Sinister connections: How to analyse organised crime with social network analysis?

Networks have recently become ubiquitous in many scientific fields. In criminology, social network analysis (SNA) provides a potent tool for analysis of organized crime. This paper introduces basic network terms and measures as well as advanced models and reviews their application in criminological...

Full description

Saved in:
Bibliographic Details
Published inActa Universitatis Carolinae. Philosophica et historica Vol. 2018; no. 2; pp. 115 - 135
Main Author Diviák, Tomáš
Format Journal Article
LanguageCzech
English
Published Karolinum Press 18.04.2018
Subjects
Online AccessGet full text
ISSN0567-8293
2464-7055
2464-7055
DOI10.14712/24647055.2018.7

Cover

Abstract Networks have recently become ubiquitous in many scientific fields. In criminology, social network analysis (SNA) provides a potent tool for analysis of organized crime. This paper introduces basic network terms and measures as well as advanced models and reviews their application in criminological research. The centrality measures – degree and betweenness – are introduced as means to describe relative importance of actors in the network. The centrality measures are useful also in determining strategically positioned actors within the network or providing efficient targets for disruption of criminal networks. The cohesion measures, namely density, centralization, and average geodesic distance are described and their relevance is related to the idea of efficiency-security trade-off. As the last of the basic measures, the attention is paid to subgroup identification algorithms such as cliques, k-plexes, and factions. Subgroups are essential in the discussion on the cell-structure in criminal networks. The following part of the paper is a brief overview of more sophisticated network models. Models allow for theory testing, distinguishing systematic processes from randomness, and simplification of complex network structures. Quadratic assignment procedure, blockmodels, exponential random graph models, and stochastic actor-oriented models are covered. Some important research examples include similarities in co-offending, core-periphery structures, closure and brokerage, and network evolution. Subsequently, the paper reflects the three biggest challenges for application of SNA to criminal settings – data availability, proper formulation of theories and adequate methods application. In conclusion, readers are referred to books and journals combining SNA and criminology as well as to software suitable to carry out SNA.
AbstractList Networks have recently become ubiquitous in many scientific fields. In criminology, social network analysis (SNA) provides a potent tool for analysis of organized crime. This paper introduces basic network terms and measures as well as advanced models and reviews their application in criminological research. The centrality measures – degree and betweenness – are introduced as means to describe relative importance of actors in the network. The centrality measures are useful also in determining strategically positioned actors within the network or providing efficient targets for disruption of criminal networks. The cohesion measures, namely density, centralization, and average geodesic distance are described and their relevance is related to the idea of efficiency-security trade-off. As the last of the basic measures, the attention is paid to subgroup identification algorithms such as cliques, k-plexes, and factions. Subgroups are essential in the discussion on the cell-structure in criminal networks. The following part of the paper is a brief overview of more sophisticated network models. Models allow for theory testing, distinguishing systematic processes from randomness, and simplification of complex network structures. Quadratic assignment procedure, blockmodels, exponential random graph models, and stochastic actor-oriented models are covered. Some important research examples include similarities in co-offending, core-periphery structures, closure and brokerage, and network evolution. Subsequently, the paper reflects the three biggest challenges for application of SNA to criminal settings – data availability, proper formulation of theories and adequate methods application. In conclusion, readers are referred to books and journals combining SNA and criminology as well as to software suitable to carry out SNA.
Author Diviák, Tomáš
Author_xml – sequence: 1
  givenname: Tomáš
  surname: Diviák
  fullname: Diviák, Tomáš
BookMark eNqNkEtLAzEUhYMoWGv3LvMHWvOYycONSFFbKAg-1uE2k9HUMSnJyNB_7_ShC0Hwbi4cznc4nDN0HGJwCF1QMqGFpOySFaKQpCwnjFA1kUdosFXGW-kYDUgp5FgxzU_RKOcV6Y9roRQZoMcnH3xuXcI2huBs62PIV3gWO9xGDAGaTXY4plfoba7CNvkPhzvfvuEcrYcGB9d2Mb0fvD5fn6OTGprsRoc_RC93t8_T2XjxcD-f3izGluq-j6BKCQ6MEVFXpZaVVYUApWpHrFCCUNDSMqCqtgUVtdZOQt_ZqZJxUAL4EM33uVWElVn3xSBtTARvdkLf2UBqvW2ccdKxklO-LBwpipprqNWy0iUsGZR8Sfssus_6DGvYdNA0P4GUmN3G5ntjs93YyJ4he8ammHNy9X8Q8QuxvoXt5m0C3_wNfgE8UY_n
CitedBy_id crossref_primary_10_2478_amns_2024_3003
crossref_primary_10_1108_JACPR_11_2020_0558
Cites_doi 10.1177/2059799115622748
10.1080/10967490600899747
10.1080/14742837.2013.832622
10.1093/acprof:oso/9780199206650.001.0001
10.4324/9780203837122
10.1016/j.socnet.2016.07.001
10.1080/17440572.2012.702523
10.1017/CBO9781316212639.004
10.1017/CBO9781139227193.003
10.1017/CBO9781139227193
10.1023/A:1008354713842
10.1016/0378-8733(78)90021-7
10.1017/CBO9781316212639
10.1016/j.socnet.2009.02.004
10.1016/j.socnet.2012.07.004
10.1080/17440572.2015.1008627
10.6000/1929-4409.2012.01.12
10.1007/s12117-009-9067-z
10.1177/1477370812447738
10.1007/s12117-008-9057-6
10.1145/1400181.1400198
10.1016/j.socnet.2004.11.008
10.1017/CBO9781139136877
10.5210/fm.v7i4.941
10.1177/1043986210377105
10.1038/srep04238
10.1177/0022002710393919
10.1177/1043463113481202
10.1080/10511251003693694
10.1016/j.socnet.2006.08.002
10.1016/0378-8733(91)90008-H
10.1515/9781626372573
10.4324/9781315885018
10.1016/j.socnet.2006.05.001
10.1016/S0378-8733(99)00019-2
10.1007/978-0-387-09526-4
10.1080/17440572.2013.790312
10.1017/CBO9780511488801
10.1007/s12117-008-9059-4
10.1007/s10611-012-9387-9
10.1007/s10611-011-9336-z
10.1177/0003122416650149
10.1017/CBO9780511815478
10.1080/17440572.2015.1039164
10.1016/j.physrep.2009.11.002
10.1111/soc4.12147
10.9783/9780812206791
10.1111/j.1745-9125.2008.00103.x
10.1016/j.socnet.2016.08.003
10.1017/CBO9780511584176
10.1080/0022250X.1971.9989788
ContentType Journal Article
DBID AAYXX
CITATION
ADTOC
UNPAY
DOA
DOI 10.14712/24647055.2018.7
DatabaseName CrossRef
Unpaywall for CDI: Periodical Content
Unpaywall
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
DatabaseTitleList
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Open Access Full Text
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
EISSN 2464-7055
EndPage 135
ExternalDocumentID oai_doaj_org_article_e7e25313b4e044f39af8bd95ab2a53b1
10.14712/24647055.2018.7
10_14712_24647055_2018_7
GroupedDBID 42P
AAFWJ
AAYXX
ADBBV
AFPKN
ALMA_UNASSIGNED_HOLDINGS
BCNDV
CITATION
F5P
GROUPED_DOAJ
OK1
P2P
REL
~45
ADTOC
EOJEC
IPNFZ
OBODZ
RIG
UNPAY
ID FETCH-LOGICAL-c1967-618863a2206fd597dc846a88fe0c68601a97c2a18fc416f99e7a688e8523a86a3
