Search results

1 – 10 of 218
Book part
Publication date: 9 September 2020

Ryan Scrivens, Steven Windisch and Pete Simi

Purpose – This chapter examines how those who study issues related to radicalization and counter-radicalization have recently drawn from the experiences of former extremists to…

Abstract

Purpose – This chapter examines how those who study issues related to radicalization and counter-radicalization have recently drawn from the experiences of former extremists to inform our understanding of complex issues in terrorism and extremism studies.

Approach – The authors synthesize the empirical research on radicalization and counter-radicalization that incorporates formers in the research designs. In doing so, the authors trace these research trends as they unfold throughout the life-course: (1) extremist precursors; (2) radicalization toward extremist violence; (3) leaving violent extremism; and (4) combating violent extremism.

Findings – While formers have informed our understanding of an array of issues related to radicalization and counter-radicalization, empirical research in this space is in its infancy and requires ongoing analyses.

Value – This chapter provides researchers, practitioners, and policymakers with an in-depth account of how formers have informed radicalization and counter-radicalization research in recent years as well as an overview of some of the key gaps in the empirical literature.

Details

Radicalization and Counter-Radicalization
Type: Book
ISBN: 978-1-83982-988-8

Keywords

Content available
Book part
Publication date: 9 September 2020

Abstract

Details

Radicalization and Counter-Radicalization
Type: Book
ISBN: 978-1-83982-988-8

Book part
Publication date: 9 September 2020

Keiran Hardy

Purpose – To examine how John Stuart Mill’s harm principle can guide debates surrounding definitions of radicalization, extremism, and deradicalization.Methodology/Approach – This…

Abstract

Purpose – To examine how John Stuart Mill’s harm principle can guide debates surrounding definitions of radicalization, extremism, and deradicalization.

Methodology/Approach – This chapter begins by surveying definitional debates in terrorism studies according to three identified binaries: (1) cognitive versus behavioral radicalization; (2) violent extremism versus non-violent extremism; and (3) deradicalization versus disengagement. The author then interprets Mill’s harm principle and assesses which interpretation researchers and policy-makers should favor.

Findings – Applying the harm principle suggests that researchers and policy-makers should prefer behavioral over cognitive radicalization, violent over non-violent extremism, and disengagement over deradicalization. This is because government intervention in people’s lives can be justified to prevent direct risks of harm, but not to change beliefs that diverge from mainstream society.

Originality/Value – This chapter extends previous work that applied the harm principle to coercive preventive measures in counter-terrorism. It makes an original contribution by applying the principle to definitional debates surrounding radicalization and counter-radicalization. The harm principle provides researchers and policy-makers with a compass to navigate these debates. It offers an analytical method for resolving conceptual confusion.

Details

Radicalization and Counter-Radicalization
Type: Book
ISBN: 978-1-83982-988-8

Keywords

Abstract

Details

Police Responses to Islamist Violent Extremism and Terrorism
Type: Book
ISBN: 978-1-83797-845-8

Expert briefing
Publication date: 4 April 2016

Counterterrorism and censorship online.

Details

DOI: 10.1108/OXAN-DB210186

ISSN: 2633-304X

Keywords

Geographic
Topical
Expert briefing
Publication date: 5 September 2019

Tackling online extremism.

Details

DOI: 10.1108/OXAN-DB246246

ISSN: 2633-304X

Keywords

Geographic
Topical
Book part
Publication date: 9 September 2020

Stefano Bonino

Purpose – This chapter examines the process of radicalization, deradicalization, and support for intelligence agencies in a few well-known cases of terrorists who turned into…

Abstract

Purpose – This chapter examines the process of radicalization, deradicalization, and support for intelligence agencies in a few well-known cases of terrorists who turned into informants.

Methodology/Approach – Five cases studies are utilized to demonstrate the process of engagement in, disengagement from, and revolt against terrorist groups. Existing literature on radicalization and deradicalization is set against the context of these case studies.

Findings – By drawing upon the experiences of terrorists who turned into informants, it is possible to prove theories on radicalization and deradicalization. In particular, the process of cognitive radicalization presumes that extremist beliefs can also be rejected (deradicalization), while the process of behavioral radicalization presumes that terrorists can distance themselves from extremist behaviors (disengagement).

Originality/Value – Scholarship has traditionally focused on “underdogs” of all kinds, with a less keen interest in elites or the actors operating on their behalf. The work of informants has often remained in a dimly lit corner of academic research. This chapter helps illuminate the path undertaken by terrorists who become informants for Western security apparatus.

Details

Radicalization and Counter-Radicalization
Type: Book
ISBN: 978-1-83982-988-8

Keywords

Book part
Publication date: 26 August 2019

Ryan Scrivens, Tiana Gaudette, Garth Davies and Richard Frank

Purpose – This chapter examines how sentiment analysis and web-crawling technology can be used to conduct large-scale data analyses of extremist content online.Methods/approach …

Abstract

Purpose – This chapter examines how sentiment analysis and web-crawling technology can be used to conduct large-scale data analyses of extremist content online.

