LASA: Research Proposal – A Terror On Your Doorstep: Homegrown Terrorists
This research proposal intended to establish a relationship between personal beliefs and homegrown terrorism. Two theories have been provided to support and understand the proposal’s topic. The present literature has a lacuna when it comes to peer-reviewed and quantitative research studies. This proposal aims to fill those gaps through a quantitative methodology. This methodology includes a correlational research design and a questionnaire as a measurement instrument. Our population is vulnerable due to their restrictive environment. Therefore, since a vulnerability exists in our population, this proposal is focusing to take the highest ethical level to prevent and minimize any harm. The data from this population will be tabulated using inferential statistics through the SPSS software. The limitations and threats to validity of this research proposal are clear and the best course of action to minimize them has been considered. Finally, this proposal has four different plan for its dissemination.
LASA: Research Proposal – A Terror On Your Doorstep: Homegrown Terrorists
The United States of America and other countries around the world had suffered, at some point, some sort of terrorist attack. From the bombing in Oklahoma City, Oklahoma to the Frankfurt Airport shooting in Germany, terrorism has been the synonym of terror (Böckler, Hoffmann & Zick, 2015). However, on September 11, 2001, the United States witnessed one of the terrifying events in its history: a large scale, well planned and organized terrorist attack (Reyes, 2018). The reason for this is that the 9/11 was first terrorist attack streaming live in the United States. Watching, literally, people jumping off the window is a scar in everyone’s memory who watched while it happened. The perpetrator wasn’t U.S. citizens but after the 9/11 a new “trend” of terrorism emerged hitting the American soil with an unprecedented force (Kirchick, 2010 & Precht, 2007). This trend, this type of terrorism was a local, internal and a domestic one: United State awoke a rotten root, a disease called homegrown terrorism. This emerging threat means that terrorism is not solely from foreign groups or countries (Precht, 2007). In recent years, in the United States, “there has been unprecedented growth in violent activity inspired by radical” groups who are far more destructive because homegrown terrorists are citizens, born, raised and educated within their own country (Wilner & Dubouloz, 2010). What are the reasons, if any, of this growth? What changed? Why is the country having more and more homegrown terrorists? This research proposal intends to examine the problem of homegrown terrorists. The research will address the predisposition of personal beliefs for individuals who are born, raised and educated within the U.S., that engage in domestic terrorism (Wilner & Dubouloz, 2010 & Reyes, 2018).
Purpose of the Study
The purpose of this study are two. First, this study intends to shed some light on homegrown terrorists by adding some “growth of knowledge” (Oliver, 2012) to the literature/research already done in this topic by scholars. Second, this study aim to establish, analyze and describe a relationship between homegrown terrorists and personal beliefs (Leedy & Ormrod, 2016, p. 46 & Hale, 2011).
Research Question and hypotheses
This research proposal have one research question and two hypotheses: one alternative hypothesis and one null hypothesis. The research question for this proposal is as follows: Is there a correlation between personal beliefs and the change of behavior in an individual that leads to being a homegrown terrorist? (Reyes, 2018). The alternative hypothesis is that there is a positive correlation between personal beliefs and the change of behavior in an individual that leads to being a homegrown terrorist (Reyes, 2018). The null hypothesis is that there is no correlation between personal beliefs and the change of behavior in an individual that leads to being a homegrown terrorist (Reyes, 2018).
The theoretical framework for this research proposal will be composed of a combination of two theories. The first theory is a psychological theory called the Identity Theory from Erik Erikson in 1959. This theory proposes a psychological development of an individual through eight phases (Schwartz, Dunkel & Waterman, 2009; Sokol, 2009 & Victoroff, 2005). Every phase will come with a conflict, crucial point or crisis that the individual must face and resolve in order to continue the psychological development (Schwartz et al., 2009; Sokol, 2009 & Victoroff, 2005). Erikson explained that every psychological phase or stage will produce an outcome, whether is a positive or negative one, and the outcome of previous stages will affect the other stages (Schwartz et al., 2009; Sokol, 2009 & Victoroff, 2005). In other words, failure in one of the stages will mean an unhealthy psychological development. These stages are 1. Trust vs. Mistrust, 2. Autonomy vs. Shame, 3. Initiative vs. Guilt, 4. Industry vs. Inferiority, 5. Identity vs. Role Confusion, 6. Intimacy vs. Isolation, 7. Generativity vs. Stagnation and 8. Ego Integrity vs. Despair (Sokol, 2009). For Erikson, the most crucial, most important psychological stage was the fifth: Identity vs. Role Confusion (Sokol, 2009). He understood that adolescence is a “transitional period of development” where an individual goes from childhood to adulthood, where an individual looks for a sense of self and participation in a group (Sokol, 2009). In other words, adolescence is a bridge during an individual’s growth. A bridge that is full of confusion and changes not only psychological but physiological as well and social causes play an important role in an individual’s life including the so-called phenomenon of peer-pressure (Matić, Dremel & Šakić, 2015).
The second theory is the Quest for Personal Significance Theory from Kruglanski and colleagues (Dugas, Bélanger, Moyano, Schumpe, Kruglanski, Gelfand, Touchton-Leonard & Nociti, 2016; Kruglanski & Orehek, 2011 & Kruglanski & Fishman, 2009). This theory proposes that personal significance is a fundamental factor and a “motivational force in human behavior” (Kruglanski & Orehek, 2011 & Kruglanski & Fishman, 2009). The theory explains that an individual is motivated and seek an attachment to social groups by defending the group’s point of view/beliefs and by working within that group (Kruglanski & Orehek, 2011). This theory also explains that the personal significance is not due to lack of finances nor education because it focuses on perceptions of injustices and some sort of deprivation (Kruglanski & Orehek, 2011). Therefore, Kruglanski and colleagues (2016, 2011 & 2009) proposed that “most terrorist attacks is the quest for personal significance”. In other words, the theory postulates that the quest for personal significance is an ordinary goal, a desire, that an individual endeavor, socially talking, to “make a difference” (Dugas et al., 2016)
For purposes of this proposal, clarification and better understanding of the research question’s concepts that will be used from now on, a definition of them will be provided. These are the operational definitions of concepts that the researcher will be using throughout the research to analyze and explain certain aspects of the research’s topic. Personal beliefs are support and acceptance of convictions held by an individual that he/she considers it to be true and may prompt an individual to expresses it as a need or desire (Reyes, 2018; Matsick & Conley, 2016; Thompson, Lamont, Parncutt & Russo, 2014, p. 128; Kruglanski & Orehek, 2011 & Vohs, Baumeister & Sage Publications, 2007, p. 110). The Merriam-Webster Dictionary (2018) defines behavior as “the way in which someone conducts oneself”. For purposes of this study, behavior will be used as the particular way in which an individual control his/her actions that are socially and legally accepted (Reyes, 2018). Therefore, a change of behavior is when an individual is unable to control his/her behavior and actions in a social and legal manner. A homegrown terrorist is an individual who is a citizen, born, raised, educated and resides within the United States (and its territories) who is willing to carry out terrorist attacks to/in his/her own country (including its people and infrastructures) (Reyes, 2018; Wilner & Dubouloz, 2010 & Precht, 2007).
LITERATURE REVIEW SECTION
Nowadays terrorism looks like an old tale, old news, something of the past that no one cares to talk about. The reasons for this are many and it will vary depending on what country you’re in, what point of view you’re looking at and what political/ideological/beliefs you have. Nevertheless, it is common knowledge that terrorism is a social and complex problem affecting countries, regardless of their politics, socioeconomic and religious statuses, around the world (Horgan, 2017; Schwartz, Dunkel & Waterman, 2009 & Schbley, 2003). Despite the knowledge of its existence, the world has not come with a definite and concrete definition about terrorism or at least a mutual agreement of what terrorism is (Jackson, 2009 & Kruglanski & Fishman, 2009). This can result very problematic because there’s no way to approach, resolve or at least minimize this social problem. Even though defining terrorism is not easy task, there shouldn’t be over one hundred almost two hundred definitions of terrorism in the literature (Jackson, 2009). For purposes of this research proposal and for the sake of clarification, two different definitions of terrorism will be provided. However, only one will be used and the reasons for it will be explained. The first definition is from the Federal Bureau of Investigations [FBI] (2010), under the U.S. Code of Federal Regulations (28 C.F.R. Section 0.85). According to the FBI (2010), terrorism is “the unlawful use of force and violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives”. The second definition is from a study that was focusing on definitions for terrorism but the focus of the study shifted to have a better understanding of a religious terrorist (Reyes, 2018 & Schbley, 2003). The definition that Schbley (2003) finally gave to terrorism is that “terrorism is any violent act upon symbolic civilians and their properties”. From the perspective of both definitions, we can agree that terrorism uses violence, persons, and their properties. However, the definition that will be using from now on is the second one. The second definition is short, simple and easy to understand. What makes a country is its people, therefore violence against the people and their properties, regardless of the means and methods, cannot be justified or tolerated and it is considered terrorism (Schbley, 2003). Now, the definition of domestic terrorism will be any violent act against civilians and their property by an individual who was born, raised and educated in that country (Wilner & Dubouloz, 2010).
It is true that there are many studies on terrorism, especially studies that try to establish a definition of terrorism. However, most of these studies focus on terrorism in general, many of them are not peer-reviewed and do not abound on the threat of domestic terrorism. To this, it is added the rarity of peer-reviewed studies with the sole focus of domestic terrorism (Jackson, 2009). Nevertheless, these studies are qualitative. In other words, they study an individual or a certain phenomenon for being peculiar or strange without providing data that can be quantified. Most of the literature about homegrown terrorists we came across are case studies of a specific individual who, for whatever reason, decided to engage in terrorism. For these reasons, this proposal aimed to add knowledge in a quantitative manner. The few peer-reviewed studies, whether quantitative or qualitative, had a pattern in some aspect of terrorism and domestic terrorism. First, the articles agreed in a rise and emerging new threat of homegrown terrorists (Scarcella, Page, & Furtado, 2016; Klausen, Campion, Needle, Nguyen & Libretti, 2015; Olsson, 2015; Kirchick, 2010; Wilner & Dubouloz, 2010 & Dernevik, Beck, Grann, Hogue & Mcguire, 2009). Second, the articles talked, defined and explained radicalization as the process of behavioral changes (atypical behavior) in an individual’s psyche due to politics or ideology (Gill, Corner, Conway, Thornton, Bloom, & Horgan, 2017; Scarcella et al., 2016; Klausen et al., 2015; Olsson, 2015; Kirchick, 2010; Wilner & Dubouloz, 2010; Dernevik et al., 2009 & Victoroff, 2005). Researchers found that this process is usually done through the Internet (Gill et al., 2017; Scarcella et al., 2016; Klausen et al., 2015; Olsson, 2015; Kirchick, 2010; Wilner & Dubouloz, 2010; Dernevik et al., 2009 & Victoroff, 2005). Third, the studies found a background pattern in a homegrown terrorist: they are educated, the are from respected families or middles class family, they don’t exhibit economic hardships, previous behavior wasn’t associated with violence, most of them are males and they are from different ethnic, race, cultural, religious and regional backgrounds (Scarcella et al., 2016; Klausen et al., 2015; Kirchick, 2010; Kis-Katos, Liebert & Schulz, 2011; Wilner & Dubouloz, 2010; Dernevik et al., 2009 & Victoroff, 2005).
Another point that was discussed in the literature, and that has been the focus of debate, has been the psychology of terrorism. From a psychological point of view, some of the studies reviewed argued that terrorism is caused by some mental disorder. In other words, a terrorist, whether is international or domestic (homegrown), commits terrorist acts because he/she suffers from some personality disorder, schizophrenia or psychopathy and thus the process of radicalization is a given (Borum, Fein & Vossekuil, 2012; Kruglanski & Fishman, 2009 & Victoroff, 2005). Other researchers gave themselves the task of refuting these studies. Especially Sageman (2004, p. 83), whose study was later published as a book, found in his sample of 172 individuals from an Al Qaeda network that mental illness is not an explanation for terrorism nor a pattern of mental illness was detected. He also thought of the possibility of a childhood trauma from the psychoanalytic theory perspective, however, the indicator was too little to none trauma in their lives (Sageman, 2004, p. 85). In other words, not only Sageman (2004), but other researchers found that there is no empirical evidence to support a psychological profile for terrorists, a terrorist personality nor a theory that terrorism is the result of a mental illness (Klausen et al., 2015; Dernevik et al., 2009; Jackson, 2009 & Schwartz et al., 2009).
Despite that the literature had given similarities there are weaknesses to these studies. First, these studies cannot come to an agreement on how long the radicalization process take (Jackson, 2009). Some of them say months, others years. Second, only two studies reported the lack and the need of assessment tools to, at least, identify behaviors of homegrown terrorists (Scarcella et al., 2016 & Klausen et al., 2015). That same study reported the lack of demographics and how they can differ depending on the individual (Klausen et al., 2015). Therefore, there is a lacuna in research when it comes to female terrorists, whether they are homegrown female terrorists or not (Jacques & Taylor, 2013). Most of these studies sampled males, leaving out the possibility that a female may have another reason to radicalized, diverse factors or other life-situations to lead her to terrorism like personal beliefs (Klausen et al., 2015 & Jacques & Taylor, 2013). Hence, this gap is another reason for this paper by establishing a relationship between homegrown terrorists and personal beliefs regardless of gender. Just because an individual is a female does not mean that the possibility to engage in act of terrorism does not exist. The literature failed to agree and provide a solid definition of terrorism (Jackson, 2009). Another gap found was the lack of human contact. The lack of face-to-face sampling techniques. Including the case studies, the sample of these studies was of second hands. That is, the information obtained was from second sources, other studies, databases or library archives (Jackson, 2009). The bigger weakness we came across with the literature in both terrorism and homegrown terrorist is the profile of Islamic terrorists (Jackson, 2009). Almost every peer-reviewed article that was reviewed for this research proposal pointed out, in different words, the same factor: our terrorists and homegrown terrorist are Islamic terrorists (Jackson, 2009). Which contradicts the previous analysis of the background pattern of homegrown terrorists. It is true that the corrections were made after conclusions were drawn, however, this academical construct has put an onerous suspicion and has poisoned the Muslim community by increasing maltreatment, discrimination, hate crimes and phobias (Jackson, 2009).
In conclusion, the literature provided that terrorism is diverse. In a short time, homegrown terrorists had been seen with frequency after 9/11 (Muhlhausen & Baker McNeill, 2011). This evolving threat is complex yet attractive to some people (Horgan, 2017 & Klausen et al., 2015). Even though homegrown terrorism has been studied in different academic disciplines, the literature still shows the lack of peer-review studies and the lack of quantitative data (Horgan, 2017 & Jackson, 2009). “The events of September 11, 2001, were a major catalyst for the study of terrorism” yet there is still a lacuna when it comes to assessment tools (Horgan, 2017). The literature also revealed that the samples for this studies, with the exception of Sageman’s book, there is not concrete human contact. Furthermore, the gap between females terrorist opens up new doors, opportunities, and possibilities for new research. Therefore, the necessity of this study lies in the purpose of it: adding knowledge and establishing a relationship between homegrown terrorists and their personal beliefs with quantitative data.
Planning a research is not easy task. Let alone when the researcher must choose what type of methodology is the best fit for the research. Every step of the research should be done carefully especially when it comes to the methodology section. How to gather your data, what instrument is needed and what tool must be used to analyze your data is part of the consideration a researcher must take in order to answer the research problem/question (Leedy & Ormrod, 2016, p. 80). Quantitative, qualitative and a mixed-method approach are different, uniques and certainly their purposes and the type of data differ greatly (Leedy & Ormrod, 2016, p. 80). Through either one, you will collect one or both types of data numerical (statistics) or nonnumerical (observations) (Leedy & Ormrod, 2016, p. 80). With that being said, and taking into account the lack of quantitative studies found during the literature review, this proposal will be using a quantitative methodology. Another reason for this methodology is that quantitative research deducts, seeks to explain, predicts, generalized and establish relationships between variables through statistics to prove, test and verify hypotheses and theories (Reyes, 2018; Leedy & Ormrod, 2016, p. 80 & Ponterotto, 2002). Furthermore, the research question and both alternative and null hypothesis are trying to establish a correlation between variables. Because we’re looking to get numerical data to see if there’s any correlation at all, a quantitative design would be our best approach (Reyes, 2018).
Since the methodology is quantitative, a research design is quantitative as well. Like it was mentioned before, this proposal is trying to establish a correlation. The best research design for this is from one of the non-experimental descriptive research designs: a correlational research design (Leedy & Ormrod, 2016, p. 137 & Lavrakas, 2008). The correlational design facilitates the withdrawing of conclusions about the actual status of a problem, situation or issue but must not be confused with cause-and-effect (Reyes, 2018; Leedy & Ormrod, 2016, p. 367; Bleske-Rechek, Morrison & Heidtke, 2015, p.49 & American Psychological Association [APA], 2013). In other words, “correlation does not imply causation” (Reyes, 2018 & Bleske-Rechek, et al., 2015, p. 49).
A correlational research investigate, measure and analyze the degree in which differences and similarities exists or are related to one or more variables (Reyes, 2018; Leedy & Ormrod, 2016, p. 137 & Lavrakas, 2008). Explore the possibility of relations or associations between variables. This design establish a correlation if a variable increases or decreases another variable regardless if is a positive or negative result (Reyes, 2018; Leedy & Ormrod, 2016, p. 137). This type of method allows the researcher to collect “quantitative data about two or more characteristics” of a distinct group (Reyes, 2018; Leedy & Ormrod, 2016, p. 137).
This proposal will be working with a vulnerable population. This population are prisoners for which special consideration must be taken due to their “restrictive, institutional environment” (Office of the Human Research Protection Program [OHRPP], 2012). These special considerations will be discussed in the procedure section of this proposal. The inclusion characteristics for the sample of this population are:
- Males and females between the ages of 18 and 50 years old whose sentences are terroristic threats or terrorism-related offenses and at the time of the study must be serving their sentences in a prison or jail state in/of the state of Texas under the Texas Department of Criminal Justice (Reyes, 2018).
- Must be citizens born, raised, educated [at some level] and have resided in the United States and/or its territories (Reyes, 2018; Wilner & Dubouloz, 2010 & Precht, 2007).
- Terroristic offenses or terrorism-related crimes can be federal, state crimes or non-federal crimes (18 U.S. Code § 2332b).
- Any individual transferred of an out-of-state prison that meets the previous three requirements.
The exclusion characteristics for the sample of this population are:
- Individuals over or below the age range (Reyes, 2018).
- Individuals who are being charged with terroristic threats or terrorism-related crimes at the time of this study and have not sentenced yet (Reyes, 2018).
- Individuals who are serving their sentences for terroristic threats or terrorism-related offenses in the Substance Abuse Felony Punishment [SAFP] (Reyes, 2018).
- Individuals whose sentence is only for assault and not for a combination of one offense with terroristic threats or terrorism-related offenses (Reyes, 2018).
No race, ethnicity, religion, cultural background, political views, disability (mental or physical), employment and marital status would be used as a criteria for inclusion nor exclusion of the sample (Reyes, 2018). In the fiscal year of 2016, the Texas Department of Criminal Justice reported 21,507 inmates whose sentences are for the offenses of Assault/Terroristic Threat (Reyes, 2018). From this 21,507; 744 are inmates in SAFP which are excluded (Reyes, 2018). The remaining individuals are 20,763. This research proposal was hoping to have a sample of 500 individuals, however, this won’t be the case. Per the Texas Department of Criminal Justice, as of January 31, 2018, there is only 25 prisoners whose sentences are terroristic threats or terrorism-related offenses. For now, the sample size for this proposal is 25 individuals.
The measurement instrument that will be used in this proposal to collect the raw data is a questionnaire (Reyes, 2018). Questionnaires, whether they are paper and pencil or online (in a computer) are cost-effective (Reyes, 2018; Leedy & Ormrod, 2016, p. 141 & Abbott, & McKinney, 2013, p. 210). This instrument is excellent for larger populations and for far away populations because saves additional and unnecessary expenses to the researcher because can easily gather the data while addressing and meeting the requirements of the research (Reyes, 2018; Leedy & Ormrod, 2016, p. 141 & Abbott, & McKinney, 2013, p. 210). One questionnaire will be provided, integrating the variables and divided by sections (Reyes, 2018). The questionnaire will be designed by the researcher and will be scrutinized by a colleague with the expertise of survey research. The researcher will look into the questions of the questionnaire to make sure no biases or prejudices are being asked.
Special considerations are needed when it comes to prisoners (OHRPP, 2012). Since this is a vulnerable population, the special considerations call for a special approval under the federal government and is also reviewed by the Institutional Review Board [IRB] (OHRPP, 2012). This federal regulation is the 45 CFR 46.305(a) which requires the following seven things:
- This proposal must be one of the research categories permissible under 46.306(a)(2) (OHRPP, 2012).
- The benefits of this proposal, in comparison with the prisoner lifestyle, cannot outweigh the risk of this study (OHRPP, 2012).
- The risk of this study is equivalent to the risk a non-prisoner would accept (OHRPP, 2012).
- Selection of prisoner are fair to all prisoners “and immune from arbitrary intervention by prison authorities or prisoners… [and] control subjects must be selected randomly from the group of available prisoners who meet the characteristics needed” for this study (OHRPP, 2012).
- The study provides information in a language understandable for the population (OHRPP, 2012).
- Prisoners’ participation in this study does not count for parole boards’ decisions and every participant “is clearly informed in advanced” (OHRPP, 2012).
- If the study has a follow-up of it participants after its conclusion, arrangements for the follow-up must be made taking into account the variety of each individual sentences and the participant will be informed of this fact (OHRPP, 2012).
Additional approvals from the Federal Bureau of Prisons will be taken into consideration as well, especially if the IRB or the Texas Department of Criminal Justice so requires it. After getting all the approvals, the recruitment process for the sample would be trough recruitment letters, referrals (from other participants and/or prison/jail staff) and flyers, notices or information sheets (OHRPP, 2012). A paper and pencil self-questionnaire would be administered to anyone who wants to participate. The questionnaire would be given in a classroom-setting type inside the prison/state jail. The specific time-frame for the questionnaire (what time is going to be?) will be determined in conjunction with the prison/state jail’s Warden. The researcher has taken into consideration that, even though this population lives in a restricted environment, they still have a schedule, routine or itinerary to follow. The time for the self-administered questionnaire would be one that better fits the sample’s routine. After the questionnaire is completed, the participants will put it in a locked box near the exit. When their participation is completely done, the participants will return to their daily routine.
The data analysis tool for this proposal are parametric and nonparametric inferential statistical processes to analyze the data. The parametric statistics will be the student’s t-test, analysis of covariance (ANCOVA), t-test, regression and factor analysis (Gill et al., 2017 & Leedy & Ormrod, 2016, p. 241). These statistical tests are the best fit because establishes a “statistically significant difference” between means, reduces the possibility of a Type II error, establishes a correlation, make possible to predict the value of a dependent variable from an independent variable without indicating cause-and-effect, examine the correlation between variables and determine the proximity of frequencies (Reyes, 2018 & Leedy & Ormrod, 2016, p. 241). The only nonparametric statistic that will be used is the chi-square (Gill, et al., 2017 & Leedy & Ormrod, 2016, p. 241). Furthermore, these statistical tools will test the hypotheses (Reyes, 2018 & Leedy & Ormrod, 2016, p. 241). The software that will be used in this proposal is the Statistical Package for the Social Sciences (SPSS) because is the only software the researcher has access to and the only one the researcher knows and understand better.
Limitations of the Study and Threats to Validity
Like any other research proposal, there are limitations and threats to validity. One limitation and is also a threat to validity (selection of the subjects) is the size of the sample. At first, it looked like there were too many subjects to participate. However, the number got drastically reduced. From thousands (literally) now I only have 25. To this be must add that not all 25 individuals are going to participate. Another threat to validity would be the Hawthorne effect, instrumentation and the experimental validity (Leedy & Ormrod, 2016, p. 85 & Argosy, 2013). I must take into consideration that my population, because of their environment, their responses, actions, and behaviors might change at any given moment (Leedy & Ormrod, 2016, p. 169 & Argosy, 2013). Since the instrumentation is a questionnaire designed by the researcher the possibility of bias is higher.
The best course of action to minimize these threats would be eliminating, as much as possible, bias in the questionnaire by carefully scrutinize the questions (Reyes, 2018). The recruitment strategy should be design to avoid subjects to participate for convenience, non-voluntarily and/or lateness (latecomers) (Reyes, 2018). Another strategy to avoid these threats to validity is to emphasize the benefits of the study to avoid the loss of participants and provide a statement to all subjects about, whether they are being observed or not, their responses, actions and behaviors should not change at any given moment (Reyes, 2018; Leedy & Ormrod, 2016, p. 169 & Argosy, 2013).
Ethics in research is not only about presenting the real data, conclusions, and results. Ethics in research is also the protection of your human subjects. Is the research’s duty to protect his participants from any harm before, during and after the research begins and finishes (Reyes, 2018). In order to protect the participants and the researcher as well, an informed consent must be given. Is not only a requirement of the IRB but is also the ethical and legal responsibility of the researcher (Nijhawan, Janodia, Muddukrishna, Bhat, Bairy, Udupa & Musmade, 2013). The informed consent for this investigation will be in writing (paper inform consent), it will be explained in detail to the participants, the participants will have enough time to read it by themselves and there would be an open forum to discuss any question, doubts or concern about the informed consent and the study before any of the participants signs the document. The informed consent of this proposal will cover the following:
1. Description of the study – the nature, purposes and/or goals of the research, the type of activities involved and what type of participation is required in a language that everybody can understand (Reyes, 2018; Leedy & Ormrod, 2016, p. 103 & Nijhawan, et al., 2013).
2. Timeframe – the duration of the study and the participation of the subjects (Reyes, 2018; Leedy & Ormrod, 2016, p. 103 & Nijhawan, et al., 2013).
3. Voluntary statement – indication that the study is completely voluntary without any penalties or loss of benefits (usually monetary, if any) if the participant decides to leave/terminate at any phase of the research (Reyes, 2018; Leedy & Ormrod, 2016, p. 103 & Nijhawan, et al., 2013).
4. Risks and benefits – description of risks, discomforts and benefits (including monetary compensation if any) for either the participants, the field of psychology or society (Reyes, 2018; Leedy & Ormrod, 2016, p. 103 & Nijhawan, et al., 2013).
5. Ethics – the informed consent will describe the ethics involved in this study, any possible ethical issues and the steps that the researcher will take in order to resolve, prevent or minimize that ethical issue as stipulated in the American Psychological Association: Ethical Principles of Psychologist and Code of Conduct [APA Ethics Code] (2010) and in the American Psychological Association: Specialty Guidelines for Forensic Psychology [SGFP] (2013) (Reyes, 2018 & Nijhawan, et al., 2013).
6. Confidentiality – a statement that guarantees the confidentiality and anonymity of the participant’s information (demographics and/or personal information) and responses in the questionnaire (Reyes, 2018; Leedy & Ormrod, 2016, p. 103 & Nijhawan, et al., 2013).
7. Data storage and access – the researcher will provide the means in which the data will be storage like a safe, locked cabinet, encrypted data or password protected computers/databases and what personnel will have access to it (Reyes, 2018 & Nijhawan, et al., 2013).
8. Researcher’s information and contact means – the researcher’s name, occupation and contact information will be provided in the informed consent. The researcher will also provide contact information about an individual and/or office, related to the research, to the participants in case there’s any doubt, questions or concern about the study through the informed consent (Reyes, 2018; Leedy & Ormrod, 2016, p. 103 & Nijhawan, et al., 2013).
9. Results – the informed consent will cover a section to provide a statement with details of the findings (how is going to be published, how the participants can get access to the results) “about the study upon its completion” (Reyes, 2018 & Leedy & Ormrod, 2016, p. 103).
10. Signatures – a place will be provided to the participants in order to date and sign the informed consent (Reyes, 2018 & Leedy & Ormrod, 2016, p. 103).
To ensure the safety of all participants from a potential risk or harm, the researcher will prevent or at least minimize it by providing detailed information about the study protocols and procedures, assembling a research team with the knowledge, experience and expertise in the population studied as well how to conduct research (Reyes, 2018). Another way to ensure their safety is incorporating a “data safety monitoring plan” (UNM Office of the Institutional Review Board, 2016) with an expert team who can safeguard the data and respond to emergencies in case of a breach of confidentiality or data leakegage (this will also limit the access of people to the data), storing data in a safe and locked place and/or encrypting, giving passwords/codes to digital data, databases and/or computers/electronic devices, obtainig certificates of confidentiality (CoC) for a vulnerable population, ensuring the sample is adequate to generate useful results and provide on-site behavioral/psychlogical/emotional support to the participatns trhough counselors, psychologists and/or psychiatrists during and after the questionnaire (Reyes, 2018 & UNM Office of the Institutional Review Board, 2016).
To maintain the highest ethical standard, the researcher will emphasize, before beginning the questionnaire, that their participation is completely voluntary and that they are free to go whenever they want to without any penalties. Lastly, the researcher will be disclaimed that the participation in this study won’t change nor affect the parole board’s decision in any of their sentences (OHRPP, 2012).
This research proposal is planning to use different dissemination strategies. The reason for this is to have a backup plan in case the main strategy or other strategies fail. First, the researcher will try to disseminate this proposal through peer-reviewed journals by a press release (this will be the main strategy since the lack of peer-reviewed studies in this topic) (Yale Center for Interdisciplinary Research on AIDS (CIRA), 2009). Second dissemination strategy is a research summary document of this study with the key findings and a fact sheet (Yale Center for Interdisciplinary Research on AIDS (CIRA), 2009). The third dissemination strategy is a media coverage through, either one or all of them, local news, local newspaper or local radio stations (Yale Center for Interdisciplinary Research on AIDS (CIRA), 2009). The fourth dissemination strategy, and is a combination of two, it will be hosting or attending seminars, local events (including Argosy University) or conferences with flyers, brochures, poster and/or research briefs (Yale Center for Interdisciplinary Research on AIDS (CIRA), 2009). Every single dissemination strategy will include a letter of appreciation to the participants. This letter will be sent to the participants as well with any finding of the study (Yale Center for Interdisciplinary Research on AIDS (CIRA), 2009).
This proposal aimed the problem of homegrown terrorists. The literature review emphasizes the purpose of this study: addition to the knowledge in the topic with quantitative data by establishing a relationship with personal beliefs and homegrown terrorism. Also, this proposal brought up the lacuna of female terrorists in the present literature and the lack of face-to-face participants. Furthermore, this proposal found the weakness of the present literature towards the Muslim community. The academic literature points out to this community like the bad people in our country; putting them at higher and unnecessary risk. The population of this proposal is vulnerable and every ethical step has been taking into consideration to protect and/or minimize any possible harm, threat or ethical issue to the participants. The data of this proposal is quantitative with a correlational design and a self-administered questionnaire. In order to analyze this quantitative data, inferential statistic (parametric and nonparametric statistics) will be used to test the hypotheses and to answer the research question. However, limitations and threat to validity exist. The two limitations/threat to validity that the researcher is more concerned about are the sample size (is too small) and the Hawthorne effect (change in behavior due to the knowledge of being observed). Nonetheless, precautions have been planned to avoid or at least minimize these. Lastly, the researcher has four different dissemination strategies to choose in case, for whatever reason, the previous one fails. Is just a precaution, a backup plan for this proposal.
Abbott, M. L., & McKinney, J. (2013). Understanding and Applying Research Design [eBook Index]. Retrieved February 20, 2018, from https://ebookcentral-proquest-com.libproxy.edmc.edu
American Psychological Association (APA)O. (2013). APA guidelines for the undergraduate psychology major, Version 2.0. Washington, DC: APA. Retrieved February 20, 2018, from http://www.apa.org/ed/precollege/about/psymajor-guidelines.pdf
Argosy University. (2013). Research and Evaluation Design. Retrieved March 3, 2018, from https://myclasses.argosy.edu/content/enforced/18247-2293792/media/FP6030_M4_G3_C2/FP6030_M4_G3_C2.pdf?_&d2lSessionVal=antJB7ONb36K7SaYpUgHXp0YV&ou=18247
Bleske-Rechek, A., Morrison, K. M., & Heidtke, L. D. (2015). Causal Inference from Descriptions of Experimental and Non-Experimental Research: Public Understanding of Correlation-Versus-Causation. Journal Of General Psychology, 142(1), 48-70. doi:10.1080/00221309.2014.977216
Böckler, N., Hoffmann, J., & Zick, A. (2015). The Frankfurt Airport Attack: A Case Study on the Radicalization of a Lone-Actor Terrorist. Journal Of Threat Assessment And Management, 2(3-4), 153-163. doi:10.1037/tam0000045
Borum, R., Fein, R., & Vossekuil, B. (2012). A Dimensional Approach to Analyzing Lone Offender Terrorism. Aggression and Violent Behavior, 17(5), 389-396. doi:10.1016/j.avb.2012.04.003
Dernevik, M., Beck, A., Grann, M., Hogue, T., & Mcguire, J. (2009). The Use of Psychiatric and Psychological Evidence in the Assessment of Terrorist Offenders. Journal of Forensic Psychiatry & Psychology, 20(4), 508-515. doi:10.1080/13501760902771217
Dugas, M., Bélanger, J. J., Moyano, M., Schumpe, B. M., Kruglanski, A. W., Gelfand, M. J., Touchton-Leonard, K. & Nociti, N. (2016). The Quest for Significance Motivates Self-Sacrifice. Motivation Science, 2(1), 15-32. doi:10.1037/mot0000030
Gill, P., Corner, E., Conway, M., Thornton, A., Bloom, M., & Horgan, J. (2017). Terrorist Use of the Internet by the Numbers. Criminology & Public Policy, 16(1), 99-117. doi:10.1111/1745-9133.12249
Hale, J. (2011). Understanding Research Methodology 3: Goals of Scientific Research. Psych Central. Retrieved on March 1, 2018, from https://psychcentral.com/blog/understanding-research-methodology-3-goals-of-scientific-research/
Horgan, J. G. (2017). Psychology of Terrorism: Introduction to the Special Issue. American Psychologist, 72(3), 199-204. doi:10.1037/amp0000148
Jackson, R. (2009). The Study of Terrorism After 11 September 2001: Problems, Challenges and Future Developments. Political Studies Review, 7(2), 171-184. doi:10.1111/j.1478-9299.2009.00177.x
Jacques, K., & Taylor, P. J. (2013). Myths and Realities of Female-Perpetrated Terrorism. Law and Human Behavior, 37(1), 35-44. doi:10.1037/h0093992
Kirchick, J. (2010). The Homegrown-Terrorist Threat. Commentary, 129(2), 16-20. Retrieved March 12, 2018, from http://eds.a.ebscohost.com.libproxy.edmc.edu/eds/pdfviewer/pdfviewer?vid=1&sid=f8013a31-01c0-4173-93fa-fef5470d89e4%40sessionmgr4008
Kis-Katos, K., Liebert, H., & Schulz, G. (2011). On the Origin of Domestic and International Terrorism. European Journal of Political Economy, 27(1), 17-36. doi:https://doi.org/10.1016/j.ejpoleco.2011.02.002
Klausen, J., Campion, S., Needle, N., Nguyen, G., & Libretti, R. (2015). Toward a Behavioral Model of “Homegrown” Radicalization Trajectories. Studies in Conflict & Terrorism, 39, 67-83. doi:10.1080/1057610X.2015.1099995
Kruglanski, A. W., & Fishman, S. (2009). Psychological Factors in Terrorism and Counterterrorism: Individual, Group, and Organizational Levels of Analysis. Social Issues and Policy Review, 3(1), 1-44. doi:10.1111/j.1751-2409.2009.01009.x
Kruglanski, A. W., & Orehek, E. (2011). Chapter 10 The Role of the Quest for Personal Significance in Motivating Terrorism. In The Psychology of Social Conflict and Aggression (pp. 153-166). New York: Psychology Press. Retrieved March 6, 2018, from https://public.psych.iastate.edu/caa/classes/487Readings/KruglanskiOrehek2011.pdf
Lavrakas, P. (2008). Research Design. In Encyclopedia of Survey Research Methods (Vol. 1, pp. 724-731). Thousand Oaks, CA: SAGE Publications, Inc. Retrieved February 20, 2018, from http://eds.b.ebscohost.com.libproxy.edmc.edu/eds/detail/detail?vid=1&sid=864d8e0a-74ed-4e24-9e1a-e1a7268c777e%40pdc-v-sessmgr01&bdata=JnNpdGU9ZWRzLWxpdmU%3d#AN=474384&db=nlebk
Leedy, P. D., & Ormrod, J. E. (2016). Practical Research: Planning and Design (11th ed.). Pearson Education, Inc: Upper Saddle River, NJ. Retrieved March 13, 2018, from https://digitalbookshelf.argosy.edu/#/books/9781323328798/cfi/6/6!/4/2/2/48@0:0
Matić, R., Dremel, A., & Šakić, M. (2015). Terrorism: Social Causes and Perspectives. Varstvoslovje: Journal Of Criminal Justice & Security, 17(1), 46-61. Retrieved March 14, 2018, from http://eds.b.ebscohost.com.libproxy.edmc.edu/eds/pdfviewer/pdfviewer?vid=1&sid=04a02ff9-33ba-438a-95cc-d66e4dafd5ae%40sessionmgr120
Matsick, J. L., & Conley, T. D. (2016). Cultural stereotypes and personal beliefs: Perceptions of heterosexual men, women, and people. Psychology of Sexual Orientation and Gender Diversity, 3(1), 113-128. doi:10.1037/sgd0000143
Merriam-Webster Dictionary. (2018, February). Behavior [Def. 1]. In Merriam-Webster Dictionaries Online. Retrieved March 6, 2018, from https://www.merriam-webster.com/dictionary/behavior?utm_campaign=sd&utm_medium=serp&utm_source=jsonld
Muhlhausen, & Baker McNeill. (2011, April). Terror Trends 40 Years’ Data on International and Domestic Terrorism. Retrieved March 13, 2018, from http://report.heritage.org/sr0093
Nijhawan, L. P., Janodia, M. D., Muddukrishna, B. S., Bhat, K. M., Bairy, K. L., Udupa, N., & Musmade, P. B. (2013). Informed consent: Issues and challenges. Journal of Advanced Pharmaceutical Technology & Research, 4(3), 134–140. http://doi.org/10.4103/2231-4040.116779
Office of the Human Research Protection Program (OHRPP). (2013, April 30). Guidance: Special Subject Populations: Prisoners. Retrieved March 6, 2018, from http://ora.research.ucla.edu/OHRPP/Documents/Policy/9/Prisoners.pdf
Office of the Human Research Protection Program (OHRPP). (2012, September 28). Guidance and Procedure: Recruitment and Screening Methods and Materials. Retrieved March 06, 2018, from http://ora.research.ucla.edu/OHRPP/Documents/Policy/5/Recruitment.pdf
Office of the United States Attorneys. (1996). 13. Terrorism Transcending National Boundaries (18 U.S.C. § 2332b). Retrieved February 20, 2018, from https://www.justice.gov/usam/criminal-resource-manual-13-terrorism-transcending-national-boundaries-18-usc-2332b
Oliver, P. (2012). The Nature and purpose of a Literature Review. In Succeeding With Your Literature Review: A Handbook For Students (pp. 4-21). New York, NY: McGraw-Hill Open University Press. Retrieved February 16, 2018, from https://www.mheducation.co.uk/openup/chapters/9780335243686.pdf.
