Professional Documents
Culture Documents
This is my original work and has not been presented for examination in any of the
academic university. Referenced works duly acknowledged have complemented the
Proposal.
REG.NO.BIR-1-5266-3/2022
Signature………………………………………..Date……………………………….
ACKNOWLEDGEMENT
TABLE OF CONTENT
Table of Contents
DECLARATION.....................................................................................................................................2
ACKNOWLEDGEMENT.......................................................................................................................3
ABSRTACT.............................................................................................................................................4
ACRONYMS...........................................................................................................................................5
TABLE OF CONTENT...........................................................................................................................6
CHAPTER 1............................................................................................................................................8
INTRODUCTION...................................................................................................................................8
1.1 Background of the study..............................................................................................................8
1.2 Statement of the research problem.....................................................................................................9
1.3 Research objectives................................................................................................................10
Main objective...................................................................................................................................10
Specific objectives.............................................................................................................................10
1.4 Research Questions..........................................................................................................................12
1.5 Justification of the proposal study...................................................................................................13
1. Justification for Policy.......................................................................................................................13
2. Academic Justification.......................................................................................................................13
1.6 Research Approach..........................................................................................................................14
1.7 Study Constraints.............................................................................................................................15
1.8 Scope of the Proposed Study...........................................................................................................15
1.9 Operational Definition of Key Concepts.........................................................................................16
CHAPTER TWO...................................................................................................................................18
LITRATURE REVIEW.........................................................................................................................18
2.1 Introduction, to the Literature Review.............................................................................................18
2.1.1The involvement of Non-State Actors, in Countering Violent Extremism...................................18
2.1.2 Obstacles and Opportunities.........................................................................................................18
2.1.3 Exploring Perspectives.........................................................................................................19
2.2 Theoretical Framework................................................................................................................19
1.Social Movement Theory....................................................................................................................20
2.3 Research Findings............................................................................................................................21
Reviewing Operations............................................................................................................................21
2.4 Conceptual Framework................................................................................................................22
2.5 Empirical Review........................................................................................................................23
2.6 Operational Review.........................................................................................................................25
CHAPTER 3..........................................................................................................................................26
RESEARCH METHODOLOGY..........................................................................................................26
3.1 Introduction to Research Methods...................................................................................................26
3.2 Research Design..............................................................................................................................26
3.3 Research Methodology....................................................................................................................26
3.4 Sampling Design..............................................................................................................................27
3.5 Data Collection................................................................................................................................27
3.6 Data Analysis...................................................................................................................................30
3.7 Inclusion Criteria.............................................................................................................................31
3.8 Study Sample Selection...................................................................................................................31
3.9 Snowball Sampling Approach.....................................................................................................31
3.1.1 Target Population......................................................................................................................32
3.1.2 Instructions, for Gathering Data and Procedures..........................................................................33
3.1.3 Research limitations......................................................................................................................36
3.1.4 Validity test...................................................................................................................................37
3.1.5 Reliability test...............................................................................................................................39
3.1.6 Research ethics.............................................................................................................................40
CHAPTER 1
INTRODUCTION
eastern Kenya. The area has been facing issues, with extremism. Its close proximity to the
border, with Somalia has left it susceptible to the influence of extremist groups, including Al-
Shabaab. Over the years, Garissa has experienced many incidents of violence, including
terrorist attacks, recruitment of youth by extremist groups, and the spread of radical
ideologies.
security personnel and global allies have taken steps to address terrorism. Yet the impact of
these actions has been. The persistence of violence remains a major concern, for the area’s
Not much focus has been given in studies, to how non-state actors contribute to
religious leaders, and civil society groups, play a crucial role in shaping community resilience
and countering extremist narratives. They have ties, within the community and a deep
It's crucial to grasp the responsibilities and tactics utilized by non-state entities in
combating violent extremism, in Garissa to enhance the development of better and lasting
counterterrorism measures and actions. By leveraging the strengths of these actors and
supporting their efforts, policymakers and practitioners can enhance the resilience of
where acts of violence carried out by extremist groups have had severe impacts on local
institutions and civil society groups have become players in addressing extremism efforts.
