Lone-Actor Terrorism–A Systematic Literature Review
Authors: Kenyon, J., Baker-Beall, C. and Binder, J.
Journal: Studies in Conflict and Terrorism
Volume: 46
Issue: 10
Pages: 2038-2065
eISSN: 1521-0731
ISSN: 1057-610X
DOI: 10.1080/1057610X.2021.1892635
Abstract:A systematic review of the empirical literature on lone-actor terrorism, the first of its kind, is presented. Across 109 sources, ten main themes that characterize this domain are identified and described: definitions of lone-actor terrorism and typologies; heterogeneity of lone-actor terrorists; presence of mental health issues and/or personality disorders; similarities with other lone-offender criminal types; motivation to act driven by personal and ideological influences; increasing prominence of internet use; ties with other extremists, groups or wider movements; processes of attack planning and preparation; role of opportunity/triggers; and a tendency toward leakage/attack signaling.
https://eprints.bournemouth.ac.uk/35507/
Source: Scopus
Lone-Actor Terrorism - A Systematic Literature Review
Authors: Kenyon, J., Baker-Beall, C. and Binder, J.
Journal: STUDIES IN CONFLICT & TERRORISM
Volume: 46
Issue: 10
Pages: 2038-2065
eISSN: 1521-0731
ISSN: 1057-610X
DOI: 10.1080/1057610X.2021.1892635
https://eprints.bournemouth.ac.uk/35507/
Source: Web of Science (Lite)
Lone-Actor Terrorism - A Systematic Literature Review
Authors: Kenyon, J., Baker-Beall, C. and Binder, J.
Journal: Studies in Conflict and Terrorism
Volume: 46
Issue: 10
Pages: 2038-2065
ISSN: 1057-610X
Abstract:A systematic review of the empirical literature on lone-actor terrorism, the first of its kind, is presented. Across 109 sources, ten main themes that characterize this domain are identified and described: definitions of lone-actor terrorism and typologies; heterogeneity of lone-actor terrorists; presence of mental health issues and/or personality disorders; similarities with other lone-offender criminal types; motivation to act driven by personal and ideological influences; increasing prominence of internet use; ties with other extremists, groups or wider movements; processes of attack planning and preparation; role of opportunity/triggers; and a tendency toward leakage/attack signaling.
https://eprints.bournemouth.ac.uk/35507/
Source: BURO EPrints