Key aspects of covert networks data collection: Problems, challenges, and opportunities

Social Networks - Tập 69 - Trang 160-169 - 2022
Tomáš Diviák1,2
1Department of Sociology, University of Groningen, and Interuniversity Center for Social Science Theory and Methodology, The Netherlands
2Department of Sociology, Faculty of Arts, Charles University in Prague, Czech Republic

Tài liệu tham khảo

Beach, 2013 Bellotti, 2014 Berlusconi, 2016, Link prediction in criminal networks: a tool for criminal intelligence analysis. Daniele Marinazzo, ed, PLoS One, 11, e0154244, 10.1371/journal.pone.0154244 Bichler, 2017, Drug supply networks: a systematic review of the organizational structure of illicit drug trade, Crime Sci., 6, 10.1186/s40163-017-0063-3 Block, 2018, Change we can believe in: comparing longitudinal network models on consistency, interpretability and predictive power, Soc. Netw., 52, 180, 10.1016/j.socnet.2017.08.001 Borgatti, 2006, On the robustness of centrality measures under conditions of imperfect data, Soc. Netw., 28, 124, 10.1016/j.socnet.2005.05.001 Borgatti, 1997, Network analysis of 2-Mode data, Soc. Netw., 19, 243, 10.1016/S0378-8733(96)00301-2 Bright, 2015, Networks within networks: using multiple link types to examine network structure and identify key actors in a drug trafficking operation, Glob. Crime, 16, 219, 10.1080/17440572.2015.1039164 Bright, 2015, Disrupting and dismantling dark networks, 39 Bright, 2012, Illuminating dark networks: a social network analysis of an australian drug trafficking syndicate, Crime Law Soc. Change, 57, 151, 10.1007/s10611-011-9336-z Bright, 2018, Illicit network dynamics: the formation and evolution of a drug trafficking network, J. Quant. Criminol. Calderoni, 2017, Communities in criminal networks: a case study, Soc. Netw., 48, 116, 10.1016/j.socnet.2016.08.003 Campana, 2016, Explaining criminal networks: strategies and potential pitfalls, Methodol. Innov., 9 Campana, 2012, Listening to the wire: criteria and techniques for the quantitative analysis of phone intercepts, Trends Organ. Crime, 15, 13, 10.1007/s12117-011-9131-3 Carrington, 2011, 236 Covert Networks-UCINET Software N.d. https://sites.google.com/site/ucinetsoftware/datasets/covert-networks, (Accessed 17 February 2019). Crossley, 2016, Cases, mechanisms and the real: the theory and methodology of mixed-method social network analysis, Sociol. Res. Online, 21, 1, 10.5153/sro.3920 Crossley, 2012, Covert social movement networks and the secrecy-efficiency trade off: the case of the UK suffragettes (1906–1914), Soc. Netw., 34, 634, 10.1016/j.socnet.2012.07.004 Cumming, 2012 Demiroz, 2012, Anatomy of a dark network: the case of the Turkish ergenekon terrorist organization, Trends Organ. Crime, 15, 271, 10.1007/s12117-012-9151-7 Diviák, 2018 Diviák, 2018, Structure, multiplexity, and centrality in a corruption network: the Czech Rath Affair, Trends Organ. Crime, 1 Diviák, 2019, Poisonous connections: A case study on a Czech counterfeit alcohol distribution network, Glob. Crime, 1 Domínguez, 2014 Duijn, 2014 Everett, 2013, 204 Faust, 2019, Social networks and crime: pitfalls and promises for advancing the field, Annu. Rev. Criminol., 2, 99, 10.1146/annurev-criminol-011518-024701 Felson, 2006, The ecosystem for organized crime, HEUNI 25th Anniversary Lecture Felson, 2009, The natural history of extended co-offending, Trends Organ. Crime, 12, 159, 10.1007/s12117-008-9056-7 Fischer, 2014, Coalition structures and policy change in a consensus democracy: coalition structures and policy change, Policy Stud. J., 42, 344, 10.1111/psj.12064 Frank, 2009, Network sampling and model fitting. in models and methods in social network analysis. Reprinted, 31 Gerdes, 2015 Gerdes, 2015, Dark dimensions: classifying relationships among clandestine actors, 19 Gutfraind, 2017 Heckathorn, 2017, Network sampling: from snowball and multiplicity to respondent-driven sampling, Annu. Rev. Sociol., 43, 101, 10.1146/annurev-soc-060116-053556 Hollstein, 2014, Mixed methods for social networks research: an introduction, 3 Horgan, 2008, From