Despite their increasing participation there remains a lack of understanding regarding the
The core research issue addressed in this study revolves around the necessity to bridge
this knowledge gap by examining the involvement of state actors in countering violent
extremism in Garissa. This includes delving into the motivations that drive these entities the
tactics they employ and the obstacles they encounter while working to combat extremism.
Furthermore, it is essential to evaluate how effective these non-state actors are at preventing
and countering extremism in Garissa and identify practices that can guide future initiatives
This research problem holds significance for reasons. Firstly, comprehending the roles
played by state actors is essential for crafting more efficient and enduring strategies to
policymakers, professionals and local leaders can enhance their assistance. Utilize their
Through capturing the experiences and approaches of governmental entities this study has the
To wrap things up the main focus of this study is to explore how non-governmental
entities are involved in combating extremism, in Garissa, Kenya. The aim is to understand
their contributions, tactics and obstacles. Delving into this issue is crucial for shaping policies
and actions against violent extremism in Garissa as well as for enhancing our academic
Main objective
This research aims to delve into the role of state actors in countering violent
Specific objectives
Identifying the state actors engaged in CVE initiatives in Garissa, such as
organizations.
Exploring the duties and roles of these state actors in CVE efforts, including
building projects.
Garissa that can guide upcoming initiatives, in the area and globally.
findings. These goals will shape the research process and aid in developing an
2) How do non-state actors in Garissa approach their CVE efforts? Adjust their
strategies based on the threats of violent extremism and the local situation?
success?
6) What role do religious establishments like mosques and religious leaders play
8) What can we gather from the experiences of groups, outside the government
Garissa, Kenya. The region has witnessed acts of violence carried out by factions resulting in
loss of life displacement of communities and a pervasive sense of insecurity among residents.
In response to this menace both the Kenyan government and international bodies have
implemented CVE programs. Nonetheless there exists a necessity for a understanding of the
This study holds significance for guiding policy decisions concerning CVE activities,
actors’ policymakers can offer improved support and enhance the efficiency of their CVE
endeavours.
The results of this research could also assist in pinpointing deficiencies, in policies
and initiatives guiding the creation of focused and enduring strategies to combat violent
2. Academic Justification
From a standpoint this study holds importance for reasons. Primarily it adds to the
expanding collection of works on countering extremism by presenting real world data on the
Key Areas of Focus; The study will delve into the following topics;
Examining the tactics and methods utilized by state actors to combat violent
extremism.
community interactions.
This study will utilize a mixed methods strategy incorporating both quantitative
methodologies. Qualitative data will be gathered through interviews with figures such as
representatives from state entities government officials and experts on countering violent
Potential limitations may arise due to restricted access, to locations or individuals well
as issues related to data availability and reliability. Steps will be taken to address these
The scope of the proposed study on the role of non-state actors in countering violent
i. Geographical Scope: The study will focus specifically on Garissa County in Kenya,
considering the unique socio-political, cultural, and security dynamics of the region.
ii. Non-State Actors: The study will examine the role of various non-state actors,
(CSOs), religious institutions, and other grassroots entities, in CVE efforts in Garissa.
iii. CVE Strategies: The study will analyze the strategies and approaches employed by
iv. Challenges and Opportunities: The study will explore the challenges faced by non-
state actors in CVE, such as resource constraints, security risks, and coordination
vii. Comparative Analysis: While the primary focus is on Garissa, the study may also
include a comparative analysis with other regions or countries facing similar CVE
organizations that are not part of the government or state apparatus. This
(CSOs), religious institutions, and other grassroots entities that are actively
ii. Countering Violent Extremism (CVE): CVE refers to a range of strategies and
iii. Role: The role of non-state actors in CVE refers to the contributions,
environment in Garissa.
actors' CVE efforts. This includes how community members perceive the
effectiveness, relevance, and impact of these efforts on their daily lives and
LITRATURE REVIEW
institutions and societies globally given the threats posed by violent extremist factions to
stability, safety and progress. In light of this issue there has been a growing acknowledgment
of the importance of engaging governmental entities, like grassroots organizations and faith-
based establishments.
