<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1794-3108</journal-id>
<journal-title><![CDATA[Revista Criminalidad]]></journal-title>
<abbrev-journal-title><![CDATA[Rev. Crim.]]></abbrev-journal-title>
<issn>1794-3108</issn>
<publisher>
<publisher-name><![CDATA[Policía Nacional de Colombia]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1794-31082021000200083</article-id>
<article-id pub-id-type="doi">10.47741/17943108.318</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Utilidad del estudio de los patrones de pensamiento en yihadistas españoles como mecanismo de prevención frente a la radicalización]]></article-title>
<article-title xml:lang="en"><![CDATA[Usefulness of the study of thought patterns in Spanish jihadists as a prevention mechanism against radicalization]]></article-title>
<article-title xml:lang="pt"><![CDATA[Utilidade do estudo de padrões de pensamento nos jiadistas espanhóis como mecanismo de prevenção contra a radicalização]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Galvis Doménech]]></surname>
<given-names><![CDATA[María José]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad de Valencia  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Spain</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>08</month>
<year>2021</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>08</month>
<year>2021</year>
</pub-date>
<volume>63</volume>
<numero>2</numero>
<fpage>83</fpage>
<lpage>98</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S1794-31082021000200083&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S1794-31082021000200083&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S1794-31082021000200083&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen El terrorismo yihadista se ha convertido en uno de los grandes retos a los que debe hacer frente nuestra sociedad en el siglo XXI. Para profundizar en su conocimiento, se han propuesto numerosas teorías acerca del proceso de radicalización que lleva a los individuos a emplear la violencia amparados en un pretexto ideológico-religioso. El objetivo de esta investigación es indagar en los patrones de pensamiento que presentan los yihadistas españoles como mecanismos desinhibitorios de la conducta radical. Su identificación podría resultar de utilidad para conocer cuál es el proceso cognitivo que experimentan, ya que podría emplearse como mecanismo de prevención frente al proceso de radicalización. Para ello, se realizó una búsqueda exhaustiva de las sentencias españolas publicadas en el CENDOJ sobre terrorismo yihadista en el periodo comprendido entre 2015 y 2017. Se analizó el contenido del discurso que emitieron textualmente los yihadistas condenados y que estaban recogidos en los textos, imágenes y vídeos publicados por dichos sujetos. Se creó una base de datos para sintetizar los hallazgos y se contabilizó la frecuencia de aparición de los patrones de pensamiento expuestos en el instrumento de Saucier et al. (2009). Como resultado se obtuvo un total de 25 sentencias que contuvieron citas textuales suficientes referentes a la propaganda yihadista emitida por sus autores para investigar los patrones de pensamiento recurrentes. Los patrones que resultaron más frecuentes fueron el empleo de terminología militar en el discurso y la glorificación de la muerte por la causa que se defiende. La identificación de los patrones de pensamiento arrojó luz sobre la motivación para actuar de los yihadistas españoles condenados. Esta información puede ser útil frente a la radicalización al interpretar los mecanismos cognitivos que subyacen tras una serie de necesidades importantes que permiten a los individuos transgredir las normas morales y usar la violencia como expresión de una ideología radical.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract Jihadist terrorism has become one of the great challenges facing our society in the twenty-first century. To deepen their knowledge, numerous theories have been proposed about the process of radicalization that leads individuals to use violence under an ideological-religious pretext. Objective. The objective of this research is to investigate the thought patterns presented by Spanish jihadists as disinhibitory mechanisms of radical behavior. Its identification could be useful to know what is the cognitive process they experience, since it could be used as a prevention mechanism against the radicalization process. Methodology. An exhaustive search was carried out of the Spanish sentences published in the CENDOJ on jihadist terrorism in the period between 2015 and 2017. The content of the speech issued verbatim by the condemned jihadists and which were included in the texts, images and videos published by these subjects was analyzed. A database was created to synthesize the findings and the frequency of appearance of the thought patterns exposed in the instrument by Saucier, Akers, Shen-Miller, Knezevié, y Stanko (2009) was counted. Results. A total of 25 sentences were obtained that contained sufficient textual quotations referring to the jihadist propaganda issued by its authors to investigate the recurrent thought patterns. The patterns that were most frequent were the use of military terminology in speech and the glorification of death for the cause being defended. Discussion. The identification of thought patterns shed light on the motivation for action of the condemned Spanish jihadists. This information can be useful in the face of radicalization by interpreting the cognitive mechanisms that underlie a number of important needs that allow individuals to transgress moral norms and employ violence as an expression of a radical ideology.]]></p></abstract>
