1932

Abstract

This review focuses on the use of open-source data in criminology and criminal justice research, highlighting the field's advancements through these data, optimal practices for constructing open-source databases, and key methodological hurdles to confront. As the amount and types of available public information have grown, scholars have capitalized on this access by constructing open-source databases. Our review found extraordinary growth in this research area and that these flexible methods have been used to study a range of important topics, including issues that have been historically challenging to research. These methods have been most impactful in the study of rare events, such as school shootings, terrorism, and mass shootings. Some studies have become core works that significantly impacted criminology and other scientific disciplines, and the limits of the use of sources have yet to be determined. Our review of this literature found variations in the methodological approach to constructing such databases. Many studies did not evaluate the credibility of the open-source information they relied upon and often were not transparent in describing their research process. We identify the different processual elements of systematically developing and using such data. We highlight the strengths and weaknesses of these methods, set forth best practices, and discuss how to improve methodological rigor and oversight in future research.

Loading

Article metrics loading...

/content/journals/10.1146/annurev-criminol-022422-013842
2025-01-29
2025-06-14
Loading full text...

Full text loading...

/deliver/fulltext/criminol/8/1/annurev-criminol-022422-013842.html?itemId=/content/journals/10.1146/annurev-criminol-022422-013842&mimeType=html&fmt=ahah

Literature Cited

  1. Ackerman GA, Pinson LE. 2016.. Speaking truth to sources: introducing a method for the quantitative evaluation of open sources in event data. . Stud. Confl. Terror. 39:(7–8):61740
    [Crossref] [Google Scholar]
  2. Aksulu A, Wade MR. 2010.. A comprehensive review and synthesis of open source research. . J. Assoc. Inform. Syst. 11:(11):576656
    [Google Scholar]
  3. Allison PD. 2001.. Missing Data. Thousand Oaks, CA:: Sage
    [Google Scholar]
  4. Amaya A, Bach R, Keusch F, Kreuter F. 2021.. New data sources in social science research: things to know before working with Reddit data. . Soc. Sci. Comput. Rev. 39:(5):94360
    [Crossref] [Google Scholar]
  5. Arslan H, Farkas D. 2015.. SHOT: developing a database for police shooting incidents in the United States. Paper presented at the 2015 Internet Technologies and Applications Conference, Wrexham, UK:
    [Google Scholar]
  6. Asal V, Rethemeyer RK. 2008.. The nature of the beast: organizational structures and the lethality of terrorist attacks. . J. Politics 70:(2):43749
    [Crossref] [Google Scholar]
  7. Askitas N, Zimmermann KF. 2009.. Google econometrics and unemployment forecasting. . Appl. Econ. Q. 55:(2):10720
    [Crossref] [Google Scholar]
  8. Askitas N, Zimmermann KF. 2013.. Nowcasting business cycles using toll data. . J. Forecast. 32:(4):299306
    [Crossref] [Google Scholar]
  9. Askitas N, Zimmermann KF. 2015.. The internet as a data source for advancement in social sciences. . Int. J. Manpow. 36:(1):212
    [Crossref] [Google Scholar]
  10. Azur MJ, Stuart EA, Frangakis C, Leaf PJ. 2011.. Multiple imputation by chained equations: What is it and how does it work?. Int. J. Methods Psychiatr. Res. 20:(1):4049
    [Crossref] [Google Scholar]
  11. Bouchard M, Joffres K, Frank R. 2014.. Preliminary analytical considerations in designing a terrorism and extremism online network extractor. . In Computational Models of Complex Systems, ed. VK Mago, V Dabbaghian , pp. 17184. New York:: Springer
    [Google Scholar]
  12. Bowie NG. 2017.. Terrorism events data: an inventory of databases and data sets, 1968–2017. . Perspect. Terror. 11:(4):5072
    [Google Scholar]
  13. Bowie NG. 2021.. 40 terrorism databases and data sets. . Perspect. Terror. 15:(2):14762
    [Google Scholar]
  14. Bushway SD, Biggs S, Taxman F, Thanner M, Van Brakle M. 2007.. Private providers of criminal history records: Do you get what you pay for?. In Barriers to Reentry? The Labor Market for Released Prisoners in Post-Industrial America, ed. SD Bushway, MA Stoll, DF Weiman , pp. 174200. New York:: Russell Sage Found.
