Crime and social network analysis

PJ Carrington - The SAGE handbook of social network analysis, 2011 - books.google.com
Applications of social network analysis in the study of crime fall mainly into three topic areas:
the influence of the personal network on ego's delinquency or crime, the influence of …

Social suppliers: exploring the cultural contours of the performance and image enhancing drug (PIED) market among bodybuilders in the Netherlands and Belgium

K Van de Ven, KJD Mulrooney - International Journal of Drug Policy, 2017 - Elsevier
Background This paper explores the understudied phenomenon of performance and image
enhancing drug (PIED) markets by examining the structure and formation of the market for …

[HTML][HTML] The territorial expansion of mafia-type organized crime. The case of the Italian mafia in Germany

R Sciarrone, L Storti - Crime, Law and Social Change, 2014 - Springer
The present paper deals with the territorial movements of the mafia groups. After postulating
that the concept of mafia refers to a form of organized crime with certain specific …

The effect of anti-money laundering policies: an empirical network analysis

P Gerbrands, B Unger, M Getzner, J Ferwerda - EPJ Data Science, 2022 - epjds.epj.org
Aim There is a growing literature analyzing money laundering and the policies to fight it, but
the overall effectiveness of anti-money laundering policies is still unclear. This paper …

Искусственный интеллект и математическая статистика в криминалистическом изучении преступлений

АА Бессонов - 2021 - elibrary.ru
Искусственный интеллект уже прочно вошел в нашу жизнь, но для многих его
использование по-прежнему кажется уделом избранных. Автор опровергает этот миф …

Techniques to Detect Crime Leaders within a Criminal Network: A Survey, Experimental, and Comparative Evaluations

K Taha, A Shoufan - arXiv preprint arXiv:2402.03355, 2024 - arxiv.org
This survey paper offers a thorough analysis of techniques and algorithms used in the
identification of crime leaders within criminal networks. For each technique, the paper …

Finding the key players in online child exploitation networks

BG Westlake, M Bouchard, R Frank - Policy & Internet, 2011 - Wiley Online Library
The growth of the Internet has been paralleled with a similar growth in online child
exploitation. Since completely shutting down child exploitation websites is difficult (or …

Strategies to disrupt online child pornography networks

K Joffres, M Bouchard, R Frank… - … and Security Informatics …, 2011 - ieeexplore.ieee.org
This paper seeks to determine which attack strategies (hub, bridge, or fragmentation) are
most effective at disrupting two online child pornography networks in terms of outcome …

Implementation of UN and EU recommendations on criminalization of organized crimes

A Vozniuk, O Dudorov, A Tytko… - Amazonia …, 2020 - amazoniainvestiga.info
Article presents comparative analysis of features and characteristics of organized criminal
associations recommended for further criminalization by provisions of Palermo Convention …

Partners in crime? Corruption as a criminal network

R Ferrali - Games and Economic Behavior, 2020 - Elsevier
How does the structure of an organization affect corruption? This paper analyzes a model
that views organizations as networks on which coalitions of corrupt accomplices may form …