Research article

Modeling radicalization of terrorism under the influence of multiple ideologies

  • Received: 01 September 2021 Revised: 16 November 2021 Accepted: 18 November 2021 Published: 27 December 2021
  • MSC : 00A69, 97M60

  • This paper proposes a compartmental model with multiple ideologies based on the mechanism of overlapping infections of contagious diseases to describe the individual radicalization of terrorism process under the influence of two cooperative ideologies. The two ideologies attract their respective supporters in the same sensitive group. The supporters of each ideology can be divided into sympathizers and defenders according to extreme levels. Cross-interaction between the two types of sympathizers is introduced. Through the interaction, sympathizers can be influenced by other ideologies and thus become more extreme. Use a set of differential equations to mathematically simulate the update process. The research results show that ideologies with cooperative mechanisms are easier to establish themselves in a group and are difficult to eliminate. This makes it more difficult to curb radicalization of the population. Based on the model, several strategies are assessed to counter radicalization.

    Citation: Yiyi Wang, Fanliang Bu. Modeling radicalization of terrorism under the influence of multiple ideologies[J]. AIMS Mathematics, 2022, 7(3): 4833-4850. doi: 10.3934/math.2022269

    Related Papers:

    [1] Ali Al Khabyah, Haseeb Ahmad, Ali Ahmad, Ali N. A. Koam . A uniform interval-valued intuitionistic fuzzy environment: topological descriptors and their application in neural networks. AIMS Mathematics, 2024, 9(10): 28792-28812. doi: 10.3934/math.20241397
    [2] Jayanta Ghosh, Dhananjoy Mandal, Tapas Kumar Samanta . Soft prime and semiprime int-ideals of a ring. AIMS Mathematics, 2020, 5(1): 732-745. doi: 10.3934/math.2020050
    [3] Tahir Khan, Fathalla A. Rihan, Muhammad Bilal Riaz, Mohamed Altanji, Abdullah A. Zaagan, Hijaz Ahmad . Stochastic epidemic model for the dynamics of novel coronavirus transmission. AIMS Mathematics, 2024, 9(5): 12433-12457. doi: 10.3934/math.2024608
    [4] Shah Hussain, Naveed Iqbal, Elissa Nadia Madi, Mohsen Bakouri, Ilyas Khan, Wei Sin Koh . On the stochastic modeling and forecasting of the $ \mathscr{SVIR} $ epidemic dynamic model under environmental white noise. AIMS Mathematics, 2025, 10(2): 3983-3999. doi: 10.3934/math.2025186
    [5] Pengcheng Ji, Jialei Chen, Fengxia Gao . Projective class ring of a restricted quantum group $ \overline{U}_{q}(\mathfrak{sl}^{*}_2) $. AIMS Mathematics, 2023, 8(9): 19933-19949. doi: 10.3934/math.20231016
    [6] Elkhateeb S. Aly, Mohammed A. Almalahi, Khaled A. Aldwoah, Kamal Shah . Criteria of existence and stability of an n-coupled system of generalized Sturm-Liouville equations with a modified ABC fractional derivative and an application to the SEIR influenza epidemic model. AIMS Mathematics, 2024, 9(6): 14228-14252. doi: 10.3934/math.2024691
    [7] Said Gounane, Jamal Bakkas, Mohamed Hanine, Gyu Sang Choi, Imran Ashraf . Generalized logistic model with time-varying parameters to analyze COVID-19 outbreak data. AIMS Mathematics, 2024, 9(7): 18589-18607. doi: 10.3934/math.2024905
    [8] Abdon Atangana, Seda İğret Araz . Advanced analysis in epidemiological modeling: detection of waves. AIMS Mathematics, 2022, 7(10): 18010-18030. doi: 10.3934/math.2022992
    [9] Guillaume Cantin, Cristiana J. Silva . Influence of the topology on the dynamics of a complex network of HIV/AIDS epidemic models. AIMS Mathematics, 2019, 4(4): 1145-1169. doi: 10.3934/math.2019.4.1145
    [10] Yulong Li, Long Zhou, Fengjie Geng . Dynamics on semi-discrete Mackey-Glass model. AIMS Mathematics, 2025, 10(2): 2771-2807. doi: 10.3934/math.2025130
  • This paper proposes a compartmental model with multiple ideologies based on the mechanism of overlapping infections of contagious diseases to describe the individual radicalization of terrorism process under the influence of two cooperative ideologies. The two ideologies attract their respective supporters in the same sensitive group. The supporters of each ideology can be divided into sympathizers and defenders according to extreme levels. Cross-interaction between the two types of sympathizers is introduced. Through the interaction, sympathizers can be influenced by other ideologies and thus become more extreme. Use a set of differential equations to mathematically simulate the update process. The research results show that ideologies with cooperative mechanisms are easier to establish themselves in a group and are difficult to eliminate. This makes it more difficult to curb radicalization of the population. Based on the model, several strategies are assessed to counter radicalization.



    The spread of a terrorist ideology can have an important impact on the process of individual radicalization. Inspired by the "Islamic State" ideology, a large number of individuals became "jihadists". In 2014, at least 12,000 "foreign fighters" from 81 countries joined the "Islamic State". Some Western youths who are dissatisfied with their circumstances accepted the ideas of the "Islamic State" and embarked on the path of violent extremism. Radicalization is a major issue for national security, so it is necessary to deeply understand its process in order to prevent and stop the radicalization of individuals. It is in this context that this paper mathematically describes radicalization by modeling the spread of extremist ideology, in a manner similar to modeling the spread of infectious diseases.

    In recent years, scholars have gradually deepened their research on infectious disease models. These studies involve the nature, transmission dynamics and application of infectious disease models [1,2,3,4]. Many mathematical scientists use population dynamics models to simulate the spread of ideology based on the exposure process of tuberculosis. They built a warehouse model, used parameters to simulate the push and instillation of extreme ideological information [5].

    A similar approach was adopted in [6,7,8]. The difference is that scholars introduced the mechanism of super infection in which pathogens competing strains coexist, that is, the process in which individuals previously infected by one pathogen are infected by another [9]. Therefore, scholars compare ideological competition to the competition process of pathogens, and propose that the existence of competitive and milder ideologies may prevent the spread of violent extremist ideology. And scholars have analyzed the efficacy of de-radicalization treatments of extremists [7,8,10,11,12,13,14].

    This paper extends the model established by C. C. McCluskey and M. Santoprete in [8]. The difference is that we have considered a more complex ideological dissemination strategy of terrorist organizations.

    In epidemiology, in addition to competition mechanisms, there are cooperation mechanisms for overlapping infections. Individuals who have been infected with one pathogen are infected with another pathogen. The two pathogens can coexist and increase the infection of the individual through cooperation. Generally speaking, the existence of a kind of bacteria will create a breeding niche for other pathogenic bacteria, and the host is easy to be colonized by other microorganisms [15]. Compared with single microbial infections, overlapping infections are usually associated with an increase in the severity of the infection and a poorer prognosis for patients [16,17]. For example, patients with chronic hepatitis B superinfected with hepatitis E virus can aggravate the condition and increase the risk of liver cirrhosis, liver failure and death [18].

    The ideology and practice of terrorist organizations can be quite complex, and overlapping ideological concerns deserve more attention. Some terrorist organizations may have multiple long-term objectives or programs that they hope to install if they are able to come into power. Such overlaps could be especially true for religious terrorist organizations, which often have both explicitly religious and more directly political objectives. Among the 202 religious terrorist organizations listed in 2006 by the Terrorist Knowledge Base of the National Memorial Association for the Prevention of Terrorism, some of the largest are also included in the classification of nationalist groups, such as Hamas and Hezbollah [19]. In order to attract more supporters, these terrorist organizations with multiple objectives often construct multiple ideologies. The "Islamic State" has drawn on the theoretical construction created by earlier movements and parties based in political Islam, and focused on the idea of invoking jihad as holy war to motivate followers. The two core ideologies of the "California" and the violent "jihad" maintain and consolidate their own legitimacy, and through the construction of subsidiary ideologies such as "migration", "loyalty" and "joy and anger for Allah". Identify and maintain global combat attacks [20].

    We hope to use our model to test some possible strategies for coping with radicalization. First, we need to test the effect of these mutually reinforcing ideologies on individual extremes when terrorist organizations begin to spread multiple ideologies. Therefore, we assume that individuals can transfer from one ideology to another, so we design the model to include two ideologies. The useful parameters in the model to quantify the spreading potential of extremist ideology are the basic reproduction number and the entrance number.

    We will prove, if both basic reproduction numbers are less than 1, the two ideologies will be eradicated. If either of the two basic reproduction numbers is greater than 1, coexistence equilibrium may prevail. And if the coexistence equilibrium is asymptotically stable locally, it will make it difficult to eliminate any kind of ideology. Our analysis shows that multiple ideologies may enhance the effectiveness of terrorist organization recruitment strategies, which makes combating violent extremism more difficult.

    Finally, we use numerical simulations to test the effectiveness of conventional de-radicalization strategies in the context of cooperative ideology. Unlike the results in the single ideological model, our model has produced new results. The cooperation mechanism provides the ideology with a communication advantage, which makes the ideology more attractive to the crowd. The main lesson we learned from this is that when terrorist organizations adopt multiple ideological dissemination strategies, simply combating or preventing one ideology will not achieve the expected suppression effect, and may even increase the attractiveness of other ideologies of terrorist organizations.

    In order to absorb more individuals, terrorist organizations may spread multiple ideologies. In this section, we want to test the effects of these mutually reinforcing ideologies on the radicalization of individuals. In some epidemiological systems, this phenomenon is called superinfection.

    The model assumes that there are two extreme ideologies in the population, and there is a sub-population that is at risk to adopt the ideologies. The sub-population is divided into five compartments: Susceptible --S, Sympathizers 1--C1, Defenders 1--D1, Sympathizers 2--C2, Defenders 2--D2.

    The individuals in susceptible class are those who have not adopted the extremist ideology. The ones in sympathetic groups initially adopt extreme ideology. The defender group are adopters that engage in violent terrorist acts. They are the most extreme, and have a strong demonstration effect on individuals in other categories and can have a major chance of infecting others. The defenders can recruit and incite susceptible and sympathetic individuals.

    New individuals enter the susceptible class in the population at the constant rate Λ. The average natural mortality constant rate is μ. Sympathizers and defenders have additional removal rates, because they are captured with rate constants dC1, dD1, dC2, dD2, respectively. For subgroups that adopt one ideology, it is assumed that the susceptible and defenders interact according to the laws of group action, and the ratio of recruiting susceptible individuals to adopt the extremist ideology is proportional to the number of interactions that are taking place between the sub-groups. Thus, susceptible individuals are recruited at rate β1SD1/β2SD2, with a fraction qC1/qC2 entering the sympathetic class and a fraction qD1=1qC1/qD2=1qC2 entering the defender class.