IEDL.DBID UNPAY
ISSN 0567-8293
2464-7055
IngestDate Fri Oct 03 12:50:22 EDT 2025
Sun Oct 26 03:06:20 EDT 2025
Thu Apr 24 23:11:50 EDT 2025
Tue Jul 01 00:17:04 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2
Language Czech
English
License cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c1967-618863a2206fd597dc846a88fe0c68601a97c2a18fc416f99e7a688e8523a86a3
OpenAccessLink https://proxy.k.utb.cz/login?url=https://karolinum.cz/data/clanek/5596/PheH_2018_2_0115.pdf
PageCount 21
ParticipantIDs doaj_primary_oai_doaj_org_article_e7e25313b4e044f39af8bd95ab2a53b1
unpaywall_primary_10_14712_24647055_2018_7
crossref_primary_10_14712_24647055_2018_7
crossref_citationtrail_10_14712_24647055_2018_7
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2018-04-18
PublicationDateYYYYMMDD 2018-04-18
PublicationDate_xml – month: 04
  year: 2018
  text: 2018-04-18
  day: 18
PublicationDecade 2010
PublicationTitle Acta Universitatis Carolinae. Philosophica et historica
PublicationYear 2018
Publisher Karolinum Press
Publisher_xml – name: Karolinum Press
References ref13
ref57
ref12
ref56
ref15
ref59
ref14
ref58
ref53
ref52
ref11
ref55
ref10
ref54
ref17
ref16
ref19
ref18
ref51
ref50
ref46
ref45
ref48
ref47
ref42
ref41
ref44
ref43
ref49
ref8
ref7
ref9
ref4
ref3
ref6
ref5
ref40
ref35
ref34
ref37
ref36
ref31
ref30
ref33
ref32
ref2
ref1
ref39
ref38
ref71
ref70
ref72
ref24
ref68
ref23
ref67
ref26
ref25
ref69
ref20
ref64
ref63
ref22
ref66
ref21
ref65
ref28
ref27
ref29
ref60
ref62
ref61
References_xml – ident: ref62
– ident: ref17
  doi: 10.1177/2059799115622748
– ident: ref46
  doi: 10.1080/10967490600899747
– ident: ref65
  doi: 10.1080/14742837.2013.832622
– ident: ref43
– ident: ref54
  doi: 10.1093/acprof:oso/9780199206650.001.0001
– ident: ref4
  doi: 10.4324/9780203837122
– ident: ref71
  doi: 10.1016/j.socnet.2016.07.001
– ident: ref21
  doi: 10.1080/17440572.2012.702523
– ident: ref12
  doi: 10.1017/CBO9781316212639.004
– ident: ref39
  doi: 10.1017/CBO9781139227193.003
– ident: ref9
– ident: ref53
– ident: ref34
– ident: ref24
  doi: 10.1017/CBO9781139227193
– ident: ref13
– ident: ref36
– ident: ref2
– ident: ref23
– ident: ref45
  doi: 10.1023/A:1008354713842
– ident: ref29
  doi: 10.1016/0378-8733(78)90021-7
– ident: ref30
  doi: 10.1017/CBO9781316212639
– ident: ref47
– ident: ref63
  doi: 10.1016/j.socnet.2009.02.004
– ident: ref20
  doi: 10.1016/j.socnet.2012.07.004
– ident: ref38
  doi: 10.1080/17440572.2015.1008627
– ident: ref41
  doi: 10.6000/1929-4409.2012.01.12
– ident: ref69
  doi: 10.1007/s12117-009-9067-z
– ident: ref33
– ident: ref31
  doi: 10.1177/1477370812447738
– ident: ref66
  doi: 10.1007/s12117-008-9057-6
– ident: ref72
  doi: 10.1145/1400181.1400198
– ident: ref3
– ident: ref58
