# Conspiracy theories and radicalization to political violence

The proliferation of conspiracy theories and their intersection with political extremism has emerged as a central concern in contemporary security studies, political psychology, and sociology. While historical instances of conspiracy-driven violence are well documented, the modern digital ecosystem has fundamentally altered the speed, scale, and nature of radicalization. The process by which individuals internalize conspiratorial narratives and subsequently mobilize toward violent extremism involves a complex interplay of psychological vulnerabilities, ideological hybridization, algorithmic amplification, and sociological triggers. This research report synthesizes peer-reviewed literature, institutional data, and global case studies to examine the precise mechanisms through which conspiracy theories radicalize individuals toward extremism and political violence.

## Psychological Mechanisms of Radicalization

The adoption of extremist ideologies is rarely a spontaneous occurrence; rather, it is the culmination of distinct psychological processes that make violence appear logically necessary and morally justified to the individual. Radicalization is best understood not as an innate pathology, but as a cognitive and behavioral trajectory influenced by contextual stressors.

### The Needs, Narratives, and Networks Framework

A foundational framework for understanding ideological radicalization is the "3N Model," developed by Kruglanski and colleagues, which posits that extremism emerges from the convergence of Needs, Narratives, and Networks [cite: 1, 2, 3]. The primary psychological driver in this model is the "need for significance"—the fundamental human desire to matter, be respected, and possess a clear sense of purpose within a social hierarchy [cite: 3, 4]. 

When individuals experience profound personal or collective grievances—such as social alienation, economic disenfranchisement, discrimination, or perceived government overreach—they often suffer a critical loss of significance [cite: 1, 2]. This psychological distress creates a "cognitive opening," a state of heightened receptivity to novel, unconventional, or extreme belief systems that promise to restore the individual's sense of self-worth and agency [cite: 2]. Conspiracy theories provide highly effective "narratives" in this context. They offer unambiguous, totalizing explanations for complex societal problems, cleanly dividing the world into an in-group of enlightened victims and an out-group of malevolent conspirators [cite: 2, 5]. Finally, extremist "networks" (operating both online and offline) provide the social validation and camaraderie necessary to reinforce the narrative, satisfy the individual's need to belong, and isolate the target from moderating influences [cite: 2, 4].

### Threat Perception and Cognitive Openings

Conspiracy theories frequently operate by artificially elevating threat perceptions to an existential level. By suggesting that a shadowy cabal is actively working to destroy, subjugate, or replace the in-group, these narratives cultivate a pervasive sense of imminent danger [cite: 6]. This heightened threat perception elicits strong, mobilizing emotional responses, primarily anxiety, outrage, and anger.

Research analyzing the linguistic and behavioral patterns of anti-government extremists indicates that anger and perceived government illegitimacy serve as powerful mediating variables bridging conspiracy beliefs and support for political violence [cite: 7]. As believers consume narratives detailing ongoing, secretive injustices perpetrated by the state, electoral systems, or elite institutions, the perceived legitimacy of these authorities erodes. Once an authority is deemed fundamentally illegitimate and inherently hostile, violence transitions from being a taboo transgression to a necessary, defensive measure [cite: 7].

## Processes of Moral Disengagement

A critical psychological barrier to mass violence is the human capacity for self-regulation and moral sanction. To commit acts of political violence, individuals must bypass their internalized ethical standards without suffering debilitating psychological dissonance. Albert Bandura’s theory of moral disengagement outlines specific cognitive restructuring techniques that allow individuals to perform harmful acts while maintaining a positive self-concept [cite: 8, 9, 10]. 

Extremist networks and conspiratorial milieus systematically employ these mechanisms to prepare adherents for violence. The mechanisms are generally categorized into three distinct psychological domains: the cognitive restructuring of the behavior itself, the obscuring of personal agency, and the alteration of the perception of the target [cite: 11, 12]. The convergence of the 3N Model and these mechanisms highlights how individual vulnerabilities are exploited by conspiratorial narratives to systematically dismantle moral barriers to violence, as illustrated in the following diagram.

[image delta #1, 0 bytes]





### Cognitive Restructuring of Behavior

The first domain involves altering how the violent act is perceived by the perpetrator. The most potent mechanism is moral justification, wherein destructive behavior is framed as serving a sacred, noble, or socially necessary purpose [cite: 8, 10]. Conspiracy theories excel at this; if an individual believes they are fighting a literal cabal of child abusers or preventing a global genocide, violence is redefined as a heroic necessity [cite: 2, 12]. This is frequently accompanied by euphemistic labeling, which uses sanitized or abstract language to mask the severity of violent acts—referring to mass casualty events as "cleansing operations," "kinetic actions," or "surgical removals" [cite: 10, 12]. Additionally, advantageous comparison is utilized to contrast the individual's violence against a supposedly much worse atrocity committed by the conspirators, making the extremist's actions seem trifling or defensive by comparison [cite: 8, 10].

### Obscuring Personal Agency

The second domain involves minimizing the perpetrator's sense of personal responsibility for the harm inflicted. Displacement of responsibility allows the actor to shift the blame to an authority figure, a dictating ideology, or even the algorithm itself, arguing that they were merely following necessary imperatives and had no alternative [cite: 10, 12]. Diffusion of responsibility dilutes personal accountability by embedding the action within group dynamics; when an individual acts as part of a mob, a militia, or a decentralized online swarm, the psychological weight of the violence is distributed, meaning no single individual feels entirely responsible for the outcome [cite: 10, 12].

### Alteration of Target Perception

The third domain focuses on the victims of the violence. Dehumanization is a pervasive feature of conspiracy-driven extremism. It involves stripping the target of human qualities, often portraying them as demonic, parasitic, or animalistic [cite: 8, 9, 10]. For example, the QAnon movement frequently framed political elites as literal demons or parasitic entities, entirely removing the psychological barriers associated with harming another human being [cite: 6, 9]. This is complemented by the attribution of blame, wherein the victim is viewed as the true aggressor whose covert, conspiratorial actions necessitated the violent response [cite: 8, 10].

| Psychological Domain | Specific Mechanism | Application in Conspiracy Extremism |
| :--- | :--- | :--- |
| **Restructuring Behavior** | Moral Justification | Framing violence as an absolute necessity to prevent a fabricated atrocity (e.g., preventing a "Great Replacement" or stopping a deep-state cabal) [cite: 8, 10, 12]. |
| | Euphemistic Labeling | Using sanitized, bureaucratic, or pseudo-military terminology to describe the murder or assault of perceived conspirators [cite: 10, 12]. |
| | Advantageous Comparison | Justifying immediate violence by comparing it to an exaggerated or entirely fictional ongoing threat [cite: 8, 10]. |
| **Obscuring Agency** | Displacement of Responsibility | Shifting moral culpability to ideological leaders, anonymous online figures (e.g., "Q"), or divine imperatives [cite: 10, 12]. |
| | Diffusion of Responsibility | Participating in mob violence or decentralized network harassment where individual accountability is masked by the collective [cite: 10, 12]. |
| **Altering Target Perception**| Dehumanization | Portraying target groups as subhuman, parasitic, or demonic, thereby removing natural empathetic restraints [cite: 8, 9, 10]. |
| | Attribution of Blame | Reversing the roles of victim and aggressor, claiming the targets brought the violence upon themselves through their alleged conspiratorial actions [cite: 8, 10]. |

## The Attitude-Behavior Gap in Extremism

While the psychological mechanisms facilitating violence are well documented, a central paradox remains in extremism research: the vast majority of individuals who hold extreme conspiracy beliefs never engage in physical violence [cite: 1, 13, 14]. Understanding this attitude-behavior gap is crucial for accurate risk assessment and the allocation of counter-terrorism resources.

### Critiques of Linear Radicalization Models

Historically, radicalization was conceptualized as a highly predictable, linear progression. Fathali Moghaddam’s "Staircase to Terrorism" (2005) remains a highly influential metaphor in policy circles [cite: 15, 16]. Moghaddam envisioned a narrowing staircase where entire populations begin on the ground floor, experiencing feelings of material deprivation or perceived systemic injustice. As individuals seek to address these grievances, a progressively smaller subset ascends to higher floors, passing through stages of displaced aggression, moral engagement with extremist ideologies, and socialization into a terrorist network, until the only remaining perceived option is the commission of a violent act [cite: 4, 16, 17].

While the Staircase model is heuristically useful for illustrating how contextual, population-level grievances can be funneled into focused aggression, contemporary empirical research heavily critiques its deterministic, sequential assumptions [cite: 15]. Empirical studies indicate that radicalization is frequently non-linear and highly idiosyncratic. Individuals may adopt profound cognitive radicalization (holding extreme, violence-justifying beliefs) without ever progressing to behavioral radicalization (committing violent acts). Conversely, some individuals may engage in extremist violence with minimal prior ideological commitment, driven instead by social pressures, thrill-seeking, or acute personal crises [cite: 5, 14].

### Catalysts for Behavioral Mobilization

Quantitative scoping reviews of literature from 2000 to 2023 reveal that the association between belief in conspiracy theories and actual violent behavior is highly complex and conditionally dependent [cite: 18]. Cross-sectional surveys consistently demonstrate a statistically significant but generally weak-to-moderate positive correlation between conspiracy ideation and attitudinal support for political violence [cite: 13, 18]. However, moving from attitudinal support to actual mobilization requires specific external or internal catalysts [cite: 1].

Research suggests that conspiracy theories act primarily as a "radicalizing multiplier" rather than a standalone cause of terrorism [cite: 19]. Conspiracism provides the ideological scaffolding that justifies violence, but the physical manifestation of that violence usually depends on individuals who possess intersecting risk factors. These factors include high baseline aggression, a history of criminality, ongoing psychological distress, specific psychosocial vulnerabilities, or exposure to immediate triggering events (such as highly contested elections or severe public health mandates) [cite: 20, 21, 22]. Consequently, law enforcement risk assessments are increasingly shifting focus from the mere presence of extreme beliefs to the identification of these specific mobilization catalysts [cite: 18].

