Home > 21 (4), 7

A Generative Model of the Mutual Escalation of Anxiety Between Religious Groups Download PDF

F. LeRon Shultsa,b , Ross Gorec , Wesley J. Wildmand , Christopher Lynchc , Justin E. Lanea, e and Monica Toftf

aNORCE Center for Modeling Social Systems, Norway; bUniversity of Agder, Norway;cVirginia Modeling, Analysis, and Simulation Center, Old Dominion University, United States; dSchool of Theology, Boston University and Center for Mind and Culture, Boston, United States; eInstitute of Cognitive and Evolutionary Anthropology, University of Oxford, United Kingdom; fThe Fletcher School of Law and Diplomacy, Tufts University

Journal of Artificial Societies and Social Simulation 21 (4) 7JASSS thanks the authors of this article for their donation
<https://www.jasss.org/21/4/7.html>
DOI: 10.18564/jasss.3840

Received: 18-Jan-2018    Accepted: 06-Sep-2018    Published: 31-Oct-2018

Abstract

We propose a generative agent-based model of the emergence and escalation of xenophobic anxiety in which individuals from two different religious groups encounter various hazards within an artificial society. The architecture of the model is informed by several empirically validated theories about the role of religion in intergroup conflict. Our results identify some of the conditions and mechanisms that engender the intensification of anxiety within and between religious groups. We define mutually escalating xenophobic anxiety as the increase of the average level of anxiety of the agents in both groups over time. Trace validation techniques show that the most common conditions under which longer periods of mutually escalating xenophobic anxiety occur are those in which the difference in the size of the groups is not too large and the agents experience social and contagion hazards at a level of intensity that meets or exceeds their thresholds for those hazards. Under these conditions agents will encounter out-group members more regularly, and perceive them as threats, generating mutually escalating xenophobic anxiety. The model’s capacity to grow the macro-level emergence of this phenomenon from micro-level agent behaviors and interactions provides the foundation for future work in this domain.
Keywords: Agent-Based Model, Religious Violence, Identity Fusion, Social Identity, Terror Management, Xenophobia

Introduction

Does religion play a causal role in promoting anxiety between groups? Do anxiogenic contexts play a causal role in promoting religiosity? If so, under what conditions and through which mechanisms? Because of their relevance for international security and public policy, these sorts of research questions have been attracting more attention in recent years (Toft et al. 2011). In this article, we present an agent-based model of mutually escalating xenophobic anxiety between religious groups that incorporates insights from a variety of theories that provide (partial) answers to these questions. We define mutually escalating xenophobic anxiety as the increase of the average level of anxiety of the agents in both groups over time.

This phenomenon, which is well documented empirically, can reach a boiling point and lead to intergroup violence (Brubaker 2015; Neuberg et al. 2014; Haushofer et al. 2010). Although our model does not explicitly simulate violence, we begin with two examples of mutually escalating xenophobic anxiety that did in fact lead to manifestations of extremely intense levels of physical conflict, albeit at quite different time scales (one lasting 3 days, the other almost 30 years).

The now infamous Gujurat riots seem to have been triggered by an event that occurred on February 27, 2002, when a Sabarmarti Express train filled with Hindu pilgrims returning to Gujarat from the Ayodhya Temple stopped in the town of Godhra. According to reports, Hindu activists were chanting religious slogans and insulting Muslim residents. Fifteen minutes later, one of the train cars - the S6 coach - caught fire and became engulfed in flames. Close to 60 people, mostly pilgrims, died in the fire. The charred remains were put on display in Ahmedabad, Gujarat's largest city, and the state's Chief Minister at that time, Narendra Modi, endorsed a widespread strike. Hindu nationalists blamed Muslims for the death of the pilgrims. They began rioting, which spilled over into ritualistic killings of Muslims. These riots - and counter-attacks by Muslims - were savage. An estimated 1,000-2,000 people died (mostly Muslims). 20,000 homes and businesses, 360 places of worship were destroyed, and 150,000 people were displaced. Members of each religious group profoundly contributed to the escalation, and police officials declared that both sides were at fault (Dugger 2002; Staff 2004).

Our second example of mutually escalating xenophobic anxiety between religious groups, which also led to manifestations of violence, lasted much longer. During the period of Northern Ireland's history called The Troubles (1973-2001), Roman Catholic groups committed to a unified Ireland (the unification of Northern Ireland and the Republic of Ireland) were in conflict with Protestant groups committed to defending the British rule of Northern Ireland. During this period there were over 3,500 deaths, and over 47,000 people were injured from both communities (including police forces, which were considered to be aligned with the Protestants). Although the Troubles were marked by several stages of punctuated anxiety and violence, such as the Battle of the Bogside and Bloody Sunday, there is evidence of mutually escalating anxiety between the two groups throughout the duration of the conflict. Figure 1 shows the mutual escalation of periods of at least three years in length, as manifested by the number of shootings between the two groups (Fay et al. 1999; Mulholland 2002). The data in Figure 1 is taken from the Conflict Archive on the Internet (CAIN) Web Service (Hopkins 2003).

Figure 1. Highlighted periods (3 years or more) of mutual escalation of anxiety, manifested in shootings, in Northern Ireland from 1973-2001.

In the next section, we identify some of the prior computational efforts and recent theoretical developments that inspired our model. We then describe the entities of the model, as well as the rules guiding their initialization, decisions and interactions. Next, we report on the results of our parameter sweeps of the model and trace validation analyses, which shed light on the conditions under which - and the mechanisms by which - intergroup anxiety can emerge and escalate. Our results show that the most common conditions under which longer periods of mutually escalating xenophobic anxiety occur are those in which the difference in the size of the groups is not too large and the agents experience social and contagion hazards at a level of intensity that meets or exceeds their thresholds for those hazards. We discuss the validity and limitations of the model and conclude with a summary our findings.

Related Work & Background

Our model draws on social influence modeling and has similarities to a number of existing agent-based models. In this section, we first review social influence modeling and then describe some of the ABMs that are most closely related to our work.

Social influence modeling

Social influence is an important factor in human interaction. In social encounters individuals can modify their opinions, attitudes, beliefs, or behavior to mimic or to oppose those with whom they are interacting. Such modifications may be the result of persuasion, uncertainty, or peer pressure (Flache et al. 2017).

Many early social influence models included agents whose opinion on a position could be socially influenced on a continuous spectrum (Abelson 1967; Berger 1981; DeGroot 1974; Lehrer 1975). For example, agents might try to find an appropriate speed on an interstate highway. Some later models involved simulating opinions that required a choice between mutually exclusive options, rather than varying on a continuous scale (Axelrod 1997; Latané 1996; Liggett 2012; Sznajd-Weron & Sznajd 2000). For example, agents might shift their opinions about political parties, music, or movies. In some cases, it is possible to model mutually exclusive options as nominal traits on a continuous spectrum (Nowak et al. 1990; Flache et al. 2017; Gore et al. 2018).

Recently, researchers have identified three classes of social-influence models that are the most popular in agent-based modeling. These classes of social influence models are: (1) assimilative social influence (Durkheim 2014; Myers 1982; Vinokur & Burnstein 1978; Akers et al. 1979), (2) similarity biased influence (Axelrod 1997; Carley 1991; Deffuant et al. 2000; Hegselmann et al. 2002; Mark 1998) and (3) repulsive influence (Jager & Amblard 2005; Macy et al. 2003; Mark 2003).

In assimilative social influence models, individuals are connected by a structural relationship and always influence each other to reduce opinion differences. Here, if the network is connected the influence dynamics eventually create consensus (Flache et al. 2017).

For models with similarity biased influence, only sufficiently similar individuals can influence each other to reduce opinion differences. How much similarity is sufficient depends on other mechanisms included in the model (e.g., social identity, confidence in others). Consensus can be avoided in similarity biased influence models. However, if the similarity bias is sufficiently strong, then multiple homogenous but distinct clusters of individuals emerge. In such cases, however, opinions never leave the initial range (Deffuant et al. 2000; Hegselmann et al. 2002; Flache et al. 2017).

In models with repulsive influence, when individuals are sufficiently dissimilar they can influence each other in ways that increase opinion differences. The amount of dissimilarity needed to trigger repulsive influence depends on other mechanisms included in the model (e.g., social identity, ego-involvement). Here too consensus can be avoided. Clusters can also form and adopt maximally opposing views (bi-polarization). These dynamics allow opinions to leave the initial range (Flache et al. 2017).

Our model uses assimilative social influence to determine the religiosity of agents. Our measure of religiosity has two dimensions and each dimension uses a different social network to determine the assimilative social influence. The two dimensions of religiosity and the social networks corresponding to each are discussed in Section 3.

Social conflict models

Other models have explored the role of cultural differentiation and boundary clarification in shaping the dynamics of ethnic anxiety and violence (Lim et al. 2007). For example, Axelrod's dissemination of culture model simulated a variety of mechanisms showing how interactions among different cultural features challenge intuitive assumptions about individuals' beliefs and interpersonal behavior and group dynamics (Axelrod 1997). In related work, models developed by Deffuant and colleagues have focused on dynamic regimes within which moderate groups are more or less susceptible to violent conflict resulting from social interaction (Deffuant et al. 2002). More recently, Upal and Gibbon developed an agent based system for simulating the dynamics of social identity beliefs that aimed at isolating factors that contribute to intergroup conflict (Upal & Gibbon 2015).

Another recent social conflict model accounts for meso- and macro-level variables such as social processes and cultural ideologies that can promote and justify violent behaviors, which in turn provide some individuals with a significance gain (Kruglanski et al. 2014). These variables include a motivational need to (re)gain personal significance, the availability of a narrative or ideology that can justify the behavior, and a social network whose group dynamics lead an individual to embrace the ideology (Webber et al. 2018). The model also recognizes that an individual must have the ability (subjective and objective capacity) to carry out extreme behaviors (Kruglanski et al. 2017).

Background

Our modeling of intergroup conflict focuses on the role of "religion", a term whose definition and use is highly contentious within and across many disciplines. Our strategy is to operationalize religion in a way that can serve our research purpose; namely, identifying some of the conditions for (and causes of) escalating anxiety that may (or may not) lead to violence. Building on research within the bio-cultural study of religion, we use the term religiosity to designate "shared imaginative engagement with axiologically relevant supernatural agents" (Shults 2014). By axiologically relevant supernatural agents, we mean disembodied intentional forces that members of a group consider in some sense germane to their values and capable of influencing their future. By shared imaginative engagement, we mean participation in ritualized behaviors organized around or oriented toward such agents. This sort of behavior typically signals and promotes individuals' sense of belonging to the group as well as their willingness to cooperate and remain committed in the face of threats from other groups and environmental challenges.

Research conducted in the scientific study of religion suggests that these beliefs and behaviors are engendered by two broad types of evolved disposition: (1) the tendency to infer the causal efficacy of supernatural agents when trying to make sense of the world; and (2) the tendency to prefer the moral normativity of a supernatural coalition when trying to act sensibly in society (Shults 2018). We utilize the phrases anthropomorphic promiscuity (AP) and sociographic prudery (SP), respectively, to refer to these two dimensions (Shults 2015, 2018). The integration of these "religious" tendencies are indicated in the lower left quadrant of Figure 2.

These phrases are borrowed from the writings of the first author of this article, who has elsewhere exposited and analyzed empirical findings and theoretical developments within the bio-cultural study of religion that support these claims (Shults 2014, 2015, 2018). Within the context of a broader argument in the scientific study of religion, the rhetorical function of this terminology is to play on the metaphor of "bearing gods," suggesting that supernatural agent conceptions are "born" in human minds as a result of hyper-active tendencies to detect hidden, human-like agents, and "borne" in human cultures as a result of hyper-active tendencies to protect familiar, ritualized in-group norms. For the purposes of the current model, we consider these to be the crucial components of religiosity.

The horizontal axis in Figure 2 represents a spectrum on which one can indicate the tendency of a person to guess "humanlike supernatural force" when confronted with ambiguous or frightening phenomena in the natural environment. The anthropomorphically promiscuous (those with high AP) are always on the lookout, jumping at opportunities to postulate such hidden intentional agents as causal explanations. The who are prudish in their anthropomorphism (those with low AP) are less likely to make these inferences because they tend to reflect more carefully before giving into an intuitive desire to grab at these types of explanations.

Figure 2. Visual depiction of AP and SP.

The vertical axis represents a spectrum on which one can register how tightly a person binds him or herself to the conventional modes of social practice regulated by the supernatural authorities of the coalition(s) with which he or she primarily identifies. Sociographic prudes (those with high SP) are strongly committed to the social norms of their in-group, following and protecting them even at great cost to themselves. They are more likely to be suspicious of out-groups and to accept claims or demands that appeal to authorities within their own coalition. Those who are promiscuous in their sociography (having low SP) are more open to social intercourse with out-groups about alternate normativities. Such persons are also less likely to accept restrictions or assertions that are based only or primarily on appeals to convention. A particular value along one of these dimensions does not dictate a particular value along the other dimension. In other words, an individual might have high AP and low SP or vice versa.

Terror Management Theory (TMT)

The model described below builds on an earlier model we developed to explore the relationship between mortality salience and religiosity, as defined above (Shults et al. 2018). That model's architecture was informed by the literature on terror management theory (TMT), which suggests that when death awareness is an "input" within the human cognitive system two of the most common "outputs" are increased acceptance of the existence of hidden intentional forces (especially supernatural agents) and increased resistance to engaging other cultures (Norenzayan & Shariff 2008; McGregor et al. 2015). In other words, the activation of the terror management system promotes anthropomorphic promiscuity (high AP) and sociographic prudery (high SP). Relying on appeals to supernatural causes to help explain confusing or threatening events and complying with supernatural conventions can ease psychological anxiety and strengthen in-group cohesion. Shared imaginative engagement with axiologically relevant supernatural agents amplifies the naturally evolved human tendencies to detect intentional forces and protect ritual coalitions.

Social Identity Theory (SIT)

The agent architecture of our new model also includes mechanisms informed by the social identity theory (SIT) of intergroup conflict. Here social identity refers to aspects of an individual's self-image that are shaped by his or her sense of belonging to a particular social category. This theory hypothesizes that pressures to evaluate one's own group positively through in-group/out-group comparisons leads social groups to attempt to differentiate themselves from each other (Tajfel & Turner 1979). The interaction between groups can be determined by value laden social differentiations that ratchet up tension between the groups, which can then lead to conflict and violence (Tajfel 1982). Because it focuses on the double role of group membership and social categorization in shaping group cohesion and contributing to intergroup conflict, this theory is particularly relevant for our research into the mechanisms that lead to the emergence and escalation of religious conflict.

Identity Fusion Theory (IFT)

This model's architecture is also informed by identity fusion theory (IFT), another important research program bearing on the escalation of intergroup anxiety. Extreme identity fusion involves the blurring of personal and social identities such that the group comes to be regarded as functionally equivalent to the self. Much of the research on IFT focuses on the way in which this distinctive form of group allegiance, which is influenced by personality and situational factors, can lead to extreme behaviors (Swann Jr & Buhrmester 2015; Swann Jr et al. 2009). Identity fusion is a distinctive construct that refers to how individual identity interacts with group identity in a synergistic and reinforcing dynamic (Gómez et al. 2011). Less fused people may have strong beliefs about what sacrifices "ought" to be made for their group, but are less likely to act on those beliefs compared to highly fused people, who are more willing to kill, or even die, for the group (Swann Jr et al. 2010; Whitehouse et al. 2014).

Computational features

The architecture of the current model also has several new computational features, including key aspects of Epstein's Agent_Zero (Epstein 2014). The dynamics in that model were configured in such a way that the intensification of affect within an individual agent could (under certain conditions based on group interactions) reach a tipping point such that the agent passes a threshold that could be taken as a proxy for initiating (for example) a lynching or a genocide. These social contagion dynamics play a central role in our modeling of the function of religion in mutually escalating xenophobic anxiety because they allow us to implement relevant theories (Le Bon 1985; Canetti 1984; Mackay 1841; Browning & Chiappori 1998) related to emotional, cognitive, and social behaviors in group dynamics. Technical details are available in the electronic supplemental materials at https://github.com/SimRel/Merv1.0.

Drawing on insights from TMT, SIT, and IFT, this model highlights conditions under which the behavior of - and interaction between - individual agents can lead to mutually escalating xenophobic anxiety. This allows us to empirically investigate the relationships between individual agents with a specific set of cognitive mechanisms, and the group-level observations we expect to see arise from the interactions of these mechanisms within a population. For a graphic illustration, see Figure 3.

Figure 3. Variable dependencies within the model that allow for identifying conditions under which mutually escalating xenophobic anxiety between religious groups emerge.

As explained in more detail below and in the appendices, agents in the model are assigned to one of two groups, distinguished by their (simulated) variance of beliefs and ritual behaviors in relation to the supernatural agents postulated by each group. As the model runs, agents are subjected to different types of hazards that increase their stress and heighten their mortality salience. These encounters can provoke members of the groups to seek explanations and help from supernatural agents, and to turn to fellow group members for comfort and protection, thereby increasing their desire to engage in shared rituals (as predicted by TMT). As these ritual engagements intensify, some agents become more fused to their in-groups, which increases their propensity towards feeling anxious about out-group members (as predicted by SIT and IFT).

The Model

The goal of our model is to generate mutually escalating xenophobic anxiety between two religious groups under theoretically sound conditions that are consistent with TMT, SIT, and IFT. Mutually escalating xenophobic anxiety occurs when the average anxiety level of agents in both groups increases over time. Figure 4 shows a plot of the average anxiety of the two groups (majority and minority) over time in a single model run. Three sections of the time series are highlighted. Each of these sections illustrates a sequence of consecutive time steps where the average anxiety of all agents in both of the groups simultaneously increases. These three sections depict three time series of mutually escalating xenophoibc anxiety.

It is important to note that for mutually escalating anxiety to occur the final anxiety level of each escalation section for each group is not necessarily higher than the previous section for the group. For example, mutually escalating anxiety can occur where the average anxiety level of each group during the final escalation in a series is not the highest level achieved during the simulation run.

Figure 4. Three series of mutually escalating anxiety within a single model run.

We chose the main elements of the architecture (agent traits, networks, hazards, group identities, etc.) with the goals of the model in mind. While many other variables and factors are relevant for mapping a phenomenon as complex as religious conflict, we aimed for a level of abstraction that captured the most salient and empirically-researched mechanisms that bear on this type of intergroup conflict. In the remainder of this section, we describe the architecture of our model including: (1) the entities within the model, (2) the process used to initialize the entities, and (3) the rules that dictate the interactions among them.

Model entities

Our model is made up of \(N\) agents separated into two groups interacting in a two-dimensional landscape. The two groups of agents are: (1) a majority group and (2) a minority group. The disparity in size between these groups can vary from negligible (2 agents) to extreme (\(N\)-2 agents). Each group is composed of individuals who share a set of distinctive supernatural beliefs and ritual behaviors.

