首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Using social network analysis (SNA), we propose a model for targeting criminal networks. The model we present here is a revised version of our existing model (Schwartz and Rouselle in IALEIA Journal, 18(1):18–14, 2008), which itself builds on Steve Borgatti’s SNA-based key player approach. Whereas Borgatti’s approach focuses solely on actors’ network positions, our model also incorporates the relative strength or potency of actors, as well as the strength of the relationships binding network actors.
Tony (D.A.) Rouselle
  相似文献   

2.
《Global Crime》2013,14(2-3):238-260
There is a growing body of research using social network analysis to study criminal networks. The great majority of this research examines networks at a single time point. Although there are theoretical approaches which hypothesise on how criminal networks develop and grow, little empirical research has been conducted on the growth of criminal networks over time. This project documents the growth of a drug trafficking network. The aims were to examine and describe structural and functional changes in a criminal network across time. We found that the density of the network remained somewhat stable over time, although the network became more decentralised at the final time point measured. Centrality scores for individual nodes showed significant changes over time. Individuals changed the roles performed across time, consistent with the changing needs and focus of the network. Overall, our results support the characterisation of networks as flexible and adaptive.  相似文献   

3.
《Global Crime》2013,14(3):219-237
Understanding criminal networks can aid in the identification of key players and important relationships within the network. We examined multiple, directed link types in a criminal network. Eight distinct link types were identified, each one related to the exchange of a particular resource (e.g. drugs, money). The analyses focused on the eight link-type network layers and a merged network representing links across all eight layers. We were able to determine the link type of around 31% of the links, and found that nearly 50% of the nodes were involved in more than one network layer. This suggests that many actors contribute in multiple, diverse ways to the operation of the network. Actors were found to specialise in the exchange of particular types of resources, and also to specialise in the strategic position they occupied in the transfer of particular resources.  相似文献   

4.
5.
6.
《Global Crime》2013,14(2-3):175-196
This paper focuses on criminals who could easily be labelled as entrepreneurs and who deal in compromised computer systems. Known as botmasters, these individuals use their technical skills to take over and control personal, business and governmental computers. These networks of hijacked computers are known as botnets in the security industry. With this massive computing power, these criminals can send large amounts of spam, attack web servers or steal financial data – all for a fee. As entrepreneurs, the botmasters' main goal is to achieve the highest level of success possible. In their case, this achievement can be measured in the illegitimate revenues they earn from the leasing of their botnet. Based on the evidence gathered in literature on legitimate and illegitimate markets, this paper sets to understand how reputation could relate to criminal achievement as well as what factors impact a heightened level of reputation in a criminal market.  相似文献   

7.
8.
This paper reflects on the use of Twitter and Facebook at the PILCH Homeless Persons' Legal Clinic (HPLC), and the lessons for social change lawyers. While these two forms of social media have been useful tools in the HPLC's mission to address the systemic and structural issues that impact on people experiencing homelessness in Victoria, Australia, there have been salutary lessons in their deployment, engagement and impact. This paper, written in autoethnographic form by a former HPLC manager, reflects on the costs and benefits of these new media forms for ‘social change lawyering’.  相似文献   

9.
Dark networks refer to organizations that are covert and illegal in nature. Terrorist networks, organized crime groups, arms smugglers, and conspiracy organizations can all be classified as dark networks. This paper analyzes Turkey??s Ergenekon Terrorist Organization (ETO) which is a political conspiracy network that has played a significant role in the terrorist activities within the country in the last few decades. It has features of organized crime enterprises, terrorist organizations, and Gladio type clandestine armies, but it exceeds the scope of these three. This study examines the structure of the ETO using network analysis tools and court documents as the data source. Findings indicate that the network has a concentrated structure which consists of a core and periphery group of actors. The core group has a strong connectedness with each other while the density of the relationship gets lower in the periphery group. Peripheral actors are separated into subgroups which are necessary for operational purposes and also prevalent in the literature of dark networks. An efficiency-security tradeoff, which is also widely discussed in the literature, does not take place in the ETO network because the political and legal conditions of the country allow members of the network to act comfortably as opposed to being under the threat of counter-terrorism or law enforcement efforts.  相似文献   

10.
《Justice Quarterly》2012,29(4):691-709

Social disorganization theory experienced a relative resurgence in the criminological literature during the 1980s. This new generation of research has expanded the work of Shaw and McKay by testing the relationship between neighborhood structure and delinquency through the use of self-report and victimization data. Confirmation of the theory has been widespread. In this paper we investigate variables mediating between social disorganization and adolescent drug use. We thus extend the research orientation to incorporate drug use and describe a preliminary attempt to examine how neighborhood structure affects behavior. The findings suggest that in the three distinct types of socially disorganized areas that were identified, there was no difference in rates of drug use but that different “mediating factors” appear to be operating in the three different types of communities.  相似文献   

11.
12.
《Global Crime》2013,14(2-3):216-237
The current study revisits the notorious Bay Area Laboratory Cooperative (BALCO) scandal involving the production and distribution of an undetectable anabolic-androgenic steroid to professional athletes from late 1990s until 2003. Multiple sources are reviewed to re-create the social structure of BALCO and examine whether it formed a close-knit community or instead multiple communities defined around a specific sport or discipline. Results from a community fragmentation analysis suggest that six communities could be identified as distinct in the BALCO network of 97 individuals – three structured around athletic interests (baseball, football and boxing), one around BALCO's chemist, another around the eventual whistle-blower, and a ‘broker’ community, labelled the network's core. The network's core functioned as the best intermediate between communities because of the diversity of actors involved and the presence of BALCO's founder (Conte), who was brokering ties all over the network, though such a structure ultimately resulted in complete demise of the BALCO network.  相似文献   

13.
Crime, Law and Social Change - Given the worldwide magnitude, pervasiveness and deleterious consequences of human trafficking (Roth, 45), a more comprehensive understanding of its underlying causes...  相似文献   

14.
The present paper operationalizes and empirically tests the most recent theoretical speculations of Hirschi and Gottfredson regarding an individual level characteristic of self-control and its relation to earlier specifications of control theory as well as the literature on personality. Linkages are drawn between their broad delineation of self-control and personal disorders of hyperactivity, impulsivity, attention deficits, and minor conduct problems. Psychologists disagree about whether such disorders represent single or multiple traits and whether both behavioral and cognitive measures can appropriately depict personality characteristics. Employing structural equation techniques, support for several propositions derived from Gottfredson and Hirschi's thesis is found: Self-control subsumes several personality disorders and is significantly comprised by early behavioral indicators of aggression and fighting, is inversely related to other elements of the social bond, is moderately stable over a short period of time, and significantly predicts criminal convictions. However, questions remain regarding the ubiquity of self-control, the magnitude and meaning of stability, and the power of this perspective to explain all forms of self-reported delinquency.  相似文献   

15.
This exploratory study examines a seemingly unique method of control used to psychologically bind Nigerian women and children to their traffickers. In order to manipulate the victims’ fear of spiritual retribution, they initially undergo a juju ritual whereby they swear an oath to the spirit world, promising not to escape or disclose their exploitation to the authorities. The aim of this research was to explore how this process affects the victim and what considerations this phenomena raises for criminal investigators. The methodology employed qualitative data obtained through interviews with front-line practitioners from the United Kingdom. Results suggest the oath is one of several mechanisms used by traffickers to instil fear. Others include rape, physical threats, threats of deportation and perceptions of police corruption. The main recommendations are to empathise with the victim’s fear of spiritual retribution; develop trust and rapport; take a joint-agency approach and provide access to psychological and spiritual counselling.  相似文献   

16.
The third molar tooth is one of the few anatomical sites available for age estimation of unknown age individuals in the late adolescent years. Computed tomography (CT) images were assessed in an Australian population aged from 15 to 25 years for development trends, particularly concerning age estimation at the child/adult transition point of 18 years. The CT images were also compared to conventional radiographs to assess the developmental scoring agreement between the two and it was found that agreement of Demirjian scores between the two imaging modalities was excellent. The relatively wide age ranges (mean ± 2SD) indicate that the third molar is not a precise tool for age estimation (age ranges of 3-8 years) but is, however, a useful tool for discriminating the adult/child transition age of 18 years. In the current study 100% of females and 96% of males with completed roots were over 18 years of age.  相似文献   

17.
The literature increasingly acknowledges that international institutions do not exist in isolation, but regularly interact with each other. This interplay might induce influence, affecting institutions’ development and performance. The following research adds to this debate by systematically analyzing the quantitative evidence on how institutional interaction drives institutional design from a network perspective. Using dyadic cross-sectional data on international environmental agreements in 1952–2000, the authors find support for their theoretical argument that regimes’ similarity in design as captured by their degree of legalization strongly depends on institutions’ interaction. However, while “soft law” disseminates between regimes that are well connected through direct or indirect links, this does not apply to “hard law.” The authors explain this divergence with states’ concerns about binding-law commitments and sovereignty costs associated with the latter. This research may have important implications for studies of international institutions and of network analysis in general.  相似文献   

18.
Over the past several decades, illegally sourced timber has contributed to a growing roster of problems that affect both producing and consuming countries alike. Within the United States, the effect of timber trafficking on the national economy, and its potential effect on American foreign policy, has raised serious concern — so much so that in 2002, President George W. Bush announced his Initiative Against Illegal Logging in an attempt to discern and curtail the causes, methods, and parties involved in illegal activities. In 2005, the National Institute of Justice and Department of State, under the auspices of the President's Council on Environmental Quality, commissioned a literature review by Abt Associates to answer two principal questions:
  1. Who commits the crimes of illegal timbering?
  2. Hwo do they commit these crimes?
  相似文献   

19.
This article evaluates the effectiveness of current law enforcement efforts in combating human trafficking in South Africa. Based on a broader empirical doctoral study, it was discovered that as currently structured, the South African Police Service (SAPS) cannot be effective in the enforcement of anti-trafficking law in the country. Combating human trafficking among other things, requires a formidable law enforcement agency that is explicitly proficient in the modus operandi of the crime; the sophisticated cum dynamic nature of the forces and factors that fuel the illicit trade in a vacillating milieu. Unfortunately, academic writings on this observable position in South Africa are scanty. Therefore, an article of this nature is not just timely but urgent. Findings from the study (among others) revealed that a wide-gap exist in the capacity of the SAPS, and other relevant stakeholders, to enforce anti-trafficking law in the country. Hence, it was recommended that for a result-oriented approach, South Africa needs to establish a specialised law enforcement agency distinct from the regular police structure to enforce anti-trafficking law in the country.  相似文献   

20.
This article argues that existing Australian regulations do not adequately cover online pharmacies or Internet advertising of medicines and that existing penalties and sanctions are often ineffective, potentially placing public health and safety at risk. Suggestions are made for future regulatory approaches. It is concluded that as well as an effective program of public education, cautious domestic legislative reform is necessary to ensure specific regulation of Australian online pharmacy practice and Internet advertising of medicines. In addition, the global nature of the Internet demands international co-operation and increased regulator and consumer vigilance.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号