You are on page 1of 41

THE ROLE OF NON-STATE ACTORS IN COUNTERING

VIOLENT EXTREMISM IN GARISSA


BIR-1-5266-3/2021
DECLARATION

This is my original work and has not been presented for examination in any of the
academic university. Referenced works duly acknowledged have complemented the
Proposal.

REG.NO.BIR-1-5266-3/2022

Signature………………………………………..Date……………………………….
ACKNOWLEDGEMENT

I wish to express my sincere appreciation to PROF.Fredrick Ochieng for his meticulous


insights make my completion of this study possible.
Finally, I thank all my classmates, the support staff in the Department of International
Studies for the motivation and encouragement.
ABSRTACT

In an era marked by persistent global security challenges, understanding the multifaceted


dynamics of countering violent extremism (CVE) has become increasingly imperative. This
study explores the nuanced role of non-state actors in CVE efforts within the context of
Garissa, Kenya. Employing a mixed-methods approach, data was gathered through
qualitative interviews with key stakeholders and quantitative surveys administered to
community members. Thematic analysis of qualitative data revealed the diverse strategies
and contributions of non-state actors, while quantitative analysis highlighted community
perceptions of their effectiveness. Findings underscored the significance of local engagement
and collaboration in CVE initiatives, shedding light on the challenges and opportunities faced
by non-state actors. This study contributes valuable insights to the discourse on CVE,
informing evidence-based strategies and policies aimed at fostering peace and resilience in
vulnerable communities.
ACRONYMS

i. CVE - Countering Violent Extremism


ii. NGO - Non-Governmental Organization
iii. CSO - Civil Society Organization
iv. CBO - Community-Based Organization
v. MoTI - Ministry of Transport and Infrastructure
vi. MoE - Ministry of Education
vii. MoH - Ministry of Health
viii. UN - United Nations
ix. EU - European Union
x. USAID - United States Agency for International Development

TABLE OF CONTENT
Table of Contents
DECLARATION.....................................................................................................................................2
ACKNOWLEDGEMENT.......................................................................................................................3
ABSRTACT.............................................................................................................................................4
ACRONYMS...........................................................................................................................................5
TABLE OF CONTENT...........................................................................................................................6
CHAPTER 1............................................................................................................................................8
INTRODUCTION...................................................................................................................................8
1.1 Background of the study..............................................................................................................8
1.2 Statement of the research problem.....................................................................................................9
1.3 Research objectives................................................................................................................10
Main objective...................................................................................................................................10
Specific objectives.............................................................................................................................10
1.4 Research Questions..........................................................................................................................12
1.5 Justification of the proposal study...................................................................................................13
1. Justification for Policy.......................................................................................................................13
2. Academic Justification.......................................................................................................................13
1.6 Research Approach..........................................................................................................................14
1.7 Study Constraints.............................................................................................................................15
1.8 Scope of the Proposed Study...........................................................................................................15
1.9 Operational Definition of Key Concepts.........................................................................................16
CHAPTER TWO...................................................................................................................................18
LITRATURE REVIEW.........................................................................................................................18
2.1 Introduction, to the Literature Review.............................................................................................18
2.1.1The involvement of Non-State Actors, in Countering Violent Extremism...................................18
2.1.2 Obstacles and Opportunities.........................................................................................................18
2.1.3 Exploring Perspectives.........................................................................................................19
2.2 Theoretical Framework................................................................................................................19
1.Social Movement Theory....................................................................................................................20
2.3 Research Findings............................................................................................................................21
Reviewing Operations............................................................................................................................21
2.4 Conceptual Framework................................................................................................................22
2.5 Empirical Review........................................................................................................................23
2.6 Operational Review.........................................................................................................................25
CHAPTER 3..........................................................................................................................................26
RESEARCH METHODOLOGY..........................................................................................................26
3.1 Introduction to Research Methods...................................................................................................26
3.2 Research Design..............................................................................................................................26
3.3 Research Methodology....................................................................................................................26
3.4 Sampling Design..............................................................................................................................27
3.5 Data Collection................................................................................................................................27
3.6 Data Analysis...................................................................................................................................30
3.7 Inclusion Criteria.............................................................................................................................31
3.8 Study Sample Selection...................................................................................................................31
3.9 Snowball Sampling Approach.....................................................................................................31
3.1.1 Target Population......................................................................................................................32
3.1.2 Instructions, for Gathering Data and Procedures..........................................................................33
3.1.3 Research limitations......................................................................................................................36
3.1.4 Validity test...................................................................................................................................37
3.1.5 Reliability test...............................................................................................................................39
3.1.6 Research ethics.............................................................................................................................40

CHAPTER 1

INTRODUCTION

1.1Background of the study


Garissa county is one among the forty-seven counties in Kenya its located in north-

eastern Kenya. The area has been facing issues, with extremism. Its close proximity to the

border, with Somalia has left it susceptible to the influence of extremist groups, including Al-

Shabaab. Over the years, Garissa has experienced many incidents of violence, including

terrorist attacks, recruitment of youth by extremist groups, and the spread of radical

ideologies.

In light of these difficulties different groups involved, such as government entities,

security personnel and global allies have taken steps to address terrorism. Yet the impact of

these actions has been. The persistence of violence remains a major concern, for the area’s

safety and order.

Not much focus has been given in studies, to how non-state actors contribute to

combating extremism in Garissa. Non-state actors, such as community-based organizations,

religious leaders, and civil society groups, play a crucial role in shaping community resilience

and countering extremist narratives. They have ties, within the community and a deep

understanding of dynamics allowing them to effectively connect with vulnerable individuals

and communities offering them options, beyond violence and extremism.

It's crucial to grasp the responsibilities and tactics utilized by non-state entities in

combating violent extremism, in Garissa to enhance the development of better and lasting

counterterrorism measures and actions. By leveraging the strengths of these actors and

supporting their efforts, policymakers and practitioners can enhance the resilience of

communities in Garissa and reduce the influence of violent extremist groups.


1.2 Statement of the research problem

Violent extremism continues to pose a challenge, in regions, including Garissa, Kenya

where acts of violence carried out by extremist groups have had severe impacts on local

communities. Non-governmental entities such as community organizations, religious

institutions and civil society groups have become players in addressing extremism efforts.

Despite their increasing participation there remains a lack of understanding regarding the

roles, strategies and impacts of these non-governmental entities in Garissa.

The core research issue addressed in this study revolves around the necessity to bridge

this knowledge gap by examining the involvement of state actors in countering violent

extremism in Garissa. This includes delving into the motivations that drive these entities the

tactics they employ and the obstacles they encounter while working to combat extremism.

Furthermore, it is essential to evaluate how effective these non-state actors are at preventing

and countering extremism in Garissa and identify practices that can guide future initiatives

focused on countering violent extremism.

This research problem holds significance for reasons. Firstly, comprehending the roles

played by state actors is essential for crafting more efficient and enduring strategies to

counter violent extremism, in Garissa.

By recognizing the roles and obstacles encountered by these individuals,

policymakers, professionals and local leaders can enhance their assistance. Utilize their

contributions effectively. Additionally, this research issue holds significance in furthering

understanding of Countering Violent Extremism (CVE) in Garissa and other regions.

Through capturing the experiences and approaches of governmental entities this study has the

potential to offer valuable perspectives to the wider CVE community.


1.3 Research objectives

To wrap things up the main focus of this study is to explore how non-governmental

entities are involved in combating extremism, in Garissa, Kenya. The aim is to understand

their contributions, tactics and obstacles. Delving into this issue is crucial for shaping policies

and actions against violent extremism in Garissa as well as for enhancing our academic

understanding of the subject.

Main objective

 This research aims to delve into the role of state actors in countering violent

extremism (CVE) in Garissa, Kenya. The emphasis is on grasping their

approaches, contributions and challenges.

Specific objectives
 Identifying the state actors engaged in CVE initiatives in Garissa, such as

community-based organizations, religious bodies and civil society

organizations.

 Exploring the duties and roles of these state actors in CVE efforts, including

their interactions with communities and partnerships with government bodies

and security agencies.

 Analysing the strategies used by state actors to combat violent extremism in

Garissa. Like educational programs, community engagements and capacity

building projects.

 Evaluating how effective non-state actors are at preventing and addressing

extremism in Garissa through outcomes and perceptions, within communities.

Exploring the difficulties that non-governmental groups encounter in their


efforts to combat extremism in Garissa, such, as resources, safety concerns

and community interactions. Identifying strategies and valuable insights from

the work of governmental organizations in countering violent extremism in

Garissa that can guide upcoming initiatives, in the area and globally.

 To offer suggestions, to policymakers, practitioners and other entities involved

in countering extremism (CVE) activities in Garissa based on the study’s

findings. These goals will shape the research process and aid in developing an

in-depth comprehension of the involvement of state actors in CVE efforts in

Garissa. Furthermore, they will assist in crafting recommendations to

strengthen CVE endeavours in the area.


1.4 Research Questions

1) What motivates community-based organizations and civil society groups, in

Garissa Kenya to get involved in countering extremism (CVE)?

2) How do non-state actors in Garissa approach their CVE efforts? Adjust their

strategies based on the threats of violent extremism and the local situation?

3) In what ways do non-state actors collaborate with government agencies,

security forces and other stakeholders in Garissa to strengthen their CVE

initiatives and ensure a response to extremism?

4) What obstacles do non-state actors face in their CVE projects in Garissa,

including resources, security challenges and community dynamics?

5) How do non-state actors evaluate the effectiveness of their CVE interventions

in Garissa? What criteria or measures do they use to gauge impact and

success?

6) What role do religious establishments like mosques and religious leaders play

in the CVE activities of state actors in Garissa? How do they shape

community attitudes and behaviours regarding extremism?

7) How do non-state actors interact with people, in Garissa to prevent

radicalization and promote narratives against violent extremism?

8) What can we gather from the experiences of groups, outside the government

involved in Countering Violent Extremism (CVE) in Garissa that could guide

CVE initiatives within and beyond the region?

9) How do gender factors shape the involvement of governmental groups in CVE

in Garissa and how do these groups tackle challenges specific, to gender

concerning violent extremism?


10) What do the people, in Garissa think about the success and influence of

governmental organizations efforts to counter violent extremism and how do

these views influence community backing, for such initiatives?

1.5 Justification of the proposal study

1. Justification for Policy

The presence of extremism presents a challenge to peace, stability and progress in

Garissa, Kenya. The region has witnessed acts of violence carried out by factions resulting in

loss of life displacement of communities and a pervasive sense of insecurity among residents.

In response to this menace both the Kenyan government and international bodies have

implemented CVE programs. Nonetheless there exists a necessity for a understanding of the

roles played by non-state actors within these initiatives.

This study holds significance for guiding policy decisions concerning CVE activities,

in Garissa. By exploring the strategies, contributions and obstacles encountered by state

actors’ policymakers can offer improved support and enhance the efficiency of their CVE

endeavours.

The results of this research could also assist in pinpointing deficiencies, in policies

and initiatives guiding the creation of focused and enduring strategies to combat violent

extremism in the area.

2. Academic Justification

From a standpoint this study holds importance for reasons. Primarily it adds to the

expanding collection of works on countering extremism by presenting real world data on the

involvement of governmental entities, in this effort.


The research will span over five years starting from 2019, to 2023 to encompass the

advancements and patterns in counter extremism initiatives, in Garissa.

Key Areas of Focus; The study will delve into the following topics;

 Exploring the involvement of governmental groups, in countering violent

extremism in Garissa and understanding their specific roles and duties.

 Examining the tactics and methods utilized by state actors to combat violent

extremism.

 Evaluating the effectiveness of state actors in preventing and addressing

violent extremism considering tangible results and community opinions.

 Investigating the challenges encountered by state actors in their efforts against

violent extremism, including limited resources, security threats and

community interactions.

 Highlighting approaches and insights gained from the experiences of state

actors involved in countering violent extremism in Garissa.

1.6 Research Approach

This study will utilize a mixed methods strategy incorporating both quantitative

methodologies. Qualitative data will be gathered through interviews with figures such as

representatives from state entities government officials and experts on countering violent

extremism. Quantitative data will be collected through surveys distributed to community

members and beneficiaries of counter programs. Additionally, content analysis will be

performed on documents like reports, policy papers and media coverage.


1.7 Study Constraints

Potential limitations may arise due to restricted access, to locations or individuals well

as issues related to data availability and reliability. Steps will be taken to address these

constraints by selecting study sites employing sampling techniques and implementing

thorough data validation measures.

1.8 Scope of the Proposed Study

The scope of the proposed study on the role of non-state actors in countering violent

extremism (CVE) in Garissa, Kenya, encompasses several key areas:

i. Geographical Scope: The study will focus specifically on Garissa County in Kenya,

considering the unique socio-political, cultural, and security dynamics of the region.

ii. Non-State Actors: The study will examine the role of various non-state actors,

including community-based organizations (CBOs), civil society organizations

(CSOs), religious institutions, and other grassroots entities, in CVE efforts in Garissa.

iii. CVE Strategies: The study will analyze the strategies and approaches employed by

non-state actors in Garissa to prevent and counter violent extremism, including

community mobilization, education, awareness campaigns, and other interventions.

iv. Challenges and Opportunities: The study will explore the challenges faced by non-

state actors in CVE, such as resource constraints, security risks, and coordination

issues, as well as the opportunities and successes they have experienced.

v. Community Perspectives: The study will seek to understand community perceptions

of non-state actors' effectiveness in CVE, including the factors that influence

community support or resistance to CVE efforts.


vi. Policy Implications: The study will assess the policy implications of non-state actors'

involvement in CVE in Garissa, providing recommendations for policymakers,

practitioners, and non-state actors themselves.

vii. Comparative Analysis: While the primary focus is on Garissa, the study may also

include a comparative analysis with other regions or countries facing similar CVE

challenges, providing broader insights into effective CVE strategies.

1.9 Operational Definition of Key Concepts

i. Non-State Actors: In this study, non-state actors refer to entities and

organizations that are not part of the government or state apparatus. This

includes community-based organizations (CBOs), civil society organizations

(CSOs), religious institutions, and other grassroots entities that are actively

involved in countering violent extremism (CVE) efforts in Garissa, Kenya.

ii. Countering Violent Extremism (CVE): CVE refers to a range of strategies and

interventions aimed at preventing individuals from radicalizing to violence

and countering the influence of violent extremist ideologies. In the context of

this study, CVE includes activities such as community engagement,

education, awareness campaigns, and other interventions aimed at addressing

the root causes of violent extremism in Garissa.

iii. Role: The role of non-state actors in CVE refers to the contributions,

strategies, and activities undertaken by these actors to prevent and counter

violent extremism in Garissa. This includes their involvement in community

mobilization, advocacy, service delivery, and other efforts aimed at building

resilience to violent extremism.


iv. Effectiveness: Effectiveness in CVE refers to the degree to which non-state

actors' interventions and strategies achieve their intended outcomes. This

includes reducing the appeal of violent extremist ideologies, increasing

community resilience, and contributing to a more peaceful and secure

environment in Garissa.

v. Community Perceptions: Community perceptions refer to the attitudes,

beliefs, and opinions of community members in Garissa towards non-state

actors' CVE efforts. This includes how community members perceive the

effectiveness, relevance, and impact of these efforts on their daily lives and

the overall security situation in Garissa.

vi. Challenges and Opportunities: Challenges refer to the obstacles and

difficulties faced by non-state actors in implementing CVE initiatives in

Garissa, such as resource constraints, security risks, and coordination issues.

Opportunities refer to the favourable conditions and possibilities for non-state

actors to enhance their CVE efforts, such as community support, partnerships,

and innovative approaches.


CHAPTER TWO

LITRATURE REVIEW

2.1 Introduction, to the Literature Review

Addressing extremism (CVE) has emerged as a pressing issue for governments,

institutions and societies globally given the threats posed by violent extremist factions to

stability, safety and progress. In light of this issue there has been a growing acknowledgment

of the importance of engaging governmental entities, like grassroots organizations and faith-

based establishments.

2.1.1The involvement of Non-State Actors, in Countering Violent Extremism

Non-actors play a crucial and diverse role in countering violent extremism (CVE)

engaging in activities such as grassroots mobilization, community participation, advocacy

and providing services. They possess an understanding of environments and dynamics

enabling them to tailor their initiatives effectively to address the underlying causes of violent

extremism. The flexibility of state actors allows them to operate in areas and interact with

communities that government bodies may find challenging or restricted.

2.1.2 Obstacles and Opportunities

Although non-state actors can contribute significantly to CVE efforts they encounter

obstacles such as resources, capacity limitations, security threats and at times lack of

acknowledgment or support from governmental bodies. Despite these hurdles non-state actors

have showcased resilience and creativity in their CVE endeavours by utilizing expertise,

networks and cultural insights to develop interventions for specific contexts. By recognizing
and tackling these obstacles collectively policymakers, practitioners and scholars can better.

