Search results1 – 10 of over 1000
Purpose – This chapter examines how those who study issues related to radicalization and counter-radicalization have recently drawn from the experiences of former…
Purpose – This chapter examines how those who study issues related to radicalization and counter-radicalization have recently drawn from the experiences of former extremists to inform our understanding of complex issues in terrorism and extremism studies.
Approach – The authors synthesize the empirical research on radicalization and counter-radicalization that incorporates formers in the research designs. In doing so, the authors trace these research trends as they unfold throughout the life-course: (1) extremist precursors; (2) radicalization toward extremist violence; (3) leaving violent extremism; and (4) combating violent extremism.
Findings – While formers have informed our understanding of an array of issues related to radicalization and counter-radicalization, empirical research in this space is in its infancy and requires ongoing analyses.
Value – This chapter provides researchers, practitioners, and policymakers with an in-depth account of how formers have informed radicalization and counter-radicalization research in recent years as well as an overview of some of the key gaps in the empirical literature.
Purpose – The chapter explores the UK’s evolving counter-radicalization program – Prevent – and its increasing alignment with a broader Counter Extremism agenda, which it…
Purpose – The chapter explores the UK’s evolving counter-radicalization program – Prevent – and its increasing alignment with a broader Counter Extremism agenda, which it argues exemplifies not merely a concern with countering radicalization or terrorism, but a broader “civic turn” toward a narrow and restrictive conception of integration and citizenship.
Methodology/Approach – The chapter draws on a range of studies of Prevent and the governance of British Muslims, to examine the traces and impact of Prevent and Counter Extremism agendas across a range of governance domains, including urban governance, schooling, and public sector institutions and integration.
Findings – Prevent has undergone substantial conceptual and operational expansion that has meant that its purpose and efficacy as a counter terrorism strategy has become ambivalent. Its evolution into an element of a broader integration policy places limits on the terms of particularly Muslims’ citizenship. It also brings it into tension with other public sector duties and legal norms.
Originality/Value – The chapter extends existing studies of the permeation of security concerns across governance and public life, and the securitization of citizenship, to examine how these have been expressed in particular domains of governance and their implications for the inclusion and accommodation of Muslims. It also offers a caveat to the tendency in much of the literature to see such securitization as exemplifying a highly cohesive governing project.
Purpose – To examine how John Stuart Mill’s harm principle can guide debates surrounding definitions of radicalization, extremism, and deradicalization.Methodology/Approach…
Purpose – To examine how John Stuart Mill’s harm principle can guide debates surrounding definitions of radicalization, extremism, and deradicalization.
Methodology/Approach – This chapter begins by surveying definitional debates in terrorism studies according to three identified binaries: (1) cognitive versus behavioral radicalization; (2) violent extremism versus non-violent extremism; and (3) deradicalization versus disengagement. The author then interprets Mill’s harm principle and assesses which interpretation researchers and policy-makers should favor.
Findings – Applying the harm principle suggests that researchers and policy-makers should prefer behavioral over cognitive radicalization, violent over non-violent extremism, and disengagement over deradicalization. This is because government intervention in people’s lives can be justified to prevent direct risks of harm, but not to change beliefs that diverge from mainstream society.
Originality/Value – This chapter extends previous work that applied the harm principle to coercive preventive measures in counter-terrorism. It makes an original contribution by applying the principle to definitional debates surrounding radicalization and counter-radicalization. The harm principle provides researchers and policy-makers with a compass to navigate these debates. It offers an analytical method for resolving conceptual confusion.
This paper aims to offer practical guidance on teaching about digital extremism – defined here as the intersection of digital disinformation campaigns with political…
This paper aims to offer practical guidance on teaching about digital extremism – defined here as the intersection of digital disinformation campaigns with political extremism – by highlighting four pedagogical challenges: the danger of unintentionally “redpilling” students; the slippery slope to false equivalency and “bothsidesism” in turbulent partisan waters; the difficulty of separating empirical analyses from prescriptive debates circulating in popular media; and the trouble of getting students to understand digital extremism as a sociotechnical problem rather than as a social-or-technical problem. The conclusion proposes opportunities for educators to integrate practical approaches to confronting digital extremism with digital civics curricula.
This paper reviews pedagogical challenges and outlines a curricular program for teaching about digital extremism drawn from the author’s experience designing undergraduate courses and open teaching modules between 2016 and 2021.
