43 research outputs found

    Delinquent Peers Revisited: Does Network Structure Matter?

    No full text

    The responsiveness of criminal networks to intentional attacks: Disrupting darknet drug trade.

    No full text
    Physical, technological, and social networks are often at risk of intentional attack. Despite the wide-spanning importance of network vulnerability, very little is known about how criminal networks respond to attacks or whether intentional attacks affect criminal activity in the long-run. To assess criminal network responsiveness, we designed an empirically-grounded agent-based simulation using population-level network data on 16,847 illicit drug exchanges between 7,295 users of an active darknet drug market and statistical methods for simulation analysis. We consider three attack strategies: targeted attacks that delete structurally integral vertices, weak link attacks that delete large numbers of weakly connected vertices, and signal attacks that saturate the network with noisy signals. Results reveal that, while targeted attacks are effective when conducted at a large-scale, weak link and signal attacks deter more potential drug transactions and buyers when only a small portion of the network is attacked. We also find that intentional attacks affect network behavior. When networks are attacked, actors grow more cautious about forging ties, connecting less frequently and only to trustworthy alters. Operating in tandem, these two processes undermine long-term network robustness and increase network vulnerability to future attacks

    The responsiveness of criminal networks to intentional attacks: disrupting darknet drug trade.

    No full text
    Physical, technological, and social networks are often at risk of intentional attack. Despite the wide-spanning importance of network vulnerability, very little is known about how criminal networks respond to attacks or whether intentional attacks affect criminal activity in the long-run. To assess criminal network responsiveness, we designed an empirically-grounded agent-based simulation using population-level network data on 16,847 illicit drug exchanges between 7,295 users of an active darknet drug market and statistical methods for simulation analysis. We consider three attack strategies: targeted attacks that delete structurally integral vertices, weak link attacks that delete large numbers of weakly connected vertices, and signal attacks that saturate the network with noisy signals. Results reveal that, while targeted attacks are effective when conducted at a large-scale, weak link and signal attacks deter more potential drug transactions and buyers when only a small portion of the network is attacked. We also find that intentional attacks affect network behavior. When networks are attacked, actors grow more cautious about forging ties, connecting less frequently and only to trustworthy alters. Operating in tandem, these two processes undermine long-term network robustness and increase network vulnerability to future attacks

    Network integration within a prison-based therapeutic community

    No full text
    Prison-based therapeutic communities (TCs) are a widespread, effective way to help incarcerated individuals address substance abuse problems. The TC philosophy is grounded in an explicitly relational paradigm that entails building community and conditioning residents to increasingly take responsibility for leadership therein. Although TCs are based on cultivating a network that continuously integrates new residents, many common structural features can jeopardize TC goals and are hence discouraged (e.g., clustering, homophily). In light of this tension, analyzing the TC from a network perspective can offer new insights to its functioning, as well as to broader questions surrounding how networks integrate new members. In this study we examine a men's TC unit in a Pennsylvania prison over a 10-month span. Using data on residents' informal networks, we examine: (1) how well individuals integrate into the TC network across time, (2) what predicts how well residents integrate into the TC, and (3) how well the TC network structure adheres to theoretical ideals. Results suggest that individual integration is driven by a range of hypothesized factors and, with limited exceptions, the observed TC is able to foster a network structure and integrate residents consistent with TC principles. We discuss the implications of these results for evaluating TCs and for understanding the process of network integration

    Where “Old Heads” Prevail: Inmate Hierarchy in a Men’s Prison Unit

    No full text
    Research of inmate social order is a once-vibrant area that receded just as American incarceration rates climbed and the country's carceral contexts dramatically changed. This study reengages inmate society with an abductive mixed methods investigation of informal status within a contemporary men's prison unit. The authors collect narrative and social network data from 133 male inmates housed in a unit of a Pennsylvania medium-security prison. Analyses of inmate narratives suggest that unit "old heads" provide collective goods in the form of mentoring and role modeling that foster a positive and stable peer environment. This hypothesis is then tested with Exponential Random Graph Models (ERGMs) of peer nomination data. The ERGM results complement the qualitative analysis and suggest that older inmates and those who have been on the unit longer are perceived by their peers as powerful and influential. Both analytical strategies point to the maturity of aging and the acquisition of local knowledge as important for attaining informal status in the unit. In sum, this mixed methods case study extends theoretical insights of classic prison ethnographies, adds quantifiable results capable of future replication, and points to a growing population of older inmates as important for contemporary prison social organization
    corecore