With the recent rise and fall of IS, academics and policy makers around the world are expressing concerns about the fate of children of former foreign fighters. Will they follow in their parents’... Show moreWith the recent rise and fall of IS, academics and policy makers around the world are expressing concerns about the fate of children of former foreign fighters. Will they follow in their parents’ footsteps? In this paper, we argue that in light of this discussion, the intergenerational transmission of extreme beliefs deserves a research agenda of its own. The transmission of extreme ideologies, such as extremism and cultism, constitutes a unique topic, not previously captured in traditional transmission studies. The concepts commonly used in popular media, such as ‘brainwashing’ and ‘indoctrination’, similarly fall short when trying to understand this phenomenon. Instead, a multidisciplinary approach centered around the concept intergenerational transmission is proposed. We present some of our preliminary literature findings on this topic, and consider their relation to broader theoretical frameworks. We conclude with several considerations and suggestions for future research, to better understand the intergenerational transmission of extreme ideologies in all its complexity. Show less
Online radicalisation has been highlighted by policymakers, the media, and academics as a top security priority in recent years. This thesis unpacks the concept by empirically analysing 201 Islamic... Show moreOnline radicalisation has been highlighted by policymakers, the media, and academics as a top security priority in recent years. This thesis unpacks the concept by empirically analysing 201 Islamic State terrorist actors in the US, discerning their pathways into their eventual activity and assesses the role of the Internet. The findings suggest that that while the Internet is ubiquitous, the online domain does not seem to be replacing face-to-face interactions, nor do terrorists that act online demonstrate substantially different experiences to those that do not. In fact, using the Internet may be a hindrance, rather than a help, to would-be terrorists.The findings also posit three interrelated radicalisation dynamics: Firstly, the consumption of propaganda is part of an ongoing socialisation process in which individuals take to social media to play out a staged authenticity to their peers. Secondly, an examination of the female terrorists shows that many use the Internet to circumvent gender restrictions and instead carve out a radical identity for themselves. Finally, the Internet can act as a “buyers’ market” of limitless information in which would-be terrorists can fulfil their needs in a space with fewer restrictions or constraints. The thesis concludes by outlining its contributions to the academic literature at the empirical, theoretical, and policy-level. Show less
In the process of shifting far-right ideas from the fringes to the centre of the political spectrum, the alt-right has infiltrated online spaces to mainstream extremist ideas. As part of this... Show moreIn the process of shifting far-right ideas from the fringes to the centre of the political spectrum, the alt-right has infiltrated online spaces to mainstream extremist ideas. As part of this process, female alt-right influencers have emerged within various popular social media platforms and fringe outlets, seeking to build credibility for the movement with new audiences. Contrary to previous assumptions about women as harmless adherents of far-right ideology, alt-right women are emerging as “organic intellectuals”, influential in the formation of everyday beliefs and principles in congruence with the tenets of far-right ideology. Their narratives strategically weave far-right ideological discourses, such as the imminent crisis of white identity, with topical matters on lifestyle and well-being. This article examines the rhetoric of online influencers as they shape an ideological space which is contributing to the normalization or mainstreaming of far-right ideas. In doing so, it addresses two questions: How do alt-right female influencers narrate a far-right identity? How do they mainstream white supremacist ideas online? Drawing on new empirical material from a series of far-right podcasts, this article demonstrates that alt-right women strategically construct a “liberated” female identity rooted in femininity, traditionalism and gender complementarity, and problematize feminism and women’s emancipation as constitutive of the crisis facing the white race. It further identifies the presence of an elaborate cultural narrative around white victimhood which alt-right influencers use to mainstream their ideology. To counter the perpetuation of far-right ideas in society, women’s participation in shaping far-right ideology should not remain unaddressed. This article sheds some light on how a small but highly visible group of influencers are actively working to promote a dangerous far-right ideology. Show less
Alberda, D.; Duits, N.; van den Bos, K.; Ayanian, A. H.; Zick, A.; Kempes, M. 2021
The European Database of Terrorist offenders (EDT) is based on comprehensive judicial information of convictedor deceased terrorist offenders, including social, psychological and psychiatric... Show moreThe European Database of Terrorist offenders (EDT) is based on comprehensive judicial information of convictedor deceased terrorist offenders, including social, psychological and psychiatric reports. This new empirical databaseis the result of a European cross-border collaboration between judicial organizations and scientists within theEuropean Union. The EDT dataset comprises developmental, individual, biographical and contextual factors,which are potentially related to engagement in violent extremism and terrorism. It supports research seeking toidentify critical risk and protective factors for violent extremism and terrorism. The EDT dataset could be usedto conduct studies aimed at the identification of significant personal and contextual risk and protective factorsfor terrorism and violent extremism, improving and validating risk assessments, as well as identifying pathwaysinto terrorism and radicalization. Moreover, this data can assist in the design of effective policy, prevention andintervention practices regarding potential violent extremist and terrorist offenders in Europe and elsewhere. The aimof this article is twofold: firstly, it seeks to present the EDT, along with discussing its development and methodology.To this end, the inclusion criteria and coding principles are discussed, alongside quality-, privacy- and securityissues associated with the gathering and processing of judicial data, together with some preliminary statistics.Secondly, it aims to discuss potentials for research based on EDT data. Accordingly, potential applications andfuture developments of the EDT are discussed as well as urgent needs to use and further develop this comprehensiveand unique database. Show less
Wieringen, L. van; Krüsselmann, K.; Weggemans, D.J.; Liem, M.C.A. 2021
Computer simulations have been used to model psychological and sociological phenomena in order to provide insight into how they affect human behavior and population-wide systems. In this study,... Show moreComputer simulations have been used to model psychological and sociological phenomena in order to provide insight into how they affect human behavior and population-wide systems. In this study, three agent-based simulations (ABSs) were developed to model opinion dynamics in an online social media context. The main focus was to test the effects of ‘social identity’ and ‘certainty’ on social influence. When humans interact, they influence each other’s opinions and behavior. It was hypothesized that the influence of other agents based on ingroup/outgroup perceptions can lead to extremism and polarization under conditions of uncertainty. The first two simulations isolated social identity and certainty respectively to see how social influence would shape the attitude formation of the agents, and the opinion distribution by extension. Problems with previous models were remedied to some extent, but not fully resolved. The third combined the two to see if the limitations of both designs would be ameliorated with added complexity. The combination proved to be moderating, and while stable opinion clusters form, extremism and polarization do not develop in the system without added forces. Show less
In discussing extremism, the key questions are: to whom is a duty owed and what are the limits of intolerance that are to be tolerated? Answering these questions requires examining limits and... Show moreIn discussing extremism, the key questions are: to whom is a duty owed and what are the limits of intolerance that are to be tolerated? Answering these questions requires examining limits and rights; analyzing them in the context of extremism is the ‘core’ of this book. While freedom of speech and freedom of religion are vital to democracies, the freedoms are not unlimited. Where to draw the line between permissible and impermissible is complicated. Religious and secular extremists pose dangers to society and individuals alike; the question I will seek to answer to what extent should, and does, society protect itself against a readily identifiable threat. Whether society chooses to ‘see’ that threat is essential to the discussion; examining why the threat is minimized, at best, and ignored, at worst, is a classic example of history repeating itself. The extremist, in addition to taking the law into his own hands, unequivocally rejects restrictions and limitations imposed by society intended to preserve civil and social order. As discussed in chapter one, I define extremism as a powerful combination of violence and ideology that must necessarily always be “correct” in the mind of its believers. For those believers their ideology is invariably “the truth” and must be defended at all costs. Show less