Noemie Bouhana

Noemie Bouhana
  • PhD
  • Professor at University College London

Professor of Crime Science and Counter Extremism

About

38
Publications
15,933
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
994
Citations
Introduction
Noémie is Professor of Crime Science and Counter Extremism in the Faculty of Engineering Sciences, University College London. She is both a political scientist and a criminologist by training, with specific interests in the complex systemic and ecological processes involved in the emergence of radicalising social ecologies, and the role these ecologies play in the emergence of extremism risk, as they interact with the biosocial factors underpinning individual susceptibility to moral change.
Current institution
University College London
Current position
  • Professor

Publications

Publications (38)
Article
Full-text available
Polarisation, social media, multiculturalism, economic strain, loss of political trust. The list of suspected drivers of extremism grows every day. How do we tell which of them really contribute to the risk of extremism? Why do some individuals seem more vulnerable to this risk than others? This paper answers these fundamental questions.
Article
Full-text available
The threat posed by lone actors ranks high on the list of terrorism-related security concerns. In recent years especially, discussions about these perpetrators have focused primarily on those associated with, or inspired by, Islamic State and other jihadist entities. However, a significant portion of lone actors actually hail from right-wing extrem...
Article
To move beyond current aggregate and static conclusions regarding radicalisation and subsequent terrorist behaviour, empirical research should look to criminological models which are influenced by the life course perspective. Current UK government policy designed to prevent radicalisation and terrorist engagement look to outputs from criminological...
Article
Full-text available
This research note argues that the ‘lone wolf’ typology should be fundamentally reconsidered. Based on a three-year empirical research project, two key points are made to support this argument. First, the authors found that ties to online and offline radical milieus are critical to lone actors’ adoption and maintenance of both the motive and capabi...
Chapter
Although the years since 9/11 have seen an significant increase in the contribution of criminologists to the study of terrorist events, efforts to apply major criminological theories to the understanding of the development of terrorist criminality and individual involvement in terrorist action have lagged. In this chapter, we apply a recently formu...
Article
Full-text available
This study examines how behavioral indicators co-occur as “risk profiles” across different domains relevant to risk assessment as theorized by a Risk Analysis Framework, and how these profiles impact upon vulnerability to radicalization. We unpack both the inter- and intra-domain relationships among profiles, identifying the relative importance of...
Chapter
In the rush to explain lone-actor terrorist radicalization and behavior, analyses highlighted a diversity of risk factors. This chapter organizes this knowledge into a general framework, the risk analysis framework (RAF). The framework incorporates theories that advance explanations about the role these factors play in producing the outcome of inte...
Research
Full-text available
Full text available from https://crestresearch.ac.uk/resources/are-conceptual-frameworks-of-radicalisation-leading-to-involvement-in-terrorism-observable/ This document reports the findings of a research project commissioned by the UK Home Office to investigate select aspects of the better-known conceptual frameworks of radicalisation leading to i...
Article
Full-text available
A public health approach to countering the threat from extremism aims to manage vulnerability before behaviour escalates to require involvement from the criminal justice system. Fundamental to applying a public health approach is understanding how risk (and protective) factors can be modified, in other words, the functional roles of these factors....
Article
Full-text available
This article adds to the growth in data‐driven analyses seeking to compare samples of violent extremists with other violent populations of interest. While lone‐actor terrorists and public mass murderers are frequently treated as distinct offender types, both engage (or attempt to engage) in largely public and highly publicized acts of violence and...
Chapter
This chapter updates builds upon previous descriptive analyses of lone-actor terrorists, their behaviours, ideological backgrounds and degrees of ‘loneness’. It offers greater conceptual clarity, updated data and a more expansive set of variables from previous analyses. Individual vulnerability indicators examined here include potential indicators...
Article
Full-text available
Crime is a complex phenomenon. To understand the commission of crime researchers must map both the temporal and the spatial processes involved. The current research combines a temporal method of analysis, Behaviour Sequence Analysis, with geospatial mapping, to outline a new method of integrating temporal and spatial movements of criminals. To show...
Article
This study examines individual differences in violent extremist intentions. It combines key criminological theories and concepts including situational action theory, social learning theory, self-control, general strain theory and legal cynicism. We employ a conceptually integrated approach to studying extremism, which acknowledges the profound effe...
Article
This paper presents a simulation model describing the radicalisation process. The radicalisation process is a complex human socio-environmental process which has been of much academic interest for the past two decades. Despite this it is still poorly understood and is an extremely difficult area for social scientists to research. It is a subject wh...
Article
Research suggests that lone-actor terrorists and mass murderers may be better conceptualized as lone-actor grievance-fueled violence (LAGFV) offenders, rather than as distinct types. The present study sought to examine the extent to which these offenders could (or could not) be disaggregated along dimensions relevant to the threat assessment of bot...
