Skip to main content
Log in

Identifying individuals at risk of being radicalised via the internet

  • Original Article
  • Published:
Security Journal Aims and scope Submit manuscript

Abstract

In an effort to better understand the risk of individuals being radicalised via the internet, this paper re-examines the phenomenon of online radicalisation by focusing on four considerations of interest: individual, online environment, interactions between individual and the online environment, and protective elements. A key premise of the discussion presented is that the different theoretical assumptions and linkages underlying each consideration are not only reconcilable but that together they provide a more comprehensive understanding of assessing risk of radicalisation via the internet than any perspective by itself. Implications for operationalising these four considerations and their associated factors to identify individuals at risk of being radicalised via the internet will also be discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Figure 1

Similar content being viewed by others

References

  • Abdullah, Z. (2016) New tool to counter risks at borders, online. The Straits Times, 14 July, http://www.straitstimes.com/singapore/new-tools-to-counter-risks-at-borders-online, accessed 15 July 2016.

  • Aly, A., Weimann-Saks, D. and Weimann, G. (2014) Making ‘noise’ online: An analysis of the say no to terror online campaign. Perspective on Terrorism, 8(5): 33–47.

    Google Scholar 

  • Anthony, A. (2014) Anjem Choudary: The British extremist who backs the caliphate. The Guardian, 7 September, http://www.theguardian.com/world/2014/sep/07/anjem-choudary-islamic-state-isis, accessed 21 December 2015.

  • Archetti, C. (2015) Terrorism, communication and new media: Explaining radicalisation in the digital age. Perspective on Terrorism, 9(1): 49–59.

    Google Scholar 

  • Baines, P.R., O’Shaughnessy, N.J., Nicholas, J., Moloney, K., Richards, B., Butler, S. and Gill, M. (2006) Muslim voices: The British Muslim response to Islamic video-polemic: An exploratory study. Cranfield University School of Management Working Paper Series 3(6): 1–28.

  • Bargh, J.A. and McKenna, K.Y.A. (2004) The internet and social life. Annual Review of Psychology, 55: 573–590.

    Article  Google Scholar 

  • B.B.C. (2014) Glasgow woman Aqsa mahmood ‘promoting terrorism’ on Twitter. British Broadcasting Corporation News, 2 September, http://www.bbc.com/news/uk-scotland-glasgow-west-29029954, accessed 21 December 2015.

  • Benson, D.C. (2014) Why the internet is not increasing terrorism. Security Studies, 23: 293–328.

    Article  Google Scholar 

  • Bergin, A., Osman, S.B., Ungerer, C. and Yasin, N.A.M. (2009) Countering Internet Radicalisation in Southeast Asia, Special Report. Barton, Australia: Australian Strategic Policy Institute.

    Google Scholar 

  • Bhui, K., Warfa, N. and Jones, E. (2014) Is violent radicalisation associated with poverty, migration, poor self-reported health and common mental disorders? PLoS ONE, 9(3): 1–10.

    Article  Google Scholar 

  • Borum, R. (2004) Psychology of terrorism. Tampa: University of South Florida.

    Google Scholar 

  • Borum, R. (2011) Radicalization into violent extremism: A review of social science theories. Journal of Strategic Security, 4(4): 7–36.

    Article  Google Scholar 

  • Borum, R. (2014) Psychological vulnerabilities and propensities for involvement in violent extremism. Behavioral Sciences and the Law, 32: 286–305.

    Article  Google Scholar 

  • Borum, R., Fein, R. and Vossekuil, B. (2012) A dimensional approach to analyzing lone offender terrorism. Aggression and Violent Behavior, 17: 389–396.

    Article  Google Scholar 

  • Bowman-Grieve, L. (2009) Exploring “Stormfront”: A virtual community of radical right. Studies in Conflict & Terrorism, 32(11): 989–1007.

    Article  Google Scholar 

  • Brachman, J.M. and Levine, A.N. (2011) You too can be Awlaki! The Fletcher Forum of World Affairs, 35(1): 25–46.

    Google Scholar 

  • Brooks, R.A. (2011) Muslim “homegrown” terrorism in the United States: How serious is the threat? International Security, 36(2): 7–47.

    Article  Google Scholar 

  • Brynielsson, J., Horndahl, A., Johansson, F., Kaati, L., Martenson, C. and Svenson, P. (2013) Harvesting and analysis of weak signals for detecting lone wolf terrorists. Security Informatics, 2(11): 1–15.

