首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
Criminal organizations tend to be clustered to reduce risks of detection and information leaks. Yet, the literature exploring the relevance of subgroups for their internal structure is so far very limited. The paper applies methods of community analysis to explore the structure of a criminal network representing the individuals’ co-participation in meetings. It draws from a case study on a large law enforcement operation (“Operazione Infinito”) tackling the ‘Ndrangheta, a mafia organization from Calabria, a southern Italian region. The results show that the network is indeed clustered and that communities are associated, in a non-trivial way, with the internal organization of the ‘Ndrangheta into different “locali” (similar to mafia families). Furthermore, the results of community analysis can improve the prediction of the “locale” membership of the criminals (up to two thirds of any random sample of nodes) and the leadership roles (above 90% precision in classifying nodes as either bosses or non-bosses). The implications of these findings on the interpretation of the structure and functioning of the criminal network are discussed.  相似文献   

2.
The aim of the present work is to investigate the relationships established within Cosa Nostra, by making use of networks and complex-systems methods. The analysis is performed at three different levels, that is, individuals, groups within mafia syndicates, and relationships amongst mafia syndicates.The reported empirical analysis is based on the criminal records of 632 affiliates to Cosa Nostra selected from a set of 125 judgements emitted by the Palermo courts from 2000 to 2014. According to the criminal records of the Palermo Prosecutor Office, such a dataset includes approximately 10% of the whole population of Cosa Nostra affiliates in western Sicily. Furthermore, the vital statistics of 235 subjects sentenced for mafia crimes and the one of their relatives complemented the database that, overall, includes about 4000 subjects.Our results show that mafia syndicates are not specialized in terms of criminal activity, rather they show a strong territorial attachment and are involved in heterogeneous criminal activities.Since syndicates insist on a delimited territory, young affiliates are selected on a territorial basis according to the significance and variety of their past criminal activity. Once inside a syndicate, affiliates tend to specialize in a few criminal activities, depending on their attitudes and the needs of the organization. Finally, despite the fact that the vast majority of mafia affiliates are males, our results highlight that female subjects are crucial to form and consolidate alliances between mafia syndicates through suitable marriages.  相似文献   

3.
Collaboration between members of different criminal groups is an important feature of crime that is considered organised, as it allows criminals to access resources and skills in order to exploit illicit economic opportunities. Collaboration across criminal groups is also difficult and risky due to the lack of institutions supporting peaceful cooperation in illicit markets. Thus cross-group collaboration has been thought to take place mostly among small and transient groups. This paper determines whether and under what conditions members of different, larger organised crime groups collaborate with one another. To do so we use intelligence data from the Canadian province of Alberta, centering on criminals and criminal groups engaged in multiple crime types in multiple geographic locations. We apply a multilevel network analytical framework and exponential random graph models using Bayesian techniques to uncover the determinants of cross-group criminal collaboration. We find cross-group collaboration depends not only on co-location, but also on the types of groups to which the criminals are affiliated, and on illicit market overlap between groups. When groups are operating in the same geographically-situated illicit markets their members tend not to collaborate with one another, providing evidence for the difficulty or undesirability of cross-group collaboration in illicit markets. Conversely, members of Outlaw Motorcycle Gangs are more likely to collaborate across groups when markets overlap, suggesting the superior capacity and motivation of biker gangs to coordinate criminal activity. Our paper contributes to the understanding of criminal networks as complex, emergent, and spatially embedded market phenomena.  相似文献   

4.
Dyadic analyses of relationships between criminals have mostly ignored the multiplex nature of criminal ties. This study attempts to provide a more complete assessment of co-offending networks by incorporating the different types of crime that relate individuals with each other. Drawing on a large dataset of arrests in Quebec between 2003 and 2009, we focus on co-offending stability and specialization and illustrate how co-offending networks based on different types of criminal activities overlap. We portray a pattern of co-offending, which extends debate of criminal specialization/versatility to the dyadic level. Our study illustrates the ways in which the frequency and spectrum of crime include a relational component. More generally, the article emphasizes the need to consider the semantics of network ties, and further, the association between different types of networks, which ultimately offers a reassessment of social structure.  相似文献   

