Examining illicit networks in laboratory experiments with a preliminary focus on communication

Purpose This research introduces a web application, the bot orchestrator, to assist researchers in developing paradigms to examine illicit networks in experiments. We implemented the application and a new paradigm to create mock networks using strangers. The proof-of-concept experiment examined comm...

Ausführliche Beschreibung

Gespeichert in:  
Bibliographische Detailangaben
1. VerfasserIn: Neequaye, David A. (VerfasserIn)
Beteiligte: Granhag, Pär Anders 1964- ; Segerberg, Andreas ; Petterson, Daniel
Medienart: Elektronisch Aufsatz
Sprache:Englisch
Veröffentlicht: 2023
In: Legal and criminological psychology
Jahr: 2023, Band: 28, Heft: 1, Seiten: 150-164
Online-Zugang: Volltext (kostenfrei)
Volltext (kostenfrei)
Journals Online & Print:
Lade...
Verfügbarkeit prüfen: HBZ Gateway
Schlagwörter:
Beschreibung
Zusammenfassung:Purpose This research introduces a web application, the bot orchestrator, to assist researchers in developing paradigms to examine illicit networks in experiments. We implemented the application and a new paradigm to create mock networks using strangers. The proof-of-concept experiment examined communication when networks plan illicit activities. Method Participants assumed the role of an illicit network member—either a manager, a coordinator or an executor. They held some information the group needed to accomplish either a material or ideological goal: communication between the roles was imperative for success. We also manipulated the level of risk associated with communicating about the planning activities. For half of the participants, there was a moderate risk of communicating about the plans. For the other half, the risk of such communication was high. The procedure allowed us to examine who a network member was willing to communicate with, given the goal under pursuit and the associated risk level. Results Although goal-type, risk level, and the Goal-type × Risk Interaction did not significantly predict communication decisions, a content analysis suggested that participants were attempting to navigate the risks while pursuing their goals. Participants employed diverse communication strategies: individual differences explained the most variance regarding how network members communicate. Conclusions We hope the web application and paradigm this research introduces will facilitate further experiments examining illicit networks.
ISSN:2044-8333
DOI:10.1111/lcrp.12230