Search results
1 – 10 of over 5000Ikem Godspower Ujene and Usman Ojedokun
Despite the fact that Nigeria’s transition from military rule to democracy is over two decades, violence targeting journalists still remains a recurring issue. On this basis, this…
Abstract
Purpose
Despite the fact that Nigeria’s transition from military rule to democracy is over two decades, violence targeting journalists still remains a recurring issue. On this basis, this paper aims to examine patterns of violent attacks targeting journalists in Lagos, Nigeria.
Design/methodology/approach
This study was descriptive and cross-sectional in design. Social disorganisation theory was deployed as theoretical framework. Data were principally elicited through the in-depth interview method. Multistage sampling techniques were used for the selection of 25 journalists across six media organisations in Lagos.
Findings
The results showed that assault on journalists is a common phenomenon in the city, with more cases usually recorded during period of general elections. Three major factors were identified by respondents as underlying violent attacks on journalists. Also, security personnel and political thugs were mentioned as the major perpetrators of violent attacks on journalists.
Originality/value
This research not only provides a unique and significant insight into the issue bordering on violent attacks that are being directed at media practitioners in Nigeria it equally puts forward some useful and far-reaching recommendations that can be adopted to effectively address the problem.
Details
Keywords
This study uses Tilly's concept of repertoires of contention as a lens to examine the utilization of eight distinct contentious tactics, ranging from nonviolent demonstrations to…
Abstract
This study uses Tilly's concept of repertoires of contention as a lens to examine the utilization of eight distinct contentious tactics, ranging from nonviolent demonstrations to rebellion. Using an original dataset on Latin America, I develop a measure of tactical fractionalization of 62 contentious campaigns in Latin America, and I find that, consistent with theory, the range of tactics within campaigns is limited, compared to the range of tactics found in the country or region as a whole. Second, an examination of the sample shows that the eight contentious tactics tend to coincide into three separate repertoires of contention: protest, strikes, and rebellion. Finally, I analyze two conflicting theories on the selection of contentious tactics: Tilly's regime theory and Lichbach's substitution model. The prevalence of the three repertoires depends a great deal on the regime type in place, the level of primary school enrollment (measuring state capacity), and the generalized level of repression. These variables were all suggested by Tilly's regime theory. Contentious challengers show no sign of shifting tactics in response to repression of that tactic in the past, which contradicts the substitution model.
Details
Keywords
The militancy phenomenon.
Details
DOI: 10.1108/OXAN-DB218319
ISSN: 2633-304X
Keywords
Geographic
Topical
Sarah Knight, Abbie Maroño and David Keatley
The purpose of this study is to compare violent and non-violent extremists in terms of their age when they first perpetrate an extremist act, and to understand how this relates to…
Abstract
Purpose
The purpose of this study is to compare violent and non-violent extremists in terms of their age when they first perpetrate an extremist act, and to understand how this relates to other factors underlying extremist behaviours. While the end goal of many extremists may be functionally similar, the pathways into extremism vary, and the literature has demonstrated that a “one-size-fits-all” explanation does not exist. Motivational drivers are complex and dynamic; therefore, attempting to identify a terrorist “profile” has limited applied efficacy.
Design/methodology/approach
This study applied a temporal approach (“crime script analysis” or CSA) to identify, map and compare the sequential stages (or “scenes”) in the life histories of violent and non-violent extremists who have committed acts of extremism across different age groups. Crime scripts comprising mainly qualitative data for 40 male extremists (20 violent, 20 non-violent “cases”) were developed, and CSA was conducted according to the age at which they committed their first extremist offence.
Findings
Results demonstrated key temporal, developmental differences between the pathways of extremists who commit their first offence at different ages. One key difference was that for both the violent and non-violent extremists, those under 30 used the internet as a main means of joining networks and spreading information, whereas the over 30s made more personal, community links.
Originality/value
This research can aid identification of potential environmental triggers and potential increased susceptibility to triggers across certain age groups.
Details
Keywords
Alex Wilner and Claire-Jehanne Dubouloz
Purpose – Drawing on Transformative Learning (TL) theory, the authors suggest a new and novel way to approach the study of violent radicalization.Methodology/Approach – First…
Abstract
Purpose – Drawing on Transformative Learning (TL) theory, the authors suggest a new and novel way to approach the study of violent radicalization.
Methodology/Approach – First, their argument is supported by the development of a Transformative Radicalization (TR) framework that borrows and adapts the core tenets of TL theory. Second, they provide a preliminary illustrative exploration of TR using two autobiographical accounts of militant radicalization (Islamist and Anarchist) from the UK and Canada.
Findings – Radicalization is a cognitive and emotional process of change that prepares and motivates an individual to pursue violent behavior. That process of change is incremental; individuals learn and adopt novel political, social, ideological, and/or religious ideals that justify and legitimize indiscriminate violence. The TR framework provides a more nuanced appreciation for the cognitive aspects involved in this process. The authors’ empirical illustrations provide guidance on how subsequent research might use original interview data on individual radicalization processes to develop more in-depth, cross-case comparisons.
Originality/Value – This theory builds a cross-disciplinary understanding of violent radicalization that highlights the way adults learn, alter their meaning perspectives, and change their behavior.
Details
Keywords
Paul Gill, Zoe Marchment, Sanaz Zolghadriha, Nadine Salman, Bettina Rottweiler, Caitlin Clemmow and Isabelle Van Der Vegt
Purpose – This chapter provides a roadmap for future research and evaluation on violent extremist risk analysis.Methodology/Approach – The authors synthesize the lessons learned…
Abstract
Purpose – This chapter provides a roadmap for future research and evaluation on violent extremist risk analysis.
Methodology/Approach – The authors synthesize the lessons learned from process evaluations of general violence risk assessment, bias research, survey designs, linguistic analyses, and spatial analyses, and apply them to the problem of violent extremist risk assessment and management.
Findings – The next generation of violent extremist risk assessment research will necessitate a focus upon process, barriers to effective implementation and taking the human element of decision-making into account. Furthermore, the development of putative risk factors for violent extremist attitudes and behaviors necessitates a movement toward more survey-based research designs. Future risk assessment processes may additionally take language and spatial components into account for a more holistic understanding.
Originality/Value – Based on existing literature, there is a paucity of research conducting process evaluations, survey designs, linguistic analyses, and spatial analyses in this area. The authors provide several roadmaps, assessments of respective strengths and weaknesses, and highlight some initial promising results.
Details