Combating Violent Extremism and Radicalization in the Digital Era

[1]  P. Costa,et al.  A contemplated revision of the NEO Five-Factor Inventory , 2004 .

[2]  Kris Christmann,et al.  Preventing Religious Radicalisation and Violent Extremism: A Systematic Review of the Research Evidence , 2012 .

[3]  S. Srivastava,et al.  The Big Five Trait taxonomy: History, measurement, and theoretical perspectives. , 1999 .

[4]  Dawn M. Cappelli,et al.  The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures , 2008, Insider Attack and Cyber Security.

[5]  M. L. Cooper,et al.  Motivational pursuits in the context of human sexual relationships. , 2011, Journal of personality.

[6]  Larissa L. Smith,et al.  Invariance on the NEO PI-R Neuroticism Scale , 2001 .

[7]  Eliot H. Rich,et al.  Simulating Insider Cyber-Threat Risks : A Model-Based Case and a Case-Based Model , 2005 .

[8]  Jennifer L. Skeem,et al.  Assessing callous-unemotional traits in adolescent offenders: validation of the Inventory of Callous-Unemotional Traits. , 2008, International journal of law and psychiatry.

[9]  Pei Wang,et al.  Psychometric structure of the Chinese Multiethnic Adolescent Cultural Identity Questionnaire. , 2014, Psychological assessment.

[10]  Samuel D. Gosling,et al.  Manifestations of Personality in Online Social Networks: Self-Reported Facebook-Related Behaviors and Observable Profile Information , 2011, Cyberpsychology Behav. Soc. Netw..

[11]  Bernd Marcus,et al.  Antecedents of counterproductive behavior at work: a general perspective. , 2004, The Journal of applied psychology.

[12]  Frank H Wilhelm,et al.  How to Bite Your Tongue Without Blowing Your Top: Implicit Evaluation of Emotion Regulation Predicts Affective Responding to Anger Provocation , 2006, Personality & social psychology bulletin.

[13]  F. Moghaddam The staircase to terrorism: a psychological exploration. , 2005, The American psychologist.

[14]  Delroy L. Paulhus,et al.  Toward a Taxonomy of Dark Personalities , 2014 .

[15]  Therese A. Sprinkle,et al.  Clarifying the Relational Ties of Organizational Belonging , 2014 .

[16]  Millicent Chang,et al.  Late Disclosure of Insider Trades: Who Does It and Why? , 2014, Journal of Business Ethics.

[17]  Bertjan Doosje,et al.  Determinants of radicalization of Islamic youth in the Netherlands: personal uncertainty, perceived injustice, and perceived group threat , 2013 .

[18]  Kamaldeep Bhui,et al.  Is Violent Radicalisation Associated with Poverty, Migration, Poor Self-Reported Health and Common Mental Disorders? , 2014, PloS one.

[19]  R. Nisbett,et al.  Culture Of Honor: The Psychology Of Violence In The South , 2019 .

[20]  Dawn M. Cappelli,et al.  A Preliminary Model of Insider Theft of Intellectual Property , 2011 .

[21]  Oliver Brdiczka,et al.  A Bayesian Network Model for Predicting Insider Threats , 2013, 2013 IEEE Security and Privacy Workshops.

[22]  Yuri Miyamoto,et al.  Cultural differences in the dialectical and non-dialectical emotional styles and their implications for health , 2011, Cognition & emotion.

[23]  Elena Mastors,et al.  Omar al-Hammami: a case study in radicalization. , 2014, Behavioral sciences & the law.

[24]  R. Bagby,et al.  Relative effectiveness of the standard validity scales in detecting fake-bad and fake-good responding: Replication and extension. , 1995 .

[25]  M. Quirin,et al.  An Alternative to Self-Reports of Trait and State Affect The Implicit Positive and Negative Affect Test (IPANAT) , 2014 .

[26]  A. Silke Radicalization Holy Warriors: Exploring the Psychological Processes of Jihadi , 2008 .

[27]  S. Lilienfeld,et al.  The Scientific Status of Projective Techniques , 2000, Psychological science in the public interest : a journal of the American Psychological Society.

[28]  W. Mischel,et al.  A cognitive-affective system theory of personality: reconceptualizing situations, dispositions, dynamics, and invariance in personality structure. , 1995, Psychological review.

[29]  E. Deci,et al.  The "What" and "Why" of Goal Pursuits: Human Needs and the Self-Determination of Behavior , 2000 .

[30]  Maria Krambia-Kapardis,et al.  Enhancing fraud prevention and detection by profiling fraud offenders. , 2004, Criminal behaviour and mental health : CBMH.

[31]  Richard E. Lucas,et al.  Personality development across the life span: longitudinal analyses with a national sample from Germany. , 2011, Journal of personality and social psychology.