Educators should shift focus from the substance of digital extremism to its tools – social media platforms’ surveillance and data-gathering methods, advertising technologies and monetized user-generated content, personalized recommendation algorithms and media manipulation strategies that amplify some narratives while suppressing others – and the media and political institutions that benefit most from it. Proposed lessons include: how digital extremists manipulate social media metadata; engagement with data creation and targeting practices; and analysis of information production, circulation and consumption exploring media manipulation tools and their effects.
This paper’s added values are the insights and practical recommendations for undergraduate educators teaching on a topic of urgent contemporary concern: digital extremism.
The purpose of this study is to know the effect of religious values that the Jordan Political discipline adopted and were mentioned in the Jordan political discourses…
The purpose of this study is to know the effect of religious values that the Jordan Political discipline adopted and were mentioned in the Jordan political discourses (Amman Message 2005, discourse of King Abdullah II in the European Parliament 2008 and his discourse in United Nations 2015) on the public opinion of the university students, especially their attitudes toward terrorism and extremism. Defending Islam is the responsibility of the Jordan political leadership according to Hashemite legacy and promoting Islamic values that rejected terrorism and extremism to Jordanian youth, especially tolerance and moderation values, to counter defamations and claims against Islam and correct its image in the West.
A political discourse analysis approach was used by analyzing the Amman Message and identifying the most important religious values contained therein. Also, a quantitative research method was used in this study. The study population consisted of university students, particularly Jordanian University students because being one of the high-bred Jordanian universities, it is characterized with gender, age, regional affiliation and family income diversities. This study depends on a purposive sample containing 350 students (175 males and 175 females). The survey was conducted in the academic year (2018-2019). A questionnaire that was reviewed by three jurors was used in data collection.
The results of the analysis of the political discourse showed that the values of tolerance and moderation are among the most valued in the Amman Message, where they were frequently repeated. Also, findings have shown that the religious values adopted by the Jordanian political system mentioned in the political discourses had an impact on public opinion of university students on terrorism and extremism causes in a large percent. When gender differed (males and females), the impact ratio of the public opinion for males was higher than that for females. When the age group differed (18-22 and 23-30 years), the effect ratio with the old age group was higher than the effect ratio for the students with the youngest age group. When regional affiliation differed (Jordanian and Jordanian of Palestinian origin), the impact ratio of the public opinion for Jordanian students was higher than that for Jordanian students of Palestinian origin. When regional family income differed (500 dinars and less, more than 500 dinars), the impact ratio of the public opinion for students with family income more than 500 dinars was higher than that for students with family income 500 dinars and less.
This study represents an approach to recognize the effect of religious values that were adopted by the Jordanian political system mentioned in the political discourses on public opinion of university students on terrorism and extremism causes, considering that university students represent the influential youth group in the Jordanian society.
The purpose of this paper is to examine the case of the Aspiration, Communication and Transformation campaign conducted by journalism students to counter extremism as a…
The purpose of this paper is to examine the case of the Aspiration, Communication and Transformation campaign conducted by journalism students to counter extremism as a form of experiential learning in Lebanese higher educational context. It documents the views and experiences of students in a service learning (SL) project for redressing a timely social issue.
This study employed a descriptive case study methodology involving a portraiture naturalistic approach for data gathering. It conducted semi-structured interviews with three participating students to learn from their experiences in countering extremism. This was complemented by two interviews with the instructor in charge of the project and an external stakeholder.
Results emphasized the combination of applying the broadcast technical skills of the course to countering extremism in a volatile political context.
The findings are only a mild reflection of countering extremism through SL since it focused on a single case study involving a limited number of participants. However, the study offered common sense conclusions having broader applicability.
This topic is of particular importance to higher educational institutions and communities working on countering extremism through education, particularly in contexts rife with violence and ideological indoctrination.
This paper has social implications on promoting awareness about extremism as a challenging social debacle. It presents workable recommendations for fostering a stronger relationship between higher education institutions and communities to defy extremism. It shows the importance of connecting curricula to community needs.
This paper fills a gap in the literature pertaining to the role of higher education institutions in countering extremism through SL in Lebanon and the MENA region.