Within a given group, an agent is connected to a subset of the other agents. These connections represent relationships of closeness (e.g., sibling, friend, trading partner) within the group. Within each agent, religiosity is measured as a combination of two variables: anthropomorphic promiscuity (AP) and sociographic prudery (SP). Recall, AP indicates the level of an individual's tendency to interpret ambiguous phenomena as caused by supernatural agency, and SP indicates the level of an individual's tendency to participate in the in-group ritual behaviors of a supernatural coalition. AP and SP are represented as positive numbers. Lower positive values reflect lower levels of AP or SP, while higher positive values reflect higher levels.

At every time step, the model environment produces hazards that may be of four different types: natural hazards (e.g., earthquake or volcano), predation hazards (e.g., prowling predatory animal), social hazards (e.g., cultural other interpreted as a threat), and/or contagion hazards (e.g., out-group member with apparent contagious disease). The first two of these hazards have to do with nature, broadly speaking, while the latter two hazards are related to other human beings encountered in society. For a social and contagion hazard to occur in the model an agent must be able to identify another agent from the out-group within a specified radius. Natural and predation hazards have no such requirement. Every hazard has an intensity determined by a triangular distribution with a minimum, mode and maximum parameter. The values of these parameters can range from 0 (no intensity) to 100 (maximum intensity).

Our use of the triangular distribution reflects our lack of knowledge about the distribution of these hazards. While we know that the intensity of these hazards does not follow a uniform distribution, we do not know the exact shape. As a result, we model the intensity with the minimum value and maximum value and an "inspired guess" as to the modal value. This captures the information known while preserving uncertainty where information is not known. In other words, it is the probability density function with the fewest assumptions that embodies a non-uniform random variable with a given minimum, mode and maximum (Maria 1997). In Section 5 we explore using an alternative distribution to model hazards and do not find a material difference in the reported results.

For each type of hazard, each agent has a threshold that determines the intensity a hazard must meet or exceed for them to perceive it. An agent's threshold for each type of hazard can vary from 0 (no threshold) to 100 (maximum threshold). Recall, social and contagion hazards require an additional condition: not only must the hazard level exceed the agent's threshold but the agent must be within a specified distance to an out-group agent on the landscape for the hazard to be perceived. It is important to note that the perception of an out-group agent only has to do with the position of the agent, not its inclusion within a social network.

The perception of hazards causes agents to increase their level of anxiety. In contrast, not perceiving hazards decreases an agent's level of anxiety. Within each agent, an anxiety level is represented as a real number. Lower values reflect lower levels of anxiety, while higher values reflect higher levels.

Each agent also has a hyper-vigilance threshold. This reflects the level of anxiety at which an agent searches for other agents within his/her group to share in a religious ritual. Over time, sharing in a religious ritual decreases the anxiety levels of all participating agents below their hyper-vigilance thresholds.

An overview of these entities, with their attributes and representation, are provided in Appendix B-D. Additional model-level attributes discussed in the following section are also included in Appendix B-D.

Initialization of entities

At initialization \(N\) agents are created. Upon inception each agent is assigned a threshold for each type of hazard, a specified distance to look for agents from the opposite group in the process of perceiving social and contagion hazards, and a hyper-vigilance threshold. In addition, each agent is assigned an initial AP and an initial SP value. Each of these values is determined by sampling the distribution specified by the respective model-level parameters' triangular distribution. Also, the anxiety level of each agent is initialized to zero. Once again, the use of our triangular distribution here reflects our lack of knowledge about the distribution of AP and SP, other than that the distribution is not uniform. As noted in 3.7, this follows the best practices for modeling a distribution with these characteristics, as specified in Maria (1997).

Next, the landscape is initialized as a 5\(N\) x 5\(N\) grid, where \(N\) is the size of the population. The size of the landscape is static; it does not change throughout the simulation run or between simulation runs. The minimum, mode and maximum intensity value of the triangular distributions used to generate each type of hazard are initialized using the respective model-level parameters.

Finally, each agent is placed within one of the two groups at random until one group reaches the specified size. After this point all remaining agents are assigned to the other group. Once an agent is assigned to a group, each agent is assigned a social network. The social network is generated using a Watts-Strogatz model. This model produces a set of in-group connections for agents with small-world properties, including short average path lengths and high clustering among agents (Watts & Strogatz 1998). It is important to note that the social network only dictates in-group connections; an agent is not connected to an agent from the other group (i.e. out-group). Figure 5 shows a screen shot of a population of 14 agents (8 majority group / 6 minority group) with the social network connections among the agents highlighted.

Figure 5. A population of 14 agents (8 majority group / 6 minority group) with the social network connections among the agents highlighted. Note that connections only exist between agents in the same group.

Figure 6 summarizes the interactions and decisions made by entities within the model at each time step. A state chart describing the logic agents go through at each time step and the pseudocode for the functions in the state chart are provided in Appendix E.

Figure 6. Decision tree for agents each time step.

The left side of Figure 6 highlights those actions that occur if an agent's anxiety level is below the agent's hyper-vigilance threshold. In this case natural, predation, social, and contagion hazards from the environment are created for the agent. Recall that a requirement for an agent to experience a social or a contagion hazard is for the agent to locate another agent from the other group within a specified radius. The intensity of each of these hazards is determined by sampling the triangular distribution defined by the aforementioned model-level parameters. It is important to note that (given this architecture) hazards occur only for individual agents; multiple agents do not experience the same hazard. While this abstraction does not capture some aspects of real-world interaction, it provides a simple and computationally efficient method for modeling natural and predation hazards. For each hazard the agent updates its anxiety level according to Equation 1. Once the agent is done testing if each hazard is perceived, it moves to a random location on the landscape.

$$anxiety_{current} + [\alpha \beta (\lambda - anxiety_{current})] \begin{cases} \lambda = 1, \beta = 1.00, \alpha = 0.05 & \mbox{if } {\text{hazard is perceived}} \\ \lambda = 0, \beta = 0.10, \alpha = 0.05 & \mbox{if } {\text{hazard is not perceived}} \end{cases}$$ (1)

Equation 1 is a parameterized Rescorla-Wagner model of classical conditioning, in which learning is conceptualized in terms of associated stimuli (Rescorla 1972). This serves as a simple explicit model of individual emotion in the context of groups, and has been empirically validated in a variety of studies, including some showing (1) that phasic firing of midbrain dopamine neurons carries a signed error signal consistent with the Rescorla-Wagner model (Rescorla 1973) and (2) that animal (rat, rabbit and pigeon) learning and behavior is consistent with the Rescorla-Wagner model (Myers et al. 2001; Roesch et al. 2012).

When hazards are perceived, the rate of the stimuli (\(\beta\)) in the equation is set to 1 and the association value (\(\lambda\)) is set to 1. Since an agent's anxiety level cannot exceed 1.0, these parameters reflect an incoming hazard that increases the anxiety level of the agent. Conversely, when hazards are not perceived, the rate of the stimuli (\(\beta\)) is set to 0.1 and the association value (\(\lambda\)) is set to 0. This reflects the agent's anxiety level decaying without the presence of the stimulus. The value of \(\alpha\) remains constant at 0.05 in both pieces of Equation 1. Parameterizing and using the Rescorla-Wagner model in this manner is consistent with other agent-based modelers working in similar domains (Epstein 2014; Sokolowski et al. 2014; Sokolowski & Banks 2015; Thompson et al. 2016).

The right side of Figure 6 highlights those actions that occur if the anxiety level of the agent exceeds the agent's hyper-vigilance threshold. When this occurs the agent searches for other agents in the same group who have also surpassed their hyper-vigilance threshold and seek to share in a religious ritual. The process of seeking out potential ritual partners begins with the agent searching his/her social network connections, then (if necessary) searching the social network connections of each agent to which s/he is connected. These rituals reflect the sort of religious meetings that typically occur after an individual tragedy or stressful time (Murphy et al. 2002; Gozdziak 2002).

If an agent finds a sufficient number of agents who have also passed their hyper-vigilance thresholds then a ritual cluster is formed among the agents. While agents are scanning for, or are in, a ritual cluster they can no longer experience hazards. Furthermore, agents in a cluster are unavailable to participate in ritual clusters with other agents. If an agent is unable to find a sufficient number of agents to form a ritual cluster then s/he continue the search in the next time step.

Once a ritual cluster is formed: (1) the AP value of the agent is increased according to Equation 2, (2) the SP value of the agent is increased according to Equation 3, and (3) the anxiety of all the agents in the cluster is decreased according to Equation 1 when a hazard is not perceived. These actions occur for each agent in the cluster each time step. When the anxiety level of each agent in the cluster is below each agent's hyper vigilance threshold then the ritual is complete and the cluster disbands. Figure 7 shows a screen shot of a population of 14 agents (8 majority group / 6 minority group) where three ritual clusters exist (2 majority group / 1 minority group) at the given time step.

Figure 7. A population of 14 agents (8 majority group / 6 minority group) where three ritual clusters exist (2 majority group / 1 minority group) at the given time step.
$$ap_{current} + \frac{ mean(ap_{ritual-cluster-members})}{mean(ap_{all-group-members})} %\frac{n!}$$ (2)
$$sp_{current} + \frac{mean(sp_{all-group-members})}{mean(sp_{all-members-of-other-group})} %\frac{n!}$$ (3)

The difference in equations 2 and 3 reflects the difference between the two dimensions of religion: AP and SP. Recall that AP is an agent's tendency to interpret ambiguous phenomena as caused by supernatural agency, while SP is the agent's tendency to participate in the in-group ritual behaviors of a supernatural coalition.

Forming and participating in a ritual cluster reflects an increase in both dimensions. First, forming a ritual cluster reflects SP. In our model all the agents in a group decide to try and conduct a ritual as a means to reduce anxiety. As a result, the calculation of the SP increase (Equation 3) of the agent is based on the average SP of all the members of the agent's group. In contrast, an agent's participation in a ritual reflects AP. Those in a ritual cluster of agents embrace a supernatural-based causal explanation of ambiguous phenomena they have experienced. The reduction of anxiety derived from this explanation is specific to the ritual cluster members; it is not shared by the whole group. As a result, the calculation of the AP increase (Equation 2) is based on average AP of the members of the cluster, not of the entire group to which the agent belongs.