    [Google Scholar]
  15. Bushway SD, Kalra N. 2021.. A policy review of employers’ open access to conviction records. . Annu. Rev. Criminol. 4::16589
    [Crossref] [Google Scholar]
  16. Capellan JA, Gomez SP. 2018.. Change and stability in offenders, behaviors, and incident-level characteristics of mass public shootings in the United States, 1984–2015. . J. Investig. Psychol. Offender Profiling 15:(1):5172
    [Crossref] [Google Scholar]
  17. Cent. Homel. Def. Secur. 2020.. K–12 school shooting database. . Center for Homeland Defense and Security. https://k12ssdb.org/
    [Google Scholar]
  18. Chermak SM. 1995.. Victims in the News: Crime and the American News Media. Boulder, CO:: Westview Press
    [Google Scholar]
  19. Chermak SM. 2002.. Searching for a Demon: The Media Construction of the Militia Movement. Boston:: Northeast. Univ. Press
    [Google Scholar]
  20. Chermak SM, Freilich JD, Parkin W, Lynch JP. 2012.. American terrorism and extremist crime data sources and selectivity bias: an investigation focusing on homicide events committed by far-right extremists. . J. Quant. Criminol. 28:(1):191218
    [Crossref] [Google Scholar]
  21. Chermak SM, Freilich JD, Ross A, Turner N. 2024.. Examining radicalization's risk and protective factors: a case-control study of violent extremists, non-violent criminal extremists, non-offending extremists & regular violent offenders. Grant Award 2020-ZA-CX-001 , Natl. Inst. Justice, Washington, DC:. https://nij.ojp.gov/funding/awards/2020-za-cx-0001
    [Google Scholar]
  22. Chermak S, Freilich JD, Suttmoeller M. 2013.. The organizational dynamics of far-right hate groups in the United States: comparing violent to non-violent organizations. . Stud. Confl. Terror. 36:(3):193218
    [Crossref] [Google Scholar]
  23. Chermak SM, Gruenewald J. 2006.. The media's coverage of domestic terrorism. . Justice Q. 23:(4):42861
    [Crossref] [Google Scholar]
  24. Chermak SM, Gruenewald J. 2015.. Laying the foundation for the criminological examination of right-wing, left-wing, and Al Qaeda inspired extremism in the United States. . Terror. Political Violence 27:(1):13359
    [Crossref] [Google Scholar]
  25. Cinelli C, Forney A, Pearl J. 2024.. A crash course in good and bad controls. . Sociol. Methods Res. 53:(3):1071104
    [Crossref] [Google Scholar]
  26. Cohen J. 1960.. A coefficient of agreement for nominal scales. . Educ. Psychol. Meas. 20:(1):3746
    [Crossref] [Google Scholar]
  27. Corner E, Gill P. 2021.. Psychological distress and terrorist engagement: measuring, correlating, and sequencing its onset with negative life events, social factors, and protective factors. . Transcult. Psychol. 58:(5):69771
    [Crossref] [Google Scholar]
  28. Cornish D. 1994.. The procedural analysis of offending and its relevance for situational prevention. . Crime Prev. Stud. 3::15196
    [Google Scholar]
  29. Cubukcu S, Forst B. 2018.. Measuring terrorism. . Hom. Stud. 22:(1):94116
    [Crossref] [Google Scholar]
  30. Crenshaw M, LaFree G. 2017.. Countering Terrorism. Washington, DC:: Brookings Institute
    [Google Scholar]
  31. Drysdale DA. 2010.. Campus attacks: targeted violence affecting institutions of higher education. Rep. , US Secret Serv., US Dep. Educ., Fed. Bur. Investig., Washington, DC:. https://www2.ed.gov/admins/lead/safety/campus-attacks.pdf
    [Google Scholar]
  32. Dugan L, Distler M. 2016.. Measuring terrorism. . In The Handbook of the Criminology of Terrorism, ed. G LaFree, JD Freilich , pp. 191205. New York:: Wiley
