2019
DOI: 10.1111/1745-9133.12466
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing person‐exposure patterns in lone‐actor terrorism

Abstract: Research Summary:The lone-actor terrorist population can be extremely heterogeneous and difficult to detect. Intelligence is vital to countering this threat. We devise a typology of person-exposure patterns (PEPs) that could serve as a framework for intelligence gathering and threat assessment. We use cluster analysis and a risk analysis framework (RAF) to identify relations among three components: propensity, situation, and network.The results of the analysis reveal four PEPs: solitary, susceptible, situation… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
24
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 23 publications
(25 citation statements)
references
References 106 publications
0
24
0
1
Order By: Relevance
“…This article also follows Gill et al (2017) as well as a number of other database studies (Clemmow, Bouhana, & Gill, 2020;Gill, Horgan, & Deckert, 2014;Silver, Horgan, & Gill, 2018) in coding most of the variables in a dichotomous manner-that is to say behaviors were coded as "present" or "not enough information to code as present" as opposed to a three-answer coding system of "Yes," "No," and "Not enough information" (e.g: Horgan, Shortland, Abbasciano, & Walsh, 2016;. The two-answer system is used by Gill et al (2017), who justify it on the grounds that most open-sourcing reporting on terrorism does not detail what an individual did not do, and as such:…”
Section: 22mentioning
confidence: 79%
“…This article also follows Gill et al (2017) as well as a number of other database studies (Clemmow, Bouhana, & Gill, 2020;Gill, Horgan, & Deckert, 2014;Silver, Horgan, & Gill, 2018) in coding most of the variables in a dichotomous manner-that is to say behaviors were coded as "present" or "not enough information to code as present" as opposed to a three-answer coding system of "Yes," "No," and "Not enough information" (e.g: Horgan, Shortland, Abbasciano, & Walsh, 2016;. The two-answer system is used by Gill et al (2017), who justify it on the grounds that most open-sourcing reporting on terrorism does not detail what an individual did not do, and as such:…”
Section: 22mentioning
confidence: 79%
“…Temporal sequencing underscores the finding by others that pathways to targeted violence, including terrorist violence, are complex, and single motivational explanations are insufficient (Clemmow et al, 2019; Corner et al, 2019; Corner & Gill, 2019). The temporal sequence in Figure 1 quantitatively illustrates the concept of equifinality : There are a number of pathways that can lead to one particular outcome.…”
Section: Discussionmentioning
confidence: 93%
“…Clemmow et al (2019) devised a typology of person-exposure patterns (PEPs) and used cluster analysis to identify the relationships among propensity, situation, and exposure indicators; they identified four person-exposure patterns: the solitary, susceptible, situational, and selection. This cluster analysis nicely pairs with the TRAP-18, highlighting both its strengths and weaknesses.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations