Return to search

Going beyond secrecy : methodological advances for two-mode temporal criminal networks with Social Network Analysis

This thesis seeks to extend the application of Social Network Analysis (SNA) to temporal graphs, in particular providing new insights for the understanding of covert networks. The analyses undertaken reveal informative features and properties of individuals' affiliations under covertness that also illustrate how both individuals and events influence the network structure. The review of the literature on covert networks provided in the initial two chapters suggests the presence of some ambiguities concerning how authors define structural properties and dynamics of covert networks. Authors sometimes disagree and use their findings to explain opposite views about covert networks. The controversy in the field is used as a starting point in order to justify the methodological application of SNA to understand how individuals involved in criminal and illegal activities interact with each other. I attempt to use a deductive approach, without preconceived notions about covert network characteristics. In particular, I avoid considering covert networks as organisations in themselves or as cohesive groups. I focus on individuals and their linkages constructed from their common participation in illicit events such as secret meetings, bombing attacks and criminal operations. In order to tackle these processes I developed innovative methods for investigating criminals' behaviours over time and their willingness to exchange tacit information. The strategy implies the formulation of a network model in order to represent and incorporate in a graph three types of information: individuals, events, and the temporal dimension of events. The inclusion of the temporal dimension offers the possibility of adopting a more comprehensive theoretical framework for considering individuals and event affiliations. This thesis expands the analysis of bipartite covert networks by adopting several avenues to explore in this perspective. Chapter 3 proposes a different way to represent two-mode networks starting from the use of line-graphs, namely the bi-dynamic line-graph data representation (BDLG), through which it is possible to represent the temporal evolution of individual's trajectories. The following chapter 4 presents some reflections about the idea of cohesion and cohesive subgroups specific to the case of two-mode networks. Based on the affiliation matrices, the analysis of local clustering through bi-cliques offers an attempt to analyse the mechanism of selecting accomplices while taking into account time. Chapter 5 is concerned with the concept of centrality of individuals involved in flows of knowledge exchanges. The theoretical and analytical framework helps in elaborating how individuals share their acquired hands-on experiences with others by attending joint task activities over time. Chapter 6 provides an application of the approaches introduced in the preceding chapters to the specific case of the Noordin Top terrorist network. Here, the knowledge of experience flow centrality measure opens up a new way to quantify the transmission of information and investigate the formation of the criminal capital. Finally, the last Chapter 7 presents some future research extensions by illustrating the versatility of the proposed approaches in order to provide new insights for the understanding of criminals' behaviours.

Identiferoai:union.ndltd.org:bl.uk/oai:ethos.bl.uk:713585
Date January 2017
CreatorsBroccatelli, Chiara
ContributorsEverett, Martin
PublisherUniversity of Manchester
Source SetsEthos UK
Detected LanguageEnglish
TypeElectronic Thesis or Dissertation
Sourcehttps://www.research.manchester.ac.uk/portal/en/theses/going-beyond-secrecy-methodological-advances-for-twomode-temporal-criminal-networks-with-social-network-analysis(f0f91f79-7bc3-442c-a16b-e9cf44cc68c3).html

Page generated in 0.002 seconds