Boost the involvement of state actors in CVE.

2.1.3 Exploring Perspectives

The theoretical review delves into viewpoints on violent extremism and the

involvement of non-state actors, in combating it.

The social identity theory is a concept that suggests people’s identities are influenced

by the groups they belong to and violent extremism can stem from feelings of grievance or

injustice, within these groups. Non-state entities can help prevent radicalization and violence

by fostering identities and addressing grievances effectively.

Another important concept to consider is the theory of change which highlights the

significance of identifying the root causes of extremism and creating interventions to tackle

these issues. Non-governmental organizations can be instrumental, in this process by

engaging with communities fostering trust and presenting narratives to challenge beliefs.

2.2 Theoretical Framework

The theoretical framework for this research is centred around the notion that non-

governmental organizations can contribute to Countering Violent Extremism (CVE) through

activities such as community involvement, education and advocacy. The framework outlines

elements that shape the effectiveness of state actors in CVE efforts, including their

credibility, resources and partnerships. It also considers factors like dynamics and socio-

economic contexts that influence how non-state actors implement their CVE strategies.
1.Social Movement Theory
This theory explores how non-state actors, particularly grassroots movements and community

organizations, mobilize collective action to counter violent extremism. It emphasizes the role

of these movements in shaping and influencing societal responses, challenging extremist

narratives, and promoting alternative perspectives within the community.

2. Network Theory:

Examining non-state actors through the lens of network theory helps understand the

interconnectedness and collaboration among different entities involved in countering violent

extremism. This framework highlights the importance of partnerships, information sharing,

and collaborative efforts among non-state actors in Garissa to create a more resilient network

against extremist influences.

3. Civil Society and Governance Theories:

Non-state actors, including NGOs and religious institutions, operate within the civil

society realm and contribute to governance processes. Theoretical frameworks related to civil

society and governance help analyse how these actors influence policy, engage with local

authorities, and contribute to creating an environment conducive to countering violent

extremism.

4. Cultural Criminology:

Cultural criminology offers insights into how non-state actors address the cultural

dimensions of violent extremism in Garissa. This includes understanding how cultural factors

contribute to radicalization and how non-state actors intervene through cultural initiatives,

education, and community engagement to counter these influences.


5. Conflict Transformation Theory:

This theory focuses on transforming the root causes of conflicts, including violent

extremism. Non-state actors in Garissa may apply conflict transformation strategies by

addressing socio-economic disparities, promoting dialogue, and fostering reconciliation to

mitigate the conditions that fuel extremist ideologies.

2.3 Research Findings

Studies examining the role of state actors in CVE offer valuable insights into their

contribution’s obstacles encountered and overall impact. These studies demonstrate that non-

state actors play a role in preventing and addressing extremism by fostering trust and

resilience within communities. Nevertheless, they encounter challenges such, as resources,

security threats and coordination difficulties.

Reviewing Operations
The operational assessment is centred on the hands-on elements of state actors’ efforts

in countering violent extremism (CVE) encompassing their aims, tactics and results. It delves

into how non-state actors pinpoint and rank CVE goals as how they put their plans into

action, in real world scenarios. This evaluation offers an insight into the facets of non-state

actors CVE endeavours highlighting effective approaches and valuable insights that can

guide forthcoming initiatives.


2.4 Conceptual Framework

Conceptual framework for the study on the role of non-state actors in countering violent

extremism (CVE) in Garissa, Kenya, is based on several key components:

i. Context: The framework recognizes the unique socio-political, cultural, and security

context of Garissa, including its history of conflict, marginalization, and vulnerability

to violent extremism. This context shapes the dynamics of CVE efforts and the role

of non-state actors in the region.

ii. Non-State Actors: At the center of the framework are non-state actors, including

community-based organizations (CBOs), civil society organizations (CSOs),

religious institutions, and other grassroots entities. These actors are key stakeholders

in CVE, often possessing unique insights, networks, and capabilities that complement

government-led efforts.

iii. CVE Strategies: Non-state actors employ a range of strategies and approaches to

prevent and counter violent extremism in Garissa. These include community

engagement, education, awareness campaigns, advocacy, and other interventions

aimed at addressing the root causes of violent extremism and building community

resilience.

iv. Impact and Effectiveness: The framework considers the impact and effectiveness of

non-state actors' CVE efforts, including their ability to reduce the appeal of violent

extremist ideologies, build community resilience, and contribute to a more peaceful

and secure environment in Garissa.


v. Challenges and Opportunities: The framework acknowledges the challenges faced by

non-state actors in implementing CVE initiatives, such as resource constraints,

security risks, and coordination issues. It also identifies opportunities for non-state

actors to enhance their CVE efforts, such as community support, partnerships, and

innovative approaches.

vi. Policy Implications: Finally, the framework considers the policy implications of non-

state actors' involvement in CVE in Garissa, providing recommendations for

policymakers, practitioners, and non-state actors themselves to strengthen CVE

strategies and interventions in the region.

