Skip to main content
PLOS One logoLink to PLOS One
. 2024 Feb 14;19(2):e0293810. doi: 10.1371/journal.pone.0293810

Distinct patterns of incidental exposure to and active selection of radicalizing information indicate varying levels of support for violent extremism

Sandy Schumann 1,*, Caitlin Clemmow 1, Bettina Rottweiler 1, Paul Gill 1
Editor: Daniel W Snook2
PMCID: PMC10866479  PMID: 38354207

Abstract

Exposure to radicalizing information has been associated with support for violent extremism. It is, however, unclear whether specific information use behavior, namely, a distinct pattern of incidental exposure (IE) to and active selection (AS) of radicalizing content, indicates stronger violent extremist attitudes and radical action intentions. Drawing on a representative general population sample (N = 1509) and applying latent class analysis, we addressed this gap in the literature. Results highlighted six types of information use behavior. The largest group of participants reported a near to zero probability of both IE to and AS of radicalizing material. Two groups of participants were characterized by high or moderate probabilities of incidental exposure as well as a low probability of active selection of radicalizing content. The remaining groups displayed either low, moderate, or high probabilities of both IE and AS. Importantly, we showed between-group differences regarding violent extremist attitudes and radical behavioral intentions. Individuals reporting near zero or high probabilities for both IE to and AS of radicalizing information expressed the lowest and strongest violent extremist attitudes and willingness to use violence respectively. Groups defined by even moderate probabilities of AS endorsed violent extremism more strongly than those for which the probability for incidental exposure was moderate or high but AS of radicalizing content was unlikely.

Introduction

Radicalization refers to a process during which individuals adopt extremist attitudes and, in some but not all instances, “come to perceive acts of terrorism as a possible alternative for action” [1,2]. Exposure to messages that glorify or incite the use of violence, material that derogates or dehumanizes outgroup members, as well as exposure to ideological/terrorist propaganda is considered a risk factor for radicalization [35]. So-called exposure effects have been documented with respect to radicalizing content that individuals encountered online [610] and in prisons [11,12], or following interactions with peers and family members who endorse violent extremism and rule-breaking [1316]. The present research builds on and advances those insights in two important ways.

Rather than explore the sites and actors through which radicalizing information is (made) available [1719]), we focus on the processes by which individuals encounter such messages, that is, incidental exposure (IE) and active selection (AS) [4]. More precisely, considering a representative general population sample and relying on latent class analysis, we aim to identify different types (or classes) of information use behavior that are characterized by varying probabilities of IE to and AS of radicalizing material [20]. Additionally, we seek to examine which specific information use behavior is related with, and thus, indicative of, higher levels of violent extremist attitudes and a stronger willingness to use violence to attain collective goals.

Effects of exposure to radicalizing information

Individuals are likely exposed to radicalizing information in settings where they can connect with radicalizing actors without interference (i.e., low formal or informal social control; [17]); it was shown that the latter include, for instance, prisons, schools, gyms, and coffee shops [11,12,18]. Given that hate and extremist actors have developed resilient cross-platform ecosystems online [2124], the internet also provides numerous opportunities to be exposed to radicalizing messages [2527]. Having said this, Clemmow and colleagues [28] showed that in a British sample of the general population, only 6.8% had, across their lifetime, sought violent extremist material online. A study of Belgian teenagers and young adults revealed that 96.2% had never actively pursued radicalizing material online; 49.5% had never been incidentally exposed [4,15].

Exposure to radicalizing information is considered a threat due to its expected impact on attitudes and behavior. Notably, interviews with individuals who had been radicalized highlighted that negative outgroup attitudes (here, rejection of non-Muslims or ‘Western’ politicians) as well as the willingness to use violence emerged in response to the consumption of terrorist propaganda [29]. Furthermore, cross-sectional survey studies demonstrated that actively seeking extremist content or engaging online in interactions with others who held extremist beliefs was associated with a higher likelihood of having had committed acts of political/religious violence against property or persons [9,15]. Exposure to right-wing extremist peers was further related to stronger right-wing extremist beliefs, which, in turn, predicted an increased likelihood of having had engaged in political violence [14]. Contrasting these findings, experimental work has failed to replicate (short-term) direct exposure effects [30].

In fact, a meta-analysis showed that exposure effects of radicalizing material are typically weak unless specific moderators are considered [31]. On the one hand, the impact of radicalizing information is stronger for those characterized by higher levels of thrill seeking [8] and trait aggression [31]. On the other hand, the frequency of exposure to radicalizing content likely shapes its influence. Specifically, research on the related problem of hate speech has found that repeated exposure to verbal aggressions predicts desensitization–negative emotions in response to such material are less likely [32]. Desensitization, in turn, was positively associated with prejudice towards the victims of hate speech [32]. That is, radicalizing information might, over time, lose its potential to shock and upset individuals. As the material becomes more palatable, it could elicit (stronger) attitude and behavior changes.

Incidental exposure to and active selection of radicalizing information

In summary, exposure to radicalizing messages can facilitate, to some extent and for some individuals, the radicalization process. An underlying assumption of the aforementioned work is that the process that enables individuals to be confronted with radicalizing information is universal. This, however, is not the case. Bouhana [17] provides initial guidance on this matter. More precisely, they stipulate that personal preferences or hobbies determine the likelihood of being present in particular physical or digital settings where radicalizing material may be disseminated (i.e., self selection effects [33]). Additionally, socio-demographic characteristics, such as one’s educational level or age, or social group membership (e.g., ethnicity or religion), affect whether or not individuals engage in activities in certain places (i.e., social selection effects). Both self and social selection can enhance the incidental exposure to radicalizing messages. That is, individuals receive radicalizing information while they pursue other goals, such as their hobby or education [34].

Weeks and Lane [35] distinguish state and trait unmotivated incidental exposure. Exposure to radicalizing content is referred to as state unmotivated if individuals sympathize with or endorse (violent) extremist ideas but, in this very instance, seek to fulfil another need, such as entertainment (see [36], who refers to opportunistic information discovery that informs a ‘background problem’ while individuals aim to address a ‘foreground problem’). Trait unmotivated incidental exposure implies that individuals are not at all sympathetic of violent extremism and encounter radicalizing messages when they seek different information or interaction partners. Following the Political Incidental News Exposure Model (PINE; [37]), effects of state and trait unmotivated exposure on attitudes and behavior are expected to vary.

More precisely, PINE [37] postulates that individuals appraise all information, including such that is encountered incidentally, to judge whether it is relevant, or “less important compared to the current processing goal” ([37]; p. 1039). Irrelevant information is disregarded and not processed any further (i.e., First level IE; [37]), although it might still be remembered especially after repeated exposure [38]. Relevant information is processed systematically (i.e., Second Level IE; [37]). In other words, sufficient cognitive resources are dedicated to paying attention, relating the new information to existing knowledge or memories, and scrutinizing the arguments (i.e., central route; [39]). Moreover, systematic processing may shift the original processing goal such that individuals actively seek further similar, radicalizing, information. Importantly, and in line with the elaboration-likelihood model, systematically processed information is more likely to shape lasting attitudes that are reliable predictors of long-term behavior [40].

In addition to being incidentally exposed, individuals also actively seek out content, sources, and media. Substantial evidence documents a general preference for information that aligns with existing beliefs and convictions (dissonance theory; [41]). One reason for the active selection of belief-congruent information is the defense of one’s sense of self [42] and avoidance of threats to one’s self-image (psychological immune system; [43]). The Meaning Maintenance Model [44] further stipulates that individuals “are inexhaustible meaning makers” (p. 91) and strive to keep previously established meaning frameworks intact; actively selecting information that confirms one’s beliefs might serve as a strategy to achieve this.

Slater’s [45,46] Reinforcing Spiral Model (RSM) provides a holistic framework to consider the consequences of belief-congruent information selection. First, seeking and consuming information in line with core attitudes is thought to raise the salience of the respective aspect of the self or identity. In turn, subsequent behavior, including future information selection, ought to be predicted by the salient beliefs–that is, belief-congruent information preferences should persist over time. Such ongoing selective information use predominantly contributes to the maintenance of existing attitudes at a stable level [47]. Attitudes might, however, change to more extreme positions if individuals experience a threat to their core beliefs or if they are embedded in information environments in which they hardly receive diverse viewpoints [45].

The present research

Taken together, individuals may be exposed to radicalizing content as a result of its active selection as well as due to incidental exposure. Specifically, three types of information use behavior are conceivable [48,49] (Hypothesis 1). First, the majority of the population is expected to never encounter radicalizing messages, neither through active selection nor incidental exposure [4,15]. Second, some individuals are thought to be only incidentally confronted with radicalizing information. Those individuals do not sympathize with the positions held by extremist or terrorist groups and, therefore, AS of radicalizing material is unlikely (trait unmotivated incidental exposure; [35]). Nonetheless, they might be connected with peer groups or frequent settings where radicalizing messages are disseminated (i.e., neutral magnets; [18]). A third groups of individuals is postulated to be exposed to radicalizing messages both through its AS and IE. This group agrees with the perspectives presented in radicalizing material, thus, AS of the information is likely as is state unmotivated incidental exposure in neutral or radicalizing magnets [18,35].

