Results 11 to 20 of about 4,714 (261)

De-Radicalising Prisoners in Nigeria: developing a basic prison based de-radicalisation programme

open access: yesJournal for Deradicalization, 2016
The Nigerian Counter Terrorism Strategy recognised that force alone was not enough to combat violent extremist elements in Nigeria and that a multi-faceted approach was required to counter the threat of violent extremism.
Atta Barkindo, Shane Bryans
doaj   +1 more source

De-radicalisation Through the Performative Arts

open access: yesJournal for Deradicalization, 2020
The Arab-Israeli conflict plays out on a variety of arenas. With regards to international involvement and support, the discursive aspect of the conflict is particularly important; how each side represents itself and the other.
Simon Terhaag
doaj   +1 more source

Convivial and informal encounters with de‐radicalisation

open access: yesSociology Compass, 2023
Abstract Our piece raises a conceptual issue with regards to how migration and deradicalization literature conform with each other in ways that they depict and deal with the self/other dichotomy. Both also aim at “integrating” the “other” through policy‐oriented formal mechanisms.
Doga Can Atalay   +2 more
openaire   +2 more sources

Gap analysis of Pakistan’s non-kinetic responses to violent extremism

open access: yesCogent Social Sciences, 2023
Pakistan’s counter-terrorism (CT) strategy represents a combination of kinetic and non-kinetic means. Besides the use of military, intelligence and police force, the state has also employed de-radicalization, rehabilitation and counter-narrative ...
Khuram Iqbal, Muneeb Salman
doaj   +1 more source

Human Factors in security: User-centred and socio-technical perspectives [PDF]

open access: yes, 2015
Over the last 25 years, security research and knowledge has developed in many ways. There have been increased numbers of taught courses relating to criminology and security, high-impact research being published in dedicated journals and, from that, more ...
Frumkin, Lara   +3 more
core   +1 more source

National counter-terrorism (C-T) policies and challenges to human rights and civil liberties: Case study of United Kingdom [PDF]

open access: yes, 2019
In the UK the rise post-2005 in “home-grown” terrorism, relying to a significant extent on strikes on soft targets by “self-starters,” means that the search for effective preventive measures remains a continuing concern.
A Arden   +16 more
core   +2 more sources

Entre raison et passion : l’expérience des pédagogues lors de la formation et de l’application du projet PhiloJeunes

open access: yesClinical Sociology Review, 2023
En prenant appui sur la mission de l’école québécoise qui consiste à instruire, socialiser et qualifier, le projet PhiloJeunes, implanté au Québec depuis 2015, œuvre au renforcement des facteurs de protection face à la radicalisation violente par la ...
Marie Laurence Bordeleau-Payer   +3 more
doaj   +1 more source

Arrière-plan de la radicalisation jihadiste en Suisse : une étude exploratoire assortie de recommandations pour la prévention et l'intervention [PDF]

open access: yes, 2015
Dans le cadre de cette étude exploratoire, le processus de la radicalisation jihadiste a été analysé avec différentes approches en prenant en considération le contexte social ainsi que les niveaux individuel et collectif.
Banfi, Elisa   +11 more
core   +1 more source

Intra- and Interreligious Dialogue in Flemish (Belgian) Secondary Education as a Tool to Prevent Radicalisation

open access: yesReligions, 2021
The attacks in Paris (2015) and Brussels (2016) led to the development of an Action Plan against radicalisation wherein Islamic religious teachers are expected to contribute actively to de-radicalisation processes and counter-discourse.
Naïma Lafrarchi
doaj   +1 more source

Understanding the Roots of Radicalisation on Twitter [PDF]

open access: yes, 2018
In an increasingly digital world, identifying signs of online extremism sits at the top of the priority list for counter-extremist agencies. Researchers and governments are investing in the creation of advanced information technologies to identify and ...
Borum Randy   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy