Examining illicit networks in laboratory experiments with a preliminary focus on communication

Purpose This research introduces a web application, the bot orchestrator, to assist researchers in developing paradigms to examine illicit networks in experiments. We implemented the application and a new paradigm to create mock networks using strangers. The proof-of-concept experiment examined comm...

Descripción completa

Guardado en:  
Detalles Bibliográficos
Autor principal: Neequaye, David A. (Autor)
Otros Autores: Granhag, Pär Anders 1964- ; Segerberg, Andreas ; Petterson, Daniel
Tipo de documento: Electrónico Artículo
Lenguaje:Inglés
Publicado: 2023
En: Legal and criminological psychology
Año: 2023, Volumen: 28, Número: 1, Páginas: 150-164
Acceso en línea: Volltext (kostenfrei)
Volltext (kostenfrei)
Journals Online & Print:
Gargar...
Verificar disponibilidad: HBZ Gateway
Palabras clave:
Descripción
Sumario:Purpose This research introduces a web application, the bot orchestrator, to assist researchers in developing paradigms to examine illicit networks in experiments. We implemented the application and a new paradigm to create mock networks using strangers. The proof-of-concept experiment examined communication when networks plan illicit activities. Method Participants assumed the role of an illicit network member—either a manager, a coordinator or an executor. They held some information the group needed to accomplish either a material or ideological goal: communication between the roles was imperative for success. We also manipulated the level of risk associated with communicating about the planning activities. For half of the participants, there was a moderate risk of communicating about the plans. For the other half, the risk of such communication was high. The procedure allowed us to examine who a network member was willing to communicate with, given the goal under pursuit and the associated risk level. Results Although goal-type, risk level, and the Goal-type × Risk Interaction did not significantly predict communication decisions, a content analysis suggested that participants were attempting to navigate the risks while pursuing their goals. Participants employed diverse communication strategies: individual differences explained the most variance regarding how network members communicate. Conclusions We hope the web application and paradigm this research introduces will facilitate further experiments examining illicit networks.
ISSN:2044-8333
DOI:10.1111/lcrp.12230