{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:35:48Z","timestamp":1743129348384,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030803865"},{"type":"electronic","value":"9783030803872"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-80387-2_31","type":"book-chapter","created":{"date-parts":[[2021,7,3]],"date-time":"2021-07-03T06:05:06Z","timestamp":1625292306000},"page":"321-330","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Kinetic Action and Radicalization: A Case Study of Pakistan"],"prefix":"10.1007","author":[{"given":"Brandon","family":"Shapiro","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andrew","family":"Crooks","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,7,4]]},"reference":[{"issue":"4","key":"31_CR1","first-page":"28","volume":"9","author":"RL Axtell","year":"1994","unstructured":"Axtell, R.L., Epstein, J.M.: Agent-based modeling: understanding our creations. Bull. Santa Fe Inst. 9(4), 28\u201332 (1994)","journal-title":"Bull. Santa Fe Inst."},{"issue":"6","key":"31_CR2","doi-asserted-by":"publisher","first-page":"68","DOI":"10.2307\/20031777","volume":"84","author":"Z Baran","year":"2005","unstructured":"Baran, Z.: Fighting the War of Ideas. Foreign Aff. 84(6), 68\u201378 (2005)","journal-title":"Foreign Aff."},{"key":"31_CR3","unstructured":"Bureau of Investigative Journalism. https:\/\/www.thebureauinvestigates.com\/projects\/drone-war. Accessed 20 June 2020."},{"key":"31_CR4","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1016\/j.jedc.2016.06.001","volume":"69","author":"A Caiani","year":"2016","unstructured":"Caiani, A., Godin, A., Caverzasi, E., Gallegati, M., Kinsella, S., Stiglitz, J.E.: Agent based-stock flow consistent macroeconomics: towards a benchmark model. J. Econ. Dyn. Control 69, 375\u2013408 (2016)","journal-title":"J. Econ. Dyn. Control"},{"key":"31_CR5","unstructured":"Cioffi-Revilla, C., Harrison, J.F.: Pandemonium in silico: individual radicalization for agent-based modeling. Paper Presented at the Annual Convention of the International Studies Association, Montreal, Quebec, Canada (2011)"},{"key":"31_CR6","doi-asserted-by":"publisher","DOI":"10.4135\/9781529793543","volume-title":"Agent-Based Modelling and Geographical Information Systems: A Primer","author":"A Crooks","year":"2019","unstructured":"Crooks, A., Malleson, N., Manley, E., Heppenstall, A.: Agent-Based Modelling and Geographical Information Systems: A Primer. SAGE Publications Inc., Thousand Oaks (2019)"},{"key":"31_CR7","unstructured":"Defense Science Board: Task Force on Department of Defense Strategy to Counter Violent Extremism Outside of the United States. Department of Defense (2015)"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"della Porta, D.: Radicalization: A Relational Perspective. Annual Review of Political Science, 21, 461\u2013474 (2018).","DOI":"10.1146\/annurev-polisci-042716-102314"},{"key":"31_CR9","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.copsyc.2016.06.008","volume":"11","author":"B Doosje","year":"2016","unstructured":"Doosje, B., Moghaddam, F.M., Kruglanski, A.W., de Wolf, A., Mann, L., Feddes, A.R.: Terrorism, radicalization and de-radicalization. Curr. Opin. Psychol. 11, 79\u201384 (2016)","journal-title":"Curr. Opin. Psychol."},{"issue":"5","key":"31_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0155407","volume":"11","author":"S Galam","year":"2016","unstructured":"Galam, S., Javarone, M.A.: Modeling radicalization phenomena in heterogeneous populations. PLoS ONE 11(5), 1\u201315 (2016)","journal-title":"PLoS ONE"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Genkin, M., Gutfraind, A.: How do terrorist cells self-assemble: insights from an agent-based model of radicalization. SSRN (2011)","DOI":"10.2139\/ssrn.1031521"},{"issue":"1\u20132","key":"31_CR12","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.ecolmodel.2006.04.023","volume":"198","author":"V Grimm","year":"2006","unstructured":"Grimm, V., et al.: A standard protocol for describing individual-based and agent-based models. Ecol. Model. 198(1\u20132), 115\u2013126 (2006)","journal-title":"Ecol. Model."