1,941
Views
15
CrossRef citations to date
0
Altmetric
Articles

Economic Profiling of the Lone Wolf Terrorist: Can Economics Provide Behavioral Investigative Advice?

&
Pages 151-177 | Published online: 28 Mar 2012

REFERENCES

  • Alison , L. , Goodwill , A. , Almond , L. , Heuvel , C. and Winter , J. 2010 . Pragmatic solutions to offender profiling and behavioural investigative advice . Legal and Criminological Psychology , 15 : 115 – 132 .
  • Beauregard , E. , Proulx , J. , Rossmo , K. , Leclerc , B. and Allaire , J. 2007 . Script analysis of the hunting process of serial sex offender . Criminal Justice and Behaviour , 34 : 1069 – 1084 .
  • Becker , G. S. 1968 . Crime and punishment: An economic alternative . Journal of Political Economy , 78 : 169 – 217 .
  • Canter , D. V. 1994 . Criminal shadows , London , , UK : Harper Collins .
  • Canter , D. V. 2004 . Offender profiling and investigative psychology . Journal of Investigative Psychology and Offender Profiling , 1 : 1 – 15 .
  • Canter , D. V. , Alison , L. J. , Alison , E. and Wentink , N. 2004 . The organised/ disorganised typology of serial murder: Myth or model? . Psychology, Public Policy and Law , 10 : 293 – 320 .
  • Canter , D. V. , Bennell , C. , Alison , L. J. and Reddy , S. 2003 . Differentiating sex offences: A behaviourally based thematic classification of stranger rapes . Behavioural Sciences and the Law , 21 : 157 – 174 .
  • Chambers , J. C. , Horvath , M. A. H. and Kelly , L. 2010 . A typology of multiple-perpetrator rape . Criminal Justice and Behaviour , 37 : 1114 – 1139 .
  • Dabney , D. A. , Dugan , L. , Topalli , V. and Hollinger , R. C. 2006 . The impact of implicit stereotyping of offender profiling: Unexpected results from an observational study of shoplifting . Criminal Justice and Behaviour , 33 : 646 – 674 .
  • Douglas , J. E. , Ressler , R. K. , Burgess , A. W. and Hartman , C. R. 1986 . Criminal profiling from crime scene analysis . Behavioural Sciences and the Law , 4 : 401 – 421 .
  • Ehrlich , I. 1973 . Participation in illegitimate activities: A theoretical and empirical investigation . Journal of Political Economy , 81 : 521 – 565 .
  • Elton , E. J. , Gruber , M. J. , Brown , S. J. and Goetzmann , W. N. 2003 . Modern portfolio theory and investment analysis , New York , NY : John Wiley & Sons .
  • Enders , W. and Sandler , T. 2002 . Patterns of transnational terrorism, 1970–1999: Alternative time series estimates . International Studies Quarterly , 46 : 145 – 165 .
  • Goodwill , A. M. , Alison , L. J. and Beech , A. R. 2009 . What works in offender profiling? A comparison of typological, thematic and multivariate models . Behavioural Sciences and the Law , 27 : 507 – 529 .
  • Häkkänen , H. 2006 . Finnish bomb threats: Offence and offender characteristics . International Journal of Police Science and Management , 8 : 1 – 8 .
  • Häkkänen , H. , Puolakka , P. and Santtila , P. 2004 . Crime scene actions and offender characteristics in arsons . Legal and Criminological Psychology , 9 : 197 – 214 .
  • Instituut voor Veiligheids en Crisismanagement . 2007 . Lone wolf terrorism , Netherlands : Instituut voor Veiligheids en Crisismanagement .
  • Kroll , Y. , Levy , H. and Markowitz , H. M. 1984 . Mean-variance versus direct utility maximisation . Journal of Finance , 39 : 47 – 61 .
  • Landes , W. M. 1978 . An economic study of U.S. aircraft hijackings 1961–1976 . Journal of Law and Economics , 21 : 1 – 31 .
  • Levy , H. and Markowitz , H. M. 1979 . Approximating expected utility by a function of mean and variance . American Economic Review , 69 : 308 – 317 .
  • Meyer , J. 1987 . Two-moment decision models and expected utility maximization . American Economic Review , 77 ( 3 ) : 421 – 430 .
  • Mokros , A. and Alison , L. J. 2002 . Is offender profiling possible? Testing the predicted homology of crime scene actions and background characteristics in a sample of rapists . Legal and Criminological Psychology , 7 : 25 – 43 .
  • O’Leary , M. 2009 . The mathematics of geographic profiling . Journal of Investigative Psychology and Offender Profiling , 6 : 253 – 265 .
  • Phillips , P. J. 2009 . Applying portfolio theory to the analysis of terrorism: Computing the set of attack method combinations from which the rational terrorist group will choose in order to maximise injuries and fatalities . Defence and Peace Economics , 20 : 193 – 213 .
  • Phillips , P. J. 2011 . Lone wolf terrorism . Peace Economics, Peace Science and Public Policy , 17 Article 1
  • Rossmo , D. K. 2000 . Geographic profiling , Florida , Boca Raton : CRC Press .
  • Salfati , C. G. and Canter , D. V. 1999 . Differentiating stranger murders: Profiling offender characteristics from behavioural styles . Behavioural Sciences and the Law , 17 : 391 – 406 .
  • Simon , H. A. 1978 . Rationality as process and as product of thought . American Economic Review , 68 : 1 – 16 .
  • Snook , B. , Cullen , R. M. , Bennell , C. , Taylor , P. J. and Gendreau , P. 2008 . The criminal profiling illusion: What's behind the smoke and mirrors? . Criminal Justice and Behaviour , 35 : 1257 – 1276 .
  • Snook , B. , Eastwood , J. , Gendreau , P. , Goggin , C. and Cullen , R. M. 2007 . Taking stock of criminal profiling: A narrative review and meta-analysis . Criminal Justice and Behaviour , 34 : 437 – 453 .
  • Tobin , J. 1958 . Liquidity preference as behaviour towards risk . Review of Economic Studies , 25 : 65 – 86 .
  • Zaitsu , W. 2010 . Bomb threats and offender characteristics in Japan . Journal of Investigative Psychology and Offender Profiling , 7 : 75 – 89 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.