Key aspects of covert networks data collection: Problems, challenges, and opportunities
Tài liệu tham khảo
Beach, 2013
Bellotti, 2014
Berlusconi, 2016, Link prediction in criminal networks: a tool for criminal intelligence analysis. Daniele Marinazzo, ed, PLoS One, 11, e0154244, 10.1371/journal.pone.0154244
Bichler, 2017, Drug supply networks: a systematic review of the organizational structure of illicit drug trade, Crime Sci., 6, 10.1186/s40163-017-0063-3
Block, 2018, Change we can believe in: comparing longitudinal network models on consistency, interpretability and predictive power, Soc. Netw., 52, 180, 10.1016/j.socnet.2017.08.001
Borgatti, 2006, On the robustness of centrality measures under conditions of imperfect data, Soc. Netw., 28, 124, 10.1016/j.socnet.2005.05.001
Borgatti, 1997, Network analysis of 2-Mode data, Soc. Netw., 19, 243, 10.1016/S0378-8733(96)00301-2
Bright, 2015, Networks within networks: using multiple link types to examine network structure and identify key actors in a drug trafficking operation, Glob. Crime, 16, 219, 10.1080/17440572.2015.1039164
Bright, 2015, Disrupting and dismantling dark networks, 39
Bright, 2012, Illuminating dark networks: a social network analysis of an australian drug trafficking syndicate, Crime Law Soc. Change, 57, 151, 10.1007/s10611-011-9336-z
Bright, 2018, Illicit network dynamics: the formation and evolution of a drug trafficking network, J. Quant. Criminol.
Calderoni, 2017, Communities in criminal networks: a case study, Soc. Netw., 48, 116, 10.1016/j.socnet.2016.08.003
Campana, 2016, Explaining criminal networks: strategies and potential pitfalls, Methodol. Innov., 9
Campana, 2012, Listening to the wire: criteria and techniques for the quantitative analysis of phone intercepts, Trends Organ. Crime, 15, 13, 10.1007/s12117-011-9131-3
Carrington, 2011, 236
Covert Networks-UCINET Software N.d. https://sites.google.com/site/ucinetsoftware/datasets/covert-networks, (Accessed 17 February 2019).
Crossley, 2016, Cases, mechanisms and the real: the theory and methodology of mixed-method social network analysis, Sociol. Res. Online, 21, 1, 10.5153/sro.3920
Crossley, 2012, Covert social movement networks and the secrecy-efficiency trade off: the case of the UK suffragettes (1906–1914), Soc. Netw., 34, 634, 10.1016/j.socnet.2012.07.004
Cumming, 2012
Demiroz, 2012, Anatomy of a dark network: the case of the Turkish ergenekon terrorist organization, Trends Organ. Crime, 15, 271, 10.1007/s12117-012-9151-7
Diviák, 2018
Diviák, 2018, Structure, multiplexity, and centrality in a corruption network: the Czech Rath Affair, Trends Organ. Crime, 1
Diviák, 2019, Poisonous connections: A case study on a Czech counterfeit alcohol distribution network, Glob. Crime, 1
Domínguez, 2014
Duijn, 2014
Everett, 2013, 204
Faust, 2019, Social networks and crime: pitfalls and promises for advancing the field, Annu. Rev. Criminol., 2, 99, 10.1146/annurev-criminol-011518-024701
Felson, 2006, The ecosystem for organized crime, HEUNI 25th Anniversary Lecture
Felson, 2009, The natural history of extended co-offending, Trends Organ. Crime, 12, 159, 10.1007/s12117-008-9056-7
Fischer, 2014, Coalition structures and policy change in a consensus democracy: coalition structures and policy change, Policy Stud. J., 42, 344, 10.1111/psj.12064
Frank, 2009, Network sampling and model fitting. in models and methods in social network analysis. Reprinted, 31
Gerdes, 2015
Gerdes, 2015, Dark dimensions: classifying relationships among clandestine actors, 19
Gutfraind, 2017
Heckathorn, 2017, Network sampling: from snowball and multiplicity to respondent-driven sampling, Annu. Rev. Sociol., 43, 101, 10.1146/annurev-soc-060116-053556
Hollstein, 2014, Mixed methods for social networks research: an introduction, 3
Horgan, 2008, From profiles to pathways and roots to routes: perspectives from psychology on radicalization into terrorism, Ann. Am. Acad. Pol. Soc. Sci., 618, 80, 10.1177/0002716208317539
