Search results

1 – 10 of 924
Article
Publication date: 2 October 2017

Michael Tierney

In 2014, Paul Gill et al. introduced a study of 119 lone-actor terrorism cases, and found that lone-actor extremists could be more accurately identified by their behavioural…

638

Abstract

Purpose

In 2014, Paul Gill et al. introduced a study of 119 lone-actor terrorism cases, and found that lone-actor extremists could be more accurately identified by their behavioural characteristics and activities, rather than their extremist ideologies. The study was said to have significant impact on intelligence analysis in the field of counterterrorism. The purpose of this paper is to apply Gill et al.’s findings to financial intelligence investigations, to assist investigators with the detection and prevention of lone-actor terrorist financing.

Design/methodology/approach

This article provides an overview of the key findings provided by Gill et al. It then discusses the indicators of lone-actor terrorism in the context of financial intelligence investigations, and sets out methods to improve financial intelligence investigations to better identify and stop lone-actor terrorism in the future.

Findings

By applying traditional financial intelligence techniques, which focus on assessing an individual’s activity and behaviour, with open-source intelligence gathering, financial intelligence investigators will be better equipped to identify lone-actor terrorism and its financing moving forward.

Originality/value

This article will be of value to investigators specializing in terrorism and financial crime, as it will assist them in the identification of a proliferating security threat, the lone-actor terrorist. While the article relies on the findings provided by Gill et al., it takes a new approach by applying those findings specifically to the financial intelligence sector, to improve investigations related to terrorism.

Details

Journal of Financial Crime, vol. 24 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Book part
Publication date: 11 September 2015

Brent L. Smith, Jeff Gruenewald, Paxton Roberts and Kelly R. Damphousse

In this chapter, we examine several attributes of lone wolf terrorists and how their activities are temporally and geospatially patterned. In particular, we demonstrate how…

Abstract

Purpose

In this chapter, we examine several attributes of lone wolf terrorists and how their activities are temporally and geospatially patterned. In particular, we demonstrate how precursor behaviors and attack characteristics of lone wolves are similar and different compared to those of group-based terrorists.

Methodology/approach

Based on data drawn from the American Terrorism Study (ATS), we examine 268 federal terrorism “indictees” linked to 264 incidents. Three types of loners are identified based on group affiliations and levels of assistance in preparing for and executing terrorist attacks. A series of analyses comparatively examine loners who had no assistance and those actors that did.

Findings

The results of this study suggest that lone wolf terrorists are more educated and socially isolated than group-based actors. Lone wolves also engage in less precursor activities than group actors, but are willing to travel greater distances to prepare for and execute attacks. Explanations for why lone wolves are able to “survive” longer than terrorist groups by avoiding arrest may in part stem from their ability to temporally and geospatially position their planning and preparatory activities.

Originality/value

Studies on lone wolf terrorism remain few and many are plagued by methodological and conceptual limitations. The current study adds to this growing literature by relying on lone wolf terrorism data recently made available by the American Terrorism Study (ATS). Our findings are valuable for members of the law enforcement and intelligence communities responsible for the early detection and prevention of lone wolf terrorism in the United States.

Details

Terrorism and Counterterrorism Today
Type: Book
ISBN: 978-1-78560-191-0

Keywords

Book part
Publication date: 11 September 2015

Thomas Kron, Andreas Braun and Eva-Maria Heinke

This chapter looks at a new form of a hybrid perpetrator within the field of individualized political violence. We reveal, that the new thing about (transnational) terrorism…

Abstract

Purpose

This chapter looks at a new form of a hybrid perpetrator within the field of individualized political violence. We reveal, that the new thing about (transnational) terrorism overcomes current oppositions and contradictions regarding terrorists and persons running amok, which (strategically) leads to an individualization of terrorism and thereby to a hybridization of a terroristic warfare.

Methodology/approach

By outlining organizational and structural changes in terroristic strategy within the framework of using both modern and antimodern elements, economic thinking, acting global as well as local, and by using network structures, the individualization of terror to the point of hybrid perpetrators is presented.

