Working Paper: Designing Narrative-Based CVE Products With A Structured Professional Judgment Approach
Keywords:Counternarratives, Countering Violent Extremism (CVE), Alternative Narratives, Structured Professional Judgment Approach (SPJ)
Inspired by methods used in risk assessment, this paper suggests a structured professional judgment approach (SPJ) to facilitate the decision-making process in expert group settings tasked with the development of narrative-based countering violent extremism (CVE) products. The added value of this concept is to systematically apply the relevant knowledge distributed among the literature and identify the strengths and weaknesses of the narrative-based CVE product in early stages like the baseline assessment. This may enable campaigners to avoid expensive mistakes and accelerate the development of products. A tentative checklist is provided. Furthermore, indicators for monitoring and evaluation are suggested.
Beerli, A., & Santana, J. D. M. (1999). Design and validation of an instrument for measuring advertising effectiveness in the printed media. Journal of Current Issues & Research in Advertising, 21(2), 11-30. https://doi.org/10.1080/10641734.1999.10505092
Beutel, A., Weine, S., Saeed, A., Mihajlovic, A., Stone, A., Beahrs, J., & Shanfield, S. (2016). Guiding principles for countering and displacing extremist narratives. Contemporary Voices: St Andrews Journal of International Relations, 7(3). http://doi.org/10.15664/jtr.1220
Bjørgo, T. (2011). Dreams and disillusionment: Engagement in and disengagement from militant extremist groups. Crime, law and social change, 55(4), 277-285. https://doi.org/10.1007/s10611-011-9282-9
Braddock, K., & Horgan, J. (2016). Towards a guide for constructing and disseminating counternarratives to reduce support for terrorism. Studies in Conflict & Terrorism, 39(5), 381-404. https://doi.org/10.1080/1057610x.2015.1116277
Briggs, R., & Feve, S. (2013). Review of programs to counter narratives of violent extremism. Retrieved June 2nd, 2020 from https://core.ac.uk/download/pdf/30675430.pdf.
Casebeer, W. D., & Russell, J. A. (2005). Storytelling and terrorism: Towards a comprehensive counter-narrative strategy. NAVAL Postgraduate School Monterey CA Center for Contemporary Conflict; Strategic Insights, v. 4, issue 3. Retrieved May 31st, 2020 from https://apps.dtic.mil/dtic/tr/fulltext/u2/a521449.pdf.
Cereal Entrepreneur - Jordan Steen (April 30th, 2018). Facebook Analytics Tutorial 2018. Retrieved November 4th, 2019 from https://www.youtube.com/watch?v=bEyBNWB3EwM.
Chermack, T. J., & Lynham, S. A. (2002). Definitions and outcome variables of scenario planning. Human Resource Development Review, 1(3), 366-383. https://doi.org/10.1177/1534484302013006
Cook, J., & Lewandowsky, S. (2011). The debunking handbook. Sevloid Art.
CSEP (2019). The nine essentials to consider while engaging in online P/CVE campaigning. Retrieved May 5th, 2020 from https://ec.europa.eu/home-affairs/sites/homeaffairs/files/what-we-do/networks/radicalisation_awareness_network/rancsep/docs/csep_campaigns_event_ex_post_brussel_31012019_en.pdf.
Douglas, K. S., Hart, S. D., Webster, C. D., Belfrage, H., Guy, L. S., & Wilson, C. M. (2014). Historical-clinical-risk management-20, version 3 (HCR-20V3): development and overview. International Journal of Forensic Mental Health, 13(2), 93-108. https://doi.org/10.1080/14999013.2014.906519
European Commission (2016). Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions: Supporting the prevention of radicalisation leading to violent extremism: COM/2016/0379 final. Retrieved May 5th, 2020 from https://eur-lex.europa.eu/legal-content/en/TXT/?uri=CELEX%3A52016DC0379.
Feinberg, M., & Willer, R. (2015). From gulf to bridge: when do moral arguments facilitate political influence?. Personality and Social Psychology Bulletin, 41(12), 1665-1681. https://doi.org/10.1177/0146167215607842
Funnell, S. C., & Rogers, P. J. (2011). Purposeful program theory: Effective use of theories of change and logic models. John Wiley & Sons.
Godet, M., & Roubelat, F. (1996). Creating the future: the use and misuse of scenarios. Long range planning, 29(2), 164-171. https://doi.org/10.1016/0024-6301(96)00004-0
Gómez, Á., López-Rodríguez, L., Sheikh, H., Ginges, J., Wilson, L., Waziri, H., Vázquez, A., Davis, R. & Atran, S. (2017). The devoted actor’s will to fight and the spiritual dimension of human conflict. Nature Human Behaviour,1(9), 673-679. https://doi.org/10.1038/s41562-017-0193-3
Hall, J. (December 27th, 2017). Google Analytics Beginners Tutorial. Retrieved November 4th, 2019 from https://www.youtube.com/watch?v=P3V01bDbIR0.
