{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T16:04:02Z","timestamp":1720454642536},"reference-count":101,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/100010686","name":"H2020 European Institute of Innovation and Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100010686","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers in Human Behavior"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1016\/j.chb.2020.106646","type":"journal-article","created":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T21:01:01Z","timestamp":1607374861000},"page":"106646","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":9,"special_numbering":"C","title":["Faces of radicalism: Differentiating between violent and non-violent radicals by their social media profiles"],"prefix":"10.1016","volume":"116","author":[{"given":"Michael","family":"Wolfowicz","sequence":"first","affiliation":[]},{"given":"Simon","family":"Perry","sequence":"additional","affiliation":[]},{"given":"Badi","family":"Hasisi","sequence":"additional","affiliation":[]},{"given":"David","family":"Weisburd","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.chb.2020.106646_bib1","series-title":"Social learning and social structure: A general theory of crime and deviance","author":"Akers","year":"1998"},{"key":"10.1016\/j.chb.2020.106646_bib2","series-title":"Criminological theories. 4","author":"Akers","year":"2004"},{"key":"10.1016\/j.chb.2020.106646_bib3","series-title":"Violence: From theory to research","first-page":"27","article-title":"Toward a social learning model of violence and terrorism","author":"Akers","year":"2014"},{"key":"10.1016\/j.chb.2020.106646_bib4","doi-asserted-by":"crossref","DOI":"10.1002\/9781118923986.ch8","article-title":"Social learning theory and becoming a terrorist: New challenges for a general theory","volume":"133","author":"Akins","year":"2016","journal-title":"The Handbook of the Criminology of Terrorism"},{"issue":"3","key":"10.1016\/j.chb.2020.106646_bib6","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1111\/pops.12365","article-title":"Lone\u2010actor terrorists' emotions and cognition: An evaluation beyond stereotypes","volume":"38","author":"Baele","year":"2017","journal-title":"Political Psychology"},{"issue":"3","key":"10.1016\/j.chb.2020.106646_bib7","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1111\/j.1460-2466.1978.tb01621.x","article-title":"Social learning theory of aggression","volume":"28","author":"Bandura","year":"1978","journal-title":"Journal of Communication"},{"key":"10.1016\/j.chb.2020.106646_bib8","series-title":"Social foundations of thought and action: A social cognitive theory","author":"Bandura","year":"1986"},{"key":"10.1016\/j.chb.2020.106646_bib9","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1016\/j.chb.2017.09.032","article-title":"Dark personalities on Facebook: Harmful online behaviors and language","volume":"78","author":"Bogolyubova","year":"2018","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"10.1016\/j.chb.2020.106646_bib10","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1093\/oxfordjournals.aje.a112623","article-title":"Estimation of multiple relative risk functions in matched case-control studies","volume":"108","author":"Breslow","year":"1978","journal-title":"American Journal of Epidemiology"},{"issue":"4","key":"10.1016\/j.chb.2020.106646_bib11","doi-asserted-by":"crossref","first-page":"693","DOI":"10.1093\/oxfordjournals.aje.a114443","article-title":"Matched case-control designs and overmatched analyses","volume":"124","author":"Brookmeyer","year":"1986","journal-title":"American Journal of Epidemiology"},{"issue":"9","key":"10.1016\/j.chb.2020.106646_bib12","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0220623","article-title":"Can acute suicidality be predicted by instagram data? Results from qualitative and quantitative language analyses","volume":"14","author":"Brown","year":"2019","journal-title":"PloS One"},{"issue":"1","key":"10.1016\/j.chb.2020.106646_bib13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/2190-8532-2-11","article-title":"Harvesting and analysis of weak signals for detecting lone wolf terrorists","volume":"2","author":"Brynielsson","year":"2013","journal-title":"Security Informatics"},{"issue":"1","key":"10.1016\/j.chb.2020.106646_bib14","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1177\/1362480615586614","article-title":"Is big data challenging criminology?","volume":"20","author":"Chan","year":"2016","journal-title":"Theoretical Criminology"},{"issue":"1","key":"10.1016\/j.chb.2020.106646_bib15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41746-020-0233-7","article-title":"Methods in predictive techniques for mental health status on social media: A critical review","volume":"3","author":"Chancellor","year":"2020","journal-title":"NPJ digital medicine"},{"key":"10.1016\/j.chb.2020.106646_bib16","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/j.chb.2018.12.029","article-title":"Understanding emotions in text using deep learning and big data","volume":"93","author":"Chatterjee","year":"2019","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"10.1016\/j.chb.2020.106646_bib18","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1080\/09546553.2014.849948","article-title":"Detecting linguistic markers for radical violence in social media","volume":"26","author":"Cohen","year":"2014","journal-title":"Terrorism and Political Violence"},{"key":"10.1016\/j.chb.2020.106646_bib19","series-title":"Differential Reinforcement in the online Radicalization of western muslim women converts (doctoral dissertation","author":"Cone","year":"2016"},{"key":"10.1016\/j.chb.2020.106646_bib20","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1016\/j.chb.2016.05.033","article-title":"Who views online extremism? Individual attributes leading to exposure","volume":"63","author":"Costello","year":"2016","journal-title":"Computers in Human Behavior"},{"issue":"11","key":"10.1016\/j.chb.2020.106646_bib21","doi-asserted-by":"crossref","first-page":"1150","DOI":"10.14778\/2536222.2536239","article-title":"Unicorn: A system for searching the social graph","volume":"6","author":"Curtiss","year":"2013","journal-title":"Proceedings of the VLDB Endowment"},{"key":"10.1016\/j.chb.2020.106646_bib22","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1016\/j.dss.2014.12.001","article-title":"Online profiling and clustering of Facebook users","volume":"70","author":"van Dam","year":"2015","journal-title":"Decision Support Systems"},{"key":"10.1016\/j.chb.2020.106646_bib23","series-title":"A comparison of ISIS foreign fighters and supporters social media posts: An exploratory mixed-method content analysis","author":"Dillon","year":"2019"},{"issue":"5\u20136","key":"10.1016\/j.chb.2020.106646_bib24","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1177\/0270467615584044","article-title":"Facebook displays as predictors of binge drinking: From the virtual to the visceral","volume":"34","author":"D'Angelo","year":"2014","journal-title":"Bulletin of Science, Technology & Society"},{"key":"10.1016\/j.chb.2020.106646_bib25","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1016\/j.chb.2014.04.048","article-title":"Capturing personality from Facebook photos and photo-related activities: How much exposure do you need?","volume":"37","author":"Eftekhar","year":"2014","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2020.106646_bib26","series-title":"2013 IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM 2013)","first-page":"699","article-title":"Analysis of publicly disclosed information in facebook profiles","author":"Farahbakhsh","year":"2013"},{"key":"10.1016\/j.chb.2020.106646_bib27","series-title":"Conditional logistic regression with sandwich estimators: Application to a meta-analysis","author":"Fay","year":"1998"},{"key":"10.1016\/j.chb.2020.106646_bib28","series-title":"International conference on social informatics","first-page":"22","article-title":"November). Predicting online extremism, content adopters, and interaction reciprocity","author":"Ferrara","year":"2016"},{"issue":"7\u20138","key":"10.1016\/j.chb.2020.106646_bib29","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1080\/1057610X.2016.1140998","article-title":"Measurement issues in the study of terrorism: Introducing the special issue","volume":"39","author":"Freilich","year":"2016","journal-title":"Studies in Conflict and Terrorism"},{"key":"10.1016\/j.chb.2020.106646_bib30","first-page":"106549","article-title":"Internet, the great radicalizer? Exploring relationships between seeking for online extremist materials and cognitive radicalization in young adults","author":"Frissen","year":"2020","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2020.106646_bib31","doi-asserted-by":"crossref","first-page":"576","DOI":"10.1016\/j.chb.2017.08.001","article-title":"A systematic review of the mental health outcomes associated with Facebook