The three distinct information use behaviors–no AS of or IE to, only IE to, both AS of and IE to radicalizing messages–should relate to, or be indicators of, different levels of support for violent extremism (Hypothesis 2a). Pauwels and Schils [15,50] showed, while controlling for other risk factors, significant positive associations between IE to as well as AS of extremist material online and reports of political violence against people or property. A higher frequency of active selection predicted a four and six-fold increase in the likelihood of violence against people and property respectively. A higher frequency of incidental exposure ‘only’ doubled the risk of political violence. The stronger relationship between active selection of extremist material and political violence is not surprising; AS of such content suggests that the individuals already endorsed extremist opinions. Consequently, information use behavior that is characterized at least to some degree by the active selection of radicalizing information is expected to be associated with stronger support for violent extremism than patterns defined by no or only incidental exposure (Hypothesis 2b).

Method

To test these hypotheses, we conducted an online survey. The analyses described below were not pre-registered. The analytical code, material, and data as well as all supplementary material are available here: https://osf.io/jxsva/?view_only=bb8209691cd44cefb64da484aa93a05f

Ethics approval was granted by the UCL, Department of Security and Crime Science ethics committee (approval number: n/a). Participants gave written informed consent.

Sample

A total of N = 1509 participants, reflecting the U.K. general population in terms of age, gender, and ethnicity distribution, were recruited. Representativeness is based on the most recent census data at the time of data collection, 2011. The survey encompassed eight attention checks; participants who failed three or more attention checks were excluded. The final analytical sample included N = 1495 participants. Overall, 51.4% participants identified as female, 47.6% identified as male, 0.3% indicated non-binary/third gender as their gender status, 0.1% self-described their gender status, and 0.3% preferred not to answer the question. The sample was on average Mage = 45.04 (SDage = 15.65, range: 18–78) years old. The majority of participants (80.4%) stated ‘White’ as their ethnicity. This was followed by 6.9% who reported ‘Asian’, and 3.4% participants who identified as ‘Black’. Further demographic information is available in the supplementary material (S1).

Measures

To examine the frequency of active selection of and incidental exposure to radicalizing material we relied on an adapted version of the EXPO-12 scale [4]. Frequency of AS of radicalizing information was measured with 14 items (e.g., ‘Searched for books, magazines, or other types of text which support the use of violence to achieve political, religious, or social goals’, ‘Searched for content online like websites, memes, or videos that support the use of violence to achieve political, religious, or social goals’, ‘Searched for podcasts, songs, or other types of audios which support the use of violence to achieve political, religious, or social goals’, ‘Searched for content made by people who have committed violence to achieve political, religious, or social goals, such as manifestos, or YouTube videos’; 1 = Never, 2 = Once or twice, 3 = A few times, 4 = Once or twice a year, 5 = Once or twice a month, 6 = Once or twice a week, 7 = Every day). We assessed frequency of incidental exposure to radicalizing information with nine items (e.g., ‘Received printed texts which you didn’t ask for such as books or magazines which support violence to achieve political, religious, or social goals’, ‘Received content online that you didn’t ask for such as images or videos which show acts of violence to achieve political, religious, or social goals’, ‘Overheard people expressing views in support of violence to achieve political, religious, or social goals’, ‘Accidentally witnessed comments being made online to support violence to achieve political, religious, or social goals’; 1 = Never, 2 = Once or twice, 3 = A few times, 4 = Once or twice a year, 5 = Once or twice a month, 6 = Once or twice a week, 7 = Every day). For the AS and IE measures, five items respectively referred specifically to online settings.

Support for violent extremism was captured with two outcome variables. Participants, first, completed the four items of the radicalism dimension of the activism and radicalism intention scales (ARIS; [51]), reporting the extent to which they agreed with statements such as ‘I would participate in a public protest against oppression of my group even if I thought the protest might turn violent’ or ‘I would continue to support an organisation that fights for my group’s political and legal rights even if the organisation sometimes resorts to violence’ (1 = strongly disagree, 7 = strongly agree; α = .86). We further introduced the violent extremist attitude scale [52], a four-item measure that explores attitudes towards the use of violence to pursue political, religious, or social justice goals (e.g., ‘It’s sometimes necessary to use violence to fight against things that are very unjust’, ‘It’s OK to support groups that use violence to fight injustice’; 1 = strongly disagree, 7 = strongly agree; α = .87).

Three other measures for violent extremism were included in the survey. Result patterns largely replicated the ones demonstrated for the two aforementioned scales; please see supplementary material S2 for details and discrepancies. The complete survey materials are presented in the supplementary material (S3).

Procedure

Data were collected in September 2021 on Prolific Academic, an online opt-in access panel [53]. We choose Prolific as a platform for recruiting participants because it has been consistently found to provide high(er)-quality data, especially as compared to other providers such as Amazon Mechanical Turk and CloudResearch [54,55]. Participants filled in the survey in their own time, without supervision. Participants could not skip questions or items. Questions regarding active information selection and incidental exposure were asked before the dependent variables. Demographic information was assessed in short blocks throughout the survey to break up the more demanding questions on information behavior and support for violent extremism. The average completion time was 14 minutes.

Results

Analytical approach

We employed a latent class analysis (LCA) to identify unobserved sub-groups (i.e., latent classes) of individuals based on observable characteristics [56] here, the reported frequency of active selection of as well as incidental exposure to radicalizing information. Specifically, it is expected that individuals’ scores on the observable variables are an indicator for their membership in a particular latent class [57]. The number of classes that are to be attained in a LCA is not pre-defined. Instead, several solutions with a different number of classes are estimated to then determine which model fits the observed data best. To estimate the models, we used maximum likelihood estimation with robust standard errors. Evaluations of the fit of different solutions were based on two criteria, the sample size adjusted Bayesian information criterion (aBIC) and consistent Akaike information criterion (cAIC; [58]). A lower aBIC and cAIC indicated a better model fit. Lastly, entropy was assessed to understand the extent to which, or the uncertainty with which, a chosen solution accurately defined the different latent classes. A threshold of .80 suggested acceptable entropy [59]. It should be noted that individual fit statistics often suggest different optimal class solutions. Hence, fit statistics were considered alongside knowledge from previous research and theory to identify the most appropriate class solution. After identifying the optimal number of classes, participants were assigned to one specific class, based on the highest class-membership probability. Following, we conducted a multi-variate analysis of variance to investigate between-group differences on the two dependent variables.

Latent class analysis relies on categorical variables. As described previously, the survey measures of AS and IE offered Likert-type answer options. However, the distribution of the variables indicated that they were strongly right-skewed; the large majority of participants indicated that they had ‘Never’ engaged with or were ‘Never’ confronted with radicalizing information (Table 1). We therefore decided to recode the variables into dichotomous measures that indicated whether participants had responded ‘Ever’ (i.e., answer options 2 to 6) or ‘Never’ (i.e., answer option 1) [60].

Table 1. Descriptive statistics of information use behavior and dependent variables.

  Mean  SD
Radicalism Intention Scale
2.18  1.23
Violent Extremist Attitude Scale
2.74  1.31 
Active Selection
% (n) Never  % (n) Ever 
1) Searched for books, magazines, or other types of text which support the use of violence to achieve political, religious, or social goals  88.7 (1326)  11.3 (169) 
2) Had discussions in person with people who support the use of violence to achieve political, religious, or social goals  72.0 (1077)  28.0 (418) 
3) Used the internet to chat online with people who support the use of violence to achieve political, religious, or social goals  92.4 (1381)  7.6 (114) 
4) Searched for content online like websites, memes, or videos that support the use of violence to achieve political, religious, or social goals  85.8 (1282)  14.2 (213) 
5) Searched for places where people who support the use of violence to achieve political, religious, or social goals spend time  93.0 (1391)  7.0 (104) 
6) Searched online for groups or people who support the use of violence to achieve political, religious, or social goals  88.6 (1324)  11.4 (171) 
7) Used the internet to observe online chat between other people who support the use of violence to achieve political, religious, or social goals  82.5 (1234)  17.5 (261) 
8) Searched for images or videos of violence to achieve political, religious, or social goals 83.9 (1254)  16.1 (241) 
9) Searched for podcasts, songs, or other types of audios which support the use of violence to achieve political, religious, or social goals  90.4 (1351)  9.6 (144) 
10) Searched offline (in real life) for people or groups who support the use of violence to achieve political, religious, or social goals  97.2 (1453)  2.8 (42) 
11) Searched for information on how to use weapons or make bombs for violence to achieve political, religious, or social goals  97.9 (1463)  2.1 (32) 
12) Searched for content made by people who have committed violence to achieve political, religious, or social goals, such as manifestos, or YouTube videos  86.4 (1292)  13.6 (203) 
13) Searched for content about people who have committed violence to achieve political, religious, or social goals  75.7 (1131)  24.3 (364) 
14) Searched for events or activities to attend which support violence to achieve political, religious, or social goals  96.3 (1440)  3.7 (55) 
Incidental Exposure  % (n) Never % (n) Ever
1) Received printed texts which you didn’t ask for such as books or magazines which support violence to achieve political, religious, or social goals  87.5 (1308)  12.5 (187) 
2) Accidentally come across content which supports violence to achieve political, religious, or social goals online  60.8 (909)  39.2 (586) 
3) Received content online that you didn’t ask for, such as memes or videos which violence to achieve political, religious, or social goals  70.0 (1046)  30.0 (449) 
4) Had content which supports violence to achieve political, religious, or social goals recommended to you on social media  82.6 (1235)  17.4 (260) 
5) Received content online that you didn’t ask for such as images or videos which show acts of violence to achieve political, religious, or social goals  73.3 (1096)  26.7 (399) 
6) Received audio content that you didn’t ask for such as podcasts or songs which support violence to achieve political, religious, or social goals  90.6 (1354)  9.4 (141) 
7) Come across content online about using violence to achieve political, religious, or social goals while looking for content about something else  69.0 (1032)  31.0 (463) 
8) Overheard people expressing views in support of violence to achieve political, religious, or social goals  61.6 (921)  38.4 (574) 
9) Accidentally witnessed comments being made online to support violence to achieve political, religious, or social goals  62.1 (928)  37.9 (567) 

All analyses were completed with R 4.1.0 (R Core Team, 2021). Relevant packages are indicated in the analytical script. The dataset used for the analysis reported below included no missing values.

Descriptive statistics

Table 1 documents the means and standard deviations of the outcome variables as well as the prevalence of different indicators of active selection of and incidental exposure to radicalizing information in the whole sample. Results showed overall low support for violent extremism. Moreover, active selection of radicalizing content was relatively uncommon whilst incidental exposure appeared to be more frequent. Additionally, there was noticeable variation between certain types of activities. For instance, active selection of information about individuals who had committed acts of violence was 12 times more common than searching for information about weapons.

Unique patterns of AS of and IE to radicalizing information

We estimated models for up to eight latent classes of information use behavior. All models attained entropy values above the threshold of .80 [59]. The aBIC and CAIC were on balance the lowest for the six classes solution (Table 2), that is, the sample was distinguished into six groups, each characterized by unique information use behavior.

Table 2. Evaluating class solutions.

Model LL BIC aBIC cAIC likelihood-ratio entropy
1 Class -14585.72 29339.57 29266.50 29326.57 - -
2 Classes -11227.60 22798.76 22649.46 22845.76 8585.29 .92
3 Classes -10480.18 21479.36 21253.82 21550.36 7090.46 .91
4 Classes -10218.03 21130.49 20828.71 21225.49 6566.15 .90
5 Classes -10055.06 20980.00 20601.97 21099.00 6240.22 .88
6 Classes -9943.47 20932.26 20477.99 21075.26 6017.05 .88
7 Classes -9878.84 20978.42 20477.91 21145.42 5887.77 .88
8 Classes -9815.15 21026.49 20419.74 21217.49 5760.40 .87

Note. LL = log-likelihood, aBIC = sample-size adjusted BIC, cAIC = consistent Akaike information criterion; highlighted in bold is the model with the best overall fit.

To interpret the concrete patterns of IE to and AS of radicalizing information for the six groups, we inspected the conditional item response probabilities (Fig 1). Detailed numeric values are available in supplementary material (S4). Accordingly, the six classes are described as follows: (Class 1) a near zero probability of either AS or IE, (Class 2) a moderate probability of both AS and IE, (Class 3) a moderate probability of AS and a high probability of IE, (Class 4) a low probability of AS and a moderate probability of IE, (Class 5) a high probability of both AS and IE, and (Class 6) a moderate probability of AS and a high probability of IE. Class 1 is the largest, Class 5 the smallest (Fig 1). Importantly, there is evidence in support of Hypothesis 1. The six classes reflect the proposed three information use patterns, specifically, neither AS nor IE (Class 1), IE only (Classes 3 & 4), or a combination of active selection of and incidental exposure to radicalizing information (Classes 2, 5, & 6) (Fig 1).

Fig 1. Conditional item response probabilities.

Fig 1

AS, IE, and support for violent extremism

Next, we examined between-group differences with respect to support for violent extremism (Hypothesis 2a, 2b). The multi-variate analysis of variance demonstrated main effects for the radicalism intentions scale (F(5, 1489) = 69.04, p < .001, η2 = .188) and the violent extremist attitudes scale (F(5, 1489) = 41.76, p < .001, η2 = .123) (see Table 3 for the mean scores in each class). Post-hoc tests (Table 4) further showed that participants in Class 1 reported overall the lowest and those in Class 5 the highest support for violent extremism. Indeed, all between-group differences were statistically significant with the following exceptions: we identified no differences between Class 2 and 6, and between Class 3 and 4 for both outcome variables, as well as no difference between Class 2 and 3 for the dependent variable ‘attitudes towards violent extremism’. The highly similar result pattern for both outcome variables is not surprising; indeed, an exploratory factor analysis with oblimin rotation showed that all items measuring the two dependent measures loaded on one factor (see Supplementary Material S5).

Table 3. Means and standard deviation of support for violent extremism per class.

Class Radicalism Intentions Scale
M (SD)
Attitudes towards Violent Extremism M (SD)
1 1.76 (.96) 2.35 (1.21)
2 2.84 (1.38) 3.32 (1.36)
3 2.38 (1.22) 2.95 (1.18)
4 2.13 (1.07) 2.73 (1.21)
5 4.20 (1.54) 4.31 (1.44)
6 2.87 (1.26) 3.37 (1.21)

Note. Class 1—no probability of either AS or IE, Class 2—moderate probability of both AS and IE, Class 3—moderate probability of AS, high probability of IE, Class 4—low probability of AS, moderate probability of IE, Class 5—high probability of both AS and IE, Class 6—moderate probability of AS, high probability of IE

Table 4. Post-hoc between-group comparisons.

Reference class Comparison class Radicalism Intentions Scale
Mean difference; 95% CI; p
Attitudes towards violent extremism
Mean difference; 95% CI; p
1 2
3
4
5
6
-1.08; -1.42, -.76; < .001
-.62; -.94, -.30; < .001
-.38; -.57, -.18; < .001
-2.44; -3.19, -1.70; < .001
-1.12; -1.44, -.79; < .001
-.98; -.132, -.63; < .001
-.60; -.92, -.28; < .001
-.38; -.61, -.15; < .001
-1.96; -2.66, -1.25; < .001
-1.02; -1.34, -.70; < .001
2 3
4
5
6
.46; .02, .90; .034
.71; .35, 1.07; < .001
-1.36; -2.16, -.56; < .001
-.04; -.47, .40; 1.00
.37; -.05, .80; .126
.60; .23, .96; < .001
-.98; -1.73, -.23; .004
-.04; -.47, .37; 1.00
3 4
5
6
.25; -.10, .59; .315
-1.82; -2.61, -1.03; < .001
-.49; -.92, -.07; .013
.22; -.13, .57; .450
-1.36; -2.10, -.61; < .001
-.42; -.83, -.004; .046
4 5
6
-2.07; -2.82, -2.32; < .001
-.74; -1.09, -.39; < .001
-1.58; -2.29, -.86; < .001
-.64; -.98, -.29; < .001
5 6 1.33; .53, 2.12; < .001 .94; .20, 1.69; .006

Discussion

The present study examined patterns of incidental exposure to and active selection of radicalizing messages in the general population. We showed that individuals exhibit three broad information use behaviors, namely, a near zero probability of exposure, varying probabilities of only IE to, or both AS of and IE to radicalizing information. As demonstrated in previous research, most participants indicated neither active selection of nor incidental exposure to radicalizing content [4,15]. Importantly, and in line with our hypothesis, information use characterized by even low probabilities of active selection of radicalizing material was associated with stronger violent extremist attitudes and a higher willingness to use violence to attain collective goals than patterns defined by no exposure or only incidental exposure to radicalizing information.

These findings have several implications. Notably, we identified no group of participants that reported near zero probability of IE but at least a moderate probability of active selection of radicalizing content. Thus, our results suggest that individuals who are actively seeking radicalizing information also pursue other information goals, such as entertainment or social interaction, in settings where radicalizing content is available—state unmotivated incidental exposure is as likely as AS [35]. Evidence of moderate or high probabilities of IE to and AS of radicalizing information, therefore, could be indicative of overall changes in individuals’ habits and social life, “a slow marginalization away from conventional society and toward a much narrower society where extremism becomes all-encompassing” ([61], p. 89, [62,63]).

Additionally, we observed that a higher probability of either IE or AS per se was not associated with corresponding stronger support for violent extremism. For instance, the classes of participants characterized by a moderate and high probability of incidental exposure to radicalizing messages did not express different levels of violent extremist attitudes or radical action tendencies. Instead, significant differences were found between the group that noted high probabilities for both IE and AS and all others, as well as between groups that did and did not report active selection of radicalizing material. Hence, even a low probability of active selection of radicalizing information likely reflects noteworthy commitment to the use of violence.

Although we demonstrated the three proposed patterns of information use behavior (i.e., neither IE or AS, only IE, AS and IE), the sample was distinguished into six groups, two of which were defined by different probabilities of only IE and three of which were characterized by low, moderate, or higher probabilities of both actively seeking and being incidentally exposed to radicalizing material. First, it is important to not mistake this result as differences in the frequency of incidental exposure or active selection. Second, it is worth considering the factors that contribute to the emergence of low, moderate, or high probabilities of certain information use patterns. With regards to incidental exposure to radicalizing information, self and social selection processes, that is, personal preferences as well as characteristics pertaining to social group memberships, determine the likelihood of being present in places where radicalizing agents disseminate their messages, even if the person is not interested in the content [17]. Unfortunately, previous research on the topic of violent extremism has considered ‘exposure’ primarily as a predictor and not a dependent variable. Therefore, the exact correlates of IE have not been examined. Clemmow and colleagues’ [5] study is an exception that should be extended in future research. They demonstrated that younger individuals were more likely to be incidentally exposed or actively select radicalizing messages and that male respondents were more likely to be exposed than female participants.

Continuing the previous line of thought, the availability (or lack thereof) of alternative settings to fulfill personal interests, practice one’s religion, or receive an education should also affect the probability of repeated IE to radicalizing information. That is, a higher probability of incidental exposure to radicalizing material in absence of AS could indicate that despite finding the content irrelevant, individuals are not changing (or are not able to change) their information environments. The latter might be the result of close peers or family members endorsing extremism, which constitutes a significant risk factor of radicalization [1416,64].