Hart, S. D., Cook, A. N., Pressman, D. E., Strang, S., & Lim, Y. L. (2017). A concurrent evaluation of threat assessment tools for the individual assessment of terrorism. Waterloo, Ontario: Canadian Network for Research on Terrorism, Security, and Society.
Hart, S. D., & Logan, C. (2011). Formulation of violence risk using evidence-based assessments: The structured professional judgment approach. In P. Sturmey & M. McMurran (Eds.) Forensic case formulation, 83-106. Chichester, UK: Wiley-Blackwell.
Holmer, G. (2013). Countering violent extremism: A peacebuilding perspective. US Institute of Peace, Retrieved November 22nd, 2020 from https://www.icnl.org/wp-content/uploads/Transnational_CVEUSIP.pdf.
Kemmis, A. (2019). The Difference Between Direct and Organic Website Traffic Sources. Retrieved November 4th 2019 from https://www.smartbugmedia.com/blog/what-is-the-difference-between-direct-and-organic-search-traffic-sources.
Lenos, S., Haanstra, W., Keltjens, M., & van de Donk, M. (2017). RAN Polarisation Management Manual. Retrieved November 24th, 2020 from https://ec.europa.eu/home-affairs/sites/homeaffairs/files/what-we-do/networks/radicalisation_awareness_network/ran-papers/docs/ran_polarisation_management_manual_amsterdam_06072017_en.pdf.
Lewandowsky, S., Ecker, U. K., Seifert, C. M., Schwarz, N., & Cook, J. (2012). Mis-information and its correction: Continued influence and successful debiasing. Psychological Science in the Public Interest, 13(3), 106-131. https://doi.org/10.1177/1529100612451018. Retrieved November 21st, 2019 from https://dornsife.usc.edu/assets/sites/780/docs/12_pspi_lewandowsky_et_al_misinformation.pdf.
Kahneman, D. (2011). Thinking, fast and slow. Macmillan.
Koehler, D. (2017). Understanding deradicalization: Methods, tools and programs for countering violent extremism. Taylor & Francis.
Kumkale, G. T., & Albarracín, D. (2004). The Sleeper Effect in Persuasion: A Meta-Analytic Review. Psychological bulletin, 130(1), 143- 172. https://doi.org/10.1037/0033-2909.130.1.143
Mattei, C. & Zeiger, S. (2018). Evaluate your CVE results: Projecting your impact. Hedayat. Retrieved November 21st, 2020 from http://www.hedayahcenter.org/Admin/Content/File-16720189339.pdf.
Meines, M. (2017). How to measure the impact of your online counter or alternative narrative campaign. Retrieved November 4th 2019 from https://ec.europa.eu/home-affairs/sites/homeaffairs/files/docs/pages/201702_ran_how_to_measure_impact_of_online_campaign_en.pdf.
Meines, M. & Ritzmann A. (2018). Checklist of relevant mental biases and mechanisms for developing counter or alternative narratives. Retrieved November 4th 2019 from https://ec.europa.eu/home-affairs/sites/homeaffairs/files/what-we-do/networks/radicalisation_awareness_network/about-ran/ran-c-and-n/docs/ran_c_n_checklist_relevant_mental_biases_vienna7-8_02_2018_en.pdf.
Mohlenkamp, M., Wouterse, L., & Gielen, A., J. (2018). Guideline evaluation of PCVE programmes and interventions. Retrieved May 27th 2020 from https://ec.europa.eu/home-affairs/sites/homeaffairs/files/what-we-do/networks/radicalisation_awareness_network/ran-papers/docs/ms_workshops_guidelines_evaluation_of_pcve_programmes_and_interventions_july_2018_en.pdf.
Monahan, J. (2012). The individual risk assessment of terrorism. Psychology, Public Policy, and Law, 18(2), 167-205. https://doi.org/10.1037/a0025792
Mooi, E., Sarstedt, M., & Mooi-Reci, I. (2018). Market research: The process, data, and methods using stata. Springer Nature Singapore.
Pressman, Duits, Rinne & Flockton (2018). Violent Extremism Risk Assessment Version 2 Revised. Utrecht: NIFP.