Non-actors play a crucial and diverse role in countering violent extremism (CVE)
enabling them to tailor their initiatives effectively to address the underlying causes of violent
extremism. The flexibility of state actors allows them to operate in areas and interact with
Although non-state actors can contribute significantly to CVE efforts they encounter
obstacles such as resources, capacity limitations, security threats and at times lack of
acknowledgment or support from governmental bodies. Despite these hurdles non-state actors
have showcased resilience and creativity in their CVE endeavours by utilizing expertise,
networks and cultural insights to develop interventions for specific contexts. By recognizing
and tackling these obstacles collectively policymakers, practitioners and scholars can better.
The theoretical review delves into viewpoints on violent extremism and the
The social identity theory is a concept that suggests people’s identities are influenced
by the groups they belong to and violent extremism can stem from feelings of grievance or
injustice, within these groups. Non-state entities can help prevent radicalization and violence
Another important concept to consider is the theory of change which highlights the
significance of identifying the root causes of extremism and creating interventions to tackle
engaging with communities fostering trust and presenting narratives to challenge beliefs.
The theoretical framework for this research is centred around the notion that non-
activities such as community involvement, education and advocacy. The framework outlines
elements that shape the effectiveness of state actors in CVE efforts, including their
credibility, resources and partnerships. It also considers factors like dynamics and socio-
economic contexts that influence how non-state actors implement their CVE strategies.
1.Social Movement Theory
This theory explores how non-state actors, particularly grassroots movements and community
organizations, mobilize collective action to counter violent extremism. It emphasizes the role
2. Network Theory:
Examining non-state actors through the lens of network theory helps understand the
and collaborative efforts among non-state actors in Garissa to create a more resilient network
Non-state actors, including NGOs and religious institutions, operate within the civil
society realm and contribute to governance processes. Theoretical frameworks related to civil
society and governance help analyse how these actors influence policy, engage with local
extremism.
4. Cultural Criminology:
Cultural criminology offers insights into how non-state actors address the cultural
dimensions of violent extremism in Garissa. This includes understanding how cultural factors
contribute to radicalization and how non-state actors intervene through cultural initiatives,
This theory focuses on transforming the root causes of conflicts, including violent
Studies examining the role of state actors in CVE offer valuable insights into their
contribution’s obstacles encountered and overall impact. These studies demonstrate that non-
state actors play a role in preventing and addressing extremism by fostering trust and
Reviewing Operations
The operational assessment is centred on the hands-on elements of state actors’ efforts
in countering violent extremism (CVE) encompassing their aims, tactics and results. It delves
into how non-state actors pinpoint and rank CVE goals as how they put their plans into
action, in real world scenarios. This evaluation offers an insight into the facets of non-state
actors CVE endeavours highlighting effective approaches and valuable insights that can
Conceptual framework for the study on the role of non-state actors in countering violent
i. Context: The framework recognizes the unique socio-political, cultural, and security
to violent extremism. This context shapes the dynamics of CVE efforts and the role
ii. Non-State Actors: At the center of the framework are non-state actors, including
religious institutions, and other grassroots entities. These actors are key stakeholders
in CVE, often possessing unique insights, networks, and capabilities that complement
government-led efforts.
iii. CVE Strategies: Non-state actors employ a range of strategies and approaches to
aimed at addressing the root causes of violent extremism and building community
resilience.
iv. Impact and Effectiveness: The framework considers the impact and effectiveness of
non-state actors' CVE efforts, including their ability to reduce the appeal of violent
security risks, and coordination issues. It also identifies opportunities for non-state
actors to enhance their CVE efforts, such as community support, partnerships, and
innovative approaches.
vi. Policy Implications: Finally, the framework considers the policy implications of non-
The empirical review section of this study provides a comprehensive analysis of existing
research and empirical evidence related to the role of non-state actors in countering violent
extremism (CVE) in Garissa, Kenya. The review focuses on identifying key themes, trends,
and gaps in the literature, with the aim of informing the research methodology and
contributing to the broader understanding of CVE in Garissa.
