1,063
Views
1
CrossRef citations to date
0
Altmetric
Articles

Pathways of radicalization: contrasting the Boston Marathon Bombers and Mohamad Merah

Pages 125-145 | Received 22 Jun 2021, Accepted 04 Feb 2022, Published online: 17 Feb 2022

References

  • Agnew, R. (1992). Foundation for a general strain theory of crime and delinquency. Criminology; An interdisciplinary Journal, 30(1), 47–88. https://doi.org/10.1111/j.1745-9125.1992.tb01093.x
  • Agnew, R. (2005). Why do criminals offend? A general theory of crime and delinquency. Roxbury.
  • Agnew, R. (2010). A general strain theory of terrorism. Theoretical Criminology, 14(2), 131–153. https://doi.org/10.1177/1362480609350163
  • Agnew, R. (2012). Reflection on a revised strain theory of delinquency. Social Forces, 91(1), 33–38. https://doi.org/10.1093/sf/sos117
  • Akers, R., & Silverman, A. (2004). Toward a social learning model of violence and terrorism. In M. Zahn, H. Brownstein, & S. Jackson (Eds.), Violence: From theory to research (pp. 19–30). Anderson.
  • Akers, R. L. (1985). Deviant behavior: A social learning approach (3rd ed.). Wadsworth Publishing.
  • Akers, R. L., & Jensen, G. F. (2006). The empirical status of social learning theory of crime and deviance: The past, present, and future. In F. T. Cullen, J. P. Wright, & K. R. Blevins, Taking stock: The status of criminological theory (Vol. 15, pp. 37–76). New Brunswick, NJ: Transactions Publishers.
  • Anderson, E. (2000). Code of the street: Decency, violence, and the moral life of the inner city. W.W. Norton.
  • Andre, V., & Harris-Hogan, S. (2013). Mohamed Merah: From petty criminal to neojihadist. Politics, Religion & Ideology, 14(2), 307–319. https://doi.org/10.1080/21567689.2013.792655
  • Andre, V., Mansouri, F., & Lobo, M. (2015). A fragmented discourse of religious leadership in France: Muslim youth between citizenship and radicalization. Journal of Muslim Minority Affairs, 35(2), 296–313. https://doi.org/10.1080/13602004.2015.1046743
  • Archetti, C. (2015). Terrorism, communication and new media explaining radicalization in the digital age. Perspectives on Terrorism, 9(1), 44–59.
  • Aseltine, R. H., Gore, S., & Gordon, J. (2000). Life stress, anger and anxiety, and delinquency: An empirical test of general strain. Journal of Health and Social Behavior, 41(3), 256–275. https://doi.org/10.2307/2676320
  • Basra, R., & Neumann, P. R. (2016). Criminal pasts, terrorist futures: European Jihadists and the new crime-terror nexus. Perspectives on Terrorism, 10(6), 25–40.
  • Bates, R. A. (2012). Dancing with wolves: Today’s lone wolf terrorists. The Journal of Public and Professional Sociology, 4(1), 1–15.
  • Becker, M. (2014). Explaining lone wolf target selection in the United States. Studies in Conflict & Terrorism, 37(11), 959–978. https://doi.org/10.1080/1057610X.2014.952261
  • Becker, M. (2021). When extremists become violent: Examining the association between social control, social learning, and engagement in violent extremism. Studies in Conflict & Terrorism, 44(12), 1104–1124. https://doi.org/10.1080/1057610X.2019.1626093
  • Beinecke, R., Raymond, A., Cisse, M., Renna, K., Khan, S., Fuller, A., & Crawford, K. (2017). The mental health response to the Boston Bombing: A three-year review. International Journal of Mental Health, 46(2), 89–124. https://doi.org/10.1080/00207411.2017.1294969
  • Bergen, P. (2016). The United States of Jihad. Crowne.
