Marvin Krohn's Network Theory, Big Data, and Network Analysis: Studying Social Deviance in Social Media

Authors

1 Ph.D. Candidate in Sociology of Social Problems of Iran, Department of Social Sciences, Faculty of Humanities and Social Sciences, University of Mazandaran, Babolsar, Iran

2 Professor of Sociology, Department of Social Sciences, Faculty of Humanities and Social Sciences, University of Mazandaran, Babolsar, Iran

3 Professor of Communication and Sociology, Department of Communication, Faculty of Social Sciences, University of Tehran, Tehran, Iran

4 Associate Professor of Sociology, Department of Social Sciences, Faculty of Humanities and Social Sciences, University of Mazandaran, Babolsar, Iran

Abstract

Objectives: Today, we are facing the widespread and increasing influence of social media in various aspects of people's lives, as well as the occurrence of crime and deviant behaviors in the context of these media. Considering the network structure of social media and the possibility of accessing a huge amount of social data in the last decade, we have seen the increasing interest of researchers in various fields, including social sciences, to use big data and network analysis. Despite the acceptance of this approach by sociology of deviance and criminology abroad, we are facing a lack of such studies in the country. The purpose of this article is to introduce Marvin Krohn's network theory, the application of the network analysis approach, and the use of big data in explaining social deviance in the context of social media. Methods: This paper is a review article and the research method is documentary. Results: After reviewing concepts such as big data and social media, referring to deviance and crime in social media, the application of big data and network analysis in criminology and sociology of deviance is discussed. Considering the theoretical weakness in the current empirical literature, Marvin Krohn's network theory in the field of sociology of deviance is described as a framework that has the ability to overcome this deficiency. Some suitable tools for collecting, analyzing, and visualizing social media big data are introduced. Conclusion: The integration of the three fields of sociology of deviance by providing theoretical support, network analysis, and big data can be of great help in describing, explaining, and controlling deviant and criminal behaviors in social media. Therefore, it is suggested to establish interdisciplinary cooperation in domestic universities among researchers of social sciences, computer engineering, computer sciences, and data sciences.

