Bibliography
- Albert, R., and A.-L. Barabási. “Statistical Mechanics of Complex Networks.” Reviews of Modern Physics 74, no. 1 (2002): 47–97. doi:https://doi.org/10.1103/RevModPhys.74.47.
- Antonopolous, G. A. “Cigarette Smuggling: A Case Study of A Smuggling Network in Greece.” European Journal of Crime, Criminal Law and Criminal Justice 14, no. 3 (2006): 239–255. doi:https://doi.org/10.1163/157181706778526504.
- Baker, W. E., and R. R. Faulkner. “The Social Organization of Conspiracy: Illegal Networks in the Heavy Electrical Equipment Industry.” American Sociological Review 58, no. 6 (1993): 837–860. doi:https://doi.org/10.2307/2095954.
- Berlusconi, G. “Do All the Pieces Matter? Assessing the Reliability of Law Enforcement Data Sources for the Network Analysis of Wire Taps.” Global Crime 14, no. 1 (2013): 61–81. doi:https://doi.org/10.1080/17440572.2012.746940.
- Bouchard, M. “On the Resilience of Illegal Drug Markets.” Global Crime 8, no. 4 (2007): 325–344. doi:https://doi.org/10.1080/17440570701739702.
- Bright, D. A., R. Brewer, and C. Morselli. “Using Social Network Analysis to Study Crime: Navigating the Challenges of Criminal Justice Records.” Social Networks 66 (2021): 50–64. doi:https://doi.org/10.1016/j.socnet.2021.01.006.
- Bright, D. A., and J. J. Delaney. “Evolution of a Drug Trafficking Network: Mapping Changes in Network Structure and Function across Time.” Global Crime 14, no. 2–3 (2013): 238–260.
- Bright, D. A., C. Greenhill, T. Britz, A. Ritter, and C. Morselli. “Criminal Network Vulnerabilities and Adaptations.” Global Crime 18, no. 4 (2017): 424–441. doi:https://doi.org/10.1080/17440572.2017.1377614.
- Bright, D. A., J. Koskinen, and A. E. Malm. “Illicit Network Dynamics: The Formation and Evolution of a Drug Trafficking Network.” Journal of Quantitative Criminology 35 (2019): 237–258. doi:https://doi.org/10.1007/s10940-018-9379-8.
- Butts, C. T. sna: Tools for Social Network Analysis (version 2.6). R package, 2020. https://CRAN.R-project.org/package=sna
- Calderoni, F. “The Structure of Drug Trafficking Mafias: The ‘Ndrangheta and Cocaine.” Crime, Law, and Social Change 58, no. 3 (2012): 321–349. doi:https://doi.org/10.1007/s10611-012-9387-9.
- Campana, P. “Eavesdropping on the Mob: The Functional Diversification of Mafia Activities across Territories.” European Journal of Criminology 8, no. 3 (2011): 213–228. doi:https://doi.org/10.1177/1477370811403442.
- Campana, P., and F. Varese. “Listening to the Wire: Criteria and Techniques for the Quantitative Analysis of Phone Intercepts.” Trends in Organized Crime 15, no. 1 (2012): 13–30. doi:https://doi.org/10.1007/s12117-011-9131-3.
- Campana, P., and F. Varese. “Cooperation in Criminal Organisations: Kinship and Violence as Credible Commitments.” Rationality and Society 25, no. 3 (2013): 263–289. doi:https://doi.org/10.1177/1043463113481202.
- Carley, K. M. “Destabilization of Covert Networks.” Computational and Mathematical Organization Theory 12 (2006): 51–66. doi:https://doi.org/10.1007/s10588-006-7083-y.
- Carley, K. M., J.-S. Lee, and D. Krackhardt. “Destabilizing Networks.” Connections 24, no. 3 (2002): 79–92.
- Cavallaro, L., A. Ficara, P. De Meo, G. Fiumara, S. Catanese, O. Bagdasar, S. Wei, and A. Liotta. “Disrupting Resilient Criminal Networks through Data Analysis: The Case of Sicilian Mafia.” PLOS ONE 15, no. 8 (2020): e0236476. doi:https://doi.org/10.1371/journal.pone.0236476.
- Dickenson, M. “The Impact of Leadership Removal on Mexican Drug Trafficking Organizations.” Journal of Quantitative Criminology 30, no. 4 (2014): 651–676. doi:https://doi.org/10.1007/s10940-014-9218-5.
- Duijn, P. A. C., V. Kashirin, and P. M. A. Sloot. “The Relative Ineffectiveness of Criminal Network Disruption.” Scientific Reports 4 (2014): 4238. doi:https://doi.org/10.1038/srep04238.