Further, following the reinforcing spirals model [45,46], different probabilities of AS of radicalizing information could suggest varying levels of salience of beliefs or aspects of one’s identity that are associated with a violent extremist ideology. It is expected that selective information use is associated with the maintenance of violence-affirming or violent extremist attitudes at a stable level over time [47]. However, the probability of AS should increase when information environments become more homogenous, devoid of diverse views, which also predicts a shift of attitudes to more extreme positions (i.e., positive feedback loop; [46]). Hence, as mentioned earlier, a higher probability of active selection of radicalizing materials could imply that individuals are more embedded in networks or communities where violent extremism is endorsed. Future research should aim to investigate this speculation empirically and, more generally, consider the antecedents, rather than only the consequences, of incidental exposure to as well as active selection of radicalizing material.

Any practical implications that are based on one study or analysis can only be preliminary. We nevertheless believe that the results inform two fields of practice. First, we contribute insights to the development of individual risk assessment tools that aim to identify those vulnerable to violent extremism before they commit violence [65]. These tools (e.g., VERA(2) [66]; TRAP-18 [67]) typically include a wide variety of risk or protective factors, such as grievances and ideological commitment, criminal history, mental health, or the presence of a social support system. Previous research has further developed approaches to assess individuals’ risk based on textual digital trace data (i.e., linguistic risk assessment; [68,69]). Our findings suggest that information use behavior, which is to some extent observable, should be considered as well, and in a more nuanced way, in individual risk assessment and management. Namely, we showed that evidence of patterns of only incidental exposure to radicalizing material might be less of a concern, especially if it remains temporary (i.e., individuals are not likely to be embedded in environments where radicalizing messages are regularly disseminated). In turn, information use behavior defined by even a low probability of active selection of radicalizing content online or offline likely indicates stronger support for violent extremism which could manifest in acts of terrorism. Here, efforts to prevent radicalization are especially pertinent.

Perhaps somewhat ironically, in online settings, the fact that individuals actively seek radicalizing information could provide an avenue for targeted prevention. Notably, redirect(ion) projects, which have been implemented in collaboration with large social media platforms, use the search of keywords that are thought to be indicative of (violent) extremist or terrorist actors and narratives as a cue to provide counter-narratives or offer support by civil society organizations specialized in disengagement [70]. Evaluations of past programs highlight that their implementation is not without challenges [71,72]. However, our results indicate that using the active search for radicalizing content as one of several indicators of risk is highly promising.

The aforementioned conclusions must of course be considered in light of some methodological limitations. Self-report data can be affected by a range of biases, including concerns of social desirability (i.e., under-reporting of exposure to radicalizing information and support for violent extremism), inability to accurately estimate the frequency of past information use, as well as fatigue. We addressed the latter by including several attention checks, which only very few participants failed. Nonetheless, we must acknowledge that the exact size of the different groups might not be estimated accurately as participants did not report (all) information use behavior correctly. Similarly, underreporting of support for violent extremism could mean that between-group differences are underestimated. Future research might therefore consider daily diary studies to avoid recollection biases of information use behavior.

Further, the study design only permits correlative conclusions. We do not suggest that IE to or AS of radicalizing information predict (or even cause) support for violent extremism. However, as elaborated in detail in the previous sections, the different observable information use patterns–for instance, evidence of even a moderate probability of active selection of radicalizing content–could be viewed as indicators of individuals’ (higher) level of radicalization [73]. In order to understand whether active selection of radicalizing material is not merely indicative of but causes stronger support for violent extremism, longitudinal observational or experimental studies are required.

Additionally, we did not focus on, or distinguish between, particular ideologies or exposure to information from specific extremist and terrorist actors. Although we would not expect differences in information use patterns, it is conceivable that especially state unmotivated incidental exposure is more prevalent for ideologies that are embedded in the mainstream public discourse. In the U.K. context, where our data was collected, this might apply especially to white supremacist or anti-immigrant messages. Going forward, the patterns that we have identified should be replicated across specific types of radicalizing content and ideologies. Relatedly, individuals’ information use behavior is shaped to some extent by the cultural, political, and economic context, for instance, by governmental policies regarding what information is available or permissible in certain settings. Thus, the distinct classes, defined by varying probabilities of IE and AS, are perhaps only representative of information use behavior in a Western democracy. We, therefore, encourage others to replicate the study in other geographical and political contexts.

Lastly, it is recommended to explore the research questions with other samples, notably, populations that have adopted (violent) extremist beliefs more strongly than the general population (e.g., individuals who are part of a de-radicalization program) or individuals who have committed or prepared acts of terrorism. In those instances, we would expect the absence of information use patterns that are defined by a near zero probability of incidental exposure to and active selection of radicalizing information or only evidence of incidental exposure.

Conclusion

Our research showed that a substantial proportion of the population is never exposed to information that incites or condones the use of violence to attain collective goals. We further demonstrated that not all individuals who encounter such material are per se at risk of radicalization. More precisely, information use behavior that is characterized by the active selection of (rather than only incidental exposure to) radicalizing content was associated with significantly higher support for violent extremist attitudes and radical behavior intentions. Efforts to prevent and counter radicalization should, therefore, focus in particular on individual for whom it is evident that they actively seek radicalizing material.

Data Availability

All relevant data are available on the Open Science Framework at https://osf.io/jxsva/.

Funding Statement

This work was supported by the European Research Council under the European Union’s Horizon 2020 research and innovation programme (Grant Agreement No 758834). The grant was awarded to PG. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.