Keywords


 
احمدی، حبیب، عباسی شوازی، محمدتقی، یادگاری، رامین و کرمی، فرشاد. (۱۳۹۶). مطالعه رابطه بین استفاده از رسـانه‌های مـدرن و تمـایل به بزهکـاری در بین نوجوانان دانش‌آموز (مطالعه دانش‌آموزان مقطع متوسطه شهر بستک). پژوهش‌های راهبردی مسائل اجتماعی ایران، ۶ (۴)، ۱۹، ۷۰-۵۳.
ایسپا، مرکز افکارسنجی دانشجویان ایران. (۱۴۰۰). برگرفته از http://ispa.ir/Default/Details/fa/3382/-78.5
برومیده، کامران. (۱۳۹۶). بررسی نقش شبکه‌های اجتماعی تلگرام و اینستاگرام در افزایش دادخواست طلاق با موضوع خیانت در دادگاه‌های خانواده شهر تهران (پایان‌نامه کارشناسی ارشد، دانشگاه آزاد اسلامی واحد تهران مرکزی، دانشکده علوم اجتماعی).
تولایی، روح‌الله، صباغی، زهرا و نظافتی، نوید. (۱۳۹۶). شناسایی و تحلیل فرصت‌ها و تهدیدهای شبکه‌های اجتماعی در فضای مجازی (مورد مطالعه، دانشجویان دانشگاه شهید بهشتی). تحقیقات فرهنگی ایران، 39، ۱۷۵-۱۵۳.
داودی دهاقانی، ابراهیم، شمسایی، مهدی و بارانی، محمد. (۱۳۹۷). رابطه شبکه‌های اجتماعی مجازی با ارتکاب جرائم خشن. پژوهش‌های اطلاعاتی و جنایی، ۱۳ (۱)، ۹۰-۶۵.
رضوی‌فرد، بهزاد، رباط جزی، محمدتقی و عمرانی، گلسا. (1397). پیشگیری از بزه‌‌دیدگی جنسی در شبکه‌های اجتماعی. مجله حقوقی دادگستری، 82(104)، ۶۵-۳۹.
شایگان، فریبا، رحیمی، محمد. (۱۳۹۵). بررسی جامعه‌شناختی رابطه مصرف شبکه‌های اجتماعی مجازی و گرایش به انحرافات اخلاقی (مورد مطالعه جوانان 15 تا 29 سال شهر تهران). مطالعات راهبردی ورزش و جوانان، 34، 193-۱۶۹.
شیرمحمدی، جلال. (۱۳۹۶). بررسی انگیزه‌های اصلی بزه‌کاران در فضای سایبری. مطالعات علوم سیاسی، حقوق و فقه، ۳ (۱)، ۱۳۶-۱۲۶.
عبدالرحمانی، رضا، حسین پور، جعفر، بشیری، هادی. (الف ۱۳۹۷). بررسی نقش مصرف شبکة پیام‌رسان تلگرام در گرایش جوانان به جرائم اخلاقی. پژوهش‌های انتظامی - اجتماعی زنان و خانواده، ‌۶ (۱)، ۱۲۲-۱۰۳.
عبدالرحمانی، رضا، حکیمی‌نیا، بهزاد، باقری، امیرسعید و سپیانی، مریم. (ب ۱۳۹۷). نقش شبکه‌های اجتماعی موبایلی در وقوع انواع جرائم اخلاقی. پژوهش‌های اطلاعاتی و جنایی، ۱۳ (۳)، ۱۸۸-۱۶۵.
عبداللهی نژاد، علیرضا و مجلسی، نوشین. (۱۳۹۶). خشونت کلامی در فضای مجازی، مطالعه موردی اظهارنظرهای دنبال کنندگان در صفحات اینستاگرام هنرمندان ایرانی. مطالعات رسانه‌های نوین،‌ ۴ (۱۳)، ۶۲-۱.
عدلی‌پور، صمد، اکبرپور، حامد و محکی، محمد. (۱۳۹۵). رابطه استفاده از فیس‌بوک و پایبندی به ارزش‌های خانوادگی و دینی با کجروی فرهنگی (مورد مطالعه: جوانان شهر تبریز). مطالعات راهبردی ورزش و جوانان، 34، ۱۵۰-۱۲۹.
قربانی، ابراهیم، کیانی، جواد، ابراهیمی، علی و مالکی، اسدالله. (۱۳۹۶). پیش‌بینی سهم فضای سایبر (شبکه‌های مجازی) در میزان گرایش به سوءمصرف مواد مخدر و روانگردان. پژوهش‌های اطلاعاتی و جنایی، ۱۲ (۲)، ۲۸-۹.
کللی خورموجی، راضیه. (۱۳۹۷). میزان و تأثیر استفاده از اپلیکیشن اینستاگرام بر دوستی نوجوانان دختر و پسر مقطع متوسطه شهر بوشهر. مطالعات ماهواره و رسانه‌های جدید، ۱۴‏، ۸۸-۶۵.
 
 
 