Results

Frequency of escalating anxiety

First we investigate the extent to which the model produces mutually escalating xenophobic anxiety. There is not a requirement within the model for there to be a time series of mutually escalating anxiety. To understand how frequently this condition can occur we conducted a sweep of the model's parameter space. The values of the following variables are altered in the parameter sweep: (a) percentage of agents in the majority group; (b) the mode of the distribution governing the agent threshold for natural, predation, social, and contagion hazards; and (c) the mode of the distribution governing the intensity value for natural, predation, social and contagion hazards. The parameter sweep produced data for a combined 5,000,000 time steps of the model across 20,000 runs (each run extends across 250 time steps). Of those 5,000,000 time steps, 1,212,673 (24.25%) lie within an interval of escalating levels of anxiety for one or both of the groups.

This percentage is significant. If our model sampled probability distributions randomly we would expect a far greater proportion of time steps (43.75%) to occur within windows of escalating anxiety, whether the duration of escalation is short or long. But we see 24.25% not 43.75%. This relatively low percentage reflects the manner in which conditions within our model must combine to produce escalating levels of anxiety.

Within our model, when intervals of escalating xenophobic anxiety do emerge, they are sustained for varying periods of time and can play out in at least three different ways, the first of which is the only type that is mutually escalating: (1) both the majority and minority group experience an increase; (2) the majority group experiences an increase, while the minority group does not; and (3) the minority group experiences an increase, while the majority group does not. We are interested in the first type of escalating anxiety because it is mutual: both the majority and minority populations increase their levels of anxiety.

Figure 8 displays the extent to which the escalating xenophobic anxiety time steps in the parameter sweep fall into each of these three categories as the minimum length of the escalating xenophobic anxiety interval increases. For each category, there are progressively fewer anxiety intervals. The power-law distribution of these series is expected given the combination of agent behaviors and the probabilistic distribution of agent characteristics within the model.

Figure 8. Frequency of the three different types of mutually escalating anxiety traces.

It also shows that the most common escalating xenophobic anxiety time series is: Minority Group Escalating / Majority Group Not. Recall that a requirement for an agent to experience a social or a contagion hazard is for the agent to locate another agent from the other group within a specified radius. Since there are more majority group agents than minority group agents, minority group agents have an easier time locating agents on the landscape from the majority group. This results in agents within the minority group experiencing more encounters with potential social and contagion hazards, thereby making affect increases more likely.

Religiosity variables & anxiety

We also analyzed the relationship between decreases in anxiety and increases in the two dimensions of religiosity in agents: AP and SP. To explore the relationships among these three quantities as they shift in the model we first isolated any interval of consecutive time steps collected during our parameter sweep of the model in which there was a decrease in the average anxiety level, and an increase in the AP level, or an increase in the SP level in either the majority or the minority group. Then we computed the correlation of change between anxiety, AP and SP across both groups.

Table 1: Correlation of Changes in Religiosity Variables & Anxiety
QuantityPearson CorrelationStatistical Significance
Decrease in anxiety vs. Increase in AP
0.51(significant with \(p<0.01\))
Decrease in anxiety vs. Increase in SP & 0.190.19(significant with \(p<0.01\))

The Pearson correlation across each of these three quantities for intervals of two or more time steps is presented in Table 1. These results show that as the anxiety in both groups decreases, the AP levels in both groups tend to increase in the same direction. The results also show that there is less correlation between the decrease in the anxiety level and increase in SP level (+0.19). In other words, during periods when anxiety is being decreased the religiosity of both the majority and minority group increases, but this overall increase in religiosity is driven by AP more than SP.

These dynamics highlight the importance of the role of rituals in decreasing anxiety and increasing AP (w.r.t the ritual cluster) and SP (w.r.t the group) in our model. The performance of rituals is a unique feature of the model that enables agents to mediate the effects of hazards through social interaction with other hyper-vigilant members within their group. The increase in religiosity is driven by AP as opposed to SP because AP is increased with respect to the ritual cluster while SP is increased with respect to the group. Recall, SP is increased with respect to the group because it reflects the act of forming a cluster with in-group members. AP is increased with respect to the ritual cluster because it reflects the construction of a supernatural explanation of those hazards which is specific to the agents in the cluster.

The increases with respect to the ritual cluster (AP) are larger than the increases with respect to the group (SP) because it is likely that at least one agent in a ritual cluster has participated in a ritual cluster before. This occurs because the ritual cluster disbands when the anxiety level of each agent in the cluster is below the hyper-vigilance threshold. This leaves at least one agent with increased AP and SP but with an anxiety level just below the hyper-vigilance threshold. As a result, this agent is likely to quickly experience a hazard and need to re-enter a ritual cluster. Thus, when AP is increased in a ritual cluster the magnitude of the increase is often influenced by the already high AP value of an agent who has previously participated in ritual clusters. However, when SP is increased it is always calculated with respect to the average value of the whole group. This reduces the influence of the magnitude of an increase in SP from agents who have previously participated in ritual clusters. The result is the emergence of influence from agents who regularly exceed the hyper-vigilance threshold on the AP dimension of the religiosity of the group. In the next subsection we identify the specific conditions that need to be present for mutually escalating xenophobic anxiety to exist and be maintained over a period of time.

Isolating the causes of mutually escalating xenophobic anxiety

To identify the conditions associated with mutually escalating xenophobic anxiety, we use a trace validation technique specifically designed for analyzing agent-based models (Gore et al. 2017). We provide an overview of the trace validation technique here, but it is described in more detail in Appendix A. This technique utilizes a structured approach to capture data throughout execution (i.e., records a trace of the execution) and uses this trace data to automatically construct sets of conditions pertaining to the input parameters. These conditions are then used to quantify the extent to which combinations of agent and model characteristics cause unexpected model behaviors based on an output of interest, such as mutually escalating xenophobic anxiety (Gore et al. 2015; Diallo et al. 2016). Our use of the term cause refers to model inputs that generate an output of interest (i.e., mutually escalating xenophobic anxiety) (Manzo 2014). This is similar to the use of the term in statistics (Cox 1992) as opposed to the use of the term cause in philosophy of science as described in Bunge (1959).

The extent to which each generated condition contributes to mutually escalating xenophobic anxiety intervals is quantified by two measures: correlation and coverage. These measures are aggregated into a single score called suspiciousness. The name suspiciousness originated in the field of statistical debugging in software engineering because it was used to automatically localize faults in computer programs. The formulas for each measure are provided in Appendix A.

The correlation measure captures the likelihood that, given the condition, the interval will be mutually escalating as opposed to Majority Group Escalating / Minority Group Not Escalating or Minority Group Escalating / Majority Group Not Escalating. The coverage measure is the percentage of all mutually escalating Intervals that exhibit the specified condition. The suspiciousness measure combines and balances the specificity and the coverage measures using the harmonic mean.

Each measure has a maximum value of 1.0 and a minimum value of 0.0. A suspiciousness value of 1.0 means that the condition is only true in intervals of mutually escalating anxiety and the condition is true in all cases of mutually escalating anxiety. In other words, the condition completely distinguishes all mutually escalating times series from any other escalating time series. The existence of such a condition is not guaranteed. However, conditions with higher suspiciousness scores will provide more separation between mutually escalating intervals and other escalating intervals than conditions with lower suspiciousness scores.

Our trace validation approach scores each condition generated using the escalating intervals captured during the parameter sweep. This procedure iteratively applies to all intervals starting with a minimum length of 2 time steps and ending with the maximum length (9). For example, we can automatically generate conditions such as:“% of Agents in the Majority Group ≥ 70", or “Average Contagion Hazard Threshold > Average Contagion Hazard Intensity". Furthermore, this method can also detect complex conditions combining individual conditions with simple logical operators, such as AND, OR, and NOT. An example of a compound condition is: “(% of Agents in the Majority Group ≥ 70) AND (Average Contagion Hazard Threshold > Average Contagion Hazard Intensity)". A detailed explanation of how these conditions (i.e. predicates) and their correlation, coverage and suspiciousness scores are derived is presented in the Appendix.

Given the measure of suspiciousness, we assume the conditions that create mutually escalating xenophobic anxiety will have two properties: (1) their suspiciousness score will continually improve as the length of the interval increases, and (2) the suspiciousness score for the longest intervals should be close to 1.0.

Figure 9. Analysis of conditions causing mutually escalating anxiety.

The rationale for the first property is that longer intervals reflect stronger expressions of mutually escalating xenophobic anxiety, and so a condition responsible for creating mutually escalating xenophobic anxiety should increase its suspiciousness measure as the length of the time series increases. The rationale for the second property is that the condition for strong expressions of mutually escalating xenophobic anxiety should be present in all of those intervals and only those intervals. Our selection of these properties is an attempt to filter out noise in the simulation created by the use of stochastics and to highlight the signal strength of the different rules in the simulation that govern agent behavior.

After generating and iteratively scoring each of the conditions, one condition increases suspiciousness as minimum length of the intervals increases, with a peak suspiciousness score of 1.0. This condition was: (% of Agents in the Majority Group ≤ 70) AND (Contagion Hazard Intensity ≥ Contagion Hazard Threshold) AND (Social Hazard Intensity ≥ Social Hazard Threshold).

Figure 9 demonstrates the increase of this condition's suspiciousness (shown in green) up to a peak of 1.0 as the minimum length of the escalating anxiety intervals increases relative to two other related conditions (shown in blue and red).

