Terrorist Use of the Internet by the Numbers: Quantifying Behaviors, Patterns and Processes

P. Gill, E. Corner, M. Conway, A. Thornton, Mia M. Bloom, J. Horgan
{"title":"Terrorist Use of the Internet by the Numbers: Quantifying Behaviors, Patterns and Processes","authors":"P. Gill, E. Corner, M. Conway, A. Thornton, Mia M. Bloom, J. Horgan","doi":"10.1111/1745-9133.12249","DOIUrl":null,"url":null,"abstract":"Public interest and policy debates surrounding the role of the Internet in terrorist activities is increasing. Criminology has said very little on the matter. By using a unique data set of 223 convicted United Kingdom–based terrorists, this article focuses on how they used the Internet in the commission of their crimes. As most samples of terrorist offenders vary in terms of capabilities (lone-actor vs. group offenders) and criminal sophistication (improvised explosive devices vs. stabbings), we tested whether the affordances they sought from the Internet significantly differed. The results suggest that extreme-right-wing individuals, those who planned an attack (as opposed to merely providing material support), conducted a lethal attack, committed an improvised explosive device (IED) attack, committed an armed assault, acted within a cell, attempted to recruit others, and engaged in nonvirtual network activities and nonvirtual place interactions were significantly more likely to learn online compared with those who did not engage in these behaviors. Those undertaking unarmed assaults were significantly less likely to display online learning. The results also suggested that extreme-right-wing individuals who perpetrated an IED attack, associated with a wider network, attempted to recruit others, and engaged in nonvirtual network activities and nonvirtual place interactions were significantly more likely to communicate online with co-ideologues.","PeriodicalId":158704,"journal":{"name":"Criminology and public policy","volume":"358 5","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"138","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Criminology and public policy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1111/1745-9133.12249","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 138

Abstract

Public interest and policy debates surrounding the role of the Internet in terrorist activities is increasing. Criminology has said very little on the matter. By using a unique data set of 223 convicted United Kingdom–based terrorists, this article focuses on how they used the Internet in the commission of their crimes. As most samples of terrorist offenders vary in terms of capabilities (lone-actor vs. group offenders) and criminal sophistication (improvised explosive devices vs. stabbings), we tested whether the affordances they sought from the Internet significantly differed. The results suggest that extreme-right-wing individuals, those who planned an attack (as opposed to merely providing material support), conducted a lethal attack, committed an improvised explosive device (IED) attack, committed an armed assault, acted within a cell, attempted to recruit others, and engaged in nonvirtual network activities and nonvirtual place interactions were significantly more likely to learn online compared with those who did not engage in these behaviors. Those undertaking unarmed assaults were significantly less likely to display online learning. The results also suggested that extreme-right-wing individuals who perpetrated an IED attack, associated with a wider network, attempted to recruit others, and engaged in nonvirtual network activities and nonvirtual place interactions were significantly more likely to communicate online with co-ideologues.
恐怖分子利用互联网的数字:量化的行为,模式和过程
围绕互联网在恐怖主义活动中的作用的公众利益和政策辩论正在增加。犯罪学在这个问题上几乎没有说什么。通过使用223名被定罪的英国恐怖分子的独特数据集,本文重点关注他们如何利用互联网实施犯罪。由于大多数恐怖分子的样本在能力(单独行动者与群体犯罪者)和犯罪技巧(简易爆炸装置与刺杀)方面有所不同,我们测试了他们从互联网上寻求的支持是否有显著差异。结果表明,与没有参与这些行为的人相比,那些策划袭击(而不仅仅是提供物质支持)、实施致命袭击、实施简易爆炸装置(IED)袭击、实施武装袭击、在一个小组内行动、试图招募其他人、从事非虚拟网络活动和非虚拟场所互动的极右翼个人更有可能在网上学习。那些进行非武装攻击的人明显不太可能展示在线学习。研究结果还表明,实施简易爆炸装置袭击的极右翼分子,与更广泛的网络联系在一起,试图招募其他人,从事非虚拟网络活动和非虚拟场所互动,他们更有可能在网上与共同意识形态者交流。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信