    [Google Scholar]
  33. Duwe G. 2004.. The patterns and prevalence of mass murder in twentieth-century America. . Justice Q. 21:(4):72961
    [Crossref] [Google Scholar]
  34. Fahey S, LaFree G. 2014.. Does country-level social disorganization increase terrorism?. Terror. Political Violence 27:(1):81111
    [Crossref] [Google Scholar]
  35. Fein RA, Vossekuil B. 1999.. Assassination in the United States: an operational study of recent assassins, attackers, and near-lethal approachers. . J. Forensic Sci. 44:(2):32133
    [Crossref] [Google Scholar]
  36. Finkelstein J, Goldenberg A, Stevens S, Paresky P, Jussim L, et al. 2020.. Network-enabled anarchy: how militant anarcho-socialist networks use social media to instigate widespread violence against political opponents and law enforcement. Rep. , Netw. Contag. Res. Inst., Princeton, NJ:. https://networkcontagion.us/wp-content/uploads/NCRI-White-Paper-Network-Enabled-Anarchy-25-Sept-259pm.pdf
    [Google Scholar]
  37. Follman M, Aronsen G, Pan D. 2023.. US Mass Shootings, 1982–2023: data from Mother Jones’ investigation. Mother Jones, updated Dec. 6. https://www.motherjones.com/politics/2012/12/mass-shootings-mother-jones-full-data/
    [Google Scholar]
  38. Fox JA. 2024.. Mass killing database. Northeastern University, updated April 24. https://cssh.northeastern.edu/sccj/mass-killing-database/
    [Google Scholar]
  39. Freilich JD, Adamczyk A, Chermak SM, Boyd K, Parkin WS. 2015.. Investigating the applicability of macro-level criminology theory to terrorism: a county-level analysis. . J. Quant. Criminol. 31:(3):383411
    [Crossref] [Google Scholar]
  40. Freilich JD, Chermak SM, Arietti R, Turner N. 2024.. Terrorism, political extremism, crime, and criminal justice. . Annu. Rev. Criminol. 7::187209
    [Crossref] [Google Scholar]
  41. Freilich JD, Chermak SM, Belli R, Gruenewald J, Parkin WS. 2014.. Introducing the United States Extremist Crime Database (ECDB). Terror. . Political Violence 26:(2):37284
    [Crossref] [Google Scholar]
  42. Freilich JD, Chermak S, Connell N, Klein BR, Greene-Colozzi EA. 2022.. Using open-source data to better understand and respond to American school shootings: introducing and exploring The American School Shooting Study (TASSS). . J. Sch. Violence 21:(2):93118
    [Crossref] [Google Scholar]
  43. Freilich JD, Chermak SM, Klein BR, Gaudette T, Greene-Colozzi E. 2023.. Investigating root causes of school violence: a case-control study of school violence offenders, non-school youth violence offenders, and non-offending youths. Rep. NCJ308550 , Natl. Inst. Justice, Washington, DC:
    [Google Scholar]
  44. Freilich JD, Gruenewald J, Mandala M. 2019.. Situational crime prevention and terrorism: an assessment of 10 years of research. . Crim. Justice Policy Rev. 30:(9):1283311
    [Crossref] [Google Scholar]
  45. Freilich JD, LaFree G. 2016.. Measurement issues in the study of terrorism: introducing the special issue. . Stud. Confl. Terror. 39:(7–8):56979
    [Crossref] [Google Scholar]
  46. Gill P. 2015.. Lone-Actor Terrorists: A Behavioural Analysis. London:: Routledge
    [Google Scholar]
  47. Gill P, Corner E, McKee A, Hitchen P, Betley P. 2022.. What do closed source data tell us about lone actor terrorist behavior?. A research note. Terror. Political Violence 34:(1):11330
    [Crossref] [Google Scholar]