    Sympathizers can switch to the defender class at a constant rate cC1/cC2, while defenders enter the sympathetic class at a constant rate cD1/cD2. The next step is to introduce cross-interaction among sympathetic individuals. As a result of the process of interaction, sympathetic individuals can be influenced by another ideology and become more extreme, the constant rate is δC1C2. The flow map is in Figure 1. Physical interpretation of the parameters is in Table 1.

    Figure 1.  Flow map of the model with two cooperating ideologies.
    Table 1.  Physical interpretation of the parameters.
    parameter Physical interpretation
    β1 β2 The recruited rate factor of susceptible individuals
    qC1 qC2 The rate of susceptible groups entering the sympathizer groups
    qD1 qD2 The rate of susceptible groups entering the defenders groups
    cC1 cC2 The rate at which sympathizers turn into defenders
    cD1 cD2 The rate at which defenders turn into sympathizers
    dC1 dC2 dD1 dD2 removal rates of sympathizers and defenders
    δ The rate factor at which sympathizers turn into defenders due to other ideological
    Λ The rate of new individuals entering the susceptible class in the population
    μ The average natural mortality constant rate

     | Show Table
    DownLoad: CSV

    The differential equations are:

    S=ΛμSβ1SD1β2SD2E1=qC1β1SD1(μ+dC1+cC1)C1+cD1D1δC1C2R1=qD1β1SD1+cC1C1(μ+dD1+cD1)D1+δC1C2E2=qC2β2SD2(μ+dC2+cC2)C2+cD2D2δC1C2R2=qD2β2SD2+cC2C2(μ+dD2+cD2)D2+δC1C2 (1)

    Where qC1+qD1=qC2+qD2=1, qC1,qD1,qC2,qD2[0,1]. The assumption for the full population is N=S+C1+D1+C2+D2.

    Proposition 1.1. Under the flow described by Eq (1), the region Δ={(S,C1,D1,C2,D2)50:NΛμ} is positively invariant and the attracting within is 50.

    Proof. The direction of the vector field is checked along the boundary of Δ. Along S=0, S=Λ>0 is present, so the vector field points inwards. For S,C1,D1,C2,D20, along C1=0, C1=qC1β1SD1+cD1D10 is present. Similarly, with D1=0,C2=0,D2=0 respectively, we have D1=cC1C1+δC1C20, C2=qC2β2SD2+cD2D20, D2=cC2C2+δC1C20, respectively. It follows from [(1), Proposition 1.1] that 50 is positively invariant.

    N=S+C1+D1+C2+D2=ΛμS(μ+dC1)C1(μ+dD1)D1(μ+dC2)C2(μ+dD2)D2ΛμN.

    According to the standard comparison theorem, for t0, it follows that N(t)(N(0)Λμ)eμt+Λμ. Thus, if N(0)Λμ, then N(t)Λμ for all t0, then the set Δ is positively invariant and the attracting within is 50.

    System (1) has three equilibrium points. We define the basic reproduction number to describe the equilibria which can quantify the ideology's transmission potential. In mathematical epidemiology, it is defined as the number of secondary infections caused by infectious individuals in susceptible class.

    There is an equilibrium point x0=(S0,0,0,0,0)=(Λμ,0,0,0,0), when C1=D1=C2=D2=0. If the first ideology is taken as an example, the basic reproduction number R1 is the spectral radius of the next generation matrix G at x0. In Eq (1), when only the first ideology exists, the subgroups affected by it includes C1, D1. Set fC1, fD1 is the new ratio of individuals using this ideology in C1, D1. Let vj=vjv+j, where v+j is conversion rate for individuals entering the subgroup j{C1,D1}, and vj is conversion rate for individuals moving out the subgroup j. The next generation matrix G=FV1 is:

    F=[fC1C1fC1D1fD1C1fD1D1](x0)=[0qC1β1S00qD1β1S0],V=[vC1C1vC1D1vD1C1vD1D1](x0)=[μ+dC1+cC1cD1cC1μ+dD1+cD1],
    G=β1S0(μ+dC1+cC1)(μ+dD1+cD1)cC1cD1[0qC10qD1][μ+dD1+cD1cD1cC1μ+dC1+cC1].

    The next generation matrix G has only one non-zero eigenvalue, and that non-zero eigenvalue is greater than zero, so its spectral radius is the non-zero eigenvalue. When S0=Λμ is included, then there is the following:

    R1=Λμβ1[cC1+qD1(μ+dC1)](μ+dC1+cC1)(μ+dD1+cD1)cC1cD1.

    Similarly, the basic reproduction value for the second ideology is:

    R2=Λμβ2[cC2+qD2(μ+dC2)](μ+dC2+cC2)(μ+dD2+cD2)cC2cD2.

    The following result follows from [21,Theorem 2].

    Theorem 2.1. If R1<1 and R2<1, then x0 is locally asymptotically stable. If R1>1 or R2>1, then x0 is unstable.