The steady rise of the suspiciousness score demonstrates that the green condition is more frequently met in mutually escalating times series as the length of the time series increases. Figure 9 also suggests that social and contagion threats (green and blue lines) are more impactful than natural and predatory threats (red line) on the escalation of anxiety.

This result is readily interpretable. Mutually escalating xenophobic anxiety within the model is generated under the following three conditions: (1) When the majority and minority group are created there is not too large a disparity in size between them; (2) When the average intensity of a social hazard an agent experiences meets or exceeds the threshold the agent has for social hazards; and (3) When the average intensity of a contagion hazard an agent experiences meets or exceeds the threshold the agent has for contagion hazards. The combination of these circumstances creates an environment where agents in the majority and the minority groups regularly identify agents from the other group within a specified radius and perceive them as social and contagion threats. Mutually escalating intervals are produced because both groups are operating under circumstances where they are likely to experience hazards, which increases anxiety.

Figure 9 also demonstrates that other, even somewhat similar, conditions do not provide as effective an explanation for mutually escalating anxiety. For example, the suspiciousness score of the condition (the blue line) (% of Agents in Majority Group ≤ 70) OR (Contagion Hazard Intensity ≥ Contagion Hazard Threshold) OR (Social Hazard Intensity ≥ Social Hazard Threshold) does not strictly increase with the minimum length of the escalating anxiety intervals, and thus does not distinguish mutually escalating intervals from other escalating intervals.

The analysis in Figure 9 further shows that the intensity and threshold of social and contagion hazards are more responsible for creating mutually escalating xenophobic anxiety than natural and predation hazards. The suspiciousness score for the condition (the red line) (% of Agents in Majority Group ≤ 70) AND (Natural Hazard Intensity ≥ Natural Hazard Threshold) AND (Predation Hazard Intensity ≥ Predation Hazard Threshold) fluctuates as the minimum length of the escalating anxiety intervals increases, and so does not effectively distinguish mutually escalating anxiety intervals from other escalating anxiety intervals.

This makes sense because natural and predation hazards occur randomly at each time step and are unaffected by the percentage of agents in the majority or minority group. Social and contagion hazards, in contrast, are triggered as agents search for out-group agents during each time step. While random natural and predation hazards that meet or exceed the threshold of agents will increase the number of perceived threats, it is unlikely that predation and natural hazards alone will be enough to cause agents in both groups to cross the threshold in consecutive time steps, and that is what is required for mutually escalating xenophobic anxiety to arise within the model.

The trace validation analysis yields a simple explanation for how mutually escalating xenophobic anxiety emerges within the model. The agents need to be distributed into two groups not too different in size, and the simulation must produce the conditions under which agents from both groups encounter social and contagion hazards at levels of intensity that meet or exceed their thresholds for the respective hazards. Agents will then encounter others from a different group regularly and perceive them as threats, creating mutually escalating xenophobic anxiety.

It may appear as if this explanation relies only on system level properties (thresholds and population proportions) as opposed to interaction elements. However, upon closer inspection this is not the case. Mutually escalating xenophobic anxiety depends on there being enough agents in the minority group such that they are regularly encountered by and interact with the majority group agents. Without these interactions, the perceived social and contagion hazards that drive mutually escalating anxiety will not occur.

Given knowledge of previous research, and access to Figure 9, this explanation may seem so simple as to appear trivial. However, many emergent behaviors generated from agent-based models seem obvious once one knows how they arise. Our use of trace validation highlighted the conditions that cause mutually escalating xenophobic anxiety to emerge in the model, and these are consistent with the conditions discovered in other empirical research on the role of social conflict in increasing anxiety and engendering violence (Reed et al. 2003; Toft 2007; Lemke 2008). These findings also provide some confidence that our model can produce valuable insights into real-world intergroup conflicts such as those that occurred during the Gujurat riots. We are not claiming to have produced a novel explanation, but a novel computational model that illuminates some of the micro-level mechanisms at work in generating the macro-level phenomenon of mutually escalating xenophobic anxiety.

Model Validity and Limitations

Concerns about external, construct, and internal validity all affect the plausibility of our model. In addition to these validity concerns, our model has a number of limitations. Here we review each of these areas and discuss how they relate to our model.

External validity

Concerns about external validity arise when the results of the model cannot be generalized. The results of our current model cannot be generalized to explain specific occurrences of (or to forecast) mutually escalating xenophobic anxiety. However, this does not mean that the model bears no relationship to the real world. It is an attempt to implement relevant theories based on empirical research that has helped to explain phenomena of the sort described in our two examples in the introduction. Terror management theory (TMT), social identity theory (SIT) and identity fusion theory (IFT) have been used to describe how conflict between religious groups increases anxiety, and can even lead to a willingness to commit acts of violence on behalf of an in-group.

Construct validity

Concerns about construct validity are related to the appropriateness of the measures used to represent the entities in our model. While our model reflects a novel generative explanation of mutually escalating xenophobic anxiety, it is limited by our assumptions and choice of abstractions.

First, the system and agents within our model are mostly static. By this we mean that they continue to behave according to the same mechanisms for a whole simulation run. In future work we will explore the interplay that results from adding more individual behavior mechanisms and network dynamics, taking advantage of existing research in computational sociology.

Second, the initial anxiety level of each agent is 0 within our model. One could note that this might create a potential for path dependence and atypical system convergence behavior. We have explored whether initializing agent anxiety to a uniform number in [0,1] changes our results in Section 5; and it does not. However, in future work we will explore whether the results are sensitive to more varied initializations of agent anxiety.

Third, the social networks in our model follow the Watts-Strogatz model to describe in-group relationships. While this seems reasonable given that in-group agents interact by conducting rituals with one another, it is not the only type of social network that may be applicable. We have investigated whether the results of the simulation experiments are sensitive to this assumption by exchanging the Watts-Strogatz network to describe in-group relationships with Random networks and Preferential Attachment networks. These changes do not have an effect on our results. In future work we will explore whether the results are sensitive to other social network models of in-group relationships.

Fourth, the intensity of the hazards within our model are generated using a triangular distribution. One could argue that this type of distribution is not observed in reality. We have investigated using a truncated normal distribution instead of a triangular distribution. The truncated normal distribution also meets our requirements of a non-uniform distribution with a minimum, maximum and central tendency. This change does not have a material effect on our reported results.

Finally, the largest concern related to construct validity involves equifinality. The construction of our model required us to make a series of reasonable assumptions to fill specificity gaps. While we did our best to address each gap with the most reasonable assumptions, we did not exhaustively explore all of the additional factors that could have been included. For example, the model omits the role of political actors who mobilize religious groups to intensify and calcify perceived differences between them. It is possible that our interest in this topic may have biased our model construction. Many other reasonable assumptions could also have been made, and other factors could be included (Poile & Safayeni 2016). The technical choices in our model serve as recommendations for other researchers tasked with similar problems, and we welcome debate over alternatives for model construction. In future work we will use more input from qualitative research to inform new versions of the model.

Internal validity

Internal validity concerns arise when factors affect the dependent variables without the modelers' knowledge. It is possible that some implementation flaws could have affected the evaluation results. However, the algorithms we used within our model passed several internal code reviews and the analysis presented in the Results Section combines the output of 20,000 model executions. In addition, we used established libraries whenever possible to minimize the amount of new code that would be included in the model or the analytical tools we developed.

Conclusion

The experimental results of the model described in this article expand our understanding of the conditions under which - and the mechanisms by which - mutual xenophobic anxiety between religious groups can emerge and escalate. Its causal architecture, based on several leading theories about the relationships among components of religiosity and psychological and social anxiogenic factors generated macro-level phenomena from the micro-level behaviors and interactions of artificial agents in a simulated environment. The trace validation techniques we used show that the most common conditions under which longer periods of mutually escalating xenophobic anxiety occur are those in which the difference in the size of the groups is not too large and the agents experience social and contagion hazards at a level of intensity that meets or exceeds their thresholds for those hazards. Under these conditions agents will encounter out-group members more regularly, and perceive them as threats, generating mutually escalating xenophobic anxiety. While the model has limitations related to its external, internal, and construct validity, it serves as a platform for future work in this domain.


Acknowledgements

Funding for this research was provided by: (1) The Research Council of Norway (Grant # 250449) and (2) The John Templeton Foundation (Grant # 43288). The authors wish to thank other members of the Modeling Religion Project and the Modeling Religion in Norway project for conversations about the model, and the NORCE Center for Modeling and Social Systems, the University of Agder, the Center for Mind and Culture, and the Virginia Modeling, Analysis, and Simulation Center for additional support.

Appendix

A: Trace Validation

Statistical debugging

Our approach to trace validation employs predicates that are used in statistical debuggers. Statistical debuggers isolate the causes of software bugs using a set of inputs, corresponding execution traces, and a labeling of the execution traces as passing or failing (Liblit et al. 2005). The execution traces typically reflect the coverage of individual statements. The debuggers assign suspiciousness scores to statements to guide developers in locating faults. The equations below define the suspiciousness of a statement \(s\).

$$correlation_{s} = \frac{\textrm{# of failing execution traces including } s}{\textrm{# of execution traces including } s}$$ (4)
$$coverage_{s} = \frac{\textrm{# of failing execution traces including } s}{\textrm{# of failing execution traces}}$$ (5)
$$suspiciousness_{s} = \frac{2 \times correlation_{s} \times coverage_{s}}{correlation_{s} + coverage_{s}}$$ (6)

The \(correlation_{s}\) of a statement reflects the likelihood of a statement \(s\) appearing in a failing execution trace, while the \(coverage_{s}\) of a statement reflects the likelihood that a failing execution trace includes statement \(s\). The suspiciousness of a statement balances these two rate measures via the harmonic mean. Developers examine the statements in decreasing order of suspiciousness until the fault is discovered. For the approach to be effective, faulty statements must generally have higher suspiciousness scores than non-faulty statements.