use","volume":"76","author":"Frost","year":"2017","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2020.106646_bib32","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/j.chb.2015.11.040","article-title":"Beyond positive or negative: Qualitative sentiment analysis of social media reactions to unexpected stressful events","volume":"56","author":"Gaspar","year":"2016","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"10.1016\/j.chb.2020.106646_bib33","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1111\/1745-9133.12249","article-title":"Terrorist use of the Internet by the numbers: Quantifying behaviors, patterns, and processes","volume":"16","author":"Gill","year":"2017","journal-title":"Criminology & Public Policy"},{"issue":"3\u20134","key":"10.1016\/j.chb.2020.106646_bib34","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1037\/tam0000066","article-title":"Indicators of lone actor violent events: The problems of low base rates and long observational periods","volume":"3","author":"Gill","year":"2016","journal-title":"Journal of Threat Assessment and Management"},{"key":"10.1016\/j.chb.2020.106646_bib35","series-title":"2010 proceedings IEEE infocom","first-page":"1","article-title":"March). Walking in facebook: A case study of unbiased sampling of osns","author":"Gjoka","year":"2010"},{"issue":"9","key":"10.1016\/j.chb.2020.106646_bib36","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1089\/cyber.2010.0087","article-title":"Manifestations of personality in online social networks: Self-reported Facebook-related behaviors and observable profile information","volume":"14","author":"Gosling","year":"2011","journal-title":"Cyberpsychology, Behavior, and Social Networking"},{"key":"10.1016\/j.chb.2020.106646_bib37","series-title":"2013 international conference on social computing","first-page":"671","article-title":"Exploring image virality in google plus","author":"Guerini","year":"2013"},{"issue":"4","key":"10.1016\/j.chb.2020.106646_bib38","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1177\/0261927X05281426","article-title":"The emotional broadcaster theory of social sharing","volume":"24","author":"Harber","year":"2005","journal-title":"Journal of Language and Social Psychology"},{"issue":"1","key":"10.1016\/j.chb.2020.106646_bib39","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1177\/0261927X13502793","article-title":"Hearing stories that violate expectations leads to emotional broadcasting","volume":"33","author":"Harber","year":"2014","journal-title":"Journal of Language and Social Psychology"},{"key":"10.1016\/j.chb.2020.106646_bib40","first-page":"1","article-title":"Crime and terror: Examining criminal risk factors for terrorist recidivism","author":"Hasisi","year":"2019","journal-title":"Journal of Quantitative Criminology"},{"key":"10.1016\/j.chb.2020.106646_bib41","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1007\/978-981-10-4181-5_22","article-title":"Counter-terrorism effectiveness and human rights in Israel","author":"Hasisi","year":"2019","journal-title":"International human rights and counter-terrorism"},{"issue":"4","key":"10.1016\/j.chb.2020.106646_bib42","doi-asserted-by":"crossref","first-page":"1013","DOI":"10.1086\/320298","article-title":"Delinquent peers revisited: Does network structure matter?","volume":"106","author":"Haynie","year":"2001","journal-title":"American Journal of Sociology"},{"issue":"2","key":"10.1016\/j.chb.2020.106646_bib43","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1023\/A:1015227414929","article-title":"Friendship networks and delinquency: The relative nature of peer delinquency","volume":"18","author":"Haynie","year":"2002","journal-title":"Journal of Quantitative Criminology"},{"issue":"4","key":"10.1016\/j.chb.2020.106646_bib44","doi-asserted-by":"crossref","first-page":"688","DOI":"10.1111\/1745-9125.12052","article-title":"Gender, friendship networks, and delinquency: A dynamic network approach","volume":"52","author":"Haynie","year":"2014","journal-title":"Criminology"},{"issue":"1","key":"10.1016\/j.chb.2020.106646_bib45","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1080\/18335330.2013.877375","article-title":"Developing grading processes for ideological content","volume":"9","author":"Holbrook","year":"2014","journal-title":"Journal of Policing, Intelligence and Counter Terrorism"},{"key":"10.1016\/j.chb.2020.106646_bib46","series-title":"Cybercrime in progress: Theory and prevention of technology-enabled