Assessing the missing data problem in criminal network analysis using forensic DNA data

Abstract Missing data is pertinent to criminal networks due to the hidden nature of crime. Generally, researchers evaluate the impact of incomplete network data by extracting or adding nodes and/or edges from a known network. Statistics on this reduced or completed network are then compared with statistics from the known network. In this study, we integrate police data on known offenders with DNA data on unknown offenders. Statistics from the integrated dataset (‘known network’) are compared with statistics from the police data (‘reduced network’). Networks with both known and unknown offenders are bigger but also have a different structure to networks with only known offenders.

[1]  Wim Bernasco,et al.  Are mobile offenders less likely to be caught? The influence of the geographical dispersion of serial offenders’ crime locations on their probability of arrest , 2013 .

[2]  Henk Elffers,et al.  How long do offenders escape arrest? Using DNA traces to analyse when serial offenders are caught , 2012 .

[3]  Mark Warr ORGANIZATION AND INSTIGATION IN DELINQUENT GROUPS , 1996 .

[4]  Joseph Galaskiewicz,et al.  Estimating point centrality using different network sampling techniques , 1991 .

[5]  Jure Leskovec,et al.  Measurement error in network data: A re-classification , 2012, Soc. Networks.

[6]  Malcolm K. Sparrow,et al.  The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .

[7]  Federico Varese,et al.  Listening to the wire: criteria and techniques for the quantitative analysis of phone intercepts , 2011, Trends in Organized Crime.

[8]  R. Ruback,et al.  The Relationship Between Co-Offending, Age, and Experience Using a Sample of Adult Burglary Offenders , 2017 .

[9]  James Moody,et al.  Structural effects of network sampling coverage I: Nodes missing at random , 2013, Soc. Networks.

[10]  C. Haythornthwaite Social network analysis: An approach and technique for the study of information exchange☆ , 1996 .

[11]  Gisela Bichler,et al.  Networks of Collaborating Criminals: Assessing the Structural Vulnerability of Drug Markets , 2011 .

[12]  L. Freeman Centrality in social networks conceptual clarification , 1978 .

[13]  Carlo Morselli,et al.  The Efficiency/Security Trade-Off in Criminal Networks , 2007, Soc. Networks.

[14]  Andrew V Papachristos,et al.  Network exposure and homicide victimization in an African American community. , 2014, American journal of public health.

[15]  Terrill L. Frantz,et al.  Robustness of centrality measures under uncertainty: Examining the role of network topology , 2009, Comput. Math. Organ. Theory.

[16]  Mark Warr Companions in Crime: The Social Aspects of Criminal Conduct , 2002 .

[17]  Thomas W. Valente,et al.  The stability of centrality measures when networks are sampled , 2003, Soc. Networks.

[18]  James Moody,et al.  Network sampling coverage II: The effect of non-random missing data on network measurement , 2017, Soc. Networks.

[19]  Nigel Coles,et al.  It's Not What You Know-It's Who You Know that Counts. Analysing Serious Crime Groups as Social Networks , 2001 .

[20]  D. Farrington,et al.  Advancing Knowledge About Co-Offending: Results from a Prospective Longitudinal Survey of London Males , 1991 .

[21]  John Scott What is social network analysis , 2010 .

[22]  Patrick Doreian,et al.  Defining and locating cores and boundaries of social networks , 1994 .

[23]  G. Berlusconi Do all the pieces matter? Assessing the reliability of law enforcement data sources for the network analysis of wire taps , 2013 .

[24]  Gábor Csárdi,et al.  The igraph software package for complex network research , 2006 .

[25]  Richard Frank,et al.  Exploring the structural characteristics of social networks in a large criminal court database , 2013, 2013 IEEE International Conference on Intelligence and Security Informatics.

[26]  Gueorgi Kossinets Effects of missing data in social networks , 2006, Soc. Networks.

[27]  P. Duijn,et al.  The Relative Ineffectiveness of Criminal Network Disruption , 2014, Scientific Reports.

[28]  Akhilesh Chandra,et al.  Challenges and constraints to the diffusion of biometrics in information systems , 2005, CACM.

[29]  A. Reiss, Co-Offending and Criminal Careers , 1988, Crime and Justice.

[30]  P.A.C. Duijn,et al.  Detecting and disrupting criminal networks , 2016 .

[31]  Kathleen M. Carley,et al.  On the robustness of centrality measures under conditions of imperfect data , 2006, Soc. Networks.

[32]  Frank Weerman,et al.  Criminele groepen en Samenwerkingsverbanden , 2002 .

[33]  C. Prell Social Network Analysis: History, Theory and Methodology , 2011 .

[34]  Carlo Morselli,et al.  The contribution of forensic science to the analysis of crime networks , 2017 .

[35]  Jean Marie McGloin,et al.  POLICY AND INTERVENTION CONSIDERATIONS OF A NETWORK ANALYSIS OF STREET GANGS , 2005 .

[36]  C. Whelan,et al.  Social network analysis and small group ‘dark’ networks: an analysis of the London bombers and the problem of ‘fuzzy’ boundaries , 2015 .

[37]  David Bright,et al.  Illuminating dark networks: a social network analysis of an Australian drug trafficking syndicate , 2012 .

[38]  Mark Huisman,et al.  Imputation of Missing Network Data , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..

[39]  Marcus Felson,et al.  The Impact of Co-Offending , 2010 .

[40]  Hsinchun Chen,et al.  Criminal network analysis and visualization , 2005, CACM.

[41]  Hsinchun Chen,et al.  The topology of dark networks , 2008, Commun. ACM.

[42]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994 .