In addition to profiling program statements, most statistical debuggers employ conditional propositions, or predicates, to record the values assigned to variables in an execution trace. For example, three predicates can be instrumented for every assignment statement in a program to test if a value being assigned to a variable is greater than, less than, or equal to zero. The suspiciousness of these predicates is calculated using the failing execution traces where the predicate is true, the total number of execution traces where the predicate is true and the total number of failing execution traces.

The addition of predicates (including those that are more complex than the three described above) enables statistical debuggers to analyze relationships within and among variable values. In theory and in practice this has been shown to improve effectiveness of the statistical debugging (Liblit 2007; Gore et al. 2011, 2015). Next, we describe the different types of predicates and how these predicates can be combined.

Predicates

Statistical debuggers employ two different types of predicates (single variable, scalar pairs) at two different levels of specificity (static and elastic) to localize bugs. The choice of type and the specificity-level defines a unique combination of conditions related to the variable(s) that the predicate captures. Two or more predicates can also be combined by generating compound predicates to gather insight about a variable's behavior at an additional level of granularity. Here we review predicate types, their specificity levels, and describe how they can be combined in a compound predicate.

Single variable predicates

A single variable predicate partitions the set of possible values that can be assigned to a variable \(x\). Single variable predicates can be created at two levels of specificity: the static level and the elastic level. The most basic single variable predicates are static. Static single variable predicates are employed to partition the values for each variable \(x\) around the number zero: (\(x > 0\)), (\(x = 0\)) and (\(x < 0\)). These single variable predicates are referred to as static because the decision to compare the value of \(x\) to 0 is made before execution. In contrast, the single variable elastic predicates use summary statistics of the values given to variable \(x\) to create partitions that cluster together values which are a similar distance and direction from the mean. For the variable \(x\) with mean \(\mu_{x}\) and standard deviation \(\sigma_{x}\), the elastic single variables predicates created are: (\(x > \mu_{x} + \sigma_{x}\)), (\(\mu_{x} + \sigma_{x} > x > \mu_{x} - \sigma_{x}\)), (\(x < \mu_{x} - \sigma_{x}\)). These predicates reflect values of variable \(x\) that are well above their normal value, within their normal range of values and well below their normal value.

Scalar pair predicates

Scalar pair predicates capture the important relationships between two variables that elude single variable predicates. The most basic scalar pair variables are static. Static scalar pair predicates are employed to partition the difference between a pair of variables, x and y, around the number zero: (\(x - y > 0\)), (\(x - y \geq 0\)), (\(x - y = 0\)) (\(x - y \leq 0\)) and (\(x - y < 0\)). These scalar pairs predicates are referred to as static because the decision to compare the difference between \(x\) and \(y\) to 0 is made before execution. In contrast, the scalar pairs elastic predicates use summary statistics of the difference between \(x\) and \(y\) to create partitions that cluster together values which are a similar distance and direction from the mean. For the pair of variables \(x\) and \(y\) with mean difference \(\mu_{x-y}\) and standard deviation \(\sigma_{x-y}\), the elastic scalar pairs predicates created are: (\(x - y > \mu_{x-y} + \sigma_{x-y}\)), (\(\mu_{x-y} + \sigma_{x-y} > x - y > \mu_{x-y} - \sigma_{x-y}\)) and (\(x-y < \mu_{x-y} - \sigma_{x-y}\)). These predicates reflect differences between the values of \(x\) and \(y\) that are well above the normal value, within the normal range of values and well below the normal value.

Compound Predicates

Compound predicates reflect any combination of single variable and scalar pair predicates that can be composed using the logical operators \(\wedge\) (and) and \(\vee\) (or). For any two predicates \(P\) and \(Q\), two compound predicates are tested: (1) the conjunction of the predicates (\(P \wedge Q\)) and (2) the disjunction of the predicates (\(P \vee Q\)). Once created a compound predicate can be combined with another compound predicate. Work in the field of software engineering has shown that there is not a significant benefit to combining compound predicates together more than three times (Arumuga Nainar et al. 2007).

Putting it all together

To perform a trace validation of this ABM, we start by specifying one or more outputs of interest within the ABM for the validation. Next, we specify the range of values under which each output is considered valid. In the context of this paper this is mutually escalating anxiety occurring over a time series of at least length two. Then, we identify the entities of interest within the model to trace. These are specified in the Results Section. Next, we run the simulation for a set of inputs based on a parameter sweep. The parameter sweep is the sweep described in Section 4.1. Finally, we collect the suspiciousness scores for each predicate (i.e. condition) generated for the set of entities of interest. The predicates and suspiciousness scores capture the relationship between: (1) the conditions within and among the entities and the presence of the output (i.e. mutually escalating anxiety occurring over a time series of at least length two).

B: Model-level Entities

Table 2: Model-level Entities
Model-level AttributesRepresentation
Number of Total AgentsAn even Integer \(N\)
Majority Group SizeIntegers from an Integer \(\frac{N}{2}+1\) to \(N\)-1
Minority Group Size Integers from an Integer \(\frac{N}{2}+1\) to \(N\)-1
Landscape HeightFixed Integer Value of 5\(N\)
Landscape WidthFixed Integer Value of 5\(N\)
Minimum Initial APInteger number not less than 0
Mode Initial APInteger number not less than 0
Maximum Initial APInteger number not less than 0
Minimum Initial SPInteger not less than 0
Mode Initial SPInteger not less than 0
Maximum Initial SPInteger not less than 0
Minimum Ritual Group SizeInteger not less than 2
Social Network2-D Matrix; 1 if connected, 0 otherwise
Minimum Hyper-vigilance ThresholdReal number [0,1]
Mode Hyper-vigilance ThresholdReal number [0,1]
Maximum Hyper-vigilance ThresholdReal number [0,1]
Mode Natural Hazard ThresholdReal number [0,100]
Maximum Natural Hazard ThresholdReal number [0,100]
Minimum Natural Hazard ThresholdReal number [0,100]
Mode Predation Hazard ThresholdReal number [0,100]
Maximum Predation Hazard ThresholdReal number [0,100]
Minimum Predation Hazard ThresholdReal number [0,100]
Mode Contagion Hazard ThresholdReal number [0,100]
Maximum Contagion Hazard ThresholdReal number [0,100]
Minimum Contagion Hazard ThresholdReal number [0,100]
Mode Social Hazard ThresholdReal number [0,100]
Maximum Social Hazard ThresholdReal number [0,100]
Minimum Social Hazard ThresholdReal number [0,100]
Minimum Social/Contagion Hazard Radius/td>Integer not less than 0
Mode Social/Contagion Hazard RadiusInteger not less than 0
Maximum Social/Contagion Hazard RadiusInteger not less than 0

C: Agent Entities

Table 3: Agent Entities
Agent AttributeRepresentation
Group Membership0 if minority, 1 if majority
Natural Hazard Threshold<br>Real Number [0,100]
Predation Hazard ThresholdReal Number [0,100]
Contagion Hazard ThresholdReal Number [0,100]
Social Hazard ThresholdReal Number [0,100]
Hyper-vigilance ThresholdInteger not less than 0
Anxiety LevelReal number [0,1]
Social/Contagion Hazard RadiusInteger not less than 0
Anthropomorphic Promiscuity (AP)Integer not less than 0
Sociographic Prudery (SP)Integer not less than 0

D: Environment Entities

Table 4: Environment Entities
Minimum Natural HazardReal number in [0,100]
Mode Natural Hazard IntensityReal number in [0,100]
Maximum Natural Hazard IntensityReal number in [0,100]
Minimum Predation Hazard IntensityReal number in [0,100]
Mode Predation Hazard IntensityReal number in [0,100]
Maximum Predation Hazard IntensityReal number in [0,100]
Minimum Contagion Hazard IntensityReal number in [0,100]
Mode Contagion Hazard IntensityReal number in [0,100]
Maximum Contagion Hazard IntensityReal number in [0,100]
Minimum Social Hazard IntensityReal number in [0,100]
Mode Social Hazard IntensityReal number in [0,100]
Maximum Social Hazard IntensityReal number in [0,100]

