Covert network data: a typology of effects, processes, practices and structures Kathryn Oliver, Gemma Edwards, Nick Crossley, Johan Koskinen, Martin Everett.

Slides:



Advertisements
Similar presentations
African Youth Day: Youth United in Action for Agenda 2063
Advertisements

Seed Grants and External Funding Dr. Kimberly A. Tyler Department of Sociology.
SOCI 5013: Advanced Social Research: Network Analysis Spring 2004.
1 Legal separation impact on individuals’ social networks in Italy Evidences from the European Community Household Panel Lorenzo Todesco Department of.
Covert Networks: Theories and Applications of Network Analysis Gemma Edwards, Kathryn Oliver, Martin Everett, Nick Crossley, Johan Koskinen, Chiara Broccatelli.
Friendship and Support. Overview of Friendship Nature of Friendship Rules of Friendship Theories of Friendship Balance Theory Developmental Theory Theories.
Scoping review to draw together data on safeguarding children and compare the position of England with that in other countries Emily Munro and Esme Manful.
PEER: Exploring the lives of sex workers in Tyne and Wear The PEER Research Team: The GAP project, Northumbria University and Peer Researchers.
PEER (Promoting Education, Empowerment and Research): Exploring the Lives of Sex Workers in Tyne and Wear Adele Irving and Dr Mary Laing.
Getting Connected: The Inaugural Seminar of the Laboratory for Applied Network Research Valentina Kuskova May 20, 2014 NRU HSE International Laboratory.
Sustainable lives in sustainable communities Living and working in suburban Australia Philippa Williams, Barbara Pocock, Ken Bridge & Jane Edwards Centre.
INTEGRATING BENEFICIARY FEEDBACK INTO EVALUATION- A STRUCTURED APPROACH Presentation to UKES Conference May 2015 Theme: Theory and practice of inclusion.
Data Use: How to Write a PLACE Report Priorities for Local AIDS Control Efforts.
Network Structure and Delinquency Within a Juvenile Gang.
Work, Meaning, and Multiple Identities
Actor Centrality Correlates to Project based Coordination Liaquat Hossain, Ph.D. Knowledge Management Research Lab
Research problem, Purpose, question
Group-associated child sexual exploitation: Exploring the networks Maureen Taylor 1 st Year PhD student.
Grooming: what parents should know
STUDYING SOCIETY REVISION
1 Introduction to Group Dynamics
 Quantitative research (experimental method)  Qualitative research (non-experimental method)  What’s the difference?  When to use which?
Effective Employer -Employee Relations
Delmar Learning Copyright © 2003 Delmar Learning, a Thomson Learning company Chapter 30 Family and Community Violence.
Don’t get spun! How to spot data torturing, and other tricks of the trade Elizabeth Pisani Vienna, 2010.
RESEARCH A systematic quest for undiscovered truth A way of thinking
Women’s Health Academic Centre Effect of migration and stressful life events on women’s mental health and quality of life Laura Nellums MSc, PhD Student.
London’s leading voice for volunteering Volunteering A Wider Perspective Hackney Volunteer Centre AGM 09/11/11 Linking to the discussion Can volunteering.
Parents of Young Offenders as Blameworthy Victims? Methodological Challenges and Solutions Daniel McCarthy Lecturer in Criminology University of Surrey.
Danielle Varda & Carrie Chapman University of Colorado at Denver, School of Public Affairs.
Program Evaluation and Logic Models
Learning journey Part 1: Welcome and introduction Part 2: Concepts, evidence, and good practice: Addressing gender-based violence and engaging men and.
EVENT LEVEL: Sex obtained through aggression will frequently be unprotected GLOBAL LEVEL: Men who have perpetrated sexual aggression will be more likely.
Introduction Smoking and Social Networks Joseph R. Pruis, Student Research Collaborator, Rosemary A. Jadack, PhD, RN, Professor Department Of Nursing,
What should we expect? Choice of a control group FETP India.
Human Services Integration Building More Effective Responses to Peoples’ Needs.
Safeguarding Tutorial The Manchester College 1. Aim of session: To raise awareness of Safeguarding Objectives: By the end of the session you will be able.
South Africa: Khayelitsha Youth violence Reduction Panel Study mid-study presentation Ian Edelstein Head of Communications Pretoria Regional Delegation.
Personal Budgets. Introduction Name Andrea Woodier Organisation Leicestershire County Council Telephone number address
An Evaluation of the Fathers’ Development Work Programme.
Support for family members and significant others.
Conflict Conflict is natural in marriage because of the challenges that individuals face in their lives together!
Sampling Choosing your participants for your research.
Interkulturelles Zentrum INTERCULTURAL DIALOG as a political process FRANJO STEINER.
Anita Hammerton-Reid, Director of Programmes Elisha Augustin, Project Manager.
Screen 1 of 20 Vulnerability Vulnerability Assessment LEARNING OBJECTIVES Define the purpose and scope of vulnerability assessment. Understand how vulnerability.
Intimacy Among Friends and changing Concepts of Love and Companionship Gerontology 410 Feb 2008.
Addiction Treatment in Israel: An Overview of Services Provision Iris Mordecovitch, MSW.
The EU Kids Online Project Leslie Haddon 10th Forum for Social Trends: Youth and Social Exclusion, Madrid, 12th-14th March, 2008.
Chapter 5. Gender Roles  - Most significant change, women now employed, even when they have children. If role of women change, then so do men.  - Work.
Street Violence (exchange/ Survival sex) Street Violence (exchange/ Survival sex) Street Violence (exchange/ Survival sex) Jeff Johnson, MSW Jeff Johnson,
IT2-GRU LjublJana – 8-9 October 2009 Makno Managing knowledge in intercultural learning communities Framework: Council of Europe 2004.
The sex workers’ movement in Europe and globally.
Social Sciences use research and data analysis to explain human behaviour – what people think, how and why they act the way they do
Hate Crime MARAC George Pothecary. AIMS Reduce the risk of harm to victims and families A forum for inter-agency information sharing Support for the victims.
C4EO – Ways of Working Heather Rushton, Planning and Performance 1.
ESSAY 1920s. Introduce DBQ Directions: The following question requires you to construct a coherent essay that integrates your interpretation the era and.
Exploring the impact of Changes in contact with Food for older womens’ Experience (CAFÉ) Fiona Poland, Kathleen Lane, Lee Hooper.
Chestnuts Primary School PREVENT Protecting our children and families from Extremism & Radicalisation Wednesday 27 th April 2015.
CRIMINAL LAW 1. Ahmed T. Ghandour.. CRIMES OF POWERFUL.
Social networking and career management skills Kane Needham & John Mowbray Careers guidance research workshop 3D Social Networking © Photo by: Potter,
Child Sexual Exploitation Kirstie King MSCB Learning and Development Officer.
 True or False 1.Differences in values & personality don’t really matter when choosing a dating partner. 2.There’s really nothing a teen can do to avoid.
CHILD SEXUAL EXPLOITATION. Child Sexual Exploitation is a form of sexual abuse that involves the manipulation and/or coercion of young people under.
Background  Substance abusers are at risk for HIV and other STIs.  Anal intercourse (AI) is riskier than vaginal intercourse.  Studies of AI have focused.
QUALITATIVE RESEARCH IN PERSPECTIVE. QUALITATIVE APPROACHES -Qualitative research is an interdisciplinary, transdisciplinary, and sometimes counterdisciplinary.
Formation of Romantic Relationships
Module 9 Designing and using EFGR-responsive evaluation indicators
Chapter 1 The Scientific Method
Child Sexual Exploitation - 7 Minute Briefing
Presentation transcript:

