Search results
21 – 30 of 384
The purpose of this paper is to consider historical shifts in the mobilisation of the concept of radical in relation to Australian schooling.
Abstract
Purpose
The purpose of this paper is to consider historical shifts in the mobilisation of the concept of radical in relation to Australian schooling.
Design/methodology/approach
Two texts composed at two distinct points in a 40-year period in Australia relating to radicalism and education are strategically juxtaposed. These texts are: the first issue of the Radical Education Dossier (RED, 1976), and the Attorney General Department’s publication Preventing Violent Extremism and Radicalisation in Australia (PVERA, 2015). The analysis of the term radical in these texts is influenced by Raymond Williams’s examination of particular keywords in their historical and contemporary contexts.
Findings
Across these two texts, radical is deployed as adjective for a process of interrogating structured inequalities of the economy and employment, and as individualised noun attached to the “vulnerable” young person.
Social implications
Reading the first issue of RED alongside the PVERA text suggests the consequences of the reconstitution of the role of schools, teachers and the re-positioning of certain young people as “vulnerable”. The juxtaposition of these two texts surfaces contemporary patterns of the therapeutisation of political concerns.
Originality/value
A methodological contribution is offered to historical sociological analyses of shifts and continuities of the role of the school in relation to society.
Details
Keywords
Scholars often suggest that violent extremism or terrorism – “the threatened or actual use of illegal force and violence to attain a political, economic, religious or social goal…
Abstract
Purpose
Scholars often suggest that violent extremism or terrorism – “the threatened or actual use of illegal force and violence to attain a political, economic, religious or social goal through fear, coercion or intimidation” (LaFree, G., & Dugan, L. (2007). Introducing the Global Terrorism Database. Terrorism and Political Violence, 19, 181–204, 184) – is a battle for legitimacy. However, the ambiguous definition of legitimacy often makes its application to counterterrorism measures difficult at best. The purpose of this chapter is to define legitimacy to connect policies designed to counter violent extremism.
Methodology/approach
The main impediment in the study of the influence of legitimacy on terrorism is the debate over the meaning and measurement of legitimacy. This debate is reviewed, and a recent resolution is presented, grouping the many conceptualizations of legitimacy into three broad categories and identifying empirical indicators for each. These categories are then used to distinguish counterterrorism policies that can be used to boost legitimacy.
Originality/value
This chapter organizes counterterrorism policies into a recently developed framework as a tool for researchers, practitioners, and policymakers.
Details
Keywords
Tackling online extremism.
Details
DOI: 10.1108/OXAN-DB246246
ISSN: 2633-304X
Keywords
Geographic
Topical
Mohamed O. Elkhosht, Mahmoud Mahmoud, Ahmed Zayed, Mo’taz S. Abdallah, Mohamed S. A. Kharbush and Dalal Mahmoud
This study aims to investigate the relationship between the spread of extremist thoughts and the weak economic and social factors surrounding it. There are higher chances of…
Abstract
Purpose
This study aims to investigate the relationship between the spread of extremist thoughts and the weak economic and social factors surrounding it. There are higher chances of better understanding of this relationship on Egypt’s borders more than its center. Achieving development and stability leads to creating a preventive environment to extremist thoughts existence and spread, in addition to preventing its transformation into terrorism.
Design/methodology/approach
The study depends on an analytical methodology to examine the validity of the research hypothesis through two basic steps. The first step depends on describing the geographical, demographical, economic, social, political and security aspects of North Sinai. The second step is a prospective approach to build a strategy that helps in achieving development and accordingly a comprehensive confront for the opportunities of extremist thought spreading in North Sinai.
Findings
The study concludes that Egypt is well aware of the dimensions of encountering extremist thoughts and has adopted a comprehensive approach in achieving this. It has already started the paces of this confrontation in general, with some specificity in North Sinai Governorate that observed lately increased activities by extremists and terrorist groups. The proposed strategy is a set of policies that can help the country achieve its goals against extremism and terrorism.
Research limitations/implications
The study covers a time frame that starts from 2014, which is considered the beginning of a new phase for the Egyptian state. The study relies on the field of strategic studies and it focuses on North Sinai Governorate.
Originality/value
The study has a scientific importance because it presents a proposal for a comprehensive strategy to encounter extremist thoughts, which adds value to the literature of the study of extremism. The current study makes its contributions in some directions, such as reviewing the contents of this extremist thought or the juristic comment on it, the impacts of the spread of extremist thoughts, the role of the official media in disseminating extremist thoughts or standing up to it. In terms of application, the study presents a proposal with many policies in various fields to counter extremist ideology. These proposals are implementable in North Sinai Governorate as well as other frontier governorates.
Details
Keywords
Purpose – The author investigates how those who have engaged in political violence in the UK understand Prevent’s preemptive rationality, and how Prevent conceptualizes the…
Abstract
Purpose – The author investigates how those who have engaged in political violence in the UK understand Prevent’s preemptive rationality, and how Prevent conceptualizes the trajectory toward “terrorism” in relation to the testimony of those who have engaged in “terrorist” violence and were convicted of terrorism offences.
Methodology/Approach – The author takes the assumptions that Prevent makes about risk (from the Prevent Strategy and other documents), and tests these against the testimony of former combatants from “the Troubles.”
Findings – Despite the trajectory toward violence not being considered to differ fundamentally nor demonstrated through evidence to operate differently from one era to the next, the premise of Prevent’s assumptions of the movement into violence and former combatant testimony are entirely foreign to each other.
Originality/Value – Although militants from “the Troubles” (a conflict ending in 1998) and Prevent (established in 2003) are speaking about the same country and narrating their “truth” within five years of each other, the differences in how former combatants and Prevent understand the trajectory toward violence have not been considered. This has remained a significant omission of terrorism scholarship.
Details
Keywords
This article discusses findings from a study of practitioners' perceptions of issues in implementing the Safer Communities initiative in areas of high ethnic diversity. It…
Abstract
This article discusses findings from a study of practitioners' perceptions of issues in implementing the Safer Communities initiative in areas of high ethnic diversity. It highlights perceived differences in responses to crime and safety between different ethnic groups and identifies a number of dilemmas facing practitioners.
Details
Keywords
Yeslam Al-Saggaf and Amanda Davies
The purpose of this paper is to discuss the design, application and findings of a case study in which the application of a machine learning algorithm is utilised to identify the…
Abstract
Purpose
The purpose of this paper is to discuss the design, application and findings of a case study in which the application of a machine learning algorithm is utilised to identify the grievances in Twitter in an Arabian context.
Design/methodology/approach
To understand the characteristics of the Twitter users who expressed the identified grievances, data mining techniques and social network analysis were utilised. The study extracted a total of 23,363 tweets and these were stored as a data set. The machine learning algorithm applied to this data set was followed by utilising a data mining process to explore the characteristics of the Twitter feed users. The network of the users was mapped and the individual level of interactivity and network density were calculated.
Findings
The machine learning algorithm revealed 12 themes all of which were underpinned by the coalition of Arab countries blockade of Qatar. The data mining analysis revealed that the tweets could be clustered in three clusters, the main cluster included users with a large number of followers and friends but who did not mention other users in their tweets. The social network analysis revealed that whilst a large proportion of users engaged in direct messages with others, the network ties between them were not registered as strong.
Practical implications
Borum (2011) notes that invoking grievances is the first step in the radicalisation process. It is hoped that by understanding these grievances, the study will shed light on what radical groups could invoke to win the sympathy of aggrieved people.
Originality/value
In combination, the machine learning algorithm offered insights into the grievances expressed within the tweets in an Arabian context. The data mining and the social network analyses revealed the characteristics of the Twitter users highlighting identifying and managing early intervention of radicalisation.
Details