  48. Gill P, Horgan J, Deckert P. 2014.. Bombing alone: tracing the motivations and antecedent behaviors of lone-actor terrorists. . J. Forensic Sci. 59:(2):42535
    [Crossref] [Google Scholar]
  49. Greene-Colozzi EA. 2022.. Mitigating the harm of public mass shootings through situational crime prevention. PhD Diss. , City Univ. New York, New York:
    [Google Scholar]
  50. Greene-Colozzi EA, Silva JR. 2022.. Mass outcome or mass intent? A proposal for an intent-focused, no-minimum casualty count definition of public mass shooting incidents. . J. Mass Violence Res. 1:(2):2741
    [Google Scholar]
  51. Gruenewald J. 2022.. Studying violent extremism and hate crime using open-source data. . Criminologist 47:(1):16
    [Google Scholar]
  52. Gruenewald JA. 2013.. Using open-source data to study bias homicide against homeless persons. . Int. J. Criminol. Sociol. 2::53849
    [Crossref] [Google Scholar]
  53. Gruenewald J, Allison K. 2018.. Examining differences in bias homicide across victim groups. . Crime Delinquency 64:(3):31641
    [Crossref] [Google Scholar]
  54. Gruenewald J, Chermak S, Freilich JD. 2013.. Distinguishing “loner” attacks from other domestic extremist violence: a comparison of far-right homicide incident and offender characteristics. . Criminol. Public Policy 12:(1):6391
    [Crossref] [Google Scholar]
  55. Gruenewald J, Klein BR, Hayes BE, Parkin WS, June T. 2024.. Examining disparities in case dispositions and sentencing outcomes for domestic violent extremists in the United States. . Crime Delinquency 70:(1):12656
    [Crossref] [Google Scholar]
  56. Gruenewald J, Pridemore WA. 2012.. A comparison of ideologically-motivated homicides from the new extremist crime database and homicides from the supplementary homicide reports using multiple imputation by chained equations to handle missing values. . J. Quant. Criminol. 28:(1):14162
    [Crossref] [Google Scholar]
  57. Gun Violence Arch. 2024.. General methodology. . Gun Violence Archive. https://www.gunviolencearchive.org/methodology
    [Google Scholar]
  58. Gundur RV, Berry M, Taodang D. 2021.. Using digital open source and crowdsourced data in studies of deviance and crime. . In Cybercrime Research Methods and the Use of Online Data for Various Areas of Study, ed. A Lavorgna, TJ Holt , pp. 14568. Cham, Switz:.: Springer Nature
    [Google Scholar]
  59. Harris DJ, Simi P, Ligon G. 2016.. Reporting practices of journal articles that include interviews with extremists. . Stud. Confl. Terror. 39:(7–8):60216
    [Crossref] [Google Scholar]
  60. Hayes BE, Freilich JD, Chermak SM. 2016.. An exploratory study of honor crimes in the United States. . J. Fam. Violence 31:(3):30314
    [Crossref] [Google Scholar]
  61. Heinonen JA, Wilson JM. 2012.. Product counterfeiting at the state level: an empirical examination of Michigan-related incidents. . Int. J. Comp. Appl. Crim. Justice 36::27390
    [Crossref] [Google Scholar]
  62. Hodwitz O. 2019.. Recognizing and resolving issues in terrorism research, data collection, & analysis. Rep. , Resolve Netw., Washington, DC:. https://www.resolvenet.org/system/files/2019-10/RSVE_RVESeries_Hodwitz_October2019.pdf
    [Google Scholar]
  63. Holt TJ, Chermak SM, Freilich JD, Turner N, Greene-Colozzi E. 2023.. Introducing and exploring the Extremist Cybercrime Database (ECCD). . Crime Delinquency 69:(12):241136
    [Crossref] [Google Scholar]
  64. Hsu HY, Vasquez BE, McDowall D. 2018.. A time-series analysis of terrorism: intervention, displacement, and diffusion of benefits. . Justice Q. 35:(4):55783