[32]  C. Duggan Does personality change and, if so, what changes? , 2004, Criminal behaviour and mental health : CBMH.

[33]  Sadie Creese,et al.  Understanding Insider Threat: A Framework for Characterising Attacks , 2014, 2014 IEEE Security and Privacy Workshops.

[34]  Oliver C. Schultheiss,et al.  Measuring implicit motives. , 2007 .

[35]  C. Wan,et al.  Cultural knowledge, category label, and social connections: Components of cultural identity in the global, multicultural context , 2013 .

[36]  E. S. Conklin Human Motivation , 1932, The Journal of Religion.

[37]  K. Fiedler,et al.  Unresolved problems with the “I”, the “A”, and the “T”: A logical and psychometric critique of the Implicit Association Test (IAT) , 2006 .

[38]  Arie W Kruglanski,et al.  Groups as epistemic providers: need for closure and the unfolding of group-centrism. , 2006, Psychological review.

[39]  David C. McClelland,et al.  How Do Self-Attributed and Implicit Motives Differ?. , 1989 .

[40]  J. Laurenceau,et al.  Integrating the dynamics of personality and close relationship processes: methodological and data analytic implications. , 2011, Journal of personality.

[41]  Neil Harrington,et al.  The Frustration Discomfort Scale: development and psychometric properties , 2005 .

[42]  Albert Bandura,et al.  The role of selective moral disengagement in terrorism and counterterrorism. , 2004 .

[43]  L. Treviño,et al.  WHY EMPLOYEES DO BAD THINGS: MORAL DISENGAGEMENT AND UNETHICAL ORGANIZATIONAL BEHAVIOR , 2012 .

[44]  Dawn M. Cappelli,et al.  The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes , 2012 .

[45]  D. McFarland,et al.  Theory of motivation (Second edition)R. Bolles, Harper & Row, New York (1975). pp. 568 , 1976, Neuroscience.

[46]  James M. LeBreton,et al.  Predicting counterproductive work behaviors with sub-clinical psychopathy: Beyond the Five Factor Model of personality , 2013 .

[47]  J. Salgado The Big Five Personality Dimensions and Counterproductive Behaviors , 2002 .

[48]  M. Dacin,et al.  Psychological Pathways to Fraud: Understanding and Preventing Fraud in Organizations , 2011 .

[49]  Terrorism, Violence, and Hope for Peace , 2008 .

[50]  S. Nolen-Hoeksema,et al.  The Other End of the Continuum: The Costs of Rumination , 1998 .

[51]  R. Trivers,et al.  The evolution and psychology of self-deception. , 2011, The Behavioral and brain sciences.

[52]  Dieter Gollmann,et al.  Insider Threats in Cyber Security , 2010, Insider Threats in Cyber Security.

[53]  I. Kirsch,et al.  Reaction time as a predictor of imaginative suggestibility and hypnotizability. , 2001 .

[54]  Arie W. Kruglanski,et al.  The Psychology of Radicalization and Deradicalization: How Significance Quest Impacts Violent Extremism , 2014 .

[55]  Bernd Marcus,et al.  PERSONALITY DIMENSIONS EXPLAINING RELATIONSHIPS BETWEEN INTEGRITY TESTS AND COUNTERPRODUCTIVE BEHAVIOR: BIG FIVE, OR ONE IN ADDITION? , 2007 .

[56]  C. L. Hull Principles of Behavior , 1945 .

[57]  D. Winter Motivation and the Escalation of Conflict: Case Studies of Individual Leaders , 2004 .

[58]  David T. Neal,et al.  A new look at habits and the habit-goal interface. , 2007, Psychological review.

[59]  Vincent Egan,et al.  Moral disengagement, the dark triad, and unethical consumer attitudes , 2015 .

[60]  David G. Winter,et al.  Leader Appeal, Leader Performance, and the Motive Profiles of Leaders and Followers: A Study of American Presidents and Elections , 1987 .

[61]  J. Belsky,et al.  Theory testing, effect-size evaluation, and differential susceptibility to rearing influence: the case of mothering and attachment. , 1997, Child development.

[62]  Paul R. Sackett,et al.  Citizenship and Counterproductive Behavior: Clarifying Relations Between the Two Domains , 2006 .

[63]  J. Holsappel,et al.  Translating Conceptualizations Into Practical Suggestions: What the Literature on Radicalization Can Offer to Practitioners , 2014 .

[64]  Suzonne M. Kline,et al.  Reliability of risk assessment measures used in sexually violent predator proceedings. , 2012, Psychological assessment.

[65]  H. Spencer The Principles of Psychology - Vol. I , 2016 .

[66]  E. Leibenluft,et al.  The Affective Reactivity Index: a concise irritability scale for clinical and research settings , 2012, Journal of child psychology and psychiatry, and allied disciplines.