offenses","author":"Holt","year":"2016"},{"issue":"2","key":"10.1016\/j.chb.2020.106646_bib47","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1080\/0735648X.2010.9721287","article-title":"Social learning and cyber-deviance: Examining the importance of a full social learning model in the virtual world","volume":"33","author":"Holt","year":"2010","journal-title":"Journal of Crime and Justice"},{"key":"10.1016\/j.chb.2020.106646_bib48","series-title":"International conference on information systems","article-title":"Facebook groups: Perception and usage among undergraduates in the context of learning","author":"Hong","year":"2014"},{"key":"10.1016\/j.chb.2020.106646_bib49","volume":"Vol. 398","author":"Hosmer","year":"2013"},{"key":"10.1016\/j.chb.2020.106646_bib50","article-title":"Exploring the dominant features of social media for depression detection","author":"Hussain","year":"2019","journal-title":"Journal of Information Science"},{"key":"10.1016\/j.chb.2020.106646_bib51","series-title":"2016 IEEE international conference on cybercrime and computer forensic (ICCCF)","first-page":"1","article-title":"June). Linguistic analysis of lone offender manifestos","author":"Kaati","year":"2016"},{"key":"10.1016\/j.chb.2020.106646_bib52","series-title":"Non-state armed actors in the Middle East","first-page":"213","article-title":"The making of European foreign fighters: Identity, social media and virtual radicalization","author":"Karda\u015f","year":"2018"},{"key":"10.1016\/j.chb.2020.106646_bib53","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.tele.2018.12.005","article-title":"Liking, sharing, commenting and reacting on Facebook: User behaviors' impact on sentiment intensity","volume":"39","author":"Kaur","year":"2019","journal-title":"Telematics and Informatics"},{"issue":"2","key":"10.1016\/j.chb.2020.106646_bib54","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1016\/j.pubrev.2017.02.006","article-title":"Like, comment, and share on Facebook: How each behavior differs from the other","volume":"43","author":"Kim","year":"2017","journal-title":"Public Relations Review"},{"issue":"4","key":"10.1016\/j.chb.2020.106646_bib55","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1002\/ab.20250","article-title":"Pornography use and sexual aggression: The impact of frequency and type of pornography use on recidivism among sexual offenders","volume":"34","author":"Kingston","year":"2008","journal-title":"Aggressive Behavior"},{"issue":"1","key":"10.1016\/j.chb.2020.106646_bib56","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1080\/1057610X.2015.1099995","article-title":"Toward a behavioral model of \u201chomegrown\u201d radicalization trajectories","volume":"39","author":"Klausen","year":"2016","journal-title":"Studies in Conflict & Terrorism"},{"key":"10.1016\/j.chb.2020.106646_bib57","first-page":"1","article-title":"Radicalization trajectories: An evidence-based computational approach to dynamic risk assessment of \u201chomegrown\u201d jihadists","author":"Klausen","year":"2018","journal-title":"Studies in Conflict & Terrorism"},{"key":"10.1016\/j.chb.2020.106646_bib58","doi-asserted-by":"crossref","first-page":"57","DOI":"10.3389\/fpubh.2018.00057","article-title":"Unconditional or conditional logistic regression model for age-matched case\u2013control data?","volume":"6","author":"Kuo","year":"2018","journal-title":"Frontiers in public health"},{"key":"10.1016\/j.chb.2020.106646_bib59","series-title":"2010 22nd international teletraffic congress (lTC 22)","first-page":"1","article-title":"On the bias of BFS (breadth first search)","author":"Kurant","year":"2010"},{"issue":"2","key":"10.1016\/j.chb.2020.106646_bib60","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1111\/1745-9125.12169","article-title":"Correlates of violent political extremism in the United States","volume":"56","author":"LaFree","year":"2018","journal-title":"Criminology"},{"issue":"6","key":"10.1016\/j.chb.2020.106646_bib61","doi-asserted-by":"crossref","first-page":"6939","DOI":"10.1007\/s11042-018-6445-z","article-title":"A survey on sentiment analysis and opinion mining for social multimedia","volume":"78","author":"Li","year":"2019","journal-title":"Multimedia Tools and Applications"},{"key":"10.1016\/j.chb.2020.106646_bib62","series-title":"Multiple regression and causal analysis","author":"McClendon","year":"1994"},{"issue":"2","key":"10.1016\/j.chb.2020.106646_bib63","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.jcrimjus.2015.01.002","article-title":"Beyond traditional interaction: Exploring the functional form