- Duxbury, S. W., and D. L. Haynie. “Criminal Network Security: An Agent-Based Approach to Evaluating Network Resilience.” Criminology 57, no. 2 (2019): 314–342. doi:https://doi.org/10.1111/1745-9125.12203.
- Eilstrup-Sangiovanni, M., and C. Jones. “Assessing the Dangers of Illicit Networks: Why al-Qaida May Be Less Threatening than Many Think.” International Security 33, no. 2 (2008): 7–44. doi:https://doi.org/10.1162/isec.2008.33.2.7.
- Erickson, B. H. “Secret Societies and Social Structure.” Social Forces 60, no. 1 (1981): 188–210. doi:https://doi.org/10.2307/2577940.
- Gambetta, D. “Mafia: The Price of Distrust.” In Trust: Making & Breaking Cooperative Relations, edited by D. Gambetta and . Oxford: Basic Blackwell 158–175 , 1988.
- Gambetta, D. Codes of the Underworld: How Criminals Communicate. Princeton & Oxford: Princeton University Press, 2009.
- Gill, P., J. Lee, K. R. Rethemeyer, J. Horgan, and V. Asal. “Lethal Connections: The Determinants of Network Connections in the Provitional Irish Republican Army, 1979-1998.” International Interactions 40, no. 1 (2014): 52–78. doi:https://doi.org/10.1080/03050629.2013.863190.
- Goodreau, S. M., J. A. Kitts, and M. Morris. “Birds of a Feather, or Friend of a Friend? Using Exponential Random Graph Models to Investigate Adolescent Social Networks.” Demography 46 (2009): 103–125. doi:https://doi.org/10.1353/dem.0.0045.
- Grund, T. U., and J. A. Densley. “Ethnic Homophily and Triad Closure: Mapping Internal Gang Structure Using Exponential Random Graph Models.” Journal of Contemporary Criminal Justice 31, no. 3 (2015): 354–370. doi:https://doi.org/10.1177/1043986214553377.
- Handcock, M. S., D. R. Hunter, C. T. Butts, S. M. Goodreau, P. N. Krivitsky, and M. Morris. ergm (Version 4.1.2). R package, 2021 https://CRAN.R-project.org/package=ergm.
- Helfstein, S., and D. Wright. “Covert or Convenient? Evolution of Terror Attack Networks.” Journal of Conflict Resolution 55, no. 5 (2011): 785–813. doi:https://doi.org/10.1177/0022002710393919.
- Hunter, D. R., S. M. Goodreau, and M. S. Handcock. “Goodness of Fit of Social Network Models.” Journal of the American Statistical Association 103, no. 481 (2008): 248–258. doi:https://doi.org/10.1198/016214507000000446.
- Hunter, D. R., M. S. Handcock, C. T. Butts, S. M. Goodreau, and M. Morris. “Ergm: A Package to Fit, Simulate and Diagnose Exponential-Family Models for Networks.” Journal of Statistical Software 24, no. 3 (2008). doi:https://doi.org/10.18637/jss.v024.i03.
- Kleemans, E. R., and H. van de Bunt. “The Social Embeddedness of Organized Crime.” Transnational Organized Crime 5, no. 1 (1999): 19–36.
- Krebs, V. E. “Mapping Networks of Terrorist Cells.” Connections 24, no. 3 (2001): 43–52.
- Lusher, D., J. Koskinen, and G. Robins, eds. Exponential Random Graph Models for Social Networks: Theory, Methods, and Applications. Cambridge: Cambridge University Press, 2013.
- Malm, A., and G. Bichler. “Using Friends for Money: The Positional Importance of Money-Launderers in Organized Crime.” Trends in Organized Crime 16, no. 4 (2013): 365–381. doi:https://doi.org/10.1007/s12117-013-9205-5.
- Malm, A. E., and G. M. Bichler. “Networks of Collaborating Criminals: Assessing the Structural Vulnerability of Drug Markets.” Journal of Research in Crime and Delinquency 48, no. 2 (2011): 271–297. doi:https://doi.org/10.1177/0022427810391535.
- Malm, A. E., G. M. Bichler, and S. Van De Walle. “Comparing the Ties that Bind Criminal Networks: Is Blood Thicker than Water?’.” Security Journal 23, no. 1 (2010): 52–74. doi:https://doi.org/10.1057/sj.2009.18.
- McCarthy, B., J. Hagan, and L. E. Cohen. “Uncertainty, Cooperation, and Crime: Understanding the Decision to Co-Offend.” Social Forces 77, no. 1 (1998): 155–184. doi:https://doi.org/10.2307/3006013.
- McMillan, C., D. Felmlee, and D. Braines. “Dynamic Patterns of Terrorist Networks: Efficiency and Security in the Evolution of Eleven Islamic Extremist Attack Networks.” Journal of Quantitative Criminology 36 (2020): 559–581. doi:https://doi.org/10.1007/s10940-019-09426-9.
