Terrorist use of the internet by the numbers: quantifying behaviors, patterns, and processes
Public interest and policy debates surrounding the role of the Internet in terrorist activities is increasing. Criminology has said very little on the matter. By using a unique data set of 223 convicted United Kingdom–based terrorists, this article focuses on how they used the Internet in the commis...
Authors: | ; ; |
---|---|
Format: | Electronic Article |
Language: | English |
Published: |
2016
|
In: |
Criminology & public policy
Year: 2017, Volume: 16, Issue: 1, Pages: 99-117 |
Online Access: |
Presumably Free Access Volltext (Resolving-System) |
Journals Online & Print: | |
Check availability: | HBZ Gateway |
Keywords: |
MARC
LEADER | 00000naa a2200000 4500 | ||
---|---|---|---|
001 | 1583848940 | ||
003 | DE-627 | ||
005 | 20181119154924.0 | ||
007 | cr uuu---uuuuu | ||
008 | 181119s2016 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1111/1745-9133.12249 |2 doi | |
035 | |a (DE-627)1583848940 | ||
035 | |a (DE-576)513848940 | ||
035 | |a (DE-599)BSZ513848940 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Gill, Paul |e VerfasserIn |0 (DE-588)1114846937 |0 (DE-627)869245295 |0 (DE-576)429423608 |4 aut | |
109 | |a Gill, Paul | ||
245 | 1 | 0 | |a Terrorist use of the internet by the numbers |b quantifying behaviors, patterns, and processes |c Paul Gill, Emily Corner, Maura Conway [und 3 weitere] |
264 | 1 | |c 2016 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Public interest and policy debates surrounding the role of the Internet in terrorist activities is increasing. Criminology has said very little on the matter. By using a unique data set of 223 convicted United Kingdom–based terrorists, this article focuses on how they used the Internet in the commission of their crimes. As most samples of terrorist offenders vary in terms of capabilities (lone‐actor vs. group offenders) and criminal sophistication (improvised explosive devices vs. stabbings), we tested whether the affordances they sought from the Internet significantly differed. The results suggest that extreme‐right‐wing individuals, those who planned an attack (as opposed to merely providing material support), conducted a lethal attack, committed an improvised explosive device (IED) attack, committed an armed assault, acted within a cell, attempted to recruit others, and engaged in nonvirtual network activities and nonvirtual place interactions were significantly more likely to learn online compared with those who did not engage in these behaviors. Those undertaking unarmed assaults were significantly less likely to display online learning. The results also suggested that extreme‐right‐wing individuals who perpetrated an IED attack, associated with a wider network, attempted to recruit others, and engaged in nonvirtual network activities and nonvirtual place interactions were significantly more likely to communicate online with co‐ideologue. | ||
700 | 1 | |a Corner, Emily |e VerfasserIn |4 aut | |
700 | 1 | |a Conway, Maura |e VerfasserIn |0 (DE-588)1143050258 |0 (DE-627)1002323789 |0 (DE-576)378510886 |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Criminology & public policy |d Oxford [u.a.] : Wiley-Blackwell, 2001 |g 16(2017), 1, Seite 99-117 |h Online-Ressource |w (DE-627)357169069 |w (DE-600)2094251-5 |w (DE-576)262493047 |x 1745-9133 |7 nnns |
773 | 1 | 8 | |g volume:16 |g year:2017 |g number:1 |g pages:99-117 |
856 | |u https://onlinelibrary.wiley.com/doi/pdfdirect/10.1111/1745-9133.12249 |x unpaywall |z Vermutlich kostenfreier Zugang |h publisher [open (via crossref license)] | ||
856 | 4 | 0 | |u http://dx.doi.org/10.1111/1745-9133.12249 |x Resolving-System |3 Volltext |
951 | |a AR | ||
ELC | |a 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 3032701953 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1583848940 | ||
LOK | |0 005 20181119154924 | ||
LOK | |0 008 181119||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-21-110 |c DE-627 |d DE-21-110 | ||
LOK | |0 689 |a s |a Terrorist behavior | ||
LOK | |0 689 |a s |a Internet | ||
LOK | |0 689 |a s |a Affordance | ||
LOK | |0 689 |a s |a Radicalization | ||
LOK | |0 689 |a s |a Situational crime prevention | ||
LOK | |0 689 |a s |a Radikalisierung | ||
LOK | |0 852 |a DE-21-110 | ||
LOK | |0 852 1 |9 00 | ||
LOK | |0 935 |a krub | ||
OAS | |a 1 | ||
ORI | |a SA-MARC-krimdoka001.raw |