Max Taylor

Max Taylor
University College London | UCL · Department of Security and Crime Science

BA, PhD

About

64
Publications
73,521
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,719
Citations
Citations since 2017
1 Research Item
1058 Citations
2017201820192020202120222023050100150
2017201820192020202120222023050100150
2017201820192020202120222023050100150
2017201820192020202120222023050100150

Publications

Publications (64)
Article
This paper addresses commonalities between two different forms of exploitation of young people – child abuse images and online solicitation and radicalisation. A number of areas of similarity are identified, and the implications of these commonalities are discussed. The role of social networking as a critical factor is particularly explored.
Article
The harvesting of financial intelligence by law enforcement and intelligence services through various forms of surveillance is now so prevalent that it has become a core feature of contemporary security practice. Not surprisingly, concerns have been raised regarding the intrusive nature of financial intelligence collection and the emerging challeng...
Article
Full-text available
As yet, little is understood of the potential problems and benefits associated with Internet use, and the resulting social outcomes that may arise. This article examines issues that emerged out of a subset of nine interviews with social workers and probation officers, namely the feelings by such practitioners that they did not understand the functi...
Article
Agencies working with sex offenders are starting to see the emergence of people with a sexual interest in children who meet some of their needs through the use of child pornography, or the seduction of children, through the Internet. While CBT models dominate our understanding of sex offenders, there has been little research into the role that such...
Article
Full-text available
A central issue with many interpretations of radicalization remains their tendency to overemphasize the role of extremist beliefs in motivating involvement in terrorism. A er elaborating on this critique, the authors propose that ‘fanaticism’, a concept developed by Taylor in the early 1990s, o ers a way of overcoming this de ciency in radicalizati...
Article
Full-text available
Using the Islamic State (ISIS) as a case study, we explore the process by which children evolve from novice recruits to fully-fledged members of a violent extremist movement. From currently available data, we propose six stages of child socialization to ISIS – Seduction, Schooling, Selection, Subjugation, Specialization, and Stationing. Furthermore...
Article
Full-text available
This article presents a case study of one individual's trajectory through violent right-wing extremism in the USA. Drawing on an in-depth in-person interview conducted with ‘Sarah', we trace the influences affecting the nature and extent of her involvement, engagement and disengagement. We focus on delineating the complexity of Sarah's disengagemen...
Article
Full-text available
This paper initially identifies a number of critical distinctions that might help our understanding of the relationship between Internet use and terrorism. It then develops the notion of complex global microstructures as a useful conceptual aid to understanding how people interact with the Internet in general, and to terrorism in particular. Parall...
Article
Full-text available
Publication details, including instructions for authors and subscription information:
Article
Full-text available
In this article we offer a first attempt at providing a set of universal grading criteria for determining on what basis, and how far, an item of discursive content can be considered “terroristic.” In doing so, we draw loosely on the existing COPINE scale for child abuse images. The scale described in the article is not intended to reflect actual ri...
Article
This paper explores ways in which the Internet itself might be thought to contribute to the commission of criminal behaviour, such as the trade in abuse images of children. In doing so, it identifies a number of characteristics or qualities of the Internet that might be thought to facilitate the commission of criminal acts. The discussion is framed...
Article
The trial of Anders Breivik, who murdered 77 people in two attacks in Norway, has attracted considerable controversy because of the questions concerning his mental state. Max Taylor argues that such extreme fanatics should be considered insane, but Tom Fahy (doi:10.1136/bmj.e4647) believes that a psychiatric diagnosis is an abrogation of personal a...
Article
Information risk security management is an area that is constantly moving to respond to new threats, standards and technologies. Security is now a part of information risk management, which in turn has a place in the overall business risk management ...
Article
You cannot have freedom of speech without the option to remain anonymous. Most censorship is retrospective, it is generally much easier to curtail free speech by punishing those who exercise it afterward, rather than preventing them from doing it in the first place. The only way to prevent this is to remain anonymous. (The Free Network Project) The...
Article
Full-text available
This article explores psychological and behavioural issues that may help our understanding of some important contemporary developments in Islam. The particular areas of immediate concern are the behavioural bases of the relationship between Islamic fundamentalism and violence. A more general issue, however, relates to how we might understand the na...
Article
This paper offers a critical review of the role of group processes in terrorist behavior. It draws on a fundamental distinction between terrorist ‘involvement’ and terrorist ‘events’ to explore what group phenomena might contribute to our understanding of actual terrorist behavior, as opposed to the context to terrorism. It does this through the us...
Article