– ident: ref68
– ident: ref6
  doi: 10.1016/j.socnet.2004.11.008
– ident: ref27
  doi: 10.1017/CBO9781139136877
– ident: ref40
  doi: 10.5210/fm.v7i4.941
– ident: ref48
  doi: 10.1177/1043986210377105
– ident: ref22
– ident: ref26
  doi: 10.1038/srep04238
– ident: ref37
  doi: 10.1177/0022002710393919
– ident: ref16
  doi: 10.1177/1043463113481202
– ident: ref44
  doi: 10.1080/10511251003693694
– ident: ref59
  doi: 10.1016/j.socnet.2006.08.002
– ident: ref64
  doi: 10.1016/0378-8733(91)90008-H
– ident: ref19
– ident: ref32
– ident: ref5
  doi: 10.1515/9781626372573
– ident: ref50
  doi: 10.4324/9781315885018
– ident: ref51
  doi: 10.1016/j.socnet.2006.05.001
– ident: ref55
– ident: ref7
  doi: 10.1016/S0378-8733(99)00019-2
– ident: ref49
  doi: 10.1007/978-0-387-09526-4
– ident: ref1
  doi: 10.1080/17440572.2013.790312
– ident: ref35
  doi: 10.1017/CBO9780511488801
– ident: ref57
  doi: 10.1007/s12117-008-9059-4
– ident: ref14
  doi: 10.1007/s10611-012-9387-9
– ident: ref10
  doi: 10.1007/s10611-011-9336-z
– ident: ref61
  doi: 10.1177/0003122416650149
– ident: ref70
  doi: 10.1017/CBO9780511815478
– ident: ref67
– ident: ref11
  doi: 10.1080/17440572.2015.1039164
– ident: ref28
  doi: 10.1016/j.physrep.2009.11.002
– ident: ref56
  doi: 10.1111/soc4.12147
– ident: ref60
  doi: 10.9783/9780812206791
– ident: ref52
  doi: 10.1111/j.1745-9125.2008.00103.x
– ident: ref15
  doi: 10.1016/j.socnet.2016.08.003
– ident: ref8
– ident: ref18
– ident: ref25
  doi: 10.1017/CBO9780511584176
– ident: ref42
  doi: 10.1080/0022250X.1971.9989788
SSID ssj0000396880
Score 2.0269651
Snippet Networks have recently become ubiquitous in many scientific fields. In criminology, social network analysis (SNA) provides a potent tool for analysis of...
SourceID doaj
unpaywall
crossref
SourceType Open Website
Open Access Repository
Enrichment Source
Index Database
StartPage 115
SubjectTerms covert networks
criminal networks
network models
organized crime
social network analysis
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LSwMxEA7iRT2IomJ9kYMXhbW72TSbeBEVS_HgwQd4WybZBITSlm5F_PfOZLelXuzF65LNhG-SzEwy-Yaxc_CqZ1NtkkxCnshcmMRoLxPnTAqF88QyRdkWT2rwJh_fe-9Lpb4oJ6yhB26A6_rCC5wnuZU-lTLkBoK2lemBFdDLbQx8UNZSMBX34NwoHcumoYHHbRiNWntHiZux6AqpJNHIUGqXvip-2aRI3b_FNj5HE_j-guFwyd70d9h26yjy22aAu2zN1Xvs-SUy3fopd5SgEt8k1Nd8MP7iszGHSDDieVOpqfYVd0Tez-mslTeH43zUpH23bT_qm3321n94vR8kbVWExOFqoTd9WqschEhVqDAcqBy6EKB18KlTGuMrMIUTkOng0NkKxvgCEAuvMeQErSA_YOuj8cgfMi5cajUuUAghlVY4o2SW2Qq1FgL2mHVYd45L6VrKcKpcMSwpdCAkyzmSJSFZFh12sfhj0tBl_NH2jqBetCOi6_gBUSpb9Zer1N9hlwtFrZR49B8Sj9km9UY3Spk-Yeuz6ac_RcdkZs_iHPwBm8TaUw
  priority: 102
  providerName: Directory of Open Access Journals
Title Sinister connections: How to analyse organised crime with social network analysis?