    [Crossref] [Google Scholar]
  65. Jensen M. 2013.. Discussion point: the benefits and drawbacks of methodological advancements in data collection and coding: insights from the Global Terrorism Database. . START. https://www.start.umd.edu/news/discussion-point-benefits-and-drawbacks-methodological-advancements-data-collection-and-coding
    [Google Scholar]
  66. Jensen M, LaFree G, James P, Atwell-Seate A, Pisoiu D, et al. 2016.. Empirical assessment of domestic radicalization (EADR). Fin. Rep. PIRUS Proj., Natl. Consort. Study Terror. Responses Terror. (START), College Park, MD:. https://www.ojp.gov/pdffiles1/nij/grants/250481.pdf
    [Google Scholar]
  67. Jensen MA, Yates EA, Kane SE. 2021.. A pathway approach to the study of bias crime offenders. Rep. , US Dep. Justice, Washington, DC:. https://www.ojp.gov/library/publications/pathway-approach-study-bias-crime-offenders
    [Google Scholar]
  68. Klein BR. 2020.. Pathways to school shootings: toward a dual-process developmental-situational model of choice. PhD Diss. , Michigan State Univ., Lansing, MI:
    [Google Scholar]
  69. Klein BR, Trowbridge J, Schnell C, Lewis K. 2023.. Characteristics and obtainment methods of firearms used in adolescent school shootings. . JAMA Pediatr. 178:(1):7379
    [Crossref] [Google Scholar]
  70. Krippendorff K. 2011.. Computing Krippendorff's alpha-reliability. Work. Pap. , Univ. Pa., Philadelphia:. https://repository.upenn.edu/entities/publication/034a6030-c584-4d14-9d3d-7b7e8d16df20
    [Google Scholar]
  71. Lacy S, Watson BR, Riffe D, Lovejoy J. 2015.. Issues and best practices in content analysis. . J. Mass Commun. Q. 92:(4):791811
    [Google Scholar]
  72. LaFree G. 2019.. The evolution of terrorism event databases. . In The Oxford Handbook of Terrorism, ed. E Chenoweth, R English, A Gofas, SN Kalyvas , pp. 5068. Oxford, UK:: Oxford Univ. Press
    [Google Scholar]
  73. LaFree G, Bersani BE. 2014.. County-level correlates of terrorist attacks in the United States. . Criminol. Public Policy 13::45581
    [Crossref] [Google Scholar]
  74. LaFree G, Dugan L. 2007.. Introducing the global terrorism database. . Terror. Political Violence 19:(1):181204
    [Crossref] [Google Scholar]
  75. LaFree G, Gill P. 2024.. Strengths and weaknesses of open source data for studying terrorism and political violence. . Stud. Confl. Terror. https://doi.org/10.1080/1057610X.2024.2361948
    [Google Scholar]
  76. LaFree G, Jensen M, James PA, Safer-Lichtenstein A. 2018.. Correlates of violent political extremism in the United States. . Criminology 56:(2):23368
    [Crossref] [Google Scholar]
  77. Lageson SE. 2020.. Digital Punishment: Privacy, Stigma and the Harms of Data-Driven Criminal Justice. New York:: Oxford Univ. Press
    [Google Scholar]
  78. Lageson SE. 2023.. Criminally bad data: inaccurate criminal records, data brokers, and algorithmic injustice. . Univ. Ill. Law Rev. 5::1771810
    [Google Scholar]
  79. Lageson SE, Denver M, Pickett J. 2019.. Privatizing criminal stigma: experience, intergroup contact, and public views about publicizing arrest records. . Punishm. Soc. 21:(3):31541
    [Crossref] [Google Scholar]
  80. Lageson SE, Stewart R. 2024.. The problem with criminal records: discrepancies between state reports and private-section background checks. . Criminology 62:(1):534
    [Crossref] [Google Scholar]