    Google Scholar 

  • Carter, J.A., Maher, S. and Neumann, P. R. (2014) #Greenbirds: measuring importance and influence in Syrian foreign fighter networks. London: The International Centre for the Study of Radicalisation and Political Violence.

    Google Scholar 

  • Carver, C.S. (1998) Resilience and thriving: Issues, models, and linkages. Journal of Social Issues, 54(2): 245–266.

    Article  Google Scholar 

  • Cohen, K. (2012) Who will be a Lone Wolf Terrorist? Mechanisms of Self-Radicalisation and the Possibility of Detecting Lone Offender Threats on the Internet. Swedish Defence Research Agency (FOI).

  • Cohen, K., Johansson, F., Kaati, L. and Mork, J.C. (2014) Detecting linguistic markers for radical violence in social media. Terrorism and Political Violence, 26(1): 246–256.

    Article  Google Scholar 

  • Cole, J., Alison, E., Cole, B. and Alison, L. (2010) Guidance for Identifying People Vulnerable to Recruitment into Violent Extremism. Liverpool: University of Liverpool, School of Psychology.

    Google Scholar 

  • Community Oriented Policing Services [COPS]. (2014) Online Radicalisation to Violent Extremism: Awareness Brief. Washington, DC: Office of Community Oriented Policing Services.

    Google Scholar 

  • Conway, M. (2012) From al-Zarqawi to al-Awlaki: The emergence and development of an online radical milieu. Combating Terrorism Exchange, 2(4): 12–22.

    Google Scholar 

  • Conway, M. and McInerney, L. (2008) Jihadi video & auto-radicalisation: Evidence from an exploratory YouTube study. Intelligence and Security Informatics, 5376: 108–118.

    Google Scholar 

  • Cottee, S. (2016) What ISIS women want. Foreign Policy, 17 May, http://foreignpolicy.com/2016/05/17/what-isis-women-want-gendered-jihad, accessed 21 July 2016.

  • Cragin, R.K. (2014) Resisting violent extremism: A conceptual model for non-radicalisation. Terrorism and Political Violence, 26(2): 337–353.

    Article  Google Scholar 

  • Crenshaw, M. (2007) The debate over ‘new’ vs ‘old’ terrorism. Paper presented at the Annual Meeting of the American Political Science Association, Chicago, http://www.start.umd.edu/sites/default/files/files/publications/New_vs_Old_Terrorism.pdf., accessed 21 December 2013.

  • Crone, M. (2016) Radicalization revisited: Violence, politics and the skills of the body. International Affairs, 92(3): 587–604.

    Article  Google Scholar 

  • Dalgaard-Nielsen, A. (2013) Promoting exit from violent extremism: Themes and approaches. Studies in conflict & Terrorism, 23(2): 99–115.

    Article  Google Scholar 

  • Dauber, C.E. and Winkler, C.K. (Eds.). (2014) Radical visual propaganda in the online environment: An introduction. In Visual Propaganda and Extremism in the Online Environment (pp. 1–30). Carlisle, PA: Strategic Studies Institute and U.S. Army War College Press.

    Google Scholar 

  • de Bie, J.L., de Poot, C.J. and van der Leun, J.P. (2015) Shifting modus operandi of Jihadist foreign fighters from the Netherlands between 2000 and 2013: A crime script analysis. Terrorism and Political Violence Advance online publication,. doi:10.1080/09546553.2015.1021038.

    Google Scholar 

  • Dean, G. (2014) Neurocognitive risk assessment for the early detection of violent extremists. New York, NY: Springer.

    Book  Google Scholar 

  • Edwards, C. and Gribbon, L. (2013) Pathways to violent extremism in the digital era. The RUSI Journal, 158(5): 40–47.

    Article  Google Scholar 

  • Eidelson, R.J. and Eidelson, J.I. (2003) Dangerous ideas: Five beliefs that propel groups toward conflict. American Psychologist, 58(3): 182–192.

    Article  Google Scholar 

  • Gill, P. (2015) Lone-actor terrorists: A behavioural analysis. New York, NY: Routledge.

    Google Scholar 

  • Gill, P., Horgan, J. and Deckert, P. (2014) Bombing alone: Tracing the motivations and antecedent behaviors of lone-actor terrorists. Journal of Forensic Sciences, 59(2): 425–435.

    Article  Google Scholar 

  • Hider, J. (2010) Double life of ‘gifted and polite’ terror suspect Umar Farouk Abdulmutallab. The Times, 1 January, http://www.timesonline.co.uk/tol/news/world/middle_east/article6973007.ece, accessed 21 December 2014.

