Skip to main content

Graph and Network Theory for the Analysis of Criminal Networks

  • Chapter
  • First Online:
Data Science and Internet of Things

Part of the book series: Internet of Things ((ITTCC))

Abstract

Social Network Analysis is the use of Network and Graph Theory to study social phenomena, which was found to be highly relevant in areas like Criminology. This chapter provides an overview of key methods and tools that may be used for the analysis of criminal networks, which are presented in a real-world case study. Starting from available juridical acts, we have extracted data on the interactions among suspects within two Sicilian Mafia clans, obtaining two weighted undirected graphs. Then, we have investigated the roles of these weights on the criminal networks properties, focusing on two key features: weight distribution and shortest path length. We also present an experiment that aims to construct an artificial network which mirrors criminal behaviours. To this end, we have conducted a comparative degree distribution analysis between the real criminal networks, using some of the most popular artificial network models: Watts-Strogats, Erdős-Rényi, and Barabási-Albert, with some topology variations. This chapter will be a valuable tool for researchers who wish to employ social network analysis within their own area of interest.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Source code are available at https://github.com/lcucav/criminal-nets.

  2. 2.

    https://networkx.github.io/documentation/networkx-1.9/reference/generators.html.

References

  1. Linyuan, L., Zhou, T.: Link prediction in complex networks: a survey. Phys. A Stat. Mech. Appl. 390(6), 1150–1170 (2011). https://doi.org/10.1016/j.physa.2010.11.027

    Article  Google Scholar 

  2. Hasan, M.A., Zaki, M.J.: A survey of link prediction in social networks. In: Aggarwal, C. (ed.) Social Network Data Analytics. Springer, Boston, MA (2011)

    Google Scholar 

  3. Tassiulas, L., Katsaros, D., Basaras, P.: Detecting influential spreaders in complex, dynamic networks. Computer 46(4), 24–29 (2013). https://doi.org/10.1109/MC.2013.75

    Article  Google Scholar 

  4. Cavallaro, L., Costantini, S., De Meo, P., Liotta, A., Stilo, G.: Network connectivity under a probabilistic node failure model. In: ArXiv e-print (Jun 2020). arXiv: 2006.13551 [cs.SI]

  5. Mocanu, D.C., Mocanu, E., Stone, P., Nguyen, P.H., Gibescu, M., Liotta, A.: Scalable training of artificial neural networks with adaptive sparse connectivity inspired by network science. Nat. Commun. 9(1), 1–12 (2018)

    Article  Google Scholar 

  6. Cavallaro, L., Bagdasar, O., De Meo, P., Fiumara, G., Liotta, A.: Network science strategies for accelerating the training of artificial neural networks. In: Numerical Computations: Theory and Algorithms NUMTA 2019, p. 169 (2019)

    Google Scholar 

  7. Cavallaro, L., Bagdasar, O., De Meo, P., Fiumara, G., Liotta, A.: Artificial neural networks training acceleration through network science strategies. In: Sergeyev, Y.D., Kvasov, D.E. (eds.) Numerical Computations: Theory and Algorithms, pp. 330–336. Springer International Publishing, Cham (2020)

    Google Scholar 

  8. Bellur, U., Kulkarni, R.: Improved matchmaking algorithm for semantic web services based on bipartite graph matching. In: IEEE International Conference on Web Services (ICWS 2007), Salt Lake City, UT, pp. 86-93 (2007)

    Google Scholar 

  9. Zhou, X., Zafarani, R.: Fake news: a survey of research, detection methods, and opportunities. In: ArXiv e-print (Dec 2018). arXiv:1812.00315 [cs.CL]

  10. Oluwabunmi, O., Cosma, G., Liotta, A.: Clan-based cultural algorithm for feature selection. In: 2019 International Conference on Data Mining Workshops (ICDMW), pp. 465–472. IEEE (2019)

    Google Scholar 

  11. Ficara, A., Cavallaro, L., De Meo, P., Fiumara, G., Catanese, S., Bagdasar, O., Liotta A.: Social network analysis of sicilian mafia interconnections. In: Cherifi, H., Gaito, S., Mendes, J., Moro, E., Rocha, L. (eds.) Complex Networks and Their Applications VIII. COMPLEX NETWORKS 2019. Studies in Computational Intelligence, vol. 882, pp. 440–450. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-36683-4_36

  12. Cavallaro, L., Ficara, A., De Meo, P., Fiumara, G., Catanese, S., Bagdasar, O., Song, W., Liotta, A.: Disrupting resilient criminal networks through data analysis: the case of Sicilian Mafia. PLoS ONE. 15(8), e0236476 (2020). https://doi.org/10.1371/journal.pone.0236476

  13. Barabási, A.L., Pósfai, M.: Network Science. Cambridge University Press, Cambridge (2016). http://barabasi.com/networksciencebook/

