首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
The emigration of scientists facilitates the formation of international networks. However, are ties in such networks maintained after the scientists return to their respective home countries? Using data from the Web of Science, this paper analyzes whether Japanese migrant scientists returning from the US maintain the collaborative research network ties that they formed during their stay in the US and, if so, what features of these ties contribute to maintaining these relationships. The geographical distance between the US and Japan can impede the transfer of knowledge that is transmitted most effectively through face-to-face interactions. However, social proximity may compensate for geographical distance. Accordingly, the ties that Japanese scientists have formed with other Japanese scientists living in the US are more likely to be maintained than the ties that they have formed with scientists of different ethnicities. Social proximity was also measured by past experiences in collaborative research. The ties to scientists with whom Japanese scientists collaborated more frequently or co-produced papers with higher citation counts are more likely to be maintained after the scientists return to Japan. When collaborative research of American and Japanese scientists is worthwhile, they obtain mutual benefits through a ‘give and take’ in which they compensate for one partner’s lack of knowledge by the other partner’s knowledge. In a research field with which the developmental gap between the US and Japan is great, ties are less likely to be maintained.  相似文献   

2.
Dominant theories of organised crime assume that criminal organisations which operate in extremely violent markets do so because they consider it financially cost-effective. This article contends that by using increasingly violent actions intended to deter competitors and government forces, criminal organisations sometimes eliminate their exit option, making the penalties for withdrawal to a less violent strategy significantly worse than those of continued violence. Based on a systematic examination of footage of public statements by 18 former associates of two Mexican organised crime groups (OCGs), La Familia Michoacana (LFM) and its offshoot Los Caballeros Templarios (LCT), this article argues that through gradual increases in their use of violence, these groups reached a ‘point of no return’. After reaching this point, desisting from further violence escalation became more hazardous than pursuing a violent path, even when the latter did not align with the organisations’ business interests.  相似文献   

3.
《Global Crime》2013,14(2):200-213
There have been several studies conducted about racist groups, gangs, cults, terrorist and other criminal organisations, but very little has been written about the psychology and recruitment process of the ‘narcotrafficker’. This is because like most criminal organisations, they tend to be secretive and difficult to penetrate by law enforcement, academics and others who wish to study them. Using an audio‐recorded content analysis of ‘narcocorridos’ — ballads glorifying the activities of the ‘narcos’ and describing their successes' — as well as Social Identity and Group theories, the author describes some of the techniques used to recruit individuals into drug cartels; the labels, stereotypes and images of the in-group versus the out-group and the similarities in the socialisation and recruitment process of other criminal organisations. This study shows the recruitment of individuals into drug cartels follow similar patterns to other criminal organisations including the need for power, belonging, respect, security and pride.  相似文献   

4.
5.
Two recent studies which are part of the Dutch Research Program on the Safety and Security of Online Banking, present empirical material regarding the origin, growth and criminal capabilities of cybercriminal networks carrying out attacks on customers of financial institutions. This article extrapolates upon the analysis of Dutch cases and complements the existing picture by providing insight into 22 cybercriminal networks active in Germany, the United Kingdom and the United States. The analysis regarding origin and growth shows that social ties play an important role in the majority of networks. These networks usually originate and grow either by means of social contacts alone or by the combined use of social contacts and forums (to recruit specialists). Equally, however, forums play a vital role within the majority of the networks by offering a place where co-offenders can meet, recruit and trade criminal ‘services’. Moreover, those networks where origin and growth is primarily based on forums appear capable of creating more flexible forms of cooperation between key members and enablers, thereby facilitating a limited number of core members to become international players. Analysis of the capabilities of criminal networks shows that all networks are primarily targeted towards customers of financial institutions, but most networks are not restricted to one type of crime. Core members are often involved in other forms of offline and online crime. The majority of networks fall into the high-tech category of networks, mostly international, high-tech networks. These are networks with core members, enablers, and victims originating from different countries.  相似文献   