2.5 Empirical Review

The empirical review section of this study provides a comprehensive analysis of existing
research and empirical evidence related to the role of non-state actors in countering violent
extremism (CVE) in Garissa, Kenya. The review focuses on identifying key themes, trends,
and gaps in the literature, with the aim of informing the research methodology and
contributing to the broader understanding of CVE in Garissa.

i. Non-State Actors in CVE: Existing research emphasizes the crucial role played by
non-state actors, including community-based organizations (CBOs), civil society
organizations (CSOs), and religious institutions, in CVE efforts. These actors
often have deep-rooted connections within communities, enabling them to
effectively address the drivers of violent extremism at the local level.CVE
Strategies and Approaches: Studies highlight a range of strategies employed by
non-state actors in CVE, including community mobilization, education, and social
support programs. These initiatives aim to address underlying grievances and
vulnerabilities that may lead individuals to radicalize.

ii. Impact and Effectiveness: Research on the impact of non-state actors' CVE efforts
has shown mixed results. While some studies indicate positive outcomes, such as
increased community resilience and reduced support for violent extremism, others
point to challenges in measuring impact and assessing effectiveness in complex
environments.
iii. Challenges and Opportunities: Studies identify various challenges faced by non-
state actors in implementing CVE initiatives, including resource constraints,
security risks, and coordination issues. However, research also highlights
opportunities for enhancing non-state actors' CVE efforts, such as building
partnerships and leveraging local networks.

iv. Policy Implications: The empirical review underscores the need for evidence-
based policies and strategies to support the role of non-state actors in CVE.
Recommendations include increased support and resources, improved
coordination among stakeholders, and the development of context-specific
approaches informed by research and data.
2.6 Operational Review

Operational review section of this study provides a detailed examination of the practical aspects of
non-state actors' involvement in countering violent extremism (CVE) in Garissa, Kenya. This includes
an analysis of the strategies, activities, and challenges faced by non-state actors in their CVE efforts,
as well as an assessment of their operational effectiveness and impact on the ground.

i. Strategies and Activities: The review examines the specific strategies and activities
employed by non-state actors in CVE, such as community engagement, education and
awareness campaigns, capacity-building initiatives, and advocacy efforts. It analyzes how
these strategies are implemented, their objectives, and the target populations they aim to
reach.

ii. Partnerships and Collaborations: The review explores the partnerships and collaborations
that non-state actors engage in to enhance their CVE efforts. This includes partnerships
with government agencies, international organizations, local authorities, and other
stakeholders, as well as collaborations with communities and individuals affected by
violent extremism.

iii. Capacity and Resources: An assessment of the capacity and resources available to non-
state actors for CVE initiatives is conducted. This includes an analysis of funding sources,
staff expertise, logistical support, and other resources needed to implement effective CVE
programs.

iv. Monitoring and Evaluation: The review examines the monitoring and evaluation
mechanisms used by non-state actors to assess the effectiveness of their CVE activities.
This includes the use of indicators, data collection methods, and reporting mechanisms to
measure impact and adjust strategies as needed.

v. Challenges and Lessons Learned: An analysis of the challenges faced by non-state actors
in their CVE efforts is conducted, including security risks, resource constraints,
community dynamics, and other factors. Lessons learned from these challenges are also
highlighted to inform future CVE initiatives.

vi. Success Stories and Best Practices: The review identifies success stories and best
practices from non-state actors' CVE efforts in Garissa. This includes case studies and
examples of effective strategies that have led to positive outcomes in countering violent
extremism.
CHAPTER 3

RESEARCH METHODOLOGY

3.1 Introduction to Research Methods

In the section on research methods we outline the plans, techniques and strategies that

will be employed to carry out a study on how non-state actors combat extremism (CVE) in

Garissa, Kenya. This part is crucial as it sets the groundwork for collecting, analysing and

interpreting data to address the research inquiries and goals. The methodology will follow a

mixed methods approach blending quantitative methods to achieve a grasp of the subject.

3.2 Research Design

The combination of quantitative methods is ideal for this study as it allows for an

exploration of phenomena from various angles. Qualitative approaches like interviews and

content analysis will offer insights into the tactics, contributions and obstacles encountered

by state actors involved in CVE in Garissa. Quantitative techniques such as surveys will

complement these discoveries by offering evidence on the efficacy and influence of

interventions, by non-state actors. Through this integration of methods our study aims to

present a nuanced view of the role played by state actors.

3.3 Research Methodology

In this study a mixed methods approach is employed for the research design

incorporating both quantitative techniques. By using this method an investigation, into the

involvement of state actors in addressing violent extremism (CVE) in Garissa Kenya is made
possible. The qualitative aspect of the study entails conducting structured interviews with key

figures such as non-state actors, government representatives and CVE experts. These

interviews aim to offer insights into the strategies, contributions and obstacles encountered by

state actors in CVE efforts.

On the hand the quantitative part of the research involves distributing surveys to

community members and beneficiaries of CVE initiatives in Garissa. These surveys will

gather data on how the community perceives the effectiveness of state actors in preventing

and combatting violent extremism, as well as, on quantifiable outcomes resulting from CVE

programs. By utilizing this mixed method approach the study can cross reference information

gathered from sources and methodologies to strengthen the accuracy and dependability of its

findings.

3.4 Sampling Design

In this study we plan to use snowball sampling techniques. Purposive sampling will

help us select informants, with knowledge and experience in Countering Violent Extremism

(CVE) in the Garissa region. Snowball sampling will be employed to discover participants by

getting referrals from the interviewees. This approach allows us to gather insights from a

range of individuals with perspectives and experiences related to the efforts of non-state

actors in CVE.

