Sinister connections: How to analyse organised crime with social network analysis?
Networks have recently become ubiquitous in many scientific fields. In criminology, social network analysis (SNA) provides a potent tool for analysis of organized crime. This paper introduces basic network terms and measures as well as advanced models and reviews their application in criminological...
Saved in:
| Published in | Acta Universitatis Carolinae. Philosophica et historica Vol. 2018; no. 2; pp. 115 - 135 |
|---|---|
| Main Author | |
| Format | Journal Article |
| Language | Czech English |
| Published |
Karolinum Press
18.04.2018
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 0567-8293 2464-7055 2464-7055 |
| DOI | 10.14712/24647055.2018.7 |
Cover
| Abstract | Networks have recently become ubiquitous in many scientific fields. In criminology, social network analysis (SNA) provides a potent tool for analysis of organized crime. This paper introduces basic network terms and measures as well as advanced models and reviews their application in criminological research. The centrality measures – degree and betweenness – are introduced as means to describe relative importance of actors in the network. The centrality measures are useful also in determining strategically positioned actors within the network or providing efficient targets for disruption of criminal networks. The cohesion measures, namely density, centralization, and average geodesic distance are described and their relevance is related to the idea of efficiency-security trade-off. As the last of the basic measures, the attention is paid to subgroup identification algorithms such as cliques, k-plexes, and factions. Subgroups are essential in the discussion on the cell-structure in criminal networks. The following part of the paper is a brief overview of more sophisticated network models. Models allow for theory testing, distinguishing systematic processes from randomness, and simplification of complex network structures. Quadratic assignment procedure, blockmodels, exponential random graph models, and stochastic actor-oriented models are covered. Some important research examples include similarities in co-offending, core-periphery structures, closure and brokerage, and network evolution. Subsequently, the paper reflects the three biggest challenges for application of SNA to criminal settings – data availability, proper formulation of theories and adequate methods application. In conclusion, readers are referred to books and journals combining SNA and criminology as well as to software suitable to carry out SNA. |
|---|---|
