logo Hurry, Grab up to 30% discount on the entire course
Order Now logo

Ask This Question To Be Solved By Our ExpertsGet A+ Grade Solution Guaranteed

expert
Alexis JiangEducation
(5/5)

943 Answers

Hire Me
expert
Ernest BanisterComputer science
(5/5)

674 Answers

Hire Me
expert
StatAnalytica ExpertPhilosophy
(5/5)

641 Answers

Hire Me
expert
Ngozi EmeagwaliStatistics
(/5)

720 Answers

Hire Me
Econometrics
(5/5)

Who should be the main targets to capture in order to dismantle the organization

INSTRUCTIONS TO CANDIDATES
ANSWER ALL QUESTIONS
Work on a project that is inspired by the course exercises.
 
–The project is formulated in a way that you must solve it in a creative manner
 
–The dataset(s) to be used is(are) given,

Your Task

–Dataset must be analysed
 
–Approach justified
 
–Conclusions drawn
 
–Individual Written report (3 –4 pages)  
 
Structure of the written report (3 to 4 pages)
 
•  Introduction 
•  Data description + question you want to address 
•  Method 
•  Results 
•  Conclusions

Topic

Dismantle criminal network (you should make 5 projects)Data: Networks representing strengths of relationships among members of criminal networks (e.g. Gang in London, 2005-2009).  See bibliography for which analyses you can do with data, you can choose and be creative and original!!
 
Nodes are members, and the edge gives the  relationships

Task:

-Who should be the main targets to capture in order to dismantle the organization?
 
Grund, and J. Densley, "Ethnic homophily and triad closure: Mapping internal gang structure using exponential random graph models." Journal of Contemporary Criminal Justice 31(3), 354-370 (2015) Link
 
Extra questions asked in class:
 
As working on the data set for criminal networks, I, and the other students who were assigned with the same project, would like to raise the following question:
 
- Should we justify why we consider a specific approach rather than another one as well as their shortcomings/ limits? 
 
yes, that is the idea. 
 
- As far as I understood, we should apply the dynamic analysis instead of the static analysis. However, considering the dynamic approach, how can we take into account the "capacity of criminal networks to adapt" after arrests or activity disruptions? 
 
Usually, - as a first approximation - you consider that there is no adaptation, and that the network remains as it was - except for the removed node -. 
 
- Should we determine ourselves which approach to determine the most valuable targets? (most valuable nodes vs. functionality by example).
 
The point is that there is not single answer. You can follow multiple strategies. So, linked to your first question, once you have justified saying.. “In this study we consisder …. because ….”, you should follow that logic.
 
- Considering the high number of "hidden" nodes in terrorist organisation, to what extend should we apply the function to determine 'non-identified nodes' (actual network vs. targeter view) ? Should we simulate the links discovery to 20, 50, 80 or 100 % ? 
 
Use a small value and a large one
 
The other students are in copy of the email, as I am sure that despite the fact that datasets were randomised, your answers will be of great importance to all of us. 
 
Sure! I only wanted to randomise the networks to avoid that you obtain the same node ID as answer :)
 
(5/5)
Attachments:

Related Questions

. The fundamental operations of create, read, update, and delete (CRUD) in either Python or Java

CS 340 Milestone One Guidelines and Rubric  Overview: For this assignment, you will implement the fundamental operations of create, read, update,

. Develop a program to emulate a purchase transaction at a retail store. This  program will have two classes, a LineItem class and a Transaction class

Retail Transaction Programming Project  Project Requirements:  Develop a program to emulate a purchase transaction at a retail store. This

. The following program contains five errors. Identify the errors and fix them

7COM1028   Secure Systems Programming   Referral Coursework: Secure

. Accepts the following from a user: Item Name Item Quantity Item Price Allows the user to create a file to store the sales receipt contents

Create a GUI program that:Accepts the following from a user:Item NameItem QuantityItem PriceAllows the user to create a file to store the sales receip

. The final project will encompass developing a web service using a software stack and implementing an industry-standard interface. Regardless of whether you choose to pursue application development goals as a pure developer or as a software engineer

CS 340 Final Project Guidelines and Rubric  Overview The final project will encompass developing a web service using a software stack and impleme