Exponential random graph models (ERGMs) are increasingly applied to observed network data and are central to understanding social structure and network processes. The chapters in this edited volume provide a self-contained, exhaustive account of the theoretical and methodological underpinnings of ERGMs, including models for univariate, multivariate, bipartite, longitudinal and social-influence type ERGMs. Each method is applied in individual case studies illustrating how social science theories may be examined empirically using ERGMs. The authors supply the reader with sufficient detail to specify ERGMs, fit them to data with any of the available software packages and interpret the results.
Written by a stellar team of experts, Analyzing Social Networks is a practical book on how to collect, visualize, analyze and interpret social network data with a particular emphasis on the use of the software tools UCINET and Netdraw.
The book includes a clear and detailed introduction to the fundamental concepts of network analyses, including centrality, subgroups, equivalence and network structure, as well as cross-cutting chapters that helpfully show how to apply network concepts to different kinds of networks.
Continue reading “Analyzing Social Networks”
Some of the most important international security threats stem from terror groups, criminal enterprises, and other violent non-state actors (VNSAs). Because these groups are often structured as complex, dark networks, analysts have begun to use network science to study them. However, standard network tools were originally developed to examine companies, friendship groups, and other transparent networks. The inherently clandestine nature of dark networks dictates that conventional analytical tools do not always apply. Data on dark networks is incomplete, inaccurate, and often just difficult to find. Moreover, dark networks are often organized to undertake fundamentally different tasks than transparent networks, so resources and information may follow different paths through these two types of organizations. Given the distinctive characteristics of dark networks, unique tools and methods are needed to understand these structures. Illuminating Dark Networks explores the state of the art in methods to study and understand dark networks.
Computers and the Internet play an increasingly pivotal role in daily life, making it vitally important to understand the dynamics of cybercrime and those victimized by it. The anthology Cybercrime and Criminological Theory: Fundamental Readings on Hacking, Piracy, Theft, and Harassment explores the predictors for participation in various forms of cybercrime and deviance, from common problems like media piracy, to more distinct offenses such as computer hacking. Most criminological theories were developed to account for street crimes, so it is unclear how these theories may apply to virtual offending. This text provides critical insight into the utility of multiple theories to account for cybercrimes.
Cybercrime and Criminological Theory gives direct insight into the rates and prevalence of cybercrime offenses using data sets from populations across the United States. It gives readers a fundamental understanding of, and appreciation for various forms of cybercrime, and outlines prospective predictors of both offending and victimization. The selected readings identify research questions that must be addressed in order to improve the legal, technical, and policy responses to cybercrimes.
Continue reading “Cybercrime and Criminological Theory: Fundamental Readings on Hacking, Piracy, Theft, and Harassment”
Cybercrime is a legal workbook for anyone involved in the rapidly developing area of cybercrime. It comprehensively covers: determining what conduct is considered a cybercrime; investigating improper cyber conduct; trying a cybercrime case as a prosecuting or defending attorney; and handling the international aspects of cybercrime. As technology grows increasingly complex, so does computer crime. In this third edition, Clifford leads a team of nationally known experts in cybercrime (gathered from the diverse fields of academia, private, and governmental practice) to unfold the legal mysteries of computer crime. The book explores the variety of crimes that involve computer technology and provides essential details on procedural and tactical issues associated with the prosecution and defense of a cybercrime. The authors' insight will be of great interest to criminal prosecution and defense attorneys, law enforcement officers, and students of computer or modern criminal law.