Using social network analysis to study crime: Navigating the challenges of criminal justice records
暂无分享,去创建一个
[1] M. Bouchard,et al. The Search for Suitable Homicide Co-Offenders Among Gang Members , 2015, CrimRxiv.
[2] C. Leuprecht,et al. Guns for hire: North America’s intra-continental gun trafficking networks , 2014, Russian Journal of Economics and Law.
[3] A.V.Bakshi,et al. Network Analysis , 2005, Operations Research.
[4] David A. Bright,et al. Illicit Network Dynamics: The Formation and Evolution of a Drug Trafficking Network , 2019 .
[5] Gisela Bichler,et al. The Impact of Civil Gang Injunctions on Networked Violence Between the Bloods and the Crips , 2019 .
[6] Hernan Mondani,et al. Organizing on two wheels: uncovering the organizational patterns of Hells Angels MC in Sweden , 2019 .
[7] Katherine Faust,et al. Social Networks and Crime: Pitfalls and Promises for Advancing the Field , 2019, Annual Review of Criminology.
[8] Tyler Reese,et al. A mixed methods social network analysis of a cross-border drug network: the Fernando Sanchez organization (FSO) , 2018, Trends in Organized Crime.
[9] David A. Bright,et al. On the Durability of Terrorist Networks: Revealing the Hidden Connections between Jihadist Cells , 2018, Studies in Conflict & Terrorism.
[10] C. Vandeviver,et al. Integrating police-recorded crime data and DNA data to study serial co-offending behaviour , 2018 .
[11] M. Bouchard,et al. The 40 Members of the Toronto 18: Group Boundaries and the Analysis of Illicit Networks , 2018, Deviant Behavior.
[12] Paolo Campana,et al. Out of Africa: The organization of migrant smuggling across the Mediterranean , 2018 .
[13] Martin Bouchard,et al. On to the next one? Using social network data to inform police target prioritization , 2017, Policing: An International Journal of Police Strategies & Management.
[14] Andrea Giménez-Salinas Framis,et al. Static and Dynamic Approaches of a Drug Trafficking Network , 2017 .
[15] Jenny Chalmers,et al. Social network analysis of Australian poly-drug trafficking networks: How do drug traffickers manage multiple illicit drugs? , 2017, Soc. Networks.
[16] Catherine S. Greenhill,et al. Criminal network vulnerabilities and adaptations , 2017 .
[17] Jacopo Costa. Networks and illicit associations in corrupt exchanges: representing a gelatinous system in Italy , 2017 .
[18] Travis J. Meyers. Examining the network components of a Medicare fraud scheme: the Mirzoyan-Terdjanian organization , 2017 .
[19] B. Ariel,et al. Searching For Influential Actors in Co-Offending Networks: The Recruiter , 2017 .
[20] Russell Brewer. Controlling crime through networks , 2017 .
[21] Gisela Bichler,et al. Uncovering the Social Pecking Order in Gang Violence , 2017 .
[22] Aili Malm,et al. Social Network Analysis and Its Contribution to Research on Crime and Criminal Justice , 2016 .
[23] Andrew V. Papachristos,et al. Trust Thy Crooked Neighbor , 2016 .
[24] Erin Denton,et al. Anatomy of Offending: Human Trafficking in the United States, 2006–2011 , 2016 .
[25] Pasquale De Meo,et al. Network Structure and Resilience of Mafia Syndicates , 2015, Inf. Sci..
[26] Paolo Campana. The Structure of Human Trafficking: Lifting the Bonnet on a Nigerian Transnational Network , 2016 .
[27] Anthony A. Braga,et al. THE COMPANY YOU KEEP? THE SPILLOVER EFFECTS OF GANG MEMBERSHIP ON INDIVIDUAL GUNSHOT VICTIMIZATION IN A CO‐OFFENDING NETWORK , 2015 .
[28] Joshua D. Freilich,et al. Exploring the crime‒terror nexus in the United States: a social network analysis of a Hezbollah network involved in trade diversion , 2015 .
[29] Catherine S. Greenhill,et al. The Use of Actor-Level Attributes and Centrality Measures to Identify Key Actors , 2015 .
[30] Thomas Grund,et al. Ethnic Homophily and Triad Closure , 2015 .
[31] Catherine S. Greenhill,et al. Networks within networks: using multiple link types to examine network structure and identify key actors in a drug trafficking operation , 2015 .
[32] Hernan Mondani,et al. The Complexity of Crime Network Data: A Case Study of Its Consequences for Crime Control and the Study of Networks , 2015, PloS one.
[33] David C. Hofmann,et al. Leadership protection in drug-trafficking networks , 2015 .
[34] C. Whelan,et al. Social network analysis and small group ‘dark’ networks: an analysis of the London bombers and the problem of ‘fuzzy’ boundaries , 2015 .
[35] Kathleen M. Carley,et al. Open-Source Exploitation for Understanding Covert Networks , 2015 .
[36] F. Calderoni. Predicting Organized Crime Leaders , 2015 .
[37] Luke M. Gerdes,et al. The Methodological Challenges of Extracting Dark Networks: Minimizing False Positives through Ethnography , 2015 .
[38] Marina Mancuso. Not all madams have a central role: analysis of a Nigerian sex trafficking network , 2014 .