## The Emergence of Composite Violent Extremism

The landscape of political violence has shifted dramatically over the past decade. Traditional counter-terrorism paradigms relied heavily on discrete ideological categories, such as ethno-nationalism, Salafi-jihadism, or structured right-wing extremism. However, modern digital radicalization has fostered a high degree of ideological hybridization, rendering traditional taxonomies increasingly obsolete.

### Evolution of Ideological Hybridization

Security agencies initially adopted colloquial terms to describe attackers who cherry-picked disparate, historically contradictory beliefs. In the United States, the Federal Bureau of Investigation (FBI) utilized the term "salad bar extremism," while British counter-terrorism officials created the "Mixed, Unstable, or Unclear" (MUU) designation to categorize offenders who defied traditional bucketing [cite: 23, 24, 25]. This shift is heavily driven by digital consumption habits, where algorithms serve users a fragmented mosaic of extremist content, allowing young individuals to venerate the operational tactics of Salafi-jihadism while simultaneously adopting the aesthetic and rhetoric of white nationalism [cite: 26].

### Taxonomies of Composite Extremism

Recognizing the need for a rigorous academic framework to replace colloquialisms, researchers developed the concept of Composite Violent Extremism (CoVE) [cite: 15-18]. CoVE provides a structured taxonomy for categorizing attackers whose worldviews challenge established silos. This framework is essential for threat assessment, as the underlying motivations dictate the potential targets and operational methods of the attacker.

| CoVE Subtype | Defining Characteristics | Operational Examples & Indicators |
| :--- | :--- | :--- |
| **Ambiguous** | Lacks any coherent ideological system. Driven by a chaotic amalgamation of subcultures, prejudices, and personal grievances (e.g., misogyny, antisemitism, fascination with mass violence) [cite: 24, 27]. | Often resembles non-ideological mass shooters. Attackers may display contradictory symbols simultaneously without demonstrating any understanding of their historical context [cite: 24]. |
| **Mixed** | Adheres to multiple, distinct, and recognizable ideologies at relatively equal levels of conviction, merging them into a bespoke worldview [cite: 24, 27]. | An attacker combining deep ecological extremism with Salafi-jihadist tactics and explicit sovereign-citizen rhetoric [cite: 24, 25]. |
| **Fused** | Oriented primarily around a single core ideology, but incorporates sentiments or language from other distinct ideologies that complicate immediate categorization [cite: 24, 27]. | A right-wing extremist who adopts extensive anti-capitalist, far-left rhetoric to express grievances against specific corporate entities or tech platforms [cite: 27]. |
| **Convergent** | Adheres to a distinct ideology but actively coordinates or expresses solidarity with entirely different ideological groups based on a shared immediate goal or enemy [cite: 24, 27]. | Anti-government domestic militias attempting to align with foreign designated terrorist organizations based on a shared desire to destabilize the federal government [cite: 24]. |

The COVID-19 pandemic acted as a mass accelerator for this ideological convergence [cite: 28, 29]. Global disruption, combined with widespread physical isolation, forced millions to navigate digital platforms where health anxieties were rapidly weaponized. Anti-lockdown and anti-vaccine sentiments seamlessly merged with deep-state conspiracy theories (such as QAnon) and sovereign citizen ideologies, creating a generalized anti-system, anti-government milieu [cite: 30]. In this environment, the specific ideology became secondary to the overarching meta-narrative: that a corrupt, hidden elite was orchestrating crises to subjugate the population [cite: 29]. This broad anti-institutional framing allows extremists from across the political spectrum to find common cause, further accelerating the CoVE phenomenon.

## Digital Infrastructure and Algorithmic Amplification

The mechanism of modern radicalization cannot be separated from the digital infrastructure that facilitates it. Conspiracy theories and extremist propaganda no longer rely solely on active, peer-to-peer offline recruitment; they are passively accelerated by the fundamental architecture of the modern internet.

### Recommendation Algorithms and the Attention Economy

Social media platforms deploy machine-learning recommendation algorithms designed to maximize user retention and engagement, the core metrics of the attention economy [cite: 31, 32]. These systems do not inherently evaluate content for truth, nuance, or societal benefit; they optimize for watch time, shares, and comments. Because human psychology is naturally biased toward threat detection and high-arousal emotions, content that triggers outrage, fear, and intergroup hostility consistently outperforms neutral, factual information [cite: 33, 34].

This dynamic results in "algorithmic amplification," wherein recommendation engines autonomously push users toward increasingly extreme content [cite: 32, 35]. A user initially exploring mainstream political conservatism, alternative health practices, or gaming content may be algorithmically guided down an "ideological rabbit hole" toward white nationalism, incel forums, or QAnon conspiracies, as the system attempts to serve progressively more stimulating content to maintain engagement [cite: 31, 36, 37]. This creates a positive feedback loop that solidifies echo chambers, normalizes previously fringe concepts, and artificially inflates the perceived social consensus surrounding conspiracy theories [cite: 4, 33].

### Migration to Alternative Technology Platforms

As major platforms (e.g., Facebook, YouTube, X) face regulatory pressure and implement stricter content moderation policies, extremist communities have increasingly migrated to "alt-tech" ecosystems [cite: 38]. Platforms such as Telegram, Gab, and Rumble explicitly market themselves as free-speech alternatives, adopting highly permissive or completely hands-off moderation approaches [cite: 63-65]. 

Telegram, in particular, has evolved into a crucial digital infrastructure for both international terrorism and domestic political extremism [cite: 38, 39]. Its hybrid functionality—combining encrypted, private direct messaging with massive, public one-to-many broadcast channels—makes it an ideal staging ground for radicalization [cite: 38]. On these platforms, disinformation, conspiracy theories, and accelerationist propaganda (which advocates for the intentional collapse of modern society through mass violence) circulate unchecked, providing a safe haven for cross-pollination among global extremist networks [cite: 39, 40]. Research indicates that following major deplatforming events on mainstream sites, these alt-tech platforms experience massive surges in user acquisition, effectively consolidating highly radicalized individuals into concentrated digital enclaves [cite: 39, 41].

## Mechanisms of Stochastic Terrorism

The synthesis of algorithmic amplification and pervasive, unchecked conspiracism has given rise to the phenomenon of "stochastic terrorism" [cite: 42, 43]. Originally a statistical concept applied to risk modeling, the term has been adapted to describe a specific, mass-mediated form of modern political violence. 

### Probabilistic Violence and Mass Communication

Stochastic terrorism refers to the use of mass communications to demonize an individual, group, or institution to such an extent that it predictably provokes random acts of ideologically motivated violence, even without direct coordination or explicit orders [cite: 42-45]. By repeatedly broadcasting dehumanizing conspiracy theories—such as framing political opponents as literal demons, or a minority demographic as an existential, invasive threat—to an audience of millions, the communicator effectively raises the statistical background risk of violence. 

While the vast majority of the audience will merely consume the content or engage in non-violent digital harassment, the sheer volume of exposure makes an eventual violent act by a susceptible lone actor statistically probable [cite: 43, 44]. The following flowchart illustrates this probabilistic dynamic.

[image delta #2, 0 bytes]





### Legal Distinctions from Direct Incitement

Stochastic terrorism represents a significant challenge for legal and security frameworks because it circumvents traditional thresholds for criminal incitement. In many Western legal doctrines (such as the *Brandenburg v. Ohio* standard in the United States), incitement requires the speaker to explicitly direct imminent, lawless action against a specific target [cite: 42, 44]. Stochastic terrorism, by contrast, operates on plausible deniability. The speaker can claim they were merely engaging in hyperbolic political rhetoric or protected free speech, maintaining distance from the unpredictable, uncoordinated actions of the "lone wolf" perpetrator [cite: 45]. This asymmetric dynamic allows highly influential figures to effectively weaponize unstable individuals against political targets without incurring direct legal liability.

## Distinctions Between Ideological Radicalization and Psychopathology

When acts of politically or conspiratorially motivated violence occur, public and media discourse frequently defaults to explanations centered on psychopathology. However, the academic consensus firmly rejects the premise that mental illness is a primary, sweeping cause of radicalization or terrorism [cite: 46, 47]. 

### Psychiatric Prevalence in Extremist Populations

Systematic reviews of radicalized populations establish that extremists, taken as a whole, are generally no more likely to suffer from severe mental illness than the general population [cite: 48, 49]. In fact, members of highly organized, formal terrorist groups often exhibit *lower* rates of mental illness than the general public. Clandestine organizations actively screen out individuals whose instability, impulsivity, or impaired reality testing might compromise operational security and group cohesion [cite: 46, 47]. 

Attempting to explain the complex, multifaceted process of radicalization through the singular lens of a psychiatric diagnosis is highly reductive. Mental illness does not possess the ideological specificity required to target discrete political entities, nor does it account for the vast majority of non-violent individuals managing similar psychiatric conditions [cite: 46, 50]. Evidence suggests that socio-economic variables, such as a history of criminal behavior or unemployment, are often stronger statistical predictors for group-based extremism than clinical psychopathology [cite: 49].

### Psychosocial Profiles of Lone-Actor Extremists

While mental illness does not cause terrorism writ large, crucial distinctions emerge when stratifying extremists by their operational profile. Empirical studies consistently demonstrate a significantly higher prevalence of psychopathology among "lone-actor" terrorists compared to group-based actors, as highlighted in the data visualization below.

[image delta #3, 0 bytes]





Lone actors—who often self-radicalize online without physical affiliation to an established group—report higher lifetime prevalence rates of specific disorders, notably schizophrenia, delusional disorders, and autism spectrum disorders, compared to both the general population and group actors [cite: 22, 50, 51]. In these specific sub-cohorts, psychological distress or neurodivergence may interact disastrously with social isolation, rendering the individual highly susceptible to the rigid, black-and-white certainty offered by online conspiracy theories [cite: 48, 52]. Consequently, forensic mental health practitioners increasingly view clinical mental illness in these cases not as the primary genesis of the extremism, but as a critical vulnerability factor that amplifies susceptibility to toxic online narratives [cite: 51, 52].

| Offender Characteristic | Group-Based Extremists | Lone-Actor Extremists |
| :--- | :--- | :--- |
| **Prevalence of Mental Illness** | Extremely low (~3.4%), often lower than general population averages due to operational screening [cite: 47, 50]. | Comparatively high (~31.9%), representing a significant vulnerability factor, though still a minority of the total cohort [cite: 47, 50]. |
| **Social Integration** | High integration into a distinct subculture; reliant on strong peer networks and offline social bonds [cite: 4, 46]. | Characterized by high rates of social isolation, unemployment, and deep reliance on digital parasocial relationships [cite: 46, 49]. |
| **Ideological Coherence** | Generally strict adherence to established organizational doctrines and strategic collective goals [cite: 53]. | High tendency toward Composite Violent Extremism (CoVE); idiosyncratic blending of personal grievances with disparate ideologies [cite: 24, 27]. |

## Global Manifestations of Conspiracy-Driven Violence

The weaponization of conspiracy theories is a distinctly transnational phenomenon. While specific narratives heavily adapt to local historical and cultural contexts, the underlying mechanisms of algorithmic amplification and moral disengagement remain remarkably consistent across the globe.