References

  • 1.Wikström PO, Bouhana N. Analysing terrorism and radicalization: A situational action theory. The Encyclopaedia of the Criminology of Terrorism. John Wiley and Sons. 2017. [Google Scholar]
  • 2.Orofino E. & Allchorn W. (2023) Routledge Handbook of Non-violent Extremism: Groups, Perspectives and New Debates. London:Taylor & Francis. [Google Scholar]
  • 3.Bouhana N PO Wikström. Theorizing terrorism: terrorism as moral action: a scoping study. Contemporary Readings in Law and Social Justice. 2010. Jul 1;2(2):9. [Google Scholar]
  • 4.Clemmow C, Rottweiler B, Gill P. EXPO-12: Development and validation of the Exposure to Violent Extremism Scale. Psychology of violence. 2022. May 5. [Google Scholar]
  • 5.Clemmow C, Rottweiler B, Wolfowicz M, Bouhana N, Marchment Z, Gill P. The Whole Is Greater than the Sum of Its Parts: Risk and Protective Profiles for Vulnerability to Radicalization. Justice Quarterly. 2023. Jan 30:1–27. [Google Scholar]
  • 6.Hassan G, Brouillette-Alarie S, Alava S, Frau-Meigs D, Lavoie L, Fetiu A, et al. Exposure to extremist online content could lead to violent radicalization: A systematic review of empirical evidence. International journal of developmental science. 2018. Jan 1;12(1–2):71–88. [Google Scholar]
  • 7.Kenyon J, Binder J, Baker-Beall C. Understanding the Role of the Internet in the Process of Radicalisation: An Analysis of Convicted Extremists in England and Wales. Studies in Conflict & Terrorism. 2022. Apr 15:1–25. [Google Scholar]
  • 8.Pauwels LJ, Hardyns W. Endorsement for extremism, exposure to extremism via social media and self-reported political/religious aggression. International journal of developmental science. 2018. Jan 1;12(1–2):51–69. [Google Scholar]
  • 9.Schils N, Pauwels LJ. Political violence and the mediating role of violent extremist propensities. Journal of Strategic Security. 2016. Jul 1;9(2):70–91. [Google Scholar]
  • 10.Williams TJ, Tzani C, Gavin H, Ioannou M. Policy vs reality: comparing the policies of social media sites and users’ experiences, in the context of exposure to extremist content. Behavioral Sciences of Terrorism and Political Aggression. 2023. Apr 5:1–8. [Google Scholar]
  • 11.Rushchenko J. Terrorist recruitment and prison radicalization: Assessing the UK experiment of ‘separation centres’. European Journal of Criminology. 2019. May;16(3):295–314. [Google Scholar]
  • 12.Trujillo HM, Jordán J, Antonio Gutierrez J, González-Cabrera J. Radicalization in prisons? Field research in 25 Spanish prisons. Terrorism and Political Violence. 2009. Sep 16;21(4):558–79. [Google Scholar]
  • 13.Gill P, Bouhana N, Morrison J. Individual disengagement from terrorist groups. Terrorism and political violence. 2015:243–57. [Google Scholar]
  • 14.Pauwels LJ, Heylen B. Perceived group threat, perceived injustice, and self-reported right-wing violence: An integrative approach to the explanation right-wing violence. Journal of interpersonal violence. 2020. Nov;35(21–22):4276–302. doi: 10.1177/0886260517713711 [DOI] [PubMed] [Google Scholar]
  • 15.Pauwels L, Schils N. Differential online exposure to extremist content and political violence: Testing the relative strength of social learning and competing perspectives. Terrorism and Political Violence. 2016. Jan 1;28(1):1–29. [Google Scholar]
  • 16.Perry G, Wikström PO, Roman GD. Differentiating right-wing extremism from potential for violent extremism: The role of criminogenic exposure. International journal of developmental science. 2018. Jan 1;12(1–2):103–13. [Google Scholar]
  • 17.Bouhana N. The Moral Ecology of Extremism. A Systemic Perspective, paper prepared for the UK Commission for Countering Extremism. 2019. Jul:9. [Google Scholar]
  • 18.Genkin M, Gutfraind A. How do terrorist cells self-assemble: Insights from an agent-based model of radicalization. Available at SSRN 1031521. 2011. Jul 7. [Google Scholar]
  • 19.Perliger A, Milton D. From cradle to grave: the lifecycle of foreign fighters in Iraq and Syria. US Military Academy-Combating Terrorism Center West Point United States; 2016. Nov 1. [Google Scholar]
  • 20.Matthes J, Nanz A, Stubenvoll M, Heiss R. Processing news on social media. The political incidental news exposure model (PINE). Journalism. 2020. Aug;21(8):1031–48. [Google Scholar]
  • 21.Baele SJ, Brace L, Coan TG. Uncovering the far-right online ecosystem: An analytical framework and research agenda. Studies in Conflict & Terrorism. 2020. Dec 12:1–21. [Google Scholar]
  • 22.Benigni MC, Joseph K, Carley KM. Online extremism and the communities that sustain it: Detecting the ISIS supporting community on Twitter. PloS one. 2017. Dec 1;12(12):e0181405. doi: 10.1371/journal.pone.0181405 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 23.Ferrara E. Contagion dynamics of extremist propaganda in social networks. Information Sciences. 2017. Dec 1;418:1–2. [Google Scholar]
  • 24.Veilleux-Lepage Y. Retweeting the Caliphate. The role of soft-sympathizers in the Islamic State’s social media strategy. Turkish Journal of Security Studies. 2016;18(1):53–69. [Google Scholar]
  • 25.Conway M, Watkin AL, Looney S. Violent extremism and terrorism online in 2021: The year in review. Available at: https://www.voxpol.eu/download/vox-pol_publication/RAN-Policy-Support_Prevent_Consolidated_Year-in-Review-2021.pdf [Google Scholar]
  • 26.Gill P, Corner E, Conway M, Thornton A, Bloom M, Horgan J. Terrorist use of the Internet by the numbers: Quantifying behaviors, patterns, and processes. Criminology & Public Policy. 2017. Feb;16(1):99–117. [Google Scholar]
  • 27.LaFree G. Terrorism and the Internet. Criminology & Pub. Pol’y. 2017;16:93. [Google Scholar]
  • 28.Clemmow C, Schumann S, Salman NL, Gill P. The base rate study: Developing base rates for risk factors and indicators for engagement in violent extremism. Journal of forensic sciences. 2020. May;65(3):865–81. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 29.Baugut P, Neumann K. How right-wing extremists use and perceive news media. Journalism & Mass Communication Quarterly. 2019. Sep;96(3):696–720. [Google Scholar]
  • 30.Shortland N, McGarry P. The personality and propaganda puzzle: Exploring the effect of personality on exposure to extremist content online. Psychology of violence. 2022. Jan;12(1):1. [Google Scholar]
  • 31.Wolfowicz M, Hasisi B, Weisburd D. What are the effects of different elements of media on radicalization outcomes? A systematic review. Campbell Systematic Reviews. 2022. Jun;18(2):e1244. doi: 10.1002/cl2.1244 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 32.Soral W, Bilewicz M, Winiewski M. Exposure to hate speech increases prejudice through desensitization. Aggressive behavior. 2018. Mar;44(2):136–46. doi: 10.1002/ab.21737 [DOI] [PubMed] [Google Scholar]
  • 33.Pinjari AR, Bhat CR, Hensher DA. Residential self-selection effects in an activity time-use behavior model. Transportation Research Part B: Methodological. 2009. Aug 1;43(7):729–48. [Google Scholar]
  • 34.Downs A. An economic theory of democracy. Harper and Row. 1957;28. [Google Scholar]
  • 35.Weeks BE, Lane DS. The ecology of incidental exposure to news in digital media environments. Journalism. 2020. Aug;21(8):1119–35. [Google Scholar]
  • 36.Erdelez S. Investigation of information encountering in the controlled research environment. Information processing & management. 2004. Nov 1;40(6):1013–25. [Google Scholar]
  • 37.Matthes J, Nanz A, Stubenvoll M, Heiss R. Processing news on social media. The political incidental news exposure model (PINE). Journalism. 2020. Aug;21(8):1031–48. [Google Scholar]
  • 38.Zukin C, Snyder R. Passive learning: When the media environment is the message. Public Opinion Quarterly. 1984. Jan 1;48(3):629–38. [Google Scholar]
  • 39.Petty RE, Cacioppo JT. The effects of involvement on responses to argument quantity and quality: Central and peripheral routes to persuasion. Journal of personality and social psychology. 1984. Jan;46(1):69. [Google Scholar]
  • 40.Petty RE, Fazio RH, Briñol P, editors. Attitudes: Insights from the new implicit measures. Psychology Press; 2008. Oct 9. [Google Scholar]
  • 41.Festinger L. A theory of cognitive dissonance. Stanford university press; 1962. [Google Scholar]
  • 42.Porot N, Mandelbaum E. The science of belief: A progress report. Wiley Interdisciplinary Reviews: Cognitive Science. 2021. Mar;12(2):e1539. doi: 10.1002/wcs.1539 [DOI] [PubMed] [Google Scholar]
  • 43.Gilbert DT, Pinel EC, Wilson TD, Blumberg SJ, Wheatley TP. Immune neglect: a source of durability bias in affective forecasting. Journal of personality and social psychology. 1998. Sep;75(3):617. doi: 10.1037//0022-3514.75.3.617 [DOI] [PubMed] [Google Scholar]
  • 44.Heine SJ, Proulx T, Vohs KD. The meaning maintenance model: On the coherence of social motivations. Personality and social psychology review. 2006. May;10(2):88–110. doi: 10.1207/s15327957pspr1002_1 [DOI] [PubMed] [Google Scholar]
  • 45.Slater MD. Reinforcing spirals model: Conceptualizing the relationship between media content exposure and the development and maintenance of attitudes. Media psychology. 2015. Jul 3;18(3):370–95. doi: 10.1080/15213269.2014.897236 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 46.Slater MD. Reinforcing spirals: The mutual influence of media selectivity and media effects and their impact on individual behavior and social identity. Communication theory. 2007. Aug 1;17(3):281–303. [Google Scholar]
  • 47.Schumann S, Thomas F, Ehrke F, Bertlich T, Dupont JC. Maintenance or change? Examining the reinforcing spiral between social media news use and populist attitudes. Information, Communication & Society. 2022. Oct 3;25(13):1934–51. [Google Scholar]
  • 48.Blumler JG. The role of theory in uses and gratifications studies. Communication research. 1979. Jan;6(1):9–36. [Google Scholar]
  • 49.Levy MR, Windahl S. Audience activity and gratifications: A conceptual clarification and exploration. Communication research. 1984. Jan;11(1):51–78. [Google Scholar]
  • 50.Pauwels L, Brion , De Ruyver B. Explaining and understanding the role of exposure to new social media on violent extremism. An integrative quantitative and qualitative approach (RADIMED): Summary.
  • 51.Moskalenko S, McCauley C. Measuring political mobilization: The distinction between activism and radicalism. Terrorism and political violence. 2009. Mar 31;21(2):239–60. [Google Scholar]
  • 52.Nivette A, Eisner M, Ribeaud D. Developmental predictors of violent extremist attitudes: A test of general strain theory. Journal of research in crime and delinquency. 2017. Nov;54(6):755–90. [Google Scholar]
  • 53.Clemmow C, van der Vegt I, Rottweiler B, Schumann S, Gill P. Crowdsourcing Samples for Research on Violent Extremism: A Research Note. Terrorism and Political Violence. 2023. Apr 22:1–6. [Google Scholar]
  • 54.Douglas BD, Ewell PJ, Brauer M. Data quality in online human-subjects research: Comparisons between MTurk, Prolific, CloudResearch, Qualtrics, and SONA. Plos one. 2023. Mar 14;18(3):e0279720. doi: 10.1371/journal.pone.0279720 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 55.Eyal P, David R, Andrew G, Zak E, Ekaterina D. Data quality of platforms and panels for online behavioral research. Behavior Research Methods. 2021. Sep 29:1–20. doi: 10.3758/s13428-021-01694-3 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 56.Hagenaars JA, McCutcheon AL, editors. Applied latent class analysis. Cambridge University Press; 2002. Jun 24. [Google Scholar]
  • 57.Muthén B, Muthén LK. Integrating person‐centered and variable‐centered analyses: Growth mixture modeling with latent trajectory classes. Alcoholism: Clinical and experimental research. 2000. Jun;24(6):882–91. [PubMed] [Google Scholar]
  • 58.Anderson DR, Burnham KP, White GC. Comparison of Akaike information criterion and consistent Akaike information criterion for model selection and statistical inference from capture-recapture studies. Journal of Applied Statistics. 1998. Apr 1;25(2):263–82. [Google Scholar]
  • 59.Celeux G, Soromenho G. An entropy criterion for assessing the number of clusters in a mixture model. Journal of classification. 1996. Sep;13:195–212. [Google Scholar]
  • 60.Weller BE, Bowen NK, Faubert SJ. Latent class analysis: a guide to best practice. Journal of Black Psychology. 2020. May;46(4):287–311. [Google Scholar]
  • 61.Horgan J. From profiles to pathways and roots to routes: Perspectives from psychology on radicalization into terrorism. The ANNALS of the American Academy of Political and Social Science. 2008. Jul;618(1):80–94. [Google Scholar]
  • 62.Borum R. Radicalization into violent extremism I: A review of social science theories. Journal of strategic security. 2011. Dec 1;4(4):7–36. [Google Scholar]
  • 63.Doosje B, Moghaddam FM, Kruglanski AW, De Wolf A, Mann L, Feddes AR. Terrorism, radicalization and de-radicalization. Current Opinion in Psychology. 2016. Oct 1;11:79–84. [Google Scholar]
  • 64.Wolfowicz M, Litmanovitz Y, Weisburd D, Hasisi B. A field-wide systematic review and meta-analysis of putative risk and protective factors for radicalization outcomes. Journal of quantitative criminology. 2020. Sep;36:407–47. [Google Scholar]
  • 65.Pressman DE, Davis N. Violent extremism risk assessment and screening analysis: applicability, challenges, and new developments. Journal of Policing, Intelligence and Counter Terrorism. 2022. Sep 2;17(3):301–13. [Google Scholar]
  • 66.Pressman DE, Flockton J. Calibrating risk for violent political extremists and terrorists: The VERA 2 structured assessment. The British Journal of Forensic Practice. 2012. Nov 16;14(4):237–51. [Google Scholar]
  • 67.Meloy JR, Goodwill A, Clemmow C, Gill P. Time sequencing the TRAP-18 indicators. Journal of Threat Assessment and Management. 2021. Mar;8(1–2):1. [Google Scholar]
  • 68.Ebner J, Kavanagh C, Whitehouse H. Measuring socio-psychological drivers of extreme violence in online terrorist manifestos: an alternative linguistic risk assessment model. Journal of Policing, Intelligence and Counter Terrorism. 2023. Aug 23:1–9. [Google Scholar]
  • 69.Cohen K, Johansson F, Kaati L, Mork JC. Detecting linguistic markers for radical violence in social media. Terrorism and Political Violence. 2014. Jan 1;26(1):246–56. [Google Scholar]
  • 70.Saltman E, Kooti F, Vockery K. New models for deploying counterspeech: Measuring behavioral change and sentiment analysis. Studies in Conflict & Terrorism. 2023. Sep 2;46(9):1547–74. [Google Scholar]
  • 71.Helmus T.C. & Klein K. (2018). A Case Study of the Redirect Method. RAND Corporation. Available at: https://www.rand.org/content/dam/rand/pubs/research_reports/RR2800/RR2813/RAND_RR2813.pdf. [Google Scholar]
  • 72.Moonshot CVE (2020). From passive search to active conversation: An evaluation of the Facebook Redirect Programme. Available at: https://149736141.v2.pressablecdn.com/wp-content/uploads/Facebook-Redirect-Evaluation_Final-Report_Moonshot-1.pdf. [Google Scholar]
  • 73.Scrivens R, Wojciechowski TW, Freilich JD, Chermak SM, Frank R. Comparing the online posting behaviors of violent and non-violent right-wing extremists. Terrorism and political violence. 2023. Jan 2;35(1):192–209. [Google Scholar]

