Skip to main content

Social Network Analysis

  • Chapter
  • First Online:
Book cover Handbook of Quantitative Criminology

Abstract

Social networks have long been central to some of the most influential theories in criminology. For researchers interested in exploring social networks (or personal networks) and their relationship to crime, network analysis provides the leverage to answer questions in a more refined way than do nonrelational analyses. Network approaches are gaining popularity in criminology, but the formal use of network techniques and methods remains limited. After briefly discussing the background of network analysis, as well as important issues related to sampling, this chapter uses a hypothetical dataset to illustrate the utility of social network graphs and measures, both for theory and policy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    In contrast to a social network, a personal, or egocentric, network focuses on one node of interest (i.e., ego) and its alters (i.e., associates).

  2. 2.

    Similarly, nodes can be of many different types, including individuals, organizations, countries, and groups.

  3. 3.

    This hypothetical example is similar to the work of Natarajan (2006), which used wiretapping information to study network attributes of a heroin distribution group in New York.

  4. 4.

    In addition to adjacency matrices, there are also incident matrices, in which the rows are the nodes and the columns are incidents, events, or affiliations (i.e., the value in a cell would indicate whether a particular node was part of that specific incident, event, or affiliated with that specific group).

  5. 5.

    If the value of the tie does not reflect the strength of some relationship, but instead some combination of relationships (i.e., the network is multirelational), researchers also have the option of determining the density for the network across each type of relationship.

  6. 6.

    There are also n-cliques, which focus on geodesic distances (i.e., the shortest path between two nodes). A 1-clique would be a subgroup in which all geodesic distances among the members is 1 (i.e., a traditional clique). A 2-clique would be a subgroup in which nodes were connected to each other directly or indirectly through another node (thus, the largest geodesic distance is 2). For more information about n-cliques and other cohesive subgroups, see Scott (2000) and Wasserman and Faust (1994).

  7. 7.

    The six cliques contain the following nodes: (1) 3,7,9,11; (2) 3,7,9,13; (3) 2,3,5,11; (4) 7,9,15; (5) 7,11,14; and (6) 2,11,14.

References

  • Alter CF (1988) Function, form and change of juvenile justice systems. Child Youth Serv Rev 10:71–100

    Article  Google Scholar 

  • Braga AA, Kennedy DM, Waring EJ, Piehl AM (2001) Problem-oriented policing, deterrence, and youth violence: an evaluation of Boston’s Operation Ceasefire. J Res Crime Delinq 38:195–225

    Article  Google Scholar 

  • Bursik RJ, Grasmick HG (1993) Neighborhoods and crime: the dimensions of effective community control. Lexington Books, New York

    Google Scholar 

  • Burt RS (1992) Structural holes: the social structure of competition. Harvard University Press, Cambridge, MA

    Google Scholar 

  • Carrington P, Scott J, Wasserman S (2005) Models and methods in social network analysis. Cambridge University Press, New York

    Google Scholar 

  • Cartwright D, Harary F (1956) Structural balance: a generalisation of Heider’s theory. Psychol Rev 63:277–292

    Article  Google Scholar 

  • Coady WF (1985) Automated link analysis – artificial intelligence-based tool for investigators. Police Chief 52:22–23

    Google Scholar 

  • Coles N (2001) It’s not what you know – It’s who you know that counts. Analysing serious crime groups as social networks. Br J Criminol 41:580–594

    Google Scholar 

  • Curry GD, Thomas RW (1992) Community organization and gang policy response. J Quant Criminol 8:357–374

    Article  Google Scholar 

  • Davern M, Hachen DS (2006) The role of information and influence in social networks: examining the association between social network structure and job mobility. Am J Econ Sociol 65:269–293

    Article  Google Scholar 

  • Davis RH (1981) Social network analysis – An aid in conspiracy investigations. FBI Law Enforc Bull 50:11–19

    Google Scholar 

  • Erbring L, Young AA (1979) Individuals and social structure: contextual effects as endogenous feedback. Sociol Methods Res 17:396–430

    Article  Google Scholar 

  • Finckenauer JO, Waring EJ (1998) Russian mafia in America: immigration, culture, and crime. Northeastern University Press, Boston, MA

