Abstract
The pervasive diffusion of digital media enriches all courses of human action expanding the relational milieu in which they take place. From an analytical point of view, examining online networks constitutes a primary research task, especially in the domain of cybercrime studies. Thus, the traditional toolkit of social network analysis, already widely adopted across a range of social sciences, acquires new prominence and, at the same time, expands to cope with larger volume, variety, and velocity of online data. This chapter introduces some basic elements of social and semantic network analysis presenting some key features to characterize overall online structures; discussing community-finding procedures to explore networks at the meso level; and presenting different modes to measure single nodes prominence.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Basov, N., Breiger, R., & Hellsten, I. (2020). Socio-semantic and other dualities. Poetics,78(2020), 1–12.
Benigni, M., Joseph, K., & Carley, K. M. (2018). Mining online communities to inform strategic messaging: Practical methods to identify community level insights. Computational and Mathematical Organization Theory,24(2018), 224–242.
Blondel, V. D., Guillaume, J., Lambiotte, R., & Lefebvre, E. (2008). Fast unfolding of communities in large networks. Journal of Statistical Mechanics,2008, 1–12.
Bright, D., Brewer, R., & Morselli, C. (2021). Using social network analysis to study crime: Navigating the challenges of criminal justice records. Social Networks,66(2021), 50–64.
Bruinsma, G. J. N., & Bernasco, W. (2004). “Criminal groups and transnational illegal markets: a more detailed examination on the basis of social network theory.” Crime Law and Social Change, 41(1), 79–94.
Calderoni, F., Brunetto, D., & Piccardi, C. (2017). Communities in criminal networks: A case study. Social Networks,48, 116–125.
Carley, K. M. (2020). Social cybersecurity: AN emerging science. Computational and Mathematical Organization Theory,26(2020), 365–381.
Carley, K. M., & Kaufer, D. S. (1993). Semantic connectivity: An approach for analyzing symbols in semantic networks. Communication Theory,3(3), 183–213.
Carrington, P. J. (2011). Crime and social network analysis. In J. Scott & P. J. Carrington (Eds.), The Sage handbook of social network analysis (pp. 236–255). Sage.
Contractor, N., Monge, P., & Leonardi, P. (2011). Multidimensional networks and the dynamics of sociomateriality: Bringing technology inside the network. International Journal of Communication,5, 682–720.
Couldry, N., & Hepp, A. (2017). The mediated construction of reality. Polity Press.
De Smedt, T., De Pauw, G., & Van Ostaeyen, P. (2018). Automatic detection of online jihadist hate speech.
Diesner, J., & Carley, K. M. (2011). Semantic Networks. In G. Barnett (Ed.), Encyclopaedia of social networking (pp. 766–769). Sage.
Freeman, L. C. (2002 [1979]). Centrality in social networks: Conceptual clarifications. In J. Scott (Ed.), Social networks: Critical concepts in sociology(Vol. I, pp. 238–263). Routledge.
Froio, C., & Ganesh, B. (2019). The transnationalisation of far right discourse on Twitter: Issues and actors that cross borders in Western European democracies. European Societies,21(4), 513–539.
Gibbs, M., Meese, J., Arnold, M., Nansen, B., & Carter, M. (2015). #Funeral and Instagram: death, social media, and platform vernacular. Information, Communication & Society,18(3), 255–268.
González-Bailón, S., Borge-Holthoefer, J., & Moreno, Y. (2013). Broadcasters and hidden influentials in online protest diffusion. American Behavioral Scientist,57, 943–965.
Gould, R. V., & Fernandez, R. M. (1989). Structures of mediation: A formal approach to brokerage in transaction networks. Sociological Methodology,19, 89–126.
Haynie, D. L. (2002). Friendship networks and delinquency: The relative nature of per delinquency. Journal of Quantitative Criminology,18(2), 99–134.
Henry, N., & Powell, A. (2018). Technology-facilitated sexual violence: A literature review of empirical research. Trauma, Violence, & Abuse,19(2), 195–208.
Johnson, N. F., Leahy, R., Restrepo, N. J., Velasquez, N., Zheng, M., Manrique, P., Devkota, P., & Wuchty, S. (2019). Hidden resilience and adaptive dynamics of the global online hate ecology. Nature,573(7773), 261–265.
Klausen, Y. (2015). Tweeting the Jihad: Social media networks of western foreign fighters in Syria and Iraq. Studies in Conflict & Terrorism,38(1), 1–22.
Krebs, V. (2002). Uncloaking terrorist networks. First Monday, 7(4).
Laumann, E. O., Marsden, P. V., & Prensky, D. (1989). The boundary specification problem. In R. S. Burt & M. J. Minor (Eds.), Applied network analysis: A methodological introduction (pp. 18–34). Sage.
Leonardi, P. M. (2012). Materiality, sociomateriality, and socio-technical systems: What do these terms mean? How are they different? Do we need them? In P. M. Leonardi, B. A. Nardi, & J. Kallinikos (Eds.), Materiality and organizing: Social interaction in a technological world (pp. 25–48). Oxford University Press.
