Social network analysis applied to criminal networks: recent developments in Dutch law enforcement

PAC Duijn, PPHM Klerks - Networks and network analysis for defence and …, 2014 - Springer
This article examines the application of social network theory in Dutch law enforcement.
Increasing amounts of information about habitual lawbreakers and criminal networks are …

A review of research in illicit supply-chain networks and new directions to thwart them

R Anzoom, R Nagi, C Vogiatzis - IISE Transactions, 2021 - Taylor & Francis
Illicit trades have emerged as a significant problem to almost every government across the
world. Their gradual expansion and diversification throughout the years suggests the …

[PDF][PDF] Making the team: A guide for managers

LL Thompson, M Thompson - 2008 - leighthompson.com
Names: Thompson, Leigh L., author. Title: Making the team: a guide for managers/Leigh L.
Thompson, Kellogg School of Management, Northwestern University. Description: Sixth …

The relative ineffectiveness of criminal network disruption

PAC Duijn, V Kashirin, PMA Sloot - Scientific reports, 2014 - nature.com
Researchers, policymakers and law enforcement agencies across the globe struggle to find
effective strategies to control criminal networks. The effectiveness of disruption strategies is …

[图书][B] Computation and social science

C Cioffi-Revilla, C Cioffi-Revilla - 2017 - Springer
Social scientists have used computation since the days of the earliest digital computers.
What is the role of computation in contemporary Computational Social Science (CSS) theory …

[图书][B] Understanding dark networks: A strategic framework for the use of social network analysis

D Cunningham, S Everton, P Murphy - 2016 - books.google.com
Dark networks are the illegal and covert networks (eg, insurgents, jihadi groups, or drug
cartels) that security and intelligence analysts must track and identify to be able to disrupt …

Cooperative game theoretic centrality analysis of terrorist networks: The cases of jemaah islamiyah and al qaeda

RHA Lindelauf, HJM Hamers, BGM Husslage - European Journal of …, 2013 - Elsevier
The identification of key players in a terrorist organization aids in preventing attacks, the
efficient allocation of surveillance measures, and the destabilization of the corresponding …

Patrolling games

S Alpern, A Morton, K Papadaki - Operations research, 2011 - pubsonline.informs.org
A key operational problem for those charged with the security of vulnerable facilities (such
as airports or art galleries) is the scheduling and deployment of patrols. Motivated by the …

A game of horns-transnational flows of rhino horn

AM Hübschle - 2016 - wellbeingintlstudiesrepository.org
This dissertation (424 pages) addresses in great detail global rhino conservation and the
international efforts to protect the remaining rhino populations via international treaties …

Criminal network security: An agent‐based approach to evaluating network resilience

SW Duxbury, DL Haynie - Criminology, 2019 - Wiley Online Library
Criminal networks are frequently at risk of disruption through arrest and interorganizational
violence. Difficulties in designing empirical studies of criminal network recovery, however …