| AbstractList | Networks have recently become ubiquitous in many scientific fields. In criminology, social network analysis (SNA) provides a potent tool for analysis of organized crime. This paper introduces basic network terms and measures as well as advanced models and reviews their application in criminological research. The centrality measures – degree and betweenness – are introduced as means to describe relative importance of actors in the network. The centrality measures are useful also in determining strategically positioned actors within the network or providing efficient targets for disruption of criminal networks. The cohesion measures, namely density, centralization, and average geodesic distance are described and their relevance is related to the idea of efficiency-security trade-off. As the last of the basic measures, the attention is paid to subgroup identification algorithms such as cliques, k-plexes, and factions. Subgroups are essential in the discussion on the cell-structure in criminal networks. The following part of the paper is a brief overview of more sophisticated network models. Models allow for theory testing, distinguishing systematic processes from randomness, and simplification of complex network structures. Quadratic assignment procedure, blockmodels, exponential random graph models, and stochastic actor-oriented models are covered. Some important research examples include similarities in co-offending, core-periphery structures, closure and brokerage, and network evolution. Subsequently, the paper reflects the three biggest challenges for application of SNA to criminal settings – data availability, proper formulation of theories and adequate methods application. In conclusion, readers are referred to books and journals combining SNA and criminology as well as to software suitable to carry out SNA. |
| Author | Diviák, Tomáš |
| Author_xml | – sequence: 1 givenname: Tomáš surname: Diviák fullname: Diviák, Tomáš |
| BookMark | eNqNkEtLAzEUhYMoWGv3LvMHWvOYycONSFFbKAg-1uE2k9HUMSnJyNB_7_ShC0Hwbi4cznc4nDN0HGJwCF1QMqGFpOySFaKQpCwnjFA1kUdosFXGW-kYDUgp5FgxzU_RKOcV6Y9roRQZoMcnH3xuXcI2huBs62PIV3gWO9xGDAGaTXY4plfoba7CNvkPhzvfvuEcrYcGB9d2Mb0fvD5fn6OTGprsRoc_RC93t8_T2XjxcD-f3izGluq-j6BKCQ6MEVFXpZaVVYUApWpHrFCCUNDSMqCqtgUVtdZOQt_ZqZJxUAL4EM33uVWElVn3xSBtTARvdkLf2UBqvW2ccdKxklO-LBwpipprqNWy0iUsGZR8Sfssus_6DGvYdNA0P4GUmN3G5ntjs93YyJ4he8ammHNy9X8Q8QuxvoXt5m0C3_wNfgE8UY_n |
| CitedBy_id | crossref_primary_10_2478_amns_2024_3003 crossref_primary_10_1108_JACPR_11_2020_0558 |
| Cites_doi | 10.1177/2059799115622748 10.1080/10967490600899747 10.1080/14742837.2013.832622 10.1093/acprof:oso/9780199206650.001.0001 10.4324/9780203837122 10.1016/j.socnet.2016.07.001 10.1080/17440572.2012.702523 10.1017/CBO9781316212639.004 10.1017/CBO9781139227193.003 10.1017/CBO9781139227193 10.1023/A:1008354713842 10.1016/0378-8733(78)90021-7 10.1017/CBO9781316212639 10.1016/j.socnet.2009.02.004 10.1016/j.socnet.2012.07.004 10.1080/17440572.2015.1008627 10.6000/1929-4409.2012.01.12 10.1007/s12117-009-9067-z 10.1177/1477370812447738 10.1007/s12117-008-9057-6 10.1145/1400181.1400198 10.1016/j.socnet.2004.11.008 10.1017/CBO9781139136877 10.5210/fm.v7i4.941 10.1177/1043986210377105 10.1038/srep04238 10.1177/0022002710393919 10.1177/1043463113481202 10.1080/10511251003693694 10.1016/j.socnet.2006.08.002 10.1016/0378-8733(91)90008-H 10.1515/9781626372573 10.4324/9781315885018 10.1016/j.socnet.2006.05.001 10.1016/S0378-8733(99)00019-2 10.1007/978-0-387-09526-4 10.1080/17440572.2013.790312 10.1017/CBO9780511488801 10.1007/s12117-008-9059-4 10.1007/s10611-012-9387-9 10.1007/s10611-011-9336-z 10.1177/0003122416650149 10.1017/CBO9780511815478 10.1080/17440572.2015.1039164 10.1016/j.physrep.2009.11.002 10.1111/soc4.12147 10.9783/9780812206791 10.1111/j.1745-9125.2008.00103.x 10.1016/j.socnet.2016.08.003 10.1017/CBO9780511584176 10.1080/0022250X.1971.9989788 |