### Electoral Disinformation and Institutional Destabilization in Brazil

The destructive capacity of election-denial conspiracy theories was starkly demonstrated in Brazil during and after the 2022 presidential election. Former President Jair Bolsonaro and his political platform systematically cultivated a pervasive narrative termed the "Grand Collusion" [cite: 30-32]. This theory alleged that a vast network comprising the Brazilian Left, the Supreme Federal Court, and mainstream media was conspiring to manipulate the nation's highly reliable electronic voting system to ensure his defeat [cite: 54, 55].

Bolsonaro's digital campaigns utilized massive networks of bots and social media platforms to radicalize supporters, heavily mirroring the rhetoric and tactics of the 2020 US election denial movements [cite: 54, 56]. This multi-year campaign of delegitimizing state institutions successfully activated the psychological mechanism of perceived government illegitimacy. When Bolsonaro was defeated, his supporters, viewing the democratic process as a fraudulent coup, established semi-permanent encampments outside military bases demanding intervention [cite: 57, 58]. On January 8, 2023, this conspiratorial mobilization erupted into stochastic violence as thousands stormed and ransacked the Presidential Palace, Congress, and Supreme Court in Brasília [cite: 54, 57]. The event underscored how state-level actors can weaponize disinformation to direct violence against democratic infrastructure.

### Religious Conspiracism and Political Assassination in Japan

Japan has historically been viewed as relatively insulated from Western-style conspiracy extremism, yet recent events highlight significant underlying vulnerabilities. In July 2022, former Prime Minister Shinzo Abe was assassinated by Tetsuya Yamagami. The attacker was motivated by Abe's deep political ties to the Unification Church, a global religious sect founded in South Korea known for highly exploitative fundraising practices [cite: 59, 60]. Yamagami's actions were solitary, but his underlying grievance regarding the covert, historical collusion between the ruling Liberal Democratic Party (LDP) and controversial religious organizations resonated with long-standing domestic suspicions [cite: 59, 60]. 

Simultaneously, Japan has experienced a rising tide of imported and hybridized conspiracy movements. "Yamato Q," a Japanese offshoot of the American QAnon movement, has successfully blended global deep-state conspiracies with anti-vaccine rhetoric and domestic spiritualism [cite: 61]. In 2022, members of Yamato Q transitioned from online radicalization to direct action, resulting in arrests for invading and sabotaging COVID-19 vaccination clinics in Tokyo under the guise of protecting children from a globalist depopulation plot [cite: 61]. Furthermore, historic xenophobic conspiracies continue to thrive online, particularly narratives targeting the *Zainichi* (ethnic Koreans in Japan), accusing them of secretly controlling the media and government to subjugate the native population [cite: 61].

### Ethno-Religious Supremacy and Communal Violence in Asia

In South and Southeast Asia, disinformation and conspiracy theories are actively utilized to validate ethno-religious supremacy and incite widespread communal violence [cite: 62, 63]. Given the region's massive youth demographic and rapid mobile internet penetration, digital platforms like WhatsApp, TikTok, and Facebook have become volatile accelerators for extremism [cite: 37, 62, 63]. 

In India, Hindu nationalist movements frequently utilize social media to amplify the "Love Jihad" conspiracy theory, which alleges a highly coordinated Islamic plot to seduce and convert Hindu women to systematically alter the nation's demographics [cite: 64]. This narrative has been directly linked to widespread vigilantism and lethal mob violence against the Muslim minority [cite: 64]. Similar dynamics exist in Sri Lanka and Myanmar, where Buddhist extremist groups—such as the Bodu Bala Sena (BBS) and the 969 Movement—have systematically propagated rumors via social media claiming that Muslim populations are conspiring to eradicate Buddhism through economic monopolization and higher birth rates. These coordinated disinformation campaigns have repeatedly precipitated deadly riots, state-sanctioned persecution, and the burning of minority businesses [cite: 63, 64]. In Indonesia, digital pathways have accelerated radicalization toward jihadist groups like Jamaah Ansharut Daulah (JAD), bypassing traditional offline indoctrination entirely and facilitating plots by radicalized youth [cite: 37, 65, 66].

### Agricultural Protests and Far-Right Co-optation in Europe

Throughout 2023 and 2024, significant farmer protests erupted across the European Union, initially driven by legitimate socioeconomic grievances. These included low wholesale prices, inflation, unfair trade competition from non-EU imports, and the bureaucratic burdens of EU environmental regulations (such as stringent nitrate emissions targets) [cite: 67, 68]. 

However, these organic protests were quickly co-opted in the digital sphere by far-right political entities (e.g., the AfD in Germany and Rassemblement National in France) and transnational conspiracy networks [cite: 69, 70]. Independent fact-checking networks identified a massive influx of disinformation surrounding the protests, specifically narratives alleging that the EU was intentionally destroying agricultural infrastructure to force the population to consume synthetic, lab-grown meat or insects as part of a globalist control mechanism [cite: 69, 70]. This deliberate mapping of a genuine economic dispute onto a broader "Great Reset" conspiracy framework served to obscure the farmers' actual policy demands, instead channeling agrarian frustration into a generalized, radicalized hostility toward climate action and European democratic institutions [cite: 70].

## Strategies for Preventing and Countering Violent Extremism

As the mechanisms of radicalization have evolved from physical organizational recruitment to decentralized digital immersion, strategies for Preventing and Countering Violent Extremism (P/CVE) must adapt accordingly. Security-dominated, punitive approaches are insufficient for addressing the deep sociological and psychological roots of conspiracy-driven extremism [cite: 71, 72].

### Public Health Approaches and Cognitive Inoculation

Contemporary P/CVE frameworks increasingly advocate for a "public health" approach to extremism [cite: 21, 37]. Rather than solely targeting individuals who are already mobilizing toward violence, this model focuses on primary and secondary prevention by building community-wide resilience against manipulative narratives [cite: 72]. 

A highly promising psychological intervention is "attitudinal inoculation" (frequently termed "prebunking"). Drawing on epidemiological concepts, inoculation theory suggests that exposing individuals to weakened, deconstructed forms of extremist logic and disinformation tactics before they encounter the actual propaganda builds cognitive resistance [cite: 6, 37]. By educating populations on *how* conspiracy theories manipulate fear, exploit confirmation bias, and deploy logical fallacies, practitioners can reduce the efficacy of the narrative, closing the cognitive opening before radicalization can take root. Furthermore, effective P/CVE programs must develop localized counter-narratives that acknowledge genuine societal grievances without validating conspiratorial conclusions, providing vulnerable youth with alternative, non-violent avenues to achieve a sense of significance and community belonging [cite: 21, 37].

### Platform Regulation and Algorithmic Auditing

Addressing the supply side of extremism requires direct, sustained intervention in the digital infrastructure that amplifies it. Voluntary self-regulation by technology companies has consistently proven insufficient due to the fundamental misalignment between public safety imperatives and engagement-driven corporate business models.

Legislative frameworks are shifting away from relying on platforms to moderate individual posts toward mandatory algorithmic accountability. The European Union's Digital Services Act (DSA), fully applicable in 2024, represents the most comprehensive effort to date. The DSA legally mandates that "Very Large Online Platforms" (VLOPs) conduct rigorous, independent risk assessments to determine how their recommendation algorithms might amplify systemic societal risks, including civic discourse manipulation, election interference, and the spread of illegal hate speech [cite: 32, 34]. Similarly, the UK's Online Safety Act imposes duties of care regarding algorithmic design [cite: 32]. Future global regulatory efforts must focus on auditing and restricting the automated amplification mechanics that transform fringe conspiracies into mass-market radicalization funnels, ensuring that platforms share accountability for the stochastic violence their systems facilitate [cite: 31, 34, 73].

## Conclusion

The radicalization of individuals via conspiracy theories is a multi-dimensional threat that transcends traditional geographic and ideological boundaries, driven heavily by the architecture of the modern digital ecosystem. Exploiting the innate human need for significance, vulnerable individuals are drawn into digital networks that provide clear, albeit fabricated, narratives of existential conflict. Through the well-documented psychological mechanisms of moral disengagement and dehumanization, the fundamental taboo against violence is systematically dismantled. This cognitive trajectory is vastly accelerated by social media algorithms designed to optimize engagement through outrage, resulting in an environment conducive to stochastic terrorism, where mass demonization guarantees eventual, uncoordinated violence. Addressing this escalating global threat requires a profound paradigm shift: moving beyond reactive counter-terrorism tactics toward proactive public health strategies, cognitive inoculation, and stringent, international regulatory oversight of the algorithmic amplification systems that facilitate modern extremism.

