2011
DOI: 10.1007/s10611-011-9336-z
|View full text |Cite
|
Sign up to set email alerts
|

Illuminating dark networks: a social network analysis of an Australian drug trafficking syndicate

Abstract: A small but growing number of analysts of criminal activity have used social network analysis (SNA) to characterise criminal organisations and produce valuable insights into the operation of illicit markets. The successful conduct of SNA requires data that informs about links or relationships between pairs of individuals within the group. To date analyses have been undertaken with data extracted from offender databases, transcripts of physical or electronic surveillance, written summaries of police interrogati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
90
0
3

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 121 publications
(93 citation statements)
references
References 21 publications
(56 reference statements)
0
90
0
3
Order By: Relevance
“…In addition, social network analysis researchers often have limited control over their access to data sources and the quality of these data sources. Bright et al (2012) argue that this inherent challenge, especially regarding research into covert networks, has a tendency to "foster opportunistic rather than theory driven research" (p. 153), a sentiment that Morselli (2009) also acknowledges. Theory does exist regarding the disruption of covert networks (McBride & Hewitt, 2013;Everton, 2012b;Roberts & Everton, 2011, 2016, but this case study concerns how covert networks (ISIS in particular) use social media and how one can use social media analyses to track and learn about them.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…In addition, social network analysis researchers often have limited control over their access to data sources and the quality of these data sources. Bright et al (2012) argue that this inherent challenge, especially regarding research into covert networks, has a tendency to "foster opportunistic rather than theory driven research" (p. 153), a sentiment that Morselli (2009) also acknowledges. Theory does exist regarding the disruption of covert networks (McBride & Hewitt, 2013;Everton, 2012b;Roberts & Everton, 2011, 2016, but this case study concerns how covert networks (ISIS in particular) use social media and how one can use social media analyses to track and learn about them.…”
Section: Discussionmentioning
confidence: 99%
“…Access to data (Sparrow, 1991;Krebs, 2002;Bright, Hughes, & Chalmers, 2012), especially data that clearly show relationships between members of the network, is more challenging with covert networks. Estimates of the size of these networks or the amount of data they produce do not exist (Roberts, 2011).…”
Section: Social Mediamentioning
confidence: 99%
See 2 more Smart Citations
“…Several notable studies have, for example, applied social network analysis to various forms of criminal networks (for example, Bright and Hughes 2012;Morselli 2009;Bichler and Malm 2015). 3 Dupont (2006a: 168) posits that 'security networks form around the authorisation and delivery of security, through a range of processes and services that extend from identification of needs and the resources available to respond to them, to the management of risks and the deployment of human technological assets'.…”
Section: Making Sense Of the Melangementioning
confidence: 99%