期刊文献+

犯罪组织结构的社会网络分析 被引量:16

Social network analysis of crime organization structures
原文传递
导出
摘要 为弥补由于实际数据缺乏而导致的犯罪组织研究所具有的局限性,采用网络建模的方法研究了不同类型犯罪组织的结构特性。基于复杂网络建模的方法建立了具有无标度特征、小世界特征和层次特征的犯罪组织网络,采用社会网络分析中的中心度方法识别组织中的关键成员,并利用网络成员间的连接性和移除一定数量成员后的网络密度变化值分别考察了不同犯罪组织结构的运行效率和安全性。结果表明:在无标度网络和层次结构网络的犯罪组织中,核心成员均可以在较短的时间内将信息传遍至整个组织,因此这2种组织结构相对于小世界网络具有较高的运行效率。在安全性方面,由于小世界网络的犯罪组织中的内部成员间具有较大的平均距离,因而成员间不易被孤立,组织的安全性较高,而无标度网络和层次结构网络的组织安全性则较差。因此,在打击犯罪组织的活动中应针对不同类型的犯罪组织结构制定合理的策略方能取得较好的效果。 Network models were used to study different kinds of crime organizations and their characters to solve the problem in crime organization research caused by limited crime data. Three topologies of crime organizations, small-world, scale-free and hierarchy, were constructed based on the complex network theory. The key members in the networks were identified using the centrality method in social network analysis. The efficiency and security of the networks were analyzed by investigating connections between members and variations of network density in condition of removing a certain number of members. The results demonstrate that in crime organizations having topologies of scale-free and hierarchy, the key members can send the information to the whole organization within limited steps, so the two organizations have better efficiency than that of small world. As to the security, the average distance between members in small-world is quite large, which makes the members hardly isolated with high security degree of the small world organization. As a comparison, the scale-free and hierarchy organizations are not so safe as the small-world organization. The results also show that reasonable strategies against crime organizations based on their topologies can result in satisfactory effects.
作者 陈鹏 袁宏永
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2011年第8期1097-1101,共5页 Journal of Tsinghua University(Science and Technology)
关键词 复杂网络 犯罪组织 社会网络分析 complex network crime organization social network analysis
  • 相关文献

参考文献12

  • 1Klerks P. The network paradigm applied to criminal organizations: Theoretical nitpicking or a relevant doctrine for investigations? Recent developments in the Netherlands [J]. Conzlections, 2001, 24(3) : 53 - 65.
  • 2Krebs V E. Mapping networks of terrorist cells [J]. Connections, 2002, 24(3) 43 - 52.
  • 3黄慧霞.跨境毒品犯罪组织结构的社会网络分析[J].中国人民公安大学学报(社会科学版),2010,26(1):29-40. 被引量:22
  • 4Farley J D. Breaking AI Qaeda cells: A mathematical analysis of counterterrorism operations (A guide for risk assessment and decision making)[J].Studies in Conflict & Terrorism, 2003, 26:399 411.
  • 5Morselli C, Giguere C, Petit K. The efficiency/security trade off in criminal networks [J].Social Networks, 2007, 29(1): 14;3-153.
  • 6Watts D J, Strogatz S H. Collective dynamics of small-world networks [J]. Nature, 1998, 393(6684): 440-442.
  • 7吴晔,肖井华,吴智远,杨俊忠,马宝军.手机短信网络的生长过程研究[J].物理学报,2007,56(4):2037-2041. 被引量:27
  • 8Barabdsi A, Albert R. Emergence of scaling in random networks [J].Nature, 1999, 286(5439): 509-512.
  • 9Borgatti S P, Everett M G, Freeman L C. Ucinet for Windows: Software for social network analysis[R]. Harvard, MA: Analytic Technologies, 2002.
  • 10Freeman L C. Centrality in social networks: Conceptual clarification [J]. Social Networks, 1979, 1: 215- 239.

二级参考文献84

共引文献360

同被引文献159

引证文献16

二级引证文献70

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部