
This paper proposes a compartmental model with multiple ideologies based on the mechanism of overlapping infections of contagious diseases to describe the individual radicalization of terrorism process under the influence of two cooperative ideologies. The two ideologies attract their respective supporters in the same sensitive group. The supporters of each ideology can be divided into sympathizers and defenders according to extreme levels. Cross-interaction between the two types of sympathizers is introduced. Through the interaction, sympathizers can be influenced by other ideologies and thus become more extreme. Use a set of differential equations to mathematically simulate the update process. The research results show that ideologies with cooperative mechanisms are easier to establish themselves in a group and are difficult to eliminate. This makes it more difficult to curb radicalization of the population. Based on the model, several strategies are assessed to counter radicalization.
Citation: Yiyi Wang, Fanliang Bu. Modeling radicalization of terrorism under the influence of multiple ideologies[J]. AIMS Mathematics, 2022, 7(3): 4833-4850. doi: 10.3934/math.2022269
[1] | Ali Al Khabyah, Haseeb Ahmad, Ali Ahmad, Ali N. A. Koam . A uniform interval-valued intuitionistic fuzzy environment: topological descriptors and their application in neural networks. AIMS Mathematics, 2024, 9(10): 28792-28812. doi: 10.3934/math.20241397 |
[2] | Jayanta Ghosh, Dhananjoy Mandal, Tapas Kumar Samanta . Soft prime and semiprime int-ideals of a ring. AIMS Mathematics, 2020, 5(1): 732-745. doi: 10.3934/math.2020050 |
[3] | Tahir Khan, Fathalla A. Rihan, Muhammad Bilal Riaz, Mohamed Altanji, Abdullah A. Zaagan, Hijaz Ahmad . Stochastic epidemic model for the dynamics of novel coronavirus transmission. AIMS Mathematics, 2024, 9(5): 12433-12457. doi: 10.3934/math.2024608 |
[4] | Shah Hussain, Naveed Iqbal, Elissa Nadia Madi, Mohsen Bakouri, Ilyas Khan, Wei Sin Koh . On the stochastic modeling and forecasting of the $ \mathscr{SVIR} $ epidemic dynamic model under environmental white noise. AIMS Mathematics, 2025, 10(2): 3983-3999. doi: 10.3934/math.2025186 |
[5] | Pengcheng Ji, Jialei Chen, Fengxia Gao . Projective class ring of a restricted quantum group $ \overline{U}_{q}(\mathfrak{sl}^{*}_2) $. AIMS Mathematics, 2023, 8(9): 19933-19949. doi: 10.3934/math.20231016 |
[6] | Elkhateeb S. Aly, Mohammed A. Almalahi, Khaled A. Aldwoah, Kamal Shah . Criteria of existence and stability of an n-coupled system of generalized Sturm-Liouville equations with a modified ABC fractional derivative and an application to the SEIR influenza epidemic model. AIMS Mathematics, 2024, 9(6): 14228-14252. doi: 10.3934/math.2024691 |
[7] | Said Gounane, Jamal Bakkas, Mohamed Hanine, Gyu Sang Choi, Imran Ashraf . Generalized logistic model with time-varying parameters to analyze COVID-19 outbreak data. AIMS Mathematics, 2024, 9(7): 18589-18607. doi: 10.3934/math.2024905 |
[8] | Abdon Atangana, Seda İğret Araz . Advanced analysis in epidemiological modeling: detection of waves. AIMS Mathematics, 2022, 7(10): 18010-18030. doi: 10.3934/math.2022992 |
[9] | Guillaume Cantin, Cristiana J. Silva . Influence of the topology on the dynamics of a complex network of HIV/AIDS epidemic models. AIMS Mathematics, 2019, 4(4): 1145-1169. doi: 10.3934/math.2019.4.1145 |
[10] | Yulong Li, Long Zhou, Fengjie Geng . Dynamics on semi-discrete Mackey-Glass model. AIMS Mathematics, 2025, 10(2): 2771-2807. doi: 10.3934/math.2025130 |
This paper proposes a compartmental model with multiple ideologies based on the mechanism of overlapping infections of contagious diseases to describe the individual radicalization of terrorism process under the influence of two cooperative ideologies. The two ideologies attract their respective supporters in the same sensitive group. The supporters of each ideology can be divided into sympathizers and defenders according to extreme levels. Cross-interaction between the two types of sympathizers is introduced. Through the interaction, sympathizers can be influenced by other ideologies and thus become more extreme. Use a set of differential equations to mathematically simulate the update process. The research results show that ideologies with cooperative mechanisms are easier to establish themselves in a group and are difficult to eliminate. This makes it more difficult to curb radicalization of the population. Based on the model, several strategies are assessed to counter radicalization.
The spread of a terrorist ideology can have an important impact on the process of individual radicalization. Inspired by the "Islamic State" ideology, a large number of individuals became "jihadists". In 2014, at least 12,000 "foreign fighters" from 81 countries joined the "Islamic State". Some Western youths who are dissatisfied with their circumstances accepted the ideas of the "Islamic State" and embarked on the path of violent extremism. Radicalization is a major issue for national security, so it is necessary to deeply understand its process in order to prevent and stop the radicalization of individuals. It is in this context that this paper mathematically describes radicalization by modeling the spread of extremist ideology, in a manner similar to modeling the spread of infectious diseases.
In recent years, scholars have gradually deepened their research on infectious disease models. These studies involve the nature, transmission dynamics and application of infectious disease models [1,2,3,4]. Many mathematical scientists use population dynamics models to simulate the spread of ideology based on the exposure process of tuberculosis. They built a warehouse model, used parameters to simulate the push and instillation of extreme ideological information [5].
A similar approach was adopted in [6,7,8]. The difference is that scholars introduced the mechanism of super infection in which pathogens competing strains coexist, that is, the process in which individuals previously infected by one pathogen are infected by another [9]. Therefore, scholars compare ideological competition to the competition process of pathogens, and propose that the existence of competitive and milder ideologies may prevent the spread of violent extremist ideology. And scholars have analyzed the efficacy of de-radicalization treatments of extremists [7,8,10,11,12,13,14].
This paper extends the model established by C. C. McCluskey and M. Santoprete in [8]. The difference is that we have considered a more complex ideological dissemination strategy of terrorist organizations.
In epidemiology, in addition to competition mechanisms, there are cooperation mechanisms for overlapping infections. Individuals who have been infected with one pathogen are infected with another pathogen. The two pathogens can coexist and increase the infection of the individual through cooperation. Generally speaking, the existence of a kind of bacteria will create a breeding niche for other pathogenic bacteria, and the host is easy to be colonized by other microorganisms [15]. Compared with single microbial infections, overlapping infections are usually associated with an increase in the severity of the infection and a poorer prognosis for patients [16,17]. For example, patients with chronic hepatitis B superinfected with hepatitis E virus can aggravate the condition and increase the risk of liver cirrhosis, liver failure and death [18].
The ideology and practice of terrorist organizations can be quite complex, and overlapping ideological concerns deserve more attention. Some terrorist organizations may have multiple long-term objectives or programs that they hope to install if they are able to come into power. Such overlaps could be especially true for religious terrorist organizations, which often have both explicitly religious and more directly political objectives. Among the 202 religious terrorist organizations listed in 2006 by the Terrorist Knowledge Base of the National Memorial Association for the Prevention of Terrorism, some of the largest are also included in the classification of nationalist groups, such as Hamas and Hezbollah [19]. In order to attract more supporters, these terrorist organizations with multiple objectives often construct multiple ideologies. The "Islamic State" has drawn on the theoretical construction created by earlier movements and parties based in political Islam, and focused on the idea of invoking jihad as holy war to motivate followers. The two core ideologies of the "California" and the violent "jihad" maintain and consolidate their own legitimacy, and through the construction of subsidiary ideologies such as "migration", "loyalty" and "joy and anger for Allah". Identify and maintain global combat attacks [20].
We hope to use our model to test some possible strategies for coping with radicalization. First, we need to test the effect of these mutually reinforcing ideologies on individual extremes when terrorist organizations begin to spread multiple ideologies. Therefore, we assume that individuals can transfer from one ideology to another, so we design the model to include two ideologies. The useful parameters in the model to quantify the spreading potential of extremist ideology are the basic reproduction number and the entrance number.
We will prove, if both basic reproduction numbers are less than 1, the two ideologies will be eradicated. If either of the two basic reproduction numbers is greater than 1, coexistence equilibrium may prevail. And if the coexistence equilibrium is asymptotically stable locally, it will make it difficult to eliminate any kind of ideology. Our analysis shows that multiple ideologies may enhance the effectiveness of terrorist organization recruitment strategies, which makes combating violent extremism more difficult.
Finally, we use numerical simulations to test the effectiveness of conventional de-radicalization strategies in the context of cooperative ideology. Unlike the results in the single ideological model, our model has produced new results. The cooperation mechanism provides the ideology with a communication advantage, which makes the ideology more attractive to the crowd. The main lesson we learned from this is that when terrorist organizations adopt multiple ideological dissemination strategies, simply combating or preventing one ideology will not achieve the expected suppression effect, and may even increase the attractiveness of other ideologies of terrorist organizations.
In order to absorb more individuals, terrorist organizations may spread multiple ideologies. In this section, we want to test the effects of these mutually reinforcing ideologies on the radicalization of individuals. In some epidemiological systems, this phenomenon is called superinfection.
The model assumes that there are two extreme ideologies in the population, and there is a sub-population that is at risk to adopt the ideologies. The sub-population is divided into five compartments: Susceptible --S, Sympathizers 1--C1, Defenders 1--D1, Sympathizers 2--C2, Defenders 2--D2.
The individuals in susceptible class are those who have not adopted the extremist ideology. The ones in sympathetic groups initially adopt extreme ideology. The defender group are adopters that engage in violent terrorist acts. They are the most extreme, and have a strong demonstration effect on individuals in other categories and can have a major chance of infecting others. The defenders can recruit and incite susceptible and sympathetic individuals.
New individuals enter the susceptible class in the population at the constant rate Λ. The average natural mortality constant rate is μ. Sympathizers and defenders have additional removal rates, because they are captured with rate constants dC1, dD1, dC2, dD2, respectively. For subgroups that adopt one ideology, it is assumed that the susceptible and defenders interact according to the laws of group action, and the ratio of recruiting susceptible individuals to adopt the extremist ideology is proportional to the number of interactions that are taking place between the sub-groups. Thus, susceptible individuals are recruited at rate β1SD1/β2SD2, with a fraction qC1/qC2 entering the sympathetic class and a fraction qD1=1−qC1/qD2=1−qC2 entering the defender class.
Sympathizers can switch to the defender class at a constant rate cC1/cC2, while defenders enter the sympathetic class at a constant rate cD1/cD2. The next step is to introduce cross-interaction among sympathetic individuals. As a result of the process of interaction, sympathetic individuals can be influenced by another ideology and become more extreme, the constant rate is δC1C2. The flow map is in Figure 1. Physical interpretation of the parameters is in Table 1.
parameter | Physical interpretation |
β1 β2 | The recruited rate factor of susceptible individuals |
qC1 qC2 | The rate of susceptible groups entering the sympathizer groups |
qD1 qD2 | The rate of susceptible groups entering the defenders groups |
cC1 cC2 | The rate at which sympathizers turn into defenders |
cD1 cD2 | The rate at which defenders turn into sympathizers |
dC1 dC2 dD1 dD2 | removal rates of sympathizers and defenders |
δ | The rate factor at which sympathizers turn into defenders due to other ideological |
Λ | The rate of new individuals entering the susceptible class in the population |
μ | The average natural mortality constant rate |
The differential equations are:
S′=Λ−μS−β1SD1−β2SD2E′1=qC1β1SD1−(μ+dC1+cC1)C1+cD1D1−δC1C2R′1=qD1β1SD1+cC1C1−(μ+dD1+cD1)D1+δC1C2E′2=qC2β2SD2−(μ+dC2+cC2)C2+cD2D2−δC1C2R′2=qD2β2SD2+cC2C2−(μ+dD2+cD2)D2+δC1C2 | (1) |
Where qC1+qD1=qC2+qD2=1, qC1,qD1,qC2,qD2∈[0,1]. The assumption for the full population is N=S+C1+D1+C2+D2.
Proposition 1.1. Under the flow described by Eq (1), the region Δ={(S,C1,D1,C2,D2)∈ℜ5⩾0:N⩽Λμ} is positively invariant and the attracting within is ℜ5⩾0.
Proof. The direction of the vector field is checked along the boundary of Δ. Along S=0, S′=Λ>0 is present, so the vector field points inwards. For S,C1,D1,C2,D2⩾0, along C1=0, C1′=qC1β1SD1+cD1D1⩾0 is present. Similarly, with D1=0,C2=0,D2=0 respectively, we have D1′=cC1C1+δC1C2⩾0, C2′=qC2β2SD2+cD2D2⩾0, D2′=cC2C2+δC1C2⩾0, respectively. It follows from [(1), Proposition 1.1] that ℜ5⩾0 is positively invariant.
N′=S′+C1′+D1′+C2′+D2′=Λ−μS−(μ+dC1)C1−(μ+dD1)D1−(μ+dC2)C2−(μ+dD2)D2⩽Λ−μN. |
According to the standard comparison theorem, for t⩾0, it follows that N(t)⩽(N(0)−Λμ)e−μt+Λμ. Thus, if N(0)⩽Λμ, then N(t)⩽Λμ for all t⩾0, then the set Δ is positively invariant and the attracting within is ℜ5⩾0.
System (1) has three equilibrium points. We define the basic reproduction number to describe the equilibria which can quantify the ideology's transmission potential. In mathematical epidemiology, it is defined as the number of secondary infections caused by infectious individuals in susceptible class.
There is an equilibrium point x0=(S0,0,0,0,0)=(Λμ,0,0,0,0), when C1=D1=C2=D2=0. If the first ideology is taken as an example, the basic reproduction number R1 is the spectral radius of the next generation matrix G at x0. In Eq (1), when only the first ideology exists, the subgroups affected by it includes C1, D1. Set fC1, fD1 is the new ratio of individuals using this ideology in C1, D1. Let vj=v−j−v+j, where v+j is conversion rate for individuals entering the subgroup j∈{C1,D1}, and v−j is conversion rate for individuals moving out the subgroup j. The next generation matrix G=F⋅V−1 is:
F=[∂fC1∂C1∂fC1∂D1∂fD1∂C1∂fD1∂D1](x0)=[0qC1β1S00qD1β1S0],V=[∂vC1∂C1∂vC1∂D1∂vD1∂C1∂vD1∂D1](x0)=[μ+dC1+cC1−cD1−cC1μ+dD1+cD1], |
G=β1S0(μ+dC1+cC1)(μ+dD1+cD1)−cC1cD1[0qC10qD1][μ+dD1+cD1cD1cC1μ+dC1+cC1]. |
The next generation matrix G has only one non-zero eigenvalue, and that non-zero eigenvalue is greater than zero, so its spectral radius is the non-zero eigenvalue. When S0=Λμ is included, then there is the following:
R1=Λμβ1[cC1+qD1(μ+dC1)](μ+dC1+cC1)(μ+dD1+cD1)−cC1cD1. |
Similarly, the basic reproduction value for the second ideology is:
R2=Λμβ2[cC2+qD2(μ+dC2)](μ+dC2+cC2)(μ+dD2+cD2)−cC2cD2. |
The following result follows from [21,Theorem 2].
Theorem 2.1. If R1<1 and R2<1, then x0 is locally asymptotically stable. If R1>1 or R2>1, then x0 is unstable.
To calculate other equilibrium points, assume that when C2=D2=0, there is an equilibrium point x∗1=(S∗1,C∗1,D∗1,0,0), set C′1=D′1=0, treating S∗1 as a parameter. This gives the linear system result:
[−(μ+dC1+cC1)qC1β1S∗1+cD1cC1qD1β1S∗1−(μ+dD1+cD1)][C∗1D∗1]=[00] | (2) |
Only when the coefficient matrix is a singular matrix, i.e., when the determinant is 0, C∗1, D∗1 has non-zero solution.
S1∗=(μ+dC1+cC1)(μ+dD1+cD1)−cC1cD1β1[cC1+qD1(μ+dC1)]=Λμ1R1. |
If the first line of Eq (1) is taken, then
D1∗=Λ−μS∗1β1S∗1=μβ1(R1−1). |
When R1>1, D∗1>0, add columns 2 and 3 in (1) to get:
C∗1=β1S∗1−(μ+dD1)μ+dC1D∗1, |
where
β1S∗1=(μ+dC1+cC1)(μ+dD1+cD1)−cC1cD1cC1+qD1(μ+dC1)>(μ+dC1)(μ+dD1)+cC1(μ+dD1)cC1+qD1(μ+dC1)>(μ+dC1)(μ+dD1)+cC1(μ+dD1)cC1+qD1(μ+dC1)+qC1(μ+dC1)=μ+dD1. |
Therefore, C∗1 and D∗1 have the same positive sign so the following equilibrium point results:
x∗2=(Λμ1R2,0,0,β2S∗2−(μ+dD2)μ+dC2D∗2,μβ2(R2−1)). |
There are equilibrium for which the second ideology is absent. The entrance number is the expected number of the ideology's new adopters when the new ideology invades the stable system.
According to [4], the effect of the second ideology entering the system at the equilibrium point x∗1 (where the first ideology reaches balance) is calculated through the regeneration matrix. The subgroups adopting the second ideology are C2 and D2. The proportion of the newly added second ideological component and the conversion rate between the two subgroups are f and v.
f=[fC2fD2]=[qC2β2SD2qD2β2SD2],v=[vC2vD2]=[cC2C2+δC1C2+(μ+dC2)C2−cR2D2cD2R2+(μ+dD2)R2−cC2C2−δC1C2], |
F=[0qC2β2S∗10qD2β2S∗1],V=[cC2+δC∗1+μ+dC2−cD2−cC2−δC∗1μ+dD2+cD2]. |
With the transition matrix N=FV−1, results in
N=1H2[0qC2β2S∗10qD2β2S∗1][μ+dD2+cD2cD2cC2+δC∗1μ+dC2+cC2+δC∗1]=1H2[qC2β2S∗1(cC2+δC∗1)qC2β2S∗1(μ+dC2+cC2+δC∗1)qD2β2S∗1(cC2+δC∗1)qD2β2S∗1(μ+dC2+cC2+δC∗1)]=[ABOP], |
where H2=(μ+dD2)(μ+dC2+cC2+δC∗1)+cD2(μ+dC2).
The entrance numbers I2 is the Spectral radius of N :
I2=(A+P)+√(A−P)2+4BO2. |
When A,B,O,P treated as a function of δ, it can be seen that A,B,O,P are monotonically increasing functions of δ. Because A,B,O,P are greater than zero, ∂I2∂A, ∂I2∂B, ∂I2∂O, ∂I2∂P are greater than zero. Then I2 is a monotonically increasing functions of δ.
I2>I2|δ=0=R2R1,δ>0. |
Similarly, I1 is a monotonically increasing functions of δ.
I1>I1|δ=0=R1R2,δ>0. |
Theorem 3.1. If R1>1, R2>1, and R1≠R2, then I1 or I2 must have a value greater than 1. If either of I1 or I2 is greater than 1, then the corresponding equilibrium point x∗2 or x∗1 is unstable.
In this section, discuss how R1, R2 affect the qualitative behaviour and properties of the system.
According to Theorem 3.1, whenever the values of I1 and I2 are greater than 1 will directly affect the status of the relationship between the ideologies. δ is set as a bifurcation parameter. δ1 and δ2 are the bifurcation value of δ that respectively make I1 and I2 equal to 1. Then
δ1=1C∗2X1cC1+qD1(μ+dC1)(R1−R2)X1+R2(μ+dC1)[(μ+dD1)(1−qD1)+cD1](R2−R1)X1=(μ+dD1+cD1)(μ+dC1+cC1)−cD1cC1, |
δ2=1C∗1X2cC2+qD2(μ+dC2)(R2−R1)X2+R1(μ+dC2)[(μ+dD2)(1−qD2)+cD2](R1−R2)X2=(μ+dD2+cD2)(μ+dC2+cC2)−cD2cC2. |
Suppose R1>1, then x∗1 exists and I2>0. A sufficient (but not necessary) condition for δ2 to be positive is:
(μ+dD2)[cC2+qD2(μ+dC2)]X2<R2R1<1. |
If δ=δ2>0, then I2=1, and the Jacobian at x∗1 has eigenvalue 0. If δ increases to δ2, then x∗1 stability changes. This results in the condition where the only value of δ that could lead to a coexistence equilibrium and have a bifurcation interaction with x∗1.
Suppose R2>1, then x∗2 exists and I1>0. A sufficient (but not necessary) condition for δ1 to be positive is:
(μ+dD1)[cC1+qD1(μ+dC1)]X1<R1R2<1. |
If δ=δ1>0, then I1=1 and the Jacobian at x∗2 has eigenvalue 0. If δ increases to δ1, then x∗2 stability changes. This is the only value of δ that could lead to a coexistence equilibrium that has a bifurcation interaction with x∗2.
Situation 1: 1<R1<R2. Then:
x∗1 and x∗2 are both existing. For δ=0, I2=R2R1>1 and so x∗1 is unstable. I1=R1R2<1 and so x∗2 locally asymptotically stable.
Since I1 and I2 are monotonic functions of δ, it follows that I2>1 for all δ, so that x∗1 is unstable, and the second ideology is always accessible at the equilibrium point x∗1. I1 increases with an increase of δ. When δ increases from a minimum to a certain maximum, I1 changes from less than 1 to greater than 1. Since δ1 may be positive or negative, consider the following:
Case 1A: Suppose that δ1<0, then I1>1 and for all δ x∗2 is unstable, so near x∗2 the first ideology can always be available, and there is a coexistence equilibrium and locally asymptotically stable.
Case 1B: Suppose that δ1>0, if 0<δ<δ1, then I1<1 and x∗2 is locally asymptotically stable, and the first ideology can not enter near x∗2. If δ>δ1, then I1>1 and x∗2 are unstable, and the first ideology can always enter near x∗2, and there is a coexistence equilibrium and locally asymptotically stable.
Situation 2: 1<R2<R1. Then:
Where x∗1 and x∗2 are both existing. For δ=0, I2=R2R1<1 and thus x∗1 is locally asymptotically stable. I1=R1R2>1 and thus x∗2 is unstable.
Since I1 and I2 are monotonic functions of δ, it follows that I1>1 is for all δ, thus x∗2 is unstable, and the first ideology is always accessible at the equilibrium point x∗2. I2 increases with an increase of δ. When δ increases from a minimum to a certain maximum, I2 changes from less than 1 to greater than 1. Since δ2 may be positive or negative, consider the following:
Case 2A: Suppose δ2<0, then I2>1 and x∗1 is unstable for all δ, and the second ideology can always enter near x∗1, and there is a coexistence equilibrium and locally asymptotically stable.
Case 2B: Suppose δ2>0, if 0<δ<δ2, then I2<1 and x∗1 is locally asymptotically stable, and the second ideology can not enter near x∗1. If δ>δ2, then I2>1 and x∗1 is unstable, and the second ideology is always able to enter near x∗1, and there is a coexistence equilibrium and locally asymptotically stable.
Situation 3: R2<1<R1. Under this assumption we have:
x∗1 exists and thus I2 is defined and is positive. For δ=0, I2=R2R1<1 and x∗1 are locally asymptotically stable. When δ2>0 then as δ increases, when 0<δ<δ2, I2<1 and x∗1 are locally asymptotically stable. When δ>δ2, I2>1 and x∗1 are unstable, and there is a coexistence equilibrium and locally asymptotically stable.
Situation 4: R1<1<R2. Then:
x∗2 is existing and thus I1 is positive. For δ=0, I1=R1R2<1 and x∗2 are locally asymptotically stable. When δ1>0 then as δ increases, then 0<δ<δ1, so I1<1 and x∗2 are locally asymptotically stable. When δ>δ1, I1>1 and x∗2 are unstable, and there is a locally asymptotically stable coexistence equilibrium.
Theorem 6.1. If R1,R2⩽1, then x0 is globally asymptotically stable.
Proof. The Jacobian matrix at x0 of (1) is:
J(x0)=[−μ0−β1S00−β2S00−(μ+dC1+cC1)qC1β1S0+cD1000cC1qD1β1S0−(μ+dD1+cD1)00000−(μ+dC2+cC2)qC2β2S0+cD2000cC2qD2β2S0−(μ+dD2+cD2)]. |
The characteristic polynomial is
f(λ)=(λ+μ)[λ2+Q11λ+Q12][λ2+Q21λ+Q22]Q11=μ+dC1+cC1+μ+dD1+cD1−qD1β1S0Q12=(μ+dC1+cC1)(μ+dD1+cD1)−(μ+dC1+cC1)qD1β1S0−qC1β1S0cC1−cC1cD1Q21=μ+dC2+cC2+μ+dD1+cD1−qD1β1S0Q22=(μ+dC1+cC1)(μ+dD1+cD1)−(μ+dC1+cC1)qD1β1S0−qC1β1S0cC1−cC1cD1, |
where
Q11>μ+dD1+cD1cC1+qD1(μ+dC1)[cC1(1−qD1R1)+(1−R1)qD1(μ+dC1)], |
Q12=[(μ+dC1+cC1)(μ+dD1+cD1)−cC1cD1](1−R1). |
Since 0<qD1<1, and when R1⩽1, then Q11>0 and Q12>0. Similarly, Q21>0 and Q22>0. We get 5 eigenvalues, respectively:
λ1=−μ<0 λ2,λ3=−Q112±√Q11−4Q122λ4,λ5=−Q212±√Q21−4Q222. |
If R1,R2⩽1, then λ2,λ3,λ4,λ5 are negative or have negative real parts, so x0 is globally asymptotically stable.
Theorem 6.2. If R1>max{1,R2}, suppose that:
D∗1D1>C∗1C1cC1μ+dC1+cC1+μ+dC1μ+dC1+cC1+μ+dC2cC2+qD2(μ+dC2)cC1+qD1(μ+dC1)μ+dC1+cC1, then x∗1 is globally asymptotically stable.
If R2>max{1,R1}, suppose
D∗2D2>C∗2C2cC2μ+dC2+cC2+μ+dC2μ+dC2+cC2+μ+dC1cC1+qD1(μ+dC1)cC2+qD2(μ+dC2)μ+dC2+cC2, then x∗2 is globally asymptotically stable.
Proof. First it is necessary to analyze the stability of x∗2, and refer to [4] to construct the Lyapunov function.
W=S∗2g(SS∗2)+cC1cC1+cD1(μ+dC1)C1+μ+dC1+cC1cC1+cD1(μ+dC1)D1+A1C∗2g(C2C∗2)+A2D∗2g(D2D∗2), |
where
A1qC2+A2qD2=1,A2cC2C∗2=A1cD2D∗2+A1qC2β2S∗2D∗2. |
At x∗2, since E′2=0, we get A1=cC2cC2+qD2(μ+dC2), A2=μ+dC2+cC2cC2+qD2(μ+dC2).
Suppose (s,c2,d2)=(SS∗2,CC∗2,DD∗2), we get:
W′=μS∗2[2−s−1s]+A1cD2D∗2[2−c2d2−d2c2]+β2S∗2D∗2[A1qC2(3−1s−c2d2−sd2c2)+A2qD2(2−s−1s)]+(μ+dC1+cC1)(μ+dD1+cD1)−cC1cD1cC1+qD1(μ+dC1)(R1R2−1)R1+δC1C2[μ+dC1cC1+qD1(μ+dC1)+A2(1−1d2)−A1(1−1c2)], |
where
δC1C2[μ+dC1cC1+qD1(μ+dC1)+A2(1−1d2)−A1(1−1c2)]=δC1C2[μ+dC1cC1+qD1(μ+dC1)+μ+dC2cC2+qD2(μ+dC2)+A1C∗2C2−A2D∗2D2]. |
Thus, if R2>max{1,R1} and D∗1D1>C∗1C1cC1μ+dC1+cC1+μ+dC1μ+dC1+cC1+μ+dC2cC2+qD2(μ+dC2)cC1+qD1(μ+dC1)μ+dC1+cC1, as the arithmetic mean-geometric mean inequality, it follows that W′⩽0. If and only if S=S∗2,D1=0,C1=0 and W′=0, then the maximum invariant set where S remains constant at S∗2 and C1,D1 remains constant at 0 consists only of the equilibrium x∗2, so x∗2 is globally asymptotically stable. Similarly, it can be proved that x∗1 is globally asymptotically stable.
In this section, the mathematical analysis results are verified by numerical simulation.
First, the parameter settings are shown in Table 2 and the basic reproduction numbers R1=0.6154<1, R2=0.5979<1 are gotten. The condition of Theorem 2.1 is now satisfied, and x0 is locally asymptotically stable. Figure 2 shows the local stability of x0.
Parameter | Value | Parameter | Value |
μ | 200 | qC2 | 0.99 |
Λ | 0.005 | qD2 | 0.01 |
β1 | 0.000001 | dC1 | 0.083 |
β2 | 0.000001 | dD1 | 0.0083 |
qC1 | 0.86 | dC2 | 0.043 |
qD1 | 0.14 | dD2 | 0.0083 |
cC1 | 0.008 | cC2 | 0.008 |
cD1 | 0.0005 | cD2 | 0.005 |
δ | 0 | Initial conditions | (10000,100, 50,100, 50) |
Make β1=0.000005, dD2=0.003, while all other parameter settings remain unchanged, then R1=3.0769>1, R2=0.8558<1. The condition of Situation 3 is now satisfied, and when δ=0, x∗1 is locally asymptotically stable. Figure 3 shows the local stability of x∗1. Increasing the value of δ results in a coexistence equilibrium as shown in Figure 4.
Make β1=0.000005, β2=0.000003, qC2=0.86, qD2=0.14, and all other parameter settings remain unchanged, we get R1=3.0769>R2=1.7937>1. The condition of Situation 2 is now satisfied, and when δ=0, x∗1 is locally asymptotically stable. Increasing the value of δ results in coexistence equilibrium, as shown in Figure 5.
In the above sets of simulations, the two ideologies have achieved a coexistence equilibrium. Especially in Figure 3 (R1=3.0769>1, R2=0.8558<1), the stable coexistence of the two ideologies is still achieved. It can be seen that the cooperation mechanism provides more opportunities for the continued existence of the two ideologies.
The parameters dD1 and dD2 in the model could simulate the depolarized strike strategy, and β1 and β2 could simulate the depolarized prevention strategy. So based on the parameter setting in Figure 3, and increase dD1, the results are shown in Figure 6. When β1 is decreased, the results are shown in Figure 7.
Based on the parameter setting in Figure 5, increase dD1 and dD2 respectively, leading to the results shown in Figure 8. When β1 and β2 are decreased respectively, the results are shown in Figure 9.
Under the cooperative mechanism, the attractiveness and resistance of ideology have both increased. When one ideology had a strong ability to spread and thus dominated the setting (R1=3.0769>1), the second ideology had a weaker communication ability (R2=0.8558<1), supporters of the second ideology would be attracted under the influence of cooperation. Simply increasing dD1 / dD2 or decreasing β1 / β2 could have a certain inhibitory effect on the dominant ideology. But the weaker ideology attracts more supporters. When both ideologies had strong ability to spread (R1=3.0769>1, R2=0.8558<1), simply suppressing or preventing one ideology from attracting followers would not serve as an effective inhibitory effect.
This model aimed at the ideological practice strategy of terrorist organizations constructing multiple ideologies in order to attract more supporters, and explored the mechanism of the overlapping infection of multiple ideologies on the individual radicalization. Although our model was simple, it revealed to a certain extent the mechanism of multiple ideological overlap infections in the process of radicalization.
Our model got valuable conclusions: First of all that with the cross-interaction of cooperation, the coexistence equilibrium of the two ideologies persisted universally. When the coexistence equilibrium was locally asymptotically stable, any ideology was difficult to eliminate.
Secondly, under the cooperation mechanism, the probability that either ideology persisted will increase, which meant that the cooperation mechanism provided more opportunities for the continued existence of the two ideological components. As long as the basic reproduction number for either ideology was greater than 1, whether or not the basic reproduction number of the other ideology was greater than 1, it was possible to achieve stable coexistence. This circumstance made the fight against violent extremism more difficult.
In addition, in terms of de-radicalization strategies, the strategy for a single ideology was not suitable for the suppression of multiple ideologies under the cooperative mechanism. The parameters dD1 and dD2 in the model could simulate the depolarized strike strategy, and β1 and β2 could simulate the depolarized prevention strategy. In the model with a single ideological component, increasing dD1 and dD2 and decreasing β1 and β2 could effectively suppress the radicalization process. This model, however, had generated new results. Under the cooperative mechanism, when one ideology had a strong ability to spread and thus dominated the setting (the basic reproduction number was greater than 1), the second ideology had a weaker communication ability (the basic reproduction number was less than 1), supporters of the second ideology would be attracted under the influence of cooperation. Simply increasing the impact of the dominant ideology (increasing dD1 or dD2) or increasing the preventive measures of the dominant ideology (decreasing β1 or β2) could have a certain inhibitory effect on the dominant ideology. For the weaker ideology, however, its attraction for supporters had increased. When both ideologies had strong ability to spread (the basic reproduction numbers for both were greater than 1), simply suppressing or preventing one ideology from attracting followers would not serve as an effective inhibitory effect.
Funding source: Beijing Excellent Talents Training Funding Project. The author would like to thank Beijing Municipal Party Committee Organization Department for providing funding of this study.
The authors declare no conflict of interest.
[1] |
A. Raza, M. Rafiq, D. Baleanu, M. S. Arifet, Numerical simulations for stochastic meme epidemic model, Adv. Differ. Equ., 2020 (2020), 176. https://doi.org/10.1186/s13662-020-02593-1 doi: 10.1186/s13662-020-02593-1
![]() |
[2] |
M. S. Arif, A. Raza, M. Rafiq, M. Bibi, A reliable numerical analysis for stochastic hepatitis b virus epidemic model with the migration effect, Iran. J. Sci. Technol., 43 (2019), 2477–2492. https://doi.org/10.1007/s40995-019-00726-0 doi: 10.1007/s40995-019-00726-0
![]() |
[3] |
A. Raza, Stochastic numerical analysis for impact of heavy alcohol consumption on transmission dynamics of gonorrhoea epidemic, CMC-Comput. Mater. Con., 62 (2020), 1125–1142. https://doi.org/10.32604/cmc.2020.08885 doi: 10.32604/cmc.2020.08885
![]() |
[4] |
A. Raza, M. Rafiq, N Ahmed, I Khan, K. S. Nisar, Z. Iqbal, A structure preserving numerical method for solution of stochastic epidemic model of smoking dynamics, CMC-Comput. Mater. Con., 65 (2020), 263–278. https://doi.org/10.32604/cmc.2020.011289 doi: 10.32604/cmc.2020.011289
![]() |
[5] | C. Castillo-Chavez, B. Song, Bioterrorism: Mathematical modeling applications in homeland security 7, Philadelphia: SIAM, 2003. https://doi.org/10.1137/1.9780898717518.ch7 |
[6] |
E. T. Camacho, The development and interaction of terrorist and fanatic groups, Commun. Nonlinear Sci., 18 (2013), 3086–3097. https://doi.org/10.1016/j.cnsns.2013.04.006 doi: 10.1016/j.cnsns.2013.04.006
![]() |
[7] |
M. Santoprete, F. Xu, Global stability in a mathematical model of de-radicalization, Physica A, 509 (2018), 151–161. https://doi.org/10.1016/j.physa.2018.06.027 doi: 10.1016/j.physa.2018.06.027
![]() |
[8] |
C. C. McCluskey, M. Santoprete, A bare-bones mathematical model of radicalization, J. Dyn. Games, 5 (2018), 243–264. https://doi.org/10.3934/jdg.2018016 doi: 10.3934/jdg.2018016
![]() |
[9] | M. Martcheva, An introduction to mathematical epidemiology, Springer, 61 (2015). https://doi.org/10.1007/978-1-4899-7612-3 |
[10] |
S. Galam, M. A. Javarone, Modeling radicalization phenomena in heterogeneous populations, PloS One, 11 (2016), e0155407. https://doi.org/10.1371/journal.pone.0155407 doi: 10.1371/journal.pone.0155407
![]() |
[11] |
F. J. Santonja, A. C. Tarazona, R. J. Villanueva, A mathematical model of the pressure of an extreme ideology on a society, Comput. Math. Appl., 56 (2008), 836–846. https://doi.org/10.1016/j.camwa.2008.01.001 doi: 10.1016/j.camwa.2008.01.001
![]() |
[12] | M. Ehrhardt, M. Peco, A. C. Tarazona, R. J. Villanueva, J. Villanueva-Oller, Popular support to terrorist organizations: A short-term prediction based on a dynamic model applied to a real case, New York: Nova Science Publishers, 2013. |
[13] | J. M. Post, Countering islamist militancy: An epidemiologic approach, Amsterdam: IOS Press, 2006,399–409. |
[14] | M. Yacoubian, P. Stares, Rethinking the war on terror, United States Institute of Peace Briefing, 2005. |
[15] |
K. A. Brogden, J. M. Guthmiller, C. E. Taylor, Human polymicrobial infections, Lancet, 365 (2005), 253–255. https://doi.org/10.1016/S0140-6736(05)70155-0 doi: 10.1016/S0140-6736(05)70155-0
![]() |
[16] |
B. M. Peters, M. A. Jabra-Rizk, G. A. O'May, J. Costerton, M. E. Shirtliff, Polymicrobial interactions: Impact on pathogenesis and human disease, Clin. Microbiol. Rev., 25 (2012), 193–213. https://doi.org/10.1128/CMR.00013-11 doi: 10.1128/CMR.00013-11
![]() |
[17] |
J. A. Mccullers, The co-pathogenesis of influenza viruses with bacteria in the lung, Nat. Rev. Microbiol., 12 (2014), 252–262. https://doi.org/10.1038/nrmicro3231 doi: 10.1038/nrmicro3231
![]() |
[18] | X. J. Yu, L. L. Pan, Y. Y. Su, T. Wu, S. J. Huang, Research progress in hepatitis B virus superinfection with hepatitis E virus, Chinese J. Virol., 35 (2019), 318–322. |
[19] | B. L. Nacos, Terrorism and counterterrorism, Beijing: Social Sciences Literature Press, 2016,122. https://doi.org/10.4324/9781315641270 |
[20] |
C. Wan, The origin and practice of the core ideology of the "Islamic State", Int. Sec. Res., 37 (2019), 76–107. http://dx.doi.org/10.14093/j.cnki.cn10-1132/d.2019.04.004 doi: 10.14093/j.cnki.cn10-1132/d.2019.04.004
![]() |
[21] |
P. Van den Driessche, J. Watmough, Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission, Math. Biosci., 180 (2002), 29–48. https://doi.org/10.1016/S0025-5564(02)00108-6 doi: 10.1016/S0025-5564(02)00108-6
![]() |
1. | E. S. Antipova, Mathematical modeling of the competition of two ideologies with internal conflicts, 2023, 16, 1998-6920, 27, 10.55648/1998-6920-2022-16-4-27-42 | |
2. | Ekaterina Antipova, Sergey Rashkovskiy, Mathematical Theory of Conflicts as a Cognitive Control Theory, 2022, 14, 2078-2489, 1, 10.3390/info14010001 | |
3. | Ekaterina S. Antipova, Mathematical modeling of conflicts, 2024, 2078-9114, 41, 10.18822/byusu20230441-56 | |
4. | Ekaterina Antipova, Sergey Rashkovskiy, Conflict Resolution as a Combinatorial Optimization Problem, 2023, 14, 2078-2489, 264, 10.3390/info14050264 | |
5. | Nuno Crokidakis, Radicalization phenomena: Phase transitions, extinction processes and control of violent activities, 2023, 34, 0129-1831, 10.1142/S0129183123501000 | |
6. | Joanna Sooknanan, Terence A.R. Seemungal, Criminals and their models - a review of epidemiological models describing criminal behaviour, 2023, 458, 00963003, 128212, 10.1016/j.amc.2023.128212 | |
7. | Vasileios E. Papageorgiou, Estimating the prevalence of terrorism under control policies. A statistical modelling approach, 2025, 137, 0307904X, 115642, 10.1016/j.apm.2024.115642 | |
8. | E. S. Antipova, A Discrete Dynamic Conflict Model, 2024, 14, 2223-1552, 283, 10.21869/2223-1552-2024-14-1-283-296 | |
9. | Nuno Crokidakis, A mathematical model for the bullying dynamics in schools, 2025, 492, 00963003, 129254, 10.1016/j.amc.2024.129254 |
parameter | Physical interpretation |
β1 β2 | The recruited rate factor of susceptible individuals |
qC1 qC2 | The rate of susceptible groups entering the sympathizer groups |
qD1 qD2 | The rate of susceptible groups entering the defenders groups |
cC1 cC2 | The rate at which sympathizers turn into defenders |
cD1 cD2 | The rate at which defenders turn into sympathizers |
dC1 dC2 dD1 dD2 | removal rates of sympathizers and defenders |
δ | The rate factor at which sympathizers turn into defenders due to other ideological |
Λ | The rate of new individuals entering the susceptible class in the population |
μ | The average natural mortality constant rate |
Parameter | Value | Parameter | Value |
μ | 200 | qC2 | 0.99 |
Λ | 0.005 | qD2 | 0.01 |
β1 | 0.000001 | dC1 | 0.083 |
β2 | 0.000001 | dD1 | 0.0083 |
qC1 | 0.86 | dC2 | 0.043 |
qD1 | 0.14 | dD2 | 0.0083 |
cC1 | 0.008 | cC2 | 0.008 |
cD1 | 0.0005 | cD2 | 0.005 |
δ | 0 | Initial conditions | (10000,100, 50,100, 50) |
parameter | Physical interpretation |
β1 β2 | The recruited rate factor of susceptible individuals |
qC1 qC2 | The rate of susceptible groups entering the sympathizer groups |
qD1 qD2 | The rate of susceptible groups entering the defenders groups |
cC1 cC2 | The rate at which sympathizers turn into defenders |
cD1 cD2 | The rate at which defenders turn into sympathizers |
dC1 dC2 dD1 dD2 | removal rates of sympathizers and defenders |
δ | The rate factor at which sympathizers turn into defenders due to other ideological |
Λ | The rate of new individuals entering the susceptible class in the population |
μ | The average natural mortality constant rate |
Parameter | Value | Parameter | Value |
μ | 200 | qC2 | 0.99 |
Λ | 0.005 | qD2 | 0.01 |
β1 | 0.000001 | dC1 | 0.083 |
β2 | 0.000001 | dD1 | 0.0083 |
qC1 | 0.86 | dC2 | 0.043 |
qD1 | 0.14 | dD2 | 0.0083 |
cC1 | 0.008 | cC2 | 0.008 |
cD1 | 0.0005 | cD2 | 0.005 |
δ | 0 | Initial conditions | (10000,100, 50,100, 50) |