3.5 Data Collection

Gather quantitative and qualitative data from surveys, interviews, focus group discussions,

and existing reports. Ensure representation from various non-state actors, community

members, and relevant stakeholders.


i. Quantitative Analysis

Utilize statistical methods to analyze quantitative data, such as survey responses. This may

involve descriptive statistics to summarize key variables, inferential statistics to identify

patterns or relationships, and comparative analyses to assess differences across groups.

ii. Qualitative Analysis

Employ qualitative analysis methods like thematic coding for in-depth examination of

interview transcripts, focus group discussions, and open-ended survey responses. Identify

recurring themes, patterns, and narratives related to the roles and impact of non-state actors.

iii. Contextual Analysis

Contextualize the data by considering the socio-economic, cultural, and political context of

Garissa. Analyze how these contextual factors influence the effectiveness of non-state actors

in countering violent extremism.

iv. Comparative Analysis

Compare the roles and impacts of different types of non-state actors, such as community-

based organizations, religious institutions, and NGOs. Identify variations in approaches and

outcomes across these entities.

v. Network Analysis

Conduct network analysis to understand the collaborations and interactions among non-state

actors. Map out the relationships and partnerships that contribute to the overall effectiveness

of counter-extremism efforts.
vi. Impact Assessment

Assess the impact of non-state actors' interventions by measuring changes in key indicators,

such as community resilience, rates of radicalization, and perceptions of security. Consider

both short-term and long-term outcomes.

vii. Challenges and Success Factors

Identify and analyze challenges faced by non-state actors in Garissa, such as resource

constraints, security issues, and cultural barriers. Also, explore success factors that contribute

to the effectiveness of their initiatives.

viii. Gender Analysis

Conduct a gender analysis to understand the differential impacts and roles of non-state actors

on men and women in countering violent extremism. Consider how gender dynamics

influence the success of interventions.

ix. Policy Implications

Draw insights from the data analysis to inform policy recommendations. Identify gaps,

strengths, and areas for improvement in the involvement of non-state actors and propose

actionable strategies for policymakers.

x. Ethical Considerations

Ensure adherence to ethical standards throughout the data analysis process, respecting the

confidentiality and privacy of participants. Consider the potential impact of the research on

the community and stakeholders involved.


3.6 Data Analysis

Data analysis for this study on the role of non-state actors in countering violent extremism (CVE) in
Garissa, Kenya, will involve both qualitative and quantitative approaches to provide a comprehensive
understanding of the research questions and objectives. The data analysis process will include the
following steps:
1. Qualitative Data Analysis
I. Thematic Analysis: Conduct thematic analysis of qualitative data collected from semi-
structured interviews and focus group discussions (FGDs). This involves identifying patterns,
themes, and categories within the data to understand the strategies, contributions, challenges,
and perceptions related to non-state actors' CVE efforts in Garissa.
II. Coding: Code the qualitative data to systematically organize and categorize responses. Use
both deductive coding (based on pre-defined themes from the research questions) and
inductive coding (emerging themes from the data) to capture a wide range of insights.
III. Data Interpretation: Interpret the coded data to draw conclusions and insights regarding the
role and effectiveness of non-state actors in CVE in Garissa. Identify commonalities,
differences, and trends across participants and groups.
2. Quantitative Data Analysis
Descriptive Statistics: Analyze quantitative data collected from surveys using descriptive statistics
such as frequencies, percentages, means, and standard deviations. This will provide a summary of
community perceptions of non-state actors' effectiveness in CVE and measurable outcomes of
CVE interventions.
Inferential Statistics: Depending on the research questions and objectives, conduct inferential
statistical analysis to examine relationships, differences, or associations between variables. This
may include chi-square tests, t-tests, or regression analysis to explore the factors influencing
community perceptions or the effectiveness of CVE initiatives.
3. Integration of Qualitative and Quantitative Findings
Integrate the qualitative and quantitative findings to provide a comprehensive understanding of
non-state actors' role in CVE in Garissa. Triangulate the data to validate and complement each
other, enhancing the validity and reliability of the results.
Compare and contrast qualitative themes with quantitative findings to identify convergent or
divergent patterns and insights.
Use mixed-methods interpretation techniques to draw robust conclusions and implications for
practice and policy
4. Ethical Considerations
Ensure that the data analysis process upholds ethical principles, including confidentiality,
anonymity, and respect for participants' rights.
Handle data securely and responsibly, following institutional guidelines and regulations for data
management and protection.
3.7 Inclusion Criteria

Participants eligible for this study are those engaged or knowledgeable about CVE

initiatives in Garissa. This encompasses state actors involved in implementing CVE programs

government officials handling CVE policies and implementation security personnel

participating in CVE operations and community members affected by or knowledgeable

about violent extremism in Garissa. Selection of participants will be based on their relevance

to the research inquiries and objectives guaranteeing a representation of perspectives and

experiences related to state actors’ endeavours in CVE, within Garissa.

3.8 Study Sample Selection

The selection of participants, in this research will involve a mix of snowball sampling

methods. Purposive sampling will be utilized to choose individuals with expertise in

countering violent extremism (CVE) within Garissa, Kenya. These key figures will consist of

representatives from governmental organizations government officials and CVE specialists

actively engaged in CVE initiatives in the area. By using sampling, the study aims to include

individuals who can offer insights into the involvement of non-governmental actors in CVE

efforts in Garissa.

3.9 Snowball Sampling Approach

To identify participants beyond the key informant’s snowball sampling will be

employed. This method is particularly beneficial for studies involving to reach populations or

those with target groups. In this study snowball sampling will facilitate the identification of

individuals and groups that may not be easily reached through sampling techniques ensuring
a spectrum of perspectives and experiences regarding non-governmental actors’ efforts

towards countering violent extremism, in Garissa.

The studies sample size will be determined by reaching data saturation, which means

collecting new data stops when no new information or themes emerge. Participants will

include those actively engaged in or knowledgeable, about CVE efforts in Garissa, such as

state actors, government officials, security personnel and community members. Selection will

be based on how relevant they’re to the research questions and objectives to ensure a broad

range of perspectives and experiences related to state actors CVE efforts, in Garissa are

captured.