## Sources
1. [farid.berkeley.edu](https://farid.berkeley.edu/downloads/publications/jos24.pdf)
2. [pmc.ncbi.nlm.nih.gov](https://pmc.ncbi.nlm.nih.gov/articles/PMC12894200/)
3. [www.cambridge.org](https://www.cambridge.org/core/books/cambridge-handbook-of-the-psychology-of-violent-extremism/conspiracy-theories-and-violent-extremism/DCD7D317614C020C62B029AE97E54014)
4. [www.frontiersin.org](https://www.frontiersin.org/journals/psychology/articles/10.3389/fpsyg.2023.1111354/full)
5. [misinforeview.hks.harvard.edu](https://misinforeview.hks.harvard.edu/article/the-relationship-between-conspiracy-theory-beliefs-and-political-violence/)
6. [pmc.ncbi.nlm.nih.gov](https://pmc.ncbi.nlm.nih.gov/articles/PMC6238178/)
7. [research-repository.griffith.edu.au](https://research-repository.griffith.edu.au/server/api/core/bitstreams/72561473-2e65-4ea1-8985-87bb2ec42b8f/content)
8. [www.tandfonline.com](https://www.tandfonline.com/doi/full/10.1080/09546553.2025.2462601)
9. [melissainstitute.org](https://melissainstitute.org/from-beliefs-to-acts/)
10. [www.orfonline.org](https://www.orfonline.org/expert-speak/from-clicks-to-chaos-how-social-media-algorithms-amplify-extremism)
11. [www.researchgate.net](https://www.researchgate.net/publication/379331631_Misinformation_Extremism_and_Conspiracies_Amplification_and_Polarization_by_Algorithms)
12. [zu.elsevierpure.com](https://zu.elsevierpure.com/en/publications/algorithmic-amplification-and-polarization-in-social-media/)
13. [www.globalvoices.org.au](https://www.globalvoices.org.au/post/algorithmic-auditing-for-social-media-companies-preventing-the-algorithmic-amplification-of-extremi)
14. [www.frontiersin.org](https://www.frontiersin.org/journals/social-psychology/articles/10.3389/frsps.2025.1711791/full)
15. [www.lawfaremedia.org](https://www.lawfaremedia.org/article/composite-violent-extremism-radicalization-pattern-changing-face-terrorism)
16. [vuir.vu.edu.au](https://vuir.vu.edu.au/45661/1/Composite_violent_extremism-SCTrevised_final.2023.03.03.pdf)
17. [tacklinghate.org](https://tacklinghate.org/blogs/composite-violent-extremism-an-original-conceptual-framework/)
18. [www.researchgate.net](https://www.researchgate.net/publication/369627730_Composite_Violent_Extremism_Conceptualizing_Attackers_Who_Increasingly_Challenge_Traditional_Categories_of_Terrorism)
19. [www.fdd.org](https://www.fdd.org/analysis/2023/04/18/composite-violent-extremism-a-radicalization-pattern-reshaping-terrorism/)
20. [www.researchgate.net](https://www.researchgate.net/publication/51648120_Terrorism_as_a_process_A_critical_review_of_Moghaddam's_Staircase_to_Terrorism)
21. [fathalimoghaddam.com](https://fathalimoghaddam.com/wp-content/uploads/2013/10/1256627851.pdf)
22. [pubmed.ncbi.nlm.nih.gov](https://pubmed.ncbi.nlm.nih.gov/15740448/)
23. [www.isdglobal.org](https://www.isdglobal.org/wp-content/uploads/2023/08/Young-guns_Understandings-a-new-generation-of-extremist-radicalization-in-the-United-States.pdf)
24. [digitalcommons.usf.edu](https://digitalcommons.usf.edu/cgi/viewcontent.cgi?article=1140&context=jss)
25. [www.isdglobal.org](https://www.isdglobal.org/media-mentions/conspiracy-theories-and-violence-isd-research-featured-in-new-york-times-on-growing-links-political-mainstream/)
26. [www.cais-research.de](https://www.cais-research.de/en/ags/tracing-global-flows-of-far-right-online-radicalisation/)
27. [www.researchgate.net](https://www.researchgate.net/publication/338308220_Investigating_Radicalization_Trends_Case_Studies_in_Europe_and_Asia_Case_Studies_in_Europe_and_Asia)
28. [www.rand.org](https://www.rand.org/content/dam/rand/pubs/research_reports/RR400/RR453/RAND_RR453.pdf)
29. [www.cfr.org](https://www.cfr.org/articles/america-exporter-far-right-violent-extremism-brazil-and-beyond)
30. [www.editora.puc-rio.br](https://www.editora.puc-rio.br/media/Report_CLAS_PUCRio_2025%20ebook.pdf)
31. [www.idea.int](https://www.idea.int/sites/default/files/2023-11/case-study-brazil-gsod-2023-report.pdf)
32. [www.mdpi.com](https://www.mdpi.com/2313-5778/9/4/149)
33. [www.journals.uchicago.edu](https://www.journals.uchicago.edu/doi/10.1086/738867)
34. [pmc.ncbi.nlm.nih.gov](https://pmc.ncbi.nlm.nih.gov/articles/PMC11804141/)
35. [www.mdpi.com](https://www.mdpi.com/1648-9144/60/6/926)
36. [www.som360.org](https://www.som360.org/en/article/false-relationship-between-violent-radicalization-and-mental-health)
37. [pmc.ncbi.nlm.nih.gov](https://pmc.ncbi.nlm.nih.gov/articles/PMC7525107/)
38. [pure.uva.nl](https://pure.uva.nl/ws/files/148372537/2.pdf)
39. [www.google.com](https://www.google.com/search?q=time+in+India)
40. [www.google.com](https://www.google.com/search?q=time+in+Brazil)
41. [www.google.com](https://www.google.com/search?q=time+in+Japan)
42. [en.wikipedia.org](https://en.wikipedia.org/wiki/Stochastic_terrorism)
43. [www.britannica.com](https://www.britannica.com/topic/stochastic-terrorism)
44. [www.tandfonline.com](https://www.tandfonline.com/doi/full/10.1080/17539153.2024.2305742)
45. [pt.icct.nl](https://pt.icct.nl/article/stochastic-terrorism-and-incitement-violence-linguistic-and-psychological-analysis)
46. [csl.mpg.de](https://csl.mpg.de/en/projects/philosophical-and-public-security-law-implications-of-stochastic-terrorism)
47. [www.frontiersin.org](https://www.frontiersin.org/journals/psychology/articles/10.3389/fpsyg.2019.00437/full)
48. [academic.oup.com](https://academic.oup.com/fsr/article/6/2/115/6802658)
49. [pmc.ncbi.nlm.nih.gov](https://pmc.ncbi.nlm.nih.gov/articles/PMC10121227/)
50. [journals.lib.sfu.ca](https://journals.lib.sfu.ca/index.php/ujp/article/download/6604/5935/24484)
51. [rpm.psikologi.ui.ac.id](https://rpm.psikologi.ui.ac.id/wp-content/uploads/sites/141/2022/04/Milla-et.al-2022.pdf)
52. [www.tandfonline.com](https://www.tandfonline.com/doi/full/10.1080/10714421.2026.2658935)
53. [home-affairs.ec.europa.eu](https://home-affairs.ec.europa.eu/document/download/fa5e5bdc-1fbe-4b00-91d4-72cda980bc21_en?filename=Conclusions%20Paper%20final.pdf)
54. [www.isdglobal.org](https://www.isdglobal.org/digital-dispatch/conspiracy-theories-continue-to-mobilize-extremists-to-violence/)
55. [perilresearch.com](https://perilresearch.com/resource/radicalization-in-times-of-covid/)
56. [thesoufancenter.org](https://thesoufancenter.org/intelbrief-2025-september-9/)
57. [rsis.edu.sg](https://rsis.edu.sg/ctta-newsarticle/disinformation-conspiracy-theories-and-violent-extremism-in-south-asia/)
58. [academic.oup.com](https://academic.oup.com/edited-volume/61835/chapter/546942471?searchresult=1)
59. [gnet-research.org](https://gnet-research.org/wp-content/uploads/2021/03/GNET-Report-Polarising-Narratives-And-Deepening-Fault-Lines.pdf)
60. [www.undp.org](https://www.undp.org/sites/g/files/zskgke326/files/publications/UNDP-RBAP-Violent-Extremism-in-SE-Asia-case-study-Assuming-the-Worst-2020.pdf)
61. [infid.org](https://infid.org/wp-content/uploads/2024/01/Working-Paper-A-Cross-country-Report-on-Trends-of-Extremism-in-South-and-South-East-Asia.pdf)
62. [www.isdglobal.org](https://www.isdglobal.org/wp-content/uploads/2022/11/Telegram-as-a-Buttress_How-far-right-extremists-and-conspiracy-theorists-are-expanding-their-infrastructures-via-Telegram.pdf)
63. [www.researchgate.net](https://www.researchgate.net/publication/359378528_Telegram_and_Digital_Methods_Mapping_Networked_Conspiracy_Theories_through_Platform_Affordances)
64. [pt.icct.nl](https://pt.icct.nl/sites/default/files/2023-04/Article%206_2.pdf)
65. [radicalisationresearch.org](https://radicalisationresearch.org/research/us-extremism-on-telegram-fueling-disinformation-conspiracy-theories-and-accelerationism/)
66. [epub.ub.uni-muenchen.de](https://epub.ub.uni-muenchen.de/92891/1/10.117713548565221104977.pdf)
67. [feps-europe.eu](https://feps-europe.eu/wp-content/uploads/2025/01/10.-The-farmer-protests-in-the-EU.pdf)
68. [www.eunews.it](https://www.eunews.it/en/2024/06/03/farmers-protests-exploited-to-spread-fake-news-about-eu-climate-policy-study-nails-european-far-right/)
69. [efcsn.com](https://efcsn.com/projects/farmers-protests-weaponized-to-spread-climate-misinformation-report-from-climate-facts-europe-project-finds/)
70. [research.wur.nl](https://research.wur.nl/en/publications/farmer-protests-in-europe-20232024/)
71. [icct.nl](https://icct.nl/sites/default/files/2024-03/Anti-Government%20Threats%20and%20their%20Transnational%20Connections%20%282%29.pdf)
72. [icct.nl](https://icct.nl/sites/default/files/2023-06/QAnon%20Policy%20Brief%20-%20Kruglova%2012%2006%20TO%20PUBLISH.pdf)
73. [www.gcsp.ch](https://www.gcsp.ch/sites/default/files/2024-12/SSA-11-white-crusade-how-to-prevent-right-wing-extremists-from-exploiting-the-internet.pdf)
74. [icct.nl](https://icct.nl/node/2670)
75. [www.ncbi.nlm.nih.gov](https://www.ncbi.nlm.nih.gov/books/NBK537580/)
76. [gifct.org](https://gifct.org/wp-content/uploads/2025/02/GIFCT-25WG-0225-EG-Resources-1.1.pdf)
77. [www.google.com](https://www.google.com/search?q=time+in+Japan)
78. [www.bpb.de](https://www.bpb.de/themen/medien-journalismus/facts-contexts/facts-contexts-en/trail-of-rumours/552773/conspiracy-theories-and-their-believers-in-contemporary-japan/)
79. [www.waseda.jp](https://www.waseda.jp/top/en/news/83437)
80. [misinforeview.hks.harvard.edu](https://misinforeview.hks.harvard.edu/article/the-relationship-between-conspiracy-theory-beliefs-and-political-violence/)
81. [gjia.georgetown.edu](https://gjia.georgetown.edu/society-culture/in-the-shadow-of-a-murder-religious-freedom-versus-the-social-good-in-japan/)
82. [www.japanesestudies.org.uk](https://www.japanesestudies.org.uk/ejcjs/vol24/iss3/prusa.html)
83. [pt.icct.nl](https://pt.icct.nl/article/stochastic-terrorism-and-incitement-violence-linguistic-and-psychological-analysis)
84. [www.tandfonline.com](https://www.tandfonline.com/doi/full/10.1080/09546553.2025.2462601)
85. [vuir.vu.edu.au](https://vuir.vu.edu.au/45661/1/Composite_violent_extremism-SCTrevised_final.2023.03.03.pdf)
86. [www.isdglobal.org](https://www.isdglobal.org/wp-content/uploads/2023/08/Young-guns_Understandings-a-new-generation-of-extremist-radicalization-in-the-United-States.pdf)
87. [www.uu.nl](https://www.uu.nl/sites/default/files/Hurk_Dignum-FundamentalModelsRadicalization.pdf)
88. [assets.publishing.service.gov.uk](https://assets.publishing.service.gov.uk/media/638f089bd3bf7f327e1ea969/internet-radicalisation-report.pdf)
89. [participation-in.eu](https://participation-in.eu/media/D2.6-developing-a-model-for-understanding-the-pathways-of-extremism-and-radicalization.pdf)
90. [www.researchgate.net](https://www.researchgate.net/publication/396972257_Digital_Pathways_to_Radicalization_Step_to_Terrorism_with_Understanding_Social_Psychological_and_Technological_Dimensions_of_Terrorism_in_Indonesia)
91. [pmc.ncbi.nlm.nih.gov](https://pmc.ncbi.nlm.nih.gov/articles/PMC9175065/)
92. [en.wikipedia.org](https://en.wikipedia.org/wiki/Algorithmic_amplification)
93. [www.orfonline.org](https://www.orfonline.org/expert-speak/from-clicks-to-chaos-how-social-media-algorithms-amplify-extremism)
94. [zu.elsevierpure.com](https://zu.elsevierpure.com/en/publications/algorithmic-amplification-and-polarization-in-social-media/)
95. [knightcolumbia.org](https://knightcolumbia.org/research/algorithmic-amplification-and-society)
96. [stand.ie](https://stand.ie/stand-newsroom/digital-divide-algorithm-breeding-ground-hate)
97. [pmc.ncbi.nlm.nih.gov](https://pmc.ncbi.nlm.nih.gov/articles/PMC8314290/)
98. [www.redalyc.org](https://www.redalyc.org/journal/804/80464411005/html/)
99. [www.researchgate.net](https://www.researchgate.net/figure/Forms-of-Moral-Disengagement-and-Associated-Mechanisms_tbl1_340328790)
100. [albertbandura.com](https://albertbandura.com/albert-bandura-moral-disengagement.html)
101. [www.sfu.ca](https://www.sfu.ca/~kathleea/docs/Mechanisms%20of%20Moral%20Disengagement.pdf)
102. [radicalisationresearch.org](https://radicalisationresearch.org/research/a-false-dichotomy/)
103. [www.tandfonline.com](https://www.tandfonline.com/doi/full/10.1080/09546553.2025.2463591)
104. [www.emerald.com](https://www.emerald.com/insight/content/doi/10.1108/JCP-05-2024-073/full/html)
105. [pubmed.ncbi.nlm.nih.gov](https://pubmed.ncbi.nlm.nih.gov/36226447/)
106. [www.safeguardingsolihull.org.uk](https://www.safeguardingsolihull.org.uk/wp-content/uploads/2024/06/handbook-for-practitioners-extremism-radicalisation-mental-health.pdf)

