Radicalization and Deradicalization

The radicalization puzzle: a theoretical synthesis of empirical approaches to homegrown extremism

Year: 2015
Description:

Abstract: Why and how do individuals residing in relatively peaceful and affluent Western societies come to embrace extremist ideologies that emanate from distant places? We summarize the most recent empirical – …

Toward a Behavioral Model of “Homegrown” Radicalization Trajectories

Year: 2016
Description:

Abstract: This research note presents a dynamic risk assessment model of homegrown terrorists. The model was tested in a study of convicted “homegrown” American terrorism offenders inspired by Al Qaeda’s – …

Defining and Distinguishing Secular and Religious Terrorism

Year: 2014
Description:

Abstract: Religious terrorism is typically characterised as acts of unrestrained, irrational and indiscriminant violence, thus offering few if any policy options for counterterrorism measures. This assumption about religious terrorism stems – …

Jihadist Hotbeds. Understanding Local Radicalization Processes

Year: 2016
Description:

Recent analyses reveal that the vast majority of jihadists come from or have some connections with specific areas or districts within different states. One can describe them as local/regional “hotbeds” – …

Making CVE Work: A Focused Approach Based on Process Disruption

Author(s): Berger-- J. M.
Year: 2016
Description:

Abstract: One of the biggest barriers to designing a comprehensive Countering Violent Extremism (CVE) programme is defining its scope. This paper argues for a narrow approach, focusing on disengagement and – …

Towards a Guide for Constructing and Disseminating Counternarratives to Reduce Support for Terrorism

Year: 2015
Description:

Abstract: Despite widespread recognition that the use of counternarratives is an important strategic component of countering violent extremism, to date, there are no comprehensive guidelines on how to develop and – …

Sentiment-Based Identification of Radical Authors (SIRA)

Year: 2015
Description:

Abstract: As violent extremists continue to surface in online discussion forums, counter-extremism agencies search for new and innovative ways of uncovering their digital indicators. Using a sample of approximately 1 – …

Normative support for terrorism: The attitudes and beliefs of immediate relatives of Jema’ah Islamiyah members

Geography: Southeast Asia
Year: 2011
Description:

Abstract: Families might be an important source of norms that legitimize terrorism, an assumption that has yet to be tested empirically. To investigate this, surveys were administered to 20 immediate – …

The radicalization of homegrown jihadists: A review of theoretical models and social-psychological evidence

Year: 2011
Description:

Abstract: This article attempts to consolidate theorizing about the radicalization of Western homegrown jihadists. Five major models of radicalization are reviewed. The commonalities and discrepancies among these models are identified – …

Recruitment and selection in violent extremist organizations: Viewing through an industrial and organizational psychology lens

Walking away: the disengagement and de-radicalization of a violent right-wing extremist

Year: 2016
Description:

Abstract: This article presents a case study of one individual’s trajectory through violent right-wing extremism in the USA. Drawing on an in-depth in-person interview conducted with ‘Sarah’, we trace the – …

Paradigmatic Shifts in Jihadism in Cyberspace: The Emerging Role of Unaffiliated Sympathizers in the Islamic State’s Social Media

Year: 2016

Prisoner Radicalization: Structural Differences among Violent Extremists

Year: 2015

Radicalization in British Columbia secondary schools: The principals’ perspective.

Author(s): Mitchell– MR
Year: 2016

Education and Security: A Global Literature Report on Countering Violent Religious Extremism (CVE)

Year: 2016

‘Questions about Dawlah. DM me, plz.’ The Sock Puppet Problem in Online Terrorism Research

Year: 2015

This is Not Your Mother’s Terrorism: Social Media, Online Radicalization and the Practice of Political Jamming

Author(s): Huey-- Laura
Year: 2015
Description:

Abstract: It is commonly recognized that social media presents vast new opportunities for terrorist groups seeking to radicalize audiences. However, few scholars have studied the actual mechanisms by which radicalizing – …

Comment le jihadisme est-il devenu numérique ? Évolutions, tendances et ripostes,

Author(s): Ducol-- Benjamin
Year: 2015
Description:

Abstract: Twitter constitue un terrain de jeu de prédilection pour le groupe État islamique (EI) : espace de médiatisation, de revendication et de mobilisation. Depuis sa matrice de naissance afghane – …

Toward a Framework Understanding of Online Programs for Countering Violent Extremism

Year: 2016
Description:

Abstract: There is an emerging consensus that ideologically-based narratives play a central role in encouraging and sustaining radicalization to violence, and that preventing, arresting, or reversing radicalization requires some means – …

Voices of the Caucasus Emirate: Mapping and analyzing North Caucasus insurgency websites.

Geography: Eastern Europe
Year: 2015
Description:

Abstract: This article looks at Internet use by insurgent groups in the North Caucasus in the context of a regional diffusion of violence. Using a mixed methods research design that – …

Terrorisme, violence de masse et radicalisation. Du Moi idéal au désengagement identificatoire

Author(s): Brunet– Louis
Year: 2015

Radicalism Leading to Violent Extremism in Canada: A Multi-Level Analysis of Muslim Community and University Based Student Leaders’ Perceptions and Experiences.