  81. Lageson SE, Vuolo M, Uggen C. 2015.. Legal ambiguity in managerial assessments of criminal records. . Law Soc. Inq. 40:(1):175204
    [Crossref] [Google Scholar]
  82. Landis J, Koch GG. 1977.. An application of hierarchical kappa-type statistics in the assessment of majority agreement among multiple observers. . Biometrics 33:(2):36374
    [Crossref] [Google Scholar]
  83. Lankford A. 2014.. Précis of the myth of martyrdom: what really drives suicide bombers, rampage shooters, and other self-destructive killers. . Behav. Brain Sci. 37::35162
    [Crossref] [Google Scholar]
  84. Lankford A. 2015.. Mass shooters in the USA, 1966–2010: differences between attackers who live and die. . Justice Q. 32:(2):36079
    [Crossref] [Google Scholar]
  85. Lankford A. 2016.. Public mass shooters and firearms: a cross-national study of 171 countries. . Violence Victims 31:(2):18799
    [Crossref] [Google Scholar]
  86. Lankford A, Evans H, Bowling A. 2024.. Celebrity infidelity and sex crimes: an empirical investigation of cheating, sexual harassment, sexual assault, and solicitation. . Sex. Cult. 28::33353
    [Crossref] [Google Scholar]
  87. Logan M, Windisch S, Brookstein A. 2023.. The needs of the counterterrorism workforce: the availability and utility of datasets on domestic terrorism and targeted violence. Rep. , Natl. Counterterror. Innov. Technol. Educ. Cent., Omaha, NE:. https://digitalcommons.unomaha.edu/cgi/viewcontent.cgi?article=1060&context=ncitereportsresearch
    [Google Scholar]
  88. Lynch JP. 2018.. Not even our own facts: criminology in the era of big data. . Criminology 56:(3):43754
    [Crossref] [Google Scholar]
  89. McDevitt J, Iwama JA. 2016.. Challenges in measuring and understanding hate crime. . In The Handbook of Measurement Issues in Criminology and Criminal Justice, ed. BM Huebner, TS Bynum , pp. 13155. Hoboken, NJ:: Wiley
    [Google Scholar]
  90. Morgan S, Allison K, Klein BR. 2022.. Strained masculinity and mass shootings: toward a theoretically integrated approach to assessing the gender gap in mass violence. . Homicide Stud. 28:(4):44167
    [Crossref] [Google Scholar]
  91. Natl. Comm. Prot. Hum. Subj. Biomed. Behav. Res. 1979.. The Belmont Report: ethical principles and guidelines for the protection of human subjects of research. Rep. , US Dep. Health Educ. Welf., Washington, DC:
    [Google Scholar]
  92. O'Halloran K, Tan S, Wignell P, Bateman J, Pham D, et al. 2019.. Interpreting text and image relations in violent extremist discourse: a mixed methods approach for big data analytics. . Terror. Political Violence 31:(3):45474
    [Crossref] [Google Scholar]
  93. Otero V. 2024.. Interactive media bias chart. . Ad Fontes Media. https://www.adfontesmedia.com/interactive-media-bias-chart-2/
    [Google Scholar]
  94. Parkin WS, Freilich JD, Chermak SM. 2015.. Ideological victimization: homicides perpetrated by far-right extremists. . Homicide Stud. 19:(3):21136
    [Crossref] [Google Scholar]
  95. Parkin WS, Gruenewald J. 2017.. Open-source data and the study of homicide. . J. Interpers. Violence 32:(18):2693723
    [Crossref] [Google Scholar]
  96. Petersen JK, Densley JA. 2019.. The violence project database of mass shootings in the United States, 1966–2019. Rep. , Violence Prev. Proj., Saint Paul, MN:. https://www.theviolenceproject.org/wp-content/uploads/2019/11/TVP-Mass-Shooter-Database-Report-Final-compressed.pdf
    [Google Scholar]
  97. Peterson J, Densley J. 2024.. The violence prevention project methodology. . The Violence Prevention Project. https://www.theviolenceproject.org/methodology/
