Subtopic Deep Dive

Radicalization Processes
Research Guide

What is Radicalization Processes?

Radicalization processes refer to psychological, social, and ideological pathways that lead individuals, groups, or publics toward violent extremism and terrorism.

McCauley and Moskalenko (2008) identify twelve mechanisms of radicalization across individuals, groups, and mass publics, with 1110 citations. Borum (2011a, 770 citations) reviews social science theories, noting poor definition of radicalization beyond ideology. Borum (2011b, 368 citations) critiques conceptual models lacking empirical grounding.

15
Curated Papers
3
Key Challenges

Why It Matters

McCauley and Moskalenko (2008) enable prevention by mapping pathways like group polarization before violence. Borum (2011a) informs counterterrorism by distinguishing radical beliefs from terrorism risk. Doosje et al. (2016, 434 citations) guide deradicalization interventions. Hoffman et al. (2020, 353 citations) assess emerging incel threats for policy targeting.

Key Research Challenges

Conceptual Ambiguity

Borum (2011a) highlights undefined radicalization terms, risking conflation of beliefs with violence. Models often imply ideology as necessary precursor without evidence. This impedes consistent measurement across studies.

Empirical Validation Gap

Borum (2011b) notes frameworks rely on rational models unguided by theory or data. Few studies test pathways empirically. Thompson (2011, 171 citations) calls for evidence on social media's causal role.

De-radicalization Metrics

Doosje et al. (2016) review limited success indicators for interventions. Ashour (2009, 159 citations) examines jihadist cases but lacks scalable metrics. Coppock and McGovern (2014, 164 citations) critique vulnerability assumptions in youth programs.

Essential Papers

1.

Mechanisms of Political Radicalization: Pathways Toward Terrorism

Clark McCauley, Sophia Moskalenko · 2008 · Terrorism and Political Violence · 1.1K citations

This article conceptualizes political radicalization as a dimension of increasing extremity of beliefs, feelings, and behaviors in support of intergroup conflict and violence. Across individuals, g...

2.

Radicalization into Violent Extremism I: A Review of Social Science Theories

Randy Borum · 2011 · Journal of Strategic Security · 770 citations

In discourse about countering terrorism, the term "radicalization" is widely used, but remains poorly defined. To focus narrowly on ideological radicalization risks implying that radical beliefs ar...

3.

Terrorism, radicalization and de-radicalization

Bertjan Doosje, Fathali M. Moghaddam, Arie W. Kruglanski et al. · 2016 · Current Opinion in Psychology · 434 citations

4.

Radicalization into Violent Extremism II: A Review of Conceptual Models and Empirical Research

Randy Borum · 2011 · Journal of Strategic Security · 368 citations

Over the past decade, analysts have proposed several frameworks to explain the process of radicalization into violent extremism (RVE). These frameworks are based primarily on rational, conceptual m...

5.

Assessing the Threat of Incel Violence

Bruce Hoffman, Jacob Ware, E. I. Shapiro · 2020 · Studies in Conflict and Terrorism · 353 citations

In recent years, increasingly serious incidents of violence have been committed by young men predominantly in the United States and Canada who self-identify as incels (involuntary celibates). Altho...

6.

A Conceptual Framework for Addressing Psychological Process in the Development of the Terrorist

Max Taylor, John Horgan · 2006 · Terrorism and Political Violence · 281 citations

Abstract A conceptual framework is presented for addressing psychological issues in the development of the terrorist. In particular, the authors suggest that viewing terrorism as a process may lead...

7.

Terrorist Use of the Internet by the Numbers

Paul Gill, Emily Corner, Maura Conway et al. · 2017 · Criminology & Public Policy · 179 citations

Research Summary Public interest and policy debates surrounding the role of the Internet in terrorist activities is increasing. Criminology has said very little on the matter. By using a unique dat...

Reading Guide

Foundational Papers

Start with McCauley and Moskalenko (2008) for 12 mechanisms framework, then Borum (2011a/b) for theory and model critiques establishing core debates.

Recent Advances

Hoffman et al. (2020) on incel threats, Gill et al. (2017, 179 citations) on internet use, Doosje et al. (2016) on de-radicalization.

Core Methods

Mechanism identification (McCauley and Moskalenko, 2008), theory reviews (Borum, 2011a), conceptual frameworks (Taylor and Horgan, 2006), empirical case studies (Ashour, 2009).

How PapersFlow Helps You Research Radicalization Processes

Discover & Search

Research Agent uses searchPapers and citationGraph on McCauley and Moskalenko (2008) to map 12 mechanisms and downstream citations like Borum (2011a). exaSearch uncovers 250M+ OpenAlex papers on social media radicalization beyond Thompson (2011). findSimilarPapers expands from Doosje et al. (2016) to deradicalization interventions.

Analyze & Verify

Analysis Agent applies readPaperContent to extract mechanisms from McCauley and Moskalenko (2008), then verifyResponse with CoVe chain-of-verification flags ideological proxy claims in Borum (2011a). runPythonAnalysis computes citation networks via pandas on exportCsv data. GRADE grading scores empirical strength of Borum (2011b) models.

Synthesize & Write

Synthesis Agent detects gaps in de-radicalization metrics from Ashour (2009) and Doosje et al. (2016), flagging contradictions via exportMermaid diagrams of pathways. Writing Agent uses latexEditText, latexSyncCitations for McCauley mechanisms, and latexCompile for review manuscripts.

Use Cases

"Analyze citation patterns in radicalization mechanisms papers using Python."

Research Agent → searchPapers('McCauley Moskalenko 2008') → Analysis Agent → runPythonAnalysis(pandas network graph on citationCsv) → matplotlib plot of 1110-citation influence.

"Draft LaTeX review of Borum's radicalization models."

Research Agent → findSimilarPapers('Borum 2011') → Synthesis Agent → gap detection → Writing Agent → latexEditText(structure sections) → latexSyncCitations(Borum 2011a/b) → latexCompile(PDF output).

"Find code for social media radicalization network analysis."

Research Agent → citationGraph(Thompson 2011) → Code Discovery → paperExtractUrls → paperFindGithubRepo → githubRepoInspect(NetworkX scripts for propagation models).

Automated Workflows

Deep Research workflow conducts systematic review: searchPapers(50+ radicalization papers) → citationGraph → DeepScan(7-step verify with CoVe/GRADE) → structured report on mechanisms. Theorizer generates theory from Borum (2011a/b) reviews, chaining synthesis to exportMermaid pathway diagrams. DeepScan applies checkpoints to Hoffman et al. (2020) incel data for threat validation.

Frequently Asked Questions

What defines radicalization processes?

Radicalization is increasing extremity of beliefs, feelings, and behaviors supporting intergroup violence (McCauley and Moskalenko, 2008).

What are key methods in radicalization research?

Reviews of theories (Borum, 2011a), conceptual models (Borum, 2011b; Taylor and Horgan, 2006), and mechanisms across levels (McCauley and Moskalenko, 2008).

What are foundational papers?

McCauley and Moskalenko (2008, 1110 citations), Borum (2011a, 770 citations), Taylor and Horgan (2006, 281 citations).

What open problems exist?

Empirical testing of models (Borum, 2011b), causal role of social media (Thompson, 2011), and deradicalization metrics (Doosje et al., 2016; Ashour, 2009).

Research Terrorism, Counterterrorism, and Political Violence with AI

PapersFlow provides specialized AI tools for your field researchers. Here are the most relevant for this topic:

Start Researching Radicalization Processes with AI

Search 474M+ papers, run AI-powered literature reviews, and write with integrated citations — all in one workspace.