6.
7.
《Global Crime》2013,14(3):160-175
Social researchers are facing more and more challenges as criminal networks are expanding in size and moving to the Internet. Many efforts are currently under way to enhance the technical capabilities of researchers working in the field of cybercrimes. Rather than focusing on the technical tools that could enhance research performance, this article focuses on a specific field that has demonstrated its use in the study of criminal networks: social network analysis (SNA). This article evaluates the effectiveness of SNA to enhance the value of information on cybercriminals. This includes both the identification of possible targets for follow-up research as well as the removal of subjects who may be wasting the researchers' time. This article shows that SNA can be useful on two levels. First, SNA provides scientific and objective measures of the structure of networks as well as the position of their key players. Second, fragmentation metrics, which measure the impact of the removal of n nodes in a network, help to determine the amount of resources needed to deal with specific organisations. In this case study, a tactical strike against the network could have had the same destabilising impact as a broader approach. The resources saved by limiting the investigation targets could then be used to monitor the criminal network's reaction to the arrests and to limit its ability to adapt to the post-arrest environment.  相似文献   

8.
Out of Africa: The human trade between Libya and Lampedusa   总被引:1,自引:0,他引:1  
Smuggling and trafficking in persons is ipso facto illegal. Is this criminal activity organised or diffuse? Recent objective indicators show that between 2000-2005 the reported incidence of people trafficking and smuggling from North Africa to Europe has escalated. The article examines the nature of criminality involved in people smuggling and trafficking with specific reference to the sea route between Libya and the Italian island of Lampedusa, 180 miles north of the Libyan coast. In 2006 almost 19,000 illegal migrants arrived on this small island. Recent major operations conducted by the Italian anti-mafia unit and the state police suggest transnational criminal organisation of the trade. The networks involved in this trade, however, do not conform to mafia-like hierarchical organisations but rather smaller, more complex and fluid criminal networks. The article aims to cast light on how people are smuggled and trafficked. The background to the rise in illegal immigration from Libya is sketched underlining the ‘push’ and ‘pull’ factors involved in the human trade. The article’s chief objective is to provide a greater understanding of the mechanisms and processes involved in smuggling/trafficking. A better knowledge of the processes involved is vital if domestic, regional and international authorities and bodies are to counter the practice and/or to formalise it.  相似文献   

9.
This article begins by providing a brief overview of environmental crime in the Asia and Pacific, highlighting its complexity, varying dimensions and transnational nature. It acknowledges the difficulties in responding to organised criminal groups that operate with flexible modus operandi to commit such crimes. The paper then discusses the importance of the National Environmental Security Taskforce approach, a model developed by INTERPOL to tackle environmental crimes. Collaboration and cooperation, within and between government and non-government organisations, are conceptualised as having a possibly positive ‘panopticon effect’ that has implications for responding to both organised criminal networks and state corruption in this domain.  相似文献   

10.
This article uses the example of the cryptocurrency Bitcoin and the General Data Protection Regulation (GDPR) to show how distributed networks challenge existing legal mechanisms of allocating responsibility. The Bitcoin network stores personal data by automated means. Furthermore, full nodes qualify as establishments and the network offers a service to citizens in the EU. The data processing within the Bitcoin network therefore falls into the material and territorial scope of the GDPR. To protect data subjects, the GDPR allocates responsibility to the controller, who determines the ‘how’ and the ‘why’ of the data processing. However, the distributed structure of the Bitcoin network blurs the lines between actors who are responsible and actors who are worth protecting. Neither the Bitcoin users running lightweight nodes or full nodes nor the miners determine the ‘how’ and the ‘why’ of the data processing. They carry out their network activities according to the Bitcoin protocol, which can only be adopted and enforced by a collective of full nodes and miners. Members of this collective are joint controllers under Article 26 GDPR, which obliges them to clearly and transparently determine their respective responsibilities for compliance with the GDPR. However, this mechanism fails because of the very structure it aims to eliminate. Therefore, a solution to allocating responsibility for data protection in distributed networks lies outside the GDPR.  相似文献   