5.
Chronic disease has profound impacts on the structural features of individuals’ interpersonal connections such as bridging — ties to people who are otherwise poorly connected to each other. Prior research has documented competing arguments regarding the benefits of network bridging, but less is known about how chronic illness influences bridging and its underlying mechanisms. Using data on 1555 older adults from the National Social Life, Health, and Aging Project (NSHAP), I find that older adults diagnosed with chronic illness tend to have lower bridging potential in their networks, particularly between kin and non-kin members. They also report more frequent interactions with close ties but fewer neighbors, friends, and colleagues in their networks, which mediates the association between chronic illness and social network bridging. These findings illuminate both direct and indirect pathways through which chronic illness affects network bridging and highlight the context-specific implications for social networks in later life.  相似文献   

6.
The explosive growth of US prison populations over the last 30 years—now known as ‘mass incarceration’—has been driven by harsh sentences delivered to offenders by criminal courts, but the increasingly common practice of parole revocation has also contributed significantly to this phenomenon. As the criminal justice system has been reoriented away from rehabilitation and toward punitive objectives, the function of parole has changed accordingly. No longer focused on the successful reintegration of offenders, parole has been transformed into a managerial instrument that mainly serves to identify and reincarcerate dangerous criminals. This function entails a substantial amount of discretion in revocation decision making, raising concerns about the further entrenchment of disadvantage among already impoverished populations. However, given the professional and reputational pressures on state parole boards, revocation decision making logics appear rational. Reducing the flow of parole violators into prisons, therefore, is far more complicated than the technical re-engineering of parole practices. Such reform necessarily involves questioning our fundamental philosophies of punishment.  相似文献   

7.
In this paper, we harness server-side data—540,000 messages generated by 2085 users on TamTamy, an Enterprise Social Media (ESM) platform—to examine how gender and rank shaped “homophily” (the tendency to connect with similar others) and centrality in an ESM network. Drawing on the logic of “distinctiveness theory,” which argues that the numeric rarity of a category in a given setting promotes the use of that category as a basis for connecting with others, we hypothesized and found: (a) the tendency to connect with same-gender others was stronger among women than among men; (b) the tendency to connect with same-rank others was stronger among high-ranking employees than among low-ranking employees; (c) for high-ranking men, rank was more important than gender as a basis for connecting with others; and (d) for low-ranking women, gender was more important than rank as a basis for connecting with others. We also found that whereas higher ranking individuals were more likely to be in central (bridging) positions in the overall network, gender was unrelated to network centrality. Our study suggests that the affordances of ESM for open and distributed communications notwithstanding, the social networks that emerge on ESM platforms may reinforce social stratification on some dimensions while diminishing it on others.  相似文献   

8.
Leading economic models of crime assume that potential criminals achieve their ends by criminal means or not at all. We develop a framework in which potential criminals can also attain their objectives through voluntary trade. Our framework helps explain several features of the legal system that have proven to be problematic for the canonical approach: why optimal sanctions should be increasing in an individual's criminal history, and why necessity may be a partial defense in some situations. Finally, the inclusion of a voluntary trade option makes the maximization of a utilitarian welfare function identical to minimizing the costs of crime, implying that a long‐standing controversy in the literature is, in part, an artifact of the assumption that criminals face a binary choice set. (JEL K42, D60, H00)  相似文献   

9.
This paper explores the creation and evolution of organized crime as a concept within the United States. The paper argues that traditional definitions are both incomplete and inaccurate due primarily to their reliance on La Cosa Nostra (i.e. Italian mafia) models and inflexibility. The author proposes the introduction of a new definition, and distinguishes between computer crime committed by organized crime groups and organized criminal activity in a technological environment. In addition, a distinction is made between organized crime and cyber‐gangs. Finally, the author discusses specific examples of computer crime committed by criminal syndicates.  相似文献   

10.
Szelenyi  Iván 《Theory and Society》2019,48(4):639-644

This review essay discusses Bálint Magyar’s most recent book, Stubborn Structures: Conceptualizing Post-communist Regimes (Budapest: CEU Press 2019). Bálint Magyar first published in Hungarian in 2015 (published in English by CEU Press in 2016) a path-breaking book on The Post-Communist Mafia State: The Case of Hungary. This was the first major attempt to move beyond political controversies and offer a systematic critique of post-communist states. The book also went beyond the usual accusation of “corruption.” Magyar’s key point is that—at least in Hungary—a mafia style of “upper-world” was created, with a “godfather” at the top of it and an “adopted family” below it. This fascinating idea was followed by edited books that included contribution by other scholars. The latest such book is Magyar’s Stubborn Structures: Conceptualizing Post-communist Regimes (CEU Press 2019), which includes articles applying the “mafia state theory” to a great variety of post-communist countries.

  相似文献   

11.
Bridges that span structural holes are often explained in terms of the entrepreneurial personalities or rational motivations of brokers, or structural processes that lead to the intersection of social foci. I argue that the existence and use of bridges in interpersonal networks also depends on individuals’ health. Poor health may make it more difficult to withstand the pressures and to execute some of the common tasks associated with bridging (e.g., brokerage). I examine this possibility using egocentric network data on over 2500 older adults drawn from the recent National Social Life, Health, and Aging Project (NSHAP). Multivariate regression analyses show that both cognitive and functional health are significantly positively associated with bridging, net of sociodemographic and life-course controls. The relationship between functional (kinesthetic) health and bridging appears to be partially mediated by network composition, as older adults who have poorer functional health also tend to have networks that are richer in strong ties. Several potential mediation mechanisms are discussed. Cognitive function remains significantly associated with bridging net of network composition, suggesting that the inherent challenges of maintaining bridging positions may be more difficult to cope with for those who have cognitive impairments than for those who have functional impairments such as limited mobility. An alternative explanation is that cognitively impaired individuals have more difficulty recognizing (and thus strategically using) bridges in their networks. Theoretical implications and possibilities for future research are discussed.  相似文献   

12.
Research in computer-mediated communication has consistently asserted that Facebook use is positively correlated with social capital. This research has drawn primarily on Williams’ (2006) bridging and bonding scales as well as behavioral attributes such as civic engagement. Yet, as social capital is inherently a structural construct, it is surprising that so little work has been done relating social capital to social structure as captured by social network site (SNS) Friendship networks. Facebook is particularly well-suited to support the examination of structure at the ego level since the networks articulated on Facebook tend to be large, dense, and indicative of many offline foci (e.g., coworkers, friends from high school). Assuming that each one of these foci only partially overlap, we initially present two hypotheses related to Facebook social networks and social capital: more foci are associated with perceptions of greater bridging social capital and more closure is associated with greater bonding social capital. Using a study of 235 employees at a Midwestern American university, we test these hypotheses alongside self-reported measures of activity on the site. Our results only partially confirm these hypotheses. In particular, using a widely used measure of closure (transitivity) we observe a strong and persistent negative relationship to bonding social capital. Although this finding is initially counter-intuitive it is easily explained by considering the topology of Facebook personal networks: networks with primarily closed triads tend to be networks with tightly bound foci (such as everyone from high school knowing each other) and few connections between foci. Networks with primarily open triads signify many crosscutting friendships across foci. Therefore, bonding social capital appears to be less tied to local clustering than to global cohesion.  相似文献   

13.
《Social Networks》1991,13(3):251-274
This paper explores the opportunities for the application of network analytic techniques to the problems of criminal intelligence analysis, paying particular attention to the identification of vulnerabilities in different types of criminal organization — from terrorist groups to narcotics supply networks.A variety of concepts from the network analysis literature are considered in terms of the promise they hold for helping law enforcement agencies extract useful information from existing collections of link data. For example, six different notions of “centrality” and the three major notions of “equivalence” are examined for their relevance in revealing the mechanics and vulnerabilities of criminal enterprises.  相似文献   