**Sources:**
1. [nih.gov](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQHToyl74T9b2KzE17lz2cjwaTALJv4DfEqxPoXOu1_XPduE7OAmEdTMHjBb6MAiEzIvJhkoGq11Sct1S59YM9ci3evv2aV8TrTNH3a0_oBkw0huudUf7FXBASmnt17FbLMTN5UQcshFDQ==)
2. [ui.ac.id](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQFD6TFc_Kbec7g9vaz6n-Y3FyjGWP_JTrTG2WZngY3fOUuBek5k6KelMUxhsERwsTm0g_MUWDAgGJGwvtDWfqb8HKklDqp7oWp4oLPcTlsz2fvdDhtb2QfNpzYUG8-qbgXnHDsvNuGfWSiMYmw9u1qfgIKH133COHU9tRIyOzwfCc_d291c23T7GcX0QNz7)
3. [uu.nl](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQFC0fMVa6H7WZ3WmuMBaJl7c8_1J7WeC6Kp-Ws1mQzqr0Xo4edZ7kfsQjzcmTgM4KfQbCein4ZusEXgi6GJY7PWhg9Q4mhSSxNcHmBL49f-JHthK7oNif9rHM9NfaDvXU9CoHMQbuhxhF5dFWVFD7Smspjj-4-eiMXb_OTBQfWA9CMKz-djQ8nV_CBd)
4. [participation-in.eu](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQEfenLE2sh1-OAQxMNkMoYmL28u8kEfy7pgjGF939eSdhrrAO-lgn4rrZ4zNwQbm7f5THrWveI399rk--nFzNFUm0Q5XsFy_wBOCq2oPcBG-TqkdR_JJVZQocZ6MUBkO4COuWtlfda8KFf9PZxj1AmqY1fPuYJzzWr9x-nAlTbpNKE-qo-JObYhDEaLTY2FTl24c9kPQAG-GjD4VwRp9wCIcf0dwgJxkAQ_nOvgHH-k3Sz2)
5. [frontiersin.org](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQHGQkTlUikzU0IGCBPI7uXS8z-60uGp6YlaTNIjrqddLfrxRUiwNTG0ig_Io4vebKAo5NibLO-9zYTcEaaVChqSpicjl0EdqngITxYqKSn5zVl773M-RRpZR12fQef3p6AcXJ7Fy9khjv3ybJ2HhGMmn8A0ecWnmabN0aaoXmIVTQaPy86VXMV7lg278A==)
6. [cambridge.org](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQErpIc9Ut717EjC0vle3F8Agy8GGazE2pue4Z8KNeaLwFcYre9-DXitAjJdgepcyL5W4VCdvYeL3iwfV2e-XUhZOVRfDdP0zN3Agi66dYJDBU0wHdF_n7Lh_Npim8DqN9-Pj3mchrEvKzEJW-fRMIQnfYB9x0HsC9GuIPYXNPy-0h1cOdpgUs7euGX5DJDNVHe8xnYqGd2N1J_OVuCQomvmYAkfDOBvnTQKtIKRjmF5O0fimD58NF358pw_x6jKVYHEq_F3iAqAusz9A0KLPhRMsMh96RbngVeq-EPVs87QiQ==)
7. [griffith.edu.au](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQHKAU1gyYUAJsLCJTj51g0Nua1uPbvnYN0r-iB0PcAUJJtyZfB2eQVjk82iMf4bK0aZNlW6ckTR5AQUOYKwkrQCDK594KuNl3xWTRk2LH34GR1u6r1Deb1ye0TR_ckgieM0mPWT9gxLiSqDrGk0fFyDJ8oCiI_tOo8_rA3buG5e3nc_mJY2sNpsdSAEPcBKmChL_9wL6YeyYkf8t7350LqYw95Kx42YburV)
8. [oup.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQH-5O_PI3uLGcpKE-BceYVXuCqXhR7QGZpQ2IxaTe2oeDsdvGYWS2JKrfxn833OCeMFjidcFJWHKozGoeyPiCE7Z5CJGXy_UseSBMvYnvngxPOYUVGMPJ1LWsEqEnfd2n8L8H7zx_wZEViu)
9. [sfu.ca](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQE1tpF61WECV4ETEvPqWMRe4TETjJvsXF45gnqdxbO1H2lR8Bm4EgIlq6xT-yPbv6iufAAxFMaCgcdaA4lT-hLNdMumlIStv7x67XU3gAJGi1OHGOJxEQLIZjjyjkHq4dQfShYLXeWbc7DbMSVhvILbqetPpTQ7d69bpietMTXmHg==)
10. [nih.gov](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQEhwDW9xgSlaPQVYRm5-rEnjAqWbnFkk9z-Pg4Sactczzzq0BOPO0Lys4gktMZUXhq4o8OJwa1gATmqwLEjmAjPWmNQzrJ3y0f6h1jxyKL49gi0VlMhUuOnQKP7W7Vl8L2rWrgYbHUd)
11. [redalyc.org](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQFW3drPk0c8t0xzBtDAMlR-2Zs_1HfyL8L2Q5HvwYH70V8BWEsu8wxer6Qkefk4_8OmBP1LdHTn9u-V54jckghwRGAijUw22F5LXEUlh6fxNvKykfrYjDSWq4BYZ70Q0sdI8L_o1xEb4IQuRw==)
12. [sfu.ca](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQHww_qUh7qaSYeg-fiR4hGm6pEd-Fb6-ypQ6AJtBEhQR8fC9F5D83IFnVE-h1Xw1Xj9voBhcKZMpuP2NnEVRVjHdfpKKd0VLTnfrki1EKzKcePfv-LPA_VTsSPESuTkndKhlPHkeWYiz45Q5Dg_INdpw3csg_2oaOBWvPFOhFqypzzVDg==)
13. [harvard.edu](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQFDtarXlNf7gKzJIGI5Qj5yeeS1G1T2Hck8YdfF8cDw3XRXdoVwf7RI8anBI8Ewmxc-RUAMvsWJ7T1f1KtFnIQ25rqcZXlwRdCafvQAm-OvveEvd8o4JAyymLgRyq3OUijDrA7VvT_HaT129s9GfzzbzhDGmreOqVukC6ltW2BylUQQtWHR1PqYqEDOYAGsxNv9aTxFFLvQyRxmVGo5jGk_AyN43LkcV9jQC8YPBO0=)
14. [usf.edu](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQH92Lmpudex6Y6jo2gSNTeQORS1Z7rjSFZlqRZuGU6u5RG6KrGpgQByUKBVyBwM06DcVzSiXdSGdmbl4B9CD6u6dNyylOdFzy7XaQBypriuXWZEAkrahBlJ5ieOgadxnWWjRuC9ohZSdcgvNSBXXbQ9PSmJ-WpiAqjA_7bNeHhGhiI=)
15. [researchgate.net](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQHN9E_ohp8dbuO4MYLoON_jYN_1K-ZOt3o91beJ34EEhYMTMA3rtrOMrEsure7EKbeLjfFoNZhFZ_cbr84lHTyMO4K3ygmaxIGuvsDNhVKHWPYwdjU8pMY-ACIi7Lu-lv9cg5MFhQhNJkisSPzIBm12uLFeOqK7hJE0Juvmh8DUcXXW7UV7SN3v_fcfFSigbYUysKvV6DkBaWUAjsm_RWoGMEOCJ8gWFmSls8mEp5HFkxw5aQ8rxSo=)
16. [fathalimoghaddam.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQFbPuFVZekLqSdjUfRURAzztDYklS2rGGTvLtylqml1ICAkEQ3j2rNs180d0TlOlpNrAOE9V4580ULqwt0yr35BaP1LoYD6dOf-dUWDigVcfcRDHt3dbv1y4Qmz_2eXerIqRVT2Wwu-aPYvIhNBLpMI182shMUWoHAIJSJT)
17. [nih.gov](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQHLlmqprLGafSIgk3gDN_kQUXhM7Se12wfJiQl9IYNOTr5EXZkSZTbk-s7owLHcheVWYaPjUKlMGDCBsUy1QkI-JwHMdj_ZN3Naifpw_v3RRnRYBWW8_3K8pDHKpjTllg==)
18. [tandfonline.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQEXLhHkxwAPFG_WHi-LO6BXLKscE-IQHHumM3qyv0wL8zYzj-Qrj4mDYCk_DogP_VIMhpzGc6bpPxH2eK0kr2afLxxtSiUkiDlVUmjUr7RRvkxtGzvRujX-m87pagcpLpaefekJGNxkRv4MjFKO_ow0HEsQYTVZQVE=)
19. [nih.gov](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQFMWMRzFTYgUJ1fuXZBkMGxSCfmLfyoxlVdaJKkfE_xQidQ66HP2SmdGcNGGbPZiS3vSxTZ66Fm8yi3c1udl16ndkZJAJ-Bfqg5LjCKL1632vBUJFKJ6PmWFEHTAZmsWmJtQmznWLww)