Decision Letter 0

Emily Chenette

1 Sep 2023

PONE-D-23-12940Distinct patterns of incidental exposure to and active selection of radicalizing information indicate varying levels of support for violent extremismPLOS ONE

Dear Dr. Schumann,

Thank you for submitting your manuscript to PLOS ONE. I sincerely apologise for the unusually delayed review timeframe. Your manuscript has been assessed by four reviewers, whose comments are appended below. The reviewers comment positively on the approach and the perceived interest in the study topic, and are generally positive about the overall strength of the conclusions. However, they raise a number of concerns that should be addressed. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process.

Please submit your revised manuscript by Oct 16 2023 11:59PM. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at plosone@plos.org. When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file.

Please include the following items when submitting your revised manuscript:

  • A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). You should upload this letter as a separate file labeled 'Response to Reviewers'.

  • A marked-up copy of your manuscript that highlights changes made to the original version. You should upload this as a separate file labeled 'Revised Manuscript with Track Changes'.

  • An unmarked version of your revised paper without tracked changes. You should upload this as a separate file labeled 'Manuscript'.

If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. Guidelines for resubmitting your figure files are available below the reviewer comments at the end of this letter.

If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: https://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols. Additionally, PLOS ONE offers an option for publishing peer-reviewed Lab Protocol articles, which describe protocols hosted on protocols.io. Read more information on sharing protocols at https://plos.org/protocols?utm_medium=editorial-email&utm_source=authorletters&utm_campaign=protocols.

We look forward to receiving your revised manuscript.

Kind regards,

Emily Chenette

Editor in Chief

PLOS ONE

Journal Requirements:

When submitting your revision, we need you to address these additional requirements.

1. Please ensure that your manuscript meets PLOS ONE's style requirements, including those for file naming. The PLOS ONE style templates can be found at

https://journals.plos.org/plosone/s/file?id=wjVg/PLOSOne_formatting_sample_main_body.pdf and

https://journals.plos.org/plosone/s/file?id=ba62/PLOSOne_formatting_sample_title_authors_affiliations.pdf

2. Please include your full ethics statement in the ‘Methods’ section of your manuscript file. In your statement, please include the full name of the IRB or ethics committee who approved or waived your study, as well as whether or not you obtained informed written or verbal consent. If consent was waived for your study, please include this information in your statement as well.

3. Please review your reference list to ensure that it is complete and correct. If you have cited papers that have been retracted, please include the rationale for doing so in the manuscript text, or remove these references and replace them with relevant current references. Any changes to the reference list should be mentioned in the rebuttal letter that accompanies your revised manuscript. If you need to cite a retracted article, indicate the article’s retracted status in the References list and also include a citation and full reference for the retraction notice.

[Note: HTML markup is below. Please do not edit.]

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #1: Yes

Reviewer #2: Yes

Reviewer #3: Yes

Reviewer #4: Partly

**********

2. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #1: Yes

Reviewer #2: Yes

Reviewer #3: I Don't Know

Reviewer #4: Yes

**********

3. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #1: Yes

Reviewer #2: Yes

Reviewer #3: Yes

Reviewer #4: Yes

**********

4. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #1: Yes

Reviewer #2: Yes

Reviewer #3: Yes

Reviewer #4: Yes

**********

5. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #1: This research study is noteworthy for its effective demonstration of the probabilities associated with an individual's incidental exposure to violent extremism (VE) and their active selection of radicalizing content. However, in terms of extremism, the study lacks descriptive data on the sample's profile within a population, which would be valuable in determining when evidence of exposure could indicate an increased risk of violence. Notably, the study findings suggest that individuals who only experience incidental exposure to radicalizing material are less likely to raise concerns. To strengthen the identified correlations, it is crucial to provide a comprehensive elucidation of the sample profile, which consists of 1,509 respondents. Given the significance of radicalism and violent extremism within religion-based or race-political-based ideologies, an examination of the sample characteristics becomes imperative.

Reviewer #2: I congratulate the authors (and thank them, because this was an easy, interesting, and enjoyable read!) for putting together a coherent and well-written paper on a useful and novel topic. This is a high-quality paper and I am recommending minor revisions, which I list below.

My only substantial constructive criticism is that the discussion section covers theoretical considerations and implications fairly thoroughly, but does not touch on practical implications that the results of this research may have for PCVE interventions and policies to reduce the effects of exposure to VE content. In my opinion, the crux of the paper is summarized in the following sentence (end of page 21):

“Hence, even a low probability of active selection of radicalizing information is thought to reflect noteworthy commitment to the use of violence.”

I would like to see some additions to the Discussion (even if only a paragraph or two) thoughtfully addressing these results in the context of UK PCVE efforts, in particular when considering the broad-reaching, public health style approach to steering people away from environments and individuals that provide radicalizing information. Some examples off the top of my head could include programs such as those that promote healthy and safe internet usage among school-age children or ad campaigns (as I have seen on the London Underground for a variety of social ills, including hate crimes) reminding people of the potential legal penalties for seeking out VE content.

“In addition to being incidentally exposed, individuals also actively select content, 147 sources, and media. In doing so, they aim to gratify situational needs or motives informed by 148 personality traits, interpersonal relationships, their social identities, societal values, norms, or 149 laws (i.e., uses and gratification theories) [39-41].”

In the above section, I don’t find uses and gratification theories very compelling as an explanatory theory, but I do find significance quest or more generally the need for meaning, which align very closely with dissonance theory and RSM, to be a far better fit. From where I sit, a motivational (i.e., psychological motivation) approach makes good sense there. In fact, several motivational models having to do with meaning (Psychological Immune System, see Gilbert et al., 1998; Porot & Mandelbaum, 2021; Meaning Maintenance Model, see Heine, Proulx, & Vohs, 2006; and Meaning-Making Mode, see CL Park, 2010) may be a better fit for explaining the drive for belief congruence a la dissonance theory/confirmation bias. That is, people are motivated to select and pursue information that supports their beliefs due to our inherent need for meaning (i.e., congruence, closure, purpose, and significance).

The following criticism is more of a procedural one, and not much to do with the paper itself. You mention that,

“249 Three other measures for violent extremism were included in the survey. Result 250 patterns largely

replicated the ones demonstrated for the two aforementioned scales; see 251 supplementary material S2 for

details and discrepancies. The complete survey materials are 252 presented in the supplementary material S3. We recorded no information that would allow us 253 to identify participants at any stage of the project.”

As a fellow VE researcher, I wanted to take a look at the other VE scales and observe the result patterns you mentioned, but was taken aback to see that S2 didn’t contain the results of statistical analyses (i.e., tables), but rather raw data and a codebook (unless I missed something). This was disappointing because I wanted to check out those findings for myself, but was not able to quickly and easily do so (I’m sure you can relate to the fact that I didn’t want to have to download the data, create the necessary variables from the individual items, and run the analyses myself). I think, if you’re going to say the results basically replicated across the multiple VE measures then you should provide those results, or simply not mention that. But that may just be my opinion, so feel free to take that with a grain of salt!