11.
This article seeks to examine how public procurement policies for information and communication technology (ICT), aimed at improving the accessibility of ICT for persons with disabilities, have converged internationally. Convergence, in this instance, refers to the international harmonisation or acceptance of common standards and norms. Distinguishing itself from the predominant authorship in the area, this article seeks to explore convergence from a ‘bottom-up’ perspective, by examining the influence of networks of public and private actors on the design of public procurement standards for accessible ICT. Specifically, it will seek to answer how these actors and networks (varying in their level of coordination) have contributed to policy design in a unique area, public procurement of ICT goods and services. The influence of these networks will be discussed through the use of policy documents and semi-structured interviews, to provide empirical support for examining this ‘bottom-up’ analysis and distinguish it from the standard ‘top-down’ model usually employed in this field. This article also focuses on the role of policy actors in the United States and European Union that participated in the harmonisation of public procurement policy and the legal norms and instruments that give these policies their legal effect.  相似文献   

12.
Over the past two decades an increasing number of researchers have applied social network analysis (SNA) to various ‘dark’ networks. This research suggests that SNA is capable of revealing significant insights into the dynamics of dark networks, particularly the identification of critical nodes, which can then be targeted by law enforcement and security agencies for disruption. However, there has so far been very little research into whether and how law enforcement agencies can actually leverage SNA in an operational environment and in particular the challenges agencies face when attempting to apply various network analysis techniques to criminal networks. This paper goes some way towards addressing these issues by drawing on qualitative interviews with criminal intelligence analysts from two Australian state law enforcement agencies. The primary contribution of this paper is to call attention to the organisational characteristics of law enforcement agencies which, we argue, can influence the capacity of criminal intelligence analysts to successfully apply SNA as much as the often citied ‘characteristics of criminal networks’.  相似文献   

13.
《Global Crime》2013,14(3-4):315-338
ABSTRACT

While Mexico is widely considered as an example of consolidated statehood, the deepening of drug-related violence and insecurity has corroborated the existence and expansion of ‘dark spaces’ governed by coalitions of state and non-state actors driven by criminal and political interests. In contrast to the prevailing interpretations and public narratives, I will argue that it is historically and conceptually flawed to understand such expressions of limited statehood solely in terms of the proliferation of criminal organisations and the exacerbation of the so-called war on drugs only. Instead, I will examine the historical patterns in Mexican state-making, in which actors and practices of political ordering outside the state properly speaking exercise multiple forms of de facto sovereignty and governance. These arrangements, including caciquismo, accommodate distinct crime-governance manifestations. The article substantiates its claims by looking at the examples from different periods and regions such as Sinaloa, Sonora and Michoacán.  相似文献   

14.
It has been widely suggested that the global market in counterfeit, falsified and illegally traded medicines has expanded at a tremendous rate in recent years, offering lucrative opportunities for criminal entrepreneurs with little legal risk. However, with a few exceptions, there has been little criminological research conducted on the trade’s actors and organisation. Of the few studies that are available, most position the supply of these products in the context of ‘transnational organised crime’, often presupposing the overwhelming presence of large-scale, hierarchical structures in the trade. This article, based on two extensive research projects in the United Kingdom and the Netherlands, offers an account of the illicit supply of medicines in two European jurisdictions. The research outlines the nature and dynamics of the trade including the roles played by each national context as nodes in the global supply chain. The focus then shifts to the modus operandi, actors, online trade and social organisation in both countries. In contradistinction to the ‘transnational organised crime’ narrative, the empirical data outlined in this paper demonstrates that actors and networks involved in the trade are highly flexible and complex structures that straddle the categories of licit and illicit, online and offline, and global and local. This suggests that operations supplying illicit medicines vary largely in terms of size, reach, organisation and legality.  相似文献   

15.
Lawyers for conservative and libertarian causes are active in organizing and mobilizing interest groups within the conservative coalition, and networks of relationships among those lawyers help to maintain and shape the coalition. Using data gathered in interviews with seventy-two such lawyers, this article analyzes characteristics of the lawyers and the structure of their networks. The findings suggest that the networks are divided into segments or blocks that are identified with particular constituencies, but that a distinct set of actors with extensive relationships serves to bridge the constituencies. Measures of centrality and brokerage confirm the structural importance of these actors in the network, and a search of references in news media confirms their prominence or prestige. This "core" set of actors occupies the "structural hole" in the network that separates the business constituency from religious conservatives. Libertarians, located near the core of the network, also occupy an intermediate position. Regression analysis of ties within the network suggests that the Federalist Society plays an important role in bringing the lawyers together.  相似文献   