URI https://karolinum.cz/data/clanek/5596/PheH_2018_2_0115.pdf
https://doaj.org/article/e7e25313b4e044f39af8bd95ab2a53b1
UnpaywallVersion publishedVersion
Volume 2018
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Open Access Full Text
  customDbUrl:
  eissn: 2464-7055
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000396880
  issn: 0567-8293
  databaseCode: DOA
  dateStart: 20150101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Rb9MwELagewAeNhAgxmDyAy8gpUkcxznzgsbEVPEwTUClIR6is2ML1JJWa6sJfj13SVqxFxC8Rc4lcew7-87-_J0QLzCY0mVgk1xjkehC2cRC0In3NsPKB2aZYrTFuZlM9fvL8nJAVfJZmFmfrGbzfex_pgySTD2DPmcpeb4mvfgaJjVNWVCrmn2Z8bKJt8WeoXvZSOxNzy9OPvPQW5L1g-oYd5U2OmHKmGGPkgZjlXIhlzG0C8bVjTmpo-6_J-5s2iX-uMb5_Lf55uxAfNnWtIeZzMabteO63iRx_L9fuS_2BzdUnvR680DcCu1D8eFjx6MbrqRn-Et34mH1Wk4W13K9kNjRlwTZ54FahUZ6Tg0geSVX9kvvsu1B5YPst9WbR2J69u7T6SQZci4knmyRTwwCmAKVykxsKNhoPDkoCBBD5g1Q9Ia28gpziJ5cuWhtqNAABKCAFsFg8ViM2kUbngipfOaAzB9jzLRT3hqd564hnYiR3pgfinTb6rUfCMk5L8a85sCE-6ne9lPfUNWheLl7YtmTcfxB9i135E6OabS7AmqlerDKOlRB0SBUOB0yrWNhMYJrbIlOYVk4quKrnRr89YtP_0X4SNzlC96XyuGZGK2vNuE5uTdrd9wtCxwP2vwLIGryNQ
linkProvider Unpaywall
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Rb9MwELagewAeGAgQg4H8wAtIaRLHcc68TAMxVTxME1BpiIfo7NgaakmrtdUEv353SVqxFxC8Rc4lcew7-87-_J0QrzCY0mVgk1xjkehC2cRC0In3NsPKB2aZYrTFqZlM9cfz8nxAVfJZmFmfrGbzY-x_pQySTD2DPmcpeb4mPbsIk5qmLKhVzb7MeNnE22LP0L1sJPamp2fHX3noLcn6QXWMu0obnTBlzLBHSYOxSrmQyxjaBePqxpzUUfffE3c27RJ_XuF8_tt8c7Ivvm1r2sNMZuPN2nFdb5I4_t-vPBD3BzdUHvd681DcCu0j8elzx6MbLqVn-Et34mH1Vk4WV3K9kNjRlwTZ54FahUZ6Tg0geSVX9kvvsu1B5YPs99XRYzE9-fDl_SQZci4knmyRTwwCmAKVykxsKNhoPDkoCBBD5g1Q9Ia28gpziJ5cuWhtqNAABKCAFsFg8USM2kUbngqpfOaAzB9jzLRT3hqd564hnYiR3pgfiHTb6rUfCMk5L8a85sCE-6ne9lPfUNWBeL17YtmTcfxB9h135E6OabS7AmqlerDKOlRB0SBUOB0yrWNhMYJrbIlOYVk4quKbnRr89YvP_kX4ubjLF7wvlcOhGK0vN-EFuTdr93LQ42t4nfFA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Sinister+connections%3A+How+to+analyse+organised+crime+with+social+network+analysis%3F&rft.jtitle=Acta+Universitatis+Carolinae.+Philosophica+et+historica&rft.au=Divi%C3%A1k%2C+Tom%C3%A1%C5%A1&rft.date=2018-04-18&rft.issn=0567-8293&rft.eissn=2464-7055&rft.volume=2018&rft.issue=2&rft.spage=115&rft.epage=135&rft_id=info:doi/10.14712%2F24647055.2018.7&rft.externalDBID=n%2Fa&rft.externalDocID=10_14712_24647055_2018_7
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0567-8293&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0567-8293&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0567-8293&client=summon