I’m not familiar with Prolific and would like you to add a sentence or two describing its data quality and reliability compared to other platforms (as you would for Qualtrics, MTurk, etc.).

“Data were collected in September 2021 on Prolific Academic, an online opt-in access 256 panel.”

On page 21, I think the following is supposed to read “entertainment or social interaction”:

“However, our results suggest that individuals who are actively seeking radicalizing information also pursue other information goals, such as entertainment of social interaction…”

Reviewer #3: This paper is extremely timely as it explores the processes by which individuals encounter radicalising contents online, i.e. incidental exposure (IE) and active selection (AS). The authors have developed and adopted a suitable methodology that allowed them to study a wide sample of population (N=1509) and build six types of information use behaviour, reflecting different levels of IE and AS.

The authors hypotheses, methodological approach and claims were all sufficiently contextualised in the relevant literature, which was reviewed and used to build their own model of analysis. The original data were deposited appropriately and access to the repository was provided.

The findings presented some relevant insights into the categories explored. This research revealed a strong relationship between AS and political violence as people with higher AS already hold opinions that are aligned with those presented in radicalizing content. Also, this research showed that individuals who are actively seeking radicalizing information also pursue other information goals, such as entertainment of social interaction, in settings where radicalizing content is available.

With regard to IE to radicalising information, this research showed that personal preferences and membership to specific groups determine the likelihood of being present in places where radicalizing agents disseminate their messages, even if the person is not interested in the content.

While as a qualitative researcher I do not feel I have got extensive quantitative knowledge to comment on the rigour of the statistical analysis performed, I can certainly say that the manuscript is well organised, clearly written, understandable and accessible even to non-specialist audience.

The method utilised in this paper is replicable and the authors themselves have invited other scholars to use their methodology and replicate the study in different geographical and political contexts to enhance the generalizability of their findings.

A few considerations/points below could help strengthen this paper further:

1. On p.2, line 33 it is stated “Exposure to radicalizing information has been associated with support for violent extremism”, however the authors have not provided any reference for this statement. Who says so? No references were provided. Is that their assumption or substantiated by previous studies? There are numerous studies exploring online ecosystems that suggest a link between radicalisation contents and direct action, however this is just one among the numerous triggers to violence (See: See Kenyon, Jonathan, Jens Binder, and Christopher Baker-Beall. 2022. "Understanding the Role of the Internet in the Process of Radicalisation: An Analysis of Convicted Extremists in England and Wales." Studies in Conflict & Terrorism:1-25. doi: 10.1080/1057610X.2022.2065902; Williams, Thomas James Vaughan, Calli Tzani, Helen Gavin, and Maria Ioannou. 2023. "Policy vs reality: comparing the policies of social media sites and users’ experiences, in the context of exposure to extremist content." Behavioral Sciences of Terrorism and Political Aggression:1-18. doi: 10.1080/19434472.2023.2195466.)

2. P.3, lines 57-58 state: “Radicalization refers to a process during which individuals develop a growing willingness to use violence as a means to pursue political, religious, or social-justice goals”. This definition seems to assume that radicalisation is a natural process towards violent actions and terrorism, which is not often times. The wide cohort of non-violent but extreme individuals and groups are an example of what stated above and implies that radicalisation should not be considered as a natural path towards violence. (See: Orofino, Elisa, and William Allchorn. 2023. Routledge Handbook of Non-violent Extremism: Groups, Perspectives and New Debates: Taylor & Francis; Littler, Mark, and Ben Lee. 2023. "Studying Extremism in the 21st Century: The Past, a Path, & Some Proposals." Studies in Conflict & Terrorism:1-3. doi: 10.1080/1057610X.2023.2195056.)

Some other comments/considerations include the following:

- On p. 28 we read “This study did not focus on, or distinguish between, particular ideologies or exposure to information from specific extremist and terrorist actors. Although we would not expect differences in information use patterns, it is conceivable that especially state unmotivated incidental exposure is more prevalent for ideologies that are embedded in the mainstream public discourse”. It would be good to test the results of this study using specific ideologies (e.g. Islamism, far-right, eco-radicalism) sharing common elements (enemy to fight, victims to protect and call urgent action) but coming from very different ideological tenets (See Orofino, Elisa. 2022. "Extremism (s) and Their Fight against Modernity: The Case of Islamists and Eco-Radicals." Religions 13 (8).)

- This study was conducted on general population and it served the purpose it was conceived for. However, it would be useful if future research could survey Prevent population (Channel adopted cases in the UK) to verify level of AS and IE to radicalising contents in the pathways towards violent actions (not terrorism) and extreme behaviours. Channel adopted cases are made up of people who have been referred to Counter-terrorism policing because holding extreme ideas but who have not committed any offence (yet). In the UK, these people are supported by an early de-radicalisation programme (Channel) tailored on their specific case.

-Finally, this research showed that individuals with higher AS of radicalising content also pursue other information goals, such as entertainment of social interaction, in settings where radicalizing content is available. This finding suggests that these people act as a vehicle to spread radicalising contents to others in all the platforms they navigate. As a result, more research on specific online ecosystems (e.g. bodybuilding websites, gaming platforms) is needed.

Reviewer #4: Thank you for the opportunity to review this article that explores the distinct patterns of incidental exposure (IE) and active selection (AS) of radicalizing content and their impact on radicalization outcomes. The article demonstrates a strong understanding of the relevant literature and presents an intriguing setting for investigation.

One important methodological concern I have with the article relates to the similarity between the items measuring the active selection and support for violent extremism. The potential overlap in meaning raises questions about whether active selection and support for VE may actually represent the same underlying construct. I suggest conducting a factor analysis that includes all relevant items, encompassing both AS and the support for VE, to assess their distinctiveness.

Additionally, the results, which present correlations rather than causality or directionality, appear somewhat self-evident. It is reasonable to expect that individuals supporting violent extremism would actively seek content that aligns with their views online. Therefore, it is crucial to address whether AS and support for VE truly measure different constructs or if they both reflect the same violent extremist attitudes/intentions.

Despite these concerns, the article contributes to the research community by highlighting the importance of examining different types of exposure and distinguishing between AS and support for VE. However, I recommend that the authors address the key concern regarding the potential overlap in measurement constructs before publication. This clarification will enhance the article's impact and ensure its methodological rigor.

**********

6. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy.

Reviewer #1: Yes: Anita Amaliyah

Reviewer #2: No

Reviewer #3: No

Reviewer #4: No

**********

[NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.]

While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/. PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at figures@plos.org. Please note that Supporting Information files do not need this step.

PLoS One. 2024 Feb 14;19(2):e0293810. doi: 10.1371/journal.pone.0293810.r002

Author response to Decision Letter 0


27 Sep 2023

Responses to Reviewer Comments

We thank all reviewers for their thoughtful comments, which have helped to improve the quality of the manuscript. In addition to the changes detailed below, we have revised the manuscript to improve readability and style.

Reviewer 1

1) Reviewer 1 noted that the sample should be described in more detail.

We agree that sample descriptions should always be as comprehensive as possible. We, therefore, had included in the original paper information about participants’ age, gender, and ethnicity. We had also directed readers to the Supplementary Material (specifically S1), which is available through the link to the OSF project page (shared before the sample description), where more information about participants’ level of education, work status, religion, citizenship, and immigration status is presented. We believe that the aforementioned information provides a detailed description of the sample.

Reviewer 2

1) Reviewer 2 highlighted that practical implications of the results are not discussed in sufficient detail. They asked us to address results in the context of UK PCVE efforts.

We agree that it is crucial to discuss practical implications of the findings. Although the data were collected in the UK, we aimed to provide broader points of discussion and, thus, did not focus on the UK explicitly. We added the following two paragraphs to explore implications for risk assessment and PCVE efforts that are implemented online, specifically redirection projects.

“Any practical implications that are based on one study or analysis can only be preliminary. We nevertheless believe that the results inform two fields of practice. First, we contribute insights to the development of individual risk assessment tools that aim to identify those vulnerable to violent extremism before they commit violence (Pressman & Davis, 2022). These tools (e.g., VERA(2) (Pressman & Flockton, 2012); TRAP-18 (Meloy et al., 2021)) typically include a wide variety of risk or protective factors, such as grievances and ideological commitment, criminal history, mental health, or the presence of a social support system. Previous research has further developed approaches to assess individuals’ risk based on textual digital trace data (i.e., linguistic risk assessment; Ebner et al., 2012; Cohen et al., 2014). Our findings suggest that information use behavior, which is to some extent observable, should be considered as well, and in a more nuanced way, in individual risk assessment and management. Namely, we showed that evidence of patterns of only incidental exposure to radicalizing material might be less of a concern, especially if it remains temporary (i.e., individuals are not likely to be embedded in environments where radicalizing messages are regularly disseminated). In turn, information use behavior defined by even a low probability of active selection of radicalizing content online or offline likely indicates stronger support for violent extremism which could manifest in acts of terrorism. Here, efforts to prevent radicalization are especially pertinent.