of the exposure-offending association across online network size","volume":"43","author":"McCuddy","year":"2015","journal-title":"Journal of Criminal Justice"},{"issue":"2","key":"10.1016\/j.chb.2020.106646_bib64","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1177\/0734016814557010","article-title":"More than just friends: Online social networks and offending","volume":"40","author":"McCuddy","year":"2015","journal-title":"Criminal Justice Review"},{"issue":"12","key":"10.1016\/j.chb.2020.106646_bib65","doi-asserted-by":"crossref","first-page":"1543","DOI":"10.1177\/0011128714526499","article-title":"Virtual peer effects in social learning theory","volume":"62","author":"Miller","year":"2016","journal-title":"Crime & Delinquency"},{"key":"10.1016\/j.chb.2020.106646_bib66","series-title":"Proceedings of the 2015 ACM on conference on online social networks","first-page":"71","article-title":"November). The city privacy attack: Combining social media and public records for detailed profiles of adults and children","author":"Minkus","year":"2015"},{"issue":"9","key":"10.1016\/j.chb.2020.106646_bib67","article-title":"100,000 false positives for every real terrorist: Why anti-terror algorithms don't work","volume":"22","author":"Munk","year":"2017","journal-title":"First Monday"},{"key":"10.1016\/j.chb.2020.106646_bib68","doi-asserted-by":"crossref","first-page":"496","DOI":"10.1016\/j.chb.2017.02.061","article-title":"Reactions to ideological websites: The impact of emotional appeals, credibility, and pre-existing attitudes","volume":"72","author":"Ness","year":"2017","journal-title":"Computers in Human Behavior"},{"issue":"3","key":"10.1016\/j.chb.2020.106646_bib69","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1177\/096228029200100303","article-title":"Statistical methods for longitudinal and clustered designs with binary responses","volume":"1","author":"Neuhaus","year":"1992","journal-title":"Statistical Methods in Medical Research"},{"issue":"1","key":"10.1016\/j.chb.2020.106646_bib70","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1186\/s40537-019-0172-9","article-title":"How to (better) find a perpetrator in a haystack","volume":"6","author":"Neuman","year":"2019","journal-title":"Journal of Big Data"},{"key":"10.1016\/j.chb.2020.106646_bib71","series-title":"2019 IEEE international conference on intelligence and security informatics (ISI)","first-page":"98","article-title":"Understanding the radical mind: Identifying signals to detect extremist content on twitter","author":"Nouh","year":"2019"},{"key":"10.1016\/j.chb.2020.106646_bib72","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1016\/j.chb.2014.11.024","article-title":"Posting, commenting, and tagging: Effects of sharing news stories on Facebook","volume":"44","author":"Oeldorf-Hirsch","year":"2015","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2020.106646_bib73","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.chb.2018.09.025","article-title":"The digital footprints of adolescent depression, social rejection and victimization of bullying on Facebook","volume":"91","author":"Ophir","year":"2019","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2020.106646_bib74","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1016\/j.chb.2013.05.024","article-title":"Sentiment analysis in Facebook and its application to e-learning","volume":"31","author":"Ortigosa","year":"2014","journal-title":"Computers in Human Behavior"},{"issue":"3","key":"10.1016\/j.chb.2020.106646_bib75","first-page":"5","article-title":"Studying jihadists on social media: A critique of data collection methodologies","volume":"12","author":"Parekh","year":"2018","journal-title":"Perspectives on Terrorism"},{"key":"10.1016\/j.chb.2020.106646_bib77","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1016\/j.chb.2014.02.043","article-title":"Social media as a vector for youth violence: A review of the literature","volume":"35","author":"Patton","year":"2014","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"10.1016\/j.chb.2020.106646_bib78","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/09546553.2013.876414","article-title":"Differential online exposure to extremist content and political violence: Testing the relative strength of social learning and competing perspectives","volume":"28","author":"Pauwels","year":"2016","journal-title":"Terrorism and Political Violence"},{"issue":"2","key":"10.1016\/j.chb.2020.106646_bib79","first-page":"163","article-title":"Policing of