16.
The ‘reasonable doubt standard’ is the controlling standard of proof for criminal fact finding in several jurisdictions. Drawing on decision theory, some scholars have argued that the stringency of this standard varies according to the circumstances of the case. This article contends that the standard does not lend itself to the ‘sliding‐scale’ approach mandated by decision theory. This is supported through investigation of the concept of ‘reasonableness’. While this concept has mostly been studied as it operates with reference to practical reasoning, scant attention has been given to the meaning that it acquires when referred to theoretical reasoning. Unlike in the former case, reasonableness does not in the latter depend on the reasoner's attitudes in favour of the outcomes of a decisional process. Therefore, since criminal fact finding is an instance of theoretical reasoning, the question whether in this enterprise a doubt is reasonable is not susceptible to a decision‐theoretic approach.  相似文献   

17.
Family systems appear to be an important factor framing people's individual behavior. Thus far, family systems have been primarily addressed on a macro regional level with indirect measures. Revisiting Reher (1998) and the family ties criterion, the main question of this paper is to examine to what extent we perceive family structures differently in Europe by taking direct measures of the structures of people's broader social networks into consideration. Based on the Survey of Health, Ageing and Retirement in Europe (SHARE), we derived two indicators of family regimes based on individual-level data regarding the density of ego social networks: contact frequency and geographic proximity among network members. We aggregated these data and mapped them on the NUTS 2 level regions for various locations in Europe. The results of our analyses exhibit that, based on these two network indicators, significant differences in family structures between European regions exist. These results confirm the classification of strong family Southern and comparatively weaker family Northern European regions to a large extent, though substantial regional differences in and between countries are also revealed. Our findings demonstrate that the classification of European regions largely depends on which indicator of network density we consider. This is particularly obvious in the Eastern European regions where the classification markedly differs according to the type of network indicator. Intriguingly, social networks in Central European regions can be characterized as rather loose, often even looser than the ‘traditional’ weak ties in Scandinavia. Family regimes can, therefore, be regarded as a construct of multiple dimensions of which one dimension may be classified as weak while the other can be strong at the same time.  相似文献   

18.
Governments have long relied on non-state actors to assist in the implementation of public policy. Legitimate elements of civil society have become familiar instruments of governance. States have also engaged criminal actors to this end. This article will note examples of state collaboration with criminal interests, from pirates turned privateers during the 17th and 18th centuries, to the patriotic hackers of today. It will discuss the strategic considerations giving rise to such engagements, the pitfalls that may beset them, and the ethical considerations that might inform the decision by a state to enlist the services of illicit organisations.  相似文献   

19.
《Global Crime》2013,14(2-3):216-237
The current study revisits the notorious Bay Area Laboratory Cooperative (BALCO) scandal involving the production and distribution of an undetectable anabolic-androgenic steroid to professional athletes from late 1990s until 2003. Multiple sources are reviewed to re-create the social structure of BALCO and examine whether it formed a close-knit community or instead multiple communities defined around a specific sport or discipline. Results from a community fragmentation analysis suggest that six communities could be identified as distinct in the BALCO network of 97 individuals – three structured around athletic interests (baseball, football and boxing), one around BALCO's chemist, another around the eventual whistle-blower, and a ‘broker’ community, labelled the network's core. The network's core functioned as the best intermediate between communities because of the diversity of actors involved and the presence of BALCO's founder (Conte), who was brokering ties all over the network, though such a structure ultimately resulted in complete demise of the BALCO network.  相似文献   

20.
This article describes the process of “primitive professionalization”—the efforts of a small set of actors to claim professional status before their field has professionalized. Using a case study of Eastern State Penitentiary (1829–1879), I examine the strategies by which one prison's administrators claimed status as professionals—those whose command of a specialized knowledge grants authority within their domain. Eastern's administrators deployed a series of evolving discursive strategies aimed at establishing themselves as professionals long before more formal, field‐wide efforts to professionalize criminal justice. These strategies allowed Eastern's administrators to establish their professional status without traditional status markers of national networks, college degrees, or special training, which emerged later. Beyond illustrating a new pathway to professionalization, examining criminal justice professionalization at this early stage illuminates the early prison's precarious position and the internecine warfare among actors competing to control its meaning.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号