    To calculate other equilibrium points, assume that when C2=D2=0, there is an equilibrium point x1=(S1,C1,D1,0,0), set C1=D1=0, treating S1 as a parameter. This gives the linear system result:

    [(μ+dC1+cC1)qC1β1S1+cD1cC1qD1β1S1(μ+dD1+cD1)][C1D1]=[00] (2)

    Only when the coefficient matrix is a singular matrix, i.e., when the determinant is 0, C1, D1 has non-zero solution.

    S1=(μ+dC1+cC1)(μ+dD1+cD1)cC1cD1β1[cC1+qD1(μ+dC1)]=Λμ1R1.

    If the first line of Eq (1) is taken, then

    D1=ΛμS1β1S1=μβ1(R11).

    When R1>1, D1>0, add columns 2 and 3 in (1) to get:

    C1=β1S1(μ+dD1)μ+dC1D1,

    where

    β1S1=(μ+dC1+cC1)(μ+dD1+cD1)cC1cD1cC1+qD1(μ+dC1)>(μ+dC1)(μ+dD1)+cC1(μ+dD1)cC1+qD1(μ+dC1)>(μ+dC1)(μ+dD1)+cC1(μ+dD1)cC1+qD1(μ+dC1)+qC1(μ+dC1)=μ+dD1.

    Therefore, C1 and D1 have the same positive sign so the following equilibrium point results:

    x2=(Λμ1R2,0,0,β2S2(μ+dD2)μ+dC2D2,μβ2(R21)).

    There are equilibrium for which the second ideology is absent. The entrance number is the expected number of the ideology's new adopters when the new ideology invades the stable system.

    According to [4], the effect of the second ideology entering the system at the equilibrium point x1 (where the first ideology reaches balance) is calculated through the regeneration matrix. The subgroups adopting the second ideology are C2 and D2. The proportion of the newly added second ideological component and the conversion rate between the two subgroups are f and v.

    f=[fC2fD2]=[qC2β2SD2qD2β2SD2],v=[vC2vD2]=[cC2C2+δC1C2+(μ+dC2)C2cR2D2cD2R2+(μ+dD2)R2cC2C2δC1C2],
    F=[0qC2β2S10qD2β2S1],V=[cC2+δC1+μ+dC2cD2cC2δC1μ+dD2+cD2].

    With the transition matrix N=FV1, results in

    N=1H2[0qC2β2S10qD2β2S1][μ+dD2+cD2cD2cC2+δC1μ+dC2+cC2+δC1]=1H2[qC2β2S1(cC2+δC1)qC2β2S1(μ+dC2+cC2+δC1)qD2β2S1(cC2+δC1)qD2β2S1(μ+dC2+cC2+δC1)]=[ABOP],

    where H2=(μ+dD2)(μ+dC2+cC2+δC1)+cD2(μ+dC2).

    The entrance numbers I2 is the Spectral radius of N :

    I2=(A+P)+(AP)2+4BO2.

    When A,B,O,P treated as a function of δ, it can be seen that A,B,O,P are monotonically increasing functions of δ. Because A,B,O,P are greater than zero, I2A, I2B, I2O, I2P are greater than zero. Then I2 is a monotonically increasing functions of δ.

    I2>I2|δ=0=R2R1,δ>0.

    Similarly, I1 is a monotonically increasing functions of δ.

    I1>I1|δ=0=R1R2,δ>0.

    Theorem 3.1. If R1>1, R2>1, and R1R2, then I1 or I2 must have a value greater than 1. If either of I1 or I2 is greater than 1, then the corresponding equilibrium point x2 or x1 is unstable.

    In this section, discuss how R1, R2 affect the qualitative behaviour and properties of the system.

    According to Theorem 3.1, whenever the values of I1 and I2 are greater than 1 will directly affect the status of the relationship between the ideologies. δ is set as a bifurcation parameter. δ1 and δ2 are the bifurcation value of δ that respectively make I1 and I2 equal to 1. Then

    δ1=1C2X1cC1+qD1(μ+dC1)(R1R2)X1+R2(μ+dC1)[(μ+dD1)(1qD1)+cD1](R2R1)X1=(μ+dD1+cD1)(μ+dC1+cC1)cD1cC1,
    δ2=1C1X2cC2+qD2(μ+dC2)(R2R1)X2+R1(μ+dC2)[(μ+dD2)(1qD2)+cD2](R1R2)X2=(μ+dD2+cD2)(μ+dC2+cC2)cD2cC2.

    Suppose R1>1, then x1 exists and I2>0. A sufficient (but not necessary) condition for δ2 to be positive is:

    (μ+dD2)[cC2+qD2(μ+dC2)]X2<R2R1<1.

    If δ=δ2>0, then I2=1, and the Jacobian at x1 has eigenvalue 0. If δ increases to δ2, then x1 stability changes. This results in the condition where the only value of δ that could lead to a coexistence equilibrium and have a bifurcation interaction with x1.

    Suppose R2>1, then x2 exists and I1>0. A sufficient (but not necessary) condition for δ1 to be positive is:

    (μ+dD1)[cC1+qD1(μ+dC1)]X1<R1R2<1.

    If δ=δ1>0, then I1=1 and the Jacobian at x2 has eigenvalue 0. If δ increases to δ1, then x2 stability changes. This is the only value of δ that could lead to a coexistence equilibrium that has a bifurcation interaction with x2.

    Situation 1: 1<R1<R2. Then:

    x1 and x2 are both existing. For δ=0, I2=R2R1>1 and so x1 is unstable. I1=R1R2<1 and so x2 locally asymptotically stable.

