6,140
Views
1
CrossRef citations to date
0
Altmetric
Articles

Vulnerability to radicalisation in a general population: a psychometric network approach

ORCID Icon, ORCID Icon, ORCID Icon & ORCID Icon
Pages 408-436 | Received 07 Feb 2021, Accepted 03 Dec 2021, Published online: 27 Feb 2022

References

  • Baldet, W. (2020). Prevent and the terrorism act: We need to talk about Kieron. https://www.radicalrightanalysis.com/2020/02/27/prevent-and-the-terrorism-act-we-need-to-talk-about-kieron/
  • Barry-Walsh, J., James, D. V., & Mullen, P. E. (2020). Fixated threat assessment centres: Preventing harm and facilitating care in public figure threat cases and those thought to be at risk of lone-actor grievancefuelled violence. In K. Warburton & S. Stahl (Eds.), Decriminalizing mental illness (pp. 328). Cambridge University Press.
  • Berinsky, A. J., Margolis, M. F., & Sances, M. W. (2014). Separating the shirkers from the workers? Making sure respondents pay attention on self-administered surveys. American Journal of Political Science, 58(3), 739–753. https://doi.org/10.1111/ajps.12081
  • Bhui, K. S., Hicks, M. H., Lashley, M., & Jones, E. (2012). A public health approach to understanding and preventing violent radicalization. BMC Medicine, 10(1), 16. https://doi.org/10.1186/1741-7015-10-16
  • Bichler, G., & Malm, A. (2018). Social network analysis. In Routledge Handbook of Crime Science (pp. 207–222). Routledge.
  • Bogaerts, S., Spreen, M., Masthoff, E., & Jankovic, M. (2020). Longitudinal network structure and changes of clinical risk and protective factors in a nationwide sample of forensic psychiatric patients. International Journal of Offender Therapy and Comparative Criminology, 64(15), 1533–1550.
  • Borsboom, D. (2008). Psychometric perspectives on diagnostic systems. Journal of Clinical Psychology, 64(9), 1089–1108. https://doi.org/10.1002/jclp.20503
  • Borsboom, D., & Cramer, A. O. J. (2013). Network analysis: An integrative approach to the structure of psychopathology. Annual Review of Clinical Psychology, 9(1), 91–121. https://doi.org/10.1146/annurev-clinpsy-050212-185608
  • Borum, R. (2003). Understanding the terrorist mind-set. FBI L. Enforcement Bull, 72, 7.
  • Bouhana, N. (2019). The moral ecology of extremism a systemic perspective. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/834354/Bouhana-The-moral-ecology-of-extremism.pdf
  • Bringmann, L. F., Elmer, T., Epskamp, S., Krause, R. W., Schoch, D., Wichers, M., Wigman, J. T. W., & Snippe, E. (2019). What do centrality measures measure in psychological networks? Journal of Abnormal Psychology, 128(8), 892–903. https://doi.org/10.1037/abn0000446
  • Cardeli, E., Sideridis, G., Lincoln, A. K., Abdi, S. M., & Ellis, B. H. (2020). Social bonds in the diaspora: The application of social control theory to Somali refugee young adults in resettlement. Psychology of Violence, 10(1), 18–29. https://doi.org/10.1037/vio0000259
  • Clemmow, C., Bouhana, N., & Gill, P. (2019). Analyzing person-exposure patterns in lone-actor terrorism. Criminology & Public Policy, 19(2), 451–482. https://doi.org/10.1111/capp.v19.2
  • Clemmow, C., Gill, P., Bouhana, N., Silver, J., & Horgan, J. (2020). Disaggregating lone-actor grievance-fuelled violence: Comparing lone-actor terrorists and mass murderers. Terrorism and Political Violence, 1–26. https://doi.org/10.1080/09546553.2020.1718661
  • Clemmow, C., Gill, P., Corner, E., Farnham, F., Taylor, R., Wilson, S., Taylor, A., & James, D. (2021). A data-driven classification of outcome behaviors in those who cause concern to British public figures. Psychology, Public Policy, and Law, 27(4), 509–521. https://doi.org/10.1037/law0000269
