Keywords
game theory
graph theory
network analysis
criminal analysis
graph theory
network analysis
criminal analysis
How to Cite
Theory and policing practice of network analysis. (2022). Academic Journal of Internal Affairs, 70(1), 69-86. https://doi.org/10.38146/BSZ.2022.1.5
Abstract
The aim of our study is to highlight the usefulness of network analysis methods in the field of law enforcement, and that the future of this field depends on collaboration and productive cooperation of theory and practice. After a brief historical overview, we introduce the most important concepts related to network analysis and graph theory, and then present a possible resolution strategy for a mafia network. Finally, we provide an overview of the directions of network analysis that can be used in profiling.
Downloads
Download data is not yet available.
Similar Articles
- Csaba Orbán, Public security: A secondary effect for criminal investigation , Academic Journal of Internal Affairs: Vol. 65 No. 5 (2017)
- Richárd Szongoth, Dániel Vetter, International law enforcement cooperation in the field of cybercrime , Academic Journal of Internal Affairs: Vol. 66 No. 7-8 (2018)
- Péter Kővári, The Benefits of Using INTERPOL’s Criminal Databases – The Hungarian Perspective , Academic Journal of Internal Affairs: Vol. 71 No. 3.ksz (2023): Különszám
- Péter Olexa, Zágon Csaba, The scientometric analysis of body language research , Academic Journal of Internal Affairs: Vol. 71 No. 1 (2023)
- Csaba Ludányi , Arrest of a criminal organization engaged in money laundering , Academic Journal of Internal Affairs: Vol. 71 No. 9 (2023)
- Béla Blaskó, The Institute for Criminal Justice at the Law Enforcement Faculty , Academic Journal of Internal Affairs: Vol. 66 No. 11 (2018)
- Miklós Tihanyi, Dávid Papp, History of the Neighbourhood Police Officers’ Service 3. From political transition , Academic Journal of Internal Affairs: Vol. 70 No. 5 (2022)
- Kinga Sorbán, Law enforcement sciences and informatics , Academic Journal of Internal Affairs: Vol. 67 No. 11 (2019)
- Richárd Nagy, Investigating cyber related crime against property , Academic Journal of Internal Affairs: Vol. 66 No. 7-8 (2018)
- Viktor Halász, How Bitcoin work and how it can be seized in criminal procedures , Academic Journal of Internal Affairs: Vol. 66 No. 7-8 (2018)
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Klaudia Lohner, Special Investigative Support and Behavioural Analysis , Academic Journal of Internal Affairs: Vol. 72 No. 5 (2024)
- Klaudia Lohner, Criminal profiling – trough researches to crime scene investigation , Academic Journal of Internal Affairs: Vol. 69 No. 12 (2021)
- Klaudia Lohner, Zsombor Hermann, József Haller, Traces of sexual motivation at the crime scene: from criminal psychology to forensics , Academic Journal of Internal Affairs: Vol. 69 No. 10 (2021)
- Éva Rompos, Noémi Emőke Baráth, Zsóka Mária Bellavics, Klaudia Lohner, József Haller, The law enforcement neurobiology of the „bika” (bull) drug , Academic Journal of Internal Affairs: Vol. 69 No. 4 (2021)
- Klaudia Lohner, István Csomós, Risk analysis of potential terrorist offenders , Academic Journal of Internal Affairs: Vol. 70 No. 9 (2022)
- Klaudia Lohner, Arab nevek a rendvédelmi adatbázisokban – rendszerezés, értelmezés, átírás , Academic Journal of Internal Affairs: Vol. 67 No. 7-8 (2019)