Ahmad, S., Ullah, A., Shafi, B., & Shah, M. (2014). The Role of Internet use in the Adoption of Deviant Behavior among University Students. Pakistan Journal of Criminology, 6(1), 133.
Al-khateeb, S., & Agarwal, N. (2019a). Deviance in social media. In Deviance in social media and social cyber forensics (pp. 1-26). Springer, Cham.
Al-khateeb, S., & Agarwal, N. (2019b). Tools and Methodologies for Data Collection, Analysis, and Visualization. In Deviance in Social Media and Social Cyber Forensics (pp. 45-65). Springer, Cham.
Bichler, G., & Malm, A. (2013). Small arms, big guns: a dynamic model of illicit market opportunity. Global Crime, 14(2-3), 261-286.
Borgatti, S. P., Everett, M. G., & Freeman, L. C. (2002). Ucinet for Windows: Software for social network analysis. Harvard, MA: Analytic Technologies.
Bott, E. (1957). Family and social networks. London: Tavistock Publications.
Bouchard, M., & Konarski, R. (2014). Assessing the core membership of a youth gang from its co-offending network. in C. Morselli (Ed.). Crime and Networks Criminology and Justice Series (Pp. 81-93). New York: Routledge.
Bouchard, M., & Malm, A. (2016). Social network analysis and its contribution to research on crime and criminal justice. In Oxford Handbooks Online (Pp. 1-23). Oxford University Press.
Brantingham, P. J., Tita, G. E., Short, M. B., & Reid, S. E. (2012). The ecology of gang territorial boundaries. Criminology, 50(3), 851-885.
Bright, D. A., & Delaney, J. J. (2013). Evolution of a drug trafficking network: Mapping changes in network structure and function across time. Global Crime14(2-3), 238-260.
Bruinsma, G., & Bernasco, W. (2004). Criminal groups and transnational illegal markets. Crime, Law and Social Change41(1), 79-94.
Burris, V., Smith, E., & Strahm, A. (2000). White supremacist networks on the Internet. Sociological focus, 33(2), 215-235.
Calderoni, F. (2012). The structure of drug trafficking mafias: the ‘Ndrangheta and cocaine. Crime, law and social change58(3), 321-349.
Cale, J., Leclerc, B., & Gil, F. (2020). Big data in criminology and criminal justice through the lens of the business literature. In Big Data (pp. 1-16). Routledge.
Carley, K. M., Dombroski, M., Tsvetovat, M., Reminga, J., & Kamneva, N. (2003). Destabilizing dynamic covert networks. In Proceedings of the 8th international Command and Control Research and Technology Symposium(pp. 79-92). Washington DC: National Defense War College.
Carrington, P.J. (2011). Crime and social network analysis. in J. Scott and P.J. Carrington (eds.), SAGE Handbook of Social Network Analysis (Pp. 236-255(. London: Sage.
Chan, T. K., Cheung, C. M., & Wong, R. Y. (2019). Cyberbullying on social networking sites: the crime opportunity and affordance perspectives. Journal of Management Information Systems, 36(2), 574-609.
Clifford, W. (1976). Crime and Control in Japan. Lexington, MA: Lexington Books.
Clinard, M. B. (1978). Cities with little crime: The case of Switzerland. Cambridge: Cambridge University Press.
Craven, P., & Wellman, B. (1973). The network city. Sociological inquiry43(3‐4), 57-88.
Décary-Hétu, D., & Dupont, B. (2013). Reputation in a dark network of online criminals. Global Crime, 14(2-3), 175-196.
Dupont, B. (2013). Skills and trust: a tour inside the hard drives of computer hackers. In Crime and networks (pp. 195-217). Routledge.
Ennett, S. T., Bauman, K. E., Hussong, A., Faris, R., Foshee, V. A., Cai, L., & DuRant, R. H. (2006). The peer context of adolescent substance use: Findings from social network analysis. Journal of research on adolescence16(2), 159-186.
Feld, S. L. (1981). The focused organization of social ties. American journal of sociology86(5), 1015-1035.
Fischer, C. S., Jackson, R. M., Stueve, C. A., Gerson, K., & Jones, L. M. & Baldassare, M. (1977). Networks and places: social relations in the urban setting. New York: Free Press.
Friday, P. C., & Hage, J. (1976). Youth crime in postindustrial societies: an integrated perspective. Criminolo- -gy, 14(3), 347-368.
Gephi. (2023). Features. Retrived from https://gephi.org/features/
Granovetter, M. S. (1973). The strength of weak ties. American journal of sociology78(6), 1360-1380.
Gruzd, A., Mai, P., & Kampen, A. (2022). Using Netlytic to Analyze Twitter Conversations about the 2014 Euromaidan Revolution in Ukraine. The SAGE Handbook of Social Media Research Methods, 467-475.
Gundur, R. V., Berry, M., & Taodang, D. (2021). Using digital open source and crowdsourced data in studies of deviance and crime. In Researching Cybercrimes: Methodologies, Ethics, and Critical Approaches (pp. 145-167). Palgrave Macmillan, Cham.
Hawdon, J. (2012). Applying differential association theory to online hate groups: A theoretical statement. Research on Finnish Society, 5, 39–47.
