EconPapers    
Economics at your fingertips  
 

Covert Network Construction, Disruption, and Resilience: A Survey

Annamaria Ficara (), Francesco Curreri, Giacomo Fiumara, Pasquale De Meo and Antonio Liotta
Additional contact information
Annamaria Ficara: Department of Mathematical and Computer Science, Physical Sciences and Earth Sciences, University of Messina, 98166 Messina, Italy
Francesco Curreri: Department of Mathematical and Computer Science, Physical Sciences and Earth Sciences, University of Messina, 98166 Messina, Italy
Giacomo Fiumara: Department of Mathematical and Computer Science, Physical Sciences and Earth Sciences, University of Messina, 98166 Messina, Italy
Pasquale De Meo: Department of Ancient and Modern Civilizations, University of Messina, 98168 Messina, Italy
Antonio Liotta: Faculty of Computer Science, Free University of Bozen-Bolzano, 39100 Bolzano, Italy

Mathematics, 2022, vol. 10, issue 16, 1-43

Abstract: Covert networks refer to criminal organizations that operate outside the boundaries of the law; they can be mainly classified as terrorist networks and criminal networks. We consider how Social Network Analysis (SNA) is used to analyze such networks in order to attain a greater knowledge of criminal behavior. In fact, SNA allows examining the network structure and functioning by computing relevant metrics and parameters to identify roles, positions, features, and other network functioning that are not otherwise easily discovered at first glance. This is why Law Enforcement Agencies (LEAs) are showing growing interest in SNA, which is also used to identify weak spots and disrupt criminal groups. This paper provides a literature review and a classification of methods and real-case applications of disruption techniques. It considers covert network adaptability to such dismantling attempts, herein referred to as resilience. Critical problems of SNA in criminal studies are discussed, including data collection techniques and the inevitable incompleteness and biases of real-world datasets, with the aim of promoting a new research stream for both dismantling techniques and data collection issues.

Keywords: covert networks; dark networks; criminal networks; terrorist networks; network disruption; network resilience; human capital; social capital; graph theory; network centrality (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2022
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (1)

Downloads: (external link)
https://www.mdpi.com/2227-7390/10/16/2929/pdf (application/pdf)
https://www.mdpi.com/2227-7390/10/16/2929/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:10:y:2022:i:16:p:2929-:d:888073

Access Statistics for this article

Mathematics is currently edited by Ms. Emma He

More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-04-12
Handle: RePEc:gam:jmathe:v:10:y:2022:i:16:p:2929-:d:888073