Processual Models of Radicalization into Terrorism: A Best Fit Framework Synthesis
Keywords:
Radicalization Process, Terrorism, Processual Model, Best Fit Framework Synthesis, Meta-FrameworkAbstract
The pre-emptive turn in the criminal justice system, and more in particular in the counterterrorism context, has brought legislators to intervene as early as possible and to target remote risks. However, when drafting far-reaching legislation, hardly any attention is given to the underlying phenomena. This article therefore aims to review existing processual models of radicalization that provide insight into the sequence of the trajectory towards terrorism. These models are often isolated and comparative reviews have been scarce and partial in scope. Through a best fit framework synthesis, this contribution systematically identifies existing models and frameworks in the literature and analyses them thematically. As a result, a meta-framework, represented by an eight-phased horizontal funnel, embodies the current state of research on phase models of radicalization. The eight phases cover the entire process from pre-radicalization, to five radicalization phases sensu stricto, to implementation and post-implementation. In these phases, multiple concepts that relate to grievances, cognitions, groups and violence are identified. The meta-framework, or integrated funnel model, evidences the pre-crime hypothesis and shows that far-reaching criminal law provisions intervene at too early stages of the radicalization process.
References
Bartlett, J., Birdwell, J., & King, M. (2010). The Edge of Violence. London: Demos.
Beck, U. (1992). Risk Society: Towards a New Modernity. London: Sage.
Booth, A., & Carroll, C. (2015). How to build up the actionable knowledge base: the role of 'best fit' framework synthesis for studies of improvement in healthcare. BMJ Quality & Safety, 24(11).
Borum, R. (2003). Understanding the terrorist mind-set. FBI Law Enforcement Bulletin, 72(7), 7-10.
Borum, R. (2010). Understanding terrorist psychology. In A. Silke (Ed.), The psychology of counter-terrorism. Oxon: Routledge.
Borum, R. (2011a). Radicalization into Violent Extremism I: A Review of Social Science Theories. Journal of Strategic Security, 4(4), 7-36.
Borum, R. (2011b). Radicalization into Violent Extremism II: A Review of Conceptual Models and Empirical Research. Journal of Strategic Security, 4(4), 37-62.
Buijs, F. J., Demant, F., & Hamdy, A. (2006). Strijders van eigen bodem: Radicale en democratische moslims in Nederland. Amsterdam: Amsterdam University Press.
Carroll, C., Booth, A., & Cooper, K. (2011). A worked example of "best fit" framework synthesis: A systematic review of views concerning the taking of some potential chemopreventive agents. BMC Medical Research Methodology, 11.
Carroll, C., Booth, A., Leaviss, J., & Rick, J. (2013). “Best fit” framework synthesis: refining the method. BMC Medical Research Methodology, 13.
Cherif, A., Yoshioka, H., Ni, W., & Bose, P. (2009). Terrorism: Mechanism of Radicalization Process, Control of Contagion and Counter-Terrorist Measures. ArXiv.
Christmann, K. (2012). Preventing Religious Radicalisation and Violent Extremism: A Systematic Review of the Research Evidence. Retrieved from www.gov.uk.
Chuang, Y.-L., Chou, T., & D’Orsogna, M. R. (2018 ). Age-structured social interactions enhance radicalization. The Journal of Mathematical Sociology, 42(3).
Dafnos, A. (2013). Lone Wolf Terrorism as Category: Learning from the Breivik Case. Journal EXIT-Deutchland, (3).
de Bie, J. L. (2016). Involvement mechanisms of jihadist networks. Perspectives on Terrorism, 10(5).
Dean, G. (2016). Framing the Challenges of Online Violent Extremism:“Policing-Public-Policies". In M. Khader (Ed.), Combating Violent Extremism and Radicalization in the Digital Era.
Demetriou, C., & Alimi, E. Y. (2018). Relational Radicalization. In The Palgrave Handbook of Relational Sociology: Springer.
Dyer, C., McCoy, R. E., Rodriguez, J., & Van Duyn, D. N. (2007). Countering Violent Islamic Extremism: A Community Responsibility. FBI L. Enforcement Bull., 76, 3-9.
Easton, M., Schils, N., Waele, M. D., Pauwels, L., & Verhage, A. (2013). Is er plaats voor ‘radicalisme’ in onze democratische maatschappij? Orde van de Dag, (62), 5-16.
Ericson, R. V. (2008). The state of preemption: Managing terrorism risk through counter law. In L. Amoore & M. D. Goede (Eds.), Risk and the war on terror (pp. 57-76). New York: Routledge.
Fitzgibbon, D. W. (2007). Institutional Racism, Pre-Emptive Criminalisation and Risk Analysis. The Howard Journal, 46(2), 128-144.
Frantzen, K. K., & Fetters, M. D. (2015). Meta-integration for synthesizing data in a systematic mixed studies review: insights from research on autism spectrum disorder. Springer Science+Business Media, 50, 2251–2277.
Garland, D. (2001). The Culture of Control: Crime and Social Order in Contemporary Society. Oxford: Oxford University Press.
Gill, P. (2007). A Multi-Dimensional Approach to Suicide Bombing. International Journal of Conflict and Violence, 1(2), 142–159.
Griffin, R. (2012 ). The Metapolitics of Terrorist Radicalization. In R. Griffin (Ed.), Terrorist's Creed (pp. 88-110): Palgrave Macmillan.
Hafez, M., & Mullins, C. (2015). The Radicalization Puzzle: A Theoretical Synthesis of Empirical Approaches to Homegrown Extremism. Studies in Conflict & Terrorism, 38(11), 958-975.
Hamm, M., & Spaaij, R. (2015). Lone Wolf Terrorism in America: Using Knowledge of Radicalization Pathways to Forge Prevention Strategies. Retrieved from www.ncjrs.gov
Hannes, K. (2016). Introducing framework synthesis and thematic synthesis. Paper presented at the Systematic Reviews in social sciences: Mixed methods and qualitative research reviewed, Ghent University.
Hardy, K. (2018). Comparing Theories of Radicalisation with Countering Violent Extremism Policy. Journal for Deradicalization, 15(2), 76-110.
Helfstein, S. (2012). Edges of radicalization: Ideas, individuals and networks in violent extremism. Retrieved from ctc.usma.edu.
Holbrook, D., & Taylor, M. (2017). Terrorism as Process Narratives: A Study of Pre-Arrest Media Usage and the Emergence of Pathways to Engagement. Terrorism and Political Violence.
Horgan, J., & Taylor, D. M. (2011 ). Disengagement, de-radicalization, and the arc of terrorism: Future directions for research. In R. Coolsaet (Ed.), Jihadi terrorism and the radicalisation challenge.
Ingram, H. J. (2013). The charismatic leadership phenomenon in radical and militant islamism. Farnham: Ashgate.
Jakobs, G. (1985). Kriminalisierung im Vorfeld einer Rechtsgutsverletzung. Zeitschrift für die gesamte Strafrechtswissenschaft, 97, 751-785.
Jensen, M. A., Seaten, A. A., & James, P. A. (2018). Radicalization to Violence: A Pathway Approach to Studying Extremism. Terrorism and Political Violence.
Jerard, J. (2015). Terrorism in Indonesia: An Examination of Ten Radical Groups. (PhD), University of St Andrews.
Juergensmeyer, M. (2000). Terror in the Mind of God. The Global Rise of Religious Violence. Berkeley: University of California Press.
King, M., & Taylor, D. M. (2011). The Radicalization of Homegrown Jihadists: A Review of Theoretical Models and Social Psychological Evidence. Terrorism and Political Violence, 23(4), 602-622.
Klausen, J., Campion, S., Needle, N., Nguyen, G., & Libretti, R. (2016). Toward a Behavioral Model of “Homegrown” Radicalization Trajectories. Studies in Conflict & Terrorism, 39(1).
Lakhani, S. (2013). Radicalisation as a moral career: A qualitative study of how people become terrorists in the United Kingdom. (PhD), Cardiff University.
Lomell, H. M. (2012). Punishing the uncommitted crime: Prevention, pre-emption, precaution and the transformation of criminal law. In S. Ugelvik & B. Hudson (Eds.), Justice and Security in the 21st Century: Risks, rights and the rule of law (pp. 83-100). Oxon: Routledge.
Lygre, R. B., Eid, J., Larsson, G., & Ranstorp, M. (2011). Terrorism as a process: A critical review of Moghaddam's "Staircase to Terrorism". Scandinavian Journal of Psychology, 52, 609-616.
McCauley, C., & Moskalenko, S. (2017). Understanding political radicalization: The two-pyramids model. American Psychologist, 72(3), 205-216.
McCulloch, J., & Carlton, B. (2006). Preempting Justice: Suppression of Financing of Terrorism and the 'War on Terror'. Current Issues in Criminal Justice, 17(3), 397-412.
McCulloch, J., & Wilson, D. (2015). Pre-Crime: Preemption, Precaution and the Future. London and New York: Routledge.
McSherry, B. (2004). Terrorism Offences in the Criminal Code: Broadening the Boundaries of Australian Criminal Laws. U.N.S.W.L.J., 27, 354-372.
Moghaddam, F. M. (2005). The Staircase to Terrorism: A Psychological Exploration. American Psychologist, 60(2), 161-169.
Moskalenko, S., & McCauley, C. (2009). Measuring Political Mobilization: The Distinction Between Activism and Radicalism. Terrorism and Political Violence, 21(2), 239-260.
Muhanna-Matar, A. (2017 ). The limit-experience and self-deradicalisation: the example of radical Salafi youth in Tunisia. Critical Studies on Terrorism, 10(3), 435-475.
Murphy, C. (2012). EU counter-terrorism law: pre-emption and the rule of law Oxford: Hart.
Nasser-Eddine, M., Garnham, B., Agostino, K., & Caluya, G. (2011). Countering violent extremism (CVE) literature review. Retrieved from https://discover.dtic.mil.
Neo, L. S. (2016). An Internet-Mediated Pathway for Online Radicalisation: RECRO. In M.
Khader, L. S. Neo, G. Ong, E. T. Mingyi, & J. Chin (Eds.), Combating Violent Extremism and Radicalization in the Digital Era (pp. 197-224).
Pajunen, C. (2015 ). The Lone Wolf Terrorist: Mechanisms and Triggers of a Process-Driven Radicalization. Paideia, 101-113.
Pauwels, L., Brion, F., Schils, N., Laffineur, J., Verhage, A., De Ruyver, B., & Easton, M. (2014). Explaining and understanding the role of exposure to new social media on violent extremism: an integrative quantitative and qualitative approach. Ghent: Academia Press.
Precht, T. (2007). Home Grown Terrorism and Islamist Radicalisation in Europe: From Conversion to Terrorism. Retrieved from www.justitsministeriet.dk.
Rahimullah, R. H., Larmar, S., & Abdalla, M. (2013). Understanding Violent Radicalization amongst Muslims: A Review of the Literature. Journal of Psychology and Behavioral Science, 1(1), 19-35.
Reidy, K. (2018). Radicalization as a Vector: Exploring Non-Violent and Benevolent Processes of Radicalization. Journal for Deradicalization, (4), 249-294.
Sageman, M. (2008). A Strategy for Fighting International Islamist Terrorists. The Annals of the American Academy of Political and Social Science, 618, 223-231.
Schuurman, B., & Eijkman, Q. (2015). Indicators of terrorist intent and capability: Tools for threat assessment. Dynamics of Asymmetric Conflict, 8(3).
Silber, M. D., & Bhatt, A. (2007). Radicalization in the West: The Homegrown Threat. Retrieved from www.judicialwatch.org.
Sinai, J. (2014). Developing a model of prison radicalisation. In A. Silke (Ed.), Prisons, Terrorism and Extremism: Critical issues in management, radicalisation and reform (pp. 35-46). Oxon: Routledge.
Slootman, M., & Tillie, J. (2006). Processes of Radicalisation: Why some Amsterdam Muslims become radicals. Retrieved from http://dare.uva.nl.
Sprinzak, E. (1991). The process of delegitimation: Towards a linkage theory of political terrorism. Terrorism and Political Violence, 3(1), 50-68.
Stern, J., & Wiener, J. B. (2006). Precaution Against Terrorism. Journal of Risk Research, 9(4), 393-447.
Stubbs, K. S., & Galli, F. (2012). Inchoate offences: The sanctioning of an act prior to and irrespective of the commission of any harm. In F. Galli & A. Weyembergh (Eds.), EU counter-terrorism offences: What impact on national legislation and case-law? (pp. 291-303).
Brussels: Editions de L'Université de Bruxelles.
Taarnby, M. (2005). Recruitment of Islamist Terrorists in Europe: Trends and Perspectives.
Taylor, M., & Horgan, J. (2006). A conceptual framework for addressing psychological process in the development of the terrorist. Terrorism and Political Violence, 18, 585–601.
Torok, R. (2015 ). Institutionalised moral reframing: A research based model on Islamic radicalisation on social media. Paper presented at the 8th Australian Security and Intelligence Conference, Edith Cowan University Joondalup Campus, Perth, Western Australia.
Van der Valk, I., & Wagenaar, W. (2010). Monitor Racisme & Extemisme: In en Uit Extreemrechts. Amsterdam: Anne Frank Stichting / Amsterdam University Press.
van der Woude, M. (2010a). Voorzorgsstrafrecht: zorgen voor inzichtelijke keuzes. Een eerste aanzet tot een ex post- en ex ante-evaluatiemodel voor de wetgever. In M. Hildebrant & R.
Pieterman (Eds.), Zorg om voorzorg (pp. 77-116). Den Haag: Boom Juridische Uitgevers.
van der Woude, M. (2010b). Wetgeving in een Veiligheidscultuur: totstandkoming van antiterrorismewetgeving in Nederland bezien vanuit maatschappelijke en (rechts)politieke context. (Doctor), Leiden University, Den Haag.
Veldhuis, T., & Staun, J. (2009). Islamist radicalisation: a root cause model. Retrieved from https://www.diis.dk.
Weyembergh, A., & Kennes, L. (2012). Domestic provisions and case law: the Belgian case. In F. Galli & A. Weyembergh (Eds.), EU counter-terrorism offences: What impact on national legislation and case-law? (pp. 149-165). Brussels: Editions de L'Université de Bruxelles.
Wiktorowicz, Q. (2004). Joining the Cause: Al-Muhajiroun and Radical Islam. Paper presented at the The Roots of Islamic Radicalism Conference, Yale University.
Young, H. F., Zwenk, F., & Rooze, M. (2013). A review of the literature on radicalisation; and what it means for TERRA. Retrieved from http://www.terra-net.eu.
Zedner, L. (2007a). Pre-crime and post-criminology? Theoretical Criminology, 11, 261-281.
Zedner, L. (2007b). Seeking Security by Eroding Rights: The Side-stepping of Due Process. In B. J. Goold & L. Lazarus (Eds.), Security and Human Rights (pp. 257-276). Oxford and Portland, Oregon Hart Publishing.
Downloads
Published
Issue
Section
License
The JD Journal for Deradicalization uses a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND) Licence. You are free to share - copy and redistribute the material in any medium or format under the following conditions:
Attribution — You must give appropriate credit, provide a link to the license, andindicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
NonCommercial — You may not use the material for commercial purposes.
NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material.