20. [nih.gov](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQEVKeOwbyW4ByCnxsx4eNbN3b4-cUEVXKn5Z4TfuVVZmahouAWTUUNQrU1-bz2_-lpkWUm9uCfNGZzV1y-RCroUQRBMyzXpVnlmGoGRzfVIPRb50fIiIWmFF0xvPCP_AOsMiLE5xZWUNw==)
21. [icct.nl](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQEDMsRg50seuYzC-zeHj01loSqiK171mppOwJTxDQ5t1QfS90MyzJccauIEfltMx-JgTg4gFSZP8W0ELxGN9q4PTpcFPLDWyGruBVx2LzFY2foalYnwhoKQyt_az7p3X9V-yEH3zznpcFZpvhCJm2sfgspx0CvYKoX1MZOTjEsv47O6RXW0sNqibC9ljXHK_cnM1A4RYts6xgd3hNL4oTj5GFTijQ==)
22. [radicalisationresearch.org](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQGSb_aihndNp8A4vYhiRXBunNe8-ZTx8MWk3tCaEl25_JpAW5koxfrtw6AVBHnSOg_DWyxLhcyB4avy8w9qa-iPZ763t1TaqAgK0wL9uqdPs3_lxKQD5la_PeUFdLZwTJXX6sQt1cQ8ektlNOaFzbwhECHP9w==)
23. [lawfaremedia.org](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQFuKxR0mVTO68IGMQtOdRd18HDqBA994Tbl9Okzf55f3BdR-wpQd51h13yJIcl0RrusJwqtj77F-TZXtbMXmJTIhOlawhOGE5DjDwZ9LDaO8pHlM1chG-zXE3vZ2nVQt--iXWPcZu7omaWM02F3xRU8ASDx77kq78dx_Zm7U4yKeNbruLcYFd3FlM_XMnGhNKpcU5W-lRuyNDHnAIn-2ZUZ3w37vn8=)
24. [vu.edu.au](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQG6_DwUtXfYKelbT5sg3XaGSGjFiCTqsIOTUucJe8-Sl81T8p6EwSNcb35QHj8R7Hcw-F4TmDl5Oym-NeuS60xmjV0_JZNlIdK8VJcPjlViN_TSN93ca_AdJqeyPe9mAppvNlHKen5-Av-e2E4l9lzatpnK3cyeNMvuZJUaNkZuK7DAQPJrOi6JXWZKoAFwPpM=)
25. [researchgate.net](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQElVqKzqM-tXrlz9LJ-pTLECgaZMrtA8x7Ur4LQiVeVfUwkbygrrckXOltBTNZH5vL26-Om2YeAmUkhgJcxkHc8Bit77GL5v0TKNhx1LZLPxG2_5_XiUz9wmMOtQ-3xhFPEyuRvr_N5eQHXwQOaYZ6-5fg-7MbYH0iN1W1XByhRg3gkoQ1d-p1mXJShS238UnwjQCzTgJAaY_V2MQBYfxcEgWHTVqM36Tp-5mvpbtUyKuR1xACQuBWJyqmgftS7LYshqeT-rvFDVuVH10URjZfJrPbtwtft_bj9ljpUKUE=)
26. [isdglobal.org](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQFCfkUc1JSP1MGjAUkGOjAvJeeNcNtuexHSUY9ItwgScbAJtZx1KGzrenLW-4EMy69shtDT247VIwGCH_bVvlzuv8d96eIkIKZWIgpSOVma2Ph7zlg2JXvKSr3wqywsWULi-LAIawfQQ44MoJu8ubFcDnefThcNwHaHElqmrhFl8rVHBzxcN6WCzwnpMm4hYu33bhO64a5Y9Ya-WT_Tx8CaA8A6_wfoMROT2OIabEsOM7bKwmOEbO-kJliIPvS5F2CeT-xxWH7kejkVMQ==)
27. [fdd.org](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQE8_QuHdlSoXWvSl4AvpOxZ7kKTk066MEhc2dYV3sjm68da1TiUKe5G3Eglz7T1sfwaW6I-xFfk3e1wS89XK0PSMCFwIboKkX7IAsJ7Lz9HVSFrIBu5oU5fSV2t052pF-HxnvqN26yHzRvRnUZJ0JRI-s_PB4WUevy1dES4e0jC2H9ncwuWXAnDxqcxOLLf7zX28xCJ8nAtU5AKzEiGCdcTgBoXtUCP0A==)
28. [tandfonline.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQFUinncYtmwG8nB_C4Gb9VBm_o8jPTPdtOSvlJg_quGttvvR7yZHP5WjypOlMWny__iKDNKQqokOmEEWJYR6OeFlJpdIcw1MIxQDaJaBdjNlpDkyohgM1vXpZgQQmLIY0v_gOBbESPZ6g5Yef7IY0rzrhXu76eASh4=)
29. [europa.eu](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQH-00-qG480Zf5_Z1Y1zepHSCai-VmE9FRM8lds75QTyRfQmt-_5zVmlxjHfBi6Da7ixhoB6CnYry0fJIfrSRA3184-56wHodmOwA3Q5fXbAkAwSF1Iyv15jniC5_qXhjgejYpSm8yqfoM1Wjdjn2UUoLregtzDCYAJdI1jEKFOT67yevcUVN1HDIOPukKXgoVAgkfLnIOwJwAUY_9CVBn8lskyvTquaZhslLjPI0CVRcdXplvjWpGUZbyq)
30. [icct.nl](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQGwGb3nacr76Wc7pLf2ZiQ7T6wdJ8vhHEzgiLJYtA4zb6-BqymHc2COqPVNkSBmzrrU6MvaBqcjHtzgGOY0OC7BjFQ3yPfwcoP9TkGBM2dgeSZK0EsAjP4LWkpQ5MVtYhryg7u5TC6DATZLrMOh7q-lrZZMpELdizqTXCUpl6LVVzZdr69nQXAahHHT97sK2a4j4h7KmYePFLdmlgHkF3O5ppVYppH6u4SvdoQoF4ivGeTwlSkt)
31. [orfonline.org](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQFtlGhVMAAHBqPEa9GHbRLu2NdgqrX99ojatVHiSd9PuCWnOVK9DvyRWM-T3ErPioNYSCPgJGE4csERtba0AqAPDAUavKiH-IKHm4PK7eYNYUZw_iIOUnDd_D2wq5F4CXT9p6JFbBp19RPV2buzX-FhFqqu10pUaAnWRoKSusVvCuQd6hmEk_JH04H39ADY1Am5htCxeqj2MRFPVxuwXmU=)
32. [wikipedia.org](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQH4nWBhuzN6xHbVimaipwfPdtOJxfnB2i9Tq8DZ8xn1fsPJ3m1cMpunuMWW2KcirtsQfQ4NWJsuEy9a6oWdv69aopTSSiCJ2Y6GjWosnHoqoWx8S4e_KznCj6YlkoryGfqi_u91ppWnyn8rSzoX)
33. [researchgate.net](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQHH40n53ACFC4O3bHOiIOzQ-sK-MddyUt77Bi8oSb935un-93pxlVHEDmcEsi15T5JNG87uvKSmGvZIz1odBMTaXPgfSuB2ZzhlvVDaSprhciifKd779h9HUeEaNTjhCF4xW6li5eSRZ3qgSq9Gw-PjjCUlDLua7yGuH71GheX73tVdNwM3flz-BlGQpXvVqg0RONovqqM9tfpqJf8UOUGmwgBep6HJkP8JI96XAj_3paj_FVtVi4uzzqiUw01RwMw=)
34. [stand.ie](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQHmHMuaPzDVyK4Z97dqq_dKq2qw_byX7NWndlhSj9WlEajm8EJe5M4ED_Ap19YUvuOdovDQKhTbYD7hYcsugkWrsgQ_OtS6QfpeOxbAQ8W6k9IzoZiGlQywRDfVbwBe6lBhtVh6Cph5DYI685VMO_HGmJEtiiCsYQm5eGpsW5bh36Y8Sw==)
35. [knightcolumbia.org](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQFSFEMtabuXev6l06YeirpcvTwQgGzYxXWyv5rSxyUASv_DV8tMKvBuheSZsu_DukioOFhFUyYR9PWpe9GH_obrwjJQtxBpC843oMaHBG5UtV-2gcGavJ70UxRyuswq4P8YEIuTxnCoQ-MUls4TKE6sVzwphpoFFfuOPut259hp)
36. [frontiersin.org](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQGbG22kKqJQDjM1_pU36aCSl37werIuFZDPAf-f9iu0dSpVwgC6QmEAi1OrbnnwMmX_qBZ844mjXadu4eHhguxduRYNqr8e3VC_W91Vj8JI4RzVAaMGBkrzQMTtq8aF0_Ol7Id0zdrJzS4PRzZ1aL3-nuU72fcAMbHfY0mophfcsZyHtMICezW3Egm3jE8iOalFQgGlGg==)
37. [thesoufancenter.org](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQGvhKN5oFN4TGgsL38UWJJuJSnfQyK8JW6-v8A2NmvVzWN2zRKjyXEMZTnQaBKERjqUkbyIsGgH2JqXm04-sd-uj-gyINv_9Zop8UWQbDEi10hlEl2yfFP_xFDWsF73UlMDY59yxB08YZGUhSHLPw==)