    Google Scholar 

  • Friedkin NE (1984) Structural cohesion and equivalence explanations of social homogeneity. Sociol Methods Res 12:235–261

    Article  Google Scholar 

  • Granovetter M (1973) The strength of weak ties. Am J Sociol 81:1287–1303

    Article  Google Scholar 

  • Gustafson LFJ (1997) An historical and network analysis of the juvenile justice system in the Austin, Texas, metropolitan area. University Microfilms International, Ann Arbor, MI

    Google Scholar 

  • Hagan J (1993) The social embeddedness of crime and unemployment. Criminology 31:465–491

    Article  Google Scholar 

  • Harary F, Norman R, Cartwright D (1965) Structural models: an introduction to the theory of directed graphs. Wiley, New York

    Google Scholar 

  • Haynie DL (2001) Delinquent peers revisited: does network structure matter? Am J Sociol 106:1013–1057

    Article  Google Scholar 

  • Haynie DL, Osgood DW (2005) Reconsidering peers and delinquency: how do peers matter? Soc Forces 84: 1109–1130

    Article  Google Scholar 

  • Hirschi T (1969) Causes of delinquency. University of California Press, Berkeley, CA

    Google Scholar 

  • Hochstetler A (2001) Opportunities and decisions: interactional dynamics in robbery and burglary groups. Criminology 39:737–764

    Article  Google Scholar 

  • Howlett JB (1980) Analytical investigative techniques: tools for complex criminal investigations. Police Chief 47: 42–45

    Google Scholar 

  • Huisman M, van Duijn MAJ (2005) Software for social network analysis. In: Carrington PJ, Scott J, Wasserman S (eds) Models and methods in social network analysis. Cambridge University Press, New York

    Google Scholar 

  • Kasarda JD, Janowitz M (1974) Community attachment in mass society. Am Sociol Rev 39:328–339

    Article  Google Scholar 

  • Kennedy DM, Braga AA, Piehl AM (1997) The (un)known universe: mapping gangs and gang violence in Boston. In: Weisburd D, McEwen T (eds) Crime mapping and crime prevention. Criminal Justice Press, Monsey, NY

    Google Scholar 

  • Kennedy DM, Braga AA, Piehl AM, Waring EJ (2001) Reducing gun violence: The Boston gun project’s operation ceasefire. National Institute of Justice, Washington, DC

    Google Scholar 

  • Kennedy DM, Piehl AM, Braga AA (1996) Youth gun violence in Boston: gun markets, serious youth offenders, and a use reduction strategy. John F. Kennedy School of Government, Harvard University, Boston, MA

    Google Scholar 

  • Klein MW (1995) The American street gang. Oxford University Press, New York

    Google Scholar 

  • Knoke D, Kuklinski JH (1982) Network analysis. Sage, Thousand Oaks, CA

    Google Scholar 

  • Krohn MD, Thornberry TP (1993) Network theory: a model for understanding drug abuse among African-American and Hispanic youth. In: De la Rosa M, Adrados JLR (eds) Drug abuse among minority youth: advances in research methodology, NIDA Research Monograph 130. Department of Health and Human Services, Bethesda, MD

    Google Scholar 

  • Lin N (1982) Social resources and instrumental action. In: Marsden P, Lin N (eds) Social structure and network analysis. Sage, Beverly Hills, CA

    Google Scholar 

  • Lin N (1990) Social resources and social mobility: a structural theory of status attainment. In: Breiger RL (ed) Social mobility and social structure. Cambridge University Press, New York

    Google Scholar 

  • Maltz MD (1998) Visualizing homicide: a research note. J Quant Criminol 14:397–410

    Article  Google Scholar 

  • McGloin JM (2005) Policy and intervention considerations of a network analysis of street gangs. Criminol Public Policy 43:607–636

    Article  Google Scholar 

  • McGloin JM (2007) The organizational structure of street gangs in Newark, New Jersey: a network analysis methodology. J Gang Res 15:1–34

    Google Scholar 

  • McGloin JM, Piquero AR (2010) On the relationship between co-offending network redundancy and offending versatility. J Res Crime Delinq