Article
Research Summary The lone‐actor terrorist population can be extremely heterogeneous and difficult to detect. Intelligence is vital to countering this threat. We devise a typology of person–exposure patterns (PEPs) that could serve as a framework for intelligence gathering and threat assessment. We use cluster analysis and a risk analysis framework...
Article
Ongoing targeting of mass transit networks and the challenges associated with policing these large open systems means that encouraging public vigilance and reporting on railways is a counter-terrorism priority. There is, however, surprisingly little research on motivations and barriers to cooperating with the police in this context. This paper cont...
Article
Full-text available
Although there has recently been a considerable increase in research into lone actor terrorism, one of the main areas that remains understudied is that of target selection. The lack of empirically driven studies that can guide prevention measures is a notable oversight. This paper applies methods from environmental criminology to examine the reside...
Article
Full-text available
Terrorists from a wide array of ideological influences and organisational structures consider security and risk on a continuous and rational basis. The rationality of terrorism has been long noted of course but studies tended to focus upon organizational reasoning behind the strategic turn toward violence. A more recent shift within the literature...
Article
Full-text available
This article provides an in-depth assessment of lone actor terrorists’ attack planning and preparation. A codebook of 198 variables related to different aspects of pre-attack behavior is applied to a sample of 55 lone actor terrorists. Data were drawn from open-source materials and complemented where possible with primary sources. Most lone actors...
Article
The Channel programme is part of the Prevent Strategy, one of the four strands of the UK counter-terrorism strategy known as CONTEST. While the programme has been running since 2007 and thousands of purportedly ‘vulnerable’ individuals are referred to the programme each year, there are still gaps in public knowledge about the programme, and this ar...
Technical Report
Full-text available
Led by UCL, the purpose of this deliverable is to set out an analytical framework, which will 1) guide and motivate the project's data collection activities; and 2) provide the 'bare frame' around which to build LAEE scripts by identifying key categories of indicators associated with LAEEs, which are theorised to signposts opportunities for the pre...
Article
The study found little to distinguish these two violent offender types in their socio-demographic profiles. Their behaviors, on the other hand, differed significantly in the degree to which they had interacted with co-conspirators, their antecedent event behaviors, and the degree to which they lacked information prior to their attack. Unlike lone t...
Article
Led by UCL, the purpose of this deliverable is to set out an analytical framework, which will 1) guide and motivate the project's data collection activities; and 2) provide the 'bare frame' around which to build LAEE scripts by identifying key categories of indicators associated with LAEEs, which are theorised to signposts opportunities for the pre...
Article
Full-text available
PurposeBehavioural crime linkage is underpinned by two assumptions: (a) that offenders exhibit some degree of consistency in the way they commit offences (their modus operandi [MO]); and, (b) that offenders can be differentiated on the basis of their offence behaviour. The majority of existing studies sample at most three crimes from an offender's...
Article
Full-text available
A recent disciplinary offshoot of criminology, crime science (CS) defines itself as “the application of science to the control of crime.” One of its stated ambitions is to act as a cross-disciplinary linchpin in the domain of crime reduction. Despite many practical successes, notably in the area of situational crime prevention (SCP), CS has yet to...
Conference Paper
Full-text available
This paper examines the phenomenon of extreme protest activities in the environmental and animal rights movements, and how their propagation can be simulated through the construction of agent-based models. It uses criminological theory to examine what factors cause a propensity for violent action to spread across social networks, and uses this as t...
Article
This report introduces the crime prevention knowledge-base on evaluation and lays out the foundations of a systemist evaluation framework for online influence activities (OIAs). Different approaches to evaluation are assessed for suitability, including evidence-based and realist evaluation, and the pros and cons of the main families of research des...
Technical Report
Full-text available
This report introduces the crime prevention knowledge-base on evaluation and lays out the foundations of a systemist evaluation framework for online influence activities (OIAs). Different approaches to evaluation are assessed for suitability, including evidence-based and realist evaluation, and the pros and cons of the main families of research des...
Conference Paper
form only given. Systems engineering requires a good understanding of user needs. For security systems, the potentially large number of threats and the diverse conditions that a product may experience can create practical challenges for those in charge of developing system requirements. The complexity involved in carrying out this task can be reduc...
Article
Full-text available
The use of forensic evidence in the prosecution of terrorism cases was investigated using data provided by the Metropolitan Police and Crown Prosecution Service. This article addresses the following questions: (1) What are the types of evidence used in the prosecution of terrorism cases in Britain between 1972 and 2008? (2) Are there differences be...
Article
Full-text available
In this paper, the authors derive the specifications for a security system capable to detect so-called suspicious human activities using an affordable network of radar sensors. This work constitutes a first step towards the development of a robust day-and-night twenty-four hour surveillance system performing real-time automatic detection of terrori...

Network

Cited By