  • Horgan, J. (2008) From profiles to pathways and roots to routes: Perspectives from psychology on radicalization into terrorism. The Annals of the American Academy of Political and Social Science, 618: 80–94.

    Article  Google Scholar 

  • Hussain, G. and Saltman, E.M. (2014) Jihad Trending: A Comprehensive Analysis of Online Extremism and How to Counter It. London: Quilliam Foundation.

    Google Scholar 

  • Johansson, F., Kaati, L. and Sahlgren, M. (2016) Detecting linguistic markers of violent extremism in online environments. In M. Khader, L.S. Neo, G. Ong, E. Tan, and J. Chin (Eds.), Countering Violent Extremism and Radicalisation in the Digital Era (pp. 374–390). Hershey, PA: IGI Global.

    Chapter  Google Scholar 

  • Jore, S. and Nja, O. (2010) Risk of terrorism: A scientifically valid phenomenon or a wild guess? The impact of different approaches to risk assessment. Critical Approaches to Discourse Analysis Across Disciplines, 4: 197–216.

    Google Scholar 

  • Kebbell, M.R. and Porter, L. (2011) An intelligence assessment framework for identifying individuals at risk of committing acts of violent extremism against the West. Security Journal, 25(3): 212–228.

    Article  Google Scholar 

  • Khader, M. (2016) What we know and what else we need to do to address the problem of violent extremism online: Concluding chapter. In M. Khader, L.S. Neo, G. Ong, E. Tan, and J. Chin (Eds.), Countering Violent Extremism and Radicalisation in the Digital Era (pp. 486–495). Hershey, PA: IGI Global.

    Chapter  Google Scholar 

  • Kossowska, M., Trejtowicz, M., de Lemus, S., Bukowski, M., Van Hiel, A. and Goodwin, R. (2011) Relationships between right-wing authoritarianism, terrorism threat, and attitudes towards restrictions of civil rights: A comparison among four European countries. British Journal of Psychology, 102(2): 245–259.

    Google Scholar 

  • Kruglanski, A.W. (2014) Psychology not theology: Overcoming ISIS’ secret appeal. E-International Relations, 28 October, http://www.e-ir.info/2014/10/28/psychology-not-theology-overcoming-isis-secret-appeal/, accessed 21 December 2014.

  • Lemieux, A.F., Brachman, J.M., Levitt, J. and Wood, J. (2014) Inspire magazine: A critical analysis of its significance and potential impact through the lens of the information, motivation, and behavioral skills model. Terrorism and Political Violence, 26(2): 354–371.

    Article  Google Scholar 

  • Lennings, C.J., Amon, K.L., Brummert, H. and Lennings, N. (2010) Grooming for terror: The Internet and young people. Psychiatry, Psychology and Law, 17(3): 424–437.

    Article  Google Scholar 

  • Leonard, G. (2009) Sex torment drove him nuts. The New York Post, 31 December, http://nypost.com/2009/12/30/sex-torment-drove-him-nuts/, accessed 21 December 2014.

  • Lucas, K. and Aly, A. (2015) Counter narratives to interrupt online radicalisation. A report on the CNOIR project presented to the Department of Attorney General. Australia: Countering online Violent Extremism Research Program, Curtin University.

  • McFarlane, B. (2010) Online Violent Radicalisation (OVeR): Challenges Facing Law Enforcement Agencies and Policy Stakeholders, Peer Reviewed Conference Paper. Monash, Australia: Global Terrorism Research Centre, Monash University.

    Google Scholar 

  • Meloy, J.R., Hoffmann, J., Guldimann, A. and James, D. (2012) The role of warning behaviors in threat assessment: An exploration and suggested typology. Behavioral Sciences & the Law, 30: 256–279.

    Article  Google Scholar 

  • Menn, J. and Volz, D. (2016) Exclusive: Google, Facebook quietly move toward automatic blocking of extremist videos. Reuters, 25 June, http://mobile.reuters.com/article/idUSKCN0ZB00M, accessed 26 June 2016.

  • Mihailidis, P. and Thevenin, B. (2013) Media literacy as core competency for engaged citizenship in participatory democracy. American Behavioral Scientist, 57(11): 1611–1622.

    Article  Google Scholar 

  • Moghaddam, A. (2005) The staircase to terrorism: A psychological exploration. American Psychologist, 60: 161–169.

