Schumann, S, Kenyon, J and Binder, J ORCID: https://orcid.org/0000-0002-1083-7109,
2025.
Identifying distinct types of internet use that predict the likelihood of planning or committing a terrorist attack: findings from an analysis of individuals convicted on terrorism(-related) charges in England and Wales.
Computers in Human Behavior, 168: 108646.
ISSN 0747-5632
Preview |
Text
2420698_Binder.pdf - Published version Download (1MB) | Preview |
Abstract
Previous research has documented that the internet plays an increasingly important role in facilitating involvement in terrorism. However, the level of specificity of this literature is low. Advancing current insights, we examined how three concrete examples of active (i.e., generate/disseminate terrorist propaganda; interact with co ideologues) and two examples of passive (i.e., learn about terrorist ideologies/actors; learn tactical information) internet use are related to distinct distal and proximal dynamics of radicalisation. Additionally, we assessed associations between the different types of internet use and the likelihood of having planned/committed a terrorist attack. We analysed a unique dataset based on closed-source risk assessment reports of individuals convicted of terrorism(-related) offences in England and Wales (N = 377). Results of this secondary data analysis pointed to three internet use repertoires: (1) learning about tactical information and terrorist ideologies/actors; (2) only learning about terrorist ideologies/actors; (3) active internet use and learning about terrorist ideologies/actors. Learning about tactical information and terrorist ideologies/actors was (compared to the other two repertoires) associated with a higher likelihood of having planned/committed an act of terrorism. Additionally, levels of capability were higher if individuals learnt both tactical and ideological information online compared to using the internet actively and browsing content about terrorist ideologies/actors. Individuals characterised by either internet use repertoire did, however, not vary significantly regarding their levels of engagement with extremist ideas and actors and the degree to which they had developed an extremist mindset. The results can inform terrorist/violent extremist risk assessment.
Item Type: | Journal article |
---|---|
Publication Title: | Computers in Human Behavior |
Creators: | Schumann, S., Kenyon, J. and Binder, J. |
Publisher: | Elsevier BV |
Date: | July 2025 |
Volume: | 168 |
ISSN: | 0747-5632 |
Identifiers: | Number Type 10.1016/j.chb.2025.108646 DOI 2420698 Other |
Rights: | © 2025 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). |
Divisions: | Schools > School of Social Sciences |
Record created by: | Laura Borcherds |
Date Added: | 02 Apr 2025 12:32 |
Last Modified: | 02 Apr 2025 12:32 |
URI: | https://irep.ntu.ac.uk/id/eprint/53351 |
Actions (login required)
![]() |
Edit View |
Statistics
Views
Views per month over past year
Downloads
Downloads per month over past year