<abstract abstract-type="short" xml:lang="pt"><p><![CDATA[Resumo O terrorismo jihadista tornou-se um dos grandes desafios enfrentados por nossa sociedade no século XXI. Para aprofundar seus conhecimentos, inúmeras teorias têm sido propostas sobre o processo de radicalização que leva os indivíduos a usar a violência sob um pretexto ideológico-religioso. Objetivo. O objetivo desta pesquisa é investigar os padrões de pensamento apresentados pelos jiadistas espanhóis como mecanismos desinibitórios de comportamento radical. Sua identificação poderia ser útil para saber qual é o processo cognitivo que vivenciam, já que poderia ser usado como mecanismo de prevenção contra o processo de radicalização. Metodologia. Uma busca exaustiva foi realizada das sentenças espanholas publicadas no CENDOJ sobre terrorismo jihadista no período entre 2015 e 2017. O conteúdo do discurso emitido pelos jiadistas condenados e que foram incluídos nos textos, imagens e vídeos publicados por esses sujeitos foi analisado. Um banco de dados foi criado para sintetizar os achados e a frequência de aparecimento dos padrões de pensamento expostos no instrumento por Saucier, Akers, Shen-Miller, Knezevié e Stanko (2009) foi contada. Resultados. Foram obtidas 25 frases que continham citações textuais suficientes referentes à propaganda jihadista emitida por seus autores para investigar os padrões de pensamento recorrentes. Os padrões mais frequentes foram o uso da terminologia militar na fala e a glorificação da morte pela causa que está sendo defendida. Discussão. A identificação de padrões de pensamento lançou luz sobre a motivação para a ação dos jiadistas espanhóis condenados. Essas informações podem ser úteis diante da radicalização interpretando os mecanismos cognitivos que fundamentam uma série de necessidades importantes que permitem aos indivíduos transgredir normas morais e empregar a violência como expressão de uma ideologia radical.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Terrorismo]]></kwd>
<kwd lng="es"><![CDATA[prevención]]></kwd>
<kwd lng="es"><![CDATA[Pensamiento]]></kwd>
<kwd lng="es"><![CDATA[yihadismo]]></kwd>
<kwd lng="es"><![CDATA[radicalización]]></kwd>
<kwd lng="en"><![CDATA[Terrorism]]></kwd>
<kwd lng="en"><![CDATA[prevention]]></kwd>
<kwd lng="en"><![CDATA[Thought]]></kwd>
<kwd lng="en"><![CDATA[jihadism]]></kwd>
<kwd lng="en"><![CDATA[radicalization]]></kwd>
<kwd lng="pt"><![CDATA[Terrorismo]]></kwd>
<kwd lng="pt"><![CDATA[prevenção]]></kwd>
<kwd lng="pt"><![CDATA[Pensamento]]></kwd>
<kwd lng="pt"><![CDATA[jihadismo]]></kwd>
<kwd lng="pt"><![CDATA[radicalização]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alimi]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Relational dynamics in factorial adoption of terrorist tactics: a comparative perspective]]></article-title>
<source><![CDATA[Journal of Theoretical Society]]></source>
<year>2011</year>
<volume>40</volume>
<numero>95</numero>
<issue>95</issue>
<page-range>118</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bandura]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Social foundations of thought and action: a social cognitive theory]]></source>
<year>1986</year>
<publisher-name><![CDATA[Prentice-Hall]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bandura]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Social cognitive theory of selfregulation]]></article-title>
<source><![CDATA[Organizational Behavior and Human Decision Processes]]></source>
<year>1991</year>
<volume>50</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>248-87</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bandura]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Social cognitive theory: an agentic perspective]]></article-title>
<source><![CDATA[Asian Journal of Social Psychology]]></source>
<year>1999</year>
<volume>2</volume>
<page-range>21-41</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bandura]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Barbaranelli]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Caprara]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Pastorelli]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Mechanisms of moral disengagement in the exercise of moral agency]]></article-title>
<source><![CDATA[Journal of Personality and Social Psychology]]></source>
<year>1996</year>
<volume>71</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>364-74</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Borum]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Understanding the terrorist mindset]]></article-title>
<source><![CDATA[FBI Law Enforcement Bulletin]]></source>
<year>2003</year>
<page-range>7-10</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Borum]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Psychological vulnerabilities and propensities for involvement in violent extremism]]></article-title>
<source><![CDATA[Behavioral Sciences and the Law]]></source>
<year>2014</year>
<volume>32</volume>
<page-range>286-305</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cole]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Alison]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Cole]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Alison]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Guidance for identifying people vulnerable to recruitment into violent extremism]]></source>
<year>2013</year>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cole]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Cole]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Martyrdom: radicalization and terrorist violence among British Muslims]]></source>
<year>2009</year>
<publisher-name><![CDATA[Pennant Books]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cole]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Cole]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Alison]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Alison]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Free radicals: stopping extremists before they start]]></article-title>
<source><![CDATA[Jane&#8217;s Intelligence Review]]></source>
<year>2010</year>
<volume>22</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>18-21</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Collins]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[My Jihad: the true story of an American mujahid&#8217;s amazing journey from Usama Bin Laden&#8217;s training camps to counterterrorism with the FBI and CIA]]></source>
<year>2006</year>
<publisher-name><![CDATA[Manas]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cottee]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Hayward]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Terrorist (e) motives: the existential attractions of terrorism]]></article-title>
<source><![CDATA[Studies in Conflict &amp; Terrorism]]></source>
<year>2011</year>
<volume>34</volume>
<page-range>963-86</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Crenshaw]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The psychology of political terrorism: an agenda for the 21st century]]></article-title>
<source><![CDATA[Political Psychology]]></source>
<year>2000</year>
