312
Views
9
CrossRef citations to date
0
Altmetric
Articles

Exploring Co-offending Networks by Considering Geographic Background: An Investigation of Electric Bicycle Thefts in Beijing

&
Pages 73-83 | Received 01 Dec 2016, Accepted 01 Feb 2017, Published online: 05 Jul 2017

Literature Cited

  • Alessio, S. J., and L. Stolzenberg. 2010. Do cities influence co-offending? Journal of Criminal Justice 38:711–19.
  • Berlusconi, G., F. Calderoni, N. Parolini, M. Verani, and C. Piccardi. 2016. Link prediction in criminal networks: A tool for criminal intelligence analysis. PLoS ONE 11 (4): e0154244.
  • Borgatti, S. P., M. G. Everett, and L. C. Freeman. 2002. Ucinet for Windows: Software for social network analysis. Cambridge, MA: Analytic Technologies.
  • Brantingham, P. J., and P. L. Brantingham. 1991. Environmental criminology. Prospect Heights, IL: Waveland.
  • Brantingham, P. J., P. L. Brantingham, and M. A. Andresen. 2016. The geometry of crime and crime pattern theory. In Environmental criminology and crime analysis. 2nd ed., ed. R. Wortley and M. Townsley, 98–115. London and New York: Routledge.
  • Brantingham, P. L., and P. J. Brantingham. 1993. Environment, routine, and situation: Toward a pattern theory of crime. In Routine activity and rational choice, ed. R. V. Clarke and M. Feslon, 259–94. New Brunswick, NJ: Transaction.
  • Carrington, P. J. 2009. Co-offending and the development of the delinquent career. Criminology 47:1295–1329.
  • ———. 2011. Crime and social network analysis. In The Sage handbook of social network analysis, ed. J. Scott and P. Carrington, 236–55. Thousand Oaks, CA: Sage.
  • Chan, K. W. 2010. The global financial crisis and migrant workers in China: “There is no future as a labourer; returning to the village has no meaning.” International Journal of Urban and Regional Research 34 (3): 659–77.
  • Chimbos, P., and C. Agocs. 1983. Kin and hometown networks as support systems for the immigration and settlement of Greek Canadians. Canadian Ethnic Studies/Etudes Ethniques au Canada 15 (2): 42.
  • Clarke, R. V., and M. Felson. 2011. The origins of the routine activity approach and situational crime prevention. In The origins of American criminology: Advances in criminological theory, ed. F. Cullen, C. Jonson, A. Myer, and F. Adler, 245–61. New Brunswick, NJ: Transaction.
  • Cohen, L. E., and M. Felson. 1979. Social change and crime rate trends: A routine activity approach. American Sociological Review 44 (4): 588–608.
  • Everett, M., and S. P. Borgatti. 2005. Extending centrality. In Models and methods in social network analysis, ed. P. J. Carrington, J. Scott, and S. Wasserman, 57–76. New York: Cambridge University Press.
  • Falk, M., J. Hüsler, and R. Reiss. 2010. Laws of small numbers: Extremes and rare events. New York: Springer.
  • Farley, J. D. 2003. Breaking Al Qaeda cells: A mathematical analysis of counterterrorism operations. A guide for risk assessment and decision making. Studies in Conflict & Terrorism 26 (6): 399–411.
  • Freeman, L. C. 1977. A set of measures of centrality based on betweenness. Sociometry 40 (1): 35–41.
  • ———. 1979. Centrality in social networks: Conceptual clarification. Social Networks 1:215–39.
  • Groff, E. R. 2007. Simulation for theory testing and experimentation: An example using routine activity theory and street robbery. Journal of Quantitative Criminology 23:75–103.
  • Gu, C., and J. Shen. 2003. Transformation of urban socio-spatial structure in socialist market economies: The case of Beijing. Habitat International 27 (1): 107–22.
  • Gu, S., L. Zheng, and S. Yi. 2007. Problems of rural migrant workers and policies in the new period of urbanization. China Population, Resources and Environment 17 (1): 1–6.