3.1.1 Target Population

The target population for this study includes various groups and individuals involved in or affected by
countering violent extremism (CVE) efforts in Garissa, Kenya. They include: -
I. Non-State Actors: Community-based organizations (CBOs), civil society
organizations (CSOs), religious institutions, and other grassroots entities that are
actively engaged in CVE initiatives in Garissa.

II. Government Officials: Officials from the Ministry of Interior and Coordination of
National Government, Ministry of Education, Ministry of Health, and other relevant
government departments involved in CVE policy and implementation in Garissa.
III. Security Personnel: Members of the security forces, including the police, military,
and intelligence services, who are involved in CVE operations in Garissa.

IV. Community Members: Members of the community in Garissa who may have been
affected by or have knowledge of violent extremism in the region.

V. CVE Experts: Researchers, academics, and practitioners with expertise in CVE who
can provide insights and perspectives on non-state actors' role in CVE in Garissa.

VI. Beneficiaries of CVE Programs: Individuals and groups who have directly benefited
from CVE programs and interventions implemented by non-state actors in Garissa.

3.1.2 Instructions, for Gathering Data and Procedures

I. Interviews; We plan to conduct structured interviews with important

individuals, including representatives from non-governmental organizations

government officials and experts in countering violent extremism. These

interviews will be held either face to face or through video calls depending on

the participants availability and preferences. The questions asked during the

interviews will aim to gather insights into the approaches, contributions and

obstacles encountered by state entities involved in countering violent

extremism in Garissa.

II. Surveys; We intend to distribute surveys to community members and

beneficiaries of countering extremism programs in Garissa. These surveys will

focus on collecting data regarding how the community perceives the

effectiveness of state actors in preventing and combating violent extremism as

well as assessing the tangible outcomes of countering violent extremism

initiatives. The surveys will be shared electronically or in print form based on

the accessibility of the target population.


III. Content Analysis; A thorough analysis of documents such as reports, policy

papers and media pieces will be carried out to complement the quantitative

data obtained from interviews and surveys. This content analysis process will

involve categorizing and examining the content of these documents to identify

themes and trends related to efforts by non-state actors in countering violent

extremism, in Garissa.

IV. Data Management; The data gathered from interviews, surveys and content

analysis will be carefully handled using tools and software, for data

management. We will ensure that all information is securely stored and

accessible to authorized individuals involved in the research. To safeguard

participants confidentiality data will be. Any identifying details will be

removed from transcripts and survey responses.

V. Ethical Considerations; Upholding ethical standards is essential throughout

the process of collecting data. Prior consent will be obtained from all

participants assuring them of their privacy and anonymity. Participants will

have the freedom to withdraw from the study at any point, without facing any

repercussions. The research will comply with guidelines and procedures

established by the institutional review boards.

VI. The data gathered from interviews, surveys and content analysis will undergo

a mixed methods approach to gain an understanding of how non-state actors

contribute to countering extremism (CVE), in Garissa, Kenya. The analysis

will focus on the research questions and study objectives aiming to uncover

themes, patterns and insights regarding the strategies, contributions and

obstacles faced by state actors in CVE.


VII. Qualitative Analysis; The qualitative data obtained from interviews and

content analysis will be thematically analysed. This process entails identifying

patterns, themes and categories within the data to offer an understanding of the

role played by state actors in CVE. Thematic analysis involves coding the data

organizing it into themes and interpreting the results to derive conclusions and

insights.

VIII. Quantitative Analysis; The quantitative data collected through surveys will

be analysed using statistics. This analysis will summarize survey responses

using metrics like frequencies, percentages and averages. It aims to provide

insights into community perceptions of the effectiveness of state actors in

CVE as well, as measurable outcomes of CVE interventions.

IX. Analysing Quantitative Data; We will examine the numbers gathered from

surveys by using statistics. This process entails summarizing the survey

responses through metrics, like frequencies, percentages and averages. By

conducting analysis, we aim to present insights into how the community

perceives the effectiveness of non-state actors in CVE and the tangible results

of CVE interventions.

X. Blending Qualitative and Quantitative Discoveries; To gain an

understanding of state actors’ role in CVE in Garissa we will combine

qualitative and quantitative findings. These two sets of data will be cross

referenced to validate and complement each other enhancing the credibility

and dependability of our conclusions. This holistic approach will empower us

to formulate insights and offer advice, for policymakers, practitioners and non-

state actors engaged in CVE initiatives.


3.1.3 Research limitations

I. Sample bias: The possibility of sample bias is one of the study's limitations.

The sample obtained by the use of purposive and snowball sampling

approaches could not be entirely representative of the population of interest.

Key informants who choose to participate, for instance, could have distinct

viewpoints or experiences from those who do not. In a similar vein,

community members who reply to the polls could hold distinct opinions from

those who don't. Efforts will be made to guarantee a varied sample and

interpret the results in the context of the sampling strategy in order to lessen

this constraint.

II. Funding and time restrictions are just two examples of the resource limits that

affect this project. The six-month duration of the research may restrict the

breadth and depth of the data collecting and analysis. Furthermore, the

$10,000 research funding can make it more difficult to reach a large number of

individuals or undertake in-depth fieldwork. In order to overcome this

constraint, the study will give priority to important participants and, when

feasible, employ low-cost techniques for gathering data, such online

questionnaires and virtual interviews.

III. Contextual elements: Lastly, the limitations of this study include the

contextual elements that might affect the results. Kenya's Garissa is a vibrant,

multifaceted place with distinct socio-political and cultural characteristics.

These variables might affect non-state actors' tactics, contributions, and

difficulties in battling violent extremism. Although these contextual elements

will be taken into consideration during the data collecting and analysis
process, it is possible that the results may be unique to the Garissa

environment and not entirely transferable to other contexts.