    Article  Google Scholar 

  • Monahan, J. (2012) The individual risk assessment of terrorism. Psychology, Public Policy, and Law, 18(2): 167–205.

    Article  Google Scholar 

  • Neo, L.S. (2016) An Internet-mediated pathway for online radicalisation: RECRO. In M. Khader, L.S. Neo, G. Ong, E. Tan, and J. Chin (Eds.), Countering Violent Extremism and Radicalisation in the Digital Era (pp. 197–224). Hershey, PA: IGI Global.

    Chapter  Google Scholar 

  • Neo, L.S., Dillon, L., Shi, P., Tan, J., Wang, Y. and Gomes, D. (2016a) Understanding the psychology of persuasive violent extremist online platforms. In M. Khader, L.S. Neo, G. Ong, E. Tan, and J. Chin (Eds.), Countering Violent Extremism and Radicalisation in the Digital Era (pp. 1–15). Hershey, PA: IGI Global.

    Google Scholar 

  • Neo, L.S., Khader, M., Ang, J., Ong, G. and Tan, E. (2014) Developing an early screening guide for jihadi terrorism: A behavioural analysis of 30 terror attacks. Security Journal Advance online publication, 24 November, doi: 10.1057/sj.2014.44.

  • Neo, L.S., Shi, P., Dillon, L., Tan, J., Wang, Y. and Gomes, D. (2016b) Why is ISIS so psychologically attractive. In M. Khader, L.S. Neo, G. Ong, E. Tan, and J. Chin (Eds.), Countering Violent Extremism and Radicalisation in the Digital Era (pp. 149–167). Hershey, PA: IGI Global.

    Chapter  Google Scholar 

  • Nesser, P. (2012) Single actor terrorism: Scope, characteristics and explanations. Perspectives on Terrorism, 6: 61–73.

    Google Scholar 

  • Pauwels, L. and Schils, N. (2016) Differential online exposure to extremist content and political violence: Testing the relative strength of social learning and competing perspectives. Terrorism and Political Violence, 28(1): 1–29.

    Article  Google Scholar 

  • Post, J.M., Ruby, K.G. and Shaw, E.C. (2002) The radical group in context: 1. An integrated framework for the analysis of group risk for terrorism. Studies in Conflict & Terrorism, 25(2): 73–100.

    Article  Google Scholar 

  • Pressman, D.E. and Flockton, J.S. (2012) Calibrating risk for violent political extremists: The VERA-2 structural assessment. The British Journal of Forensic Practise, 14(4): 237–251.

    Article  Google Scholar 

  • Pressman, D.E. and Ivan, C. (2016) Internet use and violent extremism: A cyber-VERA risk assessment protocol. In M. Khader, L.S. Neo, G. Ong, E. Tan, and J. Chin (Eds.), Countering Violent Extremism and Radicalisation in the Digital Era (pp. 391–409). Hershey, PA: IGI Global.

    Chapter  Google Scholar 

  • Reinares, F. (2012) Exit from terrorism: A qualitative empirical study on disengagement and deradicalisation among members of ETA. Terrorism and Political Violence, 23(5): 780–803.

    Article  Google Scholar 

  • Richardson, M. (2006) Maritime-Related Terrorism: Al-Qaeda, Hezbollah, What Next from the International Jihadist Network? Trends in Southeast Asia Series (9/2006). Singapore: Institute of Southeast Asian Studies.

    Google Scholar 

  • Rieger, D., Frischich, L. and Bente, G. (2013) Propaganda 2.0 psychological effects of right-wing and Islamic extremist Internet videos. Germany: German Federal Criminal Police Office.

  • Sageman, M. (2008) Leaderless Jihad: Terror Networks in the Twenty-First Century. Philadelphia, PA: University of Pennsylvania Press.

    Book  Google Scholar 

  • Saifudeen, O.A. (2014) The Cyber Extremism Orbital Pathways Model. Singapore: S. Rajaratnam School of International Studies, Nanyang Technological University.

    Google Scholar 

  • Saifudeen, O.A. (2016) Getting out of the armchair: Potential tipping points for online radicalisation. In M. Khader, L.S. Neo, G. Ong, E. Tan, and J. Chin (Eds.), Countering Violent Extremism and Radicalisation in the Digital Era (pp. 129–148). Hershey, PA: IGI Global.

    Chapter  Google Scholar 

  • Saltman, E.M. (2016) Western female migrants to ISIS: Propaganda, radicalisation, and recruitment. In M. Khader, L.S. Neo, G. Ong, E. Tan, and J. Chin (Eds.), Countering Violent Extremism and Radicalisation in the Digital Era (pp. 174–196). Hershey, PA: IGI Global.