Author(s): Ahmed-- Kawser
Geography: Canada
Year: 2016
Description:

Recently, more than 150 Canadians have joined the Islamic State (IS) in the Middle East, causing alarm among both Canadian policy makers and the general citizenry. One of the most – …

Spreading the message digitally: A look into extremist organizations’ use of the Internet

Year: 2015
Description:

Why would a terrorist choose to utilize the Internet rather than the usual methods of assassination, hostage taking, and guerrilla warfare? Conway (2006) identified five major reasons why extremist groups – …

A Radical Sociability: In Defense of an Online/Offline Multidimensional Approach to Radicalisation

Publisher: Routledge
Year: 2015

Terrorist and extremist organizations’ use of the internet for recruitment

Publisher: Routledge

Social Networks, Terrorism, and Counter-Terrorism: Radical and Connected

Publisher: Routledge
Year: 2015
Description:

This book examines two key themes in terrorism studies, the radicalization process and counter-terrorism policies, through the lens of social networks. The book aims to show that networks should be – …

Youth Evaluations of CVE/PVE Programming in Kenya in Context

Geography: Kenya
Year: 2016
Description:

Despite the military efforts of the Kenyan, Ethiopian, and Somali Federal governments, the collaboration of the African Union Mission in Somalia (AMISOM) forces with US and coalition forces, and despite – …

TSAS WP16-06: Teaching CVE: a review of the Preventing Violent Extremism and Radicalisation in Australia handbook, and challenges across policy and practice

Author(s): Nolan--Elanna
Publisher: TSAS
Geography: Australia
Description:

(1) What are some of the key issues and challenges that emerged following the release of the Preventing Violent Extremism and Radicalisation in Australia (PVERA) handbook? (2) What lessons that – …

TSAS WP16-05: Assessment of the state of knowledge: Connections between research on the social psychology of the Internet and violent extremism

Publisher: TSAS
Description:

This paper seeks to answer the question: How does social psychology contribute to our understanding of the link between the Internet and violent extremism?

Radicalization in British Columbia Secondary Schools: The Principals’ Perspective

Year: 2016

TSAS WP16-01: Policies and Responsibilities for Governing Violent Extremism at Ontario Universities

Author(s): Ford--Katie
Publisher: TSAS
Year: 2016
Description:

This research looks at the governance of violent extremism on Ontario university campuses. Specifically, it explores: 1) how Ontario universities are governed; 2) how student organizations (such as clubs) and – …

‘Car Bombing “With Due Respect”: The Niger Delta Insurgency and the Idea of MEND’

Year: 2013

Security and Uncertainty in Contemporary Delayed-Return Cultures: Coping with the Blockage of Personal Goals

Year: 2015

Anxious uncertainty and reactive approach motivation (RAM) for religious, idealistic, and lifestyle extremes

Year: 2013
Description:

Reactive Approach Motivation (RAM) theory proposes that the personal uncertainty arising from motivational conflict causes anxiety, and that anxiety draws people to extremes because extremes activate approach-motivated states that automatically – …

Threat and defense as goal regulation: From implicit goal-conflict to anxious uncertainty, reactive approach motivation (RAM), and ideological extremism

Author(s): McGregor-- Ian
Year: 2011
Description:

Four studies investigated a goal regulation view of anxious uncertainty threat (Gray & McNaughton, 2000) and ideological defense. In all studies, participants (N = 444) were randomly assigned to have – …

Study 1 of 3: A Qualitative Examination of Radicalization and Susceptibility to Radicalization

Geography: Canada
Year: 2014
Description:

Correctional Service Canada (CSC) staff members recognize the complex, multi-faceted nature of radicalization, and are familiar with a wide range of behaviours indicative of radicalization or susceptibility to radicalization. Responses – …

Study 3 of 3: Estimating Susceptibility to Prison Radicalization

Geography: Canada
Year: 2014
Description:

The ability to estimate which inmates may be more susceptible to radicalizing influences and potentially intervene with those individuals prior to them being exposed or converted to a radical ideology – …

Examining the Needs and Motivations of Canada’s Federally Incarcerated Radicalized Offenders

Author(s): Michel-- S | Stys--Y
Geography: Canada
Year: 2014
Description:

This study allowed for an enhanced understanding of the motivations and needs of radicalized offenders,Footnote 1 while providing the Correctional Service of Canada (CSC) with further evidence that can be – …

Use of Programs and Interventions with Canada’s Federally Sentenced Radicalized Offenders

Author(s): Michel– S | Stys–Y
Geography: Canada
Year: 2014

TSAS WP15-06: Traits de personnalité et terrorisme

Author(s): CSIS–
Publisher: TSAS

TSAS WP15-05: Personality Traits and Terrorism

Author(s): CSIS–
Publisher: TSAS
Year: 2015

Implementing Montreal’s Centre for the prevention of radicalization leading to violence: Insights from the 2015 TSAS Summer Academy

Author(s): Berube– Maxime
Year: 2015

Leaderless Resistance and the Loneliness of Lone Wolves: Exploring the Rhetorical Dynamics of Lone Actor Violence

Author(s): Joosse– Paul
Publisher: Routledge
Year: 2015

The Subjective Reality of the Terrorist: Ideological and Psychological Factors in Terrorism

Year: 1988
Description:

[This is reprinted as “Subjective Realities” in chapter 5 of Martha Crenshaw, Explaining Terrorism. New York: Routledge, 2011 — but I prefer the original, if you can get it, because the reprint has – …

Chapter 5 – Radicalization Patterns

Year: 2015

This is Not Your Mother’s Terrorism: Social Media, Online Radicalization and the Practice of Political Jamming

Author(s): Huey– Laura
Geography: North America
Year: 2015

Questions about Dawlah. DM me, plz.’ The Sock Puppet Problem in Online Terrorism Research

Year: 2015

Radicalization: What does it mean?

Author(s): Mandel– D
Geography: Western Europe
Year: 2010

Violent Radicalization in Europe: What We Know and What We Do Not Know

Geography: Western Europe
Year: 2010

Crime Facilitation Purposes of Social Networking Sites: A Review and Analysis of the Cyberbanging Phenomenon

Year: 2013