Habiba, U., Farid, N., & Saud, M. (2018). Social Networking Sites and Deviance among Youth in Islamabad, Pakistan. European Journal of Behavioral Sciences1(1), 48-58.
Haynie, D. L. (2001). Delinquent peers revisited: Does network structure matter? American Journal of Sociology, 106(4), 1013-1057.
Haynie, D. L., Doogan, N. J., & Soller, B. (2014). Gender, friendship networks, and delinquency: A dynamic network approach. Criminology52(4), 688-722.
Hofmann, D. C., & Gallupe, O. (2015). Leadership protection in drug-trafficking networks. Global Crime, 16(2), 123-138.
Kadushin, C. (1983). Mental health and the interpersonal environment: a reexamination of some effects of social structure on mental health. American sociological review48(2), 188-198.
Kadushin, C. (2012). Understanding social networks: Theories, concepts, and findings. Oxford university press.
Kenney, M. (2007). The architecture of drug trafficking: network forms of organisation in the Colombian cocaine trade. Global crime8(3), 233-259.
King, J. E., Walpole, C. E., & Lamon, K. (2007). Surf and turf wars online—growing implications of internet gang violence. Journal of Adolescent Health41(6), S66-S68.
Kitchin, R., & Lauriault, T. P. (2015). Small data in the era of big data. GeoJournal80(4), 463-475.
Krohn, M. D. (1986). The web of conformity: A network approach to the explanation of delinquent behavior. Social Problems, 32, 455–473.
Laney, D. (2001). 3-D data management: Controlling data volume, velocity and variety. Application Delivery Strategies by META Group Inc. disponibile sul sito, available at: https://blogs. gartner. com/doug-laney/files/2012/01/ad949-3D-Data-Management-Controlling-Data-Volume-Velocity-and-Variety. pdf (accessed 6 February 2001).
Laumann, E. O., Galaskiewicz, J., & Marsden, P. V. (1978). Community structure as inter organizational linkages. Annual Review of Sociology, 4(1), 455-484.
Laestadius, L. & Witt, A. (2022). Instagram revisited. In The SAGE handbook of social media research methods (2nd ed.) (pp. 581-597).
Malm, A., Bichler, G., & Nash, R. (2011). Co-offending between criminal enterprise groups. Global Crime, 12(2), 112-128.
Malm, A. E., Kinney, J. B., & Pollard, N. R. (2008). Social network and distance correlates of criminal associates involved in illicit drug production. Security Journal21(1), 77-94.
McCuddy, T., & Vogel, M. (2015). More than just friends: Online social networks and offending. Criminal Justice Review40(2), 169-189.
McCuish, E. C., Bouchard, M., & Corrado, R. R. (2015). The search for suitable homicide co-offenders among gang members. Journal of Contemporary Criminal Justice31(3), 319–336.
McDonald, H., Hortsmann, B., Strom, K., & Pope, M. (2009). The impact of the internet on deviant behavior and deviant communities. Washington, DC: Institute for Homeland Security Solutions. Retrieved October 15, 2014 from http://sites.duke.edu/ihss/files/2011/12/IRW-Literature-Reviews-Deviance-and-the-Internet.Pdf
McGloin, J. M., & Nguyen, H. (2013). The importance of studying co-offending networks for criminological theory and policy. In C. Morselli (Ed.). Crime and networks (pp. 13-27). New York: Routledge.
Mercken, L., Candel, M., Willems, P., & De Vries, H. (2007). Disentangling social selection and social influence effects on adolescent smoking: the importance of reciprocity in friendships. Addiction, 102(9), 1483-1492.
Mitchell, J. C. (1969). The concept and use of social networks. In J. Clyde Mitchell (ed.). Social networks in urban situations (Pp. 1-50). Manchester: The University Press.
Moreno, J. L. (1947). Contributions of sociometry to research methodology in sociology. American Sociological Review, 12(3), 287-292.
Moreno, J. L., & Jennings, H. H. (1938). Statistics of social configurations. Sociometry, 342-374.
Morselli, C. (2001). Structuring Mr. Nice: Entrepreneurial opportunities and brokerage positioning in the cannabis trade. Crime, law and social change35(3), 203-244.
Morselli, C. (2003). Career opportunities and network-based privileges in the Cosa Nostra. Crime, Law and Social Change39(4), 383-418.
Morselli, C. (2009). Inside criminal networks (Vol. 8). New York: Springer.
Morselli, C., & Petit, K. (2007). Law-enforcement disruption of a drug importation network. Global Crime8(2), 109-130.
Nash, R., Bouchard, M., & Malm, A. (2013). Investing in people: The role of social networks in the diffusion of a large-scale fraud. Social networks, 35(4), 686-698.
Nau, C., & Quan-Haase, A. (2022). Defining social media and asking social media research questions: How well does the Swiss army knife metaphor apply?. In The Sage handbook of social media research methods (pp. 13-26). Sage.
Netlytic. (2023).  About. Retrived from https://netlytic.org/home/?page_id=10834
Newman, G. R., & Clarke, R. V. (2013). Superhighway robbery. London: Willan.