    Chapter  Google Scholar 

  • Saltman, E.M. and Winter, C. (2014) Islamic State: The Changing Face of Modern Jihadism. London: Quilliam Foundation.

    Google Scholar 

  • Schwartz, S.J., Dunkel, C.S. and Waterman, A.S. (2009) Terrorism: An identity theory perspective. Studies in Conflict & Terrorism, 32: 537–559.

    Article  Google Scholar 

  • Shortland, N.D. (2016) “On the internet, nobody knows you’re a dog”: The online risk assessment of violent extremists. In M. Khader, L.S. Neo, G. Ong, E. Tan, and J. Chin (Eds.), Countering Violent Extremism and Radicalisation in the Digital Era (pp. 349–373). Hershey, PA: IGI Global.

    Chapter  Google Scholar 

  • Silber, M.D. and Bhatt, A. (2007) Radicalization in the West: The Home Grown Threat. New York, NY: New York Police Department.

    Google Scholar 

  • Silke, A. (Ed.). (2014) Prisons, Terrorism and Extremism: Critical Issues in Management, Radicalization and Reform. Oxon, UK: Routledge.

    Google Scholar 

  • Tan, E. (2006) Road to radicalisation: A psychological analysis of the Jemaah Islamiyah group and its members, Research report No. 01/2006. Singapore: Ministry of Home Affairs, Home Team Behavioural Sciences Centre.

  • Torok, R. (2013) Developing an explanatory model for the process of online radicalisation and terrorism. Security Informatics, 2: 1–10.

    Article  Google Scholar 

  • Torok, R. (2016) Social media and the use of discursive markers of online extremism and recruitment. In M. Khader, L.S. Neo, G. Ong, E. Tan, and J. Chin (Eds.), Countering Violent Extremism and Radicalisation in the Digital Era (pp. 39–369). Hershey, PA: IGI Global.

    Chapter  Google Scholar 

  • Torres-Soriano, M.R. (2012) Between the pen and the sword: The Global Islamic Media Front in the West. Terrorism and Political Violence, 24: 769–786.

    Article  Google Scholar 

  • United States of America v. Emerson Winfield Begolly. (2013) Sentencing Memorandum of Case 2:11-cr-00172-MBC Document 67 Filed 07/09/13 filed in the United States District Court for the Western District of Pennsylvania, http://www.investigativeproject.org/documents/case_docs/2200.pdf, accessed 21 December 2014.

  • von Behr, I., Reding, A., Edwards, C. and Gribbon, L. (2013) Radicalisation in the Digital Age: The Use of the Internet in 15 Cases of Terrorism and Extremism. Santa Monica, CA: RAND Corporation.

    Google Scholar 

  • Walton, G.M., Cohen, G.L., Cwir, D. and Spencer, S.J. (2012) Mere belonging: The power of social connections. Journal of Personality and Social Psychology, 102(3): 513–532.

    Article  Google Scholar 

  • Weimann, G. (2006) Terror on the Internet: The New Arena, the New Challenges. Washington, DC: United States Institute of Peace.

    Google Scholar 

  • Weimann, G. (2010) Terror on Facebook, Twitter, and YouTube. Brown Journal of World Affairs, 16(2): 45–54.

    Google Scholar 

  • Weimann, G. (2012) Lone wolves in cyberspace. Journal of Terrorism Research, 3(2): 75–90.

    Article  Google Scholar 

  • Williams, M.J., Horgan, J.G. and Evans, W.P. (2016) The critical role of friends in networks for countering violent extremism: Toward a theory of vicarious help-seeking. Behavioral Sciences of Terrorism and Political Aggression, 8(1): 45–65.

    Article  Google Scholar 

  • Zelin, A.Y., Kohlmann, E.F. and al-Khouri, L. (2013) Convoy of Martyrs in the Levant. New York, US: Flashpoint Partners.

    Google Scholar 

Download references

Acknowledgments

The views expressed in this article are the authors’ only and do not represent the official position or view of the Ministry of Home Affairs, Singapore. The authors would like to thank Dr Damien Cheong of Nanyang Technological University for his comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Loo Seng Neo.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Neo, L.S., Dillon, L. & Khader, M. Identifying individuals at risk of being radicalised via the internet. Secur J 30, 1112–1133 (2017). https://doi.org/10.1057/s41284-016-0080-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/s41284-016-0080-z

Keywords

Navigation