38. [isdglobal.org](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQHMhnDNOYVEBvE0sQj4rGSkQarfahyaDGnktFHR8_zprqmsxaogdSf1jgmP7VhQ15KX2dtyO_7wLhkDQlYqH2eIzWenn2VIZ3Kf4BjERpMW4Hqiz1XbhLSyf-9Vsia5t_9Y8bpRwWEvst2TorR5FdQQ82ilBkWzf7-pDcfPQUzL4THMJvYzCcaPAAB587AuVeJbEl1_mX1WU-GEZd1pMFpfGQqAi06pozjGbPXzBqpQTYgIJ372tJFiwLpJF85KC-6rjErYqEKy8WxODogn36kktn_S3EVb_6GLidXrT9l-0_tLvIXm1lRSsQ==)
39. [icct.nl](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQGu30WLSAGCqIv3sN8DzBSWq--KSIrC02iqkvSd5CWwGfahtlvk7WruiYsZ43GjtlpqyXvP6gJpk77D9DA2Q6CGTiOQjJ7pkmPaQLKlgQVqlYZwfj9R34wd2ycaHf7k4c2GPdC-s0VngKNDVW1H8neivEC9L0ht)
40. [radicalisationresearch.org](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQHgZm5kXQKCo_MlfH-H8sF6ziXR3QC86_wDPG7ThOn18H-f1z4R38Be-gTjAMYBEKKXbHpRpcbpHlXys6jFGkn9zS4f-fhh11g3wzqpt86XX2xuSXUBaSzjw8KzzWsqKPEoXQnM5jjMgoNQlZHOgbwHaQabB1jK_flYulx_pfbLoiApIUMyiw7Lmc4muXPj3sC5uLIzCAqa1bcjf_SwzS1isEFr6u9YMvs0x4Zr2NhezQfZAdbr03_novkt)
41. [researchgate.net](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQE-laOXyG2XmvgoflLAgwsmm5f3k6exZfMrj_O_DmzlLY3NATMU3YEJlJFbJD-Vx9kZaoOWtl29BHH4149O3X4r5KA02-jlI3B6DTzOAjJTarT1pXLIGLoRT-L3bc_W2Y8VWWXaYa_i3yJIrOuPlCpWT3kIlkrR1s3knpLWzE-90Ix-z_RjYuzFYrz4Bg67o-azFCHIRyg1334KdJZ7PshDabzMul2-VYCVgR5dUmRZObm_Oq8FntgFjTeio56sg56OfPEhjEfF7IM=)
42. [wikipedia.org](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQG3N12hgRfRfWdINRx0ZdtTRycX8W2OLbNIGzQBQGLXeGgBMX_23n7JgSjosEoWvne_Gpl8wE5zFUN0OcJmF0-mRkDhMzVPtRQh5pGTfDGkQicHEmTe_a9Cm7geU_qDpabRjSW6dL8C9Q==)
43. [tandfonline.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQE0Smic0ldYeaNysLHoOs-qJ5iOjDgusSRf59F6xZhmrl4yjO1RQ0bz47yLB65iY2pSP6g7QC2QcpnCjza5Qnt6wQR8vIA8fQhJPuXeSlJJbfK701AIlbAXUN1LKhLgHd03exCzTXzF7B7_HRbZsQsK6j_h8UpPIJ4=)
44. [britannica.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQHZqMhNUR5B-g92e2z3eZOvg1WLi0eeB1HtmEPut9EgwD8q28Apl-0i1LXAc1aN5F6Hf6oO8wr_ZWeGD1zT-76Vown5MQqmujucn0T1I709gE3XQqHRCeJdayM4F0Hb96veLSFOV71-6XDFBg==)
45. [mpg.de](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQGFLkKMcJ97_egrrWj0Dnn0AHvNHKzLWyuanRxr5-hI205QX2_gPsaEWoFWhQ_kuCm6owBsRl7Z3KbhiOO0cGlfm8DZFAZ_ZwxAGMIuMJExBN4pNiYA013JpibDpNS28kpCii5s5kmH_7eU5J16qY37pvqZjYqo5ehO296pPRSo_8VgerR0ihKUrW3bq4udzfRY28BWxzDuFv3GQhymPwM=)
46. [som360.org](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQEZpYPnW5Ral3d0dAkOMF1Avdw2yX13sqFKQtoRRTVpDLhGMwfcjnQOFURA8LSQFn62ryOl_vu2NpMZqJRkRFmgNA3DaF2Z9Ygh9PSiwK4S9U51BJ2EVkL7YlGq82l2RGiHSdnWzJs6uxB8NVnSRzumRmxRoPLCHYYzz4YnbreX9kmVlO0vVBFMsXWuPKNNz_d_ikIx2qQo4XN9ew==)
47. [emerald.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQGEAsOGqRK6xSw-2Q0HkeIqg4IhxG17QiH65mN7di02SM8zZA8_JnYy0j3BOzbbt_pgHqGo_SBpKepNS-Tu9cnpqstUfRaIad-BwRQNTg8iOJjm_d08Xm86LbOiQA-WZvaQUzovWtrK-uOz6GDZG5MqWMkjrzzVJPGo2VEmq8Q234q9_g==)
48. [mdpi.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQGPlNHcwNufHMOugZcNmitqrumsXj5N-Fo38DcQ8ZOA_3GancxNFV2NMF0aWIvwn8PovhO_8Mdin-pnNCSENInWhCyf28fG1Wxa_Bm2lsCGUkPA_UZHpQR9GGqy1KI=)
49. [tandfonline.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQEEVZJrxMQGC8hU6iXeLepKRfCS4ATUiGWginPYNl2zgcKaQIGFQdWdPaD3Cxfr5jeGab8stGKo5sAlD9GanT8QOZL23R0VzoT_MUG50iOiVSPz3GipCAapVnDxKfnQWBR54qn3KfkBp6s8l93r-6mxnlaqm51YA9Q=)
50. [uva.nl](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQE0nfPgU24YOY0Ak4CTgWMuCEXc-3n-_yp8x5UT6pRF9LjWFWiVNxFf_g0kHVBjO7TVUmiN7SlJpeqhq1pxA70d7EyuEtpUl1-U6vKZFJtBiG9ObprKZ7IjusznMtTqlLwc3A==)
51. [nih.gov](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQH_-3_UdvSFr-uYdA_eucwcV4p3DZpkgVDZgcH_zUacd5nxcNVIC_uvksSz_n5-2d6J8g6eal_AaHMhY6ZoZfZg7qHM1AuV7-mxB-Paa78n3gk1NHfpyDe7NxkRGIY0IR-lxoM12cZe6w==)
52. [safeguardingsolihull.org.uk](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQHbXIed5XpVe9zTIV87HLULlKRiVC7XIydWs372LBA_yw8JelsB97IwYFS4n-ubcyQ42wifWY4Qnuubla0p8Xr34YbkQxf7NQszfqwGMyeCKDiJAGcDHECKiS_s70xobdX-gtClysFw8HN80mD1aXDTGYJSZ4zl6dujukD-VlHTFFyCPTm89LioT5yFxWVUyFa7NHwuvIBwUcKkhl4FdCpznUrqGKisMCzXgSc0He0xtrJEpCC0snvHNKCN20y_MA==)
53. [nih.gov](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQGKv8hAOxqkpXY0Feqe2VQSEdricNYc3XAOkYA6NbzQPDqDGcaQVwKXY09YN41INlC0GSUiDqrVAry3KHoFbNyHSggp4pkaDg4xS0M_m8HnVvk3aeQ7CW65YKeT-9bksA==)
54. [idea.int](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQFoEcvdK7TmEixd7gIKeSieD0vCmoZjKRVnoAz71QmR6pjSBOPoonhe9TVSpOOLgi7GdvGRuBWLMhzs-P1804zufC5t7E1fVgnKB8HnJ93tBb2dH9IgzJnA6iQPMvgKasQgdu7Kfj0XqvC6aA-U8_duZGRJA4EKoJ5fJryAMXuQ92T7FtgaU8CATEoZ2VI=)
55. [mdpi.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQEduZe4HLAZFHL6u5G6s2CAAprJuvk3u5IJJl89Q_Wm_rmuvaqx6ZF37EHae56v10zbXHHn9tTAnPJlLzFoZZzz1qDk3uA7m9AbkBZIMV2AUZ8Lyv4kDxbpp6ghJA==)
56. [puc-rio.br](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQGwiLjdywAPkC0xNeZgOkHGwfBwkOYNpDJdWuc_B_0r6B15VBcMaq69LNX-uRqeXmv4ahOs9pddFFjQmQ-0oEvKsNHOglh5M2x4Lz-Wzb9ETukKLkgCgzV6ZOfi0GZ6JWSdi53jLDoEKuR88kCx2Px4XCK3eEJSYTrtvUE0qrA=)
