Abstract
The antiquities market repeatedly raises concerns about money laundering, forgeries, and illicit trafficking. Auction houses’ and dealers’ roles in these activities are heavily studied, but there has been little research looking at connections between these market participants. We show the potential for social network analysis illuminate new aspects of the art market. In this case study, we track 30,000 individual items based on catalogued provenance information indicating their prior transit through various auction houses and dealers. The network inferred from these data allows us to address basic questions about the structure of the antiquities market, such as the rate of transit for items in the market, the pathways taken by items between auction houses, and the relationship between sale outcomes and re-appearance at auction. There are two types of objects that reappear at auction: those that failed to sell and are re-auctioned very quickly, and those that are held by a collector for about a decade before returning to auction. We also show that private dealers play a relatively important role in “vetting” certain objects, lending them legitimacy. Finally, we discuss additional uses of social network analysis and possible data sources for future art market researchers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
These were the most recently available data during the data collection phase of this project.
- 2.
We use the word provenance when referring to an object’s ownership history because that is the term used in auction house catalogues. There is a scholarly debate regarding the appropriate terms to denote an archaeological object’s ownership history since excavation vis-à-vis its archaeological and stratigraphic context or its history since creation. See Gerstenblith (2020) for a history of this debate and the related complexities of an object’s legality and authenticity.
- 3.
An edgearray dataset allows for visualisation of networks by type of relationship by structuring data as a series of stacked matrices that account for multiple levels of relationships at once (Borgatti et al., 2013).
- 4.
Both variables looking at auction house and/or location movement include four categories with values 0–4 in ascending order: (0) item not auctioned, (1) no change in the house and location, (2) a change in the house with no change in the location (e.g., an item is auctioned at Bonhams in London and is then auctioned at Christie’s in London the next time) (3) a change in the location with no change in the house (e.g., an item is auctioned at Bonhams Knightsbridge and then Bonhams New Bond Street), and (4) a change in both the house and the location.
- 5.
NetDraw is a free social network analysis visualisation software that was developed to work alongside the analytical software UCINET. For more information, see http://www.analytictech.com/products.htm.
- 6.
UCINET is a windows-based software package for analysing social networks, developed by Lin Freeman, Martin Everett and Steve Borgatti. For more information, see https://sites.google.com/site/ucinetsoftware/home.
- 7.
A few black dots represent locations such as Christie’s Paris, which does not normally hold stand-alone antiquities auctions. The presence of these nodes is because they sold antiquities in other auctions, and those antiquities later sold at one of the major antiquities auctions from which we gathered data.
- 8.
We partly focus on just 20 because they are identifiable as dealers (provenance information is not always clear on whether someone was a dealer or collector, or what the full name of the dealer is). We also focus on these 20 because they are highly prominent and therefore presumably lend some credibility to the object’s authenticity and may add prestige to the object itself. We ignore items that were noted to have been in a dealer’s private collection, as dealers can act as collectors in their own right.
- 9.
A documented archaeological origin is referred to as provenience, as opposed to provenance, which is a history of the object since excavation. The distinction is important when considering objects’ scientific value, as opposed to just aesthetic value or legality. Regardless of how far back provenance research can track an object, most of the time they still come to the market with no provenience. The foundational studies are Muscarella (1977) and Chippindale and Gill (1993).
References
Agrawal, A., Catalini, C., & Goldfarb, A. (2015). Crowdfunding: Geography, social networks, and the timing of investment decisions. Journal of Economics and Management Strategy, 24(2), 253–274.
Beltrametti, S., & Marrone, J. V. (2016). Market responses to court rulings: Evidence from antiquities auctions. Journal of Law and Economics, 59(40), 913–944.
Berlusconi, G., Aziani, A., & Giommoni, L. (2017). The determinants of heroin flows in Europe: A latent space approach. Social Networks, Crime and Networks, 51, 104–117. https://doi.org/10.1016/j.socnet.2017.03.012
Bichler, G., Bush, S., & Malm, A. (2013). Bad actors and faulty props: Unlocking legal and illicit art trade. Global Crime, 14(4), 359–385.
Bichler, G., & Malm, A. (2013). Small arms, big guns: A dynamic model of illicit market opportunity. Global Crime, 14(2–3), 261–286. https://doi.org/10.1080/17440572.2013.787928
Black, J. (1996). Italy and the Grand Tour: The British experience in the eighteenth century. Annali d’Italianistica, 14, 532–541.
Black, J. (2010). The British and the Grand Tour. Routledge.
Borgatti, S. P., Everett, M. G., & Johnson, J. C. (2013). Analyzing social networks. SAGE Publications.
Borgatti, S. P., & Li, S. (2009). On social network analysis in a supply chain context. Journal of Supply Chain Management, 45(2), 5–22.
Bright, D. A., Hughes, C. E., & Chalmers, J. (2012). Illuminating dark networks: A social network analysis of an Australian drug trafficking syndicate. Crime, Law and Social Change, 57(2), 151–176.
Brodie, N. (1998). Pity the poor middlemen. Culture Without Context, 3, 7–9.
Brodie, N. (2012, August 21). Organigram. Blog post. Trafficking Culture. Retrieved May 31, 2021, from https://traffickingculture.org/encyclopedia/case-studies/organigram/
Brodie, N. (2014a). Auction houses and the antiquities trade. In S. Choulia-Kapeloni (Ed.), 3rd International conference of experts on the return of cultural property (pp. 71–82). Archaeological Receipts Fund.
Brodie, N. (2014b). The antiquities market: It’s all in a price. Heritage & Society, 7(1), 32–46.