Lindekilde, L. (2016). Radicalization, de-radicalization, and counter-radicalization. In R. Jackson (Ed.), Routledge handbook of critical terrorism studies (pp. 248–260). Routledge.
Lotan, G., Graeff, E., Ananny, M., Gaffney, D., Pearce, I., & d. boyd (2011). The revolutions were tweeted: Information flows during the 2011 Tunisian and Egyptian revolutions. International Journal of Communication, 5(2011), 1375–1405.
Marres, N. (2017). Digital sociology. Polity Press.
Martellozzo, E., & Jane, E. A. (2017). Introduction: Victims of cybercrime on the small ‘I’ internet. In E. Martellozzo & E. A. Jane (Eds.), Cybercrime and its victims. Routledge.
Massanari, A. (2017). #Gamergate and the fappening: How Reddit’s algorithm, governance, and culture support toxic technocultures. New Media and Society,19(3), 329–346.
Mathew, B., Saha, P., Tharad, H., Rajgaria, S., Singhania, P., Maity, S. K., Goyal, P., & Mukherje, A. (2019). Thou shalt not hate: Countering online hate speech. Proceedings of the International AAAI Conference on Web and Social Media,13, 369–380.
Mattoni, A., & Pavan, E. (2020). Activist media practices, alternative media and online digital traces: The case of YouTube in the Italian Se non ora, quando? Movement. In H. Stephansen & E. Treré (Eds.), Citizen media and practice currents, connections, challenges (pp. 152–168). Routledge.
McCulloh, I. A., & Carley, K. M. (2008). Social network change direction. CASOS Technical Report CMU-ISR-08-116. Pittsburgh, PA: Carnagie Mellon University.
Menini, S., Moretti, G., Corazza, M., Cabrio, E., Tonelli, S., & Villata, S. (2019). A system to monitor cyberbullying based on message classification and social network analysis. In Proceedings of the Third Workshop on Abusive Language Online (pp. 105–110).
Mislove, A., Marcon, M., Gummadi, M. P., Druschel, P., & Bhattacharjee, B. (2007). Measurement and analysis of online social networks. Proceedings of the 7th ACM SIGCOMM Conference on Internet measurement (pp. 29–42).
Morselli, C. (2009). Inside criminal networks. Springer Publishing.
Newman, M. E. J., & Girvan, M. (2004). Finding and evaluating community structure in networks. Physical Review,69(026113), 1–12.
Ouellet, M., & Hashimi, S. (2019). Criminal group dynamics and network methods. Methods of criminology and criminal justice research—Sociology of crime, law and deviance (Vol. 24, pp. 47–65).
Ouellet, M., Bouchard, M., & Charette, Y. (2017). One gang dies, another gains? The network dynamics of criminal group persistence. Criminology,57(2017), 5–33.
Padovani, C., & Pavan, E. (2016). Global governance and ICTs: Exploring online governance networks around gender and media. Global Networks,16(3), 350–371.
Pattillo, M. E. (1998). Sweet mothers and gangbangers: managing crime in a black middle-class neighborhood. Social Forces,76(3), 747–774.
Pavan, E. (2017). The integrative power of online collective action networks beyond protest: Exploring social media use in the process of institutionalization. Social Movement Studies, 16(4): 433–446.
Pavan, E., & Lavorgna, A. (2021). Promises and pitfalls of legal responses to image-based sexual abuse: Critical insights from the Italian case. In A. Powell, A. Flynn, & L. Sugiura (Eds.), The Palgrave handbook of gendered violence and technology. Palgrave.
Rainie, L., & Wellman, B. (2012). Networked: The new social operating system. The MIT Press.
Salganik, M. (2018). Bit by bit: Social research in the digital age. Princeton University Press.
Traag, V. A., Waltman, L., & van Eck, L. J. (2019). “From Louvain to Leiden: guaranteeing well-connected communities.” Scientific reports, 9(5233), 1–12.
Uyheng, J., & Carley, K. M. (2019). Bots and online hate during the COVID-19 pandemic: Case studies in the United States and the Philippines. Journal of Computational Social Science,3, 445–468.
Van der Hulst, R. C. (2011). Terrorist networks: The threat of connectivity. In J. Scott & P. J. Carrington (Eds.), The Sage handbook of social network analysis (pp. 256–270). Sage.
Wasserman, S., & Faust, K. (1994). Social network analysis: Methods and applications. Cambridge University Press.
Yuan, K., Lu, H., Liao, X. and Wang, X. (2018). Reading Thieves’ cant: Automatically identifying and understanding dark jargons from cybercrime marketplaces. In Proceedings of the 27th USENIX Security Symposium (pp. 1027–1041).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Pavan, E. (2021). Social and Semantic Online Networks. In: Lavorgna, A., Holt, T.J. (eds) Researching Cybercrimes. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-74837-1_13
Download citation
DOI: https://doi.org/10.1007/978-3-030-74837-1_13
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-030-74836-4
Online ISBN: 978-3-030-74837-1
eBook Packages: Law and CriminologyLaw and Criminology (R0)