Keywords
game theory
graph theory
network analysis
criminal analysis
graph theory
network analysis
criminal analysis
How to Cite
Theory and policing practice of network analysis. (2022). Academic Journal of Internal Affairs, 70(1), 69-86. https://doi.org/10.38146/BSZ.2022.1.5
Abstract
The aim of our study is to highlight the usefulness of network analysis methods in the field of law enforcement, and that the future of this field depends on collaboration and productive cooperation of theory and practice. After a brief historical overview, we introduce the most important concepts related to network analysis and graph theory, and then present a possible resolution strategy for a mafia network. Finally, we provide an overview of the directions of network analysis that can be used in profiling.
Downloads
Download data is not yet available.
Similar Articles
- Péter Kővári, The Benefits of Using INTERPOL’s Criminal Databases – The Hungarian Perspective , Academic Journal of Internal Affairs: Vol. 71 No. 11 (2023)
- István Kristóf, Suicide-caused death in Budapest: The role of the crime scene forensic pathologist , Academic Journal of Internal Affairs: Vol. 63 No. 9 (2015)
- Zoltán Hautzinger, International Opportunities for the Study and Development of Police Science , Academic Journal of Internal Affairs: Vol. 71 No. 3.ksz (2023): Különszám
- Sándor Fórizs, The 2014 Berlin crime statistics , Academic Journal of Internal Affairs: Vol. 64 No. 6 (2016)
- Gergely Gárdonyi, The achievements and developments in Hungarian crime scene investigation , Academic Journal of Internal Affairs: Vol. 64 No. 7-8 (2016)
- Ferenc Irk , Ecosystem network risks and liability issues , Academic Journal of Internal Affairs: Vol. 71 No. 10 (2023)
- Richárd Szongoth, Dániel Vetter, International law enforcement cooperation in the field of cybercrime , Academic Journal of Internal Affairs: Vol. 66 No. 7-8 (2018)
- Csaba Ludányi , Arrest of a criminal organization engaged in money laundering , Academic Journal of Internal Affairs: Vol. 71 No. 9 (2023)
- Petronella Deres , Characteristics of Illicit Access to Data and Crimes against Information Systems in Hungary between 2013 and 2021 , Academic Journal of Internal Affairs: Vol. 71 No. 10 (2023)
- Csaba Orbán, Public security: A secondary effect for criminal investigation , Academic Journal of Internal Affairs: Vol. 65 No. 5 (2017)
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Klaudia Lohner, Special Investigative Support and Behavioural Analysis , Academic Journal of Internal Affairs: Vol. 72 No. 5 (2024)
- Klaudia Lohner, Criminal profiling – trough researches to crime scene investigation , Academic Journal of Internal Affairs: Vol. 69 No. 12 (2021)
- Klaudia Lohner, Zsombor Hermann, József Haller, Traces of sexual motivation at the crime scene: from criminal psychology to forensics , Academic Journal of Internal Affairs: Vol. 69 No. 10 (2021)
- Éva Rompos, Noémi Emőke Baráth, Zsóka Mária Bellavics, Klaudia Lohner, József Haller, The law enforcement neurobiology of the „bika” (bull) drug , Academic Journal of Internal Affairs: Vol. 69 No. 4 (2021)
- Klaudia Lohner, István Csomós, Risk analysis of potential terrorist offenders , Academic Journal of Internal Affairs: Vol. 70 No. 9 (2022)
- Klaudia Lohner, Arab nevek a rendvédelmi adatbázisokban – rendszerezés, értelmezés, átírás , Academic Journal of Internal Affairs: Vol. 67 No. 7-8 (2019)