i. Non-State Actors in CVE: Existing research emphasizes the crucial role played by
non-state actors, including community-based organizations (CBOs), civil society
organizations (CSOs), and religious institutions, in CVE efforts. These actors
often have deep-rooted connections within communities, enabling them to
effectively address the drivers of violent extremism at the local level.CVE
Strategies and Approaches: Studies highlight a range of strategies employed by
non-state actors in CVE, including community mobilization, education, and social
support programs. These initiatives aim to address underlying grievances and
vulnerabilities that may lead individuals to radicalize.
ii. Impact and Effectiveness: Research on the impact of non-state actors' CVE efforts
has shown mixed results. While some studies indicate positive outcomes, such as
increased community resilience and reduced support for violent extremism, others
point to challenges in measuring impact and assessing effectiveness in complex
environments.
iii. Challenges and Opportunities: Studies identify various challenges faced by non-
state actors in implementing CVE initiatives, including resource constraints,
security risks, and coordination issues. However, research also highlights
opportunities for enhancing non-state actors' CVE efforts, such as building
partnerships and leveraging local networks.
iv. Policy Implications: The empirical review underscores the need for evidence-
based policies and strategies to support the role of non-state actors in CVE.
Recommendations include increased support and resources, improved
coordination among stakeholders, and the development of context-specific
approaches informed by research and data.
2.6 Operational Review
Operational review section of this study provides a detailed examination of the practical aspects of
non-state actors' involvement in countering violent extremism (CVE) in Garissa, Kenya. This includes
an analysis of the strategies, activities, and challenges faced by non-state actors in their CVE efforts,
as well as an assessment of their operational effectiveness and impact on the ground.
i. Strategies and Activities: The review examines the specific strategies and activities
employed by non-state actors in CVE, such as community engagement, education and
awareness campaigns, capacity-building initiatives, and advocacy efforts. It analyzes how
these strategies are implemented, their objectives, and the target populations they aim to
reach.
ii. Partnerships and Collaborations: The review explores the partnerships and collaborations
that non-state actors engage in to enhance their CVE efforts. This includes partnerships
with government agencies, international organizations, local authorities, and other
stakeholders, as well as collaborations with communities and individuals affected by
violent extremism.
iii. Capacity and Resources: An assessment of the capacity and resources available to non-
state actors for CVE initiatives is conducted. This includes an analysis of funding sources,
staff expertise, logistical support, and other resources needed to implement effective CVE
programs.
iv. Monitoring and Evaluation: The review examines the monitoring and evaluation
mechanisms used by non-state actors to assess the effectiveness of their CVE activities.
This includes the use of indicators, data collection methods, and reporting mechanisms to
measure impact and adjust strategies as needed.
v. Challenges and Lessons Learned: An analysis of the challenges faced by non-state actors
in their CVE efforts is conducted, including security risks, resource constraints,
community dynamics, and other factors. Lessons learned from these challenges are also
highlighted to inform future CVE initiatives.
vi. Success Stories and Best Practices: The review identifies success stories and best
practices from non-state actors' CVE efforts in Garissa. This includes case studies and
examples of effective strategies that have led to positive outcomes in countering violent
extremism.
CHAPTER 3
RESEARCH METHODOLOGY
In the section on research methods we outline the plans, techniques and strategies that
will be employed to carry out a study on how non-state actors combat extremism (CVE) in
Garissa, Kenya. This part is crucial as it sets the groundwork for collecting, analysing and
interpreting data to address the research inquiries and goals. The methodology will follow a
mixed methods approach blending quantitative methods to achieve a grasp of the subject.
The combination of quantitative methods is ideal for this study as it allows for an
exploration of phenomena from various angles. Qualitative approaches like interviews and
content analysis will offer insights into the tactics, contributions and obstacles encountered
by state actors involved in CVE in Garissa. Quantitative techniques such as surveys will
interventions, by non-state actors. Through this integration of methods our study aims to
In this study a mixed methods approach is employed for the research design
incorporating both quantitative techniques. By using this method an investigation, into the
involvement of state actors in addressing violent extremism (CVE) in Garissa Kenya is made
possible. The qualitative aspect of the study entails conducting structured interviews with key
figures such as non-state actors, government representatives and CVE experts. These
interviews aim to offer insights into the strategies, contributions and obstacles encountered by
On the hand the quantitative part of the research involves distributing surveys to
community members and beneficiaries of CVE initiatives in Garissa. These surveys will
gather data on how the community perceives the effectiveness of state actors in preventing
and combatting violent extremism, as well as, on quantifiable outcomes resulting from CVE
programs. By utilizing this mixed method approach the study can cross reference information
gathered from sources and methodologies to strengthen the accuracy and dependability of its
findings.