The 2006 General Assembly adoption of the United Nations (UN) Global Counter-terrorism strategy marked the first time all member states ratified a collective…
The 2006 General Assembly adoption of the United Nations (UN) Global Counter-terrorism strategy marked the first time all member states ratified a collective counter-terrorism (CT) agenda. Building on the 2000 Millennium Development Goals, the strategy incorporated Amartya Sen's capability-based approach to development. This promised human-oriented and holistic methods for countering terrorism and violent extremism, in contrast to the post-2001 ‘hard security’ context of the United States–led Global War on Terror (GWOT). Although the first pillar of the strategy emphasised human rights and social progress over isolated economic growth, poverty, violence and retrogression in conflict zones since 2006 have led to the deaths of millions. Combined with resource scarcity and environmental devastation, insurgency-related conflicts have resulted in 70 million people displaced worldwide in 2019, while the politically violent phenomena of extreme right-wing nationalism and neo-jihadism remain prevalent. Reflecting on the social and economic outcomes of the GWOT, this chapter evaluates development-related discourses and activity in UN-led initiatives to counter and prevent violent extremism and terrorism. In doing so, it accounts for the impacts of UN CT measures on contemporary patterns ‘in phenomena described in policy arenas as ‘violent extremism’ and ‘terrorism’, including ‘neo-jihadism’ and right-wing extremism, in Global North and Global South contexts.
Purpose – UK laws surrounding the duty to prevent individuals being drawn into terrorism often focus on the need to safeguard the populace from exploitation by terrorist…
Purpose – UK laws surrounding the duty to prevent individuals being drawn into terrorism often focus on the need to safeguard the populace from exploitation by terrorist or extremist groups. It is within this context that countering violent extremism (CVE) work often takes place. This chapter explores how this legal duty shapes CVE projects in the UK, drawing on practitioner’s perspectives.
Methods – Writing from the perspective of practitioners from ConnectFutures, an organization that has been operating since 2013 in the UK and internationally, who advocate for a contextual safeguarding approach to provide a more holistic attitude to the prevention of violent extremism and exploitation.
Findings – Exploring the intersections between multiple forms of criminal exploitation, as well as engaging in the spaces and places young people experience harm, allows practitioners working in the CVE space to contribute to the protection of individuals from terrorist and extremist radicalization.
Originality/Value – Applying the new developed contextual safeguarding framework to CVE projects provides a contemporary and alternative ways to conduct CVE work. The chapter provides overviews of three CVE projects running with young people today in the UK, exploring how the new frameworks are adopted within these programs, all designed to address the complex causes of violent extremism.
UK government counter‐terrorism policy in the wake of the London bombings of 7 July 2005 has included an evolving set of measures seeking to engage the support of and…
UK government counter‐terrorism policy in the wake of the London bombings of 7 July 2005 has included an evolving set of measures seeking to engage the support of and productive interaction with UK citizens, so as to help oppose violent extremist ideology, to thwart potential sympathy for its proponents and to avert future incidents. The primary focus of such attempts has been Al‐Qaida‐influenced violent extremism. Government preventative measures have provoked controversy, especially in British Muslim communities. The article examines their reaction, from research commissioned by the Metropolitan Police Service and undertaken in London by the International School for Communities, Rights and Inclusion (ISCRI) from the University of Central Lancashire (UCLan), in its community engagement (CE) Pathfinder programme. The findings from this research find many parallels in recent academic literature and other commentaries. The authors contend that some government programmes have erroneously served to stigmatise UK Muslim communities ‘en masse’, which has been counter‐productive to the government objective of gaining community support and involvement, and has thereby compromised the effectiveness of counterterrorism preventative measures. The article highlights a different emphasis and some specific elements for a revised prevention policy in counter terrorism from consideration of these sources, including the primary evidence from Muslim communities themselves in the community engagement Pathfinder programme.
Purpose – This chapter examines how sentiment analysis and web-crawling technology can be used to conduct large-scale data analyses of extremist content online.…
Purpose – This chapter examines how sentiment analysis and web-crawling technology can be used to conduct large-scale data analyses of extremist content online.
Methods/approach – The authors describe a customized web-crawler that was developed for the purpose of collecting, classifying, and interpreting extremist content online and on a large scale, followed by an overview of a relatively novel machine learning tool, sentiment analysis, which has sparked the interest of some researchers in the field of terrorism and extremism studies. The authors conclude with a discussion of what they believe is the future applicability of sentiment analysis within the online political violence research domain.
Findings – In order to gain a broader understanding of online extremism, or to improve the means by which researchers and practitioners “search for a needle in a haystack,” the authors recommend that social scientists continue to collaborate with computer scientists, combining sentiment analysis software with other classification tools and research methods, as well as validate sentiment analysis programs and adapt sentiment analysis software to new and evolving radical online spaces.
Originality/value – This chapter provides researchers and practitioners who are faced with new challenges in detecting extremist content online with insights regarding the applicability of a specific set of machine learning techniques and research methods to conduct large-scale data analyses in the field of terrorism and extremism studies.