438
Views
8
CrossRef citations to date
0
Altmetric
Original Articles

Age-structured social interactions enhance radicalization

, &
Pages 128-151 | Received 03 Jul 2017, Accepted 03 Mar 2018, Published online: 26 Mar 2018

References

  • Ahmed, A. G., Audu, D., Loza, W., & Maximenco, A. (2013). The prevalence of extreme Middle-Eastern ideologies among some Nigerians. International Journal of Social Science Studies, 1(2), 161–167.
  • Bakker, E. (2006). Jihadi terrorists in Europe, their characteristics and the circumstances in which they joined the Jihad: An exploratory study. Technology reports. Den Haag, The Netherlands: The Hague Clingendael Institute.
  • Boccara, N., Cheong, K., & Oram, M. (1994). A probabilistic automata network epidemic model with births and deaths exhibiting cyclic behaviour. Journal of Physics A: Mathematical and General, 27(5), 1585–1597.
  • Bodewig, E. (1956). Matrix calculus. Amsterdam, The Netherlands: North-Holland.
  • Bogen, K. T., & Jones, E. D. (2005). Risks of mortality and morbidity from worldwide terrorism: 1968–2004. Risk Analysis, 26(1), 45–59.
  • Borum, R. (2003). Understanding the terrorist mindset. FBI Law Enforcement Bulletin. 7–10.
  • Burton, T. (2005). Volterra integral and differential equations. New York, NY: Elsevier.
  • Camacho, E. T. (2013). The development and interaction of terrorist and fanatic groups. Communications in Nonlinear Science and Numerical Simulation, 18(11), 3086–3097. doi:10.1016/j.cnsns.2013.04.006
  • Castillo-Chavez, C., & Song, B. (2003). The development and interaction of terrorist and fanatic groups. In C. Castillo-Chavez (edited by), Bioterrorism: Mathematical modeling applications in homeland security (pp. 155–172). Philadelphia, PA: SIAM.
  • Centola, D. (2010). The spread of behavior in an online social network experiment. Science, 329(5996), 1194–1197. doi:10.1126/science.1185231
  • Chaves, M. (1994). Secularization as declining religious authority. Social Forces, 72(3), 749–774. doi:10.1093/sf/72.3.749
  • Chou, T., & Greenman, C. D. (2016). A hierarchical kinetic theory of birth, death and fission in age-structured interacting populations. Journal of Statistical Physics, 164(1), 49–76. doi:10.1007/s10955-016-1524-x
  • Chuang, Y.-L., D’Orsogna, M. R., & Chou, T. (2017). A bistable belief dynamics model for radicalization within sectarian conflict. Quarterly of Applied Mathematics, 75(1), 19–37.
  • Crenshaw, M. (2011). Explaining terrorism: Causes, process, and consequences. London, UK: Routledge.
  • Deutscha, T., & Ehrhard, M. (2015). Mathematical modelling of radicalization processes: The example of right-wing extremism in Germany. Submitted to Mathematical Social Sciences.
  • Doosje, B., Loseman, A., & van den Bos, K. (2013). Determinants of radicalization of Islamic Youth in the Netherlands: Personal uncertainty, perceived injustice, and perceived group threat. Journal of Social Issues, 69(3), 586–604. doi:10.1111/josi.2013.69.issue-3
  • Dumortier, F., Llibre, J., & Artés, J. C. (2006). Qualitative theory of planar differential systems. New York, NY: Universitext, Springer-Verlag.
  • Ehrhardt, M., Peco, M., Tarazona, A. C., Villanueva, R. J., & Villanueva-Oller, J. (2013). Popular support to terrorist organization: A short-term prediction based on a dynamic model applied to a real case. In J. C. Cortes, L. J. Sanchez, & R. J. Villanueva (edited by), Mathematical modeling in engineering and social science, (pp. 1–8). Hauppauge, NY: Nova Science Publishers..
  • Farzanegan, M. R., & Witthuhn, S. (2017). Corruption and political stability: Does the youth bulge matter? European Journal of Political Economy, 49, 47–70. doi:10.1016/j.ejpoleco.2016.12.007
  • Fox, J. (2012). The religious wave: Religion and domestic conflict from 1960 to 2009. Civil Wars, 14(2), 141–158. doi:10.1080/13698249.2012.679492
  • Fuller, G., & Pitts, F. R. (1990). Youth cohorts and political unrest in South Korea. Political Geography Quarterly, 9(1), 9–22.
