,et al.  The Methodological Challenges of Extracting Dark Networks: Minimizing False Positives through Ethnography , 2015 .

[38]  Marina Mancuso Not all madams have a central role: analysis of a Nigerian sex trafficking network , 2014 .

[39]  Carlo Morselli,et al.  Coercion, Control, and Cooperation in a Prostitution Ring , 2014 .

[40]  P. Duijn,et al.  The Relative Ineffectiveness of Criminal Network Disruption , 2014, Scientific Reports.

[41]  P. Duijn,et al.  Social Network Analysis Applied to Criminal Networks: Recent Developments in Dutch Law Enforcement , 2014 .

[42]  R. Karl Rethemeyer,et al.  Network analysis , 2011 .

[43]  Catherine S. Greenhill,et al.  Dismantling Criminal Networks: Can Node Attributes Play a Role? , 2013 .

[44]  R. Frank,et al.  The Evolution of a Drug Co-arrest Network , 2013 .

[45]  M. Bouchard,et al.  Assessing the Core Membership of a Youth Gang from its Co-offending Network , 2013 .

[46]  Garry Robins,et al.  Bayesian analysis for partially observed network data, missing ties, attributes and actors , 2013, Soc. Networks.

[47]  James Moody,et al.  Structural effects of network sampling coverage I: Nodes missing at random , 2013, Soc. Networks.

[48]  Aili Malm,et al.  Using friends for money: the positional importance of money-launderers in organized crime , 2013 .

[49]  David Bright,et al.  Evolution of a drug trafficking network: Mapping changes in network structure and function across time , 2013 .

[50]  M. Bouchard,et al.  The BALCO scandal: the social structure of a steroid distribution network , 2013 .

[51]  Shandon Harris-Hogan,et al.  Anatomy of a terrorist cell: a study of the network uncovered in Sydney in 2005 , 2013 .

[52]  G. Berlusconi Do all the pieces matter? Assessing the reliability of law enforcement data sources for the network analysis of wire taps , 2013 .

[53]  dhetu Information Exchange Paths In IRC Hacking Chat Rooms , 2013 .

[54]  A. Papachristos,et al.  The Embedded and Multiplex Nature of Al Capone , 2013 .

[55]  Carlo Morselli,et al.  Predicting sentencing outcomes with centrality measures , 2013, Security Informatics.

[56]  Benoît Dupont,et al.  Skills and Trust: A Tour Inside the Hard Drives of Computer Hackers , 2012 .

[57]  Francesco Calderoni,et al.  The structure of drug trafficking mafias: the ‘Ndrangheta and cocaine , 2012 .

[58]  David Décary-Hétu,et al.  The social network of hackers , 2012 .

[59]  Federico Varese,et al.  Listening to the wire: criteria and techniques for the quantitative analysis of phone intercepts , 2011, Trends in Organized Crime.

[60]  David Bright,et al.  Illuminating dark networks: a social network analysis of an Australian drug trafficking syndicate , 2012 .

[61]  R. Keast,et al.  Resilience of a corrupt police network: the first and second jokes in Queensland , 2012 .

[62]  G. Laycock,et al.  Exploring internal child sex trafficking networks using social network analysis , 2011 .

[63]  Gisela Bichler,et al.  Co-offending between criminal enterprise groups , 2011 .

[64]  Scott Helfstein,et al.  Covert or Convenient? Evolution of Terror Attack Networks , 2011 .

[65]  Robyn L. Keast,et al.  Corrupt police networks: uncovering hidden relationship patterns, functions and roles , 2011 .

[66]  Gisela Bichler,et al.  Networks of Collaborating Criminals: Assessing the Structural Vulnerability of Drug Markets , 2011 .

[67]  Francesco Calderoni,et al.  Strategic positioning in mafia networks , 2011 .

[68]  Carlo Morselli,et al.  Assessing Vulnerable and Strategic Positions in a Criminal Network , 2010 .

[69]  Alison Ritter,et al.  Retail price as an outcome measure for the effectiveness of drug law enforcement. , 2010, The International journal on drug policy.

[70]  Aili Malm,et al.  Comparing the ties that bind criminal networks: Is blood thicker than water? , 2010 .

[71]  Efstathios D. Mainas,et al.  The Analysis of Criminal and Terrorist Organisations as Social Network Structures: A Quasi-Experimental Study , 2012 .

[72]  Carlo Morselli,et al.  Hells Angels in springtime , 2009 .

[73]  Carlo Morselli,et al.  BROKERAGE QUALIFICATIONS IN RINGING OPERATIONS , 2008 .

[74]  Aili Malm,et al.  Social Network and Distance Correlates of Criminal Associates Involved in Illicit Drug Production , 2008 .

[75]  Carlo Morselli,et al.  The Efficiency/Security Trade-Off in Criminal Networks , 2007, Soc. Networks.

[76]  Carlo Morselli,et al.  Law-Enforcement Disruption of a Drug Importation Network , 2007 .

[77]  Carlo Morselli,et al.  “Legitimate Strengths in Criminal Networks” , 2006 .

[78]  Martin G. Everett,et al.  A Graph-theoretic perspective on centrality , 2006, Soc. Networks.

[79]  M. Natarajan Understanding the Structure of a Large Heroin Distribution Network: A Quantitative Analysis of Qualitative Data , 2006 .

[80]  John Jay,et al.  UNDERSTANDING THE STRUCTURE OF A DRUG TRAFFICKING ORGANIZATION : A CONVERSATIONAL ANALYSIS by Mangai Natarajan , 2006 .

[81]  C. Morselli The relational dynamics of illegal firearm transactions , 2002 .

[82]  Malcolm K. Sparrow,et al.  The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .

[83]  H. Becker,et al.  Outsiders: Studies in the Sociology of Deviance. , 1964 .