Access the full text.
Sign up today, get DeepDyve free for 14 days.
A. Wimmer, Kevin Lewis (2010)
Beyond and Below Racial Homophily: ERG Models of a Friendship Network Documented on Facebook1American Journal of Sociology, 116
E. Quintane, D. Lusher, J. Koskinen, G. Robins (2012)
Comparing Networks: Structural Correspondence between Behavioral and Recall Networks
A. Papachristos, David Hureau, A. Braga (2013)
The Corner and the Crew: The Influence of Geography and Social Networks on Gang ViolenceAmerican Sociological Review, 78
W. Baker, R. Faulkner (1993)
THE SOCIAL ORGANIZATION OF CONSPIRACY: ILLEGAL NETWORKS IN THE HEAVY ELECTRICAL EQUIPMENT INDUSTRY*American Sociological Review, 58
G. Homans, G. Simmel, K. Wolff, R. Bendix, E. Hughes (1955)
Conflict.@@@The Web of Group-Affiliations.American Sociological Review, 16
Brian Uzzi (1996)
The Sources and Consequences of Embeddedness for the Economic Performance of Organizations: The Network EffectAmerican Sociological Review, 61
D. Bell (1953)
Crime as an American Way of LifeAntioch Review, 13
Ami Pedahzur, A. Perliger (2006)
The Changing Nature of Suicide Attacks - A Social Network PerspectiveSocial Forces, 84
J. Xu, Hsinchun Chen (2008)
The topology of dark networksCommunications of the ACM, 51
(2013)
“ Trust thy crooked neighbor ” is our adaptation of a plaque that hung on Murray “ Curly ” Humphreys ’ s fireplace that read , “ Love thy crooked neighbor as you love thy crooked self
René Bakker, Jörg Raab, H. Milward (2012)
A preliminary theory of dark network resilienceInternational Journal of Social Psychiatry
J. Moody, D. White (2003)
Structural Cohesion and Embeddedness: A Hierarchical Concept of Social GroupsAmerican Sociological Review, 68
P. Bearman, Robert Faris, J. Moody (1999)
Blocking the Future: New Solutions for Old Problems in Historical Social ScienceSocial Science History, 23
S. Goodreau, J. Kitts, M. Morris (2009)
Birds of a feather, or friend of a friend? using exponential random graph models to investigate adolescent social networks*Demography, 46
A. Stinchcombe (2006)
Cooperation Without Trust?Contemporary Sociology: A Journal of Reviews, 35
Stefan Schaal, A. Ijspeert, A. Billard (2003)
Computational approaches to motor learning by imitation.Philosophical transactions of the Royal Society of London. Series B, Biological sciences, 358 1431
R. Collins (2011)
Patrimonial Alliances and Failures of State PenetrationThe ANNALS of the American Academy of Political and Social Science, 636
D. Haynie (2001)
Delinquent Peers Revisited: Does Network Structure Matter?1American Journal of Sociology, 106
Mark Granovetter (1973)
The Strength of Weak TiesAmerican Journal of Sociology, 78
D. Knoke (2013)
Understanding Social Networks: Theories, Concepts, and FindingsContemporary Sociology: A Journal of Reviews, 42
Brian Uzzi (1999)
Embeddedness in the Making of Financial Capital: How Social Relations and Networks Benefit Firms Seeking FinancingAmerican Sociological Review, 64
S. Sesto, Francis Ianni, Elizabeth Reuss-Ianni (1974)
A family business : kinship and social control in organized crimeJournal of Criminal Law & Criminology, 65
Aili Malm, Gisela Bichler, Stephanie Walle (2010)
Comparing the ties that bind criminal networks: Is blood thicker than water?Security Journal, 23
B. Pescosolido, Beth Rubin (2000)
The Web of Group Affiliations Revisited: Social Life, Postmodernism, and SociologyAmerican Sociological Review, 65
James Finckenauer (2014)
Organized Crime in Chicago: Beyond the MafiaContemporary Sociology: A Journal of Reviews, 43
S. Venkatesh (2006)
Off the Books: The Underground Economy of the Urban Poor
G. Robins, P. Pattison, S. Wasserman (1999)
Logit models and logistic regressions for social networks: III. Valued relationsPsychometrika, 64
R. Merton (1938)
Social Structure and Anomie
L. Bienen, Brandon Rottinghaus (2002)