Methods/approach – The authors describe a customized web-crawler that was developed for the purpose of collecting, classifying, and interpreting extremist content online and on a large scale, followed by an overview of a relatively novel machine learning tool, sentiment analysis, which has sparked the interest of some researchers in the field of terrorism and extremism studies. The authors conclude with a discussion of what they believe is the future applicability of sentiment analysis within the online political violence research domain.

Findings – In order to gain a broader understanding of online extremism, or to improve the means by which researchers and practitioners “search for a needle in a haystack,” the authors recommend that social scientists continue to collaborate with computer scientists, combining sentiment analysis software with other classification tools and research methods, as well as validate sentiment analysis programs and adapt sentiment analysis software to new and evolving radical online spaces.

Originality/value – This chapter provides researchers and practitioners who are faced with new challenges in detecting extremist content online with insights regarding the applicability of a specific set of machine learning techniques and research methods to conduct large-scale data analyses in the field of terrorism and extremism studies.

Details

Methods of Criminology and Criminal Justice Research
Type: Book
ISBN: 978-1-78769-865-9

Keywords

Article
Publication date: 21 November 2023

Afzal Izzaz Zahari, Jamaliah Said, Kamarulnizam Abdullah and Norazam Mohd Noor

This paper aims to employ the use of focus groups composed of enforcement officers to explore and identify the financial methods used by terrorism-related organisations in…

Abstract

Purpose

This paper aims to employ the use of focus groups composed of enforcement officers to explore and identify the financial methods used by terrorism-related organisations in Malaysia.

Design/methodology/approach

The study used an open-ended question and focus group methods to gather information from 20 Malaysian enforcement officers with extensive experience in dealing with terrorism-related activities, as they strive to prevent and counter terrorism incidents. In addition, experienced practitioners and field experts also contributed to the study.

Findings

The study reveals various innovative financial methods used by terrorist-linked organisations to evade detection by local enforcement agencies. These findings are consistent with previous research, which highlights the intelligence of these organisations in avoiding detection by financial regulators.

Research limitations/implications

The findings are based on the perspectives of enforcement officers involved in preventing and countering terrorism activities. Further research could be conducted to gather insights from other government agencies, such as the judiciary or local agencies.

Practical implications

The study offers practical suggestions for organisations and institutions on effectively monitoring and taking appropriate actions in financial activities related to terrorism.

Originality/value

This study provides unique insights into the financial methods of terrorism-related organisations in an emerging country in Southeast Asia. Its findings can be applied throughout the region, given the country’s global connectivity. Furthermore, the study is distinctive in that it provides information from enforcement officers within terrorism-related government organisations, an area where resources are limited. The study also considers the impact of the pandemic on the development of these financial innovations by terrorist organisations.

Details

Journal of Criminological Research, Policy and Practice, vol. 10 no. 1
Type: Research Article
ISSN: 2056-3841

Keywords

Article
Publication date: 8 May 2017

Geoff Dean and Graeme Pettet

The purpose of this paper is to explore two distinct yet complimentary “structured professional judgement (SPJ)” approaches to terrorist/extremist risk assessment on the vexing…

2288

Abstract

Purpose

The purpose of this paper is to explore two distinct yet complimentary “structured professional judgement (SPJ)” approaches to terrorist/extremist risk assessment on the vexing issue of how best to deal with the subjectivity inherently involved in professional judgement.

Design/methodology/approach

An SPJ methodology is considered the best practice approach for assessing terrorism risk. Currently there are four specific terrorism risk instruments that have been published in the literature. Two of these SPJ tools are examined in detail, namely the Violent Extremist Risk Assessment tool (Pressman, 2009; Pressman et al., 2012) and the Structured Assessment of Violent Extremism (SAVE) tool (Dean, 2014). The paper critically unpacks the conceptual and methodological stumbling blocks of an SPJ methodology for controlling human subjectivity.

Findings

The paper presents the case for adopting a “controlling in” approach rather than a “controlling out” approach of an analyst’s subjective tacit (in-the-head) knowledge inherent in their professional judgement. To have a quantifiable SPJ tool that triangulates the multi-dimensionality of terrorism risk which can validate an analyst’s professional judgement is the next logical step in terrorist/extremist risk assessment work. The paper includes a case example of this “controlling in” approach and the validation methodology used by the SAVE software system.

Practical implications

The implications for practice range from incorporating the SAVE system in operational policing/national security work with its quantitative nature, triangulated risk scores, visualisation output of a prioritised case report with in-built alerts, to the required training for system calibration to enhance user proficiency.

Originality/value

This is a highly original and innovative paper as this type of quantified SPJ tool (SAVE) has up until now never been applied before in terrorist/extremist risk assessment work.

Details

Journal of Forensic Practice, vol. 19 no. 2
Type: Research Article
ISSN: 2050-8794

Keywords

1 – 10 of 218