| ContentType | Journal Article |
| DBID | AAYXX CITATION ADTOC UNPAY DOA |
| DOI | 10.14712/24647055.2018.7 |
| DatabaseName | CrossRef Unpaywall for CDI: Periodical Content Unpaywall DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Open Access Full Text url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| EISSN | 2464-7055 |
| EndPage | 135 |
| ExternalDocumentID | oai_doaj_org_article_e7e25313b4e044f39af8bd95ab2a53b1 10.14712/24647055.2018.7 10_14712_24647055_2018_7 |
| GroupedDBID | 42P AAFWJ AAYXX ADBBV AFPKN ALMA_UNASSIGNED_HOLDINGS BCNDV CITATION F5P GROUPED_DOAJ OK1 P2P REL ~45 ADTOC EOJEC IPNFZ OBODZ RIG UNPAY |
| ID | FETCH-LOGICAL-c1967-618863a2206fd597dc846a88fe0c68601a97c2a18fc416f99e7a688e8523a86a3 |
| IEDL.DBID | UNPAY |
| ISSN | 0567-8293 2464-7055 |
| IngestDate | Fri Oct 03 12:50:22 EDT 2025 Sun Oct 26 03:06:20 EDT 2025 Thu Apr 24 23:11:50 EDT 2025 Tue Jul 01 00:17:04 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 2 |
| Language | Czech English |
| License | cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c1967-618863a2206fd597dc846a88fe0c68601a97c2a18fc416f99e7a688e8523a86a3 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://karolinum.cz/data/clanek/5596/PheH_2018_2_0115.pdf |
| PageCount | 21 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_e7e25313b4e044f39af8bd95ab2a53b1 unpaywall_primary_10_14712_24647055_2018_7 crossref_primary_10_14712_24647055_2018_7 crossref_citationtrail_10_14712_24647055_2018_7 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2018-04-18 |
| PublicationDateYYYYMMDD | 2018-04-18 |
| PublicationDate_xml | – month: 04 year: 2018 text: 2018-04-18 day: 18 |
| PublicationDecade | 2010 |
| PublicationTitle | Acta Universitatis Carolinae. Philosophica et historica |
| PublicationYear | 2018 |
| Publisher | Karolinum Press |
| Publisher_xml | – name: Karolinum Press |
| References | ref13 ref57 ref12 ref56 ref15 ref59 ref14 ref58 ref53 ref52 ref11 ref55 ref10 ref54 ref17 ref16 ref19 ref18 ref51 ref50 ref46 ref45 ref48 ref47 ref42 ref41 ref44 ref43 ref49 ref8 ref7 ref9 ref4 ref3 ref6 ref5 ref40 ref35 ref34 ref37 ref36 ref31 ref30 ref33 ref32 ref2 ref1 ref39 ref38 ref71 ref70 ref72 ref24 ref68 ref23 ref67 ref26 ref25 ref69 ref20 ref64 ref63 ref22 ref66 ref21 ref65 ref28 ref27 ref29 ref60 ref62 ref61 |
