2004
DOI: 10.1007/978-3-540-25952-7_27
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing and Visualizing Criminal Network Dynamics: A Case Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
30
0
1

Year Published

2006
2006
2017
2017

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 44 publications
(31 citation statements)
references
References 30 publications
0
30
0
1
Order By: Relevance
“…Lin et al's user-acceptance study based on the COPLINK system [8] highlights the importance of solutions that make a compelling case for acceptance, which is also one of the motivations of our work in this paper. Xu et al present a method to analyze and visualize criminal networks, focusing on dynamics [9]. Introducing the dynamic element into our model in this paper is an interesting avenue for further work.…”
Section: Related Workmentioning
confidence: 99%
“…Lin et al's user-acceptance study based on the COPLINK system [8] highlights the importance of solutions that make a compelling case for acceptance, which is also one of the motivations of our work in this paper. Xu et al present a method to analyze and visualize criminal networks, focusing on dynamics [9]. Introducing the dynamic element into our model in this paper is an interesting avenue for further work.…”
Section: Related Workmentioning
confidence: 99%
“…To overcome the lack of complete data, researchers have applied probabilistic modeling (Miffen, Boner, Godfrey, & Skokan 2004) and Markov processes (Kaplan, 2010), used overlapping network assumptions (Atkinson & Wein, 2010), and approached the problem from a network topology perspective (Xu & Chen, 2008) to model terrorist networks. They have successfully applied social network analysis (SNA) to covert networks such as corporate price fixing, organized crime, drug trafficking, and terrorist groups (e.g., Krebs, 2002;Sageman, 2004;Xu, Marshall, Kaza, & Chen, 2004;Rodriguez, 2005;Keefe, 2006;Natarajan, 2006;Reid, Chen, & Xu, 2007;Bright et al, 2012;Senekal, 2014). Critical to this success has been the more recent use of social media networks and the analysis of these networks and data using existing social network analysis techniques (Everton, 2012a;Schroeder, Everton, & Shepherd, 2012;Freeman & Schroeder, 2014) and new techniques such as real-time Twitter data analysis and visualization (Cheong & Lee, 2011;Dudas, 2013).…”
Section: Social Mediamentioning
confidence: 99%
“…SNA has been applied to a number of different criminal contexts, including illegal price fixing within corporations, organised crime gangs, terrorist groups, and drug trafficking syndicates [3,5,6,[14][15][16][17][18].…”
Section: Sna Applied To Dark Networkmentioning
confidence: 99%
“…Arguably the primary challenge facing researchers who want to conduct SNA on criminal organisations is securing access to appropriate data [3,4]. Previous analyses have been based on data extracted from offender databases, transcripts of physical or electronic surveillance, written summaries of police interrogations, transcripts of court proceedings, and media reports (e.g., [5][6][7]). Previous research suggests that transcripts of electronic surveillance (e.g., wire taps) are the best source of data for SNA as they provide critical information about the existence of relationships (e.g., [6,8]).…”
Section: Introductionmentioning
confidence: 99%