E: Simulation State Chart and Pseudocode

Figure 10. State chart describing the logic of an agent at each time step in detail. Extended from Shults et al. (2018).
function natural_check: gen_hazard_intensity = model.generate_nat_hazard(model.nat_hazard_intensity_min, model.nat_hazard_intensity_mode, model.nat_hazard_intensity_max) agent.percieved_nat_hazard = gen_hazard_intensity > agent.nat_hazard_threshold if agent.percieved_nat_hazard = true agent.anxietyIncrease() else agent.anxeityDecrease() agent.hyper_vigilant = agent.check_hyper_vigilant_status() function predation_check: gen_hazard_intensity = model.generate_pred_hazard(model.pred_hazard_intensity_min, model.pred_hazard_intensity_mode, model.pred_hazard_intensity_max) agent.percieved_pred_hazard = gen_hazard_intensity > agent.pred_hazard_threshold if agent.percieved_pred_hazard = true agent.anxietyIncrease() else agent.anxeityDecrease() agent.hyper_vigilant = agent.check_hyper_vigilant_status() function social_check: gen_hazard_intensity = model.generate_soc_hazard(model.soc_hazard_intensity_min, model.soc_hazard_intensity_mode, model.soc_hazard_intensity_max) agent.percieved_soc_hazard = gen_hazard_intensity > agent.soc_hazard_threshold & model.outgroup_agent_in_radius(agent.radius, agent.group) if agent.percieved_soc_hazard = true agent.anxietyIncrease() else agent.anxeityDecrease() agent.hyper_vigilant = agent.check_hyper_vigilant_status() function contagion_check: gen_hazard_intensity = model.generate_cont_hazard(model.cont_hazard_intensity_min, model.cont_hazard_intensity_mode, model.cont_hazard_intensity_max) agent.percieved_cont_hazard = gen_hazard_intensity > agent.cont_hazard_threshold & model.outgroup_agent_in_radius(agent.radius, agent.group) if agent.percieved_cont_hazard = true agent.anxietyIncrease() else agent.anxeityDecrease() agent.hyper_vigilant = agent.check_hyper_vigilant_status() function move: new_pos_x := null new_pos_y := null while new_pos_x != null | new_pos_y != null new_pos_x := uniform_random(1, N) new_pox_y := uniform_random(1, N) if (model.is_free(new_pos_x, new_pox_y) = false) new_pos_x := null new_pox_y := null agent.pos_x := new_pos_x agent.pos_x := new_pos_y function scan: if agent.hyper_vigilant = true agent.ready_for_ritual := true if length(agent.ritual_members) < model.Min_Ritual_Group_Size for each agent x in agent.social_network if x.hyper_vigilant = true & x.ready_for_ritual = false if agent.ritual_partners.contains(x) = false agent.ritual_partners.add(x) x.ready_for_ritual := true x.ritual_partners.add(agent) else agent.enhanced_ritual_engagement() function enhanced_ritual_engagement: if model.all_below_threshold(agent, agent.ritual_partners) agent.move() else if agent.has_not_been_processed_for_ritual() agent.increaseAP(agent.ritual_partners, agent.group) agent.increaseSP(agent.group) agent.anxeityDecrease() agent.processed_for_ritual := true for each agent x in agent.ritual_partners(x) if x.has_not_been_processed() x.increaseAP(x.ritual_partners, x.group) x.increaseSP(agent.group) x.anxeityDecrease() x.processed_for_ritual := true

F: Supplementary Information

This section provides download links to supplementary information associated with our work and model. An electronic version of this appendix can be found at https://github.com/SimRel/Merv1.0.

Analysis Data

The data files used in the figures and analysis of this publication can be downloaded at https://github.com/SimRel/Merv1.0/tree/master/data.

Plotting and analysis scripts

The scripts used for the plotting and analysis of the data used in this publication can be downloaded at https://github.com/SimRel/Merv1.0/tree/master/analysis-and-plot-scripts.

AnyLogic Simulation File

The AnyLogic .alp file which runs the simulation described in this publication can be downloaded at https://github.com/SimRel/Merv1.0/tree/master/bin. A free personal use / trial version of AnyLogic can be downloaded at: https://www.anylogic.com/downloads/personal-learning-edition-download/.

Simulation source code

The files containing the source code of the simulation described in this publication can be downloaded at https://github.com/SimRel/Merv1.0/tree/master/src.

References

ABELSON, R. P. (1967). Mathematical models in social psychology. Advances in Experimental Social Psychology, 3, 1–54. [doi:10.1016/S0065-2601(08)60341-X]

AKERS, R. L., Krohn, M. D., Lanza-Kaduce, L. & Radosevich, M. (1979). Social learning and deviant behavior: A specific test of a general theory. American Sociological Review, 636–655.

ARUMUGA Nainar, P., Chen, T., Rosin, J. & Liblit, B. (2007). Statistical debugging using compound boolean predicates. In Proceedings of the 2007 international symposium on Software testing and analysis, (pp. 5–15). ACM.

AXELROD, R. (1997). The dissemination of culture: A model with local convergence and global polarization. Journal of Conflict Resolution, 41(2), 203–226.

BERGER, R. L. (1981). A necessary and sufficient condition for reaching a consensus using degroot’s method. Journal of the American Statistical Association, 76(374), 415–418. [doi:10.1080/01621459.1981.10477662]

BROWNING, M. & Chiappori, P.-A. (1998). Efficient intra-household allocations: A general characterization and empirical tests. Econometrica, 66(6), 1241–1278.

BRUBAKER, R. (2015). Religious dimensions of political conflict and violence. Sociological Theory, 33(1), 1–19. [doi:10.1177/0735275115572153]

BUNGE, M. A. (1959). Causality: The Place of the Causal Principle in Modern Science. Cambridge, MA: Harvard University Press.

CANETTI, E. (1984). Crowds and Power. Translated from the German by Carol Stewart Carol Stewart. London: Victor Gollancz Ltd.

CARLEY, K. (1991). A theory of group stability. American Sociological Review, 56(3), 331–354.

COX, D. R. (1992). Causality: some statistical aspects. Journal of the Royal Statistical Society. Series A (Statistics in Society), 155, 291–301, [doi:10.2307/2982962]

DEFFUANT, G., Amblard, F., Weisbuch, G. & Faure, T. (2002). How can extremism prevail: A study based on the relative agreement interaction model. Journal of Artificial Societies and Social Simulation, 5(4), 1: https://www.jasss.org/5/4/1.html.

DEFFUANT, G., Neau, D., Amblard, F. & Weisbuch, G. (2000). Mixing beliefs among interacting agents. Advances in Complex Systems, 3(01n04), 87–98. [doi:10.1142/S0219525900000078]

DEGROOT, M. H. (1974). Reaching a consensus. Journal of the American Statistical Association, 69(345), 118–121.

DIALLO, S. Y., Gore, R., Lynch, C. J. & Padilla, J. J. (2016). Formal methods, statistical debugging and exploratory analysis in support of system development: Towards a verification and validation calculator tool. International Journal of Modeling, Simulation, and Scientific Computing, 7(1), 1641001. [doi:10.1142/S1793962316410014]

DUGGER, C. (2002). Religious riots loom over Indian politics. New York Times: https://www.nytimes.com/2002/07/27/world/religious-riots-loom-over-indian-politics.html.

DURKHEIM, E. (2014). The Rules of Sociological Method. New York: Simon and Schuster.

EPSTEIN, J. M. (2014). Agent_zero: Toward Neurocognitive Foundations for Generative Social Science (Vol. 25). Princeton, NJ: Princeton University Press.

FAY, M. T., Morrissey, M., & Smyth, M. (1999). Northern Ireland's troubles: The human costs (p. 136). London: Pluto Press.

FLACHE, A., Mäs, M., Feliciani, T., Chattoe-Brown, E., Deffuant, G., Huet, S. & Lorenz, J. (2017). Models of social influence: Towards the next frontiers. Journal of Artificial Societies and Social Simulation, 20(4), 2: https://www.jasss.org/20/4/2.html. [doi:10.18564/jasss.3521]

GÓMEZ, A., Brooks, M. L., Buhrmester, M. D., Vázquez, A., Jetten, J. & Swann Jr, W. B. (2011). On the nature of identity fusion: insights into the construct and a new measure. Journal of Personality and Social Psychology, 100(5), 918. [doi:10.1037/a0022642]

GORE, R., Reynolds, P. F., & Kamensky, D. (2011, November). Statistical debugging with elastic predicates. In Proceedings of the 2011 26th IEEE/ACM International Conference on Automated Software Engineering (pp. 492-495). IEEE Computer Society.

GORE, R., Reynolds Jr, P. F., Kamensky, D., Diallo, S. & Padilla, J. (2015). Statistical debugging for simulations. ACM Transactions on Modeling and Computer Simulation (TOMACS), 25(3), 16. [doi:10.1145/2699722]

GORE, R. J., Lemos, C., Shults, F. L. & Wildman, W. J. (2018). Forecasting changes in religiosity and existential security with an agent-based model. Journal of Artificial Societies and Social Simulation, 21(1), 4: https://www.jasss.org/21/1/4.html. [doi:10.18564/jasss.3596]

GORE, R. J., Lynch, C. J. & Kavak, H. (2017). Applying statistical debugging for enhanced trace validation of agent-based models. Simulation, 93(4), 273–284 [doi:10.1177/0037549716659707]

GOZDZIAK, E. M. (2002). Spiritual emergency room: the role of spirituality and religion in the resettlement of Kosovar Albanians. Journal of Refugee Studies, 15 (2), 136–152.

HAUSHOFER, J., Biletzki, A. & Kanwisher, N. (2010). Both sides retaliate in the Israeli–Palestinian conflict. Proceedings of the National Academy of Sciences, 107(42), 17927–17932. [doi:10.1073/pnas.1012115107]

HEGSELMANN, R., Krause, U. et al. (2002). Opinion dynamics and bounded confidence models, analysis, and simulation. Journal of Artificial Societies and Social Simulation, 5(3), 2: https://www.jasss.org/5/3/2.html.

HOPKINS, S. (2003). Conflict archive on the internet (CAIN). The Global Review of Ethnopolitics, 2(2), 83–84. [doi:10.1080/14718800308405139]

JAGER, W. & Amblard, F. (2005). Uniformity, bipolarization and pluriformity captured as generic stylized behaviour with an agent-based simulation model of attitude change. Computational & Mathematical Organization Theory, 10(4), 295–303.

KRUGLANSKI, A.W., Gelfand, M. J., Bélanger, J. J., Sheveland, A., Hetiarachchi, M. & Gunaratna, R. (2014). The psychology of radicalization and deradicalization: How significance quest impacts violent extremism. Political Psychology, 35(S1), 69–93. [doi:10.1111/pops.12163]

KRUGLANSKI, A. W., Jasko, K., Chernikova, M., Dugas, M. & Webber, D. (2017). To the fringe and back: Violent extremism and the psychology of deviance. American Psychologist, 72(3), 217.

LATANÉ, B. (1996). Dynamic social impact: The creation of culture by communication. Journal of Communication, 46(4), 13–25. [doi:10.1111/j.1460-2466.1996.tb01501.x]

LE BON, G. (1895) [1960]. The Crowd. New York: Viking.