  • Hussain, D. M. A. 2007. Destabilization of terrorist networks through argument driven hypothesis model. Journal of Software 2 (6): 22–29.
  • Krebs, V. E. 2002. Mapping networks of terrorist cells. Connections 24 (3): 43–52.
  • Lantz, B., and R. Hutchison. 2015. Co-offender ties and the criminal career: The relationship between co-offender group structure and the individual offender. Journal of Research in Crime and Delinquency 52 (5): 658–90.
  • Liu, J. H. 2006. Modernization and crime patterns in China. Journal of Criminal Justice 34:119–30.
  • Liu, X., E. Patacchini, Y. Zenou, and L. F. Lee. 2015. Who is the key player? A network analysis of juvenile delinquency. Unpublished manuscript, Stockholm University, Stockholm, Sweden. http://www.ne.su.se/polopoly_fs/1.230906.1427808103!/menu/standard/file/Liu_Patacchini_Zenou_March_2015.pdf (last accessed 29 July 2016).
  • Liu, Y., S. He, F. Wu, and C. Webster. 2010. Urban villages under China's rapid urbanization: Unregulated assets and transitional neighbourhoods. Habitat International 34 (2): 135–44.
  • Liu, Y., Z. Li, and W. Breitung. 2012. The social networks of new-generation migrants in China's urbanized villages: A case study of Guangzhou. Habitat International 36 (1): 192–200.
  • Lu, Y. 2003. Getting away with the stolen vehicle: An investigation of journey-after-crime. The Professional Geographer 55 (4): 422–33.
  • McGloin, J. M., J. S. Christopher, A. R. Piquero, and S. Bacon. 2008. Investigating the stability of co-offending and co-offenders among a sample of youthful offenders. Criminology 46 (1): 155–88.
  • McGloin, J. M., and A. R. Piquero. 2010. On the relationship between co-offending network redundancy and offending versatility. Journal of Research in Crime and Delinquency 47 (1): 63–90.
  • McIllwain, J. S. 1999. Organized crime: A social network approach. Crime, Law and Social Change 32 (4): 301–23.
  • McPherson, M., L. Smith-Lovin, and J. M. Cook. 2001. Birds of a feather: Homophily in social networks. Annual Review of Sociology 27 (1): 415–44.
  • Orozco, M., and R. Rouse. 2013. Migrant hometown associations and opportunities for development: Community Development. Washington, DC: Migration Policy Institute.
  • Ozgul, F., and Z. Erdem. 2012. Detecting criminal networks using social similarity. In Advances in social networks analysis and mining (ASONAM), 2012 IEEE/ACM International Conference, 581–85. Piscataway, NJ: IEEE.
  • Radil, S. M., C. Flint, and G. E. Tita. 2010. Spatializing social networks: Using social network analysis to investigate geographies of gang rivalry, territoriality and violence in Los Angeles. Annals of the Association of American Geographers 100 (2): 307–26.
  • Reiss, A. J. 1988. Co-offending and criminal careers. Crime and Justice 10:117–70.
  • Reyns, B. W. 2016. Environmental criminology: Evolution, theory and practice. Security Journal 29 (3): e1–e3.
  • Rostami, A., and H. Mondani. 2015. The complexity of crime network data: A case study of its consequences for crime control and the study of networks. PLoS ONE 10 (3): e0119309.
  • Schaefer, D. R. 2012. Youth co-offending networks: An investigation of social and spatial effects. Social Networks 34:141–49.
  • Temin, P. 1980. Modes of behavior. Journal of Economic Behavior & Organization 1 (2): 175–95.
  • Xu, J., and H. Chen. 2008. The topology of dark networks. Communications of the ACM 51 (10): 58–65.
  • Yoshiharu, M., and O. Yukio. 2009. Analyzing covert social network foundation behind terrorism disaster. International of Journal of Services Sciences 2:125–41.
  • Zheng, S., F. Long, C. C. Fan, and Y. Gu. 2009. Urban villages in China: A 2008 survey of migrant settlements in Beijing. Eurasian Geography and Economics 50 (4): 425–46.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.