In this study we plan to use snowball sampling techniques. Purposive sampling will
help us select informants, with knowledge and experience in Countering Violent Extremism
(CVE) in the Garissa region. Snowball sampling will be employed to discover participants by
getting referrals from the interviewees. This approach allows us to gather insights from a
range of individuals with perspectives and experiences related to the efforts of non-state
actors in CVE.
Gather quantitative and qualitative data from surveys, interviews, focus group discussions,
and existing reports. Ensure representation from various non-state actors, community
Utilize statistical methods to analyze quantitative data, such as survey responses. This may
Employ qualitative analysis methods like thematic coding for in-depth examination of
interview transcripts, focus group discussions, and open-ended survey responses. Identify
recurring themes, patterns, and narratives related to the roles and impact of non-state actors.
Contextualize the data by considering the socio-economic, cultural, and political context of
Garissa. Analyze how these contextual factors influence the effectiveness of non-state actors
Compare the roles and impacts of different types of non-state actors, such as community-
based organizations, religious institutions, and NGOs. Identify variations in approaches and
v. Network Analysis
Conduct network analysis to understand the collaborations and interactions among non-state
actors. Map out the relationships and partnerships that contribute to the overall effectiveness
of counter-extremism efforts.
vi. Impact Assessment
Assess the impact of non-state actors' interventions by measuring changes in key indicators,
Identify and analyze challenges faced by non-state actors in Garissa, such as resource
constraints, security issues, and cultural barriers. Also, explore success factors that contribute
Conduct a gender analysis to understand the differential impacts and roles of non-state actors
on men and women in countering violent extremism. Consider how gender dynamics
Draw insights from the data analysis to inform policy recommendations. Identify gaps,
strengths, and areas for improvement in the involvement of non-state actors and propose
x. Ethical Considerations
Ensure adherence to ethical standards throughout the data analysis process, respecting the
confidentiality and privacy of participants. Consider the potential impact of the research on
Data analysis for this study on the role of non-state actors in countering violent extremism (CVE) in
Garissa, Kenya, will involve both qualitative and quantitative approaches to provide a comprehensive
understanding of the research questions and objectives. The data analysis process will include the
following steps:
1. Qualitative Data Analysis
I. Thematic Analysis: Conduct thematic analysis of qualitative data collected from semi-
structured interviews and focus group discussions (FGDs). This involves identifying patterns,
themes, and categories within the data to understand the strategies, contributions, challenges,
and perceptions related to non-state actors' CVE efforts in Garissa.
II. Coding: Code the qualitative data to systematically organize and categorize responses. Use
both deductive coding (based on pre-defined themes from the research questions) and
inductive coding (emerging themes from the data) to capture a wide range of insights.
III. Data Interpretation: Interpret the coded data to draw conclusions and insights regarding the
role and effectiveness of non-state actors in CVE in Garissa. Identify commonalities,
differences, and trends across participants and groups.
2. Quantitative Data Analysis
Descriptive Statistics: Analyze quantitative data collected from surveys using descriptive statistics
such as frequencies, percentages, means, and standard deviations. This will provide a summary of
community perceptions of non-state actors' effectiveness in CVE and measurable outcomes of
CVE interventions.
Inferential Statistics: Depending on the research questions and objectives, conduct inferential
statistical analysis to examine relationships, differences, or associations between variables. This
may include chi-square tests, t-tests, or regression analysis to explore the factors influencing
community perceptions or the effectiveness of CVE initiatives.
