Abstract
Social Network Analysis is the use of Network and Graph Theory to study social phenomena, which was found to be highly relevant in areas like Criminology. This chapter provides an overview of key methods and tools that may be used for the analysis of criminal networks, which are presented in a real-world case study. Starting from available juridical acts, we have extracted data on the interactions among suspects within two Sicilian Mafia clans, obtaining two weighted undirected graphs. Then, we have investigated the roles of these weights on the criminal networks properties, focusing on two key features: weight distribution and shortest path length. We also present an experiment that aims to construct an artificial network which mirrors criminal behaviours. To this end, we have conducted a comparative degree distribution analysis between the real criminal networks, using some of the most popular artificial network models: Watts-Strogats, Erdős-Rényi, and Barabási-Albert, with some topology variations. This chapter will be a valuable tool for researchers who wish to employ social network analysis within their own area of interest.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Source code are available at https://github.com/lcucav/criminal-nets.
- 2.
References
Linyuan, L., Zhou, T.: Link prediction in complex networks: a survey. Phys. A Stat. Mech. Appl. 390(6), 1150–1170 (2011). https://doi.org/10.1016/j.physa.2010.11.027
Hasan, M.A., Zaki, M.J.: A survey of link prediction in social networks. In: Aggarwal, C. (ed.) Social Network Data Analytics. Springer, Boston, MA (2011)
Tassiulas, L., Katsaros, D., Basaras, P.: Detecting influential spreaders in complex, dynamic networks. Computer 46(4), 24–29 (2013). https://doi.org/10.1109/MC.2013.75
Cavallaro, L., Costantini, S., De Meo, P., Liotta, A., Stilo, G.: Network connectivity under a probabilistic node failure model. In: ArXiv e-print (Jun 2020). arXiv: 2006.13551 [cs.SI]
Mocanu, D.C., Mocanu, E., Stone, P., Nguyen, P.H., Gibescu, M., Liotta, A.: Scalable training of artificial neural networks with adaptive sparse connectivity inspired by network science. Nat. Commun. 9(1), 1–12 (2018)
Cavallaro, L., Bagdasar, O., De Meo, P., Fiumara, G., Liotta, A.: Network science strategies for accelerating the training of artificial neural networks. In: Numerical Computations: Theory and Algorithms NUMTA 2019, p. 169 (2019)
Cavallaro, L., Bagdasar, O., De Meo, P., Fiumara, G., Liotta, A.: Artificial neural networks training acceleration through network science strategies. In: Sergeyev, Y.D., Kvasov, D.E. (eds.) Numerical Computations: Theory and Algorithms, pp. 330–336. Springer International Publishing, Cham (2020)
Bellur, U., Kulkarni, R.: Improved matchmaking algorithm for semantic web services based on bipartite graph matching. In: IEEE International Conference on Web Services (ICWS 2007), Salt Lake City, UT, pp. 86-93 (2007)
Zhou, X., Zafarani, R.: Fake news: a survey of research, detection methods, and opportunities. In: ArXiv e-print (Dec 2018). arXiv:1812.00315 [cs.CL]
Oluwabunmi, O., Cosma, G., Liotta, A.: Clan-based cultural algorithm for feature selection. In: 2019 International Conference on Data Mining Workshops (ICDMW), pp. 465–472. IEEE (2019)
Ficara, A., Cavallaro, L., De Meo, P., Fiumara, G., Catanese, S., Bagdasar, O., Liotta A.: Social network analysis of sicilian mafia interconnections. In: Cherifi, H., Gaito, S., Mendes, J., Moro, E., Rocha, L. (eds.) Complex Networks and Their Applications VIII. COMPLEX NETWORKS 2019. Studies in Computational Intelligence, vol. 882, pp. 440–450. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-36683-4_36
Cavallaro, L., Ficara, A., De Meo, P., Fiumara, G., Catanese, S., Bagdasar, O., Song, W., Liotta, A.: Disrupting resilient criminal networks through data analysis: the case of Sicilian Mafia. PLoS ONE. 15(8), e0236476 (2020). https://doi.org/10.1371/journal.pone.0236476