RAN, Brown, K., E., & Marway, H. (2019). Preventing Radicalization to Terrorism and Violent Extremism: Delivering counter- or alternative narratives. Retrieved May 31st, 2020 from https://ec.europa.eu/home-affairs/sites/homeaffairs/files/what-we-do/networks/radicalisation_awareness_network/ran-best-practices/docs/delivering_alternative_narratives_en.pdf.
RAN, van de Donk, M., & Lenos, S. (2019). Preventing Radicalization to Terrorism and Violent Extremism: Approaches and Practices. Retrieved May 31st, 2020 from https://ec.europa.eu/home-affairs/sites/homeaffairs/files/what-we-do/networks/radicalisation_awareness_network/ran-best-practices/docs/ran_collection-approaches_and_practices_en.pdf.
Reed, A. G., Ingram, H. J., & Whittaker, J. (2017). Countering terrorist narratives. Retrieved May 31st, 2020 from www.europarl.europa.eu/RegData/etudes/STUD/2017/596829/IPOL_STU(2017)596829_EN.pdf.
Reynolds, L., & Tuck, H. (2016). The Counter-Narrative Monitoring & Evaluation Handbook. Institute for Strategic Dialogue. Retrieved March 15 th, 2019 from https://www.isdglobal.org/wp-content/uploads/2017/06/CN-Monitoring-and-Evaluation-Handbook.pdf.
Ritzmann, A. (2017). RAN guidelines for effective alternative and counter-narrative campaigns (GAMMMA+). Retrieved November 4th, 2019 from https://ec.europa.eu/home-affairs/sites/homeaffairs/files/what-we-do/networks/radicalisation_awareness_network/about-ran/ran-c-and-n/docs/ran_cn_guidelines_effective_alternative_counter_narrative_campaigns_31_12_2017_en.pdf.
Ritzmann, A., Wouterse, L., & Verdegaal, M. (2019). Effective Narratives: Updating the GAMMMA+ model. Retrieved May 29th, 2020 from https://ec.europa.eu/home-affairs/sites/homeaffairs/files/what-we-do/networks/radicalisation_awareness_network/about-ran/ran-c-and-n/docs/ran_cn_academy_creating_implementing_effective_campaigns_brussels_14-15112019_en.pdf.
Sadowski, F., Rossegger, A., Pressman, E., Rinne, T., Duits, N., & Endrass, J. (2017). Das Violent Extremism Risk Assessment Version 2 Revised (VERA-2R): eine Skala zur Beurteilung des Risikos extremistischer Gewalt; Deutsche Übersetzung. Kriminalistik, (5), 335-342.
Safe Space Group (2015). Open your Eyes. Retrieved February 17th, 2020 from https://openyoureyes.net.
Tuck, H. (2017). Measuring the impact of your online counter or alternative narrative campaign message. Retrieved November 4th, 2019 from https://www.voxpol.eu/measuring-impact-online-counter-alternative-narrative-campaign-message/.
Tuck, H., & Silverman, T. (2016). The Counter-Narrative Handbook. London: Institute for Strategic Dialogue. Retrieved March 1st , 2019 from https://www.isdglobal.org/wp-content/uploads/2016/06/Counter-narrative-Handbook_1.pdf.
Turn (2016). Jamal Al-Khatib: Mein Weg. Retrieved February 17 th, 2020 from https://www.boja.at/projekte/flucht/jamal-al-khatib-paedagogisches-paket/.
UN WOMEN (2012). What is a baseline assessment?. Retrieved November 24th, 2020 from https://www.endvawnow.org/en/articles/1323-what-is-a-baseline-assessment.html.
Van der Heide, L., & Schuurman, B. (2018). Reintegrating terrorists in the Netherlands: Evaluating the Dutch approach. Journal for Deradicalization, (17), 196-239.
Van Notten, P. W., Rotmans, J., Van Asselt, M. B., & Rothman, D. S. (2003). An updated scenario typology. Futures, 35(5), 423-443. https://doi.org/10.1016/s0016-3287(02)00090-3
Wouterse, L. & Verdegaal, M. (2019). Monitoring & Evaluating counter-and alternative narrative campaigns. Retrieved November 21st, 2019 from https://ec.europa.eu/home-affairs/sites/homeaffairs/files/what-we-do/networks/radicalisation_awareness_network/about-ran/ran-c-and-n/docs/ran_cn_ex_post_evaluating_campaigns_berlin_210219_22_en.pdf.
The JD Journal for Deradicalization uses a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND) Licence. You are free to share - copy and redistribute the material in any medium or format under the following conditions:
Attribution — You must give appropriate credit, provide a link to the license, andindicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
NonCommercial — You may not use the material for commercial purposes.
NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material.