Examining illicit networks in laboratory experiments with a preliminary focus on communication
Purpose This research introduces a web application, the bot orchestrator, to assist researchers in developing paradigms to examine illicit networks in experiments. We implemented the application and a new paradigm to create mock networks using strangers. The proof-of-concept experiment examined comm...
Authors: | ; ; ; |
---|---|
Format: | Electronic Article |
Language: | English |
Published: |
2023
|
In: |
Legal and criminological psychology
Year: 2023, Volume: 28, Issue: 1, Pages: 150-164 |
Online Access: |
Volltext (kostenfrei) Volltext (kostenfrei) |
Journals Online & Print: | |
Check availability: | HBZ Gateway |
Keywords: |
Summary: | Purpose This research introduces a web application, the bot orchestrator, to assist researchers in developing paradigms to examine illicit networks in experiments. We implemented the application and a new paradigm to create mock networks using strangers. The proof-of-concept experiment examined communication when networks plan illicit activities. Method Participants assumed the role of an illicit network member—either a manager, a coordinator or an executor. They held some information the group needed to accomplish either a material or ideological goal: communication between the roles was imperative for success. We also manipulated the level of risk associated with communicating about the planning activities. For half of the participants, there was a moderate risk of communicating about the plans. For the other half, the risk of such communication was high. The procedure allowed us to examine who a network member was willing to communicate with, given the goal under pursuit and the associated risk level. Results Although goal-type, risk level, and the Goal-type × Risk Interaction did not significantly predict communication decisions, a content analysis suggested that participants were attempting to navigate the risks while pursuing their goals. Participants employed diverse communication strategies: individual differences explained the most variance regarding how network members communicate. Conclusions We hope the web application and paradigm this research introduces will facilitate further experiments examining illicit networks. |
---|---|
ISSN: | 2044-8333 |
DOI: | 10.1111/lcrp.12230 |