Learning from the past, living in the present: Understanding homicide in Chicago, 1870-1930Journal of Criminal Law & Criminology, 92
Mark Granovetter (1985)
Economic Action and Social Structure: The Problem of EmbeddednessAmerican Journal of Sociology, 91
N. Milburn (1983)
To Dwell Among Friends: Personal Networks in Town and City.Psyccritiques, 28
Neha Gondal, P. McLean (2013)
Linking tie-meaning with network structure: Variable connotations of personal lending in a multiple-network ecologyPoetics, 41
(1993)
“ Big Allied and Dangerous ( BAAD ) Database 1 - Lethality Data , 1998 – 2005 . ” Project on Violent Conflict
Kevin Lewis (2013)
The limits of racial prejudiceProceedings of the National Academy of Sciences, 110
M. Sageman (2004)
Understanding terror networks.International journal of emergency mental health, 7 1
E. Lazega, P. Pattison (1999)
Multiplexity, generalized exchange and cooperation in organizations: a case studySoc. Networks, 21
F. Tönnies, Charles Loomis (1959)
Community and society (Gemeinschaft und Gesellschaft)
Jimi Adams, J. Moody, M. Morris (2013)
Sex, drugs, and race: how behaviors differentially contribute to the sexually transmitted infection risk network structure.American journal of public health, 103 2
Jimi Adams, J. Moody, S. Muth, M. Morris (2012)
Quantifying the Benefits of Link-Tracing Designs for Partnership Network StudiesField Methods, 24
John Padgett, C. Ansell (1993)
Robust Action and the Rise of the Medici, 1400-1434American Journal of Sociology, 98
C. Sowle (1964)
Organized Crime in ChicagoJournal of Criminal Law & Criminology, 55
Stephanie Coontz (1988)
The Social Origins of Private Life: A History of American Families 1600-1900
D. Heckathorn (1997)
Respondent-driven sampling : A new approach to the study of hidden populationsSocial Problems, 44
Peng-Fei Wang (2012)
Exponential Random Graph Models for Social Networks: Exponential Random Graph Model Extensions: Models for Multiple Networks and Bipartite Networks
D. Lusher, G. Robins, P. Pattison, A. Lomi (2012)
"Trust Me": Differences in expressed and perceived trust relations in an organizationSoc. Networks, 34
Gregory Zimmerman, S. Messner (2010)
Neighborhood Context and the Gender Gap in Adolescent Violent CrimeAmerican Sociological Review, 75
Reveal Evidence of $54,000,000 City Food Fraud
Julien Brailly, Scott Viallet-Thévenin (2014)
Exponential Random Graph Models for Social NetworksBulletin de Méthodologie Sociologique, 123
Daniel Brass, J. Galaskiewicz, H. Greve, Wenpin Tsai (2004)
Taking Stock of Networks and Organizations: A Multilevel PerspectiveAcademy of Management Journal, 47
Roger Gould (1991)
MULTIPLE NETWORKS AND MOBILIZATION IN THE PARIS COMMUNE, 1871*American Sociological Review, 56
S. Srivastava, M. Banaji (2011)
Culture, Cognition, and Collaborative Networks in OrganizationsAmerican Sociological Review, 76
C. Morselli (2003)
Career opportunities and network-based privileges in the Cosa NostraCrime, Law and Social Change, 39
David Ruth (1996)
Inventing the Public Enemy: The Gangster in American Culture, 1918-1934
J. Fontaine, E. Bott (1969)
Family and Social Network; Roles Norms, and External Relationships in Ordinary, Urban Families., 4
M. Haller (1971)
Organized Crime in Urban Society: Chicago in the Twentieth CenturyJournal of Social History, 5
Daniel McFarland, J. Moody, David Diehl, Jeffrey Smith, Reuben Thomas (2014)
Network Ecology and Adolescent Social StructureAmerican Sociological Review, 79
L. Verbrugge (1979)
Multiplexity in Adult FriendshipsSocial Forces, 57
C. Fischer (2011)
Still Connected: Family and Friends in America Since 1970
You Can All Go Thirsty' Is Al Capone's Adieu
J. Bishop (2013)
Networked: The New Social Operating SystemInt. J. E Politics, 4
M. Heaney (2014)
Multiplex networks and interest group influence reputation: An exponential random graph modelSoc. Networks, 36
A. Blok (1978)
The Mafia of a Sicilian Village, 1860-1960: A Study of Violent Peasant Entrepreneurs
