Examining illicit networks in laboratory experiments with a preliminary focus on communication

Purpose This research introduces a web application, the bot orchestrator, to assist researchers in developing paradigms to examine illicit networks in experiments. We implemented the application and a new paradigm to create mock networks using strangers. The proof-of-concept experiment examined comm...

Full description

Saved in:  
Bibliographic Details
Authors: Neequaye, David A. (Author) ; Granhag, Pär Anders 1964- (Author) ; Segerberg, Andreas (Author) ; Petterson, Daniel (Author)
Format: Electronic Article
Language:English
Published: 2023
In: Legal and criminological psychology
Year: 2023, Volume: 28, Issue: 1, Pages: 150-164
Online Access: Volltext (kostenfrei)
Volltext (kostenfrei)
Journals Online & Print:
Drawer...
Check availability: HBZ Gateway
Keywords:
Description
Summary:Purpose This research introduces a web application, the bot orchestrator, to assist researchers in developing paradigms to examine illicit networks in experiments. We implemented the application and a new paradigm to create mock networks using strangers. The proof-of-concept experiment examined communication when networks plan illicit activities. Method Participants assumed the role of an illicit network member—either a manager, a coordinator or an executor. They held some information the group needed to accomplish either a material or ideological goal: communication between the roles was imperative for success. We also manipulated the level of risk associated with communicating about the planning activities. For half of the participants, there was a moderate risk of communicating about the plans. For the other half, the risk of such communication was high. The procedure allowed us to examine who a network member was willing to communicate with, given the goal under pursuit and the associated risk level. Results Although goal-type, risk level, and the Goal-type × Risk Interaction did not significantly predict communication decisions, a content analysis suggested that participants were attempting to navigate the risks while pursuing their goals. Participants employed diverse communication strategies: individual differences explained the most variance regarding how network members communicate. Conclusions We hope the web application and paradigm this research introduces will facilitate further experiments examining illicit networks.
ISSN:2044-8333
DOI:10.1111/lcrp.12230