| References_xml | – ident: ref62 – ident: ref17 doi: 10.1177/2059799115622748 – ident: ref46 doi: 10.1080/10967490600899747 – ident: ref65 doi: 10.1080/14742837.2013.832622 – ident: ref43 – ident: ref54 doi: 10.1093/acprof:oso/9780199206650.001.0001 – ident: ref4 doi: 10.4324/9780203837122 – ident: ref71 doi: 10.1016/j.socnet.2016.07.001 – ident: ref21 doi: 10.1080/17440572.2012.702523 – ident: ref12 doi: 10.1017/CBO9781316212639.004 – ident: ref39 doi: 10.1017/CBO9781139227193.003 – ident: ref9 – ident: ref53 – ident: ref34 – ident: ref24 doi: 10.1017/CBO9781139227193 – ident: ref13 – ident: ref36 – ident: ref2 – ident: ref23 – ident: ref45 doi: 10.1023/A:1008354713842 – ident: ref29 doi: 10.1016/0378-8733(78)90021-7 – ident: ref30 doi: 10.1017/CBO9781316212639 – ident: ref47 – ident: ref63 doi: 10.1016/j.socnet.2009.02.004 – ident: ref20 doi: 10.1016/j.socnet.2012.07.004 – ident: ref38 doi: 10.1080/17440572.2015.1008627 – ident: ref41 doi: 10.6000/1929-4409.2012.01.12 – ident: ref69 doi: 10.1007/s12117-009-9067-z – ident: ref33 – ident: ref31 doi: 10.1177/1477370812447738 – ident: ref66 doi: 10.1007/s12117-008-9057-6 – ident: ref72 doi: 10.1145/1400181.1400198 – ident: ref3 – ident: ref58 – ident: ref68 – ident: ref6 doi: 10.1016/j.socnet.2004.11.008 – ident: ref27 doi: 10.1017/CBO9781139136877 – ident: ref40 doi: 10.5210/fm.v7i4.941 – ident: ref48 doi: 10.1177/1043986210377105 – ident: ref22 – ident: ref26 doi: 10.1038/srep04238 – ident: ref37 doi: 10.1177/0022002710393919 – ident: ref16 doi: 10.1177/1043463113481202 – ident: ref44 doi: 10.1080/10511251003693694 – ident: ref59 doi: 10.1016/j.socnet.2006.08.002 – ident: ref64 doi: 10.1016/0378-8733(91)90008-H – ident: ref19 – ident: ref32 – ident: ref5 doi: 10.1515/9781626372573 – ident: ref50 doi: 10.4324/9781315885018 – ident: ref51 doi: 10.1016/j.socnet.2006.05.001 – ident: ref55 – ident: ref7 doi: 10.1016/S0378-8733(99)00019-2 – ident: ref49 doi: 10.1007/978-0-387-09526-4 – ident: ref1 doi: 10.1080/17440572.2013.790312 – ident: ref35 doi: 10.1017/CBO9780511488801 – ident: ref57 doi: 10.1007/s12117-008-9059-4 – ident: ref14 doi: 10.1007/s10611-012-9387-9 – ident: ref10 doi: 10.1007/s10611-011-9336-z – ident: ref61 doi: 10.1177/0003122416650149 – ident: ref70 doi: 10.1017/CBO9780511815478 – ident: ref67 – ident: ref11 doi: 10.1080/17440572.2015.1039164 – ident: ref28 doi: 10.1016/j.physrep.2009.11.002 – ident: ref56 doi: 10.1111/soc4.12147 – ident: ref60 doi: 10.9783/9780812206791 – ident: ref52 doi: 10.1111/j.1745-9125.2008.00103.x – ident: ref15 doi: 10.1016/j.socnet.2016.08.003 – ident: ref8 – ident: ref18 – ident: ref25 doi: 10.1017/CBO9780511584176 – ident: ref42 doi: 10.1080/0022250X.1971.9989788 |
| SSID | ssj0000396880 |
| Score | 2.0269651 |
| Snippet | Networks have recently become ubiquitous in many scientific fields. In criminology, social network analysis (SNA) provides a potent tool for analysis of... |
| SourceID | doaj unpaywall crossref |
| SourceType | Open Website Open Access Repository Enrichment Source Index Database |
| StartPage | 115 |
| SubjectTerms | covert networks criminal networks network models organized crime social network analysis |
