Questions? 800.667.7745; Voice Mail: 925-391-0363
Add To Cart

Section 7
Internet-Based Propaganda: Access to An Endless Stream
of Glorifying Extremist

Question 7 | Test | Table of Contents

Office of Partner Engagement

If you wish to increase the text size of this publication, maximize your window.
Click outside the box below, click Ctrl + several times, then scroll.
Questions? Email:

- Office of Partner Engagement (January 2016). Preventing Violent Extremism in Schools. Office of Partner Engagement, p. 13-15.

Peer-Reviewed Journal Article References:
Horgan, J., Shortland, N., & Abbasciano, S. (2018). Towards a typology of terrorism involvement: A behavioral differentiation of violent extremist offenders. Journal of Threat Assessment and Management, 5(2), 84–102.

Lloyd, M., & Dean, C. (2015). The development of structured guidelines for assessing risk in extremist offenders. Journal of Threat Assessment and Management, 2(1), 40–52.

Warren, J. I., Leviton, A. C. R., Reed, J., Saathoff, G. B., Patterson, T. D., Richards, L. A., & Fancher, A. D. (2018). Operationalizing theory: A moral-situational action model for extremist violence. Journal of Threat Assessment and Management, 5(4), 205–226. 

What is the first defense to monitor internet usage, content, or violent propaganda alerting to possible extremist beliefs, contacts, or future intentions? To select and enter your answer go to Test.

Section 8
Table of Contents