Findings

The new thing about (transnational) terrorism is the evolution of individualized perpetrators, radicalizing themselves without a clear connection to terroristic organizations. This leads to a hybridization of terroristic warfare, and within individualized single perpetrators it can be described as terrok. A terrorist running amok or a gunman on rampage with a radicalized mindset, equipped with his very individual ideology, who carries out his attacks logistically and operatively on his own while accepting his own death constitutes a new strategic way of irritating western society.

Originality/value

Currently, terrorists and persons running amok are separated into sharply distinguished categories. But regarding new tendencies in terroristic attacks committed by single perpetrators, this separation seems to be no longer able to capture the individualization of terrorism and thereby the linked hybridization of a terroristic warfare adequately. But in combining findings from both approaches, the new concept of terrok is able to do so.

Details

Terrorism and Counterterrorism Today
Type: Book
ISBN: 978-1-78560-191-0

Keywords

Abstract

Details

Journal of Intellectual Disabilities and Offending Behaviour, vol. 9 no. 1
Type: Research Article
ISSN: 2050-8824

Expert briefing
Publication date: 26 August 2016

Lone-actor terrorist motivations.

Details

DOI: 10.1108/OXAN-DB213243

ISSN: 2633-304X

Keywords

Geographic
Topical
Executive summary
Publication date: 23 March 2017

UNITED KINGDOM: Lone-actor attacks are hard to prevent

Details

DOI: 10.1108/OXAN-ES219821

ISSN: 2633-304X

Keywords

Geographic
Topical
Article
Publication date: 12 June 2017

Lino Faccini and Clare S. Allely

The prevalence of individuals with an autism spectrum disorder (ASD) being associated with terroristic threats, lone wolf terrorism or affiliating with terroristic groups is rare…

Abstract

Purpose

The prevalence of individuals with an autism spectrum disorder (ASD) being associated with terroristic threats, lone wolf terrorism or affiliating with terroristic groups is rare. This paper aims to discuss this issue.

Design/methodology/approach

However, several cases are presented, where individuals with autism are involved in making a naïve, empty terroristic threat or uttering serious serial terroristic threats. Other cases are also presented of individuals being at risk for an abduction or being used by a terrorist group, and finally committing an act of domestic lone wolf terrorism.

Findings

Essential to the analysis was establishing a functional connection between autism-based deficits and the terroristic threats, terrorism, and when to not criminalize naïve, empty terroristic threats or acts.

Originality/value

Currently, tools available to law enforcement and prosecutors exploit the vulnerabilities and liabilities which arise as a result of group interactions, a “preventive” approach to terrorism that is not applicable to the solitary, “lone wolf” terrorist. There has been relatively little research (including case studies) examining individuals with ASD who engage in terrorism. For instance, when dealing with an individual with ASD who is charged with terrorism, it is crucial to consider how the diagnosis of autism may have presented as a contextual vulnerability, and to make sure that justice, rehabilitation and management, are informed by an understanding of the person’s diagnosis of ASD.

Details

Journal of Intellectual Disabilities and Offending Behaviour, vol. 8 no. 2
Type: Research Article
ISSN: 2050-8824

Keywords

Book part
Publication date: 6 November 2012

David Gibbs and Kirstie O’Neill

Purpose – There has been a growing interest in the development of a ‘green’ or ‘low carbon’ economy as a means of reconciling economic development and the environment. Research on…

Abstract

Purpose – There has been a growing interest in the development of a ‘green’ or ‘low carbon’ economy as a means of reconciling economic development and the environment. Research on green entrepreneurs to date has been upon individual entrepreneurs, neglecting wider economic and social contexts within which they operate. By looking at these wider networks of support, we suggest that discourses of the lone entrepreneur innovating and changing business practices are misrepresentative.

Methodology/approach – Semi-structured interviews to investigate green entrepreneurship with green building companies and policy makers.

