Tahir’s method is a total solution for prevention of radicalisation based on a new and improved methodology based on knowledge, experience and advanced tools of catching thought. The method provides greater catch performance and increased efficiency by choice of preventive measures compared to earlier solutions. The basis of whole methodology is an empirical, cognitive, integrated, systematic Process model of radicalisation that explain the cognitive and active functions of human mind as Normal, transformation process and abnormal (radicalised).Further it divides empirically the radicalisation process into three categories to analyse fully the status, intensity and direction of the radicalised mind. On the other hand, the model can easily evaluate the risk analysis based on radicalised mind or minds, at individual, group, micro and macro levels.
Knowledge of what really happens when people are in the process of radicalization is essential for making the optimal preventive actions. If not, it will be completely at random what one chooses, and the chance of failure is great.
This is the weakness of all the arrangements for preventing Islamic radicalism available in Norway and rest of the world, today. These are all just experience-driven approaches, and they assume that those who will apply them have experiences that will be used both to understand what is about to happen, and what should be done. These assumptions are most often not present, and one therefore ends up with interventions that have no or limited effect.
As shown in the figure above, the shortcomings of existing offerings are many. Missing proper routines on suspicion of evolution of thought, missing the lessons learned and systematic knowledge about both Islam and the radicalization process and lack of proper tools and skills in using them in the various stages of prevention.
Our method is advanced, systematic, integrated, cognitive, descriptive and Empirical approach, when or if you have suspicion that unwanted radicalization takes place.
To do this, we use a newly developed model of the radicalization process combined with generic checklists to make diagnoses and analysis that, in turn, is used to choose the appropriate actions to solve the problem. This is the standard procedure in most other forms of prevention, but represents something new in the prevention of radicalization.
We will, in this context, in particular, emphasize that we have developed an all-new model to describe what's going on at the evolution of thought. The model is entirely problem-based and can only be evaluated for its ability to prevent unwanted radicalization. The model can cover all forms of radicalization, and may explain the evolution of thought both at the individual level, group level and the macro level, as well as uncover the lonely radicalized youth or persons, at an early stage. The model solves many of the problems associated with the existing radicalization models.
Without going into details, the model has the following characteristics:
Based on a modified “Mind space” way of thinking, covers cognitive aspects and decision theory, descriptive for easy user understanding, integrated for better controls, systematic to be result oriented.
Four pillars; Drivers, Process, Rational and Balancing functions together with sub functions, triggers and catalysts.
From these functional setup of Mind space, messages can be localized, and their unwanted nature, direction, intensity, origin and effect on the individual's cognition to advanced judgments.
This can, in turn, provide the basis for diagnosis and solutions that have a starting point in the transition between the phases and levels.
In order to be able to identify the development of any unwanted radicalization, we use systematic checklists. This use of checklist is not something new, But any other checklists are based on the unsystematic assumptions and our checklists are based on our model that makes it possible both to find out where in the process someone is and thus how to think. The collection of Data in order to be able to answer this can be done in various ways. By having daily contact with the individual under suspicion, know first-line service a lot already, one can also use the casual conversations, theme sequences, etc. in order to get the required data.
When you have sufficient data to get a detailed overview of the situation, these must be analyzed to choose optimal instruments. To do this, we have developed a set of stereotypes based on the information about who is in the process of, or are at risk of being radicalized, the most important "root causes" and at what stage in the process.
These stereotypes provide specific recommendations to be used which are at your disposal.
The choice of actions to be taken
This includes the choice of the main strategies, based on the choice of concrete actions how they are going to be designed, and what arguments to use. These are not essentially different from those used today, but with the big difference that our form is based on the knowledge and facts, not on the more or less random observations and assumptions.
Knowledge in the use of these forms is an obvious and important part to our training opportunities. Information meetings and campaigns, seminars and conferences should in this context be considered as types of actions and it’s very important to know the process itself before organizing any counter radicalization activity.
A moment to consider at this stage in the process is to decide how much resources you want to use in such a contingency.
When you have decided the choice of strategies and what actions to be used, the next step is implementation. This phase has three sub-phases.
The first step is to select stakeholders. These are groups that are participating in the implementation of the selected actions, and that may have different roles in this effort. Who is going to participate, and with what, will vary from project to project, and from municipality to municipality, and it can be complicated with many actors contributing in different ways. It may therefore be useful to make a list both of participants and their contributions before the project is put in the time.
It is optional whether one will turn all the actions together and make a list for the entirety or you want to make the list for the individual actions or subprojects. For large projects, one will have a need for both.
There are many ways to make action plans, but there should be one action plan for the overall project and for each sub-project and only our model can be great help in the coordination’s, connectivity, and assimilation of actions, if the acts are divided among different actors.
Book will be out in june 2016.
Pre-order the book: email@example.com
Our Intellectual and Exclusive Strength for Institutions and States
- Advanced Strategic process models
- Knowledge based methodologies
- Advanced Strategic courses
- Advanced Strategic analysis
- Advanced Strategic evaluations
- Advanced Strategic solutions
- Advanced Strategic policy makings
- Advanced Strategic consultancies
- Empirical Process Models - Methodologies
- Advanced Tools of Administrative Solutions
- 9 Advanced Counter Radicalisation Solutions for State Administrations
- Mathematical Equations of Radicalistaion for Evaluations