  • Bernburg, J. (2002). Anomie, social change and crime: A theoretical examination of institutional-anomie theory. British Journal of Criminology, 42(4), 729–742. https://doi.org/10.1093/bjc/42.4.729
  • Bersani, B. E. (2014). An examination of first and second generation immigrant offending trajectories. Justice Quarterly, 31(2), 315–343. https://doi.org/10.1080/07418825.2012.659200
  • Brzica, N. (2017). Potential adherents of radical Islam in Europe: Methods of recruitment and the age of perpetrators in acts of terror. Croatian Political Science Review, 54(4), 161–184.
  • Carpenter, A. L., Elkins, M., Kerns, C., Chou, T., Green, J. G., & Comer, J. S. (2017). Exposure to community violent: Event-related household discussions following the Boston Marathon Bombing and associated posttraumatic stress among area youth. Journal of Clinical Child and Adolescent Psychology, 46(3), 331–342. https://doi.org/10.1080/15374416.2015.1063432
  • Carson, J. V., James, P. A., & O’Neal, T. A. (2019). The radicalization of the Kanes: Family as a primary group influence? Dynamics of Asymmetric Conflict, 1(12), 67–89. https://doi.org/10.1080/17467586.2019.1568513
  • Caruso, R., & Schneider, F. (2013). Brutality of Jihadist terrorism: A contest perspective and empirical evidence in the period 2002-2010. Journal of Policy Modeling, 35(5), 685–696. https://doi.org/10.1016/j.jpolmod.2012.12.005
  • Creswell, J. W. (2014). Research design: Qualitative, quantitative, and mixed method approaches (4th ed.). Sage.
  • Danzell, O. E., & Maisonet Montanez, L. M. (2016). Understanding the lone wolf terror phenomena: Assessing current profiles. Behavioral Sciences of Terrorism and Political Aggression, 8(2), 135–159. https://doi.org/10.1080/19434472.2015.1070189.
  • Elman, C., Gerring, J., & Mahoney, J. (2016). Case study research: Putting the quant into the qual. Sociological Methods & Research, 45(3), 375–391. https://doi.org/10.1177/0049124116644273
  • Esser, F., & Brosius, H. B. (1996). Television as arsonists? The spread of right-wing violence in Germany. European Journal of Communication, 11(2), 235–260. https://doi.org/10.1177/0267323196011002005
  • Galily, Y., Yarchi, M., Tamir, I., & Samuel-Azran, T. (2016). The Boston game and the ISIS match: Terrorism, media, and sport. American Behavioral Scientists, 60(9), 1057–1067. https://doi.org/10.1177/0002764216632844
  • Gallini, B. (2015). The unlikely meeting between Dzhokhar Tsarnaev and Benjamin Quarles. Case Western Reserve Law Review, 66(2), 393–523.
  • Gessen, M. (2015). The brothers: The road to an American tragedy. Riverhead Books.
  • Gill, P., Corner, E., Conway, M., Thornton, A., Boom, M., & Horgan, J. (2017). Terrorist use of the internet by the numbers: Quantifying behaviors, patterns, and processes. Criminology; An interdisciplinary Journal, 16(1), 99–117. https://doi.org/10.1111/1745-9133.12249
  • Gunaratna, R., & Haynal, C. (2013). Current and emerging threats of homegrown terrorism: The case of the Boston Bombing. Perspectives on Terrorism, 7(3), 44–63.
  • Henry, D. B., Totla, P. H., & Gotrman-Smith, D. (2001). Longitudinal family and peer group effects on violence and nonviolent delinquency. Journal of Clinal Child & Adolescent Psychology, 30(2), 172–186. https://doi.org/10.1207/S15374424JCCP3002_5
  • Hershi, T. (1969). Cause of delinquency. University of California Press.
  • Hoffman, B. (2006). Inside terrorism. Columbia University Press.