Findings – Combined with new demands from consumers for more environmentally friendly products and services, the changing shape of national and global economies is leading to new forms of entrepreneurship. We identify a number of tensions between policy intentions and businesses’ experiences on the ground.

Research limitations/implications – To date, research has only been undertaken in the UK – we recommend that future research takes other national contexts into account. Other economic sectors also represent promising areas for future research, potentially including social enterprises in the green economy. Sustainability transitions theories offer a potentially valuable means for understanding the role of businesses in engendering a green economy.

Practical implications – Implications for policy frameworks are outlined in the conclusions.

Originality/value of chapter – By incorporating policy and support organisations, and informal networks of support, the chapter challenges the dominant view of the lone entrepreneurial hero and points to the significance of networks for facilitating green entrepreneurship. This will be of importance for policy makers and funders of entrepreneurship programmes.

Details

Social and Sustainable Enterprise: Changing the Nature of Business
Type: Book
ISBN: 978-1-78190-254-7

Keywords

Article
Publication date: 31 August 2021

Ryan Little, Peter Ford and Alessandra Girardi

Understanding the psychological risk factors in radicalisation and terrorism is typically limited by both a lack of access to individuals who carry out the acts and those who are…

Abstract

Purpose

Understanding the psychological risk factors in radicalisation and terrorism is typically limited by both a lack of access to individuals who carry out the acts and those who are willing to engage in research on the matter. The purpose of this study is to describe the process of self-radicalisation of an otherwise law-abiding individual who engaged in single-actor terrorism activities.

Design/methodology/approach

A single case study, based on clinical interviews and psychometric testing, of an individual with autism who engaged in multiple acts of terrorism through online activity. The case is presented within existing frameworks of radicalisation, and describes how it developed along the steps described in the path to intended violence.

Findings

A number of variables are identified as contributing towards the individual’s vulnerability to radicalisation, such as deficits in higher order cognition, psychopathology, autism spectrum disorder traits, personal interests, social isolation and life stressors.

Originality/value

Unique to this study is how the process of radicalisation and the possibility to carry out the individual’s attacks was made possible only through the use of internet technology.

Details

Journal of Intellectual Disabilities and Offending Behaviour, vol. 12 no. 3/4
Type: Research Article
ISSN: 2050-8824

Keywords

Article
Publication date: 23 May 2008

Svante Leijon and Arne Söderbom

The purpose of this research paper is to contribute to strategy theory by differentiating different types of top management narratives and trying to understand the interplay…

1242

Abstract

Purpose

The purpose of this research paper is to contribute to strategy theory by differentiating different types of top management narratives and trying to understand the interplay between them as well as the dynamics over time.

Design/methodology/approach

The study was designed from an interpretative narrative approach. Narratives were produced from deep interviews and organisational documents covering a period of more than 25 years.

Findings

Two kinds of narratives were detected – builders and cleaners. The builders' narratives illustrate how personal life‐stories are embedded in the strategic development processes but the cleaners' narratives are organisational stories without personal life‐stories and cover no actual development. The concept meta‐narrative helped to understand strategic changes over time and was embedded in the myth‐periods involved. The meta‐narrative identified was built on an idea of a going concern and on the role to produce physical large objects for long‐term use.

Research limitations/implications

Owing to the longitudinal design of the study a cyclical pattern with related managerial narratives were produced. The dichotomy builders and cleaners could be developed studying other longitudinal business strategies and also by connections to meta‐narratives derived from more general economic theories.

Practical implications

Builders and cleaners focus on either business or organisational/financial aspects but neither of both. Awareness of this, learning strategic management requires co‐operation between different actors.

Originality/value

The longitudinal design describes and analyzes a cyclical pattern of managerial patterns, while other studies based on narratives cover more limited organisational events in time and space.

Details

Journal of Organizational Change Management, vol. 21 no. 3
Type: Research Article
ISSN: 0953-4814

Keywords

1 – 10 of 924