IV. Difficulties in Data collecting: Another drawback is the possibility of

difficulties in data collecting. There have been security issues in Garissa,

which might make it more difficult to reach some regions or people while

gathering data. Furthermore, the COVID-19 epidemic could make it

logistically difficult to conduct surveys or in-person interviews. The

representativeness and completeness of the data gathered for the study may be

impacted by these difficulties.

V. Restricted Scope: The study's focus is on the non-state actors' contribution to

the fight against violent extremism; it may not address all pertinent variables

or viewpoints about CVE in Garissa. For instance, it's possible that the study

skimped on discussing how international organizations and government

players fit into CVE initiatives. Furthermore, the study's emphasis on non-

state actors may have obscured other significant elements influencing the

spread of violent extremism in the area.

3.1.4 Validity test

A validity test evaluates how well a study measures what it aims to measure. In your

research, on the involvement of state actors in addressing violent extremism (CVE) in

Garissa, Kenya you can use various validity tests to ensure the accuracy of your findings;

I. Content Validity; This test ensures that your research adequately covers all

aspects of the phenomenon under study. To check content validity experts in

CVE and non-actors can review your research tools (interview questions,
survey items) to ensure they fully capture the role of non-state actors in CVE

in Garissa.

II. Construct Validity; This test evaluates whether the concepts and theories

being studied are accurately reflected in the research. In your study construct

validity can be verified by assessing whether the strategies, contributions and

challenges identified align with existing theories and concepts related to CVE

and state actors.

III. Internal Validity; This aspect examines how well the study design and

methods avoid biases and accurately represent relationships between variables.

To assess validity methods, like control groups, random assignment or

statistical techniques can be used to minimize the impact of confounding

variables.

IV. External validity refers to how the findings of a study can be applied to

populations or situations. Since this study focuses on Garissa specifically its

external validity may have some limitations. To improve validity, it would be

helpful to offer, in depth explanations of the context and research methods for

comparisons, with similar situations.

V. Conclusion Validity: This refers to the assessment of whether the inferences

made from the data are corroborated by the evidence gathered. You can utilize

member checking, in which participants examine the findings for accuracy,

peer debriefing, or various data sources (triangulation) to test for conclusion

validity (where other researchers assess the study and conclusions).


3.1.5 Reliability test

In a study a reliability test gauges how consistent and stable the measurements or data

gathered are. When researching the involvement of state actors, in countering violent

extremism (CVE) in Garissa, Kenya various reliability tests can be used to ensure the

accuracy of your results;

1. Internal Consistency Reliability; This test examines how well different items or

questions within the measurement tool (like a survey) yield outcomes. Cronbach’s alpha

coefficient can be employed to assess consistency reliability. It's important to see correlation

among items meant to measure the concept (e.g. effectiveness of non-state actors in CVE).

2. Test Retest Reliability; This type of reliability evaluates how consistent

measurements remain over time. One approach for your study could involve administering

survey questions or interviews to a subset of participants at two time points and analysing the

correlation between their responses. A strong correlation indicates consistent measures over

time.

3. Inter Ratter Reliability; This form of reliability scrutinizes the agreement among

ratters or observers when making ratings or judgments. If multiple researchers are coding

data or scoring responses you can determine ratter reliability using methods, like Cohens

kappa coefficient or intra class correlation. There is reliability, in coding or scoring when

ratters show a level of agreement.

Comparing the reliability of measurement instruments can be done through two

methods; forms reliability and split half reliability. Parallel forms reliability involves

comparing two versions of an instrument that evaluate the thing like using two survey

questionnaires, with similar content but presented differently. On the hand split half
reliability splits an instrument into halves to assess consistency by comparing scores from

each half using methods, like the Spearman Brown formula or Pearson correlation.

3.1.6 Research ethics

Research ethics pertain to the principles and guidelines that oversee research

involving subjects. When conducting your study, on how non-state actors combat extremism

in Garissa, Kenya it is crucial to uphold standards to safeguard the rights, dignity and welfare

of the individuals and communities involved. Here are some important ethical considerations

to consider;

I. Informed Consent; Make sure all participants are fully informed about the

studies purpose, risks, benefits and nature before agreeing to participate.

Provide consent forms outlining these aspects. Ensure participants have the

freedom to withdraw from the study at any point without facing any

repercussions.

II. Confidentiality; Safeguard participants confidentiality by anonymizing their

data and ensuring their information remains undisclosed without their

permission. Use codes or pseudonyms of names in reports or publications to

maintain confidentiality.

III. Privacy; Respect participants privacy by conducting interviews or surveys, in

private settings where they feel at ease discussing sensitive topics related to

violent extremism. Avoid collecting details and guarantee that data storage

and transmission methods are secure to prevent unauthorized access.

Minimizing Harm; Make sure to reduce any harm or discomfort, for

participants especially when talking about events linked to violent extremism.


Offer support resources. Suggest counselling services, for those who might

need help.

IV. Respecting Cultural Sensitivities; It's important to understand and honour

the traditions, beliefs and customs of the Garissa communities. Consulting

with community leaders and stakeholders can help ensure that the research is

carried out in a respectful and suitable manner.

V. Promoting Goodness; Make sure that the research contributes positively to

the wellbeing of both participants and the wider community by generating

insights that can support efforts to counter extremism (CVE) and foster peace,

security and social unity, in Garissa.

VI. Openness; Share openly about the purpose, approaches and potential impacts

of the research with all parties, including participants, community leaders and

relevant authorities. Provide truthful information about what the study aims to

achieve how it will be conducted and what results are expected.

VII. By considering these aspects in your study on how non-state actors influence

CVE, in Garissa you can conduct research that's considerate, ethical and

beneficial for everyone involved while maintaining high standards of honesty

and professionalism.

You might also like