2008
DOI: 10.1057/palgrave.sj.8350069
|View full text |Cite
|
Sign up to set email alerts
|

Social Network and Distance Correlates of Criminal Associates Involved in Illicit Drug Production

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0
1

Year Published

2011
2011
2020
2020

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 42 publications
(15 citation statements)
references
References 29 publications
0
14
0
1
Order By: Relevance
“…Eight of the studies assessed the network position of group leaders (studies: Calderoni 2014; Duijn et al 2014;Hofmann and Gallupe 2015;Malm et al 2008;Morselli 2009Morselli , 2010Xu and Chen 2008). 12 The 11 One study explored internal co-offending (study 16), finding that members of an ethnically diverse, but racially homogeneous street gang were more likely to co-offend with other gang members from the same ethnic group, suggesting the existence of distinct internal co-offending structures.…”
Section: Criminal Network Structurementioning
confidence: 99%
“…Eight of the studies assessed the network position of group leaders (studies: Calderoni 2014; Duijn et al 2014;Hofmann and Gallupe 2015;Malm et al 2008;Morselli 2009Morselli , 2010Xu and Chen 2008). 12 The 11 One study explored internal co-offending (study 16), finding that members of an ethnically diverse, but racially homogeneous street gang were more likely to co-offend with other gang members from the same ethnic group, suggesting the existence of distinct internal co-offending structures.…”
Section: Criminal Network Structurementioning
confidence: 99%
“…Social network analysis has long been presented as a surveillance and intelligence gathering technique (Sparrow 1991;Klerks 1999). However, after 9/11 (Krebs 2002) it has been used to map security problems or 'dark networks' (Milward and Raab 2006;Raab and Milward 2003), including criminal enterprises (e.g., Malm and Bichler 2011;Malm, Kinney and Pollard 2008;Morselli 2010;Morselli and Giguere 2006), terror cells (Krebs 2002;Koschade 2006) and even corrupt police (Lauchs et al 2011). Dupont (2006) is one of the few to use social network analysis in an attempt to map security networks.…”
Section: Defining 'Network' and 'Security Network'mentioning
confidence: 99%
“…Thus, for the police to have a record of a crime taking place, a proactive investigation action must be employed. Furthermore, due to the secondary nature of the evidence, it was not possible to control for data error and missing data (e.g., due to the impossibility of manually surveying the whole population of offenders; Malm, Kinney & Pollard, 2008).…”
Section: Limitationsmentioning
confidence: 99%