Olsson, P. A. (2015). The Making of a Homegrown Terrorist. Psychiatric Times, 32(4), 1-5. Retrieved on March 12, 2018, from http://eds.a.ebscohost.com.libproxy.edmc.edu/eds/detail/detail?vid=1&sid=bef07102-895b-4027-8e02-4f41974b9c11%40sessionmgr4009&bdata=JnNpdGU9ZWRzLWxpdmU%3d#AN=109630476&db=rzh
Ponterotto, J. G. (2002). Qualitative Research Methods. The Counseling Psychologist, 30(3), 394-406. doi:10.1177/0011000002303002
Precht, T. (2007). Home Grown Terrorism and Islamist Radicalisation in Europe (pp. 1-98). København, Denmark: Danish Ministry of Justice. Retrieved February 10, 2018, from http://www.justitsministeriet.dk/sites/default/files/media/Arbejdsomraader/Forskning/Forskningspuljen/2011/2007/Home_grown_terrorism_and_Islamist_radicalisation_in_Europe_-_an_assessment_of_influencing_factors__2_.pdf
Reyes, Y. (2018). Course Project Task I, Evaluating Quantitative Design: Comparing Methods and Annotated Bibliography. Retrieved March 12, 2018.
Sageman, M. (2004). Understanding Terror Networks. Philadelphia: University of Pennsylvania Press. Retrieved March 10, 2018, from https://ebookcentral-proquest-com.libproxy.edmc.edu
Scarcella, A., Page, R., & Furtado, V. (2016). Terrorism, Radicalisation, Extremism, Authoritarianism and Fundamentalism: A Systematic Review of the Quality and Psychometric Properties of Assessments. Plos One, 11(12), 1-19. doi:10.1371/journal.pone.0166947
Schbley, A. (2003). Defining Religious Terrorism: A Causal and Anthological Profile. Studies in Conflict & Terrorism, 26(2), 105-134. doi:10.1080/10576100390145198
Schwartz, S. J., Dunkel, C. S., & Waterman, A. S. (2009). Terrorism: An Identity Theory Perspective. Studies in Conflict & Terrorism, 32(6), 537-559. doi:10.1080/10576100902888453
Sokol, J. (2009). Identity Development Throughout the Lifetime: An Examination of Eriksonian Theory. Graduate Journal of Counseling Psychology, 1(2), 14th art., 1-12. Retrieved March 14, 2018, from https://epublications.marquette.edu/cgi/viewcontent.cgi?referer=https://www.google.com/&httpsredir=1&article=1030&context=gjcp
Texas Department of Criminal Justice. (2018, January). FW: Texas Department of Criminal Justice Fiscal Year 2016 Statistical Report [E-mail to the author].
Texas Department of Criminal Justice. (2016). Fiscal Year 2016 Statistical Report. Retrieved March 6, 2018, from https://www.tdcj.state.tx.us/documents/Statistical_Report_FY2016.pdf
Thompson, W. F., Lamont, A., Parncutt, R., & Russo, F. A. (2014). Music in the Social and Behavioral Sciences: An Encyclopedia. Los Angeles: SAGE Publications, Inc. Retrieved March 6, 2018, from http://eds.a.ebscohost.com.libproxy.edmc.edu/eds/ebookviewer/ebook/ZTkwMHh3d19fOTIzODkyX19BTg2?sid=4da86039-3b47-4bf4-b156-40adc87d230b@sessionmgr4006&vid=0&format=EB
UNM Office of the Institutional Review Board. (2016, March 9). Guidance on Assessing and Minimizing Risk in Human Research. Retrieved March 6, 2018, from http://irb.unm.edu/sites/default/files/Guidance%20on%20Assessing%20and%20Minimizing%20Risk%20in%20Human%20Research.pdf
United States, U.S. Department of Justice, Federal Bureau of Investigation (FBI). (2010, May 21). Terrorism 2002-2005. Retrieved March 10, 2018, from https://www.fbi.gov/stats-services/publications/terrorism-2002-2005
Victoroff, J. (2005). The Mind of the Terrorist. Journal of Conflict Resolution, 49(1), 3-42. doi:10.1177/0022002704272040
Vohs, K. D., Baumeister, R. F., & Sage Publications, I. (2007). Encyclopedia of Social Psychology. Thousand Oaks, CA: SAGE Publications, Inc. Retrieved March 6, 2018, from http://eds.a.ebscohost.com.libproxy.edmc.edu/eds/ebookviewer/ebook/bmxlYmtfXzQ3NDMwNV9fQU41?sid=90326547-7857-43a5-bc4a-9db560b7a538@sessionmgr4006&vid=0&format=EB
Wilner, A.S. & Dubouloz, C.J. (2010) Homegrown terrorism and transformative learning: an interdisciplinary approach to understanding radicalization, Global Change, Peace & Security, 22(1), 33-51, DOI: 10.1080/14781150903487956
Yale Center for Interdisciplinary Research on AIDS (CIRA). (2009, March). Beyond Scientific Publication: Strategies for Disseminating Research Findings. Retrieved March 12, 2018, from https://depts.washington.edu/ccph/pdf_files/CARE_Dissemination_Strategies_FINAL_eversion.pdf