Huisman, 2008, Treatment of non-response in longitudinal network studies, Soc. Netw., 30, 297, 10.1016/j.socnet.2008.04.004
van der Hulst, 2011, 256
Krause, 2018, Missing network data a comparison of different imputation methods, 159
Krebs, 2002, Uncloaking terrorist networks, First Monday, 7, 10.5210/fm.v7i4.941
Laumann, 1983, The boundary specification problem in network analysis, Appl. Netw. Anal.: A Methodol. Introd., 61, 18
2016
Lubbers, 2007, A comparison of various approaches to the exponential random graph model: a reanalysis of 102 student networks in school classes, Soc. Netw., 29, 489, 10.1016/j.socnet.2007.03.002
Mancuso, 2014, Not all madams have a central role: analysis of a nigerian sex trafficking network, Trends Organ. Crime, 17, 66, 10.1007/s12117-013-9199-z
Morselli, 2009, vol. 8
Morselli, 2014
Morselli, 2008, Brokerage qualifications in ringing operations*, Criminology, 46, 71, 10.1111/j.1745-9125.2008.00103.x
Morselli, 2006, “Legitimate strengths in criminal networks.” crime, Rev. Law Soc. Change, 45, 185, 10.1007/s10611-006-9034-4
Morselli, 2007, Law-enforcement disruption of a drug importation network, Glob. Crime, 8, 109, 10.1080/17440570701362208
van Nassau, 2019
Oliver, 2014
Ouellet, 2018, The 40 members of the Toronto 18: group boundaries and the analysis of illicit networks, Deviant Behav., 39, 1467, 10.1080/01639625.2018.1481678
Pattison, 2013, Conditional estimation of exponential random graph models from snowball sampling designs, J. Math. Psychol., 57, 284, 10.1016/j.jmp.2013.05.004
2009, Configurational comparative methods: qualitative comparative analysis (QCA) and related techniques
Robins, 2009, Understanding individual behaviors within covert networks: the interplay of individual qualities, psychological predispositions, and network effects, Trends Organ. Crime, 12, 166, 10.1007/s12117-008-9059-4
Robins, 2013, A tutorial on methods for the modeling and analysis of social network data, J. Math. Psychol., 57, 261, 10.1016/j.jmp.2013.02.001
Robins, 2004, Missing data in networks: exponential random graph (P∗) models for networks with non-respondents, Soc. Netw., 26, 257, 10.1016/j.socnet.2004.05.001
Rostami, 2015, The complexity of crime network data: a case study of its consequences for crime control and the study of networks. Thomas Niederkrotenthaler, ed, PLoS One, 10, e0119309, 10.1371/journal.pone.0119309
Rubin, 1976, Inference and missing data, Biometrika, 63, 581, 10.1093/biomet/63.3.581
Sageman, 2004
Smith, 2016, Trust thy crooked neighbor multiplexity in Chicago organized crime networks, Am. Sociol. Rev., 81, 617, 10.1177/0003122416650149
Smith, 2013, Structural effects of network sampling coverage I: nodes missing at random, Soc. Netw., 35, 652, 10.1016/j.socnet.2013.09.003
Smith, 2017, Network sampling coverage II: the effect of non-random missing data on network measurement, Soc. Netw., 48, 78, 10.1016/j.socnet.2016.04.005
Snijders, 2010, Introduction to stochastic actor-based models for network dynamics, Soc. Netw., 32, 44, 10.1016/j.socnet.2009.02.004
Snijders, 2011, Statistical models for social networks, Annu. Rev. Sociol., 37, 131, 10.1146/annurev.soc.012809.102709
Sparrow, 1991, The application of network analysis to criminal intelligence: an assessment of the prospects, Soc. Netw., 13, 251, 10.1016/0378-8733(91)90008-H
Steglich, 2010, Dynamic networks and behavior: separating selection from influence, Sociol. Methodol., 40, 329, 10.1111/j.1467-9531.2010.01225.x
Volk, 2017, So you want to study bullying? Recommendations to enhance the validity, transparency, and compatibility of bullying research, Aggress. Violent Behav., 36, 34, 10.1016/j.avb.2017.07.003
Wang, 2013, Exponential random graph model specifications for bipartite networks—a dependence hierarchy, Soc. Netw., 35, 211, 10.1016/j.socnet.2011.12.004
Wikström, 2017, Analyzing radicalization and terrorism: a situational action theory, 175