<volume>21</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>405-20</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Egan]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Cole]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Cole]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Alison]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Alison]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Warning]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Elntib]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Can you identify violent extremists using a screening checklist and open-source intelligence alone?]]></article-title>
<source><![CDATA[Journal of Threat Assessment and Management]]></source>
<year>2016</year>
<volume>3</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>21-36</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fiske]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Rai]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Virtuous Violence]]></source>
<year>2014</year>
<publisher-name><![CDATA[Cambridge University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Galvis]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Garrido]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Guardiola]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Tipologías del terrorista yihadista: análisis teórico desde un enfoque político-criminal. En Libro de actas del seminario internacional &#8220;El terrorismo en la actualidad: un nuevo enfoque políticocriminal&#8221;]]></source>
<year>2017</year>
<page-range>61-74</page-range><publisher-name><![CDATA[Dykinson]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[García-Pablos de Molina]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La prevención del delito en un estado social y democrático de derecho]]></article-title>
<source><![CDATA[Estudios Penales y Criminológicos]]></source>
<year>2012</year>
<volume>15</volume>
<page-range>79-98</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Garrido]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<source><![CDATA[Perfiles criminales: un recorrido por el lado oscuro del ser humano]]></source>
<year>2020</year>
<publisher-name><![CDATA[Ariel]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Giddens]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Modernity and Self-Identity Self and Society in the Late Modern Age]]></source>
<year>1991</year>
<publisher-name><![CDATA[Stanford University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gunaratna]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Understanding the challenge of ideological extremism]]></article-title>
<source><![CDATA[Discussion Papers]]></source>
<year>2008</year>
<volume>18</volume>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="">
<collab>HM Government</collab>
<source><![CDATA[Countering international terrorism: the United Kingdom's strategy]]></source>
<year>2006</year>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="">
<collab>HM Government</collab>
<source><![CDATA[Prevent strategy]]></source>
<year>2011</year>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[James]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<source><![CDATA[The moral equivalent of war. Essays in Religion and Morality]]></source>
<year>1982</year>
<publisher-name><![CDATA[Harvard University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Javaid]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[National consensual narrative against terrorism]]></article-title>
<source><![CDATA[Journal of Political Studies]]></source>
<year>2015</year>
<volume>22</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>383-98</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kebbell]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Porter]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An intelligence assessment framework for identifying individuals at risk of committing acts of violent extremism against the West]]></article-title>
<source><![CDATA[Security Journal]]></source>
<year>2012</year>
<volume>25</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>212-28</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Klausen]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Campion]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Needle]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Nguyen]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Libretti]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Toward a behavioral model of &#8220;homegrown&#8221; radicalization trajectories]]></article-title>
<source><![CDATA[Studies in Conflict &amp; Terrorism]]></source>
<year>2016</year>
<volume>39</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>67-83</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Klausner]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[The intermingling of pain and pleasure: the stress-seeking personality in its social context. En S. Klausner (ed.), Why man takes chances: studies in stress seeking]]></source>
<year>1968</year>
<page-range>137-68</page-range><publisher-name><![CDATA[Doubleday]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kruglanski]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Fishman]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Psychological factors in terrorism and counterterrorism: Individual, group, and organizational levels of analysis]]></article-title>
<source><![CDATA[Social Issues and Policy Review]]></source>
<year>2009</year>
<volume>3</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-44</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Laurence]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Matthews]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Oxford handbook of military psychology]]></source>
<year>2012</year>
<publisher-name><![CDATA[Oxford University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Leistedt]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Behavioral aspects of terrorism]]></article-title>
<source><![CDATA[Journal of Forensic Science International]]></source>
<year>2013</year>
<volume>228</volume>
<page-range>21-7</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marret]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Feddes]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Mann]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Doosje]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[GriffioenYoung]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An overview of the SAFIRE project: a scientific approach to finding indicators and responses to radicalization]]></article-title>
