Skip to main content

Case Study Sources and Designs

  • Chapter
  • First Online:
Inside Criminal Networks

Part of the book series: Studies of Organized Crime ((SOOC,volume 8))

  • 2942 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    A slightly modified version of Krebs’ (2001) study was published about a year later (see Krebs 2002). Though Krebs was more advanced in his data gathering (this later article included 26 more participants in the overall terrorist network), no details were offered to substantiate these data modifications. Our analysis therefore relies on the first article (Krebs 2001).

  2. 2.

    CERVO is an acronym for Contrôle de l’exportation et du récel des véhicules voles outré-mer, which translates into the control of stolen-vehicle exportation and resale.

  3. 3.

    The ACIIS is a system that is updated and shared by law-enforcement agencies across Canada.

  4. 4.

    Ucinet 6 (Borgatti , Everett , and Freeman 2002) was used to prepare the matrices, shape the sociograms, and generate the network analyses that appear throughout the book’s case studies. Although there are several network programs that are available for achieving these objectives, the Ucinet package is simple to learn and offers an impressive range of measures and statistical procedures for analyzing networks. More recent versions of this software integrate additional programs (NetDraw, Pajek, and Mage) that facilitate the reshaping of sociograms and expand the inventory of analytical options. Ucinet is also amongst the least expensive of network software packages.

  5. 5.

    Note that the street gang and Operation Springtime investigations were the only two that applied gangsterism legislation as a basis for arrests and accusations. Gangsterism is the Canadian version of the American RICO legislation. Individuals found guilty of such a crime are those who are proven to be part of an ongoing criminal organization (or gang in French), defined by article 467.1 of the Canadian Criminal Code as: a group, however organized, that (a) is composed of three or more persons in or outside Canada; and (b) has as one of its main purposes or main activities the facilitation or commission of one or more serious offences that, if committed, would likely result in the direct or indirect receipt of a material benefit, including a financial benefit, by the group or by any persons who constitute the group. Unlike traditional predicate crimes, gangsterism is a crime of association and such direct or indirect association is likely to increase the likelihood of arrest for a wider range of criminal-network participants.

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Morselli, C. (2009). Case Study Sources and Designs. In: Inside Criminal Networks. Studies of Organized Crime, vol 8. Springer, New York, NY. https://doi.org/10.1007/978-0-387-09526-4_2

Download citation

Publish with us

Policies and ethics