    Since I1 and I2 are monotonic functions of δ, it follows that I2>1 for all δ, so that x1 is unstable, and the second ideology is always accessible at the equilibrium point x1. I1 increases with an increase of δ. When δ increases from a minimum to a certain maximum, I1 changes from less than 1 to greater than 1. Since δ1 may be positive or negative, consider the following:

    Case 1A: Suppose that δ1<0, then I1>1 and for all δ x2 is unstable, so near x2 the first ideology can always be available, and there is a coexistence equilibrium and locally asymptotically stable.

    Case 1B: Suppose that δ1>0, if 0<δ<δ1, then I1<1 and x2 is locally asymptotically stable, and the first ideology can not enter near x2. If δ>δ1, then I1>1 and x2 are unstable, and the first ideology can always enter near x2, and there is a coexistence equilibrium and locally asymptotically stable.

    Situation 2: 1<R2<R1. Then:

    Where x1 and x2 are both existing. For δ=0, I2=R2R1<1 and thus x1 is locally asymptotically stable. I1=R1R2>1 and thus x2 is unstable.

    Since I1 and I2 are monotonic functions of δ, it follows that I1>1 is for all δ, thus x2 is unstable, and the first ideology is always accessible at the equilibrium point x2. I2 increases with an increase of δ. When δ increases from a minimum to a certain maximum, I2 changes from less than 1 to greater than 1. Since δ2 may be positive or negative, consider the following:

    Case 2A: Suppose δ2<0, then I2>1 and x1 is unstable for all δ, and the second ideology can always enter near x1, and there is a coexistence equilibrium and locally asymptotically stable.

    Case 2B: Suppose δ2>0, if 0<δ<δ2, then I2<1 and x1 is locally asymptotically stable, and the second ideology can not enter near x1. If δ>δ2, then I2>1 and x1 is unstable, and the second ideology is always able to enter near x1, and there is a coexistence equilibrium and locally asymptotically stable.

    Situation 3: R2<1<R1. Under this assumption we have:

    x1 exists and thus I2 is defined and is positive. For δ=0, I2=R2R1<1 and x1 are locally asymptotically stable. When δ2>0 then as δ increases, when 0<δ<δ2, I2<1 and x1 are locally asymptotically stable. When δ>δ2, I2>1 and x1 are unstable, and there is a coexistence equilibrium and locally asymptotically stable.

    Situation 4: R1<1<R2. Then:

    x2 is existing and thus I1 is positive. For δ=0, I1=R1R2<1 and x2 are locally asymptotically stable. When δ1>0 then as δ increases, then 0<δ<δ1, so I1<1 and x2 are locally asymptotically stable. When δ>δ1, I1>1 and x2 are unstable, and there is a locally asymptotically stable coexistence equilibrium.

    Theorem 6.1. If R1,R21, then x0 is globally asymptotically stable.

    Proof. The Jacobian matrix at x0 of (1) is:

    J(x0)=[μ0β1S00β2S00(μ+dC1+cC1)qC1β1S0+cD1000cC1qD1β1S0(μ+dD1+cD1)00000(μ+dC2+cC2)qC2β2S0+cD2000cC2qD2β2S0(μ+dD2+cD2)].

    The characteristic polynomial is

    f(λ)=(λ+μ)[λ2+Q11λ+Q12][λ2+Q21λ+Q22]Q11=μ+dC1+cC1+μ+dD1+cD1qD1β1S0Q12=(μ+dC1+cC1)(μ+dD1+cD1)(μ+dC1+cC1)qD1β1S0qC1β1S0cC1cC1cD1Q21=μ+dC2+cC2+μ+dD1+cD1qD1β1S0Q22=(μ+dC1+cC1)(μ+dD1+cD1)(μ+dC1+cC1)qD1β1S0qC1β1S0cC1cC1cD1,

    where

    Q11>μ+dD1+cD1cC1+qD1(μ+dC1)[cC1(1qD1R1)+(1R1)qD1(μ+dC1)],
    Q12=[(μ+dC1+cC1)(μ+dD1+cD1)cC1cD1](1R1).

    Since 0<qD1<1, and when R11, then Q11>0 and Q12>0. Similarly, Q21>0 and Q22>0. We get 5 eigenvalues, respectively:

    λ1=μ<0    λ2,λ3=Q112±Q114Q122λ4,λ5=Q212±Q214Q222.

    If R1,R21, then λ2,λ3,λ4,λ5 are negative or have negative real parts, so x0 is globally asymptotically stable.

    Theorem 6.2. If R1>max{1,R2}, suppose that:

    D1D1>C1C1cC1μ+dC1+cC1+μ+dC1μ+dC1+cC1+μ+dC2cC2+qD2(μ+dC2)cC1+qD1(μ+dC1)μ+dC1+cC1, then x1 is globally asymptotically stable.

    If R2>max{1,R1}, suppose

    D2D2>C2C2cC2μ+dC2+cC2+μ+dC2μ+dC2+cC2+μ+dC1cC1+qD1(μ+dC1)cC2+qD2(μ+dC2)μ+dC2+cC2, then x2 is globally asymptotically stable.

    Proof. First it is necessary to analyze the stability of x2, and refer to [4] to construct the Lyapunov function.