<source><![CDATA[Journal EXIT-Deutschland, Zeitschrift für Deradikalisierung and demokratische Kultur]]></source>
<year>2013</year>
<volume>2</volume>
<page-range>123-48</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[McCauley]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Moskalenko]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Mechanisms of political radicalization: pathways toward terrorism]]></article-title>
<source><![CDATA[Terrorism and Political Violence]]></source>
<year>2008</year>
<volume>20</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>415-33</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Moghaddam]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The staircase to terrorism: a psychological exploration]]></article-title>
<source><![CDATA[American Psychologist]]></source>
<year>2005</year>
<volume>60</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>161-9</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Moyano]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Factores psicosociales contribuyentes a la radicalización islamista de jóvenes en España. Construcción de un instrumento de evaluación]]></source>
<year>2011</year>
<publisher-name><![CDATA[Universidad de Granada]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pliner]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Observable indicators of possible radicalization. ISCA, Safire Project]]></source>
<year>2013</year>
<publisher-name><![CDATA[International Security and CounterTerrorism Academy]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Quiggin]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<source><![CDATA[Understanding Al-Qaida&#8217;s ideology for counter-narrative work. Perspectives on Terrorism]]></source>
<year>2010</year>
<volume>3.2</volume>
<publisher-name><![CDATA[Canadian Centre for Intelligence and Security Study at Carleton University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Romero]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La influencia de la lengua árabe en el léxico militar español]]></article-title>
<source><![CDATA[Art and Humanities]]></source>
<year>2015</year>
<volume>2</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>67-76</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sageman]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A strategy for fighting international Islamist terrorists]]></article-title>
<source><![CDATA[Annals of the American Academy of Political and Social Science]]></source>
<year>2008</year>
<volume>618</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>223-31</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sageman]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Small group dynamics. En S. Canna (ed.), Protecting the Homeland from International and Domestic Terrorism Threats: Current Multi-Disciplinary Perspectives on Root Causes, the Role of Ideology, and Programs for Counter-radicalization and Disengagement]]></source>
<year>2010</year>
<page-range>129-37</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sarma]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Risk assessment and the prevention of radicalization from nonviolence into terrorism]]></article-title>
<source><![CDATA[American Psychologist]]></source>
<year>2017</year>
<volume>72</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>278-88</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Saucier]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Akers]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Shen-Miller]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Knezevié]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Stanko]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Patterns of thinking in militant extremism]]></article-title>
<source><![CDATA[Perspectives on Psychological Science]]></source>
<year>2009</year>
<volume>4</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>256-71</page-range></nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schmid]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Violent and non-violent extremism: two sides of the same coin? ICCT Research Paper]]></source>
<year>2014</year>
<month>a</month>
</nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schmid]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Al-Qaeda&#8217;s &#8220;single narrative&#8221; and attempts to develop counter-narratives: the state of knowledge]]></source>
<year>2014</year>
<month>b</month>
<publisher-name><![CDATA[ICCT Research Paper]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Silber]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Bhatt]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Radicalization in the West: the homegrown threat]]></source>
<year>2007</year>
<publisher-name><![CDATA[NYPD Intelligence Division]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sykes]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Matza]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Techniques of neutralization: a theory of delinquency]]></article-title>
<source><![CDATA[American Sociological Review]]></source>
<year>1957</year>
<volume>22</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>664-70</page-range></nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Taylor]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Horgan]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A conceptual framework for addressing psychological process in the development of the terrorist]]></article-title>
<source><![CDATA[Terrorism and Political Violence]]></source>
<year>2006</year>
<volume>18</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>585-601</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vega]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[El control y la prevención del delito como objeto de la criminología]]></article-title>
<source><![CDATA[Miscelánea Comillas]]></source>
<year>2017</year>
<volume>75</volume>
<numero>146</numero>
<issue>146</issue>
<page-range>171-94</page-range></nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wiktorowicz]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
</person-group>
<source><![CDATA[Joining the cause: AlMuhajiroun and radical Islam]]></source>
<year>2004</year>
<conf-name><![CDATA[ Paper presented at The Roots of Islamic Radicalism Conference]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