    [Google Scholar]
  98. Peterson J, Densley J, Erickson G. 2021.. Presence of armed school officials and fatal and nonfatal gunshot injuries during mass school shootings, United States, 1980–2019. . JAMA Netw. Open 4:(2):e2037394
    [Crossref] [Google Scholar]
  99. Pezzella FS, Fetzer MD, Keller T. 2019.. The dark figure of hate crime underreporting. . Am. Behav. Sci. https://doi.org/10.1177/0002764218823844
    [Google Scholar]
  100. Pridemore WA, Makel MC, Plucker JA. 2018.. Replication in criminology and the social sciences. . Annu. Rev. Criminol. 1::1938
    [Crossref] [Google Scholar]
  101. Raasch C, Lee V, Spaeth S, Herstatt C. 2013.. The rise and fall of interdisciplinary research: the case of open source innovation. . Res. Policy 42:(5):113851
    [Crossref] [Google Scholar]
  102. Ravndal JA. 2016.. Right-wing terrorism and violence in Western Europe: introducing the RTV dataset. . Perspect. Terror. 10:(3):215
    [Google Scholar]
  103. Ravndal JA, Bjørgo T. 2018.. Investigating terrorism from the extreme right: a review of past and present research. . Perspect. Terror. 12:(6):522
    [Google Scholar]
  104. Ravndal JA, Tandberg C, Sessolo S, Jupskås AR, Bjørgo T. 2023.. RTV trend report 2023: right-wing terrorism and violence in Western Europe, 1990–2022. Rep. , Univ. Oslo, Oslo, Nor:.
    [Google Scholar]
  105. Royston P. 2009.. Multiple imputation of missing values: further update of ice, with an emphasis on categorical variables. . Stata J. 9:(3):46677
    [Crossref] [Google Scholar]
  106. Rubin DB. 1976.. Inference and missing data. . Biometrika 63:(3):58192
    [Crossref] [Google Scholar]
  107. Rutledge GP. 1998.. The internet and US financial markets. . J. Financ. Crime 6:(2):12941
    [Crossref] [Google Scholar]
  108. Safer-Lichtenstein A, LaFree G, Loughran T. 2017.. Studying terrorism empirically: what we know about what we don't know. . J. Contemp. Crim. Justice 33:(3):27391
    [Crossref] [Google Scholar]
  109. Sageman M. 2004.. Understanding Terror Networks. Philadelphia: Univ. Pa. Press:
    [Google Scholar]
  110. Sandel WL, Martaindale MH. 2022.. What are we talking about? Definitional confusion within active and mass shooting research. . J. Mass Violence Res. 1:(2):416
    [Crossref] [Google Scholar]
  111. Schaurer F, Störger J. 2013.. The evolution of open source intelligence (OSINT). . Comput. Hum. Behav. 19::5356
    [Google Scholar]
  112. Schober M, Pasek J, Guggenheim L, Lampe C, Conrad F. 2016.. Social media analyses for social measurement. . Public Opin. Q. 80::180211
    [Crossref] [Google Scholar]
  113. Scrivens R, Freilich JD, Chermak SM, Frank R. 2024.. Data collection in online terrorism and extremism research: strengths, limitations and future directions. . Stud. Confl. Terror. https://doi.org/10.1080/1057610X.2024.2361957
    [Google Scholar]
  114. Shaw CR, McKay HD. 1942.. Juvenile Delinquency and Urban Areas. Chicago:: Univ. Chicago Press
    [Google Scholar]
  115. Sheehan IS. 2012.. Assessing and comparing data sources for terrorism research. . In Evidence-Based Counterterrorism Policy, ed. C Lum, LW Kennedy , pp. 1340. New York:: Springer
    [Google Scholar]
  116. Silva JR. 2023.. Global mass shootings: comparing the United States against developed and developing countries. . Int. J. Comp. Appl. Crim. Justice 47:(4):31740
    [Crossref] [Google Scholar]