Brodie, N. (2016, May 14). Rich and powerful collectors (1). Blog post. Market of Mass Destruction. Retrieved May 31, 2021, from http://www.marketmassdestruction.com/rich-and-powerful-collectors-1/
Brodie, N. (2019). Through a glass, darkly: Long-term antiquities auction data in context. International Journal of Cultural Property, 26(3), 265–283.
Brodie, N., & Manivet, P. (2017). Cylinder seals at Sotheby’s and Christie’s (1985–2013). Journal of Art Crime, 17(Spring), 3–6.
Brodie, N., & Renfrew, C. (2005). Looting and the world’s archaeological heritage: The inadequate response. Annual Review of Anthropology, 34, 343–361.
Brodie, N., & Sabrine, I. (2018). The illegal excavation and trade of Syrian cultural objects: A view from the ground. Journal of Field Archaeology, 43(1), 74–84.
Campbell, P. B. (2013). The illicit antiquities trade as a transnational criminal network: Characterizing and anticipating trafficking of cultural heritage. International Journal of Cultural Property, 20(2), 113–153.
Chippindale, C., & Gill, D. W. J. (1993). Material and intellectual consequences of esteem for Cycladic figures. American Journal of Archaeology, 97(4), 601–659.
D’Ippolito, M. (2014). New methods of mapping: The application of social network analysis to the illegal trade in antiquities. In W. Kennedy, N. Agarwal, & S. J. Yang (Eds.), Social computing, behavioral-cultural modelling and prediction (pp. 253–260). Springer.
Davis, T. (2011). Supply and demand: Exposing the illicit trade in Cambodian antiquities through a study of Sotheby’s auction house. Crime, Law and Social Change, 56(2), 155–174.
Fabiani, M. (2019). Building a baseline: Unifying spatial and temporal methodologies to understand archaeological looting in Egypt. Doctoral Dissertation, University of Maryland. Digital Repository of the University of Maryland (DRUM).
Farchakh-Bajjaly, J. (2008). Who are the looters at archaeological sites in Iraq? In L. Rothfield (Ed.), Antiquities under siege: Cultural heritage protection after the Iraq war (pp. 49–56). Altamira.
Felch, J., & Frammolino, R. (2011). Chasing Aphrodite: The hunt for looted antiquities at the world’s richest museum. Houghton Mifflin Harcourt.
Gerstenblith, P. (2019). Provenances: Real, fake, and questionable. International Journal of Cultural Property, 26(3), 285–304.
Gerstenblith, P. (2020). Provenience and provenance intersecting with international law in the market for antiquities. North Carolina Journal of International Law, 45(2), 457–496.
Greenland, F., Marrone, J. V., Topçuoglu, O., & Vorderstrasse, T. (2019). A site-level market model of the antiquities trade. International Journal of Cultural Property, 26(1), 21–47.
Kersel, M. M. (2007). Transcending borders: Objects on the move. Archaeologies: Journal of the World Archaeological Congress, 3(2), 81–98.
Mackenzie, S., & Davis, T. (2014). Temple looting in Cambodia: Anatomy of a statue trafficking network. British Journal of Criminology, 54(7), 722–740.
Marrone, J. V. (2018). Quantifying the supply chain for Near Eastern antiquities in times of war and conflict. Journal of Cultural Heritage, 33, 278–284.
Molm, L. D., Schaefer, D., & Collett, J. L. (2009). Fragile and resilient trust: Risk and uncertainty in negotiated and reciprocal exchange. Sociological Theory, 27(1), 1–32. https://doi.org/10.1111/j.1467-9558.2009.00336.x
Muscarella, O. W. (1977). ‘Ziwiye’ and Ziwiye: The forgery of a provenience. Journal of Field Archaeology, 4(2), 197–219.
Polk, K. (2014). The global trade in antiquities: Some new directions? In L. Grove & S. Thomas (Eds.), Heritage and crime: Prospects, progress, and prevention (pp. 206–223). Palgrave Macmillan.
Reid, E., Hsinchun, C., & Xu, J. (2007). Social network analysis for terrorism research. In H. Chen, T. S. Raghu, R. Ramesh, A. Vinze, & D. Zeng (Eds.), Handbooks in information systems, book 2: National security (pp. 243–270). Elsevier.
Rose, J. C., & Burke, D. L. (2004). Making money from buried treasure. Culture Without Context, 14, 4–8.
Topçuoğlu, O., & Vorderstrasse, T. (2019). Small finds, big values: Cylinder seals and coins from Iraq and Syria on the online market. International Journal of Cultural Property, 26(3), 239–263.
Uzzi, B. (1997). Social structure and competition in interfirm networks: The paradox of embeddedness. Administrative Science Quarterly, 42(1), 35–67.
Von Lampe, K., & Johansen, P. O. (2004). Organized crime and trust: On the conceptualization and empirical relevance of trust in the context of criminal networks. Global Crime, 6(2), 159–184. https://doi.org/10.1080/17440570500096734
Watson, P. (1997). Sotheby’s: The inside story. Bloomsbury.
Watson, P., & Todeschini, C. (2007). The Medici conspiracy: The illicit journey of looted antiquities—From Italy’s tomb raiders to the world’s greatest museums. PublicAffairs.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Fabiani, M.D., Marrone, J.V. (2021). Transiting Through the Antiquities Market. In: Oosterman, N., Yates, D. (eds) Crime and Art. Studies in Art, Heritage, Law and the Market, vol 1. Springer, Cham. https://doi.org/10.1007/978-3-030-84856-9_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-84856-9_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-84855-2
Online ISBN: 978-3-030-84856-9
eBook Packages: Law and CriminologyLaw and Criminology (R0)