terrorism using data from social media","volume":"3","author":"Pelzer","year":"2018","journal-title":"European Journal of Scientific Research"},{"key":"10.1016\/j.chb.2020.106646_bib80","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/j.avb.2017.01.012","article-title":"Cyber violence: What do we know and where do we go from here?","volume":"34","author":"Peterson","year":"2017","journal-title":"Aggression and Violent Behavior"},{"issue":"1","key":"10.1016\/j.chb.2020.106646_bib81","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1177\/0886260506294997","article-title":"Reconsidering the relationship between alcohol and lethal violence","volume":"22","author":"Phillips","year":"2007","journal-title":"Journal of Interpersonal Violence"},{"issue":"6","key":"10.1016\/j.chb.2020.106646_bib83","doi-asserted-by":"crossref","first-page":"765","DOI":"10.1080\/07418820903379610","article-title":"The empirical status of social learning theory: A meta\u2010analysis","volume":"27","author":"Pratt","year":"2010","journal-title":"Justice Quarterly"},{"key":"10.1016\/j.chb.2020.106646_bib84","series-title":"Combating violent extremism and radicalisation in the digital era","first-page":"391","article-title":"Internet use and violent extremism: A cyber-vera risk assessment protocol","author":"Pressman","year":"2016"},{"issue":"5","key":"10.1016\/j.chb.2020.106646_bib85","first-page":"42","article-title":"On and off the radar: Tactical and strategic responses to screening known potential terrorist attackers","volume":"11","author":"Quiggin","year":"2017","journal-title":"Perspectives on terrorism"},{"issue":"3","key":"10.1016\/j.chb.2020.106646_bib86","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1002\/bsl.999","article-title":"The role of warning behaviors in threat assessment: An exploration and suggested typology","volume":"30","author":"Reid Meloy","year":"2012","journal-title":"Behavioral Sciences & the Law"},{"issue":"4","key":"10.1016\/j.chb.2020.106646_bib88","first-page":"68","article-title":"Research desiderata: 150 un-and under-researched topics and themes in the field of (counter-) terrorism studies\u2013a new list","volume":"12","author":"Schmid","year":"2018","journal-title":"Perspectives on terrorism"},{"issue":"1","key":"10.1016\/j.chb.2020.106646_bib89","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1080\/19434472.2016.1276612","article-title":"Searching for signs of extremism on the web: An introduction to sentiment-based identification of radical authors","volume":"10","author":"Scrivens","year":"2018","journal-title":"Behavioral Sciences of Terrorism and Political Aggression"},{"issue":"2","key":"10.1016\/j.chb.2020.106646_bib90","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1080\/01639625.2018.1556994","article-title":"Measuring the evolution of radical right-wing posting behaviors online","volume":"41","author":"Scrivens","year":"2020","journal-title":"Deviant Behavior"},{"key":"10.1016\/j.chb.2020.106646_bib91","first-page":"179","volume":"Vol. 24","author":"Scrivens","year":"2019"},{"key":"10.1016\/j.chb.2020.106646_bib92","series-title":"The palgrave handbook of international cybercrime and cyberdeviance","article-title":"The role of the internet in facilitating violent extremism and terrorism: Suggestions for progressing research","author":"Scrivens","year":"2019"},{"key":"10.1016\/j.chb.2020.106646_bib93","series-title":"Comparing ISIS foreign fighters versus sympathisers: Insights from their twitter postings","author":"Seng","year":"2018"},{"issue":"4","key":"10.1016\/j.chb.2020.106646_bib94","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1089\/cyber.2017.0384","article-title":"Predicting individual characteristics from digital traces on social media: A meta-analysis","volume":"21","author":"Settanni","year":"2018","journal-title":"Cyberpsychology, Behavior, and Social Networking"},{"issue":"3","key":"10.1016\/j.chb.2020.106646_bib95","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1080\/01639625.2019.1565513","article-title":"Cyberbullying perpetration: An empirical test of social learning theory in Iran","volume":"41","author":"Shadmanfaat","year":"2020","journal-title":"Deviant Behavior"},{"issue":"1\u20132","key":"10.1016\/j.chb.2020.106646_bib96","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1080\/1057610X.2018.1513694","article-title":"Women's radicalization to religious terrorism: An examination of ISIS cases in the United States","volume":"42","author":"Shapiro","year":"2019","journal-title":"Studies