Network Structure and Resilience of Mafia Syndicates
In this paper we present the results of the study of Sicilian Mafia organization by using Social Network Analysis. The study investigates the network structure of a Mafia organization, describing its evolution and highlighting its plasticity to interventions targeting membership and its resilience t...
Autor principal: | |
---|---|
Otros Autores: | ; ; ; |
Tipo de documento: | Electrónico Libro |
Lenguaje: | Inglés |
Publicado: |
2015
|
En: | Año: 2015 |
Acceso en línea: |
Volltext (kostenfrei) Volltext (kostenfrei) |
Verificar disponibilidad: | HBZ Gateway |
Palabras clave: |
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | 1865809047 | ||
003 | DE-627 | ||
005 | 20250116054844.0 | ||
007 | cr uuu---uuuuu | ||
008 | 231017s2015 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1016/j.ins.2016.02.027 |2 doi | |
035 | |a (DE-627)1865809047 | ||
035 | |a (DE-599)KXP1865809047 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
084 | |a 2,1 |2 ssgn | ||
100 | 1 | |a Agreste, Santa |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Network Structure and Resilience of Mafia Syndicates |
264 | 1 | |c 2015 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a In this paper we present the results of the study of Sicilian Mafia organization by using Social Network Analysis. The study investigates the network structure of a Mafia organization, describing its evolution and highlighting its plasticity to interventions targeting membership and its resilience to disruption caused by police operations. We analyze two different datasets about Mafia gangs built by examining different digital trails and judicial documents spanning a period of ten years: the former dataset includes the phone contacts among suspected individuals, the latter is constituted by the relationships among individuals actively involved in various criminal offenses. Our report illustrates the limits of traditional investigation methods like tapping: criminals high up in the organization hierarchy do not occupy the most central positions in the criminal network, and oftentimes do not appear in the reconstructed criminal network at all. However, we also suggest possible strategies of intervention, as we show that although criminal networks (i.e., the network encoding mobsters and crime relationships) are extremely resilient to different kind of attacks, contact networks (i.e., the network reporting suspects and reciprocated phone calls) are much more vulnerable and their analysis can yield extremely valuable insights.Comment: 22 pages, 10 figures, 1 tabl | ||
650 | 4 | |a Research | |
700 | 1 | |a Fiumara, Giacomo |e VerfasserIn |4 aut | |
700 | 1 | |a Ferrara, Emilio |e VerfasserIn |4 aut | |
700 | 1 | |a De Meo, Pasquale |e VerfasserIn |4 aut | |
700 | 1 | |a Catanese, Salvatore |e VerfasserIn |4 aut | |
856 | |u https://arxiv.org/pdf/1509.01608 |x unpaywall |z Vermutlich kostenfreier Zugang |h repository [oa repository (via OAI-PMH doi match)] | ||
856 | 4 | 0 | |u http://arxiv.org/abs/1509.01608 |x Verlag |z kostenfrei |3 Volltext |
856 | 4 | 0 | |u https://doi.org/10.1016/j.ins.2016.02.027 |x Resolving-System |z kostenfrei |3 Volltext |
935 | |a mkri | ||
951 | |a BO | ||
ELC | |a 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 4390847449 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1865809047 | ||
LOK | |0 005 20231017043626 | ||
LOK | |0 008 231017||||||||||||||||ger||||||| | ||
LOK | |0 035 |a (DE-2619)CORE18092226 | ||
LOK | |0 040 |a DE-2619 |c DE-627 |d DE-2619 | ||
LOK | |0 092 |o n | ||
LOK | |0 852 |a DE-2619 | ||
LOK | |0 852 1 |9 00 | ||
LOK | |0 935 |a core | ||
OAS | |a 1 | ||
ORI | |a SA-MARC-krimdoka001.raw |