Barabási, A.L., Pósfai, M.: Network Science. Cambridge University Press, Cambridge (2016). http://barabasi.com/networksciencebook/
Antoniou, Ioannis: E and Tsompa, ET : Statistical analysis of weighted networks. Discret. Dyn. Nat. Soc. 2008 (2008). https://doi.org/10.1155/2008/375452
Barthélemy, M., Barrat, A., Pastor-Satorras, R., Vespignani, A.: Characterization and modeling of weighted networks. Phys. A Stat. Mech. Appl. 346(1–2), 34–43 (2005). https://doi.org/10.1016/j.physa.2004.08.047
Travers, J., Milgram, S.: The small world problem. Psychol. Today 1(1), 61–67 (1967)
Milgram, S.: An experimental study of the small world problem. Sociometry 32(4), 425–443. American Sociological Association (1969). https://doi.org/10.2307/2786545
Erdős, P., Rényi, A.: On random graphs I. Publicationes Mathematicae 6 290–297 (1959)
Watts, D.J., Strogatz, S.H.: Collective dynamics of small-world networks. Nature 393, 440–442 (1998)
Barabási, A.L., Albert, R.: Emergence of scaling in random networks. Science 286, 509–512 (1999)
Chen H., Chung W., Xu J., Wang G., Qin Y., Chau M.: Crime data mining: a general framework and some examples. IEEE Comput. 37, 50–56. IEEE (2004). https://doi.org/10.1109/MC.2004.1297301
Bahulkar, A., Szymanski, B.K., Baycik, N.O., Sharkey, T.C.: Community detection with edge augmentation in criminal networks. In: 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 1168–1175. IEEE (2018)
Berlusconi, G., Calderoni, F., Parolini, N., Verani, M., Piccardi, C.: Link prediction in criminal networks: a tool for criminal intelligence analysis. Public Library of Science. PLoS ONE. 11(4), 1–21 (2016). https://doi.org/10.1371/journal.pone.0154244
Franchetti, L., Sonnino, S.: La Sicilia nel 1876. 1. Barbèra G. (1877)
McGloin, J.M.: Policy and intervention considerations of a network analysis of street gangs. Criminol. Public Policy 4(3), 607–635 (2005). https://doi.org/10.1111/j.1745-9133.2005.00306.x
Mastrobuoni, G., Patacchini, E.: Organized crime networks: an application of network analysis techniques to the American Mafia. Rev. Netw. Econ. 11(3) (2012). https://doi.org/10.1515/1446-9022.1324
Krebs, V.: Mapping networks of terrorist cells. Connections 24(3), 43–52. INSNA (2002)
Xu, J., Chen, H.: Criminal network analysis and visualization. Commun. ACM 48(6), 100–107. ACM (2005). https://doi.org/10.1145/1064830.1064834
Calderoni, F., Morselli, C.: Inside criminal networks. Eur. J. Crim. Policy Res. 16(1), 69–70 (2010). https://doi.org/10.1007/s10610-010-9118-7
Campana, P., Varese. F.: Listening to the wire: criteria and techniques for the quantitative analysis of phone intercepts. Trends Organ. Crime 15(1), 13–30 (2012). https://doi.org/10.1007/s12117-011-9131-3
Cavallaro, L., Ficara, A., De Meo, P., Fiumara, G., Catanese, S., Bagdasar, O., Song, W., Liotta, A.: Criminal Network: The Sicilian Mafia. “Montagna Operation” (Version 0.0.1) [Data set]. Zenodo. (2020). https://doi.org/10.5281/zenodo.3938818
Castaldo, F. (ed.): Messina, arrestati il capo ed i sodali della “Famiglia mafiosa di Mistretta”. In: Grandangolo, il giornale di Agrigento (Jan. 18th 2019). https://www.grandangoloagrigento.it/mafia/messina-arrestati-il-capo-ed-i-sodali-della-famiglia-mafiosa-di-mistretta
Newman, M.E.J., Watts, D.J.: Renormalization group analysis of the small-world network model. Phys. Lett. A 263(4), 341–346 (1999). https://doi.org/10.1016/S0375-9601(99)00757-4
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Cavallaro, L., Bagdasar, O., De Meo, P., Fiumara, G., Liotta, A. (2021). Graph and Network Theory for the Analysis of Criminal Networks. In: Fortino, G., Liotta, A., Gravina, R., Longheu, A. (eds) Data Science and Internet of Things. Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-030-67197-6_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-67197-6_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-67196-9
Online ISBN: 978-3-030-67197-6
eBook Packages: Computer ScienceComputer Science (R0)