57. [cfr.org](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQEPFMQM7u6NJj3OjJC5Or9k0JkwF8wdjYuItnQooeFkCbjd0Pk-XXv7aMpmtykjMHgKsbuhz3lYbsj-NSe-Dt4lUT0sbR6ep9lH_1yXjxnQprPjwOJUgSmpLdjdQVCqYklJ3hdwqpt46eVEEJqskIo-g_1dWS22oL_v5BVLApkFghdimv_EHYzNrKqYV-Zj4bvY)
58. [uchicago.edu](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQHKsl9-NBPI60iAp0bei9VxFFgqwnSV_Qp1WIqeEYPymJKdOoPJm1CEOY9OCVZpf_vv9P1_HHSrg4Xx1kJ3RbK2OQb7Ctv88afM7jdCEERvfTwmyKSk32BTvwZcEk21i2ShH5TlmDiaXTfm)
59. [georgetown.edu](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQGQXxCyWkad9Pu7aZVPErUeM10_aPgjBdnn5WP-ffheDTGkG-cIRKmQt_tTyXY6s_zMsyfAZvdqVZa9K_P0N6OGg1vvdYt8KfT7ppP3aLVDeHpC6_cTz2hXR8X4EFdd2-HrG9wnRBYPztKmBlkG_5nZ5M06nzIJmW_Ik1Azlz2sOuBxj_odNDsRvqMx3Zl7kks7HBrSawjnw3CvtXPl-xDBBC5aqyiIaeQOBQ25B98=)
60. [japanesestudies.org.uk](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQGuZHn-yVrXRvRx0u_v-3Fkjbno_EKcw5lpClvP-abTYKlHCFAqtwZjs7jkXyYMxHjcnJn72NV_pJEAViCcY-MN5MEXCfnxUQC64GCrX1I3g_kwgx_1e19IjoFRmDUIfQHH4lVnWvq6jGreclGrfl40admYpA==)
61. [bpb.de](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQFLQ5DeILSo69FwkXN1jB_-z0_41tQCYxEXCh4Ni9k47NKMcd1S7Rao8lRA77GQ9j3co2ACu2GKBiV0QcKOVakbxcZhDom4gkHXdF9VFMSAkuZJ3oHUelYR5O75dA8Sf54ngEMUVhCf88NLT-pH9b2rZQK6JLeyoV3StXnyy5Is6trF9aqNlAuDQ7gifkP0YJkEEU282nMLrEZ3YPb2YXp0GBkoc21RXGy0x4DAwHVdEurN-5S4qVKi_Qdre3aMeoVGqtPfbZQYr0FCi0N-esjePoCSWJZWtk5G1XPL)
62. [rsis.edu.sg](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQGsXdinHC0DRhX_CAEPRf6osKubOo1-o9hT5ljKk1Fc9JVAVjkSB4XsrmD0o49Ei88age_ivkBPsin7zZAg7bATuxmVoshSSKaWGo2vM19I9Xvpg55Nd-B0KTNSyIL3ZnWslOBT7OfHAO8n9ulzBmnmnDwdujkfpbYC0_cnVDPSNg6PiwTVAbAhfODpBkUVKFHrrAI0sQ9sYjbrxWB-x3mY1_s=)
63. [gnet-research.org](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQF9XfWvK9e-8ONOUvY-06RDDimuocwOr6cP-kuds_KF2Pr2IqfF4BR8FsbBAlOpDLPdiq-fbA-Ma7Ps_xX9W4Va77-VHs1MMVi4VKxGPcHUhCGmxG_CTlnIeNG6hN0NbBlfhysD843k_mnH2h7llGuYHTTGfwUros0IvnwQPyP2Oa10pwB_FpJivUeRh0URI5RSnGRmcnXhOKTuNoiUqHrK4SqVQAlOvn7rRA==)
64. [oup.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQH8XQ1F35c0Y31xHiaSrWz1mySTeExyQ7Z1QuGThwfE3JP9-IkIR7bVQbMhEasvD4HrYCytVpVY6nmBsSALRQ5tcj1NOvsU06xsz2jcpw05GLKKyqhRRfOiYaUOGIKRrX6W1MIEUoXsLnYGOvdh6KZ7EcR5r3FDpXFWYyGirUgclcECrw==)
65. [infid.org](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQEpcS7J4DecObSN5CM401ZzjLkqU96NLFrhDsxLgnfoDS1ZpRSyPti3CzFPEX2Z4ZynaJc1D5vnJ16k3KQY_QouSmvNeJ-7Xg-2VhzirrsfZNmCT28KnQQ2i7ViHH87CbINXTcHu842_hRzmz-sVOQ-0h_yCYOj4tchR2B2b9jdK3CXMaAYRzb_7T_eIiL8T2LKR_S12-VQlfWu20v04-oNVRWjA5PgfTaP6kC6hajkwSFO6CMRDhJX-ov19HCLuUs=)
66. [researchgate.net](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQEIPaV2flSY2ZwKaZUOKpfA-6ipsBmw2lDRnEOGWlopdVCjD0WNhqezeFgxPbtfvMzJ_3okftU978Ygmecf08X1wsgMVTXBpeI1R5vdDg5G0bWrwgIs9J4eb-D2PDwQUPvkd9FmEWm4Rtli76qmAjnNyEqKkB2Kz92C6x88VLgkDeu0xot1I5ROPQcn-cMMuVYUE81k89-wDp06iKKMWrZmjOyaHD8Lv18JatT0L6f30zkmxZMB2rykdH_Nyju8zdXYPpu7Yl3eG7Prg-EQBNLxMU9ppVkIouZ-jinou4WDG-DU9AeMWBWfZkOHhG1-2kKbS9dKenIqc5GQFBDZ)
67. [feps-europe.eu](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQGoAR62QM9_jXqvh9CEt9OhFHvuBvPV2P8ChhRmBATj0CPuBADHBOEuVBXDe4ajEAqrKIoFo4-yOohEY6FeVPBN_0vyTHAoCLQdD9wbRj2SqdoWyvknb0aWTsJpZbC0QHwZbrWsNAQaNmtHAWdiTRvWRrlf3ZpmtGLs-jM6WCKbcrILndN5z5amyaX4VS4=)
68. [wur.nl](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQFQoPni49iqmEJtyj5BT1MMd_ANTCqb4nbCHa7ePYLXKY1PzZO-NpZ6O49X80OhRfAfCCk_7C5Bmp3_OHAHnrSmmTyQ026QzCK0EubwUdZR2xHNsxj9s-s2pqeQa9WQxe7yPo0t26I9qe2rqWBFD511LePfKCxcz3SG6g-YvI---vo=)
69. [eunews.it](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQE8QM5gvI72MGGKOHob5vU3TQ6PSOLsXAPJShMaTiyM-XInnUWxl_m_eTwr1662pFqfrZNzCdUHDmLyt7UMq-r5munEk3C9LPyPKOfvDqeSQJWrTuc5duDXqQecI1iRwE-XPi_vk_ss8R7CVtz-ILlEp7-Ud4aNNQXGgSTb9ioJpCe6t4adeI-ZwihQ8AtGVXzFuxM6gGhwGSSGboT9R3dMTwg8075Ef_NxouC3JR35wYGHwL7zRU-uFWhZHaYBa1z6)
70. [efcsn.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQG0NRhJ_h03lp2PWV4JU2I0uPCQACTqYn6xAszG9BiJFSZQ6KymhMgPRkRR3hIxJWCAwdjWzCzUlFPad_58j8n4AKVMwv2K-pM_C6R_6-qLfW3Q5G7sX5j4AakAn5lzVyiOsQt1qrcsZLX2ahwkNaEwC2FSxfK7rgfugmUcXTw4QeGbYAXM19xUnDw4VRHzyT-DVAPePV1kF9yN4asaW8l8Xm9dCKHEUwQ_E3Gt1EbDAHCwSPVFX2k21sa56kU_)
71. [icct.nl](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQFxeCl7fZagewelz-z7ho4drdMQtcm0iKOnbBhROPLuE5iLVWGbGv5xuYtwIjlS54Ouc5QDwOVc-bMPaeqYGAouebYjlYpourh8LHUdWUa1)
72. [nih.gov](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQF4EicQW2GuNZdiF3CZpDRK_gotzSObRm3jJlGnAGYakkvC_NG8V86RB-z7zlA3_TGBBgXD2aNoUOn4re5n6pCclgedzZfxTlbPiz6HrewgMSy9UVqv8pwS3XLqJi3eige1qdE=)
73. [globalvoices.org.au](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQGVSqXfyx3HcmjzpREKKVPvnmCtw2LNEZryy3uR69ciU2MMpxlQIz_QFYuOoZHGLalQIa9vdYJMzYY0E_RLIIqRVDjRZueKdEhwCNtM9HLCglJ6C_6jrBR8KzRDl8lHOae6M5T4Wip20IKDRpEE8u0mHkDQ6MHfiy7DWmiQk62XUAGS12u0ixyL_j7g-v7SbG_Fi4OOjrP23COwRR0g3XbnivtSSeTAJw-44xroU-MXjqgQCvgF5JyXDbEPn32bIA==)