  • Golub, G. H., & van der Vorst, H. A. (2000). Eigenvalue computation in the 20th century. Journal of Computation and Applied Mathematics, 123(1–2), 35–65. doi:10.1016/S0377-0427(00)00413-1
  • Hart, D., Atkins, R., Markey, P., Youniss, J., & Science, P. (2004). Knowledge, youth bulges, and rebellion. Psychological Science, 16(8), 661–662.
  • Horgan, J. (2008). From profiles to pathways and roots to routes: Perspectives from psychology on radicalization into terrorism. The Annals of the American Association of Political and Social Sciences, 618(1), 80–94.
  • Howden, L. M., & Meyer, J. A. (2011). Age and sex composition: 2010. Technology reports. Suitland, MD: United States Census Bureau.
  • Keyfitz, B. L. (1997). The McKendrick partial differential equation and its uses in epidemiology and population study. Mathematical and Computer Modelling, 26(6), 1–9. doi:10.1016/S0895-7177(97)00165-9
  • King, M., & Taylor, D. M. (2011). The radicalization of homegrown jihadists: A review of theoretical models and social psychological evidence. Terrorism and Political Violence, 23(4), 602–622. doi:10.1080/09546553.2011.587064
  • Klausen, J., Campion, S., Needle, N., Nguyen, G., & Libretti, R. (2016). Toward a behavioral model of “Homegrown” radicalization trajectories. Studies in Conflict and Terrorism, 39(1), 67–83 doi:10.1080/1057610X.2015.1099995
  • Koehler, D. (2014). Right-wing extremist radicalization process: The formers perspective. Journal EXIT-Deutschland, 1, 307–377.
  • LaFree, G., & Dugan, L. (2007). Introducing the global terrorism database. Terrorism and Political Violence, 19(2), 181–204.. doi:10.1080/09546550701246817
  • Leslie, P. H. (1945). On the use of matrices in certain population mathematics. Biometrika, 33(3), 183–212. doi:10.1093/biomet/33.3.183
  • Leslie, P. H. (1948). Some further notes on the use of matrices in population mathematics. Biometrika, 35(3/4), 213–245. doi:10.1093/biomet/35.3-4.213
  • Lofland, J., & Stark, R. (1965). Becoming a world-saver: A theory of conversion to a deviant perspective. American Sociological Review, 30(6), 862–875. doi:10.2307/2090965
  • Loza, W., El Fatah, Y. A., Prinsloo, J., Hesselink-Louw, A., & Seidler, K. (2011). Journal of Interpersonal Violence, 26(3), 522–538.
  • Marvel, S. A., Hong, H., Papush, A., & Strogatz, S. H. (2012). Encouraging moderation: Clues from a simple model of ideological conflict. Physical Review Letters, 109(11), 118702. doi:10.1103/PhysRevLett.109.118702
  • McAllister, B., & Schmid, A. P. (2011). The routledge handbook of terrorism research. London, UK: Routledge. 210–293. chap. Theories of Terrorism.
  • McCauley, C., & Moskalenko, S. (2008). Mechanisms of political radicalization: Pathways toward terrorism. Terrorism and Political Violence, 20(3), 415–433. doi:10.1080/09546550802073367
  • McKendrick, A. G. (1925). Applications of mathematics to medical problems. Proceedings of the Edinburgh Mathematical Society, 44, 98–130.
  • Meeus, W. H. (2015). Why do young people become Jihadists? A theoretical account on radical identity development. European Journal of Development Psychology, 12(3), 275–281 doi:10.1080/17405629.2015.1024106
  • Mesquida, C. G., & Wiener, N. I. (1999). Male age composition and severity of conflicts. Politics and the Life Sciences, 18(2). 181–189. doi:10.1017/S0730938400021158
  • Moghaddam, F. M. (2005). The staircase to terrorism: A psychological exploration. American Psychologist, 60(2), 161–169.
  • Neumann, P. R. (2013). The trouble with radicalization. International Affairs, 89(4), 873–893. doi:10.1111/inta.2013.89.issue-4
  • Parker, T., & Sitter, N. (2016). The four horsemen of terrorism: It’s Not Waves, It’s Strains. Terrorism and Political Violence, 28(2), 197–216. doi:10.1080/09546553.2015.1112277
  • Precht, T. (2007). Home grown terrorism and Islamist radicalisation in Europe. Technology reports. Copenhagen, Denmark: Danish Ministry of Justice.
  • Rapoport, D. C. (2002). The four waves of rabel terror and September 11. Anthropoetics: the Journal of Generative Anthropology, 8(1), 1–19.