Examines the term fanatic and the ways in which this concept might reflect an understanding of terrorist behavior. The present authors explore the link between fanaticism and other psychological processes, such as prejudice and authoritarianism. One kind of fanatical act, suicide to achieve some political or war end, which may have links with terro...
Article
Full-text available
A conceptual framework is presented for addressing psychological issues in the development of the terrorist. In particular, the authors suggest that viewing terrorism as a process may lead not only to better conceptual development in analyses of the terrorist, but may also lead to the development of more practical and efficient counterterrorism ini...
Article
This research note explores the events and circumstances surrounding Osama bin Laden's stay in Sudan from 1991 to 1996. In particular, it discusses the role that the Sudanese politician, Hassan al-Turabi may have played in the development of bin Laden and al Qaeda. It draws particular attention to the role of the Popular Arab and Islamic Congress (...
Article
There is increasing evidence that people use the Internet to avoid negative emotional states, such as boredom, anxiety, or depression. This may be of increasing relevance for sex offenders. While the primary function of accessing the Internet for sex offenders is to obtain material that aids sexual arousal, the Internet functions to help people add...
Book
How can we understand offending and victimisation processes in relation to abuse images and the Internet? This book offers the reader unique and deep insights into innovative ways of thinking about this challenging problem. The chapter authors are amongst the foremost researchers and practitioners in this field. In an area that often attracts unthi...
Article
Full-text available
This is the second of two articles detailing aspects of the financial operations of the Provisional IRA (PIRA). While the first article highlighted some of the socioorganizational factors both underpinning and limiting the nature and extent of certain fundraising activities by the PIRA, this article presents details of activities traditionally elus...
Book
Full-text available
Child pornography, particularly that available via the Internet, has become a cause of huge social concern in recent years. This book examines the reality behind the often hysterical media coverage of the topic. Drawing on extensive new research findings, it examines how child pornography is used on the Internet and the social context in which such...
Article
Full-text available
Paramilitary vigilantism in Northern Ireland has increased dramatically in the wake of the 1994 cease-fires, and is increasingly threatening to destabilise the peace process. Yet despite the long history of vigilantism in Northern Ireland and the unprecedented attention the activity is now attracting, virtually no empirical research has been carrie...
Article
Full-text available
Thirteen men convicted of downloading child pornography were interviewed with a view to understanding how these men talked about the photographs and the function such talk played in their accounts. The interviews were informed by earlier work with defended subjects and were analyzed within a discursive framework. Quotations are used from the interv...
Article
This paper presents a case study of a man charged with the offense of downloading child pornography from the Internet. He had used the Internet to traffic child pornography, and, in addition, to locate children to abuse, to engage in inappropriate sexual communication with children, and to communicate with other pedophiles. Such offenses were facil...
Article
Full-text available
Over recent years, offences related to the production, possession and distribution of child pornography have assumed great prominence. Public attention has focused on these crimes as being particularly repellent and deserving of both proactive policing and, when detected, full and extensive investigation. Increased awareness of the problem of child...
Article
The COPINE Project at the Department of Applied Psychology, seeks to address children's vulnerability in relation to the Internet and child pornography. As part of the project, offenders convicted of downloading such images have been interviewed. This paper considers existing models of offender behaviour alongside literature relating to Internet us...
Article
Full-text available
Ethnomethodologists in the field of offender-based research have recently criticised the earlier use of prison-based samples in research on residential burglary. They claim that interviewing burglars in their natural environment has produced findings of greater validity and reliability. By describing further analysis of data from earlier experiment...
Article
Full-text available
The changes in Eastern Europe have called into question common assumptions we used to make about the sources of conflict, and about the relationship between terrorism and conflict. Other less clearly identifiable social changes might also lead us to re-evaluate how terrorism might develop in the future. This paper identifies and focuses primarily o...
Article
This is the second of two articles detailing aspects of the financial operations of the Provisional IRA (PIRA). While the first article highlighted some of the socio-organizational factors both underpinning and limiting the nature and extent of certain fundraising activities by the PIRA, this article presents details of activities traditionally elu...
Article
The Provisional Irish Republican Army (PIRA) has long been regarded as one of the most highly organised and sophisticated terrorist groups the world has seen. The command and functional structure of this large, hierarchically‐organised movement is outlined here. The adaptability of the PIRA is noteworthy as demonstrated through a major structural a...
Article