Covert network data: a typology of effects, processes, practices and structures Kathryn Oliver, Gemma Edwards, Nick Crossley, Johan Koskinen, Martin Everett

Covert network project 3 year project Aim to collect covert network data (freely available, in-house) Collate and test theories Develop new metrics and theories Thus far: – 200 hypotheses – 50 datasets (freely available)

Application of SNA to secret networks Secret communities amenable to study through relational methods Data on communications, attendance at events, pre- existing ties often available Focused primarily on criminal and terrorist networks Concepts such as ‘resilience’, ‘disruption’, ‘capacity Methodological work on boundary definition & missing data

Covert populations Heroin users Clubbers Men who have sex with men Swingers Terrorists Clients of sex workers Youth gangs Illegal immigrants Corrupt policemen Criminals Persecuted Jews Online fraudsters Drug dealers Child pornographers People with infectious diseases Suffragettes Militants Ravers Freemasons Cyclists Armed robbers Child sex offenders

Types of covert tie or ties in covert networks Knowing them Being related Exchanging money Being in the same gang Selling/buying sex or drugs Talking to Being arrested with Being abused by Sharing resources with (drugs, money, child porn etc) Committed fraud against Planning events with Being in the same place at the same time Communicating with Living near Sharing needles or sex partners Reporting to/managing Friends with Sexual contact Works with Migrated with Same genetic BBV Grassed on