  117. Silva J, Greene-Colozzi EA. 2018.. Deconstructing an epidemic: determining the frequency of mass gun violence. . In Assessing and Averting the Prevalence of Mass Violence, ed. SE Daly , pp. 3967. Hershey, PA:: IGI Global
    [Google Scholar]
  118. Silver J, Horgan J, Gill P. 2018.. Foreshadowing targeted violence: assessing leakage of intent by public mass murderers. . Aggress. Violent Behav. 38:(1):94100
    [Crossref] [Google Scholar]
  119. Simi P, Futrell R. 2006.. Cyberculture and the endurance of white power activism. . J. Political Mil. Sociol. 34:(1):11542
    [Google Scholar]
  120. Smith BL. 1994.. Terrorism in America: Pipe Bombs and Pipe Dreams. New York:: SUNY Press
    [Google Scholar]
  121. Smith BL, Damphousse KR. 2007.. American terrorism study, 1980–2002. Rep. , Natl. Inst. Justice, Washington, DC:
    [Google Scholar]
  122. Snyder D, Kelly WR. 1977.. Conflict intensity, media sensitivity and the validity of newspaper data. . Am. Soc. Rev. 42::10523
    [Crossref] [Google Scholar]
  123. Steffensmeier DJ, Schwartz J, Roche M. 2013.. Gender and twenty-first century corporate crime: female involvement and the gender gap in Enron-era corporate frauds. . Am. Sociol. Rev. 78::44876
    [Crossref] [Google Scholar]
  124. Turanovic JJ, Pratt TC, Neville KJ, La Tosa A. 2022.. A comprehensive assessment of deadly mass shootings, 1980–2018. Rep. NCJ305090 , Natl. Inst. Justice, Washington, DC:. https://www.ojp.gov/pdffiles1/nij/grants/305090.pdf
    [Google Scholar]
  125. Turner ND. 2024.. Exploring criminogenic differences between violent, nonviolent criminal and non-offending extremists. PhD Diss. , Michigan State Univ., East Lansing, MI:
    [Google Scholar]
  126. Turner ND, Klein BR. 2023.. A mixed methods exploration of the relationship between target hardening and differential terrorist attack outcomes. . Stud. Confl. Terror. https://doi.org/10.1080/1057610X.2023.2194842
    [Google Scholar]
  127. Vossekuil B, Fein RA, Reddy M, Borum R, Modzeleski W. 2002.. The final report and findings of the Safe School Initiative. Rep. , US Secret Serv., US Dep. Educ., Washington, DC:. https://www2.ed.gov/admins/lead/safety/preventingattacksreport.pdf
    [Google Scholar]
  128. Willinsky J. 2005.. The unacknowledged convergence of open source, open access, and open science. . First Monday 10:(8). https://firstmonday.org/ojs/index.php/fm/article/view/1265
    [Google Scholar]
  129. Wilson JM, Dalton E. 2008.. Human trafficking in the heartland: variation in law enforcement awareness and response. . J. Contemp. Crim. Justice 24::296313
    [Crossref] [Google Scholar]
  130. Winch AT, Alexander K, Bowers C, Beidel DC. 2024.. An evaluation of completed and averted school shootings. . Front. Public Health 11::1305286
    [Crossref] [Google Scholar]
  131. Wingenroth B, Miller E, Jensen M, Hodwitz O, Quinlan K. 2016.. Event Data and the Construction of Reality. Paper presented at International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction and Behavior Representations in Modeling and Simulation (SBP-BRiMS), Implications for Policy and Practice, Pittsburgh, PA:
    [Google Scholar]
  132. Yaksic E. 2022.. Killer Data: Modern Perspectives on Serial Murder. London:: Routledge
    [Google Scholar]
/content/journals/10.1146/annurev-criminol-022422-013842
Loading
/content/journals/10.1146/annurev-criminol-022422-013842
Loading

Data & Media loading...

This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error