},{"issue":"1","key":"31_CR13","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1111\/gean.12267","volume":"53","author":"A Heppenstall","year":"2021","unstructured":"Heppenstall, A., Crooks, A., Malleson, N., Manley, E., Ge, J., Batty, M.: Future developments in geographical agent-based models: challenges and opportunities. Geograph. Anal. 53(1), 76\u201391 (2021)","journal-title":"Geograph. Anal."},{"issue":"4","key":"31_CR14","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1093\/cesifo\/ify011","volume":"64","author":"DA Jaeger","year":"2018","unstructured":"Jaeger, D.A., Siddique, Z.: Are drone strikes effective in Afghanistan and Pakistan? On the dyanmics of violence between the United States and the Taliban. CESifo Econ. Stud. 64(4), 667\u2013697 (2018)","journal-title":"CESifo Econ. Stud."},{"issue":"5","key":"31_CR15","doi-asserted-by":"publisher","first-page":"1067","DOI":"10.1080\/09546553.2018.1442330","volume":"32","author":"MA Jensen","year":"2020","unstructured":"Jensen, M.A., Seate, A.A., James, P.A.: Radicalization to violence: a pathway approach to studying extremism. Terrorism Polit. Violence 32(5), 1067\u20131090 (2020)","journal-title":"Terrorism Polit. Violence"},{"issue":"7","key":"31_CR16","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1080\/1057610X.2018.1492819","volume":"43","author":"J Klausen","year":"2020","unstructured":"Klausen, J., Libretti, R., Hung, B.W.K., Jayasumana, A.P.: Radicalization trajectories: an evidence-based computational approach to dynamic risk assesssment of \u201cHomegrown\u201d Jihadists. Stud. Conflict & Terrorism 43(7), 588\u2013615 (2020)","journal-title":"Stud. Conflict & Terrorism"},{"issue":"3","key":"31_CR17","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1162\/isec.2009.33.3.180","volume":"33","author":"K Marten","year":"2008","unstructured":"Marten, K., Johnson, T.H., Mason, C.: Misunderstanding Pakistan\u2019s federally administered Tribal area? Int. Secur. 33(3), 180\u2013189 (2008)","journal-title":"Int. Secur."},{"issue":"3","key":"31_CR18","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1080\/09546550802073367","volume":"20","author":"C McCauley","year":"2008","unstructured":"McCauley, C., Moskalenko, S.: Mechanisms of political radicalization: pathways toward terrorism. Terrorism Polit. Violence 20(3), 415\u2013433 (2008)","journal-title":"Terrorism Polit. Violence"},{"issue":"3","key":"31_CR19","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1037\/amp0000062","volume":"72","author":"C McCauley","year":"2017","unstructured":"McCauley, C., Moskalenko, S.: Understanding political radicalization: the two-pyramids model. Am. Psychol. 72(3), 205\u2013216 (2017)","journal-title":"Am. Psychol."},{"issue":"2","key":"31_CR20","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1037\/0003-066X.60.2.161","volume":"60","author":"FM Moghaddam","year":"2005","unstructured":"Moghaddam, F.M.: The staircase to terrorism: a psychological exploration. Am. Psychol. 60(2), 161\u2013169 (2005)","journal-title":"Am. Psychol."},{"issue":"5","key":"31_CR21","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MIS.2007.4338493","volume":"22","author":"I-C Moon","year":"2007","unstructured":"Moon, I.-C., Carley, K.M.: Modeling and simulating terrorist networks in social and geospatial dimensions. IEEE Intell. Syst. 22(5), 40\u201349 (2007)","journal-title":"IEEE Intell. Syst."},{"key":"31_CR22","unstructured":"National Consortium for the Study of Terrorism and Responses to Terrorism (START). University of  Maryland. Global Terrorism Database. https:\/\/www.start.umd.edu\/gtd. Accessed 26 Oct 2020"},{"key":"31_CR23","unstructured":"Nawaz, S.: FATA - a most dangerous place: meeting the challenge of militancy and terror in the federally administered Tribal areas of Pakistan. Center for Strategic & International Studies (CSIS) (2009)"},{"key":"31_CR24","doi-asserted-by":"publisher","unstructured":"Orsini, A.: What everybody should know about radicalization and the DRIA model. Stud. Conflict Terrorism 1\u201333 (2020). https:\/\/doi.org\/10.1080\/1057610X.2020.1738669","DOI":"10.1080\/1057610X.2020.1738669"},{"issue":"4","key":"31_CR25","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MIS.2008.71","volume":"23","author":"J Ozik","year":"2008","unstructured":"Ozik, J., Sallach, D.L., Macal, C.M.: Modeling dynamic multiscale social processes in agent-based models. IEEE Intell. Syst. 23(4), 36\u201342 (2008)","journal-title":"IEEE Intell. Syst."},{"key":"31_CR26","unstructured":"Pew Research Center: Global Opposition to U.S. Surveillance and Drones, But Limited Harm to America's Image. Pew Research Center (2014)"},{"key":"31_CR27","volume-title":"The Drone Debate: A Primer on the U.S. Use of Unmanned Aircraft Outside Conventional Battlefields","author":"A Plaw","year":"2016","unstructured":"Plaw, A., Fricker, M.S., Colon, C.R.: The Drone Debate: A Primer on the U.S. Use of Unmanned Aircraft Outside Conventional Battlefields. Rowman & Littlefield, New York (2016)"},{"key":"31_CR28","doi-asserted-by":"publisher","DOI":"10.9783\/9780812206791","volume-title":"Understanding Terror Networks","author":"M Sageman","year":"2004","unstructured":"Sageman, M.: Understanding Terror Networks. University of Pennsylvania Press, Philadelphia (2004)"},{"issue":"4","key":"31_CR29","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1162\/isec_a_00312","volume":"42","author":"A Shah","year":"2018","unstructured":"Shah, A.: Do U.S. drone strikes cause blowback? Evidence from Pakistan and beyond. Int. Secur. 42(4), 47\u201384 (2018)","journal-title":"Int. Secur."},{"key":"31_CR30","series-title":"Springer Proceedings in Complexity","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/978-3-030-34127-5_41","volume-title":"Advances in Social Simulation","author":"FL Shults","year":"2020","unstructured":"Shults, F.L., Gore, R.: Modeling radicalization and violent extremism. In: Verhagen, H., Borit, M., Bravo, G., Wijermans, N. (eds.) Advances in Social Simulation. SPC, pp. 405\u2013410. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-34127-5_41"},{"key":"31_CR31","unstructured":"Silber, M.D., Bhatt, A.: Radicalization in the West: The Homegrown Threat. New York Police Department Intelligence Division (2007)"},{"issue":"Supplement 1","key":"31_CR32","doi-asserted-by":"publisher","first-page":"234","DOI":"10.2307\/143141","volume":"46","author":"WR Tobler","year":"1970","unstructured":"Tobler, W.R.: A computer movie simulating urban growth in the detroit region. Econ. Geogr. 46(Supplement 1), 234\u2013240 (1970)","journal-title":"Econ. Geogr."},{"key":"31_CR33","unstructured":"United States House of Representatives: Reassessing the Evolving al-Qaeda Threat to the Homeland, Hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, 111th Congress, First Session (2009)"},{"key":"31_CR34","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1002\/9781118923986.ch2","volume-title":"The Handbook of the Criminology of Terrorism","author":"D Webber","year":"2016","unstructured":"Webber, D., Kruglanski, A.W.: Psychological factors in radicalization: a \u201c3N\u201d approach. In: LaFree, G., Freilich, J.D. (eds.) The Handbook of the Criminology of Terrorism, pp. 33\u201346. Wiley-Blackwell, Malden (2016)"},{"key":"31_CR35","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.copsyc.2017.03.024","volume":"19","author":"D Webber","year":"2018","unstructured":"Webber, D., Kruglanski, A.W.: The social psychological makings of a terrorist. Curr. Opin. Psychol. 19, 131\u2013134 (2018)","journal-title":"Curr. Opin. Psychol."},{"key":"31_CR36","unstructured":"Wilensky, U.: NetLogo. Center for Connected Learning and Computer-Based Modeling, Northwestern University, Evanston (1999). http:\/\/ccl.northwestern.edu\/netlogo\/"}],"container-title":["Lecture Notes in Computer Science","Social, Cultural, and Behavioral Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-80387-2_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T14:03:27Z","timestamp":1710252207000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-80387-2_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030803865","9783030803872"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-80387-2_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"4 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SBP-BRiMS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sbp2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/sbp-brims.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"56","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"57% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}