- Morselli, C. Inside Criminal Networks. New York, NY: Springer, 2009.
- Morselli, C., C. Giguere, and K. Petit. “The Efficiency/Security Trade-off in Criminal Networks.” Social Networks 29, no. 1 (2007): 143–153. doi:https://doi.org/10.1016/j.socnet.2006.05.001.
- Morselli, C., and K. Petit. “Law-Enforcement Disruption of a Drug Importation Network.” Global Crime 8, no. 2 (2007): 109–130. doi:https://doi.org/10.1080/17440570701362208.
- Ouellet, M., M. Bouchard, and M. Hart. “Criminal Collaboration and Risk: The Drivers of Al Qaeda’s Network Structure before and after 9/11.” Social Networks 51 (2017): 171–177. doi:https://doi.org/10.1016/j.socnet.2017.01.005.
- Paoli, L. Mafia Brotherhoods: Organized Crime, Italian Style. (Original edition: “Fratelli di Mafia: Cosa Nostra e ‘Ndrangheta”, Il Mulino, Bologna, 2000). New York, NY: Oxford University Press, 2003.
- Paoli, L., and P. Reuter. “Drug Trafficking and Ethnic Minorities in Western Europe.” European Journal of Criminology 5, no. 1 (2008): 13–37. doi:https://doi.org/10.1177/1477370807084223.
- R Core Team. R: A Language and Environment for Statistical Computing (version 4.1.1). Vienna, Austria: R Foundation for Statistical Computing, 2021. https://www.R-project.org
- Robins, G. “Understanding Individual Behaviors within Covert Networks: The Interplay of Individual Qualities, Psychological Predispositions and Network Effects.” Trends in Organized Crime 12, no. 2 (2009): 166–187. doi:https://doi.org/10.1007/s12117-008-9059-4.
- Robins, G., P. Pattison, Y. Kalish, and D. Lusher. “An Introduction to Exponential Random Graph (P*) Models for Social Networks.” Social Networks 29 (2007): 173–191. doi:https://doi.org/10.1016/j.socnet.2006.08.002.
- Schwartz, D. M., and T. D. A. Rouselle. “Using Social Network Analysis to Target Criminal Networks.” Trends in Organized Crime 12, no. 2 (2009): 188–207. doi:https://doi.org/10.1007/s12117-008-9046-9.
- Smith, C. M., and A. V. Papachristos. “Trust Thy Crooked Neighbor: Multiplexity in Chicago Organized Crime Networks.” American Sociological Review 81, no. 4 (2016): 644–667. doi:https://doi.org/10.1177/0003122416650149.
- Sparrow, M. K. “Network Vulnerabilities and Strategic Intelligence in Law Enforcement.” International Journal of Intelligence and Counterintelligence 5, no. 3 (1991): 255–274. doi:https://doi.org/10.1080/08850609108435181.
- Tremblay, P. “Searching for Suitable Co-Offenders.” In Routine Activity and Rational Choice: Advances in Criminological Theory, edited by R. V. Clarke and M. Felson, 17–36. Vol. 5. Piscataway, NJ: Transaction Publishers, 1993.
- van de Bunt, H. G., D. Siegel, and D. Zaitch. “The Social Embeddedness of Organized Crime.” In The Oxford Handbook on Organized Crime, edited by L. Paoli, 321–339. Oxford: Oxford University Press, 2014.
- Vargas, R. “Criminal Group Embeddedness and the Adverse Effects of Arresting A Gang’s Leader: A Comparative Case Study.” Criminology 52, no. 2 (2014): 143–168. doi:https://doi.org/10.1111/1745-9125.12033.
- Von Lampe, K., and P. Ole Johansen. “Organized Crime and Trust: On the Conceptualization and Empirical Relevance of Trust in the Context of Criminal Networks.” Global Crime 6, no. 2 (2004): 159–184. doi:https://doi.org/10.1080/17440570500096734.
- Williams, P. “Transnational Criminal Networks.” In Networks and Netwars: The Future of Terror, Crime, and Militancy, edited by D. F. Ronfeldt and J. Arquilla, 61–97. Santa Monica, CA: RAND, 2001.
- Wood, G. “The Structure and Vulnerability of a Drug Trafficking Collaboration Network.” Social Networks 48 (2017): 1–9. doi:https://doi.org/10.1016/j.socnet.2016.07.001.
- Zhang, S. X., K. Chin, and J. Miller. “Women’s Participation in Chinese Transnational Human Smuggling: A Gendered Market Perspective.” Criminology 45, no. 3 (2007): 699–733. doi:https://doi.org/10.1111/j.1745-9125.2007.00085.x.