    Google Scholar 

  • McGloin JM, Shermer LO (2009) Self-control and deviant peer structure. J Res Crime Delinq 46:35–72

    Article  Google Scholar 

  • Miller J (1980) Access to interorganizational networks as a professional resource. Am Sociol Rev 45:479–496

    Article  Google Scholar 

  • Moreno JL (1934) Who shall survive?. Beacon Press, New York

    Google Scholar 

  • Morris M (1993) Epidemiology and social networks: modeling structured diffusion. Sociol Methods Res 22:99–126

    Article  Google Scholar 

  • Morselli C, Tremblay P (2004) Criminal achievement, offender networks and the benefits of low self-control. Criminology 42:773–804

    Article  Google Scholar 

  • Natarajan M (2006) Understanding the structure of a large heroin distribution network: a quantitative analysis of qualitative data. J Quant Criminol 22:171–192

    Article  Google Scholar 

  • Osgood DW (1998) Interdisciplinary integration: building criminology by stealing from our friends. Criminologist 23:1, 3–5, 41

    Google Scholar 

  • Osgood DW, Wilson JK, O’Malley PM (1996) Routine activities and individual deviant behavior. Am Sociol Rev 5:635–655

    Article  Google Scholar 

  • Papachristos AV (2009) Murder by structure: dominance relations and the social structure of gang homicide in Chicago. Am J Sociol 115:74–128

    Article  Google Scholar 

  • Podolny JM, Baron J (1997) Social networks and mobility in the work place. Am Sociol Rev 62:673–694

    Article  Google Scholar 

  • Sampson RJ, Groves WB (1989) Community structure and crime: testing social disorganization theory. Am J Sociol 94:744–802

    Article  Google Scholar 

  • Sampson RJ, Raudenbush SW, Earls F (1997) Neighborhood and violent crime: a multilevel study of collective efficacy. Science 227:918–924

    Article  Google Scholar 

  • Sarnecki J (2001) Delinquent networks. Cambridge University Press, Cambridge, UK

    Book  Google Scholar 

  • Schreck CJ, Fisher BS, Miller JM (2004) The social context of violent victimization: a study of the delinquent peer effect. Justice Q 21:23–47

    Article  Google Scholar 

  • Scott J (2000) Social network analysis: a handbook, 2nd edn. Sage, London

    Google Scholar 

  • Shaw C, McKay HD (1931) Report on the causes of crime, Volume II. U.S. Government Printing Office, Washington, DC

    Google Scholar 

  • Snijders T (2005) Models for longitudinal network data. In: Carrington P, Scott J, Wasserman S (eds) Models and methods in social network analysis. Cambridge University Press, New York

    Google Scholar 

  • Sparrow MK (1991) The application of network analysis to criminal intelligence: an assessment of the prospects. Soc Networks 13:251–274

    Article  Google Scholar 

  • Stelfox P (1996) Gang violence: strategic and tactical options. Crown, Manchester

    Google Scholar 

  • Sutherland EH (1947) Principles of criminology, 4th edn. J.B. Lippincott, Philadelphia, PA

    Google Scholar 

  • Tita G, Riley JK, Greenwood P (2005) Reducing gun violence: operation ceasefire in Los Angeles, Research in Brief. National Institute of Justice, Washington, DC

    Google Scholar 

  • Warr M (2002) Companions in crime: the social aspects of criminal conduct. Cambridge University Press, Cambridge, UK

    Google Scholar 

  • Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, Cambridge, UK

    Google Scholar 

  • Wellman B (1983) Network analysis: some basic principles. Sociol Theory 1:155–200

    Article  Google Scholar 

  • Wellman B, Berkowitz SD (1988) Introduction: studying social structures. In: Wellman B, Berkowitz SD (eds) Social structures: a network approach. Cambridge University Press, Cambridge, UK

    Google Scholar 

  • Whyte WF (1943) Street corner society. University of Chicago Press, Chicago

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

McGloin, J.M., Kirk, D.S. (2010). Social Network Analysis. In: Piquero, A., Weisburd, D. (eds) Handbook of Quantitative Criminology. Springer, New York, NY. https://doi.org/10.1007/978-0-387-77650-7_11

Download citation

Publish with us

Policies and ethics