53,415 research outputs found

    Exploring internal child sex trafficking networks using social network analysis

    Get PDF
    This article explores the potential of social network analysis as a tool in supporting the investigation of internal child sex trafficking in the UK. In doing so, it uses only data, software, and training already available to UK police. Data from two major operations are analysed using in-built centrality metrics, designed to measure a network’s overarching structural properties and identify particularly powerful individuals. This work addresses victim networks alongside offender networks. The insights generated by SNA inform ideas for targeted interventions based on the principles of Situational Crime Prevention. These harm-reduction initiatives go beyond traditional enforcement to cover prevention, disruption, prosecution, etc. This article ends by discussing how SNA can be applied and further developed by frontline policing, strategic policing, prosecution, and policy and research

    Do cyber-birds flock together? Comparing deviance among social network members of cyber-dependent offenders and traditional offenders

    No full text
    The distinct setting in which cyber-dependent crime takes place may reduce the similarity in the deviance of social network members. We test this assumption by analysing the deviance of the most important social contacts of cyber-dependent offenders and traditional offenders in the Netherlands (N = 344 offenders; N = 1131 social contacts). As expected, similarity in deviance is weaker for cyber-dependent crime. Because this is a strong predictor of traditional offending, this has important implications for criminological research and practice. Additionally, for both crime types the offending behaviour of a person is more strongly linked to the deviance of social ties if those ties are of the same gender and age, and if the offender has daily contact with them. Implications and future criminological research suggestions are discussed

    Social Network Intelligence Analysis to Combat Street Gang Violence

    Full text link
    In this paper we introduce the Organization, Relationship, and Contact Analyzer (ORCA) that is designed to aide intelligence analysis for law enforcement operations against violent street gangs. ORCA is designed to address several police analytical needs concerning street gangs using new techniques in social network analysis. Specifically, it can determine "degree of membership" for individuals who do not admit to membership in a street gang, quickly identify sets of influential individuals (under the tipping model), and identify criminal ecosystems by decomposing gangs into sub-groups. We describe this software and the design decisions considered in building an intelligence analysis tool created specifically for countering violent street gangs as well as provide results based on conducting analysis on real-world police data provided by a major American metropolitan police department who is partnering with us and currently deploying this system for real-world use

    The computer nose best

    Get PDF

    Faculty Research in Progress, 2018-2019

    Get PDF
    The production of scholarly research continues to be one of the primary missions of the ILR School. During a typical academic year, ILR faculty members published or had accepted for publication over 25 books, edited volumes, and monographs, 170 articles and chapters in edited volumes, numerous book reviews. In addition, a large number of manuscripts were submitted for publication, presented at professional association meetings, or circulated in working paper form. Our faculty\u27s research continues to find its way into the very best industrial relations, social science and statistics journal

    Online Child Sex Solicitation: Exploring the Feasibility of a Research 'Sting'

    Get PDF
    A small scale test of the integrity of Internet Web 2.0 social network sites was undertaken over several weeks in 2007. The fictional identities of four female underage children where posted on three network sites and later introduced to relay chat forums in order to explore the impact of apparent vulnerability on potential selection of Internet victims. Only one of the three social network sites in the study recognised that the postings violated child protection policies and subsequently closed down the underage postings. Two basic identities were created: one that engendered a needy and vulnerable characterisation of a child while the other identity was created to represent a happy and attached child character. The number of contacts and suspicious contacts were monitored to test assumptions about child ‘vulnerability’ and risks of unwanted sexual solicitations. The characters created also included either an avatar and/or contact details. These variants of the experiment showed that the inclusion of an image or access details increased the likelihood of contacts, including suspicious contact regardless of ‘vulnerability’. This small experiment noted that although vulnerable children with additional cues maybe at more risk all children who posted details about themselves on social network sites faced the risk of contact by predators. The need for further research and better means of regulating such sites was suggested

    Why forums? An empirical analysis into the facilitating factors of carding forums

    No full text
    Over the last decade, the nature of cybercrime has transformed from naive vandalism to profit-driven, leading to the emergence of a global underground economy. A noticeable trend which has surfaced in this economy is the repeated use of forums to operate online stolen data markets. Using interaction data from three prominent carding forums: Shadowcrew, Cardersmarket and Darkmarket, this study sets out to understand why forums are repeatedly chosen to operate online stolen data markets despite numerous successful infiltrations by law enforcement in the past. Drawing on theories from criminology, social psychology, economics and network science, this study has identified four fundamental socio-economic mechanisms offered by carding forums: (1) formal control and coordination; (2) social networking; (3) identity uncertainty mitigation; (4) quality uncertainty mitigation. Together, they give rise to a sophisticated underground market regulatory system that facilitates underground trading over the Internet and thus drives the expansion of the underground economy

    Towards effective practice in offender supervision

    Get PDF
    This paper has been prepared principally for the Performance Improvement Strategy Group - a group convened by the Community Justice Division of the Scottish Government to advise and assist in the development of criminal justice social work services in particular and of community justice more generally. The PISG comprises representatives of the Scottish Government's Community Justice Division, of the Effective Practice Unit, of the Association of Directors of Social Work, of the voluntary sector service providers in Scotland, of the Scottish Prison Service, of the Risk Management Authority and from various Scottish universities. Discussions between the chair and some of the members of the PISG charged with leading work-streams on accreditation, interventions and inspection, indicated the need for the provision of a summary of effective practice that was sensitive to the unique Scottish context for the community supervision of offenders. The paper aims to provide that summary and to develop some ideas around a Scottish model of effective practice in offender supervision; as such it is concerned principally with the roles and tasks of criminal justice social work staff rather than with the important but broader debates around community and criminal justice in Scotland
    corecore