This final report describes a series of three interrelated studies addressing the nature of cues predictive of ambush or terrorist threat available to security force personnel in terrorist environments. The studies were as follows: (1) Eighty four actal or attempted ambush situations were reconstructed through interviews with police participants, a...
Article
The Ulster Defence Association is the largest of the paramilitary organisations in Northern Ireland, yet it has received scant attention in the literature on terrorism. As a paramilitary organisation, it appeared to be in terminal decline in the late 1980s, but it has since then re‐established itself as a significant security threat in Northern Ire...
Article
Full-text available
This paper describes interviews conducted with a sample of 50 convicted residential burglars imprisoned in the Republic of Ireland. The interviews were structured to establish the nature of their criminal career, the characteristics of the burglaries they Committed, their occupational style and their general lifestyle. The results of the interviews...
Article
This paper comprises three broad sections. The first discusses and reviews psychological approaches to the identification and definition of terrorism, including its consequences, violence associated with it, the relationship between terrorism and mental health, and the notion of state and non-state terrorism. Different types of terrorism are identi...
Article
Groups of food and water deprived rats were injected with either 2 mg/kg d-amphetamine, 9mg/kg dl-fenfluramine or isotonic saline immediately after the first presentation of a 25 percent solution of condensed milk for a 30 min period. When animals were tested for aversion to condensed milk 8 days later both drugs were found to cause a highly signif...
Article
The behavioral and anorexic effects of fenfluramine, norfenfluramine, and 780SE were studied in the rat. Behavioral Activity analysis of these compounds indicates that acutely after intraperitoneal administration they all possess sedative properties but that 780SE and the related compound 1513 are much less active when administered subcutaneously....
Article
SKF 525A was found possess sedative properties in rats at doses of 25 and 50 mg per kg, when injected intraperitoneally. The behavioural effects of the drug were assessed in two ways. Firstly, by "Time Sampling Behavioural Categorisation" of explatory behaviour; and secondly by activity measurements obtained with an ultrasonic motion recorder. The...
Article
The behavioural effects of a range of high doses of D-amphetamine and DL-fenfluramine were investigated in rats. Subjects were observed individually for 1 min in every 5 for a period of an hour. During each observation period the presence of any of 6 behavioural patterns was recorded in an all or none; fashion Behaviour patterns recorded included:...
Article
The anorexic and behavioural effects of Norfenfluramine were studied in rats. Two separate experiments were conducted involving administration by intra-peritoneal and sub-cutaneous routes respectively. Behavioural effects were assessed by time sampling categorisation on Days 1 and 14 of a 20 day chronic study and anorexic effects by daily weighing....
Article
A series of eight experiments were conducted on the acute effects of a number of anorexic agents on rat exploratory behaviour, as assessed by a time sampling procedure of behavioural categorisation. Compounds studied were of three types. Firstly, some well known anorexiants (Amphetamine, Diethylpropion, Fenfluramine); secondly, a series of fenflura...
Article
The behavioural and anorexic effects of the fenfluramine derivative SE 780 in rats were studied after chronic administration over 35 days. Behavioural effects of the compound were assessed by time sampling behavioural categorisation, on days 1, 14 and 28 of administration. An initial sedative effect observed after acute administration was absent on...
Article
Two experiments on the effects of fenfluramine on FR responding are reported. In Experiment 1 two rats were trained on an FR 10 schedule of reinforcement. After more than 30 h training, intraperitoneal injection of saline, 2, 4 and 8 mg/kg fenfluramine were given. Disruption of the initial stages of responding was noted after 2 and 4 mg/kg, with co...
Article
Two experiments were conducted on the effects of chronic administration of fenfluramine on behaviour and body weight in rats. In Experiment One the effects of 28 day chronic administration were studied. A dose related rapid weight loss was observed in treated subjects, with development of tolerance to the effects of the drug on body weight after 14...
Article
Three experiments are reported investigating the effects of acute administration of fenfluramine over 3 doses on activity, eating and drinking behaviour. A time sampling procedure of activity analysis was used, employing six behaviour categories. Fenfluramine produced a dose related decrease in rearing behaviours, with some evidence of an increase...

Network

Cited By

Projects

Project (1)
Archived project
I am currently editing the Routledge Handbook of Terrorism and Counterterrorism. This is, by some margin, the largest book I have worked on in my career. The handbook provides a wide-ranging overview of the current state of academic analysis and debate on terrorism and counterterrorism, as well as a detailed survey of key historical and contemporary terrorist groups and major counter-terrorism campaigns. Adopting a wide focus, the volume highlights key trends in these areas as well as cutting-edge topics and emerging critical issues. It also has a strongly international flavour intentionally drawing on conflicts and case studies from across the globe. Ultimately, the handbook will fill an important current gap in Routledge’s growing handbook series. It benefits from a superb collection of contributors and will provide a comprehensive, state-of-the-art overview of current knowledge in this area. The volume is due to be published at the end of August 2018.