Papachristos, A. V. (2009). Murder by structure: Dominance relations and the social structure of gang homicide. American journal of sociology115(1), 74-128.
Papachristos, A. V. (2014). The network structure of crime. Sociology Compass8(4), 347-357.
Papachristos, A. V., Braga, A. A., & Hureau, D. M. (2012). Social networks and the risk of gunshot injury. Journal of Urban Health89(6), 992-1003.
Papachristos, A. V., Hureau, D. M., & Braga, A. A. (2013). The corner and the crew: The influence of geography and social networks on gang violence. American sociological review, 78(3), 417-447.
Patton, D., Eschmann, R., & Butler, D. (2013). Internet banging: New trends in social media, gang violence, masculinity and hip hop. Computers in Human Behavior, 29, A54–A59.
Parks, R. F., Lowry, P. B., Wigand, R. T., Agarwal, N., & Williams, T. L. (2018). Why students engage in cyber-cheating through a collective movement: A case of deviance and collusion. Computers & Education125, 308-326.
Pyrooz, D., Decker, S., & Moule, R. (2013). Criminal and routine activities in online settings: Gangs, offenders, and the internet. Justice Quarterly, 30, 1–29.
Rambaran, J. A., Dijkstra, J. K., & Veenstra, R. (2020). Bullying as a group process in childhood: A longitudinal social network analysis. Child development91(4), 1336-1352.
Reynolds, A. D., & Crea, T. M. (2015). Peer influence processes for youth delinquency and depression. Journal of adolescence, 43, 83-95.
Rice, E., & Yoshioka-Maxwell, A. (2015). Social network analysis as a toolkit for the science of social work. Journal of the Society for Social Work and Research, 6(3), 369-383.
Sarnecki, J. (2001). Delinquent Networks: Youth Co-offending in Stockholm. Cambridge, UK: Cambridge University Press.
Sageman, M. (2004). Understanding terror networks. Philadelphia, PA: University of Pennsylvania Press.
Schaefer, D. R. (2012). Youth co-offending networks: An investigation of social and spatial effects. Social networks, 34(1), 141-149.Siegel, L. J. (2016). Criminology: Theories, patterns and typologies. Boston. USA: Cengage.
Short, J. F., & Strodtbeck, F. L. (1965). Group process and gang delinquency (pp. 25-46). Chicago: University of Chicago Press.
Smith, G. J., Bennett Moses, L., & Chan, J. (2017). The challenges of doing criminology in the big data era: Towards a digital and data-driven approach. The British journal of criminology57(2), 259-274.
Socialdatalab. (2023). Introducing COSMOS 2.0. Retrived from http://socialdatalab.net/cosmos-blog
Statista (2022). Most popular social networks worldwide as of January 2022, ranked by number of monthly active users. Retrieved from https://www.statista.com/statistics/272014/global-social-networks-ranked-by-number-of-users/
Tayebi, M., Glässer, U., & Andresen, M. A. (2020). Future applications of big data in environmental criminology. In Big Data (pp. 40-53). Routledge.
Tita, G. E., & Radil, S. M. (2011). Spatializing the social networks of gangs to explore patterns of violence. Journal of Quantitative Criminolo - -gy, 27(4), 521-545.
Waring, E. (2018). Co-offending as a network form of social organization. In Crime & Social Organization (pp. 31-48). Routledge.
Wasserman, S., & Faust, K. (1994). Social network analysis: Methods and applications (Vol. 8). Cambridge, UK: Cambridge University Press.
Weerman, F. M. (2011). Delinquent peers in context: A longitudinal network analysis of selection and influence effects. Criminology, 49(1), 253-286.
Westlake, B. G., & Bouchard, M. (2016a). Liking and hyperlinking: Community detection in online child sexual exploitation networks. Social science research, 59, 23-36.
Westlake, B. G., & Bouchard, M. (2016b). Criminal careers in cyberspace: Examining website failure within child exploitation networks. Justice Quarterly33(7), 1154-1181.
Weulen Kranenbarg, M., Ruiter, S., & Van Gelder, J. L. (2021). Do cyber-birds flock together? Comparing deviance among social network members of cyber-dependent offenders and traditional offenders. European Journal of Criminology, 18(3), 386-406.
White, W. E., & Carmody, D. (2018). Preventing online victimization: College students’ views on intervention and prevention. Journal of interpersonal violence, 33(14), 1-17.
Williams, M. L. (2015). Towards an ethical framework for using social media data in social research. presented at Social Research Association Workshop, Institute of Education, 15 June 2015, available at http://the-sra.org.uk/wp-content/uploads/ethicsin-social-media-research-matthew-williams.pdf.
Williams, M. L., Burnap, P., & Sloan, L. (2017). Crime sensing with big data: The affordances and limitations of using open-source communicatio- -ns to estimate crime patterns. The British Journal of Criminology, 57(2), 320-340.
Zeller, F. (2022). The Good, the Bad, and the How-to of Analysing Social Media Data. In The SAGE Handbook of Social Media Research Methods, (pp. 363-381).