Home > Research > Publications & Outputs > Examining illicit networks in laboratory experi...

Links

Text available via DOI:

View graph of relations

Examining illicit networks in laboratory experiments with a preliminary focus on communication

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Examining illicit networks in laboratory experiments with a preliminary focus on communication. / Neequaye, David A.; Granhag, Pär Anders; Segerberg, Andreas et al.
In: Legal and Criminological Psychology, Vol. 28, No. 1, 28.02.2023, p. 150-164.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Neequaye, DA, Granhag, PA, Segerberg, A & Petterson, D 2023, 'Examining illicit networks in laboratory experiments with a preliminary focus on communication', Legal and Criminological Psychology, vol. 28, no. 1, pp. 150-164. https://doi.org/10.1111/lcrp.12230

APA

Neequaye, D. A., Granhag, P. A., Segerberg, A., & Petterson, D. (2023). Examining illicit networks in laboratory experiments with a preliminary focus on communication. Legal and Criminological Psychology, 28(1), 150-164. https://doi.org/10.1111/lcrp.12230

Vancouver

Neequaye DA, Granhag PA, Segerberg A, Petterson D. Examining illicit networks in laboratory experiments with a preliminary focus on communication. Legal and Criminological Psychology. 2023 Feb 28;28(1):150-164. Epub 2023 Jan 8. doi: 10.1111/lcrp.12230

Author

Neequaye, David A. ; Granhag, Pär Anders ; Segerberg, Andreas et al. / Examining illicit networks in laboratory experiments with a preliminary focus on communication. In: Legal and Criminological Psychology. 2023 ; Vol. 28, No. 1. pp. 150-164.

Bibtex

@article{f31ee93c27a34d84805ee9c266ba82ce,
title = "Examining illicit networks in laboratory experiments with a preliminary focus on communication",
abstract = "PurposeThis research introduces a web application, the bot orchestrator, to assist researchers in developing paradigms to examine illicit networks in experiments. We implemented the application and a new paradigm to create mock networks using strangers. The proof-of-concept experiment examined communication when networks plan illicit activities.MethodParticipants assumed the role of an illicit network member—either a manager, a coordinator or an executor. They held some information the group needed to accomplish either a material or ideological goal: communication between the roles was imperative for success. We also manipulated the level of risk associated with communicating about the planning activities. For half of the participants, there was a moderate risk of communicating about the plans. For the other half, the risk of such communication was high. The procedure allowed us to examine who a network member was willing to communicate with, given the goal under pursuit and the associated risk level.ResultsAlthough goal-type, risk level, and the Goal-type × Risk Interaction did not significantly predict communication decisions, a content analysis suggested that participants were attempting to navigate the risks while pursuing their goals. Participants employed diverse communication strategies: individual differences explained the most variance regarding how network members communicate.ConclusionsWe hope the web application and paradigm this research introduces will facilitate further experiments examining illicit networks.",
keywords = "communication, goal pursuit, illicit networks, intelligence gathering, risk perception",
author = "Neequaye, {David A.} and Granhag, {P{\"a}r Anders} and Andreas Segerberg and Daniel Petterson",
year = "2023",
month = feb,
day = "28",
doi = "10.1111/lcrp.12230",
language = "English",
volume = "28",
pages = "150--164",
journal = "Legal and Criminological Psychology",
issn = "1355-3259",
publisher = "Wiley-Blackwell",
number = "1",

}

RIS

TY - JOUR

T1 - Examining illicit networks in laboratory experiments with a preliminary focus on communication

AU - Neequaye, David A.

AU - Granhag, Pär Anders

AU - Segerberg, Andreas

AU - Petterson, Daniel

PY - 2023/2/28

Y1 - 2023/2/28

N2 - PurposeThis research introduces a web application, the bot orchestrator, to assist researchers in developing paradigms to examine illicit networks in experiments. We implemented the application and a new paradigm to create mock networks using strangers. The proof-of-concept experiment examined communication when networks plan illicit activities.MethodParticipants assumed the role of an illicit network member—either a manager, a coordinator or an executor. They held some information the group needed to accomplish either a material or ideological goal: communication between the roles was imperative for success. We also manipulated the level of risk associated with communicating about the planning activities. For half of the participants, there was a moderate risk of communicating about the plans. For the other half, the risk of such communication was high. The procedure allowed us to examine who a network member was willing to communicate with, given the goal under pursuit and the associated risk level.ResultsAlthough goal-type, risk level, and the Goal-type × Risk Interaction did not significantly predict communication decisions, a content analysis suggested that participants were attempting to navigate the risks while pursuing their goals. Participants employed diverse communication strategies: individual differences explained the most variance regarding how network members communicate.ConclusionsWe hope the web application and paradigm this research introduces will facilitate further experiments examining illicit networks.

AB - PurposeThis research introduces a web application, the bot orchestrator, to assist researchers in developing paradigms to examine illicit networks in experiments. We implemented the application and a new paradigm to create mock networks using strangers. The proof-of-concept experiment examined communication when networks plan illicit activities.MethodParticipants assumed the role of an illicit network member—either a manager, a coordinator or an executor. They held some information the group needed to accomplish either a material or ideological goal: communication between the roles was imperative for success. We also manipulated the level of risk associated with communicating about the planning activities. For half of the participants, there was a moderate risk of communicating about the plans. For the other half, the risk of such communication was high. The procedure allowed us to examine who a network member was willing to communicate with, given the goal under pursuit and the associated risk level.ResultsAlthough goal-type, risk level, and the Goal-type × Risk Interaction did not significantly predict communication decisions, a content analysis suggested that participants were attempting to navigate the risks while pursuing their goals. Participants employed diverse communication strategies: individual differences explained the most variance regarding how network members communicate.ConclusionsWe hope the web application and paradigm this research introduces will facilitate further experiments examining illicit networks.

KW - communication

KW - goal pursuit

KW - illicit networks

KW - intelligence gathering

KW - risk perception

U2 - 10.1111/lcrp.12230

DO - 10.1111/lcrp.12230

M3 - Journal article

VL - 28

SP - 150

EP - 164

JO - Legal and Criminological Psychology

JF - Legal and Criminological Psychology

SN - 1355-3259

IS - 1

ER -