    W=S2g(SS2)+cC1cC1+cD1(μ+dC1)C1+μ+dC1+cC1cC1+cD1(μ+dC1)D1+A1C2g(C2C2)+A2D2g(D2D2),

    where

    A1qC2+A2qD2=1,A2cC2C2=A1cD2D2+A1qC2β2S2D2.

    At x2, since E2=0, we get A1=cC2cC2+qD2(μ+dC2), A2=μ+dC2+cC2cC2+qD2(μ+dC2).

    Suppose (s,c2,d2)=(SS2,CC2,DD2), we get:

    W=μS2[2s1s]+A1cD2D2[2c2d2d2c2]+β2S2D2[A1qC2(31sc2d2sd2c2)+A2qD2(2s1s)]+(μ+dC1+cC1)(μ+dD1+cD1)cC1cD1cC1+qD1(μ+dC1)(R1R21)R1+δC1C2[μ+dC1cC1+qD1(μ+dC1)+A2(11d2)A1(11c2)],

    where

    δC1C2[μ+dC1cC1+qD1(μ+dC1)+A2(11d2)A1(11c2)]=δC1C2[μ+dC1cC1+qD1(μ+dC1)+μ+dC2cC2+qD2(μ+dC2)+A1C2C2A2D2D2].

    Thus, if R2>max{1,R1} and D1D1>C1C1cC1μ+dC1+cC1+μ+dC1μ+dC1+cC1+μ+dC2cC2+qD2(μ+dC2)cC1+qD1(μ+dC1)μ+dC1+cC1, as the arithmetic mean-geometric mean inequality, it follows that W0. If and only if S=S2,D1=0,C1=0 and W=0, then the maximum invariant set where S remains constant at S2 and C1,D1 remains constant at 0 consists only of the equilibrium x2, so x2 is globally asymptotically stable. Similarly, it can be proved that x1 is globally asymptotically stable.

    In this section, the mathematical analysis results are verified by numerical simulation.

    First, the parameter settings are shown in Table 2 and the basic reproduction numbers R1=0.6154<1, R2=0.5979<1 are gotten. The condition of Theorem 2.1 is now satisfied, and x0 is locally asymptotically stable. Figure 2 shows the local stability of x0.

    Table 2.  Parameter settings.
    Parameter Value Parameter Value
    μ 200 qC2 0.99
    Λ 0.005 qD2 0.01
    β1 0.000001 dC1 0.083
    β2 0.000001 dD1 0.0083
    qC1 0.86 dC2 0.043
    qD1 0.14 dD2 0.0083
    cC1 0.008 cC2 0.008
    cD1 0.0005 cD2 0.005
    δ 0 Initial conditions (10000,100, 50,100, 50)

     | Show Table
    DownLoad: CSV
    Figure 2.  When R1=0.6154<1, R2=0.5979<1, solution of model (1): x0=(40000,0,0,0,0).

    Make β1=0.000005, dD2=0.003, while all other parameter settings remain unchanged, then R1=3.0769>1, R2=0.8558<1. The condition of Situation 3 is now satisfied, and when δ=0, x1 is locally asymptotically stable. Figure 3 shows the local stability of x1. Increasing the value of δ results in a coexistence equilibrium as shown in Figure 4.

    Figure 3.  When R1=3.0769>1, R2=0.8558<1, solution of model (1): x1=(13000,1220,2077,0,0).
    Figure 4.  When R1=3.0769>1, R2=0.8558<1, and when δ is then increased, there is a coexistence equilibrium of model (1). (a) Stable value (9098, 1125, 3174, 24, 1125); (b) Stable value (8123, 1121, 3610, 4, 1577).

    Make β1=0.000005, β2=0.000003, qC2=0.86, qD2=0.14, and all other parameter settings remain unchanged, we get R1=3.0769>R2=1.7937>1. The condition of Situation 2 is now satisfied, and when δ=0, x1 is locally asymptotically stable. Increasing the value of δ results in coexistence equilibrium, as shown in Figure 5.

    Figure 5.  When R1=3.0769>R2=1.7937>1, then increase δ, the coexistence equilibrium of model (1).(a) Stable value (5039,711, 5039,128, 2896); (b) Stable value (4519,610, 5777, 18, 3458).

    In the above sets of simulations, the two ideologies have achieved a coexistence equilibrium. Especially in Figure 3 (R1=3.0769>1, R2=0.8558<1), the stable coexistence of the two ideologies is still achieved. It can be seen that the cooperation mechanism provides more opportunities for the continued existence of the two ideologies.

    The parameters dD1 and dD2 in the model could simulate the depolarized strike strategy, and β1 and β2 could simulate the depolarized prevention strategy. So based on the parameter setting in Figure 3, and increase dD1, the results are shown in Figure 6. When β1 is decreased, the results are shown in Figure 7.

    Figure 6.  There is coexistence equilibrium when R1=3.0769>1, R2=0.8558<1, then let dD1=0.05, the stable value of (1) (11430, 34, 1413,387, 5430).
    Figure 7.  There is coexistence equilibrium when R1=3.0769>1, R2=0.8558<1, then let β1=0.000001 the stable value of (1) (13660, 20, 4829,567, 4803).

    Based on the parameter setting in Figure 5, increase dD1 and dD2 respectively, leading to the results shown in Figure 8. When β1 and β2 are decreased respectively, the results are shown in Figure 9.