  • Clemmow, C., Schumann, S., Salman, N. L., & Gill, P. (2020). The base rate study: Developing base rates for risk factors and indicators for engagement in violent extremism. Journal of Forensic Sciences, 65(3), 865–881. https://doi.org/10.1111/1556-4029.14282
  • Coid, J. W., Bhui, K., MacManus, D., Kallis, C., Bebbington, P., & Ullrich, S. (2016). Extremism, religion and psychiatric morbidity in a population-based sample of young men. The British Journal of Psychiatry, 209(6), 491–497. https://doi.org/10.1192/bjp.bp.116.186510
  • Corner, E., & Gill, P. (2019). Psychological distress, terrorist involvement and disengagement from terrorism: A sequence analysis approach. Journal of Quantitative Criminology, 36(3), 499–526. https://doi.org/10.1007/s10940-019-09420-1
  • Corner, E., Gill, P., Schouten, R., & Farnham, F. (2018). Mental disorders, personality traits, and grievance-fueled targeted violence: The evidence base and implications for research and practice. Journal of Personality Assessment, 100(5), 459–470. https://doi.org/10.1080/00223891.2018.1475392
  • Costantini, G., Epskamp, S., Borsboom, D., Perugini, M., Mõttus, R., Waldorp, L. J., & Cramer, A. O. J. (2015). State of the aRt personality research: A tutorial on network analysis of personality data in R. Journal of Research in Personality, 54, 13–29. https://doi.org/10.1016/j.jrp.2014.07.003
  • Csardi, G., & Nepusz, T. (2006). The igraph software package for complex network research. InterJournal, Complex Systems, 1695(5), 1–9.
  • Dalege, J., Borsboom, D., van Harreveld, F., Waldorp, L. J., & van der Maas, H. L. J. (2017). Network structure explains the impact of attitudes on voting decisions. Scientific Reports, 7(1), 1–11. https://doi.org/10.1038/s41598-017-05048-y
  • De Beurs, D. (2017). Network analysis: A novel approach to understand suicidal behaviour. International Journal of Environmental Research and Public Health, 14(3), 219. https://doi.org/10.3390/ijerph14030219
  • Department of Homeland Security. (2021). Center for the preventio programs and pertnerships. Retrieved May 16, 2021, from https://www.dhs.gov/CP3
  • Desmarais, S. L., Simons-Rudolph, J., Brugh, C. S., Schilling, E., & Hoggan, C. (2017). The state of scientific knowledge regarding factors associated with terrorism. Journal of Threat Assessment and Management, 4(4), 180. https://doi.org/10.1037/tam0000090
  • Douglas, K. S., & Kropp, P. R. (2002). A prevention-based paradigm for violence risk assessment: Clinical and research applications. Criminal Justice and Behavior, 29(5), 617–658.
  • Epskamp, S., Borsboom, D., & Fried, E. I. (2018). Estimating psychological networks and their accuracy: A tutorial paper. Behavior Research Methods, 50(1), 195–212. https://doi.org/10.3758/s13428-017-0862-1
  • Epskamp, S., Cramer, A. O. J., Waldorp, L. J., Schmittmann, V. D., & Borsboom, D. (2012). Qgraph: Network visualizations of relationships in psychometric data. Journal of Statistical Software, 48(4), 1–18. https://hdl.handle.net/11245/1.380173, https://doi.org/10.18637/jss.v048.i04
  • Farrington, D. P. (2001). Predicting adult official and self-reported violence. In G.-F. Pinard & L. Pagani (Eds.), Clinical assessment of dangerousness: Empirical contributions (pp. 66–88). Cambridge University Press. https://doi.org/10.1017/CBO9780511500015.005
  • Fruchterman, T. M. J., & Reingold, E. M. (1991). Graph drawing by force-directed placement. Software: Practice and Experience, 21(11), 1129–1164. https://doi.org/10.1002/spe.4380211102
  • Gill, P. (2015). Lone-actor terrorists: A behavioural analysis. Routledge.
  • Gill, P., Clemmow, C., Hetzel, F., Rottweiler, B., Salman, N., Van Der Vegt, I., Marchment, Z., Schumann, S., Zolghadriha, S., Schulten, N., Taylor, H., & Corner, E. (2021). Systematic review of mental health problems and violent extremism. The Journal of Forensic Psychiatry & Psychology, 32(1), 51–78. https://doi.org/10.1080/14789949.2020.1820067
  • Gill, P., Horgan, J., & Deckert, P. (2014a). Bombing alone: Tracing the motivations and antecedent behaviors of lone-actor terrorists. Journal of Forensic Sciences, 59(2), 425–435. https://doi.org/10.1111/1556-4029.12312
  • Gill, P., Lee, J., Rethemeyer, K. R., Horgan, J., & Asal, V. (2014b). Lethal connections: The determinants of network connections in the provisional Irish republican army, 1970–1998. International Interactions, 40(1), 52–78. https://doi.org/10.1080/03050629.2013.863190
  • Gill, P., Silver, J., Horgan, J., Corner, E., & Bouhana, N. (2021). Similar crimes, similar behaviors? Comparing lone-actor terrorists and public mass murderers. Journal of Forensic Sciences, 66(5), 1797–1804.
  • Gomes, H. S., Farrington, D. P., Maia, Â, & Krohn, M. D. (2019). Measurement bias in self-reports of offending: A systematic review of experiments. Journal of Experimental Criminology, 15(3), 313–339. https://doi.org/10.1007/s11292-019-09379-w
  • Gruenewald, J., Chermak, S., & Freilich, J. D. (2013). Distinguishing “loner” attacks from other domestic extremist violence: A comparison of far-right homicide incident and offender characteristics. Criminology and Public Policy, 12(1), 65–91.
  • Hassan, G., Brouillette-Alarie, S., Alava, S., Frau-Meigs, D., Lavoie, L., Fetiu, A., Varela, W., Borokhovski, E., Venkatesh, V., Rousseau, C., & Sieckelinck, S. (2018). Exposure to extremist online content could lead to violent radicalization: A systematic review of empirical evidence. International Journal of Developmental Science, 12(1-2), 71–88.
  • Heino, M. T. J., Knittle, K., Fried, E., Sund, R., Haukkala, A., Borodulin, K., Uutela, A., Araujo-Soares, V., Vasankari, T., & Hankonen, N. (2019). Visualisation and network analysis of physical activity and its determinants: Demonstrating opportunities in analysing baseline associations in the let’s move It trial. Health Psychology and Behavioral Medicine, 7(1), 269–289. https://doi.org/10.1080/21642850.2019.1646136
  • Hevey, D. (2018). Network analysis: A brief overview and tutorial. Health Psychology and Behavioral Medicine, 6(1), 301–328.
  • Home Office. (2012). Channel: Vulnerability assessment framework. https://www.gov.uk/government/publications/channel-vulnerability-assessment
  • Home Office. (2018). Counter-terrorism strategy (CONTEST) 2018. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/97995/strategy-contest.pdf
  • Horgan, J. (2003). The search for the terrorist personality. In A. Silke (Ed.), Terrorists, victims and society (pp. 3–27). Wiley & Sons Ltd.
  • Horgan, J. (2008). From profiles to pathways and roots to routes: Perspectives from psychology on radicalization into terrorism. The ANNALS of the American Academy of Political and Social Science, 618(1), 80–94. https://doi.org/10.1177/0002716208317539
  • Horgan, J. G., Gill, P., Bouhana, N., Silver, J., & Corner, E. (2016). Across the universe? A comparative analysis of violent radicalization across three offender types with implications for criminal justice training and education. National Criminal Justice Reference System.
  • Jensen, M. A., Safer-Lichtenstein, A., James, P. A., & LaFree, G. (2020). The link between prior criminal record and violent political extremism in the united. In D. Weisburd, E. Savona, B. Hasisi, & F. Calderoni (Eds.), Understanding recruitment to organized crime and terrorism (pp. 121–146). Springer. https://doi.org/10.1007/978-3-030-36639-1_6
  • Kruglanski, A. W., Jasko, K., Chernikova, M., Dugas, M., & Webber, D.. (2018). To the fringe and back: Violent extremism and the psychology of deviance. American Psychologist, 72(3), 217–230. https://doi.org/10.1037/amp0000091
  • Krumpal, I. (2013). Determinants of social desirability bias in sensitive surveys: A literature review. Quality and Quantity, 47(4), 2025–2047.
  • LaFree, G., Jensen, M. A., James, P. A., & Safer-Lichtenstein, A. (2018). Correlates of violent political extremism in the United States. Criminology; An interdisciplinary Journal, 56(2), 233–268. https://doi.org/10.1111/1745-9125.12169
  • Lloyd, M., & Dean, C. (2015). The development of structured guidelines for assessing risk in extremist offenders. Journal of Threat Assessment and Management, 2(1), 40–52. https://doi.org/10.1037/tam0000035
  • Logan, C., & Lloyd, M. (2019). Violent extremism: A comparison of approaches to assessing and managing risk. Legal and Criminological Psychology, 24(1), 141–161. https://doi.org/10.1111/lcrp.12140
  • Lösel, F., Bender, D., Jugl, I., & King, S. (2020). Resilience against political and religious extremism, radicalization, and related violence: A systematic review of studies on protective factors. In D. Weisburd, E. Savona, B. Hasisi, & F. Calderoni (Eds.), Understanding recruitment to organized crime and terrorism (pp. 55–84). Springer.
  • Lynam, D. R., & Miller, J. D. (2004). Personality pathways to impulsive behavior and their relations to deviance: Results from three samples. Journal of Quantitative Criminology, 20(4), 319–341. https://doi.org/10.1007/s10940-004-5867-0
  • McCuish, E., Bouchard, M., & Beauregard, E. (2021). A network-based examination of the longitudinal association between psychopathy and offending versatility. Jounral of Quantitative Criminology, 37(3), 693–714. https://doi.org/10.1007/s10940-020-09462-w
  • Milla, M. N., & Hudiyana, J. (2019). The protective role of friendship: Cross-group friendship mediates the effect of ideological quest for significance on commitment to a radical group. Differences, 76, 87. https://doi.org/10.7454/proust.v2i2.42
  • Monahan, J. (2012). The individual risk assessment of terrorism. Psychology, Public Policy, and Law, 18(2), 167. https://doi.org/10.1037/a0025792
  • Monahan, J. (2017). The individual risk assessment of terrorism: Recent developments. The handbook of the criminology of terrorism (pp. 520–534). Wiley.
  • Monahan, J., Steadman, H. J., Silver, E., Appelbaum, P. S., Robbins, P. C., Mulvey, E. P., Roth, L. H., Grisso, T., & Banks, S. M. (2001). Rethinking risk assessment: The MacArthur study of mental disorder and violence. Oxford University Press.
  • Nussio, E. (2020). The role of sensation seeking in violent armed group participation. Terrorism and Political Violence, 32(1), 1–19. https://doi.org/10.1080/09546553.2017.1342633
  • Oppenheimer, D. M., Meyvis, T., & Davidenko, N. (2009). Instructional manipulation checks: Detecting satisficing to increase statistical power. Journal of Experimental Social Psychology, 45(4), 867–872. https://doi.org/10.1016/j.jesp.2009.03.009
  • Palan, S., & Schitter, C. (2018). Prolific. ac-A subject pool for online experiments. Journal of Behavioral and Experimental Finance, 17, 22–27.
  • Pathé, M. T., Haworth, D. J., Goodwin, T., Holman, A. G., Amos, S. J., Winterbourne, P., & Day, L. (2018). Establishing a joint agency response to the threat of lone-actor grievance-fuelled violence. The Journal of Forensic Psychiatry & Psychology, 29(1), 37–52. https://doi.org/10.1080/14789949.2017.1335762
  • Pauwels, L., Brion, F., & De Ruyver, B. (2014). Explaining and understanding the role of exposure to new social media on violent extremism. An integrative quantitative and qualitative approach (RADIMED): Summary. https://orfeo.kbr.be/bitstream/handle/internal/4197/synTA043_en.pdf?sequence=1
  • Pauwels, L., & Schils, N. (2016). Differential online exposure to extremist content and political violence: Testing the relative strength of social learning and competing perspectives. Terrorism and Political Violence, 28(1), 1–29.
  • Peer, E., Brandimarte, L., Samat, S., & Acquisti, A. (2017). Beyond the Turk: Alternative platforms for crowdsourcing behavioral research. Journal of Experimental Social Psychology, 70, 153–163.