profiles to pathways and roots to routes: perspectives from psychology on radicalization into terrorism, Ann. Am. Acad. Pol. Soc. Sci., 618, 80, 10.1177/0002716208317539 Huisman, 2008, Treatment of non-response in longitudinal network studies, Soc. Netw., 30, 297, 10.1016/j.socnet.2008.04.004 van der Hulst, 2011, 256 Krause, 2018, Missing network data a comparison of different imputation methods, 159 Krebs, 2002, Uncloaking terrorist networks, First Monday, 7, 10.5210/fm.v7i4.941 Laumann, 1983, The boundary specification problem in network analysis, Appl. Netw. Anal.: A Methodol. Introd., 61, 18 2016 Lubbers, 2007, A comparison of various approaches to the exponential random graph model: a reanalysis of 102 student networks in school classes, Soc. Netw., 29, 489, 10.1016/j.socnet.2007.03.002 Mancuso, 2014, Not all madams have a central role: analysis of a nigerian sex trafficking network, Trends Organ. Crime, 17, 66, 10.1007/s12117-013-9199-z Morselli, 2009, vol. 8 Morselli, 2014 Morselli, 2008, Brokerage qualifications in ringing operations*, Criminology, 46, 71, 10.1111/j.1745-9125.2008.00103.x Morselli, 2006, “Legitimate strengths in criminal networks.” crime, Rev. Law Soc. Change, 45, 185, 10.1007/s10611-006-9034-4 Morselli, 2007, Law-enforcement disruption of a drug importation network, Glob. Crime, 8, 109, 10.1080/17440570701362208 van Nassau, 2019 Oliver, 2014 Ouellet, 2018, The 40 members of the Toronto 18: group boundaries and the analysis of illicit networks, Deviant Behav., 39, 1467, 10.1080/01639625.2018.1481678 Pattison, 2013, Conditional estimation of exponential random graph models from snowball sampling designs, J. Math. Psychol., 57, 284, 10.1016/j.jmp.2013.05.004 2009, Configurational comparative methods: qualitative comparative analysis (QCA) and related techniques Robins, 2009, Understanding individual behaviors within covert networks: the interplay of individual qualities, psychological predispositions, and network effects, Trends Organ. Crime, 12, 166, 10.1007/s12117-008-9059-4 Robins, 2013, A tutorial on methods for the modeling and analysis of social network data, J. Math. Psychol., 57, 261, 10.1016/j.jmp.2013.02.001 Robins, 2004, Missing data in networks: exponential random graph (P∗) models for networks with non-respondents, Soc. Netw., 26, 257, 10.1016/j.socnet.2004.05.001 Rostami, 2015, The complexity of crime network data: a case study of its consequences for crime control and the study of networks. Thomas Niederkrotenthaler, ed, PLoS One, 10, e0119309, 10.1371/journal.pone.0119309 Rubin, 1976, Inference and missing data, Biometrika, 63, 581, 10.1093/biomet/63.3.581 Sageman, 2004 Smith, 2016, Trust thy crooked neighbor multiplexity in Chicago organized crime networks, Am. Sociol. Rev., 81, 617, 10.1177/0003122416650149 Smith, 2013, Structural effects of network sampling coverage I: nodes missing at random, Soc. Netw., 35, 652, 10.1016/j.socnet.2013.09.003 Smith, 2017, Network sampling coverage II: the effect of non-random missing data on network measurement, Soc. Netw., 48, 78, 10.1016/j.socnet.2016.04.005 Snijders, 2010, Introduction to stochastic actor-based models for network dynamics, Soc. Netw., 32, 44, 10.1016/j.socnet.2009.02.004 Snijders, 2011, Statistical models for social networks, Annu. Rev. Sociol., 37, 131, 10.1146/annurev.soc.012809.102709 Sparrow, 1991, The application of network analysis to criminal intelligence: an assessment of the prospects, Soc. Netw., 13, 251, 10.1016/0378-8733(91)90008-H Steglich, 2010, Dynamic networks and behavior: separating selection from influence, Sociol. Methodol., 40, 329, 10.1111/j.1467-9531.2010.01225.x Volk, 2017, So you want to study bullying? Recommendations to enhance the validity, transparency, and compatibility of bullying research, Aggress. Violent Behav., 36, 34, 10.1016/j.avb.2017.07.003 Wang, 2013, Exponential random graph model specifications for bipartite networks—a dependence hierarchy, Soc. Netw., 35, 211, 10.1016/j.socnet.2011.12.004 Wikström, 2017, Analyzing radicalization and terrorism: a situational action theory, 175