[39] Carlo Morselli,et al. Coercion, Control, and Cooperation in a Prostitution Ring , 2014 .
[40] P. Duijn,et al. The Relative Ineffectiveness of Criminal Network Disruption , 2014, Scientific Reports.
[41] P. Duijn,et al. Social Network Analysis Applied to Criminal Networks: Recent Developments in Dutch Law Enforcement , 2014 .
[42] R. Karl Rethemeyer,et al. Network analysis , 2011 .
[43] Catherine S. Greenhill,et al. Dismantling Criminal Networks: Can Node Attributes Play a Role? , 2013 .
[44] R. Frank,et al. The Evolution of a Drug Co-arrest Network , 2013 .
[45] M. Bouchard,et al. Assessing the Core Membership of a Youth Gang from its Co-offending Network , 2013 .
[46] Garry Robins,et al. Bayesian analysis for partially observed network data, missing ties, attributes and actors , 2013, Soc. Networks.
[47] James Moody,et al. Structural effects of network sampling coverage I: Nodes missing at random , 2013, Soc. Networks.
[48] Aili Malm,et al. Using friends for money: the positional importance of money-launderers in organized crime , 2013 .
[49] David Bright,et al. Evolution of a drug trafficking network: Mapping changes in network structure and function across time , 2013 .
[50] M. Bouchard,et al. The BALCO scandal: the social structure of a steroid distribution network , 2013 .
[51] Shandon Harris-Hogan,et al. Anatomy of a terrorist cell: a study of the network uncovered in Sydney in 2005 , 2013 .
[52] G. Berlusconi. Do all the pieces matter? Assessing the reliability of law enforcement data sources for the network analysis of wire taps , 2013 .
[53] dhetu. Information Exchange Paths In IRC Hacking Chat Rooms , 2013 .
[54] A. Papachristos,et al. The Embedded and Multiplex Nature of Al Capone , 2013 .
[55] Carlo Morselli,et al. Predicting sentencing outcomes with centrality measures , 2013, Security Informatics.
[56] Benoît Dupont,et al. Skills and Trust: A Tour Inside the Hard Drives of Computer Hackers , 2012 .
[57] Francesco Calderoni,et al. The structure of drug trafficking mafias: the ‘Ndrangheta and cocaine , 2012 .
[58] David Décary-Hétu,et al. The social network of hackers , 2012 .
[59] Federico Varese,et al. Listening to the wire: criteria and techniques for the quantitative analysis of phone intercepts , 2011, Trends in Organized Crime.
[60] David Bright,et al. Illuminating dark networks: a social network analysis of an Australian drug trafficking syndicate , 2012 .
[61] R. Keast,et al. Resilience of a corrupt police network: the first and second jokes in Queensland , 2012 .
[62] G. Laycock,et al. Exploring internal child sex trafficking networks using social network analysis , 2011 .
[63] Gisela Bichler,et al. Co-offending between criminal enterprise groups , 2011 .
[64] Scott Helfstein,et al. Covert or Convenient? Evolution of Terror Attack Networks , 2011 .
[65] Robyn L. Keast,et al. Corrupt police networks: uncovering hidden relationship patterns, functions and roles , 2011 .
[66] Gisela Bichler,et al. Networks of Collaborating Criminals: Assessing the Structural Vulnerability of Drug Markets , 2011 .
[67] Francesco Calderoni,et al. Strategic positioning in mafia networks , 2011 .
[68] Carlo Morselli,et al. Assessing Vulnerable and Strategic Positions in a Criminal Network , 2010 .
[69] Alison Ritter,et al. Retail price as an outcome measure for the effectiveness of drug law enforcement. , 2010, The International journal on drug policy.
[70] Aili Malm,et al. Comparing the ties that bind criminal networks: Is blood thicker than water? , 2010 .
[71] Efstathios D. Mainas,et al. The Analysis of Criminal and Terrorist Organisations as Social Network Structures: A Quasi-Experimental Study , 2012 .
[72] Carlo Morselli,et al. Hells Angels in springtime , 2009 .
[73] Carlo Morselli,et al. BROKERAGE QUALIFICATIONS IN RINGING OPERATIONS , 2008 .
[74] Aili Malm,et al. Social Network and Distance Correlates of Criminal Associates Involved in Illicit Drug Production , 2008 .
[75] Carlo Morselli,et al. The Efficiency/Security Trade-Off in Criminal Networks , 2007, Soc. Networks.
[76] Carlo Morselli,et al. Law-Enforcement Disruption of a Drug Importation Network , 2007 .
[77] Carlo Morselli,et al. “Legitimate Strengths in Criminal Networks” , 2006 .
[78] Martin G. Everett,et al. A Graph-theoretic perspective on centrality , 2006, Soc. Networks.
[79] M. Natarajan. Understanding the Structure of a Large Heroin Distribution Network: A Quantitative Analysis of Qualitative Data , 2006 .
[80] John Jay,et al. UNDERSTANDING THE STRUCTURE OF A DRUG TRAFFICKING ORGANIZATION : A CONVERSATIONAL ANALYSIS by Mangai Natarajan , 2006 .
[81] C. Morselli. The relational dynamics of illegal firearm transactions , 2002 .
[82] Malcolm K. Sparrow,et al. The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .
[83] H. Becker,et al. Outsiders: Studies in the Sociology of Deviance. , 1964 .