What Do Closed Source Data Tell Us About Lone Actor Terrorist Behavior? A Research Note
This article contributes to the growing body of knowledge on lone-actor terrorism with the incorporation of closed-source data. The analyses presented investigate the antecedent behaviors of U.K.-based lone-actor terrorists leading up to their planning or conducting a terrorist event. The results su...
Autor principal: | |
---|---|
Otros Autores: | ; ; ; |
Tipo de documento: | Electrónico Artículo |
Lenguaje: | Inglés |
Publicado: |
2022
|
En: |
Terrorism and political violence
Año: 2022, Volumen: 34, Número: 1, Páginas: 113-130 |
Acceso en línea: |
Presumably Free Access Volltext (lizenzpflichtig) |
Journals Online & Print: | |
Verificar disponibilidad: | HBZ Gateway |
Palabras clave: |
MARC
LEADER | 00000caa a22000002c 4500 | ||
---|---|---|---|
001 | 1789489717 | ||
003 | DE-627 | ||
005 | 20220221154324.0 | ||
007 | cr uuu---uuuuu | ||
008 | 220214s2022 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1080/09546553.2019.1668781 |2 doi | |
035 | |a (DE-627)1789489717 | ||
035 | |a (DE-599)KXP1789489717 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
084 | |a 2,1 |2 ssgn | ||
100 | 1 | |a Gill, Paul |e VerfasserIn |0 (DE-588)1114846937 |0 (DE-627)869245295 |0 (DE-576)429423608 |4 aut | |
109 | |a Gill, Paul | ||
245 | 1 | 0 | |a What Do Closed Source Data Tell Us About Lone Actor Terrorist Behavior? A Research Note |
264 | 1 | |c 2022 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a This article contributes to the growing body of knowledge on lone-actor terrorism with the incorporation of closed-source data. The analyses presented investigate the antecedent behaviors of U.K.-based lone-actor terrorists leading up to their planning or conducting a terrorist event. The results suggest that prior to their attack or arrest the vast majority of lone-actor terrorists each demonstrated elements concerning (a) their grievance, (b) an escalation in their intent to act, (c) gaining capability—both psychologically and technically and (d) attack planning. The results also disaggregate our understanding of lone-actor terrorists in two ways. First, we compare the behaviors of the jihadist actors to those of the extreme-right. Second, we visualize Borum’s (2012) continuums of loneness, direction, and motivation. Collectively the results provide insight into the threat assessment and management of potential lone actors. | ||
650 | 4 | |a Risk Management | |
650 | 4 | |a Risk Assessment | |
650 | 4 | |a Closed sources | |
650 | 4 | |a Lone-actor terrorism | |
700 | 1 | |a Corner, Emily |e VerfasserIn |4 aut | |
700 | 1 | |a McKee, Amy |e VerfasserIn |4 aut | |
700 | 1 | |a Hitchen, Paul |e VerfasserIn |4 aut | |
700 | 1 | |a Betley, Paul |e VerfasserIn |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Terrorism and political violence |d London : Cass, 1989 |g 34(2022), 1, Seite 113-130 |h Online-Ressource |w (DE-627)349234795 |w (DE-600)2080322-9 |w (DE-576)113563507 |x 1556-1836 |7 nnas |
773 | 1 | 8 | |g volume:34 |g year:2022 |g number:1 |g pages:113-130 |
856 | |u https://discovery.ucl.ac.uk/10084756/3/Gill_Regulus%20Paper%20for%20Review%20R%26R4.pdf |x unpaywall |z Vermutlich kostenfreier Zugang |h repository [oa repository (via OAI-PMH title and first author match)] | ||
856 | 4 | 0 | |u https://doi.org/10.1080/09546553.2019.1668781 |x Resolving-System |z lizenzpflichtig |3 Volltext |
935 | |a mkri | ||
951 | |a AR | ||
ELC | |a 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 4056350779 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1789489717 | ||
LOK | |0 005 20220221094745 | ||
LOK | |0 008 220214||||||||||||||||ger||||||| | ||
LOK | |0 035 |a (DE-2619)KrimDok#2022-02-13#B8F187C6AF3503BB1D26B2F013150E5F00C6D294 | ||
LOK | |0 040 |a DE-2619 |c DE-627 |d DE-2619 | ||
LOK | |0 092 |o n | ||
LOK | |0 852 |a DE-2619 | ||
LOK | |0 852 1 |9 00 | ||
LOK | |0 935 |a zota | ||
OAS | |a 1 | ||
ORI | |a SA-MARC-krimdoka001.raw |