  • Hogg, M. A., & Adelman, J. (2013). Uncertainty-identity theory: Extreme groups, radical behavior, and authoritarian leadership. Journal of Social Issues, 69(3), 436–454. https://doi.org/10.1111/josi.12023
  • Institute for Economics and Peace. (2019). Global Terrorism Index 2018. http://economicsandpeace.org
  • Jensen, M., LaFree, G., James, P., Atwell-Seate, A., Pisoiu, D., Stevenson, J., & Tinsley, H. (2016). Empirical Assessment of Domestic Radicalization (EADR), final report to the national institute of justice. Washington DC: National Institute of Justice.
  • Jasko, K., LaFree, G., & Kruglanski, A. (2017). Quest for significance and violent extremism: The case of domestic radicalization. Political Psychology, 38(5), 815–831. https://doi.org/10.1111/pops.12376
  • Joshi, P. T., & O’Donnell, D. A. (2003). Consequences of child exposure to war and terrorism. Clinical Child and Family Psychological Review, 6(4), 275–292. https://doi.org/10.1023/B:CCFP.0000006294.88201.68
  • Khosrokhavar, F. (2013). Radicalization in prison: The French case. Politics, Religion & Ideology, 14(2), 284–306. https://doi.org/10.1080/21567689.2013.792654
  • LaFree, G., Jensen, M. A., James, P. A., & Safer-Lichtenstein, A. (2018). Correlates of violent political extremism in the United States. Criminology; An interdisciplinary Journal, 56(2), 233–268. https://doi.org/10.1111/1745-9125.12169
  • Li, Q., & Schaub, D. (2004). Economic globalization and transnational terrorism: A pooled time-series analysis. Journal of Conflict Resolution, 48(2), 230–258. https://doi.org/10.1177/0022002703262869
  • Maxfield, M. G., & Babbie, E. R. (2018). Research methods for criminal justice and criminology (8th ed.). Cengage Learning.
  • McPhee, M. R. (2017). Maximum harm: The Tsarnaev Brothers, the FBI, and the road to the marathon bombing. Foreedge.
  • McPhee, M. R. (2020). Mayhem: Unanswered questions about the Tsarnaev Brothers, the US government and the Boston Marathon Bombing. Steerforth Press.
  • Merton, R. K. (1938). Social structure and anomie. American Sociological Review, 54(5), 597–611. 2084686
  • Messner, S. F., & Rosenfeld, R. (1994). Crime and the American dream (2nd ed.). Wadsworth Publishing.
  • Mills, C. E., Freilich, J. D., Chermak, S. M., Holt, T. J., & LaFree, G. (2021). Social learning and social control in the off- and online pathways to hate crime and terrorist violence. Studies in Conflict & Terrorism, 44(9), 701–729. https://doi.org/10.1080/1057610X.2019.1585628
  • Nasi, M., Aaltonen, M., & Kivivuori, J. (2016). Youth hate crime offending: The role of strain, social control and self-control theories. Journal of Scandinavian Studies in Criminology and Crime Prevention, 17(2), 177–184. https://doi.org/10.1080/14043858.2016.1260332
  • Nivette, A., Eisner, M., & Ribeaud, D. (2017). Developmental predictors of violent extremist attitudes: A test of general strain theory. Journal of Research in Crime and Delinquency, 54(6), 755–790. https://doi.org/10.1177/0022427817699035
  • Pauwels, L., & Schils, N. (2016). Differential online exposure to extremist content and political violence: Testing the relative strength of social learning and competing perspectives. Terrorism and Political Violence, 28(1), 1–29. https://doi.org/10.1080/09546553.2013.876414
  • Perry, S., Hasisi, B., & Perry, G. (2019). Lone terrorist: A study of run-over attacks in Israel. European Journal of Criminology, 16(1), 102–123. https://doi.org/10.1177/1477370818769257
  • Phillips, P. J., & Pohl, G. (2012). Economic profiling of the lone wolf terrorist: Can economics provide behavioral investigative advice? Journal of Applied Security Research, 7(2), 151–177. https://doi.org/10.1080/19361610.2012.656250
  • Piazza, J. A. (2011). Poverty, minority economic discrimination, and domestic terrorism. Journal of Peace Research, 48(3), 339–353. https://doi.org/10.1177/0022343310397404
  • Pratt, T. C., Cullen, F. T., Sellers, C. S., Winfree, T., Madensen, T. D., Daigle, L. E., Fearn, N. E., & Gau, J. M. (2010). The empirical status of social learning theory: A meta-analysis. Justice Quarterly, 27(6), 765–802. https://doi.org/10.1080/07418820903379610
  • Pritchett, S., & Moeller, K. (2021). Can social bonds and social learning theories help explain radical violent extremism? Nordic Journal of Criminology, 1–19. https://doi.org/10.1080/2578983X.2021.1889133
  • Regan, J. M. (2017). Select terrorism theories. In T. Morris & M. Hadji-Janev (Eds.), Countering terrorism in South Eastern Europe (pp. 74–81). NATO Science for Peace and Security Series (p. 131). IOS Press BV.
