In an effort to better understand the risk of individuals being radicalised via the internet, this paper re-examines the phenomenon of online radicalisation by focusing on four considerations of interest: individual, online environment, interactions between individual and the online environment, and protective elements. A key premise of the discussion presented is that the different theoretical assumptions and linkages underlying each consideration are not only reconcilable but that together they provide a more comprehensive understanding of assessing risk of radicalisation via the internet than any perspective by itself. Implications for operationalising these four considerations and their associated factors to identify individuals at risk of being radicalised via the internet will also be discussed.
This is a preview of subscription content, access via your institution.
Buy single article
Instant access to the full article PDF.
Price includes VAT (USA)
Tax calculation will be finalised during checkout.
Abdullah, Z. (2016) New tool to counter risks at borders, online. The Straits Times, 14 July, http://www.straitstimes.com/singapore/new-tools-to-counter-risks-at-borders-online, accessed 15 July 2016.
Aly, A., Weimann-Saks, D. and Weimann, G. (2014) Making ‘noise’ online: An analysis of the say no to terror online campaign. Perspective on Terrorism, 8(5): 33–47.
Anthony, A. (2014) Anjem Choudary: The British extremist who backs the caliphate. The Guardian, 7 September, http://www.theguardian.com/world/2014/sep/07/anjem-choudary-islamic-state-isis, accessed 21 December 2015.
Archetti, C. (2015) Terrorism, communication and new media: Explaining radicalisation in the digital age. Perspective on Terrorism, 9(1): 49–59.
Baines, P.R., O’Shaughnessy, N.J., Nicholas, J., Moloney, K., Richards, B., Butler, S. and Gill, M. (2006) Muslim voices: The British Muslim response to Islamic video-polemic: An exploratory study. Cranfield University School of Management Working Paper Series 3(6): 1–28.
Bargh, J.A. and McKenna, K.Y.A. (2004) The internet and social life. Annual Review of Psychology, 55: 573–590.
B.B.C. (2014) Glasgow woman Aqsa mahmood ‘promoting terrorism’ on Twitter. British Broadcasting Corporation News, 2 September, http://www.bbc.com/news/uk-scotland-glasgow-west-29029954, accessed 21 December 2015.
Benson, D.C. (2014) Why the internet is not increasing terrorism. Security Studies, 23: 293–328.
Bergin, A., Osman, S.B., Ungerer, C. and Yasin, N.A.M. (2009) Countering Internet Radicalisation in Southeast Asia, Special Report. Barton, Australia: Australian Strategic Policy Institute.
Bhui, K., Warfa, N. and Jones, E. (2014) Is violent radicalisation associated with poverty, migration, poor self-reported health and common mental disorders? PLoS ONE, 9(3): 1–10.
Borum, R. (2004) Psychology of terrorism. Tampa: University of South Florida.
Borum, R. (2011) Radicalization into violent extremism: A review of social science theories. Journal of Strategic Security, 4(4): 7–36.
Borum, R. (2014) Psychological vulnerabilities and propensities for involvement in violent extremism. Behavioral Sciences and the Law, 32: 286–305.
Borum, R., Fein, R. and Vossekuil, B. (2012) A dimensional approach to analyzing lone offender terrorism. Aggression and Violent Behavior, 17: 389–396.
Bowman-Grieve, L. (2009) Exploring “Stormfront”: A virtual community of radical right. Studies in Conflict & Terrorism, 32(11): 989–1007.
Brachman, J.M. and Levine, A.N. (2011) You too can be Awlaki! The Fletcher Forum of World Affairs, 35(1): 25–46.
Brooks, R.A. (2011) Muslim “homegrown” terrorism in the United States: How serious is the threat? International Security, 36(2): 7–47.
Brynielsson, J., Horndahl, A., Johansson, F., Kaati, L., Martenson, C. and Svenson, P. (2013) Harvesting and analysis of weak signals for detecting lone wolf terrorists. Security Informatics, 2(11): 1–15.
Carter, J.A., Maher, S. and Neumann, P. R. (2014) #Greenbirds: measuring importance and influence in Syrian foreign fighter networks. London: The International Centre for the Study of Radicalisation and Political Violence.
Carver, C.S. (1998) Resilience and thriving: Issues, models, and linkages. Journal of Social Issues, 54(2): 245–266.
Cohen, K. (2012) Who will be a Lone Wolf Terrorist? Mechanisms of Self-Radicalisation and the Possibility of Detecting Lone Offender Threats on the Internet. Swedish Defence Research Agency (FOI).
Cohen, K., Johansson, F., Kaati, L. and Mork, J.C. (2014) Detecting linguistic markers for radical violence in social media. Terrorism and Political Violence, 26(1): 246–256.
Cole, J., Alison, E., Cole, B. and Alison, L. (2010) Guidance for Identifying People Vulnerable to Recruitment into Violent Extremism. Liverpool: University of Liverpool, School of Psychology.
Community Oriented Policing Services [COPS]. (2014) Online Radicalisation to Violent Extremism: Awareness Brief. Washington, DC: Office of Community Oriented Policing Services.
Conway, M. (2012) From al-Zarqawi to al-Awlaki: The emergence and development of an online radical milieu. Combating Terrorism Exchange, 2(4): 12–22.
Conway, M. and McInerney, L. (2008) Jihadi video & auto-radicalisation: Evidence from an exploratory YouTube study. Intelligence and Security Informatics, 5376: 108–118.
Cottee, S. (2016) What ISIS women want. Foreign Policy, 17 May, http://foreignpolicy.com/2016/05/17/what-isis-women-want-gendered-jihad, accessed 21 July 2016.
Cragin, R.K. (2014) Resisting violent extremism: A conceptual model for non-radicalisation. Terrorism and Political Violence, 26(2): 337–353.
Crenshaw, M. (2007) The debate over ‘new’ vs ‘old’ terrorism. Paper presented at the Annual Meeting of the American Political Science Association, Chicago, http://www.start.umd.edu/sites/default/files/files/publications/New_vs_Old_Terrorism.pdf., accessed 21 December 2013.
Crone, M. (2016) Radicalization revisited: Violence, politics and the skills of the body. International Affairs, 92(3): 587–604.
Dalgaard-Nielsen, A. (2013) Promoting exit from violent extremism: Themes and approaches. Studies in conflict & Terrorism, 23(2): 99–115.
Dauber, C.E. and Winkler, C.K. (Eds.). (2014) Radical visual propaganda in the online environment: An introduction. In Visual Propaganda and Extremism in the Online Environment (pp. 1–30). Carlisle, PA: Strategic Studies Institute and U.S. Army War College Press.
de Bie, J.L., de Poot, C.J. and van der Leun, J.P. (2015) Shifting modus operandi of Jihadist foreign fighters from the Netherlands between 2000 and 2013: A crime script analysis. Terrorism and Political Violence Advance online publication,. doi:10.1080/09546553.2015.1021038.
Dean, G. (2014) Neurocognitive risk assessment for the early detection of violent extremists. New York, NY: Springer.
Edwards, C. and Gribbon, L. (2013) Pathways to violent extremism in the digital era. The RUSI Journal, 158(5): 40–47.
Eidelson, R.J. and Eidelson, J.I. (2003) Dangerous ideas: Five beliefs that propel groups toward conflict. American Psychologist, 58(3): 182–192.
Gill, P. (2015) Lone-actor terrorists: A behavioural analysis. New York, NY: Routledge.
Gill, P., Horgan, J. and Deckert, P. (2014) Bombing alone: Tracing the motivations and antecedent behaviors of lone-actor terrorists. Journal of Forensic Sciences, 59(2): 425–435.
Hider, J. (2010) Double life of ‘gifted and polite’ terror suspect Umar Farouk Abdulmutallab. The Times, 1 January, http://www.timesonline.co.uk/tol/news/world/middle_east/article6973007.ece, accessed 21 December 2014.
Horgan, J. (2008) From profiles to pathways and roots to routes: Perspectives from psychology on radicalization into terrorism. The Annals of the American Academy of Political and Social Science, 618: 80–94.
Hussain, G. and Saltman, E.M. (2014) Jihad Trending: A Comprehensive Analysis of Online Extremism and How to Counter It. London: Quilliam Foundation.
Johansson, F., Kaati, L. and Sahlgren, M. (2016) Detecting linguistic markers of violent extremism in online environments. In M. Khader, L.S. Neo, G. Ong, E. Tan, and J. Chin (Eds.), Countering Violent Extremism and Radicalisation in the Digital Era (pp. 374–390). Hershey, PA: IGI Global.
Jore, S. and Nja, O. (2010) Risk of terrorism: A scientifically valid phenomenon or a wild guess? The impact of different approaches to risk assessment. Critical Approaches to Discourse Analysis Across Disciplines, 4: 197–216.
Kebbell, M.R. and Porter, L. (2011) An intelligence assessment framework for identifying individuals at risk of committing acts of violent extremism against the West. Security Journal, 25(3): 212–228.
Khader, M. (2016) What we know and what else we need to do to address the problem of violent extremism online: Concluding chapter. In M. Khader, L.S. Neo, G. Ong, E. Tan, and J. Chin (Eds.), Countering Violent Extremism and Radicalisation in the Digital Era (pp. 486–495). Hershey, PA: IGI Global.
Kossowska, M., Trejtowicz, M., de Lemus, S., Bukowski, M., Van Hiel, A. and Goodwin, R. (2011) Relationships between right-wing authoritarianism, terrorism threat, and attitudes towards restrictions of civil rights: A comparison among four European countries. British Journal of Psychology, 102(2): 245–259.
Kruglanski, A.W. (2014) Psychology not theology: Overcoming ISIS’ secret appeal. E-International Relations, 28 October, http://www.e-ir.info/2014/10/28/psychology-not-theology-overcoming-isis-secret-appeal/, accessed 21 December 2014.
Lemieux, A.F., Brachman, J.M., Levitt, J. and Wood, J. (2014) Inspire magazine: A critical analysis of its significance and potential impact through the lens of the information, motivation, and behavioral skills model. Terrorism and Political Violence, 26(2): 354–371.
Lennings, C.J., Amon, K.L., Brummert, H. and Lennings, N. (2010) Grooming for terror: The Internet and young people. Psychiatry, Psychology and Law, 17(3): 424–437.
Leonard, G. (2009) Sex torment drove him nuts. The New York Post, 31 December, http://nypost.com/2009/12/30/sex-torment-drove-him-nuts/, accessed 21 December 2014.
Lucas, K. and Aly, A. (2015) Counter narratives to interrupt online radicalisation. A report on the CNOIR project presented to the Department of Attorney General. Australia: Countering online Violent Extremism Research Program, Curtin University.
McFarlane, B. (2010) Online Violent Radicalisation (OVeR): Challenges Facing Law Enforcement Agencies and Policy Stakeholders, Peer Reviewed Conference Paper. Monash, Australia: Global Terrorism Research Centre, Monash University.
Meloy, J.R., Hoffmann, J., Guldimann, A. and James, D. (2012) The role of warning behaviors in threat assessment: An exploration and suggested typology. Behavioral Sciences & the Law, 30: 256–279.
Menn, J. and Volz, D. (2016) Exclusive: Google, Facebook quietly move toward automatic blocking of extremist videos. Reuters, 25 June, http://mobile.reuters.com/article/idUSKCN0ZB00M, accessed 26 June 2016.
Mihailidis, P. and Thevenin, B. (2013) Media literacy as core competency for engaged citizenship in participatory democracy. American Behavioral Scientist, 57(11): 1611–1622.
Moghaddam, A. (2005) The staircase to terrorism: A psychological exploration. American Psychologist, 60: 161–169.
Monahan, J. (2012) The individual risk assessment of terrorism. Psychology, Public Policy, and Law, 18(2): 167–205.
Neo, L.S. (2016) An Internet-mediated pathway for online radicalisation: RECRO. In M. Khader, L.S. Neo, G. Ong, E. Tan, and J. Chin (Eds.), Countering Violent Extremism and Radicalisation in the Digital Era (pp. 197–224). Hershey, PA: IGI Global.
Neo, L.S., Dillon, L., Shi, P., Tan, J., Wang, Y. and Gomes, D. (2016a) Understanding the psychology of persuasive violent extremist online platforms. In M. Khader, L.S. Neo, G. Ong, E. Tan, and J. Chin (Eds.), Countering Violent Extremism and Radicalisation in the Digital Era (pp. 1–15). Hershey, PA: IGI Global.
Neo, L.S., Khader, M., Ang, J., Ong, G. and Tan, E. (2014) Developing an early screening guide for jihadi terrorism: A behavioural analysis of 30 terror attacks. Security Journal Advance online publication, 24 November, doi: 10.1057/sj.2014.44.
Neo, L.S., Shi, P., Dillon, L., Tan, J., Wang, Y. and Gomes, D. (2016b) Why is ISIS so psychologically attractive. In M. Khader, L.S. Neo, G. Ong, E. Tan, and J. Chin (Eds.), Countering Violent Extremism and Radicalisation in the Digital Era (pp. 149–167). Hershey, PA: IGI Global.
Nesser, P. (2012) Single actor terrorism: Scope, characteristics and explanations. Perspectives on Terrorism, 6: 61–73.
Pauwels, L. and Schils, N. (2016) Differential online exposure to extremist content and political violence: Testing the relative strength of social learning and competing perspectives. Terrorism and Political Violence, 28(1): 1–29.
Post, J.M., Ruby, K.G. and Shaw, E.C. (2002) The radical group in context: 1. An integrated framework for the analysis of group risk for terrorism. Studies in Conflict & Terrorism, 25(2): 73–100.
Pressman, D.E. and Flockton, J.S. (2012) Calibrating risk for violent political extremists: The VERA-2 structural assessment. The British Journal of Forensic Practise, 14(4): 237–251.
Pressman, D.E. and Ivan, C. (2016) Internet use and violent extremism: A cyber-VERA risk assessment protocol. In M. Khader, L.S. Neo, G. Ong, E. Tan, and J. Chin (Eds.), Countering Violent Extremism and Radicalisation in the Digital Era (pp. 391–409). Hershey, PA: IGI Global.
Reinares, F. (2012) Exit from terrorism: A qualitative empirical study on disengagement and deradicalisation among members of ETA. Terrorism and Political Violence, 23(5): 780–803.
Richardson, M. (2006) Maritime-Related Terrorism: Al-Qaeda, Hezbollah, What Next from the International Jihadist Network? Trends in Southeast Asia Series (9/2006). Singapore: Institute of Southeast Asian Studies.
Rieger, D., Frischich, L. and Bente, G. (2013) Propaganda 2.0 psychological effects of right-wing and Islamic extremist Internet videos. Germany: German Federal Criminal Police Office.
Sageman, M. (2008) Leaderless Jihad: Terror Networks in the Twenty-First Century. Philadelphia, PA: University of Pennsylvania Press.
Saifudeen, O.A. (2014) The Cyber Extremism Orbital Pathways Model. Singapore: S. Rajaratnam School of International Studies, Nanyang Technological University.
Saifudeen, O.A. (2016) Getting out of the armchair: Potential tipping points for online radicalisation. In M. Khader, L.S. Neo, G. Ong, E. Tan, and J. Chin (Eds.), Countering Violent Extremism and Radicalisation in the Digital Era (pp. 129–148). Hershey, PA: IGI Global.
Saltman, E.M. (2016) Western female migrants to ISIS: Propaganda, radicalisation, and recruitment. In M. Khader, L.S. Neo, G. Ong, E. Tan, and J. Chin (Eds.), Countering Violent Extremism and Radicalisation in the Digital Era (pp. 174–196). Hershey, PA: IGI Global.
Saltman, E.M. and Winter, C. (2014) Islamic State: The Changing Face of Modern Jihadism. London: Quilliam Foundation.
Schwartz, S.J., Dunkel, C.S. and Waterman, A.S. (2009) Terrorism: An identity theory perspective. Studies in Conflict & Terrorism, 32: 537–559.
Shortland, N.D. (2016) “On the internet, nobody knows you’re a dog”: The online risk assessment of violent extremists. In M. Khader, L.S. Neo, G. Ong, E. Tan, and J. Chin (Eds.), Countering Violent Extremism and Radicalisation in the Digital Era (pp. 349–373). Hershey, PA: IGI Global.
Silber, M.D. and Bhatt, A. (2007) Radicalization in the West: The Home Grown Threat. New York, NY: New York Police Department.
Silke, A. (Ed.). (2014) Prisons, Terrorism and Extremism: Critical Issues in Management, Radicalization and Reform. Oxon, UK: Routledge.
Tan, E. (2006) Road to radicalisation: A psychological analysis of the Jemaah Islamiyah group and its members, Research report No. 01/2006. Singapore: Ministry of Home Affairs, Home Team Behavioural Sciences Centre.
Torok, R. (2013) Developing an explanatory model for the process of online radicalisation and terrorism. Security Informatics, 2: 1–10.
Torok, R. (2016) Social media and the use of discursive markers of online extremism and recruitment. In M. Khader, L.S. Neo, G. Ong, E. Tan, and J. Chin (Eds.), Countering Violent Extremism and Radicalisation in the Digital Era (pp. 39–369). Hershey, PA: IGI Global.
Torres-Soriano, M.R. (2012) Between the pen and the sword: The Global Islamic Media Front in the West. Terrorism and Political Violence, 24: 769–786.
United States of America v. Emerson Winfield Begolly. (2013) Sentencing Memorandum of Case 2:11-cr-00172-MBC Document 67 Filed 07/09/13 filed in the United States District Court for the Western District of Pennsylvania, http://www.investigativeproject.org/documents/case_docs/2200.pdf, accessed 21 December 2014.
von Behr, I., Reding, A., Edwards, C. and Gribbon, L. (2013) Radicalisation in the Digital Age: The Use of the Internet in 15 Cases of Terrorism and Extremism. Santa Monica, CA: RAND Corporation.
Walton, G.M., Cohen, G.L., Cwir, D. and Spencer, S.J. (2012) Mere belonging: The power of social connections. Journal of Personality and Social Psychology, 102(3): 513–532.
Weimann, G. (2006) Terror on the Internet: The New Arena, the New Challenges. Washington, DC: United States Institute of Peace.
Weimann, G. (2010) Terror on Facebook, Twitter, and YouTube. Brown Journal of World Affairs, 16(2): 45–54.
Weimann, G. (2012) Lone wolves in cyberspace. Journal of Terrorism Research, 3(2): 75–90.
Williams, M.J., Horgan, J.G. and Evans, W.P. (2016) The critical role of friends in networks for countering violent extremism: Toward a theory of vicarious help-seeking. Behavioral Sciences of Terrorism and Political Aggression, 8(1): 45–65.
Zelin, A.Y., Kohlmann, E.F. and al-Khouri, L. (2013) Convoy of Martyrs in the Levant. New York, US: Flashpoint Partners.
The views expressed in this article are the authors’ only and do not represent the official position or view of the Ministry of Home Affairs, Singapore. The authors would like to thank Dr Damien Cheong of Nanyang Technological University for his comments.
About this article
Cite this article
Neo, L.S., Dillon, L. & Khader, M. Identifying individuals at risk of being radicalised via the internet. Secur J 30, 1112–1133 (2017). https://doi.org/10.1057/s41284-016-0080-z
- online radicalisation
- online environment
- protective elements