  14. Antoniou, Ioannis: E and Tsompa, ET : Statistical analysis of weighted networks. Discret. Dyn. Nat. Soc. 2008 (2008). https://doi.org/10.1155/2008/375452

  15. Barthélemy, M., Barrat, A., Pastor-Satorras, R., Vespignani, A.: Characterization and modeling of weighted networks. Phys. A Stat. Mech. Appl. 346(1–2), 34–43 (2005). https://doi.org/10.1016/j.physa.2004.08.047

  16. Travers, J., Milgram, S.: The small world problem. Psychol. Today 1(1), 61–67 (1967)

    Google Scholar 

  17. Milgram, S.: An experimental study of the small world problem. Sociometry 32(4), 425–443. American Sociological Association (1969). https://doi.org/10.2307/2786545

  18. Erdős, P., Rényi, A.: On random graphs I. Publicationes Mathematicae 6 290–297 (1959)

    Google Scholar 

  19. Watts, D.J., Strogatz, S.H.: Collective dynamics of small-world networks. Nature 393, 440–442 (1998)

    Google Scholar 

  20. Barabási, A.L., Albert, R.: Emergence of scaling in random networks. Science 286, 509–512 (1999)

    Article  MathSciNet  Google Scholar 

  21. Chen H., Chung W., Xu J., Wang G., Qin Y., Chau M.: Crime data mining: a general framework and some examples. IEEE Comput. 37, 50–56. IEEE (2004). https://doi.org/10.1109/MC.2004.1297301

  22. Bahulkar, A., Szymanski, B.K., Baycik, N.O., Sharkey, T.C.: Community detection with edge augmentation in criminal networks. In: 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 1168–1175. IEEE (2018)

    Google Scholar 

  23. Berlusconi, G., Calderoni, F., Parolini, N., Verani, M., Piccardi, C.: Link prediction in criminal networks: a tool for criminal intelligence analysis. Public Library of Science. PLoS ONE. 11(4), 1–21 (2016). https://doi.org/10.1371/journal.pone.0154244

  24. Franchetti, L., Sonnino, S.: La Sicilia nel 1876. 1. Barbèra G. (1877)

    Google Scholar 

  25. McGloin, J.M.: Policy and intervention considerations of a network analysis of street gangs. Criminol. Public Policy 4(3), 607–635 (2005). https://doi.org/10.1111/j.1745-9133.2005.00306.x

    Article  Google Scholar 

  26. Mastrobuoni, G., Patacchini, E.: Organized crime networks: an application of network analysis techniques to the American Mafia. Rev. Netw. Econ. 11(3) (2012). https://doi.org/10.1515/1446-9022.1324

  27. Krebs, V.: Mapping networks of terrorist cells. Connections 24(3), 43–52. INSNA (2002)

    Google Scholar 

  28. Xu, J., Chen, H.: Criminal network analysis and visualization. Commun. ACM 48(6), 100–107. ACM (2005). https://doi.org/10.1145/1064830.1064834

  29. Calderoni, F., Morselli, C.: Inside criminal networks. Eur. J. Crim. Policy Res. 16(1), 69–70 (2010). https://doi.org/10.1007/s10610-010-9118-7

  30. Campana, P., Varese. F.: Listening to the wire: criteria and techniques for the quantitative analysis of phone intercepts. Trends Organ. Crime 15(1), 13–30 (2012). https://doi.org/10.1007/s12117-011-9131-3

  31. Cavallaro, L., Ficara, A., De Meo, P., Fiumara, G., Catanese, S., Bagdasar, O., Song, W., Liotta, A.: Criminal Network: The Sicilian Mafia. “Montagna Operation” (Version 0.0.1) [Data set]. Zenodo. (2020). https://doi.org/10.5281/zenodo.3938818

  32. Castaldo, F. (ed.): Messina, arrestati il capo ed i sodali della “Famiglia mafiosa di Mistretta”. In: Grandangolo, il giornale di Agrigento (Jan. 18th 2019). https://www.grandangoloagrigento.it/mafia/messina-arrestati-il-capo-ed-i-sodali-della-famiglia-mafiosa-di-mistretta

  33. Newman, M.E.J., Watts, D.J.: Renormalization group analysis of the small-world network model. Phys. Lett. A 263(4), 341–346 (1999). https://doi.org/10.1016/S0375-9601(99)00757-4

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lucia Cavallaro .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Cavallaro, L., Bagdasar, O., De Meo, P., Fiumara, G., Liotta, A. (2021). Graph and Network Theory for the Analysis of Criminal Networks. In: Fortino, G., Liotta, A., Gravina, R., Longheu, A. (eds) Data Science and Internet of Things. Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-030-67197-6_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-67197-6_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-67196-9

  • Online ISBN: 978-3-030-67197-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics