Results 11 to 20 of about 51,284 (208)
sponsorship: This work was supported in part by the Research Council KU Leuven grants C14/18/067 and STG/17/019, by CyberSecurity Research Flanders with reference number VR20192203, and by the Research Foundation Flanders (FWO) through the WOG Coding Theory and Cryptography. (Research Council KU Leuven|C14/18/067, Research Council KU Leuven|STG/17/019,
Castryck, Wouter +2 more
openaire +3 more sources
This is the protocol for a Campbell systematic review: The objectives are as follows: (1) to critically and systematically synthesize the empirical evidence on the effects or impacts of exposure to or consumption, active search, or promotion of hate ...
Ghayda Hassan +9 more
doaj +1 more source
The radical ambitions of counter‐radicalization [PDF]
AbstractThe “Trojan Horse” scandal laid bare an anxiety at the heart of the British security establishment; an anxiety that brings together questions of identity, values, and security within the demand to manage radicalization. It is an anxiety that, I will argue, reveals a novel conceptualization of threat that has driven the UK’s security and ...
openaire +2 more sources
Jihad, Extremism and Radicalization in Pakistan
Purpose: The purpose of this study is to fill current information cavities in the present material on the determinants of radicalization. The radicalization has badly affected good governance.
Surriya Shahab +3 more
doaj +1 more source
Recently, radicalism and radicalization have been gaining a great deal of public attention and are considered one of many signs of political crisis. Yet, this belies the ambivalence of these terms.
Hande Abay Gaspar +4 more
doaj +1 more source
On normal radicals, N-radicals, and A-radicals
In this paper we work in the class of associative rings. Fundamental definitions and properties of radicals may be found in Divinsky [3] and Wiegandt [I 71. The concept of normal radical was introduced by Jaegermann [7] and further properties were given by Sands [12]. l’he concept of A’-radical was introduced by Sands [I I].
Jaegermann, M., Sands, A. D.
openaire +2 more sources
Radicalization in the Digital Society: A Social Psychological Analysis
Terrorism is not a new phenomenon, it has existed for more than two millennia, developing, changing and acquiring new features and peculiarities of a particular historical period.
Inna B. Bovina +2 more
doaj +1 more source
Radicalization in the Age of Social Media: Mass Identity Manipulations (MIMs)
On November 25, 2020, Dr. Sophia Moskalenko presented on Radicalization in the Age of Social Media: Mass Identity Manipulations (MIMs) at the 2020 CASIS West Coast Security Conference.
Sophia Moskalenko
doaj +1 more source
Framing the UK’s counter-terrorism policy within the context of a wicked problem [PDF]
Terrorist attacks can be seen as the ultimate wicked problem. After 9/11, terrorists moved from so-called ‘spectacular’ events to relatively low-intensity attacks against individuals and groups. The emergence of what has become known as the ‘home-grown’
Fischbacher-Smith, Denis
core +1 more source
When Healing Turns to Activism: Formers and Family Members’ Motivation to Engage in P/CVE.
The involvement of former extremists or family members of terrorists in measures aimed at preventing and countering violent extremism (P/CVE) has recently gained more attention in research and practice.
Jonatan Schewe, Daniel Koehler
doaj

