Search results
1 – 10 of 73This paper presents an historical reconstruction of the radicalisation of Alan Fox, the industrial sociologist and a detailed analysis of his early historical and sociological…
Abstract
Purpose
This paper presents an historical reconstruction of the radicalisation of Alan Fox, the industrial sociologist and a detailed analysis of his early historical and sociological writing in the classical pluralist phase.
Design/methodology/approach
An intellectual history, including detailed discussion of key Fox texts, supported by interviews with Fox and other Biographical sources.
Findings
Fox’s radicalisation was incomplete, as he carried over from his industrial relations (IR) pluralist mentors, Allan Flanders and Hugh Clegg, a suspicion of political Marxism, a sense of historical contingency and an awareness of the fragmented nature of industrial conflict.
Originality/value
Recent academic attention has centred on Fox’s later radical pluralism with its “structural” approach to the employment relationship. This paper revisits his early, neglected classical pluralist writing. It also illuminates his transition from institutional IR to a broader sociology of work, influenced by AH Halsey, John Goldthorpe and others and the complex nature of his radicalisation.
Details
Keywords
Sarah Knight, Abbie Maroño and David Keatley
The purpose of this study is to compare violent and non-violent extremists in terms of their age when they first perpetrate an extremist act, and to understand how this relates to…
Abstract
Purpose
The purpose of this study is to compare violent and non-violent extremists in terms of their age when they first perpetrate an extremist act, and to understand how this relates to other factors underlying extremist behaviours. While the end goal of many extremists may be functionally similar, the pathways into extremism vary, and the literature has demonstrated that a “one-size-fits-all” explanation does not exist. Motivational drivers are complex and dynamic; therefore, attempting to identify a terrorist “profile” has limited applied efficacy.
Design/methodology/approach
This study applied a temporal approach (“crime script analysis” or CSA) to identify, map and compare the sequential stages (or “scenes”) in the life histories of violent and non-violent extremists who have committed acts of extremism across different age groups. Crime scripts comprising mainly qualitative data for 40 male extremists (20 violent, 20 non-violent “cases”) were developed, and CSA was conducted according to the age at which they committed their first extremist offence.
Findings
Results demonstrated key temporal, developmental differences between the pathways of extremists who commit their first offence at different ages. One key difference was that for both the violent and non-violent extremists, those under 30 used the internet as a main means of joining networks and spreading information, whereas the over 30s made more personal, community links.
Originality/value
This research can aid identification of potential environmental triggers and potential increased susceptibility to triggers across certain age groups.
Details
Keywords
Carol Galvin, Aisling Martin, Paige Milburn and Patrick John Kennedy
Factors that may influence risk and/or vulnerability to young people’s involvement in terrorism are currently unclear. Understanding the factors that contribute to a young…
Abstract
Purpose
Factors that may influence risk and/or vulnerability to young people’s involvement in terrorism are currently unclear. Understanding the factors that contribute to a young person’s risk profile is a high priority for Youth Justice Services to enable the development of targeted interventions and subsequent risk reduction. The purpose of this study is to systematically identify and critically review studies relating to young peoples’ involvement in terrorism to understand potential risk and/or vulnerability factors and the implications for intervention.
Design/methodology/approach
Literature was evaluated using the systematic review method. Twelve papers were selected for the systematic review according to the inclusion criteria.
Findings
Twelve factors emerged that indicated relevance to terrorism by young people and were combined into five overarching themes: contextual, social, psychological factors, trauma and use of time.
Originality/value
This systematic review is one of the first of its kind relating to terrorism by young people. The reported findings will be valuable to practitioners seeking to understand the risk and vulnerability factors related to terrorism by young people and the implications for intervention. Directions for future research are explored.
Details
Keywords
Kabir Md Shahin and Moyenul Hasan
This paper aims to examine the prevailing Rohingya refugee crisis from political and humanitarian perspectives and explores the political and humanitarian aspects of the Rohingya…
Abstract
Purpose
This paper aims to examine the prevailing Rohingya refugee crisis from political and humanitarian perspectives and explores the political and humanitarian aspects of the Rohingya refugee crisis.
Design/methodology/approach
Relevant literature has been reviewed for conceptual understanding. This study is descriptive and qualitative in nature and based on secondary sources of data.
Findings
The main causes of the Rohingya crisis such as political and humanitarian aspects. Issues such as discrimination and homelessness, and national security concerns that regional politics scapegoated the Rohingya to exacerbate regional tensions. Moreover, armed conflicts, political radicalization, security concerns, human rights violations and low media attention compared to other displaced families have made the future of the Rohingyas very uncertain.
Practical implications
The Rohingya crisis has far-reaching implications for domestic and regional politics as well as for relations with major world powers. In the context of regional security and geopolitics, this study provides insight into the polarization and politicization of the Rohingya minority.
Originality/value
This research offers a vital exploration of the Rohingya refugee crisis, delving into its multifaceted political and humanitarian dimensions, contributing fresh insights to address a pressing global concern.
Details
Keywords
Afzal Izzaz Zahari, Nor Balkish Zakaria, Mohd Hizam Hanafiah and Lokman Effendi Ramli
This paper aims to present a case study analysing the reintegration programs of Malaysian violent extremist detainees and prisoners. It explores the ongoing challenges faced by…
Abstract
Purpose
This paper aims to present a case study analysing the reintegration programs of Malaysian violent extremist detainees and prisoners. It explores the ongoing challenges faced by these individuals as they strive to reintegrate and assimilate into society.
Design/methodology/approach
Qualitative data was collected through interviews with 12 violent extremist detainees and prisoners who had successfully reintegrated into society. The life course perspective was used as the analytical framework, and data analysis was conducted using ATLAS.ti.
Findings
The study revealed common challenges faced by the participants in gaining societal acceptance, dealing with stigma and achieving economic stability. The results also highlighted the difficulties of sustaining livelihoods due to heightened vigilance in the surrounding environment.
Research limitations/implications
These findings enhance the understanding of factors influencing successful reintegration of people who were involved in violent extremism into mainstream society.
Practical implications
Government bodies, agencies or organisations and non-governmental organisations can implement these successful factors to prevent any issues of recidivism or resentment towards society.
Originality/value
This research contributes unique insights based on data from individuals who have undergone successful or partial successful reintegration. Detailed academic sharing of such information from a Southeast Asian country such as Malaysia is relatively scarce, given the specific procedures required for accessing such data.
Details