    Figure 8.  When R1=3.0769>R2=1.7937>1 there is a coexistence equilibrium, and increase dD1 and dD2, the stable value of (1). (a) dD1=0.05, (11140, 5,687, 1332, 3176); (b) dD2=0.05, (13000, 1220, 2077, 0, 0), (c) dD1=dD2=0.05, (18820,345,778, 17,582).
    Figure 9.  When R1=3.0769>R2=1.7937>1, there is a coexistence equilibrium, decrease β1 and β2, the stable value of (1). (a) β1=0.000003, (4899,110, 6920,146, 5021); (b) β2=0.000001, (12670, 1220, 2142, 0, 48); (c) β1=0.000003 and β2=0.000001, (13470,906, 2942, 3, 1019).

    Under the cooperative mechanism, the attractiveness and resistance of ideology have both increased. When one ideology had a strong ability to spread and thus dominated the setting (R1=3.0769>1), the second ideology had a weaker communication ability (R2=0.8558<1), supporters of the second ideology would be attracted under the influence of cooperation. Simply increasing dD1 / dD2 or decreasing β1 / β2 could have a certain inhibitory effect on the dominant ideology. But the weaker ideology attracts more supporters. When both ideologies had strong ability to spread (R1=3.0769>1, R2=0.8558<1), simply suppressing or preventing one ideology from attracting followers would not serve as an effective inhibitory effect.

    This model aimed at the ideological practice strategy of terrorist organizations constructing multiple ideologies in order to attract more supporters, and explored the mechanism of the overlapping infection of multiple ideologies on the individual radicalization. Although our model was simple, it revealed to a certain extent the mechanism of multiple ideological overlap infections in the process of radicalization.

    Our model got valuable conclusions: First of all that with the cross-interaction of cooperation, the coexistence equilibrium of the two ideologies persisted universally. When the coexistence equilibrium was locally asymptotically stable, any ideology was difficult to eliminate.

    Secondly, under the cooperation mechanism, the probability that either ideology persisted will increase, which meant that the cooperation mechanism provided more opportunities for the continued existence of the two ideological components. As long as the basic reproduction number for either ideology was greater than 1, whether or not the basic reproduction number of the other ideology was greater than 1, it was possible to achieve stable coexistence. This circumstance made the fight against violent extremism more difficult.

    In addition, in terms of de-radicalization strategies, the strategy for a single ideology was not suitable for the suppression of multiple ideologies under the cooperative mechanism. The parameters dD1 and dD2 in the model could simulate the depolarized strike strategy, and β1 and β2 could simulate the depolarized prevention strategy. In the model with a single ideological component, increasing dD1 and dD2 and decreasing β1 and β2 could effectively suppress the radicalization process. This model, however, had generated new results. Under the cooperative mechanism, when one ideology had a strong ability to spread and thus dominated the setting (the basic reproduction number was greater than 1), the second ideology had a weaker communication ability (the basic reproduction number was less than 1), supporters of the second ideology would be attracted under the influence of cooperation. Simply increasing the impact of the dominant ideology (increasing dD1 or dD2) or increasing the preventive measures of the dominant ideology (decreasing β1 or β2) could have a certain inhibitory effect on the dominant ideology. For the weaker ideology, however, its attraction for supporters had increased. When both ideologies had strong ability to spread (the basic reproduction numbers for both were greater than 1), simply suppressing or preventing one ideology from attracting followers would not serve as an effective inhibitory effect.

    Funding source: Beijing Excellent Talents Training Funding Project. The author would like to thank Beijing Municipal Party Committee Organization Department for providing funding of this study.

    The authors declare no conflict of interest.