Toby Ditz (1990)
The Social Origins of Private Life: A History of American Families, 1600-1900.Stephanie Coontz
Gijs Huitsing, M. Duijn, T. Snijders, Peng Wang, M. Sainio, C. Salmivalli, R. Veenstra (2012)
Univariate and multivariate models of positive and negative networks: Liking, disliking, and bully-victim relationshipsSoc. Networks, 34
P. McLean (2016)
Between Monopoly and Free Trade: The English East India Company, 1600–1757 by Emily Erikson (review)Social Forces, 95
A. Papachristos, Chris Smith (2013)
The Embedded and Multiplex Nature of Al Capone
J. Beggs, Valerie Haines, J. Hurlbert (2010)
Revisiting the rural-urban contrast : Personal networks in nonmetropolitan and metropolitan settingsRural Sociology, 61
(2001)
The Outfit: The Role of Chicago’s Underworld in the Shaping of Modern America
P. Parigi, W. Henson (2014)
Social Isolation in AmericaReview of Sociology, 40
Friends Launch Aldermanic Boom for Young Newsie
Emily Erikson (2014)
Book Review: Between Monopoly and Free Trade: The English East India Company, 1600–1757International Journal of Maritime History, 27
Jimi Adams, James Moody (2013)
Sex, Drugs and Race: How Behaviors Differentially Contribute to STI-Risk Network Structure*
Y. Zhao, Olaf Rank, D. Lusher, J. Koskinen, G. Robins (2012)
Interdependencies between Working Relations: Multivariate ERGMs for Advice and Satisfaction
M. Krohn, J. Massey, Mary Zielinski (1988)
Role overlap, network multiplexity, and adolescent deviant behaviorSocial Psychology Quarterly, 51
J. Boissevain (1974)
Friends of friends : networks, manipulators and coalitions
S. Wasserman, Katherine Faust (1994)
Social Network Analysis: Methods and Applications
Mary Pattillo (1998)
Sweet Mothers and Gangbangers: Managing Crime in a Black Middle-Class NeighborhoodSocial Forces, 76
S. Wasserman, P. Pattison (1996)
Logit models and logistic regressions for social networks: I. An introduction to Markov graphs andpPsychometrika, 61
B. Wellman (1979)
The Community Question: The Intimate Networks of East YorkersAmerican Journal of Sociology, 84
R. Breiger, Eric Schoon, David Melamed, Victor Asal, R. Rethemeyer (2014)
Comparative configurational analysis as a two-mode network problem: A study of terrorist group engagement in the drug tradeSoc. Networks, 36
(2009)
PNet: Program for the Simulation and Estimation of Exponential Random Graph (p*) Models.” University of Melbourne, Australia
Bureaucratic and patrimonial theories of organized crime tend to miss the history and mobility of crime groups integrating into and organizing with legitimate society. The network property of multiplexity—when more than one type of relationship exists between a pair of actors—offers a theoretical and empirical inroad to analyzing overlapping relationships of seemingly disparate social spheres. Using the historical case of organized crime in Chicago and a unique relational database coded from more than 5,000 pages of archival documents, we map the web of multiplex relationships among bootleggers, politicians, union members, businessmen, families, and friends. We analyze the overlap of criminal, personal, and legitimate networks containing 1,030 individuals and 3,726 mutual dyads between them. Multiplexity is rare in these data: only 10 percent of the mutual dyads contain multiplex ties. However, results from bivariate exponential random graph models demonstrate that multiplexity is a relevant structural property binding the three networks together. Even among our sample of criminals, we find dependencies between the criminal and personal networks and the criminal and legitimate networks. Although not pervasive, multiplexity glued these worlds of organized crime together above and beyond the personalities of famous gangsters, ethnic homophily, and other endogenous network processes.
American Sociological Review – SAGE
Published: Aug 1, 2016
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.