in Conflict & Terrorism"},{"key":"10.1016\/j.chb.2020.106646_bib97","series-title":"Combating violent extremism and radicalization in the digital era","first-page":"349","article-title":"\u201cOn the internet, nobody knows you're a dog\u201d: The online risk assessment of violent extremists","author":"Shortland","year":"2016"},{"issue":"4","key":"10.1016\/j.chb.2020.106646_bib98","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1177\/0022427897034004005","article-title":"A social learning theory analysis of computer crime among college students","volume":"34","author":"Skinner","year":"1997","journal-title":"Journal of Research in Crime and Delinquency"},{"issue":"2","key":"10.1016\/j.chb.2020.106646_bib99","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1177\/1745691619885870","article-title":"The need to refocus on the group as the site of radicalization","volume":"15","author":"Smith","year":"2020","journal-title":"Perspectives on Psychological Science"},{"key":"10.1016\/j.chb.2020.106646_bib100","doi-asserted-by":"crossref","first-page":"106298","DOI":"10.1016\/j.chb.2020.106298","article-title":"Detecting psychological change through mobilizing interactions and changes in extremist linguistic style","volume":"108","author":"Smith","year":"2020","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"10.1016\/j.chb.2020.106646_bib101","first-page":"439","article-title":"Anonymity, membership-length and postage frequency as predictors of extremist language and behaviour among twitter users","volume":"13","author":"Sutch","year":"2019","journal-title":"International Journal of Cyber Criminology"},{"key":"10.1016\/j.chb.2020.106646_bib102","series-title":"Understanding recruitment to organized crime and terrorism","first-page":"105","article-title":"Unintended negative outcomes of counter-terrorism policing: Procedural (in) justice and perceived risk of recruitment into terrorism","author":"Tankebe","year":"2020"},{"issue":"1","key":"10.1016\/j.chb.2020.106646_bib103","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1111\/1745-9133.12285","article-title":"A same kind of different: Affordances, terrorism and the internet","volume":"16","author":"Taylor","year":"2017","journal-title":"Criminology & Public Policy"},{"issue":"3","key":"10.1016\/j.chb.2020.106646_bib104","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1080\/19331681.2014.888383","article-title":"Spill-over effects between facebook and on\/offline political participation? Evidence from a two-wave panel study","volume":"11","author":"Vissers","year":"2014","journal-title":"Journal of Information Technology & Politics"},{"issue":"9","key":"10.1016\/j.chb.2020.106646_bib105","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1089\/cyber.2016.0162","article-title":"How affective is a \u201cLike\u201d?: The effect of paralinguistic digital affordances on perceived social support","volume":"19","author":"Wohn","year":"2016","journal-title":"Cyberpsychology, Behavior, and Social Networking"},{"issue":"3","key":"10.1016\/j.chb.2020.106646_bib106","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/s10940-019-09439-4","article-title":"A field-wide systematic review and meta-analysis of putative risk and protective factors for radicalization outcomes","volume":"36","author":"Wolfowicz","year":"2020","journal-title":"Journal of Quantitative Criminology"}],"container-title":["Computers in Human Behavior"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563220303939?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563220303939?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,10,14]],"date-time":"2023-10-14T19:00:04Z","timestamp":1697310004000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0747563220303939"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3]]},"references-count":101,"alternative-id":["S0747563220303939"],"URL":"https:\/\/doi.org\/10.1016\/j.chb.2020.106646","relation":{},"ISSN":["0747-5632"],"issn-type":[{"value":"0747-5632","type":"print"}],"subject":[],"published":{"date-parts":[[2021,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Faces of radicalism: Differentiating between violent and non-violent radicals by their social media profiles","name":"articletitle","label":"Article Title"},{"value":"Computers in Human Behavior","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.chb.2020.106646","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2020 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"106646"}}