LEHRER, K. (1975). Social consensus and rational agnoiology. Synthese, 31(1), 141–160. [doi:10.1007/BF00869475]

LEMKE, J. L. (2008). Identity, development and desire: Critical questions. In Identity trouble (pp. 17-42). Palgrave Macmillan, London.

LIBLIT, B. (2007). Cooperative bug isolation: winning thesis of the 2005 ACM doctoral dissertation competition (Vol. 4440). Berlin Heidelberg: Springer.

LIBLIT, B., Naik, M., Zheng, A. X., Aiken, A. & Jordan, M. I. (2005). Scalable statistical bug isolation. ACM Sigplan Notices, 40(6), 15–26.

LIGGETT, T. (2012). Interacting particle systems (Vol. 276). Berlin Heidelberg: Springer Science & Business Media.

LIM, M., Metzler, R. & Bar-Yam, Y. (2007). Global pattern formation and ethnic/cultural violence. Science, 317(5844), 1540–1544.

MACKAY, C. (1841) [1932]. Extraordinary popular delusions and the madness of crowds, preface to edition of 1852: Memoirs of extraordinary popular delusions and the madness of crowds (p. xx). New York: Farrar, Strauss and Giroux.

MACY, M. W., Kitts, J. A., Flache, A. & Benard, S. (2003). 'Polarization in dynamic networks: A Hopfield model of emergent structure.' In Dynamic Social Network Modeling and Analysis. Workshop Summary and Papers, Washington, DC: The National Academies Press, pp. 162–173.

MANZO, G. (2014). ‘Data, generative models, and mechanisms: More on the principles of analytical sociology.’ In Manzo G. (Ed), Analytical sociology. Hoboken: Wiley, pp. 1–52. [doi:10.1002/9781118762707.ch01]

MARIA, A. (1997). Introduction to modeling and simulation. In Proceedings of the 29th conference on Winter simulation, (pp. 7–13). IEEE Computer Society.

MARK, N. (1998). Beyond individual differences: Social differentiation from first principles. American Sociological Review, 63(3), 309–330. [doi:10.2307/2657552]

MARK, N. P. (2003). Culture and competition: Homophily and distancing explanations for cultural niches. American Sociological Review, 68(3), 319–345.

MCGREGOR, I., Hayes, J., & Prentice, M. (2015). Motivation for aggressive religious radicalization: goal regulation theory and a personality threat affordance hypothesis. Frontiers in Psychology, 6, 1325. [doi:10.3389/fpsyg.2015.01325]

MULHOLLAND, M. (2002). The Longest War: Northern Ireland’s Troubled History. Oxford: Oxford University Press.

MURPHY, S. A., Johnson, L. C., Lohan, J. & Tapper, V. J. (2002). Bereaved parents’ use of individual, family, and community resources after a child’s violent death. Family & Community Health, 25(1), 71–82. [doi:10.1097/00003727-200204000-00010]

MYERS, D. G. (1982). 'Polarizing effects of social interaction.' In H. Brandstatter et al. (Eds.), Group Decision-Making. London: Academic Press, pp. 125–161.

MYERS, K. M., Vogel, E. H., Shin, J. & Wagner, A. R. (2001). A comparison of the Rescorla-Wagner and Pearce models in a negative patterning and a summation problem. Animal Learning & Behavior, 29(1), 36–45. [doi:10.3758/BF03192814]

NEUBERG, S. L., Warner, C. M., Mistler, S. A., Berlin, A., Hill, E. D., Johnson, J. D., Filip-Crawford, G., Millsap, R. E., Thomas, G., Winkelman, M. et al. (2014). Religion and intergroup conflict: Findings from the global group relations project. Psychological science, 25(1), 198–206.

NORENZAYAN, A. & Shari_, A. F. (2008). The origin and evolution of religious prosociality. Science, 322(5898), 58–62. [doi:10.1126/science.1158757]

NOWAK, A., Szamrej, J. & Latané, B. (1990). From private attitude to public opinion: A dynamic theory of social impact. Psychological Review, 97(3), 362.

POILE, C. & Safayeni, F. (2016). Using computational modeling for building theory: A double edged sword. Journal of Artificial Societies and Social Simulation, 19(3), 8: https://www.jasss.org/19/3/8.html. [doi:10.18564/jasss.3137]

REED, I., Aquino, K. F. et al. (2003). Moral identity and the expanding circle of moral regard toward out-groups. Journal of Personality and Social Psychology, 84(6), 1270.

RESCORLA, R. A. (1972). Informational variables in Pavlovian conditioning. Psychology of Learning and Motivation, 6, 1–46. [doi:10.1016/S0079-7421(08)60383-7]

RESCORLA, R. A. (1973). Evidence for" unique stimulus" account of configural conditioning. Journal of Comparative and Physiological Psychology, 85(2), 331.

ROESCH, M. R., Esber, G. R., Li, J., Daw, N. D., & Schoenbaum, G. (2012). Surprise! Neural correlates of Pearce–Hall and Rescorla–Wagner coexist within the brain. European Journal of Neuroscience, 35(7), 1190-1200. [doi:10.1111/j.1460-9568.2011.07986.x]

SHULTS, F. L. (2014). Theology After the Birth of God: Atheist Conceptions in Cognition and Culture. Berlin Heidelberg: Springer.

SHULTS, F. L. (2015). How to survive the anthropocene: Adaptive atheism and the evolution of homo deiparensis. Religions, 6(2), 724–741. [doi:10.3390/rel6020724]

SHULTS, F. L. (2018). Practicing Safe Sects: Religious Reproduction in Scientific and Philosophical Perspective. Leiden: Brill.

SHULTS, F. L., Lane, J.E., Wildman, W.J., Diallo, S., Lynch, C. & Gore, R. (2018). Modeling terror management theory: Computer simulations of the impact of mortality salience on religiosity. Religion, Brain & Behavior, 8(1), 77-100. [doi:10.1080/2153599X.2016.1238846]

SOKOLOWSKI, J. A. & Banks, C. M. (2015). An agent-based approach to modeling insider threat. In Proceedings of the Symposium on Agent-Directed Simulation, (pp. 36–41). Society for Computer Simulation International.

SOKOLOWSKI, J. A., Banks, C. M., & Hayes, R. L. (2014, December). Modeling population displacement in the Syrian city of Aleppo. In Proceedings of the 2014 Winter Simulation Conference (pp. 252-263). IEEE Press.URL https://www.soundvision.com/article/what-happened-in-godhra-gujurat. [doi:10.1109/WSC.2014.7019893]

STAFF, S. (2004). What happened in Godhra, Gujarat? Soundvision: https://www.soundvision.com/article/what-happened-in-godhra-gujurat.

SWANN Jr, W. B. & Buhrmester, M. D. (2015). Identity fusion. Current Directions in Psychological Science, 24(1), 52–57. [doi:10.1177/0963721414551363]

SWANN Jr, W. B., Gomez, A., Dovidio, J. F., Hart, S. & Jetten, J. (2010). Dying and killing for one’s group: Identity fusion moderates responses to intergroup versions of the trolley problem. Psychological Science, 21(8), 1176–1183.

SWANN Jr,W. B., Gómez, A., Seyle, D. C., Morales, J. & Huici, C. (2009). Identity fusion: The interplay of personal and social identities in extreme group behavior. Journal of Personality and Social Psychology, 96(5), 995. [doi:10.1037/a0013668]

SZNAJD-WERON, K. & Sznajd, J. (2000). Opinion evolution in closed community. International Journal of Modern Physics C, 11(06), 1157–1165.

TAJFEL, H. (1982). Social psychology of intergroup relations. Annual Review of Psychology, 33(1), 1–39, [doi:10.1146/annurev.ps.33.020182.000245]

TAJFEL, H. & Turner, J. C. (1979). An integrative theory of intergroup conflict. The Social Psychology of Intergroup Relations, 33(47), 74

THOMPSON, J., Savino, G. & Stevenson, M. (2016). A model of behavioural adaptation as a contributor to the safety-in-numbers effect for cyclists. Transportation Research Part A: Policy and Practice, 85, 65–75. [doi:10.1016/j.tra.2015.12.004]

TOFT, M. D. (2007). Getting religion? The puzzling case of Islam and civil war. International Security, 31(4), 97-131.

TOFT, M. D., Philpott, D., & Shah, T. S. (2011). God's century: Resurgent Religion and Global Politics. WW Norton & Company.

UPAL, M. A. & Gibbon, S. (2015). Agent-based system for simulating the dynamics of social identity beliefs. In Proceedings of the 48th Annual Simulation Symposium, (pp. 94–101). Society for Computer Simulation International.

VINOKUR, A. & Burnstein, E. (1978). Depolarization of attitudes in groups. Journal of Personality and Social Psychology, 36(8), 872. [doi:10.1037/0022-3514.36.8.872]

WATTS, D. J. & Strogatz, S. H. (1998). Collective dynamics of ’small-world’ networks. Nature, 393(6684), 440–442.

WEBBER, D., Babush, M., Schori-Eyal, N., Vazeou-Nieuwenhuis, A., Hettiarachchi, M., Bélanger, J. J., Moyano, M., Trujillo, H. M., Gunaratna, R., Kruglanski, A. W. et al. (2018). The road to extremism: Field and experimental evidence that significance loss-induced need for closure fosters radicalization. Journal of Personality and Social Psychology, 114(2), 270. [doi:10.1037/pspi0000111]

WHITEHOUSE, H., McQuinn, B., Buhrmester, M. & Swann, W. B. (2014). Brothers in arms: Libyan revolutionaries bond like family. Proceedings of the National Academy of Sciences, 111 (50) 17783-17785.