Perhaps somewhat ironically, in online settings, the fact that individuals actively seek radicalizing information could provide an avenue for targeted prevention. Notably, redirect(ion) projects, which have been implemented in collaboration with large social media platforms, use the search of keywords that are thought to be indicative of (violent) extremist or terrorist actors and narratives as a cue to provide counter-narratives or offer support by civil society organizations specialized in disengagement (Saltman et al., 2021). Evaluations of past programs highlight that their implementation is not without challenges (Helmus & Klein, 2018; Moonshot CVE, 2020). However, our results indicate that using the active search for radicalizing content as one of several indicators of risk is highly promising.” p. 21-22

2) Reviewer 2 also remarked that it would be helpful to introduce other theoretical frameworks (rather than the uses and gratification approach) to provide a rationale for the active selection of belief-congruent information.

We thank the reviewer for pointing us to those theories that were not yet familiar with. We removed the reference to uses and gratification theories and added a concise rationale grounded in the psychological immune system approach and Meaning Maintenance Model.

“In addition to being incidentally exposed, individuals also actively seek out content, sources, and media. Substantial evidence documents a general preference for information that aligns with existing beliefs and convictions (dissonance theory; Festinger, 1962). One reason for the active selection of belief-congruent information is the defense of one’s sense of self (Porot & Mandelbaum, 2021) and avoidance of threats to one’s self-image (psychological immune system; Gilbert, et al., 1998). The Meaning Maintenance Model (Heine et al., 2006) further stipulates that individuals “are inexhaustible meaning makers” (p. 91) and strive to keep previously established meaning frameworks intact; actively selecting information that confirms one’s beliefs might serve as a strategy to achieve this.” (p. 6)

3) Additionally, Reviewer 2 pointed out that the results for the additional measures of support for violent extremism were not available in the supplementary material.

We believe that this might have been a misunderstanding. The file “S2 Between-group Comparisons for Additional Measures for Violent Extremism.docx” in the folder ‘Supplementary Material’ on the OSF project page includes precisely the information that the reviewer had hoped to find (see https://osf.io/zb2ux).

4) Further, Reviewer 2 asked us to provide more information about the platform that we used for data collection, especially what data quality can be expected.

Responding to this comment, we added a reference to a recent paper that described the use of platforms such as Prolific for the study of violent extremism. Additionally, we added a sentence highlighting that we chose Prolific because it is expected to provide high-quality data.

“Data were collected in September 2021 on Prolific Academic, an online opt-in access panel (Clemmow et al., 2023b). We choose Prolific as a platform for recruiting participants because it has been consistently found to provide high(er)-quality data, especially as compared to other providers such as Amazon Mechanical Turk and CloudResearch (Douglas et al., 2023; Eyal et al., 2022).” (p. 10-11)

5) Lastly, Reviewer 2 made us aware of a typo on page 21, which we corrected.

Reviewer 3

1) The reviewer pointed out that no references were included in the abstract, and they suggested useful works to be added.

References were not included in the abstract to comply with the journal formatting requirements. On page 3, where the same argument is made again, we do provide several references (Bouhana & Wikström, 2010; Clemmow et al., 2022; Clemmow et al., 2023a; Gill et al., 2015; Hassan et al., 2018; Pauwels & Hardyns, 2018; Pauwels & Heylen, 2020; Pauwels & Schils, 2016; Perry et al., 2018; Rushchenko, 2019; Schils & Pauwels, 2016; Trujillo et al., 2009). We added to this list on page 3 the two recommended works.

2) Reviewer 3 further noted that the definition of radicalization that we provided is too narrow as it suggests that the latter is a natural path towards violence.

We adjusted the wording of the definition and included the recommended book as a reference.

“Radicalization refers to a process during which individuals adopt extremist attitudes and, in some but not all instances, “come to perceive acts of terrorism as a possible alternative for action” (Wikström & Bouhana, 2016, p. 176; see also Orofino & Allcorn, 2023).” p. 2

3) Further, reviewer 3 highlighted that it would be useful to replicate the study while focusing on specific ideologies.

We agree with this observation, although it is not something that can be achieved in the present research. We extended the call for replications in the discussion by adding a note on ‘different ideologies’:

“Going forward, the patterns that we have identified should be replicated across specific types of radicalizing content and ideologies.” p. 23

4) Reviewer 3 also reminded us that the study should be ideally replicated in a sample that is known to have adopted extremist beliefs to such a degree that it warrants support by a de-radicalization program.

We fully agree with this recommendation and extended the suggestions for future research in the following way: “Lastly, it is recommended to explore the research questions with other samples, notably, populations that have adopted (violent) extremist beliefs more strongly than the general population (e.g., individuals who are part of a de-radicalization program) or individuals who have committed or prepared acts of terrorism. In those instances, we would expect the absence of information use patterns that are defined by a near zero probability of incidental exposure to and active selection of radicalizing information or only evidence of incidental exposure.” p. 23

5) Lastly, Reviewer 3 highlighted that the findings might suggest that a higher likelihood of active selection of radicalizing information predicts the dissemination of the latter in other (online and offline) contexts.

We believe that this conclusion is not fully supported by the data, and we are, therefore, hesitant to make it (or add it to the manuscript). We do not have data on what participants do with the information that they actively select; future research could, of course, add such questions.

Reviewer 4

1) Reviewer 4 noted that it is crucial to document that the concepts of IS, AS, as well as the dependent variables are distinct. They recommended that we conduct a factor analysis to confirm that the measured concepts do not ‘overlap’.

We agree with the reviewer and thank them for raising the point. We report an exploratory factor analysis with oblimin rotation in the Supplementary Material (S5) that documents that the scales capturing active selection and incidental exposure assess distinct concepts and that both are distinct from the concept examined with the outcome measures – support for violent extremism. The exploratory factor analysis also shows that all items of the radicalism intentions sub-scale and the violent extremist attitudes scale loaded on one factor, which explains why results for both measures are highly similar. We added a note indicating this point in the manuscript (with a reference to Supplementary Material S5).

“The highly similar result pattern for both outcome variables is not surprising; indeed, an exploratory factor analysis with oblimin rotation showed that all items measuring the two dependent measures loaded on one factor (Supplementary Material S5).” p. 18

Attachment

Submitted filename: Reviewer responses PLOS One.docx

Decision Letter 1

Daniel W Snook

20 Oct 2023

Distinct patterns of incidental exposure to and active selection of radicalizing information indicate varying levels of support for violent extremism

PONE-D-23-12940R1

Dear Dr. Schumann,

Your revised manuscript entitled "Distinct Patterns of Incidental Exposure to and Active Selection of Radicalizing Information Indicate Varying Levels of Support for Violent Extremism", which you submitted to PLOS One, has been reviewed.

I have been assigned to be the Guest Academic Editor for this manuscript and am pleased to inform you that following the revisions you have made in response to reviewer comments, your manuscript has been judged scientifically suitable for publication and will be formally accepted for publication once it meets all outstanding technical requirements. Congratulations! Thank you for submitting your work for consideration. 

The comments provided by other reviewers, as well as my own review (to preserve transparency I inform you that I was Reviewer 2) and critical assessment, demonstrate that this work is worthy of publication for several reasons. First, your paper contributes meaningfully to understanding on a critical topic in the understanding of violent extremism: the role of exposure to and pursuit of radicalizing materials in the online context. Second, the methods and analyses you have used are appropriate for the hypotheses, statistically rigorous, and well documented in the main and supplementary materials. Finally, your conclusions are presented in an appropriate fashion, are supported by the data, and are contextualized within the broader literature in a way that will be of use to violent extremism researchers and PCVE practitioners.

Within one week, you’ll receive an e-mail detailing the required amendments. When these have been addressed, you’ll receive a formal acceptance letter and your manuscript will be scheduled for publication.

An invoice for payment will follow shortly after the formal acceptance. To ensure an efficient process, please log into Editorial Manager at http://www.editorialmanager.com/pone/, click the 'Update My Information' link at the top of the page, and double check that your user information is up-to-date. If you have any billing related questions, please contact our Author Billing department directly at authorbilling@plos.org.

If your institution or institutions have a press office, please notify them about your upcoming paper to help maximize its impact. If they’ll be preparing press materials, please inform our press team as soon as possible -- no later than 48 hours after receiving the formal acceptance. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact onepress@plos.org.

Thank you again for submitting this manuscript!

Kind regards,

Daniel W. Snook, Ph.D.

Assistant Professor of Experimental Psychology

Department of Psychology

Florida Gulf Coast University

Guest Editor

PLOS ONE

Additional Editor Comments (optional):

Reviewers' comments:

Acceptance letter

Daniel W Snook

25 Oct 2023

PONE-D-23-12940R1

Distinct Patterns of Incidental Exposure to and Active Selection of Radicalizing Information Indicate Varying Levels of Support for Violent Extremism

Dear Dr. Schumann:

I'm pleased to inform you that your manuscript has been deemed suitable for publication in PLOS ONE. Congratulations! Your manuscript is now with our production department.

If your institution or institutions have a press office, please let them know about your upcoming paper now to help maximize its impact. If they'll be preparing press materials, please inform our press team within the next 48 hours. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information please contact onepress@plos.org.

If we can help with anything else, please email us at plosone@plos.org.

Thank you for submitting your work to PLOS ONE and supporting open access.

Kind regards,

PLOS ONE Editorial Office Staff

on behalf of

Dr. Daniel W. Snook

Guest Editor

PLOS ONE

Associated Data

    This section collects any data citations, data availability statements, or supplementary materials included in this article.

    Supplementary Materials

    Attachment

    Submitted filename: Reviewer responses PLOS One.docx

    Data Availability Statement

    All relevant data are available on the Open Science Framework at https://osf.io/jxsva/.


    Articles from PLOS ONE are provided here courtesy of PLOS

    RESOURCES