What do we know about covert networks? Multiplicity of theories But little consensus Examples: density, centralisation

Theories

Covert networks are sparse Red indicates empirically tested Frame of reference? Compared with overt networks? Yes!No! Are sparse Krebs (2002) Demiroz & Kapucu (2012) Milward and Raab (2006) Natarajan (2006) Natarajan (2000) Gimenez-Salinas (2011) Baker and Faulkner 1993 Koschade 2002 Get denser over timeHelfstein and Wright (2011) Are denser where there are pre-existing ties Raab and Milward 2003 Krebs 2002 Are denser where there are shared aims and values Milward and Raab (2006) Provan and Milward (1995) Are denser for criminals than terrorists Morselli (2007) Are denser where risk is greater Enders and Su (2007)

Density

Centralisation YesNo covert networks are centralised Demiroz and Kapucu (2012) Baker and Faulkner (1993) Varese (2012) Crenshaw (2010) Stanford Gimenez-Salinas (2011) Cockbain (2011) Carley, Lee, Krackhardt (2002) Crenshaw (2010) Stanford Bouchard (2007) Gimenez-Salinas (2011) Become more decentralised over time Milward and Raab (2006) Helfstein and Wright (2011) Raab and Milward (2003) Become more centralised as risk decreases Demiroz and Kapucu (2012)

Centralisation Author’s interpretation

What do we know about covert networks? Multiplicity of theories But little consensus Examples: density, centralisation Are comparisons valid? Outstanding questions test theories on empirical datasets Explore differences – role of context, network aim, interaction type etc Compare with overt networks of similar characteristics

Types ofcovertnetworks Takes up little of ones life Takes up most of ones life Goes to sex parties every once in a while Full-time activist

Integrated into wider networks of whatever type of tie Segregated from wider networks of whatever type of tie Types ofcovertnetworks Takes up little of ones life Takes up most of ones life Militant factions Freemasons part of business communities

Integrated into wider networks of whatever type of tie Segregated from wider networks of whatever type of tie Actions controlled by network Actions controlled by individuals Types ofcovertnetworks Takes up little of ones life Takes up most of ones life Seeking out marital affair Tasked as suicide bomber

Integrated into wider networks of whatever type of tie Segregated from wider networks of whatever type of tie Individual aimsNetwork aims Actions controlled by network Actions controlled by individuals Types ofcovertnetworks Takes up little of ones life Takes up most of ones life e.g. votes for women Getting high

Integrated into wider networks of whatever type of tie Segregated from wider networks of whatever type of tie Individual aimsNetwork aims Actions controlled by network Network consequences Actions controlled by individuals Individual consequences Types ofcovertnetworks Takes up little of ones life Takes up most of ones life Arrest of all union members Being jailed

Integrated into wider networks of whatever type of tie Segregated from wider networks of whatever type of tie Individual aimsNetwork aims Actions controlled by network Network consequences Actions controlled by individuals Individual consequences Types ofcovertnetworks Takes up little of ones life Takes up most of ones life …Wherever you are on these axes affects network structure….

Integrated into wider networks of whatever type of tie Segregated from wider networks of whatever type of tie Individual aimsNetwork aims Actions controlled by network Network consequences Actions controlled by individuals Individual consequences Types ofcovertnetworks Takes up little of ones life Takes up most of ones life …Wherever you are on these axes affects network structure…. HOWEVER all of these are also factors affecting overt networks e.g. Being in a closed order

Therefore secrecy is the key characteristic of these networks

Where might secrecy happen? Covert aims (political, ideological, illegal) Covert identities (mafia boss, spies) Types of actions within covert network (e.g. communication) etc

Aim: to develop set of covertness variables and use to build hypotheses

e.g. predicting centralisation NetworkAbsorptionAims (1 = individual, 5 = group) Actions (1 = individual, 5 = group) Consequenc es (1 = individual, 5 = group) SegregationCentrality 1 (e.g. hijackers) 100%51180%Highly centralised 2 (swingers) 5%14210%Low And can compare with…. 3 (monks)100%51180%High 4 clubbers5%14210%Low

Covert networks Mitchell Centre We aim to: Collect covert network data and make freely available where possible Compare and test theories Develop concept of covertness as variable/set of variables? Recruitment, segregation, formation, dissolution as qualitative case studies Contact me:

Thanks Mitchell Centre for Social Network Analysis