  • Rasler, K., & Thompson, W. R. (2009). Looking for waves of terrorism. Terrorism and Political Violence, 21(1), 28–41. doi:10.1080/09546550802544425
  • Roser, M. (2018). War and peace, global deaths in conflicts since the year 1400 on our world in data (ourworldindata.org/war-and-peace), based on P. Brecke’s conflict catalog at the centre for global economic history. www.cgeh.nl/data
  • Sageman, M. (2004). Understanding terrorist networks. Philadelphia, PA: University of Philadelphia University Press.
  • Sageman, M. (2008). A strategy for fighting international islamist terrorists. Annals of the American Academy of Political and Social Science, 618(1), 223–231. doi:10.1177/0002716208317051
  • Santonja, F. J., Tarazona, A. C., & Villanueva, R. J. (2008). A mathematical model of the pressure of an extreme ideology on a society. Computers and Mathematics with Applications, 56(3), 836–846. doi:10.1016/j.camwa.2008.01.001
  • Sedgwick, M. (2007). Inspiration and the origins of global waves of terrorism. Studies in Conflict and Terrorism, 30(2), 97–112. doi:10.1080/10576100601101042
  • Seul, J. R. (1999). `Ours is the way of god’: Religion, identity, and intergroup conflict. Journal of Peace Research, 36(5), 553–569. doi:10.1177/0022343399036005004
  • Short, M. B., McCalla, S. G., & D’Orsogna, M. R. (2017). Modelling radicalization: How small violent fringe sects develop into large indoctrinated societies. Royal Society Open Science, 4(8), 170678. doi:10.1098/rsos.170678
  • Short, M. B., Pitcher, A. B., & D’Orsogna, M. R. (2013). External conversions of player strategy in an evolutionary game: A cost-benefit analysis through optimal control. European Journal of Applied Mathematics, 24(1), 131-159. doi:10.1017/S0956792512000332
  • Silber, M. D., & Bhatt, A. (2007). Radicalization in the west: The homegrown threat. New York, NY: New York City Police Department.
  • Silke, A. (2003). Becoming a terrorist. In A. Silke (edited by), Terrorists, victims, and society: Psychological perspectives on terrorism and its consequences. Philadelphia, PA: Wiley.
  • Silke, A. (2008). Holy warriors. European Journal of Criminology, 5(1), 99–123. doi:10.1177/1477370807084226
  • Sprinzak, E. (1991). The process of delegitimation: Towards a linkage theory of political terrorism. Terrorism and Political Violence, 3(1), 50–68.
  • Trucco, E. (1965). Mathematical models for cellular systems: The von Foerster equation. Part I. Bulletin of Mathematical Biophysics, 27(3), 285–304.
  • Urdal, H. (2006). A clash of generations? Youth bulges and political violence. International Studies Quarterly, 50(3), 607–629. doi:10.1111/isqu.2006.50.issue-3
  • Verma, G., Swami, A., & Chan, K. (2014). The impact of competing zealots on opinion dynamics. Physica A: Statistical Mechanics and Its Applications, 395, 310–331.
  • Von Knop, K. (2007). Hypermedia seduction for terrorist recruiting. In B. Ganor, K. Von Knop, & C. Duarte (edited by), NATO science for peace and security series E: Human and societal dynamics (Vol. 25). Amsterdam, The Netherlands: IOS Press.
  • Von Mises, R., & Pollaczek-Geiringer, H. (1929). Praktische verfahren der gleichungsauflosung. ZAMM - Zeitschrift Für Angewandte Mathematik Und Mechanik, 9 152–164.
  • Waagen, A., Verma, G., Chan, K., Swami, A., & D’Souza, R. (2015). Effect of zealotry in high-dimensional opinion dynamics models. Physical Review E, 91(2), 022811. doi:10.1103/PhysRevE.91.022811
  • Wald, K. D., & Wilcox, C. (2006). Getting religion: Has political science rediscovered the faith factor? American Political Science Review, 100(4), 523–529. doi:10.1017/S0003055406062381
  • Wiktorowicz, Q. (2004). The roots of Islamic radicalism conference. New Haven, CT: Yale University.
  • Multiple sources. (2018). Such as data from B’Tselem: The Israeli Information Center for Human Rights in the Occupied Territories www.btselem.org/statistics/, and from Israel Ministry of Foreign Affairs. http://mfa.gov.il/MFA/ForeignPolicy/Terrorism/Palestinian/
  • Yair, O., & Miodownik, D. (2016). Youth bulge and civil war: Why a country’s share of young adults explains only non-ethnic wars. Conflict Management and Peace Science, 33(1), 25–44.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.