3. Integration of Qualitative and Quantitative Findings
Integrate the qualitative and quantitative findings to provide a comprehensive understanding of
non-state actors' role in CVE in Garissa. Triangulate the data to validate and complement each
other, enhancing the validity and reliability of the results.
Compare and contrast qualitative themes with quantitative findings to identify convergent or
divergent patterns and insights.
Use mixed-methods interpretation techniques to draw robust conclusions and implications for
practice and policy
4. Ethical Considerations
Ensure that the data analysis process upholds ethical principles, including confidentiality,
anonymity, and respect for participants' rights.
Handle data securely and responsibly, following institutional guidelines and regulations for data
management and protection.
3.7 Inclusion Criteria
Participants eligible for this study are those engaged or knowledgeable about CVE
initiatives in Garissa. This encompasses state actors involved in implementing CVE programs
about violent extremism in Garissa. Selection of participants will be based on their relevance
The selection of participants, in this research will involve a mix of snowball sampling
countering violent extremism (CVE) within Garissa, Kenya. These key figures will consist of
actively engaged in CVE initiatives in the area. By using sampling, the study aims to include
individuals who can offer insights into the involvement of non-governmental actors in CVE
efforts in Garissa.
employed. This method is particularly beneficial for studies involving to reach populations or
those with target groups. In this study snowball sampling will facilitate the identification of
individuals and groups that may not be easily reached through sampling techniques ensuring
a spectrum of perspectives and experiences regarding non-governmental actors’ efforts
The studies sample size will be determined by reaching data saturation, which means
collecting new data stops when no new information or themes emerge. Participants will
include those actively engaged in or knowledgeable, about CVE efforts in Garissa, such as
state actors, government officials, security personnel and community members. Selection will
be based on how relevant they’re to the research questions and objectives to ensure a broad
range of perspectives and experiences related to state actors CVE efforts, in Garissa are
captured.
The target population for this study includes various groups and individuals involved in or affected by
countering violent extremism (CVE) efforts in Garissa, Kenya. They include: -
I. Non-State Actors: Community-based organizations (CBOs), civil society
organizations (CSOs), religious institutions, and other grassroots entities that are
actively engaged in CVE initiatives in Garissa.
II. Government Officials: Officials from the Ministry of Interior and Coordination of
National Government, Ministry of Education, Ministry of Health, and other relevant
government departments involved in CVE policy and implementation in Garissa.
III. Security Personnel: Members of the security forces, including the police, military,
and intelligence services, who are involved in CVE operations in Garissa.
IV. Community Members: Members of the community in Garissa who may have been
affected by or have knowledge of violent extremism in the region.
V. CVE Experts: Researchers, academics, and practitioners with expertise in CVE who
can provide insights and perspectives on non-state actors' role in CVE in Garissa.
VI. Beneficiaries of CVE Programs: Individuals and groups who have directly benefited
from CVE programs and interventions implemented by non-state actors in Garissa.
interviews will be held either face to face or through video calls depending on
the participants availability and preferences. The questions asked during the
interviews will aim to gather insights into the approaches, contributions and
extremism in Garissa.
papers and media pieces will be carried out to complement the quantitative
data obtained from interviews and surveys. This content analysis process will
extremism, in Garissa.
IV. Data Management; The data gathered from interviews, surveys and content
analysis will be carefully handled using tools and software, for data
the process of collecting data. Prior consent will be obtained from all
have the freedom to withdraw from the study at any point, without facing any
VI. The data gathered from interviews, surveys and content analysis will undergo
will focus on the research questions and study objectives aiming to uncover
patterns, themes and categories within the data to offer an understanding of the
role played by state actors in CVE. Thematic analysis involves coding the data
organizing it into themes and interpreting the results to derive conclusions and
insights.
VIII. Quantitative Analysis; The quantitative data collected through surveys will
IX. Analysing Quantitative Data; We will examine the numbers gathered from
perceives the effectiveness of non-state actors in CVE and the tangible results
of CVE interventions.
qualitative and quantitative findings. These two sets of data will be cross
to formulate insights and offer advice, for policymakers, practitioners and non-
I. Sample bias: The possibility of sample bias is one of the study's limitations.
Key informants who choose to participate, for instance, could have distinct
community members who reply to the polls could hold distinct opinions from
those who don't. Efforts will be made to guarantee a varied sample and
interpret the results in the context of the sampling strategy in order to lessen
this constraint.
II. Funding and time restrictions are just two examples of the resource limits that
affect this project. The six-month duration of the research may restrict the
breadth and depth of the data collecting and analysis. Furthermore, the
$10,000 research funding can make it more difficult to reach a large number of
constraint, the study will give priority to important participants and, when
III. Contextual elements: Lastly, the limitations of this study include the
contextual elements that might affect the results. Kenya's Garissa is a vibrant,
will be taken into consideration during the data collecting and analysis
process, it is possible that the results may be unique to the Garissa
which might make it more difficult to reach some regions or people while
representativeness and completeness of the data gathered for the study may be
the fight against violent extremism; it may not address all pertinent variables
or viewpoints about CVE in Garissa. For instance, it's possible that the study
players fit into CVE initiatives. Furthermore, the study's emphasis on non-
state actors may have obscured other significant elements influencing the
A validity test evaluates how well a study measures what it aims to measure. In your
Garissa, Kenya you can use various validity tests to ensure the accuracy of your findings;
I. Content Validity; This test ensures that your research adequately covers all
CVE and non-actors can review your research tools (interview questions,
survey items) to ensure they fully capture the role of non-state actors in CVE
in Garissa.
II. Construct Validity; This test evaluates whether the concepts and theories
being studied are accurately reflected in the research. In your study construct
challenges identified align with existing theories and concepts related to CVE
III. Internal Validity; This aspect examines how well the study design and
variables.
IV. External validity refers to how the findings of a study can be applied to
helpful to offer, in depth explanations of the context and research methods for
made from the data are corroborated by the evidence gathered. You can utilize
In a study a reliability test gauges how consistent and stable the measurements or data
gathered are. When researching the involvement of state actors, in countering violent
extremism (CVE) in Garissa, Kenya various reliability tests can be used to ensure the
1. Internal Consistency Reliability; This test examines how well different items or
questions within the measurement tool (like a survey) yield outcomes. Cronbach’s alpha
coefficient can be employed to assess consistency reliability. It's important to see correlation
among items meant to measure the concept (e.g. effectiveness of non-state actors in CVE).
measurements remain over time. One approach for your study could involve administering
survey questions or interviews to a subset of participants at two time points and analysing the
correlation between their responses. A strong correlation indicates consistent measures over
time.
3. Inter Ratter Reliability; This form of reliability scrutinizes the agreement among
ratters or observers when making ratings or judgments. If multiple researchers are coding
data or scoring responses you can determine ratter reliability using methods, like Cohens
kappa coefficient or intra class correlation. There is reliability, in coding or scoring when
methods; forms reliability and split half reliability. Parallel forms reliability involves
comparing two versions of an instrument that evaluate the thing like using two survey
questionnaires, with similar content but presented differently. On the hand split half
reliability splits an instrument into halves to assess consistency by comparing scores from
each half using methods, like the Spearman Brown formula or Pearson correlation.
Research ethics pertain to the principles and guidelines that oversee research
involving subjects. When conducting your study, on how non-state actors combat extremism
in Garissa, Kenya it is crucial to uphold standards to safeguard the rights, dignity and welfare
of the individuals and communities involved. Here are some important ethical considerations
to consider;
I. Informed Consent; Make sure all participants are fully informed about the
Provide consent forms outlining these aspects. Ensure participants have the
freedom to withdraw from the study at any point without facing any
repercussions.
maintain confidentiality.
private settings where they feel at ease discussing sensitive topics related to
violent extremism. Avoid collecting details and guarantee that data storage
need help.
with community leaders and stakeholders can help ensure that the research is
insights that can support efforts to counter extremism (CVE) and foster peace,
VI. Openness; Share openly about the purpose, approaches and potential impacts
of the research with all parties, including participants, community leaders and
relevant authorities. Provide truthful information about what the study aims to
VII. By considering these aspects in your study on how non-state actors influence
CVE, in Garissa you can conduct research that's considerate, ethical and
and professionalism.