Lone-Actor Terrorism–A Systematic Literature Review

Authors: Kenyon, J., Baker-Beall, C. and Binder, J.

Journal: Studies in Conflict and Terrorism

Volume: 46

Issue: 10

Pages: 2038-2065

eISSN: 1521-0731

ISSN: 1057-610X

DOI: 10.1080/1057610X.2021.1892635

Abstract:

A systematic review of the empirical literature on lone-actor terrorism, the first of its kind, is presented. Across 109 sources, ten main themes that characterize this domain are identified and described: definitions of lone-actor terrorism and typologies; heterogeneity of lone-actor terrorists; presence of mental health issues and/or personality disorders; similarities with other lone-offender criminal types; motivation to act driven by personal and ideological influences; increasing prominence of internet use; ties with other extremists, groups or wider movements; processes of attack planning and preparation; role of opportunity/triggers; and a tendency toward leakage/attack signaling.

https://eprints.bournemouth.ac.uk/35507/

Source: Scopus

Lone-Actor Terrorism - A Systematic Literature Review

Authors: Kenyon, J., Baker-Beall, C. and Binder, J.

Journal: STUDIES IN CONFLICT & TERRORISM

Volume: 46

Issue: 10

Pages: 2038-2065

eISSN: 1521-0731

ISSN: 1057-610X

DOI: 10.1080/1057610X.2021.1892635

https://eprints.bournemouth.ac.uk/35507/

Source: Web of Science (Lite)

Lone-Actor Terrorism - A Systematic Literature Review

Authors: Kenyon, J., Baker-Beall, C. and Binder, J.

Journal: Studies in Conflict and Terrorism

Volume: 46

Issue: 10

Pages: 2038-2065

ISSN: 1057-610X

Abstract:

A systematic review of the empirical literature on lone-actor terrorism, the first of its kind, is presented. Across 109 sources, ten main themes that characterize this domain are identified and described: definitions of lone-actor terrorism and typologies; heterogeneity of lone-actor terrorists; presence of mental health issues and/or personality disorders; similarities with other lone-offender criminal types; motivation to act driven by personal and ideological influences; increasing prominence of internet use; ties with other extremists, groups or wider movements; processes of attack planning and preparation; role of opportunity/triggers; and a tendency toward leakage/attack signaling.

https://eprints.bournemouth.ac.uk/35507/

Source: BURO EPrints