  • Rosenthal, J. (2016). Merah: The ‘untold story’ of a French Jihadist icon. World Affairs, 178(4), 50–60.
  • Sageman, M. (2008). Leaderless Jihad: Terror networks in the twenty-first century. Philadelphia. PA: University of Pennsylvania Press.
  • Sampson, R. J., Laub, J. H., & Wilmer, C. (2006). Does marriage reduce crime? A counterfactual approach to within-individual causal effects. Criminology; An interdisciplinary Journal, 44(3), 465–508. https://doi.org/10.1111/j.1745-9125.2006.00055.x
  • Shecory, M., & Laufer, A. (2008). Social control theory and the connection with ideological offenders among Israel youth during the Gaza disengagement period. International Journal of Offender Therapy and Comparative Criminology, 52(4), 454–473. https://doi.org/10.1177/0306624X07307353
  • Sherman, C., & Wedge, D. (2015). Boston strong: A city’s triumph over tragedy. ForeEdge.
  • Simi, P., & Futrell, R. (2010). America swastika: Inside the white power movement’s hidden spaces of hate. Rowman & Littlefield.
  • Spaaij, R. (2010). The enigma of lone world terrorism: An assessment. Studies in Conflict & Terrorism, 33(9), 854–870. https://doi.org/10.1080/1057610X.2010.501426
  • Spaaij, R. (2012). Understanding long world terrorism: Global patterns, motivations and prevention. Springer.
  • Spaaij, R., & Hamm, M. S. (2015). Key issues and research agendas in lone wolf terrorism. Studies in Conflict & Terrorism, 38(3), 167–178. https://doi.org/10.1080/1057610X.2014.986979
  • Speckhard, A. (2013). The Boston marathon bombers: The lethal cocktail that turned troubled youth to terrorism. Perspectives on Terrorism, 7(3), 64–78.
  • Starman, A. B. (2013). The case study as a type of qualitative research. Journal of Contemporary Educational Studies, 1, 28–43.
  • Sutherland, E. H. (1947). Principles of criminology (4th ed.). Lippincott.
  • Tarr, C. (2014). Looking at Muslims: The visibility of Islam in contemporary French cinema. Patterns of Prejudice, 48(5), 516–533. https://doi.org/10.1080/0031322X.2014.967939
  • Teich, S. (2013). Trends and developments in long world terrorism in the western world: An analysis of terrorist attacks and attempted attacks by Islamic extremists. International Institute for Counter-Terrorism.
  • Weimann, G. (2014). New terrorism and new media. The Wilson Center.
  • Wilner, A. S., & Dubouloz, C. (2010). Homegrown terrorism and transformative learning: An interdisciplinary approach to understanding radicalization. Global Change, Peace & Security, 22(1), 33–51. https://doi.org/10.1080/14781150903487956

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.