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LSwMxEA7iRT2IomJ9kYMXhbW72TSbeBEVS_HgwQd4WybZBITSlm5F_PfOZLelXuzF65LNhG-SzEwy-Yaxc_CqZ1NtkkxCnshcmMRoLxPnTAqF88QyRdkWT2rwJh_fe-9Lpb4oJ6yhB26A6_rCC5wnuZU-lTLkBoK2lemBFdDLbQx8UNZSMBX34NwoHcumoYHHbRiNWntHiZux6AqpJNHIUGqXvip-2aRI3b_FNj5HE_j-guFwyd70d9h26yjy22aAu2zN1Xvs-SUy3fopd5SgEt8k1Nd8MP7iszGHSDDieVOpqfYVd0Tez-mslTeH43zUpH23bT_qm3321n94vR8kbVWExOFqoTd9WqschEhVqDAcqBy6EKB18KlTGuMrMIUTkOng0NkKxvgCEAuvMeQErSA_YOuj8cgfMi5cajUuUAghlVY4o2SW2Qq1FgL2mHVYd45L6VrKcKpcMSwpdCAkyzmSJSFZFh12sfhj0tBl_NH2jqBetCOi6_gBUSpb9Zer1N9hlwtFrZR49B8Sj9km9UY3Spk-Yeuz6ac_RcdkZs_iHPwBm8TaUw priority: 102 providerName: Directory of Open Access Journals |
| Title | Sinister connections: How to analyse organised crime with social network analysis? |
| URI | https://karolinum.cz/data/clanek/5596/PheH_2018_2_0115.pdf https://doaj.org/article/e7e25313b4e044f39af8bd95ab2a53b1 |
| UnpaywallVersion | publishedVersion |
| Volume | 2018 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Open Access Full Text customDbUrl: eissn: 2464-7055 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000396880 issn: 0567-8293 databaseCode: DOA dateStart: 20150101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Rb9MwELagewAeNhAgxmDyAy8gpUkcxznzgsbEVPEwTUClIR6is2ML1JJWa6sJfj13SVqxFxC8Rc4lcew7-87-_J0QLzCY0mVgk1xjkehC2cRC0In3NsPKB2aZYrTFuZlM9fvL8nJAVfJZmFmfrGbzfex_pgySTD2DPmcpeb4mvfgaJjVNWVCrmn2Z8bKJt8WeoXvZSOxNzy9OPvPQW5L1g-oYd5U2OmHKmGGPkgZjlXIhlzG0C8bVjTmpo-6_J-5s2iX-uMb5_Lf55uxAfNnWtIeZzMabteO63iRx_L9fuS_2BzdUnvR680DcCu1D8eFjx6MbrqRn-Et34mH1Wk4W13K9kNjRlwTZ54FahUZ6Tg0geSVX9kvvsu1B5YPst9WbR2J69u7T6SQZci4knmyRTwwCmAKVykxsKNhoPDkoCBBD5g1Q9Ia28gpziJ5cuWhtqNAABKCAFsFg8ViM2kUbngipfOaAzB9jzLRT3hqd564hnYiR3pgfinTb6rUfCMk5L8a85sCE-6ne9lPfUNWheLl7YtmTcfxB9i135E6OabS7AmqlerDKOlRB0SBUOB0yrWNhMYJrbIlOYVk4quKrnRr89YtP_0X4SNzlC96XyuGZGK2vNuE5uTdrd9wtCxwP2vwLIGryNQ |
| linkProvider | Unpaywall |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Rb9MwELagewAeGAgQg4H8wAtIaRLHcc68TAMxVTxME1BpiIfo7NgaakmrtdUEv353SVqxFxC8Rc4lcew7-87-_J0QrzCY0mVgk1xjkehC2cRC0In3NsPKB2aZYrTFqZlM9cfz8nxAVfJZmFmfrGbzY-x_pQySTD2DPmcpeb4mPbsIk5qmLKhVzb7MeNnE22LP0L1sJPamp2fHX3noLcn6QXWMu0obnTBlzLBHSYOxSrmQyxjaBePqxpzUUfffE3c27RJ_XuF8_tt8c7Ivvm1r2sNMZuPN2nFdb5I4_t-vPBD3BzdUHvd681DcCu0j8elzx6MbLqVn-Et34mH1Vk4WV3K9kNjRlwTZ54FahUZ6Tg0geSVX9kvvsu1B5YPs99XRYzE9-fDl_SQZci4knmyRTwwCmAKVykxsKNhoPDkoCBBD5g1Q9Ia28gpziJ5cuWhtqNAABKCAFsFg8USM2kUbngqpfOaAzB9jzLRT3hqd564hnYiR3pgfiHTb6rUfCMk5L8a85sCE-6ne9lPfUNWBeL17YtmTcfxB9h135E6OabS7AmqlerDKOlRB0SBUOB0yrWNhMYJrbIlOYVk4quKbnRr89YvP_kX4ubjLF7wvlcOhGK0vN-EFuTdr93LQ42t4nfFA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Sinister+connections%3A+How+to+analyse+organised+crime+with+social+network+analysis%3F&rft.jtitle=Acta+Universitatis+Carolinae.+Philosophica+et+historica&rft.au=Divi%C3%A1k%2C+Tom%C3%A1%C5%A1&rft.date=2018-04-18&rft.issn=0567-8293&rft.eissn=2464-7055&rft.volume=2018&rft.issue=2&rft.spage=115&rft.epage=135&rft_id=info:doi/10.14712%2F24647055.2018.7&rft.externalDBID=n%2Fa&rft.externalDocID=10_14712_24647055_2018_7 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0567-8293&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0567-8293&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0567-8293&client=summon |