14.
This article introduces nonprofit researchers and practitioners to a social network analytical technique for assessing internal staff relationships after a merger. We studied a case of a nonprofit merger, investigating its formal and informal intraorganizational networks to see which parts integrated and which remained separate operationally. We discovered a prior‐organizational‐affiliation‐based homophily within the merged organization: most interpersonal relationships existing within these networks remained among the employees who worked together prior to the merger. However, the informal and expressive networks of mentoring, friendship, and socioemotional support were even more disconnected than the formal and instrumental networks of work relationships and problem solving. We highlight the role of a mentoring network in bridging formal and informal networks in a merged organization.  相似文献   

15.
16.
This article examines opportunities to share job information. It adds to the growing body of research on information holders and complements existing research that explains what kinds of networks and network positions provide the greatest benefit to job seekers. Data from an exploratory study of entry‐level, white‐collar workers are used to relate opportunities to share information—defined to consist of both knowledge of a job opening and awareness of a potential applicant among one's network members—with information holders’ network composition. The data show that information holders with strong within‐industry networks have more opportunities to share information and do share more information. Information holders with diverse networks more often identify potential applicants for jobs and thus have more opportunities to share information. However, despite having more opportunities to do so, they do not share information more often than those with less diverse networks. These findings, combined with the growing literature on information holders, suggest that different aspects of network composition affect the flow of job information at different stages and thus by different mechanisms.  相似文献   

17.
Despite the long-standing acknowledgement that crime is a group phenomenon, little research treats co-offending as a dynamic network process. This study analyses the individual and network processes responsible for long-lasting criminal relationships using co-offending dyads from eight years of arrest records in Chicago. Results from proportional hazard models suggest that homophily with respect to age, race, gender, geographic proximity, and gang identity lead to sustained partnerships. Victimization increases the probability of continued co-offending, while the victimization of one’s associates dissuade continued collaboration. Supra-dyadic processes (centrality, transitivity) influence the likelihood of continued co-offending. Results are discussed regarding opportunities and turning points.  相似文献   

18.
未成年人犯罪在近几年来逐渐倾向于恶性化、低龄化,尤其有关完全不负无刑事责任年龄人的恶性犯罪案件屡屡出现于舆论焦点,社会影响较为恶劣,及时完善刑事责任年龄等相关法律制度尤为重要。可以参考英美国家“恶意补足年龄”规则适用的司法实践,其针对未成年人恶性犯罪个案的犯罪主体资格补足机制,对于未成年人恶性犯罪追责机制完善乃至犯罪防控具有重要意义。针对特定犯罪适当设置特殊年龄区间,并在该区间内,针对特定的犯罪人加以适用“恶意补足年龄”规则,可考虑其于未来我国未成年人恶性犯罪追责机制补充衔接的合理性。  相似文献   

19.
The paper briefly reviews the leading theories of female crime causation that surfaced in the twentieth century and proposes an alternative, theoretical orientation using a Marxian approach. This explanation uses existing theoretical and empirical studies to account for: 1) the means by which women are defined as criminal, 2) the class relationship between female criminals and the general population of women, and 3) the system by which control over both the population of female criminals and the general population of women is legitimized. The paper also examines the relationship between the victimization of women and the opportunity structure as class‐based.  相似文献   

20.
This study (1) tested the effectiveness of a new survey tool to collect ego-centered network data and (2) assessed the impact of giving people feedback about their network on subsequent responses. The new tool, GENSI (Graphical Ego-centered Network Survey Interface), allows respondents to describe all network contacts at once via a graphical representation of their networks. In an online experiment, 434 American adults were randomly assigned to answer traditional network questions or GENSI and were randomly assigned to receive feedback about their network or not. The traditional questionnaire and GENSI took the same amount of time to complete, and measurements of racial composition of the network showed equivalent convergent validity in both survey tools. However, the new tool appears to solve what past researchers have considered to be a problem with online administration: exaggerated numbers of network connections. Moreover, respondents reported enjoying GENSI more than the traditional tool. Thus, using a graphical interface to collect ego-centered network data seems to be promising. However, telling respondents how their network compared to the average Americans reduced the convergent validity of measures administered after the feedback was provided, suggesting that such feedback should be avoided.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号