43 research outputs found

    Delinquent Peers Revisited: Does Network Structure Matter?

    No full text

    The responsiveness of criminal networks to intentional attacks: Disrupting darknet drug trade.

    No full text
    Physical, technological, and social networks are often at risk of intentional attack. Despite the wide-spanning importance of network vulnerability, very little is known about how criminal networks respond to attacks or whether intentional attacks affect criminal activity in the long-run. To assess criminal network responsiveness, we designed an empirically-grounded agent-based simulation using population-level network data on 16,847 illicit drug exchanges between 7,295 users of an active darknet drug market and statistical methods for simulation analysis. We consider three attack strategies: targeted attacks that delete structurally integral vertices, weak link attacks that delete large numbers of weakly connected vertices, and signal attacks that saturate the network with noisy signals. Results reveal that, while targeted attacks are effective when conducted at a large-scale, weak link and signal attacks deter more potential drug transactions and buyers when only a small portion of the network is attacked. We also find that intentional attacks affect network behavior. When networks are attacked, actors grow more cautious about forging ties, connecting less frequently and only to trustworthy alters. Operating in tandem, these two processes undermine long-term network robustness and increase network vulnerability to future attacks

    The responsiveness of criminal networks to intentional attacks: disrupting darknet drug trade.

    No full text
    Physical, technological, and social networks are often at risk of intentional attack. Despite the wide-spanning importance of network vulnerability, very little is known about how criminal networks respond to attacks or whether intentional attacks affect criminal activity in the long-run. To assess criminal network responsiveness, we designed an empirically-grounded agent-based simulation using population-level network data on 16,847 illicit drug exchanges between 7,295 users of an active darknet drug market and statistical methods for simulation analysis. We consider three attack strategies: targeted attacks that delete structurally integral vertices, weak link attacks that delete large numbers of weakly connected vertices, and signal attacks that saturate the network with noisy signals. Results reveal that, while targeted attacks are effective when conducted at a large-scale, weak link and signal attacks deter more potential drug transactions and buyers when only a small portion of the network is attacked. We also find that intentional attacks affect network behavior. When networks are attacked, actors grow more cautious about forging ties, connecting less frequently and only to trustworthy alters. Operating in tandem, these two processes undermine long-term network robustness and increase network vulnerability to future attacks

    Network integration within a prison-based therapeutic community

    No full text
    Prison-based therapeutic communities (TCs) are a widespread, effective way to help incarcerated individuals address substance abuse problems. The TC philosophy is grounded in an explicitly relational paradigm that entails building community and conditioning residents to increasingly take responsibility for leadership therein. Although TCs are based on cultivating a network that continuously integrates new residents, many common structural features can jeopardize TC goals and are hence discouraged (e.g., clustering, homophily). In light of this tension, analyzing the TC from a network perspective can offer new insights to its functioning, as well as to broader questions surrounding how networks integrate new members. In this study we examine a men's TC unit in a Pennsylvania prison over a 10-month span. Using data on residents' informal networks, we examine: (1) how well individuals integrate into the TC network across time, (2) what predicts how well residents integrate into the TC, and (3) how well the TC network structure adheres to theoretical ideals. Results suggest that individual integration is driven by a range of hypothesized factors and, with limited exceptions, the observed TC is able to foster a network structure and integrate residents consistent with TC principles. We discuss the implications of these results for evaluating TCs and for understanding the process of network integration
    corecore