  • Perliger, A., & Pedahzur, A. (2011). Social network analysis in the study of terrorism and political violence. PS: Political Science & Politics, 44(1), 45–50. https://doi.org/10.1093/isq/sqv010
  • Piazza, J. A. (2017). The determinants of domestic right-wing terrorism in the USA: Economic grievance, societal change and political resentment. Conflict Management and Peace Science, 34(1), 52–80. https://doi.org/10.1177/0738894215570429
  • Pons, P., & Latapy, M.. (2005). Computing communities in large networks using random walks. In P. Yolum, T. Güngör, F. Gürgen, & C. Özturan (Eds.), Computer and Information Sciences - ISCIS 2005. ISCIS 2005. Lecture Notes in Computer Science (Vol. 3733, pp. 284–293). Springer. https://doi.org/10.1007/11569596_31
  • Ravndal, J. A. (2018). Explaining right-wing terrorism and violence in Western Europe: Grievances, opportunities and polarisation. European Journal of Political Research, 57(4), 845–866. https://doi.org/10.1111/1475-6765.12254
  • Robinaugh, D. J., Hoekstra, R. H. A., Toner, E. R., & Borsboom, D. (2020). The network approach to psychopathology: A review of the literature 2008–2018 and an agenda for future research. Psychological Medicine, 50(3), 353–366. https://doi.org/10.1017/S0033291719003404
  • Rottweiler, B., & Gill, P. (2020). Conspiracy beliefs and violent extremist intentions: The contingent effects of self-efficacy, self-control and law-related morality. Terrorism and Political Violence, 1–20. https://doi.org/10.1080/09546553.2020.1803288
  • Rousseau, C., Oulhote, Y., Lecompte, V., Mekki-Berrada, A., Hassan, G., & El Hage, H. (2021). Collective identity, social adversity and college student sympathy for violent radicalization. Transcultural Psychiatry, 58(5), 654–668. https://doi.org/10.1177/1363461519853653
  • Schumpe, B. M., Bélanger, J. J., Moyano, M., & Nisa, C. F. (2020). The role of sensation seeking in political violence: An extension of the Significance Quest theory. Journal of Personality and Social Psychology, 118(4), 743–761. https://doi.org/10.1037/pspp0000223
  • Shover, N., & Thompson, C. Y. (1992). Age, differential expectations, and crime desistance. Criminology, 30(1), 89–104.
  • Taylor, M., & Horgan, J. (2006). A conceptual framework for addressing psychological process in the development of the terrorist. Terrorism and Political Violence, 18(4), 585–601.
  • Torjesen, I. (2018). Can public health strategies tackle London’s rise in fatal violence? British Medical Journal Publishing Group, 361, https://doi.org/10.1136/bmj.k1578
  • Tourangeau, R., & Yan, T. (2007). Sensitive questions in surveys. Psychological Bulletin, 133(5), 859.
  • Trimbur, M., Amad, A., Horn, M., Thomas, P., & Fovet, T. (2021). Are radicalization and terrorism associated with psychiatric disorders? A systematic review. Journal of Psychiatric Research, 141, 214–222.
  • van Borkulo, C. D., Borsboom, D., Epskamp, S., Blanken, T. F., Boschloo, L., Schoevers, R. A, & Waldorp, L. J.. (2015). A new method for constructing networks from binary data. Scientific Reports, 4(1), 14. https://doi.org/10.1038/srep05918
  • Victoroff, J. (2005). The mind of the terrorist: A review and critique of psychological approaches. Journal of Conflict Resolution, 49(1), 3–42. https://doi.org/10.1177/0022002704272040
  • Wikström, P. O. (2010). Situational action theory. In V. F. Cullen & P. Wilcoux (Eds.), Encyclopedia of criminological theory (pp. 1001–1008). Sage.
  • Wiktorowicz, Q. (2004). Joining the cause: Al-Muhajiroun and radical Islam. The Roots of Radical Islam.
  • Wilson, L. C., & Scarpa, A. (2011). The link between sensation seeking and aggression: A meta-analytic review. Aggressive Behavior, 37(1), 81–90. https://doi.org/10.1002/ab.20369
  • Wolfowicz, M., Litmanovitz, Y., Weisburd, D., & Hasisi, B. (2020). A field-wide systematic review and meta-analysis of putative risk and protective factors for radicalization outcomes. Journal of Quantitative Criminology, 36(3), 407–447. https://doi.org/10.1007/s10940-019-09439-4
  • Yang, Z., Algesheimer, R., & Tessone, C. J. (2016). A comparative analysis of community detection algorithms on artificial networks. Scientific Reports, 6(1), 1–18.