    [1] A. Raza, M. Rafiq, D. Baleanu, M. S. Arifet, Numerical simulations for stochastic meme epidemic model, Adv. Differ. Equ., 2020 (2020), 176. https://doi.org/10.1186/s13662-020-02593-1 doi: 10.1186/s13662-020-02593-1
    [2] M. S. Arif, A. Raza, M. Rafiq, M. Bibi, A reliable numerical analysis for stochastic hepatitis b virus epidemic model with the migration effect, Iran. J. Sci. Technol., 43 (2019), 2477–2492. https://doi.org/10.1007/s40995-019-00726-0 doi: 10.1007/s40995-019-00726-0
    [3] A. Raza, Stochastic numerical analysis for impact of heavy alcohol consumption on transmission dynamics of gonorrhoea epidemic, CMC-Comput. Mater. Con., 62 (2020), 1125–1142. https://doi.org/10.32604/cmc.2020.08885 doi: 10.32604/cmc.2020.08885
    [4] A. Raza, M. Rafiq, N Ahmed, I Khan, K. S. Nisar, Z. Iqbal, A structure preserving numerical method for solution of stochastic epidemic model of smoking dynamics, CMC-Comput. Mater. Con., 65 (2020), 263–278. https://doi.org/10.32604/cmc.2020.011289 doi: 10.32604/cmc.2020.011289
    [5] C. Castillo-Chavez, B. Song, Bioterrorism: Mathematical modeling applications in homeland security 7, Philadelphia: SIAM, 2003. https://doi.org/10.1137/1.9780898717518.ch7
    [6] E. T. Camacho, The development and interaction of terrorist and fanatic groups, Commun. Nonlinear Sci., 18 (2013), 3086–3097. https://doi.org/10.1016/j.cnsns.2013.04.006 doi: 10.1016/j.cnsns.2013.04.006
    [7] M. Santoprete, F. Xu, Global stability in a mathematical model of de-radicalization, Physica A, 509 (2018), 151–161. https://doi.org/10.1016/j.physa.2018.06.027 doi: 10.1016/j.physa.2018.06.027
    [8] C. C. McCluskey, M. Santoprete, A bare-bones mathematical model of radicalization, J. Dyn. Games, 5 (2018), 243–264. https://doi.org/10.3934/jdg.2018016 doi: 10.3934/jdg.2018016
    [9] M. Martcheva, An introduction to mathematical epidemiology, Springer, 61 (2015). https://doi.org/10.1007/978-1-4899-7612-3
    [10] S. Galam, M. A. Javarone, Modeling radicalization phenomena in heterogeneous populations, PloS One, 11 (2016), e0155407. https://doi.org/10.1371/journal.pone.0155407 doi: 10.1371/journal.pone.0155407
    [11] F. J. Santonja, A. C. Tarazona, R. J. Villanueva, A mathematical model of the pressure of an extreme ideology on a society, Comput. Math. Appl., 56 (2008), 836–846. https://doi.org/10.1016/j.camwa.2008.01.001 doi: 10.1016/j.camwa.2008.01.001
    [12] M. Ehrhardt, M. Peco, A. C. Tarazona, R. J. Villanueva, J. Villanueva-Oller, Popular support to terrorist organizations: A short-term prediction based on a dynamic model applied to a real case, New York: Nova Science Publishers, 2013.
    [13] J. M. Post, Countering islamist militancy: An epidemiologic approach, Amsterdam: IOS Press, 2006,399–409.
    [14] M. Yacoubian, P. Stares, Rethinking the war on terror, United States Institute of Peace Briefing, 2005.
    [15] K. A. Brogden, J. M. Guthmiller, C. E. Taylor, Human polymicrobial infections, Lancet, 365 (2005), 253–255. https://doi.org/10.1016/S0140-6736(05)70155-0 doi: 10.1016/S0140-6736(05)70155-0
    [16] B. M. Peters, M. A. Jabra-Rizk, G. A. O'May, J. Costerton, M. E. Shirtliff, Polymicrobial interactions: Impact on pathogenesis and human disease, Clin. Microbiol. Rev., 25 (2012), 193–213. https://doi.org/10.1128/CMR.00013-11 doi: 10.1128/CMR.00013-11
    [17] J. A. Mccullers, The co-pathogenesis of influenza viruses with bacteria in the lung, Nat. Rev. Microbiol., 12 (2014), 252–262. https://doi.org/10.1038/nrmicro3231 doi: 10.1038/nrmicro3231
    [18] X. J. Yu, L. L. Pan, Y. Y. Su, T. Wu, S. J. Huang, Research progress in hepatitis B virus superinfection with hepatitis E virus, Chinese J. Virol., 35 (2019), 318–322.
    [19] B. L. Nacos, Terrorism and counterterrorism, Beijing: Social Sciences Literature Press, 2016,122. https://doi.org/10.4324/9781315641270
    [20] C. Wan, The origin and practice of the core ideology of the "Islamic State", Int. Sec. Res., 37 (2019), 76–107. http://dx.doi.org/10.14093/j.cnki.cn10-1132/d.2019.04.004 doi: 10.14093/j.cnki.cn10-1132/d.2019.04.004
    [21] P. Van den Driessche, J. Watmough, Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission, Math. Biosci., 180 (2002), 29–48. https://doi.org/10.1016/S0025-5564(02)00108-6 doi: 10.1016/S0025-5564(02)00108-6
  • This article has been cited by:

    1. E. S. Antipova, Mathematical modeling of the competition of two ideologies with internal conflicts, 2023, 16, 1998-6920, 27, 10.55648/1998-6920-2022-16-4-27-42
    2. Ekaterina Antipova, Sergey Rashkovskiy, Mathematical Theory of Conflicts as a Cognitive Control Theory, 2022, 14, 2078-2489, 1, 10.3390/info14010001
    3. Ekaterina S. Antipova, Mathematical modeling of conflicts, 2024, 2078-9114, 41, 10.18822/byusu20230441-56
    4. Ekaterina Antipova, Sergey Rashkovskiy, Conflict Resolution as a Combinatorial Optimization Problem, 2023, 14, 2078-2489, 264, 10.3390/info14050264
    5. Nuno Crokidakis, Radicalization phenomena: Phase transitions, extinction processes and control of violent activities, 2023, 34, 0129-1831, 10.1142/S0129183123501000
    6. Joanna Sooknanan, Terence A.R. Seemungal, Criminals and their models - a review of epidemiological models describing criminal behaviour, 2023, 458, 00963003, 128212, 10.1016/j.amc.2023.128212
    7. Vasileios E. Papageorgiou, Estimating the prevalence of terrorism under control policies. A statistical modelling approach, 2025, 137, 0307904X, 115642, 10.1016/j.apm.2024.115642
    8. E. S. Antipova, A Discrete Dynamic Conflict Model, 2024, 14, 2223-1552, 283, 10.21869/2223-1552-2024-14-1-283-296
    9. Nuno Crokidakis, A mathematical model for the bullying dynamics in schools, 2025, 492, 00963003, 129254, 10.1016/j.amc.2024.129254
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2388) PDF downloads(157) Cited by(9)

Figures and Tables

Figures(9)  /  Tables(2)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog