Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_9661007_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: ANWAR ALAM
Author-X-Name-First: ANWAR
Author-X-Name-Last: ALAM
Title: THE SOCIOLOGY AND POLITICAL ECONOMY OF “ISLAMIC TERRORISM” IN EGYPT
Abstract: This article has been retracted.
Journal: 
Pages: 114-142
Issue: 4
Volume: 15
Year: 2003
X-DOI: 10.1080/09546550390449917
File-URL: http://hdl.handle.net/10.1080/09546550390449917
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:15:y:2003:i:4:p:114-142



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_9661008_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gary A. Ackerman
Author-X-Name-First: Gary A.
Author-X-Name-Last: Ackerman
Title: BEYOND ARSON? A THREAT ASSESSMENT OF THE EARTH LIBERATION FRONT
Abstract: The Earth Liberation Front (ELF) is radical environmentalist group that has in the past engaged in profile acts of arson, thus far without causing casualties. In order to determine the correct level of official response, it is necessary to examine the potential for the ELF and other radical environmentalist groups to engage in various levels of violence against human beings. Using empirically-based threat assessment, this study investigates the motivational and capability-related attributes of the ELF and concludes that there is a moderate-high threat of an escalation to internationally targeting people, a moderate probability that its members will at some point seek to inflict mass casualties and a low potential for ELF attacks using unconventional weapons. The assessment also identifies several factors indicating that the threat of all three types of violence is increasing, although determining the magnitude of this increase requires further study. Recommendations are given for law enforcement strategies with respect to the ELF and similarly-oriented radical groups.
Journal: 
Pages: 143-170
Issue: 4
Volume: 15
Year: 2003
X-DOI: 10.1080/09546550390449935
File-URL: http://hdl.handle.net/10.1080/09546550390449935
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:15:y:2003:i:4:p:143-170



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_9661005_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nimrod Raphaeli
Author-X-Name-First: Nimrod
Author-X-Name-Last: Raphaeli
Title: FINANCING OF TERRORISM: SOURCES, METHODS, AND CHANNELS
Abstract: Terrorism has global reach in its activities and in its sources of funding. There are manifold sources operating through methods that may be legal or illegal and sometimes even nefarious, and through routes that are often circuitous. Indeed, so-called charitable organizations are often used as a front to mobilize funds or serve as a conduit for the money. It is clear that if acts of terrorism are to be eliminated, the flow of money on which they ride must be stemmed at the source. This is one area in which stringent financial procedures and controls could be helpful. Equally important is the control that central banks must exercise in the financial sector, and the banking system in particular, to ensure greater accountability and better record keeping. Realistically, however, as long there is someone who operates a hawala system from a back of a store, money will keep flowing. No less important is the cooperation between countries and the enforcement of international conventions. A recent article on the transfer of money in Dubai notes that the authorities counted 429 suspicious money transfer operations between August 2001 and May 2003. Of these, only 46 cases were thoroughly investigated because there was little support from other countries involved, including Britain, Switzerland and the United States. Finally, education systems that teach jihad (holy war) as the highest calling for the individual and breeds religious intolerance must be reformed.
Journal: 
Pages: 59-82
Issue: 4
Volume: 15
Year: 2003
X-DOI: 10.1080/09546550390449881
File-URL: http://hdl.handle.net/10.1080/09546550390449881
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:15:y:2003:i:4:p:59-82



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_9661006_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: T. David Mason
Author-X-Name-First: T. David
Author-X-Name-Last: Mason
Title: STRUCTURES OF ETHNIC CONFLICT: REVOLUTION VERSUS SECESSION IN RWANDA AND SRI LANKA
Abstract: A structural framework of ethnic politics is presented, contrasting the patterns of inter-ethnic relations found in ranked versus unranked systems of ethnic stratification. This framework allows us to account for why ethnic conflict erupts in some cases but not others, and why that conflict takes the form of ethnic revolution in some situations and ethnic separatism in others. This framework's explanatory utility is illustrated with a comparison of case studies: why ethnic separatism emerged in Sri Lanka while ethnic revolution occurred in Rwanda.
Journal: 
Pages: 83-113
Issue: 4
Volume: 15
Year: 2003
X-DOI: 10.1080/09546550390450492
File-URL: http://hdl.handle.net/10.1080/09546550390450492
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:15:y:2003:i:4:p:83-113



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_9661003_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: BIOGRAPHICAL NOTES
Journal: 
Pages: iii-iii
Issue: 4
Volume: 15
Year: 2003
X-DOI: 10.1080/09546550390461012
File-URL: http://hdl.handle.net/10.1080/09546550390461012
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:15:y:2003:i:4:p:iii-iii



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_9661004_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: STEFAN H. LEADER
Author-X-Name-First: STEFAN H.
Author-X-Name-Last: LEADER
Author-Name: PETER PROBST
Author-X-Name-First: PETER
Author-X-Name-Last: PROBST
Title: THE EARTH LIBERATION FRONT AND ENVIRONMENTAL TERRORISM
Abstract: The Earth Liberation Front (ELF) and its sister organization the Animal Liberation Front (ALF) are believed responsible for some 600 criminal acts between 1996 and 2002 and some $43 million in damages. Committed to direct action and revolutionary violence, ELF relies on a leaderless resistance model of operations. They have no discernible organizational structure and rely on members who understand the organization's goals and orientation to take action on their own initiative, making identification and prosecution of perpetrators very difficult. ELF favors rollback of industrial civilization to preserve the environment. ELF is media saavy and unlike Islamist terrorists, generally “want a lot of people watching, not a lot of people dead.” Their tactics emphasize attacks on property not people and include arson, sabotage, and vandalism designed to cause significant economic damage. Targets have included research laboratories, multi-national corporations, and the logging industry. ELF poses an immediate and direct threat to research facilities and labs involved in or seen as involved in research on genetically modified organisms, but could easily shift to nuclear industry targets.
Journal: 
Pages: 37-58
Issue: 4
Volume: 15
Year: 2003
X-DOI: 10.1080/09546550390449872
File-URL: http://hdl.handle.net/10.1080/09546550390449872
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:15:y:2003:i:4:p:37-58



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_9661010_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bron Taylor
Author-X-Name-First: Bron
Author-X-Name-Last: Taylor
Title: THREAT ASSESSMENTS AND RADICAL ENVIRONMENTALISM
Abstract: Recent claims that Radical Environmentalists are becoming increasingly likely to deploy weapons of mass death are characterized by a selective reading of the facts, a failure to apprehend significant differences among radical groups, and injudicious speculation. A more careful analysis of the likelihood of violence emerging from radical environmentalist, animal rights, and green anarchist groups requires an analysis of the differences that characterize these groups as well as their intersections. Such an analysis suggests that among these three groups, only green anarchism can provide a possible ideological rationale for the use of weapons of mass death, but even in this case, there are many reasons to doubt they will utilize such tactics.
Journal: 
Pages: 173-182
Issue: 4
Volume: 15
Year: 2003
X-DOI: 10.1080/09546550390449962
File-URL: http://hdl.handle.net/10.1080/09546550390449962
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:15:y:2003:i:4:p:173-182



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_9661011_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gary A. Ackerman
Author-X-Name-First: Gary A.
Author-X-Name-Last: Ackerman
Title: MY REPLY TO PERLSTEIN AND TAYLOR
Abstract: Gary Ackerman, the author of “Beyond Arson? A Threat Assessment of the Earth Liberation Front” (Terrorism and Political Violence, 15(4)), replies to the critiques of his article by Gary Perlstein and Bron Taylor. The reply addresses several points raised in the critiques, including issues of bias and the applicability of the methodology of threat assessments to radical environmentalist groups. It also places the threat assessment in a broader historical context, comparing the evolution of the Earth Liberation Front to that of several other radical groups.
Journal: 
Pages: 183-189
Issue: 4
Volume: 15
Year: 2003
X-DOI: 10.1080/09546550390449971
File-URL: http://hdl.handle.net/10.1080/09546550390449971
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:15:y:2003:i:4:p:183-189



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_9661002_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jens Hainmüller
Author-X-Name-First: Jens
Author-X-Name-Last: Hainmüller
Author-Name: Jan Martin Lemnitzer
Author-X-Name-First: Jan Martin
Author-X-Name-Last: Lemnitzer
Title: WHY DO EUROPEANS FLY SAFER? THE POLITICS OF AIRPORT SECURITY IN EUROPE AND THE US
Abstract: Hitherto, political science has failed to answer a rather simple question: Why do some states provide high levels of airport security, while others fail to do so? Drawing upon a rational choice institutionalist framework, we compare airport security regimes in the US and Europe (in particular Germany) and show that the performance gap before September 11 can be largely attributed to institutional factors. In the US, responsibility was assigned to airlines, whose cost-cutting efforts resulted in lax controls. In Germany, the government shielded the provision of airport security from market pressures. We claim that delegation of responsibility for airport security to the government is a necessary, yet not a sufficient condition for a high security performance. Systems in which responsibility lies with private airlines are doomed to fail, since private markets are ill-equipped to provide a high security performance. While airlines have a long-term interest in safeguarding civil aviation, there exists both a time inconsistency and a collective cost problem that prevents sufficient investment in security in the short run. Thus, US policy-makers are well advised to resist the growing pressures for re-privatization and cost-cutting as well as to eliminate remaining flaws in the current federalized system.
Journal: 
Pages: 1-36
Issue: 4
Volume: 15
Year: 2003
X-DOI: 10.1080/09546550390449863
File-URL: http://hdl.handle.net/10.1080/09546550390449863
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:15:y:2003:i:4:p:1-36



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_9661012_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: FIGHTING FOR GOD: MOTIVATIONS AND AIMS OF RELIGIOUS TERRORISTS
Journal: 
Pages: 190-201
Issue: 4
Volume: 15
Year: 2003
X-DOI: 10.1080/09546550390449980
File-URL: http://hdl.handle.net/10.1080/09546550390449980
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:15:y:2003:i:4:p:190-201



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_9661009_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gary Perlstein
Author-X-Name-First: Gary
Author-X-Name-Last: Perlstein
Title: COMMENTS ON ACKERMAN
Journal: 
Pages: 171-172
Issue: 4
Volume: 15
Year: 2003
X-DOI: 10.1080/09546550390449944
File-URL: http://hdl.handle.net/10.1080/09546550390449944
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:15:y:2003:i:4:p:171-172

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_9702318_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daphne Burdman
Author-X-Name-First: Daphne
Author-X-Name-Last: Burdman
Title: A CONTINUING DEBATE: THE NEED TO CONVINCE: THE QUESTION OF CURRENT RELEVANCE
Journal: Terrorism and Political Violence
Pages: 350-358
Issue: 2
Volume: 16
Year: 2004
X-DOI: 10.1080/09546550490480966
File-URL: http://hdl.handle.net/10.1080/09546550490480966
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:16:y:2004:i:2:p:350-358



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_9702317_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Niklas Swanström
Author-X-Name-First: Niklas
Author-X-Name-Last: Swanström
Author-Name: Emma Björnehed
Author-X-Name-First: Emma
Author-X-Name-Last: Björnehed
Title: CONFLICT RESOLUTION OF TERRORISTS CONFLICTS IN SOUTHEAST ASIA
Abstract: This article addresses the issue of transnational terrorism in Southeast Asia. The objective of the article is to investigate the structure of the transnational element of terrorism to determine their impact on conflict resolution attempts in the region. The transnational terrorist organization Jemaah Islamyiah will be used as a single case for the analysis. From this analysis, obstacles toward conflict resolution originating from the structure of transnational terrorism are identified, and the article provides suggestions on how to circumvent these impediments.
Journal: Terrorism and Political Violence
Pages: 328-349
Issue: 2
Volume: 16
Year: 2004
X-DOI: 10.1080/09546550490483990
File-URL: http://hdl.handle.net/10.1080/09546550490483990
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:16:y:2004:i:2:p:328-349



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_9702319_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: M. Fox
Author-X-Name-First: M.
Author-X-Name-Last: Fox
Title: A CONTINUING DEBATE: BURDMAN'S INDOCTRINATED PALESTINIAN CHILDREN: THE NEED TO CONVINCE
Journal: Terrorism and Political Violence
Pages: 359-364
Issue: 2
Volume: 16
Year: 2004
X-DOI: 10.1080/09546550490446171
File-URL: http://hdl.handle.net/10.1080/09546550490446171
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:16:y:2004:i:2:p:359-364



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_9702314_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Caron Gentry
Author-X-Name-First: Caron
Author-X-Name-Last: Gentry
Title: THE RELATIONSHIP BETWEEN NEW SOCIAL MOVEMENT THEORY AND TERRORISM STUDIES: THE ROLE OF LEADERSHIP, MEMBERSHIP, IDEOLOGY AND GENDER
Abstract: This article demonstrates the relationship between new social movement theory and terrorism studies. The revolutionary dimension of new social movements can be correlated to terrorist groups. This article also uses new social movement theory to develop a fuller understanding of the leadership, membership, personal ideology and gender within a new social movement; these then can be used to follow the development of a politically violent group. This article uses the example of the American movement and its by-product—the Weather Underground.
Journal: Terrorism and Political Violence
Pages: 274-293
Issue: 2
Volume: 16
Year: 2004
X-DOI: 10.1080/09546550490483422
File-URL: http://hdl.handle.net/10.1080/09546550490483422
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:16:y:2004:i:2:p:274-293



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_9702313_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Abdelaziz Testas
Author-X-Name-First: Abdelaziz
Author-X-Name-Last: Testas
Title: DETERMINANTS OF TERRORISM IN THE MUSLIM WORLD: AN EMPIRICAL CROSS-SECTIONAL ANALYSIS
Abstract: This article tries to quantify empirically the factors behind terrorism in 37 Muslim countries. In the article’s most complete model, regressors include education attainment, political repression, income (GDP per capita), and a dummy for civil wars. We find education to be a positive determinant of terrorism— i.e., higher education levels give rise to more transnational terrorism in sample countries, low and high repression are a positive determinant of terrorism, so that a nonlinear relation (U-shaped) holds. The civil war dummy is also a positive influence. The income variable is a negative determinant of terrorism, but is either marginally significant or insignificant.
Journal: Terrorism and Political Violence
Pages: 253-273
Issue: 2
Volume: 16
Year: 2004
X-DOI: 10.1080/09546550490482504
File-URL: http://hdl.handle.net/10.1080/09546550490482504
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:16:y:2004:i:2:p:253-273



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_9702316_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anne Speckhard
Author-X-Name-First: Anne
Author-X-Name-Last: Speckhard
Author-Name: Nadejda Tarabrina
Author-X-Name-First: Nadejda
Author-X-Name-Last: Tarabrina
Author-Name: Valery Krasnov
Author-X-Name-First: Valery
Author-X-Name-Last: Krasnov
Author-Name: Khapta Akhmedova
Author-X-Name-First: Khapta
Author-X-Name-Last: Akhmedova
Title: RESEARCH NOTE: OBSERVATIONS OF SUICIDAL TERRORISTS IN ACTION
Abstract: 11 September woke the world up to the scourge of the twenty-first century—suicidal terrorism. Hostage-taking coupled with suicidal terrorism is its newest variant, played out in a Moscow theater in late October 2002. Forty Chechen terrorists armed with automatic rifles, grenades and self-detonating bombs announced to 800 plus hostages that the event was a suicide mission. The standoff ended when Russian Special Forces gassed and stormed the building, killing all the terrorists. Suicidal terrorists are rarely, if ever, observed in action. In the first months after the event, an American psychologist collaborated with Russian Academy of Sciences colleagues to collect interviews from the hostages. This article reports on hostages’ observations, interactions and conversations with the 40 suicidal terrorists.
Journal: Terrorism and Political Violence
Pages: 305-327
Issue: 2
Volume: 16
Year: 2004
X-DOI: 10.1080/09546550490490721
File-URL: http://hdl.handle.net/10.1080/09546550490490721
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:16:y:2004:i:2:p:305-327



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_9702315_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael C. Clarke
Author-X-Name-First: Michael C.
Author-X-Name-Last: Clarke
Title: TERRORISM, ENGINEERING AND THE ENVIRONMENT: THEIR INTERRELATIONSHIPS
Abstract: The study of countering terrorism came to the fore following the terrorist attacks of 11 September 2001 in New York. The study has taken many paths. These include looking at the sociology/psychology of the terrorist or terrorist group, the understanding of terrorist organisations, the use of risk management techniques to identify targets that may be of interests to terrorists, the design of security infrastructure to counter or ward off terrorism and the consideration of how built infrastructure/environment may be strengthened to mitigate the effects of terrorism.
Journal: Terrorism and Political Violence
Pages: 294-304
Issue: 2
Volume: 16
Year: 2004
X-DOI: 10.1080/09546550490483431
File-URL: http://hdl.handle.net/10.1080/09546550490483431
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:16:y:2004:i:2:p:294-304



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_9702320_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: BOOK REVIEWS
Journal: Terrorism and Political Violence
Pages: 365-395
Issue: 2
Volume: 16
Year: 2004
X-DOI: 10.1080/09546550490481019
File-URL: http://hdl.handle.net/10.1080/09546550490481019
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:16:y:2004:i:2:p:365-395



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_9702312_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Zimmerman
Author-X-Name-First: John
Author-X-Name-Last: Zimmerman
Title: SAYYID QUTB'S INFLUENCE ON THE 11 SEPTEMBER ATTACKS
Abstract: The 11 September attacks cannot be understood fully without an understanding of the ideas of Sayyid Qutb, who is widely acknowledged as the intellectual godfather for the various modern radical Islamic movements, including Al-Qaeda. Qutb's writings are important because they define the core elements that have been adopted by all radical Islamic movements. These include: (1) an extreme hostility toward Western culture, especially the role of women and sexual mores in the West; (2) the formation of society under the rule of Sharia, Islamic law; (3) the overthrow of governments not under the rule of Sharia by means of holy war; and (4) an intense hatred of Jews and distrust of Christians. This article also illustrates Qutb's influence on radical Islamic groups.
Journal: Terrorism and Political Violence
Pages: 222-252
Issue: 2
Volume: 16
Year: 2004
X-DOI: 10.1080/09546550490480993
File-URL: http://hdl.handle.net/10.1080/09546550490480993
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:16:y:2004:i:2:p:222-252



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_9702311_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alex Schmid
Author-X-Name-First: Alex
Author-X-Name-Last: Schmid
Title: FRAMEWORKS FOR CONCEPTUALISING TERRORISM
Abstract: Terrorism has been situated—and thereby implicitly also defined—in various contexts such as crime, politics, war, propaganda and religion. Depending on which framework one chooses, certain aspects of terrorism get exposed while others are placed ‘outside the picture’ if only one framework is utilised. In this article five conceptual lenses are utilised: 1. terrorism as/and crime; 2. terrorism as/and politics; 3. terrorism as/and warfare; 4. terrorism as/and communication; and 5. terrorism as/and religious fundamentalism.
Journal: Terrorism and Political Violence
Pages: 197-221
Issue: 2
Volume: 16
Year: 2004
X-DOI: 10.1080/09546550490483134
File-URL: http://hdl.handle.net/10.1080/09546550490483134
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:16:y:2004:i:2:p:197-221

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_224592_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Cristiana C. Kittner
Author-X-Name-First: Cristiana C.
Author-X-Name-Last: Kittner
Title: The Role of Safe Havens in Islamist Terrorism
Abstract: This article will develop an explanatory theory on terrorist safe havens. Focusing on Islamist Terrorist networks, this article argues that four specific conditions are necessary for the establishment of a safe haven for Islamist terrorist networks: geographic features, weak governance, history of corruption and violence, and poverty. At the conclusion of the article, the developed theory is applied to the Tri-Border Area of South America (TBA), where the frontiers of Argentina, Brazil, and Paraguay meet, an area overlooked by the 9/11 National Commission Report's list of Islamist terrorists' safe havens.
Journal: Terrorism and Political Violence
Pages: 307-329
Issue: 3
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701246791
File-URL: http://hdl.handle.net/10.1080/09546550701246791
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:3:p:307-329



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_224611_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ignacio Sànchez-Cuenca
Author-X-Name-First: Ignacio
Author-X-Name-Last: Sànchez-Cuenca
Title: The Dynamics Of Nationalist Terrorism: ETA and the IRA
Abstract: Nationalist terrorism aspires to independence or greater autonomy for some territory. The combination of territorial claims and armed struggle gives rise to a very definite strategy, violence intended to coerce the State. Nationalist terrorist organizations kill repeatedly with the aim of breaking the will of the State. They engage in a peculiar sort of war of attrition with the State. This paper analyzes comparatively the war of attrition strategy in two organizations, ETA and the IRA. The focus of the paper is on strategy: it examines how ETA and the IRA understood their activity in terms of war of attrition and how they developed their strategy subject to some constraints, such as the moderate preferences of their supporters. I show that popularity constraints account for the high degree of selectivity in their killings. The analysis is based on a combination of historical information, internal documents, and a large data set I have constructed of the killings of these two organizations.
Journal: Terrorism and Political Violence
Pages: 289-306
Issue: 3
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701246981
File-URL: http://hdl.handle.net/10.1080/09546550701246981
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:3:p:289-306



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_242288_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Paul Joosse
Author-X-Name-First: Paul
Author-X-Name-Last: Joosse
Title: Leaderless Resistance and Ideological Inclusion: The Case of the Earth Liberation Front
Abstract: Leaderless resistance is a strategy of opposition that allows for and encourages individuals or small cells to engage in acts of political violence entirely independent of any hierarchy of leadership or network of support. This article examines the development of the leaderless resistance strategy by the radical right and more recently by the radical environmentalist movement. While both movements use leaderless resistance to avoid detection, infiltration, and prosecution by the state, environmental groups like the Earth Liberation Front (ELF) benefit additionally because of the ideological inclusiveness that leaderless resistance fosters. Historically, ideological cleavages have rendered radical environmental groups such as Earth First! less effective than they would have been otherwise. Using leaderless resistance, however, the ELF eliminates all ideology extraneous to the specific cause of halting the degradation of nature. This elimination enables the ELF to mobilize a greater number of “direct actions.”
Journal: Terrorism and Political Violence
Pages: 351-368
Issue: 3
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701424042
File-URL: http://hdl.handle.net/10.1080/09546550701424042
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:3:p:351-368



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_242289_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gregory Miller
Author-X-Name-First: Gregory
Author-X-Name-Last: Miller
Title: Confronting Terrorisms: Group Motivation and Successful State Policies
Abstract: Much of the recent debate among policymakers and in recent scholarship focuses on how states should respond to terrorism: whether they should use harsh policies to punish terrorists and thus deter future acts, or concentrate on root causes and reduce incentives to use terrorism. Often ignored in this discussion are the characteristics that distinguish terrorist groups from one another, and that influence the effectiveness of a state's actions. This article examines group motivation—national-separatism, revolution, reaction, or religion—as one key trait, and finds that these different “terrorisms” do affect the relative success of various counterterrorist policies.
Journal: Terrorism and Political Violence
Pages: 331-350
Issue: 3
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701424059
File-URL: http://hdl.handle.net/10.1080/09546550701424059
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:3:p:331-350



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_242291_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mariya Omelicheva
Author-X-Name-First: Mariya
Author-X-Name-Last: Omelicheva
Title: Combating Terrorism in Central Asia: Explaining Differences in States' Responses to Terror
Abstract: This work examines differences in the level of violence of counterterrorism measures adopted by Central Asian states. Why do some Central Asian governments opt for wanton repression in the name of the struggle with terrorism, while others adopt less severe methods of control and prevention? To answer this question, this study draws on a synthesis of rationalist and constructivist explanations. Like rationalists, it posits that the magnitude of terrorism and states' material capabilities affect governments' responses to terrorism. Following constructivists, the study stresses the impact of ideas about the nature of terrorist threats and views on the appropriateness of the use of force on the counterterrorism policies of Central Asian states.
Journal: Terrorism and Political Violence
Pages: 369-393
Issue: 3
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701424075
File-URL: http://hdl.handle.net/10.1080/09546550701424075
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:3:p:369-393



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_243484_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jonathan Fox
Author-X-Name-First: Jonathan
Author-X-Name-Last: Fox
Title: The Increasing Role of Religion in State Failure: 1960 to 2004
Abstract: This study examines the extent of religious conflict between 1960 and 2004 in the context of all domestic conflicts in that era based on data from the State Failure dataset. The findings show that until 2002 religious conflicts were a minority of all conflicts, but from 2002 to 2004 they were a majority of all conflicts. This study also examines the extent to which groups belonging to different religious traditions (i.e., Christianity, Islam, etc.) participate in conflict. The specific results on the relative participation in conflict by Christian and Muslim groups depend on the method used to measure conflict. However, no matter how conflict is measured, the results consistently show a rise in Islamic participation in conflict since the late 1970s. Also, for nearly the entire period covered by this study, the majority of religious conflicts involved Muslims. All of this supports contentions that rather than causing religion's demise, modernity has caused a resurgence of religion.
Journal: Terrorism and Political Violence
Pages: 395-414
Issue: 3
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701436020
File-URL: http://hdl.handle.net/10.1080/09546550701436020
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:3:p:395-414



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_247457_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Avishag Gordon
Author-X-Name-First: Avishag
Author-X-Name-Last: Gordon
Title: Berko Anat. . Forward by Moshe Addad, and translated by Elizabeth Yuval
Journal: 
Pages: 415-417
Issue: 3
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701475804
File-URL: http://hdl.handle.net/10.1080/09546550701475804
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:3:p:415-417



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_247459_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Max Taylor
Author-X-Name-First: Max
Author-X-Name-Last: Taylor
Title: J.W. Charny. 
Journal: 
Pages: 417-418
Issue: 3
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701475820
File-URL: http://hdl.handle.net/10.1080/09546550701475820
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:3:p:417-418



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_247461_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Ellis van Courtland Moon
Author-X-Name-First: John Ellis
Author-X-Name-Last: van Courtland Moon
Title: Andreas Wenger and Reto Wollenmann, eds. 
Journal: 
Pages: 419-420
Issue: 3
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701475846
File-URL: http://hdl.handle.net/10.1080/09546550701475846
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:3:p:419-420



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_247465_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Youssef Aboul-Enein
Author-X-Name-First: Youssef
Author-X-Name-Last: Aboul-Enein
Title: Lorenzo Vidino. 
Journal: 
Pages: 420-421
Issue: 3
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701475887
File-URL: http://hdl.handle.net/10.1080/09546550701475887
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:3:p:420-421



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_247467_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dipak Gupta
Author-X-Name-First: Dipak
Author-X-Name-Last: Gupta
Title: Mike Dash. . London: Granta Books, 2005. 356 pp. Cloth £20. ISBN 1-86207-846-7. Martine van Woerkens. 
Journal: 
Pages: 421-424
Issue: 3
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701475903
File-URL: http://hdl.handle.net/10.1080/09546550701475903
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:3:p:421-424



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_247468_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: D.J. Mulloy
Author-X-Name-First: D.J.
Author-X-Name-Last: Mulloy
Title: Stuart Croft. 
Journal: 
Pages: 424-425
Issue: 3
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701475911
File-URL: http://hdl.handle.net/10.1080/09546550701475911
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:3:p:424-425



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_247469_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Ellis Moon
Author-X-Name-First: John Ellis
Author-X-Name-Last: Moon
Title: Mark A. Prelas and Michael S. Peck. 
Journal: 
Pages: 425-427
Issue: 3
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701475929
File-URL: http://hdl.handle.net/10.1080/09546550701475929
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:3:p:425-427



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_247470_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Horgan
Author-X-Name-First: John
Author-X-Name-Last: Horgan
Title: Steve Tatham. 
Journal: 
Pages: 427-428
Issue: 3
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701475937
File-URL: http://hdl.handle.net/10.1080/09546550701475937
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:3:p:427-428



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_247472_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Zimmerman
Author-X-Name-First: John
Author-X-Name-Last: Zimmerman
Title: David Selbourne. 
Journal: 
Pages: 429-430
Issue: 3
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701475952
File-URL: http://hdl.handle.net/10.1080/09546550701475952
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:3:p:429-430



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_247474_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Ballard
Author-X-Name-First: John
Author-X-Name-Last: Ballard
Title: Etherington, Mark. 
Journal: 
Pages: 430-431
Issue: 3
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701475978
File-URL: http://hdl.handle.net/10.1080/09546550701475978
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:3:p:430-431



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_247475_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dipak Gupta
Author-X-Name-First: Dipak
Author-X-Name-Last: Gupta
Title: Praveen Swami. 
Journal: 
Pages: 431-434
Issue: 3
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701475986
File-URL: http://hdl.handle.net/10.1080/09546550701475986
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:3:p:431-434



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_247476_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Robert Wesley
Author-X-Name-First: Robert
Author-X-Name-Last: Wesley
Title: Derek D. Smith. 
Journal: 
Pages: 434-435
Issue: 3
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701475994
File-URL: http://hdl.handle.net/10.1080/09546550701475994
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:3:p:434-435



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_247477_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Martin Durham
Author-X-Name-First: Martin
Author-X-Name-Last: Durham
Title: George Michael. 
Journal: 
Pages: 435-436
Issue: 3
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701476000
File-URL: http://hdl.handle.net/10.1080/09546550701476000
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:3:p:435-436



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_247480_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Ballard
Author-X-Name-First: John
Author-X-Name-Last: Ballard
Title: Cordesman, Anthony H. 
Journal: 
Pages: 436-438
Issue: 3
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701476034
File-URL: http://hdl.handle.net/10.1080/09546550701476034
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:3:p:436-438



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_247489_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mark Sedgwick
Author-X-Name-First: Mark
Author-X-Name-Last: Sedgwick
Title: John Mueller. 
Journal: 
Pages: 438-440
Issue: 3
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701476125
File-URL: http://hdl.handle.net/10.1080/09546550701476125
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:3:p:438-440



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_247491_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Youssef Aboul-Enein
Author-X-Name-First: Youssef
Author-X-Name-Last: Aboul-Enein
Title: Henri Alleg with a new afterword by the author and preface by Jean Paul Satre. 
Journal: 
Pages: 440-441
Issue: 3
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701476141
File-URL: http://hdl.handle.net/10.1080/09546550701476141
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:3:p:440-441

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_258913_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Eugene Tan
Author-X-Name-First: Eugene
Author-X-Name-Last: Tan
Title: Norming “Moderation” in an “Iconic Target”: Public Policy and the Regulation of Religious Anxieties in Singapore
Abstract: The maintenance of a “moderate mainstream” Muslim community as a bulwark against the fraying of harmonious ethnic relations has become a key governance concern post-September 11. In light of the global concern—and often paranoia—with diasporic Islam, Islamic religious institutions and civil society have been portrayed in the popular media as hotbeds of radicalism, promoters of hatred, and recruiters for a “conflict of civilization” between the Muslim world and the modern world. Having declared itself a terrorist's “iconic target,” Singapore has taken a broad-based community approach in advancing inter-religious tolerance, including a subtle initiative to include the “Muslim civil society” in advancing the understanding and the promotion of a moderate brand of Islam in Singapore. This tacit process of regulation (top-down, intra-community and inter-community), while effective, is constrained by the unique governance context in Singapore.
Journal: Terrorism and Political Violence
Pages: 443-462
Issue: 4
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701590610
File-URL: http://hdl.handle.net/10.1080/09546550701590610
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:4:p:443-462



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_258915_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Edward Newman
Author-X-Name-First: Edward
Author-X-Name-Last: Newman
Title: Weak States, State Failure, and Terrorism
Abstract: It is common to hear the assertion that weak or failed states are fertile ground for terrorism. Yet terrorist groups have emerged from, and operated within, countries which have strong, stable states and a variety of systems of government. Terrorist organizations operate in weak and failed states but it is not necessarily the condition of weak or failed statehood which explains their presence. Moreover, it is not necessarily the weakest states which do host such groups. Therefore, this condition is not a sufficient explanation for their presence. While weak or failed states might provide an enabling environment for certain types of terrorist groups to operate, additional explanatory variables need to be identified.
Journal: Terrorism and Political Violence
Pages: 463-488
Issue: 4
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701590636
File-URL: http://hdl.handle.net/10.1080/09546550701590636
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:4:p:463-488



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_258919_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mikel Buesa
Author-X-Name-First: Mikel
Author-X-Name-Last: Buesa
Author-Name: Aurelia Valiño
Author-X-Name-First: Aurelia
Author-X-Name-Last: Valiño
Author-Name: Joost Heijs
Author-X-Name-First: Joost
Author-X-Name-Last: Heijs
Author-Name: Thomas Baumert
Author-X-Name-First: Thomas
Author-X-Name-Last: Baumert
Author-Name: Javier Gómez
Author-X-Name-First: Javier
Author-X-Name-Last: Gómez
Title: The Economic Cost of March 11: Measuring the Direct Economic Cost of the Terrorist Attack on March 11, 2004 in Madrid
Abstract: This article attempts to measure the direct costs that the terrorist attacks of 3/11 had on the economy of the region of Madrid. The evaluation has been made applying conservative criteria, and the results obtained have to be considered as minimum. The result indicates that the terrorist attacks caused a loss of nearly 212 million euros to the regional economy of Madrid, equivalent to 0.16 percent of the regional GDP (0.03 of the national GDP). This confirms that the immediate economic dimension of a terrorist attack such as the one of 3/11—apart from human catastrophic consequences—is relatively low.
Journal: Terrorism and Political Violence
Pages: 489-509
Issue: 4
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701590677
File-URL: http://hdl.handle.net/10.1080/09546550701590677
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:4:p:489-509



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_260506_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Beau Seegmiller
Author-X-Name-First: Beau
Author-X-Name-Last: Seegmiller
Title: Radicalized Margins: Eric Rudolph and Religious Violence
Abstract: In recent years we have witnessed a growing body of scholarship that asserts that religion often motivates violence; anti-abortion violence is presented as a prominent example. Through examining the rhetoric and actions of anti-abortion bomber Eric Rudolph, I question the centrality of religion when invocations of divine authority or apocalyptic narratives are conspicuously absent in his justificatory writings. I argue that other social, political, and strategic considerations are more significant in the emergence of a radicalized anti-abortion movement than religion. This analysis nuances notions of a causal relationship between religion and violence and calls for interrogation of the category.
Journal: Terrorism and Political Violence
Pages: 511-528
Issue: 4
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701606531
File-URL: http://hdl.handle.net/10.1080/09546550701606531
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:4:p:511-528



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_260508_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gokhan Bacik
Author-X-Name-First: Gokhan
Author-X-Name-Last: Bacik
Author-Name: Sammas Salur
Author-X-Name-First: Sammas
Author-X-Name-Last: Salur
Title: Deconstructing the Multiple Readings of a Terrorist Event in Turkey: The Case of the Council of State (Danıştay) Assault of 2006
Abstract: Terrorism is a pivotal matter in Turkish politics. In this article, a specific terrorist activity, which is still having an impact upon Turkish politics, has been analyzed. It scrutinizes two perspectives of the event. Some actors lean towards a secular/positivist reading of events while others favour a conservative/postmodern reading. This serious factional political debate is possibly just the result that the terrorists had in mind. Being imbued by republican principles, the seculars' claims compel the conservatives to raise defensive points since they are blamed for murdering secular figures and targeting the very essence of the republic. Using different symbolic readings, both sides arrive at opposing conclusions: for the seculars the aim/message of the terror is clear—it is the republic; for the conservatives the aim/message is hidden—destabilizing the country.
Journal: Terrorism and Political Violence
Pages: 529-544
Issue: 4
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701606556
File-URL: http://hdl.handle.net/10.1080/09546550701606556
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:4:p:529-544



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_260509_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeffrey Kaplan
Author-X-Name-First: Jeffrey
Author-X-Name-Last: Kaplan
Title: The Fifth Wave: The New Tribalism?
Abstract: This article builds on David Rapoport's Four Waves Theory by identifying several anomalous movements which did not appear to precisely fit with the internationalist model posited in Rapoport's Four Waves. Specifically, groups which I have called Fifth Wave movements have turned inward, becoming localistic rather than international, and manifest intense ethnic, racial, or tribal mysticism. They are millenarian and chiliastic in nature, and seek to create a new society—based on the creation of new men and women—in a single generation. Fifth Wave movements thus focus strongly on women and see children as the vanguard of their movements. Following this logic, rape is their signature tactic and child abduction their normal recruiting practice. This study posits the pre-state Khmer Rouge in Cambodia as the avatar of the current Fifth Wave, but finds that after a nearly generation-long hiatus, the fifth wave in its fully modern form emerged in Africa with the Lord's Resistance Army in Uganda as its paradigmatic exemplar.
Journal: Terrorism and Political Violence
Pages: 545-570
Issue: 4
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701606564
File-URL: http://hdl.handle.net/10.1080/09546550701606564
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:4:p:545-570



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_260511_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Rogelio Alonso
Author-X-Name-First: Rogelio
Author-X-Name-Last: Alonso
Author-Name: Marcos García Rey
Author-X-Name-First: Marcos
Author-X-Name-Last: García Rey
Title: The Evolution of Jihadist Terrorism in Morocco
Abstract: Over the last few years, Moroccans have been disproportionately involved in jihadist terrorism. Morocco has been increasingly identified as one of the largest producers of terrorists and insurgents in Afghanistan, Iraq, and throughout Europe. This article examines the factors behind the emergence of jihadist terrorism in Morocco, and how this terrorist threat has gone beyond this country's borders. Three factors have contributed to this development: the influence of global jihad on potential Moroccan jihadists; the growing Islamization of the country; and deteriorating socioeconomic conditions. In analyzing these variables, special attention will be paid to the Casablanca terrorist attacks on May 16, 2003, marking the debut of suicide terrorism in Morocco. The article will also examine the principal counterterrorist initiatives Morocco has implemented in response to this threat.
Journal: Terrorism and Political Violence
Pages: 571-592
Issue: 4
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701606580
File-URL: http://hdl.handle.net/10.1080/09546550701606580
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:4:p:571-592



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_262533_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Peter Waldmann
Author-X-Name-First: Peter
Author-X-Name-Last: Waldmann
Title: Is There a Culture of Violence in Colombia?
Abstract: This study identifies evidence of a “culture of violence” in Colombia and discusses the structural conditions that allow or cause such a culture to arise. The thesis is that economic factors alone cannot explain violence; rather, cultural factors must be taken into account.
Journal: Terrorism and Political Violence
Pages: 593-609
Issue: 4
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701626836
File-URL: http://hdl.handle.net/10.1080/09546550701626836
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:4:p:593-609



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_267961_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Leonard Weinberg
Author-X-Name-First: Leonard
Author-X-Name-Last: Weinberg
Title: A Review of: “What's New?: A Review Essay On The ‘New’ Anti-Semitism”
Journal: 
Pages: 611-620
Issue: 4
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701681047
File-URL: http://hdl.handle.net/10.1080/09546550701681047
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:4:p:611-620



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_267963_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: D. J. Mulloy
Author-X-Name-First: D. J.
Author-X-Name-Last: Mulloy
Title: A Review of: “David Simpson. ”
Journal: 
Pages: 620-621
Issue: 4
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701681062
File-URL: http://hdl.handle.net/10.1080/09546550701681062
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:4:p:620-621



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_267968_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marc Sageman
Author-X-Name-First: Marc
Author-X-Name-Last: Sageman
Title: A Review of: “Michael Kenney. ”
Journal: 
Pages: 623-624
Issue: 4
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701681112
File-URL: http://hdl.handle.net/10.1080/09546550701681112
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:4:p:623-624



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_269167_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mia Bloom
Author-X-Name-First: Mia
Author-X-Name-Last: Bloom
Title: A Review of: “Mike Davis. ”
Journal: 
Pages: 621-623
Issue: 4
Volume: 19
Year: 2007
X-DOI: 10.1080/09546550701692937
File-URL: http://hdl.handle.net/10.1080/09546550701692937
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:19:y:2007:i:4:p:621-623

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_285768_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David Rapoport
Author-X-Name-First: David
Author-X-Name-Last: Rapoport
Title: Before the Bombs There Were the Mobs: American Experiences with Terror
Abstract: Terrorist studies rarely discuss activities before the invention of dynamite, which made modern terror possible. One important, interesting, and forgotten form is the mob terror campaign. Two significant successful American examples are examined and compared, “The Sons of Liberty” which ignited the American Revolution, and the Ku Klux Klan, which “won the peace” the South wanted after it lost the Civil War. The study concludes by briefly comparing modern with mob terror.
Journal: Terrorism and Political Violence
Pages: 167-194
Issue: 2
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550701856045
File-URL: http://hdl.handle.net/10.1080/09546550701856045
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:2:p:167-194



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_290925_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeffrey Simon
Author-X-Name-First: Jeffrey
Author-X-Name-Last: Simon
Title: The Forgotten Terrorists: Lessons from the History of Terrorism
Abstract: One of the most intriguing, yet forgotten, terrorist groups in history is the Galleanists, an innovative group of militant Italian anarchists active in the United States during the early part of the twentieth century. They introduced tactics and strategies that are widely used today in the world of terrorism. This article examines the rise and fall of the group, and discusses how America's experience with it holds many lessons for understanding today's global terrorist threat.
Journal: Terrorism and Political Violence
Pages: 195-214
Issue: 2
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550801907599
File-URL: http://hdl.handle.net/10.1080/09546550801907599
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:2:p:195-214



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_290927_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Leonard Weinberg
Author-X-Name-First: Leonard
Author-X-Name-Last: Weinberg
Author-Name: William Eubank
Author-X-Name-First: William
Author-X-Name-Last: Eubank
Author-Name: Elizabeth Francis
Author-X-Name-First: Elizabeth
Author-X-Name-Last: Francis
Title: The Cost of Terrorism: The Relationship Between International Terrorism and Democratic Governance
Abstract: After Al Qaeda's destruction of the World Trade Center on 11 September 2001, many democracies reacted to the event, and to international terrorism in general, by passing laws restricting civil liberties and political rights, raising questions about the balance between security and liberty. Such laws have produced alarms among civil libertarians, worldwide. Are the alarms justified? In this article we analyze the relationship between the yearly number of international terrorist attacks in 24 countries from 1968–2003 and (a) measures of civil liberties and political rights as provided by Freedom House, and (b) levels of democracy as measured in the Polity IV scales. We take the number of international terrorist events, by country, from data provided by the Memorial Institute of the Prevention of Terrorism (MIPT) http://www.tkb.org/Home.jsp. Our analysis indicates that there is, generally, no relationship between the number of international terrorist events and the levels of civil rights, political rights, or democracy as measured by the Freedom House and Polity IV indicators. When there is a statistically significant relationship, it is negative, opposite to what is predicted by the tradeoff hypothesis.
Journal: Terrorism and Political Violence
Pages: 257-270
Issue: 2
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550801907615
File-URL: http://hdl.handle.net/10.1080/09546550801907615
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:2:p:257-270



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_292241_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Petter Nesser
Author-X-Name-First: Petter
Author-X-Name-Last: Nesser
Title: How did Europe's Global Jihadis Obtain Training for their Militant Causes?
Abstract: This article examines, compares, and contrasts the ways in which “global jihadis” have trained for terrorism in Western Europe. Before the invasion of Afghanistan, the terrorists received training in Al Qaeda paramilitary camps. After invasion, they had to find alternative training methods and arenas. It is widely assumed that the Internet has taken over the role of the Afghan camps. The current survey suggests that the Internet's role as a “virtual training camp” might be overstated. Although the Net has become an important tool for terrorists on many levels, they maintain an urge to obtain real-life, military-style training in jihadi combat zones. Despite difficulties and risks, many of today's terrorists attend terrorist training facilities in Pakistan or other places. The main characteristic of training practices after the invasion of Afghanistan seems to be that, from an organizational perspective, the push for training and preparation comes from “below” rather than from “above.”
Journal: Terrorism and Political Violence
Pages: 234-256
Issue: 2
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550801920758
File-URL: http://hdl.handle.net/10.1080/09546550801920758
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:2:p:234-256



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_292245_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anne Stenersen
Author-X-Name-First: Anne
Author-X-Name-Last: Stenersen
Title: The Internet: A Virtual Training Camp?
Abstract: This study aims to investigate how Al Qaeda uses the Internet for military training and preparation. What kind of training material is available on jihadi webpages, who produces it, and for what purpose? The article argues that in spite of a vast amount of training-related literature online, there have been few organized efforts by Al Qaeda to train their followers by way of the Internet. The Internet is per today not a “virtual training camp” organized from above, but rather a resource bank maintained and accessed largely by self-radicalized sympathizers.
Journal: Terrorism and Political Violence
Pages: 215-233
Issue: 2
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550801920790
File-URL: http://hdl.handle.net/10.1080/09546550801920790
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:2:p:215-233



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_292252_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Clarke
Author-X-Name-First: Michael
Author-X-Name-Last: Clarke
Title: China's “War on Terror” in Xinjiang: Human Security and the Causes of Violent Uighur Separatism
Abstract: The paper argues that violent Uighur separatism and terrorism conforms in a number of important respects to the human security theory of terrorism, particularly in the realm of political and civil rights. However, it argues that impetus has been given to the various separatist organisations in the region by the development of interconnections between the largely internal aspects of China's policy of integration in the region and the wider Central and South Asian dynamic of Islamic radicalism since 1990.
Journal: Terrorism and Political Violence
Pages: 271-301
Issue: 2
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550801920865
File-URL: http://hdl.handle.net/10.1080/09546550801920865
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:2:p:271-301



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_295945_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alisa Stack-O'Connor
Author-X-Name-First: Alisa
Author-X-Name-Last: Stack-O'Connor
Title: A Review of: “Kelly Oliver. .”
Journal: 
Pages: 302-303
Issue: 2
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550801957792
File-URL: http://hdl.handle.net/10.1080/09546550801957792
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:2:p:302-303



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_295946_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: LCDR Youssef Aboul-Enein
Author-X-Name-First: LCDR Youssef
Author-X-Name-Last: Aboul-Enein
Title: A Review of: “Lorry M. Fenner and Marie M. deYoung. ”
Journal: 
Pages: 303-304
Issue: 2
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550801957800
File-URL: http://hdl.handle.net/10.1080/09546550801957800
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:2:p:303-304



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_295947_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anar Valiyev
Author-X-Name-First: Anar
Author-X-Name-Last: Valiyev
Title: A Review of: “Peter Mandaville. .
Adeeb Khalid. .
Muammer Kaylan. .”
Journal: 
Pages: 304-307
Issue: 2
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550801957818
File-URL: http://hdl.handle.net/10.1080/09546550801957818
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:2:p:304-307



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_295948_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Shahid Bux
Author-X-Name-First: Shahid
Author-X-Name-Last: Bux
Title: A Review of: “Alan B. Krueger. .”
Journal: 
Pages: 307-308
Issue: 2
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550801957826
File-URL: http://hdl.handle.net/10.1080/09546550801957826
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:2:p:307-308



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_295949_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lawrence Rubin
Author-X-Name-First: Lawrence
Author-X-Name-Last: Rubin
Title: A Review of: “Nathan Gonzalez. .”
Journal: 
Pages: 308-310
Issue: 2
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550801957834
File-URL: http://hdl.handle.net/10.1080/09546550801957834
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:2:p:308-310



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_295951_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Roger Griffin
Author-X-Name-First: Roger
Author-X-Name-Last: Griffin
Title: A Review of: “Rebecca Knuth. .”
Journal: 
Pages: 310-312
Issue: 2
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550801957859
File-URL: http://hdl.handle.net/10.1080/09546550801957859
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:2:p:310-312



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_295952_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: D. J. Mulloy
Author-X-Name-First: D. J.
Author-X-Name-Last: Mulloy
Title: A Review of: “Philip Smith. .”
Journal: 
Pages: 312-314
Issue: 2
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550801957867
File-URL: http://hdl.handle.net/10.1080/09546550801957867
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:2:p:312-314



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_295953_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Noam Schimmel
Author-X-Name-First: Noam
Author-X-Name-Last: Schimmel
Title: A Review of: “Donald Dutton. .”
Journal: 
Pages: 314-317
Issue: 2
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550801957875
File-URL: http://hdl.handle.net/10.1080/09546550801957875
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:2:p:314-317



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_295954_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: D. J. Mulloy
Author-X-Name-First: D. J.
Author-X-Name-Last: Mulloy
Title: A Review of: “Bruce Ackerman. .”
Journal: 
Pages: 317-319
Issue: 2
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550801957883
File-URL: http://hdl.handle.net/10.1080/09546550801957883
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:2:p:317-319



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_295955_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anar Valiyev
Author-X-Name-First: Anar
Author-X-Name-Last: Valiyev
Title: A Review of: “H. V. Savitch. .”
Journal: 
Pages: 319-321
Issue: 2
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550801957891
File-URL: http://hdl.handle.net/10.1080/09546550801957891
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:2:p:319-321



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_295956_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alisa Stack-O'Connor
Author-X-Name-First: Alisa
Author-X-Name-Last: Stack-O'Connor
Title: A Review of: “Rashid Khalidi. .”
Journal: 
Pages: 321-323
Issue: 2
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550801957909
File-URL: http://hdl.handle.net/10.1080/09546550801957909
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:2:p:321-323



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_295957_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Shahid Bux
Author-X-Name-First: Shahid
Author-X-Name-Last: Bux
Title: A Review of: “Rogelio Alonso. .”
Journal: 
Pages: 323-324
Issue: 2
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550801957917
File-URL: http://hdl.handle.net/10.1080/09546550801957917
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:2:p:323-324



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_295958_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Max Taylor
Author-X-Name-First: Max
Author-X-Name-Last: Taylor
Title: A Review of: “Adrian Miller. .”
Journal: 
Pages: 324-326
Issue: 2
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550801957925
File-URL: http://hdl.handle.net/10.1080/09546550801957925
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:2:p:324-326



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_295960_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Max Taylor
Author-X-Name-First: Max
Author-X-Name-Last: Taylor
Title: A Review of: “Alan B. Kruger. .”
Journal: 
Pages: 326-328
Issue: 2
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550801957941
File-URL: http://hdl.handle.net/10.1080/09546550801957941
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:2:p:326-328



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_295961_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel Turack
Author-X-Name-First: Daniel
Author-X-Name-Last: Turack
Title: A Review of: “. Edited by Ved P. Nanda.”
Journal: 
Pages: 328-331
Issue: 2
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550801957958
File-URL: http://hdl.handle.net/10.1080/09546550801957958
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:2:p:328-331

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_307496_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mikkel Thorup
Author-X-Name-First: Mikkel
Author-X-Name-Last: Thorup
Title: The Anarchist and the Partisan—Two Types of Terror in the History of Irregular Warfare
Abstract: This article deals with the anarchist and the partisan as forerunners of contemporary terrorism. It investigates their different relationship to the state, the anarchist trying to replace it and the partisan trying to conquer it and what that means in terms of resistance, critique, and position on the use of force. The article is both theoretical and historical, trying to place the anarchist and the partisan within their different time epochs and institutional settings. It ends by discussing if and how a third type of political violence, Islamist terrorism, can be interpreted within the analytical framework of legality/illegality and regularity/irregularity worked out in the article, that is, to what extent is current the Islamist terrorist a child of the anarchist and the partisan?
Journal: Terrorism and Political Violence
Pages: 333-355
Issue: 3
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802073300
File-URL: http://hdl.handle.net/10.1080/09546550802073300
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:3:p:333-355



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_307497_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Justin Magouirk
Author-X-Name-First: Justin
Author-X-Name-Last: Magouirk
Title: The Nefarious Helping Hand: Anti-Corruption Campaigns, Social Service Provision, and Terrorism
Abstract: This article offers a novel contribution to the terrorism literature by using mathematical modeling and case studies to demonstrate how terrorist and extremist groups can utilize social service provision activities and anti-corruption campaigns instead of violent activities to gain support.The basic argument of the model is that terrorist groups will try to gain support by promising that they will be better distributors of resources than the current regime once they gain power and by promising that they will be less corrupt. However, because all organizations can freely make these promises, their words are cheap talk, and the general population should ignore them. To overcome this problem, organizations must offer a costly signal. Provision of social goods and implementation of explicit anti-corruption campaigns before taking power serves as such a signal. As the United States government and its allies widen their “war on terrorism,” they must consider the ramifications of social service provision and anti-corruption activities, which are common, effective, and potentially useful for increasing the probability of group success.
Journal: Terrorism and Political Violence
Pages: 356-375
Issue: 3
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802073318
File-URL: http://hdl.handle.net/10.1080/09546550802073318
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:3:p:356-375



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_307499_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Clarke
Author-X-Name-First: Ryan
Author-X-Name-Last: Clarke
Author-Name: Stuart Lee
Author-X-Name-First: Stuart
Author-X-Name-Last: Lee
Title: The PIRA, D-Company, and the Crime-Terror Nexus
Abstract: This article compares and contrasts the Provisional Irish Republican Army (PIRA) and D-Company, two seemingly dissimilar organisations that nonetheless share some striking commonalities, especially in regards to the use of tactics that contradict their declared ideology in pursuit of a larger goal. First, the growing relationship between organised criminal syndicates and terror groups is discussed and Makarenko's well-known “Crime-Terror Continuum” introduced. Following this, a historical overview and an analysis of the organisational structure of the PIRA is provided and organisational models proposed. Further, the founding and development of D-Company is addressed in addition to the syndicate's intricate involvement in the 1993 Bombay Blasts. Similarly, organisational models are offered and conclusions drawn. This work then moves to a comparative analysis of the organisational and operating structure of the PIRA and D-Company and finishes with a brief conclusion. This article argues that although criminal syndicates and militant groups may have different organisation structures, the line that distinguishes their activities has begun to blur and the space between Makarenko's graduated levels is becoming smaller and less discernible, thus rendering her model obsolete.
Journal: Terrorism and Political Violence
Pages: 376-395
Issue: 3
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802073334
File-URL: http://hdl.handle.net/10.1080/09546550802073334
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:3:p:376-395



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_307501_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel Masters
Author-X-Name-First: Daniel
Author-X-Name-Last: Masters
Title: The Origin of Terrorist Threats: Religious, Separatist, or Something Else?
Abstract: Recent studies indicate that the number of terrorist incidents is declining while their lethality is increasing. This trend in casualty rates has raised the rhetoric on terrorism, leading to claims that a new form of terrorism has emerged over the last thirty years. The “new terrorism” is defined by a tendency towards maximum destruction and a pronounced religious motivation. The question is whether or not the new terrorism is actually driving current trends in terrorist violence? This study examines casualty rates by terrorist groups categorized by their ideologies and finds that trends in terrorist violence are not being driven by the new terrorism per se. Instead, all forms of terrorism are more violent generally, and variations of ethno-national terrorism are the most violent specifically.
Journal: Terrorism and Political Violence
Pages: 396-414
Issue: 3
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802073359
File-URL: http://hdl.handle.net/10.1080/09546550802073359
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:3:p:396-414



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_307502_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Clark McCauley
Author-X-Name-First: Clark
Author-X-Name-Last: McCauley
Author-Name: Sophia Moskalenko
Author-X-Name-First: Sophia
Author-X-Name-Last: Moskalenko
Title: Mechanisms of Political Radicalization: Pathways Toward Terrorism
Abstract: This article conceptualizes political radicalization as a dimension of increasing extremity of beliefs, feelings, and behaviors in support of intergroup conflict and violence. Across individuals, groups, and mass publics, twelve mechanisms of radicalization are distinguished. For ten of these mechanisms, radicalization occurs in a context of group identification and reaction to perceived threat to the ingroup. The variety and strength of reactive mechanisms point to the need to understand radicalization—including the extremes of terrorism—as emerging more from the dynamics of intergroup conflict than from the vicissitudes of individual psychology.
Journal: Terrorism and Political Violence
Pages: 415-433
Issue: 3
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802073367
File-URL: http://hdl.handle.net/10.1080/09546550802073367
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:3:p:415-433



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_319631_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Zimmerman
Author-X-Name-First: John
Author-X-Name-Last: Zimmerman
Title: A Review of: “Islam and War: A Review Essay”
Journal: 
Pages: 434-438
Issue: 3
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802194643
File-URL: http://hdl.handle.net/10.1080/09546550802194643
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:3:p:434-438



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_319632_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Zimmerman
Author-X-Name-First: John
Author-X-Name-Last: Zimmerman
Title: A Review of: “John F. Murphy. .”
Journal: 
Pages: 438-439
Issue: 3
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802194650
File-URL: http://hdl.handle.net/10.1080/09546550802194650
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:3:p:438-439



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_319633_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alisa Stack-O'Connor
Author-X-Name-First: Alisa
Author-X-Name-Last: Stack-O'Connor
Title: A Review of: “Abdulla, Rasha. .”
Journal: 
Pages: 440-441
Issue: 3
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802194668
File-URL: http://hdl.handle.net/10.1080/09546550802194668
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:3:p:440-441



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_319634_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Helen Jones
Author-X-Name-First: Helen
Author-X-Name-Last: Jones
Title: A Review of: “Brynjar Lia. .”
Journal: 
Pages: 441-442
Issue: 3
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802194676
File-URL: http://hdl.handle.net/10.1080/09546550802194676
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:3:p:441-442



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_319635_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alisa Stack-O'Connor
Author-X-Name-First: Alisa
Author-X-Name-Last: Stack-O'Connor
Title: A Review of: “Ronald J. Olive. .”
Journal: 
Pages: 442-443
Issue: 3
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802194684
File-URL: http://hdl.handle.net/10.1080/09546550802194684
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:3:p:442-443



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_319636_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mark Sedgwick
Author-X-Name-First: Mark
Author-X-Name-Last: Sedgwick
Title: A Review of: “James L. Gelvin. .”
Journal: 
Pages: 443-445
Issue: 3
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802194692
File-URL: http://hdl.handle.net/10.1080/09546550802194692
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:3:p:443-445



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_319637_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lawrence Rubin
Author-X-Name-First: Lawrence
Author-X-Name-Last: Rubin
Title: A Review of: “Fawaz A. Gerges. .”
Journal: 
Pages: 445-446
Issue: 3
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802194700
File-URL: http://hdl.handle.net/10.1080/09546550802194700
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:3:p:445-446



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_319638_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Zimmerman
Author-X-Name-First: John
Author-X-Name-Last: Zimmerman
Title: A Review of: “Mufti Muhammad Taqi Usmani. ,”
Journal: 
Pages: 446-448
Issue: 3
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802194718
File-URL: http://hdl.handle.net/10.1080/09546550802194718
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:3:p:446-448



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_319640_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Youssef Aboul-Enein
Author-X-Name-First: Youssef
Author-X-Name-Last: Aboul-Enein
Title: A Review of: “Robert G. Rabil. Foreword by Walid Phares. .”
Journal: 
Pages: 448-449
Issue: 3
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802194734
File-URL: http://hdl.handle.net/10.1080/09546550802194734
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:3:p:448-449



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_319642_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Noam Schimmel
Author-X-Name-First: Noam
Author-X-Name-Last: Schimmel
Title: A Review of: “John Mearsheimer and Stephen Walt. .”
Journal: 
Pages: 449-452
Issue: 3
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802194759
File-URL: http://hdl.handle.net/10.1080/09546550802194759
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:3:p:449-452



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_319643_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Youssef Aboul-Enein
Author-X-Name-First: Youssef
Author-X-Name-Last: Aboul-Enein
Title: A Review of: “Mary Habeck. .”
Journal: 
Pages: 452-454
Issue: 3
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802194767
File-URL: http://hdl.handle.net/10.1080/09546550802194767
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:3:p:452-454



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_319644_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Zimmerman
Author-X-Name-First: John
Author-X-Name-Last: Zimmerman
Title: A Review of: “Hillel Schenker and Ziad Abu-Zayyad. ,”
Journal: 
Pages: 454-456
Issue: 3
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802194775
File-URL: http://hdl.handle.net/10.1080/09546550802194775
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:3:p:454-456



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_319645_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Zimmerman
Author-X-Name-First: John
Author-X-Name-Last: Zimmerman
Title: A Review of: “Raphael Israeli. ,”
Journal: 
Pages: 456-457
Issue: 3
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802194783
File-URL: http://hdl.handle.net/10.1080/09546550802194783
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:3:p:456-457



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_319647_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Wallis
Author-X-Name-First: John
Author-X-Name-Last: Wallis
Title: A Review of: “Jack Nelson-Pallmeyer. .”
Journal: 
Pages: 458-459
Issue: 3
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802194809
File-URL: http://hdl.handle.net/10.1080/09546550802194809
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:3:p:458-459

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_325883_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lisa Blaydes
Author-X-Name-First: Lisa
Author-X-Name-Last: Blaydes
Author-Name: Lawrence Rubin
Author-X-Name-First: Lawrence
Author-X-Name-Last: Rubin
Title: Ideological Reorientation and Counterterrorism: Confronting Militant Islam in Egypt
Abstract: During the 1990s, Egypt fought a bitter campaign against militant Islamist groups in which over a thousand people died. Since the end of the insurgency in 1997, Egypt's two fiercest Islamic terrorist groups, first the Islamic Group (Al-Gama‘a Al-Islamiyya) and then Islamic Jihad, not only ceased their violent activities but also produced and published texts revising their religious beliefs on the use of violence. Based on the counterterrorism experience of Egypt, this paper defines and describes a counterterrorism strategy of ideological reorientation. We define ideological reorientation as a counterterrorism approach that seeks to change core ideological or religious beliefs of the terrorist group, thus bringing the beliefs of group members in line with societal norms. While we cannot causally attribute the groups' decisions to lay down arms to ideological reorientation versus other regime actions (like repression), the Egyptian experience is highly suggestive. First, it indicates that the ideology of religiously-based groups is not exogenous and fixed, as is often assumed, but rather endogenous and flexible. Second, the Egyptian experience suggests that ideological reorientation may be more effective at stemming militancy in the long run compared to rival approaches.
Journal: Terrorism and Political Violence
Pages: 461-479
Issue: 4
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802257168
File-URL: http://hdl.handle.net/10.1080/09546550802257168
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:4:p:461-479



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_325887_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Muhammad Bakashmar
Author-X-Name-First: Muhammad
Author-X-Name-Last: Bakashmar
Title: Winning the Battles, Losing the War? An Assessment of Counterterrorism in Malaysia
Abstract: This work addresses the structural weaknesses that threaten to derail counterterrorism efforts by the Malaysian government. It also highlights the links between various pre-September 11 security issues in Southeast Asia and the terrorism threat facing Malaysia at present. The limitations of the current counterterrorism approach by the government are highlighted. In addition, the paper identifies structural problems such as systemic corruption, weaknesses in border security, and inadequate private sector regulation as key areas of concern. The paper concludes by highlighting the symbiotic relationship between a successful counterterrorism campaign and the rule of law.
Journal: Terrorism and Political Violence
Pages: 480-497
Issue: 4
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802257200
File-URL: http://hdl.handle.net/10.1080/09546550802257200
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:4:p:480-497



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_325888_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Oldrich Bures
Author-X-Name-First: Oldrich
Author-X-Name-Last: Bures
Title: Europol's Fledgling Counterterrorism Role
Abstract: This article offers an analysis of Europol's counterterrorism role. Based on official EU documents, internal reports, and secondary sources, it dissects the contemporary counterterrorism activities of both Europol and the informal arrangements outside of the EU structure that are frequently utilized by some EU Member States. Although Europol does not perform any indispensable counterterrorism functions at the moment due to its limited powers and lack of trust from national agencies, the author contends that Europol has the potential to make a substantial contribution to the fight against terrorism.
Journal: Terrorism and Political Violence
Pages: 498-517
Issue: 4
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802257218
File-URL: http://hdl.handle.net/10.1080/09546550802257218
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:4:p:498-517



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_325889_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Brynjar Lia
Author-X-Name-First: Brynjar
Author-X-Name-Last: Lia
Title: Doctrines for Jihadi Terrorist Training
Abstract: Based on an in-depth review of jihadi discourse on terrorist training and preparation, this article finds considerable differences between leading jihadi theorists on issues such as how training should be defined, its ultimate purpose, and where and how to prepare jihadi fighters. However, they all agree on the importance of training, and that ideological indoctrination and spiritual preparation should take precedence over physical and military training. The preparatory process must produce battle-hardened, martyrdom-seeking fighters, whose primary strength lies in their spiritual determination, their patience, and a willingess to employ savagery against the enemy.
Journal: Terrorism and Political Violence
Pages: 518-542
Issue: 4
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802257226
File-URL: http://hdl.handle.net/10.1080/09546550802257226
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:4:p:518-542



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_325891_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Truls Tønnessen
Author-X-Name-First: Truls
Author-X-Name-Last: Tønnessen
Title: Training on a Battlefield: Iraq as a Training Ground for Global Jihadis
Abstract: This article aims to describe and analyze the training that foreign jihadis in Iraq have received, how this may impact on the future of the insurgency in Iraq, and the potential spillover effect from the Iraqi jihad scene. The nature of the training in Iraq has been influenced by the difficult conditions the jihadis were operating under, and much has consisted of on-the-job training inside safe houses. The foreign jihadis were dependent on the support of the local Iraqis in order to conduct training, but the increasing use of suicide attacks has turned their erstwhile allies against them.
Journal: Terrorism and Political Violence
Pages: 543-562
Issue: 4
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802257242
File-URL: http://hdl.handle.net/10.1080/09546550802257242
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:4:p:543-562



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_325896_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: James Gelvin
Author-X-Name-First: James
Author-X-Name-Last: Gelvin
Title: Al-Qaeda and Anarchism: A Historian's Reply to Terrorology
Abstract: This article situates al-Qaeda and similar jihadi movements within the category of anarchism. In so doing, it challenges the central pillar of the terrorology paradigm: the notion that terrorism is useful as an independent unit of analysis. The article takes a two-fold approach; in the first part, it offers a five-part definition of anarchism, based on the literature in the fields of history, political science, and sociology. Anarchism is distinguished by five characteristics: First, anarchism is an episodic discourse which provides its adherents with a prescription for action and which has been consistently available to, but only sometimes adopted by, political actors in the modern world. Second, anarchism makes for itself the claim of being defensive in nature. Third, anarchism is anti-systemic; i.e., the target of anarchist grievances is the very system (the nation-state system, capitalism) anarchists view as the source of oppression. Fourth, by “othering” the source of oppression, anarchists delineate, either implicitly or explicitly, an ideal counter-community. Finally, unlike the disarticulated domain of, for example, scientific socialism, the discursive field of anarchism draws heavily from the specific cultural milieu from which it springs. The second part of the article examines al-Qaeda and similar movements in terms of these five characteristics, contrasts al-Qaeda with other organizations (Hamas, Hizbullah) which have often been conflated with al-Qaeda under the terrorist rubric, and argues that, based on those characteristics, al-Qaeda does not represent a new or sui generis phenomenon, but rather fits squarely into the anarchist mold.
Journal: Terrorism and Political Violence
Pages: 563-581
Issue: 4
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802257291
File-URL: http://hdl.handle.net/10.1080/09546550802257291
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:4:p:563-581



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_325899_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Leonard Binder
Author-X-Name-First: Leonard
Author-X-Name-Last: Binder
Title: Comment on Gelvin's Essay on Al-Qaeda and Anarchism
Journal: Terrorism and Political Violence
Pages: 582-588
Issue: 4
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802257325
File-URL: http://hdl.handle.net/10.1080/09546550802257325
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:4:p:582-588



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_325900_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard Jensen
Author-X-Name-First: Richard
Author-X-Name-Last: Jensen
Title: Nineteenth Century Anarchist Terrorism: How Comparable to the Terrorism of al-Qaeda?
Journal: Terrorism and Political Violence
Pages: 589-596
Issue: 4
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802257333
File-URL: http://hdl.handle.net/10.1080/09546550802257333
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:4:p:589-596



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_325902_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: George Esenwein
Author-X-Name-First: George
Author-X-Name-Last: Esenwein
Title: Comments on James L. Gelvin's “Al-Qaeda and Anarchism: A Historian's Reply to Terrorology”
Journal: Terrorism and Political Violence
Pages: 597-600
Issue: 4
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802257358
File-URL: http://hdl.handle.net/10.1080/09546550802257358
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:4:p:597-600



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_325905_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Kelsay
Author-X-Name-First: John
Author-X-Name-Last: Kelsay
Title: Al-Qaida as a Muslim (Religio-Political) Movement Remarks on James L. Gelvin's “Al-Qaeda and Anarchism: A Historian's Reply to Terrorology”
Journal: Terrorism and Political Violence
Pages: 601-605
Issue: 4
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802257382
File-URL: http://hdl.handle.net/10.1080/09546550802257382
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:4:p:601-605



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_325906_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: James Gelvin
Author-X-Name-First: James
Author-X-Name-Last: Gelvin
Title: Al-Qaeda and Anarchism: A Historian's Reply to Terrorology: Response to Commentaries
Journal: Terrorism and Political Violence
Pages: 606-611
Issue: 4
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802257390
File-URL: http://hdl.handle.net/10.1080/09546550802257390
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:4:p:606-611



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_342830_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Noam Schimmel
Author-X-Name-First: Noam
Author-X-Name-Last: Schimmel
Title: A Review of: “Scott Straus. ”
Journal: 
Pages: 612-616
Issue: 4
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802426623
File-URL: http://hdl.handle.net/10.1080/09546550802426623
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:4:p:612-616



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_342851_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel Turack
Author-X-Name-First: Daniel
Author-X-Name-Last: Turack
Title: A Review of: “John Davis, ed. .”
Journal: 
Pages: 616-618
Issue: 4
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802426839
File-URL: http://hdl.handle.net/10.1080/09546550802426839
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:4:p:616-618



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_342852_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Noam Schimmel
Author-X-Name-First: Noam
Author-X-Name-Last: Schimmel
Title: A Review of: “Jared Cohen. .”
Journal: 
Pages: 618-621
Issue: 4
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802426847
File-URL: http://hdl.handle.net/10.1080/09546550802426847
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:4:p:618-621



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_342868_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alisa Stack-O'Connor
Author-X-Name-First: Alisa
Author-X-Name-Last: Stack-O'Connor
Title: A Review of: “Nacos, Brigitte L. . Centre of Excellence Defense Against Terrorism. .”
Journal: 
Pages: 621-623
Issue: 4
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802427001
File-URL: http://hdl.handle.net/10.1080/09546550802427001
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:4:p:621-623



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_342873_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alisa Stack-O'Connor
Author-X-Name-First: Alisa
Author-X-Name-Last: Stack-O'Connor
Title: A Review of: “Kenneth Allard. .”
Journal: 
Pages: 624-625
Issue: 4
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802427050
File-URL: http://hdl.handle.net/10.1080/09546550802427050
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:4:p:624-625



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_342876_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Horgan
Author-X-Name-First: John
Author-X-Name-Last: Horgan
Title: A Review of: “Gabriel Weimann. .”
Journal: 
Pages: 625-627
Issue: 4
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802427084
File-URL: http://hdl.handle.net/10.1080/09546550802427084
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:4:p:625-627



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_342878_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anar Valliyev
Author-X-Name-First: Anar
Author-X-Name-Last: Valliyev
Title: A Review of: “Kepel, Gilles. . Samad, Yunas and Sen, Kasturai. . Hahn, Gordon. . Russell, John. ”
Journal: 
Pages: 627-631
Issue: 4
Volume: 20
Year: 2008
X-DOI: 10.1080/09546550802427100
File-URL: http://hdl.handle.net/10.1080/09546550802427100
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:20:y:2008:i:4:p:627-631

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_354606_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Silvestri
Author-X-Name-First: Michael
Author-X-Name-Last: Silvestri
Title: The Bomb, , and Dan Breen: Terrorism in Bengal and Its Relation to the European Experience
Abstract: This article will analyze several issues relating to terrorism in colonial India, focusing on the province of Bengal from the early 1900s to the mid-1930s. First, I will analyze the composition of Bengali revolutionary organizations. Although Bengali revolutionary terrorism was not a mass movement, I argue that there was greater diversity in the movement's social and religious composition, and in the outlook of its members, than is often assumed. Second, I will examine the question of indigenous versus foreign influences on Indian terrorism. Terrorism in Bengal and elsewhere in colonial India was diverse in its inspirations, drawing upon indigenous resistance to colonial rule, and Hindu religious imagery, as well as European anarchist, nationalist, and socialist movements. Lastly, I will consider some of the ways in which the revolutionary movement changed over its thirty-year history and conclude with a brief discussion of the colonial response to Bengali terrorism. Bengali terrorists' adaptation and re-fashioning of ideas and tactics in a colonial context illustrate the widespread networks of exchange within the British Empire.
Journal: Terrorism and Political Violence
Pages: 1-27
Issue: 1
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550802544383
File-URL: http://hdl.handle.net/10.1080/09546550802544383
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:1:p:1-27



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_354610_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Karen Rasler
Author-X-Name-First: Karen
Author-X-Name-Last: Rasler
Author-Name: William Thompson
Author-X-Name-First: William
Author-X-Name-Last: Thompson
Title: Looking for Waves of Terrorism
Abstract: This article uses ITERATE data on international terrorism 1968–2004 to test Rapoport's wave-like behavior of modern terrorism. While the interpretation encompasses a much longer period of time than can be tested empirically with readily available data, it is possible to examine the past 3–4 decades of terrorist activity for traces of the coming and going of old and new groups. The article codes the type of group (anarchists, nationalists, leftists/Marxists, and religious fundamentalists) and then examines the type of tactics employed, deaths, and targets across time. The results confirm the presence of heterogeneous, wave-like behavior that conforms to the Rapoport interpretation as new and old groups/tactics/issues cycle in and out of activity.
Journal: Terrorism and Political Violence
Pages: 28-41
Issue: 1
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550802544425
File-URL: http://hdl.handle.net/10.1080/09546550802544425
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:1:p:28-41



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_354633_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andreas Feldmann
Author-X-Name-First: Andreas
Author-X-Name-Last: Feldmann
Author-Name: Victor Hinojosa
Author-X-Name-First: Victor
Author-X-Name-Last: Hinojosa
Title: Terrorism in Colombia: Logic and Sources of a Multidimensional and Ubiquitous Phenomenon
Abstract: This article examines contemporary uses of terrorism in Colombia. Combining an historical analysis with the most complete database available on political violence, we illustrate how terrorism in Colombia constitutes a specific strategy that can be distinguished from other manifestations of violence. We argue that Colombia's non-state armed groups have turned terrorism into a pivotal element of their repertoires of action. These parties have not only increased their reliance on this strategy and introduced more refined forms such as de-territorialized terrorism, but also have specialized in particular terrorist attacks that suit their general objectives. While paramilitary groups rely mostly on massacres and forced disappearance, guerrillas concentrate on agitational terrorism including kidnappings and indiscriminate bombings.
Journal: Terrorism and Political Violence
Pages: 42-61
Issue: 1
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550802544656
File-URL: http://hdl.handle.net/10.1080/09546550802544656
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:1:p:42-61



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_354637_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: James Piazza
Author-X-Name-First: James
Author-X-Name-Last: Piazza
Title: Is Islamist Terrorism More Dangerous?: An Empirical Study of Group Ideology, Organization, and Goal Structure
Abstract: Scholars have traditionally argued that Islamist terrorist groups tend to commit higher casualty attacks. Noting that casualty rates of attacks vary widely across Islamist terrorist groups, this study advances an alternative hypothesis that group organizational features and goal structures better explain differing casualty rates than does the overarching ideological type. Using both cross-national analysis and a case study of post-invasion Iraq, I demonstrate that there are two basic types of Islamist terrorist groups whose organizational and goal-structure features explain divergent casualty rates: “strategic groups” that function similarly to secular national-liberation and regime-change movements and “abstract/universal groups” that are affiliated with the global al-Qaeda network.
Journal: Terrorism and Political Violence
Pages: 62-88
Issue: 1
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550802544698
File-URL: http://hdl.handle.net/10.1080/09546550802544698
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:1:p:62-88



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_354654_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard Jensen
Author-X-Name-First: Richard
Author-X-Name-Last: Jensen
Title: The International Campaign Against Anarchist Terrorism, 1880–1930s
Abstract: This essay presents a short overview of the “classic” era of anarchist terrorism between 1880 and World War I, while concentrating on an analysis of the little-known efforts by diplomats, politicians, and the police to control and repress anarchist terrorism. These efforts included the Rome Anti-Anarchist Conference of 1898 and the St. Petersburg Protocol of 1904. Before World War I, a combination of economic, social, and political factors, combined with a systematic government effort to redefine and downplay the nature and importance of anarchist terrorism provides the best explanation for why this form of violence declined in certain countries but not in others. Careful police intelligence work and international police cooperation, together with a more rigorously professional system of protection for monarchs and heads of state, could aid in reducing the problem of anarchist terrorism, but heavy-handed repression only worsened it. The essay concludes with a sketch of anarchist terrorism after 1914 and a brief comparison between present-day terrorism and its nineteenth-century predecessor.
Journal: Terrorism and Political Violence
Pages: 89-109
Issue: 1
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550802544862
File-URL: http://hdl.handle.net/10.1080/09546550802544862
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:1:p:89-109



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_355353_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gonzalo Vargas
Author-X-Name-First: Gonzalo
Author-X-Name-Last: Vargas
Title: Urban Irregular Warfare and Violence Against Civilians: Evidence From a Colombian City
Abstract: This article uses the analytical model put forward by Kalyvas in his Logic of Violence in Civil War to explore the violent transition experienced by Barrancabermeja from 1998 onwards, when the increasing insurgent presence was curbed by paramilitary groups and government forces. While the model sheds light on the causal mechanisms that led to violence against civilians, it fails to predict some of the observed outcomes; these anomalies are discussed with a view to expanding its explanatory power. Furthermore, the paper highlights the relevance of socioeconomic factors and spatial segregation in predicting the distribution of violence.
Journal: Terrorism and Political Violence
Pages: 110-132
Issue: 1
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550802551859
File-URL: http://hdl.handle.net/10.1080/09546550802551859
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:1:p:110-132



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_356003_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jessie Blackbourn
Author-X-Name-First: Jessie
Author-X-Name-Last: Blackbourn
Title: International Terrorism and Counterterrorist Legislation: The Case Study of Post-9/11 Northern Ireland
Abstract: Since September 11, 2001 the threat from international terrorism has led to a greatly increased programme of counterterrorism legislation from the British government, yet it has contradictorily introduced legislation aimed at normalizing society in Northern Ireland. Prime Minister Tony Blair led the way in proclaiming differences between terrorism related to Northern Ireland and terrorism that is international in scope in order to create and enact a two-tier system of terrorism legislation in the United Kingdom. This article will examine Blair's decade in power and his role in distinguishing between, and legislating differently for, the two forms of terrorism.
Journal: Terrorism and Political Violence
Pages: 133-154
Issue: 1
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550802558359
File-URL: http://hdl.handle.net/10.1080/09546550802558359
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:1:p:133-154



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_358925_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Veronica Kitchen
Author-X-Name-First: Veronica
Author-X-Name-Last: Kitchen
Author-Name: Karthika Sasikumar
Author-X-Name-First: Karthika
Author-X-Name-Last: Sasikumar
Title: Canada (En)Counters Terrorism: U.S.-Canada Relations and Counter-terrorism Policy
Abstract: This paper examines the role of identity in shaping counter-terrorism policy in Canada. We show that identity functions in three ways: constitutively by defining the range of choices a state is likely to consider; strategically by being a resource to buttress arguments based in economic or sovereignty interests; and heuristically by using identity as a marker for risk. This three-faceted explanation helps explain why, despite close economic, social, and political links between Canada and the United States which might lead us to expect Canada to follow American counter-terrorism policy, Canadian counter-terrorism policy often diverges from the American lead.
Journal: Terrorism and Political Violence
Pages: 155-173
Issue: 1
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550802587572
File-URL: http://hdl.handle.net/10.1080/09546550802587572
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:1:p:155-173



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_364600_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Shahid Bux
Author-X-Name-First: Shahid
Author-X-Name-Last: Bux
Title: A Review of: “Rik Coolsaet, ed. ”
Journal: 
Pages: 174-177
Issue: 1
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550802644308
File-URL: http://hdl.handle.net/10.1080/09546550802644308
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:1:p:174-177



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_364601_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Leena Malkki
Author-X-Name-First: Leena
Author-X-Name-Last: Malkki
Title: A Review of: “Seth G. Jones and Martin C. Libicki. .”
Journal: 
Pages: 177-178
Issue: 1
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550802644316
File-URL: http://hdl.handle.net/10.1080/09546550802644316
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:1:p:177-178



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_364602_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Martin Durham
Author-X-Name-First: Martin
Author-X-Name-Last: Durham
Title: A Review of: “George Michael. .”
Journal: 
Pages: 178-179
Issue: 1
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550802644324
File-URL: http://hdl.handle.net/10.1080/09546550802644324
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:1:p:178-179



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_364603_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: George Michael
Author-X-Name-First: George
Author-X-Name-Last: Michael
Title: A Review of: “Adam Dolnik. .”
Journal: 
Pages: 179-182
Issue: 1
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550802644332
File-URL: http://hdl.handle.net/10.1080/09546550802644332
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:1:p:179-182



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_364605_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Christopher Costa
Author-X-Name-First: Christopher
Author-X-Name-Last: Costa
Title: A Review of: “John Borgonovo. .”
Journal: 
Pages: 182-184
Issue: 1
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550802644357
File-URL: http://hdl.handle.net/10.1080/09546550802644357
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:1:p:182-184



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_364606_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Olivia Allison
Author-X-Name-First: Olivia
Author-X-Name-Last: Allison
Title: A Review of: “Martin I. Wayne. .”
Journal: 
Pages: 184-185
Issue: 1
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550802644365
File-URL: http://hdl.handle.net/10.1080/09546550802644365
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:1:p:184-185



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_364608_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Fred Wehling
Author-X-Name-First: Fred
Author-X-Name-Last: Wehling
Title: A Review of: “Jack Caravelli. .”
Journal: 
Pages: 185-187
Issue: 1
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550802644381
File-URL: http://hdl.handle.net/10.1080/09546550802644381
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:1:p:185-187

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_354624_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Stuart Wright
Author-X-Name-First: Stuart
Author-X-Name-Last: Wright
Title: Strategic Framing of Racial-Nationalism in North America and Europe: An Analysis of a Burgeoning Transnational Network
Abstract: Following the deadly Oklahoma City bombing in 1995, far-right racialist leaders responded rapidly to changes in the political environment, disavowing militia and Patriot violence and exploiting increased public concerns about immigration and the growth of nonwhite populations. Evidence suggests that Patriot movement demobilization may have actually helped to swell the ranks of racial-nationalists. As attention to political violence shifted to international terrorism in the aftermath of September 11, racial-nationalist movement actors again moved quickly to seize the opportunity. The strategic framing of the crisis by racial-nationalist leaders revealed the existence of a transnational network of allies promoting a two-pronged message, 1) a virulent anti-Semitic assault on pro-Israel U.S. foreign policy and 2) a broadside on immigration and multiculturalism. The lineaments of these transnational networks are analyzed in an effort to explain a “trajectory of contention” regarding this emergent movement. Possible links between racial-nationalists and Islamic militants are also explored.
Journal: Terrorism and Political Violence
Pages: 189-210
Issue: 2
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550802544565
File-URL: http://hdl.handle.net/10.1080/09546550802544565
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:2:p:189-210



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_354651_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Christopher Hewitt
Author-X-Name-First: Christopher
Author-X-Name-Last: Hewitt
Author-Name: Jessica Kelley-Moore
Author-X-Name-First: Jessica
Author-X-Name-Last: Kelley-Moore
Title: Foreign Fighters in Iraq: A Cross-National Analysis of Jihadism
Abstract: Statistics on the national origin of almost one thousand killed and captured foreign fighters in Iraq reveal noticeable differences among Muslim majority countries in their jihadism rate (number of fighters/million population). These cross-national differences are used to test different theories as to the causes of Islamist extremism. The findings do not support those theories which see the cause of jihadism in the political and economic failures of Muslim societies, since the foreign fighters come from the more developed countries. The foreign fighters also come from the more religious societies, and from those societies “occupied” by U.S. or Israeli military forces.
Journal: Terrorism and Political Violence
Pages: 211-220
Issue: 2
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550802544839
File-URL: http://hdl.handle.net/10.1080/09546550802544839
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:2:p:211-220



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_354652_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ron Schleifer
Author-X-Name-First: Ron
Author-X-Name-Last: Schleifer
Title: Psyoping Hezbollah: The Israeli Psychological Warfare Campaign During the 2006 Lebanon War
Abstract: The 2006 War between Israel and Hezbollah had a significant component of PSYOP. For the first time in its military history Israel deployed PSYOP as an inseparable part of its military operations. The performance of the PSYOP unit was less than satisfactory due to organizational factors and the general conduct of the war itself. This article analyzes the goals, the themes, and the delivery channels used throughout the PSYOP campaign. An attempt is made to answer the key question of whether this effort was effective.
Journal: Terrorism and Political Violence
Pages: 221-238
Issue: 2
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550802544847
File-URL: http://hdl.handle.net/10.1080/09546550802544847
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:2:p:221-238



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_376720_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sophia Moskalenko
Author-X-Name-First: Sophia
Author-X-Name-Last: Moskalenko
Author-Name: Clark McCauley
Author-X-Name-First: Clark
Author-X-Name-Last: McCauley
Title: Measuring Political Mobilization: The Distinction Between Activism and Radicalism
Abstract: In this paper we review and extend measures of political mobilization: the increasing extremity of beliefs, feelings, and behaviors in support of inter-group conflict. Building on previous research, we introduce the Activism and Radicalism Intention Scales (ARIS). The Activism Intention Scale assesses readiness to participate in legal and non-violent political action, whereas the Radicalism Intention Scale assesses readiness to participate in illegal or violent political action. In ad-hoc samples of U.S. and Ukrainian undergraduates, and in an Internet panel survey representative of the U.S. population, Activism and Radicalism intentions formed two correlated but distinguishable dimensions. The popular “conveyor belt” metaphor of radicalization (implying that activism leads easily to radicalism and that most radicals emerge from activism) found only mixed support in our results. Discussion suggests the potential usefulness of the ARIS for learning about how individuals move from political attitudes and beliefs to political action, including political violence and terrorism.
Journal: Terrorism and Political Violence
Pages: 239-260
Issue: 2
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550902765508
File-URL: http://hdl.handle.net/10.1080/09546550902765508
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:2:p:239-260



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_376726_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Boyle
Author-X-Name-First: Michael
Author-X-Name-Last: Boyle
Title: Bargaining, Fear, and Denial: Explaining Violence Against Civilians in Iraq 2004–2007
Abstract: From mid-2004 to mid-2007, the Iraq war was distinguished from other comparable insurgencies by its high rates of civilian victimization. This has been attributed to a number of different factors, including the role of Islamic fundamentalist groups such as al-Qaeda in Iraq as well as the regional ambitions of Iran and Syria. Using an unpublished dataset of violence in Iraq from 2003–2008 from the Iraq Body Count (IBC), this paper argues that the violence against civilians is best understood as a combination of three interacting logics—bargaining, fear, and denial—that are predominantly local in character. First, armed Iraqi actors bargained through violence both across and within sectarian communities, and were driven by mechanisms of outbidding and outflanking to escalate their attacks on civilians. Second, the pervasive fear about the future of the Iraqi state encouraged the “localization” of violence in Iraq, particularly in the emergence of a security dilemma and the proliferation of criminal and tribal actors. Finally, Islamist groups such as al-Qaeda in Iraq played the spoiler in Iraq, using mass-casualty attacks to generate fear among the population and deny U.S. efforts to build a functioning state. Only by addressing each of these three logics as part of its counter-insurgency strategy can the U.S. put an end to violence against civilians and develop the Iraqi state into a credible competitor for the loyalties of the population.
Journal: Terrorism and Political Violence
Pages: 261-287
Issue: 2
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550902765565
File-URL: http://hdl.handle.net/10.1080/09546550902765565
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:2:p:261-287



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_376731_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jannie Lilja
Author-X-Name-First: Jannie
Author-X-Name-Last: Lilja
Title: Trapping Constituents or Winning Hearts and Minds? Rebel Strategies to Attain Constituent Support in Sri Lanka
Abstract: Why do rebels choose violence over non-violent methods to attain the cooperation of their constituency in the war against the government? This article assesses the importance of rebels' dependency on constituent support through a case study of the LTTE in Sri Lanka. The empirical findings suggest that dependency largely results in non-violent measures. However, a multitude of passive coercion methods – broadly unaccounted for by existing theory – evolve over time in the form of territorial and social entrapments. This implies that rebels do not need the hearts and minds of their people to wage war at later stages of conflict. Time pressure, however, appears to result in violence.
Journal: Terrorism and Political Violence
Pages: 306-326
Issue: 2
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550902765615
File-URL: http://hdl.handle.net/10.1080/09546550902765615
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:2:p:306-326



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_376732_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: H. D. Munroe
Author-X-Name-First: H. D.
Author-X-Name-Last: Munroe
Title: The October Crisis Revisited: Counterterrorism as Strategic Choice, Political Result, and Organizational Practice
Abstract: Counterterrorism is generally understood in terrorism research as the product of rational strategic choice by governments. This is rarely the case, however: Strategic choice is often heavily circumscribed by the effects of crisis, when factors become significant drivers of government action. This paper uses the October Crisis of 1970 to demonstrate how the assumption of rational choice can be very misleading, and argues that scholarly research on counterterrorism needs a more nuanced understanding of how a governments' intent is translated into action.
Journal: Terrorism and Political Violence
Pages: 288-305
Issue: 2
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550902765623
File-URL: http://hdl.handle.net/10.1080/09546550902765623
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:2:p:288-305



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_376737_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Ellis van Courtland Moon
Author-X-Name-First: John
Author-X-Name-Last: Ellis van Courtland Moon
Title: A Review of: “Geoffrey Zubay et al., ”
Journal: 
Pages: 337-338
Issue: 2
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550902765672
File-URL: http://hdl.handle.net/10.1080/09546550902765672
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:2:p:337-338



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_376741_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nicholas Kiersey
Author-X-Name-First: Nicholas
Author-X-Name-Last: Kiersey
Title: A Review of: “Colin Mooers, ed., .”
Journal: 
Pages: 338-340
Issue: 2
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550902765714
File-URL: http://hdl.handle.net/10.1080/09546550902765714
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:2:p:338-340



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_376742_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alisa Stack-O'Connor
Author-X-Name-First: Alisa
Author-X-Name-Last: Stack-O'Connor
Title: A Review of: “Wenona Giles and Jennifer Hyndman, eds., ”
Journal: 
Pages: 340-341
Issue: 2
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550902765722
File-URL: http://hdl.handle.net/10.1080/09546550902765722
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:2:p:340-341



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_376743_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: George Michael
Author-X-Name-First: George
Author-X-Name-Last: Michael
Title: A Review of: “Martin Durham, ”
Journal: 
Pages: 341-343
Issue: 2
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550902765730
File-URL: http://hdl.handle.net/10.1080/09546550902765730
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:2:p:341-343



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_376745_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Shahid Bux
Author-X-Name-First: Shahid
Author-X-Name-Last: Bux
Title: A Review of: “Adam Dolnik, ”
Journal: 
Pages: 343-344
Issue: 2
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550902765755
File-URL: http://hdl.handle.net/10.1080/09546550902765755
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:2:p:343-344



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_376748_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Noam Schimmel
Author-X-Name-First: Noam
Author-X-Name-Last: Schimmel
Title: A Review of: “Daniela Kroslak, .”
Journal: 
Pages: 344-347
Issue: 2
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550902765789
File-URL: http://hdl.handle.net/10.1080/09546550902765789
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:2:p:344-347



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_376749_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard Whelan
Author-X-Name-First: Richard
Author-X-Name-Last: Whelan
Title: A Review of: “Proceedings of the NATO Advanced Research Workshop on , edited by Centre of Excellence”
Journal: 
Pages: 347-349
Issue: 2
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550902765797
File-URL: http://hdl.handle.net/10.1080/09546550902765797
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:2:p:347-349



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_376750_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Donald Denton
Author-X-Name-First: Donald
Author-X-Name-Last: Denton
Title: A Review of: “Jerrold M. Post, .”
Journal: 
Pages: 349-350
Issue: 2
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550902765805
File-URL: http://hdl.handle.net/10.1080/09546550902765805
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:2:p:349-350



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_376753_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Robert White
Author-X-Name-First: Robert
Author-X-Name-Last: White
Title: A Review of: “Anthony McIntyre, ”
Journal: 
Pages: 350-352
Issue: 2
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550902765839
File-URL: http://hdl.handle.net/10.1080/09546550902765839
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:2:p:350-352



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_376754_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mark Sedgwick
Author-X-Name-First: Mark
Author-X-Name-Last: Sedgwick
Title: A Review of: “Faisal Devji, .”
Journal: 
Pages: 352-354
Issue: 2
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550902765847
File-URL: http://hdl.handle.net/10.1080/09546550902765847
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:2:p:352-354



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_376756_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andrew Tan
Author-X-Name-First: Andrew
Author-X-Name-Last: Tan
Title: A Review of: “Jeffrey H. Norwitz, ed., .”
Journal: 
Pages: 354-356
Issue: 2
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550902765862
File-URL: http://hdl.handle.net/10.1080/09546550902765862
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:2:p:354-356



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_376757_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Ellis van Courtland Moon
Author-X-Name-First: John Ellis
Author-X-Name-Last: van Courtland Moon
Title: A Review of: “Yonah Alexander and Michael B. Kraft. ”
Journal: 
Pages: 356-357
Issue: 2
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550902765870
File-URL: http://hdl.handle.net/10.1080/09546550902765870
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:2:p:356-357



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_377369_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Aaron Zelinsky
Author-X-Name-First: Aaron
Author-X-Name-Last: Zelinsky
Author-Name: Martin Shubik
Author-X-Name-First: Martin
Author-X-Name-Last: Shubik
Title: Research Note: Terrorist Groups as Business Firms: A New Typological Framework
Abstract: Existing typological frameworks do not adequately categorize terrorist groups by their operational characteristics. We propose a new framework which compares terrorist groups to business firms. In our framework, terrorist groups are mapped on two axes: centralization of resources and centralization of operations. We separate terrorist groups into four typologies echoing familiar business arrangements: Hierarchy, Venture Capital, Franchise, and Brand. Responses to each typology are briefly sketched out. We conclude by analyzing the changes in Al Qaeda over the last two decades in the context of our framework. We close by proposing appropriate policy responses to combat Al Qaeda in light of its current Brand typology.
Journal: Terrorism and Political Violence
Pages: 327-336
Issue: 2
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550902771993
File-URL: http://hdl.handle.net/10.1080/09546550902771993
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:2:p:327-336

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_395199_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andrea Talentino
Author-X-Name-First: Andrea
Author-X-Name-Last: Talentino
Title: Nation Building or Nation Splitting? Political Transition and the Dangers of Violence
Abstract: Internationally-directed nation building combines great rhetorical promise with very mixed practical outcomes. In spite of considerable optimism on the part of international actors, and in spite of often substantial desire for a functioning government among targeted populations, it has not clearly succeeded in building states or nations. The question is why? While many authors look to the weaknesses of international efforts for explanation, the answers may lie instead in the difficult process of transition itself. Although transforming political and social interactions is often necessary in post-conflict contexts, doing so can intensify vulnerabilities and uncertainties that prevent reforming governments from establishing legitimacy. That can in turn enable the fragmentation of political authority and become a sort of worst case scenario for nation building. International actors have shown no ability to counteract fragmentation and in some cases may unwittingly aid its entrenchment. One reason for this is that nation building strategies seldom take account of the hazards of transition, particularly the ways in which international preferences and domestic needs may clash. This article examines nation building within the context of political transition to assess how and when international efforts serve to unite or splinter state authority. It argues that the capacity to improve outcomes rests in better understanding the dynamics of transition, particularly the group vulnerabilities that reform exacerbates. Where nation building cannot counteract fragmentation it cannot succeed, but will serve rather to create contexts where political violence is both easier and more likely.
Journal: Terrorism and Political Violence
Pages: 378-400
Issue: 3
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550902950274
File-URL: http://hdl.handle.net/10.1080/09546550902950274
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:3:p:378-400



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_395200_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mikkel Thorup
Author-X-Name-First: Mikkel
Author-X-Name-Last: Thorup
Title: Enemy of Humanity: The Anti-Piracy Discourse in Present-Day Anti-Terrorism
Abstract: This article explores the anti-pirate discourse as a feature of the present war on terror and the more general connection between state and non-state violence. The anti-pirate discourse in ancient and early modern history is explored where piracy was one of the main threats coming from the private use of force. The anti-piracy reference is used in the present anti-terror discourse to open the way for a more militaristic approach to fighting terrorism centered around the concept of “enemy of humanity.” Naming the enemy as someone outside the reach of reason and of conventional warfare brands the enemy as fanatically intent on destruction for destruction's sake and a state's intention to fight the “war” dirty as the only route to success.
Journal: Terrorism and Political Violence
Pages: 401-411
Issue: 3
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550902950282
File-URL: http://hdl.handle.net/10.1080/09546550902950282
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:3:p:401-411



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_395201_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kristine Höglund
Author-X-Name-First: Kristine
Author-X-Name-Last: Höglund
Title: Electoral Violence in Conflict-Ridden Societies: Concepts, Causes, and Consequences
Abstract: What are the causes of electoral violence? And how does electoral violence influence conflict resolution and democracy? This article argues for a conceptualization of electoral violence as a specific sub-category of political violence, determined mainly by its timing and target. The enabling conditions and triggering factors can be identified in three main areas: 1) the nature of politics in conflict societies, 2) the nature of competitive elections, and 3) the incentives created by the electoral institutions. These clusters of factors are important for understanding electoral violence both between different societies and across elections in a specific country.
Journal: Terrorism and Political Violence
Pages: 412-427
Issue: 3
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550902950290
File-URL: http://hdl.handle.net/10.1080/09546550902950290
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:3:p:412-427



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_395202_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jennifer Webb
Author-X-Name-First: Jennifer
Author-X-Name-Last: Webb
Author-Name: Susan Cutter
Author-X-Name-First: Susan
Author-X-Name-Last: Cutter
Title: The Geography of U.S. Terrorist Incidents, 1970–2004
Abstract: This paper describes the spatio-temporal trends in terrorist incidents in the United States, from 1970 through 2004. Utilizing the Global Terrorism Database (GTD) and ancillary data, we examine both the frequency of incidents and their characteristics: location, target type, attack type, weapon type, and perpetrator group. While the frequency of terrorist incidents has declined since the 1970s, there still is significant activity nationwide. Instead of urban-rural or West Coast-East Coast divisions, the pattern is a more complex mosaic based on group identity, target, and weapon type. We conclude that there is an explicit geography of terrorism, one that is quite decentralized and highly localized.
Journal: Terrorism and Political Violence
Pages: 428-449
Issue: 3
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550902950308
File-URL: http://hdl.handle.net/10.1080/09546550902950308
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:3:p:428-449



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_395203_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bruce Hoffman
Author-X-Name-First: Bruce
Author-X-Name-Last: Hoffman
Title: A Counterterrorism Strategy for the Obama Administration
Abstract: This article assesses the scope and nature of the current terrorist threat to the United States and suggests a strategy to counter it. Al-Qaeda continues to pose the most serious terrorist threat to the U.S. today. If the September 11, 2001 attacks have taught us anything, it is that al-Qaeda is most dangerous when it has a sanctuary or safe haven from which to plan and plot attacks. Al-Qaeda has acquired such a sanctuary in Pakistan's Federal Administered Tribal Areas (FATA) and its North-West Frontier Province (NWFP) and surrounding environs. Accordingly, the highest priority for the new American presidential administration must be to refocus our—and our allies'—attention on Afghanistan and Pakistan, where al-Qaeda began to collapse after 2001, but has now re-grouped. This will entail understanding that al-Qaeda and its local militant jihadi allies cannot be defeated by military means alone. Success will require a dual strategy of systematically destroying and weakening enemy capabilities—that is, continuing to kill and capture al-Qaeda commanders and operatives—along with breaking the cycle of terrorist recruitment among radicalized “bunches of guys” as well as more effectively countering al-Qaeda's effective information operations. The U.S. thus requires a strategy that harnesses the overwhelming kinetic force of the American military as part of a comprehensive vision to transform other, non-kinetic instruments of national power in order to deal more effectively with irregular and unconventional threats. This article first discusses the scope and details of the terrorist threat today and then proposes a counterterrorism strategy for the new presidential administration. It focuses first on creating a micro approach to address the deteriorating situation in both Afghanistan and Pakistan. It then considers the requirements of a broader macro strategy to counter terrorism and insurgency.
Journal: Terrorism and Political Violence
Pages: 359-377
Issue: 3
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550902950316
File-URL: http://hdl.handle.net/10.1080/09546550902950316
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:3:p:359-377



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_395204_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joshua Freilich
Author-X-Name-First: Joshua
Author-X-Name-Last: Freilich
Author-Name: Steven Chermak
Author-X-Name-First: Steven
Author-X-Name-Last: Chermak
Author-Name: Joseph Simone
Author-X-Name-First: Joseph
Author-X-Name-Last: Simone
Title: Surveying American State Police Agencies About Terrorism Threats, Terrorism Sources, and Terrorism Definitions
Abstract: This study presents American state police agencies' perceptions about three significant terrorism and public safety issues. First, we asked about the threat posed by specified extremist groups nationally and to their state. We asked about the number of such groups and their supporters, and the number of activities each group participates in during a typical year in their state. We also asked about the number of criminal incidents each group commits and the number of their supporters arrested in a typical year. Second, we asked the agencies to rate the usefulness of fifteen specified terrorism sources. Third, we queried the agencies about their views of eight terrorism definitions. These data were collected by surveying the fifty state police agencies in the United States. We discovered widespread concern about the criminal activities of various extremist groups, with a particular concern about the threat of Islamic jihadists. Interestingly, although the top rated threat was Islamic jihadists, the respondents indicated that other types of groups were much more criminally active. Further, respondents indicated that various open and non-open sources were valuable terrorism sources. Finally, most respondents reacted more favorably to official terrorism definitions—especially the FBI's—as opposed to academic definitions. We conclude with a discussion of the policy implications of our findings and we outline directions for future research.
Journal: Terrorism and Political Violence
Pages: 450-475
Issue: 3
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550902950324
File-URL: http://hdl.handle.net/10.1080/09546550902950324
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:3:p:450-475



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_397188_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Vani Borooah
Author-X-Name-First: Vani
Author-X-Name-Last: Borooah
Title: Terrorist Incidents in India, 1998–2004: A Quantitative Analysis of Fatality Rates
Abstract: Using data from the University of Maryland's Global Terrorism Database II, this paper first provides information on the nature of terrorist incidents in India in the period 1998-2004: the Indian states that were worst affected by terrorist incidents and fatalities; the terrorist groups responsible for such incidents and their modus operandi. Next, the paper focuses on the issue of fatalities from terrorist incidents. It inquires into the extent to which the number of fatalities following an incident was influenced by the type of attack (bombings, armed assault, etc.) and the extent to which it was influenced by the type of terrorist group. By examining the number of fatalities resulting from terrorist attacks in India, the paper disentangles the influence on this number of attack type and attack group. Lastly, the paper applies Atkinson's concept of equality-adjusted income to terrorism to arrive at the concept of equality-adjusted deaths from terrorist incidents: in order to avoid spectacular incidents resulting in the loss of a large number of lives—as in New York on September 11, 2001 and in Mumbai 26–29 November 2008—“society” might be prepared to tolerate “low-grade” terrorism which resulted in a larger number of deaths in total but avoided a large number of deaths from a single iconic incident.
Journal: Terrorism and Political Violence
Pages: 476-498
Issue: 3
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550902970165
File-URL: http://hdl.handle.net/10.1080/09546550902970165
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:3:p:476-498



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_398576_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Karen Jacques
Author-X-Name-First: Karen
Author-X-Name-Last: Jacques
Author-Name: Paul Taylor
Author-X-Name-First: Paul
Author-X-Name-Last: Taylor
Title: Female Terrorism: A Review
Abstract: The sharp growth in the number of publications examining female involvement in terrorism has produced a valuable but un-integrated body of knowledge spread across many disciplines. In this paper, we bring together 54 publications on female terrorism and use qualitative and quantitative analyses to examine the range of theoretical and methodological approaches in these papers. Using a content analysis, we identify six primary research foci: Portrayal in media, Feminism, Interviews with terrorists, Group roles, Motivation and recruitment, and Environmental enablers. Results revealed a reliance on secondary rather than primary data, narrative rather than statistical comparisons, and descriptions rather than explanations of events.
Journal: Terrorism and Political Violence
Pages: 499-515
Issue: 3
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550902984042
File-URL: http://hdl.handle.net/10.1080/09546550902984042
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:3:p:499-515



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_398583_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Leonard Binder
Author-X-Name-First: Leonard
Author-X-Name-Last: Binder
Title: Christmas in Gaza: An Adventitious War?
Journal: Terrorism and Political Violence
Pages: 516-523
Issue: 3
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550902984117
File-URL: http://hdl.handle.net/10.1080/09546550902984117
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:3:p:516-523



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_405657_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kristian Alexander
Author-X-Name-First: Kristian
Author-X-Name-Last: Alexander
Title: A Review of: “Robert O. Marlin IV. .”
Journal: 
Pages: 526-528
Issue: 3
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550903054845
File-URL: http://hdl.handle.net/10.1080/09546550903054845
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:3:p:526-528



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_405946_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Zimmerman
Author-X-Name-First: John
Author-X-Name-Last: Zimmerman
Title: A Review of: “Gilles Kepel and Jean – Pierre Milelli, eds., ”
Journal: 
Pages: 528-530
Issue: 3
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550903057731
File-URL: http://hdl.handle.net/10.1080/09546550903057731
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:3:p:528-530



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_406032_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard Whelan
Author-X-Name-First: Richard
Author-X-Name-Last: Whelan
Title: A Review of: “Audrey Kurth Cronin. ”
Journal: 
Pages: 530-532
Issue: 3
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550903058598
File-URL: http://hdl.handle.net/10.1080/09546550903058598
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:3:p:530-532



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_406757_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Zimmerman
Author-X-Name-First: John
Author-X-Name-Last: Zimmerman
Title: A Reviews of: “Brynjar Lia, ” and “Jim Lacey, ed., ”
Journal: 
Pages: 532-537
Issue: 3
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550903065841
File-URL: http://hdl.handle.net/10.1080/09546550903065841
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:3:p:532-537



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_406828_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard English
Author-X-Name-First: Richard
Author-X-Name-Last: English
Title: A Review of: “Robert W. White. ”
Journal: 
Pages: 524-526
Issue: 3
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550903066559
File-URL: http://hdl.handle.net/10.1080/09546550903066559
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:3:p:524-526

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_415473_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Hartmut Behr
Author-X-Name-First: Hartmut
Author-X-Name-Last: Behr
Author-Name: Lars Berger
Author-X-Name-First: Lars
Author-X-Name-Last: Berger
Title: The Challenge of Talking about Terrorism: The EU and the Arab Debate on the Causes of Islamist Terrorism
Abstract: The Arab “hegemonic debate” on the causes of Islamist terrorism nurtures (pan-) Arab, anti-Western sentiments and delegitimizes criticism of the political status quo. The European Union's emphasis on multilateral means of conflict resolution and trade promotion leads to official pronouncements that barely address the Arab world's domestic problems, instead referring to international tensions such as the Arab-Israeli conflict as a particular cause of Islamist terrorism and the need for cooperation with Arab governments. By failing to challenge the official narratives of authoritarian Arab regimes the EU obstructs interests in the democratization of the region and the delegitimization of Islamist violence.
Journal: Terrorism and Political Violence
Pages: 539-557
Issue: 4
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550903153001
File-URL: http://hdl.handle.net/10.1080/09546550903153001
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:4:p:539-557



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_415486_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Humberto Trujillo
Author-X-Name-First: Humberto
Author-X-Name-Last: Trujillo
Author-Name: Javier Jordán
Author-X-Name-First: Javier
Author-X-Name-Last: Jordán
Author-Name: Jose Antonio Gutiérrez
Author-X-Name-First: Jose
Author-X-Name-Last: Antonio Gutiérrez
Author-Name: Joaquín González-Cabrera
Author-X-Name-First: Joaquín
Author-X-Name-Last: González-Cabrera
Title: Radicalization in Prisons? Field Research in 25 Spanish Prisons
Abstract: This article has two principal objectives: (1) to study the behavioral dimensions of Muslim prisoners which predict their Islamist radicalism and (2) to study whether the behavior manifested by them is higher in prisons with a greater concentration of Muslims and a higher presence of prisoners convicted for Islamist terrorism than in prisons with fewer Muslims and no convicted Islamist terrorists. We conclude that some Spanish prisons may provide favorable social environments for jihadist radicalism and that the questionnaire utilized is a useful diagnostic tool for evaluating the magnitude of this phenomenon.
Journal: Terrorism and Political Violence
Pages: 558-579
Issue: 4
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550903153134
File-URL: http://hdl.handle.net/10.1080/09546550903153134
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:4:p:558-579



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_415503_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marco Pinfari
Author-X-Name-First: Marco
Author-X-Name-Last: Pinfari
Title: Exploring the Terrorist Nature of Political Assassinations: A Reinterpretation of the Orsini Attentat
Abstract: This paper reassesses the suggestion, advanced among others by David George, that the 1858 failed attentat by the Italian patriot Felice Orsini against Napoleon III can be considered as a paradigmatic instance of “terrorist assassination.” Drawing on a new interpretation of the acts of Orsini's trial, the paper argues that Orsini's motivations were to a large degree “idiosyncratic”; however, it also discusses evidence suggesting that the significant collateral damage caused by the attack was, in Orsini's mind, one of the aims of the action and cannot be portrayed as unintended.
Journal: Terrorism and Political Violence
Pages: 580-594
Issue: 4
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550903153308
File-URL: http://hdl.handle.net/10.1080/09546550903153308
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:4:p:580-594



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_415512_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Luciana Fernández
Author-X-Name-First: Luciana
Author-X-Name-Last: Fernández
Title: Organized Crime and Terrorism: From the Cells Towards Political Communication, A Case Study
Abstract: During the first half of 2006 the city of São Paulo suffered three series of violent attacks against the security forces, civilians, and the government. The violent campaign also included a massive rebellion in prisons and culminated in the kidnapping of a journalist and the broadcast of a manifesto from the criminal organization PCC threatening the police and the government. Right after, the main device used to contain organized crime in the prisons was declared unconstitutional. This episode represents a prototypical example of the use of media-focused terrorism by organized crime for projection into the political communication arena.
Journal: Terrorism and Political Violence
Pages: 595-616
Issue: 4
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550903153399
File-URL: http://hdl.handle.net/10.1080/09546550903153399
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:4:p:595-616



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_415517_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Thomas Rid
Author-X-Name-First: Thomas
Author-X-Name-Last: Rid
Title: Razzia: A Turning Point in Modern Strategy
Abstract: The razzia, a tactic of swift and brutal raids used by the French military against recalcitrant tribes in Algeria in the 1840s, was a necessary step in modern military thought. At first glance the destructive and violent razzias stand in stark contrast to the constructive and non-violent bureaux arabes—an institutional ancestor of Provincial Reconstruction Teams. But both were developed in the same conflict and by the same men. These two innovations, this article argues, were also flipsides of the same coin: what today is called war “among the people.” The razzia consequently appears as a necessary historic precursor for contemporary counterinsurgency doctrine.
Journal: Terrorism and Political Violence
Pages: 617-635
Issue: 4
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550903153449
File-URL: http://hdl.handle.net/10.1080/09546550903153449
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:4:p:617-635



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_425835_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Robert White
Author-X-Name-First: Robert
Author-X-Name-Last: White
Title: Paul Wilkinson.  (Second Edition, 2006)
Journal: 
Pages: 636-638
Issue: 4
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550903256614
File-URL: http://hdl.handle.net/10.1080/09546550903256614
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:4:p:636-638



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_425836_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard Whelan
Author-X-Name-First: Richard
Author-X-Name-Last: Whelan
Title: A Review of: “Gilles Kepel. .”
Journal: 
Pages: 638-639
Issue: 4
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550903256622
File-URL: http://hdl.handle.net/10.1080/09546550903256622
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:4:p:638-639



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_425839_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kristian Alexander
Author-X-Name-First: Kristian
Author-X-Name-Last: Alexander
Title: A Review of: “Marc Sageman. ”
Journal: 
Pages: 639-642
Issue: 4
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550903256655
File-URL: http://hdl.handle.net/10.1080/09546550903256655
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:4:p:639-642



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_425840_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Christopher Costa
Author-X-Name-First: Christopher
Author-X-Name-Last: Costa
Title: A Review of: “Alfred G. Gerteiny. ”
Journal: 
Pages: 642-644
Issue: 4
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550903256663
File-URL: http://hdl.handle.net/10.1080/09546550903256663
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:4:p:642-644



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_425845_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tanya Narozhna
Author-X-Name-First: Tanya
Author-X-Name-Last: Narozhna
Title: A Review of: “Margaret Gonzalez-Perez. ”
Journal: 
Pages: 644-646
Issue: 4
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550903256713
File-URL: http://hdl.handle.net/10.1080/09546550903256713
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:4:p:644-646



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_425848_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: D. J. Mulloy
Author-X-Name-First: D. J.
Author-X-Name-Last: Mulloy
Title: A Review of: “Mike German. ”
Journal: 
Pages: 646-647
Issue: 4
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550903256747
File-URL: http://hdl.handle.net/10.1080/09546550903256747
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:4:p:646-647



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_425849_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: George Michael
Author-X-Name-First: George
Author-X-Name-Last: Michael
Title: A Review of: “Brian Michael Jenkins. ”
Journal: 
Pages: 647-649
Issue: 4
Volume: 21
Year: 2009
X-DOI: 10.1080/09546550903256754
File-URL: http://hdl.handle.net/10.1080/09546550903256754
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:21:y:2009:i:4:p:647-649

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_444881_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel Bessner
Author-X-Name-First: Daniel
Author-X-Name-Last: Bessner
Author-Name: Michael Stauch
Author-X-Name-First: Michael
Author-X-Name-Last: Stauch
Title: Karl Heinzen and the Intellectual Origins of Modern Terror
Abstract: Scholars have long recognized the importance of Karl Heinzen's Mord und Freiheit in the history of terrorist thought. Yet the translation most scholars have relied on—1881s Murder and Liberty—is incomplete. Our new translation reveals four elements omitted from the 1881 translation. First, Heinzen conceived of terrorism as a transnational phenomenon. Second, he provided a material justification for terrorist tactics. Third, Heinzen viewed terrorism as both a tool to impel human society to progress and as a “progressive” tool of violence. Finally, he argued in favor of the primary modern tactic of terrorism—the indiscriminate bombing of civilians.
Journal: Terrorism and Political Violence
Pages: 143-176
Issue: 2
Volume: 22
Year: 2010
X-DOI: 10.1080/09546550903445209
File-URL: http://hdl.handle.net/10.1080/09546550903445209
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:2:p:143-176



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_447603_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David Jones
Author-X-Name-First: David
Author-X-Name-Last: Jones
Author-Name: M. L. R. Smith
Author-X-Name-First: M. L. R.
Author-X-Name-Last: Smith
Title: Beyond Belief: Islamist Strategic Thinking and International Relations Theory
Abstract: The development of radical Islamist strategic thinking and the impact of post-modern, Western styles of thought upon the ideology that informs that strategy is often overlooked in conventional discussions of homegrown threats from jihadist militants. The propensity to discount the ideology informing both al-Qaeda and nominally non-violent Islamist movements with an analogous political philosophy like Hizb ut-Tahrir neglects the influence that critical Western modes of thought exercise upon their strategic thinking especially in the context of homegrown radicalization. Drawing selectively on non-liberal tendencies in the Western ideological canon has, in fact, endowed Khilaafaism (caliphism) with both a distinctive theoretical style and strategic practice. In particular, it derives intellectual sustenance from a post-Marxist Frankfurt School of critical thinking that in combination with an “English” School of international relations idealism holds that epistemological claims are socially determined, subjective, and serve the interests of dominant power relations. This critical, normative, and constructivist approach to international relations seeks not only to explain the historical emergence of the global order, but also to transcend it. This transformative agenda bears comparison with radical Islamist critiques of Western ontology and is of interest to Islamism's political and strategic thinking. In this regard, the relativist and critical approaches that have come to dominate the academic social sciences since the 1990s not only reflect a loss of faith in Western values in a way that undermines the prospects for a liberal and pluralist polity, but also, through a critical process facilitated by much international relations orthodoxy, promotes the strategic and ideological agenda of radical Islam. It is this curious strategic and ideological evolution that this paper explores.
Journal: Terrorism and Political Violence
Pages: 242-266
Issue: 2
Volume: 22
Year: 2010
X-DOI: 10.1080/09546550903472286
File-URL: http://hdl.handle.net/10.1080/09546550903472286
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:2:p:242-266



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_455952_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Kenney
Author-X-Name-First: Michael
Author-X-Name-Last: Kenney
Title: Beyond the Internet: , , and the Limitations of Online Artifacts for Islamist Terrorists
Abstract: This study challenges the conventional wisdom that the Internet is a reliable source of operational knowledge for terrorists, allowing them to train for terrorist attacks without access to real-world training camps and practical experience. The article distinguishes between abstract technical knowledge (what the Greeks called techne) and practical, experiential knowledge (mētis), investigating how each helps terrorists prepare for attacks. This distinction offers insight into how terrorists acquire the practical know-how they need to perform their activities as opposed to abstract know-what contained in bomb-making manuals. It also underscores the Internet's limitations as a source of operational knowledge for terrorists. While the Internet allows militants to share substantial techne, along with religious and ideological information, it is not particularly useful for disseminating the experiential and situational knowledge terrorists use to engage in acts of political violence. One likely reason why Al Qaeda and other Islamist terrorists have not made better use of the Internet's training potential to date is that its value as a source of operational knowledge of terrorism is limited.
Journal: Terrorism and Political Violence
Pages: 177-197
Issue: 2
Volume: 22
Year: 2010
X-DOI: 10.1080/09546550903554760
File-URL: http://hdl.handle.net/10.1080/09546550903554760
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:2:p:177-197



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_457939_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sabri Sayari
Author-X-Name-First: Sabri
Author-X-Name-Last: Sayari
Title: Political Violence and Terrorism in Turkey, 1976–80: A Retrospective Analysis
Abstract: During the late 1970s, Turkey experienced a major campaign of political terrorism that was waged by a multiplicity of leftist, ultranationalist, and separatist groups. Between 1976 and 1980, more than 5000 people lost their lives in hundreds of terrorist incidents. The steady escalation of violence amidst a major political and economic crisis undermined the country's fragile democratic system and paved the way for a military coup in September 1980. This study examines the origins and growth of the terrorist movement in Turkey, the main characteristics of political violence, and the causes of the dramatic escalation of terrorism in the late 1970s. The study suggests that although state-sponsored terrorism against Turkey facilitated the rapid proliferation of leftist, rightist, and separatist armed extremist groups, the drift into total terrorism was largely the product of domestic political and social developments.
Journal: Terrorism and Political Violence
Pages: 198-215
Issue: 2
Volume: 22
Year: 2010
X-DOI: 10.1080/09546550903574438
File-URL: http://hdl.handle.net/10.1080/09546550903574438
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:2:p:198-215



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_459525_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mauricio Florez-Morris
Author-X-Name-First: Mauricio
Author-X-Name-Last: Florez-Morris
Title: Why Some Colombian Guerrilla Members Stayed in the Movement Until Demobilization: A Micro-Sociological Case Study of Factors That Influenced Members' Commitment to Three Former Rebel Organizations: M-19, EPL, and CRS
Abstract: Based on 42 in-depth interviews with members of three former Colombian guerrilla organizations, M-19, EPL, and CRS, reasons why they stayed in these organizations through several years, if not decades, of violent confrontation with government forces are examined. From a micro-level perspective, the study identifies four important motivations for members to remain in these groups: personal dependence on their organization, values shared with other members and with the group, the clandestine life-style, and self-identity, which is boosted by the subjects' feeling that their work in the group matters.
Journal: Terrorism and Political Violence
Pages: 216-241
Issue: 2
Volume: 22
Year: 2010
X-DOI: 10.1080/09546551003590167
File-URL: http://hdl.handle.net/10.1080/09546551003590167
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:2:p:216-241



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_459983_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Horgan
Author-X-Name-First: John
Author-X-Name-Last: Horgan
Author-Name: Kurt Braddock
Author-X-Name-First: Kurt
Author-X-Name-Last: Braddock
Title: Rehabilitating the Terrorists?: Challenges in Assessing the Effectiveness of De-radicalization Programs
Abstract: Renewed interest on how and why terrorism ends has emerged in parallel with increased visibility of some new and innovative approaches to counterterrorism. These are collectively known, whether for good or bad, as “de-radicalization programs.” However, and despite their popularity, data surrounding even the most basic of facts about these programs remains limited. This article presents an overview of the results of a one-year pilot study of select de-radicalization programs and investigates critical issues surrounding assessment of their effectiveness and outcomes. We argue that Multi Attribute Utility Technology (MAUT) may offer promise for future empirical assessment of what we prefer to designate “terrorism risk reduction initiatives.” Perhaps less obviously, and until more data surrounding the efficacy of such initiatives becomes available, MAUT may also provide a conceptual basis for planning, evaluating, and guiding the development of future such initiatives and may have the unanticipated consequence of facilitating progress by encouraging greater exploration of efforts to change behavior from other contexts.
Journal: Terrorism and Political Violence
Pages: 267-291
Issue: 2
Volume: 22
Year: 2010
X-DOI: 10.1080/09546551003594748
File-URL: http://hdl.handle.net/10.1080/09546551003594748
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:2:p:267-291



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_460267_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Heather Gregg
Author-X-Name-First: Heather
Author-X-Name-Last: Gregg
Title: Fighting the Jihad of the Pen: Countering Revolutionary Islam's Ideology
Abstract: Al Qaeda's ideology is not new; their critique of the existing political and social order and vision for how to redeem the Muslim world builds on preexisting arguments of several 20th century predecessors who called for an Islamic revolution that would create a new order based on Islam. The persistence of revolutionary Islam suggests that these ideas need to be countered in order to strike at the root of the problem driving Islamically motivated terrorism and insurgency. U.S. efforts to defeat Al Qaeda, however, continue to focus primarily on killing or capturing the leadership, interdicting operations, and defensively bolstering the homeland and U.S. assets against various types of attacks. In order to confront Al Qaeda's ideology, U.S. efforts should focus on indirectly fostering “a market place of ideas”—the space and culture of questioning and debating—in order to challenge the grievances and solutions proposed by revolutionary Islam.
Journal: Terrorism and Political Violence
Pages: 292-314
Issue: 2
Volume: 22
Year: 2010
X-DOI: 10.1080/09546551003597584
File-URL: http://hdl.handle.net/10.1080/09546551003597584
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:2:p:292-314



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_462302_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Donald Denton
Author-X-Name-First: Donald
Author-X-Name-Last: Denton
Title: A Review of: “Curtis E. Cummings and Elisaveta Stikova (eds.). .”
Journal: 
Pages: 315-317
Issue: 2
Volume: 22
Year: 2010
X-DOI: 10.1080/09546551003617937
File-URL: http://hdl.handle.net/10.1080/09546551003617937
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:2:p:315-317



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_462305_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andrew Tan
Author-X-Name-First: Andrew
Author-X-Name-Last: Tan
Title: A Review of: “Hall Gardner. ”
Journal: 
Pages: 317-318
Issue: 2
Volume: 22
Year: 2010
X-DOI: 10.1080/09546551003617960
File-URL: http://hdl.handle.net/10.1080/09546551003617960
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:2:p:317-318



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_462307_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Max Taylor
Author-X-Name-First: Max
Author-X-Name-Last: Taylor
Title: A Review of: “James J. F. Forest (ed.). .”
Journal: 
Pages: 318-320
Issue: 2
Volume: 22
Year: 2010
X-DOI: 10.1080/09546551003617986
File-URL: http://hdl.handle.net/10.1080/09546551003617986
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:2:p:318-320



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_462309_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nori Katagiri
Author-X-Name-First: Nori
Author-X-Name-Last: Katagiri
Title: A Review of: “David H. Ucko. .”
Journal: 
Pages: 320-322
Issue: 2
Volume: 22
Year: 2010
X-DOI: 10.1080/09546551003618000
File-URL: http://hdl.handle.net/10.1080/09546551003618000
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:2:p:320-322



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_462310_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Douglas Byrd
Author-X-Name-First: Douglas
Author-X-Name-Last: Byrd
Title: A Review of: “Richard English. .”
Journal: 
Pages: 322-324
Issue: 2
Volume: 22
Year: 2010
X-DOI: 10.1080/09546551003618018
File-URL: http://hdl.handle.net/10.1080/09546551003618018
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:2:p:322-324



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_462314_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Noam Schimmel
Author-X-Name-First: Noam
Author-X-Name-Last: Schimmel
Title: A Review of: “Phil Clark and Zachary Kaufman. ”
Journal: 
Pages: 324-328
Issue: 2
Volume: 22
Year: 2010
X-DOI: 10.1080/09546551003618059
File-URL: http://hdl.handle.net/10.1080/09546551003618059
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:2:p:324-328



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_462316_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kurt Braddock
Author-X-Name-First: Kurt
Author-X-Name-Last: Braddock
Title: A Review of: “James F. Miskel. , ”
Journal: 
Pages: 328-329
Issue: 2
Volume: 22
Year: 2010
X-DOI: 10.1080/09546551003618075
File-URL: http://hdl.handle.net/10.1080/09546551003618075
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:2:p:328-329



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_462317_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Darren Mulloy
Author-X-Name-First: Darren
Author-X-Name-Last: Mulloy
Title: A Review of: “Gilles Dorronsoro. ”
Journal: 
Pages: 329-330
Issue: 2
Volume: 22
Year: 2010
X-DOI: 10.1080/09546551003618083
File-URL: http://hdl.handle.net/10.1080/09546551003618083
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:2:p:329-330



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_462322_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: M. Walker
Author-X-Name-First: M.
Author-X-Name-Last: Walker
Title: A Review of: “H. Dan O'Hair, Robert L. Heath, Kevin J. Ayotte, and Gerald R. Ledlow (eds.). ”
Journal: 
Pages: 330-332
Issue: 2
Volume: 22
Year: 2010
X-DOI: 10.1080/09546551003618133
File-URL: http://hdl.handle.net/10.1080/09546551003618133
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:2:p:330-332



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_462325_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: George Michael
Author-X-Name-First: George
Author-X-Name-Last: Michael
Title: A Review of: “Thomas Rid and Marc Hecker. ”
Journal: 
Pages: 332-334
Issue: 2
Volume: 22
Year: 2010
X-DOI: 10.1080/09546551003618166
File-URL: http://hdl.handle.net/10.1080/09546551003618166
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:2:p:332-334



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_462328_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Raffaello Pantucci
Author-X-Name-First: Raffaello
Author-X-Name-Last: Pantucci
Title: A Review of: “Stephen Grey. ”
Journal: 
Pages: 334-336
Issue: 2
Volume: 22
Year: 2010
X-DOI: 10.1080/09546551003618190
File-URL: http://hdl.handle.net/10.1080/09546551003618190
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:2:p:334-336

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_466656_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Simon Shen
Author-X-Name-First: Simon
Author-X-Name-Last: Shen
Author-Name: Peng Liu
Author-X-Name-First: Peng
Author-X-Name-Last: Liu
Title: Does Proximity Encourage Tolerance and Less State-Centrism?: Dismissing Monolithic Chinese Youth Perception of Terrorism and Security in a Comparative Regional Study
Abstract: After 9/11, the exact perception among young Chinese of terrorism and security is little known to the world. What are their views and how are they formed? Are there any obvious differences in perception between young Chinese in different parts of China? What causes this disparity, if there is any? Are these differences intentionally created by the Chinese party-state top-down, or are they only nurtured in a bottom-up, decentralized manner? Using primary research findings obtained from original quantitative surveys and qualitative analyses, this article attempts to offer an empirical answer to these questions. The article is arranged in three sections. The first provides a review of the literature on the topic and describes the research methodology used. The second offers an analysis of our survey findings on how university students from two different cities, Shanghai and Xi'an, evolve distinctive perceptions about terrorism and security. The third section explains the framework used to analyse our findings, which can be summarized as “the nearer, the more tolerant and the less state-centric” towards terrorist-related topics. A conclusion suggests the possible roles of—and wake-up calls for—the Chinese state and the media in light of these disparate perceptions.
Journal: Terrorism and Political Violence
Pages: 522-540
Issue: 4
Volume: 22
Year: 2010
X-DOI: 10.1080/09546551003661349
File-URL: http://hdl.handle.net/10.1080/09546551003661349
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:4:p:522-540



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_485534_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Turner
Author-X-Name-First: John
Author-X-Name-Last: Turner
Title: From Cottage Industry to International Organisation: The Evolution of Salafi-Jihadism and the Emergence of the Al Qaeda Ideology
Abstract: Al Qaeda after the invasion of Afghanistan can now be understood as not only an international terror organisation but an ideology which inspires groups with similar goals of a supranational caliphate. The Al Qaeda ideology draws from long standing historical Islamic concepts that date to the time of Muhammad. The ideologues of the organisation, most notably Ayman al Zawahiri, have cleverly used these ideas and the works of other Islamists to create not just a terror organisation but an ideology designed to unite disparate groups of Islamic radicals around the world.
Journal: Terrorism and Political Violence
Pages: 541-558
Issue: 4
Volume: 22
Year: 2010
X-DOI: 10.1080/09546553.2010.485534
File-URL: http://hdl.handle.net/10.1080/09546553.2010.485534
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:4:p:541-558



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_491009_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mark Sedgwick
Author-X-Name-First: Mark
Author-X-Name-Last: Sedgwick
Title: The Concept of Radicalization as a Source of Confusion
Abstract: The ubiquity of use of the term “radicalization” suggests a consensus about its meaning, but this article shows through a review of a variety of definitions that no such consensus exists. The article then argues that use of the term is problematic not just for these reasons, but because it is used in three different contexts: the security context, the integration context, and the foreign-policy context. It is argued that each of these contexts has a different agenda, impacted in the case of the integration agenda by the rise of European “neo-nationalism,” and so each uses the term “radical” to mean something different. The use of one term to denote at least three different concepts risks serious confusion. The proposed solution is to abandon the attempt to use “radicalization” as an absolute concept.
Journal: Terrorism and Political Violence
Pages: 479-494
Issue: 4
Volume: 22
Year: 2010
X-DOI: 10.1080/09546553.2010.491009
File-URL: http://hdl.handle.net/10.1080/09546553.2010.491009
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:4:p:479-494



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_492305_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: C. Fair
Author-X-Name-First: C.
Author-X-Name-Last: Fair
Author-Name: Neil Malhotra
Author-X-Name-First: Neil
Author-X-Name-Last: Malhotra
Author-Name: Jacob Shapiro
Author-X-Name-First: Jacob
Author-X-Name-Last: Shapiro
Title: Islam, Militancy, and Politics in Pakistan: Insights From a National Sample
Abstract: We use data from an innovative nationally representative survey of 6,000 Pakistanis in April 2009 to study beliefs about political Islam, Sharia, the legitimacy and efficacy of jihad, and attitudes towards specific militant organizations. These issues are at the forefront of U.S. policy towards Pakistan. Four results shed new light on the politics of militancy and Islamic identity in Pakistan. First, there is no relationship between measures of personal religiosity and the likelihood a respondent expresses highly sectarian sentiments. Second, militarized jihad is widely seen as legitimate in Pakistan but there are substantial regional differences in the acceptance of militarized jihad. Third, attitudes towards militant groups vary dramatically across groups, particularly when it comes to the efficacy of their actions. Fourth, while Pakistanis express massive levels of support for Sharia law, this is driven by its perceived connection with good governance, not by sympathy with the goals of militant groups claiming to implement it.
Journal: Terrorism and Political Violence
Pages: 495-521
Issue: 4
Volume: 22
Year: 2010
X-DOI: 10.1080/09546553.2010.492305
File-URL: http://hdl.handle.net/10.1080/09546553.2010.492305
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:4:p:495-521



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_493778_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Aaron Hoffman
Author-X-Name-First: Aaron
Author-X-Name-Last: Hoffman
Author-Name: Dwaine Jengelley
Author-X-Name-First: Dwaine
Author-X-Name-Last: Jengelley
Author-Name: Natasha T. Duncan
Author-X-Name-First: Natasha T.
Author-X-Name-Last: Duncan
Author-Name: Melissa Buehler
Author-X-Name-First: Melissa
Author-X-Name-Last: Buehler
Author-Name: Meredith Rees
Author-X-Name-First: Meredith
Author-X-Name-Last: Rees
Title: How Does the Business of News Influence Terrorism Coverage? Evidence From  and 
Abstract: Observers argue that the business of news is responsible for worsening the coverage of terrorism, but exactly how economic considerations influence coverage is controversial. Based on an analysis of over 1600 articles from The Washington Post and USA Today, we find that concerns about the effects of economic pressures on terrorism reporting are exaggerated. The business climate affects coverage, but the long-term impact of market pressures on coverage is modest. Articles about terrorist violence are increasingly prominent, but coverage of counterterrorism remains robust. Efforts to inoculate the press against the worst excesses of the market are unnecessary.
Journal: Terrorism and Political Violence
Pages: 559-580
Issue: 4
Volume: 22
Year: 2010
X-DOI: 10.1080/09546553.2010.493778
File-URL: http://hdl.handle.net/10.1080/09546553.2010.493778
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:4:p:559-580



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_495617_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nathan Porath
Author-X-Name-First: Nathan
Author-X-Name-Last: Porath
Title: Civic Activism Continued Through Other Means: Terror-Violence in the South of Thailand
Abstract: This article explores the relationship between civil society and terror-violence. It argues that terrorism should be understood as “civic activism continued through other means.” This allows us to distinguish it from state-terror. The article then explores the theme with data drawn from the political situation in the south of Thailand focusing on some recent events in which local Thai Malay-Muslims have protested against military presence. The paper also provides a brief history of the development of belligerent separatist groups in the area showing that they emerged after dissatisfaction with 20th century Thai civil-societal possibilities.
Journal: Terrorism and Political Violence
Pages: 581-600
Issue: 4
Volume: 22
Year: 2010
X-DOI: 10.1080/09546553.2010.495617
File-URL: http://hdl.handle.net/10.1080/09546553.2010.495617
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:4:p:581-600



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_496317_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mohamed Mohamed Osman
Author-X-Name-First: Mohamed
Author-X-Name-Last: Mohamed Osman
Title: Reviving the Caliphate in the : Hizbut Tahrir Indonesia's Mobilization Strategy and Its Impact in Indonesia
Abstract: Hizbut Tahrir (HT) is a transnational Islamic movement operating in over forty-five countries. Literature on HT has focused mainly on its activities in Central Asia and Europe. As such, when the HT chapter in Indonesia organized the largest-ever political gathering staged by HT, many observers were caught by surprise. Yet despite the importance of Hizbut Tahrir Indonesia (HTI), little is known about the organization in the English-speaking world. This paper is an attempt to present empirical data on this group. The paper argues that HTI's usage of different mobilization strategies has resulted in its ability to effect policy changes in Indonesia.
Journal: Terrorism and Political Violence
Pages: 601-622
Issue: 4
Volume: 22
Year: 2010
X-DOI: 10.1080/09546553.2010.496317
File-URL: http://hdl.handle.net/10.1080/09546553.2010.496317
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:4:p:601-622



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_499274_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Beatrice de Graaf
Author-X-Name-First: Beatrice
Author-X-Name-Last: de Graaf
Author-Name: Leena Malkki
Author-X-Name-First: Leena
Author-X-Name-Last: Malkki
Title: Killing it Softly? Explaining the Early Demise of Left-Wing Terrorism in the Netherlands
Abstract: This article seeks to provide a comprehensive analysis of the early demise of Rode Jeugd's initiatives towards a terrorist campaign in the Netherlands. It is concluded that three contextual factors played a crucial role in the process: the openness of the political culture, the setbacks experienced by similar organizations elsewhere (RAF in particular), and the lack of overt repression, combined with effective covert operations carried out by the security forces against the Rode Jeugd. Overall, the case of Rode Jeugd is a prime example of a demonstration of state power not always being the most efficient or even suitable method to combat terrorism.
Journal: Terrorism and Political Violence
Pages: 623-640
Issue: 4
Volume: 22
Year: 2010
X-DOI: 10.1080/09546553.2010.499274
File-URL: http://hdl.handle.net/10.1080/09546553.2010.499274
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:4:p:623-640



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_508013_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Clark McCauley
Author-X-Name-First: Clark
Author-X-Name-Last: McCauley
Author-Name: Sophia Moskalenko
Author-X-Name-First: Sophia
Author-X-Name-Last: Moskalenko
Title: Recent U.S. Thinking About Terrorism and Counterterrorism: Baby Steps Towards a Dynamic View of Asymmetric Conflict
Journal: Terrorism and Political Violence
Pages: 641-657
Issue: 4
Volume: 22
Year: 2010
X-DOI: 10.1080/09546553.2010.508013
File-URL: http://hdl.handle.net/10.1080/09546553.2010.508013
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:4:p:641-657



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_508021_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andrew Tan
Author-X-Name-First: Andrew
Author-X-Name-Last: Tan
Title: A Review of: “Bruce R. Pirnie and Edward O'Connell. ”
Journal: Terrorism and Political Violence
Pages: 658-659
Issue: 4
Volume: 22
Year: 2010
X-DOI: 10.1080/09546553.2010.508021
File-URL: http://hdl.handle.net/10.1080/09546553.2010.508021
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:4:p:658-659



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_508023_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andrew Tan
Author-X-Name-First: Andrew
Author-X-Name-Last: Tan
Title: A Review of: “John Mackinlay and Alison Al-Baddawy. .”
Journal: Terrorism and Political Violence
Pages: 659-660
Issue: 4
Volume: 22
Year: 2010
X-DOI: 10.1080/09546553.2010.508023
File-URL: http://hdl.handle.net/10.1080/09546553.2010.508023
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:4:p:659-660



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_508024_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andrew Tan
Author-X-Name-First: Andrew
Author-X-Name-Last: Tan
Title: A Review of: “David C. Gompert and John Gordon. .”
Journal: Terrorism and Political Violence
Pages: 660-662
Issue: 4
Volume: 22
Year: 2010
X-DOI: 10.1080/09546553.2010.508024
File-URL: http://hdl.handle.net/10.1080/09546553.2010.508024
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:4:p:660-662



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_508026_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Randall Law
Author-X-Name-First: Randall
Author-X-Name-Last: Law
Title: A Review of: “John P. Moran. ”
Journal: Terrorism and Political Violence
Pages: 662-663
Issue: 4
Volume: 22
Year: 2010
X-DOI: 10.1080/09546553.2010.508026
File-URL: http://hdl.handle.net/10.1080/09546553.2010.508026
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:4:p:662-663



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_517719_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Emma Leonard
Author-X-Name-First: Emma
Author-X-Name-Last: Leonard
Title: A Review of: “Hugo Slim. ”
Journal: Terrorism and Political Violence
Pages: 663-664
Issue: 4
Volume: 22
Year: 2010
X-DOI: 10.1080/09546553.2010.517719
File-URL: http://hdl.handle.net/10.1080/09546553.2010.517719
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:4:p:663-664



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_517721_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: A Review of: “Abdul Salam Zaeef.  (ed. and tran. Alex Strick van Linschoten and Felix Kuehn).”
Journal: Terrorism and Political Violence
Pages: 664-666
Issue: 4
Volume: 22
Year: 2010
X-DOI: 10.1080/09546553.2010.517721
File-URL: http://hdl.handle.net/10.1080/09546553.2010.517721
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:4:p:664-666



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_517722_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Douglas Byrd
Author-X-Name-First: Douglas
Author-X-Name-Last: Byrd
Title: A Review of: “Duncan McCargo. .Duncan McCargo (ed.). .”
Journal: Terrorism and Political Violence
Pages: 666-669
Issue: 4
Volume: 22
Year: 2010
X-DOI: 10.1080/09546553.2010.517722
File-URL: http://hdl.handle.net/10.1080/09546553.2010.517722
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:4:p:666-669



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_517723_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: George Michael
Author-X-Name-First: George
Author-X-Name-Last: Michael
Title: A Review of: “Michael Levi. .”
Journal: Terrorism and Political Violence
Pages: 669-671
Issue: 4
Volume: 22
Year: 2010
X-DOI: 10.1080/09546553.2010.517723
File-URL: http://hdl.handle.net/10.1080/09546553.2010.517723
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:22:y:2010:i:4:p:669-671

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_505457_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andreas Musolff
Author-X-Name-First: Andreas
Author-X-Name-Last: Musolff
Title:  Revisited: West German Terrorism and the Problem of Coming to Terms With the Nazi Past
Abstract: The origins of West German terrorism are closely linked to post-war Germany's problems of dealing with the National Socialist past. The terrorist groups defined themselves as “antifascist” and accused the Federal Republic of Germany, the USA, and Israel of continuing “imperialist” Nazi policy, which was supposed to justify their “armed struggle.” On the other hand, the terrorists themselves have been described as “Hitler's children” in the sense that they had adopted key aspects of National Socialist ideology, including anti-Semitism. The article reviews the evidence for such an assessment in the context of Germany's debates about the legacy of National Socialism.
Journal: Terrorism and Political Violence
Pages: 60-71
Issue: 1
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2010.505457
File-URL: http://hdl.handle.net/10.1080/09546553.2010.505457
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:1:p:60-71



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_512839_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Manuel Torres Soriano
Author-X-Name-First: Manuel
Author-X-Name-Last: Torres Soriano
Title: The Road to Media Jihad: The Propaganda Actions of Al Qaeda in the Islamic Maghreb
Abstract: This article offers a descriptive analysis of the evolution of the propaganda actions of the Algerian Salafist Group for Preaching and Combat (GSPC), later known as Al Qaeda in the Islamic Maghreb (AQIM). An examination of the content of the propaganda released by the terrorist group between 1998 and 2009 allows us to identify the different stages and factors accounting for the role played by communications in the strategy of the organisation. The article argues that the AQIM has gradually become an organisation centred on the “media Jihad.”
Journal: Terrorism and Political Violence
Pages: 72-88
Issue: 1
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2010.512839
File-URL: http://hdl.handle.net/10.1080/09546553.2010.512839
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:1:p:72-88



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_514776_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ogen Goldman
Author-X-Name-First: Ogen
Author-X-Name-Last: Goldman
Title: The Globalization of Terror Attacks
Abstract: This study raises two questions: have terror attacks been globalized and if so, is the phenomenon somehow linked with globalization. Two opposite hypotheses are tested by trend analysis for the years 1968–2007, using several statistical tools. The principal conclusions are that terror attacks have not become globalized and even display signs of localization since the 1990s. Furthermore, globalization is not significantly connected, positively or negatively, with transnational terror attack trends.
Journal: Terrorism and Political Violence
Pages: 31-59
Issue: 1
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2010.514776
File-URL: http://hdl.handle.net/10.1080/09546553.2010.514776
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:1:p:31-59



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_515133_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Efrat Silber
Author-X-Name-First: Efrat
Author-X-Name-Last: Silber
Title: Israel's Policy of House Demolitions During the First Intifada, 1987–1993
Abstract: Israel's counter-terrorism policies have often aroused the anger of the Palestinians and the international community. One of the most controversial policies is the demolition and sealing of houses of families connected to a terrorist act. While there is significant media attention on this controversial policy, there have been very few academic studies examining the effectiveness of this policy. This article examines Israel's policy during the first Intifada (1987–1993), administered in accordance with section 119 (1) of the Defence Emergency Regulations of 1945 from the British Mandate government. Based on a carefully structured empirical analysis, the article concludes that the benefits of this policy do not outweigh the costs.
Journal: Terrorism and Political Violence
Pages: 89-107
Issue: 1
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2010.515133
File-URL: http://hdl.handle.net/10.1080/09546553.2010.515133
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:1:p:89-107



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_515438_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Amitai Etzioni
Author-X-Name-First: Amitai
Author-X-Name-Last: Etzioni
Title: Terrorists: A Distinct Species
Abstract: This article first lays out arguments that explain why terrorists should not be treated as criminals or as soldiers. It suggests that they are best characterized as a third, distinct species. Although their basic rights should be honored, e.g., they should not be tortured, on all other matters they should be subject to distinct authorities and procedures. For instance, instead of being held indefinitely without review, they should be held until a review board (somewhat like a parole board in prison) determines that they are no longer a danger to society.
Journal: Terrorism and Political Violence
Pages: 1-12
Issue: 1
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2010.515438
File-URL: http://hdl.handle.net/10.1080/09546553.2010.515438
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:1:p:1-12



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_515439_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Matthew Waxman
Author-X-Name-First: Matthew
Author-X-Name-Last: Waxman
Title: Terrorism: Why Categories Matter
Journal: Terrorism and Political Violence
Pages: 19-22
Issue: 1
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2010.515439
File-URL: http://hdl.handle.net/10.1080/09546553.2010.515439
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:1:p:19-22



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_515442_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marc Sageman
Author-X-Name-First: Marc
Author-X-Name-Last: Sageman
Title: Civilian Trials and the Prevention of Atrocities
Journal: Terrorism and Political Violence
Pages: 13-15
Issue: 1
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2010.515442
File-URL: http://hdl.handle.net/10.1080/09546553.2010.515442
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:1:p:13-15



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_515445_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kenneth Anderson
Author-X-Name-First: Kenneth
Author-X-Name-Last: Anderson
Title: Comments on Professor Etzioni's “Terrorists: A Distinct Species”
Journal: Terrorism and Political Violence
Pages: 16-18
Issue: 1
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2010.515445
File-URL: http://hdl.handle.net/10.1080/09546553.2010.515445
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:1:p:16-18



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_515447_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Amitai Etzioni
Author-X-Name-First: Amitai
Author-X-Name-Last: Etzioni
Title: Comments
Journal: Terrorism and Political Violence
Pages: 27-30
Issue: 1
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2010.515447
File-URL: http://hdl.handle.net/10.1080/09546553.2010.515447
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:1:p:27-30



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_527264_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Frederic Bernard
Author-X-Name-First: Frederic
Author-X-Name-Last: Bernard
Title: Counterterrorism and an Imaginative Right-Based Approach
Journal: Terrorism and Political Violence
Pages: 23-26
Issue: 1
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2011.527264
File-URL: http://hdl.handle.net/10.1080/09546553.2011.527264
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:1:p:23-26



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_529766_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: Editorial Retraction
Journal: Terrorism and Political Violence
Pages: 131-131
Issue: 1
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2011.529766
File-URL: http://hdl.handle.net/10.1080/09546553.2011.529766
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:1:p:131-131



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_533074_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Clark McCauley
Author-X-Name-First: Clark
Author-X-Name-Last: McCauley
Author-Name: Sophia Moskalenko
Author-X-Name-First: Sophia
Author-X-Name-Last: Moskalenko
Title: Do Suicide Terrorists Have Personality Problems?A Review of: “Ariel Merari. .Nancy Hartevelt Kobrin. .”
Journal: Terrorism and Political Violence
Pages: 108-111
Issue: 1
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2011.533074
File-URL: http://hdl.handle.net/10.1080/09546553.2011.533074
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:1:p:108-111



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_533075_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Christopher Costa
Author-X-Name-First: Christopher
Author-X-Name-Last: Costa
Title: A Review of: “Joshua Alexander Geltzer. .”
Journal: Terrorism and Political Violence
Pages: 112-114
Issue: 1
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2011.533075
File-URL: http://hdl.handle.net/10.1080/09546553.2011.533075
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:1:p:112-114



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_533076_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: A Review of: “John W. Parker. .”
Journal: Terrorism and Political Violence
Pages: 114-115
Issue: 1
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2011.533076
File-URL: http://hdl.handle.net/10.1080/09546553.2011.533076
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:1:p:114-115



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_533078_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: George Michael
Author-X-Name-First: George
Author-X-Name-Last: Michael
Title: A Review of: “Andrew F. Krepinevich. .”
Journal: Terrorism and Political Violence
Pages: 115-118
Issue: 1
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2011.533078
File-URL: http://hdl.handle.net/10.1080/09546553.2011.533078
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:1:p:115-118



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_533079_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: James Geistman
Author-X-Name-First: James
Author-X-Name-Last: Geistman
Title: A Review of: “Pete Simi and Robert Futrell. .”
Journal: Terrorism and Political Violence
Pages: 118-122
Issue: 1
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2011.533079
File-URL: http://hdl.handle.net/10.1080/09546553.2011.533079
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:1:p:118-122



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_533080_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Randall Law
Author-X-Name-First: Randall
Author-X-Name-Last: Law
Title: A Review of: “Cameron I. Crouch. .”
Journal: Terrorism and Political Violence
Pages: 122-123
Issue: 1
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2011.533080
File-URL: http://hdl.handle.net/10.1080/09546553.2011.533080
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:1:p:122-123



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_533082_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: George Michael
Author-X-Name-First: George
Author-X-Name-Last: Michael
Title: A Review of: “Richard A. Clarke and Robert K. Knake. .”
Journal: Terrorism and Political Violence
Pages: 124-126
Issue: 1
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2011.533082
File-URL: http://hdl.handle.net/10.1080/09546553.2011.533082
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:1:p:124-126



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_533083_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Robert White
Author-X-Name-First: Robert
Author-X-Name-Last: White
Title: A Review of: “John Horgan. .”
Journal: Terrorism and Political Violence
Pages: 126-128
Issue: 1
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2011.533083
File-URL: http://hdl.handle.net/10.1080/09546553.2011.533083
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:1:p:126-128



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_533084_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Donald Denton
Author-X-Name-First: Donald
Author-X-Name-Last: Denton
Title: A Review of: “Gregory D. Koblentz. .”
Journal: Terrorism and Political Violence
Pages: 128-130
Issue: 1
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2011.533084
File-URL: http://hdl.handle.net/10.1080/09546553.2011.533084
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:1:p:128-130

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_516210_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Isak Svensson
Author-X-Name-First: Isak
Author-X-Name-Last: Svensson
Author-Name: Emily Harding
Author-X-Name-First: Emily
Author-X-Name-Last: Harding
Title: How Holy Wars End: Exploring the Termination Patterns of Conflicts With Religious Dimensions in Asia
Abstract: Conventional wisdom suggests that armed conflicts with religious dimensions are inherently difficult to end. Religious appeals seem to make conflict issues indivisible. Yet, religious conflicts do end. In order to understand this puzzle, there is a need to examine the empirical records of the termination process of these types of armed conflicts. In this study, we argue that there is a potential for conflict resolution of religious conflicts without necessarily requiring concessions on the core beliefs and aspirations. We explore this proposition by examining the empirical pattern of Asian armed conflicts with explicit religious dimensions as stated incompatible positions and scrutinize how they are ended. Our empirical analysis reveals that none of the parties raising religious demands has made concessions on those demands. Yet, in about half of the cases, there are accommodations that do not imply concessions on the religious goals. Based on these findings, the study draws out the potential implications for the debate about the role of religion, armed conflicts, and peaceful resolution.
Journal: Terrorism and Political Violence
Pages: 133-149
Issue: 2
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2010.516210
File-URL: http://hdl.handle.net/10.1080/09546553.2010.516210
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:2:p:133-149



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_521087_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jonathan Kennedy
Author-X-Name-First: Jonathan
Author-X-Name-Last: Kennedy
Author-Name: Gabriel Weimann
Author-X-Name-First: Gabriel
Author-X-Name-Last: Weimann
Title: The Strength of Weak Terrorist Ties
Abstract: The current age of technology, mass communication, and globalization makes networks analysis an especially useful tool for understanding cell-based terrorism. Some concepts from traditional networks analysis may be especially relevant. The Strength of Weak Ties hypothesis (SWT) is particularly promising and will be used here to demonstrate the usability of traditional networks analysis for studying modern terrorism. The findings suggest that the strength of weak terrorist ties may improve Al Qaeda's operational capabilities despite the group's decentralization following the U.S.-led military campaign in Afghanistan beginning in 2001.
Journal: Terrorism and Political Violence
Pages: 201-212
Issue: 2
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2010.521087
File-URL: http://hdl.handle.net/10.1080/09546553.2010.521087
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:2:p:201-212



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_526039_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Page
Author-X-Name-First: Michael
Author-X-Name-Last: Page
Author-Name: Lara Challita
Author-X-Name-First: Lara
Author-X-Name-Last: Challita
Author-Name: Alistair Harris
Author-X-Name-First: Alistair
Author-X-Name-Last: Harris
Title: Al Qaeda in the Arabian Peninsula: Framing Narratives and Prescriptions
Abstract: Al Qaeda in the Arabian Peninsula has positioned itself at the vanguard of a media revolution in which terrorist groups both create and frame news events to an unprecedented extent. Through the publication of its e-magazine Sada al-Malahim (The Echo of Epic Battles), the organization has sought to mobilize both Yemeni and non-Yemeni Muslim, Arabic-speaking audiences to carry out violent jihad. This article utilizes the concept of collective action frames to analyze Al Qaeda in the Arabian Peninsula's media output, identifying the organization's grievance narratives, ideological justifications for violent actions, and means to strengthen its credibility among its intended audiences.
Journal: Terrorism and Political Violence
Pages: 150-172
Issue: 2
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2010.526039
File-URL: http://hdl.handle.net/10.1080/09546553.2010.526039
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:2:p:150-172



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_526869_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Shane Barter
Author-X-Name-First: Shane
Author-X-Name-Last: Barter
Title: Strong State, Smothered Society: Explaining Terrorist Violence in Thailand's Deep South
Abstract: Why have militants in southern Thailand utilized anonymous and at times indiscriminate terrorist violence against civilians? This article gauges three explanations: resource wealth, weak states, and strong states. I argue that terrorist violence against civilians in southern Thailand is partially sustained and largely structured by the considerable institutional strength of the Thai state. This helps sustain the conflict by providing an additional grievance and it structures the form of violence by forcing militants underground and severing their links to civilians. A potential response would be to trim state agencies and scale back the presence of the state in Patani.
Journal: Terrorism and Political Violence
Pages: 213-232
Issue: 2
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2010.526869
File-URL: http://hdl.handle.net/10.1080/09546553.2010.526869
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:2:p:213-232



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_529389_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Miroslav Mareš
Author-X-Name-First: Miroslav
Author-X-Name-Last: Mareš
Title: Terrorism-Free Zone in East Central Europe? Strategic Environment, Risk Tendencies, and Causes of Limited Terrorist Activities in the Visegrad Group Countries
Abstract: The aim of this article is to analyse terrorism and the phenomena linked to it in East Central Europe. In comparison with a number of other regions of today's world, this area can currently seem to be a relatively “terrorism-free zone.” Although the number of terrorist attacks committed in this territory is insignificant, this does not mean that the risk of terrorism is entirely negligible in the region. This text explains some historical determinants of the current situation and describes the consequences both of regime change in the countries in question and of their foreign policy decisions after 1989. I also analyse the importance of East Central Europe as a logistical space for international terrorism (weapons procurement, stays of terrorists, etc.). I characterise the threats of Islamic and Middle Eastern terrorism in connection with the pro-American and pro-Israeli policies of East Central European countries, especially after 9/11, assess the risks posed by the domestic extremist scenes in those countries that have a relationship with terrorism, and take notice of the accusations of terrorism that have been voiced in international politics. On the basis of this data, I then provide an overview of the importance of East Central Europe for the contemporary study of terrorism.
Journal: Terrorism and Political Violence
Pages: 233-253
Issue: 2
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2010.529389
File-URL: http://hdl.handle.net/10.1080/09546553.2010.529389
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:2:p:233-253



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_535717_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sam Mullins
Author-X-Name-First: Sam
Author-X-Name-Last: Mullins
Title: Islamist Terrorism and Australia: An Empirical Examination of the “Home-Grown” Threat
Abstract: Australian interests have been considered viable targets for Islamist terrorists since at least 2001, and Australians have suffered from attacks in Bali in 2002 and 2005, and Jakarta in 2004 and 2009. Moreover, Australian citizens have been involved in militant Islamist networks since the late 1980s, and similar to other Western countries in recent years there have been examples of “home-grown” plots to carry out domestic terrorist attacks. This article seeks to clarify the nature of the contemporary security threat within Australia by analysing the involvement of Australian citizens and residents in Islamist terrorism, both at home and abroad. The results build upon previous research findings revealing that while the profile of Australian jihadis is unique in terms of its exact manifestation, there is overall conformity with generally observed trends in Islamist terrorism in other Western countries.
Journal: Terrorism and Political Violence
Pages: 254-285
Issue: 2
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2010.535717
File-URL: http://hdl.handle.net/10.1080/09546553.2010.535717
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:2:p:254-285



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_537587_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Petter Nesser
Author-X-Name-First: Petter
Author-X-Name-Last: Nesser
Title: Ideologies of Jihad in Europe
Abstract: The article explores ideological fault lines among Sunni Muslim militants (jihadists) in Europe since the mid-1990s. It argues there have been disputes among the militants about whether to prioritize local struggles or Al Qaeda's global war, and about the legitimacy of launching terrorist attacks in European states offering political asylum to Muslims. It concludes that Europe's militants have become more ideologically unified in conjunction with the invasions of Afghanistan, Iraq, and the Mohammed drawings, seeing European countries as legitimate and prioritized targets, and identifying with Al Qaeda.
Journal: Terrorism and Political Violence
Pages: 173-200
Issue: 2
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2010.537587
File-URL: http://hdl.handle.net/10.1080/09546553.2010.537587
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:2:p:173-200



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_538276_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Christian Kaunert
Author-X-Name-First: Christian
Author-X-Name-Last: Kaunert
Author-Name: Sarah Léonard
Author-X-Name-First: Sarah
Author-X-Name-Last: Léonard
Title: EU Counterterrorism and the European Neighbourhood Policy: An Appraisal of the Southern Dimension
Abstract: Terrorists trained on European soil, but originating from the Middle East, attacked the world's only superpower on September 11, 2001. Countering this terrorist threat has become an increasingly significant part of European Foreign Policy. At the same time, the European Neighbourhood Policy (ENP) has become an increasingly important dimension of European Foreign Policy. This article examines the extent to which counterterrorism has occupied a prominent place in the ENP, with a particular focus on the Southern Mediterranean ENP partners. The findings of this article suggest that, despite the commonly held view in the literature that security issues, in particular terrorism, have dominated the ENP agenda, counterterrorism cooperation between the European Union (EU) and its Southern Mediterranean ENP partners has not advanced as much as might have been expected.
Journal: Terrorism and Political Violence
Pages: 286-309
Issue: 2
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2010.538276
File-URL: http://hdl.handle.net/10.1080/09546553.2010.538276
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:2:p:286-309



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_554283_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: George Michael
Author-X-Name-First: George
Author-X-Name-Last: Michael
Title: A Review of: “Bob Coen and Eric Nadler. .”
Journal: Terrorism and Political Violence
Pages: 310-312
Issue: 2
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2011.554283
File-URL: http://hdl.handle.net/10.1080/09546553.2011.554283
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:2:p:310-312



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_554288_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Thomas Campbell
Author-X-Name-First: Thomas
Author-X-Name-Last: Campbell
Title: A Review of: “Philip Seib and Dana M. Janbek. .”
Journal: Terrorism and Political Violence
Pages: 312-314
Issue: 2
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2011.554288
File-URL: http://hdl.handle.net/10.1080/09546553.2011.554288
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:2:p:312-314



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_554292_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Raffaello Pantucci
Author-X-Name-First: Raffaello
Author-X-Name-Last: Pantucci
Title: A Review of: “Lawrence Archer and Fiona Bawdon. ”
Journal: Terrorism and Political Violence
Pages: 314-315
Issue: 2
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2011.554292
File-URL: http://hdl.handle.net/10.1080/09546553.2011.554292
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:2:p:314-315



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_554293_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Martin Durham
Author-X-Name-First: Martin
Author-X-Name-Last: Durham
Title: A Review of: “Leonard Zeskind. .”
Journal: Terrorism and Political Violence
Pages: 316-317
Issue: 2
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2011.554293
File-URL: http://hdl.handle.net/10.1080/09546553.2011.554293
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:2:p:316-317



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_554297_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard Phelps
Author-X-Name-First: Richard
Author-X-Name-Last: Phelps
Title: A Review of: “Gareth Peirce. .”
Journal: Terrorism and Political Violence
Pages: 317-318
Issue: 2
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2011.554297
File-URL: http://hdl.handle.net/10.1080/09546553.2011.554297
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:2:p:317-318



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_554299_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andrew Tan
Author-X-Name-First: Andrew
Author-X-Name-Last: Tan
Title: A Review of: “Rohan Gunaratna, Arabinda Acharya, and Wang Pengxin. .”
Journal: Terrorism and Political Violence
Pages: 318-320
Issue: 2
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2011.554299
File-URL: http://hdl.handle.net/10.1080/09546553.2011.554299
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:2:p:318-320



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_554301_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Amanda Skuldt
Author-X-Name-First: Amanda
Author-X-Name-Last: Skuldt
Title: A Review of: “Georg Ferks and Berma Klein Goldewijk (eds.). .”
Journal: Terrorism and Political Violence
Pages: 321-323
Issue: 2
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2011.554301
File-URL: http://hdl.handle.net/10.1080/09546553.2011.554301
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:2:p:321-323



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_555283_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: A Review of: “Anna Cento Bull. .”
Journal: Terrorism and Political Violence
Pages: 323-324
Issue: 2
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2011.555283
File-URL: http://hdl.handle.net/10.1080/09546553.2011.555283
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:2:p:323-324



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_555285_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andrew Tan
Author-X-Name-First: Andrew
Author-X-Name-Last: Tan
Title: A Review of: “Rohan Gunaratna and Khuram Iqbal. .”
Journal: Terrorism and Political Violence
Pages: 327-328
Issue: 2
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2011.555285
File-URL: http://hdl.handle.net/10.1080/09546553.2011.555285
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:2:p:327-328



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_555286_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: A Review of: “Gordon Corera. .”
Journal: Terrorism and Political Violence
Pages: 324-327
Issue: 2
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2011.555286
File-URL: http://hdl.handle.net/10.1080/09546553.2011.555286
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:2:p:324-327



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_555674_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Raffaello Pantucci
Author-X-Name-First: Raffaello
Author-X-Name-Last: Pantucci
Title: A Review of: “Rohan Gunaratna, Arabinda Acharya, and Wang Pengxin. .”
Journal: Terrorism and Political Violence
Pages: 320-321
Issue: 2
Volume: 23
Year: 2011
X-DOI: 10.1080/09546553.2011.555674
File-URL: http://hdl.handle.net/10.1080/09546553.2011.555674
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:23:y:2011:i:2:p:320-321

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_728938_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David Hofmann
Author-X-Name-First: David
Author-X-Name-Last: Hofmann
Title: Clark McCauley and Sophia Moskalenko. 
Journal: Terrorism and Political Violence
Pages: 865-866
Issue: 5
Volume: 24
Year: 2012
X-DOI: 10.1080/09546553.2012.728938
File-URL: http://hdl.handle.net/10.1080/09546553.2012.728938
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:24:y:2012:i:5:p:865-866



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_728929_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Raffaello Pantucci
Author-X-Name-First: Raffaello
Author-X-Name-Last: Pantucci
Title: Ramón Spaaij. 
Journal: Terrorism and Political Violence
Pages: 855-856
Issue: 5
Volume: 24
Year: 2012
X-DOI: 10.1080/09546553.2012.728929
File-URL: http://hdl.handle.net/10.1080/09546553.2012.728929
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:24:y:2012:i:5:p:855-856



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_728928_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Leena Malkki
Author-X-Name-First: Leena
Author-X-Name-Last: Malkki
Title: Ramón Spaaij. 
Journal: Terrorism and Political Violence
Pages: 853-854
Issue: 5
Volume: 24
Year: 2012
X-DOI: 10.1080/09546553.2012.728928
File-URL: http://hdl.handle.net/10.1080/09546553.2012.728928
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:24:y:2012:i:5:p:853-854



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_644105_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Matenia Sirseloudi
Author-X-Name-First: Matenia
Author-X-Name-Last: Sirseloudi
Title: The Meaning of Religion and Identity for the Violent Radicalisation of the Turkish Diaspora in Germany
Abstract: In the following article, factors with an effect on the radical practice of religion in diaspora communities will be examined. Three factors play a major role in the religious radicalisation of the Islamic diaspora, often referred to as Islamism or religious activism: 1. The Islamist movement in the home country of the immigrants, 2. The situation created by immigration in which religion fulfils functions beyond purely spiritual needs and 3. A personal crisis resulting in individuals being receptive to extremist ideas. After a short conceptual explanation, the development of the Islamist movement in Turkey, which had a strong impact on the diaspora communities, will be traced. Following that, the role of religion for first- and second-generation immigrants will be discussed and individual crisis situations that aid extremism and violent radicalisation will be looked at. The conclusion drawn here allows statements to be made with regard to future tendencies towards violent radicalisation and their religious embedding.
Journal: Terrorism and Political Violence
Pages: 807-824
Issue: 5
Volume: 24
Year: 2012
X-DOI: 10.1080/09546553.2011.644105
File-URL: http://hdl.handle.net/10.1080/09546553.2011.644105
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:24:y:2012:i:5:p:807-824



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_643934_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Manuel Torres Soriano
Author-X-Name-First: Manuel
Author-X-Name-Last: Torres Soriano
Title: Between the Pen and the Sword: The Global Islamic Media Front in the West
Abstract: This article undertakes a descriptive analysis of the jihadist group, the Global Islamic Media Front. Using information obtained from cells broken up in the West, it argues that, in addition to its propaganda actions in support of terrorism, the group fulfils three additional functions: (a) It serves as an “identity refuge” for individuals wishing to cultivate an identity as fighters of the jihad; (b) It offers a form of “surrogate activism” to those who fail in their attempts to join organisations engaged in terrorist violence; and (c) It is an important source of violent radicalisation for its own members who become increasingly dissatisfied with their propaganda activities.
Journal: Terrorism and Political Violence
Pages: 769-786
Issue: 5
Volume: 24
Year: 2012
X-DOI: 10.1080/09546553.2011.643934
File-URL: http://hdl.handle.net/10.1080/09546553.2011.643934
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:24:y:2012:i:5:p:769-786



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_728931_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: M. Walker
Author-X-Name-First: M.
Author-X-Name-Last: Walker
Title: Des Freedman and Daya Kishan Thussu (Eds.). 
Journal: Terrorism and Political Violence
Pages: 858-860
Issue: 5
Volume: 24
Year: 2012
X-DOI: 10.1080/09546553.2012.728931
File-URL: http://hdl.handle.net/10.1080/09546553.2012.728931
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:24:y:2012:i:5:p:858-860



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_728930_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard Phelps
Author-X-Name-First: Richard
Author-X-Name-Last: Phelps
Title: Peter L. Bergen. 
Journal: Terrorism and Political Violence
Pages: 856-858
Issue: 5
Volume: 24
Year: 2012
X-DOI: 10.1080/09546553.2012.728930
File-URL: http://hdl.handle.net/10.1080/09546553.2012.728930
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:24:y:2012:i:5:p:856-858



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_728933_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: D. Mulloy
Author-X-Name-First: D.
Author-X-Name-Last: Mulloy
Title: Michael Barkun. 
Journal: Terrorism and Political Violence
Pages: 861-862
Issue: 5
Volume: 24
Year: 2012
X-DOI: 10.1080/09546553.2012.728933
File-URL: http://hdl.handle.net/10.1080/09546553.2012.728933
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:24:y:2012:i:5:p:861-862



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_638347_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ioana Matesan
Author-X-Name-First: Ioana
Author-X-Name-Last: Matesan
Title: What Makes Negative Frames Resonant? Hamas and the Appeal of Opposition to the Peace Process
Abstract: Increasingly, scholars are applying Social Movement Theory to explore how radical Islamist groups strategically employ framing to legitimize the use of violence. What has not been explicitly examined, however, is under what conditions radical frames are more resonant with the public than more moderate alternatives. This article argues that the strength of a particular frame depends on the credibility of the competing claim-makers. Drawing on public opinion polls from the Palestinian Territories, the article shows that the resonance of Hamas’ frames vis-à-vis the peace process between 1993 and 2006 depended on the ability of the Palestinian leadership to maintain its legitimacy. Since the Gaza take-over and Hamas’ shift to a position of leadership rather than opposition party, the organization's inability to deliver in the economic realm or to even feign any progress regarding the peace process damaged its credibility and reputation. Accordingly, its frames vis-à-vis the peace process also started losing their resonance with the public. An understanding of the dynamics of credibility can also help explain the continued moves towards national reconciliation between Hamas and Fatah.
Journal: Terrorism and Political Violence
Pages: 671-705
Issue: 5
Volume: 24
Year: 2012
X-DOI: 10.1080/09546553.2011.638347
File-URL: http://hdl.handle.net/10.1080/09546553.2011.638347
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:24:y:2012:i:5:p:671-705



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_642907_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Graham Brownlow
Author-X-Name-First: Graham
Author-X-Name-Last: Brownlow
Title: Towards an Acceptable Level of Violence: Institutional Lessons From Northern Ireland
Abstract: Institutional and economic development has recently returned to the forefront of economic analysis. The use of case studies (both historical and contemporary) has been important in this revival. Likewise, it has been argued recently by economic methodologists that historical context provides a kind of “laboratory” for the researcher interested in real world economic phenomena. Counterterrorism economics, in contrast with much of the rest of the literature on terrorism, has all too rarely drawn upon detailed contextual case studies. This article seeks to help remedy this problem. Archival evidence, including previously unpublished material on the DeLorean case, is an important feature of this article. The article examines how an inter-related strategy, which traded-off economic, security, and political considerations, operated during the Troubles. Economic repercussions of this strategy are discussed. An economic analysis of technical and organizational change within paramilitarism is also presented. A number of institutional lessons are discussed including: the optimal balance between carrot versus stick, centralization relative to decentralization, the economics of intelligence operations, and tit-for-tat violence. While existing economic models are arguably correct in identifying benefits from politico-economic decentralization, they downplay the element highlighted by institutional analysis.
Journal: Terrorism and Political Violence
Pages: 722-742
Issue: 5
Volume: 24
Year: 2012
X-DOI: 10.1080/09546553.2011.642907
File-URL: http://hdl.handle.net/10.1080/09546553.2011.642907
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:24:y:2012:i:5:p:722-742



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_728932_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gregory Koblentz
Author-X-Name-First: Gregory
Author-X-Name-Last: Koblentz
Title: Nicholas H. Bergman (Ed.). Bacillus anthracis 
Journal: Terrorism and Political Violence
Pages: 860-861
Issue: 5
Volume: 24
Year: 2012
X-DOI: 10.1080/09546553.2012.728932
File-URL: http://hdl.handle.net/10.1080/09546553.2012.728932
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:24:y:2012:i:5:p:860-861



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_726593_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: Editorial Board EOV
Journal: Terrorism and Political Violence
Pages: ebi-ebi
Issue: 5
Volume: 24
Year: 2012
X-DOI: 10.1080/09546553.2012.726593
File-URL: http://hdl.handle.net/10.1080/09546553.2012.726593
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:24:y:2012:i:5:p:ebi-ebi



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_728935_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: George Michael
Author-X-Name-First: George
Author-X-Name-Last: Michael
Title: Jeffrey T. Richelson. 
Journal: Terrorism and Political Violence
Pages: 862-865
Issue: 5
Volume: 24
Year: 2012
X-DOI: 10.1080/09546553.2012.728935
File-URL: http://hdl.handle.net/10.1080/09546553.2012.728935
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:24:y:2012:i:5:p:862-865



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_642908_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lindsay Heger
Author-X-Name-First: Lindsay
Author-X-Name-Last: Heger
Author-Name: Danielle Jung
Author-X-Name-First: Danielle
Author-X-Name-Last: Jung
Author-Name: Wendy Wong
Author-X-Name-First: Wendy
Author-X-Name-Last: Wong
Title: Organizing for Resistance: How Group Structure Impacts the Character of Violence
Abstract: How does the way in which a group organizes change the lethality of the group's attacks? In this article, we argue that groups organized vertically as hierarchies are likely to conduct more lethal attacks. We build our argument around three advantages inherent to centralized structures: functional differentiation, clear command and control structures, and accountability. We argue that each of these characteristics positively impacts an organization's ability to deliver an effective lethal blow. To test our argument, we use a mixed method approach, drawing on empirical evidence and support from a time-series case study. Our large-N analysis examines the trends in more than 19,000 attacks. In this test we develop a novel proxy measure for hierarchy based on a group's bases of operation and non-violent activities. To complement the empirical work, we examine the history of Euskadi Ta Askatasuna (ETA), the Basque separatist group. Over several decades of violent operations, this group's structure has changed dramatically. We analyze how these shifts impacted ETA's ability to maximize the effectiveness and damage of their attacks. In both the case study and large-N analysis, the more hierarchically organized the group, the more easily the group can orchestrate lethal attacks.
Journal: Terrorism and Political Violence
Pages: 743-768
Issue: 5
Volume: 24
Year: 2012
X-DOI: 10.1080/09546553.2011.642908
File-URL: http://hdl.handle.net/10.1080/09546553.2011.642908
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:24:y:2012:i:5:p:743-768



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_639415_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Findley
Author-X-Name-First: Michael
Author-X-Name-Last: Findley
Author-Name: Joseph Young
Author-X-Name-First: Joseph
Author-X-Name-Last: Young
Title: More Combatant Groups, More Terror?: Empirical Tests of an Outbidding Logic
Abstract: We examine and test the logic that outbidding among insurgent groups results in more suicide terrorism specifically and more terrorism of any type, which has become a popular argument in recent years. A global analysis of terrorism from 1970–2004 provides scant support for the notion that outbidding increases suicide terrorism. An extension of the argument to all types of terrorist attacks provides even less support. The logic of outbidding has received considerable attention in academic and policy circles in recent years.1 Similar to the argument that democratic occupation increases suicide terror,2 our lack of empirical support suggests that considerable cross-national work is still needed to understand suicide terror adequately. We suggest some reasons why this may be the case, drawing particular attention to the problem of overgeneralizing from a limited set of cases.
Journal: Terrorism and Political Violence
Pages: 706-721
Issue: 5
Volume: 24
Year: 2012
X-DOI: 10.1080/09546553.2011.639415
File-URL: http://hdl.handle.net/10.1080/09546553.2011.639415
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:24:y:2012:i:5:p:706-721



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_652317_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel Byman
Author-X-Name-First: Daniel
Author-X-Name-Last: Byman
Title: Curious Victory: Explaining Israel's Suppression of the Second Intifada
Abstract: The article examines Israel's successes and failures during the Second Intifada. It argues that Israel's advances came from an effective counterterrorism campaign involving a mix of military operations, defensive measures, and in particular improved intelligence gathering. Domestic resilience also proved strong in the face of a brutal terrorism campaign. Yet long-term victory remains elusive for Israel. Deterrence, always difficult against terrorist groups, is growing harder for Israel. Hamas's control of Gaza, and the mistrust and hatred sown during the Second Intifada, have hindered a political deal between Israel and moderate Palestinians. Much of what went into successful counterterrorism, notably the security barrier and the aggressive campaign of raids and arrests, does not jibe with most visions of what peace would look like and makes a deal harder to achieve. To make a peace deal work, Israeli counterterrorism must change, with measures including relocating parts of the security barrier, bolstering moderate Palestinian politicians, and working with, as opposed to undermining, Palestinian security forces in the West Bank.
Journal: Terrorism and Political Violence
Pages: 825-852
Issue: 5
Volume: 24
Year: 2012
X-DOI: 10.1080/09546553.2011.652317
File-URL: http://hdl.handle.net/10.1080/09546553.2011.652317
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:24:y:2012:i:5:p:825-852



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_644098_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Vanda Felbab-Brown
Author-X-Name-First: Vanda
Author-X-Name-Last: Felbab-Brown
Author-Name: James Forest
Author-X-Name-First: James
Author-X-Name-Last: Forest
Title: Political Violence and the Illicit Economies of West Africa
Abstract: This comparative analysis draws on field research in several West African countries to illustrate the dynamic relationships between political violence and organized crime in this sub-region. These relationships are often transactional, and almost always on a temporary basis. While some alliances of convenience may be forged, in other cases an adversarial relationship exists between organized crime and terrorist networks. In some cases, key actors within West African governments have benefited from these relationships. We then examine recent policies and strategies pursued by the U.S. and the international community that, in the name of combating terrorism, seek to constrain the illicit economies of the region, but in doing so may do more harm than good. The article concludes with some policy recommendations based on this analysis.
Journal: Terrorism and Political Violence
Pages: 787-806
Issue: 5
Volume: 24
Year: 2012
X-DOI: 10.1080/09546553.2011.644098
File-URL: http://hdl.handle.net/10.1080/09546553.2011.644098
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:24:y:2012:i:5:p:787-806

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_733273_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tavishi Bhasin
Author-X-Name-First: Tavishi
Author-X-Name-Last: Bhasin
Author-Name: Maia Hallward
Author-X-Name-First: Maia
Author-X-Name-Last: Hallward
Title: Hamas as a Political Party: Democratization in the Palestinian Territories
Abstract: Why do violent movements participate in elections? To answer this question, we examine Hamas's formation of the Reform and Change Party and its iconic victory in the 2006 elections to the Palestinian Legislative Council. We argue that Hamas's formation of this party was a logical step, following nearly two decades of participation in local and municipal elections. Hamas's need to attract resources from external donors, who make funding decisions based on civilian support for the movement, best explains why Hamas decided to participate in local elections in the early 1990s, taking Hamas on a path that eventually led to its 2006 legislative victory. Hamas's foray into elections was consistent with its dual strategy of directing violence against Israel and building Palestinian support through welfare services. We demonstrate that changes in political opportunities (Fatah's decline and the increase in Hamas's popularity), institutional incentives (lax electoral laws and the holding of municipal elections), and the rise of moderate voices within Hamas explain the timing of its entry into legislative elections. Finally, we discuss Hamas's electoral victory, the need for cooperation between Fatah and Hamas, and the role played by international actors as significant factors influencing prospects for peace and democratization in the region.
Journal: Terrorism and Political Violence
Pages: 75-93
Issue: 1
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.733273
File-URL: http://hdl.handle.net/10.1080/09546553.2013.733273
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:1:p:75-93



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_733274_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Matt Buehler
Author-X-Name-First: Matt
Author-X-Name-Last: Buehler
Title: Safety-Valve Elections and the Arab Spring: The Weakening (and Resurgence) of Morocco's Islamist Opposition Party
Abstract: What purpose do elections serve in authoritarian states? Scholars often describe these elections as “safety valves” to contain opposition groups. Though we often use this safety valve terminology, it remains an abstract concept without sufficient empirical testing. In a study of the 2009 local elections in Morocco, I show how this safety-valve process played out in real politics. This article makes the case that the Moroccan regime undertook activities in an effort to weaken the Justice and Development Party (PJD), an Islamist opposition party. Using 20 original interviews and over 100 Arabic primary documents, I delineate the ways in which regime elites manipulated electoral rules and formal institutions, especially loyalist political parties, in an attempt to undermine the Islamists’ power between 2007 and 2010. I also examine how Arab Spring unrest turned back many of these efforts, empowering the PJD to secure a sweeping victory in the 2011 parliamentary elections. I conclude by discussing how scholars may reconsider safety-valve elections in authoritarian regimes as sequenced processes rather than one-time events. This case study of Morocco generates a new theory of safety-valve elections testable in other contexts.
Journal: Terrorism and Political Violence
Pages: 137-156
Issue: 1
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.733274
File-URL: http://hdl.handle.net/10.1080/09546553.2013.733274
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:1:p:137-156



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_733250_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nil Satana
Author-X-Name-First: Nil
Author-X-Name-Last: Satana
Author-Name: Molly Inman
Author-X-Name-First: Molly
Author-X-Name-Last: Inman
Author-Name: Jóhanna Birnir
Author-X-Name-First: Jóhanna
Author-X-Name-Last: Birnir
Title: Religion, Government Coalitions, and Terrorism
Abstract: When ethnic minority parties are excluded from government coalitions, are group attributes such as religion related to the groups’ use of political violence? We argue that extremist factions within minority groups make use of divergence in religion to mobilize support for violent action when the group is excluded from government. Thus, we posit that while religion per se is not a source of violence, extremist elements of ethnic minorities, whose religion differs from the majority, may use religious divergence to mobilize group members to perpetrate terrorism. Specifically we test the hypotheses that extremist factions of an excluded group will be more likely to carry out terrorist attacks when the group's members belong to a different religion as well as when they belong to a different denomination or sect of a religion than the majority. To test these propositions, we use data on ethnic minority party inclusion in government coalitions, ethnic minority group religion, and the Global Terrorism Database (GTD) by matching perpetrators with ethnic groups for all democracies, 1970–2004.
Journal: Terrorism and Political Violence
Pages: 29-52
Issue: 1
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.733250
File-URL: http://hdl.handle.net/10.1080/09546553.2013.733250
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:1:p:29-52



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_733276_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mary Beth Altier
Author-X-Name-First: Mary Beth
Author-X-Name-Last: Altier
Author-Name: Susanne Martin
Author-X-Name-First: Susanne
Author-X-Name-Last: Martin
Author-Name: Leonard Weinberg
Author-X-Name-First: Leonard
Author-X-Name-Last: Weinberg
Title: Conclusions to the Special Issue on Violence, Elections, and Party Politics
Journal: Terrorism and Political Violence
Pages: 157-159
Issue: 1
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.733276
File-URL: http://hdl.handle.net/10.1080/09546553.2013.733276
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:1:p:157-159



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_733272_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Rogelio Alonso
Author-X-Name-First: Rogelio
Author-X-Name-Last: Alonso
Title: The Madrid Bombings and Negotiations With ETA: A Case Study of the Impact of Terrorism on Spanish Politics
Abstract: This article analyzes the impact that two terrorism-related matters had on Spanish politics and electoral processes in the country. First, the article analyzes the terrorist attacks perpetrated by jihadists on March 11, 2004, three days before Spain's general election. The indiscriminate, lethal attacks caused a state of shock in the country, brought the election campaign to a sudden end, and led to the defeat of the party in power. Second, the article analyzes the negotiations entered into with the ETA terrorist organization by the new government during its first term, from 2004 to 2008. This controversial step, upheld by the Spanish government despite massive opposition by civil society and the main opposition party, failed to bring about the end of ETA. Both the Madrid attacks and the negotiations with ETA were responsible for the breakdown of the consensus in regard to terrorism that had existed among the main Spanish political parties. The article analyzes how both events generated an unprecedented level of polarization and tension among political parties and society from 2004 to 2008, and how each event had a different impact on the general elections held during that period. The period under examination provides an example of adversarial politics; terrorism was highly influenced by the management of both events by the main political players.
Journal: Terrorism and Political Violence
Pages: 113-136
Issue: 1
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.733272
File-URL: http://hdl.handle.net/10.1080/09546553.2013.733272
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:1:p:113-136



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_733251_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Robert Brathwaite
Author-X-Name-First: Robert
Author-X-Name-Last: Brathwaite
Title: The Electoral Terrorist: Terror Groups and Democratic Participation
Abstract: Why do some terrorist groups participate in the electoral process but not others? If elections provide some strategic or tactical benefit then we would expect other groups to emulate that strategy. However, we see variation in the adoption of an electoral strategy by terrorist groups. I argue that involvement in territorial disputes and group competition determine whether terrorist groups embrace an electoral strategy. Conflicts involving territorial disputes are more likely to see terrorist groups contest elections because electoral participation may aid in the creation of the independent or autonomous territory they desire. Increased group competition changes the number of actors, which impacts the level and distribution of resources (supporters, finance, and arms) involved in the conflict. When multiple terrorist groups compete, groups are motivated to participate in elections in response to new competitive pressures. This argument is tested using a large-n dataset of 89 terrorist groups in existence during the years 1968–2006 and a case study of Hamas's decision to contest elections.
Journal: Terrorism and Political Violence
Pages: 53-74
Issue: 1
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.733251
File-URL: http://hdl.handle.net/10.1080/09546553.2013.733251
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:1:p:53-74



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_733271_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Luis de la Calle
Author-X-Name-First: Luis
Author-X-Name-Last: de la Calle
Author-Name: Ignacio Sánchez-Cuenca
Author-X-Name-First: Ignacio
Author-X-Name-Last: Sánchez-Cuenca
Title: Killing and Voting in the Basque Country: An Exploration of the Electoral Link Between ETA and its Political Branch
Abstract: We deal in this article with the relationship between ETA attacks and electoral support for Batasuna, its political wing. We show that the relationship is twofold, since the geographical distribution of electoral support for the terrorists affects the location of ETA attacks, but violence also influences electoral support for the terrorist cause. On the one hand, when ETA chooses a location for its attacks, it takes into account the electoral strength of Batasuna. Our results show that the higher the vote for Batasuna in a municipality, the more likely members of the security forces will be killed there. With regard to the targeting of civilians, the relationship is curvilinear. ETA kills civilians in municipalities that are polarized, where support for Batasuna falls short of being hegemonic. On the other hand, our results also show that ETA attacks have an effect on the size of its support community. When ETA kills members of the security forces, voters punish the Batasuna party electorally. In the case of civilians, it depends on the specifics of the various campaigns. We find that when ETA kills informers and drug-dealers, the vote for Batasuna increases. ETA's killing of non-nationalist politicians, however, decreases Batasuna's vote share.
Journal: Terrorism and Political Violence
Pages: 94-112
Issue: 1
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.733271
File-URL: http://hdl.handle.net/10.1080/09546553.2013.733271
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:1:p:94-112



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_733241_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mary Beth Altier
Author-X-Name-First: Mary Beth
Author-X-Name-Last: Altier
Author-Name: Susanne Martin
Author-X-Name-First: Susanne
Author-X-Name-Last: Martin
Author-Name: Leonard Weinberg
Author-X-Name-First: Leonard
Author-X-Name-Last: Weinberg
Title: Introduction to the Special Issue on Violence, Elections, and Party Politics
Journal: Terrorism and Political Violence
Pages: 1-7
Issue: 1
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.733241
File-URL: http://hdl.handle.net/10.1080/09546553.2013.733241
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:1:p:1-7



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_733247_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lindsay Newman
Author-X-Name-First: Lindsay
Author-X-Name-Last: Newman
Title: Do Terrorist Attacks Increase Closer to Elections?
Abstract: The shadow of violence that elections cast remains poorly understood. A key obstacle impeding cross-national empirical analysis of electoral violence has been the varied nature of such violence. To address this challenge, I examine terrorist attacks as one particular form of electoral violence. By tracking the incidence of terrorist violence relative to election dates over time and across countries using an original dataset for the period from 2000–2005, I find strong support for the hypothesis that terrorist violence increases as we move closer to an election date. In fact, terrorist violence approximates a normal distribution centered on the election date.
Journal: Terrorism and Political Violence
Pages: 8-28
Issue: 1
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.733247
File-URL: http://hdl.handle.net/10.1080/09546553.2013.733247
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:1:p:8-28

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_728939_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mahmoud Eid
Author-X-Name-First: Mahmoud
Author-X-Name-Last: Eid
Title: Brigitte L. Nacos. 
Journal: Terrorism and Political Violence
Pages: 328-330
Issue: 2
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2012.728939
File-URL: http://hdl.handle.net/10.1080/09546553.2012.728939
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:2:p:328-330



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_659361_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniela Pisoiu
Author-X-Name-First: Daniela
Author-X-Name-Last: Pisoiu
Title: Coming to Believe “Truths” About Islamist Radicalization in Europe
Abstract: This article addresses four assumptions behind many of the current theoretical and policy approaches to individual processes of Islamist radicalization in Europe: the association with terrorism and extremism; determinism; the extraordinary nature of radicals; and the reification of the grievance and collective identity discourse. It argues for an intentional and developmental, rather than structural and socio-economic feature-focused, approach to the explanation of the radicalization process, with the consideration of framing and socio-psychological mechanisms having an impact on individual decision-making processes, and for an overall, broader conceptual understanding of radicalism.
Journal: Terrorism and Political Violence
Pages: 246-263
Issue: 2
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2012.659361
File-URL: http://hdl.handle.net/10.1080/09546553.2012.659361
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:2:p:246-263



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_755419_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kieran McEvoy
Author-X-Name-First: Kieran
Author-X-Name-Last: McEvoy
Author-Name: Pete Shirlow
Author-X-Name-First: Pete
Author-X-Name-Last: Shirlow
Title: The Northern Ireland Peace Process and “Terroristic” Narratives: A Reply to Edwards and McGrattan
Journal: Terrorism and Political Violence
Pages: 161-166
Issue: 2
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.755419
File-URL: http://hdl.handle.net/10.1080/09546553.2013.755419
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:2:p:161-166



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_728942_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: D. Mulloy
Author-X-Name-First: D.
Author-X-Name-Last: Mulloy
Title: Mark S. Hamm. 
Journal: Terrorism and Political Violence
Pages: 331-333
Issue: 2
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2012.728942
File-URL: http://hdl.handle.net/10.1080/09546553.2012.728942
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:2:p:331-333



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_761846_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Ali S. Awadh Asseri. 
Journal: Terrorism and Political Violence
Pages: 338-340
Issue: 2
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.761846
File-URL: http://hdl.handle.net/10.1080/09546553.2013.761846
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:2:p:338-340



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_728941_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard Phelps
Author-X-Name-First: Richard
Author-X-Name-Last: Phelps
Title: Theo Padnos. 
Journal: Terrorism and Political Violence
Pages: 330-331
Issue: 2
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2012.728941
File-URL: http://hdl.handle.net/10.1080/09546553.2012.728941
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:2:p:330-331



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_761858_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Clark McCauley
Author-X-Name-First: Clark
Author-X-Name-Last: McCauley
Title: Erica Chenoweth and Adria Lawrence. 
Journal: Terrorism and Political Violence
Pages: 340-344
Issue: 2
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.761858
File-URL: http://hdl.handle.net/10.1080/09546553.2013.761858
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:2:p:340-344



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_652318_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Eva Herschinger
Author-X-Name-First: Eva
Author-X-Name-Last: Herschinger
Title: A Battlefield of Meanings: The Struggle for Identity in the UN Debates on a Definition of International Terrorism
Abstract: For nearly forty years, debates on a definition of international terrorism as part of a comprehensive convention have been preoccupying the United Nations. This article challenges conventional approaches referring to divergences in national interests and preferences, or to institutional constraints and national legal traditions, to explain why no definition has been agreed upon. It analyzes the inconclusive debates from a critical perspective and argues that the continuous search for a definition can be understood through the prism of collective identity struggles: the desire to define terrorism is not only the desire to give a precise content to terrorism and, thereby, create the identity of an Other. It is also the desire to create a collective identity, a “Self,” representing and uniting those who oppose terrorism. By applying a discursive understanding of collective identity construction to analyze the UN debates, the article elucidates how strongly the definition of terrorism hinders a common understanding among those who are opposing terrorism. Thereby, the analysis highlights that the demonization of terrorism foremost impedes a homogeneous understanding of a collective Self, ready to confront and define terrorism in the first place.
Journal: Terrorism and Political Violence
Pages: 183-201
Issue: 2
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2011.652318
File-URL: http://hdl.handle.net/10.1080/09546553.2011.652318
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:2:p:183-201



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_664011_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Megan Smith
Author-X-Name-First: Megan
Author-X-Name-Last: Smith
Author-Name: James Walsh
Author-X-Name-First: James
Author-X-Name-Last: Walsh
Title: Do Drone Strikes Degrade Al Qaeda? Evidence From Propaganda Output
Abstract: The United States has used unmanned, aerial vehicles—drones—to launch attacks on militants associated with Al Qaeda and other violent groups based in Pakistan. The goal is to degrade the target's capacity to undertake political and violent action. We assess the effectiveness of drone strikes in achieving this goal, measuring degradation as the capacity of Al Qaeda to generate and disseminate propaganda. Propaganda is a key output of many terrorist organizations and a long-standing priority for Al Qaeda. Unlike other potential measures of terrorist group activity and capacity, propaganda output can be observed and measured. If drone strikes have degraded Al Qaeda, their occurrence should be correlated with a reduction in the organization's propaganda output. The analysis presented here finds little evidence that this is the case. Drone strikes have not impaired Al Qaeda's ability to generate propaganda.
Journal: Terrorism and Political Violence
Pages: 311-327
Issue: 2
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2012.664011
File-URL: http://hdl.handle.net/10.1080/09546553.2012.664011
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:2:p:311-327



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_662557_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Brian Jackson
Author-X-Name-First: Brian
Author-X-Name-Last: Jackson
Author-Name: Bryce Loidolt
Author-X-Name-First: Bryce
Author-X-Name-Last: Loidolt
Title: Considering al-Qa'ida's Innovation Doctrine: From Strategic Texts to “Innovation in Practice”
Abstract: Understanding how terrorist groups innovate and adapt is key for anticipating future shifts in terrorist threats. Past innovation studies have identified factors that shape group behavior, as well as the importance of combining study of organizations' innovation doctrines with data on how these doctrines are put into practice. Here we describe such an analysis for two texts that have shaped al-Qa'ida and its associated movements' strategies: contrasting Naji's Management of Savagery with al-Suri's Call to Global Islamic Resistance—including elements of the latter relevant to innovation specifically translated for this work. Though open source data on the groups' innovation practices are necessarily more sparse, we contrast the doctrinal texts with selected examples, which suggest caution in assuming that group doctrine is necessarily put into practice “as written.” [Supplemental materials are available for this article. Please visit the publisher's online edition of Terrorism and Political Violence for the following free, supplemental resource: Translation of portions of Abu Mus'ab al-Suri's The Call for Global Islamic Resistance, relating to innovation and learning.]
Journal: Terrorism and Political Violence
Pages: 284-310
Issue: 2
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2012.662557
File-URL: http://hdl.handle.net/10.1080/09546553.2012.662557
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:2:p:284-310



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_728943_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: JoEllen McNergney Vinyard. 
Journal: Terrorism and Political Violence
Pages: 333-335
Issue: 2
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2012.728943
File-URL: http://hdl.handle.net/10.1080/09546553.2012.728943
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:2:p:333-335



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_653893_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Donald Holbrook
Author-X-Name-First: Donald
Author-X-Name-Last: Holbrook
Author-Name: Gilbert Ramsay
Author-X-Name-First: Gilbert
Author-X-Name-Last: Ramsay
Author-Name: Max Taylor
Author-X-Name-First: Max
Author-X-Name-Last: Taylor
Title: “Terroristic Content”: Towards a Grading Scale
Abstract: In this article we offer a first attempt at providing a set of universal grading criteria for determining on what basis, and how far, an item of discursive content can be considered “terroristic.” In doing so, we draw loosely on the existing COPINE scale for child abuse images. The scale described in the article is not intended to reflect actual risk of engagement in terrorist violence, nor is it intended to have evidential validity in relation to offenses in certain jurisdictions relating to “terrorist publications.” Rather, by formalising assumptions which seem already to be latent in the literature on terrorist use of the Internet, it aspires to serve as a starting point for a more methodologically coherent approach to relationships between content—particularly online content—and terrorism.
Journal: Terrorism and Political Violence
Pages: 202-223
Issue: 2
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2011.653893
File-URL: http://hdl.handle.net/10.1080/09546553.2011.653893
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:2:p:202-223



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_761842_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Donald Denton
Author-X-Name-First: Donald
Author-X-Name-Last: Denton
Title: Daniel M. Gerstein. 
Journal: Terrorism and Political Violence
Pages: 335-338
Issue: 2
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.761842
File-URL: http://hdl.handle.net/10.1080/09546553.2013.761842
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:2:p:335-338



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_661321_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Erik Ringmar
Author-X-Name-First: Erik
Author-X-Name-Last: Ringmar
Title: “How to Fight Savage Tribes”: The Global War on Terror in Historical Perspective
Abstract: The Bush administration's “Global War on Terror” has, by both defenders and critics, been characterized as unique. However, as this article shows, there is a long tradition, both in the United States and in Europe, of fighting wars against “savage tribes”—against enemies who fail to make a distinction between soldiers and civilians, and who use terror as a weapon. The problem of how to fight such groups was much discussed in the legal literature of the nineteenth century. This is a discussion from which it is possible to learn contemporary lessons.
Journal: Terrorism and Political Violence
Pages: 264-283
Issue: 2
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2012.661321
File-URL: http://hdl.handle.net/10.1080/09546553.2012.661321
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:2:p:264-283



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_761861_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Raphael Cohen-Almagor
Author-X-Name-First: Raphael
Author-X-Name-Last: Cohen-Almagor
Title: Yaakov Lappin. 
Journal: Terrorism and Political Violence
Pages: 344-346
Issue: 2
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.761861
File-URL: http://hdl.handle.net/10.1080/09546553.2013.761861
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:2:p:344-346



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_761862_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Alessandro Orsini. 
Journal: Terrorism and Political Violence
Pages: 346-348
Issue: 2
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.761862
File-URL: http://hdl.handle.net/10.1080/09546553.2013.761862
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:2:p:346-348



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_657280_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Simon Pratt
Author-X-Name-First: Simon
Author-X-Name-Last: Pratt
Title: “Anyone Who Hurts Us”: How the Logic of Israel's “Assassination Policy” Developed During the Aqsa Intifada
Abstract: This article examines the evolving logic to the systematic assassinations of Palestinian activists carried out by Israel during the Aqsa Intifada (September 2000–2005). It argues that the logic of Israel's “assassination policy” developed in three stages. During each successive stage, the security executive expanded the scope of who could be legitimately targeted and what goals could be served in doing so. This article further argues that normative and legal considerations played a key role in determining target selection and tactical means. It finds that during the Aqsa Intifada, the Israeli government used assassination not according to any unified purpose but rather as an evolving and often ad hoc combination of political communication, tactical action and, more rarely, strategic manipulation. In short: there was not one single rationale driving the assassinations but several.
Journal: Terrorism and Political Violence
Pages: 224-245
Issue: 2
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2012.657280
File-URL: http://hdl.handle.net/10.1080/09546553.2012.657280
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:2:p:224-245



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_755815_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Emmanuel Karagiannis
Author-X-Name-First: Emmanuel
Author-X-Name-Last: Karagiannis
Author-Name: Clark McCauley
Author-X-Name-First: Clark
Author-X-Name-Last: McCauley
Title: The Emerging Red-Green Alliance: Where Political Islam Meets the Radical Left
Abstract: No matter how unlikely it may seem, radical Leftists and Islamists have come closer in recent years. Drawing on substantial ideological interchange, and operating at both state and non-state levels, the two movements are building a Common Front against the United States and its allies. In this article, we use framing theory to examine the contemporary convergence of political Islam and the radical Left. Both radical Leftists and Islamists have utilized the master frame of anti-globalization/anti-capitalism and the master frame of anti-colonialism/anti-imperialism to elicit support from the widest possible range of people. The emerging Red-Green alliance presents a complex challenge that will require careful attention from U.S. and European policymakers.
Journal: Terrorism and Political Violence
Pages: 167-182
Issue: 2
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2012.755815
File-URL: http://hdl.handle.net/10.1080/09546553.2012.755815
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:2:p:167-182

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_795416_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: D. Mulloy
Author-X-Name-First: D.
Author-X-Name-Last: Mulloy
Title: Fred Halliday. 
Journal: Terrorism and Political Violence
Pages: 504-505
Issue: 3
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.795416
File-URL: http://hdl.handle.net/10.1080/09546553.2013.795416
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:3:p:504-505



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_795415_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Raphael Cohen-Almagor
Author-X-Name-First: Raphael
Author-X-Name-Last: Cohen-Almagor
Title: Ami Pedahzur and Arie Perliger. 
Journal: Terrorism and Political Violence
Pages: 501-503
Issue: 3
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.795415
File-URL: http://hdl.handle.net/10.1080/09546553.2013.795415
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:3:p:501-503



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_667738_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gideon Aran
Author-X-Name-First: Gideon
Author-X-Name-Last: Aran
Author-Name: Ron Hassner
Author-X-Name-First: Ron
Author-X-Name-Last: Hassner
Title: Religious Violence in Judaism: Past and Present
Abstract: Throughout Jewish history, religious tradition has had a dialectical relationship with violence. Judaism is neither more nor less violent than any other religion. In this essay, however, we offer a comprehensive and integrated survey of the components of Jewish ethos and mythos relating to violence while analyzing and illustrating their development and influence over the course of three millennia, from biblical times to the contemporary Jewish world, particularly in the Jewish State. We analyze the various transformations that Jewish religious violent norms, values, moods, and symbols have undergone, their linkage to ever-changing social and cultural circumstances, their social-political roots and implications, and their relationship to other Jewish traditions. We trace how ancient violent motifs have emerged and have been processed over time, and observe present-day violent behavior in light of these motifs. Along the way, we explicate the dynamics that characterize the tradition of Jewish religious violence and its paradoxical nature. Our argument implies a general theoretical model of religious violence that can be applied in a comparative context: Actors engage in a constant evaluation, selection, and reinterpretation of religious ideas and practices from an ever-growing reservoir and in so doing contribute to that reservoir. Religious tradition is adaptable but it also places limits on the violence agents can justify at any point in time.
Journal: Terrorism and Political Violence
Pages: 355-405
Issue: 3
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2012.667738
File-URL: http://hdl.handle.net/10.1080/09546553.2012.667738
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:3:p:355-405



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_795414_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dipak Gupta
Author-X-Name-First: Dipak
Author-X-Name-Last: Gupta
Title: Stephen Tankel.  Dilip Hiro. 
Journal: Terrorism and Political Violence
Pages: 499-501
Issue: 3
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.795414
File-URL: http://hdl.handle.net/10.1080/09546553.2013.795414
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:3:p:499-501



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_795413_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard Phelps
Author-X-Name-First: Richard
Author-X-Name-Last: Phelps
Title: Melissa Finn. 
Journal: Terrorism and Political Violence
Pages: 497-499
Issue: 3
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.795413
File-URL: http://hdl.handle.net/10.1080/09546553.2013.795413
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:3:p:497-499



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_667744_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ami Pedahzur
Author-X-Name-First: Ami
Author-X-Name-Last: Pedahzur
Author-Name: Arie Perliger
Author-X-Name-First: Arie
Author-X-Name-Last: Perliger
Title: Comment on “Religious Violence in Judaism: Past and Present” by Gideon Aran and Ron E. Hassner
Journal: Terrorism and Political Violence
Pages: 413-415
Issue: 3
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2012.667744
File-URL: http://hdl.handle.net/10.1080/09546553.2012.667744
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:3:p:413-415



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_795412_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Stephen E. Atkins.  (Volumes 1 and 2)
Journal: Terrorism and Political Violence
Pages: 495-497
Issue: 3
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.795412
File-URL: http://hdl.handle.net/10.1080/09546553.2013.795412
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:3:p:495-497



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_795411_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard Phelps
Author-X-Name-First: Richard
Author-X-Name-Last: Phelps
Title: Abdel Bari Atwan. 
Journal: Terrorism and Political Violence
Pages: 494-495
Issue: 3
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.795411
File-URL: http://hdl.handle.net/10.1080/09546553.2013.795411
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:3:p:494-495



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_667745_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gideon Aran
Author-X-Name-First: Gideon
Author-X-Name-Last: Aran
Author-Name: Ron Hassner
Author-X-Name-First: Ron
Author-X-Name-Last: Hassner
Title: Rejoinder
Journal: Terrorism and Political Violence
Pages: 416-418
Issue: 3
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2012.667745
File-URL: http://hdl.handle.net/10.1080/09546553.2012.667745
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:3:p:416-418



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_667018_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Rory Cormac
Author-X-Name-First: Rory
Author-X-Name-Last: Cormac
Title: Much Ado About Nothing: Terrorism, Intelligence, and the Mechanics of Threat Exaggeration
Abstract: Through its ability to transcend not only national boundaries but so too departmental jurisdictions and the traditional public-private security divide, the rise of international terrorism in the late 1960s and early 1970s posed a number of challenges to the British intelligence machinery which remain relevant today. This article focuses on the dangers and mechanics of threat exaggeration and the importance of intelligence coordination to ensure that threats are assessed and reports are disseminated in a realistic manner. Using the over-emphasised threat of maritime terrorism in 1970 as a case study, this article is able to examine the intelligence cycle as a whole and consider the importance of source validation, the dangers of incremental analysis, and the need for coordinated advice disseminated coherently to consumers both inside and outside of the government.
Journal: Terrorism and Political Violence
Pages: 476-493
Issue: 3
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2012.667018
File-URL: http://hdl.handle.net/10.1080/09546553.2012.667018
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:3:p:476-493



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_667740_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Eitan Alimi
Author-X-Name-First: Eitan
Author-X-Name-Last: Alimi
Title: Response to Aran and Hassner's “Religious Violence in Judaism: Past and Present”: A Comprehensive Yet Unfinished Agenda for Understanding Religious Violence
Journal: Terrorism and Political Violence
Pages: 406-408
Issue: 3
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2012.667740
File-URL: http://hdl.handle.net/10.1080/09546553.2012.667740
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:3:p:406-408



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_667741_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard Hecht
Author-X-Name-First: Richard
Author-X-Name-Last: Hecht
Title: Not All Actors Are the Same: Some Comments in Response to Gideon Aran and Ron E. Hassner's “Religious Violence in Judaism: Past and Present”
Journal: Terrorism and Political Violence
Pages: 409-412
Issue: 3
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2012.667741
File-URL: http://hdl.handle.net/10.1080/09546553.2012.667741
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:3:p:409-412



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_791122_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Aaron Edwards
Author-X-Name-First: Aaron
Author-X-Name-Last: Edwards
Author-Name: Cillian MCGrattan
Author-X-Name-First: Cillian
Author-X-Name-Last: MCGrattan
Title: What We Talk About When We Talk About Peace: A Rejoinder to McEvoy and Shirlow
Journal: Terrorism and Political Violence
Pages: 351-354
Issue: 3
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.791122
File-URL: http://hdl.handle.net/10.1080/09546553.2013.791122
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:3:p:351-354



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_664202_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: George Garner
Author-X-Name-First: George
Author-X-Name-Last: Garner
Title: Chechnya and Kashmir: The Jihadist Evolution of Nationalism to Jihad and Beyond
Abstract: This article examines the transformation of the Chechen conflict from a predominately nationalist to jihadist struggle, and compares the similar changes that took place in the Kashmiri insurgency. Using global jihadist strategy and ideology, and the accompanying influence of Al Qaida, both conflicts are shown to have taken on a new ideology and to have expanded beyond previous areas of operation. In both instances, the political leadership wrapped themselves in the mantle of political Islam (Islamism) as ensuing violence led to rapid socioeconomic transformation and social breakdown, thus allowing foreign jihadists to exert power and take up/divert the cause. In the past few years, two main groups originating in Chechnya and Kashmir have taken on Western targets and become more indoctrinated in Al Qaida's global jihadist ideology: the Caucasus Emirate (CE) and Lashkar-e-Taiba (LeT). The opportunist franchising strategy of Al Qaida could come to play a role in the future of both groups, especially if the CE is able to coalesce into a more unified front. More importantly, the global jihadist attributes of the CE must begin to garner the same attention in the Western world as that of LeT.
Journal: Terrorism and Political Violence
Pages: 419-434
Issue: 3
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2012.664202
File-URL: http://hdl.handle.net/10.1080/09546553.2012.664202
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:3:p:419-434



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_664587_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Paul Gill
Author-X-Name-First: Paul
Author-X-Name-Last: Gill
Author-Name: John Horgan
Author-X-Name-First: John
Author-X-Name-Last: Horgan
Title: Who Were the Volunteers? The Shifting Sociological and Operational Profile of 1240 Provisional Irish Republican Army Members
Abstract: This article presents an empirical analysis of a unique dataset of 1240 former members of the Provisional Irish Republican Army (PIRA). We highlight the shifting sociological and operational profile of PIRA's cadre, and highlight these dynamics in conjunction with primary PIRA documents and secondary interview sources. The effect of these changes in terms of the scale and intensity of PIRA violence is also considered. Although this is primarily a study of a disbanded violent organization, it contains broad policy implications beyond the contemporary violence of dissident movements in both Northern Ireland and the Republic of Ireland. We conclude with a consideration of how a shifting sociological profile impacts upon group effectiveness, resilience, homogeneity, and the turn toward peaceful means of contention.
Journal: Terrorism and Political Violence
Pages: 435-456
Issue: 3
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2012.664587
File-URL: http://hdl.handle.net/10.1080/09546553.2012.664587
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:3:p:435-456



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_664588_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ian Taylor
Author-X-Name-First: Ian
Author-X-Name-Last: Taylor
Author-Name: Zhengyu Wu
Author-X-Name-First: Zhengyu
Author-X-Name-Last: Wu
Title: China's Arms Transfers to Africa and Political Violence
Abstract: Chinese arms sales to Africa have increased in recent years. In a region beset by conflict and unstable regimes, and where arms sales are a significant and positive predictor of an increased probability of political violence, this is inherently problematic. The sale of weaponry to a regime in Khartoum caught up in an alleged “genocide” in Darfur, the awkward appearance in 2008 of a Chinese ship loaded with weapons bound for Mugabe's Zimbabwe off the coast of eastern Africa, and the recent exposure in 2011 that Chinese arms companies offered to sell around $200 million worth of arms to Muammar Gaddafi's regime are emblematic of an issue in Africa's political violence that needs analysis. This article seeks to discuss the rationale behind China's arms sales to Africa and the effect that they have had on political violence in recipient countries. It also provides an analysis of the supply-and-demand circumstances of Chinese arms transfers to Africa, Beijing's attempts to control such transfers, and evidence that Chinese policies on proliferation are (slowly) evolving.
Journal: Terrorism and Political Violence
Pages: 457-475
Issue: 3
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2012.664588
File-URL: http://hdl.handle.net/10.1080/09546553.2012.664588
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:3:p:457-475



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_795419_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Clark McCauley
Author-X-Name-First: Clark
Author-X-Name-Last: McCauley
Title: Antonio Giustozzi. 
Journal: Terrorism and Political Violence
Pages: 508-509
Issue: 3
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.795419
File-URL: http://hdl.handle.net/10.1080/09546553.2013.795419
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:3:p:508-509



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_795417_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David Hofmann
Author-X-Name-First: David
Author-X-Name-Last: Hofmann
Title: Frazer Egerton. 
Journal: Terrorism and Political Violence
Pages: 505-506
Issue: 3
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.795417
File-URL: http://hdl.handle.net/10.1080/09546553.2013.795417
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:3:p:505-506



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_795418_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Raphael Cohen-Almagor
Author-X-Name-First: Raphael
Author-X-Name-Last: Cohen-Almagor
Title: Joy Warrick. 
Journal: Terrorism and Political Violence
Pages: 506-508
Issue: 3
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.795418
File-URL: http://hdl.handle.net/10.1080/09546553.2013.795418
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:3:p:506-508

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_814506_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kineret Guterman
Author-X-Name-First: Kineret
Author-X-Name-Last: Guterman
Title: The Dynamics of Stereotyping: Is a New Image of the Terrorist Evolving in American Popular Culture?
Abstract: This article considers popular ways of representing terror activists, and the metamorphoses that approaches to representation in the American media have undergone. A part of the article deals with terrorism in the media over time, common stereotypes, and how they affect the representation of Arabs and Muslims. The article then discusses Sleeper Cell (2005), a mini-series which focuses on a Jihad terror group. The article addresses questions including: How are Arabs and non-Arab Muslims portrayed in the series? Can a real change be observed over time in the method of portraying them? Twentieth-century historical considerations precede the pointed topical discussion.
Journal: Terrorism and Political Violence
Pages: 640-652
Issue: 4
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.814506
File-URL: http://hdl.handle.net/10.1080/09546553.2013.814506
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:4:p:640-652



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_814505_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sariel Birnbaum
Author-X-Name-First: Sariel
Author-X-Name-Last: Birnbaum
Title: Egyptian Cinema as a Tool in the Struggle Against Islamic Terrorism
Abstract: The cinema has been used by Egyptian regimes, from the monarchy until Mubarak, to resist the political agenda of Islamic radicals and terrorists. Edward Said and others describe Islamic terrorists’ images in the Western media as “Western fantasies.” Nevertheless, for Egyptian intellectuals, terrorists were and remain a stark reality. In Egypt, the entire state apparatus was set in motion to fight Islamic terrorism. The state was unprepared for the massive popular uprising of 2011. While the direction that Egyptian culture will follow after Mubarak remains unclear, an important objective is to study pre-revolutionary Egyptian cinema and to understand its ideological tendencies.
Journal: Terrorism and Political Violence
Pages: 635-639
Issue: 4
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.814505
File-URL: http://hdl.handle.net/10.1080/09546553.2013.814505
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:4:p:635-639



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_814499_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Weisskopf
Author-X-Name-First: Michael
Author-X-Name-Last: Weisskopf
Title: Where Trotsky's Train Comes From: A Literary Scholar's View of a Revolutionary's Biography
Abstract: The article discusses the autobiography of Leon Trotsky (published by Bronshtein in 1930) from a psychoanalytic angle. Trotsky the revolutionary leader was a key figure in the October 1917 coup, and a statesman second only to Lenin in the early years of the Soviet regime. The article concentrates on Trotsky's departure from Judaism and evolution toward Christianity. The author sees this drift as parallel to Trotsky's transition from the Jewish bourgeoisie to the Russian proletariat. The next step in this process of denationalization would be Trotsky's embracing of world revolution. Bolshevik terror became for Trotsky a form of emancipation from his personal past.
Journal: Terrorism and Political Violence
Pages: 576-586
Issue: 4
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.814499
File-URL: http://hdl.handle.net/10.1080/09546553.2013.814499
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:4:p:576-586



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_814491_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Paul Hollander
Author-X-Name-First: Paul
Author-X-Name-Last: Hollander
Title: Righteous Political Violence and Contemporary Western Intellectuals
Abstract: Modern political violence has been increasingly preceded or accompanied by elaborate ideological justifications, devised, in part, by intellectuals motivated by their own political beliefs and commitments. Many idealistic intellectuals have been especially sympathetic toward political movements and systems that have promised to carry out far-reaching social transformations. These movements and systems have often relied upon violent means to accomplish their goals. The political partisanship of many Western intellectuals necessitates a revision of their idealized conception. These issues are dealt with in the context of the intellectuals’ attitudes toward Nazism, communism, and present-day Islamic radicalism.
Journal: Terrorism and Political Violence
Pages: 518-530
Issue: 4
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.814491
File-URL: http://hdl.handle.net/10.1080/09546553.2013.814491
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:4:p:518-530



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_814500_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Yossi Goldstein
Author-X-Name-First: Yossi
Author-X-Name-Last: Goldstein
Title: The Impact of Russian Terrorism in Kishinev on the Zionist Movement and the Jewish Intelligentsia
Abstract: The explosion of terror which took place in the Bessarabian capital in April 1903 and which has since become known as the Kishinev Pogrom had a profound impact on all of Russian Jewry. But as far as the Zionist movement is concerned, and in opposition to what is generally believed about the Pogrom's central role in the history of Zionism, the Pogrom did not lead to any changes in the activities undertaken by the Zionists or in the ideology which they espoused. It was rather that the Pogrom triggered certain phenomena already present in Zionism during the preceding few years.
Journal: Terrorism and Political Violence
Pages: 587-596
Issue: 4
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.814500
File-URL: http://hdl.handle.net/10.1080/09546553.2013.814500
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:4:p:587-596



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_814484_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Helena Rimon
Author-X-Name-First: Helena
Author-X-Name-Last: Rimon
Author-Name: Ron Schleifer
Author-X-Name-First: Ron
Author-X-Name-Last: Schleifer
Title: Who Will Guard the Guardians? Introduction to the Special Issue on the Intellectuals and Terror: A Fatal Attraction
Journal: Terrorism and Political Violence
Pages: 511-517
Issue: 4
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.814484
File-URL: http://hdl.handle.net/10.1080/09546553.2013.814484
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:4:p:511-517



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_814502_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Shlomo Shpiro
Author-X-Name-First: Shlomo
Author-X-Name-Last: Shpiro
Title: The Intellectual Foundations of Jewish National Terrorism: Avraham Stern and the Lehi
Abstract: The Lehi, a fringe Jewish paramilitary group created in 1940, conducted a concerted terrorist campaign against the British authorities in Palestine during and after World War II, proclaiming that its activities were undertaken in the name of national liberation. Lehi was founded and led by Avraham Stern, also known as “Yair.” Scholar, intellectual, and poet, Stern developed a fundamental ideology of national and messianic Jewish terrorism, which became the ideological basis not only for the work of the Lehi, but also for later Jewish terrorist activism. The present article examines the intellectual foundations of Lehi terrorism and how its intellectual and ideological principles influenced Lehi's most controversial activities—internal terrorism and the execution of its own members. In conclusion, the author traces the impact of Stern's intellectual legacy on later generations of Jewish terrorists.
Journal: Terrorism and Political Violence
Pages: 606-620
Issue: 4
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.814502
File-URL: http://hdl.handle.net/10.1080/09546553.2013.814502
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:4:p:606-620



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_814501_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Meir Seidler
Author-X-Name-First: Meir
Author-X-Name-Last: Seidler
Title: The Beauty and the Beast: Jean-Paul Sartre and the Baader-Meinhof Gang
Abstract: The article deals with the intellectual and philosophical background of Sartre's thought, which made him susceptible to the influence of left-wing totalitarian structures in general and to left-wing terrorism in particular. Consequently it is argued that Sartre's identification with Stalinism in his younger years, and his later sympathies with the infamous German Baader-Meinhof terrorist gang, were more than mere expressions of his personality, but rather part and parcel of his special blend of existentialism and philosophy. At the end of the article, Sartre's position in this matter is contrasted with the position of another existentialist French thinker, Sartre's contemporary, Albert Camus.
Journal: Terrorism and Political Violence
Pages: 597-605
Issue: 4
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.814501
File-URL: http://hdl.handle.net/10.1080/09546553.2013.814501
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:4:p:597-605



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_814496_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Golda Akhiezer
Author-X-Name-First: Golda
Author-X-Name-Last: Akhiezer
Title: Jewish Identity and the Russian Revolution: A Case Study of Radical Activism in the Russian Empire
Abstract: The article deals with Jewish revolutionaries in the Russian Empire from the 1880s until the October Revolution of 1917, approaching them through the prism of their identity crisis during a period of transition. The author's aim is to uncover the cultural and psychological mechanisms of Jewish radical motivation and to elucidate the factors which led to the formation of a radical consciousness and to growth in radical activity. Some of these mechanisms are universal, while others specifically characterize Jewish society in Russia. Equally essential are the modes of transformation of traditional Jewish concepts into the specific elements of revolutionary ideologies.
Journal: Terrorism and Political Violence
Pages: 561-575
Issue: 4
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.814496
File-URL: http://hdl.handle.net/10.1080/09546553.2013.814496
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:4:p:561-575



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_814504_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard Landes
Author-X-Name-First: Richard
Author-X-Name-Last: Landes
Title: From Useful Idiot to Useful Infidel: Meditations on the Folly of 21st-Century “Intellectuals”
Abstract: Lenin allegedly referred to the thinkers and activists ready to cover up for his crimes against his own people as “useful idiots.” Today, some intellectuals sacrifice their integrity as intellectuals not for a professedly progressive egalitarian movement, but in order to protect radical Islam, one of the most regressive and authoritarian movements imaginable. This article refers to such people as “useful infidels,” showing how their excessive self-criticism is exploited by Islamists to incriminate the West in the evils of modernity. The result is a perversion of human rights discourse and a marriage of pre-modern sadism and post-modern masochism.
Journal: Terrorism and Political Violence
Pages: 621-634
Issue: 4
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.814504
File-URL: http://hdl.handle.net/10.1080/09546553.2013.814504
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:4:p:621-634



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_814493_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Helena Rimon
Author-X-Name-First: Helena
Author-X-Name-Last: Rimon
Title: Paradoxes of “Free Floating” and Controversy of Betrayal: Intellectuals' Reflections on Themselves Against the Background of Terror
Abstract: Throughout the 1900s, intellectuals have been defined as a “privileged minority” (according to Chomsky), or as outsiders, whose “free floating” condition (Mannheim) guarantees their functioning as “custodians of values like reason and justice” (Hofstadter). Julien Benda accused intellectuals of betraying this mission. But, perhaps, betrayal is built into the very nature of their privileged position; perhaps, by pretending to be “free floating,” generations of intellectuals have actually been constructing predictable paradigms, using calamity as a new kind of raw material for the old myth of lucrimax (Etkind). The tragic experience of Russian intellectuals provides us with fresh insight for this discussion.
Journal: Terrorism and Political Violence
Pages: 531-549
Issue: 4
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.814493
File-URL: http://hdl.handle.net/10.1080/09546553.2013.814493
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:4:p:531-549



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_814494_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anna Geifman
Author-X-Name-First: Anna
Author-X-Name-Last: Geifman
Title: The Liberal Left Opts for Terror
Abstract: For a century, intellectual debate on political violence has been dominated by efforts to romanticize the extremist and to invest him with the aura of the altruistic “freedom fighter.” It is astonishing that in the post-9/11 era, the terrorist's image continues to remain habitually mystified and ennobled, while terror attacks are justified as self-defense. “Terrorist discourse” is indicative of the universality of the intellectual position of the Left with regard to terror, national discrepancies notwithstanding. The present article evaluates leftist liberals' attitudes towards terrorism in the 20th-century Russian Empire, Europe, the U.S., and especially Israel—one of the epicenters of terrorism today. The article proposes to examine psychological responses to terrorism in conjunction with a range of contemporary reactions to threats, acknowledged or displaced with an assortment of mental constructs and rationalizations.
Journal: Terrorism and Political Violence
Pages: 550-560
Issue: 4
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.814494
File-URL: http://hdl.handle.net/10.1080/09546553.2013.814494
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:4:p:550-560

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_699906_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Justin Hastings
Author-X-Name-First: Justin
Author-X-Name-Last: Hastings
Author-Name: Ryan Chan
Author-X-Name-First: Ryan
Author-X-Name-Last: Chan
Title: Target Hardening and Terrorist Signaling: The Case of Aviation Security
Abstract: In this article, we examine the relationship between hardening a target and the value that a terrorist group derives from attacking it. We use a simple expected value framework to compare how the expected value of attacking a hardened target varies between a violence-based approach, where terrorists are presumed to be maximizing the physical damage done to the target, and a signaling-based approach, where terrorists are presumed to be maximizing the symbolic value of their attack. We argue that, if it is proper to understand terrorist attacks as costly signals of terrorist strength or determination, hardening a target actually increases the expected value of attacking a target (relative to its value before hardening), even if the attack fails. We go on to examine the evolution of aviation security, and trace how al-Qaeda's views of airplanes and airports as targets have changed since 9/11. As aviation targets were hardened with increasingly onerous security measures, al-Qaeda began to see even attacks that did not result in detonation as successes, in large part because of what they signaled about al-Qaeda's abilities, and the ability of al-Qaeda to impose costs on the U.S. and other countries even in the absence of explosions.
Journal: Terrorism and Political Violence
Pages: 777-797
Issue: 5
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2012.699906
File-URL: http://hdl.handle.net/10.1080/09546553.2012.699906
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:5:p:777-797



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_842390_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Young
Author-X-Name-First: Michael
Author-X-Name-Last: Young
Title: Kent Roach. 
Journal: Terrorism and Political Violence
Pages: 852-854
Issue: 5
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.842390
File-URL: http://hdl.handle.net/10.1080/09546553.2013.842390
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:5:p:852-854



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_842391_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Raj Persaud
Author-X-Name-First: Raj
Author-X-Name-Last: Persaud
Title: Anne Clunan, Peter Lavoy, and Susan Martin (Eds.). 
Journal: Terrorism and Political Violence
Pages: 854-855
Issue: 5
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.842391
File-URL: http://hdl.handle.net/10.1080/09546553.2013.842391
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:5:p:854-855



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_842392_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Miranda Alison. 
Journal: Terrorism and Political Violence
Pages: 855-857
Issue: 5
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.842392
File-URL: http://hdl.handle.net/10.1080/09546553.2013.842392
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:5:p:855-857



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_700657_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Madhav Joshi
Author-X-Name-First: Madhav
Author-X-Name-Last: Joshi
Title: Livelihood Coping Mechanisms, Local Intelligence, and the Pattern of Violence During the Maoist Insurgency in Nepal
Abstract: While fighting insurgency, both state and non-state groups depend on the local population for valuable resources such as food, intelligence, and security. By using a repertoire of subsistence coping mechanisms available to households in the context of the local political economy as an indicator of grievances and mechanisms of interactions between local households and the state and insurgents, district level data from Nepal on Maoist conflict is used to test hypotheses regarding state and insurgent violence. The analysis confirms that the state was more likely to kill people in a district where the number of households that borrowed to cope with subsistence was high. The Maoists were more likely to kill in a district with a higher number of subsistence sufficient households.
Journal: Terrorism and Political Violence
Pages: 820-839
Issue: 5
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2012.700657
File-URL: http://hdl.handle.net/10.1080/09546553.2012.700657
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:5:p:820-839



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_842402_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Robert W. Pringle. 
Journal: Terrorism and Political Violence
Pages: 866-867
Issue: 5
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.842402
File-URL: http://hdl.handle.net/10.1080/09546553.2013.842402
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:5:p:866-867



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_842401_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Deepa M. Ollapally. 
Journal: Terrorism and Political Violence
Pages: 864-866
Issue: 5
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.842401
File-URL: http://hdl.handle.net/10.1080/09546553.2013.842401
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:5:p:864-866



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_700656_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joerg Le Blanc
Author-X-Name-First: Joerg
Author-X-Name-Last: Le Blanc
Title: The Urban Environment and its Influences on Insurgent Campaigns
Abstract: For a long time, insurgency was a rural affair. The growing modernization of the modern world, however, shifts conflicts to the cities and requires us to explore the logics of armed struggle in urban environments. This article explores how the urban environment shapes armed conflicts, and argues that insurgents face severe practical constraints when acting in the cities. The urban environment offers the insurgents alternative ways of financing and of operating while close state control impedes them in pursuing a classic strategy of insurgency. Although state control cannot prevent attacks as such, it particularly hampers insurgents in relating to the population and organizing opposition. However, without massive and active support, armed struggle will remain sectarian and, thus, fail to achieve major political changes. This article argues that urban insurgents face a paradoxical relationship with society. While urban insurgents become independent of social support on an operational level, they depend more than ever on spontaneous massive and active social support on a strategic level.
Journal: Terrorism and Political Violence
Pages: 798-819
Issue: 5
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2012.700656
File-URL: http://hdl.handle.net/10.1080/09546553.2012.700656
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:5:p:798-819



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_842374_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sophia Moskalenko
Author-X-Name-First: Sophia
Author-X-Name-Last: Moskalenko
Title: Adam Lankford. 
Journal: Terrorism and Political Violence
Pages: 840-843
Issue: 5
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.842374
File-URL: http://hdl.handle.net/10.1080/09546553.2013.842374
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:5:p:840-843



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_842387_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: D. Mulloy
Author-X-Name-First: D.
Author-X-Name-Last: Mulloy
Title: Michael Flynn and Fabiola F. Salek. .
Journal: Terrorism and Political Violence
Pages: 848-849
Issue: 5
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.842387
File-URL: http://hdl.handle.net/10.1080/09546553.2013.842387
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:5:p:848-849



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_842399_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Isaac Kfir
Author-X-Name-First: Isaac
Author-X-Name-Last: Kfir
Title: Vahid Brown and Don Rassler. 
Journal: Terrorism and Political Violence
Pages: 862-863
Issue: 5
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.842399
File-URL: http://hdl.handle.net/10.1080/09546553.2013.842399
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:5:p:862-863



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_677878_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Carole Villiger
Author-X-Name-First: Carole
Author-X-Name-Last: Villiger
Title: Political Violence: Switzerland, A Special Case?
Abstract: When we speak of political violence during the second half of the twentieth century in Western Europe, we tend to think of events that took place in Germany, involving the Red Army Faction, and in Italy, with the Red Brigades. Such political violence does not apply in the case of Switzerland, which is perceived as a haven of peace, security, democracy, and economic affluence. However, cursory analysis of the contemporary press undermines this stereotypical vision: indeed, between 1968 and 1995 there were a number of violent acts of protest. Switzerland may not have experienced the phenomenon of organized armed struggle in the same way as Germany and Italy—in fact, the intensity of the violence was far from being the same—but political acts against the government did occur, acts involving either damage to property or, more rarely, injury to people. A rough typology identifies three different political tendencies: separatists and anti-separatists pertaining to Canton Jura, the far-Left, and the far-Right. The aim of this article is to pinpoint and analyze the different features of the violent repertoire that unfolded in Switzerland between 1968 and 1995.
Journal: Terrorism and Political Violence
Pages: 672-687
Issue: 5
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2012.677878
File-URL: http://hdl.handle.net/10.1080/09546553.2012.677878
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:5:p:672-687



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_842389_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kai Chen
Author-X-Name-First: Kai
Author-X-Name-Last: Chen
Title: Justin V. Hastings. 
Journal: Terrorism and Political Violence
Pages: 851-852
Issue: 5
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.842389
File-URL: http://hdl.handle.net/10.1080/09546553.2013.842389
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:5:p:851-852



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_842388_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Samir Puri. 
Journal: Terrorism and Political Violence
Pages: 849-851
Issue: 5
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.842388
File-URL: http://hdl.handle.net/10.1080/09546553.2013.842388
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:5:p:849-851



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_693552_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sam Mullins
Author-X-Name-First: Sam
Author-X-Name-Last: Mullins
Title: “Global Jihad”: The Canadian Experience
Abstract: This study aims to address the relative lack of research examining the Canadian experience of terrorism relating to the “Global Salafi Jihad.” The fundamental research question was “What have people living in, or from, Canada been doing to support or advance violent jihad either at home or abroad?” Data were collected on individuals active from the 1980s through to the end of 2011 in an effort to be as exhaustive as possible. They were analysed according to three broad categories: background variables; operational variables; and investigations and outcomes. The sample was further divided into two and results compared according to whether individuals began offending before or after September 11, 2001, in order to assess change over time. The article begins with a brief history of terrorism in Canada, followed by the methodology, analysis of variables, and summary and conclusions. Cases included and excluded from the analysis are listed in Appendices A and B respectively.
Journal: Terrorism and Political Violence
Pages: 734-776
Issue: 5
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2012.693552
File-URL: http://hdl.handle.net/10.1080/09546553.2012.693552
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:5:p:734-776



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_842395_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Damien Kingsbury. 
Journal: Terrorism and Political Violence
Pages: 860-862
Issue: 5
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.842395
File-URL: http://hdl.handle.net/10.1080/09546553.2013.842395
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:5:p:860-862



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_842377_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Isaac Kfir
Author-X-Name-First: Isaac
Author-X-Name-Last: Kfir
Title: Christina Hellmich. 
Abstract: This article has been retracted.
Journal: Terrorism and Political Violence
Pages: 843-845
Issue: 5
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.842377
File-URL: http://hdl.handle.net/10.1080/09546553.2013.842377
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:5:p:843-845



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_842394_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Kevin A. O'Brien. 
Journal: Terrorism and Political Violence
Pages: 858-860
Issue: 5
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.842394
File-URL: http://hdl.handle.net/10.1080/09546553.2013.842394
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:5:p:858-860



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_674077_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Phillip Gray
Author-X-Name-First: Phillip
Author-X-Name-Last: Gray
Title: Leaderless Resistance, Networked Organization, and Ideological Hegemony
Abstract: This article examines various forms of “new terrorism,” specifically the structure of “leaderless resistance,” in connection with Robert Michels’ idea of the “iron law of oligarchy.” It is usually argued that “leaderless resistance” movements lack some of the typical obstacles of terrorist (and other) organizations, given their non-hierarchical and comparatively fluid natures. However, a new form of oligarchy develops in this type of movement, located in the propagation of key ideological concepts/arguments/symbols, the assigning of target preferences, and the elevation or demotion of others within the movement broadly. Rather than oligarchy forming via the material assets of organizations, an “ideational” oligarchy is created that shapes the goals of leaderless resistance movements: those leaders who are already established, and who control the means of communicating the movement's ideas to the widest audience, will impede the growth of groups and individuals within the movement that attempt to supplant their role. This article will use the examples of certain eco-terror groups (the Animal Liberation Front and the Earth Liberation Front) to explicate this development.
Journal: Terrorism and Political Violence
Pages: 655-671
Issue: 5
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2012.674077
File-URL: http://hdl.handle.net/10.1080/09546553.2012.674077
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:5:p:655-671



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_842385_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Maxwell Taylor
Author-X-Name-First: Maxwell
Author-X-Name-Last: Taylor
Title: Jean-Michel Oughourlian. 
Journal: Terrorism and Political Violence
Pages: 845-847
Issue: 5
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.842385
File-URL: http://hdl.handle.net/10.1080/09546553.2013.842385
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:5:p:845-847



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_842393_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: D. Mulloy
Author-X-Name-First: D.
Author-X-Name-Last: Mulloy
Title: Neville Bolt. 
Journal: Terrorism and Political Violence
Pages: 857-858
Issue: 5
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.842393
File-URL: http://hdl.handle.net/10.1080/09546553.2013.842393
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:5:p:857-858



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_692739_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Cigdem Sirin
Author-X-Name-First: Cigdem
Author-X-Name-Last: Sirin
Author-Name: Nehemia Geva
Author-X-Name-First: Nehemia
Author-X-Name-Last: Geva
Title: Examining the Distinct Effects of Emotive Triggers on Public Reactions to International Terrorism
Abstract: In recent years, a growing body of research has set out to examine the role that emotions play in shaping political attitudes and behaviors regarding terrorism. However, one major issue that is generally overlooked is whether the thematic relevance of emotive triggers leads to differential effects on people's reactions to international terrorism. Specifically, does anger—regardless of its source—tend to drive people towards supporting an aggressive foreign policy option to counter terrorism, or do the thematic underpinnings of anger (i.e., the specific contents that trigger this particular emotion, such as watching a news story about a recent terrorist attack) matter vis-à-vis the policy choice? To address this gap, this study experimentally examines the impact of anger—induced by thematically relevant versus irrelevant emotive triggers—on people's cognitive processing and foreign policy preferences regarding international terrorism. Overall, we find that the induction of anger via thematically relevant emotive triggers leads to a higher tendency for selecting a military option, a lower amount of information acquisition, and a shorter processing time in response to terror-related incidents.
Journal: Terrorism and Political Violence
Pages: 709-733
Issue: 5
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2012.692739
File-URL: http://hdl.handle.net/10.1080/09546553.2012.692739
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:5:p:709-733



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_840149_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: Editorial Board EOV
Journal: Terrorism and Political Violence
Pages: ebi-ebi
Issue: 5
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2013.840149
File-URL: http://hdl.handle.net/10.1080/09546553.2013.840149
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:5:p:ebi-ebi



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_679755_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kacper Rekawek
Author-X-Name-First: Kacper
Author-X-Name-Last: Rekawek
Title: “Their History Is a Bit Like Our History”: Comparative Assessment of the Official and the Provisional IRAs
Abstract: The Provisional Irish Republican Army (PIRA), one of the best known and most researched terrorist organizations in history, has been comparatively assessed alongside various terrorist outfits from around the world. However, it has never been systematically compared with its most immediate rival, neighbour, and competitor, the lesser known Official Irish Republican Army (OIRA). This article addresses this scholarly gap and presents a thematic assessment of the similarities and differences between the two organisations in their respective post-ceasefire periods of 1972 and 1994. It proposes a new comparative approach to studying terrorist organisations in which knowledge about a better known entity (here, the PIRA) and its future trajectory is generated through a detailed assessment of the activities and developments of a not only more obscure case (here, the OIRA) but also, in many aspects, the most comparable case or cases. Such an approach could yield interesting results for the field of terrorism studies, which could still profit from in-depth, internal, case study analyses of specific terrorist organizations.
Journal: Terrorism and Political Violence
Pages: 688-708
Issue: 5
Volume: 25
Year: 2013
X-DOI: 10.1080/09546553.2012.679755
File-URL: http://hdl.handle.net/10.1080/09546553.2012.679755
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:25:y:2013:i:5:p:688-708

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_854032_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeffrey Kaplan
Author-X-Name-First: Jeffrey
Author-X-Name-Last: Kaplan
Author-Name: Heléne Lööw
Author-X-Name-First: Heléne
Author-X-Name-Last: Lööw
Author-Name: Leena Malkki
Author-X-Name-First: Leena
Author-X-Name-Last: Malkki
Title: Introduction to the Special Issue on Lone Wolf and Autonomous Cell Terrorism
Journal: Terrorism and Political Violence
Pages: 1-12
Issue: 1
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.854032
File-URL: http://hdl.handle.net/10.1080/09546553.2014.854032
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:1:p:1-12



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_849916_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Clark McCauley
Author-X-Name-First: Clark
Author-X-Name-Last: McCauley
Author-Name: Sophia Moskalenko
Author-X-Name-First: Sophia
Author-X-Name-Last: Moskalenko
Title: Toward a Profile of Lone Wolf Terrorists: What Moves an Individual From Radical Opinion to Radical Action
Abstract: Research has shown that there is no profile of individual characteristics of group-based terrorists, but profiling the characteristics of lone wolf terrorists may yet be possible. In this article, we bring together suggestions about what a lone wolf profile might look like. We describe a two-pyramids model that distinguishes radicalization of opinion from radicalization of action, then use this model to review three case histories of lone wolf terrorists. We also review results comparing two kinds of mostly lone actor violent offenders: assassins and school attackers. Results highlight the gap between radical opinion and radical action, and suggest two profiles of lone wolf terrorists: disconnected-disordered are individuals with a grievance and weapons experience who are social loners and often show signs of psychological disorder; caring-compelled are individuals who strongly feel the suffering of others and feel a personal responsibility to reduce or avenge this suffering.
Journal: Terrorism and Political Violence
Pages: 69-85
Issue: 1
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.849916
File-URL: http://hdl.handle.net/10.1080/09546553.2014.849916
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:1:p:69-85



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_849919_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard Jensen
Author-X-Name-First: Richard
Author-X-Name-Last: Jensen
Title: The Pre-1914 Anarchist “Lone Wolf” Terrorist and Governmental Responses
Abstract: After discussing the extent to which the period from 1878–1934, with its frequent incidents of anarchist assassinations and bombings, can be considered the classic age of “lone wolf” or leaderless terrorism, this article focuses on four acts of anarchist violence and police and government responses to this violence. The four cases are the 1896 bombing of a Corpus Christi procession in Barcelona, the 1901 assassination of President McKinley, a 1902 bombing in Livorno (Leghorn) Italy, and the 1912 attempted assassination of Italian King Victor Emmanuel III. Confronted by these violent acts, the authorities resorted to two basic policies that might be referred to as “micro” and “macro” approaches. The macro approach was to launch massive crackdowns, arrest hundreds if not thousands of suspects (in some cases torturing them), and pass repressive legislation limiting freedom of the press, freedom of association, and freedom of assembly in order to discover the guilty terrorists and to squelch anarchist propaganda and organized activity. The micro approach was to focus on improving the intelligence capacity of the police by modernizing and expanding it, and creating or professionalizing the protective service for government ministers and heads of state.
Journal: Terrorism and Political Violence
Pages: 86-94
Issue: 1
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.849919
File-URL: http://hdl.handle.net/10.1080/09546553.2014.849919
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:1:p:86-94



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_849948_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Katie Cohen
Author-X-Name-First: Katie
Author-X-Name-Last: Cohen
Author-Name: Fredrik Johansson
Author-X-Name-First: Fredrik
Author-X-Name-Last: Johansson
Author-Name: Lisa Kaati
Author-X-Name-First: Lisa
Author-X-Name-Last: Kaati
Author-Name: Jonas Mork
Author-X-Name-First: Jonas
Author-X-Name-Last: Mork
Title: Detecting Linguistic Markers for Radical Violence in Social Media
Abstract: Lone-wolf terrorism is a threat to the security of modern society, as was tragically shown in Norway on July 22, 2011, when Anders Behring Breivik carried out two terrorist attacks that resulted in a total of 77 deaths. Since lone wolves are acting on their own, information about them cannot be collected using traditional police methods such as infiltration or wiretapping. One way to attempt to discover them before it is too late is to search for various “weak signals” on the Internet, such as digital traces left in extremist web forums. With the right tools and techniques, such traces can be collected and analyzed. In this work, we focus on tools and techniques that can be used to detect weak signals in the form of linguistic markers for potential lone wolf terrorism.
Journal: Terrorism and Political Violence
Pages: 246-256
Issue: 1
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.849948
File-URL: http://hdl.handle.net/10.1080/09546553.2014.849948
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:1:p:246-256



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_849945_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gary Ackerman
Author-X-Name-First: Gary
Author-X-Name-Last: Ackerman
Author-Name: Lauren Pinson
Author-X-Name-First: Lauren
Author-X-Name-Last: Pinson
Title: An Army of One: Assessing CBRN Pursuit and Use by Lone Wolves and Autonomous Cells
Abstract: In recent years, much of the literature on terrorist pursuits and use of unconventional weapons has focused on al-Qaeda and other Islamic extremist groups. Some scholars posit lone actors may differ from organizations when it comes to the observation that larger organizations are more likely to engage in chemical, biological, radiological, and nuclear (CBRN) activity, but leave this as an open question because of a prior lack of data on lone actors. Furthermore, new technologies and expanding networks may also spawn more deleterious lone actors, including what have been referred to as “super-empowered individuals.” This article utilizes the Profiles of Incidents Involving CBRN by Non-State Actors Dataset and the Radiological and Nuclear Non-State Actors Database to illustrate the characteristics of CBRN pursuit by lone wolves and autonomous cells over time. Initial findings confirm the general perceptions that, historically, lone actors have engaged in cruder, smaller scale, and less frequent CBRN plots and attacks than their formal terrorist organization counterparts, but suggest that such actors do present a genuine threat, at least in terms of the potential for mass disruption. Additionally, while they share several similarities with more formal organizations, lone actors and autonomous cells tend to be motivated less by collective religious or ethno-nationalist concerns than larger organizations, focusing more on narrow or solipsistic drivers. Lone actors and autonomous cells also appear to largely calibrate their CBRN ambitions to their capabilities and their CBRN actions tend to receive better media coverage than formal terrorist organizations.
Journal: Terrorism and Political Violence
Pages: 226-245
Issue: 1
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.849945
File-URL: http://hdl.handle.net/10.1080/09546553.2014.849945
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:1:p:226-245



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_849932_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jelle van Buuren
Author-X-Name-First: Jelle
Author-X-Name-Last: van Buuren
Author-Name: Beatrice de Graaf
Author-X-Name-First: Beatrice
Author-X-Name-Last: de Graaf
Title: Hatred of the System: Menacing Loners and Autonomous Cells in the Netherlands
Abstract: In this article, the violent threat emerging from “menacing loners” and autonomous cells in The Netherlands is being historicized and contextualized by providing quantitative and qualitative insight into this threat and illuminating some of the most dramatic incidents. Although beyond the core purpose of this mainly empirical article, some tentative remarks will be presented as possible explanation for both continuity and change. We argue that the shift from political violence originating from groups and networks to political violence perpetrated by individuals, and the shift from ideologically motivated violence to performative violence, are both shifts within a continuum, not radical breaks with the past. It is a difference in degree. Further, we argue that these gradual shifts in types of violence can only be understood as dependent on parallel manifestations of counter-policies, technological developments, and broader trends within society, rather than as attributable to indigenous terrorist developments as such. We postulate a shift from ideologically motivated to performative violence, resulting to a large extent from the possibilities offered by the Internet and social media, and from a broader cultural trend defined as the emergence of the “casting society.”
Journal: Terrorism and Political Violence
Pages: 156-184
Issue: 1
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.849932
File-URL: http://hdl.handle.net/10.1080/09546553.2014.849932
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:1:p:156-184



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_849920_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: José Zúquete
Author-X-Name-First: José
Author-X-Name-Last: Zúquete
Title: Men in Black: Dynamics, Violence, and Lone Wolf Potential
Abstract: Since the turn of the millennium in particular, protest movements have often been characterized by Black Bloc tactics of confrontation and street fighting between anarchist militants and police forces. This article analyses the Black Bloc's philosophy, dynamics, organization, praxis, and goals. After discussing the relationship between the Black Bloc and violence, the article analyses dynamics within militant anarchism that open the way for the formation of autonomous terrorist cells, as well as the potential for lone wolf terrorism in the movement.
Journal: Terrorism and Political Violence
Pages: 95-109
Issue: 1
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.849920
File-URL: http://hdl.handle.net/10.1080/09546553.2014.849920
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:1:p:95-109



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_849933_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Leena Malkki
Author-X-Name-First: Leena
Author-X-Name-Last: Malkki
Title: Political Elements in Post-Columbine School Shootings in Europe and North America
Abstract: School shootings have traditionally been interpreted as non-political acts. Empirical evidence, however, suggests that not all shootings are necessarily so different from political violence, at least in the shooter's own opinion. The article analyses 28 school rampage shootings in Europe, the U.S., and Canada from 1999–2011 to determine common and prevalent political elements in the shootings. The shootings are divided into three categories: shootings with overtly political communication (four cases), shootings with references to previous school rampage shootings (13 cases), and isolated incidents (11 cases). While it is possible to question whether the shootings were genuinely politically motivated, it is clear that the majority of school shooters link their deed to the agenda and beliefs presented by the Columbine shooters, which has created a sense of tradition, continuity, and imagined community among the shooters and their admirers, not unlike in cases of terrorism and political violence that are referred to as leaderless resistance.
Journal: Terrorism and Political Violence
Pages: 185-210
Issue: 1
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.849933
File-URL: http://hdl.handle.net/10.1080/09546553.2014.849933
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:1:p:185-210



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_873666_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: Statement of Retraction
Journal: Terrorism and Political Violence
Pages: 257-257
Issue: 1
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.873666
File-URL: http://hdl.handle.net/10.1080/09546553.2014.873666
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:1:p:257-257



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_849907_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeffrey Kaplan
Author-X-Name-First: Jeffrey
Author-X-Name-Last: Kaplan
Author-Name: Christopher Costa
Author-X-Name-First: Christopher
Author-X-Name-Last: Costa
Title: On Tribalism: Auxiliaries, Affiliates, and Lone Wolf Political Violence
Abstract: In this article, we endeavor to shed new light on the consequences of tribalism in the present day, one of the most important of which is the threat posed by lone wolf actors and the emergence of autonomous cells that operate with no central direction. To better acquaint the reader with the theoretical models used in this article—in particular the Trinitarian model of Carl von Clausewitz—we begin with historic models dating back to Alexander the Great. The central focus of our article posits a reconceptualization of tribalism as a driving force behind the global jihadist phenomenon. We will go into the cases of Iraq and Afghanistan in some depth, believing that it is necessary to provide a close examination of these case studies to better understand the emergence of jihadist lone wolves who operate both in the ungoverned spaces of the Middle East and South Asia and in their Western homelands. We conclude with an examination of cases of jihadist lone wolf terrorism involving recent converts to radical Islam in the U.S. Finally, our article focuses on the emerging security threats posed by lone wolves, autonomous cells, and the challenges ahead for the military, security, and intelligence services.
Journal: Terrorism and Political Violence
Pages: 13-44
Issue: 1
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.849907
File-URL: http://hdl.handle.net/10.1080/09546553.2014.849907
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:1:p:13-44



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_849935_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Patrick Ellis
Author-X-Name-First: Patrick
Author-X-Name-Last: Ellis
Title: Lone Wolf Terrorism and Weapons of Mass Destruction: An Examination of Capabilities and Countermeasures
Abstract: Today, the specters of lone wolves and autonomous cells acquiring and using chemical, biological, radiological, and nuclear (CBRN) weapons of mass destruction, whether in their traditional military forms or the more non-traditional industrial forms, seems less far-fetched. Fortunately, military CBRN agents and weapons are not normally accessible to lone wolves or autonomous cells and are often located in highly secured areas. Therefore, lone wolves and autonomous cells may be drawn to materials similar to CBRN located in less secure areas. These commonplace industrial chemicals, biological contaminants, and radioactive materials could be used to cause disruptions or mass casualties. The dual use nature of these materials and technologies enables them to be turned into weapons and delivered by nonmilitary means. Future “over-the-horizon” threats, such as the proliferation of new biotechnologies and amateur do-it-yourself capabilities, pose a risk that lone wolves could develop weapons at a time when travel, access to knowledge, and dual-use technologies, in the globalizing environment, make lone wolf terrorists more dangerous. Thus, the author explores existing countermeasures, such as laws, strategies, passive and active measures designed to stop these dangerous threats. In particular, capabilities to prevent, protect, respond, and recover from CBRN terrorist acts are examined.
Journal: Terrorism and Political Violence
Pages: 211-225
Issue: 1
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.849935
File-URL: http://hdl.handle.net/10.1080/09546553.2014.849935
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:1:p:211-225



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_849912_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: George Michael
Author-X-Name-First: George
Author-X-Name-Last: Michael
Title: Counterinsurgency and Lone Wolf Terrorism
Abstract: This essay examines strategies to counter the threat of lone wolf terrorism. Lone wolves implement a tactical approach dubbed “leaderless resistance,” which has become popular in several extremist subcultures. Although most episodes of lone wolf terrorism have not been highly destructive, there are notable exceptions that have claimed a substantial number of victims. The lone wolf trend should be contextualized in the evolution of conflict and strategy in which smaller and smaller entities figure prominently. Elements of the counterinsurgency doctrine can be applied to lone wolf terrorism. A comprehensive counterterrorism strategy must prepare for the prospect of lone wolf terrorism because of the increasing number of small-scale attacks, the large number of soft targets in contemporary society, and the potential damage that individuals can cause with the use of weapons of mass destruction.
Journal: Terrorism and Political Violence
Pages: 45-57
Issue: 1
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.849912
File-URL: http://hdl.handle.net/10.1080/09546553.2014.849912
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:1:p:45-57



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_849921_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daveed Gartenstein-Ross
Author-X-Name-First: Daveed
Author-X-Name-Last: Gartenstein-Ross
Title: Lone Wolf Islamic Terrorism: Abdulhakim Mujahid Muhammad (Carlos Bledsoe) Case Study
Abstract: This article is a detailed case study examining Abdulhakim Mujahid Muhammad (born Carlos Bledsoe), a lone wolf jihadist who carried out a fatal shooting at a joint Army-Navy recruiting center in Little Rock, Arkansas, on June 1, 2009. The article explores his early life, including involvement in violent and criminal activities that caused Muhammad to get into trouble with authorities, after which he decided to explore religion as an alternative that could keep him out of trouble. Muhammad found that he was attracted to the Islamic faith, and converted at the age of nineteen. The article explores Muhammad's subsequent turn toward Salafism, and chronicles his increasing extremism with reference to academic debates about the concept of radicalization and the role of religious ideas. Finally, the article explains Muhammad's attack on the recruiting center, and the manner in which he was able to continue his jihad even while imprisoned.
Journal: Terrorism and Political Violence
Pages: 110-128
Issue: 1
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.849921
File-URL: http://hdl.handle.net/10.1080/09546553.2014.849921
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:1:p:110-128



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_849930_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mattias Gardell
Author-X-Name-First: Mattias
Author-X-Name-Last: Gardell
Title: Crusader Dreams: Oslo 22/7, Islamophobia, and the Quest for a Monocultural Europe
Abstract: The synchronized terror attacks on July 22, 2011 was the worst politically motivated assault in post-WW2 Norway. To the perpetrator, Anders Behring Breivik, 22/7 was a “marketing operation,” designed to draw attention to his compendium, 2083: A European Declaration of Independence. While Breivik acted alone, his political philosophy is far from unique. Through a detailed analysis of the compendium's content, identifying the original authors whose texts Breivik used but did not always acknowledge, this essay discusses the political traditions that informed the assailant's worldview: Islamophobia (anti-Muslim racism), cultural conservative nationalism, antifeminism, and selected elements of White Power thought, far Right evangelical theology, and the Knights Templar tradition, all permeated by romantic male warrior ideals. The stunning violence of July 22 was a hyper-masculine performative act aimed at producing a heroic avant-garde of nationalist warriors who will rise to purge Europe from the corrupting influence of its internal enemies and defeat its external enemies. Through the cleansing fire of the civil war, he believes that a reborn Europe will arise to reclaim its ordained position of glory as the world's leading civilization. In the final analysis, Breivik's political philosophy may thus be recognized as a 21st-century articulation of the fascist legacy.
Journal: Terrorism and Political Violence
Pages: 129-155
Issue: 1
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.849930
File-URL: http://hdl.handle.net/10.1080/09546553.2014.849930
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:1:p:129-155



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_849913_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Christopher Hewitt
Author-X-Name-First: Christopher
Author-X-Name-Last: Hewitt
Title: Law Enforcement Tactics and Their Effectiveness in Dealing With American Terrorism: Organizations, Autonomous Cells, and Lone Wolves
Abstract: The article examines law-enforcement activities in 20 cases of terrorism and 38 cases of terrorism prevention, using published records. It proposes a seven-fold classification of police actions and examines which tactics were successful in identifying and apprehending perpetrators. Overall, in capturing those responsible for terrorist attacks, the most successful tactics were routine policing, the use of informers, and information provided by the public. Organized terrorism campaigns were most vulnerable to informers and surveillance, while the most effective tactics against lone wolves were witness identification and information from the public. The most successful terrorist preventions involved informers and surveillance.
Journal: Terrorism and Political Violence
Pages: 58-68
Issue: 1
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.849913
File-URL: http://hdl.handle.net/10.1080/09546553.2014.849913
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:1:p:58-68

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_881675_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Christopher Hewitt
Author-X-Name-First: Christopher
Author-X-Name-Last: Hewitt
Title: Jeffrey D. Simon.
Journal: Terrorism and Political Violence
Pages: 390-391
Issue: 2
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.881675
File-URL: http://hdl.handle.net/10.1080/09546553.2014.881675
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:2:p:390-391



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_881676_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard English
Author-X-Name-First: Richard
Author-X-Name-Last: English
Title: George Kassimeris. 
Journal: Terrorism and Political Violence
Pages: 391-392
Issue: 2
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.881676
File-URL: http://hdl.handle.net/10.1080/09546553.2014.881676
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:2:p:391-392



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_881677_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gamal Gasim
Author-X-Name-First: Gamal
Author-X-Name-Last: Gasim
Title: Gregory D. Johnsen. 
Journal: Terrorism and Political Violence
Pages: 392-394
Issue: 2
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.881677
File-URL: http://hdl.handle.net/10.1080/09546553.2014.881677
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:2:p:392-394



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_714820_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: R. Cragin
Author-X-Name-First: R.
Author-X-Name-Last: Cragin
Title: Resisting Violent Extremism: A Conceptual Model for Non-Radicalization
Abstract: Although much has been written about how and why individuals become terrorists, very little research has focused on why individuals choose not to become involved in political violence. Some assume that these non-radicalized individuals simply have not had the same life experiences as terrorists. Yet one only has to explore areas of conflict, such as the Gaza Strip, northwest Pakistan, or the southern Philippines, to wonder why more individuals have not joined local militant groups. This article presents a conceptual model ofnon-radicalization in an attempt to move the discussion forward on this topic. It argues that it is impossible to understand radicalization pathways, or design policies to preempt them, without a complementary knowledge ofwhy individuals resist the influence ofviolent extremism.
Journal: Terrorism and Political Violence
Pages: 337-353
Issue: 2
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2012.714820
File-URL: http://hdl.handle.net/10.1080/09546553.2012.714820
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:2:p:337-353



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_881678_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: George Michael
Author-X-Name-First: George
Author-X-Name-Last: Michael
Title: Stephen J. Cimbala. 
Journal: Terrorism and Political Violence
Pages: 394-397
Issue: 2
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.881678
File-URL: http://hdl.handle.net/10.1080/09546553.2014.881678
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:2:p:394-397



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_700658_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: William Rosenau
Author-X-Name-First: William
Author-X-Name-Last: Rosenau
Author-Name: Ralph Espach
Author-X-Name-First: Ralph
Author-X-Name-Last: Espach
Author-Name: Román Ortiz
Author-X-Name-First: Román
Author-X-Name-Last: Ortiz
Author-Name: Natalia Herrera
Author-X-Name-First: Natalia
Author-X-Name-Last: Herrera
Title: Why They Join, Why They Fight, and Why They Leave: Learning From Colombia's Database of Demobilized Militants
Abstract: For nearly ten years the Colombian government has systematically debriefed men and women who have left the Revolutionary Armed Forces of Colombia (FARC) and other violent extremist organizations. Today, the Colombian government maintains a database of more than 15,000 digitized interview transcripts—the largest of its kind in the world. With the proper enhancements and analysis, the database can provide critical insights into topics such as extremist recruitment, motivation, information operations, intelligence activities, leadership, and tactical and operational adaptation and innovation. Although Colombia's political violence is unique in many respects, further research using the database contributes to our understanding of the dynamics of insurgency in other regions. Ultimately, this research could enhance efforts to prevent recruitment into, and encourage current members to exit from violent non-state groups, such as gangs, terrorist groups, militias, and drug trafficking organizations.
Journal: Terrorism and Political Violence
Pages: 277-285
Issue: 2
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2012.700658
File-URL: http://hdl.handle.net/10.1080/09546553.2012.700658
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:2:p:277-285



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_881672_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alisa Stack
Author-X-Name-First: Alisa
Author-X-Name-Last: Stack
Title: Mia Bloom. 
Journal: Terrorism and Political Violence
Pages: 385-386
Issue: 2
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.881672
File-URL: http://hdl.handle.net/10.1080/09546553.2014.881672
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:2:p:385-386



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_881673_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard Phelps
Author-X-Name-First: Richard
Author-X-Name-Last: Phelps
Title: Matthew Levitt. 
Journal: Terrorism and Political Violence
Pages: 386-388
Issue: 2
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.881673
File-URL: http://hdl.handle.net/10.1080/09546553.2014.881673
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:2:p:386-388



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_881674_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dipak Gupta
Author-X-Name-First: Dipak
Author-X-Name-Last: Gupta
Title: Ahmed S. Hashim. 
Journal: Terrorism and Political Violence
Pages: 388-389
Issue: 2
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.881674
File-URL: http://hdl.handle.net/10.1080/09546553.2014.881674
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:2:p:388-389



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_713229_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joshua Freilich
Author-X-Name-First: Joshua
Author-X-Name-Last: Freilich
Author-Name: Steven Chermak
Author-X-Name-First: Steven
Author-X-Name-Last: Chermak
Author-Name: Roberta Belli
Author-X-Name-First: Roberta
Author-X-Name-Last: Belli
Author-Name: Jeff Gruenewald
Author-X-Name-First: Jeff
Author-X-Name-Last: Gruenewald
Author-Name: William Parkin
Author-X-Name-First: William
Author-X-Name-Last: Parkin
Title: Introducing the United States Extremis Crime Database (ECDB)
Abstract: This note describes a new and unique, open source, relational database called the United States Extremist Crime Database (ECDB). We first explain how the ECDB was created and outline its distinguishing features in terms of inclusion criteria and assessment of ideological commitment. Second, the article discusses issues related to the evaluation of the ECDB, such as reliability and selectivity. Third, descriptive results are provided to illustrate the contributions that the ECDB can make to research on terrorism and criminology.
Journal: Terrorism and Political Violence
Pages: 372-384
Issue: 2
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2012.713229
File-URL: http://hdl.handle.net/10.1080/09546553.2012.713229
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:2:p:372-384



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_711395_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tony Craig
Author-X-Name-First: Tony
Author-X-Name-Last: Craig
Title: Monitoring the Peace?: Northern Ireland's 1975 Ceasefire Incident Centres and the Politicisation of Sinn Féin
Abstract: During the Provisional IRA's (PIRA) 1975 ceasefire, two different sets of incident centres were established across Northern Ireland in order to monitor and avert escalation of violence between Republicans and Security Forces. While one group of offices was run by the Northern Ireland Office (NIO) and administered by clerks in the Northern Ireland Civil Service, very quickly Sinn Féin (taking advantage of their decriminalisation in 1974) established their own incident centres to coordinate their communication with the government. This article argues that the establishment of the Sinn Féin incident centres set a precedent for the future political activity of the Provisional Republican Movement; that their activity during the 1975 ceasefire played an important formative role in the evolution of the group's political strategy; and that this experience, acquired from the work done during the 1975 truce, was of far greater influence than is appreciated in current accounts.
Journal: Terrorism and Political Violence
Pages: 307-319
Issue: 2
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2012.711395
File-URL: http://hdl.handle.net/10.1080/09546553.2012.711395
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:2:p:307-319



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_705254_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Floris Vermeulen
Author-X-Name-First: Floris
Author-X-Name-Last: Vermeulen
Title: Suspect Communities—Targeting Violent Extremism at the Local Level: Policies of Engagement in Amsterdam, Berlin, and London
Abstract: Throughout Europe, authorities have set up new policy measures and programs to curb homegrown violent extremists. This article describes local policy responses to violent Islamic extremism—and/or the mere threat of it—in the neighborhoods Oost in Amsterdam, Moabit and Soldiner Kiez in Berlin, and Tower Hamlets in London. Based on locally conducted fieldwork, the study compares and contrasts these neighborhoods’ approaches and aims to make a first assessment of their effects. A major finding for all three cities is that authorities target the entire local Muslim community rather than a few select individuals. This can lead to the construction of suspect communities, an approach with possible paradoxical effects on targeting actual violent extremists. Suspect communities subsequently create stigmatization, exclusion, and possibly marginalization, which not only has negative consequences for involved groups, but may well produce a breeding ground for future violence. However, the author did not find that engagement with Islamic organizations or individuals was used to directly change the nature of local Muslim communities. Orthodox and non-violent extremist organizations and individuals in all three cities were potential partners for engagement, which probably lowers the chance of stigmatizing the suspect communities.
Journal: Terrorism and Political Violence
Pages: 286-306
Issue: 2
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2012.705254
File-URL: http://hdl.handle.net/10.1080/09546553.2012.705254
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:2:p:286-306



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_828604_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anthony Lemieux
Author-X-Name-First: Anthony
Author-X-Name-Last: Lemieux
Author-Name: Jarret Brachman
Author-X-Name-First: Jarret
Author-X-Name-Last: Brachman
Author-Name: Jason Levitt
Author-X-Name-First: Jason
Author-X-Name-Last: Levitt
Author-Name: Jay Wood
Author-X-Name-First: Jay
Author-X-Name-Last: Wood
Title:  Magazine: A Critical Analysis of its Significance and Potential Impact Through the Lens of the Information, Motivation, and Behavioral Skills Model
Abstract: This article presents an analysis of Al Qaeda in the Arabian Peninsula's English language publication Inspire that was conceptualized and conducted on the basis of the Information-Motivation-Behavioral Skills (IMB) framework. The IMB model has been widely tested, validated, and applied across a range of behavior change interventions, and provides both a conceptual and analytic framework to examine the range and quality of content featured across the 11 issues of Inspire that were published and distributed online starting in July of 2010. Inspire has been implicated in multiple instances of terrorism cases in the U.S. and its impact and potential can be analyzed on the extent to which it effectively targets core attitudes, perceptions of social normative support for violence, and its regular featuring of behavioral skills such as bomb making, weapons training, and emphasizing a creative and do-it-yourself ethos.
Journal: Terrorism and Political Violence
Pages: 354-371
Issue: 2
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2013.828604
File-URL: http://hdl.handle.net/10.1080/09546553.2013.828604
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:2:p:354-371



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_720623_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Martin Gallagher
Author-X-Name-First: Martin
Author-X-Name-Last: Gallagher
Title: Terrorism and Organised Crime: Co-operative Endeavours in Scotland?
Abstract: It has been suggested that a nexus between terrorist groups and those involved in organised crime exists. This study explores the co-operative possibilities that exist between these phenomena, focusing specifically on the level of assistance participants in organised criminal activity might provide to those engaged in terrorism, the “initial nexus.” This was achieved initially through interviews with subject matter experts with knowledge of the organised crime and counter terrorism situation in Scotland. Thereafter, law enforcement personnel who investigate serious and organised crime were interviewed, and their opinions sought in respect of the likely actions of those they investigate. The data gathered is subject to analysis and comment are provided as to what level of co-operation between those involved in organised crime and terrorism can be expected; what motivational factors may have a bearing on the level of co-operation provided; and discussion of “tipping points,” ethical or otherwise, where the withdrawal of co-operation could occur, providing opportunities for increasingly successful law enforcement intervention.
Journal: Terrorism and Political Violence
Pages: 320-336
Issue: 2
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2012.720623
File-URL: http://hdl.handle.net/10.1080/09546553.2012.720623
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:2:p:320-336



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_690791_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Beverley Milton-Edwards
Author-X-Name-First: Beverley
Author-X-Name-Last: Milton-Edwards
Title: Islamist Versus Islamist: Rising Challenge in Gaza
Abstract: Islam's diversity is a direct result of centuries of schism and factionalism, and presents a challenge to the original spirit of unity as envisaged by its founder, the Prophet Mohammed. Rivalry within Islam undermines the precedent notion of unity through communal belonging (tawhid and ummah). Yet in the twenty-first century this diversity is ignored, and political Islam is represented as being more of a monolith than a spectrum of ideas and aspirations. Generally, the materialization of new Islamist groups is a challenge to those who hold that unity is all. In the Gaza Strip, specifically, the dominant Islamist actor, Hamas, is facing internal challenges from other Islamist elements. These rival Islamists are also influenced by events across their border in post-revolutionary Egypt where a plethora of new Islamist actors are vying for political space and power. This article deals with Hamas's Islamist rivals, and the effects they have had on Hamas's governance of the Gaza Strip, and political and religious legitimacy within it. It will focus on ideological and violent disputes between the Islamist elements in Gaza, and the means by which Hamas and its security elements have tackled newly emerging rivals.
Journal: Terrorism and Political Violence
Pages: 259-276
Issue: 2
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2012.690791
File-URL: http://hdl.handle.net/10.1080/09546553.2012.690791
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:2:p:259-276

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_914837_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kai Chen
Author-X-Name-First: Kai
Author-X-Name-Last: Chen
Title: Paul B. Rich and Isabelle Duyvesteyn (Eds.). 
Journal: Terrorism and Political Violence
Pages: 547-548
Issue: 3
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.914837
File-URL: http://hdl.handle.net/10.1080/09546553.2014.914837
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:3:p:547-548



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_914839_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Sue Onslow (Ed.). 
Journal: Terrorism and Political Violence
Pages: 550-552
Issue: 3
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.914839
File-URL: http://hdl.handle.net/10.1080/09546553.2014.914839
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:3:p:550-552



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_914838_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Carolin Goerzig. 
Journal: Terrorism and Political Violence
Pages: 548-550
Issue: 3
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.914838
File-URL: http://hdl.handle.net/10.1080/09546553.2014.914838
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:3:p:548-550



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_736891_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Hemda Ben-Yehuda
Author-X-Name-First: Hemda
Author-X-Name-Last: Ben-Yehuda
Author-Name: Luba Levin-Banchik
Author-X-Name-First: Luba
Author-X-Name-Last: Levin-Banchik
Title: Regime and Power in International Terror Crises: Strong Democracies Fight Back Hard
Abstract: This study explores regime, power, and violence in international terror crises (ITCs). It examines terror strikes and retaliations against the terror groups and their hosts. The exploration tests two hypotheses: first, democracies, like other states, retaliate, even at the risk of escalation; and second, strong democracies fight back with massive violence as do authoritarian regimes. Historical narratives of ITCs from 1934 to 2006 show that strong democracies were the most common targets of terror. Like authoritarian states, they responded to terror, but were the most violent retaliators, followed by weaker states, democratic or not. So the democratic constraints affect weaker states more than stronger ones. These trends draw attention to the destabilizing nature of international terror and its challenge to the peaceful resolution of international disputes.
Journal: Terrorism and Political Violence
Pages: 504-522
Issue: 3
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2012.736891
File-URL: http://hdl.handle.net/10.1080/09546553.2012.736891
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:3:p:504-522



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_914842_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Dawn Chatty and Bill Finlayson (Eds.). 
Journal: Terrorism and Political Violence
Pages: 556-558
Issue: 3
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.914842
File-URL: http://hdl.handle.net/10.1080/09546553.2014.914842
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:3:p:556-558



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_732629_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Barak Mendelsohn
Author-X-Name-First: Barak
Author-X-Name-Last: Mendelsohn
Title: al Qaeda and Global Governance: When Ideology Clashes With Political Expediency
Abstract: In recent years, statements by al Qaeda leaders have included references to topics often associated with global-governance proponents’ critique of the state. This article examines the organization's attitude toward symbols of global governance, giving particular attention to its view of the United Nations as the foundation for global governance, and to the manner in which al Qaeda approaches the central questions of environmental threats and human rights. The organization is seeking to insert itself into the discourse of global governance and use it in an instrumental manner; it focuses on anti-Western narrative and seeks to expose the existing order as designed by Western powers, particularly the United States, for self-serving reasons. However, the article argues, notwithstanding al Qaeda's reputation for sophistication in manipulating public opinion, the organization's references to global governance underscore the limitations its rigid ideology imposes on its messaging efforts. Even though adopting the global governance discourse is in line with the group's effort to improve its image, al Qaeda's extremist ideology limits its ability to take full advantage of the benefits this discourse offers.
Journal: Terrorism and Political Violence
Pages: 470-487
Issue: 3
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2012.732629
File-URL: http://hdl.handle.net/10.1080/09546553.2012.732629
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:3:p:470-487



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_914841_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Francesco Marone
Author-X-Name-First: Francesco
Author-X-Name-Last: Marone
Title: Jacob N. Shapiro. 
Journal: Terrorism and Political Violence
Pages: 553-556
Issue: 3
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.914841
File-URL: http://hdl.handle.net/10.1080/09546553.2014.914841
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:3:p:553-556



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_914840_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: James Hopkins
Author-X-Name-First: James
Author-X-Name-Last: Hopkins
Title: Anna Geifman. 
Journal: Terrorism and Political Violence
Pages: 552-553
Issue: 3
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.914840
File-URL: http://hdl.handle.net/10.1080/09546553.2014.914840
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:3:p:552-553



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_738263_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel Aldrich
Author-X-Name-First: Daniel
Author-X-Name-Last: Aldrich
Title: First Steps Towards Hearts and Minds? USAID's Countering Violent Extremism Policies in Africa
Abstract: The United States government has adopted new approaches to counter violent extremist organizations around the world. “Soft security” and development programs include focused educational training for groups vulnerable to terrorist recruitment, norm messaging through local radio programming, and job creation in rural communities. This article evaluates the effectiveness of one set of these multi-vectored, community-level programs through data from 200 respondents in two similar, neighboring towns in northern Mali, Africa. The data show that residents in Timbuktu who were exposed to the programming for up to five years displayed measurably altered civic behavior and listening patterns in comparison with their counterparts in the control town of Diré, which had no programming (controlling for potential covariates including age, ethnicity, and political and socioeconomic conditions). However, there was little measurable difference between the groups in terms of their cultural identities and attitudes towards the West. While this study is unable to definitively prove a causal connection between programming and behavioral outcomes, it nonetheless strongly suggests that the process of “winning hearts and minds” can be effective at certain levels but may require extended time and dedicated resources to generate higher-level results.
Journal: Terrorism and Political Violence
Pages: 523-546
Issue: 3
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2012.738263
File-URL: http://hdl.handle.net/10.1080/09546553.2012.738263
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:3:p:523-546



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_914844_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mark Currie
Author-X-Name-First: Mark
Author-X-Name-Last: Currie
Title: Roger Griffin. 
Journal: Terrorism and Political Violence
Pages: 561-563
Issue: 3
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.914844
File-URL: http://hdl.handle.net/10.1080/09546553.2014.914844
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:3:p:561-563



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_914843_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: George Michael
Author-X-Name-First: George
Author-X-Name-Last: Michael
Title: Peter L. Bergen. 
Journal: Terrorism and Political Violence
Pages: 558-561
Issue: 3
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.914843
File-URL: http://hdl.handle.net/10.1080/09546553.2014.914843
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:3:p:558-561



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_728153_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mustafa Unal
Author-X-Name-First: Mustafa
Author-X-Name-Last: Unal
Title: Strategist or Pragmatist: A Challenging Look at Ocalan's Retrospective Classification and Definition of PKK's Strategic Periods Between 1973 and 2012
Abstract: The PKK, a violent group seeking secession in southeastern Turkey through the use of terror and guerilla methods, has evolved through different strategic and pragmatic phases in pursuing its goal. Ocalan, the incarcerated leader, classified the PKK's objectives into four deliberate strategic periods and commenced the final period of Strategic Lunge in March 2010 (for establishing de-facto autonomy). To compare these periods to PKK's real evolution, this article reviewed the entire process of the PKK (1973–2012) through analysis of resolutions from PKK congresses/conferences and the characteristics of PKK violence (e.g., target status, incident type/location, form, and purpose). This study argues that as opposed to Ocalan's assessment, PKK moves—particularly after 1994—are based on emergent (ex-post) pragmatic shifts rather than predetermined (ex-ante) strategic plans, as verified by analysis of the nature/form of PKK violence. It also argues that the PKK's pragmatic moves permeated even into its ideology and declared goal. Contrary to Ocalan's four-stage strategic periods, the PKK's initial manifesto indicates a three-stage Maoist strategy for reaching its goal. However, the PKK's military attempt to reach the third stage in 1991 failed due to conditions that were not sufficient for realization of the third stage of Maoist strategy. As a result, the PKK quit pursuing military victory after acknowledging its defeat in 1994; instead, since it still possessed the ability to initiate violence, it strategically employed (and ceased) violence to supplement its campaign of political compromise and negotiation.
Journal: Terrorism and Political Violence
Pages: 419-448
Issue: 3
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2012.728153
File-URL: http://hdl.handle.net/10.1080/09546553.2012.728153
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:3:p:419-448



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_725681_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Karl Sörenson
Author-X-Name-First: Karl
Author-X-Name-Last: Sörenson
Author-Name: J. Widen
Author-X-Name-First: J.
Author-X-Name-Last: Widen
Title: Irregular Warfare and Tactical Changes: The Case of Somali Piracy
Abstract: The aim of this article is to analyze the tactical behavior of Somali pirates, international naval forces, and the shipping community operating in the Gulf of Aden and the Somali Basin. To what extent has tactical behavior changed over time and can this process be understood in more theoretical terms? Our theoretical framework centers around some concepts often used in naval doctrine, discussing tactical change in terms of command and control, force, mobility, protection, intelligence, and endurance. We also evaluate this change using two tactical concepts—tactical adaptation and tactical development. The empirical data is based on statistics from the International Criminal Court-International Maritime Bureau and the EU NAVFOR Operation Atalanta, as well as interviews. We conclude that Somali piracy has unquestionably adapted their tactics to circumstances, while naval forces have increased their capacity to capture pirates and shipping to avoid pirates.
Journal: Terrorism and Political Violence
Pages: 399-418
Issue: 3
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2012.725681
File-URL: http://hdl.handle.net/10.1080/09546553.2012.725681
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:3:p:399-418



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_729541_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Shandon Harris-Hogan
Author-X-Name-First: Shandon
Author-X-Name-Last: Harris-Hogan
Author-Name: Andrew Zammit
Author-X-Name-First: Andrew
Author-X-Name-Last: Zammit
Title: The Unseen Terrorist Connection: Exploring Jihadist Links Between Lebanon and Australia
Abstract: A defining feature of Australian jihadism over the past decade has been the predominant involvement of individuals of Lebanese descent, along with Australian citizens engaging in jihadist activity in Lebanon. This article outlines the separate relevant cases of jihadist activity in Australia and Lebanon, and examines various explanations for this unique situation. It finds long-distance nationalism, target selection, and training locations to be inadequate explanations, despite their utility in other cases where ethnic diaspora associations converge with jihadist activity. The marginalisation and disadvantage faced by Lebanese-Australian Muslims proved to be an influence, but could not account for the difference between the small numbers involved in jihadism and the tens of thousands facing comparable social circumstances. The most direct explanation for this phenomenon proved to be the intimate personal connections between the radical networks straddling the two countries. A network analysis is therefore conducted, distinguishing between operational and social connections, in order to give greater insight into this threat.
Journal: Terrorism and Political Violence
Pages: 449-469
Issue: 3
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2012.729541
File-URL: http://hdl.handle.net/10.1080/09546553.2012.729541
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:3:p:449-469



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_734875_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ariel Ahram
Author-X-Name-First: Ariel
Author-X-Name-Last: Ahram
Title: The Role of State-Sponsored Militias in Genocide
Abstract: This article explains how and why armed, non-state actors collaborate with states to inflict massive levels of violence. Regime type and state capacity interact to provide state elites a menu of repertoires for implementing violence, some emphasizing direct state action, others emphasizing cooperation and alliance between state and armed, non-state actors. Rather than struggling in vain to build strong states to eliminate armed non-state actors and establish a monopoly over the use of force, averting genocide might necessitate recruiting and strengthening the power of indigenous, armed non-state actors.
Journal: Terrorism and Political Violence
Pages: 488-503
Issue: 3
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2012.734875
File-URL: http://hdl.handle.net/10.1080/09546553.2012.734875
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:3:p:488-503

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_745853_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Eric Ouellet
Author-X-Name-First: Eric
Author-X-Name-Last: Ouellet
Author-Name: Jérôme Lacroix-Leclair
Author-X-Name-First: Jérôme
Author-X-Name-Last: Lacroix-Leclair
Author-Name: Pierre Pahlavi
Author-X-Name-First: Pierre
Author-X-Name-Last: Pahlavi
Title: The Institutionalization of Al-Qaeda in the Islamic Maghreb (AQMI)
Abstract: A number of observers have expressed serious concerns that Al-Qaeda in the Islamic Maghreb (AQMI), as it expands in the Sahel, may become strong enough to be a threat to Europe and carry on the global mission of Al-Qaeda as conceived by bin Laden. This fear seems unwarranted. Using institutional analysis to study the AQMI behavioral fluctuations over the last decade, this article argues that AQMI's need to find a compromise between external and internal legitimacy has constrained its behavior. The affiliation of the Algerian terrorists with Al-Qaeda was in many ways a marriage of convenience that created a number of internal contradictions. At the cognitive level, implicit Algerian nationalism to rid the country of its corrupt regime remains at odds with pan-Islamic views shared by Al-Qaeda's leadership. At the normative level, indiscriminate suicide bombing supported by Al-Qaeda is abhorrent to many Algerian terrorists, who construe their mandate in the spirit of the Algerian war of independence where it is their duty to protect civilians. These and other contradictions prevent AQMI from developing a coherent political agenda and thus it is less likely to engage in a long-term conflict against European societies.
Journal: Terrorism and Political Violence
Pages: 650-665
Issue: 4
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2012.745853
File-URL: http://hdl.handle.net/10.1080/09546553.2012.745853
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:4:p:650-665



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_760455_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ore Koren
Author-X-Name-First: Ore
Author-X-Name-Last: Koren
Title: Military Structure, Civil Disobedience, and Military Violence
Abstract: In this article, I argue that factors inherent to the structure of a military organization and their relationship with the political leadership play a role in the organization's tendency to perpetrate violence against civilians during civil disobedience campaigns. To examine this hypothesis, I conducted a three-phased statistical analysis on a database containing 97 campaigns that took place between 1972 and 2012. In the first phase, I examined the relationship between military centric factors and violent crackdowns. In the second phase, I examined the relationship between military centric factors and mass killing. In the third stage, I examined the relationship between two specific types of discrimination in the military and mass killing. I found strong evidence supporting the hypothesis mentioned above. High-risk militaries that served a militarized regime, contained loosely regulated or indoctrinated paramilitaries, and discriminated against the protesting group, were much more likely to perpetrate violence against civilians during civil disobedience campaigns than low-risk militaries. The conclusions of this study suggest that further examination of the military's role in perpetrating violence against civilians during protests and conflict may provide some novel findings.
Journal: Terrorism and Political Violence
Pages: 688-712
Issue: 4
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2012.760455
File-URL: http://hdl.handle.net/10.1080/09546553.2012.760455
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:4:p:688-712



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_934158_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dipak Gupta
Author-X-Name-First: Dipak
Author-X-Name-Last: Gupta
Title: James P. Farwell. .Samir Puri. .Eamon Murphy. .
Journal: Terrorism and Political Violence
Pages: 725-727
Issue: 4
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.934158
File-URL: http://hdl.handle.net/10.1080/09546553.2014.934158
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:4:p:725-727



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_773899_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joseph Mann
Author-X-Name-First: Joseph
Author-X-Name-Last: Mann
Title: Saudi-Palestinian Relations During the Run-Up to and the Aftermath of Black September
Abstract: The Black September events in Jordan in 1970 are an example of the conflict the Palestinian issue presented for monarchic regimes. On the one hand, wealthy regimes such as Saudi Arabia and Kuwait wanted to assist the Palestinians in their struggle against Israel, but on the other hand, the moment they understood that siding with the Palestinians could weaken their regimes, they renounced their support. This article, therefore, emphasizes the importance the monarchic regimes in the Persian Gulf attributed to their own stability, and the influence that issue had on their policies within the Arab world.
Journal: Terrorism and Political Violence
Pages: 713-724
Issue: 4
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2013.773899
File-URL: http://hdl.handle.net/10.1080/09546553.2013.773899
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:4:p:713-724



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_934159_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Claudia Hillebrand. 
Journal: Terrorism and Political Violence
Pages: 727-728
Issue: 4
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.934159
File-URL: http://hdl.handle.net/10.1080/09546553.2014.934159
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:4:p:727-728



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_895649_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marc Sageman
Author-X-Name-First: Marc
Author-X-Name-Last: Sageman
Title: The Stagnation in Terrorism Research
Abstract: Despite over a decade of government funding and thousands of newcomers to the field of terrorist research, we are no closer to answering the simple question of “What leads a person to turn to political violence?” The state of stagnation with respect to this issue is partly due to the government strategy of funding research without sharing the necessary primary source information with academia, which has created an unbridgeable gap between academia and the intelligence community. This has led to an explosion of speculations with little empirical grounding in academia, which has the methodological skills but lacks data for a major breakthrough. Most of the advances in the field have come from historical archival research and analysis of a few field interviews. Nor has the intelligence community been able to achieve any breakthrough because of the structure and dynamic of this community and its lack of methodological rigor. This prevents creative analysis of terrorism protected from political concerns. The solution to this stagnation is to make non-sensitive data available to academia and to structure more effective discourse between the academic and intelligence communities in order to benefit from the complementary strengths in these two communities.
Journal: Terrorism and Political Violence
Pages: 565-580
Issue: 4
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.895649
File-URL: http://hdl.handle.net/10.1080/09546553.2014.895649
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:4:p:565-580



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_895653_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Clark McCauley
Author-X-Name-First: Clark
Author-X-Name-Last: McCauley
Author-Name: Sophia Moskalenko
Author-X-Name-First: Sophia
Author-X-Name-Last: Moskalenko
Title: Some Things We Think We've Learned Since 9/11: A Commentary on Marc Sageman's “The Stagnation in Terrorism Research”
Journal: Terrorism and Political Violence
Pages: 601-606
Issue: 4
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.895653
File-URL: http://hdl.handle.net/10.1080/09546553.2014.895653
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:4:p:601-606



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_751912_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Freeman
Author-X-Name-First: Michael
Author-X-Name-Last: Freeman
Title: A Theory of Terrorist Leadership (and its Consequences for Leadership Targeting)
Abstract: States often target terrorist leaders with the belief that the leader's death or capture will cause the terrorist organization to collapse. Yet the history of this strategy of “leadership targeting” provides a mixed record—for every example of effectiveness, there are similar examples of ineffectiveness. The central question of this article is: what makes a terrorist leader important? Specifically, what does a terrorist leader do that no one else can do (or do as well) for the organization? To answer this question, I develop a theory of terrorist leadership that argues that leaders might potentially perform two main functions: they can provide inspiration and/or operational direction (or not for both). I also theorize as to how and why the provision of these functions changes over time as the organization itself changes. The consequences for leadership targeting flow naturally from this theory—when leaders provide these functions to the organization, leadership targeting is most likely to be effective. Case studies of Algeria, Peru, and Japan offer insights into why some cases of leadership targeting were effective and why others were not. The conclusion extends this model with an analysis of al-Qaeda's prospects after the death of bin Laden.
Journal: Terrorism and Political Violence
Pages: 666-687
Issue: 4
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2012.751912
File-URL: http://hdl.handle.net/10.1080/09546553.2012.751912
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:4:p:666-687



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_895652_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David Schanzer
Author-X-Name-First: David
Author-X-Name-Last: Schanzer
Title: No Easy Day: Government Roadblocks and the Unsolvable Problem of Political Violence: A Response to Marc Sageman's “The Stagnation in Terrorism Research”
Journal: Terrorism and Political Violence
Pages: 596-600
Issue: 4
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.895652
File-URL: http://hdl.handle.net/10.1080/09546553.2014.895652
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:4:p:596-600



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_744306_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Fritz Allhoff
Author-X-Name-First: Fritz
Author-X-Name-Last: Allhoff
Title: Empirical Objections to Torture: A Critical Reply
Abstract: Those who support torture in ticking-time-bomb cases are often criticized as failing to consider empirical objections to torture; however, torture's critics often wield this charge uncritically, doing little more than throwing out platitudes without considering the role of those platitudes in the dialectic. I agree with the critics that more empirical engagement is owed than is typically on offer, but deny that such engagement vindicates their position. This article therefore considers various stock objections to the actual use of torture, while ultimately arguing that those objections fail to undermine the use of torture in exceptional cases. In particular, we will consider the efficacy and reliability of torture, the institutional requirements for torture, the nefarious spread of torture, and whether there are better alternatives to torture. In each of these discussions, let us frame them against the associated contentions made by critics regarding the inapplicability of ticking-time-bomb cases to the real world. The last two sections of the article consider where the burden of proof falls in this debate and, in particular, whether the proponent of torture needs real-world ticking-time-bomb cases to defend exceptional torture, as well as what such cases might be.
Journal: Terrorism and Political Violence
Pages: 621-649
Issue: 4
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2012.744306
File-URL: http://hdl.handle.net/10.1080/09546553.2012.744306
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:4:p:621-649



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_895655_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marc Sageman
Author-X-Name-First: Marc
Author-X-Name-Last: Sageman
Title: Low Return on Investment
Journal: Terrorism and Political Violence
Pages: 614-620
Issue: 4
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.895655
File-URL: http://hdl.handle.net/10.1080/09546553.2014.895655
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:4:p:614-620



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_934160_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: D. Mulloy
Author-X-Name-First: D.
Author-X-Name-Last: Mulloy
Title: Stephanie Carvin. 
Journal: Terrorism and Political Violence
Pages: 729-730
Issue: 4
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.934160
File-URL: http://hdl.handle.net/10.1080/09546553.2014.934160
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:4:p:729-730



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_895654_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jessica Stern
Author-X-Name-First: Jessica
Author-X-Name-Last: Stern
Title: Response to Marc Sageman's “The Stagnation in Terrorism Research”
Journal: Terrorism and Political Violence
Pages: 607-613
Issue: 4
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.895654
File-URL: http://hdl.handle.net/10.1080/09546553.2014.895654
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:4:p:607-613



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_934162_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Antonio Giustozzi. 
Journal: Terrorism and Political Violence
Pages: 730-731
Issue: 4
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.934162
File-URL: http://hdl.handle.net/10.1080/09546553.2014.934162
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:4:p:730-731



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_943621_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: Statement of Retraction
Journal: Terrorism and Political Violence
Pages: 732-732
Issue: 4
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.943621
File-URL: http://hdl.handle.net/10.1080/09546553.2014.943621
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:4:p:732-732



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_895651_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alex Schmid
Author-X-Name-First: Alex
Author-X-Name-Last: Schmid
Title: Comments on Marc Sageman's Polemic “The Stagnation in Terrorism Research”
Journal: Terrorism and Political Violence
Pages: 587-595
Issue: 4
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.895651
File-URL: http://hdl.handle.net/10.1080/09546553.2014.895651
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:4:p:587-595



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_895650_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Max Taylor
Author-X-Name-First: Max
Author-X-Name-Last: Taylor
Title: If I Were You, I Wouldn't Start From Here: Response to Marc Sageman's “The Stagnation in Terrorism Research”
Journal: Terrorism and Political Violence
Pages: 581-586
Issue: 4
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.895650
File-URL: http://hdl.handle.net/10.1080/09546553.2014.895650
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:4:p:581-586

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_968027_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeffrey Kaplan
Author-X-Name-First: Jeffrey
Author-X-Name-Last: Kaplan
Title: Mel Ayton. 
Journal: BOOK REVIEWS
Pages: 855-857
Issue: 5
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.968027
File-URL: http://hdl.handle.net/10.1080/09546553.2014.968027
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:5:p:855-857



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_796934_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jonathan Leader Maynard
Author-X-Name-First: Jonathan
Author-X-Name-Last: Leader Maynard
Title: Rethinking the Role of Ideology in Mass Atrocities
Abstract: There is a widespread sense amongst theorists of genocide and other violent atrocities that ideology matters. But in spite of this agreement all is not well with actual efforts to theorise ideology's role. Theoretical and empirical coverage has been uneven, and there has been little if any effort to incorporate theories and research from the actual specialist field of contemporary ideology studies. As a result, overarching theoretical accounts of the role ideology plays in violent atrocities remain limited and problematic. This article aims to encourage theorists to think about ideology in a more systematic and productive fashion by analysing four questions: (a) what do we mean by ideology?; (b) who, in cases of atrocity, might be relevantly affected by ideology?; (c) how do these people come to be influenced by atrocity-justifying ideologies?; and (d) how might ideology encourage these people to commit, or permit, mass violence? In discussing these four questions, I aim to clear up a number of misconceptions or vagaries that frequent current analyses of ideology in works on atrocity and political violence. I ultimately offer a suggestive account of six recurring “justificatory mechanisms” which collectively describe some of the common features of ideology's role across cases of mass atrocity.
Journal: Terrorism and Political Violence
Pages: 821-841
Issue: 5
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2013.796934
File-URL: http://hdl.handle.net/10.1080/09546553.2013.796934
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:5:p:821-841



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_946835_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: Editorial Board EOV
Journal: Terrorism and Political Violence
Pages: ebi-ebi
Issue: 5
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.946835
File-URL: http://hdl.handle.net/10.1080/09546553.2014.946835
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:5:p:ebi-ebi



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_968025_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mahmoud Eid
Author-X-Name-First: Mahmoud
Author-X-Name-Last: Eid
Title: The Media Amid Terrorism and Counterterrorism
Journal: Terrorism and Political Violence
Pages: 842-854
Issue: 5
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.968025
File-URL: http://hdl.handle.net/10.1080/09546553.2014.968025
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:5:p:842-854



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_805094_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Eteri Tsintsadze-Maass
Author-X-Name-First: Eteri
Author-X-Name-Last: Tsintsadze-Maass
Author-Name: Richard Maass
Author-X-Name-First: Richard
Author-X-Name-Last: Maass
Title: Groupthink and Terrorist Radicalization
Abstract: Why do groups adopt terrorism? Major theories of terrorist radicalization assume it to be a rational process whereby groups select terrorism as the policy most likely to advance their goals. Not all terrorism is rational, however, and these theories cannot explain cases when groups pursue terrorism despite it being self-defeating. We distinguish between rational and irrational terrorism, and explain the latter using social psychology's groupthink mechanism. Although terrorists are widely assumed to be vulnerable to groupthink, empirical work on the phenomenon has focused overwhelmingly on decision-making by national executives. We firmly establish the link between groupthink and terrorist radicalization by tracing groupthink's operation through the development of the Weather Underground, an American terrorist group that emerged in the late 1960s and conducted six years of bombings against the U.S. government. All of the antecedent conditions, symptoms, and decision-making defects predicted by groupthink are evident in the Weather Underground, providing valuable evidence of the dangers of irrational radicalization and offering lessons for its prevention.
Journal: Terrorism and Political Violence
Pages: 735-758
Issue: 5
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2013.805094
File-URL: http://hdl.handle.net/10.1080/09546553.2013.805094
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:5:p:735-758



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_968029_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Tore Bjørgo and John Horgan (Eds.). 
Journal: Terrorism and Political Violence
Pages: 857-859
Issue: 5
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.968029
File-URL: http://hdl.handle.net/10.1080/09546553.2014.968029
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:5:p:857-859



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_772511_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nelly Lahoud
Author-X-Name-First: Nelly
Author-X-Name-Last: Lahoud
Title: The Neglected Sex: The Jihadis’ Exclusion of Women From Jihad
Abstract: The ideological literature of jihad excludes women from combat, even though the classical doctrine of defensive jihad (jihad al-daf’) that jihadis invoke stipulates that all Muslims—men, women, children, and slaves—have an obligation to go out to fight (fard ‘ayn) in defense of their territory and their faith. Thus, the validity of the doctrine of defensive jihad is inherently linked to its universal application to all Muslims. Jihadi ideologues and leaders, however, have either purposely refrained from calling on women to make their presence felt on the battlefield as warriors or have explicitly excluded them. This article is an investigation into this lacuna in jihadi ideology. It addresses a dimension that is hardly, if ever, discussed in the academic literature, namely the jihadis’ exclusion of women from combat. This exclusion represents a gaping hole in jihadi ideology and undermines the validity of the jihadis’ defensive jihad.
Journal: Terrorism and Political Violence
Pages: 780-802
Issue: 5
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2013.772511
File-URL: http://hdl.handle.net/10.1080/09546553.2013.772511
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:5:p:780-802



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_968033_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alicja Stańco-Wawrzyńska
Author-X-Name-First: Alicja
Author-X-Name-Last: Stańco-Wawrzyńska
Title: Jarosław Tomasiewicz. 
Journal: Terrorism and Political Violence
Pages: 861-862
Issue: 5
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.968033
File-URL: http://hdl.handle.net/10.1080/09546553.2014.968033
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:5:p:861-862



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_778198_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Katherine Seifert
Author-X-Name-First: Katherine
Author-X-Name-Last: Seifert
Author-Name: Clark McCauley
Author-X-Name-First: Clark
Author-X-Name-Last: McCauley
Title: Suicide Bombers in Iraq, 2003–2010: Disaggregating Targets Can Reveal Insurgent Motives and Priorities
Abstract: Extending data reported by Mohammed Hafez in 2007, we compiled a database of 1,779 suicide bombers who attempted or completed attacks in Iraq from 2003 through 2010. From 2003 through 2006, monthly totals of suicide bombers show a pattern different from the pattern of non-suicide insurgent attacks, but from 2007 through 2010 the two patterns were similar. This biphasic pattern indicates that suicide attacks sometimes warrant separate analysis but sometimes are just one tactic in a larger envelope of insurgent violence. We also show that only 13 percent of suicide bombers targeted coalition forces and international civilians, primarily during the early years of the conflict, whereas 83 percent of suicide bombers targeted Iraqis (civilians, members of the Anbar Awakening Movement, Iraqi security forces, and government entities) in attacks that extended throughout the duration of the insurgency. These results challenge the idea that suicide attacks are primarily a nationalist response to foreign occupation, and caution that “smart bombs” may be more often sent against soft targets than hard targets. More generally, our results indicate that suicide attacks must be disaggregated by target in order to understand these attacks as the expression of different insurgent priorities at different times.
Journal: Terrorism and Political Violence
Pages: 803-820
Issue: 5
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2013.778198
File-URL: http://hdl.handle.net/10.1080/09546553.2013.778198
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:5:p:803-820



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_968031_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Dhana Hughes. 
Journal: Terrorism and Political Violence
Pages: 859-860
Issue: 5
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2014.968031
File-URL: http://hdl.handle.net/10.1080/09546553.2014.968031
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:5:p:859-860



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_767245_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lars Berntzen
Author-X-Name-First: Lars
Author-X-Name-Last: Berntzen
Author-Name: Sveinung Sandberg
Author-X-Name-First: Sveinung
Author-X-Name-Last: Sandberg
Title: The Collective Nature of Lone Wolf Terrorism: Anders Behring Breivik and the Anti-Islamic Social Movement
Abstract: Anders Behring Breivik, a lone wolf terrorist, killed 77 people in two terrorist attacks in Norway in 2011. This study uses framing theory from social movement studies to compare his Manifesto with the rhetoric of the anti-Islamic movement that inspired him. The anti-Islamic movement has a dual, and sometimes inconsistent, collective action framing. On the one hand, they portray Islam as an existential threat to the West and a warlike enemy; on the other, they promote peaceful and democratic opposition. The potential for radicalization is thus immanent. This case study reveals the importance of seeing lone wolf terrorists as acting from rhetoric embedded in larger social movements. It further demonstrates, in detail, the subtle and complex ways in which political narratives rejecting terrorism and political violence still end up inspiring such acts.
Journal: Terrorism and Political Violence
Pages: 759-779
Issue: 5
Volume: 26
Year: 2014
X-DOI: 10.1080/09546553.2013.767245
File-URL: http://hdl.handle.net/10.1080/09546553.2013.767245
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:26:y:2014:i:5:p:759-779

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_959405_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joshua D. Freilich
Author-X-Name-First: Joshua D.
Author-X-Name-Last: Freilich
Author-Name: Gary LaFree
Author-X-Name-First: Gary
Author-X-Name-Last: LaFree
Title: Criminology Theory and Terrorism: Introduction to the Special Issue
Abstract: 
 In this short essay, we introduce readers to a special issue of Terrorism and Political Violence on criminological approaches to the study of terrorism. In addition to summarizing the eight articles in the issue, we outline some general points about the relationship between criminological thinking and our understanding of terrorism. Our goal is to place the special issue's contributions in context and highlight under-explored issues that future research could address.
Journal: Terrorism and Political Violence
Pages: 1-8
Issue: 1
Volume: 27
Year: 2015
Month: 1
X-DOI: 10.1080/09546553.2014.959405
File-URL: http://hdl.handle.net/10.1080/09546553.2014.959405
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:1:p:1-8



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_959406_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniela Pisoiu
Author-X-Name-First: Daniela
Author-X-Name-Last: Pisoiu
Title: Subcultural Theory Applied to Jihadi and Right-Wing Radicalization in Germany
Abstract: 
 This article assesses the applicability of subcultural theories to individual cases of jihadi and Right-wing radicalization in Germany, with a focus on the individual initial situation and motivation for involvement. Within an overall qualitative research design, the article tests deviance/strain and Centre for Contemporary Cultural Studies (CCCS) subcultural theories against four jihadi and three Right-wing extremist cases. The findings show little support for the strain-based status frustration hypothesis, but confirm the illegitimate opportunity structure thesis; modified versions of the CCCS’ resistance, bricolage, and homology concepts; as well as some of the postmodern approaches to agency and cultural cross-fertilization. The jihadi and Right-wing radicals examined here are assertive and purposive agents, strategically using the rich cultural arsenal available in the mainstream and/or other subcultures, while at the same time being themselves influenced by contemporary mainstream preferences of style. The article discusses the implications of these findings for radicalization research and specific subcultural approaches. It argues for a greater focus on both individual agency and the (sub-)cultural context for an improved understanding of individual involvement in political violence.
Journal: Terrorism and Political Violence
Pages: 9-28
Issue: 1
Volume: 27
Year: 2015
Month: 1
X-DOI: 10.1080/09546553.2014.959406
File-URL: http://hdl.handle.net/10.1080/09546553.2014.959406
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:1:p:9-28



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_962989_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Henda Y. Hsu
Author-X-Name-First: Henda Y.
Author-X-Name-Last: Hsu
Author-Name: Robert Apel
Author-X-Name-First: Robert
Author-X-Name-Last: Apel
Title: A Situational Model of Displacement and Diffusion Following the Introduction of Airport Metal Detectors
Abstract: 
 Much of the discourse surrounding counterterrorism centers on the inevitability of displacement, or the substitution of another form of terrorist attack in place of the one that has been thwarted. Yet a longstanding tradition of research in situational crime prevention finds that displacement is far from inevitable, and often depends crucially on the specific features of the incidents in question. In fact, crime prevention efforts are often followed by a “diffusion of benefits” (i.e., crime reductions) to incidents, groups, or locations that were not the intended target of the intervention. The current study examines various forms of displacement and diffusion in response to airport metal detectors among terrorist groups that had been involved in the perpetration of aviation attacks prior to their implementation. Using data from the Global Terrorism Database, the findings from interrupted time series models suggest a complex set of displacement and diffusion effects with respect to alternative attack modes, target types, and weapon usage.
Journal: Terrorism and Political Violence
Pages: 29-52
Issue: 1
Volume: 27
Year: 2015
Month: 1
X-DOI: 10.1080/09546553.2014.962989
File-URL: http://hdl.handle.net/10.1080/09546553.2014.962989
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:1:p:29-52



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_962991_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Simon Perry
Author-X-Name-First: Simon
Author-X-Name-Last: Perry
Author-Name: Badi Hasisi
Author-X-Name-First: Badi
Author-X-Name-Last: Hasisi
Title: Rational Choice Rewards and the Jihadist Suicide Bomber
Abstract: 
 Suicide terrorism is the most violent and horrifying form of terrorism in the world today. This kind of terrorism causes many fatalities and can throw an entire nation into a state of panic. We usually attribute this kind of terrorism to altruistic motivation, assuming that bombers are willing to sacrifice themselves for a higher cause. The current study uses the criminological theory of Rational Choice to analyze the motivation of jihadist suicide terrorism. By reviewing the religious, personal, and social incentives, we demonstrate that even those who kill themselves in suicide attacks, which are seemingly examples of irrational or altruistic behavior, do so while considering future, self-gratifying benefits. Since this self-destructive behavior is mostly driven not by altruistic motivation but by the anticipation of costs and benefits, we find that there is no fundamental difference between the perpetrators’ motivations and those of other criminals; both groups are committed to maximizing self-gratifying, beneficial behavior.
Journal: Terrorism and Political Violence
Pages: 53-80
Issue: 1
Volume: 27
Year: 2015
Month: 1
X-DOI: 10.1080/09546553.2014.962991
File-URL: http://hdl.handle.net/10.1080/09546553.2014.962991
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:1:p:53-80



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_972156_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Susan Fahey
Author-X-Name-First: Susan
Author-X-Name-Last: Fahey
Author-Name: Gary LaFree
Author-X-Name-First: Gary
Author-X-Name-Last: LaFree
Title: Does Country-Level Social Disorganization Increase Terrorist Attacks?
Abstract: 
 This study examines the effects of a measure of country-level social disorganization on levels of terrorist attacks and fatalities in 101 countries from 1981 to 2010. We measure social disorganization as the presence of state instability: revolutionary and ethnic war, adverse regime change, and genocide. The classic social disorganization perspective posits that individuals experiencing these types of rapid social change will be freed from the institutional and informal restraints that bind them to society, and keep them conforming to social norms and laws. We examine the extent to which this reasoning applies to the number of terrorist attacks and fatalities from terrorist attacks occurring in countries. To control for the possibility that better functioning states are better able to prevent terrorist attacks, we include two measures of state capacity. We find that controlling for state capacity and a wide variety of other variables, social disorganization is consistently associated with increases in terrorist attacks and fatalities. We consider implications of the results for future research and policy.
Journal: Terrorism and Political Violence
Pages: 81-111
Issue: 1
Volume: 27
Year: 2015
Month: 1
X-DOI: 10.1080/09546553.2014.972156
File-URL: http://hdl.handle.net/10.1080/09546553.2014.972156
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:1:p:81-111



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_972160_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alex Braithwaite
Author-X-Name-First: Alex
Author-X-Name-Last: Braithwaite
Author-Name: Shane D. Johnson
Author-X-Name-First: Shane D.
Author-X-Name-Last: Johnson
Title: The Battle for Baghdad: Testing Hypotheses About Insurgency From Risk Heterogeneity, Repeat Victimization, and Denial Policing Approaches
Abstract: 
 The Iraqi Insurgency (2003–2011) has commonly been characterized as demonstrating the tendency for violence to cluster and diffuse at the local level. Recent research has demonstrated that insurgent attacks in Iraq cluster in time and space in a manner similar to that observed for the spread of a disease. The current study employs a variety of approaches common to the scientific study of criminal activities to advance our understanding of the correlates of observed patterns of the incidence and contagion of insurgent attacks. We hypothesize that the precise patterns will vary from one place to another, but that more attacks will occur in areas that are heavily populated, where coalition forces are active, and along road networks. To test these hypotheses, we use a fishnet to build a geographical model of Baghdad that disaggregates the city into more than 3000 grid cell locations. A number of logistic regression models with spatial and temporal lags are employed to explore patterns of local escalation and diffusion. These models demonstrate the validity of arguments under each of three models but suggest, overall, that risk heterogeneity arguments provide the most compelling and consistent account of the location of insurgency. In particular, the results demonstrate that violence is most likely at locations with greater population levels, higher density of roads, and military garrisons.
Journal: Terrorism and Political Violence
Pages: 112-132
Issue: 1
Volume: 27
Year: 2015
Month: 1
X-DOI: 10.1080/09546553.2014.972160
File-URL: http://hdl.handle.net/10.1080/09546553.2014.972160
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:1:p:112-132



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_975646_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Steven Chermak
Author-X-Name-First: Steven
Author-X-Name-Last: Chermak
Author-Name: Jeffrey A. Gruenewald
Author-X-Name-First: Jeffrey A.
Author-X-Name-Last: Gruenewald
Title: Laying a Foundation for the Criminological Examination of Right-Wing, Left-Wing, and Al Qaeda-Inspired Extremism in the United States
Abstract: 
 Despite several overlaps between crime and terrorism, criminological examinations of terrorism to date have been limited. To fill this gap in the research, we examine several individual and contextual socio-demographic characteristics of a diverse sample of extremists operating in the United States who have committed violent crimes. In addition, we provide a comparative analysis to explain and understand differences between extremists who have committed violent crimes while active in either far-Right, far-Left (including environmental and animal rights extremists), or Al Qaeda and affiliated movements. To assess the impact of external factors on the nature of domestic extremist violence, we also comparatively examine these three types of domestic extremists before and after the September 11, 2001 terrorist attacks. We find several similarities across domestic extremists but many important suspect- and county-level differences as well. We end the paper with suggestions for future research that could extend the criminological study of terrorism.
Journal: Terrorism and Political Violence
Pages: 133-159
Issue: 1
Volume: 27
Year: 2015
Month: 1
X-DOI: 10.1080/09546553.2014.975646
File-URL: http://hdl.handle.net/10.1080/09546553.2014.975646
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:1:p:133-159



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_975648_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Javier Argomaniz
Author-X-Name-First: Javier
Author-X-Name-Last: Argomaniz
Author-Name: Alberto Vidal-Diez
Author-X-Name-First: Alberto
Author-X-Name-Last: Vidal-Diez
Title: Examining Deterrence and Backlash Effects in Counter-Terrorism: The Case of ETA
Abstract: 
 Scholars are increasingly drawing on models and theories from the field of Criminology to offer new insights on terrorist violence. A particularly useful framework by LaFree, Dugan, and Korte works from the assumption that illegal behaviour can be affected by the threat and/or imposition of punishment. It sees the results of the government's intervention in terms of deterrence (state's repressive action leads to a reduction in terrorism violence), and backlash (state's repressive action leads to defiance and retaliation, and to an upsurge of terrorism violence). This article applies this model to a case study of the government's responses to Euzkadi Ta Askatasuna (ETA). It uses a variation of survival analysis technique—Series Hazard—to assess the impact of six major initiatives on the risk of new ETA attacks in the period from 1977 to 2010. Mostly, the results provide support for both backlash interpretations, although important questions regarding interpretation are raised.
Journal: Terrorism and Political Violence
Pages: 160-181
Issue: 1
Volume: 27
Year: 2015
Month: 1
X-DOI: 10.1080/09546553.2014.975648
File-URL: http://hdl.handle.net/10.1080/09546553.2014.975648
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:1:p:160-181



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_975649_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: William S. Parkin
Author-X-Name-First: William S.
Author-X-Name-Last: Parkin
Author-Name: Joshua D. Freilich
Author-X-Name-First: Joshua D.
Author-X-Name-Last: Freilich
Title: Routine Activities and Right-Wing Extremists: An Empirical Comparison of the Victims of Ideologically- and Non-Ideologically-Motivated Homicides Committed by American Far-Rightists
Abstract: 
 This study examines whether Criminology's Routine Activities Theory (RAT) and related Lifestyle Theory (LST) can account for variation between the attributes of victims of fatal ideologically motivated attacks (akin to terrorism) and the victims of non-ideologically motivated homicide incidents committed by far-Right extremists in the United States. This article makes four contributions. First, we empirically test Criminology theory in the context of terrorism by using routine activities to devise four core hypotheses to explain differences between the two types of victims. Second, our investigation uniquely includes a non-terrorist comparison group (i.e., victims of homicides committed by extremists for personal reasons like greed). Third, our study focuses on ideological victimization. Terrorism researchers have usually ignored victims because of the difficulty in accessing the necessary data. Finally, we also make a methodological contribution by showing that criminology can build upon the terrorism literature by utilizing open-sources. Using data from the Extremist Crime Database (ECDB), the results of a multivariate analysis partially supported the hypotheses, showing that RAT and LST offer empirically supported theoretical constructs that have the ability to differentiate between ideological and non-ideological homicides.
Journal: Terrorism and Political Violence
Pages: 182-203
Issue: 1
Volume: 27
Year: 2015
Month: 1
X-DOI: 10.1080/09546553.2014.975649
File-URL: http://hdl.handle.net/10.1080/09546553.2014.975649
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:1:p:182-203

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_796935_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tobias Hecker
Author-X-Name-First: Tobias
Author-X-Name-Last: Hecker
Author-Name: Roos Haer
Author-X-Name-First: Roos
Author-X-Name-Last: Haer
Title: Drugs Boosting Conflict? A Micro-Level Test of the Linkage Between Substance Use and Violence
Abstract: 
 Many studies have emphasized the role of natural resources in the onset and duration of armed conflict. Due to its characteristics, narcotics are considered to be one of the most influential resources. However, the dynamics of how this particular commodity is linked to conflict is still not well understood. Most scholars have focused on the revenue aspects of narcotics and only a few have mentioned the micro-level aspect, i.e., the effect of drug intake and alcohol consumption on combatants' behavior during conflict. With the help of a dataset based on 224 interviews held with former combatants in the Democratic Republic of the Congo, we examined this latter dynamic. Our analyses show, after controlling for armed group-level and individual-level variables, that drug intake and alcohol consumption boost the number of violent actions perpetrated by combatants.
Journal: Terrorism and Political Violence
Pages: 205-224
Issue: 2
Volume: 27
Year: 2015
Month: 3
X-DOI: 10.1080/09546553.2013.796935
File-URL: http://hdl.handle.net/10.1080/09546553.2013.796935
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:2:p:205-224



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_800048_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Brian J. Phillips
Author-X-Name-First: Brian J.
Author-X-Name-Last: Phillips
Title: What Is a Terrorist Group? Conceptual Issues and Empirical Implications
Abstract: 
 Researchers increasingly conduct quantitative studies of terrorist groups, which is an important advance in the literature. However, there has been little discussion of what constitutes a “terrorist group,” regarding conceptualization or measurement. Many studies of terrorist groups do not define the term, and among those that do, definitions vary considerably. The lack of clarity leads to conceptual confusion as well as sample selection issues, which can affect inferences. To address these issues, this article offers an in-depth analysis of the term and its use. It explores definitions in the literature, and then discusses different samples used. Empirically, the article demonstrates how sample selection can affect variable values. It also shows that a non-representative sample, such as the U.S. Foreign Terrorist Organization list, can lead to inaccurate generalizations. Ultimately, I present a straightforward “inclusive” definition, and argue for its practicality. Other suggestions are made for a more effective and cohesive research program.
Journal: Terrorism and Political Violence
Pages: 225-242
Issue: 2
Volume: 27
Year: 2015
Month: 3
X-DOI: 10.1080/09546553.2013.800048
File-URL: http://hdl.handle.net/10.1080/09546553.2013.800048
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:2:p:225-242



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_800049_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jane Esberg
Author-X-Name-First: Jane
Author-X-Name-Last: Esberg
Title: Democracy's Effect on Terrorist Organizations: Regime Type and Armed Group Behavior in Chile
Abstract: 
 How does democracy influence terrorism? The regime-responsive school argues that lack of representation in autocracies motivates violence; the regime-permissive school posits that individual liberty in democracies allows it. The schools thus disagree about the democratic feature to which violence responds—representation or individual liberty. These arguments are problematic in two ways. First, neither accounts for the potentially competing effects of different democratic features. Second, treating terrorism as a set response to operating context ignores the operational processes behind violence, described in organizational theories of terrorism. This article develops a bridge between the regime-responsive and regime-permissive schools by applying organizational theories of terrorism to their key arguments. I argue that representation and individual liberty have independent, and sometimes competing, effects on armed groups' missions, hierarchies, and membership—collectively organizational capacity, the ability to survive and influence the environment. This explains the mixed effects of democracy on terrorism: both high-functioning democracy and repressive autocracy weaken organizational capacity, but decreased representation in a democracy or higher individual liberty in an autocracy removes organizational stresses. New research on Chile between 1965 and 1995—representing five government periods, with four armed groups operating—acts as an initial test of these relationships.
Journal: Terrorism and Political Violence
Pages: 243-267
Issue: 2
Volume: 27
Year: 2015
Month: 3
X-DOI: 10.1080/09546553.2013.800049
File-URL: http://hdl.handle.net/10.1080/09546553.2013.800049
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:2:p:243-267



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_806310_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Simanti Lahiri
Author-X-Name-First: Simanti
Author-X-Name-Last: Lahiri
Title: Choosing to Die: Suicide Bombing and Suicide Protest in South Asia
Abstract: 
 Scholars tend to attribute the use of suicide protest and suicide bombing to purely rational considerations. In contrast, I argue that conventional understandings of strategy are too narrow and must be expanded to include emotional motivations for political mobilization. “Complex” strategy directly engages both the calculative and emotive understandings of political action. I develop this theory through a comparison of suicide protests and suicide bombings in South Asia, focusing on the emotional content of this extreme tactic. Suicide protests illustrate the importance of pride, sympathy, fear, and shame in political mobilization. I explore the emotional character of suicide in protest through an investigation of two cases: the Liberation Tigers of Tamil Eelam in Sri Lanka (LTTE) and the Narmada Bachao Andolan (NBA) in India.
Journal: Terrorism and Political Violence
Pages: 268-288
Issue: 2
Volume: 27
Year: 2015
Month: 3
X-DOI: 10.1080/09546553.2013.806310
File-URL: http://hdl.handle.net/10.1080/09546553.2013.806310
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:2:p:268-288



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_806911_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Maria Josua
Author-X-Name-First: Maria
Author-X-Name-Last: Josua
Author-Name: Mirjam Edel
Author-X-Name-First: Mirjam
Author-X-Name-Last: Edel
Title: To Repress or Not to Repress—Regime Survival Strategies in the Arab Spring
Abstract: 
 Authoritarian regimes use repression as an essential strategy to attain regime stability and survival. During the Arab Spring, different forms of repression have been employed. We argue that to explain this variation, three bundles of characteristics have to be taken into account: the setup of the regime, the state, and the challenge. As we assume that elites have a wider repertoire of strategies besides repression at their disposal, the analysis of repression has to be embedded in a broader framework of strategies of rule. Including specific forms and target groups of repression, we develop an explanatory model addressing the question of which repressive measures rulers utilize under which circumstances. The postulated relationship between repression and characteristics of the state, regime, and challenge are then tested in a comparative analysis of the reactions to the challenges arising with the 2011 uprisings in two very different Arab countries, Bahrain and Egypt. On the basis of these empirical findings, we propose a readjusted model explaining repression.
Journal: Terrorism and Political Violence
Pages: 289-309
Issue: 2
Volume: 27
Year: 2015
Month: 3
X-DOI: 10.1080/09546553.2013.806911
File-URL: http://hdl.handle.net/10.1080/09546553.2013.806911
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:2:p:289-309



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_806912_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bernhard Blumenau
Author-X-Name-First: Bernhard
Author-X-Name-Last: Blumenau
Title: Taming the Beast: West Germany, the Political Offence Exception, and the Council of Europe Convention on the Suppression of Terrorism
Abstract: 
 In the 1970s, Western European countries were hit hard by terrorism, especially by international terrorism that crossed borders easily and allowed terrorists of different origins to carry out attacks against both governments and people. Consequently, the necessity of fighting this menace also extended to international organisations. This article looks at how the Council of Europe dealt with the issue, and assesses the negotiations that led to the Convention on the Suppression of Terrorism from the German perspective. West Germany was very interested in establishing a sounder international legal framework against terrorism and thought that the Council of Europe would be able to make an important contribution by abolishing the political offence exception that had so far been a core feature of most extradition treaties. This clause allowed political criminals to escape punishment by fleeing to a country that would deny extradition to a different country on the grounds of the political nature of the act committed by the person in question. The article gives an account and analysis of the complex negotiations that finally resulted in the adoption of the Convention in 1977, as well as of the problems encountered and compromises reached during these negotiations.
Journal: Terrorism and Political Violence
Pages: 310-330
Issue: 2
Volume: 27
Year: 2015
Month: 3
X-DOI: 10.1080/09546553.2013.806912
File-URL: http://hdl.handle.net/10.1080/09546553.2013.806912
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:2:p:310-330



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_808194_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marc R. DeVore
Author-X-Name-First: Marc R.
Author-X-Name-Last: DeVore
Author-Name: Armin B. Stähli
Author-X-Name-First: Armin B.
Author-X-Name-Last: Stähli
Title: Explaining Hezbollah's Effectiveness: Internal and External Determinants of the Rise of Violent Non-State Actors
Abstract: 
 Few issues are more important to scholars of security studies than understanding the impact of state sponsorship on the capabilities of non-state armed actors. The subject of our study—Lebanon's Hezbollah—was selected based on its reputation amongst scholars and policymakers alike as an exceptionally capable organization. In our inquiry, we seek to answer the following questions about Hezbollah's rapid emergence during the 1980s as one of the world's premier armed non-state actors: (a) how did Iranian sponsorship contribute to Hezbollah's effectiveness?; and (b) to what extent did Hezbollah's success depend on characteristics endogenous to the organization itself? To preview our conclusions, state sponsorship can contribute markedly to non-state actors' capabilities by providing resources and sanctuary. However, the ultimate effectiveness of non-state armed groups depends heavily on such internal characteristics as their decision-making processes and members' backgrounds. Thus, while state support may be necessary for non-state actors to achieve their goals, it is insufficient as a guarantee of their effectiveness.
Journal: Terrorism and Political Violence
Pages: 331-357
Issue: 2
Volume: 27
Year: 2015
Month: 3
X-DOI: 10.1080/09546553.2013.808194
File-URL: http://hdl.handle.net/10.1080/09546553.2013.808194
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:2:p:331-357



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1006094_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeffrey Kaplan
Author-X-Name-First: Jeffrey
Author-X-Name-Last: Kaplan
Title: Editor's Note
Journal: Terrorism and Political Violence
Pages: 358-358
Issue: 2
Volume: 27
Year: 2015
Month: 3
X-DOI: 10.1080/09546553.2015.1006094
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1006094
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:2:p:358-358



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1006095_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ivan Strenski
Author-X-Name-First: Ivan
Author-X-Name-Last: Strenski
Title: Ari Shavit Broods Over Israel's Sins and Celebrates Its Virtues
Journal: Terrorism and Political Violence
Pages: 359-367
Issue: 2
Volume: 27
Year: 2015
Month: 3
X-DOI: 10.1080/09546553.2015.1006095
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1006095
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:2:p:359-367



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1006097_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Counter-Terrorism Intelligence, Policy and Theory Since 9/11
Journal: Terrorism and Political Violence
Pages: 368-375
Issue: 2
Volume: 27
Year: 2015
Month: 3
X-DOI: 10.1080/09546553.2015.1006097
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1006097
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:2:p:368-375



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1006099_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: M. Karen Walker
Author-X-Name-First: M. Karen
Author-X-Name-Last: Walker
Title: Neil L. Whitehead and Sverker Finnström (Eds.). Virtual War and Magical Death: Technologies and Imaginaries for Terror and Killing.
Journal: Terrorism and Political Violence
Pages: 376-377
Issue: 2
Volume: 27
Year: 2015
Month: 3
X-DOI: 10.1080/09546553.2015.1006099
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1006099
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:2:p:376-377



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1006101_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kai Chen
Author-X-Name-First: Kai
Author-X-Name-Last: Chen
Title: Martin N. Murphy. Small Boats, Weak States, Dirty Money: Piracy and Maritime Terrorism in the Modern World.
Journal: Terrorism and Political Violence
Pages: 378-379
Issue: 2
Volume: 27
Year: 2015
Month: 3
X-DOI: 10.1080/09546553.2015.1006101
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1006101
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:2:p:378-379



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1006102_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: M. Karen Walker
Author-X-Name-First: M. Karen
Author-X-Name-Last: Walker
Title: Akil N. Awan, Andrew Hoskins, and Ben O'Loughlin. Radicalisation and Media: Connectivity and Terrorism in the New Media Ecology.
Journal: Terrorism and Political Violence
Pages: 379-380
Issue: 2
Volume: 27
Year: 2015
Month: 3
X-DOI: 10.1080/09546553.2015.1006102
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1006102
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:2:p:379-380



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1006103_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Matt Buehler
Author-X-Name-First: Matt
Author-X-Name-Last: Buehler
Title: Laleh Khalili and Jillian Schwedler (Eds.). Policing and Prisons in the Middle East: Formations of Coercion.
Journal: Terrorism and Political Violence
Pages: 380-381
Issue: 2
Volume: 27
Year: 2015
Month: 3
X-DOI: 10.1080/09546553.2015.1006103
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1006103
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:2:p:380-381



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1006104_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jonathan L. Snow
Author-X-Name-First: Jonathan L.
Author-X-Name-Last: Snow
Title: Mahmoud Eid (Ed.). Exchanging Terrorism Oxygen for Media Airwaves: The Age of Terroredia.
Journal: Terrorism and Political Violence
Pages: 382-383
Issue: 2
Volume: 27
Year: 2015
Month: 3
X-DOI: 10.1080/09546553.2015.1006104
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1006104
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:2:p:382-383



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1006105_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Samuel Helfont
Author-X-Name-First: Samuel
Author-X-Name-Last: Helfont
Title: Assaf Moghadam (Ed.). Militancy and Political Violence in Shiism: Trends and Patterns
Journal: Terrorism and Political Violence
Pages: 383-384
Issue: 2
Volume: 27
Year: 2015
Month: 3
X-DOI: 10.1080/09546553.2015.1006105
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1006105
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:2:p:383-384



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1006106_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: James Hopkins
Author-X-Name-First: James
Author-X-Name-Last: Hopkins
Title: Henri Alleg. The Question. Fritz Allhoff. Terrorism, Ticking Time-Bombs, and Torture: A Philosophical Analysis.
Journal: Terrorism and Political Violence
Pages: 384-390
Issue: 2
Volume: 27
Year: 2015
Month: 3
X-DOI: 10.1080/09546553.2015.1006106
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1006106
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:2:p:384-390



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1023662_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: Erratum
Journal: Terrorism and Political Violence
Pages: 391-391
Issue: 2
Volume: 27
Year: 2015
Month: 3
X-DOI: 10.1080/09546553.2015.1023662
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1023662
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:2:p:391-391

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1032030_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Cerwyn Moore
Author-X-Name-First: Cerwyn
Author-X-Name-Last: Moore
Title: Introductory Comments to Foreign Fighters Research: Special Mini-Series
Journal: Terrorism and Political Violence
Pages: 393-394
Issue: 3
Volume: 27
Year: 2015
Month: 5
X-DOI: 10.1080/09546553.2015.1032030
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1032030
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:3:p:393-394



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1032035_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Cerwyn Moore
Author-X-Name-First: Cerwyn
Author-X-Name-Last: Moore
Title: Foreign Bodies: Transnational Activism, the Insurgency in the North Caucasus and “Beyond”
Abstract: 
 This article examines foreign fighters and the insurgency in the North Caucasus. The first part of the article addresses conceptual issues concerning the ways that foreign fighters are analysed, posing this more widely in terms of transnational activism. Here I examine the importance of kin and relatedness. I develop this argument in the second part of the article, which examines pan-Islamism and transnational activism in the post-Soviet period. The third section draws attention to the different groups of foreign fighters, as part of a wider activist movement in the North Caucasus. Here I show that a complex group of transnational activists from the Greater Middle East, North Africa, parts of Europe, and Central Asia participated in the conflicts in the North Caucasus. Finally, the article turns to examine volunteers from the North Caucasus who travelled to fight in Syria, concluding with some considerations about the reintegration of returnees and former activists.
Journal: Terrorism and Political Violence
Pages: 395-415
Issue: 3
Volume: 27
Year: 2015
Month: 5
X-DOI: 10.1080/09546553.2015.1032035
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1032035
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:3:p:395-415



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1021038_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jasper L. de Bie
Author-X-Name-First: Jasper L.
Author-X-Name-Last: de Bie
Author-Name: Christianne J. de Poot
Author-X-Name-First: Christianne J.
Author-X-Name-Last: de Poot
Author-Name: Joanne P. van der Leun
Author-X-Name-First: Joanne P.
Author-X-Name-Last: van der Leun
Title: Shifting Modus Operandi of Jihadist Foreign Fighters From the Netherlands Between 2000 and 2013: A Crime Script Analysis
Abstract: 
 This article describes the development of foreign fighters’ preparatory modes of operation between 2000 and 2013, based on an analysis of 17 closed police investigations and 21 semi-structured interviews with police investigators, public prosecutors, and lawyers. Through the use of grounded theory methods and a crime script analysis, we find that the phenomenon is not as new as is often portrayed. It changes over time as changing opportunity structures have an impact on the activities foreign fighters undertake during the preparation phase. We demonstrate how geopolitical changes, social opportunity structures, and technological developments affect the modus operandi over time. One of the implications of our findings is that the dynamic nature of the foreign fighting phenomenon requires flexible and tailored prevention measures.
Journal: Terrorism and Political Violence
Pages: 416-440
Issue: 3
Volume: 27
Year: 2015
Month: 5
X-DOI: 10.1080/09546553.2015.1021038
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1021038
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:3:p:416-440



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1032032_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard Bach Jensen
Author-X-Name-First: Richard Bach
Author-X-Name-Last: Jensen
Title: Anarchist Terrorism and Global Diasporas, 1878–1914
Abstract: 
 During the quarter century before the First World War, anarchist terrorism was often blamed on the impact of anarchist agitators on naïve immigrants. This article seeks to investigate the truth of this claim, focusing particularly on Italian emigrants, but also looking at some examples of Spanish, French, and Russian emigrants. My conclusion is that, with a few exceptions, radicals emigrated, but emigration did not create radical terrorists. A particularly good example of this can be found by examining the large Italian emigration to Argentina. At most, the emigrant experience may have heightened a pre-existing radicalism or given more precise configuration to its violent expression.
Journal: Terrorism and Political Violence
Pages: 441-453
Issue: 3
Volume: 27
Year: 2015
Month: 5
X-DOI: 10.1080/09546553.2015.1032032
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1032032
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:3:p:441-453



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1032151_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David Malet
Author-X-Name-First: David
Author-X-Name-Last: Malet
Title: Foreign Fighter Mobilization and Persistence in a Global Context
Abstract: 
 Although foreign fighting is hardly new, scholarly research on the phenomenon is only a decade old. Since 2005, there has also been a dramatic rise in the number of transnational insurgents fighting in the Middle East, and they appear to have become the face of the jihad movement. However, of the dozens of foreign fighter contingents around the world in recent decades, only about half have been Islamists. In this article, I contend that the difference between the other contemporary and historical foreign fighter groups and the jihadis is not one of mobilization or effectiveness, but of persistence. Most other foreign fighters demobilized at the end of their conflicts and reintegrated. I argue that the primary factor that accounts for the persistence of the jihadis was the policies of their home and host states that prevented reintegration and created cohorts of stateless, and now professionalized, actors who perpetuate in weakly-governed conflict zones. In presenting this argument, I first attempt to establish a common working definition of foreign fighter based on the first decade of discourse in this emerging field of study, and present a comparative examination of the largest recorded foreign fighter mobilizations.
Journal: Terrorism and Political Violence
Pages: 454-473
Issue: 3
Volume: 27
Year: 2015
Month: 5
X-DOI: 10.1080/09546553.2015.1032151
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1032151
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:3:p:454-473



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_809339_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Elena Pokalova
Author-X-Name-First: Elena
Author-X-Name-Last: Pokalova
Title: Legislative Responses to Terrorism: What Drives States to Adopt New Counterterrorism Legislation?
Abstract: 
 Recent years have witnessed a significant increase in the amount of counterterrorism legislation worldwide. The commonly held assumption behind the adoption of counterterrorism legislation links it to the terrorist threat in a state. However, little research has focused on empirically testing reasons driving states to legislate. This article addresses this void by analyzing the puzzle of why states choose to adopt new terrorism-specific legislation. The article presents empirical analysis of the probability of states to legislate before and after September 11, 2001, and is based on a new database of counterterrorism legislation. The findings reveal that before September 11, state decisions to adopt new legislation correlated with the number of terrorist organizations operating in their territory. Since September 11, however, the most significant predictors for the adoption of new legislation have become the existence of previous counterterrorism legislation and the participation of a state in the War on Terror.
Journal: Terrorism and Political Violence
Pages: 474-496
Issue: 3
Volume: 27
Year: 2015
Month: 5
X-DOI: 10.1080/09546553.2013.809339
File-URL: http://hdl.handle.net/10.1080/09546553.2013.809339
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:3:p:474-496



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_809340_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Olivier J. Walther
Author-X-Name-First: Olivier J.
Author-X-Name-Last: Walther
Author-Name: Dimitris Christopoulos
Author-X-Name-First: Dimitris
Author-X-Name-Last: Christopoulos
Title: Islamic Terrorism and the Malian Rebellion
Abstract: 
 Using Social Network Analysis, this article illuminates the relationship between the Islamists and rebels involved in the Malian conflict. We use publicly available data to demonstrate that the connection between Islamists and rebels depends on brokers who defected from the Tuareg rebellion to radical groups. Our work also details the internal relationships within each of the subgroups. By using descriptive network analysis, we are able to show that both groups were affected by the accidental disappearance of one of the Al-Qaeda in the Islamic Maghreb emirs, and the death of one of the architects of the Tuareg rebellion. Both events affected social cohesion. The article concludes with a discussion of the influence that the French-backed intervention may have on the evolution of the conflict, and how network analysis could contribute to a better understanding of terrorist activities in the region.
Journal: Terrorism and Political Violence
Pages: 497-519
Issue: 3
Volume: 27
Year: 2015
Month: 5
X-DOI: 10.1080/09546553.2013.809340
File-URL: http://hdl.handle.net/10.1080/09546553.2013.809340
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:3:p:497-519



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_812035_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel Baracskay
Author-X-Name-First: Daniel
Author-X-Name-Last: Baracskay
Title: The Evolutionary Path of Hamas: Examining the Role of Political Pragmatism in State Building and Activism
Abstract: 
 Of the two major Palestinian factions, Hamas has demonstrated that it is more radical and willing to use acts of terrorism than Fatah. While some arguments have made the case that Hamas has become more moderate in light of efforts to develop stable institutions of government and societal organizations, there has not been conclusive evidence of this ideological shift. In fact, the continued adherence to the Muqawama (resistance) Doctrine represents a decisive facet of the movement's enduring pledge to nullify the state of Israel through a prolonged war of attrition. This article examines the role of political pragmatism in the evolution of Hamas. First, it discusses why the moderation argument alone does not provide an adequate understanding of the movement's evolution, especially since it continues to embrace the use of terrorism and violence as facets of Islamism and as an extension of the Muqawama Doctrine. Second, rather than solely using the moderation argument, this article offers an alternative approach which considers how the combination of strategic policy approaches implemented by Hamas has reflected the role of pragmatism in pursuing its domestic and foreign policy agendas, which are intertwined with the values of the Muqawama Doctrine.
Journal: Terrorism and Political Violence
Pages: 520-536
Issue: 3
Volume: 27
Year: 2015
Month: 5
X-DOI: 10.1080/09546553.2013.812035
File-URL: http://hdl.handle.net/10.1080/09546553.2013.812035
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:3:p:520-536



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_820184_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Muhammad Sohail Anwar Malik
Author-X-Name-First: Muhammad Sohail Anwar
Author-X-Name-Last: Malik
Author-Name: Michael Sandholzer
Author-X-Name-First: Michael
Author-X-Name-Last: Sandholzer
Author-Name: M. Zubair Khan
Author-X-Name-First: M. Zubair
Author-X-Name-Last: Khan
Author-Name: Sajjad Akbar
Author-X-Name-First: Sajjad
Author-X-Name-Last: Akbar
Title: Identification of Risk Factors Generating Terrorism in Pakistan
Abstract: 
 Terrorism is a complex issue and various researchers have identified numerous causes and conditions that generate or are capable of generating terrorism. In the last decade, terrorist attacks claimed 36,495 lives and injured 27,985 people in Pakistan as a result of 3,482 bomb blasts and 281 suicide attacks. The aim of this research was to establish the major risk factors generating terrorism, based on the opinions of security officials who dealt directly with the Pakistan security situation. Sixty-five causes identified from the literature and interviews with security officials were modeled and transformed into a questionnaire. A nationwide response from security officials who were directly involved in dealing with apprehended terrorists was obtained. The population was selected proportionately from high, medium, and low security zones of Pakistan. Out of 500 questionnaires sent, 103 valid responses were received. The results helped establish the 13 major risk factors associated with generating terrorism. It was observed that addressing these 13 major risk factors would mostly resolve the other minor risk factors as well. Findings of this research might be beneficial for countries affected by terrorism, and countries with prioritized and rationalized allocation of funds in their budgets for substantially overcoming terrorism.
Journal: Terrorism and Political Violence
Pages: 537-556
Issue: 3
Volume: 27
Year: 2015
Month: 5
X-DOI: 10.1080/09546553.2013.820184
File-URL: http://hdl.handle.net/10.1080/09546553.2013.820184
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:3:p:537-556



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_829459_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Håvard Mokleiv Nygård
Author-X-Name-First: HÃ¥vard Mokleiv
Author-X-Name-Last: Nygård
Author-Name: Michael Weintraub
Author-X-Name-First: Michael
Author-X-Name-Last: Weintraub
Title: Bargaining Between Rebel Groups and the Outside Option of Violence
Abstract: 
 Although military cooperation among rebel groups in multi-party civil wars could help rebels defeat or extract concessions from an incumbent government, violent conflict among rebel groups is empirically prevalent. Why do rebel groups in multi-party civil wars choose to fight one another? This article models the strategic dilemma facing rebel groups in multi-party civil wars as an alternating-offer bargaining game of incomplete information with an outside option. The game-theoretic model explores the relationship between the status quo distribution of power among rebel groups, the costs of fighting, and the likelihood that one rebel group will opt to unilaterally end bargaining over a set of goods, such as access to supply routes, natural resources, and control over civilian populations. We show that the likelihood of violent conflict between rebel groups is lowest when the status quo distribution of benefits reflects the existing distribution of power.
Journal: Terrorism and Political Violence
Pages: 557-580
Issue: 3
Volume: 27
Year: 2015
Month: 5
X-DOI: 10.1080/09546553.2013.829459
File-URL: http://hdl.handle.net/10.1080/09546553.2013.829459
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:3:p:557-580



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1055968_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: The Terrorism, Ideology, and Transformations of Al-Qaeda
Journal: Terrorism and Political Violence
Pages: 581-590
Issue: 3
Volume: 27
Year: 2015
Month: 5
X-DOI: 10.1080/09546553.2015.1055968
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1055968
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:3:p:581-590



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1055971_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lucia Bird
Author-X-Name-First: Lucia
Author-X-Name-Last: Bird
Title: Walter Enders and Todd Sandler. The Political Economy of Terrorism, Second Edition
Journal: Terrorism and Political Violence
Pages: 591-592
Issue: 3
Volume: 27
Year: 2015
Month: 5
X-DOI: 10.1080/09546553.2015.1055971
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1055971
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:3:p:591-592



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1055973_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Freeman
Author-X-Name-First: Michael
Author-X-Name-Last: Freeman
Title: Daniel Byman. A High Price: The Triumphs and Failures of Israeli Counterterrorism
Journal: Terrorism and Political Violence
Pages: 593-594
Issue: 3
Volume: 27
Year: 2015
Month: 5
X-DOI: 10.1080/09546553.2015.1055973
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1055973
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:3:p:593-594



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1055974_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: David Canter (Ed.). The Faces of Terrorism: Multidisciplinary Perspectives
Journal: Terrorism and Political Violence
Pages: 594-596
Issue: 3
Volume: 27
Year: 2015
Month: 5
X-DOI: 10.1080/09546553.2015.1055974
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1055974
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:3:p:594-596



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1055977_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ramazan ErdaÄŸ
Author-X-Name-First: Ramazan
Author-X-Name-Last: ErdaÄŸ
Title: Claudia Aradau, Jef Huysmans, Andrew Neal, and Nadine Voelkner (Eds.). Critical Security Methods: New Frameworks for Analysis
Journal: Terrorism and Political Violence
Pages: 597-598
Issue: 3
Volume: 27
Year: 2015
Month: 5
X-DOI: 10.1080/09546553.2015.1055977
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1055977
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:3:p:597-598



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1055980_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeffrey Kaplan
Author-X-Name-First: Jeffrey
Author-X-Name-Last: Kaplan
Title: Editor's Note
Journal: Terrorism and Political Violence
Pages: 598-598
Issue: 3
Volume: 27
Year: 2015
Month: 5
X-DOI: 10.1080/09546553.2015.1055980
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1055980
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:3:p:598-598



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1055978_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ann Marie Wainscott
Author-X-Name-First: Ann Marie
Author-X-Name-Last: Wainscott
Title: Lisa Stampnitzky. Disciplining Terror: How Experts Invented “Terrorism”
Journal: Terrorism and Political Violence
Pages: 598-600
Issue: 3
Volume: 27
Year: 2015
Month: 5
X-DOI: 10.1080/09546553.2015.1055978
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1055978
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:3:p:598-600



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1055981_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: D. J. Mulloy
Author-X-Name-First: D. J.
Author-X-Name-Last: Mulloy
Title: Lisa Stampnitzky. Disciplining Terror: How Experts Invented “Terrorism”
Journal: Terrorism and Political Violence
Pages: 600-601
Issue: 3
Volume: 27
Year: 2015
Month: 5
X-DOI: 10.1080/09546553.2015.1055981
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1055981
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:3:p:600-601



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1055983_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daveed Gartenstein-Ross
Author-X-Name-First: Daveed
Author-X-Name-Last: Gartenstein-Ross
Title: Jacob N. Shapiro. The Terrorist's Dilemma: Managing Violent Covert Organizations
Journal: Terrorism and Political Violence
Pages: 601-603
Issue: 3
Volume: 27
Year: 2015
Month: 5
X-DOI: 10.1080/09546553.2015.1055983
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1055983
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:3:p:601-603



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1055985_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: M. Karen Walker
Author-X-Name-First: M. Karen
Author-X-Name-Last: Walker
Title: Ondrej Ditrych. Tracing the Discourses of Terrorism: Identity, Genealogy and State
Journal: Terrorism and Political Violence
Pages: 603-605
Issue: 3
Volume: 27
Year: 2015
Month: 5
X-DOI: 10.1080/09546553.2015.1055985
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1055985
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:3:p:603-605



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1055987_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joanna Rak
Author-X-Name-First: Joanna
Author-X-Name-Last: Rak
Title: Sara McDowell and Máire Braniff. Commemoration as Conflict: Space, Memory and Identity in Peace Processes
Journal: Terrorism and Political Violence
Pages: 605-606
Issue: 3
Volume: 27
Year: 2015
Month: 5
X-DOI: 10.1080/09546553.2015.1055987
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1055987
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:3:p:605-606

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_838157_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Barak Mendelsohn
Author-X-Name-First: Barak
Author-X-Name-Last: Mendelsohn
Title: Threat Analysis and the UN's 1267 Sanctions Committee
Abstract: 
 Because of its dynamic nature, those confronting the al-Qaeda threat must follow its evolution very closely. As demonstrated here, this task is particularly challenging when counterterrorism is carried out under the aegis of international organizations. This article explores the threat identification function of the al-Qaeda Sanctions Committee (also known as the 1267 Committee) charged with supervising the UN sanctions regime against al-Qaeda and its associates. Examination of the role of threat identification in the committee's work, and of the content of the threat analysis presented in the periodic reports of its subsidiary monitoring team, suggests the marginality of strategic threat assessment and underscores the constraints created by bureaucratic and political factors. The article also demonstrates the failure of the Committee and the monitoring team to thoroughly engage in central questions regarding al-Qaeda's nature, objectives, and organizational strategy.
Journal: Terrorism and Political Violence
Pages: 609-627
Issue: 4
Volume: 27
Year: 2015
Month: 8
X-DOI: 10.1080/09546553.2013.838157
File-URL: http://hdl.handle.net/10.1080/09546553.2013.838157
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:4:p:609-627



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_847826_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Eric Jardine
Author-X-Name-First: Eric
Author-X-Name-Last: Jardine
Author-Name: Simon Palamar
Author-X-Name-First: Simon
Author-X-Name-Last: Palamar
Title: Numerous, Capable, and Well-Funded Rebels: Insurgent Military Effectiveness and Deadly Attacks in Afghanistan
Abstract: 
 Why do some of Afghanistan's provinces experience more deadly attacks on counterinsurgents than others? We argue that provinces with more militarily effective insurgents will be deadlier for the forces of the counterinsurgency. We posit that insurgent military effectiveness is an interactive function of the rebel group's size, the quality of its recruits, and the group's operational budget. More militarily effective insurgents should, in turn, produce more deadly violence against Coalition forces. We model this relationship at the provincial level in Afghanistan using negative binomial regressions. Ultimately, we find that in provinces where the insurgency is more militarily effective, deadly attacks against counterinsurgent forces occur more often. Based on this finding, we conclude with directions for future research and policy recommendations for both the current operations in Afghanistan and for future counterinsurgency campaigns.
Journal: Terrorism and Political Violence
Pages: 628-656
Issue: 4
Volume: 27
Year: 2015
Month: 8
X-DOI: 10.1080/09546553.2013.847826
File-URL: http://hdl.handle.net/10.1080/09546553.2013.847826
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:4:p:628-656



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_847827_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lee Jarvis
Author-X-Name-First: Lee
Author-X-Name-Last: Jarvis
Author-Name: Stuart Macdonald
Author-X-Name-First: Stuart
Author-X-Name-Last: Macdonald
Title: What Is Cyberterrorism? Findings From a Survey of Researchers
Abstract: 
 This article reports on a recent survey designed to capture understandings of cyberterrorism across the global research community. Specifically, it explores competing views, and the importance thereof, amongst 118 respondents on three definitional issues: (a) the need for a specific definition of cyberterrorism for either policymakers or researchers; (b) the core characteristics or constituent parts of this concept; and (c) the value of applying the term “cyberterrorism” to a range of actual or potential scenarios. The article concludes by arguing that while a majority of researchers believe a specific definition of cyberterrorism is necessary for academics and policymakers, disagreement around what this might look like has additional potential to stimulate a rethinking of terrorism more widely.
Journal: Terrorism and Political Violence
Pages: 657-678
Issue: 4
Volume: 27
Year: 2015
Month: 8
X-DOI: 10.1080/09546553.2013.847827
File-URL: http://hdl.handle.net/10.1080/09546553.2013.847827
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:4:p:657-678



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_848797_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Aurélie Campana
Author-X-Name-First: Aurélie
Author-X-Name-Last: Campana
Author-Name: Benjamin Ducol
Author-X-Name-First: Benjamin
Author-X-Name-Last: Ducol
Title: Voices of the “Caucasus Emirate”: Mapping and Analyzing North Caucasus Insurgency Websites
Abstract: 
 This article looks at Internet use by insurgent groups in the North Caucasus in the context of a regional diffusion of violence. Using a mixed methods research design that combines hyperlink network analysis and micro-discourse analysis, it examines the online characteristics of the Caucasus Emirate and the main frames conveyed by the websites affiliated with the Emirate. It demonstrates the existence of a network of cross-referencing websites that, collectively, articulate the Emirate's political agenda online and allow for the dissemination of frames across the Web. It also shows that while jihadism provides a cultural resource that fosters a global sense of community, the jihadization of discourse does not eradicate local references as the local dynamics of the conflict have a strong impact on online communicative strategies. Finally, although based on a specific case study, this article highlights the potential of a mixed methods research design as applied to an analysis of virtual insurgent networks.
Journal: Terrorism and Political Violence
Pages: 679-700
Issue: 4
Volume: 27
Year: 2015
Month: 8
X-DOI: 10.1080/09546553.2013.848797
File-URL: http://hdl.handle.net/10.1080/09546553.2013.848797
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:4:p:679-700



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_855635_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Christian Dorsch
Author-X-Name-First: Christian
Author-X-Name-Last: Dorsch
Title: A New Barometer for the Evolution of Multilateral Counterterrorism: Introduction to the Materials, Methods, and Results of the UN Security Council and Terrorism Dataset (UNSC-TDS)
Abstract: 
 There is a general tendency among analysts to treat the activity of the United Nations Security Council as a barometer for measuring the evolution of global security issues. However, despite the Council's central role in multilateral counterterrorism since 9/11, there exists no comprehensive and coherent empirical measurement of its activity on terrorism. This research gap has resulted in contradictory assessments concerning the beginning, the regularity, and the consistency of the Council's activity on terrorism. In an effort to introduce more academic rigor to terrorism studies, researchers need to systematically address this deficit. This article makes a fundamental contribution by introducing a new dataset, the UN Security Council and Terrorism Dataset. It outlines the problems of previously available data and specifies the materials and methods used for the creation of the dataset. It continues by presenting key results from this unprecedented data collection effort and illustrates general trends in the Council's activity on terrorism. Based on this extensive empirical research, it finds that the UN Security Council's activity on terrorism has evolved more regularly and consistently since 1946 than previously thought. This conclusion indicates new directions for future research.
Journal: Terrorism and Political Violence
Pages: 701-721
Issue: 4
Volume: 27
Year: 2015
Month: 8
X-DOI: 10.1080/09546553.2013.855635
File-URL: http://hdl.handle.net/10.1080/09546553.2013.855635
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:4:p:701-721



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_855636_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Victor Asal
Author-X-Name-First: Victor
Author-X-Name-Last: Asal
Author-Name: Justin V. Hastings
Author-X-Name-First: Justin V.
Author-X-Name-Last: Hastings
Title: When Terrorism Goes to Sea: Terrorist Organizations and the Move to Maritime Targets
Abstract: 
 Terrorist groups are often relatively conservative in their choice of strategy, tactics, and targets, and it is worth asking what characteristics are associated with unconventional behavior. In this article we explore the question of why terrorist organizations move to one type of unconventional attack that has been a focus of concern of policymakers in recent years, namely attacks on maritime targets. Through an investigation of the organizational capacity and ideology of terrorist groups that committed maritime attacks between 1998 and 2005, we argue that this kind of violent behavior is driven by capability. Certain organizational characteristics of terrorist groups—territorial control, involvement in the drug trade, organizational size, and connections with other groups—provide groups with the capabilities that make maritime attacks both realistic and desirable. Terrorist groups' ideology—what they believe, and what their goals are—does not have the same impact, with the possible exception of groups affiliated with al-Qaeda. Our findings have implications for future research.
Journal: Terrorism and Political Violence
Pages: 722-740
Issue: 4
Volume: 27
Year: 2015
Month: 8
X-DOI: 10.1080/09546553.2013.855636
File-URL: http://hdl.handle.net/10.1080/09546553.2013.855636
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:4:p:722-740



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_856780_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John D. Brewer
Author-X-Name-First: John D.
Author-X-Name-Last: Brewer
Author-Name: Bernadette C. Hayes
Author-X-Name-First: Bernadette C.
Author-X-Name-Last: Hayes
Title: Victimisation and Attitudes Towards Former Political Prisoners in Northern Ireland
Abstract: 
 The release of ex-combatants and the mechanisms for their re-integration within society has become an increasingly controversial issue in peace settlements. Yet to date, the view of victims concerning such arrangements in post-conflict societies remains unexplored. Mindful of this omission and using Northern Ireland as a case study, this article investigates the relationship between victimisation and attitudes towards the treatment of former political prisoners. Based on the 2011 Northern Ireland Social and Political Attitudes Survey, the results suggest that individual victims—those who directly and/or indirectly experienced violent incidents—are notably less supportive of a punitive approach towards the treatment of former political prisoners than non-victims. Moreover, this is particularly the case when victims from within the Catholic community are considered. The Northern Ireland evidence suggests that victims can act as a positive and inclusive force in terms of the rehabilitation and re-integration of former combatants in societies emerging from conflict.
Journal: Terrorism and Political Violence
Pages: 741-761
Issue: 4
Volume: 27
Year: 2015
Month: 8
X-DOI: 10.1080/09546553.2013.856780
File-URL: http://hdl.handle.net/10.1080/09546553.2013.856780
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:4:p:741-761



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_856781_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alexander De Juan
Author-X-Name-First: Alexander
Author-X-Name-Last: De Juan
Title: The Role of Intra-Religious Conflicts in Intrastate Wars
Abstract: 
 Many civil wars are fought between members of different religious communities. It seems plausible to focus on these communities’ interrelations to identify the causal factors responsible for the escalating effects that religion can have in such conflicts. A closer look, however, reveals that processes within religious communities can be crucial in influencing the role religions play in intrastate wars. Within single communities, factions of religious elites compete for material and dogmatic supremacy. Such intra-religious conflicts can motivate religious elites to search for support from political allies to prevail over their religious rivals. In return, they legitimize their political patrons’ claims for political power and their violent campaigns against members of other religious communities. Thus, intra-religious conflicts can effectively contribute to the religious escalation of intrastate wars between different religious communities. This argument is exemplified with reference to conflicts in Thailand, The Philippines, and Iraq.
Journal: Terrorism and Political Violence
Pages: 762-780
Issue: 4
Volume: 27
Year: 2015
Month: 8
X-DOI: 10.1080/09546553.2013.856781
File-URL: http://hdl.handle.net/10.1080/09546553.2013.856781
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:4:p:762-780



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1068090_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anne Speckhard
Author-X-Name-First: Anne
Author-X-Name-Last: Speckhard
Title: Alex P. Schmid (Ed.). The Routledge Handbook of Terrorism Research
Journal: Terrorism and Political Violence
Pages: 781-782
Issue: 4
Volume: 27
Year: 2015
Month: 8
X-DOI: 10.1080/09546553.2015.1068090
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1068090
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:4:p:781-782



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1068091_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: William C. Potter and Cristina Hansell (Eds.). The Global Politics of Combating Nuclear Terrorism: A Supply-Side Approach
Journal: Terrorism and Political Violence
Pages: 782-784
Issue: 4
Volume: 27
Year: 2015
Month: 8
X-DOI: 10.1080/09546553.2015.1068091
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1068091
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:4:p:782-784



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1068092_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: D. J. Mulloy
Author-X-Name-First: D. J.
Author-X-Name-Last: Mulloy
Title: John Hickman. Selling Guantánamo: Exploding the Propaganda Surrounding America's Most Notorious Military Prison
Journal: Terrorism and Political Violence
Pages: 784-785
Issue: 4
Volume: 27
Year: 2015
Month: 8
X-DOI: 10.1080/09546553.2015.1068092
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1068092
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:4:p:784-785



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1068093_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: M. Karen Walker
Author-X-Name-First: M. Karen
Author-X-Name-Last: Walker
Title: William Nester. Hearts, Minds, and Hydras: Fighting Terrorism in Afghanistan, Pakistan, America, and Beyond—Dilemmas and Lessons
Journal: Terrorism and Political Violence
Pages: 785-786
Issue: 4
Volume: 27
Year: 2015
Month: 8
X-DOI: 10.1080/09546553.2015.1068093
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1068093
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:4:p:785-786



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1068094_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: José Pedro Zúquete
Author-X-Name-First: José Pedro
Author-X-Name-Last: Zúquete
Title: Martin A. Miller. The Foundations of Modern Terrorism: State, Society and the Dynamics of Political Violence
Journal: Terrorism and Political Violence
Pages: 786-788
Issue: 4
Volume: 27
Year: 2015
Month: 8
X-DOI: 10.1080/09546553.2015.1068094
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1068094
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:4:p:786-788



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1068095_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kai Chen
Author-X-Name-First: Kai
Author-X-Name-Last: Chen
Title: Cynthia C. Combs. Terrorism in the Twenty-First Century, 7th ed.
Journal: Terrorism and Political Violence
Pages: 788-789
Issue: 4
Volume: 27
Year: 2015
Month: 8
X-DOI: 10.1080/09546553.2015.1068095
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1068095
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:4:p:788-789



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1068097_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joanna Rak
Author-X-Name-First: Joanna
Author-X-Name-Last: Rak
Title: James Dingley. Terrorism and the Politics of Social Change: A Durkheimian Analysis
Journal: Terrorism and Political Violence
Pages: 789-790
Issue: 4
Volume: 27
Year: 2015
Month: 8
X-DOI: 10.1080/09546553.2015.1068097
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1068097
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:4:p:789-790



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1068098_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joanna Rak
Author-X-Name-First: Joanna
Author-X-Name-Last: Rak
Title: Daniel Bar-Tal. Intractable Conflicts: Socio-Psychological Foundations and Dynamics
Journal: Terrorism and Political Violence
Pages: 791-792
Issue: 4
Volume: 27
Year: 2015
Month: 8
X-DOI: 10.1080/09546553.2015.1068098
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1068098
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:4:p:791-792



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1068099_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Laura C. Ferreira-Pereira and Bruno Oliveira Martins (Eds.). The European Union's Fight Against Terrorism: The CFSP and Beyond
Journal: Terrorism and Political Violence
Pages: 792-793
Issue: 4
Volume: 27
Year: 2015
Month: 8
X-DOI: 10.1080/09546553.2015.1068099
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1068099
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:4:p:792-793



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1068100_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kai Chen
Author-X-Name-First: Kai
Author-X-Name-Last: Chen
Title: Michael Edgerton. A Practitioner's Guide to Effective Maritime and Port Security
Journal: Terrorism and Political Violence
Pages: 794-795
Issue: 4
Volume: 27
Year: 2015
Month: 8
X-DOI: 10.1080/09546553.2015.1068100
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1068100
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:4:p:794-795

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_859143_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lilach Gilady
Author-X-Name-First: Lilach
Author-X-Name-Last: Gilady
Author-Name: Joseph MacKay
Author-X-Name-First: Joseph
Author-X-Name-Last: MacKay
Title: Bringing the Insurgents Back In: Early Wars in British India
Abstract: 
 What role do weaker actors play in determining the outcomes of irregular wars? The literature on counterinsurgency outcomes has tended to explain weak-side victory either as a result of informational asymmetries caused by constraints on counterinsurgent forces, or as a result of suboptimal strategic choices by the state. We suggest that this underplays the role of insurgents themselves; we attempt to “bring the insurgents back in,” giving variation in insurgent polity a role in explaining their own victories and defeats. In order to do so, we focus inductively on a relatively novel pool of cases: Great Britain's wars in India from the mid-eighteenth to early nineteenth centuries. Doing so allows us to hold the counterinsurgent side constant while evaluating variance among the insurgents themselves. We find that variance on the insurgent side is indeed significant in determining outcomes, and suggest possible reasons why this occurs.
Journal: Terrorism and Political Violence
Pages: 797-817
Issue: 5
Volume: 27
Year: 2015
Month: 10
X-DOI: 10.1080/09546553.2013.859143
File-URL: http://hdl.handle.net/10.1080/09546553.2013.859143
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:5:p:797-817



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_863184_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Arthur A. Goldsmith
Author-X-Name-First: Arthur A.
Author-X-Name-Last: Goldsmith
Title: Electoral Violence in Africa Revisited
Abstract: 
 This article addresses the still unsettled question of the incidence of violent election periods in Africa. It uses two new datasets, which report episodes of social conflict in the region for 1990–2011, and elections worldwide from 1960 to 2010. When combined, these data suggest that onsets of electoral violence peak around major election days in Africa as a whole, but with wide national variability in the volume of new episodes. Depending on the time span and type of social conflict, from one-quarter to three-quarters of the elections for national leadership have been without incident. The article also investigates the timing of electoral violence and the extent to which there is an experience curve effect, whereby subsequent elections have fewer onsets of social conflict. The data indicate that two-thirds to three-quarters of elections are free of onsets of social conflict, but that the proportion does not change much with experience. Overall, there appear to be reasonable grounds for optimism about peaceful elections in many African countries.
Journal: Terrorism and Political Violence
Pages: 818-837
Issue: 5
Volume: 27
Year: 2015
Month: 10
X-DOI: 10.1080/09546553.2013.863184
File-URL: http://hdl.handle.net/10.1080/09546553.2013.863184
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:5:p:818-837



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_865613_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gearóid Ó Faoleán
Author-X-Name-First: Gearóid Ó
Author-X-Name-Last: Faoleán
Title: The Ulster Defence Regiment and the Question of Catholic Recruitment, 1970–1972
Abstract: 
 This article aims to consider the factors which led to a serious under-representation of Catholics within the Ulster Defence Regiment (UDR) during the Northern Ireland “Troubles.” A considerable number of UDR members were implicated in collusion with loyalist paramilitaries in their targeting of Catholic civilians throughout the conflict. Further, neither the British political nor military establishment made any significant moves towards addressing Catholic grievances regarding the UDR during the crucially formative years of 1970–1972. Despite this, Catholic under-representation has often been discussed with sole or particular reference to Republican paramilitary targeting of Catholic members of the force; this is in order to dissuade any further such involvement on the part of this demographic. The validity of such assertions will be examined in this article, along with a number of other factors which have been hitherto largely underplayed or outright ignored as contributing to this under-representation.
Journal: Terrorism and Political Violence
Pages: 838-856
Issue: 5
Volume: 27
Year: 2015
Month: 10
X-DOI: 10.1080/09546553.2013.865613
File-URL: http://hdl.handle.net/10.1080/09546553.2013.865613
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:5:p:838-856



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_867849_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: B. Heidi Ellis
Author-X-Name-First: B. Heidi
Author-X-Name-Last: Ellis
Author-Name: Saida M. Abdi
Author-X-Name-First: Saida M.
Author-X-Name-Last: Abdi
Author-Name: John Horgan
Author-X-Name-First: John
Author-X-Name-Last: Horgan
Author-Name: Alisa B. Miller
Author-X-Name-First: Alisa B.
Author-X-Name-Last: Miller
Author-Name: Glenn N. Saxe
Author-X-Name-First: Glenn N.
Author-X-Name-Last: Saxe
Author-Name: Emily Blood
Author-X-Name-First: Emily
Author-X-Name-Last: Blood
Title: Trauma and Openness to Legal and Illegal Activism Among Somali Refugees
Abstract: 
 This article examines key setting events and personal factors that are associated with support for either non-violent activism or violent activism among Somali refugee young adults in the United States. Specifically, this article examines the associations of trauma, stress, symptoms of posttraumatic stress disorder (PTSD), posttraumatic growth (PTG), strength of social bonds, and attitudes towards legal and non-violent vs. illegal and violent activism. Structured interviews were conducted with a sample of Somali refugee males ages 18–25 living in the northeastern United States (N = 79). Data were analyzed using multiple linear regressions and path analysis. Greater exposure to personal trauma was associated with greater openness to illegal and violent activism. PTSD symptoms mediated this association. Strong social bonds to both community and society moderated this association, with trauma being more strongly associated with openness to illegal and violent activism among those who reported weaker social bonds. Greater exposure to trauma, PTG, and stronger social bonds were all associated with greater openness to legal non-violent activism.
Journal: Terrorism and Political Violence
Pages: 857-883
Issue: 5
Volume: 27
Year: 2015
Month: 10
X-DOI: 10.1080/09546553.2013.867849
File-URL: http://hdl.handle.net/10.1080/09546553.2013.867849
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:5:p:857-883



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_870556_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joel Busher
Author-X-Name-First: Joel
Author-X-Name-Last: Busher
Author-Name: Graham Macklin
Author-X-Name-First: Graham
Author-X-Name-Last: Macklin
Title: Interpreting “Cumulative Extremism”: Six Proposals for Enhancing Conceptual Clarity
Abstract: 
 The concept of “cumulative extremism”—described in 2006 by Roger Eatwell as “the way in which one form of extremism can feed off and magnify other forms [of extremism],” has recently gained considerable traction in academic, policy, and practitioner discourses about extremism. Yet in spite of the growing usage of the term, particularly in analyses of the dynamic between extreme Islamist and extreme Right-Wing or anti-Muslim protest groups, there has to date been scant interrogation of the concept itself or of its application. In this article, we make a series of six proposals as to how we might enhance the conceptual clarity of these conversations about “cumulative extremism.” Our aim in doing so is to increase the likelihood that the concept might become a useful addition to the debates on extremism rather than becoming, to borrow a term from John Horgan—something of an “explanatory fiction”—an idea that appears to enable us to explain a great deal, but whose explanatory value is largely lost because there is insufficient scrutiny of the claims that it is used to make and whose liberal application becomes increasingly conducive to poor science.
Journal: Terrorism and Political Violence
Pages: 884-905
Issue: 5
Volume: 27
Year: 2015
Month: 10
X-DOI: 10.1080/09546553.2013.870556
File-URL: http://hdl.handle.net/10.1080/09546553.2013.870556
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:5:p:884-905



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_873719_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bart Schuurman
Author-X-Name-First: Bart
Author-X-Name-Last: Schuurman
Author-Name: Quirine Eijkman
Author-X-Name-First: Quirine
Author-X-Name-Last: Eijkman
Author-Name: Edwin Bakker
Author-X-Name-First: Edwin
Author-X-Name-Last: Bakker
Title: The Hofstadgroup Revisited: Questioning its Status as a “Quintessential” Homegrown Jihadist Network
Abstract: 
 Despite the Dutch Hofstadgroup's status in the literature as a prime example of a homegrown Salafi-Jihadist terrorist network, the authors, using newly available primary sources, argue that this classification is to a large extent unwarranted. The lack of a rudimentary organizational structure, the existence of divergent views on the legitimacy and desirability of political violence, and the absence of collective action in pursuit of a violent goal rule out labeling the Hofstadgroup as a terrorist organization or network for the largest part of its 2002–2005 existence. A smaller subgroup of extremists did begin developing into a proto-terrorist inner circle from late 2003 onwards. In 2004, this extremist core brought forth the murderer of filmmaker Theo van Gogh. But it was only in 2005, when the remnants of the inner circle tried to resuscitate the Hofstadgroup in the wake of the arrests that had followed Van Gogh's death, that these individual actions were replaced by the communal efforts necessary to warrant the “jihadist network” label often ascribed to the Hofstadgroup. Arguably the most archetypical aspect of the Hofstadgroup case is its ability to illustrate the deleterious effects of the ongoing scarcity of primary sources-based research on terrorism.
Journal: Terrorism and Political Violence
Pages: 906-925
Issue: 5
Volume: 27
Year: 2015
Month: 10
X-DOI: 10.1080/09546553.2013.873719
File-URL: http://hdl.handle.net/10.1080/09546553.2013.873719
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:5:p:906-925



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1094306_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeffrey Kaplan
Author-X-Name-First: Jeffrey
Author-X-Name-Last: Kaplan
Author-Name: Christopher P. Costa
Author-X-Name-First: Christopher P.
Author-X-Name-Last: Costa
Title: The Islamic State and the New Tribalism
Abstract: 
 This article focuses on the apocalyptic zeitgeist of the Islamic State through the lens of what we call the New Tribalism. It finds that IS emerged from the Al Qaeda (AQ) milieu, but soon split with AQ as the messianic excitement surrounding Al-Baghdadi and his teachings grew. In common with previous millennial/messianic movements in all three “Peoples of the Book”—Judaism, Christianity, and Islam—IS soon evolved beyond the laws of the normative faith (antinomianism). We hold that for this reason, despite its claims of faith and fealty, IS has left the Islamic Umah behind, becoming a malign sectarian group of its own whose dynamism and successes are attracting a global audience and support from Muslims in almost every country. This helps to explain such abhorrent practices as forced conversion, sexual servitude, the destruction of historic artifacts, and mass executions. We find that the American invasion of Iraq was the vital first step in a series of events, which gave birth to IS. A thorough review of IS history and political culture traces these historic moments in time.
Journal: Terrorism and Political Violence
Pages: 926-969
Issue: 5
Volume: 27
Year: 2015
Month: 10
X-DOI: 10.1080/09546553.2015.1094306
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1094306
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:5:p:926-969



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1090262_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Unconventional Views of Terrorism: Culture, Objectives, and the Future
Journal: Terrorism and Political Violence
Pages: 970-975
Issue: 5
Volume: 27
Year: 2015
Month: 10
X-DOI: 10.1080/09546553.2015.1090262
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1090262
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:5:p:970-975



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1090263_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Raphael Cohen-Almagor
Author-X-Name-First: Raphael
Author-X-Name-Last: Cohen-Almagor
Title: Brian Michael Jenkins and John Paul Godges (Eds.). The Long Shadow of 9/11: America's Response to Terrorism
Journal: Terrorism and Political Violence
Pages: 976-979
Issue: 5
Volume: 27
Year: 2015
Month: 10
X-DOI: 10.1080/09546553.2015.1090263
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1090263
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:5:p:976-979



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1090264_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joanna Rak
Author-X-Name-First: Joanna
Author-X-Name-Last: Rak
Title: Samuel Justin Sinclair and Daniel Antonius (Eds.). The Political Psychology of Terrorism Fears
Journal: Terrorism and Political Violence
Pages: 978-979
Issue: 5
Volume: 27
Year: 2015
Month: 10
X-DOI: 10.1080/09546553.2015.1090264
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1090264
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:5:p:978-979



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1121738_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: Editorial Board EOV
Journal: Terrorism and Political Violence
Pages: ebi-ebi
Issue: 5
Volume: 27
Year: 2015
Month: 10
X-DOI: 10.1080/09546553.2015.1121738
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1121738
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:27:y:2015:i:5:p:ebi-ebi

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_876414_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lieven Pauwels
Author-X-Name-First: Lieven
Author-X-Name-Last: Pauwels
Author-Name: Nele Schils
Author-X-Name-First: Nele
Author-X-Name-Last: Schils
Title: Differential Online Exposure to Extremist Content and Political Violence: Testing the Relative Strength of Social Learning and Competing Perspectives
Abstract: 
 The present study applies Social Learning (Differential Association) Theory to the explanation of political violence, focusing on exposure to extremist content through new social media (NSM) and controlling for key variables derived from rival theories. Data are gathered using (a) a paper-and-pencil study among high school students, and (b) a web survey targeting youths between 16 and 24 years old. A total of 6020 respondents form the dataset. Binary logistic regression is used to analyze the data. Results show that even when controlling for background variables, strain variables, personality characteristics, moral values, and peer influences, the statistical association between measures of extremism through NSM (ENSM) and self-reported political violence remains significant and fairly constant. The most persistent effects are found for those measures where individuals actively seek out extremist content on the Internet, as opposed to passive and accidental encounters using NSM. Furthermore, offline differential associations with racist and delinquent peers are also strongly and directly related to self-reported political violence, as are some mechanisms from rival perspectives. This indicates that political violence can only partially be explained by social learning and suggests that the impact of ENSM is mediated by real-world associations and that the offline world has to be taken into account.
Journal: Terrorism and Political Violence
Pages: 1-29
Issue: 1
Volume: 28
Year: 2016
Month: 1
X-DOI: 10.1080/09546553.2013.876414
File-URL: http://hdl.handle.net/10.1080/09546553.2013.876414
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:1:p:1-29



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_878704_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Blake E. Garcia
Author-X-Name-First: Blake E.
Author-X-Name-Last: Garcia
Author-Name: Nehemia Geva
Author-X-Name-First: Nehemia
Author-X-Name-Last: Geva
Title: Security Versus Liberty in the Context of Counterterrorism: An Experimental Approach
Abstract: 
 A critical question in counterterrorism studies concerns the extent to which governments adequately balance the continual provision of individual rights and freedoms with the appropriate level of national security when faced with a terrorist attack. We experimentally assess this tradeoff utilizing a 2 × 2 × 2 between-groups factorial design, manipulating (a) the extent of terror-related threats, (b) the level of invasiveness of subsequent counterterrorism policies, as well as (c) the terror context: transnational and domestic. The results provide evidence that the public is more willing to accept greater reductions in civil liberties under a greater threat of terrorism only when the perceived effectiveness of those policies to prevent future acts of terrorism is high. Furthermore, we find these results to be specific to the context of a transnational terror threat. This suggests that the public will be unwilling to accept reductions in civil liberties when the source of the attack is domestic, regardless of the level of threat or how effective subsequent policies may be in preventing future attacks.
Journal: Terrorism and Political Violence
Pages: 30-48
Issue: 1
Volume: 28
Year: 2016
Month: 1
X-DOI: 10.1080/09546553.2013.878704
File-URL: http://hdl.handle.net/10.1080/09546553.2013.878704
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:1:p:30-48



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_879056_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Stephen Tankel
Author-X-Name-First: Stephen
Author-X-Name-Last: Tankel
Title: Beyond FATA: Exploring the Punjabi Militant Threat to Pakistan
Abstract: 
 Pakistan has a long history of patronizing militant proxies, and in recent years it has become a victim as well as a supporter of terrorism. The evolution of the jihadist insurgency in Pakistan's Federally-Administered Tribal Areas (FATA) and neighboring Khyber Pakhtunkhwa, the Pashtun militants leading it, efforts to counter the insurgency, and the overall strategic threats to the state have merited significant study. With some notable exceptions, less attention has been paid to the role Punjabi militant organizations and their splinters have played in bringing the insurgency to Pakistan's heartland. The involvement of these actors in the revolutionary jihad against the state gives the FATA-based actors leading this insurgency power projection capabilities throughout the country. This article helps to fill that knowledge gap by bringing a more detailed level of analysis to the understanding of how anti-state Punjabi militant networks function at the macro-, meso-, and micro-levels. In doing so, it illustrates that the introduction of new loci of jihad at the macro-level, simultaneous integration and atomization among militant groups at the meso-level, and greater portability of fighters at the micro-level impedes covert control by Pakistani intelligence services and decreases the utility of even sincere counterterrorism efforts by the Pakistani state.
Journal: Terrorism and Political Violence
Pages: 49-71
Issue: 1
Volume: 28
Year: 2016
Month: 1
X-DOI: 10.1080/09546553.2013.879056
File-URL: http://hdl.handle.net/10.1080/09546553.2013.879056
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:1:p:49-71



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_879057_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Max Abrahms
Author-X-Name-First: Max
Author-X-Name-Last: Abrahms
Author-Name: Matthew S. Gottfried
Author-X-Name-First: Matthew S.
Author-X-Name-Last: Gottfried
Title: Does Terrorism Pay? An Empirical Analysis
Abstract: 
 Does terrorism help perpetrators to achieve their demands? Few research questions about terrorism generate as much controversy. This study contributes to the debate in two main ways. First, we identify major limitations within the burgeoning literature on the effectiveness of terrorism. Specifically, we highlight the main methodological problems vexing empirical assessments of whether terrorism promotes government concessions. Second, we present a research design that circumvents those recurrent methodological shortcomings. In short, we find no empirical evidence to suggest that terrorism pays. In fact, multiple variants of the tactic in hostage standoffs impede the perpetrators from coercing government compliance. The negative effect of terrorism on the odds of compliance is significant and substantial across logistic and multilevel logistic model specifications, particularly when civilians are killed or wounded in the coercive incident. These findings have important implications for both scholars and practitioners of counterterrorism.
Journal: Terrorism and Political Violence
Pages: 72-89
Issue: 1
Volume: 28
Year: 2016
Month: 1
X-DOI: 10.1080/09546553.2013.879057
File-URL: http://hdl.handle.net/10.1080/09546553.2013.879057
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:1:p:72-89



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_880835_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Francesco N. Moro
Author-X-Name-First: Francesco N.
Author-X-Name-Last: Moro
Author-Name: Andrea Petrella
Author-X-Name-First: Andrea
Author-X-Name-Last: Petrella
Author-Name: Salvatore Sberna
Author-X-Name-First: Salvatore
Author-X-Name-Last: Sberna
Title: The Politics of Mafia Violence: Explaining Variation in Mafia Killings in Southern Italy (1983–2008)
Abstract: 
 Violence perpetrated by organized crime nowadays represents a major threat to state stability, both because it directly challenges political institutions, targeting officials and using terrorist techniques, and because severe inter-group conflict strongly affects human security. Though it is a distinctive feature of illegal markets and a constant strategy of Mafia-like groups, the occurrence of violence is localized in time and space. The article aims to explain temporal and spatial variation in Mafia killings focusing on its political determinants, as organized crime is deeply embedded in the political system. The analysis shows that there is a clear link between the structure of the political markets and the severity of violence. In particular, the fragmentation of the political market is negatively associated with the strategy of criminal groups to exploit violence. By contrast, single-party dominance and bipartisanship lead to an increase in homicides since these organizations have few opportunities to access the political arena. Outcomes are assessed through the analysis of monthly homicides reported by police forces in Italian provinces from 1983 to 2008.
Journal: Terrorism and Political Violence
Pages: 90-113
Issue: 1
Volume: 28
Year: 2016
Month: 1
X-DOI: 10.1080/09546553.2014.880835
File-URL: http://hdl.handle.net/10.1080/09546553.2014.880835
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:1:p:90-113



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_880836_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Konstantin Ash
Author-X-Name-First: Konstantin
Author-X-Name-Last: Ash
Title: Representative Democracy and Fighting Domestic Terrorism
Abstract: 
 Does more representative government improve states' ability to fight domestic terrorism? In prior work, democracies are seen as more susceptible to terrorism because their respect for human rights prevents them from fully eliminating terrorist groups. However, such extrajudicial aggression could also alienate large portions of the population and create the ideal conditions for an insurgency. I argue that since terrorism is the lowest-capacity form of political violence, it is natural that states that do best at deterring political violence experience the most terrorism. While representative democracies should see terrorist groups initiate spells of attacks at a greater frequency, full political representation should also galvanize major political actors to unite and eliminate terrorist threats. I test this assertion through statistical models that treat the process of terrorist group initiation and its duration and intensity separately. Results not only show that less consolidated democracies and autocracies experience longer and more intense terrorist campaigns, but that, in support of the theory's mechanisms, groups are more likely to shift to terrorism from insurgency when their political base gains more political representation. The results call the division among research programs of various political violence types into question.
Journal: Terrorism and Political Violence
Pages: 114-134
Issue: 1
Volume: 28
Year: 2016
Month: 1
X-DOI: 10.1080/09546553.2014.880836
File-URL: http://hdl.handle.net/10.1080/09546553.2014.880836
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:1:p:114-134



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_886575_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Woldemariam
Author-X-Name-First: Michael
Author-X-Name-Last: Woldemariam
Title: Battlefield Outcomes and Rebel Cohesion: Lessons From the Eritrean Independence War
Abstract: 
 This article uses data from the Eritrean war for independence to refine existing theories of rebel fragmentation. The author argues organizational performance affects the emergence of factional infighting within rebel organizations in unique and novel ways. While battlefield losses increase the likelihood of internal fragmentation, so do battlefield gains. The implication is battlefield stalemates possess unique properties that promote organizational cohesion in war, a relationship this study refers to as “cohesive stalemates.” The article extends an emerging literature on the internal politics of insurgent groups that has linked the coherence of rebel organizations to rebel losses.
Journal: Terrorism and Political Violence
Pages: 135-156
Issue: 1
Volume: 28
Year: 2016
Month: 1
X-DOI: 10.1080/09546553.2014.886575
File-URL: http://hdl.handle.net/10.1080/09546553.2014.886575
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:1:p:135-156



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_886576_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Elad Ben-Dror
Author-X-Name-First: Elad
Author-X-Name-Last: Ben-Dror
Title: The Poets of Marj al-Zuhur: Poetry as the Psychological, Political, and Ideological Weapon of the Hamas Members Deported to Lebanon in 1992
Abstract: 
 In December 1992, after the kidnapping and murder of a policeman, Israel deported 415 members of Hamas and Islamic Jihad to Lebanon. Most were affiliated with the Hamas political apparatus and had not been involved in terrorism. The deportees decided to stay together and set up a camp in Marj al-Zuhur in southern Lebanon. Here they engaged in study and various cultural pursuits—including poetry writing. Roughly a dozen of the deportees wrote poetry. The poems were read aloud at gatherings in the camp and published in the Arab press. Their main function was to raise the residents’ spirits and keep their plight in the public eye. They incorporate the expected political messages: anger at Israel and criticism of the international community, the Palestinian leadership, and the Arab states, which were prodded to work harder for the deportees’ return. The poetry was part of a successful media and information campaign, which annoyed Israel so much that it allowed all the deportees to return home by December 1993. Some of the poems were later published and helped cultivate the myth of the Marj al-Zuhur deportation, which Hamas viewed as a victory and symbol of steadfast resistance to Israel.
Journal: Terrorism and Political Violence
Pages: 157-179
Issue: 1
Volume: 28
Year: 2016
Month: 1
X-DOI: 10.1080/09546553.2014.886576
File-URL: http://hdl.handle.net/10.1080/09546553.2014.886576
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:1:p:157-179



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1112195_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alicja Stańco-Wawrzyńska
Author-X-Name-First: Alicja
Author-X-Name-Last: Stańco-Wawrzyńska
Title: Athina Karatzogianni (Ed.). Violence and War in Culture and the Media: Five Disciplinary Lenses
Journal: Terrorism and Political Violence
Pages: 180-182
Issue: 1
Volume: 28
Year: 2016
Month: 1
X-DOI: 10.1080/09546553.2015.1112195
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1112195
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:1:p:180-182



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1112198_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jonathan L. Snow
Author-X-Name-First: Jonathan L.
Author-X-Name-Last: Snow
Title: Bruce Hoffman and Fernando Reinares (Eds.). The Evolution of the Global Terrorist Threat: From 9/11 to Osama Bin Laden's Death
Journal: Terrorism and Political Violence
Pages: 182-183
Issue: 1
Volume: 28
Year: 2016
Month: 1
X-DOI: 10.1080/09546553.2015.1112198
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1112198
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:1:p:182-183



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1112199_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alisa Stack
Author-X-Name-First: Alisa
Author-X-Name-Last: Stack
Title: Max Taylor, P. M. Currie, and Donald Holbrook (Eds.). Extreme Right-Wing Political Violence and Terrorism
Journal: Terrorism and Political Violence
Pages: 184-185
Issue: 1
Volume: 28
Year: 2016
Month: 1
X-DOI: 10.1080/09546553.2015.1112199
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1112199
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:1:p:184-185



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1112200_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Jeffrey Kaplan. Terrorist Groups and the New Tribalism: Terrorism's Fifth Wave
Journal: Terrorism and Political Violence
Pages: 185-187
Issue: 1
Volume: 28
Year: 2016
Month: 1
X-DOI: 10.1080/09546553.2015.1112200
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1112200
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:1:p:185-187



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1112201_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joanna Rak
Author-X-Name-First: Joanna
Author-X-Name-Last: Rak
Title: Eitan Y. Alimi, Lorenzo Bosi, and Chares Demetriou. The Dynamics of Radicalization: A Relational and Comparative Perspective
Journal: Terrorism and Political Violence
Pages: 187-188
Issue: 1
Volume: 28
Year: 2016
Month: 1
X-DOI: 10.1080/09546553.2015.1112201
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1112201
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:1:p:187-188



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1112203_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Donald D. Denton
Author-X-Name-First: Donald D.
Author-X-Name-Last: Denton
Title: Amélie Blom, Laetitia Bucaille, and Luis Martinez (Eds.). The Enigma of Islamist Violence
Journal: Terrorism and Political Violence
Pages: 188-190
Issue: 1
Volume: 28
Year: 2016
Month: 1
X-DOI: 10.1080/09546553.2015.1112203
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1112203
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:1:p:188-190



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1112206_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Freeman
Author-X-Name-First: Michael
Author-X-Name-Last: Freeman
Title: Vahid Brown and Don Rassler. Fountainhead of Jihad: The Haqqani Nexus, 1973–2012
Journal: Terrorism and Political Violence
Pages: 190-191
Issue: 1
Volume: 28
Year: 2016
Month: 1
X-DOI: 10.1080/09546553.2015.1112206
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1112206
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:1:p:190-191



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1112208_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Abubakar Siddique. The Pashtuns: The Unresolved Key to the Future of Pakistan and Afghanistan
Journal: Terrorism and Political Violence
Pages: 191-193
Issue: 1
Volume: 28
Year: 2016
Month: 1
X-DOI: 10.1080/09546553.2015.1112208
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1112208
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:1:p:191-193



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1112209_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Scott N. Romaniuk
Author-X-Name-First: Scott N.
Author-X-Name-Last: Romaniuk
Title: Edward M. Spiers. A History of Chemical and Biological Weapons
Journal: Terrorism and Political Violence
Pages: 193-196
Issue: 1
Volume: 28
Year: 2016
Month: 1
X-DOI: 10.1080/09546553.2015.1112209
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1112209
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:1:p:193-196

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1112277_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tom Parker
Author-X-Name-First: Tom
Author-X-Name-Last: Parker
Author-Name: Nick Sitter
Author-X-Name-First: Nick
Author-X-Name-Last: Sitter
Title: The Four Horsemen of Terrorism: It's Not Waves, It's Strains
Abstract: 
 David Rapoport's concept of Four Waves of terrorism, from Anarchist terrorism in the 1880s, through Nationalist and Marxist waves in the early and mid-twentieth century, to the present Religious Wave, is one of the most influential concepts in terrorism studies. However, this article argues that thinking about different types of terrorism as strains rather than waves better reflects both the empirical reality and the idea that terrorists learn from and emulate each other. Whereas the notion of waves suggests distinct iterations of terrorist violence driven by successive broad historical trends, the concept of strains and contagion emphasizes how terrorist groups draw on both contemporary and historical lessons in the development of their tactics, strategies, and goals. The authors identify four distinct strains in total—Socialist, Nationalist, Religious, and Exclusionist—and contend that it is possible to trace each strain back to a “patient zero” active in the 1850s.
Journal: Terrorism and Political Violence
Pages: 197-216
Issue: 2
Volume: 28
Year: 2016
Month: 3
X-DOI: 10.1080/09546553.2015.1112277
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1112277
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:2:p:197-216



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1112278_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David C. Rapoport
Author-X-Name-First: David C.
Author-X-Name-Last: Rapoport
Title: It Is Waves, Not Strains
Journal: Terrorism and Political Violence
Pages: 217-224
Issue: 2
Volume: 28
Year: 2016
Month: 3
X-DOI: 10.1080/09546553.2015.1112278
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1112278
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:2:p:217-224



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1112280_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Charles Townshend
Author-X-Name-First: Charles
Author-X-Name-Last: Townshend
Title: Wave and Strain
Journal: Terrorism and Political Violence
Pages: 225-227
Issue: 2
Volume: 28
Year: 2016
Month: 3
X-DOI: 10.1080/09546553.2015.1112280
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1112280
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:2:p:225-227



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1112279_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeffrey Kaplan
Author-X-Name-First: Jeffrey
Author-X-Name-Last: Kaplan
Title: A Strained Criticism of Wave Theory
Journal: Terrorism and Political Violence
Pages: 228-235
Issue: 2
Volume: 28
Year: 2016
Month: 3
X-DOI: 10.1080/09546553.2015.1112279
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1112279
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:2:p:228-235



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_895330_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Susanne Martin
Author-X-Name-First: Susanne
Author-X-Name-Last: Martin
Author-Name: Leonard B. Weinberg
Author-X-Name-First: Leonard B.
Author-X-Name-Last: Weinberg
Title: Terrorism in an Era of Unconventional Warfare
Abstract: 
 Academic studies of terrorism and mass political violence have developed largely independently of one another. Insurgents, in contrast, have tended to incorporate terrorism tactics along with other types of unconventional warfare in their repertoire of action. This tendency has become more apparent among insurgents engaging in armed confrontations in the twenty-first century. In order to take account of this development, scholars and others interested in contemporary warfare need to incorporate terrorism studies within the broader subject of insurgencies and “small wars”—political violence, in other words.
Journal: Terrorism and Political Violence
Pages: 236-253
Issue: 2
Volume: 28
Year: 2016
Month: 3
X-DOI: 10.1080/09546553.2014.895330
File-URL: http://hdl.handle.net/10.1080/09546553.2014.895330
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:2:p:236-253



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_897622_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ami Ayalon
Author-X-Name-First: Ami
Author-X-Name-Last: Ayalon
Author-Name: Elad Popovich
Author-X-Name-First: Elad
Author-X-Name-Last: Popovich
Author-Name: Moran Yarchi
Author-X-Name-First: Moran
Author-X-Name-Last: Yarchi
Title: From Warfare to Imagefare: How States Should Manage Asymmetric Conflicts With Extensive Media Coverage
Abstract: 
 Conflicts in the 21st century differ from past conflicts based on two central factors: the level of asymmetry and disparity between the actors taking part in the conflict and the amount of foreign media coverage that a conflict receives. This article aims to develop a new theoretical perspective on the implications of these two factors on how the involved states manage a conflict. Most actors in current conflicts have vast levels of disparity and receive extensive media coverage; events in those conflicts are referred to as occurrences in the “information space” because a conflict's borders are anywhere people can receive information about it. “Imagefare”—the use of images as a guiding principle or a substitute for traditional military means to achieve political objectives—is argued to be the main tool for better facing adversaries in the information space.
Journal: Terrorism and Political Violence
Pages: 254-273
Issue: 2
Volume: 28
Year: 2016
Month: 3
X-DOI: 10.1080/09546553.2014.897622
File-URL: http://hdl.handle.net/10.1080/09546553.2014.897622
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:2:p:254-273



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_902813_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sambuddha Ghatak
Author-X-Name-First: Sambuddha
Author-X-Name-Last: Ghatak
Title: Willingness and Opportunity: A Study of Domestic Terrorism in Post-Cold War South Asia
Abstract: 
 Domestic terrorism, as a form of intrastate violence, has varied widely in South Asia along with the post-Cold War period of global economic integration and political openness. How are these two phenomena—economic integration and emergence of democracies—related to domestic terrorism in South Asia? I argue that resorting to terrorism is a rational choice when individuals'/groups' cost of heterogeneity—deprivation from public goods due to geographical and ideological distance—increases; opportunity is provided by democratization and integration into the global economy. The testable hypotheses derived from the theory are empirically tested on a dataset of five South Asian countries for the time period between 1990 and 2007. The results show that both minority discrimination and presence of unconsolidated democratic institutions increase terrorism in the highly heterogeneous South Asian countries. International trade in the presence of minority discrimination increases homegrown terrorism, but foreign direct investment neither increases nor decreases such incidents.
Journal: Terrorism and Political Violence
Pages: 274-296
Issue: 2
Volume: 28
Year: 2016
Month: 3
X-DOI: 10.1080/09546553.2014.902813
File-URL: http://hdl.handle.net/10.1080/09546553.2014.902813
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:2:p:274-296



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_908774_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tahir Abbas
Author-X-Name-First: Tahir
Author-X-Name-Last: Abbas
Author-Name: Ismail Hakki Yigit
Author-X-Name-First: Ismail Hakki
Author-X-Name-Last: Yigit
Title: Perspectives on Ethno-National Conflict Among Kurdish Families With Members in the PKK
Abstract: 
 This article reports the findings of an ethnographic study of families with members involved in the armed struggle for Kurdish nationalism led by the Kurdistan Workers' Party. Based on in-depth, semi-structured interviews and observations with a theoretical sample of six families in the area of Yüksekova, detailed discussions were held with twelve members of families with children, partners, or siblings involved in the conflict. Ethno-national exceptionalism plays a significant role in determining the motivations of political violence among groups, but with the additional background of the perceptions and realities of systematic racialization, de-territorialization, disenfranchisement, and cultural exclusion that affect certain Kurdish groups. The findings in this article offer critical sociological and anthropological accounts of the localized drivers of ethno-nationalism, and the motivations for and the experiences of conflict among families with members involved in the armed conflict and the “Kurdish question” in Turkey.
Journal: Terrorism and Political Violence
Pages: 297-315
Issue: 2
Volume: 28
Year: 2016
Month: 3
X-DOI: 10.1080/09546553.2014.908774
File-URL: http://hdl.handle.net/10.1080/09546553.2014.908774
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:2:p:297-315



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_908775_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Helge Holtermann
Author-X-Name-First: Helge
Author-X-Name-Last: Holtermann
Title: How Can Weak Insurgent Groups Grow? Insights From Nepal
Abstract: 
 How can insurgent groups that are militarily far weaker than the state survive and grow? Influential accounts drawing on Kalyvas' “control-collaboration” model argue that limited state reach can make this possible by allowing rebel groups to carve out pockets of control where they can elicit collaboration. I suggest that this account is inadequate. Even states with limited reach are likely to transfer sufficient forces to rebel-affected areas to establish at least partial control. Weak rebels therefore often face the challenge of building capacity without local control to begin with. I identify two broad factors that can make this feasible: first, strong pre-existing rebel networks, which facilitate collaboration through solidarity, norms of reciprocity, and social incentives; and second, counterinsurgency policies and practices that fail to exploit the opportunities that control offers for incentivizing collaboration and shaping political preferences. These arguments are grounded in a fieldwork-based case study of insurgency processes in a hamlet of Rolpa, Nepal.
Journal: Terrorism and Political Violence
Pages: 316-337
Issue: 2
Volume: 28
Year: 2016
Month: 3
X-DOI: 10.1080/09546553.2014.908775
File-URL: http://hdl.handle.net/10.1080/09546553.2014.908775
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:2:p:316-337



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_918879_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Heather Selma Gregg
Author-X-Name-First: Heather Selma
Author-X-Name-Last: Gregg
Title: Three Theories of Religious Activism and Violence: Social Movements, Fundamentalists, and Apocalyptic Warriors
Abstract: 
 Numerous scholars have investigated religiously motivated violence, particularly in the wake of September 11, including discussions on the role of modernity in triggering religious violence, the increasing presence of religion in politics, the violence-prone nature of certain religions, and religion's correlation with ethnicity and other conflict-intensifying variables. However, religious activism and violence are not new phenomena. Few theories have been advanced that move across time and space and, broadly, seek to explain the conditions under which religion becomes involved in activism and violence. This article argues that three broad causal arguments for religious activism—social movements, fundamentalism, and apocalyptic warriors—help explain the conditions under which religiously motivated violence occurs across time and space. These three causal arguments offer a spectrum of goals within religious activism, ranging from challenging social practices and government policies, to defending specific interpretations and practices of the faith, to hastening the apocalypse. Furthermore, each of these theories proposes different ways that religion becomes involved in social, political, and religious activism and the conditions under which groups use violence to further their goals. The article concludes by suggesting countermeasures for each type of religious activism.
Journal: Terrorism and Political Violence
Pages: 338-360
Issue: 2
Volume: 28
Year: 2016
Month: 3
X-DOI: 10.1080/09546553.2014.918879
File-URL: http://hdl.handle.net/10.1080/09546553.2014.918879
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:2:p:338-360



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1140534_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeffrey Kaplan
Author-X-Name-First: Jeffrey
Author-X-Name-Last: Kaplan
Title: State of the Book Review Column: Ten Years On
Journal: Terrorism and Political Violence
Pages: 361-362
Issue: 2
Volume: 28
Year: 2016
Month: 3
X-DOI: 10.1080/09546553.2016.1140534
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1140534
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:2:p:361-362



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1140537_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joanna Rak
Author-X-Name-First: Joanna
Author-X-Name-Last: Rak
Title: Contra-Acculturative Thought as the Source of Political Violence
Journal: Terrorism and Political Violence
Pages: 363-382
Issue: 2
Volume: 28
Year: 2016
Month: 3
X-DOI: 10.1080/09546553.2016.1140537
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1140537
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:2:p:363-382



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1140538_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Jihad and Counter-Jihad in Europe: Islamic Radicals, Right-Wing Extremists, and Counter-Terrorism Responses
Journal: Terrorism and Political Violence
Pages: 383-394
Issue: 2
Volume: 28
Year: 2016
Month: 3
X-DOI: 10.1080/09546553.2016.1140538
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1140538
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:2:p:383-394



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1140539_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Donald D. Denton
Author-X-Name-First: Donald D.
Author-X-Name-Last: Denton
Title: Tracy Lightcap and James P. Pfiffner (Eds.). Examining Torture: Empirical Studies of State Repression
Journal: Terrorism and Political Violence
Pages: 395-396
Issue: 2
Volume: 28
Year: 2016
Month: 3
X-DOI: 10.1080/09546553.2016.1140539
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1140539
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:2:p:395-396



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1140540_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Raphael Cohen-Almagor
Author-X-Name-First: Raphael
Author-X-Name-Last: Cohen-Almagor
Title: Ronald Crelinsten. Counterterrorism
Journal: Terrorism and Political Violence
Pages: 396-398
Issue: 2
Volume: 28
Year: 2016
Month: 3
X-DOI: 10.1080/09546553.2016.1140540
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1140540
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:2:p:396-398



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1140542_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Scott Nicholas Romaniuk
Author-X-Name-First: Scott Nicholas
Author-X-Name-Last: Romaniuk
Title: Milton Leitenberg and Raymond A. Zilinskas. The Soviet Biological Weapons Program: A History
Journal: Terrorism and Political Violence
Pages: 398-404
Issue: 2
Volume: 28
Year: 2016
Month: 3
X-DOI: 10.1080/09546553.2016.1140542
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1140542
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:2:p:398-404



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1140543_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Isaac Kfir
Author-X-Name-First: Isaac
Author-X-Name-Last: Kfir
Title: James Gow, Funmi Olonisakin, and Ernst Dijxhoorn (Eds.). Militancy and Violence in West Africa: Religion, Politics and Radicalisation; Nick Ridley. Terrorism in East and West Africa: The Under-Focused Dimension
Journal: Terrorism and Political Violence
Pages: 404-407
Issue: 2
Volume: 28
Year: 2016
Month: 3
X-DOI: 10.1080/09546553.2016.1140543
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1140543
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:2:p:404-407

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1155927_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John F. Morrison
Author-X-Name-First: John F.
Author-X-Name-Last: Morrison
Author-Name: Paul Gill
Author-X-Name-First: Paul
Author-X-Name-Last: Gill
Title: 100 Years of Irish Republican Violence
Journal: Terrorism and Political Violence
Pages: 409-416
Issue: 3
Volume: 28
Year: 2016
Month: 5
X-DOI: 10.1080/09546553.2016.1155927
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1155927
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:3:p:409-416



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1155929_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andrew Silke
Author-X-Name-First: Andrew
Author-X-Name-Last: Silke
Title: Ferocious Times: The IRA, the RIC, and Britain's Failure in 1919–1921
Abstract: 
 The 1916 Rising was, in military terms, a shambolic failure. Despite the fact that Britain was locked in a gruelling struggle with Germany, the Rising was still utterly crushed within a week. How then, in the aftermath of victory against Germany, did Britain fail to win the subsequent struggle with the Irish Republican Army (IRA) between 1919 and 1921? This article assesses some of the key factors that played out in the conflict, drawing particular attention to the IRA's focus on the Royal Irish Constabulary and the consequences of this, and then later, how distorted perceptions of the proximity of success ultimately undermined British commitment. One of the most remarkable features of the conflict was the widespread belief among many on the British side (and more than a few in the Republican camp) that the IRA was on the verge of total defeat when the truce was declared in 1921. The IRA had suffered heavy casualties and were running low on weapons and ammunition. Yet, somehow the movement prevailed. This article aims to shed light on how and why that happened.
Journal: Terrorism and Political Violence
Pages: 417-434
Issue: 3
Volume: 28
Year: 2016
Month: 5
X-DOI: 10.1080/09546553.2016.1155929
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1155929
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:3:p:417-434



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1155930_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kacper Rekawek
Author-X-Name-First: Kacper
Author-X-Name-Last: Rekawek
Title: “The Last of the Mohicans?” The IRA's “Operation Harvest” in an International Context
Abstract: 
 In 1956, the Irish Republican Army (IRA) launched “Operation Harvest,” an overtly ambitious guerrilla effort that was meant to secure the political unity of Ireland by force of arms. It was waged against the backdrop of a “thaw” in international relations and drew inspiration from successful anti-colonial guerrilla struggles in Algeria and Cyprus. The IRA was unaware of the simultaneous, parallel, unsuccessful irredentist efforts in Central and Eastern Europe in which anti-communist guerrillas clashed with totalitarian security apparatuses of the USSR or its satellite states. Studying the latter campaigns, which had begun earlier and were conducted by far larger and more effective guerrilla forces, might have convinced the organisation that such insurgencies in post-1945 Europe had very little hope of success. This article for the first time thematically contrasts the irredentist efforts of the IRA and the parallel Central and Eastern European guerrillas. It aims to bring to light cases that are hardly ever discussed in the Irish context but which could be of surprising use if one wishes to comparatively assess Ireland or the IRA.
Journal: Terrorism and Political Violence
Pages: 435-451
Issue: 3
Volume: 28
Year: 2016
Month: 5
X-DOI: 10.1080/09546553.2016.1155930
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1155930
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:3:p:435-451



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1155931_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sandra Peake
Author-X-Name-First: Sandra
Author-X-Name-Last: Peake
Author-Name: Orla Lynch
Author-X-Name-First: Orla
Author-X-Name-Last: Lynch
Title: Victims of Irish Republican Paramilitary Violence—The Case of “The Disappeared”
Abstract: 
 Throughout the history of Northern Ireland's (NI) “Troubles,” over 3,800 individuals were killed, with between 40,000 to 100,000 individuals injured, leaving many families and communities struggling with the aftermath. In recent times a particular category of victims and survivors has been politically active and thus featured prominently in the media: “The Disappeared.” This label has come to represent the victims of paramilitary groups whose remains were secretly disposed of. Through a long public and political battle the families of the Disappeared have achieved a measure of political success resulting in the establishment of the Independent Commission for the Location of Victims' Remains (ICLVR). Achieving political voice is not the only or perhaps the most significant difficulty encountered by these families. Their experiences in fact epitomise the complexity of the conflict and divisions in NI society and reflect the dominant issues of loyalty, identity, and importantly—silence. Throughout The Troubles, this silence and related notions of loyalty permeated all levels of society: at a community level which included the response of the church; at a statutory level including the response from social services and police; and, at a political level including local political processes but also departments within the British and Irish governments. This article examines the experiences of the families of the Disappeared through a multilevel analysis of their public campaign seeking the return of the remains of their family members. Using data collected from the families, members of the ICLVR, and support workers, the experience of the families of the Disappeared are analysed through accessing the social dynamics of silence (and loyalty), in-group affiliations, notions of sacrifice, and the attribution of blame; political successes both national and international will also serve to frame the analysis.
Journal: Terrorism and Political Violence
Pages: 452-472
Issue: 3
Volume: 28
Year: 2016
Month: 5
X-DOI: 10.1080/09546553.2016.1155931
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1155931
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:3:p:452-472



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1155932_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Paul Gill
Author-X-Name-First: Paul
Author-X-Name-Last: Gill
Author-Name: James A. Piazza
Author-X-Name-First: James A.
Author-X-Name-Last: Piazza
Author-Name: John Horgan
Author-X-Name-First: John
Author-X-Name-Last: Horgan
Title: Counterterrorism Killings and Provisional IRA Bombings, 1970–1998
Abstract: 
 Counterterrorism strategies involving the killing of terrorists are a prominently used but controversial practice. Proponents argue that such strategies are useful tools for reducing terrorist activity, while critics question their effectiveness. This article provides empirical insight into this strategy by conducting a series of negative binomial regression and Tobit estimations of the impact of killing Provisional Irish Republican Army (PIRA) terrorists as well as members of the Catholic community on counts of PIRA bombings and targeting activity in Northern Ireland for the period 1970–1998. We consider the impact of discriminate and indiscriminate killings (where only PIRA militants are killed versus those in which both militants and civilians are also killed) on subsequent PIRA improvised explosive device (IED) attacks. Our findings illustrate that while total and discriminate counterterrorism killings have little to no effect on PIRA IED attacks, indiscriminate counterterrorism killings increased PIRA bombings overall and prompted the Provisional IRA to specifically target civilians in IED events. We conclude by discussing the scholarly and policy implications of these findings.
Journal: Terrorism and Political Violence
Pages: 473-496
Issue: 3
Volume: 28
Year: 2016
Month: 5
X-DOI: 10.1080/09546553.2016.1155932
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1155932
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:3:p:473-496



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1155933_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Rory Finegan
Author-X-Name-First: Rory
Author-X-Name-Last: Finegan
Title: Shadowboxing in the Dark: Intelligence and Counter-Terrorism in Northern Ireland
Abstract: 
 The British experience in Northern Ireland, particularly the fight against the Provisional Irish Republican Army (PIRA), is an oft-cited case study in the counter-insurgency (COIN) spectrum and tome of counter-terrorism studies. It is the totality of the British intelligence experience in Northern Ireland, with its successes and challenges, which make it such a valuable case study from which to draw insight to shape contemporary COIN intelligence-based operations. As the conflict was both prolonged and intensified, a multitude of intelligence units from military and law enforcement evolved specifically to counter the effectiveness of PIRA; and to satisfy the desire of the security establishment to intensify information-gathering activities. This article examines the evolution and development of this security intelligence-driven effort that ultimately had the cumulative effect to wear down PIRA’s military capability through the focused application of a prolonged and lavishly resourced linked intelligence apparatus as an adjunct of a heavy military and police footprint. Nevertheless, despite Northern Ireland being a relatively small geographical area, the eventual containment of PIRA took years to achieve, demonstrating just how difficult it is to address a committed and determined insurgency. This highlights that a successful COIN strategy is arguably best predicated on the need for “patient” as opposed to “decisive” operations.
Journal: Terrorism and Political Violence
Pages: 497-519
Issue: 3
Volume: 28
Year: 2016
Month: 5
X-DOI: 10.1080/09546553.2016.1155933
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1155933
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:3:p:497-519



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1155934_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Rogelio Alonso
Author-X-Name-First: Rogelio
Author-X-Name-Last: Alonso
Title: Terrorist Skin, Peace-Party Mask: The Political Communication Strategy of Sinn Féin and the PIRA
Abstract: 
 The article analyses the political communication strategy adopted by Sinn Féin in order to legitimize the Provisional Irish Republican Army's (PIRA) terrorist campaign during their transition from violence into mainstream politics. Their endeavours to portray a triumphant republican movement in spite of the huge gap between strategic aims and achievements are examined. The political and social rehabilitation of violent Republicanism, and how their leaders have evolved from pariahs to celebrities, is also assessed. The role of the media and political elites, as well as the political discourse of the PIRA and Sinn Féin, is analysed in order to examine how the republican movement has tried to rewrite its past in an attempt to gain political and social legitimacy. Consequently, the myths reproduced by republicans to disguise their failures as historical compromises, reproducing a more benign interpretation of history which distorts the causes and consequences of terrorism, are critically assessed. The article will focus on the struggle for the legitimacy of the terrorist campaign and the propaganda system which, in the words of Garret FitzGerald (Irish Prime Minister between 1981 and 1987), has managed to turn the republican movement into the “peace party” despite murdering thousands of human beings.
Journal: Terrorism and Political Violence
Pages: 520-540
Issue: 3
Volume: 28
Year: 2016
Month: 5
X-DOI: 10.1080/09546553.2016.1155934
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1155934
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:3:p:520-540



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1155936_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sophie Whiting
Author-X-Name-First: Sophie
Author-X-Name-Last: Whiting
Title: Mainstream Revolutionaries: Sinn Féin as a “Normal” Political Party?
Abstract: 
 Despite the seismic shift of Sinn Féin from being the “mouthpiece” of the Provisional Irish Republican Army to the largest nationalist force in Northern Ireland, the party continues to project its objectives within the revolutionary politics and tradition of 1916. Whilst various groups across the island of Ireland stress their loyalty to Irish independence and allegiance to their republican forefathers, 2016 also plays host to devolved assembly elections in Northern Ireland. The centenary of the Easter Rising is therefore a poignant moment to reassess republican politics, more specifically, the relationship between the armed revolutionary tradition and constitutionalism. Within the post-peace process era Sinn Féin have been accused of maintaining an autocratic culture and an intra-party framework that is more representative of a clandestine revolutionary organisation than a political party. Yet, simultaneously, Sinn Féin have not been immune to the pressures experienced by other modern political parties, bound by the laws of electoral competition and driven by office-seeking priorities. In order to explore Sinn Féin within the modern political arena, this article firstly examines the broader debate surrounding how armed groups make the transition into constitutional politics. Secondly, public opinion survey data is used to judge the basis of Sinn Féin's electoral appeal. Finally, internal party documents are used to examine party structure, intra-party democracy, and professionalisation in order to judge the extent to which Sinn Féin have completed the transition from being a “mouthpiece” to their armed counterpart, towards being a “normal” political party.
Journal: Terrorism and Political Violence
Pages: 541-560
Issue: 3
Volume: 28
Year: 2016
Month: 5
X-DOI: 10.1080/09546553.2016.1155936
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1155936
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:3:p:541-560



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1155938_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: James W. McAuley
Author-X-Name-First: James W.
Author-X-Name-Last: McAuley
Author-Name: Neil Ferguson
Author-X-Name-First: Neil
Author-X-Name-Last: Ferguson
Title: “Us” and “Them”: Ulster Loyalist Perspectives on the IRA and Irish Republicanism
Abstract: 
 This article draws on data from one-to-one interviews with members and former members of the Ulster Volunteer Force, Ulster Defence Association, Red Hand Commando, Ulster Political Research Group, and the Progressive Unionist Party to explore the dynamic and fluid perceptions of the Irish Republican Army (IRA) and Sinn Féin among Ulster loyalists. The article will explore how attitudes and perceptions are influenced by the shifting political landscape in Northern Ireland as Ulster loyalists come to terms with the new realities created by the peace process, security normalization, decommissioning, and the rise in the threat of dissident republican violence. The article will also demonstrate that these perceptions are not purely antagonistic and based on the creation of negative, stereotypical “enemy images” fuelled by decades of conflict, but pragmatic, bound to societal and local events, and influenced by intragroup attitudes and divisions, in addition to the expected conflictual ingroup vs. outgroup relationships. Finally, the article will explore how loyalists employ republicanism and the transformation of the Provisional IRA in particular, as a mirror or benchmark to reflect on their own progress since 1994.
Journal: Terrorism and Political Violence
Pages: 561-575
Issue: 3
Volume: 28
Year: 2016
Month: 5
X-DOI: 10.1080/09546553.2016.1155938
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1155938
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:3:p:561-575



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1155940_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John F. Morrison
Author-X-Name-First: John F.
Author-X-Name-Last: Morrison
Author-Name: John Horgan
Author-X-Name-First: John
Author-X-Name-Last: Horgan
Title: Reloading the Armalite? Victims and Targets of Violent Dissident Irish Republicanism, 2007–2015
Abstract: 
 The centenary of the 1916 Rising marks a time of peaceful commemoration, across the island of Ireland. However, several violent dissident republican groups wish to seize it as an opportunity to re-organise in an attempt to bolster and legitimise their sustained paramilitary campaign. This study seeks to provide a greater understanding of how this paramilitary activity has manifested from 2007 to mid-2015. We do this by assessing target selection, through analysis of the Violent Dissident Republican (VDR) events database. The data suggest that civilian targets are the most regularly attacked. However, when exclusively analysing targets of detonated explosives, the data show that police, security personnel, and their infrastructure are more consistently targeted. The target selected can and does have an effect on attack method. These findings can both assist in protecting the potential targets of VDR attacks and contribute to the development of a strong nationalised, and localised, counter VDR narrative.
Journal: Terrorism and Political Violence
Pages: 576-597
Issue: 3
Volume: 28
Year: 2016
Month: 5
X-DOI: 10.1080/09546553.2016.1155940
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1155940
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:3:p:576-597



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1155941_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John F. Morrison
Author-X-Name-First: John F.
Author-X-Name-Last: Morrison
Title: Fighting Talk: The Statements of “The IRA/New IRA”
Abstract: 
 With the advent of the new violent dissident merger, “The IRA/New IRA,” the group and its affiliates have had to legitimise their new existence. They have utilised the maintenance of paramilitary activity to achieve this. However, they have also produced a number of organisational statements, justifying their position, tactics, and strategies. This article analyses the evolution of these statements, both pre and post-merger from 2007 to 2015. 126 individual statements and four magazines are analysed using grounded theory. This analysis found that the statements have a dual strategy, aiming to foster trust in the movement and distrust in their perceived enemies. One of the dominant ways in which the group aims to foster trust is by proposing their possession of an historical mandate from the republican forefathers of 1916, as well as the internally lauded paramilitaries from The Troubles-era Provisional Irish Republican Army. The focus of the distrust narrative has been on the “constitutional nationalism” of Sinn Féin. However, it also pours scorn on the Police Service of Northern Ireland, and capitalism, across the island of Ireland. The analysis of these statements can provide us with an understanding of the future direction of the group, as well as giving us insight, which can inform the development of any counter-narrative.
Journal: Terrorism and Political Violence
Pages: 598-619
Issue: 3
Volume: 28
Year: 2016
Month: 5
X-DOI: 10.1080/09546553.2016.1155941
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1155941
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:3:p:598-619



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1155942_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John F. Morrison
Author-X-Name-First: John F.
Author-X-Name-Last: Morrison
Title: An Interview With Danny Morrison
Journal: Terrorism and Political Violence
Pages: 620-635
Issue: 3
Volume: 28
Year: 2016
Month: 5
X-DOI: 10.1080/09546553.2016.1155942
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1155942
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:3:p:620-635



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1155943_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Neil Ferguson
Author-X-Name-First: Neil
Author-X-Name-Last: Ferguson
Author-Name: James W. McAuley
Author-X-Name-First: James W.
Author-X-Name-Last: McAuley
Title: An Interview With Billy Hutchinson
Journal: Terrorism and Political Violence
Pages: 636-652
Issue: 3
Volume: 28
Year: 2016
Month: 5
X-DOI: 10.1080/09546553.2016.1155943
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1155943
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:3:p:636-652

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_918880_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David Lowe
Author-X-Name-First: David
Author-X-Name-Last: Lowe
Title: Surveillance and International Terrorism Intelligence Exchange: Balancing the Interests of National Security and Individual Liberty
Abstract: 
 Using the revelations Edward Snowden passed over to the press regarding the actions of the U.S.’s National Security Agency and the UK’s Government Communications Headquarters and their use of the Prism project, this article examines the law surrounding intelligence gathering in the U.S. and UK. Underpinning the analysis is the legal principle of proportionality as applied to balancing the interests of national security and individual liberties. After examining intelligence exchange procedures, which for the UK is through negotiated agreements between national security agencies and through the European Union’s policing agency, Europol, the main part of the article discusses legal challenges that have been made regarding surveillance and the use of anti-terror laws on citizens and the rationale behind the judicial decisions made in both the U.S. and UK jurisdictions. The argument forwarded is that there is a requirement for wide preventative powers being granted to counter-terrorism agencies and that the interests of national security and individual liberty are inclusive and, as shown by the cases covered in this article, we should rely on the judiciary to perform their function in applying proportionality to each case on its own merits.
Journal: Terrorism and Political Violence
Pages: 653-673
Issue: 4
Volume: 28
Year: 2016
Month: 8
X-DOI: 10.1080/09546553.2014.918880
File-URL: http://hdl.handle.net/10.1080/09546553.2014.918880
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:4:p:653-673



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_924410_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alon Peled
Author-X-Name-First: Alon
Author-X-Name-Last: Peled
Title: Coerce, Consent, and Coax: A Review of U.S. Congressional Efforts to Improve Federal Counterterrorism Information Sharing
Abstract: 
 Government Accountability Office reports and secondary sources reveal that the U.S. Congress has employed three distinct legislative approaches to address the federal counterterrorism information-sharing impasse: coerce, consent, and coax. One main example illustrates each approach: the Homeland Security Information Network project exemplifies the coerce approach; Intellipedia illustrates the consent approach; the office of the Program Manager of the Information Sharing Environment exemplifies the coax approach. Secondary examples are utilized including those of regional Fusion Centers, the Office of the Director of National Intelligence, and the National Counterterrorism Center. The merits and challenges of the three approaches are discussed and compared. The conclusion proposes ideas for using the approach most appropriate to specific counterterrorism challenges.
Journal: Terrorism and Political Violence
Pages: 674-691
Issue: 4
Volume: 28
Year: 2016
Month: 8
X-DOI: 10.1080/09546553.2014.924410
File-URL: http://hdl.handle.net/10.1080/09546553.2014.924410
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:4:p:674-691



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_930027_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anja Dalgaard-Nielsen
Author-X-Name-First: Anja
Author-X-Name-Last: Dalgaard-Nielsen
Author-Name: Jesper Laisen
Author-X-Name-First: Jesper
Author-X-Name-Last: Laisen
Author-Name: Charlotte Wandorf
Author-X-Name-First: Charlotte
Author-X-Name-Last: Wandorf
Title: Visible Counterterrorism Measures in Urban Spaces—Fear-Inducing or Not?
Abstract: 
 Many scholars working within the tradition of critical studies are sceptical of the presence of visible security measures in urban spaces, arguing that they cause fear and facilitate the political control of citizens. A study carried out in Denmark in 2011 sought to capture, describe, and rank factors impacting positively or negatively on the feelings of safety of Danish citizens, when being in a crowded place. Surprisingly, the response to security measures like fences, cameras, and uniformed guards was positive. More visible security apparently reinforced feelings of safety. This article discusses the findings and points to, amongst others, a high level of societal trust as one possible explanation.
Journal: Terrorism and Political Violence
Pages: 692-712
Issue: 4
Volume: 28
Year: 2016
Month: 8
X-DOI: 10.1080/09546553.2014.930027
File-URL: http://hdl.handle.net/10.1080/09546553.2014.930027
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:4:p:692-712



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_950418_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mariaelisa Epifanio
Author-X-Name-First: Mariaelisa
Author-X-Name-Last: Epifanio
Title: The Politics of Targeted and Untargeted Counterterrorist Regulations
Abstract: 
 Civil liberties came under pressure after Al Qaeda’s attacks in the U.S. and Europe. Governments in many Organisation for Economic Co-operation and Development countries started questioning the effectiveness of counterterrorist policies and regulations. Incumbents responded to terrorism not only by introducing ex novo (or re-adapting) laws and regulations affecting a large set of civil rights; they also responded to international terrorism by choosing between an untargeted and a targeted legislative response. Some governments reduced the liberties of foreign foes more than the freedoms of citizens, while others preferred burdening all individuals within their borders, immigrants and citizens alike. This article analyzes the determinants of targeted and untargeted antiterrorist responses to Al Qaeda terrorism in a sample of 20 Western democracies from 2000 to 2008. The findings suggest that patterns of targeted legislation were more pronounced in countries governed by right-wing incumbents and those where the decisional power in the cabinet is divided among a few number of political parties. In addition, a larger share of Muslims and the degree of ethnic fractionalization played a relevant role in determining governments’ choices of prime targets.
Journal: Terrorism and Political Violence
Pages: 713-734
Issue: 4
Volume: 28
Year: 2016
Month: 8
X-DOI: 10.1080/09546553.2014.950418
File-URL: http://hdl.handle.net/10.1080/09546553.2014.950418
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:4:p:713-734



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_950419_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Manuel R. Torres-Soriano
Author-X-Name-First: Manuel R.
Author-X-Name-Last: Torres-Soriano
Title: The Hidden Face of Jihadist Internet Forum Management: The Case of Ansar Al Mujahideen
Abstract: 
 This article offers a descriptive analysis of the private interactions which took place on the jihadist Internet forum known as Ansar Al Mujahideen between 2008 and 2010. The analysis of the non-visible part of the forum contributes to a more robust underpinning of some current assumptions regarding the jihadist Internet infrastructure and its hierarchical dependence on, and subordination to, formal terrorist organisations and charismatic leaders. In addition, it offers a new perspective on other aspects such as the many conflicts and rivalries between the different forums, the operational constraints caused by the lack of human and material resources, and the considerable vulnerability of the forums to cyber-sabotage and infiltration attempts.
Journal: Terrorism and Political Violence
Pages: 735-749
Issue: 4
Volume: 28
Year: 2016
Month: 8
X-DOI: 10.1080/09546553.2014.950419
File-URL: http://hdl.handle.net/10.1080/09546553.2014.950419
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:4:p:735-749



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_954039_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sarah V. Marsden
Author-X-Name-First: Sarah V.
Author-X-Name-Last: Marsden
Title: A Social Movement Theory Typology of Militant Organisations: Contextualising Terrorism
Abstract: 
 Typologies are ubiquitous in terrorism studies, illustrating their continued appeal as a tool to further our understanding of this form of political violence. Despite this, to date, the promise of an empirically derived typology has largely been neglected. In addressing this gap, this article sets out a typology developed from Social Movement Theory. Using a novel statistical technique to derive a three-dimensional framework for categorising militant groups, the typology incorporates both organisational characteristics and the wider political context. The result is a typology defined by three conceptual constructs: political capacity, war-making capacity, and network capacity. Alongside these organisational features, imposing measures of the wider political opportunity structure reveals eight types of militant organisation. To explore the utility of the framework, a preliminary analysis interprets the typology in light of the presence of wider conflict. That a robust relationship is found between the various types and whether groups were operating in peacetime, civil war, or low-intensity conflict, goes some way to demonstrating its utility as an analytical tool. Conclusions draw attention to the importance of contextualising militant groups in their socio-political setting, and the benefits of combining theory alongside empirical analysis to develop robust characterisations of violent organisations.
Journal: Terrorism and Political Violence
Pages: 750-773
Issue: 4
Volume: 28
Year: 2016
Month: 8
X-DOI: 10.1080/09546553.2014.954039
File-URL: http://hdl.handle.net/10.1080/09546553.2014.954039
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:4:p:750-773



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_955572_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Charity Butcher
Author-X-Name-First: Charity
Author-X-Name-Last: Butcher
Title: Terrorism and External Audiences: Influencing Foreign Intervention Into Civil Wars
Abstract: 
 This article evaluates the effects of terrorism on interventions into civil wars. Considering civil wars from 1970–1999, this study analyzes how the use of terrorism as a tactic affects external interventions on behalf of opposition groups, interventions on behalf of governments, and diplomatic interventions. While some authors would suggest that groups might utilize terrorism as a tactic to gain external support, this study finds little evidence that groups are actually successful in gaining such support. In fact, terrorism that targets civilians appears to actually decrease the likelihood of military interventions on behalf of opposition groups. Furthermore, in civil wars with high numbers of terrorist attacks there is a greater likelihood of economic intervention on behalf of governments, further weakening the potential benefit for groups in utilizing terrorism as a tactic. While this is certainly a welcome finding, a consideration of five case studies of suicide terrorism (Lebanon, Sri Lanka, Iraq, India, and Turkey) provides evidence that the use of suicide terrorism within civil wars may have decreased the likelihood of external interventions on behalf of the government and of diplomatic interventions. These results are more troubling and suggest potentially grave consequences for mediating many of these conflicts.
Journal: Terrorism and Political Violence
Pages: 774-794
Issue: 4
Volume: 28
Year: 2016
Month: 8
X-DOI: 10.1080/09546553.2014.955572
File-URL: http://hdl.handle.net/10.1080/09546553.2014.955572
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:4:p:774-794



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1205464_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Max Taylor
Author-X-Name-First: Max
Author-X-Name-Last: Taylor
Title: Apocalypse Now? A Review Essay of Battling to the End: Conversations With Benoît Chantre
Journal: Terrorism and Political Violence
Pages: 795-802
Issue: 4
Volume: 28
Year: 2016
Month: 8
X-DOI: 10.1080/09546553.2016.1205464
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1205464
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:4:p:795-802



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1205465_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Paul Kamolnick
Author-X-Name-First: Paul
Author-X-Name-Last: Kamolnick
Title: Of Jihads, Jihadists, and Jihadisms
Journal: Terrorism and Political Violence
Pages: 803-812
Issue: 4
Volume: 28
Year: 2016
Month: 8
X-DOI: 10.1080/09546553.2016.1205465
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1205465
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:4:p:803-812



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1205466_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anthony N. Celso
Author-X-Name-First: Anthony N.
Author-X-Name-Last: Celso
Title: Jihadist Failure, Resilience, and Never-Ending Warfare
Journal: Terrorism and Political Violence
Pages: 813-822
Issue: 4
Volume: 28
Year: 2016
Month: 8
X-DOI: 10.1080/09546553.2016.1205466
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1205466
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:4:p:813-822



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1205467_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Busra Nisa Sarac
Author-X-Name-First: Busra Nisa
Author-X-Name-Last: Sarac
Title: Jessica Stern and J. M. Berger. ISIS: The State of Terror
Journal: Terrorism and Political Violence
Pages: 823-824
Issue: 4
Volume: 28
Year: 2016
Month: 8
X-DOI: 10.1080/09546553.2016.1205467
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1205467
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:4:p:823-824



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1205468_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alex P. Schmid
Author-X-Name-First: Alex P.
Author-X-Name-Last: Schmid
Title: Jeffrey Kaplan. Radical Religion and Violence: Theory and Case Studies
Journal: Terrorism and Political Violence
Pages: 825-826
Issue: 4
Volume: 28
Year: 2016
Month: 8
X-DOI: 10.1080/09546553.2016.1205468
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1205468
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:4:p:825-826

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_955915_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeffrey Reeves
Author-X-Name-First: Jeffrey
Author-X-Name-Last: Reeves
Title: Ideas and Influence: Scholarship as a Harbinger of Counterterrorism Institutions, Policies, and Laws in the People's Republic of China
Abstract: 
 This article demonstrates how scholarship on terrorism in China has provided the intellectual backdrop against which China's leadership has developed the country's counterterrorism institutions, policies, and laws. Building on the linkages between scholarship and policy-making, the article suggests potential avenues for policy reform in China's current counterterrorism architecture.
Journal: Terrorism and Political Violence
Pages: 827-847
Issue: 5
Volume: 28
Year: 2016
Month: 10
X-DOI: 10.1080/09546553.2014.955915
File-URL: http://hdl.handle.net/10.1080/09546553.2014.955915
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:5:p:827-847



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_955916_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Enzo Nussio
Author-X-Name-First: Enzo
Author-X-Name-Last: Nussio
Author-Name: Kimberly Howe
Author-X-Name-First: Kimberly
Author-X-Name-Last: Howe
Title: When Protection Collapses: Post-Demobilization Trajectories of Violence
Abstract: 
 The implementation of peacebuilding activities, including the demobilization of non-state illegal actors, does not necessarily bring about a reduction in violence. While there are several theories that address the causes of persistent violence, there are few that adequately explain why rates of violence can rapidly increase in a post-demobilization context. Using the method of process tracing, this article explores the case of Córdoba Department, Colombia, where rates of violence have increased after the demobilization of paramilitary groups (Autodefensas Unidas de Colombia [AUC]) in 2005. We argue that the AUC created and maintained a monopolistic illegal protection system during its years of operation, and this type of local order was able to contain violence. After demobilization, the protection system was disrupted and as a consequence, new competition between post-demobilization criminal organizations for existing illegal rents developed, petty crime became pervasive, and revenge killings spiked, thus contributing to increased rates of violence in the post-demobilization period. Our theory about the breakdown of protection finds support in other AUC-dominated regions of Colombia.
Journal: Terrorism and Political Violence
Pages: 848-867
Issue: 5
Volume: 28
Year: 2016
Month: 10
X-DOI: 10.1080/09546553.2014.955916
File-URL: http://hdl.handle.net/10.1080/09546553.2014.955916
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:5:p:848-867



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_961635_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Graig R. Klein
Author-X-Name-First: Graig R.
Author-X-Name-Last: Klein
Title: Ideology Isn't Everything: Transnational Terrorism, Recruitment Incentives, and Attack Casualties
Abstract: 
 In the current literature, the primary determinants of terrorist attack casualty rates have been attributed to religious fundamentalism. While zealotry, martyrdom, and the pursuit of salvation certainly empower religious fundamentalists with the liberty to decimate human targets, I argue that the sustaining necessity to recruit more terrorists from within the population, not religious fundamentalism alone, is an important predictor of the brutality of an attack. When targets are located within a potential recruitment population, there is an imminent need to restrict violence, as unnecessary collateral damage turns potential supporters away, rather than attracts them. Conversely, transnational attacks occurring outside the recruitment population abrogate these restrictions on violence. I test this argument on terrorist attacks from 1998–2005 and find empirical evidence that transnational attacks are a predictive cause of high casualty rates in a target population.
Journal: Terrorism and Political Violence
Pages: 868-887
Issue: 5
Volume: 28
Year: 2016
Month: 10
X-DOI: 10.1080/09546553.2014.961635
File-URL: http://hdl.handle.net/10.1080/09546553.2014.961635
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:5:p:868-887



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_962021_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Carlo Koos
Author-X-Name-First: Carlo
Author-X-Name-Last: Koos
Author-Name: Jan Pierskalla
Author-X-Name-First: Jan
Author-X-Name-Last: Pierskalla
Title: The Effects of Oil Production and Ethnic Representation on Violent Conflict in Nigeria: A Mixed-Methods Approach
Abstract: 
 A large qualitative literature on violent conflict in Nigeria has identified the importance of oil production and ethnicity as salient factors in understanding violence, especially in the oil-rich Niger Delta. This resonates with the broader literature on natural resources, ethnic exclusion, and conflict. This article advances existing research by providing the first highly disaggregated statistical analysis of oil, ethnicity, and violence for Nigerian Local Government Areas (LGAs). We test whether oil production in a weak state environment, and local groups’ access to governmental power, affect the level of violence in Nigeria. We employ unique disaggregated data on violent conflict events, proprietary data on oil production, and newly collected information on local ethnic groups’ access to the federal government for 774 LGAs. We find strong evidence that LGAs with oil infrastructure experience significantly more violence than others, while access to the federal government significantly reduces violence. We complement these findings with a qualitative investigation of violent conflicts in Nigeria.
Journal: Terrorism and Political Violence
Pages: 888-911
Issue: 5
Volume: 28
Year: 2016
Month: 10
X-DOI: 10.1080/09546553.2014.962021
File-URL: http://hdl.handle.net/10.1080/09546553.2014.962021
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:5:p:888-911



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_976625_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Matthew D. M. Francis
Author-X-Name-First: Matthew D. M.
Author-X-Name-Last: Francis
Title: Why the “Sacred” Is a Better Resource Than “Religion” for Understanding Terrorism
Abstract: 
 The popular media and many in academia often overstate the role that religion, and its supposedly unique qualities, has played in recent acts of terror. In this article, I argue that the notion of religious violence is unhelpful and that there is a more useful concept that we can utilize to draw out the values and ideas that play a role in the move to violence in both religious and secular groups. From a series of case studies on religious and non-religious groups, I have drawn out an alternative framework for investigating and learning from the role that beliefs play in motivations and justifications for terrorism. This framework uses the concept of non-negotiable (or “sacred”) beliefs. It is as applicable to secular as it is to religious groups, and can show us much more about how such beliefs can contribute to violence.
Journal: Terrorism and Political Violence
Pages: 912-927
Issue: 5
Volume: 28
Year: 2016
Month: 10
X-DOI: 10.1080/09546553.2014.976625
File-URL: http://hdl.handle.net/10.1080/09546553.2014.976625
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:5:p:912-927



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_982862_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Luca Falciola
Author-X-Name-First: Luca
Author-X-Name-Last: Falciola
Title: A Bloodless Guerrilla Warfare: Why U.S. White Leftists Renounced Violence Against People During the 1970s
Abstract: 
 Between 1968 and the late 1970s, a significant number of U.S. white leftist groups escalated their protest to armed struggle. After experimenting briefly with violence, they opted for low-intensity armed propaganda that targeted property and avoided hurting people. By contrast, European leftist groups and anti-colonial organizations in the U.S. made extensive use of antipersonnel violence. Why did U.S. leftists eschew attacks against civilians? Scholarship does not explain this case, as it focuses either on the internal dynamics of a single group or on structural variables. Conversely, this article addresses this question through a historical reconstruction and a multilevel analysis. The research identifies the critique and ensuing de-solidarization by the radical milieu as the main factor accounting for the restraint of violence. This article demonstrates that the radical milieu censored and isolated armed groups as soon as they escalated and began to endanger human lives. Therefore, in order to safeguard the solidarity pact with their constituencies, violent fringes moderated their repertoires of action. This article employs primary sources and original interviews with militants to support this claim and to assess the relevance of three concurrent factors: the trauma generated by the “townhouse incident,” the deterrence by law enforcement, and the militants’ socio-economic background.
Journal: Terrorism and Political Violence
Pages: 928-949
Issue: 5
Volume: 28
Year: 2016
Month: 10
X-DOI: 10.1080/09546553.2014.982862
File-URL: http://hdl.handle.net/10.1080/09546553.2014.982862
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:5:p:928-949



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_987341_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Eric Stollenwerk
Author-X-Name-First: Eric
Author-X-Name-Last: Stollenwerk
Author-Name: Thomas Dörfler
Author-X-Name-First: Thomas
Author-X-Name-Last: Dörfler
Author-Name: Julian Schibberges
Author-X-Name-First: Julian
Author-X-Name-Last: Schibberges
Title: Taking a New Perspective: Mapping the Al Qaeda Network Through the Eyes of the UN Security Council
Abstract: 
 Network analysis has attracted significant attention when researching the phenomenon of transnational terrorism, particularly Al Qaeda. While many scholars have made valuable contributions to mapping Al Qaeda, several problems remain due to a lack of data and the omission of data provided by international organizations such as the UN. Thus, this article applies a social network analysis and subsequent mappings of the data gleaned from the Security Council's consolidated sanctions list, and asks what they can demonstrate about the structure and organizational characteristics of Al Qaeda. The study maps the Al Qaeda network on a large scale using a newly compiled data set. The analysis reveals that the Al Qaeda network consists of several hundred individual and group nodes connecting almost all over the globe. Several major nodes are crucial for the network structure, while simultaneously many other nodes only weakly and foremost regionally connect to the network. The article concludes that the findings tie in well to the latest research pointing to local and simultaneously global elements of Al Qaeda, and that the new data is a valuable source for further analyses, potentially in combination with other data.
Journal: Terrorism and Political Violence
Pages: 950-970
Issue: 5
Volume: 28
Year: 2016
Month: 10
X-DOI: 10.1080/09546553.2014.987341
File-URL: http://hdl.handle.net/10.1080/09546553.2014.987341
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:5:p:950-970



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1230451_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Matt Qvortrup
Author-X-Name-First: Matt
Author-X-Name-Last: Qvortrup
Title: Counting the Cost of Counterterrorism
Journal: Terrorism and Political Violence
Pages: 971-979
Issue: 5
Volume: 28
Year: 2016
Month: 10
X-DOI: 10.1080/09546553.2016.1230451
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1230451
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:5:p:971-979



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1230452_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Raphael Cohen-Almagor
Author-X-Name-First: Raphael
Author-X-Name-Last: Cohen-Almagor
Title: I. William Zartman and Guy Olivier Faure (Eds.). Engaging Extremists
Journal: Terrorism and Political Violence
Pages: 980-982
Issue: 5
Volume: 28
Year: 2016
Month: 10
X-DOI: 10.1080/09546553.2016.1230452
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1230452
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:5:p:980-982



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1230453_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dipak Gupta
Author-X-Name-First: Dipak
Author-X-Name-Last: Gupta
Title: Solahudin. The Roots of Terrorism in Indonesia: From DI to Jema'ah Islamiyah; Rohan Gunaratna and Arabinda Acharya. The Terrorist Threat From Thailand: Jihad or Quest for Justice?; Sumit Ganguly and David P. Fidler (Eds.). India and Counterinsurgency: Lessons Learned
Journal: Terrorism and Political Violence
Pages: 982-987
Issue: 5
Volume: 28
Year: 2016
Month: 10
X-DOI: 10.1080/09546553.2016.1230453
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1230453
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:5:p:982-987



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1230455_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Marlene Laruelle (Ed.). Eurasianism and the European Far Right: Reshaping the Europe–Russia Relationship
Journal: Terrorism and Political Violence
Pages: 987-989
Issue: 5
Volume: 28
Year: 2016
Month: 10
X-DOI: 10.1080/09546553.2016.1230455
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1230455
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:5:p:987-989



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1230456_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Paul Kamolnick
Author-X-Name-First: Paul
Author-X-Name-Last: Kamolnick
Title: Boaz Ganor. Global Alert: The Rationality of Modern Islamist Terrorism and the Challenge to the Liberal Democratic Order
Journal: Terrorism and Political Violence
Pages: 990-992
Issue: 5
Volume: 28
Year: 2016
Month: 10
X-DOI: 10.1080/09546553.2016.1230456
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1230456
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:5:p:990-992



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1239958_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: Editorial Board EOV
Journal: Terrorism and Political Violence
Pages: ebi-ebi
Issue: 5
Volume: 28
Year: 2016
Month: 10
X-DOI: 10.1080/09546553.2016.1239958
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1239958
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:28:y:2016:i:5:p:ebi-ebi

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_985378_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard E. Berkebile
Author-X-Name-First: Richard E.
Author-X-Name-Last: Berkebile
Title: What Is Domestic Terrorism? A Method for Classifying Events From the Global Terrorism Database
Abstract: 
 Domestic terrorism accounts for a vast majority of all attacks, yet it is far less studied than its transnational counterpart. As a result, the literature on domestic terrorism remains theoretically and empirically underdeveloped. One of the reasons for this is the dearth of comprehensive crossnational domestic terrorism datasets. This article seeks to address the problem by proposing a method for refining original Global Terrorism Database (GTD) data into a constructively valid, crossnational domestic terrorism dataset. The analysis begins with the definition of terrorism and further develops it by conceptually distinguishing its domestic and transnational forms. Because the GTD includes nonterrorist events and conflates transnational and domestic incidents, its raw form is unsuited for domestic research. Therefore, the article examines common definitional attributes from terrorism and domestic terrorism literature. It concludes by specifying steps for assembling a dataset and examining descriptive statistics of the resulting population.
Journal: Terrorism and Political Violence
Pages: 1-26
Issue: 1
Volume: 29
Year: 2017
Month: 1
X-DOI: 10.1080/09546553.2014.985378
File-URL: http://hdl.handle.net/10.1080/09546553.2014.985378
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:1:p:1-26



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_987342_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dominique Clément
Author-X-Name-First: Dominique
Author-X-Name-Last: Clément
Title: The Transformation of Security Planning for the Olympics: The 1976 Montreal Games
Abstract: 
 Montreal's Summer Olympics in 1976 was a turning point in Olympic history: it was the Games' first highly visible security operation. It was also a transformative moment in the history of security planning in Canada: preparations for the games contributed to shifting the Security Services' focus from communism towards domestic and international terrorism. The following article documents, for the first time, the scope of this operation. It is based on five years of requests and appeals under the federal Access to Information Act, which led to the release of over fifty thousand pages of Royal Canadian Mounted Police documents. I argue that security for the Montreal Olympics was based largely on imagined threats. In addition, I argue that security costs for the Montreal Olympics were high but modest as compared to the overall budget. Nonetheless, Montreal set a precedent for high security costs that have since become the standard for hosting the Olympics. Finally, I argue that the Montreal Olympics had long-term implications for policing in Canada. The scale of the operation produced new resources and inter-agency links that were only made possible as a result of hosting the games.
Journal: Terrorism and Political Violence
Pages: 27-51
Issue: 1
Volume: 29
Year: 2017
Month: 1
X-DOI: 10.1080/09546553.2014.987342
File-URL: http://hdl.handle.net/10.1080/09546553.2014.987342
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:1:p:27-51



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_987866_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Paul Joosse
Author-X-Name-First: Paul
Author-X-Name-Last: Joosse
Title: Leaderless Resistance and the Loneliness of Lone Wolves: Exploring the Rhetorical Dynamics of Lone Actor Violence
Abstract: 
 “Leaderless resistance” and “lone wolf terrorism” are concepts that have steadily gained importance in the study of oppositional subcultures and terrorist groups, being used to describe the operational realities of a variety of terrorisms, from groups like Al Qaeda to Anders Breivik. In this article, I seek to describe leaderless resistance as a rhetorical construct, a meaning-conferring “ideology of effervescence” that lifts the spirits of both movement progenitors who advocate the strategy as well as incipient lone wolves who consider responding to their exhortations. Through an examination of the case of Wiebo Ludwig and the EnCana pipeline bombings of 2008–2009, I show how these rhetorics emerge in the interactions between activists and their political enemies. With this conception, we can (a) understand more fully the discursive/rhetorical dynamics involved in asymmetrical struggle, (b) problematize the acceptance of the organizational reality of leaderless resistance in the terrorism literature, and (c) question the assertion of some terrorism scholarship that refers to leaderless resistance and other ideologies of effervescence as hallmarks of the “new terrorism.”
Journal: Terrorism and Political Violence
Pages: 52-78
Issue: 1
Volume: 29
Year: 2017
Month: 1
X-DOI: 10.1080/09546553.2014.987866
File-URL: http://hdl.handle.net/10.1080/09546553.2014.987866
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:1:p:52-78



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_993466_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tricia Bacon
Author-X-Name-First: Tricia
Author-X-Name-Last: Bacon
Title: Hurdles to International Terrorist Alliances: Lessons From Al Qaeda's Experience
Abstract: 
 Despite the threat posed by international terrorist alliances, the conditions that foster and inhibit these relationships remain poorly understood. When seeking allies outside of their primary conflict and political market, groups struggle to forge credible commitments, particularly the requisite ‘shadows of the future’ and reputations conducive to cooperation, without third-party enforcers. Given their suspicious nature and strong in-group identities, terrorist groups sometimes balk at relinquishing independence for security. Alliances risk precipitating counterterrorism pressure, alienating constituents, and increasing the risk of betrayal. Even groups that enjoy alliance success, like Al Qaeda, experience these hurdles in their alliance. What helped to set Al Qaeda apart from most groups was its ability to navigate these obstacles, though some bedeviled its alliances efforts. This offers under-utilized opportunities for alliance disruption.
Journal: Terrorism and Political Violence
Pages: 79-101
Issue: 1
Volume: 29
Year: 2017
Month: 1
X-DOI: 10.1080/09546553.2014.993466
File-URL: http://hdl.handle.net/10.1080/09546553.2014.993466
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:1:p:79-101



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_994061_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: James A. Piazza
Author-X-Name-First: James A.
Author-X-Name-Last: Piazza
Title: Repression and Terrorism: A Cross-National Empirical Analysis of Types of Repression and Domestic Terrorism
Abstract: 
 While some scholars have theorized that repression reduces terrorism because it raises the costs of participating in terrorist activity by dissidents, others argue that repression stimulates terrorism by either closing off nonviolent avenues for expressing dissent or by provoking or sharpening grievances within a population. This study investigates these contradictory sets of expectations by considering whether or not different specific types of repression yield different effects on patterns of terrorism in 149 countries for the period 1981 to 2006. By assessing the impact of nine specific types of repression on domestic terrorism, the study produces some interesting findings: while, as expected, forms of repression that close off nonviolent avenues of dissent and boost group grievances increase the amount of domestic terrorism a country faces, types of repression that raise the costs of terrorist activity have no discernible suppressing effect on terrorism.
Journal: Terrorism and Political Violence
Pages: 102-118
Issue: 1
Volume: 29
Year: 2017
Month: 1
X-DOI: 10.1080/09546553.2014.994061
File-URL: http://hdl.handle.net/10.1080/09546553.2014.994061
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:1:p:102-118



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_995788_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Hans-Peter van den Broek
Author-X-Name-First: Hans-Peter
Author-X-Name-Last: van den Broek
Title: Labelling and Legitimization: Justifying Political Violence in the Basque Country
Abstract: 
 This article focuses on the role of labelling in the discourse employed by the Left-Wing Nationalist movement in the Basque Country to legitimize the use of violence for political ends. The approach in this article goes beyond classic labelling theory. I demonstrate that radical Nationalists do not passively undergo their being labelled as deviants (fanatics, terrorists) by society, but develop counter-labels instead to define their opponents and re-label themselves.
Journal: Terrorism and Political Violence
Pages: 119-136
Issue: 1
Volume: 29
Year: 2017
Month: 1
X-DOI: 10.1080/09546553.2014.995788
File-URL: http://hdl.handle.net/10.1080/09546553.2014.995788
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:1:p:119-136



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_997355_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mevliyar Er
Author-X-Name-First: Mevliyar
Author-X-Name-Last: Er
Title: Abd-el-Krim al-Khattabi: The Unknown Mentor of Che Guevara
Abstract: 
 Abd-el-Krim al-Khattabi's guerilla tactics are said to have influenced several renowned revolutionaries, such as Ho Chi Minh and Mao Zedong. There is evidence that Che Guevara equally employed at least some of the tactics and methods, which were devised by the Rifis. After all, Alberto Bayo, the much respected guerilla trainer of Che, had fought during his military career for a relatively long period of time against the Rifis. Castro, yet another role model for Che, mentions in his biography that he read about the battle of Annual, one of the most successful attacks against the Spanish initiated by Abd-el-Krim in 1921. There are also claims that Che had met Abd-el-Krim in 1959 in Cairo. Castro does not mention that he had discussed with Che anything about his readings on the Rif War, but he clearly states that Bayo used to teach in his camp guerilla methods that he had encountered during his assignments in Morocco. However, neither Bayo nor Che (or their biographers) mention that any of the tactics imparted during the training were from the time of Abd-el-Krim's struggle. The only person praised by both men is the Nicaraguan rebel leader Augusto César Sandino. This article compares the tactical teachings of Bayo as well as the operational methods used by Che during his battles in Cuba with the methods applied by the Rifis under Abd-el-Krim's leadership, and highlights a number of tactical similarities. It also finds that the guerilla tactics applied by Sandino have little in common with the methods described by Bayo.
Journal: Terrorism and Political Violence
Pages: 137-159
Issue: 1
Volume: 29
Year: 2017
Month: 1
X-DOI: 10.1080/09546553.2014.997355
File-URL: http://hdl.handle.net/10.1080/09546553.2014.997355
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:1:p:137-159



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1005077_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Giti Zahedzadeh
Author-X-Name-First: Giti
Author-X-Name-Last: Zahedzadeh
Author-Name: Jorge A. Barraza
Author-X-Name-First: Jorge A.
Author-X-Name-Last: Barraza
Author-Name: Paul J. Zak
Author-X-Name-First: Paul J.
Author-X-Name-Last: Zak
Title: Persuasive Narratives and Costly Actions
Abstract: 
 Persuasive narratives can induce some individuals to engage in costly actions. Entrepreneurs of suicide missions frame the necessity of violent behavior within the context of persuasive narratives to attract potential recruits. Herein we report results from an experiment to test factors involved with costly action linked to a persuasive narrative. We recruited 164 participants (M = 21, SD = 5.20) and measured hormones, electrodermal activity, and personality to predict who would be influenced by the narrative's message. We found that the persuasive narrative we tested resulted in costly action by those who are high-perspective takers and are more physiologically aroused by the narrative. The findings fill lacunae in the literature, providing a novel approach to examine costly behavior (like martyrdom missions) in the laboratory.
Journal: Terrorism and Political Violence
Pages: 160-172
Issue: 1
Volume: 29
Year: 2017
Month: 1
X-DOI: 10.1080/09546553.2015.1005077
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1005077
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:1:p:160-172



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1255065_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Conflict and Terrorism in South Asia Since 9/11
Journal: Terrorism and Political Violence
Pages: 173-184
Issue: 1
Volume: 29
Year: 2017
Month: 1
X-DOI: 10.1080/09546553.2016.1255065
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1255065
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:1:p:173-184



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1255070_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Scott Nicholas Romaniuk
Author-X-Name-First: Scott Nicholas
Author-X-Name-Last: Romaniuk
Title: Managing Proliferation: National, Regional, and Global Security in the New Age of Nuclear Weapons
Journal: Terrorism and Political Violence
Pages: 185-194
Issue: 1
Volume: 29
Year: 2017
Month: 1
X-DOI: 10.1080/09546553.2016.1255070
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1255070
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:1:p:185-194



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1255067_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dominic D. Wells
Author-X-Name-First: Dominic D.
Author-X-Name-Last: Wells
Title: David Luban. Torture, Power, and Law
Journal: Terrorism and Political Violence
Pages: 195-196
Issue: 1
Volume: 29
Year: 2017
Month: 1
X-DOI: 10.1080/09546553.2016.1255067
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1255067
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:1:p:195-196

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1008628_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Henar Criado
Author-X-Name-First: Henar
Author-X-Name-Last: Criado
Title: What Makes Terrorism Salient? Terrorist Strategies, Political Competition, and Public Opinion
Abstract: 
 This article analyzes the determinants of terrorism saliency in public opinion. It is usually assumed that after a terrorist attack, terrorism becomes automatically salient. However, this assumption is only true in those countries where terrorist attacks are exceptional events. In democracies that have suffered domestic terrorism for decades, the evolution of terrorism saliency does not only depend on the frequency or intensity of terrorist attacks. In this article it is claimed that the tactics carried out by terrorist groups (the type of victim, especially) and the dynamics of political competition (especially the ideology of the incumbent) are also factors that explain the evolution of terrorism saliency. The article also analyzes how these two factors interact with citizens’ predispositions to explain variation in their reactions to terrorist threat. The empirical test relies on a novel database from monthly public opinion surveys in Spain from 1993 to 2012.
Journal: Terrorism and Political Violence
Pages: 197-214
Issue: 2
Volume: 29
Year: 2017
Month: 3
X-DOI: 10.1080/09546553.2015.1008628
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1008628
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:2:p:197-214



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1011799_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Becker
Author-X-Name-First: Michael
Author-X-Name-Last: Becker
Title: Why Violence Abates: Imposed and Elective Declines in Terrorist Attacks
Abstract: 
 Previous scholarship on variations in violence within a given terrorist organization has primarily focused on factors that lead to the inception or destruction of that organization. However, violence varies substantially even during the “prime” of an organization's life. This article aims to understand why violence varies in the short term within many organizations, and places a special focus on declines in violence. Specifically, I argue that terrorists face countervailing incentives in terms of how much violence to use, and that when declines in violent activity do occur, they can be divided into two types: a) elective declines, which are usually temporary and used for organizational or reputational recovery; and b) imposed declines, which are dictated by changes in the relative capability of an organization, and are more likely to be permanent. The causal pathways to each type of decline are discussed, and a plausibility probe, consisting of case studies of three terrorist organizations, is then developed to substantiate this theory. The findings have notable implications for counterterrorism policy, as they illustrate not only when and why terrorists choose to curtail violent attacks, but also the conditions that determine whether declines in violence are temporary or permanent.
Journal: Terrorism and Political Violence
Pages: 215-235
Issue: 2
Volume: 29
Year: 2017
Month: 3
X-DOI: 10.1080/09546553.2015.1011799
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1011799
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:2:p:215-235



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1254626_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Zhen Jiang
Author-X-Name-First: Zhen
Author-X-Name-Last: Jiang
Title: Confrontations on the Issue of Terrorism Between Iran and the U.S. after 1979
Abstract: 
 The issue of terrorism has been a significant source of influence on the relationship between Iran and the U.S. since the Islamic Revolution. Iran's friendship with extremist groups that are designated as terrorist groups by the U.S. State Department is seriously challenging America's foreign policy. This article attempts to explore the prospect of confrontations on the issue of terrorism between Iran and the U.S. through a detailed analysis of their different interpretations and mutual recognitions of terrorism and through an in-depth analysis of the measures each party has taken regarding this confrontation. This article argues that the confrontation between Iran and the U.S. regarding the issue of terrorism is not strictly about terrorism. Rather, it is also about the conflicts of policies that result from different security interests and political values. Resolving the issue of terrorism depends on the reconciliation of the relationship between Iran and the U.S. Without mutual trust between the two nations, Iran will continue to support extremist groups in order to increase its influence against the external and internal pressures it is currently under, and the U.S. will continue to contain Iran's regional ambitions and seek changes in its behavior.
Journal: Terrorism and Political Violence
Pages: 236-253
Issue: 2
Volume: 29
Year: 2017
Month: 3
X-DOI: 10.1080/09546553.2016.1254626
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1254626
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:2:p:236-253



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1031374_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Steven T. Zech
Author-X-Name-First: Steven T.
Author-X-Name-Last: Zech
Title: Counter-Terrorizing: The Use of Torture in Peru's Counterterrorism Campaign
Abstract: 
 In this article I identify and evaluate numerous reasons why torture became common practice during the state counterterrorism campaign in Peru between 1980 and 2000, despite international and domestic legal obligations to protect human rights. I describe common structural conditions, organizational factors, and individual-level explanations often associated with torture practices. I then identify seven logics and motivations behind torture use in counterterrorism campaigns. I describe and analyze actual torture use in Peru using quantitative incident-level data, and I provide descriptive statistics concerning variation in the frequency and methods of torture. Finally, I examine specific incidents of torture to illustrate and assess the different logics and motivations for torture. I draw heavily from testimonies collected by Peru's Truth and Reconciliation Commission. I also rely on personal interviews carried out during fieldwork in the Junín and Ayacucho regions of Peru. I find that aggregate torture incidents generally coincide with political developments and shifts in violence levels and that the various state security forces used torture differently. A review of testimonies regarding specific incidents of torture suggests that multiple logics motivate state security forces, even for a single incident of torture, complicating academic efforts to formulate a parsimonious causal explanation.
Journal: Terrorism and Political Violence
Pages: 254-276
Issue: 2
Volume: 29
Year: 2017
Month: 3
X-DOI: 10.1080/09546553.2015.1031374
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1031374
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:2:p:254-276



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1034855_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Julie Chernov Hwang
Author-X-Name-First: Julie
Author-X-Name-Last: Chernov Hwang
Title: The Disengagement of Indonesian Jihadists: Understanding the Pathways
Abstract: 
 While much research has been conducted on the radicalization of Muslim militants from Jemaah Islamiyah, its spinoffs, and splinter factions; the historical roots of Indonesian radical movements; and their ideological underpinnings, far less analysis has centered on how and why individual militants may come to disengage from violence. Disengagement is defined as a gradual process through which a member of a terror group, radical movement, gang, or cult comes to reject the use of terror methods in pursuit of their goals. Utilizing original fieldwork conducted between 2010 and 2014, with fifty current and former members of Islamist extremist groups in Indonesia, this article will unpack the patterns, pathways, religious considerations, and psychological processes that propel individual militants to turn away from violence.
Journal: Terrorism and Political Violence
Pages: 277-295
Issue: 2
Volume: 29
Year: 2017
Month: 3
X-DOI: 10.1080/09546553.2015.1034855
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1034855
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:2:p:277-295



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1035368_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Neil T. N. Ferguson
Author-X-Name-First: Neil T. N.
Author-X-Name-Last: Ferguson
Title: Just the Two of Us? Civil Conflicts, Pro-State Militants, and the Violence Premium
Abstract: 
 Quantitative literature discussing violence in civil conflicts tends towards a typical model of engagement between governments and revolutionaries. Whilst recent work has shown the significant impact of multiple anti-government groups, a further feature remains understudied—the role of pro-state militants. This article theorizes a “violence premium” when such groups arise, which leads to all connected groups devoting greater energy to conflict than they would in isolation. Employing duration analysis and data from The Troubles in Northern Ireland, where Republicans act as revolutionary insurgents, Loyalists as pro-state militants, and the British Army as government forces, the violence premium is empirically confirmed. Both Loyalists and Republicans deviate from their underlying strategies to attack more frequently when violence by their rivals increases, with Republicans and the British Army engaging in the same way. An extended analysis, accounting for the status of the victim, shows that the violence premium resulting from interaction between Loyalists and Republicans targeted only the civilian population of Northern Ireland, elucidating the sectarian component of The Troubles. These results show that including all conflict parties and considering how they are linked are important features in studies that aim to determine the net level of violence in civil conflicts.
Journal: Terrorism and Political Violence
Pages: 296-322
Issue: 2
Volume: 29
Year: 2017
Month: 3
X-DOI: 10.1080/09546553.2015.1035368
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1035368
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:2:p:296-322



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1038523_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sofia Pinero Kluch
Author-X-Name-First: Sofia Pinero
Author-X-Name-Last: Kluch
Author-Name: Alan Vaux
Author-X-Name-First: Alan
Author-X-Name-Last: Vaux
Title: Culture and Terrorism: The Role of Cultural Factors in Worldwide Terrorism (1970–2013)
Abstract: 
 The relationship between terrorism and culture was systematically examined using three high-quality global databases. Contrary to prior research, terrorism—collapsed across form and era—was not related to any of Hofstede's cultural dimensions. Yet, particular forms of terrorism—incidents involving substantial casualties and damage, suicide bombings, and the proportion of incidents involving fatalities—all showed relationships with cultural dimensions. Tolerance of terrorism and relative tolerance of the 9/11 attack were related to cultural dimensions and terrorist events. Finally, populations that were relatively voiceless, disengaged from their communities, suffering, angry, and hopeless showed more tolerance of terrorism and incidents of terrorism.
Journal: Terrorism and Political Violence
Pages: 323-341
Issue: 2
Volume: 29
Year: 2017
Month: 3
X-DOI: 10.1080/09546553.2015.1038523
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1038523
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:2:p:323-341



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1041589_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lawrence P. Markowitz
Author-X-Name-First: Lawrence P.
Author-X-Name-Last: Markowitz
Title: The Resource Curse Reconsidered: Cash Crops and Local Violence in Kyrgyzstan
Abstract: 
 It is often noted in resource curse literature that agricultural economies are less conflict-prone than countries managing mobile, high-value resources. In the vast literature linking resource endowment and conflict, cash crop economies are often considered immune to civil violence, believed to stand apart from the many horrific episodes of violence and civil war centered on “lootable” wealth (such as alluvial diamonds, tin, tungsten, or other conflict minerals). But many incidents of violence—especially local violence—are in fact occurring in cash crop economies. Drawing on newspaper accounts, policy analyses, ethnographic interviews, and in-depth reports by international organizations, I examine an episode of local violence in 2010 in Kyrgyzstan. Through this case study, the article provides a better understanding of local violence in cash crop economies that can apply to other weak states.
Journal: Terrorism and Political Violence
Pages: 342-358
Issue: 2
Volume: 29
Year: 2017
Month: 3
X-DOI: 10.1080/09546553.2015.1041589
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1041589
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:2:p:342-358



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1044602_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Charles David Freilich
Author-X-Name-First: Charles David
Author-X-Name-Last: Freilich
Title: Israel's Counter-Terrorism Policy: How Effective?
Abstract: 
 The percentage of Israelis killed by terrorism is higher than in any other democracy. The article analyzes the threats Israel has faced, the impact terrorism has had on Israel, and the counter-terrorism policies Israel has adopted. Terrorism has had a decisive effect on Israeli elections and national security decisions, but not the economy. Israeli counter-terrorism has often been conducted without a coherent overall policy, has failed to reflect and conflicted with broader objectives, and has greatly undermined Israel's international standing. Conversely, it has enabled Israel to live in relative security and thrive, and provided its leaders with the latitude to pursue various policies, including peace, should they wish to do so.
Journal: Terrorism and Political Violence
Pages: 359-376
Issue: 2
Volume: 29
Year: 2017
Month: 3
X-DOI: 10.1080/09546553.2015.1044602
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1044602
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:2:p:359-376



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1277663_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Danielle Gilbert
Author-X-Name-First: Danielle
Author-X-Name-Last: Gilbert
Title: Organized Violence Between War and Peace
Journal: Terrorism and Political Violence
Pages: 377-383
Issue: 2
Volume: 29
Year: 2017
Month: 3
X-DOI: 10.1080/09546553.2016.1277663
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1277663
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:2:p:377-383



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1277666_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alisa Stack
Author-X-Name-First: Alisa
Author-X-Name-Last: Stack
Title: Jean E. Rosenfeld (Ed.). Terrorism, Identity and Legitimacy: The Four Waves Theory and Political Violence
Journal: Terrorism and Political Violence
Pages: 384-385
Issue: 2
Volume: 29
Year: 2017
Month: 3
X-DOI: 10.1080/09546553.2016.1277666
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1277666
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:2:p:384-385



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1277668_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daveed Gartenstein-Ross
Author-X-Name-First: Daveed
Author-X-Name-Last: Gartenstein-Ross
Title: Sean McFate. The Modern Mercenary: Private Armies and What They Mean for World Order
Journal: Terrorism and Political Violence
Pages: 385-386
Issue: 2
Volume: 29
Year: 2017
Month: 3
X-DOI: 10.1080/09546553.2016.1277668
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1277668
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:2:p:385-386



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1277665_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Joby Warrick. Black Flags: The Rise of ISIS
Journal: Terrorism and Political Violence
Pages: 387-389
Issue: 2
Volume: 29
Year: 2017
Month: 3
X-DOI: 10.1080/09546553.2016.1277665
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1277665
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:2:p:387-389



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1277669_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David C. Hofmann
Author-X-Name-First: David C.
Author-X-Name-Last: Hofmann
Title: Paul Gill. Lone-Actor Terrorists: A Behavioural Analysis
Journal: Terrorism and Political Violence
Pages: 389-390
Issue: 2
Volume: 29
Year: 2017
Month: 3
X-DOI: 10.1080/09546553.2016.1277669
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1277669
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:2:p:389-390



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1277670_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Donald D. Denton
Author-X-Name-First: Donald D.
Author-X-Name-Last: Denton
Title: V. Ward and R. Sherlock, eds. Religion and Terrorism: The Use of Violence in Abrahamic Monotheism
Journal: Terrorism and Political Violence
Pages: 390-391
Issue: 2
Volume: 29
Year: 2017
Month: 3
X-DOI: 10.1080/09546553.2016.1277670
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1277670
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:2:p:390-391

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1314161_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David C. Rapoport
Author-X-Name-First: David C.
Author-X-Name-Last: Rapoport
Title: President Donald J. Trump Symposium
Journal: Terrorism and Political Violence
Pages: 393-393
Issue: 3
Volume: 29
Year: 2017
Month: 5
X-DOI: 10.1080/09546553.2017.1314161
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1314161
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:3:p:393-393



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1304757_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jean E. Rosenfeld
Author-X-Name-First: Jean E.
Author-X-Name-Last: Rosenfeld
Title: Fascism as Action through Time (Or How It Can Happen Here)
Abstract: 
 The purpose of this paper is to discuss how fascism may be identified by its actions, the stages through which a fascist rule takes power, and how to recognize it before it does so. The thesis is that a fascist takeover of a democratic government is rapid and unexpected. Its goal is a revolutionary reversal of representative government in the name of the people, while it accomplishes the opposite: a single-party corporate regime that replaces individual liberty with subtle, bureaucratic, and overt types of coercion. Rather than generate a generic definition of the many types of fascism, it is more useful to study how it affects the lives of ordinary people, the milieu out of which it develops, and what its precursors look like. Understanding fascism entails studying it from the point of view of those who lived under it and recorded their experiences, as well as from the analytic perspectives of social scientists. As Robert O. Paxton observes: “The fascist phenomenon was poorly understood at the beginning in part because it was unexpected.”1 We are facing the question again in 2017 with the surprise election of Donald Trump as the forty-fifth president of the United States by a minority of the popular vote and the evident support of the white nationalist milieu. Paxton proposes a five-stage theory for understanding fascism in its many varieties. A developmental sequence is proposed against which current events in the United States may be assessed.
Journal: Terrorism and Political Violence
Pages: 394-410
Issue: 3
Volume: 29
Year: 2017
Month: 5
X-DOI: 10.1080/09546553.2017.1304757
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1304757
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:3:p:394-410



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1304759_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeffrey Kaplan
Author-X-Name-First: Jeffrey
Author-X-Name-Last: Kaplan
Title: Red Dawn is Now: Race vs. Nation and the American Election
Abstract: 
 This article details the long-standing struggle within the American far right between those whose mission it is to resist the perceived subversion of international communism and its neo-Soviet successors now in power in the Kremlin and those whose mission is dedicated to preserving the White Race from the twin threats of miscegenation and marginalization from the corridors of power. Using the metaphor of the 1984 low-budget spectacular Red Dawn and noting the current pattern of Russian interference in the election and contacts with the Trump campaign, it traces the struggle from the ascendancy of anti-communism in the 1950s and 1960s to the current triumph of the race warriors and conspiracy theorists who championed the candidacy of Donald Trump. “Red Dawn Is Now” concludes with the observation that, for those who most fear foreign subversion, the revelations about Russian penwetration of the American election process and the Trump presidency represents a 21st-century version of the Soviet occupation that the young patriots of Red Dawn fame successfully repelled. If this is so, it suggests the possibility that Thomas Jefferson's observation that “the tree of liberty must be refreshed from time to time with the blood of patriots & tyrants” may be prophetic and that the fifth wave of terrorism might at long last be at hand.
Journal: Terrorism and Political Violence
Pages: 411-424
Issue: 3
Volume: 29
Year: 2017
Month: 5
X-DOI: 10.1080/09546553.2017.1304759
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1304759
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:3:p:411-424



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1304760_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ellen Strenski
Author-X-Name-First: Ellen
Author-X-Name-Last: Strenski
Title: It Can't Happen Here,1 or Has It? Sinclair Lewis's Fascist America
Abstract: 
 Sinclair Lewis, the first American to win the Nobel Prize in Literature, anticipated many aspects of Donald J. Trump's 2016 campaign and election in his 1935 satirical dystopia, It Can't Happen Here. It was his most popular novel to date and is still satisfying, thought-provoking political theater. Lewis was influenced by growing totalitarianism in Europe, reported on by his second wife, foreign correspondent, Dorothy Thompson. Noting the power of Father Coughlin and Huey Long, among others, to mobilize a public still suffering from the Great Depression, Lewis feared a fascist takeover of the American government by democratic means. Lewis's fictional nightmare features a loutish, ignorant demagogue, who is manipulated by a sinister ghostwriter adviser. With support from a resentful League of Forgotten Men, the demagogue is elected President and quickly establishes a military, racist, and anti-Semitic dictatorship. It Can't Happen Here dramatizes the dire consequences of this takeover, which is not taken seriously at first by Lewis's newspaper editor protagonist, but then is increasingly resisted. Lewis is a social satirist in the Mark Twain tradition, and his novel is worth reading today for its suggestive parallels with current history and its good-hearted humor.
Journal: Terrorism and Political Violence
Pages: 425-436
Issue: 3
Volume: 29
Year: 2017
Month: 5
X-DOI: 10.1080/09546553.2017.1304760
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1304760
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:3:p:425-436



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1313649_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Barkun
Author-X-Name-First: Michael
Author-X-Name-Last: Barkun
Title: President Trump and the “Fringe”
Abstract: 
 The “fringe”—rejected and marginalized ideas and beliefs—has historically been clearly divided from the cultural and political mainstream. However, recent technological developments have weakened the boundary separating them. The Internet and social media have made it possible for fringe ideas to move much more readily into the mainstream. The Trump campaign was accompanied by the massive infusion of fringe motifs including the denigration of ethnic and religious groups; the support of political extremists; and the acceptance of conspiracy theories. As the fringe becomes legitimated by this mainstreaming, the possibilities for violence increase.
Journal: Terrorism and Political Violence
Pages: 437-443
Issue: 3
Volume: 29
Year: 2017
Month: 5
X-DOI: 10.1080/09546553.2017.1313649
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1313649
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:3:p:437-443



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1043996_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Paul Kamolnick
Author-X-Name-First: Paul
Author-X-Name-Last: Kamolnick
Title: How Muslim Defenders Became “Blood Spilling” Crusaders: Adam Gadahn's Critique of the “Jihadist” Subversion of Al Qaeda's Media Warfare Strategy
Abstract: 
 Adam Gadahn's Abbottabad letter offers a rare opportunity to examine how this Al Qaeda Senior Leadership (AQSL) media operative and spokesman conceptualizes and executes media warfare. In this article, I first introduce, depict, and employ the author's Terrorist Quadrangle Analysis (TQA) as a useful heuristic for conceptualizing and representing the four interrelated components of the AQSL terrorist enterprise: political objectives, media warfare, terrorist attacks, and strategic objectives. This TQA construct is then employed to conceptualize Gadahn's media warfare acumen. Gadahn is shown to be an adept communications warfare operative who conscientiously disaggregates and evaluates key target audiences, messengers, messaging, and media. Gadahn's vehement critique of select “jihadi” groups, in particular Tehrik-i-Taliban (TTP), al-Shabaab, and the Islamic State of Iraq (ISI), is then described. Key here is how and why Gadahn denounces their indiscriminate, murderous terrorist attacks on Muslim non-combatant civilians and other protected persons as effectively subverting his intended AQSL media warfare strategy and undermining AQSL strategic and religio-political objectives. A concluding section briefly summarizes these chief findings, offers select implications for scholarship and counter-AQSL messaging strategy, and identifies study limitations.
Journal: Terrorism and Political Violence
Pages: 444-463
Issue: 3
Volume: 29
Year: 2017
Month: 5
X-DOI: 10.1080/09546553.2015.1043996
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1043996
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:3:p:444-463



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1049342_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Orla Lynch
Author-X-Name-First: Orla
Author-X-Name-Last: Lynch
Author-Name: Javier Argomaniz
Author-X-Name-First: Javier
Author-X-Name-Last: Argomaniz
Title: Victims of Terrorism and Political Violence: Identity, Needs, and Service Delivery in Northern Ireland and Great Britain
Abstract: 
 Terrorism and political violence exist fundamentally as communicative acts; inherently the acts themselves serve to inspire anxiety and fear. As the recipients of such a communicative act, victims of terrorism and political violence serve as the vehicle for the dissemination of these communications to both the intended and broader audiences. Their victimising experience is thus a complex interplay between a profound personal trauma and the political/communicative dimension of the attack. Given this complexity, this article addresses how victims’ needs are understood by victims of terrorism and political violence in both Northern Ireland (NI) and Great Britain (GB). Through engagement with practitioners, victims, survivors, and community activists, this article conceptualises the existing perceptions amongst these different groups regarding needs, the delivery of services to victims in NI and GB, and examines the origins of the different approaches. Results demonstrate that victims’ needs are highly context-dependent at a public level, but relate heavily to the experiences of other victims of terrorism and political violence at a private level.
Journal: Terrorism and Political Violence
Pages: 464-482
Issue: 3
Volume: 29
Year: 2017
Month: 5
X-DOI: 10.1080/09546553.2015.1049342
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1049342
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:3:p:464-482



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1049343_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kevin Neil Buterbaugh
Author-X-Name-First: Kevin Neil
Author-X-Name-Last: Buterbaugh
Author-Name: Costel Calin
Author-X-Name-First: Costel
Author-X-Name-Last: Calin
Author-Name: Theresa Marchant-Shapiro
Author-X-Name-First: Theresa
Author-X-Name-Last: Marchant-Shapiro
Title: Predicting Revolt: Fragility Indexes and the Level of Violence and Instability in the Arab Spring
Abstract: 
 This article is one of the first to systematically assess the ability of state fragility measures to predict violent protests and adverse regime changes in countries. We focus on the Arab Spring as an example of a situation that such measures ought to predict. Through a variety of analyses, we find that none of the measures are predictive. We then create a simple model using the literature of protest and revolts to predict both the level of violence and the extent of regime change in the Arab Spring countries. This simpler model does a better job of predicting the level of involvement in the Arab Spring than any of the complex State Fragility Indexes. Thus, the goal of this article is not to explain the causes of the Arab Spring, but to add to the discussion of the predictive value of measures of instability.
Journal: Terrorism and Political Violence
Pages: 483-508
Issue: 3
Volume: 29
Year: 2017
Month: 5
X-DOI: 10.1080/09546553.2015.1049343
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1049343
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:3:p:483-508



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1050489_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Burcu Pinar Alakoc
Author-X-Name-First: Burcu Pinar
Author-X-Name-Last: Alakoc
Title: Competing to Kill: Terrorist Organizations Versus Lone Wolf Terrorists
Abstract: 
 Are organizationally linked suicide attacks deadlier than those launched by lone wolf terrorists? This article elaborates a perpetrator-based distinction among suicide terrorist attacks between organizations and lone wolf terrorists, who operate in the absence of a financially or physically supportive terrorist organization. The expectation is that terrorist organizations would serve as commitment tools that increase the loyalty of suicide bombers to their missions through material and non-material incentives. Findings demonstrate that when terrorist organizations are involved in the planning and execution of suicide terrorist attacks, not only do they increase the lethality of these attacks but they also accentuate the tactical advantages of suicide terrorism. These findings suggest that despite the recent upsurge and concern about lone wolf terrorism, the lethality and security impacts of suicide terrorism continue to be driven by terrorist organizations.
Journal: Terrorism and Political Violence
Pages: 509-532
Issue: 3
Volume: 29
Year: 2017
Month: 5
X-DOI: 10.1080/09546553.2015.1050489
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1050489
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:3:p:509-532



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1054927_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Brian J. Phillips
Author-X-Name-First: Brian J.
Author-X-Name-Last: Phillips
Title: Deadlier in the U.S.? On Lone Wolves, Terrorist Groups, and Attack Lethality
Abstract: 
 Scholars, politicians, and pundits increasingly suggest lone wolf terrorists are substantial threats, but we know little about how dangerous these actors are—especially relative to other terrorist actors. How deadly are lone actor terrorists? A growing body of empirical research focuses on terrorist organizations, but similar work on lone actors is sparse. Furthermore, attempts to explicitly compare these or other types of terrorist actors are almost non-existent. This article considers theoretical arguments for why lone wolves ought to be especially lethal. However, it presents an argument for why terrorist groups should generally be more lethal. This argument is conditional upon the environment in which actors operate. Lone wolves should only be more deadly in states with especially strong counterterrorism capacity. The article uses data on terrorist attacks in fifteen developed countries, 1970–2010, to compare the lethality of terrorist acts. Around the world, attacks by organizations tend to be far more lethal than attacks by other actors. In the United States, however, lone wolves are generally the more lethal terrorist actors. This is argued to be because the robust counterterrorism capacity makes organized terrorism more difficult to accomplish.
Journal: Terrorism and Political Violence
Pages: 533-549
Issue: 3
Volume: 29
Year: 2017
Month: 5
X-DOI: 10.1080/09546553.2015.1054927
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1054927
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:3:p:533-549



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1058788_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Frederic S. Pearson
Author-X-Name-First: Frederic S.
Author-X-Name-Last: Pearson
Author-Name: Isil Akbulut
Author-X-Name-First: Isil
Author-X-Name-Last: Akbulut
Author-Name: Marie Olson Lounsbery
Author-X-Name-First: Marie
Author-X-Name-Last: Olson Lounsbery
Title: Group Structure and Intergroup Relations in Global Terror Networks: Further Explorations
Abstract: 
 Studies have begun to look at the potentially crucial impacts of group decentralization and inter-group global networking in accounting for the extent and severity of violence in insurgencies and terrorism. Groups may be able to survive more effectively, evade anti-terror or counter-insurgency strategies, and inflict greater damage or more civilian attacks by operating under more or less centralized leadership, or by making use of the resources of other like-minded groups scattered across borders. While some analysts have examined each of these possibilities, few if any have done so simultaneously with both structural and networking indicators or examined the joint effects of these indicators. We propose to do so in this study by combining existing datasets on terrorist structure and networks. Hypotheses and findings in prior studies have indicated that structural decentralization may lead to more civilian attacks if not more destruction since local cells are freer to act on their own, and that group size and centrality in the global terror networks lead to greater lethality and group survival rates. We re-examine such assumptions here with OLS and logit models combining these effects, and find that in addition to group size, network reach (eigenvalue centrality) rather than group interconnections per se (number of allies) appears to have primary impacts on group lethality, targeting, and survival, sometimes in conjunction with decentralized organizational structure.
Journal: Terrorism and Political Violence
Pages: 550-572
Issue: 3
Volume: 29
Year: 2017
Month: 5
X-DOI: 10.1080/09546553.2015.1058788
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1058788
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:3:p:550-572

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1005076_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jean-François Ratelle
Author-X-Name-First: Jean-François
Author-X-Name-Last: Ratelle
Author-Name: Emil Aslan Souleimanov
Author-X-Name-First: Emil Aslan
Author-X-Name-Last: Souleimanov
Title: Retaliation in Rebellion: The Missing Link to Explaining Insurgent Violence in Dagestan
Abstract: 
 This article posits that the remnants of archaic sociocultural norms, particularly the honour-imposed custom of retaliation, play a crucial role in the process of insurgent engagement in Russia's autonomous republic of Dagestan. Through a series of interviews with former insurgents, this study outlines two retaliation-centred mechanisms: “individual retaliation” and “spiritual retaliation” in order to explain the microcosm of motives behind insurgent activity in Dagestan. In doing so, this study problematizes the role of Salafi/Jihadist ideology as the main impetus for insurgent violence. Reversing the traditional causal link between violence and religion, this study also demonstrates that the development of Jihadist ideology is a by-product of insurgent mobilization rather than its cause.
Journal: Terrorism and Political Violence
Pages: 573-592
Issue: 4
Volume: 29
Year: 2017
Month: 7
X-DOI: 10.1080/09546553.2015.1005076
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1005076
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:4:p:573-592



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1005741_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Emma Leonard Boyle
Author-X-Name-First: Emma
Author-X-Name-Last: Leonard Boyle
Title: Was Idi Amin's Government a Terrorist Regime?
Abstract: 
 What does state terrorism look like? How do we distinguish it from other forms of mass state violence, such as repression or genocide? Based on the developing literature on state terrorism, this study presents three expectations that violence perpetrated by the state should meet if it is to be classified as state terrorism: these are (a) that the violence is perpetrated by agents of the state, (b) that the violence is visible, and (c) that state terrorism focused against a state's own citizens will be carried out by an autocratic, personalistic regime. Drawing substantially on a series of primary sources, this study demonstrates that Idi Amin's regime in Uganda from 1971 to 1979 did engage in state terrorism against its own citizens.
Journal: Terrorism and Political Violence
Pages: 593-609
Issue: 4
Volume: 29
Year: 2017
Month: 7
X-DOI: 10.1080/09546553.2015.1005741
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1005741
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:4:p:593-609



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1005742_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Suranjan Weeraratne
Author-X-Name-First: Suranjan
Author-X-Name-Last: Weeraratne
Title: Theorizing the Expansion of the Boko Haram Insurgency in Nigeria
Abstract: 
 This research investigates the dramatic expansion of the Boko Haram insurgency in Nigeria in the last few years. Militant activity has expanded in terms of frequency and severity of attacks, geographic scope, target selection, and strategies used. The evolution of the group and the trajectory of violence are best explained through four overlapping theoretical strands. These include the growing fragmentation of the movement, development of strategic ties with Al Qaeda affiliates, strong-armed counterterrorism operations that further radicalized the movement, and exploitation of the porous border area that separates Nigeria from its northern neighbors.
Journal: Terrorism and Political Violence
Pages: 610-634
Issue: 4
Volume: 29
Year: 2017
Month: 7
X-DOI: 10.1080/09546553.2015.1005742
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1005742
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:4:p:610-634



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1043429_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Matthew Lewis
Author-X-Name-First: Matthew
Author-X-Name-Last: Lewis
Author-Name: Shaun McDaid
Author-X-Name-First: Shaun
Author-X-Name-Last: McDaid
Title: Bosnia on the Border? Republican Violence in Northern Ireland During the 1920s and 1970s
Abstract: 
 Unionist politicians have argued that Republican political violence on the Irish border, during both the partition of Ireland and more recent Northern Ireland conflict, constituted ethnic cleansing and genocide against the Protestant/Unionist community in those areas. These views have been bolstered by an increasingly ambivalent scholarly literature that has failed to adequately question the accuracy of these claims. This article interrogates the ethnic cleansing/genocide narrative by analysing Republican violence during the 1920s and the 1970s. Drawing from a wide range of theoretical literature and archival sources, it demonstrates that Republican violence fell far short of either ethnic cleansing or genocide, (in part) as a result of the perpetrators’ self-imposed ideological constraints. It also defines a new interpretive concept for the study of violence: functional sectarianism. This concept is designed to move scholarly discussion of political and sectarian violence beyond the highly politicised and moral cul-de-sacs that have heretofore characterised the debate, and has implications for our understanding of political violence beyond Ireland.
Journal: Terrorism and Political Violence
Pages: 635-655
Issue: 4
Volume: 29
Year: 2017
Month: 7
X-DOI: 10.1080/09546553.2015.1043429
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1043429
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:4:p:635-655



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1058789_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mark Shirk
Author-X-Name-First: Mark
Author-X-Name-Last: Shirk
Title: How Does Violence Threaten the State? Four Narratives on Piracy
Abstract: 
 Violence characterized by similar actions, actor motivations, group structures, or level of damage still poses qualitatively distinct genera of threats to states. For instance, “terrorism” can threaten a particular state, be used by a state, or threaten the entire state system. Building on the threat construction literature, this study argues that threat is best understood through narratives on the relationship between violence and the boundary-producing practices that construct the state. Four ideal-typical basic narratives on this relationship are produced—entrant, resource, revisionist, and criminal. Each narrative is then demonstrated by looking at how it was used in a historical case of piracy. The action (piracy as raiding at sea) is held constant while the threat in each varies with the narrative. Understanding how threat is narratively constructed can help us to understand particular historical episodes of violence and state responses to them.
Journal: Terrorism and Political Violence
Pages: 656-673
Issue: 4
Volume: 29
Year: 2017
Month: 7
X-DOI: 10.1080/09546553.2015.1058789
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1058789
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:4:p:656-673



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1060226_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bahar Baser
Author-X-Name-First: Bahar
Author-X-Name-Last: Baser
Title: Tailoring Strategies According to Ever-Changing Dynamics: The Evolving Image of the Kurdish Diaspora in Germany
Abstract: 
 Germany might be considered as the European country that has suffered the most from the spatial diffusion of Turkey's internal conflicts. It has received the highest number of Kurdish migrants in Europe and it became the core of Kurdish mobilization in transnational space. Germany's approach to the Kurdish Question on its own soil—combined with the strategies that the Kurdish activists used—determined the scope of opportunity structures for the mobilization of the Kurdish movement. This article explains how Kurdish activism has come to be perceived in Germany, and analyzes the German political environment by focusing on the criminalization and stigmatization of the Kurdish movement, especially during the 1990s. It then describes the discursive shift and change in framing strategies that the Kurdish diaspora experienced after the capture of the the Kurdistan Workers' Party's (PKK) leader in 1999. Lastly, it touches upon the recent developments in the Middle East, especially in Kobane, and their impact on the image of the Kurdish movement. The article is based on extensive fieldwork in Germany and includes testimonies of Kurdish diaspora activists, with a focus on their own perceptions about their situation and how they respond to securitization policies in the host country.
Journal: Terrorism and Political Violence
Pages: 674-691
Issue: 4
Volume: 29
Year: 2017
Month: 7
X-DOI: 10.1080/09546553.2015.1060226
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1060226
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:4:p:674-691



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1064397_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andrew Silke
Author-X-Name-First: Andrew
Author-X-Name-Last: Silke
Author-Name: Jennifer Schmidt-Petersen
Author-X-Name-First: Jennifer
Author-X-Name-Last: Schmidt-Petersen
Title: The Golden Age? What the 100 Most Cited Articles in Terrorism Studies Tell Us
Abstract: 
 In a context where widespread failings in the nature of terrorism research are well recognised—yet where the quantity of work is still enormous—is it possible to fairly assess whether the field is progressing or if it has become mired in mediocre research? Citation analysis is widely used to reveal the evolution and extent of progress in fields of study and to provide valuable insight into major trends and achievements. This study identifies and analyses the current 100 most cited journal articles in terrorism studies. A search was performed using Google Scholar for peer-reviewed journal articles on subjects related to terrorism and counter-terrorism. The most cited articles were published across sixty-two journals, which reflected the interdisciplinary nature of terrorism studies. Compared to other articles, the most cited articles were more likely to be the result of collaborative research and were also more likely to provide new data. Sixty-three of the top 100 articles have been published since 2001. The findings are discussed in relation to the evolution of terrorism research and current debates on progress in the field.
Journal: Terrorism and Political Violence
Pages: 692-712
Issue: 4
Volume: 29
Year: 2017
Month: 7
X-DOI: 10.1080/09546553.2015.1064397
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1064397
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:4:p:692-712



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1064398_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sarah E. Knight
Author-X-Name-First: Sarah E.
Author-X-Name-Last: Knight
Author-Name: Carys Keane
Author-X-Name-First: Carys
Author-X-Name-Last: Keane
Author-Name: Amy Murphy
Author-X-Name-First: Amy
Author-X-Name-Last: Murphy
Title: Adversary Group Decision-Making Regarding Choice of Attack Methods: Expecting the Unexpected
Abstract: 
 Anticipating whether an adversary group will continue to use their usual (“conventional”), expected attack methods is important for military and counterterrorism practitioners tasked with protecting the security of others. Conventional attack methods are by their nature easier to plan and prepare for whilst “innovative” methods may take those responsible for security and counterterrorism by surprise and, as such, may have more impact and more serious consequences. The present study aimed to develop understanding of how, when, and why adversary groups might decide to use conventional attack methods or opt to do something innovative instead. A literature review was conducted and findings were applied to develop a thorough understanding of the decision-making process that underlies an adversary group's choice of attack method. Identified are three stages preceding the execution of an attack: a) “strategic direction”; b) “incubation”; and c) “planning and preparation,” plus “overarching” and “contextual” factors that can influence the process at each stage. It is suggested that it is these factors and how they influence decision-making that result in innovative methods being used to execute an attack, or convention prevailing. Findings can aid practitioners and policy-makers in counterterrorism, security, and law enforcement, to support their understanding, evaluation, and countering of current and future threats.
Journal: Terrorism and Political Violence
Pages: 713-734
Issue: 4
Volume: 29
Year: 2017
Month: 7
X-DOI: 10.1080/09546553.2015.1064398
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1064398
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:4:p:713-734



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1050325_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard Bach Jensen
Author-X-Name-First: Richard Bach
Author-X-Name-Last: Jensen
Title: The Secret Agent, International Policing, and Anarchist Terrorism: 1900–1914
Abstract: 
 An unprecedented expansion of global anti-terrorist policing took place after 1900, although the security forces projected outside their borders by Russia, Italy, Germany, Austria-Hungary, Spain, and Argentina displayed an enormous diversity in size and effectiveness. Crucial to successful policing was how these countries improved their intelligence through recruiting and handling informers, maintained secrecy and good relations with local police, and handled the media. The British approach to anarchist control was arguably the most successful. Italian international policing was the most far-reaching, while the United States long remained the world's most under-policed large country. On examination, the view that anti-anarchist policing was a case of conservative imperial regimes versus the Western democracies loses validity. During this period, a general trend saw the transfer of anarchist surveillance from the hands of diplomats into those of interior ministry officials and the police, all in the name of greater centralization, professionalization, and efficiency.
Journal: Terrorism and Political Violence
Pages: 735-771
Issue: 4
Volume: 29
Year: 2017
Month: 7
X-DOI: 10.1080/09546553.2015.1050325
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1050325
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:4:p:735-771

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1008629_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Johannes Due Enstad
Author-X-Name-First: Johannes Due
Author-X-Name-Last: Enstad
Title: “Glory to Breivik!”: The Russian Far Right and the 2011 Norway Attacks
Abstract: 
 This article documents Anders Behring Breivik's reception on the Russian far Right, with a comparative view to Western Europe. On July 22, 2011, Breivik carried out two terrorist attacks in Norway, killing 77 people. Based on a variety of open sources, the article finds that Breivik has received much more open support in Russia than in Western Europe. I suggest there are three main reasons why Russia stands out. First, a weaker social stigma attached to Right-Wing extremism reduces the cost of publicly embracing Right-Wing terrorists. Second, higher levels of violence in Russian society increase desensitization and violence acceptance. Third, the embrace of Breivik fits into a vibrant tradition of iconizing Right-Wing militants on the Russian far Right. The article highlights Russia as a hotspot of Right-Wing extremist activism in Europe. It also provides insights that may prove useful in future comparative research on cross-national variation in Right-Wing violence and terrorism.
Journal: Terrorism and Political Violence
Pages: 773-792
Issue: 5
Volume: 29
Year: 2017
Month: 9
X-DOI: 10.1080/09546553.2015.1008629
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1008629
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:5:p:773-792



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1049341_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Steven Tauber
Author-X-Name-First: Steven
Author-X-Name-Last: Tauber
Author-Name: Christopher Banks
Author-X-Name-First: Christopher
Author-X-Name-Last: Banks
Title: The Impact of the Threat of Terrorism on U.S. District Court Decisions During Wartime
Abstract: 
 Federal courts are key actors in the U.S. government’s fight against terrorism because they adjudicate cases based on the USA PATRIOT Act, and accordingly make national security policy. We examine the extent that the terror threat influences judicial decisions in a dataset of 111 USA PATRIOT Act cases decided in the U.S. District Courts from 2001 through 2013, while controlling for other judicial decision-making variables. The results demonstrate that when a case involves a heightened terror threat, federal judges are more likely to defer to the government. Some key control variables are also significant.
Journal: Terrorism and Political Violence
Pages: 793-829
Issue: 5
Volume: 29
Year: 2017
Month: 9
X-DOI: 10.1080/09546553.2015.1049341
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1049341
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:5:p:793-829



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1069671_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Max Abrahms
Author-X-Name-First: Max
Author-X-Name-Last: Abrahms
Author-Name: Jochen Mierau
Author-X-Name-First: Jochen
Author-X-Name-Last: Mierau
Title: Leadership Matters: The Effects of Targeted Killings on Militant Group Tactics
Abstract: 
 Targeted killings have become a central component of counterterrorism strategy. In response to the unprecedented prevalence of this strategy around the world, numerous empirical studies have recently examined whether “decapitating” militant groups with targeted killings is strategically effective. This study builds on that research program by examining the impact of targeted killings on militant group tactical decision-making. Our empirical strategy exploits variation in the attack patterns of militant groups conditional on whether a government’s targeted killing attempt succeeded against them operationally. In both the Afghanistan-Pakistan and Israel-West Bank-Gaza Strip theaters, targeted killings significantly alter the nature of militant group violence. When their leaderships are degraded with a successful strike, militant groups become far less discriminate in their target selection by redirecting their violence from military to civilian targets. We then analyze several potential causal mechanisms to account for these results and find strongest evidence that targeted killings tend to promote indiscriminate organizational violence by empowering lower level members with weaker civilian restraint.
Journal: Terrorism and Political Violence
Pages: 830-851
Issue: 5
Volume: 29
Year: 2017
Month: 9
X-DOI: 10.1080/09546553.2015.1069671
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1069671
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:5:p:830-851



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1075979_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David Webber
Author-X-Name-First: David
Author-X-Name-Last: Webber
Author-Name: Kristen Klein
Author-X-Name-First: Kristen
Author-X-Name-Last: Klein
Author-Name: Arie Kruglanski
Author-X-Name-First: Arie
Author-X-Name-Last: Kruglanski
Author-Name: Ambra Brizi
Author-X-Name-First: Ambra
Author-X-Name-Last: Brizi
Author-Name: Ariel Merari
Author-X-Name-First: Ariel
Author-X-Name-Last: Merari
Title: Divergent Paths to Martyrdom and Significance Among Suicide Attackers
Abstract: 
 This research used open source information to investigate the motivational backgrounds of 219 suicide attackers from various regions of the world. We inquired as to whether the attackers exhibited evidence for significance quest as a motive for their actions, and whether the eradication of significance loss and/or the aspiration for significance gain systematically differed according to attackers’ demographics. It was found that the specific nature of the significance quest motive varied in accordance with attackers’ gender, age, and education. Whereas Arab-Palestinians, males, younger attackers, and more educated attackers seem to have been motivated primarily by the possibility of significance gain, women, older attackers, those with little education, and those hailing from other regions seem to have been motivated primarily by the eradication of significance loss. Analyses also suggested that the stronger an attacker’s significance quest motive, the greater the effectiveness of their attack, as measured by the number of casualties. Methodological limitations of the present study were discussed, and the possible directions for further research were indicated.
Journal: Terrorism and Political Violence
Pages: 852-874
Issue: 5
Volume: 29
Year: 2017
Month: 9
X-DOI: 10.1080/09546553.2015.1075979
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1075979
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:5:p:852-874



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1087399_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sebastian Jäckle
Author-X-Name-First: Sebastian
Author-X-Name-Last: Jäckle
Author-Name: Marcel Baumann
Author-X-Name-First: Marcel
Author-X-Name-Last: Baumann
Title: “New Terrorism” = Higher Brutality? An Empirical Test of the “Brutalization Thesis”
Abstract: 
 This article focuses on the so-called “brutalization” of terrorism. The brutalization thesis as part of the larger theoretical concept of “new terrorism” argues that “new terrorism” is more brutal than “old terrorism.” Many scholars claim that the 9/11 attacks mark the beginning of a new era of terrorism that has lifted international as well as domestic terrorism to a new level of violent brutality. Others argue that this process had already started in the early 1990s. After discussing possible ways to operationalize a brutalization of terrorism, for example focusing on suicide bombings or terrorist attacks against soft targets, this article tests the empirical credibility of the brutalization thesis regarding both potential starting points. Data from the Global Terrorism Database (GTD) shows that only three out of nine indicators increased significantly during the 1990s, partially backing the idea of a general brutalization, whereas increasing numbers of suicide attacks and beheadings after 9/11 support the notion of a qualitative change in terrorism and its brutality connected with the idea of maximizing media and public attention. Yet, these developments are regionally limited and the brutality of this “new terrorism” exceeds the levels known from the zenith of “old terrorism” in the 1970s and 1980s in only a few cases.
Journal: Terrorism and Political Violence
Pages: 875-901
Issue: 5
Volume: 29
Year: 2017
Month: 9
X-DOI: 10.1080/09546553.2015.1087399
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1087399
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:5:p:875-901



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1089863_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Christian Leuprecht
Author-X-Name-First: Christian
Author-X-Name-Last: Leuprecht
Author-Name: Olivier Walther
Author-X-Name-First: Olivier
Author-X-Name-Last: Walther
Author-Name: David B. Skillicorn
Author-X-Name-First: David B.
Author-X-Name-Last: Skillicorn
Author-Name: Hillary Ryde-Collins
Author-X-Name-First: Hillary
Author-X-Name-Last: Ryde-Collins
Title: Hezbollah’s Global Tentacles: A Relational Approach to Convergence with Transnational Organized Crime
Abstract: 
 That terrorists, criminals, and their facilitators exploit the global marketplace is well known. While the global movement of illicit goods is well documented, robust empirical evidence linking terrorism and organized crime remains elusive. This article posits Network Science as a means of making these links more apparent. As a critical case study, Hezbollah is quite possibly the most mature globalized terrorist organization, although it thinks of itself as the “Party of God.” However, the means seem to justify the ends: this article shows that Hezbollah’s holy men have no qualms about resorting to pornography, contraband cigarettes, immigration fraud, and credit card fraud to raise funds. Beyond establishing links, Social Network Analysis reveals other important characteristics, such as the relative autonomy from Hezbollah headquarters that local fundraising networks enjoy. That finding implies a paradigm shift: Hezbollah is no less a terrorist organization than an organized crime syndicate. This is apparent in a network’s structure. Transnational Organized Crime is typically about nodes being connected to many others in the network. Yet, Hezbollah fundraising networks allow such connectivity because of the group’s typically high levels of mutual trust and familial relationships. This creates a vulnerability that can be exploited by law enforcement and intelligence organizations.
Journal: Terrorism and Political Violence
Pages: 902-921
Issue: 5
Volume: 29
Year: 2017
Month: 9
X-DOI: 10.1080/09546553.2015.1089863
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1089863
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:5:p:902-921



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1092437_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Milos Popovic
Author-X-Name-First: Milos
Author-X-Name-Last: Popovic
Title: Fragile Proxies: Explaining Rebel Defection Against Their State Sponsors
Abstract: 
 Foreign governments frequently intervene in armed conflicts by sponsoring rebels against their adversaries. A sponsorship is less costly than a direct military intervention, but rebels often defy orders, desert fighting, or turn guns against their sponsors. Under what conditions do rebels defect against their sponsors? Drawing on organizational theory, I argue that as rebel organizations become less centralized and formalized, the rebels are likely to defect against their sponsors. This occurs because non-centralized organizations have weak central leadership and allow for dispersed decision-making, both of which narrow the manipulative capacity of sponsors. Due to these disadvantages, non-centralized rebel movements are less accountable to their sponsors, cannot credibly commit to rapidly change their policies in response to changes in the sponsor’s demands, and suffer from frequent and destructive quarrels between the top and lower echelons. Using multilevel logistic models for panel data, I test my argument on a novel dataset. My quantitative analysis shows that rebel structure is a robust predictor of defection.
Journal: Terrorism and Political Violence
Pages: 922-942
Issue: 5
Volume: 29
Year: 2017
Month: 9
X-DOI: 10.1080/09546553.2015.1092437
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1092437
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:5:p:922-942



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1341789_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kai Chen
Author-X-Name-First: Kai
Author-X-Name-Last: Chen
Title: Uncertainties of Afghanistan’s Future Security in the Post-2014 Period
Journal: Terrorism and Political Violence
Pages: 943-947
Issue: 5
Volume: 29
Year: 2017
Month: 9
X-DOI: 10.1080/09546553.2017.1341789
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1341789
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:5:p:943-947



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1341785_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: State and Non-State Conflict in a Global Era
Journal: Terrorism and Political Violence
Pages: 948-957
Issue: 5
Volume: 29
Year: 2017
Month: 9
X-DOI: 10.1080/09546553.2017.1341785
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1341785
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:5:p:948-957



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1341784_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Inferno in Chechnya: The Russian-Chechen Wars, the Al Qaeda Myth, and the Boston Marathon Bombings, by Brian Glyn Williams
Journal: Terrorism and Political Violence
Pages: 958-960
Issue: 5
Volume: 29
Year: 2017
Month: 9
X-DOI: 10.1080/09546553.2017.1341784
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1341784
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:5:p:958-960



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1341786_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joanna Rak
Author-X-Name-First: Joanna
Author-X-Name-Last: Rak
Title: Terrorism and the Politics of Social Change: A Durkheimian Analysis, by James Dingley
Journal: Terrorism and Political Violence
Pages: 961-962
Issue: 5
Volume: 29
Year: 2017
Month: 9
X-DOI: 10.1080/09546553.2017.1341786
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1341786
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:5:p:961-962



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1341779_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Donald D. Denton
Author-X-Name-First: Donald D.
Author-X-Name-Last: Denton
Title: Counter-Terrorism, Human Rights and the Rule of Law: Crossing Legal Boundaries in Defence of the State, by Aniceto Masferrer and Clive Walker, eds.
Journal: Terrorism and Political Violence
Pages: 963-964
Issue: 5
Volume: 29
Year: 2017
Month: 9
X-DOI: 10.1080/09546553.2017.1341779
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1341779
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:5:p:963-964



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1341788_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andreas Kuersten
Author-X-Name-First: Andreas
Author-X-Name-Last: Kuersten
Title: The Future of Violence: Robots and Germs, Hackers and Drones—Confronting a New Age of Threat, by Benjamin Wittes and Gabriella Blum
Journal: Terrorism and Political Violence
Pages: 965-966
Issue: 5
Volume: 29
Year: 2017
Month: 9
X-DOI: 10.1080/09546553.2017.1341788
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1341788
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:5:p:965-966

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1092438_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ethem Ilbiz
Author-X-Name-First: Ethem
Author-X-Name-Last: Ilbiz
Author-Name: Christian Kaunert
Author-X-Name-First: Christian
Author-X-Name-Last: Kaunert
Author-Name: Dimitrios Anagnostakis
Author-X-Name-First: Dimitrios
Author-X-Name-Last: Anagnostakis
Title: The counterterrorism agreements of Europol with third countries: Data protection and power asymmetry
Abstract: 
 This article investigates empirically the impact of power asymmetry and interest formation in the European Union’s (EU) external relations with third countries in the context of the Europol data exchange and counterterrorism agreements. It focuses on three countries, namely the United States, Turkey, and Morocco, which each have a different level of counterterrorism cooperation with the EU. This article argues that the EU acts as a pragmatic actor with regard to Europol’s data exchange agreements with third countries, and that the power asymmetry between the EU and the third country under question determines the extent of the EU’s flexibility. If the power asymmetry favours the EU, then it insists on its data protection demands. Otherwise, the EU is more flexible towards its counterparts on data protection issues.
Journal: Terrorism and Political Violence
Pages: 967-984
Issue: 6
Volume: 29
Year: 2017
Month: 11
X-DOI: 10.1080/09546553.2015.1092438
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1092438
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:6:p:967-984



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1096783_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Rogelio Alonso
Author-X-Name-First: Rogelio
Author-X-Name-Last: Alonso
Title: Victims of ETA’s terrorism as an interest group: Evolution, influence, and impact on the political agenda of Spain
Abstract: 
 This article responds to the following research questions: How and why have victims of ETA’s terrorism in Spain become an interest group with significant influence on the political and legislative agenda of the country. The evolution of the associative movement of victims of terrorism is assessed in order to explain the process by which their influence and impact on the political agenda has gradually grown throughout the years. It analyzes the transition from the isolation suffered by victims of terrorism in the early days of ETA’s campaign to the prominent social and political role played at later stages. The factors that motivate and explain their active role as interest groups are looked into, demonstrating different claims and interests with varying degrees of coherence and leverage. The relevancy of victims of terrorism within the anti-terrorist policies of various Spanish governments will be established, as well as the achievements and limitations of such a significant interest group.
Journal: Terrorism and Political Violence
Pages: 985-1005
Issue: 6
Volume: 29
Year: 2017
Month: 11
X-DOI: 10.1080/09546553.2015.1096783
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1096783
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:6:p:985-1005



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1105797_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Khagendra Acharya
Author-X-Name-First: Khagendra
Author-X-Name-Last: Acharya
Author-Name: Orla T. Muldoon
Author-X-Name-First: Orla T.
Author-X-Name-Last: Muldoon
Title: Why “I” became a combatant: A study of memoirs written by Nepali Maoist combatants
Abstract: 
 This article analyzes combatants’ accounts of their engagement with the Communist Party of Nepal, Maoist—CPN (M). We use Self-Categorization Theory (SCT) as a framework and thematic analysis as a method to examine how social relationships and contextual factors contributed to political party identification during the ten-year-long Maoist insurgency in Nepal. Based on the study of autobiographical narratives written by Nepali Maoist combatants, we demonstrate that a) key social and political experiences cumulatively evoked feeling positively inclined to partisan attachment; b) CPN (M) party ideology, which was presented as a cure-all to socio-political difficulties, actuated the predisposed people’s partisan alignment; c) families were largely unsupportive of their members’ intention to take part in the war; and when they participated, the family responded with antagonism; and d) party ideologues of the CPN (M), who met the partisan-leaning individuals as close friends, accelerated and sustained their friends’ motivation to become involved in the armed conflict. Together the findings culminate in a view that engagement with CPN (M) during the insurgency occurred despite resistance from family and increased exponentially because of societal and political experiences, the strong appeal of party ideology, and social network dynamics.
Journal: Terrorism and Political Violence
Pages: 1006-1025
Issue: 6
Volume: 29
Year: 2017
Month: 11
X-DOI: 10.1080/09546553.2015.1105797
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1105797
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:6:p:1006-1025



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1105798_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joseph Anthony L. Reyes
Author-X-Name-First: Joseph Anthony L.
Author-X-Name-Last: Reyes
Author-Name: Tom Smith
Author-X-Name-First: Tom
Author-X-Name-Last: Smith
Title: Analysing labels, associations, and sentiments in Twitter on the Abu Sayyaf kidnapping of Viktor Okonek
Abstract: 
 This article investigates Twitter data related to the kidnapping case of two German nationals in the southern region of the Philippines by the Abu Sayyaf Group (ASG). It explores perceptions of the ASG, along with associated organizations and sentiments indicated in the tweets together with statistically significant relationships. Findings revealed that: “Rebel” and “Militant” were the most frequently used labels for the ASG; a majority of the tweets contained sentiments that assess threats such as abduction and kidnapping of hostages; and almost half contained words that indicate negotiation or concession to the demands of the captors. Logistic regression analyses on “Rebel” and “Islamist” revealed positive coefficients for these sentiments used as predictors. This meant that people who assessed threats and expressed sentiments that responders should concede to the captors’ demands were more likely to use the “Rebel” or “Islamist” labels. Rather than the two longstanding dominant narratives of the ASG as terrorists and criminals, the emerging rebel and militant labels suggest a more domestically and politically sensitive Twitter commentary than is represented in the work of the Al-Qaeda-centric paradigm exponents. These findings, along with the complex associated political and policy contexts and implications, are discussed in this article.
Journal: Terrorism and Political Violence
Pages: 1026-1044
Issue: 6
Volume: 29
Year: 2017
Month: 11
X-DOI: 10.1080/09546553.2015.1105798
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1105798
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:6:p:1026-1044



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1108310_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Stacey Erin Pollard
Author-X-Name-First: Stacey Erin
Author-X-Name-Last: Pollard
Author-Name: David Alexander Poplack
Author-X-Name-First: David Alexander
Author-X-Name-Last: Poplack
Author-Name: Kevin Carroll Casey
Author-X-Name-First: Kevin Carroll
Author-X-Name-Last: Casey
Title: Understanding the Islamic State’s competitive advantages: Remaking state and nationhood in the Middle East and North Africa
Abstract: 
 While many researchers have examined the evolution and unique characteristics of the Islamic State (IS), taking an IS-centric approach has yet to illuminate the factors allowing for its establishment in the first place. To provide a clearer explanation for IS’s successes and improve analysts’ ability to predict future occurrences of similar phenomena, we analyze IS’s competitive advantages through the lens of two defining structural conditions in the Middle East North Africa (MENA): failure of state institutions and nationhood. It is commonly understood that the MENA faces challenges associated with state fragility, but our examination of state and national resiliency shows that Syria and Iraq yield the most deleterious results in the breakdown of the nation, suggesting that the combined failure of state and nation, as well as IS’s ability to fill these related vacuities, is a significant reason IS thrives there today. Against this backdrop, we provide a model of IS’s state- and nation-making project, and illustrate IS’s clear competitive advantages over all other state and non-state actors in both countries, except for Kurdish groupings. We conclude with recommendations on how policy-makers may begin halting and reversing the failure of both state and nation in Iraq and Syria.
Journal: Terrorism and Political Violence
Pages: 1045-1065
Issue: 6
Volume: 29
Year: 2017
Month: 11
X-DOI: 10.1080/09546553.2015.1108310
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1108310
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:6:p:1045-1065



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1111207_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Margarita Vorsina
Author-X-Name-First: Margarita
Author-X-Name-Last: Vorsina
Author-Name: Matthew Manning
Author-X-Name-First: Matthew
Author-X-Name-Last: Manning
Author-Name: Christopher M. Fleming
Author-X-Name-First: Christopher M.
Author-X-Name-Last: Fleming
Author-Name: Christopher L. Ambrey
Author-X-Name-First: Christopher L.
Author-X-Name-Last: Ambrey
Author-Name: Christine Smith
Author-X-Name-First: Christine
Author-X-Name-Last: Smith
Title: The welfare cost of terrorism
Abstract: 
 Data from 117 countries over the period 2006 to 2011 are used to estimate a macroeconomic cross-country system of equations that examines the association between terrorism, self-reported life satisfaction, and national income. Results indicate that terrorism is negatively associated with life satisfaction, whereas no such association is found between terrorism and real GDP per worker. Stark contrasts are found, however, between OECD and non-OECD members. In all, our results suggest that the social costs of terrorism are potentially much higher than the economic costs, and measuring only the conventional economic costs of terrorism significantly underestimates the true costs.
Journal: Terrorism and Political Violence
Pages: 1066-1086
Issue: 6
Volume: 29
Year: 2017
Month: 11
X-DOI: 10.1080/09546553.2015.1111207
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1111207
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:6:p:1066-1086



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1115759_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nilay Saiya
Author-X-Name-First: Nilay
Author-X-Name-Last: Saiya
Title: Blasphemy and terrorism in the Muslim world
Abstract: 
 This article examines the effect of blasphemy laws on Islamist terrorism in Muslim-majority countries. Although passed with the ostensibly noble purpose of defending religion, I argue that blasphemy laws encourage terrorism by creating a culture of vigilantism in which terrorists, claiming to be the defenders of Islam, attack those they believe are guilty of heresy. This study empirically tests this proposition, along with alternative hypotheses, using a time-series, cross-national negative binomial analysis of 51 Muslim-majority states from 1991–2013. It finds that states that enforce blasphemy laws are indeed statistically more likely to experience Islamist terrorist attacks than countries where such laws do not exist. The statistical analysis is supplemented with a brief case study of blasphemy laws and terrorism in Pakistan. The conclusion situates the findings in the context of policy.
Journal: Terrorism and Political Violence
Pages: 1087-1105
Issue: 6
Volume: 29
Year: 2017
Month: 11
X-DOI: 10.1080/09546553.2015.1115759
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1115759
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:6:p:1087-1105



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1127807_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tazreena Sajjad
Author-X-Name-First: Tazreena
Author-X-Name-Last: Sajjad
Author-Name: Anders C. Härdig
Author-X-Name-First: Anders C.
Author-X-Name-Last: Härdig
Title: Too many enemies: Mobilization, marginalization, and political violence
Abstract: 
 Over the past decades, a pattern has emerged across the Islamic world of secular actors struggling to build sustainable social movements while Islamists show a higher success rate in doing so—a dynamic often accompanied by high levels of violence and little space for dialogue between actors from across the political spectrum. In this article, we illustrate the utility of social movement theory (SMT) in explaining the ability of some movements to mobilize en masse, while others become marginalized. Furthermore, we suggest that SMT is useful in understanding the processes that produce socio-political dynamics conducive to violent rather than non-violent tactics. Through a case study of Bangladesh, where in 2013 the secular Shahbag mobilization was derailed by a massive Islamist counter-mobilization, this article shows how movements not only capitalize on, but actually contribute to, shifts in cultural discourse through political maneuvering and long-term socialization. By anchoring their ideology in pre-existing religio-cultural imagery, Islamists have been successful in casting themselves as “authentic” defenders of Islam and their secular opponents as “atheists.” In such a socio-political context, the space for dialogue among the various political actors is severely limited and the impetus to employ violent tactics strong.
Journal: Terrorism and Political Violence
Pages: 1106-1125
Issue: 6
Volume: 29
Year: 2017
Month: 11
X-DOI: 10.1080/09546553.2015.1127807
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1127807
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:6:p:1106-1125



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1131156_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ben Oppenheim
Author-X-Name-First: Ben
Author-X-Name-Last: Oppenheim
Author-Name: Michael Weintraub
Author-X-Name-First: Michael
Author-X-Name-Last: Weintraub
Title: Doctrine and violence: The impact of combatant training on civilian killings
Abstract: 
 Military theorists and practitioners have long argued that training shapes how combatants treat civilians during war. Yet there is little systematic evidence regarding the impact of training on wartime behavior, and almost none for non-state armed groups, despite the fact that such groups intensively train their fighters in order to shape their behavior towards civilian populations. This article argues that among insurgent groups that emphasize the strategic and tactical importance of restraint towards civilian populations, political training can reduce civilian killings. We test the observable implications of our theory in the case of Colombia, using survey data on former Revolutionary Armed Forces of Colombia (FARC) insurgents and sub-national data on civilian killings. We find support for our hypothesis, with results that are robust to a range of model specifications and controls, including alternate sources of combatant discipline and obedience, such as military training and punishment.
Journal: Terrorism and Political Violence
Pages: 1126-1148
Issue: 6
Volume: 29
Year: 2017
Month: 11
X-DOI: 10.1080/09546553.2015.1131156
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1131156
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:6:p:1126-1148



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1377556_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dmitry Shlapentokh
Author-X-Name-First: Dmitry
Author-X-Name-Last: Shlapentokh
Title: Conflict and Peace in Central Eurasia: Towards Explanations and Understanding, by Babak Rezvani
Journal: Terrorism and Political Violence
Pages: 1149-1151
Issue: 6
Volume: 29
Year: 2017
Month: 11
X-DOI: 10.1080/09546553.2017.1377556
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1377556
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:6:p:1149-1151



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1377557_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Donald D. Denton
Author-X-Name-First: Donald D.
Author-X-Name-Last: Denton
Title: Culture, Trauma, and Conflict: Cultural Studies Perspectives on War, by Nico Carpentier, ed.
Journal: Terrorism and Political Violence
Pages: 1152-1153
Issue: 6
Volume: 29
Year: 2017
Month: 11
X-DOI: 10.1080/09546553.2017.1377557
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1377557
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:6:p:1152-1153



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1377559_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Diego Muro
Author-X-Name-First: Diego
Author-X-Name-Last: Muro
Title: Engineers of Jihad: The Curious Connection between Violent Extremism and Education, by Diego Gambetta and Steffen Hertog
Journal: Terrorism and Political Violence
Pages: 1154-1156
Issue: 6
Volume: 29
Year: 2017
Month: 11
X-DOI: 10.1080/09546553.2017.1377559
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1377559
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:6:p:1154-1156



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1377560_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John C. Zimmerman
Author-X-Name-First: John C.
Author-X-Name-Last: Zimmerman
Title: The Spread of Islamikaze Terrorism in Europe: The Third Islamic Invasion, by Raphael Israeli
Journal: Terrorism and Political Violence
Pages: 1157-1158
Issue: 6
Volume: 29
Year: 2017
Month: 11
X-DOI: 10.1080/09546553.2017.1377560
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1377560
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:6:p:1157-1158



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1377563_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alicja Stańco-Wawrzyńska
Author-X-Name-First: Alicja
Author-X-Name-Last: Stańco-Wawrzyńska
Title: Media Lies and the Conquest of Kosovo: NATO’s Prototype for the Next Wars of Globalization, by Michel Collon
Journal: Terrorism and Political Violence
Pages: 1159-1160
Issue: 6
Volume: 29
Year: 2017
Month: 11
X-DOI: 10.1080/09546553.2017.1377563
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1377563
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:6:p:1159-1160



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1377565_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tony Craig
Author-X-Name-First: Tony
Author-X-Name-Last: Craig
Title: Operation Demetrius and Its Aftermath: A New History of the Use of Internment without Trial in Northern Ireland 1971–75, by Martin J. McCleery
Journal: Terrorism and Political Violence
Pages: 1161-1162
Issue: 6
Volume: 29
Year: 2017
Month: 11
X-DOI: 10.1080/09546553.2017.1377565
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1377565
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:6:p:1161-1162



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1377569_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John C. Zimmerman
Author-X-Name-First: John C.
Author-X-Name-Last: Zimmerman
Title: The Sayyid Qutb Reader: Selected Writings on Politics, Religion and Society, by Albert J. Bergesen, ed.
Journal: Terrorism and Political Violence
Pages: 1163-1164
Issue: 6
Volume: 29
Year: 2017
Month: 11
X-DOI: 10.1080/09546553.2017.1377569
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1377569
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:6:p:1163-1164



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1397944_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: Corrigendum
Journal: Terrorism and Political Violence
Pages: 1165-1165
Issue: 6
Volume: 29
Year: 2017
Month: 11
X-DOI: 10.1080/09546553.2017.1397944
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1397944
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:6:p:1165-1165



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1398989_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: EOV Editoral Board
Journal: Terrorism and Political Violence
Pages: 1166-1166
Issue: 6
Volume: 29
Year: 2017
Month: 11
X-DOI: 10.1080/09546553.2017.1398989
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1398989
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:29:y:2017:i:6:p:1166-1166

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1135424_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alon Burstein
Author-X-Name-First: Alon
Author-X-Name-Last: Burstein
Title: Armies of God, Armies of Men: A Global Comparison of Secular and Religious Terror Organizations
Abstract: 
 This article compares the violent activity of secular and religious terror organizations. Utilizing data compiled by the Global Terrorism Database cross-referenced with secondary and primary sources regarding the degree of religious components embedded in organizations’ ideologies, it tests the violent patterns of activity carried out by organizations guided by predominantly secular, secular/religious, and religious ideologies, between the years 1970 and 2012. The findings confirm that a) religious ideology correlates with specific, more deadly, attack tactics and violent patterns; and b) the degree of religious components within terror organizational ideology should be tested along a spectrum: the more religious an organization is, the more attacks it tends to carry out, and the deadlier its attacks become.
Journal: Terrorism and Political Violence
Pages: 1-21
Issue: 1
Volume: 30
Year: 2018
Month: 1
X-DOI: 10.1080/09546553.2015.1135424
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1135424
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:1:p:1-21



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1139577_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Suranjan Weeraratne
Author-X-Name-First: Suranjan
Author-X-Name-Last: Weeraratne
Author-Name: Sterling Recker
Author-X-Name-First: Sterling
Author-X-Name-Last: Recker
Title: The Isolated Islamists: The Case of the Allied Democratic Forces in the Ugandan-Congolese Borderland
Abstract: 
 This study investigates the absence of substantive linkages between locally based Salafi Jihadist movements and their more transnational counterparts such as Al-Qaeda or ISIS. While studies have addressed the heterogeneity in Jihadi alliances, the question of why inter-Jihadi ties are completely absent or tenuous at times is under-theorized in the literature. Given ISIS’s recent inexorable advance through the Middle East and North Africa and its ever-growing ties with local Jihadists, it is timely to investigate under what conditions locally based militant Islamists are less likely to forge ties with global Jihadists. Using the Allied Democratic Forces (ADF)—a militant Islamist group in the Ugandan-Congolese borderland—as an illustrative case study, the research sheds light on conditions under which inter-Jihadi ties are less likely. These include the extent of ideological divergence between local and global Jihadists, the degree of relevance to the local community, and the fear of attracting new enemies in the form of more stringent counter-terrorism operations.
Journal: Terrorism and Political Violence
Pages: 22-46
Issue: 1
Volume: 30
Year: 2018
Month: 1
X-DOI: 10.1080/09546553.2016.1139577
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1139577
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:1:p:22-46



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1142442_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Luqman Saeed
Author-X-Name-First: Luqman
Author-X-Name-Last: Saeed
Author-Name: Shabib Haider Syed
Author-X-Name-First: Shabib Haider
Author-X-Name-Last: Syed
Title: Insights into Selected Features of Pakistan’s Most Wanted Terrorists
Abstract: 
 This article attempts to provide insights into selected features of Pakistan’s most wanted terrorists using a dataset of 895 high-profile terrorists provided by the Counter Terrorism Wings of the Criminal Investigation Departments of regional police offices of Pakistan. It identifies spatial patterns of terrorist supply at subnational levels. The educational background of terrorists has also been analyzed. Noteworthy variations are observed in the supply of different types of terrorists across the geographical landscape of Pakistan. Findings also reveal that though terrorists are relatively more educated than the population group they emerge from, there is a higher probability of them emerging in districts with lower socio-economic performance.
Journal: Terrorism and Political Violence
Pages: 47-73
Issue: 1
Volume: 30
Year: 2018
Month: 1
X-DOI: 10.1080/09546553.2016.1142442
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1142442
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:1:p:47-73



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1150840_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sambuddha Ghatak
Author-X-Name-First: Sambuddha
Author-X-Name-Last: Ghatak
Title: The Role of Political Exclusion and State Capacity in Civil Conflict in South Asia
Abstract: 
 Extant literature on intrastate conflict independently explores terrorism and civil war. However, both terrorism and civil war are probably parts of a continuum of intrastate conflict with the former at one end and the latter at the other end in terms of intensity. I argue that two factors play important roles in rebels’ decision-making calculus, namely, the size of their support base and state strength. Terrorism, as a strategy of the weak, is optimal when the rebel groups have little support among their audience and the state is strong. On the other hand, guerrilla warfare is an ideal strategy when such groups have a greater support base and the state is weak. The theoretical argument is tested on a dataset of Myanmar and six countries of South Asia and for 1970–2007.
Journal: Terrorism and Political Violence
Pages: 74-96
Issue: 1
Volume: 30
Year: 2018
Month: 1
X-DOI: 10.1080/09546553.2016.1150840
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1150840
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:1:p:74-96



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1158165_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bart Schuurman
Author-X-Name-First: Bart
Author-X-Name-Last: Schuurman
Author-Name: Edwin Bakker
Author-X-Name-First: Edwin
Author-X-Name-Last: Bakker
Author-Name: Quirine Eijkman
Author-X-Name-First: Quirine
Author-X-Name-Last: Eijkman
Title: Structural Influences on Involvement in European Homegrown Jihadism: A Case Study
Abstract: 
 This article empirically assesses the applicability of structural-level hypotheses for involvement in terrorism within the context of European homegrown jihadism. It uses these hypotheses to study how structural factors influenced involvement in the Dutch “Hofstadgroup.” Structural factors enabled the group’s emergence and its participants’ adoption of extremist views. They also motivated involvement in political violence and a shift in some participants’ focus from joining Islamist insurgents overseas to committing terrorism in the Netherlands. Finally, structural factors precipitated an actual terrorist attack. No support is found for the frequently encountered argument that discrimination and exclusion drive involvement in European homegrown jihadism. Instead, geopolitical grievances were prime drivers of this process.
Journal: Terrorism and Political Violence
Pages: 97-115
Issue: 1
Volume: 30
Year: 2018
Month: 1
X-DOI: 10.1080/09546553.2016.1158165
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1158165
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:1:p:97-115



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1165213_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jason C. Mueller
Author-X-Name-First: Jason C.
Author-X-Name-Last: Mueller
Title: The Evolution of Political Violence: The Case of Somalia’s Al-Shabaab
Abstract: 
 This research investigates the development and expansion of the al-Shabaab movement in Somalia from 2000 to 2013. Initially a marginal player in Somalia, by 2013 al-Shabaab had transformed into the most formidable armed opposition to challenge the nascent Somali government and its allies. During this time period they administered territory domestically, while expanding their tactical repertoire and geographic scope of attacks. After analyzing the historical conditions (2000–2006) from which al-Shabaab emerged, I explore the evolution of this organization through the use of historical process tracing. This entails looking for critical junctures on a global, national, and local level that had a dramatic impact on the future trajectory of the insurgency. The results show that harsh foreign interventions had many deleterious consequences, acting as an initial impetus for armed resistance, while also acting as a continuous source of controversy which al-Shabaab exploited to gain new recruits. Moreover, irreconcilable intra-organizational schisms also contributed to altering the future organizational decisions made by al-Shabaab. The culmination of these results engage and expand the theory of categorical terrorism, offering observations to help scholars and policy makers alike begin to re-conceptualize ways to study terrorism and political violence.
Journal: Terrorism and Political Violence
Pages: 116-141
Issue: 1
Volume: 30
Year: 2018
Month: 1
X-DOI: 10.1080/09546553.2016.1165213
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1165213
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:1:p:116-141



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1165214_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Shuki J. Cohen
Author-X-Name-First: Shuki J.
Author-X-Name-Last: Cohen
Author-Name: Arie Kruglanski
Author-X-Name-First: Arie
Author-X-Name-Last: Kruglanski
Author-Name: Michele J. Gelfand
Author-X-Name-First: Michele J.
Author-X-Name-Last: Gelfand
Author-Name: David Webber
Author-X-Name-First: David
Author-X-Name-Last: Webber
Author-Name: Rohan Gunaratna
Author-X-Name-First: Rohan
Author-X-Name-Last: Gunaratna
Title: Al-Qaeda’s Propaganda Decoded: A Psycholinguistic System for Detecting Variations in Terrorism Ideology
Abstract: 
 We describe a novel hybrid method of content analysis that combines the speed of computerized text analysis with the contextual sensitivity of human raters, and apply it to speeches that were given by major leaders of Al-Qaeda (AQ)—both in its “core” Afghanistan/Pakistan region and its affiliate group in Iraq. The proposed “Ideology Extraction using Linguistic Extremization” (IELEX) categorization method has acceptable levels of inter-rater and test-retest reliabilities. The method uncovered subtle (and potentially non-conscious) differences in the emphases that Usama Bin Laden and Ayman Al-Zawahiri put on the various components of their ideological justification for terrorism. We show how these differences were independently recognized as the crux of the rift in AQ, based on documents that were confiscated in Abbottabad following Usama Bin Laden’s assassination. Additionally, several of the ideological discrepancies that we detected between AQ “core” and its Iraqi affiliate correspond to schisms that presumably led to the splintering of AQ Iraq and the rise of ISIS. We discuss IELEX’s capability to quantify a variety of grievance-based terrorist ideologies, along with its use towards more focused and efficient counter-terrorism and counter-messaging policies.
Journal: Terrorism and Political Violence
Pages: 142-171
Issue: 1
Volume: 30
Year: 2018
Month: 1
X-DOI: 10.1080/09546553.2016.1165214
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1165214
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:1:p:142-171



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1420127_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John C. Zimmerman
Author-X-Name-First: John C.
Author-X-Name-Last: Zimmerman
Title: Shiraz Maher, Salafi-Jihadism: The History of an Idea, Oxford: Oxford University Press, 2016. 292 pages, $29.93, Hardcover. ISBN: 978-0190651121
Journal: Terrorism and Political Violence
Pages: 172-173
Issue: 1
Volume: 30
Year: 2018
Month: 1
X-DOI: 10.1080/09546553.2017.1420127
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1420127
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:1:p:172-173



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1420126_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Reviewed by Ryan Shaffer
Author-X-Name-First: Reviewed by Ryan
Author-X-Name-Last: Shaffer
Title: Perspectives and Challenges in the Policing of Terrorism
Journal: Terrorism and Political Violence
Pages: 174-180
Issue: 1
Volume: 30
Year: 2018
Month: 1
X-DOI: 10.1080/09546553.2017.1420126
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1420126
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:1:p:174-180



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1420128_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ivan Strenski
Author-X-Name-First: Ivan
Author-X-Name-Last: Strenski
Title: “Do unto Others before They Do unto You”
Journal: Terrorism and Political Violence
Pages: 181-198
Issue: 1
Volume: 30
Year: 2018
Month: 1
X-DOI: 10.1080/09546553.2017.1420128
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1420128
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:1:p:181-198

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1432199_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lee Jarvis
Author-X-Name-First: Lee
Author-X-Name-Last: Jarvis
Author-Name: Tim Legrand
Author-X-Name-First: Tim
Author-X-Name-Last: Legrand
Title: The Proscription or Listing of Terrorist Organisations: Understanding, Assessment, and International Comparisons
Abstract: 
 This article serves as an introduction to this Special Issue on the banning or proscription of terrorist organisations around the world. It begins by arguing for greater attention to proscription powers because of their contemporary ubiquity, considerable historical lineage, implications for political life, and ambiguous effectiveness. Following an overview of the Issue’s questions and ambitions, the article discusses five themes: key moments of continuity and change within proscription regimes around the world; the significance of domestic political and legal contexts and institutions; the value of this power in countering terrorism and beyond; a range of prominent criticisms of proscription, including around civil liberties; and the significance of language and other symbolic practices in the justification and extension of proscription powers. We conclude by sketching the arguments and contributions of the subsequent articles in this Issue.
Journal: Terrorism and Political Violence
Pages: 199-215
Issue: 2
Volume: 30
Year: 2018
Month: 3
X-DOI: 10.1080/09546553.2018.1432199
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1432199
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:2:p:199-215



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1432200_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nicola McGarrity
Author-X-Name-First: Nicola
Author-X-Name-Last: McGarrity
Author-Name: George Williams
Author-X-Name-First: George
Author-X-Name-Last: Williams
Title: The Proscription of Terrorist Organisations in Australia
Abstract: 
 Australia has a long history of legislation enabling the proscription of organisations which pose a threat to Australian security. Such laws are by no means a post-9/11 phenomenon. However, the proscription of organisations has assumed a particularly significant place in this country’s legislative response to the threat of terrorism since the terrorist attacks in New York and Washington. The focus of this article is upon the provisions of Division 102 of the Criminal Code Act 1995 (Cth), as it is this regime which has been most commonly relied upon in practice. Whilst the nature of the threat of terrorism faced by Australia has moved through several distinct phases, the basic structure of this regime has remained substantially intact. For that reason, although this article will canvass recent legislative amendments made in response to the foreign terrorist fighters phenomenon specifically, the aim is to provide a holistic picture of the form and substance of the proscription regime in Division 102. This builds upon the pre-existing scholarship in the field by carefully analysing the lessons which can be drawn from the now quite significant number of prosecutions for terrorist organisation offences.
Journal: Terrorism and Political Violence
Pages: 216-235
Issue: 2
Volume: 30
Year: 2018
Month: 3
X-DOI: 10.1080/09546553.2018.1432200
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1432200
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:2:p:216-235



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1432201_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Clive Walker
Author-X-Name-First: Clive
Author-X-Name-Last: Walker
Title: “They haven’t gone away you know.” The Persistence of Proscription and the Problems of Deproscription
Abstract: 
 Proscription orders in UK legislation against terrorist groups have proliferated since 9/11. Added to the dozen or so Northern Ireland terrorist groups, around 70 international groups and one domestic neo-Nazi group have joined the list. Since that time, only two organisations have been deproscribed, and the UK government has resisted the periodic revision of listings and changes to the procedures for challenge and removal. The paper will consider the effectiveness and fairness of UK law in regard to the persistence of proscription, having regard to policy, legal, and practical frameworks and implications.
Journal: Terrorism and Political Violence
Pages: 236-258
Issue: 2
Volume: 30
Year: 2018
Month: 3
X-DOI: 10.1080/09546553.2018.1432201
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1432201
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:2:p:236-258



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1432211_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Craig Forcese
Author-X-Name-First: Craig
Author-X-Name-Last: Forcese
Author-Name: Kent Roach
Author-X-Name-First: Kent
Author-X-Name-Last: Roach
Title: Yesterday’s Law: Terrorist Group Listing in Canada
Abstract: 
 Canada’s approach to proscription differs from that of other Westminster democracies. After the negative example of listing in the October Crisis, 1970 and with the subsequent advent of a constitutional bill of rights, Canada does not ban organizations; instead it penalizes certain forms of conduct, above mere membership, with terrorist groups. “Terrorist groups” include entities listed proactively by the executive, but also entities that meet a functional definition in Canadian criminal law. In practice, the latter, functionally-defined terrorist groups have figured in most terrorism prosecutions—only a few cases have involved listed groups. With the new focus on Daesh (a listed group), that may begin to change. However, executive listing raises unresolved constitutional doubts in Canada, prompting concerns that reliance on proscription may be more trouble than it is worth. Listing has also been used with respect to individuals, but such listings in Canada have already produced false positives, perhaps because of the due process deficits of listing by the executive. In many respects, therefore, terrorist group listing is yesterday’s law, problematic and of marginal utility. There may be reasons of administrative expediency to preserve listing, but the tool is more doubtful when used as a precursor to criminal prosecutions.
Journal: Terrorism and Political Violence
Pages: 259-277
Issue: 2
Volume: 30
Year: 2018
Month: 3
X-DOI: 10.1080/09546553.2018.1432211
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1432211
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:2:p:259-277



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1432214_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Suthaharan Nadarajah
Author-X-Name-First: Suthaharan
Author-X-Name-Last: Nadarajah
Title: The Tamil Proscriptions: Identities, Legitimacies, and Situated Practices
Abstract: 
 Conventional analyses of terrorism proscription rely on conceptions of policy in terms of bureaucratic institutions and processes functioning according to means-end rationality, and law as an institutionalised body of rules expressive of sovereign power. By contrast, this article argues that the workings of Western terrorism proscription are inseparable from and deeply conditioned by situated interpretations of the contexts and dynamics within which West-led interventions for global stability—equated with liberal order—are pursued. Predicated on a seemingly self-evident division between “liberal” conduct, actors, and practices and illiberal ones which threaten the former, the production of good order requires the strengthening of the former, and the disciplining, transformation, or destruction of the latter. However, categorisations as “liberal” or “non-liberal” are not derived from “objective” criteria, but always mutually dependent on the situated interpretations by (self-recognised) liberals of the contexts within which they are intervening. Taking an interpretive approach that treats state action as situated practice, the article traces Western states’ security engagement with Sri Lanka before, during, and after the armed conflict (1983–2009) to show how changing calculations for liberal peace there governed evolving proscription practices in relation to the LTTE and the Tamil diaspora.
Journal: Terrorism and Political Violence
Pages: 278-297
Issue: 2
Volume: 30
Year: 2018
Month: 3
X-DOI: 10.1080/09546553.2018.1432214
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1432214
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:2:p:278-297



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1432215_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Vicki Sentas
Author-X-Name-First: Vicki
Author-X-Name-Last: Sentas
Title: Terrorist Organization Proscription as Counterinsurgency in the Kurdish Conflict
Abstract: 
 Proscription—the designation of non-state actors as terrorist organizations—operates as one technique of counterterrorism listing, whereby individuals and populations associated with armed non-state actors are targeted for disruption, stigmatisation, and prosecution. This article examines the effects of the globalised proscription of the Kurdistan Workers’ Party (PKK) on the Kurdish conflict as a mode of counterinsurgency warfare. It argues that calling proscription a counterinsurgency strategy better connects its preemptive functions and objects with its deleterious effects on targeted populations. Moreover, this article argues that the transnational organization of the ban of the PKK casts light on how proscription extends and deepens colonial practices of counterinsurgency.
Journal: Terrorism and Political Violence
Pages: 298-317
Issue: 2
Volume: 30
Year: 2018
Month: 3
X-DOI: 10.1080/09546553.2018.1432215
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1432215
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:2:p:298-317



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1432218_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Angela K. Bourne
Author-X-Name-First: Angela K.
Author-X-Name-Last: Bourne
Title: Securitization and the Proscription of Terrorist Organizations in Spain
Abstract: 
 This article applies securitization theory to account for the proscription of organizations linked to Euskadi Ta Askatasuna (ETA) in Spain. I argue that securitization is vital for understanding the evolution of Spanish counterterrorism policy from tolerating to banning political organisations not directly involved in terrorist attacks, but supporting and sympathetic to ETA. More specifically, I examine the role of the judiciary in the initiation of securitization processes in which ETA came to be conceived as a “complex structure” integrating armed and unarmed activists, and the resonance of judicial securitization frames in the public sphere. I do so by analysing evolving conceptions of the relationship between ETA and two organizations—the youth group Jarrai and its successors Haika and Segi and the ETA prisoners’ lobby Gestoras proAmnistía and its successor Alkatasuna—as articulated in court rulings and a sample of 573 newspaper articles published in the Spanish daily El País between 1994 and 2016. I argue that two modes of securitization can be observed in these cases, one extending security threats posed by ETA’s terrorist strategy to the political organizations and one framing both the terrorist group and political organizations as threats to the democratic community.
Journal: Terrorism and Political Violence
Pages: 318-335
Issue: 2
Volume: 30
Year: 2018
Month: 3
X-DOI: 10.1080/09546553.2018.1432218
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1432218
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:2:p:318-335



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1432219_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marieke de Goede
Author-X-Name-First: Marieke
Author-X-Name-Last: de Goede
Title: Proscription’s Futures
Abstract: 
 Proscription of individuals and groups potentially linked to terrorism in the form of targeted sanctions have become increasingly controversial in recent years, especially in Europe. Initially considered the less violent alternative when countering terrorism, individual proscriptions have become contested for their impact on due process rights and democratic space. This paper focuses on a key aspect of proscription measures that goes relatively unnoticed: its discourses and practices of time and temporality. It analyses in some depth the rationalities of time evoked, debated, accepted, and rejected in two court cases on individual sanctions. It focuses on two elements at work in these cases: first, the relation between the precautionary and the punitive; second, the politics of establishing and examining terrorist intention. In this manner, it contributes to broader literatures on proscription in two ways. First, it advances the debate on security temporalities in general and the discussion of future-oriented sanctions in particular, by focusing on recent cases and case-law. Second, the paper brings a focus on legal practice to proscription debates. The paper concludes that the juridical repertoire of establishing and assessing intentions is not just broadened but fundamentally altered in the current proscription regime.
Journal: Terrorism and Political Violence
Pages: 336-355
Issue: 2
Volume: 30
Year: 2018
Month: 3
X-DOI: 10.1080/09546553.2018.1432219
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1432219
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:2:p:336-355



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1432220_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tim Legrand
Author-X-Name-First: Tim
Author-X-Name-Last: Legrand
Title: “More Symbolic—More Political—Than Substantive”: An Interview with James R. Clapper on the U.S. Designation of Foreign Terrorist Organizations
Abstract: 
 This article considers the status and value of the U.S. Designated Foreign Terrorist Organizations (FTO) list via an extended and annotated interview with James R. Clapper, U.S. Director of National Intelligence during the administration of President Barack Obama from 2010–2017. In this interview,1 Clapper reflects on the role and effectiveness of blacklisting for U.S. national security strategy. The article frames the interview within debates in recent political science and law literatures on blacklisting to situate Clapper’s views. Drawing on recent controversies—including the fraught relationship between the U.S., Pakistan, the Taliban regime, and the Haqqani network—Clapper speaks to the a) symbolism and foreign policy drivers of FTO listing; b) implications of the FTO list for peace negotiations; and, c) the cohesion of terrorist groups and the effectiveness of FTO listings. In reporting the interview thus, the article offers a rare direct insight to the causal reasoning of an elite security official with respect to a process that has, since its inception in 1997, been shrouded in ambiguity and controversy.
Journal: Terrorism and Political Violence
Pages: 356-372
Issue: 2
Volume: 30
Year: 2018
Month: 3
X-DOI: 10.1080/09546553.2018.1432220
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1432220
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:2:p:356-372

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1167687_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David Randahl
Author-X-Name-First: David
Author-X-Name-Last: Randahl
Title: Terrorism and Public Opinion: The Effects of Terrorist Attacks on the Popularity of the President of the United States
Abstract: 
 This article uses a large-n dataset to investigate the effect of terrorist attacks with American victims on the popularity of the U.S. president. The study uses two broad theoretical frameworks to analyze this effect, the score-keeping framework and the rally-effect framework. The findings of the study show that, when excluding the effect from the September 11, 2001 terrorist attacks, actual terrorist attacks have no generalizable short-term impact on the popularity of the U.S. president. This indicates that even though the topics of national security, terrorism, and the president’s ability to handle these issues are important in the political debate in the United States, actual terrorism has little or no short-term impact on presidential approval ratings.
Journal: Terrorism and Political Violence
Pages: 373-383
Issue: 3
Volume: 30
Year: 2018
Month: 5
X-DOI: 10.1080/09546553.2016.1167687
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1167687
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:3:p:373-383



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1167688_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joshua Eastin
Author-X-Name-First: Joshua
Author-X-Name-Last: Eastin
Author-Name: Emily Kalah Gade
Author-X-Name-First: Emily Kalah
Author-X-Name-Last: Gade
Title: Beheading the Hydra: Counterinsurgent Violence and Insurgent Attacks in Iraq
Abstract: 
 We evaluate the effectiveness of anti-insurgent violence as a means to suppress insurgency with micro-level data from the Iraq War. Our findings suggest that while violence against insurgents increases the incidence of future insurgent attacks, the intensity of this violence can significantly influence the outcome. Rather than shifting monotonically, the effect is actually curvilinear, first rising, and then contracting. We argue that at low to moderate levels, violence against insurgents creates opportunities for these groups to signal strength and resolve, which enables them to build momentum, heighten civilian cooperation, and diminish political support for counterinsurgency efforts in these forces’ home countries. The result is an escalation in insurgent attacks. However, at higher levels, this effect should plateau and taper off as insurgent attrition rises, and as civilian fears over personal safety displace grievances that might otherwise provoke counter-mobilization. Our empirical tests on data from the Iraq War, 2004–2009, demonstrate robust support for this argument.
Journal: Terrorism and Political Violence
Pages: 384-407
Issue: 3
Volume: 30
Year: 2018
Month: 5
X-DOI: 10.1080/09546553.2016.1167688
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1167688
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:3:p:384-407



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1169175_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Elena Pokalova
Author-X-Name-First: Elena
Author-X-Name-Last: Pokalova
Title: The Al Qaeda Brand: The Strategic Use of the “Terrorist” Label
Abstract: 
 Al Qaeda leaders have consistently praised the Chechen insurgents as an exemplary front of global jihad. Ayman al-Zawahiri recently applauded the steadfastness of the Chechen rebels and indicated that their resolve for jihad is worthy of emulation. Ever since the world found out about a war going on in the Muslim republic in the North Caucasus, Al Qaeda leadership has attempted to represent the Chechen struggle as one of its own battlefields. In turn, the Russian government has tried to justify its policies in the North Caucasus through demonstrating to the world that the Kremlin is fighting nothing less than Osama bin Laden’s agents in Chechnya. The North Caucasus insurgents in turn have embraced some of Al Qaeda’s narratives. While such narratives have proliferated, the factual evidence to show the direct links between the North Caucasus insurgents and Al Qaeda is still lacking. The article examines how terrorist groups such as Al Qaeda use framing for strategic ends. The evidence discussed here suggests that Al Qaeda, the North Caucasus insurgents, and the Russian government have adopted similar narratives. However, the lack of evidence to back up such narratives indicates the differences in reasons driving the convergence of the narratives.
Journal: Terrorism and Political Violence
Pages: 408-427
Issue: 3
Volume: 30
Year: 2018
Month: 5
X-DOI: 10.1080/09546553.2016.1169175
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1169175
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:3:p:408-427



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1180288_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Liane Rothenberger
Author-X-Name-First: Liane
Author-X-Name-Last: Rothenberger
Author-Name: Kathrin Müller
Author-X-Name-First: Kathrin
Author-X-Name-Last: Müller
Author-Name: Ahmed Elmezeny
Author-X-Name-First: Ahmed
Author-X-Name-Last: Elmezeny
Title: The Discursive Construction of Terrorist Group Identity
Abstract: 
 The media coverage of terrorist acts has been the subject of numerous scientific studies. However, the terrorist groups’ own communication perspectives have not been thoroughly researched. The following article deals with terrorist groups and their use of websites for identity building. We examine the discursive construction of terrorist group identity through critical discourse analysis (CDA). The CDA of online texts from websites of terrorist groups is based on a five macro-strategy scheme. Our sample consists of six terrorist groups, with each group of two sharing different motivations: social-revolutionary, ethno-nationalist, or religious. All the groups analyzed are listed as terrorist organizations by the European Union. The CDA of 27 terrorist websites, purposively sampled, was conducted using two coders per site. Through this analysis, the researchers draw conclusions on strategies employed by terrorist organizations in building identity and how to counter their unregulated propaganda.
Journal: Terrorism and Political Violence
Pages: 428-453
Issue: 3
Volume: 30
Year: 2018
Month: 5
X-DOI: 10.1080/09546553.2016.1180288
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1180288
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:3:p:428-453



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1180289_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Martin Innes
Author-X-Name-First: Martin
Author-X-Name-Last: Innes
Author-Name: Colin Roberts
Author-X-Name-First: Colin
Author-X-Name-Last: Roberts
Author-Name: Alun Preece
Author-X-Name-First: Alun
Author-X-Name-Last: Preece
Author-Name: David Rogers
Author-X-Name-First: David
Author-X-Name-Last: Rogers
Title: Ten “Rs” of Social Reaction: Using Social Media to Analyse the “Post-Event” Impacts of the Murder of Lee Rigby
Abstract: 
 This article provides a case study analysis of social reactions to the murder of Fusilier Lee Rigby in 2013. Informed by empirical data collected by systematic monitoring of social media platforms, the analysis identifies a number of online behaviours with offline effects—labeled the ten “Rs”—that collectively constitute the process of social reaction to the crime. These are defined as: reporting; requesting; responding; recruiting; “risking”; retaliating; rumouring; remembering; reheating; and “resiliencing”. It is argued that the ability to observe these behaviours through the application of qualitative social media analysis has considerable potential. Conceptually, the analysis provides new insight into the complex and chaotic processes of sense-making and meaning attribution that arise in the aftermath of terrorist attacks. It illuminates how patterns of social reaction on social media are nuanced and complicated, with different segments of the public interpreting the same developments very differently. In addition, the findings and the conceptual framework outlined have implications for policy and practice development in terms of establishing a more effective and evidence-based approach to the consequence management of “post-event” conflict dynamics and social reactions.
Journal: Terrorism and Political Violence
Pages: 454-474
Issue: 3
Volume: 30
Year: 2018
Month: 5
X-DOI: 10.1080/09546553.2016.1180289
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1180289
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:3:p:454-474



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1182910_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mikel Buesa
Author-X-Name-First: Mikel
Author-X-Name-Last: Buesa
Author-Name: Thomas Baumert
Author-X-Name-First: Thomas
Author-X-Name-Last: Baumert
Title: Hit the Core or Weaken the Periphery? Comparing Strategies to Break the Circle of Violence with an Embryonic Terrorist Group: The Case of Galician Resistance
Abstract: 
 This article studies whether the action-reaction model holds on an “embryonic” terrorist group like Galician Resistance (REGA). After presenting an overview of REGA’s history, structure, financing, terrorist campaigns, and the police measures adopted against them, the text empirically contrasts whether deterrence is an efficient measure in reducing an incipient terrorist group’s actions. Our results show that deterrence does in fact reduce the number of attacks when aimed at the group’s periphery. However, it causes a backlash of new attacks when aimed at the group’s core. In addition, we prove that an increase in the number of attacks also causes a reaction by police forces and a higher number of detentions of core members. Our results give some meaningful insights into the design of counter-terrorism strategies aimed against “embryonic” groups.
Journal: Terrorism and Political Violence
Pages: 475-502
Issue: 3
Volume: 30
Year: 2018
Month: 5
X-DOI: 10.1080/09546553.2016.1182910
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1182910
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:3:p:475-502



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1190709_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lance Y. Hunter
Author-X-Name-First: Lance Y.
Author-X-Name-Last: Hunter
Author-Name: David J. Bennett
Author-X-Name-First: David
Author-X-Name-Last: J. Bennett
Author-Name: Joseph W. Robbins
Author-X-Name-First: Joseph W.
Author-X-Name-Last: Robbins
Title: Destabilizing Effects of Terrorism on Party System Stability
Abstract: 
 In democracies with stable party systems, voters can more easily trace policy decisions from parties and representatives within the government to specific policy outcomes. Consequently, party system stability (PSS) has been reportedly linked to a variety of factors including economic conditions, democratic performance, political institutions, and socioeconomic cleavages. While informative, these lessons offer precious little insight into other factors that can destabilize a party system. In this work, we surmise that terrorist attacks have important implications for two commonly used measures of PSS. The results of a pooled, cross-sectional time series analysis confirm our hypothesis: deadly attacks proximate to elections destabilize party systems, even when controlling for multiple standard controls. In addition, the level of democratic consolidation within states also influences the degree that fatal terrorist attacks affect party system stability. These findings are based on terrorism data collected from the Global Terrorism Database and from PSS data compiled by the authors.
Journal: Terrorism and Political Violence
Pages: 503-523
Issue: 3
Volume: 30
Year: 2018
Month: 5
X-DOI: 10.1080/09546553.2016.1190709
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1190709
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:3:p:503-523



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1192540_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Peter F. Trumbore
Author-X-Name-First: Peter F.
Author-X-Name-Last: Trumbore
Title: “The Movement Moves Against you”: Coercive Spoiler Management in the Northern Ireland Peace Process
Abstract: 
 More than a decade on, the Northern Ireland peace process can largely be considered a success. Despite the failure of the Provisional Republican Movement to achieve a united Ireland free of British control, the large-scale violence of “The Troubles” has been relegated to the past. Applying the logic of coercive diplomacy, this study examines the role of threats and the use of selective and limited violence by the Provisional Movement to manage real and potential opponents and challengers that have emerged within its own ideological ranks to maintain its position of dominance and prevent a spoiling of the peace process. This study shows that the Provisional Movement retained the capability to employ violence and demonstrated the credibility of coercive threat through a willingness to use force against its opponents on the Republican spectrum, and was able to do so with a high degree of impunity.
Journal: Terrorism and Political Violence
Pages: 524-543
Issue: 3
Volume: 30
Year: 2018
Month: 5
X-DOI: 10.1080/09546553.2016.1192540
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1192540
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:3:p:524-543



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1440047_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Changes and Drivers in Contemporary Terrorism
Journal: Terrorism and Political Violence
Pages: 544-552
Issue: 3
Volume: 30
Year: 2018
Month: 5
X-DOI: 10.1080/09546553.2018.1440047
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1440047
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:3:p:544-552



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1440046_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anthony Celso
Author-X-Name-First: Anthony
Author-X-Name-Last: Celso
Title: Al Qaeda’s Post 9-11 Travails
Journal: Terrorism and Political Violence
Pages: 553-561
Issue: 3
Volume: 30
Year: 2018
Month: 5
X-DOI: 10.1080/09546553.2018.1440046
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1440046
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:3:p:553-561



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1440049_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joanna Rak
Author-X-Name-First: Joanna
Author-X-Name-Last: Rak
Title: Intractable Conflicts: Socio-Psychological Foundations and Dynamics, Daniel Bar-Tal, Cambridge, Cambridge University Press, 2013, 579 pp., $119.99 (hardcover), ISBN: 978-0-521-86708-5
Journal: Terrorism and Political Violence
Pages: 562-563
Issue: 3
Volume: 30
Year: 2018
Month: 5
X-DOI: 10.1080/09546553.2018.1440049
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1440049
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:3:p:562-563



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1440052_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John C. Zimmerman
Author-X-Name-First: John C.
Author-X-Name-Last: Zimmerman
Title: The Father of Jihad: Abd Allah Azzam’s Jihad Ideas and Implications for National Security, Muhammad Haniff Hassan, New Jersey: Imperial College Press, 2014, 350 pp., Hardcover, $115.00, ISBN 978-1783262878
Journal: Terrorism and Political Violence
Pages: 564-565
Issue: 3
Volume: 30
Year: 2018
Month: 5
X-DOI: 10.1080/09546553.2018.1440052
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1440052
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:3:p:564-565



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1440053_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Martin Joseph Gallagher
Author-X-Name-First: Martin Joseph
Author-X-Name-Last: Gallagher
Title: Turning to Political Violence: The Emergence of Terrorism, Marc Sageman, Philadelphia, University of Pennsylvania Press, 2017, 496 pp., $49.95, ISBN: 978-0-8122-4877-7
Journal: Terrorism and Political Violence
Pages: 566-567
Issue: 3
Volume: 30
Year: 2018
Month: 5
X-DOI: 10.1080/09546553.2018.1440053
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1440053
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:3:p:566-567

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1182911_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joshua Tschantret
Author-X-Name-First: Joshua
Author-X-Name-Last: Tschantret
Title: Repression, opportunity, and innovation: The evolution of terrorism in Xinjiang, China
Abstract: 
 How does state repression affect the incidence and impact of terrorism? This study conducts a process tracing analysis of the ongoing contention between the Uyghur separatist movement and the Chinese state to provide a plausible explanation for the present lack of consensus on this question. Relying on insights from collective action theory, it argues that although repression was initially successful in curtailing the opportunistic use of terrorism, novel political opportunity allowed some separatists to adopt innovations, such as suicide bombing, to circumvent repression. Repression has since proved ineffective in quelling terrorism, and will likely remain incapable of forestalling future terrorist innovations.
Journal: Terrorism and Political Violence
Pages: 569-588
Issue: 4
Volume: 30
Year: 2018
Month: 7
X-DOI: 10.1080/09546553.2016.1182911
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1182911
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:4:p:569-588



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1194268_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michal Mochtak
Author-X-Name-First: Michal
Author-X-Name-Last: Mochtak
Title: Fighting and voting: Mapping electoral violence in the region of post-Communist Europe
Abstract: 
 Electoral disputes accompanied by violent outbreaks have become an emerging problem in societies under transformation, in authoritarian regimes, as well as in young democracies. The truth is that many politicians elected to office, their supporters, and political activists have altered their perceptions of electoral competition in a form of zero-sum logic with direct consequences for their opponents. After the fall of Communism in the beginning of the 1990s, Central and Eastern Europe stood at a crossroads. This period of imbalance and uncertainty affected the violent interaction in newly reformed electoral arenas with serious consequences for legitimizing democratic change. Despite the well-documented tension that existed in the region, the importance of violence in the electoral arena is rather neglected. The article approaches this gap as the first attempt to map electoral violence in a new typological environment where the process of transformation has affected political pluralism and the patterns of political contest. It argues that electoral violence is not a rare phenomenon in the region of post-Communist Europe and the dynamic varies on a great scale. Moreover, the article presents a picture of electoral violence occurring in different settings with potentially different contextual preconditions that need to be studied separately.
Journal: Terrorism and Political Violence
Pages: 589-615
Issue: 4
Volume: 30
Year: 2018
Month: 7
X-DOI: 10.1080/09546553.2016.1194268
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1194268
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:4:p:589-615



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1194270_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Emil Aslan Souleimanov
Author-X-Name-First: Emil Aslan
Author-X-Name-Last: Souleimanov
Author-Name: Huseyn Aliyev
Author-X-Name-First: Huseyn
Author-X-Name-Last: Aliyev
Author-Name: Jean-François Ratelle
Author-X-Name-First: Jean-François
Author-X-Name-Last: Ratelle
Title: Defected and loyal? A case study of counter-defection mechanisms inside Chechen paramilitaries
Abstract: 
 Can former insurgents in the service of counterinsurgent paramilitaries be considered a perfectly loyal force? What mechanisms may help to deter subsequent defections of individuals who have already “betrayed” once? Drawing on a unique set of primary data, this article examines the effective counter-defection practices of Chechnya’s pro-Moscow paramilitaries toward prospective defectors from among ex-insurgents. It explores three interwoven mechanisms employed with various intensities to avert “double defections” at the peak of the locally fought counterinsurgency in Chechnya from 2000 to 2005. These mechanisms are: a) extrajudicial executions of recidivists and their relatives, b) initiation violence targeting insurgents’ relatives, and c) disclosure of the identities of defected insurgents who were responsible for killing insurgents in combat to the families of slain insurgents.
Journal: Terrorism and Political Violence
Pages: 616-636
Issue: 4
Volume: 30
Year: 2018
Month: 7
X-DOI: 10.1080/09546553.2016.1194270
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1194270
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:4:p:616-636



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1194271_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ehud Eiran
Author-X-Name-First: Ehud
Author-X-Name-Last: Eiran
Author-Name: Peter Krause
Author-X-Name-First: Peter
Author-X-Name-Last: Krause
Title: Old (Molotov) cocktails in new bottles? “Price-tag” and settler violence in Israel and the West Bank
Abstract: 
 In the early morning of July 31, 2015, masked attackers threw firebombs into two Palestinian homes in the West Bank village of Duma, south of Nablus, killing three Palestinian civilians. Contrary to claims by Israeli and Palestinian politicians, this attack was neither an isolated anomaly nor just another incident of settler violence. Instead, it was the latest attack in an important but largely unknown phenomenon called “price-tag,” in which a loosely connected group of young Israelis called “hilltop youth” burn Palestinian mosques and destroy property in hundreds of attacks accompanied by threatening graffiti that references Israeli settlers, outposts, and anti-Arab slogans. Using an original dataset of price-tag incidents and interviews with key actors, we demonstrate that the perpetrators, targets, and strategies of price-tag are different than previous patterns of settler violence. Whereas previous settlers saw the Israeli state as legitimate and largely decided to cooperate with it, the hilltop youth have decided to confront it by using price-tag attacks to deter settlement withdrawals and chain-gang the state into a conflict with the Palestinians. This analysis of the strategic logic of price-tag reveals its potential to shift the political landscape within and between Israelis and Palestinians.
Journal: Terrorism and Political Violence
Pages: 637-657
Issue: 4
Volume: 30
Year: 2018
Month: 7
X-DOI: 10.1080/09546553.2016.1194271
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1194271
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:4:p:637-657



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1205979_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Rachel Caroline Kowalski
Author-X-Name-First: Rachel Caroline
Author-X-Name-Last: Kowalski
Title: The role of sectarianism in the Provisional IRA campaign, 1969–1997
Abstract: 
 This article concerns the nature of political violence in an ethnonationally divided society. The article engages with the debates surrounding the discrimination employed, or not, by the PIRA when selecting their targets and waging their campaign against British rule and partition in Ireland between 1969 and 1997. The piece challenges the assertion that the PIRA discriminated with religious bias, and that they actively targeted Protestant civilians. It does so by drawing upon analysis of original data collected for the piece, corroborated with qualitative primary sources including the memoirs of former PIRA members, and the sentiments of a former PIRA member turned informer, Sean O’Callaghan, who agreed to be interviewed for the piece. It is argued that the PIRA aimed only to kill individuals whom they deemed to be in some measure actively responsible for the persistence of British control in Ireland, and the prevention of a reunion with the Republic; and did so in a fashion that was, for the most part, blind to religious diversity. It is also argued, however, that the PIRA were either unable or unwilling to recognise the gap between the actual impact of their “armed struggle” and the intentions that lay behind it.
Journal: Terrorism and Political Violence
Pages: 658-683
Issue: 4
Volume: 30
Year: 2018
Month: 7
X-DOI: 10.1080/09546553.2016.1205979
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1205979
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:4:p:658-683



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1211527_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Julian Droogan
Author-X-Name-First: Julian
Author-X-Name-Last: Droogan
Author-Name: Shane Peattie
Author-X-Name-First: Shane
Author-X-Name-Last: Peattie
Title: Reading jihad: Mapping the shifting themes of Inspire magazine
Abstract: 
 Al Qaeda in the Arabian Peninsula’s Inspire magazine has received attention within Western academia and media for its role in inspiring and instructing a series of homegrown terrorist attacks. Reporting on the magazine often characterises it as a Western-centric instrument of jihadi discourse. This characterisation, while broadly accurate, is in need of refinement. Using a modified version of Jennifer Attride-Stirling’s method of thematic network analysis, this research visualises and analyses the narrative themes contained within fourteen issues of Inspire magazine. It demonstrates that the magazine’s narrative extends well beyond the Western world. In reality, Inspire’s themes centre not only on the West and its Muslim populations, but on local politics and broader religious issues. The magazine’s thematic focus has also shifted over time—particularly in response to (a) political volatility in the Middle East and North Africa, (b) the killing of prominent jihadists, and (c) the execution of successful individual jihad operations. Throughout these periods of change, Inspire struggled to maintain focus on its anti-Western narrative and proved easily distracted by local issues and the “martyrdom” of Al Qaeda leaders. Understanding Inspire’s thematic landscape and its shifting character prove important in understanding and responding effectively to its jihadi discourse.
Journal: Terrorism and Political Violence
Pages: 684-717
Issue: 4
Volume: 30
Year: 2018
Month: 7
X-DOI: 10.1080/09546553.2016.1211527
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1211527
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:4:p:684-717



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1228631_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Hyun Jin Choi
Author-X-Name-First: Hyun Jin
Author-X-Name-Last: Choi
Author-Name: Dongsuk Kim
Author-X-Name-First: Dongsuk
Author-X-Name-Last: Kim
Title: Coup, riot, war: How political institutions and ethnic politics shape alternative forms of political violence
Abstract: 
 This article explores how different types of governance systems shape different forms of political violence. We identify four governance types by combining the “institutional” dimension of coalition size represented by a minimum winning coalition (MWC) and the “ethno-political” dimension represented by the size of ethnic groups participating in the governing coalition. This study hypothesizes that (a) an exclusive system (small MWC; narrow-based ethnic coalition) is likely to engender civil war, (b) an oversized system (small MWC; broad-based ethnic coalition) is likely to generate a coup, and (c) an undersized system (large MWC; narrow-based ethnic coalition) is likely to stimulate riots or protests. Statistical analyses confirm all three hypotheses, implying that opposition groups choose alternative forms of conflict that maximize their chances of accessing power under different governance configurations. The article concludes by identifying three possible paths toward inclusive governance and suggesting that institutional reform before ethnic inclusion makes a transition toward inclusive governance far less dangerous.
Journal: Terrorism and Political Violence
Pages: 718-739
Issue: 4
Volume: 30
Year: 2018
Month: 7
X-DOI: 10.1080/09546553.2016.1228631
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1228631
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:4:p:718-739



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1207633_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ahmed Al-Rawi
Author-X-Name-First: Ahmed
Author-X-Name-Last: Al-Rawi
Title: Video games, terrorism, and ISIS’s Jihad 3.0
Abstract: 
 This study discusses different media strategies followed by the Islamic State in Iraq and Syria (ISIS). In particular, the study attempts to understand the way ISIS’s video game that is called “Salil al-Sawarem” (The Clanging of the Swords) has been received by the online Arab public. The article argues that the goal behind making and releasing the video game was to gain publicity and attract attention to the group, and the general target was young people. The main technique used by ISIS is what I call “troll, flame, and engage.” The results indicate that the majority of comments are against ISIS and its game, though most of the top ten videos are favorable towards the group. The sectarian dimension between Sunnis and Shiites is highly emphasized in the online exchanges, and YouTube remains an active social networking site that is used by ISIS followers and sympathizers to promote the group and recruit others.
Journal: Terrorism and Political Violence
Pages: 740-760
Issue: 4
Volume: 30
Year: 2018
Month: 7
X-DOI: 10.1080/09546553.2016.1207633
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1207633
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:4:p:740-760

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1447184_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Leena Malkki
Author-X-Name-First: Leena
Author-X-Name-Last: Malkki
Author-Name: Mats Fridlund
Author-X-Name-First: Mats
Author-X-Name-Last: Fridlund
Author-Name: Daniel Sallamaa
Author-X-Name-First: Daniel
Author-X-Name-Last: Sallamaa
Title: Terrorism and Political Violence in the Nordic Countries
Abstract: 
 The introductory article to the special issue discusses terrorism and political violence in the Nordic countries and reviews the state of academic research on the topic. Even though the Nordic countries appear to have suffered from lower levels of terrorism and political violence than many other Western states, they have been less void and peripheral with regard to such phenomena than common wisdom and academic scholarship would suggest. While some notable acts of violence like the July 2011 attacks in Norway have been covered in research literature to a certain degree, other phenomena such as far-right violence in Sweden have attracted less attention. The article discusses the ways in which the analysis of Nordic countries could contribute to the field of research and how articles included in the special issue address existing gaps in literature.

Journal: Terrorism and Political Violence
Pages: 761-771
Issue: 5
Volume: 30
Year: 2018
Month: 9
X-DOI: 10.1080/09546553.2018.1447184
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1447184
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:5:p:761-771



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1445888_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jacob Aasland Ravndal
Author-X-Name-First: Jacob Aasland
Author-X-Name-Last: Ravndal
Title: Right-wing Terrorism and Militancy in the Nordic Countries: A Comparative Case Study
Abstract: 
 Combining new quantitative and qualitative data, this article first describes and compares the evolution of right-wing terrorism and militancy in the Nordic countries between 1990 and 2015. Having established that Sweden has experienced considerably more right-wing terrorism and militancy than the other Nordic countries have, the article then seeks to account for Sweden’s outlier position. In doing so, the article draws on three concepts proposed by social movement research: organizational resources, political opportunities, and frame analysis. Applying these concepts to the Nordic countries, the study finds that Sweden’s outlier position may result from different WWII experiences, leaving Sweden with a stronger and more resilient extreme right movement, but also from receiving more immigrants while lacking influential anti-immigration (radical right) parties, and from conducting a more restrictive public debate on immigration, leaving little room for anti-immigration concerns in the public sphere. While the first two explanations are consistent with existing research, the third challenges the dominant view on how the public debate on immigration might influence extreme right mobilization and violence.
Journal: Terrorism and Political Violence
Pages: 772-792
Issue: 5
Volume: 30
Year: 2018
Month: 9
X-DOI: 10.1080/09546553.2018.1445888
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1445888
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:5:p:772-792



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1444796_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mattias Gardell
Author-X-Name-First: Mattias
Author-X-Name-Last: Gardell
Title: Urban Terror: The Case of Lone Wolf Peter Mangs
Abstract: 
 White racist serial killer Peter Mangs is the most politically conscious lone wolf terrorist Sweden has seen thus far. Adopting the tactics of Joseph Paul Franklin to the city of Malmö, Mangs committed at least three murders and twelve murder attempts between 2003 and 2010. Well-versed in white power literature and leaderless resistance tactics, Mangs aimed at “igniting a race war” by shooting Black, Muslim, and Roma citizens to amplify racialized tensions, grievances, and anxieties in the increasingly segregated city. Yet, Mangs is not included in any database of single-actor terrorism, as these depend on how a perpetrator or incident is defined by the police, the courts, and the media. In this case, Mangs’ political motives were ignored by everyone, except by people in the targeted communities and the white racist milieu. This fact highlights the importance of ethnographic methods to terrorism studies. Based on ten three-hour interviews with Mangs, an analysis of his own political writings, previously not known to the public, interviews with Mangs’ victims, their friends and relatives, and extensive fieldwork in Malmö among activists across the political spectrum, including people who hailed Mangs’ deeds as heroic, this essay explores the impact of urban lone wolf terrorism.
Journal: Terrorism and Political Violence
Pages: 793-811
Issue: 5
Volume: 30
Year: 2018
Month: 9
X-DOI: 10.1080/09546553.2018.1444796
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1444796
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:5:p:793-811



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1445397_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jussi Jalonen
Author-X-Name-First: Jussi
Author-X-Name-Last: Jalonen
Title: From Underground Terrorism to State Terrorism and Beyond: The Question of Terrorism in the Finnish Jäger Movement during and after the First World War
Abstract: 
 Political terrorism has played an integral part in the independence struggle of several sovereign nations, and resistance and liberation movements have often had to resort to terrorism as a deliberate strategy. In the Finnish nationalist struggle for independence, a key role was played by the Jäger Movement, which combined the features of transnational war volunteerism and an underground organization. The military cooperation with Germany against the Russian Empire during the First World War, and the creation of the Finnish 27th Royal Prussian Jäger Battalion, also necessitated the establishment of a clandestine recruitment network in Finland, which effectively operated as an underground organization. During the war, the Jäger Movement was repeatedly faced with the question of resorting to reprisals and terror tactics. This process culminated in the autumn of 1916, and briefly showed signs of escalating to the level of an actual terror campaign, until it was cut short by the Russian February Revolution. Nonetheless, the accumulated propensity for political violence manifested itself during the subsequent Finnish Civil War, as well as during the far-right reaction of the early 1930s. The article approaches the question of terrorism in the Jäger Movement during this era, the issue of deploying “enforcement terror” during the independence struggle, and the subsequent distinctive participation of Jägers in state terror during the Civil War and the extreme right-wing political terror in the 1930s.
Journal: Terrorism and Political Violence
Pages: 812-827
Issue: 5
Volume: 30
Year: 2018
Month: 9
X-DOI: 10.1080/09546553.2018.1445397
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1445397
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:5:p:812-827



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1445821_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard Bach Jensen
Author-X-Name-First: Richard Bach
Author-X-Name-Last: Jensen
Title: The 1904 Assassination of Governor General Bobrikov: Tyrannicide, Anarchism, and the Expanding Scope of “Terrorism”
Abstract: 
 The little-known assassination in 1904 of governor general Bobrikov, the Russian ruler of Finland, by the Finnish Senate clerk Eugen Schauman can be explained as an act of tyrannicide, anarchism, or terrorism. The article analyzes the question of which category this deed fits into and discusses the local and international background of one of the most significant acts of violence in Nordic history. It also postulates that around the time of Bobrikov’s murder in 1904 a fundamental shift occurred in the usage of the term “terrorism,” which began to replace “anarchism” as the standard signifier for violent crimes against civilization as well as against specific political grievances and institutions.
Journal: Terrorism and Political Violence
Pages: 828-843
Issue: 5
Volume: 30
Year: 2018
Month: 9
X-DOI: 10.1080/09546553.2018.1445821
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1445821
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:5:p:828-843



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1445892_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Teemu Tammikko
Author-X-Name-First: Teemu
Author-X-Name-Last: Tammikko
Title: The Threat of Returning Foreign Fighters: Finnish State Responses to the Volunteers in the Spanish and Syria-Iraq Civil Wars
Abstract: 
 The conflict in Syria and Iraq from 2011 onwards, and the Spanish Civil War in 1936–39 both witnessed a very relevant foreign fighter phenomenon. Even if the ideological drivers were different, both phenomena had a huge impact internationally on how foreign fighters were perceived as a threat in their home countries. In this article the official state responses to the two waves of foreign fighters have been compared with respect to the Finnish context. The volunteers in the Spanish conflict were regarded a security threat upon their return, since it was estimated that they might provide added expertise to the revolutionary left-wing movements in Finland. The returning volunteers from Syria-Iraq have not been perceived as a revolutionary threat to the Finnish political system, but as potential terrorists attacking the civilian population. After comparing different political contexts, it can be argued that the domestic political situation has in both cases had an impact on how the threats were answered in practice. Since the foreign fighters in Spain had significant political support among the growing left-wing parties, the Finnish state response towards them remained vague. In the Syria-Iraq case there has been no political support for the foreign fighters, and the issue has been effectively securitized.
Journal: Terrorism and Political Violence
Pages: 844-861
Issue: 5
Volume: 30
Year: 2018
Month: 9
X-DOI: 10.1080/09546553.2018.1445892
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1445892
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:5:p:844-861



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1447191_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Leena Malkki
Author-X-Name-First: Leena
Author-X-Name-Last: Malkki
Author-Name: Daniel Sallamaa
Author-X-Name-First: Daniel
Author-X-Name-Last: Sallamaa
Title: To Call or Not to Call It Terrorism: Public Debate on Ideologically-motivated Acts of Violence in Finland, 1991–2015
Abstract: 
 This article looks at how domestic acts of ideologically-motivated violence have been treated in Finnish public discussion with a particular focus on how the word “terrorism” has and has not been used to characterize such incidents. The work demonstrates that Finnish public debate has, with certain notable exceptions, primarily avoided labelling any violent attacks in the country as terrorism. This reluctance stems from Finnish traditions of crisis management, counterterrorism, and politics. Furthermore, the propensity to use the term “terrorism” cannot be explained by such characteristics of the attack itself as the number of casualties or whether it was perpetrated by ingroup or outgroup members. Rather than “what has happened,” the question of calling or not calling an act terrorism comes down to the question of “what needs to be done.” The article contributes to academic debate by investigating a surprisingly under-researched aspect of how the term terrorism is used in public discussion while also shedding new light on the debate in Finland, a country seldom touched upon by research of terrorism and political violence.
Journal: Terrorism and Political Violence
Pages: 862-881
Issue: 5
Volume: 30
Year: 2018
Month: 9
X-DOI: 10.1080/09546553.2018.1447191
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1447191
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:5:p:862-881

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1481186_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Julie Chernov Hwang
Author-X-Name-First: Julie Chernov
Author-X-Name-Last: Hwang
Title: Pathways into Terrorism: Understanding Entry into and Support for Terrorism in Asia
Abstract: 
 How do individuals join Islamist extremist groups? Why do individuals support such groups? What factors contribute to a decision to join? What are the pathways into Islamist extremist groups? Drawing on examples from Pakistan, Bangladesh, Indonesia and the Philippines, the articles in this special issue address these critically important questions drawing on original fieldwork, new datasets and large scale national survey research. These articles explore the experiences and perceptions of men and women, South and Southeast Asians, living in majority Muslim and non-Muslim nations. Collectively, they illustrate the importance of social bonds&kinship ties, friendship, teacher-student ties and online relationships in creating a powerful sense of community that fosters a sense of belonging and eventual commitment. The goal of this special issue is to highlight the contributions that Asian cases can make to the often Middle Eastern and European-centric discourses on radicalization, joining and support for militancy.
Journal: Terrorism and Political Violence
Pages: 883-889
Issue: 6
Volume: 30
Year: 2018
Month: 11
X-DOI: 10.1080/09546553.2018.1481186
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1481186
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:6:p:883-889



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1481269_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nava Nuraniyah
Author-X-Name-First: Nava
Author-X-Name-Last: Nuraniyah
Title: Not Just Brainwashed: Understanding the Radicalization of Indonesian Female Supporters of the Islamic State
Abstract: 
 Why do women become extremists? To what extent might they have self-agency? This paper examines the motivations and processes of female radicalization into the so-called Islamic State (IS) by drawing on a case study of Indonesian IS sympathizers, including the three migrant workers-turned-female suicide bombers whose radicalization was facilitated by social media. It argues that far from being coerced, most women join IS of their own free will. Prompted by a mix of personal crisis and socioeconomic and political grievances, the women embark on a religious seeking, exploring the various Islamic options available to them. Ideational congruence might spark the initial interest in IS, but it is generally emotional factors such as a feeling of acceptance and empowerment that make them stay. Contrary to common assumptions, women’s subordination in jihadist organizations is not absolute; it can be negotiated after joining. Most women try to conform to jihadist strict gender rules, but some, often with the support of male allies, try to bend the norms, including on female combat roles. The findings suggest that counter-terrorism agencies should abandon the binary view that women are either just brainwashing victims or terrorist provocateurs, and try to understand the gendered nuances of radicalization in order to formulate suitable preventive measures.
Journal: Terrorism and Political Violence
Pages: 890-910
Issue: 6
Volume: 30
Year: 2018
Month: 11
X-DOI: 10.1080/09546553.2018.1481269
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1481269
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:6:p:890-910



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1481309_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Julie Chernov Hwang
Author-X-Name-First: Julie Chernov
Author-X-Name-Last: Hwang
Author-Name: Kirsten E. Schulze
Author-X-Name-First: Kirsten E.
Author-X-Name-Last: Schulze
Title: Why They Join: Pathways into Indonesian Jihadist Organizations
Abstract: 
 Why do Indonesian Muslims join Islamist extremist groups? This article explores four pathways to entry into Indonesian militant groups: study sessions, local conflict, kinship, and schools. It argues that within all four of these pathways, social bonds and relationships are the common thread in encouraging entry as well as in fostering commitment. Specifically, these relationships contribute to the formation and eventual consolidation of one’s identity as a member of the jihadi group through regular participation in activities, attending meetings, narrowing the circle of friends to those within the group, and participating in increasingly risky and possibly violent activities together. Drawing on original fieldwork including 49 interviews with current and former members of Jemaah Islamiyah, Mujahidin KOMPAK, Darul Islam, Mujahidin Tanah Runtuh, Indonesia’s pro-ISIS network, and other jihadist groups as well as 57 depositions and court documents, this article explores the development and evolution of these pathways and how relational ties play a role in each.
Journal: Terrorism and Political Violence
Pages: 911-932
Issue: 6
Volume: 30
Year: 2018
Month: 11
X-DOI: 10.1080/09546553.2018.1481309
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1481309
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:6:p:911-932



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1481190_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sidney Jones
Author-X-Name-First: Sidney
Author-X-Name-Last: Jones
Title: Radicalisation in the Philippines: The Cotabato Cell of the “East Asia Wilayah”
Abstract: 
 The backgrounds of seven suspects arrested in connection with a September 2016 bombing in Davao, Philippines provide clues to how extremist ideology and support for ISIS took root in a middle-class urban environment. The seven men, part of the coalition that eventually took over Marawi in 2017, were drawn in by the idea of a caliphate, propaganda videos that became discussion material for charismatic young religious scholars, and the pull of friends and family. They represented overlapping networks of neighbours, business partners, and students. Their interwoven journeys to violent extremism provide a glimpse into how ISIS managed to transcend traditional clan and regional loyalties in the Philippines, but much more research is needed among pro-ISIS detainees to understand the phenomenon and take measures to address it.
Journal: Terrorism and Political Violence
Pages: 933-943
Issue: 6
Volume: 30
Year: 2018
Month: 11
X-DOI: 10.1080/09546553.2018.1481190
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1481190
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:6:p:933-943



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1481312_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ali Riaz
Author-X-Name-First: Ali
Author-X-Name-Last: Riaz
Author-Name: Saimum Parvez
Author-X-Name-First: Saimum
Author-X-Name-Last: Parvez
Title: Bangladeshi Militants: What Do We Know?
Abstract: 
 Although militant groups have been present in Bangladesh since the 1990s, the country catapulted to international media attention on July 1, 2016, after an attack on a café in the upscale neighborhood of the capital Dhaka. The Islamic State claimed responsibility for the attack which killed 29 people, mostly foreigners. The attack came in the wake of a series of attacks on religious and ethnic minorities, foreigners, liberal activists, authors, and publishers by both an AQIS affiliate and ISIS. The government denied the existence of militant groups tied to international terrorist organizations. Despite these developments and instances of Bangladeshis joining the ISIS in Iraq and Syria, there has been very little in-depth discussion about who these militants are and what is driving Bangladeshis to militancy. This article addresses this lacuna. This paper examines the common traits of alleged Bangladeshi militants and explores the factors of radicalization. Drawing on media reports of the profiles of the alleged militants, between July 2014 and June 2015, and between July 2016 and August 2017, the article finds that most of the Bangladeshi militants are young, educated males increasingly coming from well-off families. We have also found evidence that four factors—social relationships, use of the Internet, personal crises, and external relations—appear most frequently in the narratives of Bangladeshi militants.
Journal: Terrorism and Political Violence
Pages: 944-961
Issue: 6
Volume: 30
Year: 2018
Month: 11
X-DOI: 10.1080/09546553.2018.1481312
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1481312
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:6:p:944-961



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1481313_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: C. Christine Fair
Author-X-Name-First: C. Christine
Author-X-Name-Last: Fair
Author-Name: Ali Hamza
Author-X-Name-First: Ali
Author-X-Name-Last: Hamza
Title: Women and Support for Terrorism in Pakistan
Abstract: 
 While there have been many scholarly inquiries about the sources of support for terrorism among Muslim publics, to date, scholars have generally not asked whether or not gender predicts support for Islamist militancy. Instead, most scholars and officials assume that “men of military age” are the most important segment of interest. Instead, gender is usually treated as a “control variable” rather than a “study variable,” reflecting the paucity of interest in this subject. This is likely an important scholarly and policy-analytic oversight. Many terrorist groups have women’s wings and women-oriented publications and other outreach programs because they understand the important role that mothers, wives, and sisters play in a male family member’s decision to take up arms with a terrorist group. In some conflicts, women also join as combatants. In this paper, we seek to address these scholarly lacunae by examining gender-wise support for two militant groups based in and operating from Pakistan: the Afghan Taliban, which has no female outreach program, and the sectarian Sipha-e-Sahaba-e-Pakistan, which does. We leverage a dataset drawn from a relatively large national survey of Pakistanis collected in 2011 to model support for these groups using gender as an independent variable along with other demographic and control variables. We find that females are significantly more likely to support the sectarian group with a women’s outreach-wing. In contrast, there is no significant gender effect on support for the Afghan Taliban. We argue, from these results, that gender deserves more attention in understanding who supports and participates in Islamist militancy.
Journal: Terrorism and Political Violence
Pages: 962-983
Issue: 6
Volume: 30
Year: 2018
Month: 11
X-DOI: 10.1080/09546553.2018.1481313
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1481313
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:30:y:2018:i:6:p:962-983

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1542877_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeffrey Kaplan
Author-X-Name-First: Jeffrey
Author-X-Name-Last: Kaplan
Title: Introduction
Abstract: 
 In Finland, there is a joke of some vintage that goes roughly like this: When God created the world, He took the angels on a tour of the Earth. The key, He assured the Heavenly Host, is balance. There are people with light skin and with dark skin. There are hot regions and cold ones. There are deserts and jungles. But this, He said proudly, pointing to the land that would one day become Finland, is My greatest creation in this world. Its people will be beautiful and wise. They will become great scientists and world peace makers. And the angels marveled at the perfection of this place until one, finding his courage, said, “But Lord, what about balance?” “Ahhh…” said the Lord pointing to Sweden and Russia, “you should see the idiots that I put on either side of them!”
Journal: Terrorism and Political Violence
Pages: 1-8
Issue: 1
Volume: 31
Year: 2019
Month: 1
X-DOI: 10.1080/09546553.2018.1542877
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1542877
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:1:p:1-8



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1555994_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David B. Kanin
Author-X-Name-First: David B.
Author-X-Name-Last: Kanin
Title: The Wests: Decline Management and Geopolitics
Abstract: 
 The ebbing power of the United States signals the end of the period in which a series of “Wests” have created, globalized, and dominated an international order. Each “West” has had its own norms of authority and coercive utopia, but they shared in common the projection of a sense of modernity, technical proficiency, and inevitable, invincible authority. The two current Wests, the European Union and the United States, boast a partial normative overlap but have different creation myths. American fumbling of its hegemonic moments highlights the narrowing of room for error that defines decline. Still, decline does not necessarily lead to collapse, and skillful management could mitigate its effect. In part, this depends on whether Washington can come to rely less on neo-Wilsonian nostrums and more on the creative side of the American record.
Journal: Terrorism and Political Violence
Pages: 9-32
Issue: 1
Volume: 31
Year: 2019
Month: 1
X-DOI: 10.1080/09546553.2018.1555994
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1555994
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:1:p:9-32



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1574131_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeffrey Kaplan
Author-X-Name-First: Jeffrey
Author-X-Name-Last: Kaplan
Title: More East than West: The World Council of Churches at the Dawn of the Cold War
Abstract: 
 Before there was hybrid warfare or its more innocuously styled component information warfare, there were Soviet Active Measures (Aктивные мероприятия). Conceived in 1948 and fully implemented by the 1970s, Active Measures were a palate of techniques designed to both deceive the West and to turn Western public opinion toward whatever the Soviet policy of the moment might be. “More East than West” presents a brief introduction to the Active Measures program which is followed by a single case study, that of the World Council of Churches (WCC). The image of the World Council of Churches as a Cold War pawn of the Soviet Union has become set in the American popular consciousness. It was not always so. At its birth in 1948, the WCC was seen as a promising ecumenical experiment that might serve to better unite the Christian churches of the world. Its birth, however, coincided precisely with the emergence of the Cold War and the organization was soon dragged kicking and screaming into the conflict. The Americans in the era of President Harry S. Truman saw in the group a potential ally for the Roman Catholic Church in erecting a spiritual barricade against the encroachment of atheistic communism. After 1961, the Soviets saw the group as a useful conduit for propaganda messages as designed by the Active Measures program that designed and disseminated Soviet propaganda throughout the Cold War. In the end, Soviet influence came to dominate the group’s political positions, but it never became an actual front group and successive American Presidents carried on a range of relationships with the WCC. This article offers a history of the early years of the Cold War struggle over the soul of the WCC.
Journal: Terrorism and Political Violence
Pages: 33-63
Issue: 1
Volume: 31
Year: 2019
Month: 1
X-DOI: 10.1080/09546553.2019.1574131
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1574131
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:1:p:33-63



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1555996_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: George Michael
Author-X-Name-First: George
Author-X-Name-Last: Michael
Title: Useful Idiots or Fellow Travelers? The Relationship between the American Far Right and Russia
Abstract: 
 The relationship between the American far right and Russia has varied over time. During the Cold War, American right-wing populists were in the forefront of opposition to the Soviet Union. But as the Cold War waned, the far right became more sympathetic to Russia, viewing it as the last remaining white bastion nation in a world in which a “rising tide of color” threatened to engulf the white race. Despite the recent deterioration of relations between Russia and the United States, the contemporary alt-right is increasingly sympathetic toward President Vladimir Putin and his nationalist agenda. The realm of cyberspace presents new opportunities for the fledging alliance between Russia and its supporters among the alt-right.
Journal: Terrorism and Political Violence
Pages: 64-83
Issue: 1
Volume: 31
Year: 2019
Month: 1
X-DOI: 10.1080/09546553.2018.1555996
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1555996
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:1:p:64-83



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1555997_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Carol K. G. Lutz
Author-X-Name-First: Carol K. G.
Author-X-Name-Last: Lutz
Author-Name: Brenda J. Lutz
Author-X-Name-First: Brenda J.
Author-X-Name-Last: Lutz
Author-Name: James M. Lutz
Author-X-Name-First: James M.
Author-X-Name-Last: Lutz
Title: Russian Foreign Policy Management and Manipulation with the Soviet Successor States
Abstract: 
 Russia has been anxious to maintain its influence with the other successor states of the Soviet Union (the Near Abroad). It used a variety of methods, both overt and covert, to further its foreign policy objectives with these countries. Moscow has relied on traditional economic statecraft including trade manipulation, free trade arrangements, and currency linkages as well as ethnic appeals and propaganda/news manipulation to influence foreign audiences. In addition, Russia has used clandestine operations, including cyber attacks, and support for dissident groups. With the annexation of Crimea and the conflict with Georgia Russia chose direct military force because all other options had failed.
Journal: Terrorism and Political Violence
Pages: 84-97
Issue: 1
Volume: 31
Year: 2019
Month: 1
X-DOI: 10.1080/09546553.2018.1555997
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1555997
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:1:p:84-97



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1555975_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andres B. Munoz Mosquera
Author-X-Name-First: Andres B.
Author-X-Name-Last: Munoz Mosquera
Author-Name: Sascha Dov Bachmann
Author-X-Name-First: Sascha Dov
Author-X-Name-Last: Bachmann
Author-Name: J. Abraham Munoz Bravo
Author-X-Name-First: J. Abraham Munoz
Author-X-Name-Last: Bravo
Title: Hybrid Warfare and the Legal Domain
Abstract: 
 This short essay aims at shedding some light on the use of lawfare as an emerging domain of full spectrum warfare which can either be used in its own right to achieve its own strategic objectives or as an enabler within the context of influencing the adversary in connection with well-planned Info-Ops and Stratcom operations. The authors conclude that considering the law as a domain, the use of lawfare is an “Offset Strategy,” which will provide a considerable competitive advantage in the proper offensive and defensive applicability of law which will prevent potential adversaries to abuse the rule of law to achieve their own strategic objectives.
Journal: Terrorism and Political Violence
Pages: 98-104
Issue: 1
Volume: 31
Year: 2019
Month: 1
X-DOI: 10.1080/09546553.2018.1555975
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1555975
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:1:p:98-104



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1555974_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andreas Umland
Author-X-Name-First: Andreas
Author-X-Name-Last: Umland
Title: Irregular Militias and Radical Nationalism in Post-Euromaydan Ukraine: The Prehistory and Emergence of the “Azov” Battalion in 2014
Abstract: 
 During and after Ukraine’s celebrated Euromaydan (literally: European Square) Revolution of 2013–2014, a whole number of novel Ukrainian political and societal phenomena emerged. One of the most intriguing was the relatively spontaneous and government-supported emergence of volunteer armed units from late spring 2014 onwards, in connection with the start of Russia’s covert paramilitary intervention in Eastern Ukraine. Among the most widely noted of these initially irregular detachments was the “Azov” battalion or regiment, named after the Azov Sea, created, in May 2014, by an obscure lunatic fringe group of racist activists. This paper briefly sketches the origins of Azov, biographies of some of its founders, and particulars of its creation, without touching upon such issues as Azov’s military performance, later integration into the National Guard under Ukraine’s Ministry of Interior, and political development after 2014.
Journal: Terrorism and Political Violence
Pages: 105-131
Issue: 1
Volume: 31
Year: 2019
Month: 1
X-DOI: 10.1080/09546553.2018.1555974
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1555974
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:1:p:105-131



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1555976_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: János Besenyő
Author-X-Name-First: János
Author-X-Name-Last: Besenyő
Title: The Africa Policy of Russia
Abstract: 
 We have heard ever more about the growing Russian presence in Africa in the past few years, which might appear strange for many people. Those, however, who know the history of the Black Continent, also know that Russian presence is not a new phenomenon. Africa was an important place during the Cold War where the Soviet Union not only competed with the United States of America, but also with China. For those who observed the robustly growing US and Chinese Africa policies, it could have appeared after the end of the classic Cold War, that the Russians had retreated beyond the borders of their country, abandoning the Black Continent in favour of their previous rivals. However, it did not happen, because the Russians did not close their diplomatic missions as they did in the former socialist countries of Eastern Europe. Furthermore, the Russians played a key role in UN Peacekeeping Missions in Africa, where they provided the necessary Air Transportation Capabilities together with the Ukrainians. Today it is becoming obvious that not only a new form of the Cold War has been resumed between the West and Russia but also the fact that the Russian “retreat” was only temporary. The relations with African countries are becoming increasingly important not only for the Russians, but also for the Africans, who need no longer choose between the American and the Chinese way of development. Even though the US and China did not view Russia as a competitor in the recent past, taking into account the events of the past few years the situation has changed. We also need to see that Russia—similarly to China—is primarily a competitor to US great power interests. China intends to cooperate with Russia, rather than competing, whilst not denying the existence of competition between the two countries. I would like to give a picture of this process in my study, including the changing balance of powers in Africa.
Journal: Terrorism and Political Violence
Pages: 132-153
Issue: 1
Volume: 31
Year: 2019
Month: 1
X-DOI: 10.1080/09546553.2018.1555976
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1555976
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:1:p:132-153



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1555995_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Katri Pynnöniemi
Author-X-Name-First: Katri
Author-X-Name-Last: Pynnöniemi
Title: The Asymmetric Approach in Russian Security Strategy: Implications for the Nordic Countries
Abstract: 
 Two observations stand out from the Russian strategic outlook. First, it corresponds with the real politik vision of world politics where the states engage in (zero-sum) competition for power and resources. Second, the new world order emerges because of a conflict between different models of development and value systems. These two observations highlight a certain “family resemblance” between the current Russian assessment of the current security environment and the situation during the Cold War. Furthermore, Russian national security strategy is oriented toward achieving strategic stability with the other great powers. The maintenance of strategic parity (nuclear and conventional deterrence) is a means to this end. However, given Russia’s relative weakness in comparison to its major geopolitical competitors, this has led to the renewal of the Cold War-era concept of asymmetric approach. Although this concept is most often used in the context of nuclear deterrence and the debate on “strategic stability,” it is not about military security only. The set of asymmetric measures from economic dependence or sanctions, to diplomatic, political, and informational measures are used to prevent an emergence of a conflict that would threaten Russia’s sovereignty and domestic stability. The purpose of this paper is to explore the Soviet roots of Active Measures and how the Soviet heritage is present at both the theoretical level and in concrete practices. Finally, insights from the conceptual analysis are applied in assessing the vulnerability of the Nordic countries, in particular Finland and Sweden, to Russian influence operations.
Journal: Terrorism and Political Violence
Pages: 154-167
Issue: 1
Volume: 31
Year: 2019
Month: 1
X-DOI: 10.1080/09546553.2018.1555995
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1555995
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:1:p:154-167

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1135425_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Yelena Biberman
Author-X-Name-First: Yelena
Author-X-Name-Last: Biberman
Author-Name: Farhan Zahid
Author-X-Name-First: Farhan
Author-X-Name-Last: Zahid
Title: Why terrorists target children: Outbidding, desperation, and extremism in the Peshawar and Beslan school massacres
Abstract: 
 Why do terrorists engage in behavior that is extreme even by their own admission—killing children? This behavior poses a major puzzle to our understanding of terrorism, but it has been surprisingly underexplored. This article addresses the question of why terrorists intentionally target children with a comparative study of the two deadliest attacks in which children were deliberately targeted by a militant organization: the Peshawar (2014) and Beslan (2004) school massacres. The article identifies two factors that increase the likelihood that a terrorist group will target children. The first is the presence of internal rifts within an already highly violent organization. This is likely to trigger outbidding and, thus, result in more brutal attacks. The second is existentially threatening external pressure, which seriously weakens the group and, thus, leads it to select soft and shocking targets, such as schools. The findings are based on evidence drawn from primary and secondary sources, including interviews conducted in Peshawar and Islamabad, Pakistan, and Moscow, Russia.
Journal: Terrorism and Political Violence
Pages: 169-184
Issue: 2
Volume: 31
Year: 2019
Month: 3
X-DOI: 10.1080/09546553.2015.1135425
File-URL: http://hdl.handle.net/10.1080/09546553.2015.1135425
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:2:p:169-184



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1194269_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mehmet Alper Sozer
Author-X-Name-First: Mehmet Alper
Author-X-Name-Last: Sozer
Author-Name: Kamil Yilmaz
Author-X-Name-First: Kamil
Author-X-Name-Last: Yilmaz
Title: The PKK and its evolution in Britain (1984–present)
Abstract: 
 As of today, a highly mobilized Kurdish diaspora and its most prominent representative, the Kurdistan Workers’ Party (PKK), has become so influential in the European political arena that it might tip the balance of the European Union’s policies on Turkey in its favor. Since too much attention has been given to the PKK’s activities in Germany, the organization’s actions in Britain remain understudied, despite the fact that Britain has been a vital place in Kurdish politics and political lobbying activities. Drawing on fieldwork findings, this article attempts to explore both the evolution and the political activities of the PKK in Britain across three different timeframes, from 1984 until the present time. Our findings suggest that in Britain, the PKK has departed in recent years from its conventional terrorist activities and transformed into a lobbying power that is likely to gain full legitimacy (i.e., being de-listed from terrorist organization lists) in the near future.
Journal: Terrorism and Political Violence
Pages: 185-203
Issue: 2
Volume: 31
Year: 2019
Month: 3
X-DOI: 10.1080/09546553.2016.1194269
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1194269
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:2:p:185-203



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1211525_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nilay Saiya
Author-X-Name-First: Nilay
Author-X-Name-Last: Saiya
Title: Religion, state, and terrorism: A global analysis
Abstract: 
 This article investigates two ways in which state involvement in religion—minority and majority restriction—generates terrorism. Using a time-series, cross-national negative binomial analysis of 174 countries from 1991–2009, this study finds that when religiously devout people find themselves marginalized through either form of religious restriction, they are more likely to pursue their aims through violence. The article concludes with recommendations for policymakers.
Journal: Terrorism and Political Violence
Pages: 204-223
Issue: 2
Volume: 31
Year: 2019
Month: 3
X-DOI: 10.1080/09546553.2016.1211525
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1211525
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:2:p:204-223



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1211526_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Carol K. Winkler
Author-X-Name-First: Carol K.
Author-X-Name-Last: Winkler
Author-Name: Kareem El Damanhoury
Author-X-Name-First: Kareem
Author-X-Name-Last: El Damanhoury
Author-Name: Aaron Dicker
Author-X-Name-First: Aaron
Author-X-Name-Last: Dicker
Author-Name: Anthony F. Lemieux
Author-X-Name-First: Anthony F.
Author-X-Name-Last: Lemieux
Title: The medium is terrorism: Transformation of the about to die trope in Dabiq
Abstract: 
 Daesh’s ability to successfully recruit foreign fighters from more than one hundred countries worldwide raises the importance of understanding the group’s strategic media campaign. Recognizing that visual images, in particular, often increase viewers’ attention, recall, and emotional response, this study of Daesh’s official magazine, Dabiq, moves beyond earlier studies primarily focused on the magazine’s textual content to analyze the group’s visual communication strategy. This study’s content analysis of the 1,144 images appearing in the magazine’s first twelve issues reveals how Dabiq has relied extensively on a historic American media trope, the about to die image, to bolster image recirculation over time. This essay examines both the form and content of Dabiq’s use of three about to die image types as they have evolved across the twelve issues. Rather than seek to win the “hearts and minds” of the Muslim public, Dabiq’s use of about to die images transforms the online medium into terrorism in ways that have lasting implications for the global culture.
Journal: Terrorism and Political Violence
Pages: 224-243
Issue: 2
Volume: 31
Year: 2019
Month: 3
X-DOI: 10.1080/09546553.2016.1211526
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1211526
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:2:p:224-243



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1212599_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sam Jackson
Author-X-Name-First: Sam
Author-X-Name-Last: Jackson
Title: Non-normative political extremism: Reclaiming a concept’s analytical utility
Abstract: 
 Political extremism suffers from a definitional deficiency. This article proposes an analytical definition of the term, which avoids using extremism in a pejorative way. This definition also avoids exclusive focus on violence. This definition encourages the analyst to explicitly make the case for defining an action or an actor as extremist by comparing the action or actor to its political context. The article then explores several dimensions of an extremist political identity that can help observers understand extremist behavior and goals. It uses this conceptual framework to consider three examples of political extremism. Finally, the article concludes with some limitations and strengths of this definition of political extremism.
Journal: Terrorism and Political Violence
Pages: 244-259
Issue: 2
Volume: 31
Year: 2019
Month: 3
X-DOI: 10.1080/09546553.2016.1212599
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1212599
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:2:p:244-259



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1213721_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Antony Field
Author-X-Name-First: Antony
Author-X-Name-Last: Field
Title: Ethics and entrapment: Understanding counterterrorism stings
Abstract: 
 This article examines domestic counterterrorism sting operations in the USA. It considers why critics consider these operations unethical and illegitimate. In particular, it looks at claims that counterterrorism sting operations have entrapped innocent people. This article explains why the U.S. courts have rejected claims of entrapment. It discusses different standards of entrapment used by the U.S. courts and sets out how these standards apply to counterterrorism sting operations. The article will show how key pieces of evidence convinced the courts that the targets of sting operations were predisposed towards terrorism. As a result, defendants were not able to mount successful entrapment defenses. By the end of the article, the reader will have a better understanding of the ethical and legal safeguards governing counterterrorism sting operations in the USA.
Journal: Terrorism and Political Violence
Pages: 260-276
Issue: 2
Volume: 31
Year: 2019
Month: 3
X-DOI: 10.1080/09546553.2016.1213721
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1213721
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:2:p:260-276



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1215309_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ismail Onat
Author-X-Name-First: Ismail
Author-X-Name-Last: Onat
Title: An analysis of spatial correlates of terrorism using risk terrain modeling
Abstract: 
 The purpose of this study is to identify correlates of terrorism in space. It examines whether places with terrorist incidents show similar patterns with respect to the physical features across landscape, and tests the spatial influence of various features of environment on the incidence of terrorism. Drawing on the locations of violent terrorist offenses committed between 2008 and 2012, the study in Istanbul applies the Risk Terrain Modeling framework to terrorism. It uses data on police incidents and infrastructure (e.g., government buildings or parks). The analysis employs GIS techniques and an event count model, and combines all risky layers in a composite map to understand where the risk is higher. The study suggests a concentration of 1153 violent terrorist incidents relative to key physical factors by identifying seventeen potential risk factors, eight of which were significantly correlated in the model. Regardless of terrorists’ intent, the significantly associated establishments increase the risk in the surrounding areas where these features are located. The coexistence of leisure places such as bakeries, religious facilities, or eateries results in higher risks. While the environmental backcloth may constitute a risk for terrorism, its components may also help forecast the locations of terrorist incidents in the future.
Journal: Terrorism and Political Violence
Pages: 277-298
Issue: 2
Volume: 31
Year: 2019
Month: 3
X-DOI: 10.1080/09546553.2016.1215309
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1215309
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:2:p:277-298



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1219725_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Stephen Tankel
Author-X-Name-First: Stephen
Author-X-Name-Last: Tankel
Title: Universal soldiers or parochial actors: Understanding jihadists as products of their environments
Abstract: 
 Why did the Islamic State of Iraq and al-Sham (ISIS) and Jabhat al-Nusra (JN)—two groups that shared similar ideological preferences and were both initially part of the Al Qaeda network—take different paths in the Syrian conflict? Part of the answer lies in the fact that JN is primarily a Syrian organization, whereas Iraqis lead ISIS. A jihadist group’s relationship to its country of origin and domicile (the two are not always the same) helps to explain that organization’s ideological preferences and alliance behavior. Yet no method of categorization based on jihadist-state relations exists. I fill this gap by theorizing an explanatory typology based on a jihadist group’s relationship with its country of origin and/or domicile. This typology consists of two tiers. The first classifies jihadist organizations based on whether they are nationally homogeneous or heterogeneous, and whether they are based in their country of origin, exile, or multiple locations. The second tier categorizes groups based on the nature of their engagement—collaborative, belligerent, or neutral—with a state. This new typology enables the generation of multiple hypotheses and has practical implications given that most U.S. counterterrorism efforts require cooperation from partner nations.
Journal: Terrorism and Political Violence
Pages: 299-322
Issue: 2
Volume: 31
Year: 2019
Month: 3
X-DOI: 10.1080/09546553.2016.1219725
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1219725
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:2:p:299-322



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1228630_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joseph K. Young
Author-X-Name-First: Joseph K.
Author-X-Name-Last: Young
Title: Measuring terrorism
Abstract: 
 In the conceptual literature on terrorism, there is no shortage of answers to the question: “What is terrorism?” Indeed, the terrorism literature has been heavily criticized for a deluge of definitions. And yet the booming quantitative terrorism literature generally examines a narrow set of “what is terrorism?”: how country-level factors explain variation in the number of terrorist attacks. This article demonstrates the variety of ways in which scholars currently operationalize terrorism and compares them to the ways it could be operationalized. I replicate studies using alternative operationalizations of terrorism to examine the consequences of the terrorism literature’s collective bet to focus on attack counts at the country level. Finally, I discuss the implications of the narrow set of operational choices with an eye towards how a greater variety of approaches would produce a more robust research agenda.
Journal: Terrorism and Political Violence
Pages: 323-345
Issue: 2
Volume: 31
Year: 2019
Month: 3
X-DOI: 10.1080/09546553.2016.1228630
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1228630
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:2:p:323-345



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1228632_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joseph Mroszczyk
Author-X-Name-First: Joseph
Author-X-Name-Last: Mroszczyk
Title: To die or to kill? An analysis of suicide attack lethality
Abstract: 
 Those who study terrorism are familiar with the claim that suicide attacks are the most lethal form of terrorism today. Suicide attacks kill more people on average than non-suicide attacks, thereby justifying why terrorist organizations use this costly method of attack and explaining in part why suicide tactics have proliferated. However, extant empirical support for this claim is largely insufficient, focusing only on macro-level analysis of lethality data. Using data from the Global Terrorism Database, this study examines variation in lethality among suicide and non-suicide attacks based on geographic location, attack type, and target/victim type. It also introduces a new metric—the lethality ratio—to measure costs and benefits of attacks in terms of lives lost. It finds that, although suicide tactics are generally more lethal than non-suicide tactics, they also come at greater costs to the organization. This analysis also finds behavior that is inconsistent with the premise that terrorist groups are focused on maximizing lethality while reducing costs in all cases; that despite certain advantages, suicide attacks may remain a suboptimal tactic from the perspective of the terrorist group; and that additional criteria may help explain why suicide tactics are used.
Journal: Terrorism and Political Violence
Pages: 346-366
Issue: 2
Volume: 31
Year: 2019
Month: 3
X-DOI: 10.1080/09546553.2016.1228632
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1228632
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:2:p:346-366



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1229666_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mark Youngman
Author-X-Name-First: Mark
Author-X-Name-Last: Youngman
Title: Broader, vaguer, weaker: The evolving ideology of the Caucasus Emirate leadership
Abstract: 
 In October 2007, veteran Chechen field commander Dokka Umarov proclaimed the formation of the Caucasus Emirate (IK), formalising the victory of the North Caucasus insurgency’s Islamist wing over its nationalist-separatists. During Umarov’s time as leader, the North Caucasus experienced sustained violence and the IK claimed responsibility for multiple terrorist attacks in and beyond the region. However, despite the importance of ideology in understanding insurgent behaviour, the IK’s ideology and Umarov’s role in shaping it remain understudied. Using Social Movement Theory’s concept of framing to analyse Umarov’s communiqués throughout his lengthy tenure (June 2006–September 2013), this article identifies three distinct phases in Umarov’s ideological positioning of the insurgency: nationalist-jihadist (June 2006–October 2007); Khattabist (October 2007–late 2010); and partially hybridised (late 2010–September 2013). The article contributes to debates over typologies of jihadist actors by highlighting the difficulties in applying them to the North Caucasus and provides a clearer understanding of the IK’s ideological transformation and the limits to its engagement with external actors. The article also illustrates that weakness was a key factor in explaining that transformation and identifies several avenues for research that could further enhance our understanding of the IK’s ideology and the role it plays.
Journal: Terrorism and Political Violence
Pages: 367-389
Issue: 2
Volume: 31
Year: 2019
Month: 3
X-DOI: 10.1080/09546553.2016.1229666
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1229666
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:2:p:367-389



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1530988_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alan McPherson
Author-X-Name-First: Alan
Author-X-Name-Last: McPherson
Title: Caribbean Taliban: Cuban American Terrorism in the 1970s
Abstract: 
 Most scholars have not taken Cuban-American terrorism in the 1970s seriously, despite the unprecedented campaign of terror it unleashed. Borrowing a framework of self-identity usually applied to other terrorist groups and using case studies of the Cuban Nationalism Movement in New Jersey and of Alpha 66 in Florida, this article argues that Cuban-American political ideology was the key to its impact and its support from communities in Florida and New Jersey. Militant exiles saw themselves as betrayed by two enemy states, entitled to rule in their homeland, and imbued with a mission of civilizational renewal. In these ways, Cuban-American terrorists were similar to the Taliban in Afghanistan and their reign of terror in the 1970s should be appreciated as a major episode in the history of U.S. and global terrorism.
Journal: Terrorism and Political Violence
Pages: 390-409
Issue: 2
Volume: 31
Year: 2019
Month: 3
X-DOI: 10.1080/09546553.2018.1530988
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1530988
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:2:p:390-409



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1581504_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Erika Lorenzana Del Villar
Author-X-Name-First: Erika Lorenzana
Author-X-Name-Last: Del Villar
Title: Women in Modern Terrorism: From Liberation to Global Jihad in the Islamic State
Journal: Terrorism and Political Violence
Pages: 410-416
Issue: 2
Volume: 31
Year: 2019
Month: 3
X-DOI: 10.1080/09546553.2019.1581504
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1581504
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:2:p:410-416



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1581506_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Danielle Gilbert
Author-X-Name-First: Danielle
Author-X-Name-Last: Gilbert
Title: Terror by Any Other Name
Journal: Terrorism and Political Violence
Pages: 417-420
Issue: 2
Volume: 31
Year: 2019
Month: 3
X-DOI: 10.1080/09546553.2019.1581506
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1581506
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:2:p:417-420



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1581505_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Holy Legionary Youth: Fascist Activism in Interwar Romania
Journal: Terrorism and Political Violence
Pages: 421-423
Issue: 2
Volume: 31
Year: 2019
Month: 3
X-DOI: 10.1080/09546553.2019.1581505
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1581505
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:2:p:421-423



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1581507_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Freeman
Author-X-Name-First: Michael
Author-X-Name-Last: Freeman
Title: From Environmental Action to Ecoterrorism? Towards a Process Theory of Environmental and Animal Rights Oriented Political Violence
Journal: Terrorism and Political Violence
Pages: 424-425
Issue: 2
Volume: 31
Year: 2019
Month: 3
X-DOI: 10.1080/09546553.2019.1581507
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1581507
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:2:p:424-425



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1581508_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Manuel R. Torres-Soriano
Author-X-Name-First: Manuel R.
Author-X-Name-Last: Torres-Soriano
Title: Al-Qaeda’s Revenge: The 2004 Madrid Train Bombings
Journal: Terrorism and Political Violence
Pages: 426-427
Issue: 2
Volume: 31
Year: 2019
Month: 3
X-DOI: 10.1080/09546553.2019.1581508
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1581508
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:2:p:426-427



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1581509_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John C. Zimmerman
Author-X-Name-First: John C.
Author-X-Name-Last: Zimmerman
Title: Jihad: A History in Documents
Journal: Terrorism and Political Violence
Pages: 428-429
Issue: 2
Volume: 31
Year: 2019
Month: 3
X-DOI: 10.1080/09546553.2019.1581509
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1581509
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:2:p:428-429



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1581510_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jacob Zenn
Author-X-Name-First: Jacob
Author-X-Name-Last: Zenn
Title: Boko Haram: The History of an African Jihadist Movement
Journal: Terrorism and Political Violence
Pages: 430-432
Issue: 2
Volume: 31
Year: 2019
Month: 3
X-DOI: 10.1080/09546553.2019.1581510
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1581510
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:2:p:430-432

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1233870_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Caitriona Dowd
Author-X-Name-First: Caitriona
Author-X-Name-Last: Dowd
Title: Fragmentation, Conflict, and Competition: Islamist Anti-civilian Violence in Sub-Saharan Africa
Abstract: 
 In spite of the shared high profile of recent Islamist attacks on civilians in sub-Saharan Africa, patterns of anti-civilian violence differ across and within violent Islamist groups, and the countries in which they are active. This research seeks to explain this variation by situating Islamist violence within the sub-national spaces in which such groups operate, and the wider conflict environment in which they choose to use, or limit the use of, anti-civilian violence. Drawing on data from the Armed Conflict Location & Event Dataset, the research finds that violent Islamist groups are more likely to target civilians where they are the most active conflict agent, even when other conflict agents are active in the same spaces; but less likely to do so when they are relatively weak and in competition with other non-state armed groups. Anti-civilian violence is thus deployed strategically by violent Islamist groups, while its function as a signalling or retributive policing tool depends on the relative strength of groups in relation to actors in the wider conflict arena.
Journal: Terrorism and Political Violence
Pages: 433-453
Issue: 3
Volume: 31
Year: 2019
Month: 5
X-DOI: 10.1080/09546553.2016.1233870
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1233870
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:3:p:433-453



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1233871_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kay L. O’Halloran
Author-X-Name-First: Kay L.
Author-X-Name-Last: O’Halloran
Author-Name: Sabine Tan
Author-X-Name-First: Sabine
Author-X-Name-Last: Tan
Author-Name: Peter Wignell
Author-X-Name-First: Peter
Author-X-Name-Last: Wignell
Author-Name: John A. Bateman
Author-X-Name-First: John A.
Author-X-Name-Last: Bateman
Author-Name: Duc-Son Pham
Author-X-Name-First: Duc-Son
Author-X-Name-Last: Pham
Author-Name: Michele Grossman
Author-X-Name-First: Michele
Author-X-Name-Last: Grossman
Author-Name: Andrew Vande Moere
Author-X-Name-First: Andrew Vande
Author-X-Name-Last: Moere
Title: Interpreting Text and Image Relations in Violent Extremist Discourse: A Mixed Methods Approach for Big Data Analytics
Abstract: 
 This article presents a mixed methods approach for analysing text and image relations in violent extremist discourse. The approach involves integrating multimodal discourse analysis with data mining and information visualisation, resulting in theoretically informed empirical techniques for automated analysis of text and image relations in large datasets. The approach is illustrated by a study which aims to analyse how violent extremist groups use language and images to legitimise their views, incite violence, and influence recruits in online propaganda materials, and how the images from these materials are re-used in different media platforms in ways that support and resist violent extremism. The approach developed in this article contributes to what promises to be one of the key areas of research in the coming decades: namely the interdisciplinary study of big (digital) datasets of human discourse, and the implications of this for terrorism analysis and research.
Journal: Terrorism and Political Violence
Pages: 454-474
Issue: 3
Volume: 31
Year: 2019
Month: 5
X-DOI: 10.1080/09546553.2016.1233871
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1233871
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:3:p:454-474



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1233872_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lasse Lykke Rørbæk
Author-X-Name-First: Lasse Lykke
Author-X-Name-Last: Rørbæk
Title: Ethnic Exclusion and Civil Resistance Campaigns: Opting for Nonviolent or Violent Tactics?
Abstract: 
 Previous research has argued that political inequality between ethnic groups increases the likelihood of both nonviolent and violent protest. In this study, I focus on civil resistance campaigns and argue that the probability that these large-scale, organized movements will take violent over nonviolent forms increases with the share of a country’s population that is excluded from political power on the basis of ethnic affiliation. I expect this to be so because ethnically exclusive regimes are more likely to counter political demands with violent repression, which increases the cost and decreases the anticipated success of nonviolent relative to violent resistance. I test this proposition in a global sample of countries for the period 1950–2006 and find, first, that high levels of ethnic exclusion make civil resistance campaigns more likely to occur violently than nonviolently. Next, to assess the mechanism at play, I conduct a mediation analysis and show that almost half of the effect of ethnic exclusion on violent campaign onset is mediated by the latent level of violent repression in a country. This result suggests that political authorities’ repressive strategies are key to explaining why regime opponents do not always opt for nonviolent forms of civil resistance.
Journal: Terrorism and Political Violence
Pages: 475-493
Issue: 3
Volume: 31
Year: 2019
Month: 5
X-DOI: 10.1080/09546553.2016.1233872
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1233872
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:3:p:475-493



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1233873_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Timothy Williams
Author-X-Name-First: Timothy
Author-X-Name-Last: Williams
Author-Name: Rhiannon Neilsen
Author-X-Name-First: Rhiannon
Author-X-Name-Last: Neilsen
Title: “They Will Rot the Society, Rot the Party, and Rot the Army”*: Toxification as an Ideology and Motivation for Perpetrating Violence in the Khmer Rouge Genocide?
Abstract: 
 The genocide perpetrated by the Khmer Rouge between 1975 and 1979 appears as one of the most totalitarian manifestations of political violence in the 20th century. This article explores the ideological framework constructed by the Khmer Rouge, and looks into whether and how this influences and motivates individual low-level cadres in their participation. Our findings show that toxification as a genocidal ideology was present in the Khmer Rouge discourse, and provided a lens of legitimacy for individuals to engage in acts of violence. But such a genocidal ideology was not a motivating factor for individual perpetrators in the Cambodian genocide. This research forwards the comparative investigation of the Khmer Rouge genocide in Cambodia as an important case of genocide, both at the societal and individual levels, as well as the general study of toxification as a genocidal ideology.
Journal: Terrorism and Political Violence
Pages: 494-515
Issue: 3
Volume: 31
Year: 2019
Month: 5
X-DOI: 10.1080/09546553.2016.1233873
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1233873
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:3:p:494-515



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1253563_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeff Gruenewald
Author-X-Name-First: Jeff
Author-X-Name-Last: Gruenewald
Author-Name: Brent R. Klein
Author-X-Name-First: Brent R.
Author-X-Name-Last: Klein
Author-Name: Joshua D. Freilich
Author-X-Name-First: Joshua D.
Author-X-Name-Last: Freilich
Author-Name: Steven Chermak
Author-X-Name-First: Steven
Author-X-Name-Last: Chermak
Title: American Jihadi Terrorism: A Comparison of Homicides and Unsuccessful Plots
Abstract: 
 While the number of American jihadi terrorist attacks remains relatively rare, terrorist plots thwarted by law enforcement have increased since September 11, 2001. Although these law enforcement blocks of would-be terrorists are considered counterterrorism triumphs by the FBI, human rights and civil liberty watch groups have conversely suggested that those who plan for attacks alongside government informants and undercover agents may be unique and essentially dissimilar from terrorists. Underlying this debate is the empirical question of how planned yet unsuccessful attacks and their plotters compare to successful terrorist homicides and their perpetrators. The current study addresses this question by comparatively examining jihadi terrorist homicides and unsuccessful plots occurring in part or wholly on U.S. soil between 1990 and 2014. Data for this study come from the U.S. Extremist Crime Database (ECDB), an open-source database with information on terrorism and extremist crimes. Based on these data, descriptive statistics are provided for several incident, offender, and target variables across three jihadi terrorist violence categories, including homicides, plots with specified targets, and plots with non-specific targets. We find several important differences across categories of terrorist violence, suggesting that unsuccessful plotters and their intended crimes vary from their more successful terrorist counterparts.
Journal: Terrorism and Political Violence
Pages: 516-535
Issue: 3
Volume: 31
Year: 2019
Month: 5
X-DOI: 10.1080/09546553.2016.1253563
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1253563
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:3:p:516-535



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1258636_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Orlandrew E. Danzell
Author-X-Name-First: Orlandrew E.
Author-X-Name-Last: Danzell
Author-Name: Yao-Yuan Yeh
Author-X-Name-First: Yao-Yuan
Author-X-Name-Last: Yeh
Author-Name: Melia Pfannenstiel
Author-X-Name-First: Melia
Author-X-Name-Last: Pfannenstiel
Title: Determinants of Domestic Terrorism: An Examination of Ethnic Polarization and Economic Development
Abstract: 
 Many scholars have sought to explain why countries with ethnically heterogeneous populations experience higher levels of political violence, but these studies have produced mixed findings. Unlike most studies that use ethno-linguistic fractionalization indices to examine this relationship, we argue that ethnic polarization is a more appropriate measure to assess the role of ethnicity as a causal factor of domestic terrorism. This paper hypothesizes that high ethnic polarization influences the incidence of domestic terrorism, particularly when intervening economic factors are present. To test three hypotheses, we use negative binomial regression to model data from the Global Terrorism Dataset, World Bank, and the Reynal-Querol (RQ) ethnic polarization index of 116 countries between 1970 and 2012. Our findings show that terrorism is more likely to emerge in societies with high ethnic polarization and economic malaise.
Journal: Terrorism and Political Violence
Pages: 536-558
Issue: 3
Volume: 31
Year: 2019
Month: 5
X-DOI: 10.1080/09546553.2016.1258636
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1258636
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:3:p:536-558



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1258637_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Catherine McGlynn
Author-X-Name-First: Catherine
Author-X-Name-Last: McGlynn
Author-Name: Shaun McDaid
Author-X-Name-First: Shaun
Author-X-Name-Last: McDaid
Title: Radicalisation and Higher Education: Students’ Understanding and Experiences
Abstract: 
 Since 2015 universities have been placed under a legal duty of “due regard to prevent people from being drawn into terrorism.”1 This reflects the belief in UK counter-terrorism policy that radicalisation exists and can be countered. Advice to universities is largely silent on how this duty applies to teaching. Yet many degree programmes generate lectures and seminar discussions where views of an allegedly radicalised nature could be aired. This article presents focus group research which elicits students’ understanding of radicalisation, and provides insights into their experience of debating contentious issues such as identity, community cohesion, and the causes of terrorism. We argue that students’ understanding of radicalisation is conflated with extremism and we explore students’ anxiety about debating these issues and reliance on educators to create the right environment for such discussions. Finally, the data presented here challenges some of the assumptions underpinning contemporary counter-radicalisation policy in the domain of higher education, which are premised on ideas of active grooming. We argue that this does not accord with students’ own experiences, as they regard themselves as discerning, critical thinkers rather than inherently vulnerable to manipulation by those espousing violent extremist views.
Journal: Terrorism and Political Violence
Pages: 559-576
Issue: 3
Volume: 31
Year: 2019
Month: 5
X-DOI: 10.1080/09546553.2016.1258637
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1258637
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:3:p:559-576



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1264938_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sara K. Thompson
Author-X-Name-First: Sara K.
Author-X-Name-Last: Thompson
Author-Name: Sandra M. Bucerius
Author-X-Name-First: Sandra M.
Author-X-Name-Last: Bucerius
Title: Transnational Radicalization, Diaspora Groups, and Within-group Sentiment Pools: Young Tamil and Somali Canadians on the LTTE and al Shabaab
Abstract: 
 In recent years, the Tamil and Somali diasporas have come under intense scrutiny by the media and national security agencies in Canada. This is due to concerns that members of both communities may hold political grievances associated with their respective homelands that could be acted upon by joining or supporting transnational terrorist groups. Drawing on 168 in-depth interviews with youth and young adults in Toronto’s Tamil and Somali diasporas, we provide a comparative analysis of the varying ways that existing sentiment pools can operate to mobilize broad-levels of support for, or vilification of, the framing strategies of the LTTE and al Shabaab, respectively. Our findings show that frames that portray the LTTE in a positive light resonate deeply with the young Tamil-Canadians we interviewed, characterizing a “narrative fidelity” between these frames and the existing sentiment pool. By contrast, there exists considerable disconnect between the framing strategies of al Shabaab, their supporters, and existing sentiment within the Somali diaspora – a divide that illustrates the notion of “framing failure”. We conclude with a discussion of the dynamic nature and inherent malleability of group-level sentiment pools, and highlight why this may be important from a national security standpoint.
Journal: Terrorism and Political Violence
Pages: 577-594
Issue: 3
Volume: 31
Year: 2019
Month: 5
X-DOI: 10.1080/09546553.2016.1264938
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1264938
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:3:p:577-594



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1272455_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Evan Smith
Author-X-Name-First: Evan
Author-X-Name-Last: Smith
Title: Creating the National/Border Security Nexus: Counter-Terrorist Operations and Monitoring Middle Eastern and North African Visitors to the UK in the 1970s–1980s
Abstract: 
 This article looks at an earlier episode in the history of the UK border security apparatus by examining how the immigration control system was used in the 1970s and 1980s to detect potential terrorists from the Middle East and North Africa. Using recently opened archival records, it shows that the UK government introduced a strict system of visa checks, interviews, and other measures to nearly all Middle Eastern and North African visitors to the UK to prevent the entry of suspected terrorist personnel. By using these highly arbitrary measures, it became the modus operandi of the UK authorities to treat all Middle Eastern and North Africans as potential terrorists until convinced otherwise.
Journal: Terrorism and Political Violence
Pages: 595-614
Issue: 3
Volume: 31
Year: 2019
Month: 5
X-DOI: 10.1080/09546553.2016.1272455
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1272455
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:3:p:595-614



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1287700_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dag Arne Christensen
Author-X-Name-First: Dag Arne
Author-X-Name-Last: Christensen
Author-Name: Jacob Aars
Author-X-Name-First: Jacob
Author-X-Name-Last: Aars
Title: Does Democracy Decrease Fear of Terrorism?
Abstract: 
 Fear is an integral part of terrorism. Fighting fear can thus be a crucial part of counterterrorist policies. In the case of terrorism, citizens look to the state for protection. Yet, most studies of terrorist fear emphasize individual-level factors. We lack studies that link fear to features of the state, especially whether democratic states are capable of reducing fear among its citizens. Our study aims to fill part of this research gap by asking whether democratic government reduces or increases fear of terrorism. We find that there is substantial cross-country variance in citizens’ fear of terrorism. The results suggest that fear is more widespread among citizens in non-democratic countries compared to citizens in democratic countries. Actual exposure to terrorist attacks has no impact on citizens’ fear of terrorism when we account for whether the country is a democracy or not. Hence, democratic government displays resilience towards fear mongering.
Journal: Terrorism and Political Violence
Pages: 615-631
Issue: 3
Volume: 31
Year: 2019
Month: 5
X-DOI: 10.1080/09546553.2017.1287700
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1287700
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:3:p:615-631



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1589879_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Scott Nicholas Romaniuk
Author-X-Name-First: Scott Nicholas
Author-X-Name-Last: Romaniuk
Title: Terrorism, Deterrence, and the Search for Security in an Era of Violent Extremism
Journal: Terrorism and Political Violence
Pages: 632-638
Issue: 3
Volume: 31
Year: 2019
Month: 5
X-DOI: 10.1080/09546553.2019.1589879
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1589879
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:3:p:632-638



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1589865_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: D. J. Mulloy
Author-X-Name-First: D. J.
Author-X-Name-Last: Mulloy
Title: Radicalism and Music: An Introduction to the Music Cultures of al-Qa’ida, Racist Skinheads, Christian-affiliated Radicals, and Eco-animal Rights Militants
Journal: Terrorism and Political Violence
Pages: 639-640
Issue: 3
Volume: 31
Year: 2019
Month: 5
X-DOI: 10.1080/09546553.2019.1589865
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1589865
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:3:p:639-640



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1589867_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alisa Stack
Author-X-Name-First: Alisa
Author-X-Name-Last: Stack
Title: Female Combatants in Conflict and Peace
Journal: Terrorism and Political Violence
Pages: 641-644
Issue: 3
Volume: 31
Year: 2019
Month: 5
X-DOI: 10.1080/09546553.2019.1589867
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1589867
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:3:p:641-644



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1590066_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Donald D. Denton
Author-X-Name-First: Donald D.
Author-X-Name-Last: Denton
Title: The Weaponizing of Biology: Bioterrorism, Biocrime and Biohacking
Journal: Terrorism and Political Violence
Pages: 645-646
Issue: 3
Volume: 31
Year: 2019
Month: 5
X-DOI: 10.1080/09546553.2019.1590066
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1590066
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:3:p:645-646



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1589863_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dipak Gupta
Author-X-Name-First: Dipak
Author-X-Name-Last: Gupta
Title: The Seasons of Trouble: Life Amid the Ruins of Sri Lanka’s Civil War
Journal: Terrorism and Political Violence
Pages: 647-648
Issue: 3
Volume: 31
Year: 2019
Month: 5
X-DOI: 10.1080/09546553.2019.1589863
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1589863
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:3:p:647-648



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1589876_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: New Perspectives on Fascism and the Radical Right
Journal: Terrorism and Political Violence
Pages: 649-657
Issue: 3
Volume: 31
Year: 2019
Month: 5
X-DOI: 10.1080/09546553.2019.1589876
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1589876
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:3:p:649-657



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1589878_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joanna Rak
Author-X-Name-First: Joanna
Author-X-Name-Last: Rak
Title: The Struggle for Jerusalem’s Holy Places
Journal: Terrorism and Political Violence
Pages: 658-659
Issue: 3
Volume: 31
Year: 2019
Month: 5
X-DOI: 10.1080/09546553.2019.1589878
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1589878
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:3:p:658-659

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1272456_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sean C. Reynolds
Author-X-Name-First: Sean C.
Author-X-Name-Last: Reynolds
Author-Name: Mohammed M. Hafez
Author-X-Name-First: Mohammed M.
Author-X-Name-Last: Hafez
Title: Social Network Analysis of German Foreign Fighters in Syria and Iraq
Abstract: 
 Why do Westerners become foreign fighters in civil conflicts? We explore this question through original data collection on German foreign fighters in Syria and Iraq, and test three sets of hypotheses that revolve around socioeconomic integration, online radicalization, and social network mobilization. We conduct link analysis to map the network of German foreign fighters prior to their mobilization, and marshal evidence to assess the validity of competing explanations. We find only modest support for the integration deficit hypothesis, and meager support for the social media radicalization theory. Instead, the preponderance of evidence suggests that interpersonal ties largely drive the German foreign fighter phenomenon. Recruitment featured clustered mobilization and bloc recruitment within interconnected radical milieus, leading us to conclude that peer-to-peer networks are the most important mobilization factor for German foreign fighters.
Journal: Terrorism and Political Violence
Pages: 661-686
Issue: 4
Volume: 31
Year: 2019
Month: 7
X-DOI: 10.1080/09546553.2016.1272456
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1272456
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:4:p:661-686



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1277208_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: S. P. Harish
Author-X-Name-First: S. P.
Author-X-Name-Last: Harish
Author-Name: Risa Toha
Author-X-Name-First: Risa
Author-X-Name-Last: Toha
Title: A New Typology of Electoral Violence: Insights from Indonesia
Abstract: 
 Existing literature on election violence has focused on how violence suppresses voter participation or shapes their preferences. Yet, there are other targets of election violence beyond voters who have so far received little attention: candidates and government agencies. By intimidating rival candidates into dropping out of the race, political hopefuls can literally reduce the number of competitors and increase their likelihood of winning. Likewise, aspiring candidates can target government agencies perceived to be responsible for holding elections to push for electorally beneficial decisions. In this paper, we introduce a new typology of electoral violence and utilize new data of election violence that occur around executive elections in Indonesia from 2005 through 2012. The types of violence we identified differ in these ways: a) Of all cases of electoral violence observed in this article, most incidents were targeted towards candidates and government bodies; b) candidates are generally targeted before elections, whereas voter-targeting incidents are spread out evenly before and after elections and government-targeted violence tends to occur afterwards; c) pre-election violence is concentrated in formerly separatist areas, but post-election violence is more common in districts with prior ethnocommunal violence. These distinctions stress the importance of examining when and why different strategies are adopted.
Journal: Terrorism and Political Violence
Pages: 687-711
Issue: 4
Volume: 31
Year: 2019
Month: 7
X-DOI: 10.1080/09546553.2016.1277208
File-URL: http://hdl.handle.net/10.1080/09546553.2016.1277208
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:4:p:687-711



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1282860_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Idil Tunçer-Kılavuz
Author-X-Name-First: Idil
Author-X-Name-Last: Tunçer-Kılavuz
Title: Success or Failure in the Peace Processes of Aceh and Sri Lanka: A Comparative Study
Abstract: 
 This study examines why some internal conflicts end in negotiated agreements, while negotiations fail in others. In order to address this question, I compare the cases of Aceh, where some 30 years of armed conflict ended in a 2005 peace agreement between Gerakan Aceh Merdeka (GAM, the Free Aceh Movement) and the government of Indonesia; and Sri Lanka, where 2002–2006 negotiations between the government and the Liberation Tigers of Tamil Eelam broke down. This study adopts ideas from bargaining theories of war, focusing on the adversaries’ power perceptions in relation to actions that led to the civil war settlements. It identifies three variables as decisive: (1) information revealed by war, (2) control over spoilers, and (3) divisions in the ranks of the rebel organization.
Journal: Terrorism and Political Violence
Pages: 712-732
Issue: 4
Volume: 31
Year: 2019
Month: 7
X-DOI: 10.1080/09546553.2017.1282860
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1282860
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:4:p:712-732



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1282861_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Niklas Karlén
Author-X-Name-First: Niklas
Author-X-Name-Last: Karlén
Title: Turning off the Taps: The Termination of State Sponsorship
Abstract: 
 Why do some states terminate their sponsorship of rebel movements while others are persistent in their provision of support? In the past, most research on external support to insurgents has focused on why states choose to sponsor rebel groups and particularly how this affects conflict duration. However, we know little about the termination of such support. This is surprising given that support has been shown to make armed conflicts more intractable and tremendous efforts are made in condemning and sanctioning such behavior. This study constitutes the first large-N analysis of support termination, employing survival analysis on global data of state support to rebel movements between 1975–2009. Surprisingly, the findings indicate that only some of the factors that explain support provision can offer insights into its termination. In particular, support is more likely to be terminated when no ethnic kinship bonds exist between the rebel movement and the government of the supporting state. Many decisions to withdraw support also seem to coincide with the transition from the Cold War. Threats and sanctions from other states appear largely ineffective. The study contributes to our understanding of the international dimensions of civil war and the role and motives of third parties.
Journal: Terrorism and Political Violence
Pages: 733-758
Issue: 4
Volume: 31
Year: 2019
Month: 7
X-DOI: 10.1080/09546553.2017.1282861
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1282861
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:4:p:733-758



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1283308_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Or Honig
Author-X-Name-First: Or
Author-X-Name-Last: Honig
Author-Name: Ariel Reichard
Author-X-Name-First: Ariel
Author-X-Name-Last: Reichard
Title: The Usefulness of Examining Terrorists’ Rhetoric for Understanding the Nature of Different Terror Groups
Abstract: 
 This study advances a distinction between two generic types of terrorists’ rhetoric: (1) ideological rhetoric candidly reflecting the terrorists’ genuine beliefs and values regarding their military targeting policy (who is a legitimate target), even when adopting such rhetoric involves high image/diplomatic costs; and (2) a PR-oriented rhetoric which consciously misrepresents the terrorists’ intentions and behavior in an attempt to project a more benign and humane image, thus maintaining sympathy and rebuffing criticism. We contend that such a distinction can provide a highly useful metric for assessing terrorists groups’ rationality and pragmatism: the most pragmatic groups will shift between these two types of rhetoric depending on changing strategic needs. To show the practical usefulness of this distinction we provide criteria for categorizing terrorists’ rhetorical responses to (mostly liberal-minded) criticism that they have killed innocent civilians in their enemy’s camp. We apply our criteria by examining terrorists’ (sincere and insincere) apologies.
Journal: Terrorism and Political Violence
Pages: 759-778
Issue: 4
Volume: 31
Year: 2019
Month: 7
X-DOI: 10.1080/09546553.2017.1283308
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1283308
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:4:p:759-778



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1288112_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Jetter
Author-X-Name-First: Michael
Author-X-Name-Last: Jetter
Title: More Bang for the Buck: Media Coverage of Suicide Attacks
Abstract: 
 This paper provides empirical evidence that suicide attacks systematically draw more media attention than non-suicide terrorist attacks. Analyzing 60,341 terrorist attack days in 189 countries from 1970 to 2012, I introduce a methodology to proxy for the media coverage each one of these attack days receives in the New York Times. Suicide attacks are associated with significantly more coverage. In the most complete regression, one suicide attack produces an additional 0.6 articles—a magnitude equivalent to the effect of 95 terrorism casualties. This link remains robust to including a comprehensive list of potentially confounding factors, fixed effects, and country-specific time trends. The effect is reproduced for alternative print and television outlets (BBC, Reuters, CNN, NBC, CBS), but remains weak for Google Trends (worldwide and in the U.S.), a more direct proxy for people’s interests, and is non-existent for C-SPAN, a television station dedicated to broadcasting political discussions directly. Thus, the media appears to cover suicide missions in an extraordinary fashion, which may in turn explain their prominence among terrorist organizations.
Journal: Terrorism and Political Violence
Pages: 779-799
Issue: 4
Volume: 31
Year: 2019
Month: 7
X-DOI: 10.1080/09546553.2017.1288112
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1288112
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:4:p:779-799



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1289089_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Georgia Wralstad Ulmschneider
Author-X-Name-First: Georgia Wralstad
Author-X-Name-Last: Ulmschneider
Author-Name: James M. Lutz
Author-X-Name-First: James M.
Author-X-Name-Last: Lutz
Title: Terrorism Analysis and Holder v. Humanitarian Law Project: The Missing Element
Abstract: 
 The decision in the case of Holder v. Humanitarian Law Project raised important issues about civil liberties in the United States (2010), including freedom of speech and freedom of association, in relation to U.S. foreign policy actions. While the decision has the potential to infringe on certain liberties, the decision itself was based on very limited information on the nature of terrorism, the foreign terrorist organizations involved, and the processes by which terrorist groups can be induced to peacefully re-enter domestic political systems. There are also concerns about what can be the arbitrary designation of groups as foreign terrorist organizations. These issues raise serious questions about the role of the Supreme Court in the overall political system and judgments in cases involving terrorism and foreign policy.
Journal: Terrorism and Political Violence
Pages: 800-816
Issue: 4
Volume: 31
Year: 2019
Month: 7
X-DOI: 10.1080/09546553.2017.1289089
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1289089
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:4:p:800-816



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1289090_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jonathan S. Blake
Author-X-Name-First: Jonathan S.
Author-X-Name-Last: Blake
Title: Ethnic Elites and Rituals of Provocation: Politicians, Pastors, and Paramilitaries in Northern Ireland
Abstract: 
 Prominent theories of ethnic conflict argue that instrumental ethnic elites incite violence in order to promote their own power. Yet this approach focuses primarily on political leaders and ignores other ethnic elites, meaning that we know little about how other influential actors think about provocation. In this paper, I present novel data from Northern Ireland on diverse elite attitudes toward polarising Protestant parades with a long history of sparking ethnic violence. Using original surveys of Protestant elected officials and clergy as well as interviews with ex-paramilitaries, this paper demonstrates that these elite groups have different, often competing, interests and opinions regarding contested parades: while politicians tend to support provocative parades, the others do not. By addressing elite actors that are often ignored, I present a more nuanced picture of elite-mass relations and ethnic mobilisation in conflict.
Journal: Terrorism and Political Violence
Pages: 817-835
Issue: 4
Volume: 31
Year: 2019
Month: 7
X-DOI: 10.1080/09546553.2017.1289090
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1289090
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:4:p:817-835



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1290607_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Brendon J. Cannon
Author-X-Name-First: Brendon J.
Author-X-Name-Last: Cannon
Author-Name: Dominic Ruto Pkalya
Author-X-Name-First: Dominic
Author-X-Name-Last: Ruto Pkalya
Title: Why al-Shabaab Attacks Kenya: Questioning the Narrative Paradigm
Abstract: 
 This article questions the current narrative paradigm and argues that al-Shabaab attacks Kenya for strategic and highly rational reasons, beyond sharing a border and having bases in southern Somalia closer to major population centres than Ethiopia or Uganda. Al-Shabaab targets Kenya more than other frontline states because of the opportunity spaces linked to Kenya’s international status and visibility, its relatively free and independent media that widely publicizes terrorist attacks, a highly developed and lucrative tourist sector that provides soft targets, the comparatively high number of Kenyan foreign fighters within the group’s ranks, the presence of terror cells in Kenya, expanding democratic space, and high levels of corruption. These variables play into al-Shabaab’s motivations and aid planning and execution of terrorist acts that aim to fulfil the group’s quest to survive by maintaining relevance. In order to address this predictable menace, we offer a number of measures that Kenya needs to take, including reducing corruption in order to properly invest in intelligence efforts and relevant homeland security measures, thereby making it possible for Kenya to sustainably and effectively combat al-Shabaab.
Journal: Terrorism and Political Violence
Pages: 836-852
Issue: 4
Volume: 31
Year: 2019
Month: 7
X-DOI: 10.1080/09546553.2017.1290607
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1290607
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:4:p:836-852



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1291426_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Laura N. Bell
Author-X-Name-First: Laura N.
Author-X-Name-Last: Bell
Title: Terrorist Assassination and Institutional Change in Repressive Regimes
Abstract: 
 Missing from the political violence literature is an in-depth and systematic examination of the effects of terrorist assassination on state political institutions in repressive regimes. By broadening the scope and depth of empirical research into terrorist assassinations, the potential exists to enhance our understanding of the outcomes of assassination by terrorist actors as well as our overall understanding of political violence in repressive regimes. Utilizing survival analysis and data from the Global Terrorism Database, the Polity IV Project, and the Political Terror Scale, this project focuses on the post-terrorist assassination institutional outcomes in repressive regimes. While the effects are long-term, the most repressive regimes are the most likely to experience political institutional shifts in the wake of terrorist assassinations. The direction of the institutional shifts is mixed, but results indicate that the level of state repression in existence prior to a terrorist assassination matters to post-terrorist assassination outcomes.
Journal: Terrorism and Political Violence
Pages: 853-875
Issue: 4
Volume: 31
Year: 2019
Month: 7
X-DOI: 10.1080/09546553.2017.1291426
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1291426
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:4:p:853-875



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1621631_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard Bach Jensen
Author-X-Name-First: Richard Bach
Author-X-Name-Last: Jensen
Title: The politics of attack. Communiqués and insurrectionary violence
Journal: Terrorism and Political Violence
Pages: 876-880
Issue: 4
Volume: 31
Year: 2019
Month: 7
X-DOI: 10.1080/09546553.2019.1621631
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1621631
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:4:p:876-880



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1621638_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anthony Celso
Author-X-Name-First: Anthony
Author-X-Name-Last: Celso
Title: Apocalypse, Revolution and Terrorism: From the Sicari to the American Revolt against the Modern World
Journal: Terrorism and Political Violence
Pages: 881-882
Issue: 4
Volume: 31
Year: 2019
Month: 7
X-DOI: 10.1080/09546553.2019.1621638
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1621638
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:4:p:881-882



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1621639_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: The Islamic State: History, Transnationalism, and Implications
Journal: Terrorism and Political Violence
Pages: 883-891
Issue: 4
Volume: 31
Year: 2019
Month: 7
X-DOI: 10.1080/09546553.2019.1621639
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1621639
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:4:p:883-891



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1621640_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Raphael Cohen-Almagor
Author-X-Name-First: Raphael
Author-X-Name-Last: Cohen-Almagor
Title: Earl Warren, Ernesto Miranda and Terrorism
Journal: Terrorism and Political Violence
Pages: 892-893
Issue: 4
Volume: 31
Year: 2019
Month: 7
X-DOI: 10.1080/09546553.2019.1621640
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1621640
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:4:p:892-893



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1621641_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lucien Frary
Author-X-Name-First: Lucien
Author-X-Name-Last: Frary
Title: Black Wind, White Snow: The Rise of Russia’s New Nationalism
Journal: Terrorism and Political Violence
Pages: 894-895
Issue: 4
Volume: 31
Year: 2019
Month: 7
X-DOI: 10.1080/09546553.2019.1621641
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1621641
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:4:p:894-895



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1621642_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Violence and Terrorism in North Africa
Journal: Terrorism and Political Violence
Pages: 896-901
Issue: 4
Volume: 31
Year: 2019
Month: 7
X-DOI: 10.1080/09546553.2019.1621642
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1621642
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:4:p:896-901



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1621643_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dipak K. Gupta
Author-X-Name-First: Dipak K.
Author-X-Name-Last: Gupta
Title: Islam and sectarian violence in Pakistan: terror within
Journal: Terrorism and Political Violence
Pages: 902-903
Issue: 4
Volume: 31
Year: 2019
Month: 7
X-DOI: 10.1080/09546553.2019.1621643
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1621643
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:4:p:902-903



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1621644_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John C. Zimmerman
Author-X-Name-First: John C.
Author-X-Name-Last: Zimmerman
Title: Terror in France: The Rise of Jihad in the West
Journal: Terrorism and Political Violence
Pages: 904-905
Issue: 4
Volume: 31
Year: 2019
Month: 7
X-DOI: 10.1080/09546553.2019.1621644
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1621644
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:4:p:904-905



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1621646_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Brandon Stewart
Author-X-Name-First: Brandon
Author-X-Name-Last: Stewart
Title: Secessionism and Terrorism: Bombs, Blood, and Independence in Europe and Eurasia
Journal: Terrorism and Political Violence
Pages: 906-907
Issue: 4
Volume: 31
Year: 2019
Month: 7
X-DOI: 10.1080/09546553.2019.1621646
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1621646
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:4:p:906-907

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1293533_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gabriel Koehler-Derrick
Author-X-Name-First: Gabriel
Author-X-Name-Last: Koehler-Derrick
Author-Name: Daniel James Milton
Author-X-Name-First: Daniel James
Author-X-Name-Last: Milton
Title: Choose Your Weapon: The Impact of Strategic Considerations and Resource Constraints on Terrorist Group Weapon Selection
Abstract: 
 Historians of terrorism note that modern terrorists rely almost exclusively on two weapon types: the gun and the bomb. However, the comparative use of these weapons differs from one terrorist group to the next. We exploit this variation to examine how the tactical decisions of terrorists respond to both strategic aspirations and resource constraints. We argue that a group’s goals (a strategic consideration) and size (a resource constraint) provide a parsimonious explanation for weapon selection. Because firearms inherently expose the shooter to higher risk, are more precise, and must be used if a group aspires to maintain social order, they are unlikely to be used by groups with limited recruits in a campaign of violence. We test this theory using data on over 350 terrorist organizations. Our analysis shows that strategic considerations and resource constraints both impact tactical choices, although groups with the most expansive goals, those which transcend national borders, as well as militias, are two interesting exceptions to our theory. Our research has implications for the use of disaggregated tactical data and in furthering our understanding of the rationality of terrorism.
Journal: Terrorism and Political Violence
Pages: 909-928
Issue: 5
Volume: 31
Year: 2019
Month: 9
X-DOI: 10.1080/09546553.2017.1293533
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1293533
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:5:p:909-928



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1297707_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Paul Gill
Author-X-Name-First: Paul
Author-X-Name-Last: Gill
Author-Name: John Horgan
Author-X-Name-First: John
Author-X-Name-Last: Horgan
Author-Name: Emily Corner
Author-X-Name-First: Emily
Author-X-Name-Last: Corner
Title: The Rational Foraging Terrorist: Analysing the Distances Travelled to Commit Terrorist Violence
Abstract: 
 This paper applies the distance-to-crime approach to the case of Improvised Explosive Device (IED) and shooting attacks conducted by the Provisional Irish Republican Army (PIRA) during the Northern Ireland conflict, 1970–1998. The aim is to (a) measure the typical ‘distance to crime’ (b) detect whether a distance-decay effect is noticeable and (c) investigate whether there is a discernible difference in the distance traveled depending upon individual offender characteristics or aspects of how the offence was committed. In particular, it highlights that many of the same dynamics that influence offender decision making within the volume crime world, also apply within the terrorism realm. Five findings stand out in particular. First, a distance decay effect is identifiable. Second, younger offenders travel significantly smaller distances. Third, complex attacks typically involve greater distances. Fourth, our results show the ability of leading decision-makers within PIRA to impact upon the day-to-day operations of the field operatives. Together the results reinforce the argument that when we focus on terrorism from a preventative angle, we should focus on their behaviors: what they do rather than remain preoccupied with concerns about who they are and/or what they might be like. Collectively the results also highlight the fact that for a finer-grained understanding of terrorist behavior we need to disaggregate on a number of levels: within the cadre of operatives, across terrorist attacks, across targets and within conflicts.
Journal: Terrorism and Political Violence
Pages: 929-942
Issue: 5
Volume: 31
Year: 2019
Month: 9
X-DOI: 10.1080/09546553.2017.1297707
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1297707
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:5:p:929-942



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1297708_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joshua D. Freilich
Author-X-Name-First: Joshua
Author-X-Name-Last: D. Freilich
Author-Name: William S. Parkin
Author-X-Name-First: William S.
Author-X-Name-Last: Parkin
Author-Name: Jeff Gruenewald
Author-X-Name-First: Jeff
Author-X-Name-Last: Gruenewald
Author-Name: Steven M. Chermak
Author-X-Name-First: Steven M.
Author-X-Name-Last: Chermak
Title: Comparing Extremist Perpetrators of Suicide and Non-Suicide Attacks in the United States
Abstract: 
 This study explores differences in perpetrators of suicide attacks and non-suicide attacks in the United States. The study uses data on far-right and Al Qaeda and affiliated/inspired terrorists between 1990 and 2013 from the United States Extremist Crime Database. Our analysis estimates logistic regression models to test whether suicide attackers were more likely to have exhibited specific risk factors for suicidality, while examining other prominent claims regarding patterns of suicide terrorism. Suicide attackers were no more likely than non-suicide attackers to have previously attempted suicide or to have been diagnosed as mentally ill. Suicide attackers were more likely, though, to have a history of substance abuse, to be loners, have served in the military, participated in paramilitary training, and be more ideologically committed to the cause. We found that Al Qaeda affiliated/inspired attackers were more likely than far-right attackers to have engaged in a suicide mission. With the current focus on Americans traveling to Syria and Iraq to receive training and fight for jihadist movements (e.g., the Islamic State), our findings appear relevant. Observers have expressed concern that these fighters may return and then commit attacks in their homeland. Law enforcement could make use of this study’s findings.
Journal: Terrorism and Political Violence
Pages: 943-965
Issue: 5
Volume: 31
Year: 2019
Month: 9
X-DOI: 10.1080/09546553.2017.1297708
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1297708
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:5:p:943-965



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1300580_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Christopher R. Day
Author-X-Name-First: Christopher R.
Author-X-Name-Last: Day
Title: “Survival Mode”: Rebel Resilience and the Lord’s Resistance Army
Abstract: 
 To date, scholarly work on armed groups has seldom considered the notion of rebel resilience, or the factors that enable these groups to survive despite time, military pressure, and the myriad contingent events of civil war. In an effort to develop an explanatory framework for resilience as a distinct outcome of civil war and rebellion, this article examines the conditions under which the Lord’s Resistance Army (LRA) has persisted for nearly three decades. Based on fieldwork and original research, the article explains the LRA’s resilience in light of the group’s organizational structure and resource self-sufficiency, which have been well suited for the borderlands of East and Central Africa. The LRA is a key case of rebel resilience. It is important because it sheds light on the organizational foundations of armed groups, the relationship between resources and rebellion, and the broader study of conflict duration and termination. Understanding the sources of the LRA’s resilience can inform efforts to end such insurgencies.
Journal: Terrorism and Political Violence
Pages: 966-986
Issue: 5
Volume: 31
Year: 2019
Month: 9
X-DOI: 10.1080/09546553.2017.1300580
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1300580
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:5:p:966-986



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1300581_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gideon Aran
Author-X-Name-First: Gideon
Author-X-Name-Last: Aran
Title: Striking Home: Ideal-Type of Terrorism
Abstract: 
 This essay presents some preliminary notes in an anthropological perspective on terrorism. The following aims to be a questioning review of issues that haunt informed students of terrorism, and yet also an introductory text to the study of terrorism. It is revisionist but didactic. The essay is based on extended research of Palestinian and Israeli terrorism cases, and on critical integration of the literature on terrorism. It offers an alternative approach to the problem of the definition and distinct character of terrorism, expands on overlooked aspects of terrorism, like its relationship to the concept of “home,” emphasizes under-theorized subjects, like the randomness of the targets, and discusses hitherto untouched topics, like the “bad death” of terrorism’s victims. Terrorism is examined in terms of liminality and hybridity, and consequently as more subversive than coercive, threatening our ontological security no less than our physical security.
Journal: Terrorism and Political Violence
Pages: 987-1005
Issue: 5
Volume: 31
Year: 2019
Month: 9
X-DOI: 10.1080/09546553.2017.1300581
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1300581
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:5:p:987-1005



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1304383_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Brecht Volders
Author-X-Name-First: Brecht
Author-X-Name-Last: Volders
Title: Nuclear Terrorism: What Can We Learn from Los Alamos?
Abstract: 
 The international security community is increasingly concerned about the nexus between indiscriminate terrorism and the proliferation of nuclear technology and materials. Many nuclear terrorism threat assessments focus primarily on terrorist motivations to employ an atomic bomb, the availability of nuclear know-how and technology, and the opportunity for clandestine organisations to acquire fissile material. Scholars and experts, however, often neglect to elaborate on the challenges for terrorist organisations in organising and implementing the construction and detonation of a crude atomic bomb. This will most likely be a complex project. This article will therefore explore the organisation of such an endeavour. To be precise, we will highlight the impact of the organisational design of the terrorist group. The organisational design determines the division of tasks and how coordination is achieved among these tasks. It therefore has a strong impact on the functioning of any organisation, especially an innovative and complex terrorism project. Building on a case study of Los Alamos, we inductively infer that terrorist organisations face an inherent effectiveness-efficiency trade-off in designing a nuclear armament project.
Journal: Terrorism and Political Violence
Pages: 1006-1025
Issue: 5
Volume: 31
Year: 2019
Month: 9
X-DOI: 10.1080/09546553.2017.1304383
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1304383
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:5:p:1006-1025



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1309392_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mirella van Dun
Author-X-Name-First: Mirella
Author-X-Name-Last: van Dun
Title: Narco-Territoriality and Shadow Powers in a Peruvian Cocaine Frontier
Abstract: 
 Whereas cocaine kingpins are often portrayed as key protagonists and perpetrators of violence in Latin America, in Peru’s Upper Huallaga they are also important powerholders who have formed dynamic systems of governance by dominating socio-economic resources and legitimating their narco-territoriality through arrangements with a variety of “shadow powers.” Although potentially violent armed actors, whether insurgents or the police and military, often abound in these “dangerous places,” in the post-conflict Upper Huallaga most of these groups aimed to gain more power and control by forming coalitions with the local powerholders. Drawing upon the narratives of drug barons, traffickers and producers, insurgents, and state officers, this article seeks to focus on an aspect that is largely overlooked in other analyses: the intricate relationship between contested narco-territoriality, weakening local governance networks, and “new” outbreaks of violence.
Journal: Terrorism and Political Violence
Pages: 1026-1048
Issue: 5
Volume: 31
Year: 2019
Month: 9
X-DOI: 10.1080/09546553.2017.1309392
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1309392
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:5:p:1026-1048



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1313735_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Adrian Cherney
Author-X-Name-First: Adrian
Author-X-Name-Last: Cherney
Author-Name: Kristina Murphy
Author-X-Name-First: Kristina
Author-X-Name-Last: Murphy
Title: Support for Terrorism: The Role of Beliefs in Jihad and Institutional Responses to Terrorism
Abstract: 
 Passive support for terrorism refers to expressions of sympathy for acts of terrorism and/or the justifications (ideology) used by terrorist groups to legitimise their beliefs and actions. One form of passive support is whether Muslims feel terrorists have valid grievances. Appealing to a sense of grievance is a key way that violent Islamists attempt to recruit fellow Muslims to their cause. Using survey data collected from 800 Muslims living in Australia, this paper examines factors that lead Muslims to believe that terrorists have valid grievances. Factors examined include beliefs in jihad and attitudes towards counterterrorism policing and laws. Other variables included in the analysis are social identity, age, gender, income, religious denomination (Sunni vs. Shia), religious commitment, i.e., Mosque attendance, and recent contact with police. The most significant predictor of passive support for terrorism was found to be particular beliefs in jihad. The perceived legitimacy of counterterrorism laws and trust in police were also important. Implications for countering extremist ideology and generating community cooperation in counterterrorism will be considered.
Journal: Terrorism and Political Violence
Pages: 1049-1069
Issue: 5
Volume: 31
Year: 2019
Month: 9
X-DOI: 10.1080/09546553.2017.1313735
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1313735
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:5:p:1049-1069



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1314964_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeffrey Kaplan
Author-X-Name-First: Jeffrey
Author-X-Name-Last: Kaplan
Title: Nothing Is True, Everything Is Permitted: Premodern Religious Terrorism
Abstract: 
 In the beginning faith was the alpha and omega of revolutionary dreams and terrorist actions. This article will examine case studies among the Peoples of the Book—Judaism, Christianity, and Islam—for religious terrorism is not the product of one faith. It argues that the cultural resonance of each movement examined offers a blank slate on which contemporary seekers, dreamers, and fighters may write. The title, borrowed from a popular novel, is the leitmotif of this form of violence. By all objective forms of analysis, the movements chronicled in these pages are a parade of seemingly stupid ideas held by idealists, fools, and fanatics who dreamed that, with God at their side, they could bring perfection to a fallen world. In such a cause, antinomian violence is inevitable and genocide its logical outcome. Yet these early movements are not to be despised, for together it was they, not the huddled masses cowering before the powers that be, that created the modern world.
Journal: Terrorism and Political Violence
Pages: 1070-1095
Issue: 5
Volume: 31
Year: 2019
Month: 9
X-DOI: 10.1080/09546553.2017.1314964
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1314964
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:5:p:1070-1095



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1330200_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bryan C. Price
Author-X-Name-First: Bryan C.
Author-X-Name-Last: Price
Title: Terrorism as Cancer: How to Combat an Incurable Disease
Abstract: 
 This paper provides an alternative framework that conceptualizes the threat posed by terrorism based on an epidemiological approach that views it as a chronic disease like cancer rather than as a military, ideological, or socio-economic problem. After highlighting the similarities in the causes, behavior, treatments, and challenges of combating terrorism and cancer, this paper presents a staging system policymakers can use to educate the public and allocate counterterrorism resources more efficiently. This approach encourages policymakers to see terrorism for what it is (an all but inevitable facet of modern life that can be managed but never fully eliminated), and not what they wish terrorism to be (a national security problem that can be solved, defeated, or vanquished). It provides policymakers with a useful model to conceptualize the threat and treat terrorism in a comprehensive manner, from preventing future attacks to effectively responding to them when they will inevitably occur.
Journal: Terrorism and Political Violence
Pages: 1096-1120
Issue: 5
Volume: 31
Year: 2019
Month: 9
X-DOI: 10.1080/09546553.2017.1330200
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1330200
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:5:p:1096-1120



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1648061_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John C. Zimmerman
Author-X-Name-First: John C.
Author-X-Name-Last: Zimmerman
Title: ISIS: A History
Journal: Terrorism and Political Violence
Pages: 1121-1122
Issue: 5
Volume: 31
Year: 2019
Month: 9
X-DOI: 10.1080/09546553.2019.1648061
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1648061
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:5:p:1121-1122



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1648059_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Barbara Ann Chotiner
Author-X-Name-First: Barbara Ann
Author-X-Name-Last: Chotiner
Title: Gangs of Russia: From the Streets to the Corridors of Power
Journal: Terrorism and Political Violence
Pages: 1123-1124
Issue: 5
Volume: 31
Year: 2019
Month: 9
X-DOI: 10.1080/09546553.2019.1648059
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1648059
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:5:p:1123-1124



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1648064_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Donald D. Denton
Author-X-Name-First: Donald D.
Author-X-Name-Last: Denton
Title: Russia’s Muslim Heartlands: Islam in the Putin Era
Journal: Terrorism and Political Violence
Pages: 1125-1125
Issue: 5
Volume: 31
Year: 2019
Month: 9
X-DOI: 10.1080/09546553.2019.1648064
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1648064
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:5:p:1125-1125



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1648058_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ivan Strenski
Author-X-Name-First: Ivan
Author-X-Name-Last: Strenski
Title: Dishonoring Honor Killing and The Pursuit of Moderate Islam
Journal: Terrorism and Political Violence
Pages: 1126-1140
Issue: 5
Volume: 31
Year: 2019
Month: 9
X-DOI: 10.1080/09546553.2019.1648058
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1648058
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:5:p:1126-1140



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1648060_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard Bach Jensen
Author-X-Name-First: Richard Bach
Author-X-Name-Last: Jensen
Title: Goddess of Anarchy: The Life and Times of Lucy Parsons, American Radical
Journal: Terrorism and Political Violence
Pages: 1141-1145
Issue: 5
Volume: 31
Year: 2019
Month: 9
X-DOI: 10.1080/09546553.2019.1648060
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1648060
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:5:p:1141-1145



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1648063_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Terrorism and Counterintelligence: How Terrorist Groups Elude Detection
Journal: Terrorism and Political Violence
Pages: 1146-1148
Issue: 5
Volume: 31
Year: 2019
Month: 9
X-DOI: 10.1080/09546553.2019.1648063
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1648063
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:5:p:1146-1148

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1313736_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Amy-Jane Gielen
Author-X-Name-First: Amy-Jane
Author-X-Name-Last: Gielen
Title: Countering Violent Extremism: A Realist Review for Assessing What Works, for Whom, in What Circumstances, and How?
Abstract: 
 Scientific knowledge on what works in countering violent extremism remains limited. This article argues that we should move away from the “what works?” question and towards: “what works, for whom, in what circumstances, and how?” This method is also known as realist evaluation. This article applies the realist review method to CVE studies, which synthesizes the existing CVE literature and helps us gain insight into relevant contexts, mechanisms, and outcomes for CVE. Realist reviews help to develop and shape more effective policy and contribute to further CVE theory development.
Journal: Terrorism and Political Violence
Pages: 1149-1167
Issue: 6
Volume: 31
Year: 2019
Month: 11
X-DOI: 10.1080/09546553.2017.1313736
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1313736
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:6:p:1149-1167



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1318126_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sebastian van Baalen
Author-X-Name-First: Sebastian
Author-X-Name-Last: van Baalen
Author-Name: Kristine Höglund
Author-X-Name-First: Kristine
Author-X-Name-Last: Höglund
Title: “So, the Killings Continued”: Wartime Mobilization and Post-War Violence in KwaZulu-Natal, South Africa
Abstract: 
 Many post-war states experience continuous low-intensity violence for years after the formal end of the conflict. Existing theories often focus on country-level explanations of post-war violence, such as the presence of spoilers or the nature of the peace agreement. Yet, post-war violence does not affect all communities equally; whereas some remain entrenched in violence, others escape the perpetuation of violent conflict. We argue that communities where wartime mobilization at the local level is based on the formation of alliances between armed groups and local elites are more likely to experience post-war violence, than communities where armed groups generate civilian support based on grassroots backing of the group’s political objectives. We explore this argument in a comparison of three communities in KwaZulu-Natal, South Africa, which have experienced different levels of post-war violence. The analysis supports the main argument and contributes to the research on the microdynamics of civil war by outlining the implications of certain strategies of wartime mobilization and how these may generate localized legacies.
Journal: Terrorism and Political Violence
Pages: 1168-1186
Issue: 6
Volume: 31
Year: 2019
Month: 11
X-DOI: 10.1080/09546553.2017.1318126
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1318126
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:6:p:1168-1186



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1330199_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Zunyou Zhou
Author-X-Name-First: Zunyou
Author-X-Name-Last: Zhou
Title: Chinese Strategy for De-radicalization
Abstract: 
 China is fighting a tough battle against separatist terrorism perpetrated by militant Muslim Uyghurs in the far-western region of Xinjiang. De-radicalization is one of the policies the authorities in Xinjiang have recently taken to address the upsurge in terrorist violence. This paper consists of five parts. The first part deals with the background against which the de-radicalization strategy was conceived and developed. The second part discusses several major approaches to the strategy such as “five keys,” “four prongs,” “three contingents,” “two hands,” and “one rule.” The third part presents custodial, post-imprisonment, and social programs for targeting three groups of people: imprisoned radicals, released radicals, as well as those who are radicalized but not prosecuted. The fourth part describes programs for engaging communities in order to win over politically reliable people from civil society for support in de-radicalization. The last part draws a conclusion regarding the characteristics of, effectiveness of, controversies over, and future of the Chinese de-radicalization campaign.
Journal: Terrorism and Political Violence
Pages: 1187-1209
Issue: 6
Volume: 31
Year: 2019
Month: 11
X-DOI: 10.1080/09546553.2017.1330199
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1330199
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:6:p:1187-1209



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1330201_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Or Honig
Author-X-Name-First: Or
Author-X-Name-Last: Honig
Author-Name: Ido Yahel
Author-X-Name-First: Ido
Author-X-Name-Last: Yahel
Title: A Fifth Wave of Terrorism? The Emergence of Terrorist Semi-States
Abstract: 
 Drawing on Rapoport’s four waves thesis, this study asks whether the emergence of terrorist semi-states (TSS) in the 21st-century MENA region and Pakistan mean that we are seeing the beginning of a new (fifth) wave. We define a TSS as a rebel group that a) has control over portions of a weak state’s territory, maintaining governance there; b) but still launches terrorist attacks against third-party states. To be considered a fifth wave, the new terrorism phenomenon at hand must both fit Rapoport’s criteria of a wave (be global, have the same driving force) and also be significantly different from the prior wave. Clearly, the TSSs are different from the religious terror groups of the fourth wave in key respects: they prioritize territorial control, they engage in a much wider array of governance activities (not just social services), most of their victims have been members of the same religion—namely, Muslims (which suggests that they are driven more by the pursuit of power than by Jihad); and finally, their behavior (though not their statements) shows they have a local rather than a universal agenda. The main counter-argument is that TSSs are all Islamic and have so far not been exported globally.
Journal: Terrorism and Political Violence
Pages: 1210-1228
Issue: 6
Volume: 31
Year: 2019
Month: 11
X-DOI: 10.1080/09546553.2017.1330201
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1330201
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:6:p:1210-1228



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1341876_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: János Besenyő
Author-X-Name-First: János
Author-X-Name-Last: Besenyő
Title: Inferno Terror: Forest Fires as the New Form of Terrorism
Abstract: 
 Between the 18th and 26th of November 2016, 220 different locations went up in flames in the Israeli forest. Israeli firefighters were powerless to contain the fires, so army and police units had to contribute. Thousands of civilian volunteers also joined the fight against the fire. The Israeli firemen were unable to curb the continuously blazing fires, which is why the Prime Minister, Benjamin Netanyahu, asked and received international support. The operation lasted for eight days, more than 1,700 fires were eliminated, but the conflagration caused considerable damage. Due to the extremely dry and windy periods, many blamed the weather conditions for the damage, but it soon became clear that in several cases, the cause was arson. Although arson as a method of extremism has been continuously practiced in many incidents worldwide, it is still beyond the scope of research on terrorism. This essay aims to prove that we have to raise awareness of the issue, highlighting both relevant incidents and the extremist group’s propaganda incentive towards the enhanced use of arson. We raise the question whether on the basis of the incidents in Israel, arson could become a frequently used method of European terrorist units or individuals. And if yes, how the national counter-terrorist and law-enforcement agencies may adapt to the challenge of hardly controllable arson in order to minimize the chance of similarly executed attacks in the future.
Journal: Terrorism and Political Violence
Pages: 1229-1241
Issue: 6
Volume: 31
Year: 2019
Month: 11
X-DOI: 10.1080/09546553.2017.1341876
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1341876
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:6:p:1229-1241



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1339695_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mia Bloom
Author-X-Name-First: Mia
Author-X-Name-Last: Bloom
Author-Name: Hicham Tiflati
Author-X-Name-First: Hicham
Author-X-Name-Last: Tiflati
Author-Name: John Horgan
Author-X-Name-First: John
Author-X-Name-Last: Horgan
Title: Navigating ISIS’s Preferred Platform: Telegram1
Abstract: 
 Islamic State in Iraq and Syria (ISIS) online recruitment has been the subject of considerable interest by journalists and technology writers, but there has been no scholarly work to date exploring ISIS Telegram channels and chat rooms. Telegram has played an important role in recruitment and coordination in recent ISIS/terror attacks in Europe. Further, Telegram is quickly replacing the group’s online presence on more open platforms such as Facebook and Twitter as these companies aggressively police and shut down ISIS-linked accounts. This research note aims to demystify Telegram, explain how it can be used for research, and discuss some of the addictive qualities associated with user engagement.
Journal: Terrorism and Political Violence
Pages: 1242-1254
Issue: 6
Volume: 31
Year: 2019
Month: 11
X-DOI: 10.1080/09546553.2017.1339695
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1339695
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:6:p:1242-1254



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1361411_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Brian J. Phillips
Author-X-Name-First: Brian J.
Author-X-Name-Last: Phillips
Title: Do 90 Percent of Terrorist Groups Last Less than a Year? Updating the Conventional Wisdom
Abstract: 
 Prominent scholars criticize terrorism research for lacking sufficient empirical testing of arguments. Interestingly, one of the most widely cited estimates in terrorism studies has not been evaluated using the many data sources now available. Rapoport’s 1992 claim, that perhaps 90 percent of terrorist groups last less than one year, has been described as part of the conventional wisdom. This estimate is frequently used to justify studies of terrorist group longevity, a substantial line of research in recent years. Is the estimate accurate? Scholars increasingly publish data sets of terrorist organizations, but no one has analyzed them collectively to see if the 90 percent claim holds up. This article examines the eight largest global data sets of terrorist group longevity, covering 1968–2013. The samples vary considerably, but the percentage of groups that do not survive beyond their first year in these relevant data sets is between 25–74 percent. Across all data sets, on average about 50 percent of terrorist organizations do not make it past their first year. There is some variation depending on group motivations, consistent with Rapoport’s “wave” theory. However, overall, terrorist organizations appear to be more durable than the conventional wisdom suggests.
Journal: Terrorism and Political Violence
Pages: 1255-1265
Issue: 6
Volume: 31
Year: 2019
Month: 11
X-DOI: 10.1080/09546553.2017.1361411
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1361411
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:6:p:1255-1265



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1341877_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Khalil Sardarnia
Author-X-Name-First: Khalil
Author-X-Name-Last: Sardarnia
Author-Name: Rasoul Safizadeh
Author-X-Name-First: Rasoul
Author-X-Name-Last: Safizadeh
Title: The Internet and Its Potentials for Networking and Identity Seeking: A Study on ISIS
Abstract: 
 With the accelerating process of globalization and the development of its technological dimension, more and more opportunities and channels are available to the terrorist groups in the world to mobilize resources and advocates. “Islamic State of Iraq and Sham” (ISIS), as the most modern terrorist-excommunicative group (Takfiry), has been able to utilize the Internet and social networks highly adeptly. While ignoring the function of long-term structural and essential factors underlying the formation of ISIS, and also combining the networked society theory and triple forms of identities proposed by Manuel Castells with theoretical discussions on identity making, networking, and mobilization of media, the current article seeks to analyze the role of cyberspace and social networks as accelerating and opportunistic agents in mobilizing resources and disseminating ISIS. Using an explanatory analytical research method, the current article mainly intends to find a reply to the question: What has been the role of online social networks in connection with ISIS as an excommunicative and terrorist group? According to the research hypothesis, due to ISIS’s subtle, prevocational-emotional and targeted utilization of online social networks, the networks have played the role of an accelerator and opportunity maker in some areas including network building, guidance of public opinion, identity making, and the promotion of project identity of this terrorist group. The general conclusion obtained from the article is that ISIS, as the most terrifying and the most modern group equipped with cyber media, has been able to attract many forces out of fanatical religious groups, unemployed people, criminals, etc., worldwide. Additionally, with the recruitment of fanatics, ISIS has been able to accomplish identity making and network building. As a result, regional security and even security in Western countries is also highly endangered.
Journal: Terrorism and Political Violence
Pages: 1266-1283
Issue: 6
Volume: 31
Year: 2019
Month: 11
X-DOI: 10.1080/09546553.2017.1341877
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1341877
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:6:p:1266-1283



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1341878_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Harel Chorev
Author-X-Name-First: Harel
Author-X-Name-Last: Chorev
Title: Palestinian Social Media and Lone-Wolf Attacks: Subculture, Legitimization, and Epidemic
Abstract: 
 This article examines the impact of social media on the wave of Palestinian lone-wolf attacks against Israelis from October 2015 through September 2016. My principal argument is that social media played an important role in shaping the identity, perceptions, and behavioral patterns of dozens of assailants, and was key in creating the dynamic that ultimately characterized both the spreading of the idea of lone-wolf attacks and its execution. Social media reflected reality on the ground while simultaneously nourishing, amplifying, and escalating the situation by providing a platform for the emergence of new sources of authority, including an online subculture with distinct codes and pseudo-ritual patterns to support assailants. Social media also contributed substantially to shaping the contagious character of the attacks, and their capacity to persist without direct organizational guidance, following a typical epidemiological dynamic of spread, containment, and preservation.
Journal: Terrorism and Political Violence
Pages: 1284-1306
Issue: 6
Volume: 31
Year: 2019
Month: 11
X-DOI: 10.1080/09546553.2017.1341878
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1341878
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:6:p:1284-1306



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1341879_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Donald Holbrook
Author-X-Name-First: Donald
Author-X-Name-Last: Holbrook
Author-Name: Max Taylor
Author-X-Name-First: Max
Author-X-Name-Last: Taylor
Title: Terrorism as Process Narratives: A Study of Pre-Arrest Media Usage and the Emergence of Pathways to Engagement
Abstract: 
 Terrorism is a highly irregular form of crime where multiple factors combine to create circumstances that are unique to each case of involvement, or attempted involvement, in terrorist violence. Yet, there are commonalities in the way in which efforts to become involved unfold as processes, reflected as sequential developments where different forces combine to create conditions where individuals seek to plan acts of violence. The best way to frame this involvement is through analytical approaches that highlight these procedural dimensions but are equally sensitive to the nuances of each case. Analysing pre-arrest media usage of convicted terrorists, this paper focuses on the ways in which belief pathways and operational pathways interact in five distinct cases of terrorist involvement in the UK in what are termed “process narratives.”
Journal: Terrorism and Political Violence
Pages: 1307-1326
Issue: 6
Volume: 31
Year: 2019
Month: 11
X-DOI: 10.1080/09546553.2017.1341879
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1341879
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:6:p:1307-1326



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1476347_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael J. Williams
Author-X-Name-First: Michael J.
Author-X-Name-Last: Williams
Author-Name: Jocelyn J. Bélanger
Author-X-Name-First: Jocelyn J.
Author-X-Name-Last: Bélanger
Author-Name: John Horgan
Author-X-Name-First: John
Author-X-Name-Last: Horgan
Author-Name: William P. Evans
Author-X-Name-First: William P.
Author-X-Name-Last: Evans
Title: Experimental Effects of a Call-Center Disclaimer Regarding Confidentiality on Callers’ Willingness to Make Disclosures Related to Terrorism
Abstract: 
 Utilizing a sample drawn to represent the general U.S. population, the present study experimentally tested whether a call-center’s disclaimer regarding limits to caller confidentiality (i.e., that operators would be required to refer calls to law enforcement if callers were to discuss anyone who was a danger to themselves or others) affected disclosures related to a third party’s involvement with terrorist groups, gangs, or such party’s commission of assault and/or non-violent crimes.Disclaimer type did not significantly affect the number of terrorism-related disclosures. Furthermore, it did not significantly affect either the number of gang-related disclosures or reports of assault. However, the law enforcement referral disclaimer/condition reduced the number of disclosures of non-violent crimes that were not directly related to terrorism, gangs, or assault, though its effect accounted for less than one percent of the variance between conditions. Additionally, disclaimer type did not significantly affect willingness to recommend the call-center, nor did that effect vary significantly by age or sex. Implications for the call-center’s role in addressing ideologically motivated violence (terrorism, violent extremism), as a form of secondary/targeted prevention, are discussed.
Journal: Terrorism and Political Violence
Pages: 1327-1341
Issue: 6
Volume: 31
Year: 2019
Month: 11
X-DOI: 10.1080/09546553.2018.1476347
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1476347
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:6:p:1327-1341



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1666567_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ivan Strenski
Author-X-Name-First: Ivan
Author-X-Name-Last: Strenski
Title: Apocalypse, Revolution and Terrorism: From the Sicari to the American Revolt against the Modern World
Journal: Terrorism and Political Violence
Pages: 1342-1344
Issue: 6
Volume: 31
Year: 2019
Month: 11
X-DOI: 10.1080/09546553.2019.1666567
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1666567
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:6:p:1342-1344



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1666565_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Martin J. Gallagher
Author-X-Name-First: Martin J.
Author-X-Name-Last: Gallagher
Title: After the Caliphate
Journal: Terrorism and Political Violence
Pages: 1345-1346
Issue: 6
Volume: 31
Year: 2019
Month: 11
X-DOI: 10.1080/09546553.2019.1666565
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1666565
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:6:p:1345-1346



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1666570_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Danielle Gilbert
Author-X-Name-First: Danielle
Author-X-Name-Last: Gilbert
Title: Social Media Freaks: Digital Identity in the Network Society
Journal: Terrorism and Political Violence
Pages: 1347-1349
Issue: 6
Volume: 31
Year: 2019
Month: 11
X-DOI: 10.1080/09546553.2019.1666570
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1666570
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:6:p:1347-1349



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1666569_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Juliana Geran Pilon
Author-X-Name-First: Juliana
Author-X-Name-Last: Geran Pilon
Title: Rethinking Antifascism: History, Memory and Politics, 1922 to the Present
Journal: Terrorism and Political Violence
Pages: 1350-1351
Issue: 6
Volume: 31
Year: 2019
Month: 11
X-DOI: 10.1080/09546553.2019.1666569
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1666569
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:6:p:1350-1351



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1666568_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kyle Burke
Author-X-Name-First: Kyle
Author-X-Name-Last: Burke
Title: King of Spies: The Dark Reign of America’s Spy Master in Korea
Journal: Terrorism and Political Violence
Pages: 1352-1353
Issue: 6
Volume: 31
Year: 2019
Month: 11
X-DOI: 10.1080/09546553.2019.1666568
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1666568
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:6:p:1352-1353



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1666554_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sonja Wentling
Author-X-Name-First: Sonja
Author-X-Name-Last: Wentling
Title: A Half Century of Occupation: Israel, Palestine, and the World’s Most Intractable Conflict
Journal: Terrorism and Political Violence
Pages: 1354-1355
Issue: 6
Volume: 31
Year: 2019
Month: 11
X-DOI: 10.1080/09546553.2019.1666554
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1666554
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:6:p:1354-1355



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1666575_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marsha R. Robinson
Author-X-Name-First: Marsha R.
Author-X-Name-Last: Robinson
Title: The War Against Al Qaeda: Religion, Policy, and Counter-Narratives
Journal: Terrorism and Political Violence
Pages: 1356-1357
Issue: 6
Volume: 31
Year: 2019
Month: 11
X-DOI: 10.1080/09546553.2019.1666575
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1666575
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:6:p:1356-1357



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1666576_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Roger Chapman
Author-X-Name-First: Roger
Author-X-Name-Last: Chapman
Title: What Makes a Terrorist: Economics and the Roots of Terrorism
Journal: Terrorism and Political Violence
Pages: 1358-1359
Issue: 6
Volume: 31
Year: 2019
Month: 11
X-DOI: 10.1080/09546553.2019.1666576
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1666576
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:6:p:1358-1359



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1666556_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Afghanistan’s Internal and External Factors
Journal: Terrorism and Political Violence
Pages: 1360-1365
Issue: 6
Volume: 31
Year: 2019
Month: 11
X-DOI: 10.1080/09546553.2019.1666556
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1666556
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:6:p:1360-1365



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1666573_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Donald D. Denton
Author-X-Name-First: Donald D.
Author-X-Name-Last: Denton
Title: The Holocaust Industry: Reflections on the Exploitation of Jewish Suffering
Journal: Terrorism and Political Violence
Pages: 1366-1368
Issue: 6
Volume: 31
Year: 2019
Month: 11
X-DOI: 10.1080/09546553.2019.1666573
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1666573
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:6:p:1366-1368



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1666574_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: The Threat from Within: Recognizing Al Qaeda-Inspired Radicalization and Terrorism in the West
Journal: Terrorism and Political Violence
Pages: 1369-1370
Issue: 6
Volume: 31
Year: 2019
Month: 11
X-DOI: 10.1080/09546553.2019.1666574
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1666574
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:6:p:1369-1370



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1666577_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Caitlin Ambrozik
Author-X-Name-First: Caitlin
Author-X-Name-Last: Ambrozik
Title: Why Terrorists Quit: The Disengagement of Indonesian Jihadists
Journal: Terrorism and Political Violence
Pages: 1371-1372
Issue: 6
Volume: 31
Year: 2019
Month: 11
X-DOI: 10.1080/09546553.2019.1666577
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1666577
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:6:p:1371-1372



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1666571_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Peter Krause
Author-X-Name-First: Peter
Author-X-Name-Last: Krause
Title: Talibanistan: Negotiating the Borders Between Terror, Politics, and Religion
Journal: Terrorism and Political Violence
Pages: 1373-1375
Issue: 6
Volume: 31
Year: 2019
Month: 11
X-DOI: 10.1080/09546553.2019.1666571
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1666571
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:6:p:1373-1375



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1648062_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Babak Rezvani
Author-X-Name-First: Babak
Author-X-Name-Last: Rezvani
Title: Russian Interventions in the Post-Soviet and Syrian Conflicts
Journal: Terrorism and Political Violence
Pages: 1376-1380
Issue: 6
Volume: 31
Year: 2019
Month: 11
X-DOI: 10.1080/09546553.2019.1648062
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1648062
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:31:y:2019:i:6:p:1376-1380

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1342633_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Enzo Nussio
Author-X-Name-First: Enzo
Author-X-Name-Last: Nussio
Title: The Role of Sensation Seeking in Violent Armed Group Participation
Abstract: 
 An important puzzle in the study of political violence is why individuals risk their lives fighting for a public good, when they can free-ride and enjoy the same benefits if others take the risk. This logic is particularly important to rationalist theories, which view risk as an inherent cost to violent armed group participation—which has to be offset by selective incentives, peer pressure, or coercion. This perspective has widely contributed to the understanding of violent conflict, but ignores key insights from psychology. What if risk is not a cost and instead attractive? In this article, I argue that people with a sensation seeking personality—interested in novel and intense experience and willing to accept risk for the sake of it—are more likely to join armed groups. Preliminary survey evidence comparing voluntarily and forcibly recruited members of Colombian armed groups supports my argument. The re-interpretation of a series of existing studies on Colombian guerrilla and paramilitary fighters illustrates the pervasiveness and varying manifestations of sensation seeking. Personality traits are an under-recognized ingredient in the process of joining armed groups and complement our current understanding, which is mainly determined by contextual conditions and situational motivations.
Journal: Terrorism and Political Violence
Pages: 1-19
Issue: 1
Volume: 32
Year: 2020
Month: 1
X-DOI: 10.1080/09546553.2017.1342633
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1342633
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:1:p:1-19



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1342634_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tore Refslund Hamming
Author-X-Name-First: Tore Refslund
Author-X-Name-Last: Hamming
Title: The Al Qaeda–Islamic State Rivalry: Competition Yes, but No Competitive Escalation
Abstract: 
 On June 29, 2014, the Islamic State emerged and declared the establishment of its caliphate. The declaration was a direct challenge to other Sunni Jihadi groups including Al Qaeda and an attempt to become the leading Jihadi group around. The rivalry that evolved within Sunni Jihadism, and particularly between Al Qaeda and its renegade affiliate the Islamic State, entailed a hitherto unseen competitive environment within the Jihadi field. Interestingly, the increased competition did not lead to a dynamic of competitive escalation and mutual radicalization of behaviour. Theory tells us to expect competitive escalation, or outbidding, in such contexts, but despite the initial success of the Islamic State’s brutality and offensive conquest in Syria and Iraq, Al Qaeda did not “play along” and instead pursued a different path. The reason for this absence of competitive escalation, this paper argues, is to be found in a pre-conflict methodological re-orientation within Al Qaeda and in the pacifying role played by influential Al Qaeda-affiliated ideologues.
Journal: Terrorism and Political Violence
Pages: 20-37
Issue: 1
Volume: 32
Year: 2020
Month: 1
X-DOI: 10.1080/09546553.2017.1342634
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1342634
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:1:p:20-37



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1346505_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Zoey Reeve
Author-X-Name-First: Zoey
Author-X-Name-Last: Reeve
Title: Islamist Terrorism as Parochial Altruism
Abstract: 
 An evolutionary approach is used to explain how certain universal cognitive mechanisms (parochial altruism) underlie engagement and involvement in Islamist terrorism. Parochial altruism is the tendency to perceive and behave in ways that favour ingroups and disfavour outgroups in light of particular intergroup cues, whilst incurring some kind of personal cost to effect that bias. The parochial altruism mechanism influences how ingroups and outgroups are perceived (i.e., as threatened or threatening) and responded to. Experience of certain situations and/or dispositions (i.e., priming contexts of disease, and harm to the ingroup) make parochial altruistic responses more likely. It is argued that Islamist terrorist grievances can be considered as perceptions of evolutionarily relevant threats, whilst terrorism itself is an example of parochial altruistic behaviour. It is further proposed that features associated with engagement in terrorism (including exposure to ideology, propaganda, socialisation, etc.) enhance and guide parochial altruism, that is, perceptions of intergroup threat, and violent responses to it.
Journal: Terrorism and Political Violence
Pages: 38-56
Issue: 1
Volume: 32
Year: 2020
Month: 1
X-DOI: 10.1080/09546553.2017.1346505
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1346505
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:1:p:38-56



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1346506_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Kenney
Author-X-Name-First: Michael
Author-X-Name-Last: Kenney
Title: A Community of True Believers: Learning as Process among “The Emigrants”
Abstract: 
 This paper applies the concept of “communities of practice” to al-Muhajiroun (“the Emigrants”), an outlawed activist network that seeks to create an Islamic caliphate in Britain and the West through activism and proselytizing. Responding to recent studies on terrorism learning and adaptation, the author argues that focusing exclusively on the outputs of learning is unsatisfactory. Instead scholars should analyze learning as a process and unpack the causal mechanisms behind it. To support his within-case analysis, the author draws on extensive field work, including interviews and ethnographic observation. Newcomers to al-Muhajiroun learn the community’s norms and practices through repeated interactions with more experienced activists. These interactions take place in study circles and through companionship. Activists also learn by doing, preaching the Emigrants’ Salafi-Islamist ideology at da’wah stalls and protesting against the West’s “war on Islam” at demonstrations. The more they do, the better they become at performing the network’s high-risk activism, and the more deeply committed they become to its community of practice. However, far from allowing activists to adapt seamlessly to all challenges, the Emigrants’ insular and dogmatic community of practice creates its own problems, hindering its ability to innovate, expand, and thrive in an increasingly hostile environment.
Journal: Terrorism and Political Violence
Pages: 57-76
Issue: 1
Volume: 32
Year: 2020
Month: 1
X-DOI: 10.1080/09546553.2017.1346506
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1346506
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:1:p:57-76



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1347874_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Juan Masullo
Author-X-Name-First: Juan
Author-X-Name-Last: Masullo
Author-Name: Francis O’Connor
Author-X-Name-First: Francis
Author-X-Name-Last: O’Connor
Title: PKK Violence against Civilians: Beyond the Individual, Understanding Collective Targeting
Abstract: 
 This article examines the logic of civilian targeting in the Turkish-Kurdish civil war. It analyzes two instances of PKK violence: against pro-state Village Guards’ families in the 1980s and school-teachers in the 1990s. Against original data, we evaluate the extent to which the dominant conceptual tools available in civil war literature help us make sense of these instances and argue that there is a need to go beyond the established selective/indiscriminate distinction if we want to capture the logic of PKK’s targeting. Consequently, we build on and specify further recent conceptual developments in the field and show that both cases are better understood as instances of collective targeting. We further show, however, that the collective nature of each differs in relevant ways: while the killing of the families of Village Guards constitutes an instance of collective targeting in the sense of “extended group association,” in the case of school teachers there are indications of a secondary spatially differentiated selection criteria accompanying the collective logic. Our analysis emphasizes the field’s need for stronger conceptual foundations underpinning our theories of violence against civilians, as well as the limitations of understandings rooted in an “ontological individualism” when applied without careful consideration to non-Western societies.
Journal: Terrorism and Political Violence
Pages: 77-99
Issue: 1
Volume: 32
Year: 2020
Month: 1
X-DOI: 10.1080/09546553.2017.1347874
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1347874
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:1:p:77-99



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1351956_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Adib Bencherif
Author-X-Name-First: Adib
Author-X-Name-Last: Bencherif
Title: From Resilience to Fragmentation: Al Qaeda in the Islamic Maghreb and Jihadist Group Modularity
Abstract: 
 During the last decade, Al Qaeda in the Islamic Maghreb (AQIM) managed to survive despite suffering four major fragmentations. Through the case study of AQIM, the goal of this paper is to contribute theoretically and empirically to the literature on terrorism by explaining the fragmentation of resilient jihadist groups. Two causes of fragmentation are identified: the “preference divergence,” in reference to the works of Shapiro, and the structural organization of power. Furthermore, two notions are presented to refine the theoretical tools of the literature on terrorism: a) the meta-strategy of survival, and b) centralized and deconcentrated power. To explore the group’s history and demonstrate the modularity of AQIM, a triangulation of primary sources, such as internal documents and key interviews, along with the monitoring of the regional press, is utilized. The author concludes this paper by suggesting new avenues for studying the evolution of jihadist groups.
Journal: Terrorism and Political Violence
Pages: 100-118
Issue: 1
Volume: 32
Year: 2020
Month: 1
X-DOI: 10.1080/09546553.2017.1351956
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1351956
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:1:p:100-118



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1351957_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Muhammad Dan Suleiman
Author-X-Name-First: Muhammad Dan
Author-X-Name-Last: Suleiman
Title: What Makes Islamist Movements Different? A Study of Liberia’s NPFL and Nigeria’s Boko Haram in West Africa
Abstract: 
 West Africa witnessed many violent rebel movements in the post-cold war era, some of which led to protracted conflicts in countries like Liberia and Sierra Leone. In the post-9/11 era, Muslim extremist movements have emerged. While the scholarship on the past “conventional” rebel movements mostly understood them in their local socio-political contexts, Muslim extremist groups have been dominantly interpreted in the context of the global “war on terrorism.” This is mainly due to the latter’s unique use of a unique form of violence (terror), its religious narrative, and its external links to other groups in other countries. This article interrogates this different understanding of conventional and religious types of anti-state rebellion in West Africa through a comparative study of the National Patriotic Front of Liberia (1989–1997), and the Boko Haram insurgency in Nigeria. After a synthesisation of four key questions, the article concludes that Muslim extremist groups in West Africa are not any different from past rebel movements. Muslim extremist groups, just like past movements, are much more rational in the local West African contexts than it is dominantly acknowledged in peace and security scholarship and practice.
Journal: Terrorism and Political Violence
Pages: 119-137
Issue: 1
Volume: 32
Year: 2020
Month: 1
X-DOI: 10.1080/09546553.2017.1351957
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1351957
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:1:p:119-137



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1364634_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Arzu Kibris
Author-X-Name-First: Arzu
Author-X-Name-Last: Kibris
Author-Name: Özgür Kibris
Author-X-Name-First: Özgür
Author-X-Name-Last: Kibris
Title: State-Society Relations in Civil Conflicts
Abstract: 
 Civil conflicts are conceptualized as asymmetric, population-centric military struggles. The argument is that insurgencies, even though they are no match in military power to their state adversaries in many cases, resort to armed struggle nonetheless as a tool to impair state capacity, the quality of governance, and the ability of the state to honor the “social contract” in order to eventually destroy state authority and render the state irrelevant for the society. Note that this argument implies that state-society relations do react to the military course of the conflict. In this article, we provide empirical evidence for this implication. Introducing a new panel dataset on the long-running civil conflict in Turkey, we first conduct a micro-level analysis and demonstrate the significant impact rebel presence has upon state-society relations across localities and time. We then analyze the results of semi-structured interviews we had conducted with a group of experts from the conflict regions to decipher the possible mechanisms behind the association we observe in the data. The interviews support our motivating theoretical argument.
Journal: Terrorism and Political Violence
Pages: 138-166
Issue: 1
Volume: 32
Year: 2020
Month: 1
X-DOI: 10.1080/09546553.2017.1364634
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1364634
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:1:p:138-166



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1364635_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Olivier Walther
Author-X-Name-First: Olivier
Author-X-Name-Last: Walther
Author-Name: Christian Leuprecht
Author-X-Name-First: Christian
Author-X-Name-Last: Leuprecht
Author-Name: David B. Skillicorn
Author-X-Name-First: David B.
Author-X-Name-Last: Skillicorn
Title: Political Fragmentation and Alliances among Armed Non-state Actors in North and Western Africa (1997–2014)
Abstract: 
 Drawing on a collection of open source data, the article uses network analysis to represent alliances and conflicts among 179 organizations involved in violence in North and Western Africa between 1997 and 2014. Owing to the fundamentally relational nature of internecine violence, this article investigates the way the structural positions of conflicting parties affect their ability to resort to political violence. To this end, we combine two spectral embedding techniques that have previously been considered separately: one for directed graphs that takes into account the direction of relationships between belligerents, and one for signed graphs that takes into consideration whether relationships between groups are positive or negative. We hypothesize that groups with similar allies and foes have similar patterns of aggression. In a region where alliances are fluid and actors often change sides, the propensity to use political violence corresponds to a group’s position in the social network.
Journal: Terrorism and Political Violence
Pages: 167-186
Issue: 1
Volume: 32
Year: 2020
Month: 1
X-DOI: 10.1080/09546553.2017.1364635
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1364635
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:1:p:167-186



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1693774_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nathaniel L. Moir
Author-X-Name-First: Nathaniel L.
Author-X-Name-Last: Moir
Title: In the Warlords’ Shadow: Special Operations Forces, the Afghans, and their Fight against the Taliban
Journal: Terrorism and Political Violence
Pages: 187-190
Issue: 1
Volume: 32
Year: 2020
Month: 1
X-DOI: 10.1080/09546553.2019.1693774
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1693774
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:1:p:187-190



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1693785_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Donald D. Denton
Author-X-Name-First: Donald D.
Author-X-Name-Last: Denton
Title: Twilight Warriors: The Soldiers, Spies & Special Agents Who Are Revolutionizing the American Way of War
Journal: Terrorism and Political Violence
Pages: 191-193
Issue: 1
Volume: 32
Year: 2020
Month: 1
X-DOI: 10.1080/09546553.2019.1693785
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1693785
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:1:p:191-193



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1693783_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lucien Frary
Author-X-Name-First: Lucien
Author-X-Name-Last: Frary
Title: Transnational Organized Crime and Jihadist Terrorism: Russian Speaking Networks in Western Europe
Journal: Terrorism and Political Violence
Pages: 194-195
Issue: 1
Volume: 32
Year: 2020
Month: 1
X-DOI: 10.1080/09546553.2019.1693783
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1693783
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:1:p:194-195



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1693780_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Technology’s Impact on War and Terrorism
Journal: Terrorism and Political Violence
Pages: 196-203
Issue: 1
Volume: 32
Year: 2020
Month: 1
X-DOI: 10.1080/09546553.2019.1693780
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1693780
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:1:p:196-203



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1693782_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Thomas Klikauer
Author-X-Name-First: Thomas
Author-X-Name-Last: Klikauer
Title: The Public Prosecution of Right-Wing and Racist Violence: An Investigation into Structural Deficits and Continuation – The Example of the NSU Killings and the Terrorist Attack on the Octoberfest [Staatsanwaltschaftlicher Umgang mit rechter und rassistischer Gewalt: eine Untersuchung struktureller Defizite und Kontinuitäten am Beispiel der Ermittlungen zum NSU-Komplex und dem Oktoberfestattentat]
Journal: Terrorism and Political Violence
Pages: 204-208
Issue: 1
Volume: 32
Year: 2020
Month: 1
X-DOI: 10.1080/09546553.2019.1693782
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1693782
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:1:p:204-208



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1693781_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Donald D. Denton
Author-X-Name-First: Donald D.
Author-X-Name-Last: Denton
Title: The Political Impossibility of Modern Counterinsurgency: Strategic Problems, Puzzles, and Paradoxes & The Routledge Handbook of European Security
Journal: Terrorism and Political Violence
Pages: 209-212
Issue: 1
Volume: 32
Year: 2020
Month: 1
X-DOI: 10.1080/09546553.2019.1693781
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1693781
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:1:p:209-212



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1693773_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: D. J. Mulloy
Author-X-Name-First: D. J.
Author-X-Name-Last: Mulloy
Title: Behold, America: The Entangled History of “America First” and “The American Dream”
Journal: Terrorism and Political Violence
Pages: 213-214
Issue: 1
Volume: 32
Year: 2020
Month: 1
X-DOI: 10.1080/09546553.2019.1693773
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1693773
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:1:p:213-214



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1693779_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Adrian R. Lewis
Author-X-Name-First: Adrian R.
Author-X-Name-Last: Lewis
Title: Small Wars, Big Data: The Information Revolution in Modern Conflict
Journal: Terrorism and Political Violence
Pages: 215-216
Issue: 1
Volume: 32
Year: 2020
Month: 1
X-DOI: 10.1080/09546553.2019.1693779
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1693779
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:1:p:215-216

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1364636_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sarah Birch
Author-X-Name-First: Sarah
Author-X-Name-Last: Birch
Author-Name: David Muchlinski
Author-X-Name-First: David
Author-X-Name-Last: Muchlinski
Title: The Dataset of Countries at Risk of Electoral Violence
Abstract: 
 Electoral violence is increasingly affecting elections around the world, yet researchers have been limited by a paucity of granular data on this phenomenon. This paper introduces and describes a new dataset of electoral violence—the Dataset of Countries at Risk of Electoral Violence (CREV)—that provides measures of 10 different types of electoral violence across 642 elections held around the globe between 1995 and 2013. The paper provides a detailed account of how and why the dataset was constructed, together with a replication of previous research on electoral violence. We introduce this dataset by demonstrating that the CREV, while measuring the same underlying phenomena as other datasets on electoral violence, provides researchers with the ability to draw more nuanced conclusions about the causes and consequences of violence that occurs in connection with the electoral process. We also present and analyze descriptive data from the CREV dataset.
Journal: Terrorism and Political Violence
Pages: 217-236
Issue: 2
Volume: 32
Year: 2020
Month: 2
X-DOI: 10.1080/09546553.2017.1364636
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1364636
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:2:p:217-236



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1364637_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joseph M. Brown
Author-X-Name-First: Joseph M.
Author-X-Name-Last: Brown
Title: Notes to the Underground: Credit Claiming and Organizing in the Earth Liberation Front
Abstract: 
 This paper presents a case study of the Earth Liberation Front (ELF), based on interviews of the group’s former affiliates. It examines the role of credit claims in organizing this underground leaderless resistance group’s activity. In addition to the external signaling functions of credit claims—demonstrating capability, issuing demands, and soliciting public support—credit claims serve a movement-building role in the ELF. By issuing credit claims in “aboveground” fora that other cells are known to read, ELF cells with no direct links are able to communicate information to one another. Credit-claiming communiqués serve four organizing functions for the ELF. They constitute the ELF underground as an imagined community, recruit new cells, set agendas for future actions, and enforce operational standards of behavior via an informal “peer review” process. This study of the ELF suggests broader insights, including possible organizing techniques that may be observed in white supremacist and Islamist cases.
Journal: Terrorism and Political Violence
Pages: 237-256
Issue: 2
Volume: 32
Year: 2020
Month: 2
X-DOI: 10.1080/09546553.2017.1364637
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1364637
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:2:p:237-256



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1364638_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Maiah Jaskoski
Author-X-Name-First: Maiah
Author-X-Name-Last: Jaskoski
Author-Name: Michael Wilson
Author-X-Name-First: Michael
Author-X-Name-Last: Wilson
Author-Name: Berny Lazareno
Author-X-Name-First: Berny
Author-X-Name-Last: Lazareno
Title: Approving of but Not Choosing Violence: Paths of Nonviolent Radicals
Abstract: 
 Why do some political radicals—people who believe in using violence for political ends and who may sympathize with local violent groups—not themselves perform violent acts or join violent organizations? This article finds that prior research on terrorism, insurgency, civil war, and ethnic conflict seems to do a poor job of predicting who upon adopting radical political views will actually engage in violence. In fact, there is a great deal of contingency involved in the choice of whether or not to become violent. Employing path dependence, the article treats the radicalizing moment as a “critical juncture,” filled with contingency, but after which actions become more predictable: during this small window of time, radicalized individuals might happen to choose a profession and/or join an organization that is nonviolent, but subsequently become institutionalized as nonviolent actors. The article therefore offers an explanation for how individuals with radical beliefs can be institutionalized as either violent or nonviolent. The study’s findings are based on a content analysis of interviews with 129 nonviolent activists, most of whom exhibited radical beliefs at the time of the interview, and former violent actors, in 12 countries experiencing violent internal conflict.
Journal: Terrorism and Political Violence
Pages: 257-274
Issue: 2
Volume: 32
Year: 2020
Month: 2
X-DOI: 10.1080/09546553.2017.1364638
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1364638
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:2:p:257-274



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1364639_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Matteo Re
Author-X-Name-First: Matteo
Author-X-Name-Last: Re
Title: The Red Brigades’ Communiqués: An Analysis of the Terrorist Group’s Propaganda
Abstract: 
 The article analyzes the language, the propaganda, and communication techniques used by the Red Brigades (BR) during their activities. The analysis is based on the study of 181 communiqués, written and circulated by the terrorist organization between 1970 and 1988, i.e., from the beginning to the end of its activities. The corpus comprises three types of communiqués: a) claims of responsibility for violent actions (kidnapping, homicides), b) internal documents aimed at creating a coherent organization and ideology, and c) texts that circulated within the extra-parliamentary Left to generate positive propaganda towards the BR. The paper demonstrates that the language used, as well as the propaganda techniques, underwent important changes during the period of activity of the BR, in accordance with the evolution of their objectives and their internal development. In addition to this, the analysis reveals a certain repetition of specific communication strategies, as well as identification of specific contents that show a certain degree of homogeneity. At the same time, the article also assesses the structural changes that took place within the BR, which may have affected their communiqués.
Journal: Terrorism and Political Violence
Pages: 275-292
Issue: 2
Volume: 32
Year: 2020
Month: 2
X-DOI: 10.1080/09546553.2017.1364639
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1364639
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:2:p:275-292



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1368494_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: William A. Wagstaff
Author-X-Name-First: William A.
Author-X-Name-Last: Wagstaff
Author-Name: Danielle F. Jung
Author-X-Name-First: Danielle F.
Author-X-Name-Last: Jung
Title: Competing for Constituents: Trends in Terrorist Service Provision
Abstract: 
 What shapes the types of services terrorist and insurgent groups provide? Research on these organizations provides mounting evidence that understanding the nonviolent strategies of violent groups is critical to a complete picture of conflict dynamics. We add to this work, using a longitudinal measure of terrorist service provision coverage across a number of service sectors to evaluate hypotheses concerning the drivers of terrorist service provision to understand which services groups provide. Here, we are interested in understanding patterns of service provision: which groups provide services where, and whether and how that decision is reactive to the state context. Specifically we look to see if groups are likely to provide services as complements or substitutes to the state in the competition for constituents. We find terrorist groups challenge the state in service provision in less capital-intensive sectors, such as education, while avoiding competition in more capital-intensive sectors, such as healthcare. We also find service provision varies over a group’s lifetime, likely in response to counterterrorism efforts. As a group ages and strengthens, it is also more likely to provide a broader array of services. Finally, we observe that service-providers tend to have longer lifespans.
Journal: Terrorism and Political Violence
Pages: 293-324
Issue: 2
Volume: 32
Year: 2020
Month: 2
X-DOI: 10.1080/09546553.2017.1368494
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1368494
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:2:p:293-324



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1368495_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Cathal McManus
Author-X-Name-First: Cathal
Author-X-Name-Last: McManus
Title: Conceptualising Islamic “Radicalisation” in Europe through “Othering”: Lessons from the Conflict in Northern Ireland
Abstract: 
 Recent terror attacks across Europe have raised concerns about the issue of “radicalisation” amongst sections of the Islamic populations and how it might be successfully prevented. Drawing on the growing literature analysing “radicalisation” and applying the experiences of Northern Ireland over the past half-century, this paper argues that there is a need to move away from current discourses around radicalism and to explain the extremism that manifests itself in violent actions within the parameters of sectarianism. Arguing that this sectarianism is grounded in long-term processes of “Othering,” the paper will contend that there is a need for Western governments to recognise and address long-held grievances and fears within the Islamic community in order to reduce the threat of violence.
Journal: Terrorism and Political Violence
Pages: 325-344
Issue: 2
Volume: 32
Year: 2020
Month: 2
X-DOI: 10.1080/09546553.2017.1368495
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1368495
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:2:p:325-344



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1374254_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Charles W. Mahoney
Author-X-Name-First: Charles
Author-X-Name-Last: W. Mahoney
Title: Splinters and Schisms: Rebel Group Fragmentation and the Durability of Insurgencies
Abstract: 
 Insurgent organizations often experience internal fragmentation when a faction breaks away to form a separate group with independent leadership. Following a split, what factors influence the relative durability and status of groups within larger nationalist movements? Existing theory attributes variation in groups’ performance after a division to rebel strategy. Specifically, some work argues that extremist groups using violence will outbid more moderate competitors; however, alternate research contends organizations using strategic non-violence will have more success. Contrary to previous work, this inquiry argues that in many instances rebel strategy following a split has little influence on the duration and status of groups. Instead, organizations’ relative membership size at the time of a division is the most important factor influencing their subsequent performance. That is, after a split larger core groups are more likely to survive for longer periods and to advance within their broader nationalist movements than splinter groups. However, in cases when divisions result in groups of similar size and strength, strategy may still play a significant role in rebel organizations’ comparative longevity and status.
Journal: Terrorism and Political Violence
Pages: 345-364
Issue: 2
Volume: 32
Year: 2020
Month: 2
X-DOI: 10.1080/09546553.2017.1374254
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1374254
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:2:p:345-364



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1374255_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Manuel Ricardo Torres-Soriano
Author-X-Name-First: Manuel Ricardo
Author-X-Name-Last: Torres-Soriano
Title: Jihadist Propaganda as a Threat Indicator: The Case of Spain
Abstract: 
 The present article examines the relevance of jihadist propaganda as an indicator of the threat from terrorism. To that end, it uses jihadist propaganda output referring to Spain as a case study. It proposes an instrument of measurement based on content analysis, in which the origin, format, content, and distribution method of the materials are taken as categories. The results offer empirical evidence regarding the seriousness of the terrorist threat against Spain, a country that is particularly exposed due to its historical and geographical singularities and its status as the victim of an attack deemed paradigmatic in the minds of jihadists.
Journal: Terrorism and Political Violence
Pages: 365-381
Issue: 2
Volume: 32
Year: 2020
Month: 2
X-DOI: 10.1080/09546553.2017.1374255
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1374255
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:2:p:365-381



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1377074_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Stephen C. Nemeth
Author-X-Name-First: Stephen C.
Author-X-Name-Last: Nemeth
Author-Name: Jacob A. Mauslein
Author-X-Name-First: Jacob A.
Author-X-Name-Last: Mauslein
Title: Generosity Is a Dangerous Game: Aid Allocation and the Risks of Terrorism
Abstract: 
 While evidence has suggested that international assistance projects become the targets of violence, political science research has often addressed this relationship at the state level and not the aid location itself. Given the heterogeneous nature of aid distribution and terrorist behavior within a state, it is important to study this relationship using higher resolution data. Using geocoded terrorist attack and multilateral aid distribution data, coupled with the PRIO-GRID cell structure, our approach sheds light on whether areas in which aid is distributed are more likely to be targeted by terrorist groups. Our results show that areas where aid is being distributed are targeted more heavily than areas without aid distribution. The modality of specific multilateral aid projects is also shown to impact whether they are more likely to be targeted. Further, we show that terrorists select different types of targets in aid locations than they do in non-aid locations, lending support to the notion that terrorists seek to intimidate local populations from collaboration with the government and to dissuade further government efforts. The results not only highlight and expand upon the dangers associated with aid distribution, but also the notion that aid content is a factor in terrorist targeting preferences.
Journal: Terrorism and Political Violence
Pages: 382-400
Issue: 2
Volume: 32
Year: 2020
Month: 2
X-DOI: 10.1080/09546553.2017.1377074
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1377074
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:2:p:382-400



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1415891_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jean-Loup Samaan
Author-X-Name-First: Jean-Loup
Author-X-Name-Last: Samaan
Author-Name: Andreas Jacobs
Author-X-Name-First: Andreas
Author-X-Name-Last: Jacobs
Title: Countering Jihadist Terrorism: A Comparative Analysis of French and German Experiences
Abstract: 
 As France and Germany have become major targets of jihadist terrorism, the calls for stronger cooperation in counterterrorism at the European level have grown in earnest. However, a comparative analysis of the national experiences from both countries evidences significant differences in terms of political culture, institutional division of labor, and legal oversight. Counterterrorism practices can be described following a typology of three broad categories: a military-oriented policy that aims to prevent, deter and retaliate against terrorists; a regulatory policy that strengthens the legal and judicial resources to address the terrorist threat; a diplomatic approach that focuses on negotiations, and sometimes accommodation. Whereas France moved after the 2015 attacks towards a military-oriented policy, Germany has so far opted to sustain its traditional regulatory approach. This article details the differences between Paris and Berlin regarding the contemporary public debate on jihadist terrorism, to the law enforcement framework, to the deradicalization programs as well as to the role of armed forces. The paper identifies a clear divergence in each of these sectors. As the future extent of bi- and multilateral lateral efforts in the field of counterterrorism are likely to rise, these differences should be better taken into account.
Journal: Terrorism and Political Violence
Pages: 401-415
Issue: 2
Volume: 32
Year: 2020
Month: 2
X-DOI: 10.1080/09546553.2017.1415891
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1415891
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:2:p:401-415



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1710966_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lucien Frary
Author-X-Name-First: Lucien
Author-X-Name-Last: Frary
Title: Russia Abroad: Driving Regional Fracture in Post-Communist Eurasia and Beyond
Journal: Terrorism and Political Violence
Pages: 416-417
Issue: 2
Volume: 32
Year: 2020
Month: 2
X-DOI: 10.1080/09546553.2019.1710966
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1710966
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:2:p:416-417



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1710967_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Barbara Ann Chotiner
Author-X-Name-First: Barbara Ann
Author-X-Name-Last: Chotiner
Title: The Putin System: An Opposing View
Journal: Terrorism and Political Violence
Pages: 418-419
Issue: 2
Volume: 32
Year: 2020
Month: 2
X-DOI: 10.1080/09546553.2019.1710967
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1710967
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:2:p:418-419



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1710957_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Donald D. Denton
Author-X-Name-First: Donald D.
Author-X-Name-Last: Denton
Title: Admiral Gorshkov: The Man Who Challenged the U.S. Navy
Journal: Terrorism and Political Violence
Pages: 420-421
Issue: 2
Volume: 32
Year: 2020
Month: 2
X-DOI: 10.1080/09546553.2019.1710957
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1710957
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:2:p:420-421



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1710968_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Barbara Ann Chotiner
Author-X-Name-First: Barbara Ann
Author-X-Name-Last: Chotiner
Title: Ukraine after Maidan: Revisiting Domestic and Regional Security
Journal: Terrorism and Political Violence
Pages: 422-423
Issue: 2
Volume: 32
Year: 2020
Month: 2
X-DOI: 10.1080/09546553.2019.1710968
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1710968
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:2:p:422-423



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1710961_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: East German Intelligence and Ireland, 1949–90: Espionage, Terrorism and Diplomacy
Journal: Terrorism and Political Violence
Pages: 424-426
Issue: 2
Volume: 32
Year: 2020
Month: 2
X-DOI: 10.1080/09546553.2019.1710961
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1710961
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:2:p:424-426



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1710958_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Donald D. Denton
Author-X-Name-First: Donald D.
Author-X-Name-Last: Denton
Title: American Self-Radicalizing Terrorists and the Allure of “Jihadi Cool/Chic”
Journal: Terrorism and Political Violence
Pages: 427-429
Issue: 2
Volume: 32
Year: 2020
Month: 2
X-DOI: 10.1080/09546553.2019.1710958
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1710958
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:2:p:427-429



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1710965_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Thomas Klikauer
Author-X-Name-First: Thomas
Author-X-Name-Last: Klikauer
Title: Right-wing Terrorism in the 21st Century – The NSU
Journal: Terrorism and Political Violence
Pages: 430-433
Issue: 2
Volume: 32
Year: 2020
Month: 2
X-DOI: 10.1080/09546553.2019.1710965
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1710965
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:2:p:430-433



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1710959_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeffrey Kaplan
Author-X-Name-First: Jeffrey
Author-X-Name-Last: Kaplan
Title: Bring the War Home: The White Power Movement and Paramilitary America
Journal: Terrorism and Political Violence
Pages: 434-434
Issue: 2
Volume: 32
Year: 2020
Month: 2
X-DOI: 10.1080/09546553.2019.1710959
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1710959
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:2:p:434-434



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1710960_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kyle Burke
Author-X-Name-First: Kyle
Author-X-Name-Last: Burke
Title: Bring the War Home: The White Power Movement and Paramilitary America
Journal: Terrorism and Political Violence
Pages: 435-436
Issue: 2
Volume: 32
Year: 2020
Month: 2
X-DOI: 10.1080/09546553.2019.1710960
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1710960
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:2:p:435-436



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1710963_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Peacebuilding After Violent Conflict
Journal: Terrorism and Political Violence
Pages: 437-444
Issue: 2
Volume: 32
Year: 2020
Month: 2
X-DOI: 10.1080/09546553.2019.1710963
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1710963
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:2:p:437-444



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1710964_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nichola E. J. Rew
Author-X-Name-First: Nichola E. J.
Author-X-Name-Last: Rew
Title: Policing and Combatting Terrorism in Northern Ireland (The Royal Ulster Constabulary GC)
Journal: Terrorism and Political Violence
Pages: 445-447
Issue: 2
Volume: 32
Year: 2020
Month: 2
X-DOI: 10.1080/09546553.2019.1710964
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1710964
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:2:p:445-447

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1377075_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jason Fritz
Author-X-Name-First: Jason
Author-X-Name-Last: Fritz
Author-Name: Joseph K. Young
Author-X-Name-First: Joseph K.
Author-X-Name-Last: Young
Title: Transnational Volunteers: American Foreign Fighters Combating the Islamic State
Abstract: 
 Why do some people go abroad to engage in other people’s wars? Some studies attempt to discern why individuals choose to fight in distant lands (Malet, 2013) or seek to count how many do so (Hegghammer, 2013). The term foreign fighter has been used nearly exclusively in recent research to describe transnational fighters who join with Islamist organizations, or more generally for individuals fighting with resistance groups against a state. However, little research has been done on the many transnational fighters who travel to fight against resistance groups or against Islamist organizations. Our paper examines these transnational militants who battle against the Islamic State, focusing on Americans who engage in such activities, often referred to as volunteers. Through a review of open-source media, we created a dataset of these individuals, recording demographic data such as each individual’s military experience and stated purpose for becoming a transnational fighter. We show descriptive analyses on these data, and then compare these findings against current scholarship on Islamist transnational fighters. We argue that American volunteers and foreign terrorist fighters are phenomena with difference in degree, but not in kind.
Journal: Terrorism and Political Violence
Pages: 449-468
Issue: 3
Volume: 32
Year: 2020
Month: 4
X-DOI: 10.1080/09546553.2017.1377075
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1377075
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:3:p:449-468



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1378645_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Abdullah Bin Khaled Al-Saud
Author-X-Name-First: Abdullah
Author-X-Name-Last: Bin Khaled Al-Saud
Title: Deciphering IS’s Narrative and Activities in the Kingdom of Saudi Arabia
Abstract: 
 The self-proclaimed Islamic State (IS) has never ceased targeting, verbally and physically, the Kingdom of Saudi Arabia. While it might be easy to know why, it is harder, but more important, to understand how. Since Abu Bakr al-Baghdadi proclaimed the establishment of a wilaya (province) in the land of the two Holy Mosques in November 2014, thirty-two IS-linked terrorist operations took place in Saudi Arabia. Based on primary source materials produced by IS, and an examination of its footprint in Saudi Arabia, this article explains the calculus behind IS’s strategy and objectives in Saudi, shows the main themes of its narrative and how it tailors its strategic communications campaign to the specific historical and social context of the country, and illustrates how it tries to exploit and claim the Saudi religious heritage. The article also examines to what extent IS’s activities and operations reflect its rhetoric and purported strategy, describes the structure it adopts inside the Kingdom, and demonstrates why the momentum of its violent campaign has faltered in recent months.
Journal: Terrorism and Political Violence
Pages: 469-488
Issue: 3
Volume: 32
Year: 2020
Month: 4
X-DOI: 10.1080/09546553.2017.1378645
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1378645
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:3:p:469-488



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1383243_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dov H. Levin
Author-X-Name-First: Dov H.
Author-X-Name-Last: Levin
Title: Voting for Trouble? Partisan Electoral Interventions and Domestic Terrorism
Abstract: 
 What are the effects of partisan electoral interventions on terrorism in the intervened countries? Attempts by the great powers to affect the election results in other countries have been quite common in the postwar world with electoral interventions occurring in nearly one of every nine competitive elections between 1946 and 2000 as well as in the 2016 U.S. presidential election. However little research has been done on the possible effects such interventions can have on the target countries chances to suffer from domestic terrorism. In this paper I analyze the effects of electoral interventions on terrorism utilizing measures of domestic terrorism and of terrorist group emergence between 1970 and 2000 and 1968 and 2000 respectively. I find that while not all electoral interventions have terrorism inducing effects, overt interventions of this kind significantly increase the amount of domestic terrorism in the target as well as the probability of new domestic terrorist groups emerging
Journal: Terrorism and Political Violence
Pages: 489-505
Issue: 3
Volume: 32
Year: 2020
Month: 4
X-DOI: 10.1080/09546553.2017.1383243
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1383243
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:3:p:489-505



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1385457_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Leah Windsor
Author-X-Name-First: Leah
Author-X-Name-Last: Windsor
Title: The Language of Radicalization: Female Internet Recruitment to Participation in ISIS Activities
Abstract: 
 Why do young Muslim women radicalize and undertake high-risk political behaviors, and what factors influence their sociopolitical transformation? The process of radicalization happens because of individual, social, and political dynamics, and is facilitated by the availability of computer-mediated communication. Some young Muslim women keep detailed records of their radicalization process via social media, which we use to understand their sociopolitical transformation. By evaluating their language, we can better understand how their personal, social, and political development unfolds. This paper is a case study examining the words of one young Muslim woman, Aqsa Mahmood, who moved from her home in Scotland to join the ISIS fighters in Syria. Her Tumblr blog provides a linguistic, political, and ideological record of the process of her radicalization. We identify linguistic patterns in her blog posts that can help to develop and reveal a typology of the language of female radicalization.
Journal: Terrorism and Political Violence
Pages: 506-538
Issue: 3
Volume: 32
Year: 2020
Month: 4
X-DOI: 10.1080/09546553.2017.1385457
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1385457
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:3:p:506-538



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1388791_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michelle Butler
Author-X-Name-First: Michelle
Author-X-Name-Last: Butler
Title: Using Specialised Prison Units to Manage Violent Extremists: Lessons from Northern Ireland
Abstract: 
 The use of specialised prison units (SPUs) as a means of countering violent extremism and radicalisation is growing in popularity in many jurisdictions. Yet, little is known about their ability to prevent radicalisation in the long term, limit the spread of violent extremism, or promote de-radicalisation and disengagement. This paper begins to explore these issues by reflecting on the over 40 years of experience that Northern Ireland (NI) has had in this area. It is argued that the international community tends to have an incomplete understanding of: a) why SPUs were created and installed in NI; b) how their regime, conditions, and underlying rationale changed over time; and c) the long-term consequences that SPUs have had on the spread of violent extremism, de-radicalisation, and disengagement. This paper seeks to make an original contribution to this literature by highlighting the role psychological, situational, social, and political factors played in shaping the effectiveness of SPUs in NI. By providing a more in-depth analysis of why SPUs in NI entrenched extremism rather than promoted disengagement or de-radicalisation, other jurisdictions will be encouraged to reflect on how these factors may affect the success of their own SPUs in countering violent extremism.
Journal: Terrorism and Political Violence
Pages: 539-557
Issue: 3
Volume: 32
Year: 2020
Month: 4
X-DOI: 10.1080/09546553.2017.1388791
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1388791
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:3:p:539-557



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1388792_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dheeraj P. C.
Author-X-Name-First: Dheeraj
Author-X-Name-Last: P. C.
Title: India’s PSYWAR Against Islamic Terrorism: A Trident Strategy
Abstract: 
 Islamic terrorism in India has posed a formidable threat to India’s national security. A result of inimical state policies from India’s north-western borders as well as home-grown radicalisation, it has developed into a threat that demands a multi-faceted approach in order to be contained. Counterterrorism strategies to defeat the threat need reliance on psychological warfare in combination with offensive operations. This article, therefore, examines the current state of India’s strategic psychological operations against Islamic terrorism and prescribes a Trident Strategy for effective counterterrorist operations. On observation of the counterterrorist successes in Punjab, the Trident Strategy is composed of a strong political will, proactive action and propaganda machinery.
Journal: Terrorism and Political Violence
Pages: 558-581
Issue: 3
Volume: 32
Year: 2020
Month: 4
X-DOI: 10.1080/09546553.2017.1388792
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1388792
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:3:p:558-581



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1388793_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Clionadh Raleigh
Author-X-Name-First: Clionadh
Author-X-Name-Last: Raleigh
Author-Name: Roudabeh Kishi
Author-X-Name-First: Roudabeh
Author-X-Name-Last: Kishi
Title: Hired Guns: Using Pro-Government Militias for Political Competition
Abstract: 
 Pro-government militias (PGMs) are armed, political organizations that assist regime and state elites through illicit violence. This article considers how and where to situate militias within larger frameworks of political violence and its emerging contexts. Pro-government militias have increased in recent years, along with their participation in conflict events, including those resulting in fatalities. This is in step with increases in domestic political competition and regime fragmentation across developing states. Using a new PGM dataset that collects discrete events perpetrated by these groups across Africa from 1997–2016, two conclusions are reached: PGM groups are more active outside of civil war periods than within, and their actions and numbers have increased as more countries transition to democracy. Further, activity by PGMs is not well explained by government attempts to delegate violence for reputational reasons or low capacity. Political fragmentation at the national level and diffuse opposition threats better account for the spatial and temporal patterns of PGM activity.
Journal: Terrorism and Political Violence
Pages: 582-603
Issue: 3
Volume: 32
Year: 2020
Month: 4
X-DOI: 10.1080/09546553.2017.1388793
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1388793
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:3:p:582-603



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1389726_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mohammed M. Hafez
Author-X-Name-First: Mohammed M.
Author-X-Name-Last: Hafez
Title: Fratricidal Rebels: Ideological Extremity and Warring Factionalism in Civil Wars
Abstract: 
 Why do rebels kill each other? When confronting a formidable regime, rebels often descend into warring factionalism rather than forge unity across their ranks to reap the advantages of cooperation. This article tackles the puzzle of inter-rebel fratricide. It explores power and resource competition arguments, and contrasts them with ideological mechanisms that can drive inter-rebel violence. It argues that ideological extremity is central to rebel fratricide. Rebel organizations with common ideological origins can still compete with each other based on their degree of centrism and extremism, making them ideologically distant. This proximity-distance paradox makes their cohabitation mutually threatening. Ideological challengers from the same family tree are particularly threatening to one’s group cohesion, and if successful, guarantee one’s political marginalization within the broader movement. Extremist groups are likely to respond to these threats with fratricide, while ideologically centrist ones will rely on other strategies such as balancing, outbidding, or defecting to manage their rivalries. Algeria’s civil war, 1992–2002, is a plausibility probe case study that illustrates these causal mechanisms. The study contributes to a burgeoning literature on the role of ideology in armed civil conflicts.
Journal: Terrorism and Political Violence
Pages: 604-629
Issue: 3
Volume: 32
Year: 2020
Month: 4
X-DOI: 10.1080/09546553.2017.1389726
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1389726
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:3:p:604-629



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1393415_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Huseyn Aliyev
Author-X-Name-First: Huseyn
Author-X-Name-Last: Aliyev
Title: Pro-regime Militias and Civil War Duration
Abstract: 
 Research on civil war duration has tended to focus almost exclusively on governments and rebels as actors accounting for the longevity of armed conflicts. The impact of extra-dyad actors has thus far been absent from the analysis of factors contributing to civil war duration. This study contributes to both research on civil war duration and multi-actor models of intrastate conflicts by extending the analysis beyond the government-rebel dichotomy. With the focus on pro-regime militias, this article investigates whether the deployment of extra-dyad actors increases the duration of civil wars.Survival analysis models conducted on the sample of 250 civil war episodes between 1991 and 2015 reveal that participation of pro-regime militias in intrastate warfare has consistent association with the incidence of longer civil wars.
Journal: Terrorism and Political Violence
Pages: 630-650
Issue: 3
Volume: 32
Year: 2020
Month: 4
X-DOI: 10.1080/09546553.2017.1393415
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1393415
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:3:p:630-650



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1733339_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeffrey Kaplan
Author-X-Name-First: Jeffrey
Author-X-Name-Last: Kaplan
Title: Introduction to ‘The Prospects for the Death of Europe’
Journal: Terrorism and Political Violence
Pages: 651-653
Issue: 3
Volume: 32
Year: 2020
Month: 4
X-DOI: 10.1080/09546553.2020.1733339
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1733339
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:3:p:651-653



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1733341_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ivan Strenski
Author-X-Name-First: Ivan
Author-X-Name-Last: Strenski
Title: Prospects for the Death of Europe: Islam, Christianity, the Future Identity of Europe
Abstract: 
 A recent theme recurs in the writing of cultural critics, like journalist, Douglas Murray and the speculative novelists, such as Michel Houellebecq, author of Submission, and Jean Raspail, creator of the influential and controversial rightwing work, The Camp of the Saints. All agree that Europe finds itself poised on the brink of carelessly losing its distinctive identity. These authors concur in blaming a combination of cultural and social sources for Continent’s malaise. One the one side is the mass immigration of Muslims from conservative Islamic states and their resistance to integration into the European value mainstream. On the other side, European elites have been indifferent to and arguably complicit in Islamization, while the neglected population of traditionalist working class citizens have rebelled along racist and xenophobic lines. The alienation of the elites from the idea of Europe as a Christian civilization further feeds Europe’s crisis of confused identity. In response to these disturbing scenarios, the present author questions the assumption of a program of “saving a culture,” explores the comparative character of European national character versus the United States as immigrant nation. What are the difficulties of an actual re-Christianization, in light of European secularism, the obstacles to Tariq Ramadan’s European Islam? Are Muslim immigrants in Europe fated to remain an unassimilable entity?
Journal: Terrorism and Political Violence
Pages: 654-680
Issue: 3
Volume: 32
Year: 2020
Month: 4
X-DOI: 10.1080/09546553.2020.1733341
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1733341
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:3:p:654-680

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1747816_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Gender, War, and Conflict
Journal: Terrorism and Political Violence
Pages: 881-882
Issue: 4
Volume: 32
Year: 2020
Month: 05
X-DOI: 10.1080/09546553.2020.1747816
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1747816
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:4:p:881-882



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1747813_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Innovations and New Technology in Political Violence
Journal: Terrorism and Political Violence
Pages: 874-879
Issue: 4
Volume: 32
Year: 2020
Month: 05
X-DOI: 10.1080/09546553.2020.1747813
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1747813
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:4:p:874-879



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1747818_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Houssem Ben Lazreg
Author-X-Name-First: Houssem Ben
Author-X-Name-Last: Lazreg
Title: Western Foreign Fighters: The Threat to Homeland and International Security
Journal: Terrorism and Political Violence
Pages: 886-887
Issue: 4
Volume: 32
Year: 2020
Month: 05
X-DOI: 10.1080/09546553.2020.1747818
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1747818
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:4:p:886-887



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1747821_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ahmed M. Abozaid
Author-X-Name-First: Ahmed M.
Author-X-Name-Last: Abozaid
Title: Colonialism, Neo-Colonialism, and Anti-Terrorism Law in the Arab World
Journal: Terrorism and Political Violence
Pages: 890-894
Issue: 4
Volume: 32
Year: 2020
Month: 05
X-DOI: 10.1080/09546553.2020.1747821
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1747821
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:4:p:890-894



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1747822_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Juliana Geran Pilon
Author-X-Name-First: Juliana
Author-X-Name-Last: Geran Pilon
Title: Radicals, Revolutionaries, and Terrorists
Journal: Terrorism and Political Violence
Pages: 895-897
Issue: 4
Volume: 32
Year: 2020
Month: 05
X-DOI: 10.1080/09546553.2020.1747822
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1747822
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:4:p:895-897



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1398741_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Benjamin Isakhan
Author-X-Name-First: Benjamin
Author-X-Name-Last: Isakhan
Title: The Islamic State Attacks on Shia Holy Sites and the “Shrine Protection Narrative”: Threats to Sacred Space as a Mobilization Frame
Abstract: 
 After conquering large swaths of Syria and Iraq, the IS undertook an aggressive sectarian campaign in which they not only enacted horrific violence against the Shia people, but also damaged or destroyed several key Shia mosques and shrines. Drawing on Social Movement Theory (SMT), this article analyzes the response by various Shia non-state actors—militia leaders, religious clergymen, populist preachers, and seminal poets. It argues that they used the IS threat to Shia holy sites to develop and deploy a mobilization frame that has come to be referred to as the “shrine protection narrative.” The article also documents the manifold consequences of the shrine protection narrative: it underpinned a mass recruitment drive that saw tens of thousands enlist; it legitimized foreign Shia militias to enter the conflicts in both Syria and Iraq; it justified the formation of entirely new militias who declared the centrality of shrine protection to their mandate; and it mobilized them to enact political violence. In doing so, this article extends existing studies of SMT to demonstrate that “sacred spaces”—and particularly the need to protect religious sites from specific threats—can serve as a powerful mobilization frame towards political violence.
Journal: Terrorism and Political Violence
Pages: 724-748
Issue: 4
Volume: 32
Year: 2020
Month: 05
X-DOI: 10.1080/09546553.2017.1398741
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1398741
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:4:p:724-748



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1409212_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Pete Simi
Author-X-Name-First: Pete
Author-X-Name-Last: Simi
Author-Name: Steven Windisch
Author-X-Name-First: Steven
Author-X-Name-Last: Windisch
Title: Why Radicalization Fails: Barriers to Mass Casualty Terrorism
Abstract: 
 Few issues have garnered as much attention in recent years as the topic of violent extremism (VE). Although substantial attention has been devoted to investigating the radicalization process, few scholars have examined the obstacles that hinder VE radicalization. Based on in-depth life history interviews, the current study examines five types of barriers that hinder radicalization toward mass casualty violence (MCV): mass casualty violence as counter-productive; preference toward interpersonal violence, changes in focus and availability; internal organizational conflict; and moral apprehension. In general, we address each barrier’s unique contribution to hindering the likelihood of MCV. Finally, we discuss how our findings could be used as part of initiatives aimed at countering violent extremism (CVE).
Journal: Terrorism and Political Violence
Pages: 831-850
Issue: 4
Volume: 32
Year: 2020
Month: 05
X-DOI: 10.1080/09546553.2017.1409212
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1409212
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:4:p:831-850



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1415889_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joel David Taylor
Author-X-Name-First: Joel David
Author-X-Name-Last: Taylor
Title: ‘Suspect Categories,’ Alienation and Counterterrorism: Critically Assessing PREVENT in the UK
Abstract: 
 The ‘suspect community’ thesis has been a primary tool for exploring counter-terrorism strategies like the UK’s PREVENT and their effect on communities. However, in seeking to shed light on the differentialist, complex nature of modern counter-terrorism, it was recently redesigned by Ragazzi as the ‘suspect category’ thesis. This article engages with this thesis’ concept of distinguished ‘risky’ and ‘trusted’ suspect categories defining PREVENT’s counter-terrorism engagement with Muslim communities. With the author’s own reservations about this thesis, this article also explores this important concept to critically assess PREVENT as a counter-terrorism strategy. Principally, it provides an exploration of PREVENT’s construction of risky and trusted suspect categories and their potential for fostering alienation, as well as a reflection on the effects of alienation on counter-terrorism. These discussions prove that PREVENT fosters alienation that is detrimental to counter-terrorism efforts. Damaging constructions as such not only make PREVENT redundant, but are also emblematic of Jackson’s theory of the epistemological crisis of counter-terrorism, as this article will discuss. Recommendations regarding rethinking the conceptual basis for PREVENT will be also made with a specific emphasis on addressing the epistemological crisis of counter-terrorism.
Journal: Terrorism and Political Violence
Pages: 851-873
Issue: 4
Volume: 32
Year: 2020
Month: 05
X-DOI: 10.1080/09546553.2017.1415889
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1415889
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:4:p:851-873



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1747823_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jesse J. Norris
Author-X-Name-First: Jesse J.
Author-X-Name-Last: Norris
Title: Policing Terrorism: Research Studies into Police Counterterrorism Investigations
Journal: Terrorism and Political Violence
Pages: 898-899
Issue: 4
Volume: 32
Year: 2020
Month: 05
X-DOI: 10.1080/09546553.2020.1747823
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1747823
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:4:p:898-899



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1747815_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Donald D. Denton
Author-X-Name-First: Donald D.
Author-X-Name-Last: Denton
Title: Massacre in Norway: The 2011 Terror Attacks on Oslo & the Utoya Youth Camp
Journal: Terrorism and Political Violence
Pages: 880-880
Issue: 4
Volume: 32
Year: 2020
Month: 05
X-DOI: 10.1080/09546553.2020.1747815
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1747815
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:4:p:880-880



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1404457_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Wesley S. McCann
Author-X-Name-First: Wesley S.
Author-X-Name-Last: McCann
Author-Name: Nicholas Pimley
Author-X-Name-First: Nicholas
Author-X-Name-Last: Pimley
Title: Mixed Mandates: Issues Concerning Organizational and Statutory Definitions of Terrorism in the United States
Abstract: 
 Defining terrorism continues to be a problematic task for scholars, politicians, and government officials. Research has shown that developing a single definition of terrorism is not only unlikely, but also quite difficult. Definitions of terrorism can arguably be influenced by cultural, social, and political factors. This study qualitatively examines state criminal law and federal organizational definitions of terrorism to discern what elements are commonly seen across such definitions. Furthermore, this article examines what issues arise due to the differences and similarities between and across these groups of definitions. This study finds that organizational definitions are seemingly tied to institution mission or mandate, whereas state definitions are sporadic, lacking consensus, and are evidently influenced by major events such as the September 11 attacks. Across organizational and state definitions of terrorism, “violence,” “fear, terror,” and “target” were the most common elements included. However, other definitional elements exhibited different trends when comparing organizational and state definitions of terrorism. Overall, defining terrorism will continue to be a problem in all arenas as long as the definition is allowed to change due to external factors or influences.
Journal: Terrorism and Political Violence
Pages: 807-830
Issue: 4
Volume: 32
Year: 2020
Month: 05
X-DOI: 10.1080/09546553.2017.1404457
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1404457
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:4:p:807-830



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1404456_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Oldrich Bures
Author-X-Name-First: Oldrich
Author-X-Name-Last: Bures
Title: EU’s Response to Foreign Fighters: New Threat, Old Challenges?
Abstract: 
 The conflicts in Syria and Iraq have put foreign fighters—individuals travelling from other countries to engage in these conflicts—high on the security agenda at both the national and EU level. Drawing on theoretical arguments previously advanced to explain the haphazard evolution of the EU’s counterterrorism efforts after September 11, 2011, this articles discusses the emergence and persistence of key challenges that have hampered the EU response to security threats posed by 5,000 European foreign fighters between 2013 and early 2017. These include the absence of a common EU-level definition; the differences regarding the scope and perceptions of the threats posed to individual Member States; the lack of consensus on root causes of terrorism and radicalization; and the differences among Member States when it comes to addressing the difficulties of criminal prosecution of foreign fighters.
Journal: Terrorism and Political Violence
Pages: 789-806
Issue: 4
Volume: 32
Year: 2020
Month: 05
X-DOI: 10.1080/09546553.2017.1404456
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1404456
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:4:p:789-806



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1404455_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kevin D. Haggerty
Author-X-Name-First: Kevin D.
Author-X-Name-Last: Haggerty
Author-Name: Sandra M. Bucerius
Author-X-Name-First: Sandra M.
Author-X-Name-Last: Bucerius
Title: Radicalization as Martialization: Towards a Better Appreciation for the Progression to Violence
Abstract: 
 The process whereby individual terrorists radicalize into violent extremism is typically understood as involving a series of individual mechanisms (e.g., grievance, attachment to friends, thrill), group processes (e.g., competition, social cohesion), and mass-public mechanisms. In this article, we demonstrate that this process is actually better understood as one of “martialization,” applicable to varying degrees to conventional and unconventional soldiers alike. We detail these commonalties via an analysis of six key themes in the literature: a) a sense of vicarious injustice, b) a sense of belonging/identity, c) meaning, excitement, and glory, d) active recruitment, e) indoctrination, and f) group solidarity. Lastly, we suggest why scholars have previously been blind to these parallels. By not recognizing the similarities, we are missing out on the opportunity to mobilize our entire existing knowledge base (on conventional and unconventional soldiers) for creating useful policies for countering violent extremism.
Journal: Terrorism and Political Violence
Pages: 768-788
Issue: 4
Volume: 32
Year: 2020
Month: 05
X-DOI: 10.1080/09546553.2017.1404455
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1404455
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:4:p:768-788



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1747817_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Raphael Cohen-Almagor
Author-X-Name-First: Raphael
Author-X-Name-Last: Cohen-Almagor
Title: The Angel: The Egyptian Spy Who Saved Israel
Journal: Terrorism and Political Violence
Pages: 883-885
Issue: 4
Volume: 32
Year: 2020
Month: 05
X-DOI: 10.1080/09546553.2020.1747817
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1747817
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:4:p:883-885



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1400431_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Wisdom Oghosa Iyekekpolo
Author-X-Name-First: Wisdom Oghosa
Author-X-Name-Last: Iyekekpolo
Title: Political Elites and the Rise of the Boko Haram Insurgency in Nigeria
Abstract: 
 What is the cause of Boko Haram insurgency in Nigeria? Studies on Boko Haram insurgency onset has largely emphasized economic poverty, religious ideology, and the historical north-south identity fractionalization. Some others which focus on Nigerian politics as the cause of the insurgency have largely analyzed how corrupt politicians have caused economic poverty and inequality which have resulted in grievances in northern Nigeria. While these studies have made invaluable contributions to the literature, this study begs to deviate from their emphasis by showing how political elites have mobilized and given political relevance to the Boko Haram group. This study specifically investigates the cause of the insurgency by adopting the state-centered approach which argues that insurgencies are caused by structural vulnerabilities in certain kind of states. In doing this, this study advances the following four propositions. Firstly, when factions of political elites compete for political power at the national level on identity basis, identity groups emerge at the subnational level in defense of these identities. Secondly, identity groups gain political relevance when factions of the political elites ascribe such relevance to them in the process of competing for political power. Thirdly, when a fundamentalist identity group becomes political relevant, it makes fundamental demands which spark antagonism between it and the political elites. Finally, insurgencies based on fundamentalist identity claims go unchecked in a partial democracy with political elites factionalized along identity lines.
Journal: Terrorism and Political Violence
Pages: 749-767
Issue: 4
Volume: 32
Year: 2020
Month: 05
X-DOI: 10.1080/09546553.2017.1400431
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1400431
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:4:p:749-767



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1397515_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: James A. Piazza
Author-X-Name-First: James A.
Author-X-Name-Last: Piazza
Author-Name: Scott Piazza
Author-X-Name-First: Scott
Author-X-Name-Last: Piazza
Title: Crime Pays: Terrorist Group Engagement in Crime and Survival
Abstract: 
 What impact does engagement in crime have on terrorist group survival? In theory criminal activity may decrease group survival by damaging group legitimacy or prompting government crackdowns. Conversely, crime might boost group survival by facilitating access to revenues or by further taxing state policing capacity. Moreover, different types of crime might have different effects. We investigate the impact of crime on terrorist group survival using cross-sectional data on 578 terrorist groups observed between 1970 and 2007. We find that engagement in crime reduces a group’s chance of demise by around 50% and extends its lifespan by around 7 years on average. Terrorist groups involved in narcotics are less likely to end by police or military force, but are also less likely to win political concessions. We find that groups involved in extortion live the longest and are also less likely to end by force or by splintering.
Journal: Terrorism and Political Violence
Pages: 701-723
Issue: 4
Volume: 32
Year: 2020
Month: 05
X-DOI: 10.1080/09546553.2017.1397515
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1397515
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:4:p:701-723



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1393416_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dogukan Cansin Karakus
Author-X-Name-First: Dogukan Cansin
Author-X-Name-Last: Karakus
Author-Name: Isak Svensson
Author-X-Name-First: Isak
Author-X-Name-Last: Svensson
Title: Between the Bombs: Exploring Partial Ceasefires in the Syrian Civil War, 2011–2017
Abstract: 
 Previous research on ceasefires in armed conflicts has primarily focused on the aggregated country-level of analysis. By contrast, this article contributes by examining the local-level dynamics of local ceasefire arrangements. In particular, this study examines a novel set of 106 local-level ceasefire arrangements in the Syrian Civil War, reached between the years 2011 to 2017. Most (72 percent), but not all, of the ceasefire arrangements were respected during the stipulated time period. We argue that informal and domestic peacemaking should outperform formal and external approaches in managing conflicts with multiple rebel groups, ongoing violence, and different fronts such as in Syria. We find that the presence of insider mediators (“insider-partial”) as well as confidence-building measures between the belligerents are positively associated with successful ceasefire arrangements, whereas explanations emphasized by previous research—external third-party mediation as well as various indicators of quality of agreement—fail to explain outcomes of ceasefires. Yet, we also find some evidence indicative of a selection effect in that external mediators are associated with more difficult conflict situations. The study of local ceasefires in the Syrian Civil War can stimulate further examinations of the micro-dynamics of peacemaking in civil wars, including the causes and consequences of local ceasefires.
Journal: Terrorism and Political Violence
Pages: 681-700
Issue: 4
Volume: 32
Year: 2020
Month: 05
X-DOI: 10.1080/09546553.2017.1393416
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1393416
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:4:p:681-700



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1747820_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Amélie Godefroidt
Author-X-Name-First: Amélie
Author-X-Name-Last: Godefroidt
Title: Trust and Terror: Social Capital and the Use of Terrorism as a Tool of Resistance
Journal: Terrorism and Political Violence
Pages: 888-889
Issue: 4
Volume: 32
Year: 2020
Month: 05
X-DOI: 10.1080/09546553.2020.1747820
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1747820
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:4:p:888-889

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1415890_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Or Honig
Author-X-Name-First: Or
Author-X-Name-Last: Honig
Author-Name: Ido Yahel
Author-X-Name-First: Ido
Author-X-Name-Last: Yahel
Title: Entity-Elimination or Threat Management? Explaining Israel’s Shifting Policies Towards Terrorist Semi-States
Abstract: 
 Israel’s policy towards both terrorist semi-states (TSS)—Fatahland and Hamas-controlled Gaza—shows a puzzling variation over time between threat-management (i.e., deterrence and/or brute force capacity-reduction) and entity-elimination. We hold that a military-based cost-benefit analysis cannot fully account for this variation. This explanation predicts that Israel would avoid the costly and risky TSS-elimination as long as Israel can effectively manage the military danger through the much cheaper deterrence/periodical capacity reduction or when there is a high risk of not getting a much better option partly due to the danger of creating a power-vacuum into which other terrorists may reenter. Yet, some Israeli Prime Ministers pursued TSS-elimination notwithstanding the vacuum consideration and deterrence working. By adding a non-military variable—the extent to which Israel’s policy-makers believe that the TSS harms their ideologically-preferred foreign policy goals—we can better reconstruct changes in threat perception and hence better explain policy variation. The TSSs became an intolerable danger only when non-military threats were involved. Israel was willing to tolerate TSSs when the Prime Minister believed they did not pose a political/ideological threat but sought to eliminate them when he thought they did, if there seemed to be a feasible alternative.
Journal: Terrorism and Political Violence
Pages: 901-920
Issue: 5
Volume: 32
Year: 2020
Month: 07
X-DOI: 10.1080/09546553.2017.1415890
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1415890
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:5:p:901-920



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1418334_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ida Rudolfsen
Author-X-Name-First: Ida
Author-X-Name-Last: Rudolfsen
Title: Food Insecurity and Domestic Instability: A Review of the Literature
Abstract: 
 Research on the relationship between food insecurity and unrest has a long history. The food price spikes in 2007–2008 and 2010–2011 coincided with demonstrations and incidents of large-scale violence, prompting renewed scholarly interest in the link between food insecurity and unrest. This paper reviews the literature, synthesises its main empirical findings and central explanations, and identifies four particular issues to consider to enhance our understanding of how food insecurity is related to unrest. First, there is a wide range of suggested theoretical mechanisms of how food insecurity is linked to unrest, but the empirical tests are akin. Second, there exist various notions of the independent variable, but there is a gap between the theoretical definition and measurement. Third, the focus is often on “food riots”, but whether rioting is the most likely response, and whether it is possible to separate between “food-related” unrest and other types of turmoil is unclear. Lastly, there is a challenge to address the endogenous nature of food insecurity and unrest. The paper adds to the literature by pointing to the theoretical mechanisms linking food insecurity to unrest, relating both to the type and degree of food insecurity, and how we understand and define unrest.
Journal: Terrorism and Political Violence
Pages: 921-948
Issue: 5
Volume: 32
Year: 2020
Month: 07
X-DOI: 10.1080/09546553.2017.1418334
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1418334
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:5:p:921-948



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1419193_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ioana Emy Matesan
Author-X-Name-First: Ioana Emy
Author-X-Name-Last: Matesan
Title: Organizational Dynamics, Public Condemnation and the Impetus to Disengage from Violence
Abstract: 
 This article examines under what conditions armed Islamist groups intentionally demilitarize and de-legitimize violence, and under what conditions they deprioritize violence temporarily. The central argument is that the decision to de-escalate is driven by the interaction between political context, organizational dynamics and public attitudes. When violence becomes costly and non-violent alternatives are available, groups have incentives to pause armed action, but they do not necessarily feel the pressure to change their ideological tenets or permanently renounce military capabilities. However, when organizational weakness reaches a point of crisis, and when the public explicitly condemns groups, leaders are faced with a sink or swim scenario that forces them to reconsider the role of armed action and the very mission of the group. The ability of leaders to impose any changes in the behavior, ideology or organizational structure depends on the cohesion of the organization. Internal fragmentation can lead to behavioral escalation, but it can also eliminate the most hardline elements from a group, which facilitates organizational transformations from the top. The empirical discussion traces the complete demilitarization and renouncement of violence within the Egyptian Gama’a Islamiyah, and the more hesitant deprioritization of violence within the Indonesian Jama’a Islamiyah.
Journal: Terrorism and Political Violence
Pages: 949-969
Issue: 5
Volume: 32
Year: 2020
Month: 07
X-DOI: 10.1080/09546553.2017.1419193
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1419193
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:5:p:949-969



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1419194_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ian M. Hartshorn
Author-X-Name-First: Ian M.
Author-X-Name-Last: Hartshorn
Author-Name: Stacey Philbrick Yadav
Author-X-Name-First: Stacey
Author-X-Name-Last: Philbrick Yadav
Title: (Re)Constituting Community: Takfir and Institutional Design in Tunisia and Yemen
Abstract: 
 As a speech act, takfir—the allegation of a Muslim’s apostasy—may insinuate violence in a way that can delimit the boundaries of political, as well as religious, community. Yet the use of takfir also incurs costs in plural political environments. Those who engage in it do not always see the dividends they may imagine. This article compares public acts of takfir at critical moments in Tunisia and Yemen to argue that the weight of this particular idiom is not universal, but is a function of the specific linguistic field in which it is employed as well as the historical juncture in which it takes place. Takfir both shapes and reflects the power relations between rival factions. As an informal discourse that occurs largely outside of formal state institutions, it nonetheless leaves a clear imprint on those institutions, particularly in moments of political transition when the contours of new constitutional arrangements are negotiated. Relying on ethnographic and interview-based field research from both Tunisia and Yemen, the context-specific arguments advanced here challenge the universalist prescriptions that underwrite policy efforts to engage in “counter-takfir” as a means of combatting excommunicative discourse.
Journal: Terrorism and Political Violence
Pages: 970-987
Issue: 5
Volume: 32
Year: 2020
Month: 07
X-DOI: 10.1080/09546553.2017.1419194
File-URL: http://hdl.handle.net/10.1080/09546553.2017.1419194
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:5:p:970-987



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1425207_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Stelios Markoulis
Author-X-Name-First: Stelios
Author-X-Name-Last: Markoulis
Author-Name: Savvas Katsikides
Author-X-Name-First: Savvas
Author-X-Name-Last: Katsikides
Title: The Effect of Terrorism on Stock Markets: Evidence from the 21st Century
Abstract: 
 This paper examines the relationship between terrorist attacks and stock market performance, by employing the “event-study” methodology to examine eleven major terrorist attacks that occurred in the 21st century. Results suggest that earlier events appear to result in higher negative abnormal returns when compared to more recent ones. Where evident, these abnormal returns seem to persist beyond the date of the event, but tend to disappear rather quickly. Some events appear to exhibit a “spill-over” effect influencing international stock markets too. Our most important finding is that recent events do not seem to influence local or international markets, thus suggesting that investors have learnt to better assess terror events and react more calmly to them.
Journal: Terrorism and Political Violence
Pages: 988-1010
Issue: 5
Volume: 32
Year: 2020
Month: 07
X-DOI: 10.1080/09546553.2018.1425207
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1425207
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:5:p:988-1010



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1439023_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bart Schuurman
Author-X-Name-First: Bart
Author-X-Name-Last: Schuurman
Title: Research on Terrorism, 2007–2016: A Review of Data, Methods, and Authorship
Abstract: 
 Research on terrorism has long been criticized for its inability to overcome enduring methodological issues. These include an overreliance on secondary sources and the associated literature review methodology, a scarcity of statistical analyses, a tendency for authors to work alone rather than collaborate with colleagues, and the large number of one-time contributors to the field. However, the reviews that have brought these issues to light describe the field as it developed until 2007. This article investigates to what extent these issues have endured in the 2007–2016 period by constructing a database on all of the articles published in nine leading journals on terrorism (N = 3442). The results show that the use of primary data has increased considerably and is continuing to do so. Scholars have also begun to adapt a wider variety of data-gathering techniques, greatly diminishing the overreliance on literature reviews that was noted from the 1980s through to the early 2000s. These positive changes should not obscure enduring issues. Despite improvements, most scholars continue to work alone and most authors are one-time contributors. Overall, however, the field of terrorism studies appears to have made considerable steps towards addressing long-standing issues.
Journal: Terrorism and Political Violence
Pages: 1011-1026
Issue: 5
Volume: 32
Year: 2020
Month: 07
X-DOI: 10.1080/09546553.2018.1439023
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1439023
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:5:p:1011-1026



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1442328_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jaume Castan Pinos
Author-X-Name-First: Jaume
Author-X-Name-Last: Castan Pinos
Author-Name: Steven M. Radil
Author-X-Name-First: Steven
Author-X-Name-Last: M. Radil
Title: The Territorial Contours of Terrorism: A Conceptual Model of Territory for Non-state Violence
Abstract: 
 Our article challenges a common discourse that terrorist groups are relatively disinterested in territory by exploring emerging theories about territory and territoriality. We use these theories to introduce a new conceptual model of the importance of territory for terrorism that contrasts a group’s Sovereignty Claims over Territory (SCOT), which corresponds with the ultimate territorial aims of the group, with its Effective Control of Territory (ECOT), which relates to the ability of an organization to exert influence over a particular territory. Contrasting these dimensions of territory allows us to develop several archetypes of territorially-motivated terrorism. Our model predicts that, in contrast to common deterritorial discourses, truly non-territorial terrorism is likely to be quite rare as most groups engaged in violence have territorial ambitions in one way or another. We then use our model to interrogate the salience of territory to three representative cases: the Islamic State, ETA, and FARC-EP. Our analysis shows that territory remains a central motivating factor for these groups as their overall territorial aims tend to remain constant whereas their ability to control territory is more susceptible to change. We conclude by discussing the implications of our model and analysis for future research.

Journal: Terrorism and Political Violence
Pages: 1027-1046
Issue: 5
Volume: 32
Year: 2020
Month: 07
X-DOI: 10.1080/09546553.2018.1442328
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1442328
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:5:p:1027-1046



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1442329_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Atte Oksanen
Author-X-Name-First: Atte
Author-X-Name-Last: Oksanen
Author-Name: Markus Kaakinen
Author-X-Name-First: Markus
Author-X-Name-Last: Kaakinen
Author-Name: Jaana Minkkinen
Author-X-Name-First: Jaana
Author-X-Name-Last: Minkkinen
Author-Name: Pekka Räsänen
Author-X-Name-First: Pekka
Author-X-Name-Last: Räsänen
Author-Name: Bernard Enjolras
Author-X-Name-First: Bernard
Author-X-Name-Last: Enjolras
Author-Name: Kari Steen-Johnsen
Author-X-Name-First: Kari
Author-X-Name-Last: Steen-Johnsen
Title: Perceived Societal Fear and Cyberhate after the November 2015 Paris Terrorist Attacks
Abstract: 
 Fear is one of the negative outcomes of terrorist attacks. Currently, there is a need to understand how societal fear and fear of terrorism might be shaped and induced by social-media discussions. This study analyzed how exposure to cyberhate was associated with perceived societal fear after the November 2015 Paris terrorist attacks. Demographically balanced data sets were collected from France, Spain, Finland, Norway, and the United States four weeks after the attacks. Cyberhate exposure was associated with higher perceived societal fear in all countries studied even when adjusting for confounding factors. This was particularly evident in the case of cyberhate related to terrorism. Hateful online communication after disruptive events may contribute to a social climate of fear and escalate societal uncertainty. There are, however, indications that social trust may bolster against perceived societal fear, hence enhancing resilience.
Journal: Terrorism and Political Violence
Pages: 1047-1066
Issue: 5
Volume: 32
Year: 2020
Month: 07
X-DOI: 10.1080/09546553.2018.1442329
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1442329
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:5:p:1047-1066



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1442330_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael A. Jensen
Author-X-Name-First: Michael A.
Author-X-Name-Last: Jensen
Author-Name: Anita Atwell Seate
Author-X-Name-First: Anita
Author-X-Name-Last: Atwell Seate
Author-Name: Patrick A. James
Author-X-Name-First: Patrick A.
Author-X-Name-Last: James
Title: Radicalization to Violence: A Pathway Approach to Studying Extremism
Abstract: 
 Prior research on extremism has identified a host of psychological, emotional, material, and group-based mechanisms that are potentially important drivers of individual radicalization. However, taken on their own, none of these factors have been shown to lead to extremist behaviors. Instead, radicalization is best understood as a set of complex causal processes in which multiple factors work together to produce extremist outcomes. This paper builds on prior research by showing how radicalization mechanisms drawn from five prominent research traditions combine to form multiple sufficient pathways to extremist violence. We identify these pathways by applying fuzzy-set/Qualitative Comparative Analysis (fs/QCA) to a sample of life-course narratives that includes violent and nonviolent extremists in the United States. We find that both a sense of community victimization and a fundamental shift in individuals’ cognitive frames are present in all pathways and act as necessary conditions for radicalization to violence. These conditions combine with a set of psychological, emotional, group, and material variables to produce eight pathways that are sufficient for explaining violent outcomes. Of these, the pathways that combine psychological rewards and group biases account for the radicalization processes of the majority of the cases in our sample.
Journal: Terrorism and Political Violence
Pages: 1067-1090
Issue: 5
Volume: 32
Year: 2020
Month: 07
X-DOI: 10.1080/09546553.2018.1442330
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1442330
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:5:p:1067-1090



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1520702_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mark Youngman
Author-X-Name-First: Mark
Author-X-Name-Last: Youngman
Title: Building “Terrorism Studies” as an Interdisciplinary Space: Addressing Recurring Issues in the Study of Terrorism
Abstract: 
 Over the years, there have been many debates regarding the state of research into terrorism and whether “terrorism studies” constitutes an academic discipline in its own right. Such reflections, coupled with the natural evolution of what is still a relatively new area of research, have arguably led to significant improvements in quality and rigour. At the same time, the status of terrorism studies itself remains somewhat ambiguous: it is both discussed as a distinct field and simultaneously evades criticism by pointing to the difficulties of defining its boundaries. There are undoubtedly a number of advantages to forming a separate discipline, which would go some way to helping the field address some of the recurring problems that terrorism research faces. However, this article ultimately argues that scholars are better served by deliberately moving in the other direction and developing the field as a space for interdisciplinary engagement.
Journal: Terrorism and Political Violence
Pages: 1091-1105
Issue: 5
Volume: 32
Year: 2020
Month: 07
X-DOI: 10.1080/09546553.2018.1520702
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1520702
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:5:p:1091-1105



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1776984_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Militant and Terrorist Ideology, Meaning, and Radicalization
Journal: Terrorism and Political Violence
Pages: 1106-1112
Issue: 5
Volume: 32
Year: 2020
Month: 07
X-DOI: 10.1080/09546553.2020.1776984
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1776984
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:5:p:1106-1112



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1776986_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: János Besenyő
Author-X-Name-First: János
Author-X-Name-Last: Besenyő
Title: The Biafran Army 1967-70. Build-Up and Downfall of the Secessionist Military
Journal: Terrorism and Political Violence
Pages: 1113-1114
Issue: 5
Volume: 32
Year: 2020
Month: 07
X-DOI: 10.1080/09546553.2020.1776986
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1776986
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:5:p:1113-1114



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1776987_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Thomas Klikauer
Author-X-Name-First: Thomas
Author-X-Name-Last: Klikauer
Title: Going Dark - The Secret Social Lives of Extremists
Journal: Terrorism and Political Violence
Pages: 1115-1118
Issue: 5
Volume: 32
Year: 2020
Month: 07
X-DOI: 10.1080/09546553.2020.1776987
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1776987
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:5:p:1115-1118



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1776988_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Donald D. Denton
Author-X-Name-First: Donald D.
Author-X-Name-Last: Denton
Title: Boko Haram: The History of an African Jihadist Movement
Journal: Terrorism and Political Violence
Pages: 1119-1120
Issue: 5
Volume: 32
Year: 2020
Month: 07
X-DOI: 10.1080/09546553.2020.1776988
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1776988
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:5:p:1119-1120



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1776989_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel Milton
Author-X-Name-First: Daniel
Author-X-Name-Last: Milton
Title: The ISIS Reader: Milestone Texts of the Islamic State Movement
Journal: Terrorism and Political Violence
Pages: 1121-1122
Issue: 5
Volume: 32
Year: 2020
Month: 07
X-DOI: 10.1080/09546553.2020.1776989
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1776989
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:5:p:1121-1122



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1776991_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alisa Stack
Author-X-Name-First: Alisa
Author-X-Name-Last: Stack
Title: Insurgent Women/ Female Fighters
Journal: Terrorism and Political Violence
Pages: 1123-1125
Issue: 5
Volume: 32
Year: 2020
Month: 07
X-DOI: 10.1080/09546553.2020.1776991
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1776991
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:5:p:1123-1125



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1776992_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Barbara Ann Chotiner
Author-X-Name-First: Barbara Ann
Author-X-Name-Last: Chotiner
Title: The Return of the Russian Leviathan
Journal: Terrorism and Political Violence
Pages: 1126-1127
Issue: 5
Volume: 32
Year: 2020
Month: 07
X-DOI: 10.1080/09546553.2020.1776992
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1776992
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:5:p:1126-1127



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1776994_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Homegrown Terrorism and Responses in Europe
Journal: Terrorism and Political Violence
Pages: 1128-1132
Issue: 5
Volume: 32
Year: 2020
Month: 07
X-DOI: 10.1080/09546553.2020.1776994
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1776994
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:5:p:1128-1132



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1776996_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kyle Burke
Author-X-Name-First: Kyle
Author-X-Name-Last: Burke
Title: To Catch a Spy: The Art of Counterintelligence
Journal: Terrorism and Political Violence
Pages: 1133-1134
Issue: 5
Volume: 32
Year: 2020
Month: 07
X-DOI: 10.1080/09546553.2020.1776996
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1776996
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:5:p:1133-1134



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1776998_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marsha R. Robinson
Author-X-Name-First: Marsha R.
Author-X-Name-Last: Robinson
Title: The Caliphate at War: Operational Realities and Innovations of the Islamic State
Journal: Terrorism and Political Violence
Pages: 1135-1137
Issue: 5
Volume: 32
Year: 2020
Month: 07
X-DOI: 10.1080/09546553.2020.1776998
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1776998
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:5:p:1135-1137



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1777001_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dipak K. Gupta
Author-X-Name-First: Dipak K.
Author-X-Name-Last: Gupta
Title: Islam, Authoritarianism, and Underdevelopment
Journal: Terrorism and Political Violence
Pages: 1138-1139
Issue: 5
Volume: 32
Year: 2020
Month: 07
X-DOI: 10.1080/09546553.2020.1777001
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1777001
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:5:p:1138-1139

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1442331_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gali Perry
Author-X-Name-First: Gali
Author-X-Name-Last: Perry
Author-Name: Badi Hasisi
Author-X-Name-First: Badi
Author-X-Name-Last: Hasisi
Title: Closing the Gap: Promoting Suspect Communities’ Cooperation with Airport Security
Abstract: 
 In the aftermath of 9/11, aviation security has become a central component of counterterrorism. To mitigate threats whilst maintaining flight schedules, airport security officers require the cooperation of all passengers, but especially of ethnic minorities perceived as posing a potential threat to homeland security, often referred to as “suspect communities.” Passengers from suspect communities are subject to rigorous screening, but are also regarded as a source of information, making their cooperation even more important than that of other passengers. Nevertheless, suspect communities’ cooperation with airport security, and the gap between their attitudes and those of other passengers, have not yet been examined. The current study utilizes a survey of 1970 passengers at the Ben-Gurion airport in Israel, examining passengers’ perceptions of airport security and their willingness to cooperate. We find that passengers belonging to the suspect community of Israeli Muslims were less willing to cooperate with security procedures than all other passengers. However, when controlling for passengers’ perceptions of legitimacy and procedural justice, Israeli Muslims were more willing to cooperate with airport security than Israeli Jews. The findings highlight the importance of legitimacy and procedural justice perceptions in obtaining the cooperation of suspect communities, and suggest practical pathways for improving cooperation.
Journal: Terrorism and Political Violence
Pages: 1141-1160
Issue: 6
Volume: 32
Year: 2020
Month: 08
X-DOI: 10.1080/09546553.2018.1442331
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1442331
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:6:p:1141-1160



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1453502_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeremy Pressman
Author-X-Name-First: Jeremy
Author-X-Name-Last: Pressman
Title: Horizontal Inequality and Violent Unrest in Jerusalem
Abstract: 
 In 2014 and then again in 2015-16 in Jerusalem, some Palestinians attacked Israelis and others, including through stabbings and vehicular attacks. A case study of Israeli rule of Palestinians in Jerusalem highlights the causal role of horizontal inequality or inter-group disparities in cultural, economic, political, and social realms. Palestinians are shortchanged in each realm, and this helps fuel the violence in the city. The case also adds further nuance to some of the supporting arguments put forward by scholars in the horizontal inequality tradition. Miodownik & Nir’s focus on perceptions suggests the possibility of a gap between reality and perceptions, but in East Jerusalem, Israeli policy and Palestinian perceptions appear in synch. The spontaneous grassroots violence with only limited organizational support contrasts with other cases where violence was the result of the interaction between elites influenced by political inequality and masses motivated by economic inequality. Lastly, Stewart’s policy recommendation of more aid to reduce economic inequality assumes that the rulers will provide more aid or allow others to do so. In East Jerusalem, Israel has not provided sufficient resources but also has blocked the most likely substitute, the Palestinian Authority, from freely operating in East Jerusalem.

Journal: Terrorism and Political Violence
Pages: 1161-1185
Issue: 6
Volume: 32
Year: 2020
Month: 08
X-DOI: 10.1080/09546553.2018.1453502
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1453502
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:6:p:1161-1185



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1454316_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard Philippe Chelin
Author-X-Name-First: Richard Philippe
Author-X-Name-Last: Chelin
Title: From the Islamic State of Algeria to the Economic Caliphate of the Sahel: The Transformation of Al Qaeda in the Islamic Maghreb
Abstract: 
 Al Qaeda in the Islamic Maghreb (AQIM) appeared on the Algerian landscape in 2007 after the merger between Al Qaeda and the GSPC, with the objective of expanding its existing network in North Africa and the Sahel region. Pressure from security forces in Algeria propelled the group to seek refuge in Mali, where the 2012 conflict provided a safe haven for the group. Opération Serval, launched by the French military in 2013, dealt a severe setback to AQIM, as many of its fighters were killed and others dispersed to other parts of the region. From that period onwards, there has been a reduction in terror attacks and bombings until recently. Yet, an increase in kidnapping of foreigners for ransom coupled with drug trafficking signalled a transformation in the modus operandi of the group. To understand this trend, the article applies the crime-terror paradigm in order to assess the evolution of AQIM from a terror group with political and religious intentions into a group engaged in criminal activities with economic motivations. The article finds that AQIM is a hybrid entity that displays both terrorist and criminal motivations which are determined by the context within which the group finds itself.
Journal: Terrorism and Political Violence
Pages: 1186-1205
Issue: 6
Volume: 32
Year: 2020
Month: 08
X-DOI: 10.1080/09546553.2018.1454316
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1454316
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:6:p:1186-1205



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1457526_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Øyvind Bugge Solheim
Author-X-Name-First: Øyvind Bugge
Author-X-Name-Last: Solheim
Title: Right-wing Terrorism and Out-group Trust: The Anatomy of a Terrorist Backlash
Abstract: 
 Terrorist attacks often lead to public backlashes. Following the attacks on July 22, 2011 in Norway, Norwegians showed support for democratic values such as “openness,” “democracy,” and “tolerance” in the public debate and in the commemorations across the country. They also reported higher out-group trust. This paper explores two possible reasons for this increase in trust using a unique panel fielded before and right after the attacks. The first is that cognitive dissonance led people to dissociate from the terrorist and his ideology. The second is that the increase in trust was a response to the public backlash after the attacks. The increase in trust was not caused by cognitive dissonance. Rather, people who were already positive towards immigration, or who saw positive effects of the attacks, became more trusting than others did, and Progress Party supporters increased their trust less than others. These findings are interpreted as a response to the attacks and the political characteristics of the backlash. The study concludes by discussing implications for our understanding of the different consequences of attacks for the terrorists’ imagined constituencies and for the broader public.
Journal: Terrorism and Political Violence
Pages: 1206-1224
Issue: 6
Volume: 32
Year: 2020
Month: 08
X-DOI: 10.1080/09546553.2018.1457526
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1457526
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:6:p:1206-1224



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1457527_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lisa Zhang
Author-X-Name-First: Lisa
Author-X-Name-Last: Zhang
Author-Name: Gigi Kwik Gronvall
Author-X-Name-First: Gigi Kwik
Author-X-Name-Last: Gronvall
Title: Red Teaming the Biological Sciences for Deliberate Threats
Abstract: 
 This article describes the use of “red teaming” to analyze and forecast biological threats to U.S. national security. Red teaming is a method whereby participants adopt an adversarial perspective, and is used to stimulate critical and creative thinking without some of the flaws of other types of threat assessments, including mirror-imaging. Red team analysis is prevalent in the military, security, and commercial realms. There have been widespread calls from government and private organizations to analyze biological threats with a red teaming approach, in order to prioritize resources and to counter a wide array of biological agents. This paper includes a timeline of historical examples of both biological red team simulations and vulnerability probes, and discusses the challenges of conducting realistic, cost-effective modeling of biological agents. Finally, we propose additional analytical tools to the UK Ministry of Defense’s red team framework for the future development of structured, biological red team exercises, and discuss other existing future-oriented threat assessments in this realm.
Journal: Terrorism and Political Violence
Pages: 1225-1244
Issue: 6
Volume: 32
Year: 2020
Month: 08
X-DOI: 10.1080/09546553.2018.1457527
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1457527
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:6:p:1225-1244



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1463914_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: S. Yaqub Ibrahimi
Author-X-Name-First: S. Yaqub
Author-X-Name-Last: Ibrahimi
Title: Violence-producing Dynamics of Fragile States: How State Fragility in Iraq Contributed to the Emergence of Islamic State
Abstract: 
 In the post-Cold War era, “Jihadi-Salafi Groups” (JSGs) have emerged as significant “violence-making” organizations. Almost all JSGs have emerged in highly fragile states. The literature on the state fragility-terrorism nexus, by focusing exclusively on whether state fragility is a cause of terrorism or not, has failed to consider the broader impact of state fragility on the emergence of JSGs. The role of state fragility as a condition of the emergence of JSGs, in particular, is mostly overlooked in the literature. This paper, adding state fragility as a condition variable to the causal model of the rise of JSGs, fills this gap. The empirical basis of this research includes a single case study examining the relationship between state fragility in the post-Saddam Iraq and the formation of Islamic State (IS). By adding a new variable to the causal model of the rise of IS, this research makes a strong within-case inference concerning this case. Although the empirical basis of this research includes a single case study, the analytical framework developed in this paper has possible implications for studying a larger number of Jihadi-Salafi groups.
Journal: Terrorism and Political Violence
Pages: 1245-1267
Issue: 6
Volume: 32
Year: 2020
Month: 08
X-DOI: 10.1080/09546553.2018.1463914
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1463914
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:6:p:1245-1267



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1464444_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jason Hartwig
Author-X-Name-First: Jason
Author-X-Name-Last: Hartwig
Title: Composite Warfare and Civil War Outcome
Abstract: 
 Can rebels utilize variation in modes of warfare to overcome long odds and defeat incumbent forces? I find that rebel use of hybrid forms of warfare – the alternating use of conventional and irregular warfare – produce remarkably higher rates of victory over rebellions utilizing only irregular or conventional warfare. I argue that specific structural and organizational conditions enable use of hybrid warfare. Access to sanctuary, centralized command, and social-political cohesion interact with one another to create remarkably flexible and durable rebel organizations capable of absorbing conventional defeats, while using irregular warfare to shape conditions for eventual conventional victory.
Journal: Terrorism and Political Violence
Pages: 1268-1290
Issue: 6
Volume: 32
Year: 2020
Month: 08
X-DOI: 10.1080/09546553.2018.1464444
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1464444
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:6:p:1268-1290



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1464445_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kenneth L. Lasoen
Author-X-Name-First: Kenneth L.
Author-X-Name-Last: Lasoen
Title: Plan B(ruxellles): Belgian Intelligence and the Terrorist Attacks of 2015-16
Abstract: 
 This essay uses the official reports as well as sources from the intelligence services to provide a clearer picture of the working circumstances of the Belgian intelligence and security services and the pressure they were under to deal with the challenges posed by violent radicalisation and terrorist plots since the emergence of the foreign fighters phenomenon. It will be shown how mounting pressure from the rapidly expanding threat exacerbated the gradual exhaustion of the security services by structural issues of unaddressed organisational difficulties, and budget restrictions faced with increasing workloads. Due to the high number of foreign fighters, belated initiatives taken to assess the threat were impeded by barriers to information exchange, unclear guidance, and data overload. The failure of Belgian intelligence to detect the attack plans was more a symptom of policy failure than the underachievement of the services. A concluding section will reflect upon the inadequacy and lateness of policy responses because of a Belgian tendency to understate security.
Journal: Terrorism and Political Violence
Pages: 1291-1309
Issue: 6
Volume: 32
Year: 2020
Month: 08
X-DOI: 10.1080/09546553.2018.1464445
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1464445
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:6:p:1291-1309



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1466704_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Miguel Carreras
Author-X-Name-First: Miguel
Author-X-Name-Last: Carreras
Author-Name: Ajay Verghese
Author-X-Name-First: Ajay
Author-X-Name-Last: Verghese
Title: Violence, Insecurity, and Religiosity: A Multilevel Analysis of 71 Countries
Abstract: 
 A large social science literature demonstrates a link between personal insecurity and religiosity. When individuals are healthy, literate, and gainfully employed, they tend to be less religious. One of the most fundamental threats to an individual is the risk of violence, but this important marker of insecurity has been unexplored in recent studies of the determinants of religiosity. We use a unique dataset that measures state-sponsored terror, an ideal measure for studying insecurity, and explore the relationship between violence and religious beliefs and practices in 71 countries during the period 1981–2011. We find a robust positive association between violence and religiosity, and offer several reasons to believe that this is a causal relationship. Drawing on psychological studies, we argue that the specific mechanism at work deals with religious coping, a uniquely efficacious way of combating the stress and anxiety produced by the threat of recurrent violence.
Journal: Terrorism and Political Violence
Pages: 1310-1328
Issue: 6
Volume: 32
Year: 2020
Month: 08
X-DOI: 10.1080/09546553.2018.1466704
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1466704
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:6:p:1310-1328



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1471398_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Murat Haner
Author-X-Name-First: Murat
Author-X-Name-Last: Haner
Author-Name: Ashley Wichern
Author-X-Name-First: Ashley
Author-X-Name-Last: Wichern
Author-Name: Marissa Fleenor
Author-X-Name-First: Marissa
Author-X-Name-Last: Fleenor
Title: The Turkish Foreign Fighters and the Dynamics behind Their Flow into Syria and Iraq
Abstract: 
 During the past decade, the flow of foreign fighters into conflict zones has emerged as a serious problem that deserves policy intervention. Based on latent content analysis of 89 interviews conducted with Turkish nationals, we examined the factors that influenced the mobilization of foreign fighters into Syria. Informed by the existing literature, the analysis revealed that the decision to engage in foreign fighting was influenced by five factors: a) peer pressure coming from religious networks; b) socialization with Islamic State fighters; c) low levels of risk associated with travel; d) favorable life conditions compared to previous jihad locations; and e) the opportunity to exact revenge. Our findings indicated that Turkish individuals’ decisions to participate in foreign fighting is predominantly influenced by peer pressure coming from preexisting networks. The risk of being acknowledged as a coward, a hypocrite, or disloyal, and the risk of exclusion from religious networks motivated Turkish foreign fighters’ decision to travel to conflict zones.
Journal: Terrorism and Political Violence
Pages: 1329-1347
Issue: 6
Volume: 32
Year: 2020
Month: 08
X-DOI: 10.1080/09546553.2018.1471398
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1471398
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:6:p:1329-1347



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1788888_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anthony N. Celso
Author-X-Name-First: Anthony N.
Author-X-Name-Last: Celso
Title: The Jihadist Forever War: Islamic State Innovations in Terrorist Propaganda, Recruitment and Organizational Networking
Journal: Terrorism and Political Violence
Pages: 1348-1355
Issue: 6
Volume: 32
Year: 2020
Month: 08
X-DOI: 10.1080/09546553.2020.1788888
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1788888
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:6:p:1348-1355



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1788835_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alisa Stack
Author-X-Name-First: Alisa
Author-X-Name-Last: Stack
Title: Crafting Masculine Selves: Culture, War, and Psychodynamics in Afghanistan
Journal: Terrorism and Political Violence
Pages: 1356-1358
Issue: 6
Volume: 32
Year: 2020
Month: 08
X-DOI: 10.1080/09546553.2020.1788835
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1788835
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:6:p:1356-1358



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1788834_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Hannah Wild
Author-X-Name-First: Hannah
Author-X-Name-Last: Wild
Title: Research Handbook on Child Soliders
Journal: Terrorism and Political Violence
Pages: 1359-1361
Issue: 6
Volume: 32
Year: 2020
Month: 08
X-DOI: 10.1080/09546553.2020.1788834
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1788834
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:6:p:1359-1361



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1788832_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard Bach Jensen
Author-X-Name-First: Richard Bach
Author-X-Name-Last: Jensen
Title: Bombs, Bullets and Bread: The Politics of Anarchist Terrorism Worldwide, 1866-1926
Journal: Terrorism and Political Violence
Pages: 1362-1364
Issue: 6
Volume: 32
Year: 2020
Month: 08
X-DOI: 10.1080/09546553.2020.1788832
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1788832
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:6:p:1362-1364



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1788836_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Peter S. Henne
Author-X-Name-First: Peter S.
Author-X-Name-Last: Henne
Title: Religious Statecraft: The Politics of Islam in Iran
Journal: Terrorism and Political Violence
Pages: 1365-1366
Issue: 6
Volume: 32
Year: 2020
Month: 08
X-DOI: 10.1080/09546553.2020.1788836
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1788836
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:6:p:1365-1366



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1788840_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nicholas Stark
Author-X-Name-First: Nicholas
Author-X-Name-Last: Stark
Title: The IRA in Britain, 1919–1923: ‘In the Heart of Enemy Lines,’
Journal: Terrorism and Political Violence
Pages: 1367-1368
Issue: 6
Volume: 32
Year: 2020
Month: 08
X-DOI: 10.1080/09546553.2020.1788840
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1788840
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:6:p:1367-1368



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1788839_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: D. J. Mulloy
Author-X-Name-First: D. J.
Author-X-Name-Last: Mulloy
Title: The Defiant: Protest Movements in Post-Liberal America
Journal: Terrorism and Political Violence
Pages: 1369-1370
Issue: 6
Volume: 32
Year: 2020
Month: 08
X-DOI: 10.1080/09546553.2020.1788839
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1788839
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:6:p:1369-1370

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1472585_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Seung-Whan Choi
Author-X-Name-First: Seung-Whan
Author-X-Name-Last: Choi
Author-Name: Benjamin Acosta
Author-X-Name-First: Benjamin
Author-X-Name-Last: Acosta
Title: Sunni Suicide Attacks and Sectarian Violence
Abstract: 
 Although fundamentalist Sunni Muslims have committed more than 85% of all suicide attacks, empirical research has yet to examine how internal sectarian conflicts in the Islamic world have fueled the most dangerous form of political violence. We contend that fundamentalist Sunni Muslims employ suicide attacks as a political tool in sectarian violence and this targeting dynamic marks a central facet of the phenomenon today. We conduct a large-n analysis, evaluating an original dataset of 6,224 suicide attacks during the period of 1980 through 2016. A series of logistic regression analyses at the incidence level shows that, ceteris paribus, sectarian violence between Sunni Muslims and non-Sunni Muslims emerges as a substantive, significant, and positive predictor of suicide attacks. Indeed, the context of sectarian conflict predicts the use of suicide attacks to a much greater degree than the contexts of militant outbidding or foreign occupation. We also present five case examples, illustrating the use of suicide attacks in sectarian conflicts in Lebanon, Iraq, Syria, Nigeria, and Pakistan. Our overall results indicate that only a reduction in sectarian violence, and especially conflicts involving fundamentalist Sunni Muslims, can prevent the continuing spread of the suicide-attack phenomenon.
Journal: Terrorism and Political Violence
Pages: 1371-1390
Issue: 7
Volume: 32
Year: 2020
Month: 10
X-DOI: 10.1080/09546553.2018.1472585
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1472585
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:7:p:1371-1390



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1473858_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Shandon Harris-Hogan
Author-X-Name-First: Shandon
Author-X-Name-Last: Harris-Hogan
Author-Name: Kate Barrelle
Author-X-Name-First: Kate
Author-X-Name-Last: Barrelle
Title: Young Blood: Understanding the Emergence of a New Cohort of Australian Jihadists
Abstract: 
 The overwhelming majority of jihadists identified in Australia across the last two decades form an interconnected network which transcends time and geographic locations. Close peer relationships appear key to understanding how Australian jihadists recruit and how the network evolves. More recently the Australian network has grown significantly, and with this increase in size has come a concurrent escalation in the level of threat posed. This article analyses the factors that have coalesced together to drive this increase. In doing so, it challenges some underlying assumptions regarding radicalisation in Australia that may not be backed by empirical research, or are based on anomalous case studies not representative of the larger network. It also highlights the recent emergence of a new cohort of Australian jihadists: teenagers. An analysis of the emergence of these teenage jihadists is then conducted, along with a discussion of the implications for policing strategies and the future of countering violent extremism programs in Australia.
Journal: Terrorism and Political Violence
Pages: 1391-1412
Issue: 7
Volume: 32
Year: 2020
Month: 10
X-DOI: 10.1080/09546553.2018.1473858
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1473858
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:7:p:1391-1412



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1481050_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Zoe Marchment
Author-X-Name-First: Zoe
Author-X-Name-Last: Marchment
Author-Name: Noémie Bouhana
Author-X-Name-First: Noémie
Author-X-Name-Last: Bouhana
Author-Name: Paul Gill
Author-X-Name-First: Paul
Author-X-Name-Last: Gill
Title: Lone Actor Terrorists: A Residence-to-Crime Approach
Abstract: 
 Although there has recently been a considerable increase in research into lone actor terrorism, one of the main areas that remains understudied is that of target selection. The lack of empirically driven studies that can guide prevention measures is a notable oversight. This paper applies methods from environmental criminology to examine the residence-to-attack journeys of 122 lone terrorist acts in the U.S and Europe. The distance decay effect was evident, and significant differences were found between subgroups. Individuals were more likely to travel further if a) they were in the U.S, b) they had links to a wider network, c) they had a single-issue ideology, d) they attacked an iconic target, e) they attacked a symbolic building, or f) they used a bomb as their main weapon. A few case studies are discussed which highlight a need to conduct further research that considers the whole nodal network of an individual. The findings suggest that distance can be put forward as a constraining factor on lone actor target selection and provide support for the notion that the spatial decision making of terrorists is similar to traditional criminals.
Journal: Terrorism and Political Violence
Pages: 1413-1438
Issue: 7
Volume: 32
Year: 2020
Month: 10
X-DOI: 10.1080/09546553.2018.1481050
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1481050
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:7:p:1413-1438



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1481051_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Clara Isabel Morgades-Bamba
Author-X-Name-First: Clara Isabel
Author-X-Name-Last: Morgades-Bamba
Author-Name: Patrick Raynal
Author-X-Name-First: Patrick
Author-X-Name-Last: Raynal
Author-Name: Henri Chabrol
Author-X-Name-First: Henri
Author-X-Name-Last: Chabrol
Title: Exploring the Radicalization Process in Young Women
Abstract: 
 Women’s radicalization is a pending issue in empirical research that is worthy of attention. It has been found that the role of women in international terrorism is much greater than previously thought, but we know almost nothing about the factors underlying the process that would lead them to perpetrate radicalized acts, as almost no empirical research has been carried out on the subject. In this work we aim to explore a model of radicalization of thought and action among young women. The hypothesized model included ten predictors: cultural identity, cultural discrimination, religious involvement, depressive symptoms, and schizotypal, borderline, and the Dark Tetrad traits of personality. Dogmatism was hypothesized as a mediator between these factors and the level of radicalized cognitions and behaviors. The sample comprises 643 college women (aged 18 to 29) from French universities. Our results suggest that women becoming involved in radicalization are more “dark” than “disturbed.” Schizotypal, borderline, and depressive features, although being associated to radicalization, do not contribute to the model. Both the dark traits and socio-cultural factors are revealed as predictors of radicalization, while dogmatism is clearly shown as a mediator. Orientations in terms of prevention among young women are proposed.
Journal: Terrorism and Political Violence
Pages: 1439-1457
Issue: 7
Volume: 32
Year: 2020
Month: 10
X-DOI: 10.1080/09546553.2018.1481051
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1481051
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:7:p:1439-1457



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1482214_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Efraim Benmelech
Author-X-Name-First: Efraim
Author-X-Name-Last: Benmelech
Author-Name: Esteban F. Klor
Author-X-Name-First: Esteban F.
Author-X-Name-Last: Klor
Title: What Explains the Flow of Foreign Fighters to ISIS?
Abstract: 
 This paper provides the first systematic analysis of the link between countries’ economic, political, and social conditions and the global phenomenon of ISIS foreign fighters. We find that poor economic conditions do not drive participation in ISIS. In contrast, the number of ISIS foreign fighters is positively correlated with a country’s GDP per capita and Human Development Index (HDI). Many foreign fighters originate from countries with high levels of economic development, low income inequality, and highly developed political institutions. Other factors that explain the number of ISIS foreign fighters are the size of a country’s Muslim population and its ethnic homogeneity. Although we cannot directly determine why people join ISIS, our results suggest that the flow of foreign fighters to ISIS is not driven by economic or political conditions but rather by ideology and the difficulty of assimilation into homogenous Western countries. These conclusions are consistent with those of the related qualitative literature that relies on the personal profiles of ISIS foreign fighters.
Journal: Terrorism and Political Violence
Pages: 1458-1481
Issue: 7
Volume: 32
Year: 2020
Month: 10
X-DOI: 10.1080/09546553.2018.1482214
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1482214
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:7:p:1458-1481



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1482829_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Amélie Godefroidt
Author-X-Name-First: Amélie
Author-X-Name-Last: Godefroidt
Author-Name: Arnim Langer
Author-X-Name-First: Arnim
Author-X-Name-Last: Langer
Title: How Fear Drives Us Apart: Explaining the Relationship between Terrorism and Social Trust
Abstract: 
 A central aim of terrorism is to drive people apart and destroy social trust. Still, there is little empirical research which has systematically investigated the relationship between terrorist attacks, fear of terrorism, and social trust. In addition, the impact of terrorism is usually assumed to be uniform across different individuals and societies. In order to investigate the impact of terrorism as well as the fear of future terrorism on trust levels of different types of individuals and societies, we combine individual-level survey data of the most recent World Values Survey (WVS, Round 6, 2010–2014) with several indicators at the country-level. Our findings show that social trust is principally damaged by the fear of future terrorist attacks, more so than by past terrorist attacks. Moreover, this deleterious impact of the fear of terrorism on social trust is most prevalent in more democratic countries and among individuals who are more frequently exposed to television news. Hence, with relatively limited capabilities and resources, terrorists may therefore evoke disproportionate fear effects within democratic societies which are, at least partially, fueled by media exposure.
Journal: Terrorism and Political Violence
Pages: 1482-1505
Issue: 7
Volume: 32
Year: 2020
Month: 10
X-DOI: 10.1080/09546553.2018.1482829
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1482829
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:7:p:1482-1505



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1484356_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jan Christoffer Andersen
Author-X-Name-First: Jan Christoffer
Author-X-Name-Last: Andersen
Author-Name: Sveinung Sandberg
Author-X-Name-First: Sveinung
Author-X-Name-Last: Sandberg
Title: Islamic State Propaganda: Between Social Movement Framing and Subcultural Provocation
Abstract: 
 The Islamic State (IS) has become notorious for violent, brutal actions and the presentation of these actions in social and mainstream media. Excessive violence creates a spectacle for the news media. However, IS propaganda also emphasizes its role in state building and its engagement in social and welfare work. This twofold propaganda enables the mobilization of different audiences, but it also sends conflicting messages about the organization. In this article, we study the e-magazine Dabiq, emphasizing its methods of gaining support and attempting to recruit Western participants to violent jihadism. We use theories of social movement and subculture to reveal some of the underlying tensions in IS’s communicative strategies. The analysis first identifies how IS frames its propaganda, attempting to mobilize widespread support. Then, it highlights another dimension of IS’s rhetoric: provocations, the creation of sensationalist spectacles of violence and links to excitement seeking, stardom, and popular culture. We conclude that combining general anti-Western rhetoric and religious imagery with extraordinary depictions of violence has been both a strength and flaw in the organization’s propaganda.
Journal: Terrorism and Political Violence
Pages: 1506-1526
Issue: 7
Volume: 32
Year: 2020
Month: 10
X-DOI: 10.1080/09546553.2018.1484356
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1484356
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:7:p:1506-1526



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1486301_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joseph M. Brown
Author-X-Name-First: Joseph M.
Author-X-Name-Last: Brown
Title: Force of Words: The Role of Threats in Terrorism
Abstract: 
 This article builds a new theoretical framework to understand the role of threats in terrorism. Interviews of IRA members give rise to a speech/kinetic action model of terrorism, in which threats and violence jointly determine the physical consequences and political messages conveyed by terrorist attacks. In fact, threats are integral to the attack, and some attacks can be said to consist of threats alone. IRA interviews reveal four varieties of threats: warnings, hoaxes, pledges, and bluffs. These categories are distinguished by the timing of the threatened violence (immediate or prospective) and the intended truthfulness of the threat. The IRA interviews establish the function of each type of threat in influencing the beliefs or behavior of state and society. Threats may disrupt the economy, increase or decrease bloodshed, control social behavior, secure tactical or strategic advantage, claim attacks, aggrandize the perpetrator, and facilitate bargaining. A single threat may serve several of these functions, signaling different messages to different audiences. In fact, this is one of the most important applications of threats. When violence alone would produce suboptimal outcomes, threats alter the pattern of damage in a way that optimizes militants’ messaging for all audiences.
Journal: Terrorism and Political Violence
Pages: 1527-1549
Issue: 7
Volume: 32
Year: 2020
Month: 10
X-DOI: 10.1080/09546553.2018.1486301
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1486301
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:7:p:1527-1549



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1495627_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alex Braithwaite
Author-X-Name-First: Alex
Author-X-Name-Last: Braithwaite
Author-Name: Jessica Maves Braithwaite
Author-X-Name-First: Jessica Maves
Author-X-Name-Last: Braithwaite
Title: Restricting Opposition in Elections and Terrorist Violence
Abstract: 
 We offer a novel argument to explain how the use of terrorist violence is affected by the restrictions that governments place on opposition participation in elections. Opposition actors often decide whether and how to participate in elections. Governments influence these decisions by controlling who can contest elections and, by doing so, they influence the access to public support that opponents stand to gain from participating or fighting. “Unrestricted” elections, without limits on who can participate in opposition to the government, represent an opportunity for moderation in politics. This moderation threatens the raison d’être of violent extremists. Accordingly, extremists are likely to look to use violence to spoil unrestricted elections. “Restricted” elections, where some opponents are excluded from participating, undermine public support to the opposition as a whole, thereby reducing the likelihood that they are able to resort to terrorism. Importantly, these effects are anticipated to be most prevalent in non-democracies, where norms of moderation in politics are yet to be fully developed. A series of negative binomial regression models provide support for these dual logics.
Journal: Terrorism and Political Violence
Pages: 1550-1572
Issue: 7
Volume: 32
Year: 2020
Month: 10
X-DOI: 10.1080/09546553.2018.1495627
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1495627
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:7:p:1550-1572



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1495628_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: James Morris
Author-X-Name-First: James
Author-X-Name-Last: Morris
Author-Name: Tristan Dunning
Author-X-Name-First: Tristan
Author-X-Name-Last: Dunning
Title: Rearing Cubs of the Caliphate: An Examination of Child Soldier Recruitment by Da’esh
Abstract: 
 This study investigates child soldier recruitment strategies of the Islamic State group (Da’esh). It argues that while the dominant caretaker and free-ranger approaches to child soldier recruitment make useful contributions to understanding Da’esh’s strategy, a self-perception-based approach to examining children’s agency and association with Da’esh sheds new light on how the organization was able to systematically militarize and recruit children within occupied territory. Da’esh used social and/or political pressures to inform children’s self-perception of agency, while also aligning these self-perceptions with the group’s interests. Further examination of these pressures, children’s reactions to them, and how they inform children’s self-perceptions of agency is essential in understanding how and why children are recruited by Da’esh and how children justified violence within this context.
Journal: Terrorism and Political Violence
Pages: 1573-1591
Issue: 7
Volume: 32
Year: 2020
Month: 10
X-DOI: 10.1080/09546553.2018.1495628
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1495628
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:7:p:1573-1591



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1814105_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dipak K. Gupta
Author-X-Name-First: Dipak K.
Author-X-Name-Last: Gupta
Title: The Naxalite Movement: Review from A Personal Perspective
Journal: Terrorism and Political Violence
Pages: 1592-1600
Issue: 7
Volume: 32
Year: 2020
Month: 10
X-DOI: 10.1080/09546553.2020.1814105
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1814105
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:7:p:1592-1600



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1814101_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John C. Zimmerman
Author-X-Name-First: John C.
Author-X-Name-Last: Zimmerman
Title: Jihad and Death: The Global Appeal of the Islamic State
Journal: Terrorism and Political Violence
Pages: 1601-1602
Issue: 7
Volume: 32
Year: 2020
Month: 10
X-DOI: 10.1080/09546553.2020.1814101
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1814101
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:7:p:1601-1602



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1814102_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Christopher C. Harmon
Author-X-Name-First: Christopher C.
Author-X-Name-Last: Harmon
Title: The Closed Circle: Joining and Leaving the Muslim Brotherhood in the West
Journal: Terrorism and Political Violence
Pages: 1603-1604
Issue: 7
Volume: 32
Year: 2020
Month: 10
X-DOI: 10.1080/09546553.2020.1814102
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1814102
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:7:p:1603-1604



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1814587_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ahmet Guler
Author-X-Name-First: Ahmet
Author-X-Name-Last: Guler
Title: The Jihadist Preachers of the End Times. ISIS Apocalyptic Propaganda
Journal: Terrorism and Political Violence
Pages: 1605-1606
Issue: 7
Volume: 32
Year: 2020
Month: 10
X-DOI: 10.1080/09546553.2020.1814587
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1814587
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:7:p:1605-1606



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1814100_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lucien Frary
Author-X-Name-First: Lucien
Author-X-Name-Last: Frary
Title: Assassins: The KGB’s Poison Factory 10 Years On
Journal: Terrorism and Political Violence
Pages: 1607-1608
Issue: 7
Volume: 32
Year: 2020
Month: 10
X-DOI: 10.1080/09546553.2020.1814100
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1814100
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:7:p:1607-1608



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1814106_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nathaniel L. Moir
Author-X-Name-First: Nathaniel L.
Author-X-Name-Last: Moir
Title: The Taliban at War: 2001-2018
Journal: Terrorism and Political Violence
Pages: 1609-1612
Issue: 7
Volume: 32
Year: 2020
Month: 10
X-DOI: 10.1080/09546553.2020.1814106
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1814106
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:7:p:1609-1612



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1814104_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Routledge Handbook of Terrorism and Counterterrorism
Journal: Terrorism and Political Violence
Pages: 1613-1614
Issue: 7
Volume: 32
Year: 2020
Month: 10
X-DOI: 10.1080/09546553.2020.1814104
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1814104
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:7:p:1613-1614



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1814103_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: A. R. B. Linderman
Author-X-Name-First: A. R. B.
Author-X-Name-Last: Linderman
Title: Out of the Ashes: An Oral History of the Provisional Irish Republican Movement
Journal: Terrorism and Political Violence
Pages: 1615-1616
Issue: 7
Volume: 32
Year: 2020
Month: 10
X-DOI: 10.1080/09546553.2020.1814103
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1814103
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:7:p:1615-1616

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1497987_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David Malet
Author-X-Name-First: David
Author-X-Name-Last: Malet
Author-Name: Rachel Hayes
Author-X-Name-First: Rachel
Author-X-Name-Last: Hayes
Title: Foreign Fighter Returnees: An Indefinite Threat?
Abstract: 
 How long does it typically take a returned foreign fighter to launch a domestic terror attack? The issue of returnees, and appropriate national and international responses to potential threats, has become a preeminent security concern of the 2010s, impacting policies on everything from refugees to whether to permit ISIS fighters to leave the theater of conflict alive. This article attempts to illuminate these contentious debates through a new data set of Lags in Attack Times of Extremist Returnees (LATER) that examines 230 jihadi returnees to Western countries. The data indicate that the majority of attempted attacks occur within one year, with a median lag time of just four months. Prison appears to play no role in lag times. Our findings indicate that security and reintegration efforts should be targeted within the critical six months after return, which diminishes the risk of attack considerably.
Journal: Terrorism and Political Violence
Pages: 1617-1635
Issue: 8
Volume: 32
Year: 2020
Month: 11
X-DOI: 10.1080/09546553.2018.1497987
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1497987
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:8:p:1617-1635



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1498787_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Shlomo Ogen Goldman
Author-X-Name-First: Shlomo Ogen
Author-X-Name-Last: Goldman
Author-Name: Leah Bar
Author-X-Name-First: Leah
Author-X-Name-Last: Bar
Title: The Global Law of Terror Organization Lifespan
Abstract: 
 The study addresses the question of whether there is a global pattern of terror organization (TO) lifespan. Based on two datasets which include hundreds of organizations, we show that there is a global statistical law of TO lifespan distribution. This distribution describes populations of TOs in different contexts of periods, geographical locations, ideologies, etc. The data as a whole, as well as its subpopulations, seem to emerge from an exponential distribution, which is formulated as a mathematical model. This model enables the prediction of TOs’ global population decay rate. The findings were obtained by introducing a novel procedure, which formulates and validates this mathematical law for discrete empirical data. We suggest that human behavior generating informational cascades and a positive feedback loop, which influence the number of core members in a TO, may be the source of this global pattern.
Journal: Terrorism and Political Violence
Pages: 1636-1665
Issue: 8
Volume: 32
Year: 2020
Month: 11
X-DOI: 10.1080/09546553.2018.1498787
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1498787
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:8:p:1636-1665



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1500365_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel Koehler
Author-X-Name-First: Daniel
Author-X-Name-Last: Koehler
Author-Name: Peter Popella
Author-X-Name-First: Peter
Author-X-Name-Last: Popella
Title: Mapping Far-right Chemical, Biological, Radiological, and Nuclear (CBRN) Terrorism Efforts in the West: Characteristics of Plots and Perpetrators for Future Threat Assessment
Abstract: 
 The threat of chemical, biological, radiological and nuclear (CBRN) terrorism is widely attributed to collective actors based on a religious ideology, e.g. globally operating Salafi-jihadist groups like al-Qaeda or ISIL. Only limited attention has been given to the CBRN threat of violent domestic extremists in general or far-right terrorists specifically. Nevertheless, a number of incidents involving far-right activists and CBRN agents in Western countries are known to the public, even though these have had comparatively little impact on public threat perception. This study systematically collected public information about far-right CBRN incidents to identify their main characteristics. The authors were able to identify 31 incidents in Western countries since 1970, which display features contrary to generally assumed forms of CBRN terrorism. Far-right CBRN terrorism appears to be predominantly a lone-actor phenomenon oftentimes involving middle-aged and comparatively well-educated male perpetrators, mostly motivated by non-religious forms of far-right ideology (i.e. neo-Nazism, non-religious white supremacism) and indiscriminately targeting victims. Overall, far-right actors attempting to weaponize CBRN agents have been few and generally technically inept. However, the characteristics of the plots pose potential challenges for effective counter-measures and intervention, should the number of actors or the technical sophistication of plots increase in the future.
Journal: Terrorism and Political Violence
Pages: 1666-1690
Issue: 8
Volume: 32
Year: 2020
Month: 11
X-DOI: 10.1080/09546553.2018.1500365
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1500365
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:8:p:1666-1690



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1500366_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gianluca De Fazio
Author-X-Name-First: Gianluca
Author-X-Name-Last: De Fazio
Title: Unpacking Violent Contention: The Troubles in Northern Ireland, 1968–1972
Abstract: 
 This paper systematically describes the different types of political violence that occurred in Northern Ireland between 1968 and 1972, examining how they interacted and fueled each other. To measure the level of political violence in Northern Ireland, traditional quantitative approaches use variables such as the number of conflict-related deaths, paramilitary attacks, or riots; the goal of this paper, instead, is to disaggregate acts of violent contention by actor, type, and target. Relying on Quantitative Narrative Analysis (QNA), all the violent actions perpetrated by the actors participating in the conflict have been recorded, coded, and analyzed. Three main types of violence in Northern Ireland are identified: a) protest-related violence—violent interactions among protesters, counterprotesters, and police before, during, and after mass demonstrations; b) sectarian violence—includes riots and clashes between members of the two main ethno-national communities; and c) armed conflict—violent actions by paramilitary groups and security forces. While originating from different conflict situations, these three types of violence affected each other, as they altered, and were altered by, the broader political context. Conceptual and methodological disaggregation of political violence are encouraged to better understand violent conflicts.
Journal: Terrorism and Political Violence
Pages: 1691-1711
Issue: 8
Volume: 32
Year: 2020
Month: 11
X-DOI: 10.1080/09546553.2018.1500366
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1500366
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:8:p:1691-1711



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1506335_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Miron Lakomy
Author-X-Name-First: Miron
Author-X-Name-Last: Lakomy
Title: “One of the Two Good Outcomes”: Turning Defeats into Victories in the Islamic State’s Flagship Magazine Rumiyah
Abstract: 
 This paper attempts to understand the most evident propaganda methods and leading themes exploited in the recent issues of the Islamic State’s flagship Anglophone magazine Rumiyah to downplay its increasingly visible crisis. It argues that there are several leading methods of damage control utilized by Daesh. To begin with, a noticeable effort has been made to recover the “winner’s image” of the Islamic State with the use of card-stacking propaganda devices. This has been combined with the widespread promotion of martyrdom as an end-goal for all mujahidin, which is symbolized by the slogan: “one of the two good outcomes.” Finally, the crisis of the group has also been downplayed by a plethora of religion-related manipulation techniques and name-calling propaganda devices, utilized predominantly to exploit sectarian tensions.
Journal: Terrorism and Political Violence
Pages: 1712-1730
Issue: 8
Volume: 32
Year: 2020
Month: 11
X-DOI: 10.1080/09546553.2018.1506335
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1506335
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:8:p:1712-1730



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1506336_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Orlandrew E. Danzell
Author-X-Name-First: Orlandrew E.
Author-X-Name-Last: Danzell
Author-Name: Yao-Yuan Yeh
Author-X-Name-First: Yao-Yuan
Author-X-Name-Last: Yeh
Author-Name: Melia Pfannenstiel
Author-X-Name-First: Melia
Author-X-Name-Last: Pfannenstiel
Title: Does Education Mitigate Terrorism? Examining the Effects of Educated Youth Cohorts on Domestic Terror in Africa
Abstract: 
 Policymakers often tout expanded access to education as an antidote for terrorism in Africa. Targeted economic development is also considered a necessary complement to education gains because young, well-educated individuals who lack viable opportunities are vulnerable targets of radicalization. Despite common assertions that poor socioeconomic circumstances drive radicalization, empirical research has hitherto neglected critical inquiry of these policies. Varied findings across cross-national studies of education expansion and the effects of burgeoning youth cohorts warrant a focused examination of regions plagued by the proliferation of extremist groups. This study explores the role of education in mitigating a turn to terror among youth in Africa by examining 50 countries from 1970 to 2011. Expansions in primary, secondary, and tertiary education appear to have different influences on domestic terrorism. In the sub-Saharan region, one model shows primary and secondary education reduced terrorism while others indicate non-monotonic effects in societies experiencing a youth bulge. These nuanced findings suggest education should not be relied upon to counter extremism without additional initiatives to facilitate socioeconomic opportunities. The implication of this paper’s findings are important for academics and policymakers eager to create stable polities across the African continent.
Journal: Terrorism and Political Violence
Pages: 1731-1752
Issue: 8
Volume: 32
Year: 2020
Month: 11
X-DOI: 10.1080/09546553.2018.1506336
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1506336
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:8:p:1731-1752



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1516209_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Vivek Venkatesh
Author-X-Name-First: Vivek
Author-X-Name-Last: Venkatesh
Author-Name: Jeffrey S. Podoshen
Author-X-Name-First: Jeffrey S.
Author-X-Name-Last: Podoshen
Author-Name: Jason Wallin
Author-X-Name-First: Jason
Author-X-Name-Last: Wallin
Author-Name: Jihan Rabah
Author-X-Name-First: Jihan
Author-X-Name-Last: Rabah
Author-Name: Daniel Glass
Author-X-Name-First: Daniel
Author-X-Name-Last: Glass
Title: Promoting Extreme Violence: Visual and Narrative Analysis of Select Ultraviolent Terror Propaganda Videos Produced by the Islamic State of Iraq and Syria (ISIS) in 2015 and 2016
Abstract: 
 This paper examines aspects of violent, traumatic terrorist video propaganda produced by the Islamic State of Iraq and Syria (ISIS) within the theoretical confines of abjection and the use of utopian/dystopian themes. These themes have been present in a number of studies that have examined consumption of the dark dystopic variety. We seek to elucidate on the use of specific techniques and narratives that are relatively new to the global propaganda consumerspace and that relate to horrific violence. Our work here is centered on interpretative analysis and theory building that we believe can assist in understanding and interpreting post-apocalyptic and abject-oriented campaigns in the age of social media and rapid transmission of multimedia communications. In the present analysis, we examine eight ISIS videos created and released in 2015 and 2016. All of the videos chosen for analysis have utilized techniques related to abjection, shock, and horror, often culminating in the filming of the murder of ISIS’s enemies or place-based destruction of holy sites in the Middle East. We use inductive content analytic techniques in the contexts of consumer culture, “cinemas of attraction,” and pornography of violence to propose an extension of existing frameworks of terrorism and propaganda theory.
Journal: Terrorism and Political Violence
Pages: 1753-1775
Issue: 8
Volume: 32
Year: 2020
Month: 11
X-DOI: 10.1080/09546553.2018.1516209
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1516209
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:8:p:1753-1775



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1516210_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Barbara Perry
Author-X-Name-First: Barbara
Author-X-Name-Last: Perry
Author-Name: David C. Hofmann
Author-X-Name-First: David C.
Author-X-Name-Last: Hofmann
Author-Name: Ryan Scrivens
Author-X-Name-First: Ryan
Author-X-Name-Last: Scrivens
Title: “Confrontational but Not Violent”: An Assessment of the Potential for Violence by the Anti-Authority Community in Canada
Abstract: 
 Despite a pervasive concern among law enforcement and security agencies, there are relatively few academic explorations of the likelihood of violence associated with anti-authority activists from groups such as the Freemen-on-the-Land, Sovereign Citizens, and similar movements within Canada. In order to begin addressing this gap in knowledge, this article uses a multi-method approach to explore and assess the potential for violence by the Canadian anti-authority community against the state in particular. Data were gathered from interviews with law enforcement, lawyers, judges, notaries, and movement adherents (n = 32), as well as from the analysis of open source data which included media reports, court documents, and movement websites. Results suggest that there are three distinct classes of violent activity, directed specifically at the state and state actors, that are prevalent among Canadian anti-authority movements: a) offensive/extremist violence; b) defensive/reactionary violence; and c) harassment and intimidation. The article concludes with a discussion of two emerging areas of concern related to Canadian anti-authority violence and responses to the anti-authority community in Canada.
Journal: Terrorism and Political Violence
Pages: 1776-1796
Issue: 8
Volume: 32
Year: 2020
Month: 11
X-DOI: 10.1080/09546553.2018.1516210
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1516210
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:8:p:1776-1796



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1516643_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marina Eleftheriadou
Author-X-Name-First: Marina
Author-X-Name-Last: Eleftheriadou
Title: Refugee Radicalization/Militarization in the Age of the European Refugee Crisis: A Composite Model
Abstract: 
 This article constitutes an effort to examine the prospect of long-term refugee radicalization, beyond the dominant “short-sighted” debate on the possibility of radical Islamist militants posing as refugees. The main argument of the article is that refugees are inherently different from second-generation economic migrants, on whom most radicalization models are based. The article proposes a composite model that enriches our understanding of radicalization drivers with insights from refugee militarization studies. The model demonstrates that not only do some radicalization drivers present different dynamics in refugee populations, but that there are also other important factors, such as refugees’ cause of flight or prior political organization, which are absent in traditional radicalization models. Moreover, the article highlights the importance of a host state’s will and capacity to address refugees’ needs and the influence of external actors in policy formulation, particularly in weak or struggling host states. One implication of this study is that early-stage policies largely predetermine future radicalization. Another implication is that the possibility of refugee radicalization is not the same for every refugee population and in every (European) country. Thus, the policies the European Union or specific states adopt should be tailored to the specific needs of each community and state.
Journal: Terrorism and Political Violence
Pages: 1797-1818
Issue: 8
Volume: 32
Year: 2020
Month: 11
X-DOI: 10.1080/09546553.2018.1516643
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1516643
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:8:p:1797-1818



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1536583_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ian Ravenscroft
Author-X-Name-First: Ian
Author-X-Name-Last: Ravenscroft
Title: Terrorism, Religion and Self-control: An Unexpected Connection Between Conservative Religious Commitment and Terrorist Efficacy
Abstract: 
 Correlations between terrorism and the religious commitments of terrorist organizations and actors have been the subject of extensive scholarly investigation.1 Whilst the focus has often been on extreme Jihadist terrorism, other terrorist groups and individuals with religious commitments have been widely discussed such as Baruch Goldstein’s 1994 attack in Hebron, Christian Identity groups in the US, and Aum Shinrikyo in Japan.2 A number of theories have been advanced to explain the relationships between religious commitment and terrorism. For example, Atran has argued that many terrorists are “devoted actors”, and that members of deeply conservative religions are typically devoted actors.3 Whilst not denying that these factors may be important, this article draws attention to a further significant impact of religion on terrorism: the surprising connection between religion and self-control.4 Drawing on the large empirical literature establishing a link between religion (in particular deeply conservative religions) and self-control, it is hypothesized that the religious practices of religiously-inspired terrorists enhances their self-control and thus raises their efficacy, operationalized as casualties per attack. This hypothesis will be referred to as TERS (Terrorist Efficacy, Religion and Self-control). TERS predicts that highly conservative religious terrorist groups such as Al Qaeda and ISIS will typically have higher levels of terrorist efficacy than non-religious or moderately religious groups, and the research of supports this hypothesis.5 In addition, it is argued that TERS provides a crucial addition to Piazza’s emphasis on “universal/abstract” ideologies.6 Piazza remarks that left-wing terrorist groups can have universal/abstract ideologies. Case studies of atheist left-wing terrorist groups—specifically the Red Army Faction and the Red Brigades—reveal that such groups satisfy Piazza’s characterization of universal/abstract groups but have casualty rates per attack very much lower than those of highly conservative religious groups such as Al Qaeda and its affiliates. It is argued that highly conservative religious convictions enhance the self-control of the latter groups, raising their efficacy relative to the former atheist groups.
Journal: Terrorism and Political Violence
Pages: 1819-1834
Issue: 8
Volume: 32
Year: 2020
Month: 11
X-DOI: 10.1080/09546553.2018.1536583
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1536583
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:8:p:1819-1834



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1828701_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David B. Kanin
Author-X-Name-First: David B.
Author-X-Name-Last: Kanin
Title: How the West Was Lost: The Decline of a Myth and the Search for New Stories
Journal: Terrorism and Political Violence
Pages: 1835-1838
Issue: 8
Volume: 32
Year: 2020
Month: 11
X-DOI: 10.1080/09546553.2020.1828701
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1828701
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:8:p:1835-1838



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1828702_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: János Besenyő
Author-X-Name-First: János
Author-X-Name-Last: Besenyő
Title: A Lesser-Known Story: The Secret Operations of SAS’s Rhodesian C Squadron during the Cold War
Journal: Terrorism and Political Violence
Pages: 1839-1846
Issue: 8
Volume: 32
Year: 2020
Month: 11
X-DOI: 10.1080/09546553.2020.1828702
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1828702
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:8:p:1839-1846



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1828703_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Neo-Nazism in Germany and Beyond
Journal: Terrorism and Political Violence
Pages: 1847-1851
Issue: 8
Volume: 32
Year: 2020
Month: 11
X-DOI: 10.1080/09546553.2020.1828703
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1828703
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:8:p:1847-1851



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1828706_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John C. Zimmerman
Author-X-Name-First: John C.
Author-X-Name-Last: Zimmerman
Title: Initiative to Stop the Violence: Sadat’s Assassins and the Renunciation of Political Violence
Journal: Terrorism and Political Violence
Pages: 1852-1853
Issue: 8
Volume: 32
Year: 2020
Month: 11
X-DOI: 10.1080/09546553.2020.1828706
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1828706
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:8:p:1852-1853



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1828707_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sonja Wentling
Author-X-Name-First: Sonja
Author-X-Name-Last: Wentling
Title: Hebrew Fascism in Palestine, 1922-1942
Journal: Terrorism and Political Violence
Pages: 1854-1856
Issue: 8
Volume: 32
Year: 2020
Month: 11
X-DOI: 10.1080/09546553.2020.1828707
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1828707
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:8:p:1854-1856



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1505393_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: Corrigendum
Journal: Terrorism and Political Violence
Pages: 1857-1857
Issue: 8
Volume: 32
Year: 2020
Month: 11
X-DOI: 10.1080/09546553.2018.1505393
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1505393
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:8:p:1857-1857



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1513237_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: Corrigendum
Journal: Terrorism and Political Violence
Pages: 1858-1858
Issue: 8
Volume: 32
Year: 2020
Month: 11
X-DOI: 10.1080/09546553.2018.1513237
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1513237
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:32:y:2020:i:8:p:1858-1858

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1866892_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Max Taylor
Author-X-Name-First: Max
Author-X-Name-Last: Taylor
Title: Jerrold M. Post 1934-2020
Journal: Terrorism and Political Violence
Pages: 1-2
Issue: 1
Volume: 33
Year: 2021
Month: 01
X-DOI: 10.1080/09546553.2020.1866892
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1866892
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:1:p:1-2



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1517087_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jori Breslawski
Author-X-Name-First: Jori
Author-X-Name-Last: Breslawski
Title: In the Spotlight: How International Attention Affects Militant Behavior
Abstract: 
 Why do some militant groups use rhetoric that indicates intentions of democratic governance, while others are silent on these issues, or even clearly oppose them? In this article, I explore militant groups’ desire for external legitimacy, and seek to explain when they are willing to make costly promises to follow liberal norms. I argue that human rights media attention has a significant effect on group behavior. Specifically, militant groups are more likely to use democratic rhetoric when they are “in the spotlight,” which results in a higher likelihood of external legitimacy in exchange for following costly liberal norms. Using the Minorities at Risk Organizational Behavior (MAROB) data for the Middle East, Eastern Europe, and Russia, as well as a historical analysis of three militant groups in Indonesia, I find that militant groups residing in areas that receive a large amount of media attention are more likely to support democratic practices.
Journal: Terrorism and Political Violence
Pages: 3-25
Issue: 1
Volume: 33
Year: 2021
Month: 01
X-DOI: 10.1080/09546553.2018.1517087
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1517087
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:1:p:3-25



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1520700_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kennedy Mkutu
Author-X-Name-First: Kennedy
Author-X-Name-Last: Mkutu
Author-Name: Vincent Opondo
Author-X-Name-First: Vincent
Author-X-Name-Last: Opondo
Title: The Complexity of Radicalization and Recruitment in Kwale, Kenya
Abstract: 
 Al-Shabaab, the East-African affiliate of Al Qaeda has carried out a number of large-scale devastating attacks in the region and a steady stream of smaller scale ones. In recent years Al-Shabaab’s ongoing strength has relied upon its ability to build local support within Kenya. This work looks at Kwale County on Kenya’s coast and examines some of the factors involved in radicalization and/or recruitment into the group, including economic hardship, historical marginalization, land injustices, drugs, problems at the family level and poor relationships with state security agencies. It highlights the more recent phenomenon of those returning from fighting with Al-Shabaab and the problems of their reintegration. It concludes that there are a number of phenomenon related in complex and sometimes self-perpetuating ways which all need to be considered in the response to radicalization and recruitment.
Journal: Terrorism and Political Violence
Pages: 26-48
Issue: 1
Volume: 33
Year: 2021
Month: 01
X-DOI: 10.1080/09546553.2018.1520700
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1520700
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:1:p:26-48



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1520701_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Barbara Manthe
Author-X-Name-First: Barbara
Author-X-Name-Last: Manthe
Title: On the Pathway to Violence: West German Right-Wing Terrorism in the 1970s
Abstract: 
 West German society faced the emergence of a new calibre of right-wing terrorism in the 1970s. Right-wing terrorist groups evolved that showed themselves willing and able to commit violent attacks such as bombings and murder. This article explores the genesis and development of right-wing terrorism in West Germany between 1970 and 1980 while examining 22 identifiable groups and lone actors and taking into consideration the radicalization within the far right as well as the prevailing social conditions. West German right-wing terrorism until 1990 has remained a blind spot in historiography to this day. This article contributes to historical terrorism studies as well as to studies into the far right while applying historical-qualitative methods and interpreting primary sources. Using an approach informed by social history, this paper sheds new light on the individual participants, groups, and networks of right-wing terrorism as well as on its topics and targets. While taking into account a more dynamic definition of right-wing terrorism, this paper disengages from definitions that identify terrorism solely as a threat to the state itself. This makes possible a multidimensional approach employing contemporary history and studies in both terrorism and right-wing extremism.
Journal: Terrorism and Political Violence
Pages: 49-70
Issue: 1
Volume: 33
Year: 2021
Month: 01
X-DOI: 10.1080/09546553.2018.1520701
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1520701
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:1:p:49-70



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1520703_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Peter Wignell
Author-X-Name-First: Peter
Author-X-Name-Last: Wignell
Author-Name: Kevin Chai
Author-X-Name-First: Kevin
Author-X-Name-Last: Chai
Author-Name: Sabine Tan
Author-X-Name-First: Sabine
Author-X-Name-Last: Tan
Author-Name: Kay O’Halloran
Author-X-Name-First: Kay
Author-X-Name-Last: O’Halloran
Author-Name: Rebecca Lange
Author-X-Name-First: Rebecca
Author-X-Name-Last: Lange
Title: Natural Language Understanding and Multimodal Discourse Analysis for Interpreting Extremist Communications and the Re-Use of These Materials Online
Abstract: 
 This paper reports on a study that is part of a project which aims to develop a multimodal analytical approach for big data analytics, initially in the context of violent extremism. The findings reported here tested the application of natural language processing models to the text of a sample of articles from the online magazines Dabiq and Rumiyah, produced by the Islamic extremist organisation ISIS. For comparison, text of articles found by reverse image search software which re-used the lead images from the original articles in text which either reported on or opposed extremist activities was also analysed. The aim was to explore what insights the natural language processing models could provide to distinguish between texts produced as propaganda to incite violent extremism and texts which either reported on or opposed violent extremism. The results showed that some valuable insights can be gained from such an approach and that these results could be improved through integrating automated analyses with a theoretical approach with analysed language and images in their immediate and social contexts. Such an approach will inform the interpretation of results and will be used in training software so that stronger results can be achieved in the future.
Journal: Terrorism and Political Violence
Pages: 71-95
Issue: 1
Volume: 33
Year: 2021
Month: 01
X-DOI: 10.1080/09546553.2018.1520703
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1520703
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:1:p:71-95



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1523150_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alexander Kamprad
Author-X-Name-First: Alexander
Author-X-Name-Last: Kamprad
Author-Name: Marieke Liem
Author-X-Name-First: Marieke
Author-X-Name-Last: Liem
Title: Terror and the Legitimation of Violence: A Cross-National Analysis on the Relationship between Terrorism and Homicide Rates
Abstract: 
 This study investigates the relationship between terrorism and interpersonal violence by conducting cross-national analyses on the effects of terrorism mortality rates on homicide rates. Results show that terrorism appears to be robustly and positively associated with homicide. This finding is based on the calculation of a series of independently pooled and twoways fixed-effects models on a panel that incorporates more than 165 countries over 24 years (1991–2014). The results lend tentative support to the so-called “legitimation-habituation” hypothesis that was formulated in regard to the effects of security-related stress on homicide rates in Israel more than 30 years ago. The topic has been largely neglected ever since. While confirming a positive relationship between terrorism and homicide, this study concludes that a causal influence of terrorism on homicide rates is conceivable, but cannot conclusively be proven within the confines of the research design. Future research on potential mediators of the supposed effect is needed, and data limitations need to be overcome.
Journal: Terrorism and Political Violence
Pages: 96-118
Issue: 1
Volume: 33
Year: 2021
Month: 01
X-DOI: 10.1080/09546553.2018.1523150
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1523150
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:1:p:96-118



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1530661_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Adrian Cherney
Author-X-Name-First: Adrian
Author-X-Name-Last: Cherney
Title: The Release and Community Supervision of Radicalised Offenders: Issues and Challenges that Can Influence Reintegration
Abstract: 
 This paper explores the challenges that correctional authorities encounter when dealing with the transition of offenders back into the community after the completion of terrorism-related sentences or after demonstrating extremist views or associations. It draws on research conducted in the Australian state of New South Wales that examined mechanisms to support radicalised offenders exiting custody and completing a community-based order (i.e., parole). Drawing on interviews (N = 55) conducted with correctional and other agency staff and terrorist inmates and parolees, the paper explores six issues: whether the radicalised cohort is unique in relation to supervision needs; engaging families; information sharing; assessing risk; the implications of the broader environment surrounding terrorism; and professional training and knowledge needs. Qualitative data indicate that radicalised offenders can have similar reintegration needs to mainstream offenders and that family assistance, while important, has some drawbacks. The application of intelligence in the supervision context is highlighted, as well as its limitations. Data illustrate the emerging practices and practical limitations of risk assessment. Results show how the broader social and political environment can influence supervision processes, with topics related to staff training canvassed. Broader lessons for policy and practice on the community supervision and reintegration of radicalised offenders are highlighted.
Journal: Terrorism and Political Violence
Pages: 119-137
Issue: 1
Volume: 33
Year: 2021
Month: 01
X-DOI: 10.1080/09546553.2018.1530661
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1530661
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:1:p:119-137



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1530662_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Mueller
Author-X-Name-First: John
Author-X-Name-Last: Mueller
Author-Name: Mark G. Stewart
Author-X-Name-First: Mark G.
Author-X-Name-Last: Stewart
Title: Terrorism and Bathtubs: Comparing and Assessing the Risks
Abstract: 
 The likelihood that anyone outside a war zone will be killed by an Islamist extremist terrorist is extremely small. In the United States, for example, some six people have perished each year since 9/11 at the hands of such terrorists—vastly smaller than the number of people who die in bathtub drownings. Some argue, however, that the incidence of terrorist destruction is low because counterterrorism measures are so effective. They also contend that terrorism may well become more frequent and destructive in the future as terrorists plot and plan and learn from experience, and that terrorism, unlike bathtubs, provides no benefit and exacts costs far beyond those in the event itself by damagingly sowing fear and anxiety and by requiring policy makers to adopt countermeasures that are costly and excessive. This article finds these arguments to be wanting. In the process, it concludes that terrorism is rare outside war zones because, to a substantial degree, terrorists don’t exist there. In general, as with rare diseases that kill few, it makes more policy sense to expend limited funds on hazards that inflict far more damage. It also discusses the issue of risk communication for this hazard.
Journal: Terrorism and Political Violence
Pages: 138-163
Issue: 1
Volume: 33
Year: 2021
Month: 01
X-DOI: 10.1080/09546553.2018.1530662
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1530662
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:1:p:138-163



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1540982_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Erin M. Kearns
Author-X-Name-First: Erin M.
Author-X-Name-Last: Kearns
Title: When to Take Credit for Terrorism? A Cross-National Examination of Claims and Attributions
Abstract: 
 Rationalist research expects that groups claim credit for terrorism. Yet, the vast majority of attacks are not claimed. Of the unclaimed attacks, about half are attributed to a specific group. What factors impact claiming decisions? While extant literature largely treats claiming as binary—either claimed or not—the present study disaggregates claiming decisions further to also consider attacks with attributions of credit but no claim, using data from 160 countries between 1998 and 2016. Both attack-level and situational factors impact claiming decisions. Disaggregating claiming behavior shows meaningful differences. Specifically, competitive environments and suicide attacks increase claims but not attributions. Higher fatalities in general increase both claims and attributions, but when the target is civilian attributions decrease with a high body count whereas claims increase. Further, while the directional impact of other variables is the same, the magnitude of their effects vary between claims and attributions. Results are robust across modeling specifications. Findings demonstrate that our understanding of claiming behaviors is limited when claiming is treated as dichotomous. This study provides further insight into factors that impact claiming decisions for terrorism. Results can address data issues in academic research and inform counterterrorism responses.
Journal: Terrorism and Political Violence
Pages: 164-193
Issue: 1
Volume: 33
Year: 2021
Month: 01
X-DOI: 10.1080/09546553.2018.1540982
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1540982
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:1:p:164-193



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1864974_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alan K. Dugger
Author-X-Name-First: Alan K.
Author-X-Name-Last: Dugger
Title: Conflagration in These Times: Violence, Order, War
Journal: Terrorism and Political Violence
Pages: 194-201
Issue: 1
Volume: 33
Year: 2021
Month: 01
X-DOI: 10.1080/09546553.2021.1864974
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1864974
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:1:p:194-201



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1864971_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Hannah Wild
Author-X-Name-First: Hannah
Author-X-Name-Last: Wild
Title: Unmasking Boko Haram and The Boko Haram Insurgence in Nigeria: Perspectives from Within
Journal: Terrorism and Political Violence
Pages: 202-204
Issue: 1
Volume: 33
Year: 2021
Month: 01
X-DOI: 10.1080/09546553.2021.1864971
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1864971
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:1:p:202-204



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1864970_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Donald D. Denton
Author-X-Name-First: Donald D.
Author-X-Name-Last: Denton
Title: ANTIFA: The Anti-Fascist Handbook and From Fascism to Populism in History
Journal: Terrorism and Political Violence
Pages: 205-208
Issue: 1
Volume: 33
Year: 2021
Month: 01
X-DOI: 10.1080/09546553.2021.1864970
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1864970
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:1:p:205-208



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1864978_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Martin J. Gallagher
Author-X-Name-First: Martin J.
Author-X-Name-Last: Gallagher
Title: International Case Studies of Terrorist Rehabilitation
Journal: Terrorism and Political Violence
Pages: 209-210
Issue: 1
Volume: 33
Year: 2021
Month: 01
X-DOI: 10.1080/09546553.2021.1864978
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1864978
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:1:p:209-210



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1864976_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: James M. Lutz
Author-X-Name-First: James M.
Author-X-Name-Last: Lutz
Title: Conflict in the Modern Middle East: An Encyclopedia of Civil War, Revolutions and Regime Change
Journal: Terrorism and Political Violence
Pages: 211-212
Issue: 1
Volume: 33
Year: 2021
Month: 01
X-DOI: 10.1080/09546553.2021.1864976
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1864976
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:1:p:211-212



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1864973_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Roger Chapman
Author-X-Name-First: Roger
Author-X-Name-Last: Chapman
Title: Cry Havoc: Charlottesville and American Democracy Under Siege
Journal: Terrorism and Political Violence
Pages: 213-214
Issue: 1
Volume: 33
Year: 2021
Month: 01
X-DOI: 10.1080/09546553.2021.1864973
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1864973
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:1:p:213-214



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1864977_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lucien Frary
Author-X-Name-First: Lucien
Author-X-Name-Last: Frary
Title: Genocide in the Carpathians: War, Social Breakdown and Mass Violence 1914–1945
Journal: Terrorism and Political Violence
Pages: 215-216
Issue: 1
Volume: 33
Year: 2021
Month: 01
X-DOI: 10.1080/09546553.2021.1864977
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1864977
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:1:p:215-216



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1864979_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John C. Zimmerman
Author-X-Name-First: John C.
Author-X-Name-Last: Zimmerman
Title: Jihadism Transformed: Al Qaeda and the Islamic State’s Global Battle of Ideas
Journal: Terrorism and Political Violence
Pages: 217-218
Issue: 1
Volume: 33
Year: 2021
Month: 01
X-DOI: 10.1080/09546553.2021.1864979
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1864979
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:1:p:217-218



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1864972_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marco Gabbas
Author-X-Name-First: Marco
Author-X-Name-Last: Gabbas
Title: Brigate rosse: Dalle fabbriche alla «campagna di primavera». Volume I
Journal: Terrorism and Political Violence
Pages: 219-220
Issue: 1
Volume: 33
Year: 2021
Month: 01
X-DOI: 10.1080/09546553.2021.1864972
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1864972
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:1:p:219-220

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1880226_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marc Sageman
Author-X-Name-First: Marc
Author-X-Name-Last: Sageman
Title: The Implication of Terrorism’s Extremely Low Base Rate
Abstract: 
 A robust empirical finding is that global neojihadi terrorism is extremely rare in Western countries compared to other kinds of violence. Its base rate in the West is about 3 new global neojihadis per 100 million people per year. Bayesian conditional probability shows that this extremely low base rate ensures that any attempt to detect a potential global neojihadi on the basis of imperfectly specific indicators (conditions) will generate a large number of false positives. This finding has practical implications for a preventive counterterrorism strategy based on detection of potential global neojihadi terrorists using these indicators derived from counterterrorism research. Detection instruments based on them produce many false positives, namely overt sympathizers, who, absent state agents’ entrapment, never cross the line to political crime and violence. The state pursuit of false positives not only diverts scarce resources from targeting true threats but also results in unfair harassment, persecution, and even prosecution of these false positives. This paper suggests that, as scholars whose work helps craft these indicators, we have the moral duty to teach state practitioners about this relatively neglected implication of the extremely low base rate of global neojihadi terrorism.
Journal: Terrorism and Political Violence
Pages: 302-311
Issue: 2
Volume: 33
Year: 2021
Month: 02
X-DOI: 10.1080/09546553.2021.1880226
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1880226
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:2:p:302-311



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1747819_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lucia Bird
Author-X-Name-First: Lucia
Author-X-Name-Last: Bird
Title: Nonstate Actors in Intrastate Conflicts
Journal: Terrorism and Political Violence
Pages: 436-437
Issue: 2
Volume: 33
Year: 2021
Month: 02
X-DOI: 10.1080/09546553.2020.1747819
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1747819
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:2:p:436-437



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1883342_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nathaniel L. Moir
Author-X-Name-First: Nathaniel L.
Author-X-Name-Last: Moir
Title: The Dragons and the Snakes: How the Rest Learned to Fight the West
Journal: Terrorism and Political Violence
Pages: 411-418
Issue: 2
Volume: 33
Year: 2021
Month: 02
X-DOI: 10.1080/09546553.2021.1883342
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1883342
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:2:p:411-418



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1880235_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Maura Conway
Author-X-Name-First: Maura
Author-X-Name-Last: Conway
Title: Online Extremism and Terrorism Research Ethics: Researcher Safety, Informed Consent, and the Need for Tailored Guidelines
Abstract: 
 This article reflects on two core issues of human subjects’ research ethics and how they play out for online extremism and terrorism researchers. Medical research ethics, on which social science research ethics are based, centers the protection of research subjects, but what of the protection of researchers? Greater attention to researcher safety, including online security and privacy and mental and emotional wellbeing, is called for herein. Researching hostile or dangerous communities does not, on the other hand, exempt us from our responsibilities to protect our research subjects, which is generally ensured via informed consent. This is complicated in data-intensive research settings, especially with the former type of communities, however. Also grappled with in this article therefore are the pros and cons of waived consent and deception and the allied issue of prevention of harm to subjects in online extremism and terrorism research. The best path forward it is argued—besides talking through the diversity of ethical issues arising in online extremism and terrorism research and committing our thinking and decision-making around them to paper to a much greater extent than we have done to-date—may be development of ethics guidelines tailored to our sub-field.
Journal: Terrorism and Political Violence
Pages: 367-380
Issue: 2
Volume: 33
Year: 2021
Month: 02
X-DOI: 10.1080/09546553.2021.1880235
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1880235
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:2:p:367-380



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1880192_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michele Grossman
Author-X-Name-First: Michele
Author-X-Name-Last: Grossman
Author-Name: Vivian Gerrand
Author-X-Name-First: Vivian
Author-X-Name-Last: Gerrand
Title: Terrorism Confidential: Ethics, Primary Data and the Construction of “Necessary Fictions”
Abstract: 
 Primary human sources involved with or proximate to terrorist actors can provide critical information and insights for understanding terrorist ideologies, behaviors and orientations. Yet accessing and drawing on their knowledge and experience is bound up with a range of constraints and risks. Some of these are practical, but others are either ethical, moral or both. Terrorism research can be constructed as a moral field of enquiry insofar as it proposes to generate scientifically defendable and socially useful knowledge that will help repel or mitigate the personal, social and political harms of terrorism in ways that respect human rights and freedoms. In turn, this potentially positions terrorism researchers as moral agents engaged in knowledge production for the greater collective social and political good. However, assuming the general moral orientation of terrorism researchers does not really help us understand how terrorism researchers navigate moral complexity or moral competition when faced with irreconcilable or asymmetrical ethical frameworks that can come into conflict. Indeed, terrorism researchers can become (drawing on Emmanuel Levinas’s distinction between ethics and morality) caught between “ethical” responsibility for participants on the one hand, and “moral” responsibility for the greater good, on the other. One potential response to this lies in constructing what might be called “necessary fictions” in how we represent our primary human data. However, what look like “necessary fictions” from an ethical standpoint—mitigating the vulnerability of participants through taking ethical responsibility for the others we encounter—can become shaky ground from a moral standpoint when benchmarked against expectations governing facticity and authenticity in social science research. This is a wicked problem for terrorism research: in seeking ethically to minimize vulnerabilities for participants, do such strategies create other and deeper moral vulnerabilities for the field? This paper will attempt to unpack these issues drawing on our own recent research experiences in the field of countering violent extremism.
Journal: Terrorism and Political Violence
Pages: 242-256
Issue: 2
Volume: 33
Year: 2021
Month: 02
X-DOI: 10.1080/09546553.2021.1880192
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1880192
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:2:p:242-256



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1883344_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dianne Dentice
Author-X-Name-First: Dianne
Author-X-Name-Last: Dentice
Title: The Golden Dawn’s “Nationalist Solution”: Explaining the Rise of the Far Right in Greece
Journal: Terrorism and Political Violence
Pages: 419-419
Issue: 2
Volume: 33
Year: 2021
Month: 02
X-DOI: 10.1080/09546553.2021.1883344
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1883344
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:2:p:419-419



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1864981_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ian M. Hartshorn
Author-X-Name-First: Ian M.
Author-X-Name-Last: Hartshorn
Title: Sharia Compliant: A User’s Guide to Hacking Islamic Law
Journal: Terrorism and Political Violence
Pages: 434-435
Issue: 2
Volume: 33
Year: 2021
Month: 02
X-DOI: 10.1080/09546553.2021.1864981
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1864981
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:2:p:434-435



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1883340_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lucien Frary
Author-X-Name-First: Lucien
Author-X-Name-Last: Frary
Title: The Thirty Year Genocide: Turkey’s Destruction of Its Christian Minorities
Journal: Terrorism and Political Violence
Pages: 409-410
Issue: 2
Volume: 33
Year: 2021
Month: 02
X-DOI: 10.1080/09546553.2021.1883340
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1883340
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:2:p:409-410



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1440048_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sabri Sghaier
Author-X-Name-First: Sabri
Author-X-Name-Last: Sghaier
Title: Fear’s Empire: War, Terrorism, and Democracy
Journal: Terrorism and Political Violence
Pages: 438-440
Issue: 2
Volume: 33
Year: 2021
Month: 02
X-DOI: 10.1080/09546553.2018.1440048
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1440048
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:2:p:438-440



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1883351_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael E. Neagle
Author-X-Name-First: Michael E.
Author-X-Name-Last: Neagle
Title: The Shining Path: Love, Madness, and Revolution in the Andes
Journal: Terrorism and Political Violence
Pages: 426-427
Issue: 2
Volume: 33
Year: 2021
Month: 02
X-DOI: 10.1080/09546553.2021.1883351
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1883351
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:2:p:426-427



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1880237_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Annemarie van de Weert
Author-X-Name-First: Annemarie
Author-X-Name-Last: van de Weert
Author-Name: Quirine Eijkman
Author-X-Name-First: Quirine
Author-X-Name-Last: Eijkman
Title: Reconsidering Early Detection in Countering Radicalization by Local Frontline Professionals
Abstract: 
 In recent years, the fight against terrorism and political violence has focused more on anticipating the threats that they pose. Therefore, early detection of ideas by local professionals has become an important part of the preventive approach in countering radicalization. Frontline workers who operate in the arteries of society are encouraged to identify processes toward violent behavior at an early stage. To date, however, little is known about how these professionals take on this screening task at their own discretion. Research from the Netherlands suggests that subjective assessment appears to exist. In this article, we argue that the absence of a clear norm for preliminary judgments affects prejudice or administrative arbitrariness, which may cause side effects due to unjustified profiling.
Journal: Terrorism and Political Violence
Pages: 397-408
Issue: 2
Volume: 33
Year: 2021
Month: 02
X-DOI: 10.1080/09546553.2021.1880237
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1880237
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:2:p:397-408



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1883355_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sam Jackson
Author-X-Name-First: Sam
Author-X-Name-Last: Jackson
Title: The German New Right: AfD, PEGIDA and the Re-Imagining of National Identity
Journal: Terrorism and Political Violence
Pages: 430-431
Issue: 2
Volume: 33
Year: 2021
Month: 02
X-DOI: 10.1080/09546553.2021.1883355
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1883355
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:2:p:430-431



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1880191_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Aaron Y. Zelin
Author-X-Name-First: Aaron Y.
Author-X-Name-Last: Zelin
Title: The Case of Jihadology and the Securitization of Academia
Abstract: 
 This paper goes to the heart of this special issue by exploring the case of the web site, Jihadology, which the author founded and has managed for the past ten-plus years. It explores various issues including why such a site is necessary and/or useful, questions about dissemination and open access, lessons learned about responsibility and interaction with jihadis online, the evolution of the website that has the largest repository of jihadi content, interactions with governments and technology companies and how they viewed and dealt with the website. The paper also explores how the experience gained might help other researchers interested in creating primary source-first websites to assist in their research as well as to the benefit of others in the field. Therefore, this paper aims to shed light not only on this unique case, but also on the moral and ethical questions that have arisen through maintaining the Jihadology website for more than a decade in a time of changing online environments and more recent calls for censorship.
Journal: Terrorism and Political Violence
Pages: 225-241
Issue: 2
Volume: 33
Year: 2021
Month: 02
X-DOI: 10.1080/09546553.2021.1880191
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1880191
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:2:p:225-241



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1883347_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kathleen Webb Tunney
Author-X-Name-First: Kathleen Webb
Author-X-Name-Last: Tunney
Title: Aspects of the New Right-Wing Extremism
Journal: Terrorism and Political Violence
Pages: 422-423
Issue: 2
Volume: 33
Year: 2021
Month: 02
X-DOI: 10.1080/09546553.2021.1883347
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1883347
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:2:p:422-423



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1883356_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Austin C. Doctor
Author-X-Name-First: Austin C.
Author-X-Name-Last: Doctor
Title: Targeting Top Terrorists: Understanding Leadership Removal in Counterterrorism Strategy
Journal: Terrorism and Political Violence
Pages: 432-433
Issue: 2
Volume: 33
Year: 2021
Month: 02
X-DOI: 10.1080/09546553.2021.1883356
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1883356
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:2:p:432-433



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1880239_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Max Taylor
Author-X-Name-First: Max
Author-X-Name-Last: Taylor
Author-Name: John Horgan
Author-X-Name-First: John
Author-X-Name-Last: Horgan
Title: Primum Non Nocere – First Do No Harm
Journal: Terrorism and Political Violence
Pages: 221-224
Issue: 2
Volume: 33
Year: 2021
Month: 02
X-DOI: 10.1080/09546553.2021.1880239
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1880239
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:2:p:221-224



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1883353_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: James M Lutz
Author-X-Name-First: James M
Author-X-Name-Last: Lutz
Title: Transnational Fascism in the Twentieth Century: Spain, Italy and the Global Neo-Fascist Network
Journal: Terrorism and Political Violence
Pages: 428-429
Issue: 2
Volume: 33
Year: 2021
Month: 02
X-DOI: 10.1080/09546553.2021.1883353
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1883353
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:2:p:428-429



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1883348_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John C. Zimmerman
Author-X-Name-First: John C.
Author-X-Name-Last: Zimmerman
Title: European Muslim Anti-Semitism: Why Young Urban Males Say They Don’t Like Jews
Journal: Terrorism and Political Violence
Pages: 424-425
Issue: 2
Volume: 33
Year: 2021
Month: 02
X-DOI: 10.1080/09546553.2021.1883348
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1883348
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:2:p:424-425



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1880228_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Rachel Schmidt
Author-X-Name-First: Rachel
Author-X-Name-Last: Schmidt
Title: When Fieldwork Ends: Navigating Ongoing Contact with Former Insurgents
Abstract: 
 In research on terrorism and political violence, “fieldwork” now means many things. Scholars conduct interviews online, meet former extremists in urban centers, and travel across the globe to interview ex-combatants. But in this world of social media and constant connectivity, it is no longer possible to fully leave the “field.” Complicating matters is that researchers often do not speak openly about the ethical dilemmas they face—both during and after fieldwork—fearing it might damage their credibility. While various scholars have explored the ethical complexities of fieldwork in conflict-affected areas, there has been little discussion in political science on ethical challenges after fieldwork, and even less on how these post-fieldwork experiences are often highly gendered. Once fieldwork is over, what challenges do researchers face, what are researchers’ obligations to participants, and what types of regulations guide this behavior—especially when participants are former violent actors? What are the power dynamics between researchers and participants, how does gender affect these dynamics, and how do these relationships guide future interactions? For example, how do researchers deal with post-fieldwork requests for money or assistance? And how do scholars decide what to publish, and when, if they have received threats, or if threats to their participants change? Based on my experiences conducting over hundred interviews across Colombia, this paper argues that ethical review processes lack adequate consideration of ongoing ethical issues after fieldwork in conflict-affected environments, especially regarding contact with former insurgents. In addition, I argue that the tension between demands for transparency and adequately protecting both participants and researchers creates a disincentive to have open conversations about these dilemmas—especially among junior scholars.
Journal: Terrorism and Political Violence
Pages: 312-323
Issue: 2
Volume: 33
Year: 2021
Month: 02
X-DOI: 10.1080/09546553.2021.1880228
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1880228
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:2:p:312-323



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1880196_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Morrison
Author-X-Name-First: John
Author-X-Name-Last: Morrison
Author-Name: Andrew Silke
Author-X-Name-First: Andrew
Author-X-Name-Last: Silke
Author-Name: Eke McGowan
Author-X-Name-First: Eke
Author-X-Name-Last: McGowan
Title: The Development of the Framework for Research Ethics in Terrorism Studies (FRETS)
Abstract: 
 This article introduces readers to the Framework for Research Ethics in Terrorism Studies (FRETS). FRETS has been developed to assist IRB/HREC chairs and reviewers in completing reviews of terrorism studies ethics proposals, in as objective a manner as possible. The framework consists of a series of yes/no questions for chairs and reviewers to answer before completing their reviews. These questions are divided into six different sections: participant’s right’s, safety and vulnerability; informed consent; confidentiality and anonymity; researcher’s right’s, safety and vulnerability; data storage and security-sensitive materials; and the ethical review process. This framework was developed as a result of critical analysis of the literature in terrorism research and analogous fields.
Journal: Terrorism and Political Violence
Pages: 271-289
Issue: 2
Volume: 33
Year: 2021
Month: 02
X-DOI: 10.1080/09546553.2021.1880196
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1880196
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:2:p:271-289



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1880231_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Neil D. Shortland
Author-X-Name-First: Neil D.
Author-X-Name-Last: Shortland
Author-Name: Nicholas Evans
Author-X-Name-First: Nicholas
Author-X-Name-Last: Evans
Author-Name: John Colautti
Author-X-Name-First: John
Author-X-Name-Last: Colautti
Title: A Public Health Ethics Model of Countering Violent Extremism
Abstract: 
 The term “countering violent extremism” (CVE) refers to a suite of proactive actions to counter efforts by extremists to recruit, radicalize, and mobilize followers to violence, and thus prevent extremist violence from occurring. In this article we explore the ethics of CVE. We begin with a description of CVE, framed within a discussion of the history (and issues) with counter-terrorism efforts post 9/11. We also outline the many and varied techniques and practices that the term CVE describes. We argue that the fundamental ethical tension in many of these forms of CVE is between the purported benefits of addressing the conditions that most likely contribute to recruitment and radicalization by violent extremists; and the potential risks of upstream interventions that might unfairly target communities and individuals or produce counterproductive outcomes. We then mount a defense of CVE on ethical grounds. Drawing from literature in public health ethics, we argue that violent extremism is a “social contagion” that shares relevant features with infectious diseases that motivate arguments for publicly-funded and even enforceable vaccination schedules. CVE is justified, we argue, to the degree it is necessary, effective, proportionate, minimally infringing on individual rights, and subject to public accountability. We assess these criteria and demonstrate that, while there are cases in which CVE is performed in an unjustifiable manner, the practice itself is in principle justified. This article concludes with an applied test of the model on a newly formed CVE program in the United States.
Journal: Terrorism and Political Violence
Pages: 324-337
Issue: 2
Volume: 33
Year: 2021
Month: 02
X-DOI: 10.1080/09546553.2021.1880231
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1880231
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:2:p:324-337



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1880234_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Boaz Ganor
Author-X-Name-First: Boaz
Author-X-Name-Last: Ganor
Title: Targeted Killings: Ethical & Operational Dilemmas
Abstract: 
 The use of targeted killings as a counterterrorism strategy requires a well-calculated decision-making process. While targeted killings can be beneficial for the protection of national security, they might as well result in a “Boomerang Effect,” counterproductively increasing terrorists’ support and motivation to perpetrate other attacks. Which key ethical and operational questions should be asked to evaluate whether it is “worthwhile” to carry out a targeted killing operation? With special emphasis on the Israeli case study, this article draws an ethical paradigm to assess the legality and legitimacy of targeted killings. In addition, it presents six different quantitative and qualitative indexes that reflect potential benefits stemming from a targeted killing activity. These include (1) thwarting attacks; (2) damaging the organization’s activity; (3) morale effect; (4) deterrence; (5) changing the organization’s strategic decisions; and (6) the eradication of the organization. Finally, this “effectiveness model” suggests four criteria to examine the costs of the targeted killing activity over the short, medium and long terms.
Journal: Terrorism and Political Violence
Pages: 353-366
Issue: 2
Volume: 33
Year: 2021
Month: 02
X-DOI: 10.1080/09546553.2021.1880234
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1880234
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:2:p:353-366



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1880225_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David Omand
Author-X-Name-First: David
Author-X-Name-Last: Omand
Title: The Ethical Limits We Should Place on Intelligence Gathering as Part of an Integrated CT Strategy
Abstract: 
 This chapter first describes the importance of secret intelligence in protecting the public from terrorist attacks. The use of intelligence in deriving the strategic aim of the integrated U.K. counter-terrorism strategy, CONTEST, and supporting its delivery is examined. The ethical issues associated with the general practice of secret intelligence are identified by referencing the Just War tradition establishing ethical restraints on armed conflict. Parallels are drawn to derive jus ad intelligentiam and jus in intelligentio ethical concepts to govern the acquisition and use of secret intelligence. The chapter concludes by applying these ideas to the techniques currently in use for counter-terrorism, especially the role of digital intelligence gathering today in helping uncover terrorist networks and frustrate attacks. Specific areas of counterterrorism work that nevertheless continue to raise significant ethical issues are identified.
Journal: Terrorism and Political Violence
Pages: 290-301
Issue: 2
Volume: 33
Year: 2021
Month: 02
X-DOI: 10.1080/09546553.2021.1880225
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1880225
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:2:p:290-301



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1883345_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kristian Alexander
Author-X-Name-First: Kristian
Author-X-Name-Last: Alexander
Title: Returning Islamist Foreign Fighters-Threats and Challenges to the West
Journal: Terrorism and Political Violence
Pages: 420-421
Issue: 2
Volume: 33
Year: 2021
Month: 02
X-DOI: 10.1080/09546553.2021.1883345
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1883345
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:2:p:420-421



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1880233_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Clive Walker
Author-X-Name-First: Clive
Author-X-Name-Last: Walker
Title: Counterterrorism within the Rule of Law? Rhetoric and Reality with Special Reference to the United Kingdom
Abstract: 
 The rule of law remains a hallowed principle even in the unpromising environment of counterterrorism, but failures to live up to rule of law rhetoric must be highlighted. As a result, one might question whether counterterrorism can realistically be conducted wholly in accordance with the rule of law. So, is the rule of law rhetoric or reality? In practice, it remains exceptional for states to resort to express or wide derogations from rule of law standards because of counterterrorism, but notable exceptions in reality undermine the rhetoric of rule of law dominion. By dissecting the rule of law into its constituent components, it is possible to gain a clearer picture of strong and weak points in the rule of law, though no single doctrine, instrument or institution can be found to offer transformational reinforcement. In view of the permanence of counterterrorism, the model required is neither one of accommodation nor an unthinking acceptance of framing ideas such as “the war on terror.” Instead, the rule of law rhetoric demands constant refinement and renewal within the mechanisms of constitutionalism in order to support the reality of rule of law. These precepts will be considered in the context of counterterrorism experiences in the United Kingdom.
Journal: Terrorism and Political Violence
Pages: 338-352
Issue: 2
Volume: 33
Year: 2021
Month: 02
X-DOI: 10.1080/09546553.2021.1880233
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1880233
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:2:p:338-352



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1880159_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Manuel Castro e Almeida
Author-X-Name-First: Manuel Castro e
Author-X-Name-Last: Almeida
Author-Name: Alistair Harris
Author-X-Name-First: Alistair
Author-X-Name-Last: Harris
Title: The Conflict Sensitivity Principle: Can Best Practice in Conflict Research Fill the Ethics Gap in Terrorism and Counterterrorism Research Practice?
Abstract: 
 This article explores how best practice in conflict research can address some of the key gaps and limitations of the terrorism research field with regards to research ethics. It draws from conflict research literature, as well as the authors’ primary research experience in Fragile and Conflict-Affected States (FCAS) and in the policy-oriented field of Preventing and Countering Violent Extremism (P/CVE). The analysis focuses on “conflict sensitivity” and the methodological approaches that have been developed and refined under the framework of that principle, including Systems Conflict Analysis. We seek to demonstrate how the integration of research methods related to conflict sensitivity represents an appropriate and fitting research agenda, through which relevant limitations of terrorism research can be addressed. This research agenda emphasizes, among other aspects, the need for solid primary research grounded in a detailed understanding of the local context, a departure from the narrow understanding of the Do No Harm principle in terrorism research, and a greater awareness about the relationship between research ethics and research methods.
Journal: Terrorism and Political Violence
Pages: 381-396
Issue: 2
Volume: 33
Year: 2021
Month: 02
X-DOI: 10.1080/09546553.2021.1880159
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1880159
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:2:p:381-396



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1880193_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Adam D. Jacobson
Author-X-Name-First: Adam D.
Author-X-Name-Last: Jacobson
Title: Back to the Dark Side: Explaining the CIA’s Repeated Use of Torture
Abstract: 
 Since the CIA’s inception, elements of the Agency have researched, used, and taught interrogation tactics for national security and counterterrorism purposes. These have sometimes constituted torture, cruel, inhuman, or degrading treatment, and ethical violations. Using the lens of Institutional Change Theory and investigating critical junctures in CIA history, this paper shows that a lack of meaningful internal and external oversight and accountability measures can explain the CIA’s recurrent use and propagation of torture and abuse in interrogation. These findings have implications for future counterterrorism interrogation policy, and preventing the use of ineffective, unethical techniques.
Journal: Terrorism and Political Violence
Pages: 257-270
Issue: 2
Volume: 33
Year: 2021
Month: 02
X-DOI: 10.1080/09546553.2021.1880193
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1880193
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:2:p:257-270

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1559836_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Margherita Belgioioso
Author-X-Name-First: Margherita
Author-X-Name-Last: Belgioioso
Author-Name: Stefano Costalli
Author-X-Name-First: Stefano
Author-X-Name-Last: Costalli
Author-Name: Kristian Skrede Gleditsch
Author-X-Name-First: Kristian Skrede
Author-X-Name-Last: Gleditsch
Title: Better the Devil You Know? How Fringe Terrorism Can Induce an Advantage for Moderate Nonviolent Campaigns
Abstract: 
 Fringe terrorism is common during nonviolent campaigns. We examine how this can modify the strategic environment between dissident groups and the state in ways that present both challenges and opportunities to moderate factions. Terrorism is intended to promote violent escalation in a conflict, but we argue that fringe terrorist activities in a nonviolent campaign under certain conditions can induce an advantage for well-organized moderate factions. The risk of escalation following terrorism can give the government more incentives to offer concessions to moderate campaign leaders if the movement can credibly prevent armed escalation. The ability to control and prevent violence is more likely when nonviolent movements have a hierarchical structure and a centralized leadership, as such campaigns are better able to prevent shifts by supporters towards violent fringes. Using new data on terrorist attacks by factions sharing the same overall objectives as ongoing nonviolent campaigns, we show that nonviolent campaigns are more likely to see substantial gains in spite of fringe terrorist activities when a movement has a hierarchical structure and a centralized leadership.
Journal: Terrorism and Political Violence
Pages: 596-615
Issue: 3
Volume: 33
Year: 2021
Month: 04
X-DOI: 10.1080/09546553.2018.1559836
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1559836
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:3:p:596-615



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1909977_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marianna Kármán
Author-X-Name-First: Marianna
Author-X-Name-Last: Kármán
Title: Islamist Party Mobilization: Tunisia’s Ennahda and Algeria’s HMS Compared, 1989–2014
Journal: Terrorism and Political Violence
Pages: 667-668
Issue: 3
Volume: 33
Year: 2021
Month: 04
X-DOI: 10.1080/09546553.2021.1909977
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1909977
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:3:p:667-668



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1559835_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andrey Korotayev
Author-X-Name-First: Andrey
Author-X-Name-Last: Korotayev
Author-Name: Ilya Vaskin
Author-X-Name-First: Ilya
Author-X-Name-Last: Vaskin
Author-Name: Sergey Tsirel
Author-X-Name-First: Sergey
Author-X-Name-Last: Tsirel
Title: Economic Growth, Education, and Terrorism: A Re-Analysis
Abstract: 
 The performed cross-national tests with negative binomial regression models support the presence of a curvilinear relationship between the quantitative expansion of education (measured with mean years of schooling) and terrorist attack intensity. Growth of schooling in the least educationally developed countries is associated with a significant tendency towards the growth of terrorist attack intensity. This tendency remains significant when controlled for income level, type of political regime, unemployment, inequality, and urbanization; wherein the peak of the terrorist attack intensity is observed for a relatively low, but not zero level of the quantitative expansion of formal education (approximately three to six years of schooling). Further growth of schooling in more developed countries is associated with a significant trend toward the decrease of terrorist attack intensity. This tendency remains significant after being controlled for income level, political regime, unemployment, inequality, and urbanization. The most radical decrease is observed for the interval between seven and eight mean years of schooling. In addition, this quantitative analysis indicates the presence of a similar curvilinear relationship between GDP per capita and terrorist attack intensity with a wide peak from $4000 to $14,000. The explanation of a curvilinear relationship between GDP per capita and terrorist activity through mean years of schooling intermediary can only be partial. The regression analysis suggests that the growth of mean years of schooling with economic development of middle and high income countries may really be one of the factors accounting for the decrease of terrorist attacks in countries with GDP per capita growth. However, this regression analysis indicates that a partial role in the explanation of negative correlation between GDP per capita and terrorist attack intensity for middle and high income countries is also played by a lower level of unemployment rate in the high income countries, as well as by a very high share of consolidated democracies and an extremely low share of factional democracies among the high income states. It is especially worth noting that after the introduction of all controls, the coefficient sign for per capita GDP changes from negative to positive, i.e., GDP growth in middle and high income countries after the introduction of controls for inequality, education, unemployment, type of regime, etc. turns out to be a factor of increase rather than decline of the intensity of terrorist activity. On the one hand, this suggests that the negative correlation between per capita GDP and the level of terrorist activity in these countries is actually explained to an extremely high degree by the fact that per capita GDP growth here tends to be accompanied by an increase in the educational level of the population, a decrease in unemployment, a reduction in inequality, a decrease in the number of factional democracies, and an increase in the number of consolidated democracies. On the other hand, the positive sign (with a statistically significant correlation) indicates here that if in the middle and high countries economic growth is not accompanied by an increase in economic equality and education of the population, a decrease in unemployment, a decrease in the number of unstable factional democracies, and an increase in the number of consolidated democracies (that is, if in fact all the fruits of economic growth are captured by the elites, and almost nothing gets from this growth to the commoner population), then such economic growth would tend to lead to an increase in terrorist activity (and not to its reduction).
Journal: Terrorism and Political Violence
Pages: 572-595
Issue: 3
Volume: 33
Year: 2021
Month: 04
X-DOI: 10.1080/09546553.2018.1559835
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1559835
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:3:p:572-595



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1909974_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Thomas Klikauer
Author-X-Name-First: Thomas
Author-X-Name-Last: Klikauer
Author-Name: Norman Simms
Author-X-Name-First: Norman
Author-X-Name-Last: Simms
Title: Revenge of the Losers – the Origins of Right Wing Terrorism in Germany
Journal: Terrorism and Political Violence
Pages: 657-662
Issue: 3
Volume: 33
Year: 2021
Month: 04
X-DOI: 10.1080/09546553.2021.1909974
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1909974
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:3:p:657-662



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1548354_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Saba Hanif
Author-X-Name-First: Saba
Author-X-Name-Last: Hanif
Author-Name: Majid Hassan Ali
Author-X-Name-First: Majid Hassan
Author-X-Name-Last: Ali
Author-Name: Faiza Shaheen
Author-X-Name-First: Faiza
Author-X-Name-Last: Shaheen
Title: Religious Extremism, Religiosity and Sympathy toward the Taliban among Students across Madrassas and Worldly Education Schools in Pakistan
Abstract: 
 The role of religious seminaries (madrassas) and mainstream schools in developing religious extremism and sympathy toward Taliban (the most dangerous militant group in Pakistan) has received little, if any, scholarly attention. This study has empirically investigated the role, if any, played by religious seminaries (madrassas) and mainstream schools in promoting religious extremism, and especially sympathy toward the Taliban. The study compared attitudes among secondary school students, on the one hand, and madrassa students, on the other, and found school type to be a strong predictor of religious extremism. On the whole, madrassa students tend to hold the most extreme views. However, an individual’s religiosity appears to increase the likelihood of them becoming a Taliban sympathizer, meaning that it is religiosity rather than school type that affects sympathy toward the Taliban. The findings of this study are in line with other recent research, namely that education amplifies frustrated ambitions among individuals who then find gratification in taking extremist attitudes and/or actions.
Journal: Terrorism and Political Violence
Pages: 489-504
Issue: 3
Volume: 33
Year: 2021
Month: 04
X-DOI: 10.1080/09546553.2018.1548354
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1548354
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:3:p:489-504



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1548353_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Harrison Akins
Author-X-Name-First: Harrison
Author-X-Name-Last: Akins
Title: Violence on the Home Front: Interstate Rivalry and Pro-Government Militias
Abstract: 
 With an increased focus on the role of pro-government militias in understanding intra-state conflict, scholars have primarily argued that states use militias as a proxy of the government because of low capacity or as a means of avoiding responsibility for violence against civilians. However, states with both high capacity and a willingness to commit violence against civilians have also relied upon pro-government militias in counterinsurgency operations. This paper argues that states involved in enduring interstate rivalries are more likely to use pro-government militias in order to reserve conventional military forces for potential conflict with their rival. Based on a case study of India’s Kashmir insurgency and logit analysis of pro-government militia data from 1981 to 2001, the findings provide empirical support for this theory and are robust to alternative measures and model specifications.
Journal: Terrorism and Political Violence
Pages: 466-488
Issue: 3
Volume: 33
Year: 2021
Month: 04
X-DOI: 10.1080/09546553.2018.1548353
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1548353
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:3:p:466-488



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1909975_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard Bach Jensen
Author-X-Name-First: Richard Bach
Author-X-Name-Last: Jensen
Title: Antifa: The Anti-Fascist Handbook
Journal: Terrorism and Political Violence
Pages: 663-664
Issue: 3
Volume: 33
Year: 2021
Month: 04
X-DOI: 10.1080/09546553.2021.1909975
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1909975
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:3:p:663-664



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1551213_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Thomas J. Holt
Author-X-Name-First: Thomas J.
Author-X-Name-Last: Holt
Author-Name: Mattisen Stonhouse
Author-X-Name-First: Mattisen
Author-X-Name-Last: Stonhouse
Author-Name: Joshua Freilich
Author-X-Name-First: Joshua
Author-X-Name-Last: Freilich
Author-Name: Steven M. Chermak
Author-X-Name-First: Steven M.
Author-X-Name-Last: Chermak
Title: Examining Ideologically Motivated Cyberattacks Performed by Far-Left Groups
Abstract: 
 Over the last two decades, there has been a massive increase in research examining terror and extremist-related violence. Few have considered the extent to which these same groups may engage in attacks against digital infrastructure and the Internet, whether through hacking or other methods. The absence of empirical evidence calls to question the nature and dynamics of cyberattacks performed by extremists and ideologically motivated actors. This study attempted to address this gap in the literature through a qualitative investigation of 26 attacks performed by far-left groups against targets in the UK, US, and Canada from 2000 to 2015. This data was compared to physical attacks documented in the Extremist Crime Database during the same period. The findings demonstrated that there was an increase in cyberattacks during a period of decreased physical violence by far-left groups. Additionally, there was some parity in the targets of far-left groups on- and off-line, with similar motivations to cause harm to or embarrass businesses, government organizations, and individuals. The implications of this study for our understanding of terror and future research were discussed in detail.
Journal: Terrorism and Political Violence
Pages: 527-548
Issue: 3
Volume: 33
Year: 2021
Month: 04
X-DOI: 10.1080/09546553.2018.1551213
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1551213
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:3:p:527-548



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1909973_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: János Besenyő
Author-X-Name-First: János
Author-X-Name-Last: Besenyő
Title: Another Showdown in Western Sahara?
Journal: Terrorism and Political Violence
Pages: 649-656
Issue: 3
Volume: 33
Year: 2021
Month: 04
X-DOI: 10.1080/09546553.2021.1909973
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1909973
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:3:p:649-656



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1566127_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jacob Zenn
Author-X-Name-First: Jacob
Author-X-Name-Last: Zenn
Title: Boko Haram’s Factional Feuds: Internal Extremism and External Interventions
Abstract: 
 This article examines the factions, leadership, and internal organization of Boko Haram, the terrorist group which has operated to devastating effect in parts of northern Nigeria, Niger, Chad, and Cameroon. It finds the group’s leadership has been significantly more centralized than previous literature has acknowledged. The leadership was also extremely ruthless but enforced group cohesion by killing anyone who sought to defect. Group members attempted to defect and depose the leadership in 2012 and 2016 by seeking external interventions from Al Qaeda in the Islamic Maghreb (AQIM) and the Islamic State of Iraq and the Levant (ISIL), respectively. In the first instance Boko Haram’s leadership demonstrated control and influence by forcing defectors back into submission, but in the second instance ISIL-backed militants deposed the leadership in a rebellion and coup. The loyalty to ISIL of jihadist commanders and foot soldiers in Nigeria explains why only the rebellion and coup succeeded in 2016 even though AQIM provided greater material support to the first set of defectors in 2012. This article contributes to research on internal dynamics of Boko Haram, the relationships between Al Qaeda and ISIL and their allied and affiliated organizations, and the costs and benefits of extreme leadership for terrorist groups.
Journal: Terrorism and Political Violence
Pages: 616-648
Issue: 3
Volume: 33
Year: 2021
Month: 04
X-DOI: 10.1080/09546553.2019.1566127
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1566127
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:3:p:616-648



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1544557_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Djallil Lounnas
Author-X-Name-First: Djallil
Author-X-Name-Last: Lounnas
Title: The Shifts in the Jihadi-Salafi Paradigms: From the Peshawar and Jalalabad Paradigms to Those of Idleb and Raqqa
Abstract: 
 This paper, based on numerous interviews conducted with former jihadists, argues that the emergence of the Islamic State, more than an organizational rift, has led to a major paradigm shift within the jihadi organizations. As such we argue that the Al Qaeda salafi jihadi paradigm, i.e., the “Peshawar paradigm,” has gradually evolved over the years, becoming more in phase with the realities of the battlefield and less dogmatic, explaining this organization’s constant resilience in spite of many setbacks and leading to the rise of a new thinking which we call “the Idelb Paradigm.” Conversely, the ISIS jihadi paradigm, which we call “the Raqqa Paradigm,” stems from the Takfiri school of thought. While not new and already present in the 1980s in Afghanistan, the Takfiri school of thought has been gaining momentum over the years and emerged as a major to the Al Qaeda one. This schism is likely to have a long-term effect on the strategies and alliances of the respective affiliates of both Al Qaeda and ISIS.
Journal: Terrorism and Political Violence
Pages: 441-465
Issue: 3
Volume: 33
Year: 2021
Month: 04
X-DOI: 10.1080/09546553.2018.1544557
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1544557
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:3:p:441-465



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1549547_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Chi Zhang
Author-X-Name-First: Chi
Author-X-Name-Last: Zhang
Title: The Double-track System of Terrorism Proscription in China
Abstract: 
 This paper contributes to the debate on terrorism designation and proscription by providing information and analysis on the “double-track” system of terrorism designation and proscription in China. It calls for greater attention to China’s terrorism proscription system as China has increased its engagement in international affairs and became more willing and capable of international cooperation in counterterrorism. The case of China provides important insights from a non-Western perspective into how states function in dealing with the challenge terrorism poses. In particular, it examines China’s efforts in balancing effective counterterrorism and the accountability of the government. Adopting an interpretivist approach based on primarily Chinese-language documents, it traces the development of China’s proscription regime since 2003 to illustrate its evolution from ad-hoc list-making to a more complicated system. Because of the difficulties in collecting information and presenting it as admissible evidence in court, like many other countries, China relies on the executive for terrorism designation and proscription. While the workings of China’s proscription system demonstrates authoritarian characteristics, the development of its proscription regime reveals how it sought to respond to the concerns about the legitimacy of its counterterrorism practice, for example, on issues of due process and presumption of innocence.
Journal: Terrorism and Political Violence
Pages: 505-526
Issue: 3
Volume: 33
Year: 2021
Month: 04
X-DOI: 10.1080/09546553.2018.1549547
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1549547
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:3:p:505-526



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1909976_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Donald D. Denton
Author-X-Name-First: Donald D.
Author-X-Name-Last: Denton
Title: Boko Haram: The History of an African Jihadist Movement
Journal: Terrorism and Political Violence
Pages: 665-666
Issue: 3
Volume: 33
Year: 2021
Month: 04
X-DOI: 10.1080/09546553.2021.1909976
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1909976
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:3:p:665-666



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1557150_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Robert James Downes
Author-X-Name-First: Robert James
Author-X-Name-Last: Downes
Title: Alarming Cargo: Regulation and Control at the UK Border
Abstract: 
 Programme CYCLAMEN was initiated to manage the risk of non-conventional terrorism in the United Kingdom following Al-Qaeda’s attacks against the United States in 2001. Under Programme CYCLAMEN, the UK developed a border monitoring capability to detect and deter the illicit cross-border movement of radiological and nuclear materials by malicious non-state actors. This paper examines the development of border monitoring technologies before and after 9/11 with a focus on Programme CYCLAMEN using two models of state response to terrorism. Under the Control Model, state agencies seek to manage the risk associated with terrorism through disruption of terrorist activities. Under the Regulatory Model, actions are conceptualised as safeguarding public health and safety from various sources of risk including terrorism. The Regulatory Model is found to be dominant before 9/11 but the Control Model dominated thereafter and Programme CYCLAMEN is best understood as emanating from the Control Model. However, earlier action under the Regulatory Model shaped later consideration of this particular border-based protective security measure. This paper explores this shaping process and concludes that the Regulatory Model is under-considered as a model of state response to terrorism.
Journal: Terrorism and Political Violence
Pages: 549-571
Issue: 3
Volume: 33
Year: 2021
Month: 04
X-DOI: 10.1080/09546553.2018.1557150
File-URL: http://hdl.handle.net/10.1080/09546553.2018.1557150
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:3:p:549-571

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1921978_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: János Besenyő
Author-X-Name-First: János
Author-X-Name-Last: Besenyő
Title: Transforming US Intelligence for Irregular War: Task Force 714 in Iraq
Journal: Terrorism and Political Violence
Pages: 882-883
Issue: 4
Volume: 33
Year: 2021
Month: 05
X-DOI: 10.1080/09546553.2021.1921978
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1921978
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:4:p:882-883



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1598385_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Corri Zoli
Author-X-Name-First: Corri
Author-X-Name-Last: Zoli
Author-Name: Aliya Hallie Williams
Author-X-Name-First: Aliya Hallie
Author-X-Name-Last: Williams
Title: ISIS Cohort Transnational Travels and EU Security Gaps: Reconstructing the 2015 Paris Attack Preplanning and Outsource Strategy
Abstract: 
 We explore the underappreciated role of organizational tactics in terrorist violence in an understudied single case: ISIS’s execution of the November 13, 2015 Paris attacks. It is one of the first systemic reconstructions of the journeys made by two ISIS strike cohorts in the coordinated attacks, as teams traveled from the Levant to Europe. In contrast to other high-profile attacks, terrorism scholars have not undertaken a detailed reconstruction of this event, even while open source information is now available. By examining the transnational travels of foreign terrorist fighters, we identify ISIS’s distinctive terrorist outsourcing strategy in which operatives used their experiences to adapt to changing security conditions, while EU governments revealed limited responses. Both elements in this tightly-knit dynamic—terrorist outsourcing savvy using FTFs and EU security policy failures—were necessary to achieve this high-profile attack. The essay contributes to descriptive empirical and theoretical knowledge of terrorist tactical innovation and adaptive operational learning, as these capacities are enhanced by on-the-ground organized networks to increase organizational (versus lone-wolf) campaign success. By using a single case interdisciplinary and exploratory framework, terrorism studies can delve deeper into superficially understood phenomena to isolate concepts with future cross-case value, such as cohorts and tactical adaptation.
Journal: Terrorism and Political Violence
Pages: 806-835
Issue: 4
Volume: 33
Year: 2021
Month: 05
X-DOI: 10.1080/09546553.2019.1598385
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1598385
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:4:p:806-835



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1920239_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marc Sageman
Author-X-Name-First: Marc
Author-X-Name-Last: Sageman
Title: On Recidivism: A Commentary on Altier, Boyle, and Horgan
Abstract: 
 Altier, Boyle, and Horgan claim a 64.6 percent terrorist recidivism rate. However, the unrepresentativeness of their sample, a confusion between the notions of a recidivism base rate and the percentage of recidivists in a sample, and a questionable concept of a global terrorist population undermine their claim.
Journal: Terrorism and Political Violence
Pages: 861-867
Issue: 4
Volume: 33
Year: 2021
Month: 05
X-DOI: 10.1080/09546553.2021.1920239
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1920239
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:4:p:861-867



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1590342_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sivan Hirsch-Hoefler
Author-X-Name-First: Sivan
Author-X-Name-Last: Hirsch-Hoefler
Author-Name: Dana R. Vashdi
Author-X-Name-First: Dana R.
Author-X-Name-Last: Vashdi
Author-Name: Robert D. Lowe
Author-X-Name-First: Robert D.
Author-X-Name-Last: Lowe
Author-Name: Orla Muldoon
Author-X-Name-First: Orla
Author-X-Name-Last: Muldoon
Author-Name: Stevan E. Hobfoll
Author-X-Name-First: Stevan E.
Author-X-Name-Last: Hobfoll
Author-Name: Daphna Canetti
Author-X-Name-First: Daphna
Author-X-Name-Last: Canetti
Title: Status Symmetry Effect: The Association of Exposure and PTS in Israel-Palestine and Northern Ireland
Abstract: 
 A multi-national sample was used to investigate mechanisms that were hypothesized to moderate the relationship between exposure to political violence and symptoms of posttraumatic stress (PTS). We hypothesized that a) the phase of the conflict and b) the status asymmetry of the conflicting parties would moderate the relationship between exposure and PTS symptoms. We used original data from four groups: Israelis and Palestinians (n = 2,572), and Protestants and Catholics in Northern Ireland (n = 343). Looking at these two conflicts, we found that the positive relationship between exposure to violence and posttraumatic stress symptoms ceases to exist in a post-conflict setting (F(1, 2053) = 4.95, p < .05, η2 = 0.002). Interestingly, we found that PTS symptoms were highest among minority group members in an ongoing conflict irrespective of exposure to political violence (F(1, 2053) = 120.74, p < .001,η2 = 0.06). We provide explanations for these findings and discuss their psychological implications for victimized groups and the wider geopolitics of intergroup conflict.
Journal: Terrorism and Political Violence
Pages: 788-805
Issue: 4
Volume: 33
Year: 2021
Month: 05
X-DOI: 10.1080/09546553.2019.1590342
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1590342
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:4:p:788-805



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1921982_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lucien Frary
Author-X-Name-First: Lucien
Author-X-Name-Last: Frary
Title: Fortress Russia: Conspiracy Theories in Post-Soviet Russia
Journal: Terrorism and Political Violence
Pages: 886-887
Issue: 4
Volume: 33
Year: 2021
Month: 05
X-DOI: 10.1080/09546553.2021.1921982
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1921982
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:4:p:886-887



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1585818_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Aaron Anfinson
Author-X-Name-First: Aaron
Author-X-Name-Last: Anfinson
Title: The Treachery of Images: Visualizing “Statehood” as a Tactic for the Legitimization of Non-State Actors
Abstract: 
 This article establishes that visual displays of sovereignty were central to the escalation and projected legitimacy of a violent non-state actor. Contrary to conventional perspectives, it details that the unprecedented appeal of the so-called Islamic State was tied to a visual projection of statehood. Through an innovative methodology, this study conducts a qualitative, affordance-driven analysis of the global visual politics of Dabiq. It details how photographs taken by Islamic State militants and downloaded from a variety of sources online were strategically utilized as “evidence” of the constitutive criteria of statehood: of a permanent population, a defined territory, a government, and the capacity to enter into relations with other states. It demonstrates that this violent non-state actor utilized the affordances of digital visualizing technologies in order to position itself as a viable and competitive alternative to existing nation-states—as both a destination for migration and a legitimate threat to the established political order. This realization has implications for terrorism studies as well as for the visual politics of non-state actors operating in an era of intense mediatization.
Journal: Terrorism and Political Violence
Pages: 720-742
Issue: 4
Volume: 33
Year: 2021
Month: 05
X-DOI: 10.1080/09546553.2019.1585818
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1585818
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:4:p:720-742



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1583216_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Donald Holbrook
Author-X-Name-First: Donald
Author-X-Name-Last: Holbrook
Title: The Terrorism Information Environment: Analysing Terrorists’ Selection of Ideological and Facilitative Media
Abstract: 
 This article studies media material which individuals who planned or carried out acts of terrorism in the United Kingdom between 2004 and 2017 collected before their involvement in these activities concluded. It explores the nature and type of content found, the “levels” of extremities that can be detected in these narratives as well as their source. It identifies repetitions in selection and differences in selection between lone actors and those who operated together in a group. Finally, it traces any temporal changes that emerged over the period under examination.The article presents the subjects’ collection of ideological and facilitative media as reflections of the information environment which was available to them that helped to shape their perspective. It argues that subjects’ selections and choices from a much wider pool of available sources of information represent actions or behaviours that are observable. Moreover, it argues that studying these patterns and dynamics should form an essential part of our understanding of the way in which terrorism features and unfolds in different contexts.
Journal: Terrorism and Political Violence
Pages: 697-719
Issue: 4
Volume: 33
Year: 2021
Month: 05
X-DOI: 10.1080/09546553.2019.1583216
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1583216
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:4:p:697-719



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1923266_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Roger Chapman
Author-X-Name-First: Roger
Author-X-Name-Last: Chapman
Title: Principles of Conflict Economics: The Political Economy of War, Terrorism, Genocide, and Peace
Journal: Terrorism and Political Violence
Pages: 896-897
Issue: 4
Volume: 33
Year: 2021
Month: 05
X-DOI: 10.1080/09546553.2021.1923266
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1923266
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:4:p:896-897



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1923322_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael E. Neagle
Author-X-Name-First: Michael E.
Author-X-Name-Last: Neagle
Title: Why Do Some Civil Wars Not Happen? Peru and Bolivia Compared
Journal: Terrorism and Political Violence
Pages: 898-899
Issue: 4
Volume: 33
Year: 2021
Month: 05
X-DOI: 10.1080/09546553.2021.1923322
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1923322
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:4:p:898-899



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1920241_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mary Beth Altier
Author-X-Name-First: Mary Beth
Author-X-Name-Last: Altier
Author-Name: Emma Leonard Boyle
Author-X-Name-First: Emma Leonard
Author-X-Name-Last: Boyle
Author-Name: John G. Horgan
Author-X-Name-First: John G.
Author-X-Name-Last: Horgan
Title: On Re-engagement and Risk Factors
Journal: Terrorism and Political Violence
Pages: 868-874
Issue: 4
Volume: 33
Year: 2021
Month: 05
X-DOI: 10.1080/09546553.2021.1920241
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1920241
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:4:p:868-874



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1679781_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mary Beth Altier
Author-X-Name-First: Mary Beth
Author-X-Name-Last: Altier
Author-Name: Emma Leonard Boyle
Author-X-Name-First: Emma
Author-X-Name-Last: Leonard Boyle
Author-Name: John G. Horgan
Author-X-Name-First: John G.
Author-X-Name-Last: Horgan
Title: Returning to the Fight: An Empirical Analysis of Terrorist Reengagement and Recidivism
Abstract: 
 Recent interest in terrorist risk assessment and rehabilitation reveals the likelihood and risk factors for terrorist reengagement and recidivism are poorly understood. Informed by advances in criminology, this study develops a series of theoretical starting points and hypotheses. We test our hypotheses using data on 185 terrorist engagement events, drawn from eighty-seven autobiographical accounts, representing over seventy terrorist groups. We find terrorist reengagement and recidivism rates are relatively high in our sample and similar to criminal recidivism rates except in the case of collective, voluntary disengagements when an entire group chooses to disarm. We account for why we observe relatively high rates in this sample. With regard to risk factors, we find terrorists are less likely to reengage as they age. Radical beliefs and connections to associates involved in terrorism increase the likelihood of reengagement. Social achievements (marriage, children, employment) do not commonly serve as protective factors, at least in the short term, when controlling for beliefs and connections. Finally, those from an upper or middle-class childhood family are less likely to reengage.
Journal: Terrorism and Political Violence
Pages: 836-860
Issue: 4
Volume: 33
Year: 2021
Month: 05
X-DOI: 10.1080/09546553.2019.1679781
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1679781
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:4:p:836-860



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1921986_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ioana Emy Matesan
Author-X-Name-First: Ioana Emy
Author-X-Name-Last: Matesan
Title: The Radical’s Journey: How German Neo-Nazis Voyaged to the Edge and Back
Journal: Terrorism and Political Violence
Pages: 888-889
Issue: 4
Volume: 33
Year: 2021
Month: 05
X-DOI: 10.1080/09546553.2021.1921986
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1921986
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:4:p:888-889



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1581614_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ariel Koch
Author-X-Name-First: Ariel
Author-X-Name-Last: Koch
Title: The Non-Jihadi Foreign Fighters: Western Right-Wing and Left-Wing Extremists in Syria
Abstract: 
 The ongoing war in Syria reflects the interesting phenomenon of foreigners flocking to the troubled region to join the combat. While foreign Jihadists joining the fighting ranks of terror organizations such as the Islamic State or Al Qaeda have attracted considerable reporting and research, the flip side of this phenomenon has gone largely unnoticed—that of the foreign anti-ISIS fighters. Although these fighters share a common enemy, adversary on the battlefield, they hold disparate personal ideologies and motives. This article will examine manifestations of foreign anti-ISIS fighters affiliated with both the far right and far left ideologies, in order to contribute to the understanding of this unfamiliar aspect of the war in Syria and its scope, as well as the potential consequences and potential threats it embodies.
Journal: Terrorism and Political Violence
Pages: 669-696
Issue: 4
Volume: 33
Year: 2021
Month: 05
X-DOI: 10.1080/09546553.2019.1581614
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1581614
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:4:p:669-696



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1921976_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: New Approaches to Post-War British Fascism
Journal: Terrorism and Political Violence
Pages: 875-881
Issue: 4
Volume: 33
Year: 2021
Month: 05
X-DOI: 10.1080/09546553.2021.1921976
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1921976
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:4:p:875-881



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1921987_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gabriel Weimann
Author-X-Name-First: Gabriel
Author-X-Name-Last: Weimann
Title: Lone Wolves: The New Terrorism of Right-Wing Single Actors
Journal: Terrorism and Political Violence
Pages: 890-891
Issue: 4
Volume: 33
Year: 2021
Month: 05
X-DOI: 10.1080/09546553.2021.1921987
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1921987
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:4:p:890-891



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1921988_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John C. Zimmerman
Author-X-Name-First: John C.
Author-X-Name-Last: Zimmerman
Title: Jihadi Culture: The Art and Social Practices of Militant Islamists
Journal: Terrorism and Political Violence
Pages: 892-893
Issue: 4
Volume: 33
Year: 2021
Month: 05
X-DOI: 10.1080/09546553.2021.1921988
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1921988
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:4:p:892-893



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1586676_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mattias Wahlström
Author-X-Name-First: Mattias
Author-X-Name-Last: Wahlström
Author-Name: Anton Törnberg
Author-X-Name-First: Anton
Author-X-Name-Last: Törnberg
Title: Social Media Mechanisms for Right-Wing Political Violence in the 21st Century: Discursive Opportunities, Group Dynamics, and Co-Ordination
Abstract: 
 This article maps mechanisms by which online social media activities may contribute to right-wing political violence. High-impact studies on the wave of right-wing and racist violence in the 1990s and early 2000s established that mass media discourse on immigrants and previous violent incidents had a significant influence on the prevalence of radical right violence. This link was captured by Koopmans's and Olzak’s notion of discursive opportunities. However, this was before the dominance of online social networks and social media, which changed the media landscape radically. We argue for broadening and refining the operationalization of the concept of discursive opportunities in social movement studies as well as including in our theoretical models new mechanisms brought about by the new online media. In relation to radical right and anti-immigrant mobilizations in Sweden in the 2010s, we elaborate and exemplify three mechanisms through which activities on social media may affect the incidence of violence: a) having an increasingly co-produced discursive opportunity structure, b) making inter-group dynamics in movement groups and networks trans-local, and c) sharing (rare) practical information and co-ordinating activities.
Journal: Terrorism and Political Violence
Pages: 766-787
Issue: 4
Volume: 33
Year: 2021
Month: 05
X-DOI: 10.1080/09546553.2019.1586676
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1586676
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:4:p:766-787



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1586675_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mitchel Kelly
Author-X-Name-First: Mitchel
Author-X-Name-Last: Kelly
Author-Name: Anthea McCarthy-Jones
Author-X-Name-First: Anthea
Author-X-Name-Last: McCarthy-Jones
Title: Mapping Connections: A Dark Network Analysis of Neojihadism in Australia
Abstract: 
 This article contributes to the growing literature on dark networks through an analysis on the Australian neojihadist network (ANN). Through analysis of Australian terrorist cells, we present a visualisation of the cells’ structures to determine how individuals are connected within each cell and to the wider ANN. A detailed analysis of six separate cells was undertaken to determine the operations, structures, and interactions of individuals within each cell. A visual network is presented to demonstrate how six cells that span a 14-year period form an interconnected network of individuals linked by family and close friendships. The insights gained through the analysis of this dark network sheds light on the origins, evolution, and structure of the ANN and highlight the way in which Australia’s experience with home-grown terrorism has evolved into an interlinked overarching illegal network that transcends both geographical locations and individual operations.
Journal: Terrorism and Political Violence
Pages: 743-765
Issue: 4
Volume: 33
Year: 2021
Month: 05
X-DOI: 10.1080/09546553.2019.1586675
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1586675
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:4:p:743-765



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1921989_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Yaakov Ariel
Author-X-Name-First: Yaakov
Author-X-Name-Last: Ariel
Title: Islam and Nazi Germany’s War
Journal: Terrorism and Political Violence
Pages: 894-895
Issue: 4
Volume: 33
Year: 2021
Month: 05
X-DOI: 10.1080/09546553.2021.1921989
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1921989
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:4:p:894-895



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1921981_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Steven M. Radil
Author-X-Name-First: Steven M.
Author-X-Name-Last: Radil
Title: Triadic Coercion: Israel’s Targeting of States that Host Nonstate Actors
Journal: Terrorism and Political Violence
Pages: 884-885
Issue: 4
Volume: 33
Year: 2021
Month: 05
X-DOI: 10.1080/09546553.2021.1921981
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1921981
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:4:p:884-885

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1939542_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alisa Stack
Author-X-Name-First: Alisa
Author-X-Name-Last: Stack
Title: Insurgent Women: Female Combatants in Civil Wars
Journal: Terrorism and Political Violence
Pages: 1136-1138
Issue: 5
Volume: 33
Year: 2021
Month: 07
X-DOI: 10.1080/09546553.2021.1939542
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1939542
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:5:p:1136-1138



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1939524_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kathleen Webb Tunney
Author-X-Name-First: Kathleen Webb
Author-X-Name-Last: Tunney
Title: Aspects of the New Right-Wing Extremism
Journal: Terrorism and Political Violence
Pages: 1120-1121
Issue: 5
Volume: 33
Year: 2021
Month: 07
X-DOI: 10.1080/09546553.2021.1939524
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1939524
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:5:p:1120-1121



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1598387_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Brecht Volders
Author-X-Name-First: Brecht
Author-X-Name-Last: Volders
Title: Building the Bomb: A Further Exploration of an Organizational Approach to Nuclear Terrorism
Abstract: 
 A terrorist organization constructing and detonating a nuclear device is often a topic of popular, academic, and political concern. Yet, assessing this risk is a challenging task. This article aims to contribute to the encompassing nature of any future nuclear terrorism threat assessments by further exploring the often overlooked organizational dimension in probability assessments on nuclear terrorism. Particular emphasis is given to the role of the organizational design. In order to do so, this article theoretically builds on a 2017 research article and empirically studies Aum Shinrikyo’s chemical and biological armament activities. This article confirms and further refines the idea of an effectiveness-efficiency trade-off for a terrorist organization implementing a nuclear armament project. It particularly zooms in on the constraints that follow from the covert nature of this type of plot and elaborates on the role of Aum Shinrikyo’s value-rationality.
Journal: Terrorism and Political Violence
Pages: 1012-1031
Issue: 5
Volume: 33
Year: 2021
Month: 07
X-DOI: 10.1080/09546553.2019.1598387
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1598387
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:5:p:1012-1031



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1939536_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Martin J. Gallagher
Author-X-Name-First: Martin J.
Author-X-Name-Last: Gallagher
Title: Corruption, Fraud, Organized Crime, and the Shadow Economy
Journal: Terrorism and Political Violence
Pages: 1133-1133
Issue: 5
Volume: 33
Year: 2021
Month: 07
X-DOI: 10.1080/09546553.2021.1939536
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1939536
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:5:p:1133-1133



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1932348_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Leena Malkki
Author-X-Name-First: Leena
Author-X-Name-Last: Malkki
Title: We Have All Been Warned: Public Debate on the Capitol Attack in Finland and Sweden
Abstract: 
 The Capitol attack has provoked intensive debate and reflection far beyond the United States. These debates and their repercussions will be part of the legacy of the event. The article looks at the public debate on the Capitol attack in Finland and Sweden. In both countries, the Capitol attack was interpreted as a warning about the powerful consequences of sowing distrust towards democracy. The attack may inspire far-right actors to attempt to shake the democratic system in these countries too. Whether such mobilisation could succeed and gain support from within the political system seems unlikely, but not entirely impossible.
Journal: Terrorism and Political Violence
Pages: 926-930
Issue: 5
Volume: 33
Year: 2021
Month: 07
X-DOI: 10.1080/09546553.2021.1932348
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1932348
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:5:p:926-930



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1932346_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Beatrice de Graaf
Author-X-Name-First: Beatrice
Author-X-Name-Last: de Graaf
Title: How Contagious Were the Capitol Riots in Europe – In Praxis and in Perception?
Abstract: 
 This contribution presents a short overview on the impact of the Capitol Riots riots in Europe. Fear of a similar mass-mediated contagion was explicitly expressed by most of the European leaders. Echoes and acclamation for the riots in the U.S. were indeed heard on websites, QAnon-sites, and within circles of Trump supporters in Europe as well. An earlier storming of the German Reichstag (in 2020) was cited. In the Netherlands, the curfew riots of 24–25 January 2021 also were put into this context. Security agencies and officials in the U.K. and the Netherlands repeated this threat awareness in recent, formal threat assessments.
Journal: Terrorism and Political Violence
Pages: 922-925
Issue: 5
Volume: 33
Year: 2021
Month: 07
X-DOI: 10.1080/09546553.2021.1932346
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1932346
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:5:p:922-925



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1598386_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: STATEMENT OF REMOVAL
Journal: Terrorism and Political Violence
Pages: 1-1
Issue: 5
Volume: 33
Year: 2021
Month: 07
X-DOI: 10.1080/09546553.2019.1598386
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1598386
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:5:p:1-1



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1939538_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dianne Dentice
Author-X-Name-First: Dianne
Author-X-Name-Last: Dentice
Title: Social Networks as the New Frontier of Terrorism
Journal: Terrorism and Political Violence
Pages: 1134-1135
Issue: 5
Volume: 33
Year: 2021
Month: 07
X-DOI: 10.1080/09546553.2021.1939538
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1939538
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:5:p:1134-1135



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1939526_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Right-Wing Extremism in Canada
Journal: Terrorism and Political Violence
Pages: 1124-1125
Issue: 5
Volume: 33
Year: 2021
Month: 07
X-DOI: 10.1080/09546553.2021.1939526
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1939526
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:5:p:1124-1125



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1598384_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Christopher F. Patane
Author-X-Name-First: Christopher F.
Author-X-Name-Last: Patane
Title: Regime Rhetoric and Protests: How Government Statements Can Repress
Abstract: 
 This paper discusses the role that a regime’s rhetoric—negatively framed public statements directed at domestic targets and audiences—plays in the suppression of protest. Although much work has examined how state repression affects mobilization, this has remained isolated from other repressive strategies. I argue that a regime’s public statements serve as a non-violent alternative to state repression, that they can complement the use of force, and condition the consequences of state repression. This behavior serves to bolster the regime’s public image and rally domestic support, while undermining the complaints of protesters. Relying on a monthly event data analysis, I test the expectation that increased levels of regime rhetoric leads to lower levels of mobilization. Findings indicate that while rhetoric and repression alone increase mobilization, a campaign of regime statements used in conjunction with repression leads to a decrease in protest activity.
Journal: Terrorism and Political Violence
Pages: 951-992
Issue: 5
Volume: 33
Year: 2021
Month: 07
X-DOI: 10.1080/09546553.2019.1598384
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1598384
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:5:p:951-992



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1939533_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeremiah Kitunda
Author-X-Name-First: Jeremiah
Author-X-Name-Last: Kitunda
Title: Making and Unmaking Nations: War, Leadership, and Genocide in Modern Africa
Journal: Terrorism and Political Violence
Pages: 1126-1128
Issue: 5
Volume: 33
Year: 2021
Month: 07
X-DOI: 10.1080/09546553.2021.1939533
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1939533
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:5:p:1126-1128



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1939522_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marc Sageman
Author-X-Name-First: Marc
Author-X-Name-Last: Sageman
Title: The Universal Enemy: Jihad, Empire, and the Challenge of Solidarity
Journal: Terrorism and Political Violence
Pages: 1117-1119
Issue: 5
Volume: 33
Year: 2021
Month: 07
X-DOI: 10.1080/09546553.2021.1939522
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1939522
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:5:p:1117-1119



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1939534_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: János Besenyő
Author-X-Name-First: János
Author-X-Name-Last: Besenyő
Title: Religious Fundamentalism in the Age of Pandemic
Journal: Terrorism and Political Violence
Pages: 1129-1130
Issue: 5
Volume: 33
Year: 2021
Month: 07
X-DOI: 10.1080/09546553.2021.1939534
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1939534
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:5:p:1129-1130



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1939547_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joseph M. Brown
Author-X-Name-First: Joseph M.
Author-X-Name-Last: Brown
Title: Twitter and Tear Gas: The Power and Fragility of Networked Protest
Journal: Terrorism and Political Violence
Pages: 1139-1140
Issue: 5
Volume: 33
Year: 2021
Month: 07
X-DOI: 10.1080/09546553.2021.1939547
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1939547
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:5:p:1139-1140



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1598390_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sara Doering
Author-X-Name-First: Sara
Author-X-Name-Last: Doering
Author-Name: Garth Davies
Author-X-Name-First: Garth
Author-X-Name-Last: Davies
Title: The Contextual Nature of Right-Wing Terrorism across Nations
Abstract: 
 Despite the growing threat of right-wing terrorism as a security concern in many countries, no empirical research has examined the variables that are associated with increases or decreases in right-wing terrorist incidents at a national level of aggregation. The present study examines the applicability of indicators informed by macro-level criminological theories related to immigration, economic conditions, and social demographic composition to the study of right-wing terrorism. A dataset of right-wing terrorist incidents in North America and Western Europe from 1990–2016 was created using secondary sources. Data on indicators related to socioeconomic conditions within countries were retrieved from the World Bank’s World Development Indicator database. The results show that indicators informed by criminological theory are less useful when the analyses are aggregated across countries, but provide more insight when examining relationships within individual countries. Future research should therefore take into consideration each country’s unique social, political, and economic contexts when studying terrorism at a national level.
Journal: Terrorism and Political Violence
Pages: 1071-1093
Issue: 5
Volume: 33
Year: 2021
Month: 07
X-DOI: 10.1080/09546553.2019.1598390
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1598390
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:5:p:1071-1093



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1932342_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeffrey Kaplan
Author-X-Name-First: Jeffrey
Author-X-Name-Last: Kaplan
Title: A Conspiracy of Dunces: Good Americans vs. A Cabal of Satanic Pedophiles?
Abstract: 
 While most observers classified the demonstrators called to Washington by President Trump as denizens of the far right, a closer examination of those arrested for entering the Capitol reveal a strikingly diverse group. Only a small percentage fit the description of members of the radical right. Rather, the most common thread was fealty to the President forged through adherence to QAnon and other conspiratorial beliefs.
Journal: Terrorism and Political Violence
Pages: 917-921
Issue: 5
Volume: 33
Year: 2021
Month: 07
X-DOI: 10.1080/09546553.2021.1932342
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1932342
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:5:p:917-921



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1932337_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Max Taylor
Author-X-Name-First: Max
Author-X-Name-Last: Taylor
Title: Some Preliminary Thoughts Prompted by President Trump’s 6 January Speech: Words, Enemies, Affordances
Abstract: 
 The paper argues that in order to understand the events of 6 January we must look at events from a range of perspectives, two of which are identified—the narrow focus of a comparison of a linguistic analysis of the speech and its context, and the broader social and cultural context of a changing sense of American National Interest. It suggests that to understand the events of 6 January we need to conceptualise them as the product of a complex process where both aggregate and specific influences seem relevant, but whilst both offer necessary explanations neither in themselves provide a sufficient explanation of the event. The concept of affordance is suggested to perhaps provide the glue that may bind these and other influences together to facilitate the violence.
Journal: Terrorism and Political Violence
Pages: 907-911
Issue: 5
Volume: 33
Year: 2021
Month: 07
X-DOI: 10.1080/09546553.2021.1932337
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1932337
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:5:p:907-911



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1598388_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David B. Skillicorn
Author-X-Name-First: David B.
Author-X-Name-Last: Skillicorn
Author-Name: Olivier Walther
Author-X-Name-First: Olivier
Author-X-Name-Last: Walther
Author-Name: Christian Leuprecht
Author-X-Name-First: Christian
Author-X-Name-Last: Leuprecht
Author-Name: Quan Zheng
Author-X-Name-First: Quan
Author-X-Name-Last: Zheng
Title: The Diffusion and Permeability of Political Violence in North and West Africa
Abstract: 
 This article explores the spatial and temporal diffusion of political violence in North and West Africa by endeavoring to represent a group leader's mental landscape as he contemplates strategic targeting. We assume that this representation is a combination of the physical and social geography of the target environment, and the mental and physical cost of following a seemingly random pattern of attacks. Focusing on the distance and time between attacks and taking into consideration the transaction costs that state boundaries impose, we wish to understand what constrains a group leader to attack at a location other than the one that would yield the greatest overt payoff. We leverage functional data from the Armed Conflict Location and Event Data project (ACLED) dataset that catalogs violent extremist incidents in North and West Africa since 1997 to generate a network whose nodes are administrative regions. These nodes are connected by edges of qualitatively different types: undirected edges representing geographic distance, undirected edges incorporating the costs of crossing borders, and directed edges representing consecutive attacks by the same group. We analyze the resulting network using spectral embedding techniques that are able to account fully for the different types of edges. The result is a representation of North and West Africa that depicts its empirical permeability to violence. A better understanding of how location, time, and borders condition attacks enables planning, prepositioning, and response.
Journal: Terrorism and Political Violence
Pages: 1032-1054
Issue: 5
Volume: 33
Year: 2021
Month: 07
X-DOI: 10.1080/09546553.2019.1598388
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1598388
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:5:p:1032-1054



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1939525_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lucien Frary
Author-X-Name-First: Lucien
Author-X-Name-Last: Frary
Title: Russian Cyber Operations: Coding the Boundaries of Conflict
Journal: Terrorism and Political Violence
Pages: 1122-1123
Issue: 5
Volume: 33
Year: 2021
Month: 07
X-DOI: 10.1080/09546553.2021.1939525
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1939525
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:5:p:1122-1123



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1939535_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Katharine Petrich
Author-X-Name-First: Katharine
Author-X-Name-Last: Petrich
Title: Homegrown: ISIS in America
Journal: Terrorism and Political Violence
Pages: 1131-1132
Issue: 5
Volume: 33
Year: 2021
Month: 07
X-DOI: 10.1080/09546553.2021.1939535
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1939535
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:5:p:1131-1132



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1594789_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ofir Hadad
Author-X-Name-First: Ofir
Author-X-Name-Last: Hadad
Title: A Battle of Names: Hamas and Israeli Operations in the Gaza Strip
Abstract: 
 This paper addresses the phenomenon of military operation-naming, that is, the act of giving names to war practices. Based on the four strategies of War Normalizing Discourse theory, I argue that, like nation-states, violent non-state actors also use the tool of naming to disseminate their wartime perceptions and mobilize public opinion for their own interests. Moreover, I argue that in its war-naming efforts the violent non-state actor seeks to defy and undermine the official names of its enemy state, using its own names to expand the physical battlefield to other fields of war and to present itself as an equal and legitimate player. To establish the above arguments, the article presents the case study of Hamas—specifically, the movement’s naming of rounds of fighting against Israel since the beginning of its rule in the Gaza Strip in 2007.
Journal: Terrorism and Political Violence
Pages: 931-950
Issue: 5
Volume: 33
Year: 2021
Month: 07
X-DOI: 10.1080/09546553.2019.1594789
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1594789
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:5:p:931-950



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1598391_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Recep Onursal
Author-X-Name-First: Recep
Author-X-Name-Last: Onursal
Author-Name: Daniel Kirkpatrick
Author-X-Name-First: Daniel
Author-X-Name-Last: Kirkpatrick
Title: Is Extremism the ‘New’ Terrorism? the Convergence of ‘Extremism’ and ‘Terrorism’ in British Parliamentary Discourse
Abstract: 
 That the distinctions between terrorism and extremism have become increasingly blurred is something of a truism, but there has been little systematic analysis of whether this is truly the case nor of its possible implications. This paper argues that there has been a recent convergence between these two concepts in British parliamentary discourse, reproducing the same signifiers and meanings for non-violent extremism as previously existed for terrorism. In doing so, the paper makes a threefold contribution: methodologically through utilising the underdeveloped approach of post-foundationalist discourse analysis (PFDA) and applying it to the field of terrorism studies; empirically through analysing all the discourse in 1,037 British parliamentary debates between 2010 and 2017; theoretically through drawing together post-foundationalism with Bourdieusian practice theory to show that this transformation of discourse has coincided with social practices of informal criminalization targeting non-violent extremism as if it were terrorism. This has important policy implications as it prescribes particular counter-terrorism practices associated with the hegemonic discourse of terrorism which, when extended to extremism, risk alienating, dehumanizing and motivating the very people deemed to be “at risk” of extremism. The paper illustrates these issues through a discussion of their application in the Prevent Strategy for Higher Education.
Journal: Terrorism and Political Violence
Pages: 1094-1116
Issue: 5
Volume: 33
Year: 2021
Month: 07
X-DOI: 10.1080/09546553.2019.1598391
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1598391
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:5:p:1094-1116



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1598389_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daphna Canetti
Author-X-Name-First: Daphna
Author-X-Name-Last: Canetti
Author-Name: Amnon Cavari
Author-X-Name-First: Amnon
Author-X-Name-Last: Cavari
Author-Name: Carmit Rapaport
Author-X-Name-First: Carmit
Author-X-Name-Last: Rapaport
Author-Name: Hadar Shalev
Author-X-Name-First: Hadar
Author-X-Name-Last: Shalev
Author-Name: Stevan E. Hobfoll
Author-X-Name-First: Stevan E.
Author-X-Name-Last: Hobfoll
Title: Individual Exposure to Terror and Political Attitudes: A Physiologically-Based Model of Militancy
Abstract: 
 How does exposure to terrorism affect political attitudes? This paper presents a new individual-level psychobiological model of political attitudes. Using a unique individual-level data of personal exposure to terrorism, a physiological marker of inflammation (CRP) and a psychological measure of perception of threat to an ongoing conflict—the Israel-Palestinian Conflict—we assess the effect of personal exposure to terrorism on militant attitudes concerning the conflict. Our data of physiological (blood samples), psychological, and attitudinal factors were collected in Israel during a military escalation along the Gaza Strip border. The findings reveal that among people personally exposed to terrorism, the perception of threat mediates an association between physiological conditions and militant attitudes. These findings contribute to the emerging literature on the biopolitics of political violence, suggesting a renewed focus on the dynamic interplay between physiological, psychological, and political factors.
Journal: Terrorism and Political Violence
Pages: 1055-1070
Issue: 5
Volume: 33
Year: 2021
Month: 07
X-DOI: 10.1080/09546553.2019.1598389
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1598389
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:5:p:1055-1070



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1932334_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard Bach Jensen
Author-X-Name-First: Richard Bach
Author-X-Name-Last: Jensen
Title: Uncanny Precedent: The March on Rome
Abstract: 
 Trump supporters’ assault on the U.S. Capitol on January 6, 2021, finds an intriguing precedent in Mussolini’s March on Rome in October 1922. This article explores the similarities and differences between the two events and the two leaders and seeks to answer the question of why one was a failure and the other a success.
Journal: Terrorism and Political Violence
Pages: 903-906
Issue: 5
Volume: 33
Year: 2021
Month: 07
X-DOI: 10.1080/09546553.2021.1932334
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1932334
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:5:p:903-906



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1932338_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David C. Rapoport
Author-X-Name-First: David C.
Author-X-Name-Last: Rapoport
Title: The Capitol Attack and the 5th Terrorism Wave
Abstract: 
 The January 6 attack was unique in its target and potential consequences. But the methods employed were common in the 5th Wave where far-right demonstrations became common. They began against President Obama and were then encouraged by President Trump. The article examines those demonstrations, the participants, methods, and the difficulties government forces have had in dealing with them.
Journal: Terrorism and Political Violence
Pages: 912-916
Issue: 5
Volume: 33
Year: 2021
Month: 07
X-DOI: 10.1080/09546553.2021.1932338
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1932338
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:5:p:912-916



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1932336_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeffrey Kaplan
Author-X-Name-First: Jeffrey
Author-X-Name-Last: Kaplan
Title: Introduction to the 6 January Forum
Journal: Terrorism and Political Violence
Pages: 901-902
Issue: 5
Volume: 33
Year: 2021
Month: 07
X-DOI: 10.1080/09546553.2021.1932336
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1932336
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:5:p:901-902

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1608952_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mihai Murariu
Author-X-Name-First: Mihai
Author-X-Name-Last: Murariu
Author-Name: George Anglitoiu
Author-X-Name-First: George
Author-X-Name-Last: Anglitoiu
Title: The Case of Islamic State as a Renovative Totalist Movement
Abstract: 
 This paper uses the concept of totalism to analyze the main features of Islamic State and thus the implications of containing and confronting it and its potential future offshoots. The first part of the paper deals with the origins and concept of totalism, depicting its main features and types. This part begins by briefly showing the main features of totalism, why it must be ultimately differentiated from totalitarianism. The second part of the paper explores the extent to which Islamic State conforms to the model of a renovative totalist movement and why terms such as political religion are unsuited for explaining Islamist and Salafi-Jihadist movements, including Islamic State. Due to the overall direction of its ultimate ideological aims and the way in which it pursues the total reconstruction of public and private life, Islamic State is then found to contain the main features of a militant, renovative totalist movement. Lastly, the paper argues that it is primarily this totalist nature of the movement which, together with total commitment to emulating what it sees as the essential early Islamic traditions and examples, contributes to its long-term resilience even in the face of overwhelming odds and military reversals.
Journal: Terrorism and Political Violence
Pages: 1295-1322
Issue: 6
Volume: 33
Year: 2021
Month: 08
X-DOI: 10.1080/09546553.2019.1608952
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1608952
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:6:p:1295-1322



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1965782_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: János Besenyő
Author-X-Name-First: János
Author-X-Name-Last: Besenyő
Title: Islam as Power - Shi‛i Revivalism in the Oeuvre of Muhammad Husayn Fadlallah
Journal: Terrorism and Political Violence
Pages: 1352-1353
Issue: 6
Volume: 33
Year: 2021
Month: 08
X-DOI: 10.1080/09546553.2021.1965782
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1965782
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:6:p:1352-1353



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1608951_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ramon Van Der Does
Author-X-Name-First: Ramon
Author-X-Name-Last: Van Der Does
Author-Name: Jaroslaw Kantorowicz
Author-X-Name-First: Jaroslaw
Author-X-Name-Last: Kantorowicz
Author-Name: Sanneke Kuipers
Author-X-Name-First: Sanneke
Author-X-Name-Last: Kuipers
Author-Name: Marieke Liem
Author-X-Name-First: Marieke
Author-X-Name-Last: Liem
Title: Does Terrorism Dominate Citizens’ Hearts or Minds? The Relationship between Fear of Terrorism and Trust in Government
Abstract: 
 Terrorism only poses a small risk to people but tends to be a major source of public fear. Through fear, terrorism has far-reaching implications for public governance. In this paper we look at trust in government as a potential mitigating factor of fear of terrorism. We discern between calculative trust, based on analytical assessment of previous and expected future actions, and relational trust, based on emotions and perceived value similarity with government. We find that relational trust decreases fear of terrorism. A similar but less robust negative relationship exists between calculative trust and fear. However, our regression analyses suggest that relational trust, in fact, may mediate the relationship between calculative trust and fear of terrorism. In other words, the more citizens think government is able to prevent terrorist attacks and feel that authorities are doing enough, the more they, in turn, feel that their government shares their values, and the less fearful they are of future terrorist attacks.
Journal: Terrorism and Political Violence
Pages: 1276-1294
Issue: 6
Volume: 33
Year: 2021
Month: 08
X-DOI: 10.1080/09546553.2019.1608951
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1608951
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:6:p:1276-1294



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1608953_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Carol Winkler
Author-X-Name-First: Carol
Author-X-Name-Last: Winkler
Author-Name: Lindsey Dewick
Author-X-Name-First: Lindsey
Author-X-Name-Last: Dewick
Author-Name: Yennhi Luu
Author-X-Name-First: Yennhi
Author-X-Name-Last: Luu
Author-Name: Wojciech Kaczkowski
Author-X-Name-First: Wojciech
Author-X-Name-Last: Kaczkowski
Title: Dynamic/Static Image Use in ISIS’s Media Campaign: An Audience Involvement Strategy for Achieving Goals
Abstract: 
 The rebound of ISIS in the online environment in the aftermath of the coalition force liberation of Mosul and Raqqa has reinvigorated the need to understand the strategic choices of the group’s media campaign. This study explores ISIS’s use of dynamic vs. static imagery, with a particular focus on how the image form helps facilitate the group’s goals. Experimental studies document that the use of dynamic imagery heightens viewer attention, recall, and reaction to visual content, while fMRI studies add that audiences process dynamic still images as imagined movements. Using a content analysis of 3745 images in Dabiq, Rumiyah, and al-Naba’ from July 2014 to September 2018, we found that ISIS relies heavily on dynamic imagery in its print media campaign. The deployment of the visual strategy, however, displays significant variation based on the language of the target audience, the primary message content displayed in the photographs, and level of military force opposition the group is facing when it disseminates magazines and newsletters.
Journal: Terrorism and Political Violence
Pages: 1323-1341
Issue: 6
Volume: 33
Year: 2021
Month: 08
X-DOI: 10.1080/09546553.2019.1608953
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1608953
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:6:p:1323-1341



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1965778_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Isaac Nunoo
Author-X-Name-First: Isaac
Author-X-Name-Last: Nunoo
Title: Boko Haram’s Terrorism and the Nigeria State. Federalism, Politics and Policies, Advances in Africa Economic, Social and Political Development
Journal: Terrorism and Political Violence
Pages: 1349-1351
Issue: 6
Volume: 33
Year: 2021
Month: 08
X-DOI: 10.1080/09546553.2021.1965778
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1965778
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:6:p:1349-1351



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1603145_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nadia Al-Dayel
Author-X-Name-First: Nadia
Author-X-Name-Last: Al-Dayel
Title: “Now Is the Time to Wake Up”: Islamic State’s Narratives of Political Awareness
Abstract: 
 Terrorist organisations are increasingly seeking to attract transnational membership. In particular, the Islamic State proudly displays transnational support in its propaganda. As a result, academics have established that themes of belonging, religious fulfilment, victimhood and utopia are important recruitment devices. This article reveals additional themes that encourage a critical reasoning of the power dynamics in the citizen-state relationship, questioning the strength of religious ideology that is assumed to attract and bind transnational membership. These themes are revealed through an innovative, blended method of critical discourse analysis, interpretivism and securitisation that examines the narratives and influence of the recruitment actor on an international scale. After a review of the Islamic State’s media operations, this method is applied to a prominent video featuring a top recruiter and UN designated terrorist, Australian citizen Neil Christopher Prakash. Then, it details how Prakash’s migration to the Islamic State led to securitisation discourses from both Australia and the U.S., affecting citizen-state relations. It concludes with a discussion on implications, suggesting directions for research on transnational extremist organisations.
Journal: Terrorism and Political Violence
Pages: 1217-1236
Issue: 6
Volume: 33
Year: 2021
Month: 08
X-DOI: 10.1080/09546553.2019.1603145
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1603145
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:6:p:1217-1236



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1598392_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Beverly Powis
Author-X-Name-First: Beverly
Author-X-Name-Last: Powis
Author-Name: Kiran Randhawa
Author-X-Name-First: Kiran
Author-X-Name-Last: Randhawa
Author-Name: Darren Bishopp
Author-X-Name-First: Darren
Author-X-Name-Last: Bishopp
Title: An Examination of the Structural Properties of the Extremism Risk Guidelines (ERG22+): A Structured Formulation Tool for Extremist Offenders
Abstract: 
 This paper explores the construct validity and structural properties of the ERG22+ formulation tool, used in the assessment of risk and need in extremist offenders. The ERG22+ was developed from a clinical perspective, and was based on the small number of case studies and limited research evidence that were available at the time. It suggests three domains relevant to risk, namely Engagement, Intent, and Capability. These were originally offered as a guide to risk formulation within a functional analysis framework, but were not empirically derived. The items within the ERG22+ are scored on ordinal ratings which offers the possibility to develop subscales within the tool, but the conceptual overlap across the domains offered suggests that these would not be empirically reproduced. In this paper the structural properties of the ERG22+ were examined through factor analysis and multidimensional scaling (MDS) to inform the development of measurement scales. The ERG22+ shows promise as a risk and need formulation tool, which could be developed further in light of the findings from this study. Issues of content validity and areas for further development are discussed.
Journal: Terrorism and Political Violence
Pages: 1141-1159
Issue: 6
Volume: 33
Year: 2021
Month: 08
X-DOI: 10.1080/09546553.2019.1598392
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1598392
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:6:p:1141-1159



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1606800_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Robert J. VandenBerg
Author-X-Name-First: Robert J.
Author-X-Name-Last: VandenBerg
Title: Legitimating Extremism: A Taxonomy of Justifications for Political Violence
Abstract: 
 Terrorism is an inherently communicative enterprise in that it attempts to convey messages using violent means. Furthermore, the effective use of rhetoric is fundamental to the sustainment of militant campaigns. Nevertheless, the literature on terrorism currently lacks a comprehensive blueprint for analyzing terrorist discourse. This paper proposes a framework for classifying narrative frames that serve to justify acts of political violence. Drawing on the social movements literature, it utilizes the jihadist organizations Al Qaeda and the self-proclaimed Islamic State as primary examples to show how militants utilize defensive, moralistic, legalistic, imperialistic, and apocalyptic framing to legitimate acts of terrorism. It also demonstrates how these same categories can be applied to extremists animated by ideologies other than jihadism.
Journal: Terrorism and Political Violence
Pages: 1237-1255
Issue: 6
Volume: 33
Year: 2021
Month: 08
X-DOI: 10.1080/09546553.2019.1606800
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1606800
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:6:p:1237-1255



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1965784_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Terrorism and War in Africa
Journal: Terrorism and Political Violence
Pages: 1342-1348
Issue: 6
Volume: 33
Year: 2021
Month: 08
X-DOI: 10.1080/09546553.2021.1965784
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1965784
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:6:p:1342-1348



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1599863_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jennifer Veilleux
Author-X-Name-First: Jennifer
Author-X-Name-Last: Veilleux
Author-Name: Shlomi Dinar
Author-X-Name-First: Shlomi
Author-X-Name-Last: Dinar
Title: A Global Analysis of Water-Related Terrorism, 1970–2016
Abstract: 
 Terrorist organizations destabilize governments through violent and coercive acts that include the use of water resources as a target. Scholars in security studies recognize water as a strategic resource but have yet to systematically quantify and describe how water is used in the case of terrorism. This paper explores this gap at the nexus of the larger fields of terrorism and environmental security by offering methods to codify types of water-related terrorism events. Using the University of Maryland’s Global Terrorism Database, which includes information on terrorist events around the world, and employing aggregate data analysis, we highlight trends over time and space. We found that water-related terrorism is a method of terrorism widespread across most of the world and that water infrastructure is the main target of choice by most terrorist organizations. We identified 675 incidents of water-related terrorism that occurred in seventy-one countries. We identified terrorist organizations with the highest numbers of incidents and transboundary water basins most at risk for water-related terrorism incidents. This collective analysis identifies and codifies the number and type of water-related terrorism incidents that occurred from 1970 to 2016; describes spatial and temporal trends of those incidents; and provides information for decision-makers regarding water-related terrorism targets and associated risk.
Journal: Terrorism and Political Violence
Pages: 1191-1216
Issue: 6
Volume: 33
Year: 2021
Month: 08
X-DOI: 10.1080/09546553.2019.1599863
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1599863
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:6:p:1191-1216



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1965785_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alan Dugger
Author-X-Name-First: Alan
Author-X-Name-Last: Dugger
Title: The Origins and Rise of Dissident Irish Republicanism: The Role and Impact of Organizational Splits
Journal: Terrorism and Political Violence
Pages: 1361-1362
Issue: 6
Volume: 33
Year: 2021
Month: 08
X-DOI: 10.1080/09546553.2021.1965785
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1965785
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:6:p:1361-1362



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1965781_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Donald D. Denton
Author-X-Name-First: Donald D.
Author-X-Name-Last: Denton
Title: The Field of Fight: How We Can Win the Global War Against Radical Islam and Its Allies
Journal: Terrorism and Political Violence
Pages: 1354-1356
Issue: 6
Volume: 33
Year: 2021
Month: 08
X-DOI: 10.1080/09546553.2021.1965781
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1965781
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:6:p:1354-1356



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1606801_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: James A. Piazza
Author-X-Name-First: James A.
Author-X-Name-Last: Piazza
Author-Name: Ahmet Guler
Author-X-Name-First: Ahmet
Author-X-Name-Last: Guler
Title: The Online Caliphate: Internet Usage and ISIS Support in the Arab World
Abstract: 
 Experts argue that the internet has provided expanded opportunities for violent extremist groups to propagandize and recruit. The Islamic State of Iraq and Syria, or ISIS, is an exemplar in that it has heavily invested in an online presence and uses online communities and social media to attract and retain supporters. Does ISIS’s online presence translate into a higher probability that individuals in its target audience will become supporters? In this study we analyze over 6,000 individuals in six Arab countries to find if those that use the internet to follow political news or to express political views are more likely to support ISIS. We find that respondents who get their news online are significantly more likely to support ISIS than those who follow the news on television or print media. Moreover, those who use online fora for political expression are also more likely to express support for ISIS. Indeed, individuals who engage in online political discussion are more likely to support ISIS than those who engage in conventional political activity, though less than those who engage in contentious political behaviors such as attending a political protest. We conclude with a brief discussion of the academic and policy implications of these findings.
Journal: Terrorism and Political Violence
Pages: 1256-1275
Issue: 6
Volume: 33
Year: 2021
Month: 08
X-DOI: 10.1080/09546553.2019.1606801
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1606801
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:6:p:1256-1275



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1965780_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Caspar ten Dam
Author-X-Name-First: Caspar
Author-X-Name-Last: ten Dam
Title: How Socio-Cultural Codes Shaped Violent Mobilization and Pro-Insurgent Support in the Chechen Wars
Journal: Terrorism and Political Violence
Pages: 1357-1360
Issue: 6
Volume: 33
Year: 2021
Month: 08
X-DOI: 10.1080/09546553.2021.1965780
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1965780
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:6:p:1357-1360



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1599862_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gary A. Ackerman
Author-X-Name-First: Gary A.
Author-X-Name-Last: Ackerman
Author-Name: Michael Burnham
Author-X-Name-First: Michael
Author-X-Name-Last: Burnham
Title: Towards a Definition of Terrorist Ideology
Abstract: 
 While conventional wisdom holds that the ideology espoused by a terrorist organization is somehow related to that organization’s actions, the precise nature of the relationship between these phenomena is hotly debated, with scholarship often yielding contrasting empirical results. We argue that one reason for this divergence in viewpoints and research findings is an inadequate understanding of what ideology actually is and how it relates to terrorism. Indeed, the terrorism literature reveals widely disparate uses of the concept of terrorist ideology. This article endeavors to provide a common framework for approaching ideology in the context of terrorism studies by systematically building a new definition of terrorist ideology from first principles. In so doing, we introduce a definition of terrorist ideology that is logically consistent, has robust theoretical underpinnings, and connects the study of ideology within terrorism to broader disciplinary research traditions regarding ideology. This provides a conceptual foundation from which to examine terrorist ideology in an objective, systematic manner and thereby enables terrorism researchers to more productively investigate important outstanding questions, such as which aspects of an ideology are most relevant to violent behavior.
Journal: Terrorism and Political Violence
Pages: 1160-1190
Issue: 6
Volume: 33
Year: 2021
Month: 08
X-DOI: 10.1080/09546553.2019.1599862
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1599862
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:6:p:1160-1190

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1634057_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jasper Van Assche
Author-X-Name-First: Jasper
Author-X-Name-Last: Van Assche
Author-Name: Kim Dierckx
Author-X-Name-First: Kim
Author-X-Name-Last: Dierckx
Title: Attitudes Towards Outgroups Before and After Terror Attacks
Abstract: 
 In light of the recent terrorist attacks in Paris and Brussels, the aim of the current set of studies was to examine if attitudes towards terrorists and—by extension—uninvolved outgroups (i.e., Muslims, refugees, and immigrants) changed before vs. after these attacks. In a Belgian student sample (Study 1a), we investigated the impact of the Paris attacks on various facets of outgroup attitudes: feelings towards terrorists, Muslims, and refugees, immigrant trust, immigrant threat, and immigrant prejudice. The impact of the Brussels attacks was studied in a Belgian convenience sample (Study 1b), specifically focusing on feelings towards refugees, refugee trust, refugee threat, and avoidance of contact with refugees. Results from frequentist and Bayesian analyses in both samples revealed no significant short- and long-term longitudinal changes in outgroup attitudes after both the Paris (Study 1a) and Brussels (Study 1b) attacks. We discuss these findings and connect them to the alleged refugee crisis; another recent event that polarized European societies.
Journal: Terrorism and Political Violence
Pages: 1530-1545
Issue: 7
Volume: 33
Year: 2021
Month: 10
X-DOI: 10.1080/09546553.2019.1634057
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1634057
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:7:p:1530-1545



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1630383_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Helge Holtermann
Author-X-Name-First: Helge
Author-X-Name-Last: Holtermann
Title: Blinding the Elephant: Combat, Information, and Rebel Violence
Abstract: 
 How does combat affect insurgent violence against civilians? Existing studies emphasize the role of combat outcomes, but have not explored the direct effects of various combat events. This article argues that one such event, government attacks on the rebels, has a positive effect on insurgent violence that stems from the logic of guerrilla warfare. In guerrilla wars, government forces tend to rely on informants in finding the insurgents. Their attacks therefore often evince civilian denunciation. To deter future denunciations, the rebels have incentives to subsequently punish the suspected or known denunciator. This argument is probed using detailed original data from Nepal’s Maoist insurgency. A panel analysis shows that government attacks were positively associated with rebel violence against civilians, and especially with violence against suspected informants. Process-tracing evidence further supports the argument, suggesting that the rebels used violence strategically to prevent information leaks and government attacks.
Journal: Terrorism and Political Violence
Pages: 1469-1491
Issue: 7
Volume: 33
Year: 2021
Month: 10
X-DOI: 10.1080/09546553.2019.1630383
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1630383
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:7:p:1469-1491



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1976551_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Violence and Terrorism in East Africa
Journal: Terrorism and Political Violence
Pages: 1581-1585
Issue: 7
Volume: 33
Year: 2021
Month: 10
X-DOI: 10.1080/09546553.2021.1976551
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1976551
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:7:p:1581-1585



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1613983_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Manuel Ricardo Torres-Soriano
Author-X-Name-First: Manuel Ricardo
Author-X-Name-Last: Torres-Soriano
Title: How Do Terrorists Choose Their Targets for an Attack? The View from inside an Independent Cell
Abstract: 
 The present article aims to further our understanding of the process whereby terrorists choose targets for attacks. It offers a case study based on information from a jihadist cell broken up by police in the province of Barcelona, Spain in April 2015 in Operation Caronte. Based on detailed analysis of conversations between cell members, obtained thanks to infiltration by an undercover police officer, it argues that the terrorist brainstorming was informed by four main factors: organizational, contextual, logistical, and geographical. The materialization of the desire to use violence in an attack plan was the dynamic outcome of the way these factors modulated the will of the terrorists.
Journal: Terrorism and Political Violence
Pages: 1363-1377
Issue: 7
Volume: 33
Year: 2021
Month: 10
X-DOI: 10.1080/09546553.2019.1613983
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1613983
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:7:p:1363-1377



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1976538_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Martin J. Gallagher
Author-X-Name-First: Martin J.
Author-X-Name-Last: Gallagher
Title: The Management of Police Specialized Tactical Units
Journal: Terrorism and Political Violence
Pages: 1574-1574
Issue: 7
Volume: 33
Year: 2021
Month: 10
X-DOI: 10.1080/09546553.2021.1976538
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1976538
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:7:p:1574-1574



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1976548_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Blake Whitaker
Author-X-Name-First: Blake
Author-X-Name-Last: Whitaker
Title: The Ulster Tales: A Tribute to Those Who Served 1969–2000
Journal: Terrorism and Political Violence
Pages: 1575-1576
Issue: 7
Volume: 33
Year: 2021
Month: 10
X-DOI: 10.1080/09546553.2021.1976548
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1976548
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:7:p:1575-1576



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1976533_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Key Thinkers of the Radical Right: Behind the New Threat to Liberal Democracy
Journal: Terrorism and Political Violence
Pages: 1579-1580
Issue: 7
Volume: 33
Year: 2021
Month: 10
X-DOI: 10.1080/09546553.2021.1976533
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1976533
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:7:p:1579-1580



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1976539_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Barbara Ann Chotiner
Author-X-Name-First: Barbara Ann
Author-X-Name-Last: Chotiner
Title: The Red Mirror: Putin’s Leadership and Russia’s Insecure Identity
Journal: Terrorism and Political Violence
Pages: 1592-1593
Issue: 7
Volume: 33
Year: 2021
Month: 10
X-DOI: 10.1080/09546553.2021.1976539
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1976539
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:7:p:1592-1593



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1976528_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard English
Author-X-Name-First: Richard
Author-X-Name-Last: English
Title: Avoiding the Terrorist Trap: Why Respect for Human Rights is the Key to Defeating Terrorism
Journal: Terrorism and Political Violence
Pages: 1577-1578
Issue: 7
Volume: 33
Year: 2021
Month: 10
X-DOI: 10.1080/09546553.2021.1976528
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1976528
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:7:p:1577-1578



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1629423_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Elena Bergia
Author-X-Name-First: Elena
Author-X-Name-Last: Bergia
Title: Unexpected Rewards of Political Violence: Republican Ex-Prisoners, Seductive Capital, and the Gendered Nature of Heroism
Abstract: 
 The public debate on politically-motivated violence tends to be dominated by concerns over the societal impact of this type of violence, and the motivations that push individuals to engage in this damaging and dangerous activity. Lesser attention is generally paid to the benefits that political violence may generate for those involved. In this article, I explore one such benefit with reference to the republican armed struggle in Northern Ireland. Using ethnographic data collected in West Belfast and building on Bourdieu’s theory of capital, I introduce the concept of “seductive capital.” Seductive capital was acquired by some male republican volunteers by virtue of their involvement in the armed struggle and the republican prison struggles for political status. Strictly associated with the heroic status of ex-prisoners in nationalist communities, seductive capital could be used upon release to facilitate access to women for occasional encounters or long-term relationships. Unlike male ex-prisoners, female ex-prisoners do not appear to have acquired seductive capital. The article explores the gendered nature of seductive capital in Northern Ireland, showing its connection with anti-colonial traditions, constructs of masculinity and femininity in nationalist discourses, and widespread views on gender that resonate with other social and geographical contexts.
Journal: Terrorism and Political Violence
Pages: 1378-1398
Issue: 7
Volume: 33
Year: 2021
Month: 10
X-DOI: 10.1080/09546553.2019.1629423
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1629423
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:7:p:1378-1398



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1629910_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: C. R. Pennell
Author-X-Name-First: C. R.
Author-X-Name-Last: Pennell
Title: The Algerian State, Islamist Insurgents, and Civilians Caught in Double Jeopardy by the Violence of the Civil War of the 1990s
Abstract: 
 During the Algerian Civil War of the 1990s responsibility for both targeted assassinations of prominent politicians and political activists and largescale massacres was frequently ascribed to both the government and the Islamic insurgents of the GIA. The same was true of the more mundane but much more numerous level of individuals who fell foul of both sides in the conflict and were frequently the targets of both. Using material from the asylum tribunals of several western countries this article describes how the widespread fear among the Algerian population was the result of the strategies of the government and GIA that both sought to intimidate, punish and exact revenge at a personal level leading to a widespread social dislocation.
Journal: Terrorism and Political Violence
Pages: 1447-1468
Issue: 7
Volume: 33
Year: 2021
Month: 10
X-DOI: 10.1080/09546553.2019.1629910
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1629910
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:7:p:1447-1468



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1976537_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anthony N. Celso
Author-X-Name-First: Anthony N.
Author-X-Name-Last: Celso
Title: The ISIS Reader: Milestone Texts of the Islamic State Movement
Journal: Terrorism and Political Violence
Pages: 1567-1568
Issue: 7
Volume: 33
Year: 2021
Month: 10
X-DOI: 10.1080/09546553.2021.1976537
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1976537
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:7:p:1567-1568



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1636035_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Brandon Ives
Author-X-Name-First: Brandon
Author-X-Name-Last: Ives
Title: Ethnic External Support and Rebel Group Splintering
Abstract: 
 What leads some rebel groups to remain cohesive, while others fragment into multiple rebel groups? A growing literature examines the causes behind fragmented non-state actors and movements. Building on this work, this article examines the relationship between a rebel group and its external supporter and focuses on the extent of ethnic links between the two. It advances a novel argument for why rebel groups that receive external support from non-ethnic supporters are more likely to fragment. Using statistical analysis, I examine the relationship between ethnic and non-ethnic external support and fragmentation from 1975 to 2009. I find that an increasing percentage of co-ethnic external support is negatively associated with rebel group fragmentation. Examining variation in the relationship type that rebel groups and external supporters share provides us a fuller understanding of why some rebel groups remain cohesive and why others fragment.
Journal: Terrorism and Political Violence
Pages: 1546-1566
Issue: 7
Volume: 33
Year: 2021
Month: 10
X-DOI: 10.1080/09546553.2019.1636035
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1636035
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:7:p:1546-1566



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1632833_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Peter S. Henne
Author-X-Name-First: Peter S.
Author-X-Name-Last: Henne
Title: Assessing the Impact of the Global War on Terrorism on Terrorism Threats in Muslim Countries
Abstract: 
 After the 9/11 terrorist attacks, the United States called on Muslims to join it in its struggle against the attacks’ perpetrator, Al Qaeda (AQ). U.S. officials argued that Muslim states’ participation in these efforts could help the United States defeat AQ, but it could also benefit the states themselves by undermining the threat they faced from terrorism. As we are now over ten years out from the beginning of this global war on terrorism, it is possible to both ask and answer the question posed by U.S. demands: did it work? That is, did majority-Muslim states who implemented counterterrorism policies in line with America’s counterterrorism priorities benefit from this, through a reduction in the threat of terrorism? In this article, I argue that Muslim states that adopted policies in line with US priorities would accomplish their primary goal: disrupting Al Qaeda’s ability to carry out attacks. I use a quantitative analysis to demonstrate that states implementing the counterterrorism policies preferred by the United States experienced significantly fewer deaths from terrorist attacks than those that did not. These findings can contribute to debates over the global war on terrorism, as well as broad debates on effective counterterrorism and counterinsurgency tactics.
Journal: Terrorism and Political Violence
Pages: 1511-1529
Issue: 7
Volume: 33
Year: 2021
Month: 10
X-DOI: 10.1080/09546553.2019.1632833
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1632833
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:7:p:1511-1529



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1629909_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jade Hutchinson
Author-X-Name-First: Jade
Author-X-Name-Last: Hutchinson
Title: The New-Far-Right Movement in Australia
Abstract: 
 Australia is becoming a growing hotbed for far-right extremism given the rapid proliferation of far-right groups and mainstreaming of extremist thought. Radical Islamist violence within the region has fuelled far-right ultra-nationalistic hatred of Islam and Muslims. Newer far-right groups are increasingly heterogeneous, anti-Muslim and understand the influential power of media to further their narratives. As such, far-right ideology becomes more mainstream and Islamophobia rises in social and political domains. Australia’s newer far-right groups forward their notion of “Australian” identity that they claim is under siege from what they perceive as an encroaching dominance of Islam and Muslims in Australia. This article will explore the ideological landscape of such far-right ultra-nationalist extremist groups and how these narratives normalise hatred against Muslims. I contend that it is the expansion of the far-right identity to include multi-ethnic ultra-nationalists, the manipulation of meta-narratives of “Australian values” in both the social and mainstream media, and the dichotomous notion of “good” and “evil” based on religious-racial politics, that has helped to radicalise the new Australian far-right ultra-nationalist groups against Muslims.
Journal: Terrorism and Political Violence
Pages: 1424-1446
Issue: 7
Volume: 33
Year: 2021
Month: 10
X-DOI: 10.1080/09546553.2019.1629909
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1629909
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:7:p:1424-1446



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1976532_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John C. Zimmerman
Author-X-Name-First: John C.
Author-X-Name-Last: Zimmerman
Title: Islamist Terrorism in Europe: A History
Journal: Terrorism and Political Violence
Pages: 1590-1591
Issue: 7
Volume: 33
Year: 2021
Month: 10
X-DOI: 10.1080/09546553.2021.1976532
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1976532
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:7:p:1590-1591



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1977564_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nadia Al-Dayel
Author-X-Name-First: Nadia
Author-X-Name-Last: Al-Dayel
Author-Name: Aaron Anfinson
Author-X-Name-First: Aaron
Author-X-Name-Last: Anfinson
Title: Iraq After ISIS: The Challenges of Post-war Recovery
Journal: Terrorism and Political Violence
Pages: 1571-1573
Issue: 7
Volume: 33
Year: 2021
Month: 10
X-DOI: 10.1080/09546553.2021.1977564
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1977564
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:7:p:1571-1573



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1976534_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Padraic Kennedy
Author-X-Name-First: Padraic
Author-X-Name-Last: Kennedy
Title: One Man’s Terrorist: A Political History of the IRA
Journal: Terrorism and Political Violence
Pages: 1586-1587
Issue: 7
Volume: 33
Year: 2021
Month: 10
X-DOI: 10.1080/09546553.2021.1976534
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1976534
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:7:p:1586-1587



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1976536_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ben Farrer
Author-X-Name-First: Ben
Author-X-Name-Last: Farrer
Title: The Ecocentrists: A History of Radical Environmentalism
Journal: Terrorism and Political Violence
Pages: 1588-1589
Issue: 7
Volume: 33
Year: 2021
Month: 10
X-DOI: 10.1080/09546553.2021.1976536
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1976536
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:7:p:1588-1589



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1613984_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jesse J. Norris
Author-X-Name-First: Jesse J.
Author-X-Name-Last: Norris
Title: Another Form of American Exceptionalism? A Comparative Analysis of Terrorism Sting Operations in the US and Abroad
Abstract: 
 Sting operations can potentially thwart terrorist plots, but could also threaten civil liberties and alienate communities, making them a critical subject for counterterrorism research. Yet despite considerable research on U.S. cases, little is known about terrorism stings elsewhere. How common are such cases abroad, and how many feature strong entrapment claims or result in entrapment-related acquittals? In this study, data are gathered about non-U.S. terrorism stings, each of which is evaluated for entrapment indicators. Results show that, contrary to claims of American exceptionalism, terrorism stings could be identified in twenty-one countries, and the average number of entrapment indicators per case is similar between the U.S. and several countries. In addition, several non-U.S. cases present entrapment claims as strong as some of the most-criticized U.S. cases. However, relatively few non-U.S. terrorism stings (fifty-one) could be identified, while there are 156 U.S. cases. In addition, unlike in the U.S., courts have acquitted defendants on entrapment grounds in a high proportion of non-U.S. cases. Political, cultural, and legal differences between the U.S. and other countries, and certain cross-national commonalities, are identified as likely accounting for these results. Potential implications of these findings for terrorism prevention and legal reform are considered.
Journal: Terrorism and Political Violence
Pages: 1399-1423
Issue: 7
Volume: 33
Year: 2021
Month: 10
X-DOI: 10.1080/09546553.2019.1613984
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1613984
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:7:p:1399-1423



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1976529_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Homegrown: ISIS in America
Journal: Terrorism and Political Violence
Pages: 1569-1570
Issue: 7
Volume: 33
Year: 2021
Month: 10
X-DOI: 10.1080/09546553.2021.1976529
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1976529
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:7:p:1569-1570



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1632199_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael E. Neagle
Author-X-Name-First: Michael E.
Author-X-Name-Last: Neagle
Title: A Bandit Worth Hunting: Pancho Villa and America’s War on Terror in Mexico, 1916-1917
Abstract: 
 The September 11, 2001, attacks were not the first time that a private, foreign group attacked the United States mainland. Although not referred to as an act of “terrorism” at the time, the March 1916 raid of Francisco “Pancho” Villa and his men on Columbus, New Mexico, was understood by Americans of the early-twentieth century in much the same way. The discourse of the “bandit,” as Villa was widely described at the time, connoted many of the same meanings that we ascribe to terrorists in the twenty-first century ⁠— criminality, incivility, and illegitimacy. This rhetoric served to dehumanize Villa and justified U.S. incursions on Mexican sovereignty in its fruitless pursuit of him and his militia. Moreover, Villa’s political motivations for the attack reflect a modern understanding of terrorism. He sought revenge against the Woodrow Wilson administration for withdrawing its support of him during the Mexican Revolution and tried to goad the United States and Mexico into a wider war. His brief invasion nearly succeeded in bringing about his desired result. American understandings and approaches to Villa mirror many of the same strategies that have been used in the modern war on terror.
Journal: Terrorism and Political Violence
Pages: 1492-1510
Issue: 7
Volume: 33
Year: 2021
Month: 10
X-DOI: 10.1080/09546553.2019.1632199
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1632199
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:7:p:1492-1510

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1647175_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeanine de Roy van Zuijdewijn
Author-X-Name-First: Jeanine
Author-X-Name-Last: de Roy van Zuijdewijn
Author-Name: Jessica Sciarone
Author-X-Name-First: Jessica
Author-X-Name-Last: Sciarone
Title: Convergence of the Salience of Terrorism in the European Union Before and After Terrorist Attacks
Abstract: 
 Many European countries have been the target of jihadist terrorist attacks between 2015 and 2017. While the chance of becoming a victim of a terrorist attack is low, terrorism scholars have emphasized that terrorism does not revolve around statistics and casualty numbers. Terrorists use attacks to reach an audience and affect groups beyond the direct victims. To this date, little is known about how terrorist attacks might affect the salience of terrorism beyond national borders. This paper investigates possible convergence of issue salience of terrorism among citizens within the European Union for ten jihadist attacks in the period 2015–2017 using Eurobarometer survey data. The results indicate that it is not simply a question of convergence or divergence of salience of terrorism after a terrorist attack. The connection is multidirectional and depending upon a variety of factors. Most importantly, we observed convergence on the EU-level, but divergence on the national level. This raises important questions about the transnationality of the effects of terrorism. As this research does not test nor find a causal mechanism and is solely dependent on existing data, further research is necessary to test some of its findings.
Journal: Terrorism and Political Violence
Pages: 1713-1732
Issue: 8
Volume: 33
Year: 2021
Month: 11
X-DOI: 10.1080/09546553.2019.1647175
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1647175
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:8:p:1713-1732



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2000240_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Juliana Geran Pilon
Author-X-Name-First: Juliana
Author-X-Name-Last: Geran Pilon
Title: You Say You Want a Revolution? Radical Idealism and Its Tragic Consequences
Journal: Terrorism and Political Violence
Pages: 1818-1819
Issue: 8
Volume: 33
Year: 2021
Month: 11
X-DOI: 10.1080/09546553.2021.2000240
File-URL: http://hdl.handle.net/10.1080/09546553.2021.2000240
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:8:p:1818-1819



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2000214_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nichola E. J. Rew
Author-X-Name-First: Nichola E. J.
Author-X-Name-Last: Rew
Title: A New Counterterrorism Strategy: Why the World Failed to Stop Al Qaeda and ISIS/ISIL, and How to Defeat Terrorists
Journal: Terrorism and Political Violence
Pages: 1815-1817
Issue: 8
Volume: 33
Year: 2021
Month: 11
X-DOI: 10.1080/09546553.2021.2000214
File-URL: http://hdl.handle.net/10.1080/09546553.2021.2000214
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:8:p:1815-1817



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2000215_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gabor Sinko
Author-X-Name-First: Gabor
Author-X-Name-Last: Sinko
Title: Counter Jihad: America’s Military Experience in Afghanistan, Iraq, and Syria
Journal: Terrorism and Political Violence
Pages: 1812-1814
Issue: 8
Volume: 33
Year: 2021
Month: 11
X-DOI: 10.1080/09546553.2021.2000215
File-URL: http://hdl.handle.net/10.1080/09546553.2021.2000215
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:8:p:1812-1814



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2000216_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Attila Gulyass
Author-X-Name-First: Attila
Author-X-Name-Last: Gulyass
Title: Dark Web Investigation
Journal: Terrorism and Political Violence
Pages: 1807-1809
Issue: 8
Volume: 33
Year: 2021
Month: 11
X-DOI: 10.1080/09546553.2021.2000216
File-URL: http://hdl.handle.net/10.1080/09546553.2021.2000216
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:8:p:1807-1809



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1657097_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marta Sara Stempień
Author-X-Name-First: Marta Sara
Author-X-Name-Last: Stempień
Title: Russia in the Eyes of Islamic State: An Analysis of the Content of Dabiq and Rumiyah Magazines and Russia’s Involvement in the Fight against the Islamic State
Abstract: 
 This paper analyzes a large content of the Islamic State (IS) English-language magazines Dabiq (fifteen issues, 2014–2016) and Rumiyah (13 issues, 2016–2017), which represent the largest text sample of IS propaganda prepared for English-speaking recipients. The author attempts to understand the propaganda methods and leading themes related to Russia exploited in the magazine. Research confirmed strong, omnipresent religious dualism between “believing” and “disbelieving” applied to non-religious entities, seen by Islamic State as enemies. Thus, military opponents, such as Russia are labeled with words such as Crusaders or unbelievers, while self-proclaimed caliphate is portrayed as the last Muslim bastion against the invaders. This article attempts to fill a gap in research on the Islamic State’s propaganda methods used in its flagship online magazines. Its major objective is to discover and understand the Islamic State’s approach to one of its biggest enemies—the Russian Federation. In order to reach this goal, quantitative and qualitative content analysis is used.
Journal: Terrorism and Political Violence
Pages: 1752-1774
Issue: 8
Volume: 33
Year: 2021
Month: 11
X-DOI: 10.1080/09546553.2019.1657097
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1657097
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:8:p:1752-1774



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2000236_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John C. Zimmerman
Author-X-Name-First: John C.
Author-X-Name-Last: Zimmerman
Title: Sword and Scimitar: Fourteen Centuries of War Between Islam and the West
Journal: Terrorism and Political Violence
Pages: 1824-1825
Issue: 8
Volume: 33
Year: 2021
Month: 11
X-DOI: 10.1080/09546553.2021.2000236
File-URL: http://hdl.handle.net/10.1080/09546553.2021.2000236
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:8:p:1824-1825



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1635121_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Zoey Reeve
Author-X-Name-First: Zoey
Author-X-Name-Last: Reeve
Title: Terrorism as Parochial Altruism: Experimental Evidence
Abstract: 
 Drawing on the evolutionary approach, this paper proposes that certain universal cognitive mechanisms (parochial altruism) underlie engagement and involvement in terrorism. Parochial altruism is the tendency to perceive and behave in ways that favour ingroups and disfavour outgroups in light of particular intergroup cues, whilst incurring some kind of personal cost in order to effect that bias. New data is generated by implementing an experiment and using a student sample to investigate certain features of parochial altruism. Findings indicate that sensitivity to parochial altruism varies across individuals, according to sex, group size, and feelings of vulnerability. Some individuals are more sensitive to perceiving and responding to threatening outgroups, which is relevant to the radicalisation process. It is proposed that in certain conditions, such as the presence of radicalisation risk factors, those most sensitive to parochial altruism may be more open to perceptions of threat to the ingroup, extremist ideology, and more likely to engage in violent actions than others.
Journal: Terrorism and Political Violence
Pages: 1643-1666
Issue: 8
Volume: 33
Year: 2021
Month: 11
X-DOI: 10.1080/09546553.2019.1635121
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1635121
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:8:p:1643-1666



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2000238_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Danielle N. Lussier
Author-X-Name-First: Danielle N.
Author-X-Name-Last: Lussier
Title: The Violence Pendulum: Tactical Change in Islamist Groups in Egypt and Indonesia
Journal: Terrorism and Political Violence
Pages: 1822-1823
Issue: 8
Volume: 33
Year: 2021
Month: 11
X-DOI: 10.1080/09546553.2021.2000238
File-URL: http://hdl.handle.net/10.1080/09546553.2021.2000238
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:8:p:1822-1823



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1656613_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Leonie B. Jackson
Author-X-Name-First: Leonie B.
Author-X-Name-Last: Jackson
Title: Framing British ‘Jihadi Brides’: Metaphor and the Social Construction of I.S. Women
Abstract: 
 This article considers how mainstream newspapers metaphorically represented the British “jihadi brides”, women and girls who travelled to Syria to live in the self-declared “Islamic State” (I.S.). Based on an analysis of 365 articles published between 2013 and 2018, the article demonstrates that three frequently occurring metaphors contributed to the construction of these women and I.S. in general, representing them as natural, biological and supernatural forces. These metaphors served to convert a new phenomenon into a knowable form, but in doing so evoked homogenizing and dehumanizing representations that structured the scope of possibilities for responding to the problem of the “brides”. Ultimately, these social constructions had material consequences, as demonstrated by the mood of indifference among policy-makers to the fate of British I.S. fighters and their families following the fall of the “caliphate”.
Journal: Terrorism and Political Violence
Pages: 1733-1751
Issue: 8
Volume: 33
Year: 2021
Month: 11
X-DOI: 10.1080/09546553.2019.1656613
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1656613
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:8:p:1733-1751



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2000237_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel Rickenbacher
Author-X-Name-First: Daniel
Author-X-Name-Last: Rickenbacher
Title: The Origins of International Counterterrorism: Switzerland at the Forefront of Crisis Negotiations, Multilateral Diplomacy, and Intelligence Cooperation (1969-1977)
Journal: Terrorism and Political Violence
Pages: 1804-1806
Issue: 8
Volume: 33
Year: 2021
Month: 11
X-DOI: 10.1080/09546553.2021.2000237
File-URL: http://hdl.handle.net/10.1080/09546553.2021.2000237
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:8:p:1804-1806



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2000223_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Luigi Lonardo
Author-X-Name-First: Luigi
Author-X-Name-Last: Lonardo
Title: Power to the People. How Open Technological Innovation is Arming Tomorrow’s Terrorists
Journal: Terrorism and Political Violence
Pages: 1820-1821
Issue: 8
Volume: 33
Year: 2021
Month: 11
X-DOI: 10.1080/09546553.2021.2000223
File-URL: http://hdl.handle.net/10.1080/09546553.2021.2000223
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:8:p:1820-1821



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1657844_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bahar Baser
Author-X-Name-First: Bahar
Author-X-Name-Last: Baser
Author-Name: Alpaslan Ozerdem
Author-X-Name-First: Alpaslan
Author-X-Name-Last: Ozerdem
Title: Conflict Transformation and Asymmetric Conflicts: A Critique of the Failed Turkish-Kurdish Peace Process
Abstract: 
 In this article, we examine the dynamics of the Kurdish-Turkish peace process that collapsed in the summer of 2015. The negotiations began when the conflict reached a certain level of ripeness, one that made it possible for both sides to entertain the possibility of compromise on various taboo issues. However, in the face of both domestic and international developments, the process came to an abrupt halt. This article argues that the main reason the process stalled was because it was built from the start around the idea of “resolution” rather than “transformation,” a concept better suited to responding to highly fluid asymmetric conflicts.
Journal: Terrorism and Political Violence
Pages: 1775-1796
Issue: 8
Volume: 33
Year: 2021
Month: 11
X-DOI: 10.1080/09546553.2019.1657844
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1657844
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:8:p:1775-1796



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1642199_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Arif Sahar
Author-X-Name-First: Arif
Author-X-Name-Last: Sahar
Author-Name: Aqila Sahar
Author-X-Name-First: Aqila
Author-X-Name-Last: Sahar
Title: Ethnic Politics and Political Violence in Post-2001 Afghanistan: The 2014 Presidential Election
Abstract: 
 This article evaluates the political dynamics of the 2014 presidential election to explore the sense of nationhood that could have formed in post-2001 Afghanistan and to gauge its strength. It examines frontrunner candidates – Mohammad Ashraf Ghani and Abdullah Abdullah’s – campaign rhetoric and processes they utilized to manipulate ethnic identities for political ends. Ethnic identities sharpened by ideological and political polarisation during the civil war (1978–2001), continue to play a critical part in the political economy dynamics of post-2001 era. With the popular patriotic idea of citizenship remaining weak, the abundance of ethnic identities provides a paradigm around which power contenders articulate messages that easily feed into popular perceptions of “us” and “other”. The article contextualizes representative and consociational democracy exploring whether these models of democracy offer any solution to social cleavages in Afghanistan. It argues that elites’ manipulation of ethnic identities and distribution of resources through ethnic shares (Bonn Conference 2001, National Unity Government (NUG) 2014) might reinforce ethnic boundaries, leading to deeper consolidation of ethnic divisions.
Journal: Terrorism and Political Violence
Pages: 1692-1712
Issue: 8
Volume: 33
Year: 2021
Month: 11
X-DOI: 10.1080/09546553.2019.1642199
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1642199
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:8:p:1692-1712



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1634559_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Zoey Reeve
Author-X-Name-First: Zoey
Author-X-Name-Last: Reeve
Title: Engaging with Online Extremist Material: Experimental Evidence
Abstract: 
 Despite calls from governments to clamp down on violent extremist material in the online sphere, in the name of preventing radicalisation and therefore terrorism research investigating how people engage with extremist material online is surprisingly scarce. The current paper addresses this gap in knowledge with an online experiment. A fictional extremist webpage was designed and (student) participants chose how to engage with it. . A mortality salience prime (being primed to think of death) was also included. Mortality salience did not influence engagement with the material but the material itself may have led to disidentification with the ingroup. Whilst interaction with the material was fairly low, those that did engage tended to indicate preference for hierarchy and dominance in society, stronger identification with the ingroup, higher levels of radicalism, and outgroup hostility. More engagement with the online extremist material was also associated with increased likelihood of explicitly supporting the extremist group. These findings show that indoctrination, socialisation, and ideology are not necessarily required for individuals to engage attitudinally or behaviourally with extremist material. This study is not conducted on the dependent variable, therefore shedding light on individuals who do not engage with extremist material.
Journal: Terrorism and Political Violence
Pages: 1595-1620
Issue: 8
Volume: 33
Year: 2021
Month: 11
X-DOI: 10.1080/09546553.2019.1634559
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1634559
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:8:p:1595-1620



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2000239_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lucien Frary
Author-X-Name-First: Lucien
Author-X-Name-Last: Frary
Title: Webs of Corruption: Trafficking and Terrorism in Central Asia
Journal: Terrorism and Political Violence
Pages: 1810-1811
Issue: 8
Volume: 33
Year: 2021
Month: 11
X-DOI: 10.1080/09546553.2021.2000239
File-URL: http://hdl.handle.net/10.1080/09546553.2021.2000239
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:8:p:1810-1811



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1638256_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Stephane J. Baele
Author-X-Name-First: Stephane J.
Author-X-Name-Last: Baele
Author-Name: Lewys Brace
Author-X-Name-First: Lewys
Author-X-Name-Last: Brace
Author-Name: Travis G. Coan
Author-X-Name-First: Travis G.
Author-X-Name-Last: Coan
Title: From “Incel” to “Saint”: Analyzing the violent worldview behind the 2018 Toronto attack
Abstract: 
 This paper combines qualitative and quantitative content analysis to map and analyze the “Incel” worldview shared by members of a misogynistic online community ideologically linked to several recent acts of politically motivated violence, including Alek Minassian’s van attack in Toronto (2018) and Elliot Rodger’s school shooting in Isla Vista (2014). Specifically, the paper analyses how support and motivation for violence results from the particular structure this worldview presents in terms of social categories and causal narratives.
Journal: Terrorism and Political Violence
Pages: 1667-1691
Issue: 8
Volume: 33
Year: 2021
Month: 11
X-DOI: 10.1080/09546553.2019.1638256
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1638256
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:8:p:1667-1691



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1638255_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Steve Wood
Author-X-Name-First: Steve
Author-X-Name-Last: Wood
Author-Name: Simon Gardiner
Author-X-Name-First: Simon
Author-X-Name-Last: Gardiner
Title: Policing U.K. Airports and Schedule 7 of the Terrorism Act 2000: The Young Passengers’ Perception of Security Measures
Abstract: 
 Policing airports following 9/11 has been challenging with an emphasis on visibility and high levels of security checks for passengers. The focus has been on a form of ‘reassurance policing’ and an emphasis on procedural justice which is accepted as legitimate on the part of the public. However, there have been claims that that Muslim passengers are under greater suspicion than other passengers and have been subject to the practice of “racial profiling”. The powers under the Terrorism Act 2000, notably Schedule 7, have been under scrutiny as to the extent that they allow the police to stop and search suspects. This study reviews the opinions and experiences of young passengers at U.K. airports to see if they are reassured by policing and their opinions on profiling fellow passengers.
Journal: Terrorism and Political Violence
Pages: 1621-1642
Issue: 8
Volume: 33
Year: 2021
Month: 11
X-DOI: 10.1080/09546553.2019.1638255
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1638255
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:8:p:1621-1642



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2000217_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: New Currents in the Middle East
Journal: Terrorism and Political Violence
Pages: 1797-1803
Issue: 8
Volume: 33
Year: 2021
Month: 11
X-DOI: 10.1080/09546553.2021.2000217
File-URL: http://hdl.handle.net/10.1080/09546553.2021.2000217
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:33:y:2021:i:8:p:1797-1803

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1668781_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Paul Gill
Author-X-Name-First: Paul
Author-X-Name-Last: Gill
Author-Name: Emily Corner
Author-X-Name-First: Emily
Author-X-Name-Last: Corner
Author-Name: Amy McKee
Author-X-Name-First: Amy
Author-X-Name-Last: McKee
Author-Name: Paul Hitchen
Author-X-Name-First: Paul
Author-X-Name-Last: Hitchen
Author-Name: Paul Betley
Author-X-Name-First: Paul
Author-X-Name-Last: Betley
Title: What Do Closed Source Data Tell Us About Lone Actor Terrorist Behavior? A Research Note
Abstract: 
 This article contributes to the growing body of knowledge on lone-actor terrorism with the incorporation of closed-source data. The analyses presented investigate the antecedent behaviors of U.K.-based lone-actor terrorists leading up to their planning or conducting a terrorist event. The results suggest that prior to their attack or arrest the vast majority of lone-actor terrorists each demonstrated elements concerning (a) their grievance, (b) an escalation in their intent to act, (c) gaining capability—both psychologically and technically and (d) attack planning. The results also disaggregate our understanding of lone-actor terrorists in two ways. First, we compare the behaviors of the jihadist actors to those of the extreme-right. Second, we visualize Borum’s (2012) continuums of loneness, direction, and motivation. Collectively the results provide insight into the threat assessment and management of potential lone actors.
Journal: Terrorism and Political Violence
Pages: 113-130
Issue: 1
Volume: 34
Year: 2022
Month: 01
X-DOI: 10.1080/09546553.2019.1668781
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1668781
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:1:p:113-130



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2017164_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: János Besenyő
Author-X-Name-First: János
Author-X-Name-Last: Besenyő
Title: Portugal’s Forgotten Overseas Wars in the 20th Century
Journal: Terrorism and Political Violence
Pages: 189-194
Issue: 1
Volume: 34
Year: 2022
Month: 01
X-DOI: 10.1080/09546553.2021.2017164
File-URL: http://hdl.handle.net/10.1080/09546553.2021.2017164
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:1:p:189-194



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1671373_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jasmijn M. Remmers
Author-X-Name-First: Jasmijn M.
Author-X-Name-Last: Remmers
Title: Temporal Dynamics in Covert Networks: A Case Study of the Structure behind the Paris and Brussels Attacks
Abstract: 
 This paper analyzes the network behind the Paris and Brussels attacks and related plots that were organized in the name of Islamic State. It answers the questions how the network was structured and how it developed over time. The database used contains highly reliable information from the judiciary and the intelligence community. It is therefore among the first to allow for statistical analysis of the typology of a covert network, while also being reliable and detailed enough to admit for an analysis of the covert network chronological development. The findings are that the network was centralized and thus vulnerable to targeted attacks against the most central nodes. The network developed in three phases: (1) construction of local cells, predominantly based on pre-existing ties; (2) travel to Islamic State and merger with a larger network; (3) consolidation before carrying out an attack. In addition, it is found that (1) most network analyses of covert networks understate the importance of peripheral nodes, and (2) that analyzing the final configuration of the network alone does not necessarily lead to correct conclusions, as it ignores the underlying structures of pre-existing networks.
Journal: Terrorism and Political Violence
Pages: 131-154
Issue: 1
Volume: 34
Year: 2022
Month: 01
X-DOI: 10.1080/09546553.2019.1671373
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1671373
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:1:p:131-154



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2017165_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John C. Zimmerman
Author-X-Name-First: John C.
Author-X-Name-Last: Zimmerman
Title: Shaykh Yusuf al-Qaradawi: Spiritual Mentor of Wasati Salafism
Journal: Terrorism and Political Violence
Pages: 183-184
Issue: 1
Volume: 34
Year: 2022
Month: 01
X-DOI: 10.1080/09546553.2021.2017165
File-URL: http://hdl.handle.net/10.1080/09546553.2021.2017165
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:1:p:183-184



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2017158_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Donald D. Denton
Author-X-Name-First: Donald D.
Author-X-Name-Last: Denton
Title: Homegrown: Identity and Difference in the American War on Terror
Journal: Terrorism and Political Violence
Pages: 181-182
Issue: 1
Volume: 34
Year: 2022
Month: 01
X-DOI: 10.1080/09546553.2021.2017158
File-URL: http://hdl.handle.net/10.1080/09546553.2021.2017158
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:1:p:181-182



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1668376_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mustafa Kirisci
Author-X-Name-First: Mustafa
Author-X-Name-Last: Kirisci
Title: Militarized Law Enforcement Forces, State Capacity and Terrorism
Abstract: 
 Gendarmerie forces are actively deployed by many states in the world to fight terrorism, but their impact on terrorism has not been explored. This study fills this gap in the literature and examines the effect that having gendarmerie forces has on terrorist activities in a state. I discuss competing arguments about the relationship between having these forces and terror incidents and also address the conditioning effect of bureaucratic capacity on this relationship. By constructing a time series cross-sectional data that identifies the countries having gendarmeries in given years, I test these arguments, and the results of the empirical analyses suggest that states having gendarmerie forces experience more terrorist violence than those without gendarmeries. However, the number of terror incidents in states with gendarmeries decreases as these states have greater bureaucratic capacity. The results have implications in terms of the role of militarized policing on terrorism and countering terrorism.
Journal: Terrorism and Political Violence
Pages: 93-112
Issue: 1
Volume: 34
Year: 2022
Month: 01
X-DOI: 10.1080/09546553.2019.1668376
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1668376
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:1:p:93-112



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1676238_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mohamed El-Nashar
Author-X-Name-First: Mohamed
Author-X-Name-Last: El-Nashar
Author-Name: Heba Nayef
Author-X-Name-First: Heba
Author-X-Name-Last: Nayef
Title: ‘Cooking the Meal of Terror’ Manipulative Strategies in Terrorist Discourse: A Critical Discourse Analysis of ISIS Statements
Abstract: 
 This paper linguistically investigates terrorist discursive strategies designed to manipulate recipients’ minds into accepting, even embracing, certain ideologies. Though extensive research has been done on manipulative discourse used by journalists and politicians, examining the same discourse used by terrorists received comparatively scant attention. Under Critical Discourse Analysis, we employ a framework of analysis of ISIS discursive tools of manipulation, drawing on Reisigl and Wodak’s (2009) and Wodak’s (2011) discursive strategies, qualitatively and quantitatively analyzing (17) ISIS statements released between 2014 and 2016. We explore the discursive tools ISIS has characteristically used to manipulate its audience and legitimate and defend its actions. The aim is that once terrorist narrative is dissected from a different approach, such effort will be helpful in creating counter-narratives meant to reduce terrorism and vitiate its arguments. Emphasis will be laid on covert vs. overt manipulation, metaphorical dehumanization and metonymic depersonalization. We find that the data contained manipulative tools such as Captatio benevolentiae and volitive modality that are employed to project a positive image about ISIS.
Journal: Terrorism and Political Violence
Pages: 155-175
Issue: 1
Volume: 34
Year: 2022
Month: 01
X-DOI: 10.1080/09546553.2019.1676238
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1676238
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:1:p:155-175



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1662403_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Imogen Richards
Author-X-Name-First: Imogen
Author-X-Name-Last: Richards
Title: A Philosophical and Historical Analysis of “Generation Identity”: Fascism, Online Media, and the European New Right
Abstract: 
 This article analyzes ideological and organizational characteristics of the pan-European youth movement, “Generation Identity” (GI), through a philosophical and historical lens. With a synoptic perspective on existing and original research, it outlines an analysis of key GI literature as well as its ideological influences, activist behavior, and media strategies. This research reveals that, like other twentieth and twenty-first century examples of neo-fascism, the movement is syncretic and attempts to legitimize its political aims through reference to historical quasi- and proto-fascist cases, in combination with popular left and right-wing political ideals. A reflection on GI’s activist behavior, on the other hand, demonstrates that the movement is relatively unique in the field of current far-right politics; particularly in the extent to which it draws practical inspiration from the tactics and propagandizing strategies of contemporary left-wing movements. GI’s online presence, including its leaders’ promotion of gamification, also illustrates its distinctive appeal to young, relatively affluent, countercultural and digitally literate populations. Finally, while in many respects GI is characteristic of the “European New Right” (ENR), the analysis finds that its spokespersons’ various promotion of capitalism and commodification, including through their advocacy of international trade and sale of merchandise, diverges from the anti-capitalist philosophizing of contemporary ENR thinkers.
Journal: Terrorism and Political Violence
Pages: 28-47
Issue: 1
Volume: 34
Year: 2022
Month: 01
X-DOI: 10.1080/09546553.2019.1662403
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1662403
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:1:p:28-47



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1659783_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ginger L. Denton
Author-X-Name-First: Ginger L.
Author-X-Name-Last: Denton
Author-Name: Jonathan R. Harris
Author-X-Name-First: Jonathan R.
Author-X-Name-Last: Harris
Title: Maritime Piracy, Military Capacity, and Institutions in the Gulf of Guinea
Abstract: 
 West African security threats have become more frequent in recent years, most notably in the Gulf of Guinea. As increasing quantities of the world’s trade pass through the maritime domain, ship hijackings and other maritime criminal activities have garnered widespread attention from the international community. The International Maritime Bureau reports 785 piracy incidents have occurred in the region since 2000 and current models forecasting worldwide piracy trends have failed to accurately predict maritime crime in all of the West African states. The purpose of this article is to provide an analysis of piracy developments in the Gulf of Guinea. The authors argue that increased military capacity and anocratic regimes lead to increases in piracy while failed states are associated with a decline in such maritime crimes. Data from 2000 to 2016 is used to empirically test this claim. The analysis shows that a state’s military capacity has no impact on the prevalence of piracy events while institutional frameworks and regime type influence the degree and number of maritime attacks off the coast of West Africa. The results imply that institutionally strong and democratic regimes are less likely to experience piracy in the Gulf of Guinea than weak states or anocracies.
Journal: Terrorism and Political Violence
Pages: 1-27
Issue: 1
Volume: 34
Year: 2022
Month: 01
X-DOI: 10.1080/09546553.2019.1659783
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1659783
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:1:p:1-27



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1663828_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michaela Pfundmair
Author-X-Name-First: Michaela
Author-X-Name-Last: Pfundmair
Author-Name: Elena Aßmann
Author-X-Name-First: Elena
Author-X-Name-Last: Aßmann
Author-Name: Benjamin Kiver
Author-X-Name-First: Benjamin
Author-X-Name-Last: Kiver
Author-Name: Maximilian Penzkofer
Author-X-Name-First: Maximilian
Author-X-Name-Last: Penzkofer
Author-Name: Amelie Scheuermeyer
Author-X-Name-First: Amelie
Author-X-Name-Last: Scheuermeyer
Author-Name: Larissa Sust
Author-X-Name-First: Larissa
Author-X-Name-Last: Sust
Author-Name: Holger Schmidt
Author-X-Name-First: Holger
Author-X-Name-Last: Schmidt
Title: Pathways toward Jihadism in Western Europe: An Empirical Exploration of a Comprehensive Model of Terrorist Radicalization
Abstract: 
 Islamist terror is one of the most terrifying threats worldwide. However, there is no common model about the mechanisms underlying the complex process of radicalization and research is usually undermined by a lack of empirical data. Therefore, we aimed to compose a comprehensive model of radicalization, and test it empirically collecting and analyzing data on Islamist radicals in Western Europe. In Study 1, police professionals assessed seventy-five subjects under investigation for being in the process of radicalization. In Study 2, data from open source news articles about eighty six radical Muslims were evaluated by psychologists. Specific individual preconditions including young age, male gender, migration background, and biographical cuts were consistently found among radicals. Fueling the actual radicalization process, a gradual increase of individual, group and catalyst processes was observed from early (Study 1) to late stages of radicalization (Study 2). These included pursuing individual needs (transcendence, significance, self-esteem, control); processes in the course of a strong group commitment (group identification, prejudice, polarization, perceived group threat, collective emotions, informative influence); and cognitive adaptions to get increasingly comfortable with applying violence (desensitization, dehumanization). The current work may be a solid basis for further empirical investigations and for creating means of prevention and deradicalization.
Journal: Terrorism and Political Violence
Pages: 48-70
Issue: 1
Volume: 34
Year: 2022
Month: 01
X-DOI: 10.1080/09546553.2019.1663828
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1663828
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:1:p:48-70



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2017167_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Zsolt Szabó
Author-X-Name-First: Zsolt
Author-X-Name-Last: Szabó
Title: South Sudan’s Injustice System. Law and Activism on the Frontline
Journal: Terrorism and Political Violence
Pages: 185-186
Issue: 1
Volume: 34
Year: 2022
Month: 01
X-DOI: 10.1080/09546553.2021.2017167
File-URL: http://hdl.handle.net/10.1080/09546553.2021.2017167
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:1:p:185-186



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2017170_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lucien Frary
Author-X-Name-First: Lucien
Author-X-Name-Last: Frary
Title: The Investigator: Demons of the Balkan War
Journal: Terrorism and Political Violence
Pages: 195-196
Issue: 1
Volume: 34
Year: 2022
Month: 01
X-DOI: 10.1080/09546553.2021.2017170
File-URL: http://hdl.handle.net/10.1080/09546553.2021.2017170
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:1:p:195-196



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2017168_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sonja Wentling
Author-X-Name-First: Sonja
Author-X-Name-Last: Wentling
Title: The Forgotten Terrorist: Sirhan Sirhan and the Assassination of Robert F. Kennedy
Journal: Terrorism and Political Violence
Pages: 187-188
Issue: 1
Volume: 34
Year: 2022
Month: 01
X-DOI: 10.1080/09546553.2021.2017168
File-URL: http://hdl.handle.net/10.1080/09546553.2021.2017168
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:1:p:187-188



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2017176_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: U.S. Homegrown Political Violence and Terrorism
Journal: Terrorism and Political Violence
Pages: 176-180
Issue: 1
Volume: 34
Year: 2022
Month: 01
X-DOI: 10.1080/09546553.2021.2017176
File-URL: http://hdl.handle.net/10.1080/09546553.2021.2017176
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:1:p:176-180



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1663829_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sadi Shanaah
Author-X-Name-First: Sadi
Author-X-Name-Last: Shanaah
Title: Alienation or Cooperation? British Muslims’ Attitudes to and Engagement in Counter-Terrorism and Counter-Extremism
Abstract: 
 The dominant academic narrative portrays British Muslim communities as alienated by counter-terrorism policies and consequently reluctant to cooperate with authorities by taking action against Islamist extremism. This article reassesses and nuances the “alienation narrative” with the use of unique data from three robust surveys of British Muslims. It finds that although a minority shows signs of alienation, most British Muslims are satisfied with and trust counter-terrorism policies as well as the government and the police. The level of willingness to take action against Islamist extremism is also high. The study confirms that aspects of alienation correlate with reduced willingness to take action against Islamist extremism, although they do not necessarily lead to disengagement.
Journal: Terrorism and Political Violence
Pages: 71-92
Issue: 1
Volume: 34
Year: 2022
Month: 01
X-DOI: 10.1080/09546553.2019.1663829
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1663829
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:1:p:71-92

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1701445_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Benjamin Acosta
Author-X-Name-First: Benjamin
Author-X-Name-Last: Acosta
Title: Exclusionary Politics and Organized Resistance
Abstract: 
 In seeking to overthrow, reform, or separate from an existing political system, both violent and nonviolent resistance organizations emerge. A common finding shows that democracies face violent resistance more so than autocracies. Studied less remains the pattern of organizations using nonviolence in efforts to topple autocratic regimes. What explains these trends in conjunction with one another? I put forth a theory contending that exclusionary politics frames the organizational use of violence and nonviolence in resistance campaigns. To test hypotheses, I analyze an original dataset of over 500 resistance organizations (1940–2014). I complement the large-n tests by reviewing resistance organizations that formed amid Lebanon’s Civil War (1975–1990) and Cedar Revolution (2005) using field methods, qualitative contextualization, and process tracing. The results reveal that the relationship between the target political system and the degree of inclusion of a resistance organization’s constituent identity group helps explain the adoption of violent strategies.
Journal: Terrorism and Political Violence
Pages: 341-363
Issue: 2
Volume: 34
Year: 2022
Month: 02
X-DOI: 10.1080/09546553.2019.1701445
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1701445
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:2:p:341-363



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1701446_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Thomas J. Holt
Author-X-Name-First: Thomas J.
Author-X-Name-Last: Holt
Author-Name: Joshua D. Freilich
Author-X-Name-First: Joshua D.
Author-X-Name-Last: Freilich
Author-Name: Steven M. Chermak
Author-X-Name-First: Steven M.
Author-X-Name-Last: Chermak
Title: Examining the Online Expression of Ideology among Far-Right Extremist Forum Users
Abstract: 
 Over the last decade, there has been an increased focus among researchers on the role of the Internet among actors and groups across the political and ideological spectrum. There has been particular emphasis on the ways that far-right extremists utilize forums and social media to express ideological beliefs through sites affiliated with real-world extremist groups and unaffiliated websites. The majority of research has used qualitative assessments or quantitative analyses of keywords to assess the extent of specific messages. Few have considered the breadth of extremist ideologies expressed among participants so as to quantify the proportion of beliefs espoused by participants. This study addressed this gap in the literature through a content analysis of over 18,000 posts from eight far-right extremist forums operating online. The findings demonstrated that the most prevalent ideological sentiments expressed in users’ posts involved anti-minority comments, though they represent a small proportion of all posts made in the sample. Additionally, users expressed associations to far-right extremist ideologies through their usernames, signatures, and images associated with their accounts. The implications of this analysis for policy and practice to disrupt extremist movements were discussed in detail.
Journal: Terrorism and Political Violence
Pages: 364-384
Issue: 2
Volume: 34
Year: 2022
Month: 02
X-DOI: 10.1080/09546553.2019.1701446
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1701446
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:2:p:364-384



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2054627_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Barbara Ann Chotiner
Author-X-Name-First: Barbara Ann
Author-X-Name-Last: Chotiner
Title: Declining Democracy in East-Central Europe: The Divide in the EU and Emerging Hard Populism
Journal: Terrorism and Political Violence
Pages: 409-410
Issue: 2
Volume: 34
Year: 2022
Month: 02
X-DOI: 10.1080/09546553.2022.2054627
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2054627
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:2:p:409-410



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1702533_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Emanuele Castelli
Author-X-Name-First: Emanuele
Author-X-Name-Last: Castelli
Title: Bargaining toward Pareto-Efficiency: Relative Gains, Simultaneity and the Case of South Tyrol
Abstract: 
 Building on bargaining theory literature, I outline an original rationalist model that takes in consideration the problem of relative gains to explain why bargaining failures may lead to escalation in an open civil war and when negotiations in civil disputes are more likely to lead to Pareto-efficient solutions. I apply the model to the South Tyrol case, a relatively unknown identity-based dispute that emerged in Italy in the aftermath of the Second World War and was defused before it could produce a real escalation in violence. I show that direct and indirect compensations may help to overcome the problem of issue indivisibility, and that third-party intervention in domestic disputes may work as a functional substitute for simultaneity between the agreement and the enforcement phase.
Journal: Terrorism and Political Violence
Pages: 385-408
Issue: 2
Volume: 34
Year: 2022
Month: 02
X-DOI: 10.1080/09546553.2019.1702533
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1702533
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:2:p:385-408



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2054643_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Croatian Radical Separatism and Diaspora Terrorism During the Cold War
Journal: Terrorism and Political Violence
Pages: 416-417
Issue: 2
Volume: 34
Year: 2022
Month: 02
X-DOI: 10.1080/09546553.2022.2054643
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2054643
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:2:p:416-417



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1678468_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ben Farrer
Author-X-Name-First: Ben
Author-X-Name-Last: Farrer
Author-Name: Graig R. Klein
Author-X-Name-First: Graig R.
Author-X-Name-Last: Klein
Title: How Radical Environmental Sabotage Impacts US Elections
Abstract: 
 In this paper we examine the impact of forceful or violent environmental sabotage (FVES) on U.S. elections. We argue that voters see ideological similarities between groups that engage in FVES and other nonviolent environmental organizations, like the Green Party. This means that when an environmentalist organization engages in FVES, it has a negative impact on voter attitudes toward all environmental organizations. Moreover, this negative impact will be stronger if environmentalists had previously made electoral progress, and so they cannot use the excuse that democratic methods had failed and they were forced to turn to FVES. We demonstrate this by showing that when FVES occurs, Green Party candidates tend to win a lower share of the vote in the next election. However, this effect is conditional on the prior electoral history of the Green Party. If the Green Party has a poor electoral record, then sabotage has little effect, but if the Green Party has a better electoral record, then voters are less forgiving of sabotage. We find no evidence that FVES effects Republican or Democratic vote shares. We conclude that different organizations within the same social movement are connected in ways that impact electoral outcomes.
Journal: Terrorism and Political Violence
Pages: 218-239
Issue: 2
Volume: 34
Year: 2022
Month: 02
X-DOI: 10.1080/09546553.2019.1678468
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1678468
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:2:p:218-239



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1693370_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kurt Braddock
Author-X-Name-First: Kurt
Author-X-Name-Last: Braddock
Title: Vaccinating Against Hate: Using Attitudinal Inoculation to Confer Resistance to Persuasion by Extremist Propaganda
Abstract: 
 Research in several domains has shown that attitudinal inoculation effectively promotes resistance to persuasion. Despite its proven efficacy, inoculation has not been empirically tested as a strategy for preventing the adoption of beliefs and attitudes consistent with violent extremist ideologies. The current study addresses this gap in the literature. In a between-subjects experiment performed in the U.S., participants (N = 357) were exposed to an inoculation message or no-inoculation control message before reading left- or right-wing extremist propaganda. Inoculation positively predicted psychological reactance, which in turn, reduced intention to support the extremist group. Inoculation also negatively predicted perceptions of the extremist group’s credibility, which positively predicted support intention. Neither the apparent source of the inoculation message, nor the ideological focus of the propaganda, moderated any of these relationships. These results effectively extend the scope of inoculation theory into the realm of violent extremism and have implications for the development of messages intended to prevent persuasive outcomes consistent with extremist ideologies.
Journal: Terrorism and Political Violence
Pages: 240-262
Issue: 2
Volume: 34
Year: 2022
Month: 02
X-DOI: 10.1080/09546553.2019.1693370
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1693370
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:2:p:240-262



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1676239_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anna O. Pechenkina
Author-X-Name-First: Anna O.
Author-X-Name-Last: Pechenkina
Author-Name: Laura Gamboa
Author-X-Name-First: Laura
Author-X-Name-Last: Gamboa
Title: Who Undermines the Peace at the Ballot Box? The Case of Colombia
Abstract: 
 Electoral politics and violent civil conflict often coexist. Citizens exposed and unexposed to violence bear the costs of conflict unevenly and, thus, conceive of militant vs. accommodationist state response to the perpetrators of violence differently. The literature has found that victims of political violence tend to endorse militant state response against nonstate actors seen as responsible. This result is mostly based on secessionist conflicts in which victims of violence are often shielded from the costs of state counterinsurgency or counterterrorism campaigns. By contrast, we argue, in non-secessionist conflicts, individuals exposed to violence tend to also experience the state militant anti-guerrilla operations, which often lead to state abuses of civilians. We expect that civilians exposed to nonstate and state attacks will be more likely to support pro-peace policies. We find support for this argument analyzing Colombia’s 2014 presidential election and 2016 peace agreement referendum. In addition, we use original data on local candidates’ pro- and anti-peace process positions in Colombia’s 2014 congressional election to test the underlying logic of the argument that local communities exposed to both nonstate and state violence are more likely to demand pro-peace policies.
Journal: Terrorism and Political Violence
Pages: 197-217
Issue: 2
Volume: 34
Year: 2022
Month: 02
X-DOI: 10.1080/09546553.2019.1676239
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1676239
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:2:p:197-217



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1699794_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Wesley S. McCann
Author-X-Name-First: Wesley S.
Author-X-Name-Last: McCann
Author-Name: Nicholas Pimley
Author-X-Name-First: Nicholas
Author-X-Name-Last: Pimley
Title: Eliminating Extremism: A Legal Analysis of Hate Crime and Terrorism Laws in the United States
Abstract: 
 The distinction between hate crime and terrorism is a contentious legal issue that impacts how respective crimes are labeled and prosecuted. Using a legal content analysis, this study examines what central legal elements comprise hate crimes and terrorism, respectively, for each state to discern their legal differences. The analysis along with exegesis of terrorism and hate crime definitions enumerated in state law demonstrates that these crimes are too similar to be different legal constructs, given their definitional elements and real-world applications. The study concludes that these “crimes” need to either be eliminated from criminal law or altered so as to make the adjudication of so-called extremism more parsimonious, equitable, and consistent. Recommendations are proffered on how this can be accomplished.
Journal: Terrorism and Political Violence
Pages: 285-317
Issue: 2
Volume: 34
Year: 2022
Month: 02
X-DOI: 10.1080/09546553.2019.1699794
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1699794
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:2:p:285-317



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2054630_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joshua Akintayo
Author-X-Name-First: Joshua
Author-X-Name-Last: Akintayo
Title: Webs of Corruption: Trafficking and Terrorism in Central Asia
Journal: Terrorism and Political Violence
Pages: 413-415
Issue: 2
Volume: 34
Year: 2022
Month: 02
X-DOI: 10.1080/09546553.2022.2054630
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2054630
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:2:p:413-415



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2054628_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nadia Al-Dayel
Author-X-Name-First: Nadia
Author-X-Name-Last: Al-Dayel
Title: The CIA War in Kurdistan: The Untold Story of the Northern Front in the Iraq War
Journal: Terrorism and Political Violence
Pages: 422-423
Issue: 2
Volume: 34
Year: 2022
Month: 02
X-DOI: 10.1080/09546553.2022.2054628
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2054628
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:2:p:422-423



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1701444_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Emma Cardeli
Author-X-Name-First: Emma
Author-X-Name-Last: Cardeli
Author-Name: Mia Bloom
Author-X-Name-First: Mia
Author-X-Name-Last: Bloom
Author-Name: Sarah Gillespie
Author-X-Name-First: Sarah
Author-X-Name-Last: Gillespie
Author-Name: Tanya Zayed
Author-X-Name-First: Tanya
Author-X-Name-Last: Zayed
Author-Name: B. Heidi Ellis
Author-X-Name-First: B. Heidi
Author-X-Name-Last: Ellis
Title: Exploring the Social-Ecological Factors that Mobilize Children into Violence
Abstract: 
 This article applies the social-ecological model to children’s mobilization into two violent groups—Central American gangs and terrorist organizations. While these two groups clearly differ in important ways, there are contextual similarities that frame a child’s involvement in each. For example, both flourish in low-resource settings where governmental structures may have been weakened or disrupted. Does it follow, therefore, that similar processes are at play in relation to children engaging in violent groups? This paper seeks to answer this question, reviewing available literature on the social-ecological factors that promote engagement in each group. Points of convergence and divergence between the groups are identified, and implications for prevention and intervention efforts are explored.
Journal: Terrorism and Political Violence
Pages: 318-340
Issue: 2
Volume: 34
Year: 2022
Month: 02
X-DOI: 10.1080/09546553.2019.1701444
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1701444
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:2:p:318-340



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1693371_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mohammed Ibrahim Shire
Author-X-Name-First: Mohammed
Author-X-Name-Last: Ibrahim Shire
Author-Name: Abdi Hersi
Author-X-Name-First: Abdi
Author-X-Name-Last: Hersi
Title: Brothers in Arms: The Phenomenon of Complex Suicide Attacks
Abstract: 
 Globally, the spread and use of suicide bombing attacks have become a regular occurrence. Suicide terrorism literature focuses primarily on conventional suicide bombing attacks. However, a growing trend has been observed in the adoption of complex suicide attacks. Using Al-Shabaab as a case study, this paper investigates the phenomenon of complex suicide attacks. We explore the tactical differences of complex suicide attacks vis-à-vis simple attacks in terms of its target goal, discriminative lethality, and delivery method. The paper relies on a uniquely constructed dataset of the group’s suicide operations, employing a variety of data collection techniques. The findings reveal that, inter alia, complex suicide attacks reduce civilian casualties compared to simple suicide attacks. Contrary to the group’s intent and official guidelines to target foreign entities; findings illustrate that domestic targets bear the brunt of most complex suicide attacks. These findings have the potential to contribute to counter-terrorism strategies and be adopted by concerned states in order to effectively protect significant loss of lives and destruction of property resulting from suicide terrorism.
Journal: Terrorism and Political Violence
Pages: 263-284
Issue: 2
Volume: 34
Year: 2022
Month: 02
X-DOI: 10.1080/09546553.2019.1693371
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1693371
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:2:p:263-284



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2054645_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Donald D. Denton
Author-X-Name-First: Donald D.
Author-X-Name-Last: Denton
Title: Deterring Terrorism: A Model for Strategic Deterrence
Journal: Terrorism and Political Violence
Pages: 418-421
Issue: 2
Volume: 34
Year: 2022
Month: 02
X-DOI: 10.1080/09546553.2022.2054645
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2054645
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:2:p:418-421



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2054629_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael E. Neagle
Author-X-Name-First: Michael E.
Author-X-Name-Last: Neagle
Title: Never-Ending War on Terror
Journal: Terrorism and Political Violence
Pages: 411-412
Issue: 2
Volume: 34
Year: 2022
Month: 02
X-DOI: 10.1080/09546553.2022.2054629
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2054629
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:2:p:411-412

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1727450_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Keiran Hardy
Author-X-Name-First: Keiran
Author-X-Name-Last: Hardy
Title: A Crime Prevention Framework for CVE
Abstract: 
 CVE is a diverse policy space involving efforts to build cohesive communities, support young people who are vulnerable to radicalization, and deradicalize convicted terrorism offenders. Recently, the public health model of disease prevention has become an influential framework for understanding these diverse components. In this paper, I argue that crime prevention should be preferred as a conceptual framework for CVE. I offer a criminological framework encompassing situational prevention, developmental prevention, community crime prevention, third-party policing and procedural justice policing. I develop these concepts into an agenda for crime prevention research in CVE. I also briefly outline some of the lessons that the evidence base from criminology may provide when designing CVE programs and policy.
Journal: Terrorism and Political Violence
Pages: 633-659
Issue: 3
Volume: 34
Year: 2022
Month: 04
X-DOI: 10.1080/09546553.2020.1727450
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1727450
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:3:p:633-659



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1711741_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tuba Gün Çınğı
Author-X-Name-First: Tuba
Author-X-Name-Last: Gün Çınğı
Author-Name: Nadir SuÄŸur
Author-X-Name-First: Nadir
Author-X-Name-Last: SuÄŸur
Title: Terror Risk Perception and Fear of Terror in Turkey: Predictors, Bases and Consequences
Abstract: 
 This study was conducted in Ankara, Turkey, which has experienced a number of serious terrorist attacks in recent years. A mixed-methods research approach was used in this study and findings were based on 400 questionnaires and twenty in-depth interviews. This study tries to evaluate the risk perceptions of individuals, their fear of terror, and their associated reflections in daily life. It also attempts to determine the degree to which theories of fear of crime can explain risk perceptions and fear of terrorism. The results show that the perceived terror risk and the fear level are high. The Turkish case shows that theories of fear of crime fail to explain adequately the fear of terror.
Journal: Terrorism and Political Violence
Pages: 514-536
Issue: 3
Volume: 34
Year: 2022
Month: 04
X-DOI: 10.1080/09546553.2020.1711741
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1711741
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:3:p:514-536



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1724967_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anastasia Filippidou
Author-X-Name-First: Anastasia
Author-X-Name-Last: Filippidou
Title: The Oxymoron of a Benevolent Authoritarian Leadership: The Case of Lebanon’s Hezbollah and Hassan Nasrallah
Abstract: 
 Leadership entails both continuity and an ever-changing relationship between a number of factors, including the leader, the context, the followers, broader society and even the pace of change. Although the above elements are not identical in all scenarios, there are still certain transcending common features allowing to draw conclusions applicable to different situations. This article focuses on the leadership of radical political movements (RPMs) in volatile and crisis situations, and the role of this leadership in the transformation process from weak and fragmented communities to peaceful and viable ones. The article uses the case of Hezbollah to test the above ideas, and examines the motives behind Hezbollah’s infitah of opening up, and its Lebanonization, expressed in its ideology, political programs, and policies, leading to Hezbollah’s integration into mainstream political life, blurring the boundaries between legitimate and illegitimate politics. The research demonstrates the need for a constant balance of different and often contrasting leadership characteristics and for the adjustment of leadership styles to constantly changing situations. Lastly, the article focuses on the rigidity of state counter measures toward RPMs and their leadership, with particular emphasis on the resilience of what often appears to be outdated state counternarratives.
Journal: Terrorism and Political Violence
Pages: 585-604
Issue: 3
Volume: 34
Year: 2022
Month: 04
X-DOI: 10.1080/09546553.2020.1724967
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1724967
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:3:p:585-604



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1705283_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michele Grossman
Author-X-Name-First: Michele
Author-X-Name-Last: Grossman
Author-Name: Kristin Hadfield
Author-X-Name-First: Kristin
Author-X-Name-Last: Hadfield
Author-Name: Philip Jefferies
Author-X-Name-First: Philip
Author-X-Name-Last: Jefferies
Author-Name: Vivian Gerrand
Author-X-Name-First: Vivian
Author-X-Name-Last: Gerrand
Author-Name: Michael Ungar
Author-X-Name-First: Michael
Author-X-Name-Last: Ungar
Title: Youth Resilience to Violent Extremism: Development and Validation of the BRAVE Measure
Abstract: 
 Building resilience to violent extremism has featured in preventing violent extremism efforts for over a decade. Validated and standardized cross-cultural measures can help identify protective capacities and vulnerabilities toward violent extremism for young people. Because drivers for violent extremism are multi-factorial, a measure of resilience cannot be used to predict who will and will not commit acts of terror. Instead, its purpose is to track the multiple forms of capital available to youth at risk of adopting violence to resolve ideological, religious and political grievances, and to use this data to inform interventions that increase young people’s capacity to resist violent extremism’s push and pull forces. In this study, we developed such a measure, using data from 200 Australian and 275 Canadian participants aged eighteen to thirty years old. Following exploratory and confirmatory factor analysis, a fourteen-item measure emerged consisting of five factors: cultural identity and connectedness; bridging capital; linking capital; violence-related behaviors, and violence-related beliefs. The Building Resilience against Violent Extremism (BRAVE) measure was found to have good internal reliability (α = .76), correlating in expected directions with related measures. The BRAVE shows promise for helping understand young people’s resilience to violent extremism.
Journal: Terrorism and Political Violence
Pages: 468-488
Issue: 3
Volume: 34
Year: 2022
Month: 04
X-DOI: 10.1080/09546553.2019.1705283
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1705283
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:3:p:468-488



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1718661_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Caitlin Clemmow
Author-X-Name-First: Caitlin
Author-X-Name-Last: Clemmow
Author-Name: Paul Gill
Author-X-Name-First: Paul
Author-X-Name-Last: Gill
Author-Name: Noémie Bouhana
Author-X-Name-First: Noémie
Author-X-Name-Last: Bouhana
Author-Name: James Silver
Author-X-Name-First: James
Author-X-Name-Last: Silver
Author-Name: John Horgan
Author-X-Name-First: John
Author-X-Name-Last: Horgan
Title: Disaggregating Lone-actor Grievance-fuelled Violence: Comparing Lone-actor Terrorists and Mass Murderers
Abstract: 
 Research suggests that lone-actor terrorists and mass murderers may be better conceptualized as lone-actor grievance-fueled violence (LAGFV) offenders, rather than as distinct types. The present study sought to examine the extent to which these offenders could (or could not) be disaggregated along dimensions relevant to the threat assessment of both. Drawing on a Risk Analysis Framework (RAF), the offending process was theorized as interactions among propensity, situation, preparatory, leakage and network indicators. We analyzed a dataset of 183 U.S. offenders, including sixty-eight lone-actor terrorists and 115 solo mass murderers. Cluster analysis identified profiles within each of the components: propensity (stable, criminal, unstable), situation (low stress, high stress (social), high stress (interpersonal)), preparatory (fixated, novel aggression, equipped, clandestine, predatory, preparatory), leakage (high leakage, low leakage), and network (lone, associated, connected). Bi-variate analysis examined the extent to which the profiles classified offenders previously labeled as lone-actor terrorists or mass murderers. The results suggest that while significant differences may exist at the periphery of these dimensions, offenders previously classified as lone-actor terrorists or mass murderers occupy a noteworthy shared space. Moreover, no profile classifies a single “type” of offender exclusively. Lastly, we propose a dynamic, interactional model of LAGFV and discuss the implications of these findings for the threat assessment and management of LAGFV offenders.
Journal: Terrorism and Political Violence
Pages: 558-584
Issue: 3
Volume: 34
Year: 2022
Month: 04
X-DOI: 10.1080/09546553.2020.1718661
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1718661
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:3:p:558-584



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1699793_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: James Khalil
Author-X-Name-First: James
Author-X-Name-Last: Khalil
Author-Name: John Horgan
Author-X-Name-First: John
Author-X-Name-Last: Horgan
Author-Name: Martine Zeuthen
Author-X-Name-First: Martine
Author-X-Name-Last: Zeuthen
Title: The Attitudes-Behaviors Corrective (ABC) Model of Violent Extremism
Abstract: 
 Progress in understanding and responding to terrorism and violent extremism has continued to stall in part because we often fail to adequately conceptualize the problem. Perhaps most notably, much of our terminology (for instance, “radicalization”) and many variants of our existing models and analogies (including conveyor belts, staircases and pyramids) conflate sympathy for this violence with involvement in its creation. As its name suggests, the Attitudes-Behaviors Corrective (ABC) model seeks to overcome this issue by placing this key disconnect between attitudes and behaviors at its core. In this paper, we first present the key elements of our model, which include a graphic representation of this disconnect and a classification system of the drivers of violent extremism. The former enables us to track the trajectories of individuals in relation to both their attitudes and behaviors, while the latter helps ensure that we consider all potential explanations for these movements. We then adapt these elements to focus on exit from violence, applying the dual concepts of disengagement and deradicalization. Finally, we conclude with a section that aims to provide the research community and those tasked with preventing and countering violent extremism with practical benefits from the ABC model.
Journal: Terrorism and Political Violence
Pages: 425-450
Issue: 3
Volume: 34
Year: 2022
Month: 04
X-DOI: 10.1080/09546553.2019.1699793
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1699793
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:3:p:425-450



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1776703_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: James Khalil
Author-X-Name-First: James
Author-X-Name-Last: Khalil
Author-Name: John Horgan
Author-X-Name-First: John
Author-X-Name-Last: Horgan
Author-Name: Martine Zeuthen
Author-X-Name-First: Martine
Author-X-Name-Last: Zeuthen
Title: The ABC Model: Clarifications and Elaborations
Abstract: 
 This article responds to Clark McCauley’s commentary on our Attitudes-Behaviors Corrective (ABC) Model of Violent Extremism, in which he contrasts our framework with his own two pyramids model (developed with Sophia Moskalenko). In particular, we focus on further distinguishing between the “core” and “optional extra” elements of our ABC model, elaborating on how our interpretation deals with individuals who seemingly become involved in violence in the interests of the group, “unpacking” the concept of ideology through our ABC lens, and providing recommendations on how to measure attitudes and behaviors in a context specific manner.
Journal: Terrorism and Political Violence
Pages: 460-467
Issue: 3
Volume: 34
Year: 2022
Month: 04
X-DOI: 10.1080/09546553.2020.1776703
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1776703
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:3:p:460-467



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1763964_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Clark McCauley
Author-X-Name-First: Clark
Author-X-Name-Last: McCauley
Title: The ABC Model: Commentary from the Perspective of the Two Pyramids Model of Radicalization
Abstract: 
 In this commentary, I compare the ABC model of radicalization with the Two Pyramids model of radicalization. Both models distinguish radicalization of opinion from radicalization of action. Beyond this agreement are questions about the concepts deployed in advancing the ABC model and research issues relating to applications of the two models. I conclude with an optimistic assessment of recent progress in research on terrorism, including the suggestion that deradicalization of action may be forwarded by giving up on deradicalization of opinion.
Journal: Terrorism and Political Violence
Pages: 451-459
Issue: 3
Volume: 34
Year: 2022
Month: 04
X-DOI: 10.1080/09546553.2020.1763964
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1763964
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:3:p:451-459



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1709448_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lance Y. Hunter
Author-X-Name-First: Lance Y.
Author-X-Name-Last: Hunter
Author-Name: Glen Biglaiser
Author-X-Name-First: Glen
Author-X-Name-Last: Biglaiser
Title: The Effects of the International Monetary Fund on Domestic Terrorism
Abstract: 
 The past three decades have seen an increase in both domestic terrorist attacks and loans issued by the International Monetary Fund (IMF). In this study, we investigate the connection between IMF loan arrangements and domestic terrorism. We find that countries under IMF loans tend to observe fewer domestic terrorist incidents, especially when the borrowers are democracies. We contend that, while the IMF pressures borrower countries to prevent money laundering and combat the financing of terrorism, this effect is most pronounced in democracies, whose large selectorates incentivize the provision of public goods in a manner that works to reduce domestic terrorism. Our research shows how domestic and international institutions together can possibly help lower incidents of domestic terrorism.
Journal: Terrorism and Political Violence
Pages: 489-513
Issue: 3
Volume: 34
Year: 2022
Month: 04
X-DOI: 10.1080/09546553.2019.1709448
File-URL: http://hdl.handle.net/10.1080/09546553.2019.1709448
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:3:p:489-513



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1717475_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kavus Abushov
Author-X-Name-First: Kavus
Author-X-Name-Last: Abushov
Title: Drawing a Boundary between Structural Factors and Identity in Ethnic Conflict: Bringing Back the Role of Identity
Abstract: 
 This article focuses on the causes of ethnic civil wars, and argues that in order to develop a better understanding of their onset and intractability, one needs to distinguish different types of ethnic civil wars from each other. It first evaluates structural factors in the outbreak of ethnic conflict and then proceeds to discuss ideational factors and finally suggests a theoretic framework of understanding ethnic conflict based upon identity. It develops hypotheses that would allow to discern structuralist explanations from ideational ones and in this way contributes to the literature that tries to understand the causes of ethnic civil wars. To have a clear understanding of the suggested hypotheses, empirical evidence is provided from the post-Soviet space, namely conflicts such as Abkhazia, Crimea, Chechnya, Nagorno-Karabakh, and South Ossetia.
Journal: Terrorism and Political Violence
Pages: 537-557
Issue: 3
Volume: 34
Year: 2022
Month: 04
X-DOI: 10.1080/09546553.2020.1717475
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1717475
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:3:p:537-557



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1724968_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Valerie M. Hudson
Author-X-Name-First: Valerie M.
Author-X-Name-Last: Hudson
Author-Name: Kaylee B. Hodgson
Author-X-Name-First: Kaylee B.
Author-X-Name-Last: Hodgson
Title: Sex and Terror: Is the Subordination of Women Associated with the Use of Terror?
Abstract: 
 The overwhelming percentage of the perpetrators of terrorism are male: is this noteworthy, or not?  We believe that it is.  More specifically, we believe there is a complex mix of sex-linked grievance for men, sex-linked training for men, and sex-linked lack of voice for women that facilitates, and may even catalyze, the perpetration of terrorism. Without knowledge of those sex-linked pathways, we argue that efforts to counter terror are less effective than they might be. We first survey the literature on the causes of terrorism, as well as the literature linking inequality between the sexes to incidence of terrorism. After laying this foundation, we next contribute a theoretical framework linking the subordination of women to the incentivizing of specifically male engagement in terrorism, and then test that framework through aggregate statistical testing on a sample of 155 nations for a variety of non-state and state terrorism outcome variables. The subordination of women, as also mechanisms of marriage market obstruction including brideprice, prove highly significant and with notable effect sizes even after controlling for several alternative explanatory variables. Finally, we probe implications of our findings for efforts to counter terrorism and violent extremism.
Journal: Terrorism and Political Violence
Pages: 605-632
Issue: 3
Volume: 34
Year: 2022
Month: 04
X-DOI: 10.1080/09546553.2020.1724968
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1724968
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:3:p:605-632

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1733989_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Léa Eveline Jeanne Stéphanie Massé
Author-X-Name-First: Léa Eveline Jeanne Stéphanie
Author-X-Name-Last: Massé
Title: Losing Mood(s): Examining Jihadi Supporters’ Responses to ISIS’ Territorial Decline
Abstract: 
 The fall of the Islamic State in Iraq and Syria (ISIS) has raised a number of questions over the future of the organization and the potential threat it might continue to pose. While some commenters argue that the demise of the Caliphate will reduce ISIS’s global appeal, others have stressed the role that jihadi supporters may play in perpetuating ISIS’s ideological legacy. Yet, little is known on how supporters have responded to recent changes in circumstances. Employing a cognitive dissonance approach, this contribution examines the implications of ISIS’s defeat on twelve jihadi supporters’ commitment. It shows that while a minority of supporters have disengaged, the majority have remained committed to the group. While these differences stress the influence of personal situational factors on supporters’ responses, the data at the same time indicates that dissonance has preceded in some cases ISIS’s defeat. The contribution overall shows that integrating cognitive dissonance theory to the study of radicalization and terrorism can provide a more nuanced understanding of how individuals renegotiate the nature of their involvement in extremism when confronted by changes in circumstances.
Journal: Terrorism and Political Violence
Pages: 725-745
Issue: 4
Volume: 34
Year: 2022
Month: 05
X-DOI: 10.1080/09546553.2020.1733989
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1733989
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:4:p:725-745



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1730330_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Barak Mendelsohn
Author-X-Name-First: Barak
Author-X-Name-Last: Mendelsohn
Title: In Limited Demand: The Other Foreign Volunteers in the Syrian Civil War
Abstract: 
 The wars in Syria and Iraq attracted about 45,000 individuals from outside the arenas. Most joined the Islamic State, but interestingly, other prominent armed groups showed less interest in foreign volunteers. This paper introduces the Demand for Foreign Volunteers Theory (DFVT) to explain the diverging choices Jabhat al-Nusra, Ahrar al-Sham, and the People’s Protection Units made. The theory links four variables that shape groups’ positions: political considerations, operational needs, organizational capacity, and ideational fit. Both operational and political considerations emphasize the motivation for using foreign volunteers, though the two are not equally important; when they conflict, political considerations take priority. Organizational capacity, on the other hand, determines a group’s ability to translate need into action, serving as a necessary—but insufficient—condition for foreign mobilization. Finally, ideational factors, specifically a group’s identity and ideology, determine the pool of potential recruits. The case studies show that political considerations made all three actors cautious about recruiting foreign fighters, though these considerations differed between groups. Ultimately, despite the availability of sufficient organizational capacity, all groups found it risky and even undesirable.
Journal: Terrorism and Political Violence
Pages: 682-705
Issue: 4
Volume: 34
Year: 2022
Month: 05
X-DOI: 10.1080/09546553.2020.1730330
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1730330
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:4:p:682-705



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1742113_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mustafa CoÅŸar Ãœnal
Author-X-Name-First: Mustafa CoÅŸar
Author-X-Name-Last: Ãœnal
Author-Name: Petra Cafnik UludaÄŸ
Author-X-Name-First: Petra
Author-X-Name-Last: Cafnik UludaÄŸ
Title: Eradicating Terrorism in Asymmetric Conflict: The Role and Essence of Military Deterrence
Abstract: 
 This study quantitatively and qualitatively analyzes the impact and effectiveness of Turkey’s deterrence-oriented incapacitation effort throughout Turkey’s PKK conflict (1984–2018). By employing vector autoregressive (VAR) analysis, this study quantitatively finds that incapacitation did not reduce PKK violence over the long term and yielded a short-term counterproductive effect. Descriptive analysis asserts that while incapacitation had important mid-term deterring effects, it did not have any sustainable mitigation on the PKK insurrection. This is because, as this study argues, these deterrent impacts were not strategically converted into political gains/results. Considering the latest phase of the conflict, in which Turkey’s intra-state strife has become increasingly regionalized and lately internationalized in military and political terms with the emergence of the Syrian civil war, particularly the rise of the People’s Protection Units (YPG), this study claims that the sole application of an incapacitation-oriented eliminationist approach has become less relevant and less effective. The study suggests that deterrence should be considered within the strategic tit-for-tat game to force/compel the non-state actor to make the conflict more manageable by transforming it in a strategic way, in which strategy of deterrence is to be attached to visionary, long-term, and viable grand strategic political end-states and to be considered within the grand bargaining game.
Journal: Terrorism and Political Violence
Pages: 772-816
Issue: 4
Volume: 34
Year: 2022
Month: 05
X-DOI: 10.1080/09546553.2020.1742113
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1742113
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:4:p:772-816



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2068309_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Padraic Kennedy
Author-X-Name-First: Padraic
Author-X-Name-Last: Kennedy
Title: Legion of the Rearguard: Dissident Irish Republicanism
Journal: Terrorism and Political Violence
Pages: 881-882
Issue: 4
Volume: 34
Year: 2022
Month: 05
X-DOI: 10.1080/09546553.2022.2068309
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2068309
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:4:p:881-882



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1745775_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Victor Asal
Author-X-Name-First: Victor
Author-X-Name-Last: Asal
Author-Name: Shawn Flanigan
Author-X-Name-First: Shawn
Author-X-Name-Last: Flanigan
Author-Name: Ora Szekely
Author-X-Name-First: Ora
Author-X-Name-Last: Szekely
Title: Doing Good while Killing: Why Some Insurgent Groups Provide Community Services
Abstract: 
 Many nonstate military organizations provide a wide range of social services to civilians. The apparent contradiction between their use of violence and their provision of charity has been the subject of a great deal of research in the conflict studies literature. Two of the most common sets of arguments hold that such services are either a form of bribery aimed at controlling and isolating constituents and potential recruits, or an extension of the organization’s ideological commitments. Our findings, based on a new analysis of the BAAD dataset, demonstrate that neither explanation is correct. Rather, we find that the provision of social services represents a means of confronting and undermining the authority of the state. In this sense, the provision of social services represents an extension of the broader political goals of the nonstate armed groups providing them.
Journal: Terrorism and Political Violence
Pages: 835-855
Issue: 4
Volume: 34
Year: 2022
Month: 05
X-DOI: 10.1080/09546553.2020.1745775
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1745775
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:4:p:835-855



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1732939_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Christopher A. Hartwell
Author-X-Name-First: Christopher A.
Author-X-Name-Last: Hartwell
Title: Shooting for the Tsars: Heterogeneous Political Volatility and Institutional Change in Russia
Abstract: 
 Can deliberate political instability, including terrorism and/or political violence, have an effect on changing formal political institutions? This paper offers two major contributions toward answering this question, one focused on data and one focused on methodology. In the first instance, this paper introduces a brand-new dataset of monthly political instability in Russia from 1788 to 1914; Czarist Russia was a country plagued by informal instability and political violence throughout the nineteenth century, and which saw waves of reform and reaction. As such, it makes an excellent test case for examining the relationship between informal political instability and formal political change. Secondly, in order to trace the evolution of Russia’s political institutions in the presence of various forms of instability, I utilize non-traditional estimation in the form of Poisson, IV-Poisson-GMM, and logistic regressions to account for the slow-moving nature of political regime change. The results of these estimations show that some forms of instability did indeed “work” in forcing a modicum of liberalization. On the other hand, large-scale unrest or external conflict had no correlation with political regime change and actually appeared to be counterproductive.
Journal: Terrorism and Political Violence
Pages: 706-724
Issue: 4
Volume: 34
Year: 2022
Month: 05
X-DOI: 10.1080/09546553.2020.1732939
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1732939
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:4:p:706-724



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1745776_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Petra Hendrickson
Author-X-Name-First: Petra
Author-X-Name-Last: Hendrickson
Title: “Old” and “New” Mass Killing? Genocide and Politicide Occurrence and Severity During and After the Cold War
Abstract: 
 How did the Cold War impact the occurrence and severity of genocide and politicide? The Cold War is known to have impacted a number of conflict dynamics, yet its influence on genocide and politicide, the most severe forms of state-driven anti-civilian violence, remains unexplored. This article argues that genocide and politicide have followed a number of worldwide trends, like increased democracy and the decreased frequency of intrastate conflict, which have had dampening effects on genocide and politicide. Probit and ordered probit analyses reveal that genocide and politicide occurrence was more frequent during the Cold War, but that the effect of the Cold War on severity depends on model specification; using 1992 as the first year of the post-Cold War era, genocides and politicides are more severe after the end of the Cold War.
Journal: Terrorism and Political Violence
Pages: 856-876
Issue: 4
Volume: 34
Year: 2022
Month: 05
X-DOI: 10.1080/09546553.2020.1745776
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1745776
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:4:p:856-876



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1742707_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Christopher Fuhriman
Author-X-Name-First: Christopher
Author-X-Name-Last: Fuhriman
Author-Name: Richard M. Medina
Author-X-Name-First: Richard M.
Author-X-Name-Last: Medina
Author-Name: Simon Brewer
Author-X-Name-First: Simon
Author-X-Name-Last: Brewer
Title: Introducing a Dataset of Multi-Scale Geographies of ISIS Ideology from ISIS Sources
Abstract: 
 This research proposes a methodology for extracting and analyzing geographical perspectives of terrorists and insurgents from online textual media. The information age has afforded organizations platforms that can be used to control their own media messages. Given that power, terrorist groups are able to create customized messages and define themselves in their own eyes on an international scale, often generating widespread sympathies and increased popularity. Within their online messaging, important information is provided that can potentially unveil geopolitical strategies. A mixed-method approach comprised of computer-aided content analysis, manual content analysis, and cartographic visualization is applied to ISIS’s Dabiq magazine as a case study to demonstrate the utility of this methodology. This research highlights the importance of considering the territoriality of terror groups and movements in geohistorical and present-day contexts.
Journal: Terrorism and Political Violence
Pages: 817-834
Issue: 4
Volume: 34
Year: 2022
Month: 05
X-DOI: 10.1080/09546553.2020.1742707
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1742707
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:4:p:817-834



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2068305_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Barak Mendelsohn
Author-X-Name-First: Barak
Author-X-Name-Last: Mendelsohn
Title: Anti-Terrorism Law and Foreign Terrorist Fighters
Journal: Terrorism and Political Violence
Pages: 877-878
Issue: 4
Volume: 34
Year: 2022
Month: 05
X-DOI: 10.1080/09546553.2022.2068305
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2068305
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:4:p:877-878



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1730329_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Oldrich Bures
Author-X-Name-First: Oldrich
Author-X-Name-Last: Bures
Title: The Counterterrorism Coordinator and the Commissioner for the Security Union: Does the European Union Need Two Top-level Counterterrorism Officials?
Abstract: 
 Both national and EU officials have repeatedly emphasized the need for a comprehensive and strongly coordinated EU counterterrorism policy in order to bring together the disparate measures taken by the member states, avoid duplication of action, involve uninterested member states, and to present the EU as a coherent counterterrorism actor. To address these concerns, the EU member states agreed to create the position of an EU Counterterrorism Coordinator in 2005, only to be followed in 2016 with the position of an EU Commissioner for Security Union. A question therefore arises as to whether the EU needs two counterterrorism coordinators. This article addresses this question by utilizing Pierre Bourdieu’s concepts of field, capital, doxa, and habitus and argues that there is no apparent rationale for the coexistence of two EU Counterterrorism Coordinators with an overlapping mandate and minimal material, similar cultural and vastly disparate symbolic capital.
Journal: Terrorism and Political Violence
Pages: 661-681
Issue: 4
Volume: 34
Year: 2022
Month: 05
X-DOI: 10.1080/09546553.2020.1730329
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1730329
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:4:p:661-681



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1741355_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mustafa Kirisci
Author-X-Name-First: Mustafa
Author-X-Name-Last: Kirisci
Title: Who Fights Terror: Gendarmerie Forces and Terrorist Group Termination
Abstract: 
 While existing research on terrorist group termination examines numerous factors explaining why some terror groups end their campaigns of violence, these studies do not sufficiently address the impact that the actors who actively fight these groups have on the probability of a group’s demise. This paper explores the effect of gendarmeries on terrorist group termination. Gendarmeries may either contribute positively to the counterterrorism efforts of the state with their policing and military operations, or they may undermine these efforts to the extent that they become unaccountable to the state for their actions. Lax accountability may lead to principle-agent problems, resulting in an increase in the risk of those groups engaging in repressive or rent-seeking actions, which can undermine support for the government and contribute to the survival of the terror group. It is argued that the competing ways in which gendarmeries can affect counterterrorism efforts are conditioned by the bureaucratic effectiveness of the state in managing the activities of gendarmerie forces and by the state’s commitment to upholding the rule of law. The results of empirical analyses reveal that having gendarmeries increases a terrorist group’s chance of ending their campaign of violence but decreases the likelihood of a group’s demise in states marked by lower bureaucratic effectiveness and weak rule of law.
Journal: Terrorism and Political Violence
Pages: 746-771
Issue: 4
Volume: 34
Year: 2022
Month: 05
X-DOI: 10.1080/09546553.2020.1741355
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1741355
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:4:p:746-771



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2068306_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Padraic Kennedy
Author-X-Name-First: Padraic
Author-X-Name-Last: Kennedy
Title: Contentious Rituals: Parading the Nation in Northern Ireland
Journal: Terrorism and Political Violence
Pages: 879-880
Issue: 4
Volume: 34
Year: 2022
Month: 05
X-DOI: 10.1080/09546553.2022.2068306
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2068306
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:4:p:879-880

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2069933_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Arie Perliger
Author-X-Name-First: Arie
Author-X-Name-Last: Perliger
Author-Name: Mengyan Liu
Author-X-Name-First: Mengyan
Author-X-Name-Last: Liu
Title: Exploring the Intersection of Environmental Events and Domestic Political Violence in the United States
Abstract: 
 Increasing levels of extreme weather patterns and environmental deterioration pose pertinent threats to the availability of essential resources, such as food and water. Past research has found a positive association between climate change and the likelihood of internal conflicts, especially in developing countries. We argue that intensifying climate events can lead to an increase in the spread and intensity of both left and right-wing ideologically motivated violence in developed countries as well, specifically the United States. We also focus on how regional environmental characteristics might be correlated to the geographical distribution of domestic political violence. Our findings suggest that while both far-right and environmental violence are more prevalent during warmer seasons and extreme warming weather events, such as heat waves, political and demographic factors also need to be considered. We also found a strong linkage between man-made ecological damage, as opposed to natural disasters, and the prevalence of eco-violence incidents, especially in states that have a progressive-liberal political culture and high levels of ecological exploitation. We conclude with a brief discussion of findings and suggestions for future research.
Journal: Terrorism and Political Violence
Pages: 1024-1040
Issue: 5
Volume: 34
Year: 2022
Month: 07
X-DOI: 10.1080/09546553.2022.2069933
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2069933
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:5:p:1024-1040



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2069449_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tamanna Ashraf
Author-X-Name-First: Tamanna
Author-X-Name-Last: Ashraf
Author-Name: Shlomi Dinar
Author-X-Name-First: Shlomi
Author-X-Name-Last: Dinar
Author-Name: Jennifer Veilleux
Author-X-Name-First: Jennifer
Author-X-Name-Last: Veilleux
Title: Dams, Terrorism, and Water Nationalism’s Response to Globalization and Development: The Case of South Asia
Abstract: 
 Building on a global research sweep of terrorist organizations’ (as well as other non-state actors such as separatist and insurgent groups) use of fresh water as a target, weapon, or source of control, this paper analyzes attacks on major water projects (specifically dams and other related infrastructure) in South Asia—the region identified to have had the largest number of recorded water-related violent incidents. Focusing on India, Pakistan, and Afghanistan, and the post 9/11 period through 2019, the paper explores how large water infrastructures (and their environs) have become hot spots for violence between states that use water development projects to consolidate power, garner local loyalty, and create a national narrative and non-state actors who attempt to target these same projects to assert indigenous self-determination, subvert state power, or challenge state authority through terrorist means. Since fresh water is shared across borders, dam projects can become entangled in regional political disputes further exacerbating violent conflict between state and non-state actors. Given its impacts on water resources, climate change may act as a “threat multiplier” by enhancing local grievances, providing both government and terrorist groups additional incentives for exploitation, and further contributing to instability. The analysis provided here borrows from and contributes to the fields of development, environment and security, and terrorism studies.
Journal: Terrorism and Political Violence
Pages: 958-978
Issue: 5
Volume: 34
Year: 2022
Month: 07
X-DOI: 10.1080/09546553.2022.2069449
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2069449
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:5:p:958-978



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2069445_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Stefanie Mavrakou
Author-X-Name-First: Stefanie
Author-X-Name-Last: Mavrakou
Author-Name: Emelie Chace-Donahue
Author-X-Name-First: Emelie
Author-X-Name-Last: Chace-Donahue
Author-Name: Robin Oluanaigh
Author-X-Name-First: Robin
Author-X-Name-Last: Oluanaigh
Author-Name: Meghan Conroy
Author-X-Name-First: Meghan
Author-X-Name-Last: Conroy
Title: The Climate Change–Terrorism Nexus: A Critical Literature Review
Abstract: 
 A growing number of policymakers around the world have recognized climate change as an escalating security threat and increasingly point to the climate change—terrorism nexus in particular. This critical literature review provides an analysis of the current state of research on the causal and correlative links between climate change, intermediary factors—such as resource scarcity, loss of economic opportunities, and instability—and terrorism in sub-Saharan Africa. Moving beyond a review of substantive themes within the existing body of scholarly research examining this topic, this article critically evaluates the theories, assumptions, and methods behind the literature. In doing so, the review identifies noteworthy trends, as well as gaps and shortcomings in the current research. Our review finds that the majority of the literature has observed a positive correlation between climate change and terrorism. More precisely, the current body of research overwhelmingly assesses that climate change indirectly leads to terrorism via its impact on conditions often considered to be drivers of terrorism in sub-Saharan Africa. Still, gaps remain in empirically backing up these assertions and examining the relationship between climate change, intermediary factors, and terrorism in more depth. We use our critical review and analysis to guide recommendations for further research into this emerging and timely field of study.
Journal: Terrorism and Political Violence
Pages: 894-913
Issue: 5
Volume: 34
Year: 2022
Month: 07
X-DOI: 10.1080/09546553.2022.2069445
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2069445
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:5:p:894-913



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2069928_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Graham Macklin
Author-X-Name-First: Graham
Author-X-Name-Last: Macklin
Title: The Extreme Right, Climate Change and Terrorism
Abstract: 
 “Eco-fascism” has recently regained prominence following two of the most lethal extreme right terrorist attacks: the murderous assault on two mosques in Christchurch, New Zealand, which killed fifty-one, and the massacre at a Walmart in El Paso, Texas, which killed twenty-two. Both of these attacks were justified by their perpetrators, at least in part, in environmental terms. Brenton Tarrant, the Christchurch terrorist, went so far as to proclaim himself an “eco-fascist.” Whilst “radical right” populism is often associated with climate denial, “extreme right” environmentalism, with its roots in the “blood and soil” thinking of Nazism, is concerned with protecting the spiritual link that supposedly exists between man and nature. Having established the historical lineage of such ideas, the article explores how contemporary extreme right groups have reacted to population growth, migration, and climate change. It explores the emergence of a particular form of “dark green” environmentalism that builds upon the “blood and soil” ideas of Nazism, synthesizing them with an anti-human ecology derived from several sources including Greco-French Hitler-worshipper Savitri Devi; the “Unabomber” Ted Kaczynski; and the Finnish environmentalist and misanthrope Pentti Linkola. The misanthropic ideas of these three ideologues and their extreme “solutions” to environmental degradation and overpopulation represent an increasingly prevalent ideological tendency within extreme right subcultures online. The violent panaceas they advocate and envisage as being necessary to defend the natural environment will undoubtedly gain greater prominence as climate change-driven migration northwards to Europe intensifies.
Journal: Terrorism and Political Violence
Pages: 979-996
Issue: 5
Volume: 34
Year: 2022
Month: 07
X-DOI: 10.1080/09546553.2022.2069928
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2069928
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:5:p:979-996



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2069447_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Justin Schon
Author-X-Name-First: Justin
Author-X-Name-Last: Schon
Author-Name: Stephen Nemeth
Author-X-Name-First: Stephen
Author-X-Name-Last: Nemeth
Title: Moving into Terrorism: How Climate-Induced Rural-Urban Migration May Increase the Risk of Terrorism
Abstract: 
 How can we expect climate change to affect terrorism? Research on climate-conflict links argues that climate and conflict are unlikely to exhibit a direct relationship. Instead, these links are likely to be indirect, often through negative shocks to agriculture. Even then, politics remains a far stronger influence on conflict than climate. Terrorism appears particularly unlikely to be directly linked to climate change, since climate change disproportionately affects rural areas and terrorism disproportionately affects urban areas. Yet, we argue that there is a process through which climate change could increase the risk of terrorism. This process involves failure to adapt in rural areas, rural-urban migration, and then a failure of cities to incorporate new population influxes. Meanwhile, rural-urban migration is likely to trigger path-dependent urbanization processes that will increase the share of the world’s population living near country borders. We expect this process to increase the motivation and opportunity for terrorism as climate change continues. Policies that help rural areas adapt through new livelihood strategies and cities adapt to large population influxes are critical to reducing this threat.
Journal: Terrorism and Political Violence
Pages: 926-938
Issue: 5
Volume: 34
Year: 2022
Month: 07
X-DOI: 10.1080/09546553.2022.2069447
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2069447
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:5:p:926-938



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2069935_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ashton Kingdon
Author-X-Name-First: Ashton
Author-X-Name-Last: Kingdon
Author-Name: Briony Gray
Author-X-Name-First: Briony
Author-X-Name-Last: Gray
Title: The Class Conflict Rises When You Turn up the Heat: An Interdisciplinary Examination of the Relationship between Climate Change and Left-Wing Terrorist Recruitment
Abstract: 
 The increasing impacts of climate change have created a global humanitarian crisis. Growing populations, unstable political structures, and competition over scarce resources are generating unprecedented levels of insecurity. Capitalising on these complex situations, terrorist organisations are using the environment as a weapon of war, exploiting the strains and grievances exacerbated by climate change to increase support, aid recruitment, and incite violence. Often neglected within contemporary analyses is the potential impact of anthropogenic climate change on left-wing terrorist organisations. Consequently, the research presented in this paper takes an interdisciplinary approach, combining terrorism studies with disaster management to examine a specific type of security crisis that exists in this overlapping relationship between climate change and left-wing conflict. Three regional case studies of terrorist groups and activity are examined in detail—the Revolutionary Armed Forces of Colombia, the Shining Path in Peru, and Naxalites in India. The article reveals the complex issues that underlie climate disasters, focusing on the impact hazards such as deforestation, rising sea levels, extreme weather, glacial retreat, drought, famine, water scarcity, and migration have on left-wing terrorist recruitment and activity.
Journal: Terrorism and Political Violence
Pages: 1041-1056
Issue: 5
Volume: 34
Year: 2022
Month: 07
X-DOI: 10.1080/09546553.2022.2069935
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2069935
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:5:p:1041-1056



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2069446_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John P. Sullivan
Author-X-Name-First: John P.
Author-X-Name-Last: Sullivan
Author-Name: Keeley Townsend
Author-X-Name-First: Keeley
Author-X-Name-Last: Townsend
Title: Climate Migration: Adding Fuel to the Ethnocentric Fire
Abstract: 
 While conflict, crime, and terrorism are persistent geopolitical and human security threats, climate change can be a threat multiplier, affecting geopolitical stability on local, regional, and global scales. This paper provides a qualitative assessment of the literature and geopolitical trends related to climate change, migration, and ethnocentrism in order to evaluate the current situation and future potentials for climate-driven conflict, crime, terrorism, and ethnocentric extremism. The paper concludes that as climate change becomes a major driver of environmental degradation, natural disasters, mass migrations, and urbanization, this will escalate the impetus for violence against migrants, the exploitation of migrants, and anti-migrant politics. Potential implications in terms of terrorism and extremism are discussed.
Journal: Terrorism and Political Violence
Pages: 914-925
Issue: 5
Volume: 34
Year: 2022
Month: 07
X-DOI: 10.1080/09546553.2022.2069446
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2069446
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:5:p:914-925



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2069448_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andrea Malji
Author-X-Name-First: Andrea
Author-X-Name-Last: Malji
Author-Name: Laurabell Obana
Author-X-Name-First: Laurabell
Author-X-Name-Last: Obana
Author-Name: Cidney Hopkins
Author-X-Name-First: Cidney
Author-X-Name-Last: Hopkins
Title: When Home Disappears: South Asia and the Growing Risk of Climate Conflict
Abstract: 
 This article highlights the multiple risks of political violence facing South Asia amid the backdrop of climate change. Specifically, it draws attention to Bangladesh and its shared border with Northeast India, a region with a long history of terrorism and insurgency. As the impact from climate change intensifies, there are several specific vulnerabilities in the region. First, internal migration within Bangladesh threatens to stress already weak infrastructures, especially in urban centers like Dhaka, which already hosts thousands of climate migrants. Internal rural-to-rural migration may further instigate clashes among farmers as they compete for diminishing agricultural resources. Second, cross-border migration from Bangladesh into India threatens to escalate existing tensions between Indians and Bangladeshi migrants, particularly in Northeast India. Violent identity movements within Northeast India are already common and a key grievance has been Bangladeshi presence in the region. These grievances have historically escalated into multiple separatist and terrorist organizations and threaten to escalate again. Hindu nationalist groups threaten to further exploit these existing tensions for political gain. Third, Rohingya refugee camps in Bangladesh are situated in a location that is at very high-risk for climate disasters. Cyclones and flooding threaten to create a new humanitarian crisis in the region. Finally, both Hindu and Islamic extremist groups may exploit grievances and utilize it for recruitment efforts. Together, these factors make South Asia particularly vulnerable to climate impacts. Using GIS, we map the climate vulnerable areas of Bangladesh alongside locations that have experienced fatal political violence from 2015–2020. We find that each administrative division faces its own unique challenges, but urban centers, areas near water, and border regions are the most vulnerable to climate conflict.
Journal: Terrorism and Political Violence
Pages: 939-957
Issue: 5
Volume: 34
Year: 2022
Month: 07
X-DOI: 10.1080/09546553.2022.2069448
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2069448
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:5:p:939-957



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2069444_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andrew Silke
Author-X-Name-First: Andrew
Author-X-Name-Last: Silke
Author-Name: John Morrison
Author-X-Name-First: John
Author-X-Name-Last: Morrison
Title: Gathering Storm: An Introduction to the Special Issue on Climate Change and Terrorism
Journal: Terrorism and Political Violence
Pages: 883-893
Issue: 5
Volume: 34
Year: 2022
Month: 07
X-DOI: 10.1080/09546553.2022.2069444
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2069444
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:5:p:883-893



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2069932_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Brian Hughes
Author-X-Name-First: Brian
Author-X-Name-Last: Hughes
Author-Name: Dave Jones
Author-X-Name-First: Dave
Author-X-Name-Last: Jones
Author-Name: Amarnath Amarasingam
Author-X-Name-First: Amarnath
Author-X-Name-Last: Amarasingam
Title: Ecofascism: An Examination of the Far-Right/Ecology Nexus in the Online Space
Abstract: 
 With Patrick Crusuis’ 2019 attack that killed twenty-two people in El Paso, Texas, discussions of ecofascism were thrust into mainstream news outlets and magazines. In his manifesto, Crusius described himself as an “ecofascist” seeking to challenge the “environmental warfare” of immigration. His choice of target, a Walmart frequented by Mexican immigrants, reflects this ideological connection between ecological priorities and violent white supremacist ideology. In this paper, the authors provide a review of existing theoretical literature on ecofascism to identify its key characteristics, namely, its Romantic sensibilities, anti-humanism, and mysticism. The authors argue that these features distinguish ecofascism from what other scholars have deemed “far-right ecologisms.” Following this, the authors draw on a larger corpus of data gathered from Twitter and Telegram between November 2019 and November 2020 to identify common themes in ecofascist circles, including the thinkers they frequently cite. The dataset examined shows notable differences in the types of content shared in ecofascist groups compared to the far-right more broadly.
Journal: Terrorism and Political Violence
Pages: 997-1023
Issue: 5
Volume: 34
Year: 2022
Month: 07
X-DOI: 10.1080/09546553.2022.2069932
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2069932
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:5:p:997-1023

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1777110_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Aleksandra Gasztold
Author-X-Name-First: Aleksandra
Author-X-Name-Last: Gasztold
Author-Name: Przemysław Gasztold
Author-X-Name-First: Przemysław
Author-X-Name-Last: Gasztold
Title: The Polish Counterterrorism System and Hybrid Warfare Threats
Abstract: 
 This article examines the origins, structure and role of the Polish counterterrorism system, which is then set against the rising threat posed by state and non-state actors employing hybrid warfare tools. We demonstrate the usefulness of anti-terrorist regulations, not only in counteracting terrorist groups, but also in the thwarting of operations engaged in by various entities waging hybrid warfare. We argue that lessons learned from the international struggle against terrorism can contribute to the development of proper prescriptions that seek to tackle hybrid threats. Extensive anti-terror instruments and measures implemented since 2016 are among the key elements in the contemporary defense and security doctrine being pursued by Poland. However, while the new regulations have provided intelligence agencies with strong powers that markedly enhance their capabilities regarding the recognition of hybrid threats, the same flexible legal regulations, subject to broad interpretation, may also serve a partisan agenda, and thus endanger the rule of law.
Journal: Terrorism and Political Violence
Pages: 1259-1276
Issue: 6
Volume: 34
Year: 2022
Month: 08
X-DOI: 10.1080/09546553.2020.1777110
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1777110
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:6:p:1259-1276



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1767604_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Steven Windisch
Author-X-Name-First: Steven
Author-X-Name-Last: Windisch
Author-Name: Pete Simi
Author-X-Name-First: Pete
Author-X-Name-Last: Simi
Author-Name: Kathleen Blee
Author-X-Name-First: Kathleen
Author-X-Name-Last: Blee
Author-Name: Matthew DeMichele
Author-X-Name-First: Matthew
Author-X-Name-Last: DeMichele
Title: Measuring the Extent and Nature of Adverse Childhood Experiences (ACE) among Former White Supremacists
Abstract: 
 While progress has been made to understand mid-life correlates associated with extremist participation, much less research focuses on adolescent risk factors. The purpose of the current study is to expand upon the focus on individual-level correlates by assessing the extent and nature of childhood adversity among a sample of former white supremacists. The current study relies on in-depth life-history interviews with ninety-one North America-based former white supremacists and the Adverse Childhood Experiences questionnaire. Overall, the current sample contained elevated rates of childhood risk factors with 63 percent of participants having experienced four or more adverse experiences during the first eighteen years of their lives (as compared to 55 percent of a comparison “high risk” sample and 16 percent of the U.S. general population sample). Furthermore, participants discussed a variety of maladaptive coping strategies associated with adversity that generated vulnerabilities to adolescent misconduct and extremism early in the life-course. Our findings indicate that extremist onset does not begin with a single life event but rather is generated, and further exacerbated by the cumulative impact of multiple adverse experiences during childhood.
Journal: Terrorism and Political Violence
Pages: 1207-1228
Issue: 6
Volume: 34
Year: 2022
Month: 08
X-DOI: 10.1080/09546553.2020.1767604
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1767604
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:6:p:1207-1228



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1763320_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Austin C. Doctor
Author-X-Name-First: Austin C.
Author-X-Name-Last: Doctor
Author-Name: John D. Willingham
Author-X-Name-First: John D.
Author-X-Name-Last: Willingham
Title: Foreign Fighters, Rebel Command Structure, and Civilian Targeting in Civil War
Abstract: 
 Recent studies find that the presence of foreign fighters in a rebel organization may increase levels of anti-civilian violence in civil war. But why? Evidence from some cases indicates that foreign fighters may be used intentionally by local rebel commanders to carry out abusive operations against noncombatants. Other cases, however, suggest that foreign fighters possess greater capacity for independent agency in war, stepping outside the chain of command to inflict harm against local noncombatants. We argue that variation in a rebel group’s command structure—specifically, their degree of centralization—offers a point of leverage with which to adjudicate between the generalizability of these competing explanations. We investigate this issue with an analysis of sixty-nine rebel groups active between 1989 and 2015. We find that the effect of foreign fighters on civilian targeting is conditional: foreign fighters are associated with greater levels of anti-civilian violence only when active in groups with centralized command structures. This study contributes to the nascent literature on foreign fighters, offering insight into how these actors step into the command structures of rebel organizations. This study also demonstrates that the abuse of civilians in conflict can be explained effectively based on the characteristics of armed parties.
Journal: Terrorism and Political Violence
Pages: 1125-1143
Issue: 6
Volume: 34
Year: 2022
Month: 08
X-DOI: 10.1080/09546553.2020.1763320
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1763320
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:6:p:1125-1143



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1764942_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Zin Derfoufi
Author-X-Name-First: Zin
Author-X-Name-Last: Derfoufi
Title: Radicalization’s Core
Abstract: 
 Is radicalization inherently conducive to terrorism? This paper addresses this fault-line within discourses on radicalization by analyzing the political awakening and mobilization of British Muslims operating in environments targeted by violent-extremists. The results show that despite undergoing the “root causes” and “triggers” associated with radicalization, and even having direct contact with violent-extremists, research participants still rejected terrorism. This paper analyzes why participants’ radicalism promoted resilience to political violence rather than propel them toward it. It challenges the selection bias within terrorism and radicalization studies which constrain our ability to understand this phenomenon by focusing on the rare cases of people who support terrorism while ignoring its more common trajectories of non-terror related activism (or apathy). In correcting this bias, this paper proposes a more holistic definition of radicalization grounded in the lived realities of people undergoing that process and concludes with a discussion on what the findings mean for the assumptions underpinning academic discourses on this matter and state counterterrorism policies.
Journal: Terrorism and Political Violence
Pages: 1185-1206
Issue: 6
Volume: 34
Year: 2022
Month: 08
X-DOI: 10.1080/09546553.2020.1764942
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1764942
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:6:p:1185-1206



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2105583_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: Correction
Journal: Terrorism and Political Violence
Pages: i-i
Issue: 6
Volume: 34
Year: 2022
Month: 08
X-DOI: 10.1080/09546553.2022.2105583
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2105583
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:6:p:i-i



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1761796_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Victor Asal
Author-X-Name-First: Victor
Author-X-Name-Last: Asal
Author-Name: Justin V. Hastings
Author-X-Name-First: Justin V.
Author-X-Name-Last: Hastings
Author-Name: Karl Rethemeyer
Author-X-Name-First: Karl
Author-X-Name-Last: Rethemeyer
Title: Maritime Insurgency
Abstract: 
 Why do some insurgent organizations launch maritime attacks? To examine why organizations would engage in this behavior we draw on a new dataset of insurgencies to investigate the organizational characteristics associated with maritime attacks. We find that there are two types of maritime attacks by insurgencies. While both types of attacks are associated with the trappings of a state, beyond those factors, maritime revenue-raising attacks take place in a milieu of criminal activity, while maritime non-revenue-raising attacks are associated with an insurgency’s organizational sophistication and capacity.
Journal: Terrorism and Political Violence
Pages: 1102-1124
Issue: 6
Volume: 34
Year: 2022
Month: 08
X-DOI: 10.1080/09546553.2020.1761796
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1761796
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:6:p:1102-1124



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1776702_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Patrick F. Larue
Author-X-Name-First: Patrick F.
Author-X-Name-Last: Larue
Author-Name: Orlandrew E. Danzell
Author-X-Name-First: Orlandrew E.
Author-X-Name-Last: Danzell
Title: Rethinking State Capacity: Conceptual Effects on the Incidence of Terrorism
Abstract: 
 The civil conflict literature often relies on state capacity having significant impacts on the risk of, and duration of, civil war and other civil conflicts. Many characteristics of civil conflict are often similar to terrorism, especially domestic terrorism, and are also considered when discussing the predictors of terror. However, what is not considered in either area of the literature is alternative characteristics of state capacity, namely, the degree of fragmentation in the policymaking branches, and its ability to enforce and carry out the laws that are implemented. This paper examines these effects, expanding the interpretation of state capacity to include these aforementioned concepts, and testing them simultaneously with the extant interpretation of capacity. Results show that when including these additional characteristics of capacity, previously accepted predictors are no longer relevant in predicting terrorism.
Journal: Terrorism and Political Violence
Pages: 1241-1258
Issue: 6
Volume: 34
Year: 2022
Month: 08
X-DOI: 10.1080/09546553.2020.1776702
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1776702
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:6:p:1241-1258



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1745777_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Edward Burke
Author-X-Name-First: Edward
Author-X-Name-Last: Burke
Title: Loyalist Mobilization and Cross-Border Violence in Rural Ulster, 1972-1974
Abstract: 
 This article argues that, at a tactical level, loyalist terrorism in the Irish border region between 1972 and 1974 worked. Cross-border attacks including bombings in Irish towns prompted the Irish government to reinforce security along the border—a long-standing loyalist demand. The loyalist campaign led to the IRA embarking on an effort to punish those who were believed to have passed information to loyalists, resulting in the killing of an Irish Protestant senator and widespread condemnation of the organization in the Republic of Ireland. However, short-term gains were outweighed by a growing perception among nationalists that the British state tolerated or even colluded in such attacks, undermining the British Army’s campaign to gain trust (and information) within the Catholic population of Northern Ireland. The article also contends that middle-class loyalists played an important role in mobilizing and equipping loyalist paramilitary organizations. It concludes that the British Army showed an excessive tolerance of loyalists with political capital or ties to the security forces, despite evidence that such individuals were directly supporting the activities of loyalist paramilitaries.
Journal: Terrorism and Political Violence
Pages: 1057-1075
Issue: 6
Volume: 34
Year: 2022
Month: 08
X-DOI: 10.1080/09546553.2020.1745777
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1745777
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:6:p:1057-1075



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1768078_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Vincenzo Bove
Author-X-Name-First: Vincenzo
Author-X-Name-Last: Bove
Author-Name: Tobias Böhmelt
Author-X-Name-First: Tobias
Author-X-Name-Last: Böhmelt
Title: Imprisonment and Terrorism
Abstract: 
 While policymakers frequently praise the impact of law enforcement for addressing the threat of terrorism, several cases suggest that the imprisonment of terrorists and potential perpetrators may actually lead to (more) radicalization and, ultimately, a higher risk of terrorism. We take systematic stock of the arguments linking terrorism with incarceration and analyze newly collected data on worldwide prison populations. The results from quantitative analysis highlight that an increase in prison population is correlated with a decline in the number of terrorist attacks, in particular its domestic form. We conclude with a discussion of the implications of this finding for academic and policy circles.
Journal: Terrorism and Political Violence
Pages: 1229-1240
Issue: 6
Volume: 34
Year: 2022
Month: 08
X-DOI: 10.1080/09546553.2020.1768078
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1768078
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:6:p:1229-1240



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1763963_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Burch
Author-X-Name-First: Michael
Author-X-Name-Last: Burch
Author-Name: Elise Pizzi
Author-X-Name-First: Elise
Author-X-Name-Last: Pizzi
Title: Strategic Targeting: The Islamic State and Use of Violence in Iraq and Syria
Abstract: 
 What explains the specific location of Islamic State attacks in Syria and Iraq? We consider how both ethnic and economic factors shape the group’s decision-making about where to attack. We explore these competing motivations using spatial analysis of the Islamic State’s individual acts of violence from 2013–2017. We find that both areas with ethnic heterogeneity and valuable economic rents are associated with more individual Islamic State violent events. By examing the micro-foundations of the Islamic State’s conflict decisions, we provide further nuance to understanding the strategic logic of rebel groups during wartime.
Journal: Terrorism and Political Violence
Pages: 1162-1184
Issue: 6
Volume: 34
Year: 2022
Month: 08
X-DOI: 10.1080/09546553.2020.1763963
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1763963
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:6:p:1162-1184



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1761343_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Devorah Margolin
Author-X-Name-First: Devorah
Author-X-Name-Last: Margolin
Title: #Hamas: A Thematic Exploration of Hamas’s English-Language Twitter
Abstract: 
 As the debate on whether Hamas should be designated a terrorist organization intensifies across Europe and North America, policymakers and practitioners seek to identify the core principles that unify the group and its ideology. This paper contributes to this discussion by examining how Hamas uses Twitter to frame its narrative to English-speakers around the world. From March 2015 until November 2019, when its account was suspended from Twitter, Hamas operated an English-language Twitter handle under the name @HamasInfoEn. Using thematic content analysis to explore the first 2,848 tweets sent by Hamas in English—between March 2015 and March 2018—this paper explores the socio-political and religious narratives that lay at the core of Hamas’s online public diplomacy throughout its first three years on Twitter. Since its entrance into politics in 2006, some academics argue that Hamas has increasingly sought to distance itself from acts of terrorism and legitimize its actions as a governing actor, thereby seeking to carve out a place for itself in the international community. This study presents a nuanced understanding of how Hamas represents itself internationally, to better understand where the group is going, and how to best counter its narratives.
Journal: Terrorism and Political Violence
Pages: 1076-1101
Issue: 6
Volume: 34
Year: 2022
Month: 08
X-DOI: 10.1080/09546553.2020.1761343
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1761343
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:6:p:1076-1101



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1763962_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Cory Eybergen
Author-X-Name-First: Cory
Author-X-Name-Last: Eybergen
Author-Name: Martin A. Andresen
Author-X-Name-First: Martin A.
Author-X-Name-Last: Andresen
Title: Refugees of Conflict, Casualties of Conjecture: The Trojan Horse Theory of Terrorism and its Implications for Asylum
Abstract: 
 There are more displaced persons worldwide today than there ever has been before. Many countries, despite the urgent need for collective effort in providing for these persons, have been slow to accommodate them. Applicants continue to face stringent legal and practical barriers to asylum, even in countries party to the various international refugee agreements. Restrictions on applications are routinely justified with reference to national security, and in particular to defense against terrorism. There is a belief in some sectors of the polity and public that allowing greater numbers of refugees into the country will result in more incidences of violent terrorism. Refugee resettlement programs are caricatured as the Trojan horse permitting terrorists’ passage through national borders. Little has been done, empirically, that could testify to the veracity of such a theory, and that which has been done has been equivocal. Moreover, previous studies were unable to establish anything past a coincidental association between refugee populations and experiences of terrorism. This study explicitly tests the idea that refugees, by their own actions, cause terrorism. The findings of the study do not support Trojan horse or other theories that villainize refugees, nor are they decisive of a connection between refugees and terrorism.
Journal: Terrorism and Political Violence
Pages: 1144-1161
Issue: 6
Volume: 34
Year: 2022
Month: 08
X-DOI: 10.1080/09546553.2020.1763962
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1763962
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:6:p:1144-1161



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2068314_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Philip Luke Johnson
Author-X-Name-First: Philip Luke
Author-X-Name-Last: Johnson
Title: Super Mad at Everything All the Time: Political Media and Our National Anger
Journal: Terrorism and Political Violence
Pages: 1279-1280
Issue: 6
Volume: 34
Year: 2022
Month: 08
X-DOI: 10.1080/09546553.2022.2068314
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2068314
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:6:p:1279-1280



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2068312_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Charles W. Mahoney
Author-X-Name-First: Charles W.
Author-X-Name-Last: Mahoney
Title: Rebel Power: Why National Movements Compete, Fight, and Win
Journal: Terrorism and Political Violence
Pages: 1277-1278
Issue: 6
Volume: 34
Year: 2022
Month: 08
X-DOI: 10.1080/09546553.2022.2068312
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2068312
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:6:p:1277-1278

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1789111_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David Lowe
Author-X-Name-First: David
Author-X-Name-Last: Lowe
Title: Far-Right Extremism: Is it Legitimate Freedom of Expression, Hate Crime, or Terrorism?
Abstract: 
 Following the rise in far-right inspired terrorist attacks globally, social media and electronic communications companies have been criticized, mainly by politicians, for allowing far-right extremist content to be available. This article is a comparative legal study focusing on Australia, Canada, New Zealand, the U.K., and the U.S.’ legal provisions regarding the right to freedom of expression, hate crime, and proscription of terrorist organizations. This study found a disparity in the form of expression protected under this right. This disparity widens further when related to hate crime and proscribing groups as terrorist organizations. As such, social media and communications companies have difficulty setting at global level a baseline in determining whether content is legitimate commentary or is extremism promoting or inciting hatred and violence. The article concludes with a recommendation for how states can provide comparable legislation on hate crime as they have done in relation to Islamist inspired extremism. This will assist social media and communications companies in removing content and suspending accounts. These companies are not the guardians of freedom of expression, that is the role of states’ legislatures and judiciary.
Journal: Terrorism and Political Violence
Pages: 1433-1453
Issue: 7
Volume: 34
Year: 2022
Month: 10
X-DOI: 10.1080/09546553.2020.1789111
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1789111
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:7:p:1433-1453



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1803288_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bettina Rottweiler
Author-X-Name-First: Bettina
Author-X-Name-Last: Rottweiler
Author-Name: Paul Gill
Author-X-Name-First: Paul
Author-X-Name-Last: Gill
Title: Conspiracy Beliefs and Violent Extremist Intentions: The Contingent Effects of Self-efficacy, Self-control and Law-related Morality
Abstract: 
 This study analyzes the effects of conspiracy beliefs on violent extremist intentions. More specifically, we investigate whether the relationship between conspiracy beliefs and violent extremism depends upon individual characteristics such as varying levels of self-efficacy, self-control, and law-relevant morality. Variable interactions examine where conspiracy beliefs exert strong effects on violent extremist intentions. The analysis is based on a German nationally representative survey (N = 1502). To our knowledge, it is the first and only nationally representative survey carried out in violent extremism research.Our results confirm that a stronger conspiracy mentality leads to increased violent extremist intentions. However, this relationship is contingent on several individual differences. The effects are much stronger for individuals exhibiting lower self-control, holding a weaker law-relevant morality, and scoring higher in self-efficacy. Conversely, when stronger conspiracy beliefs are held in combination with high self-control and a strong law-relevant morality, violent extremist intentions are lower. Such individual features thus constitute interactive protective factors for violent extremism. These results have important implications for practice in the area of violent extremism risk assessment and management. Conceptually, the results demonstrate the need to further elaborate the conditional effects of certain risk as well as protective factors for violent extremism.
Journal: Terrorism and Political Violence
Pages: 1485-1504
Issue: 7
Volume: 34
Year: 2022
Month: 10
X-DOI: 10.1080/09546553.2020.1803288
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1803288
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:7:p:1485-1504



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1761342_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jared R. Dmello
Author-X-Name-First: Jared R.
Author-X-Name-Last: Dmello
Author-Name: Arie Perliger
Author-X-Name-First: Arie
Author-X-Name-Last: Perliger
Author-Name: Matthew Sweeney
Author-X-Name-First: Matthew
Author-X-Name-Last: Sweeney
Title: The Violence of Political Empowerment: Electoral Success and the Facilitation of Terrorism in the Republic of India
Abstract: 
 Ideological violence, according to previous research, tends to spike following what may be perceived as an electoral success of an ideologically-affiliated political camp. Despite a growing number of examples across the globe, the extent to which ideological success in electoral processes impacts terrorism within constituencies remains under-researched. This exploratory analysis seeks to examine how majority-minority outcomes in the electoral process influence terrorism in democratic states. This study employs a longitudinal case study approach for the Republic of India, using publicly available data from the Census of India and open-sourced data on terrorist activity. We find that economic stress most strongly impacts the likelihood that supporters of the political majority will engage in terrorist activity, followed by social cohesion, measured through religious homogeneity.
Journal: Terrorism and Political Violence
Pages: 1281-1304
Issue: 7
Volume: 34
Year: 2022
Month: 10
X-DOI: 10.1080/09546553.2020.1761342
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1761342
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:7:p:1281-1304



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1794854_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Rafe McGregor
Author-X-Name-First: Rafe
Author-X-Name-Last: McGregor
Title: Narrative Counter-Terror: Deconstruction, Deliverance, and Debilitation
Abstract: 
 The aim of this article is to explore and evaluate narrative analysis as a counter-terror strategy. Research has demonstrated that both the white supremacist and Muslim fundamentalist calls to global violence are instantiations of a single master narrative, victim, which commits the ingroup to the restoration of utopia by the expulsion or extermination of the outgroup. This study deconstructs texts from American Renaissance and Rumiyah to show that the victim master narrative is underpinned by the concept of deliverance, which combines the desirability of the survival of the ingroup (with its various superior qualities) and the likelihood of destruction by the outgroup (with its vastly superior numbers) to justify resistance, defense, and attack. The expanded and elaborated master narrative is then assessed in terms of its potential to: (1) debilitate extremist recruitment; and (2) transform attempts to reduce global terrorism by providing a soft-power alternative to the unsuccessful hard-power strategies that have characterized twenty-first century counter-terror thus far.
Journal: Terrorism and Political Violence
Pages: 1471-1484
Issue: 7
Volume: 34
Year: 2022
Month: 10
X-DOI: 10.1080/09546553.2020.1794854
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1794854
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:7:p:1471-1484



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1787384_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ayca Altay
Author-X-Name-First: Ayca
Author-X-Name-Last: Altay
Author-Name: Melike Baykal-Gürsoy
Author-X-Name-First: Melike
Author-X-Name-Last: Baykal-Gürsoy
Author-Name: Pernille Hemmer
Author-X-Name-First: Pernille
Author-X-Name-Last: Hemmer
Title: Behavior Associations in Lone-Actor Terrorists
Abstract: 
 Terrorist attacks carried out by individuals have significantly accelerated over the last twenty years. This type of lone-actor (LA) terrorism stands as one of the greatest security threats of our time. While the research on LA behavior and characteristics has produced valuable information on demographics, classifications, and warning signs, the relationship among these characteristics is yet to be addressed. Moreover, the means of radicalization and attacking have changed over decades. This study conducts an a-posteriori analysis of the temporal changes in LA terrorism and behavioral associations in LAs. We initially identify twenty-five binary behavioral characteristics of LAs and analyze 190 LAs. Next, we classify LAs according to ideology first, incident-scene behavior (determined via a virtual attacker-defender game) secondly, and, finally, the clusters obtained from the data. In addition, within each class, statistically significant associations and temporal relations are extracted using the A-priori algorithm. These associations would be instrumental in identifying the attacker’s type and intervening at the right time. The results indicate that while pre-9/11 LAs were mostly radicalized by the people in their environment, post-9/11 LAs are more diverse. Furthermore, association chains for different LA types present unique characteristic pathways to violence and after-attack behavior.
Journal: Terrorism and Political Violence
Pages: 1386-1414
Issue: 7
Volume: 34
Year: 2022
Month: 10
X-DOI: 10.1080/09546553.2020.1787384
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1787384
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:7:p:1386-1414



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2068308_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Karyn Sporer
Author-X-Name-First: Karyn
Author-X-Name-Last: Sporer
Title: Expressions of Radicalization: Global Politics, Processes and Practices
Journal: Terrorism and Political Violence
Pages: 1507-1508
Issue: 7
Volume: 34
Year: 2022
Month: 10
X-DOI: 10.1080/09546553.2022.2068308
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2068308
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:7:p:1507-1508



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1784147_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tiana Gaudette
Author-X-Name-First: Tiana
Author-X-Name-Last: Gaudette
Author-Name: Ryan Scrivens
Author-X-Name-First: Ryan
Author-X-Name-Last: Scrivens
Author-Name: Vivek Venkatesh
Author-X-Name-First: Vivek
Author-X-Name-Last: Venkatesh
Title: The Role of the Internet in Facilitating Violent Extremism: Insights from Former Right-Wing Extremists
Abstract: 
 While a growing body of evidence suggests that the Internet is a key facilitator of violent extremism, research in this area has rarely incorporated former extremists’ experiences with the Internet when they were involved in violent extremism. To address this gap, in-depth interviews were conducted with ten Canadian former right-wing extremists who were involved in violent racist skinhead groups, with interview questions provided by thirty Canadian law enforcement officials and ten community activists. Participants were asked about their use of the Internet and the connection between their on- and offline worlds during their involvement in the violent right-wing extremist movement. Overall, our study findings highlight the interplay between the Internet and violent extremism as well as the interactions between the on- and offline worlds of violent extremists. We conclude with a discussion of study limitations and avenues for future research.
Journal: Terrorism and Political Violence
Pages: 1339-1356
Issue: 7
Volume: 34
Year: 2022
Month: 10
X-DOI: 10.1080/09546553.2020.1784147
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1784147
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:7:p:1339-1356



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2068307_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daveed Gartenstein-Ross
Author-X-Name-First: Daveed
Author-X-Name-Last: Gartenstein-Ross
Title: How Terror Evolves: The Emergence and Spread of Terrorist Techniques
Journal: Terrorism and Political Violence
Pages: 1505-1506
Issue: 7
Volume: 34
Year: 2022
Month: 10
X-DOI: 10.1080/09546553.2022.2068307
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2068307
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:7:p:1505-1506



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1777987_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Thomas J. Holt
Author-X-Name-First: Thomas J.
Author-X-Name-Last: Holt
Author-Name: Jin Ree Lee
Author-X-Name-First: Jin Ree
Author-X-Name-Last: Lee
Author-Name: Joshua D. Freilich
Author-X-Name-First: Joshua D.
Author-X-Name-Last: Freilich
Author-Name: Steven M. Chermak
Author-X-Name-First: Steven M.
Author-X-Name-Last: Chermak
Author-Name: Johannes M. Bauer
Author-X-Name-First: Johannes M.
Author-X-Name-Last: Bauer
Author-Name: Ruth Shillair
Author-X-Name-First: Ruth
Author-X-Name-Last: Shillair
Author-Name: Arun Ross
Author-X-Name-First: Arun
Author-X-Name-Last: Ross
Title: An Exploratory Analysis of the Characteristics of Ideologically Motivated Cyberattacks
Abstract: 
 Web defacement is a form of hacking that involves altering the content of a website, resulting in repairs to the website code, loss of revenue, internal loss of productivity, and reputational damage. Limited research has examined the frequency of web defacements, the factors that distinguish them from other hacking motives, and the extent to which the correlates mirror research on physical acts of ideologically-motivated crime. The current study examined over 2.4 million web defacements hosted in the U.S. from 2012 to 2016 to assess aspects of routine activities theory associated with target selection and attack methods among ideologically-motivated defacements. A binary logistic regression analysis revealed that ideologically-motivated defacers were more likely to use unknown vulnerabilities; engage in repeated attacks; target top-level domains linked to foreign nations; domains ending in.edu; and homepages within websites. The findings of this study suggest that the target selection process of ideologically-motivated defacers are more purposive and designed to draw attention to their cause, resembling target preferences of individuals who engage in physical violence in support of an ideological agenda.
Journal: Terrorism and Political Violence
Pages: 1305-1320
Issue: 7
Volume: 34
Year: 2022
Month: 10
X-DOI: 10.1080/09546553.2020.1777987
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1777987
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:7:p:1305-1320



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1785876_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Katie E. Sullivan
Author-X-Name-First: Katie E.
Author-X-Name-Last: Sullivan
Author-Name: Paul B. Hutchings
Author-X-Name-First: Paul B.
Author-X-Name-Last: Hutchings
Title: Right-Wing Authoritarian and Explicit Prejudice Attitude Responses to the Paris Terror Attacks: A Within-Subjects Analysis
Abstract: 
 When a terror attack occurs people appear to be prepared, in the short term, to be more accepting of authoritarian sanctions against outgroup members, particularly if sanctions are targeted against members of the outgroup perceived as responsible for the attack. The current study examined forty-two British participants’ scores on measures of right-wing authoritarianism (RWA) and explicit prejudice (EP) before, within thirty-six hours of, and one year after the November 2015 Paris terror attacks. As higher scores on RWA measures have been linked to considering the world as dangerous and threatening, and desiring that authority control and punish transgressors of societal norms, and higher EP scores have been linked to negative perceptions of outgroups, we hypothesized that participants’ scores on both measures would increase immediately after the terror attack. Analyses showed small but significant increases in RWA and EP scores immediately after the attacks, particularly for those initially scoring lower on these measures, but scores on both measures had returned to baseline levels oneyear later. These findings from a within-subjects sample support recent between-subjects research suggesting that RWA and EP attitudes are impacted in the short term by reported terrorist attacks.
Journal: Terrorism and Political Violence
Pages: 1357-1368
Issue: 7
Volume: 34
Year: 2022
Month: 10
X-DOI: 10.1080/09546553.2020.1785876
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1785876
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:7:p:1357-1368



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1792446_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mora Deitch
Author-X-Name-First: Mora
Author-X-Name-Last: Deitch
Title: Is Religion a Barrier to Peace? Religious Influence on Violent Intrastate Conflict Termination
Abstract: 
 In recent years, a burgeoning literature has emerged on the relationship between religion and conflict. Contradictory theories address the dynamics and termination of religious violent conflicts. Some studies focus on the destructive role of religion, arguing that religious conflicts are longer, more violent, and intractable. Others argue that religion has an ambivalent role, both destructive and constructive, and recognize religion as a force for peacebuilding. This study focuses on the relationship between religion and conflict termination by examining termination outcomes, based on the length and the level of violence, as well as incidents of reoccurrence. The study quantitatively examines 118 domestic conflicts between 1990 and 2014, utilizing the Political Instability Task Force and Religion and State datasets. The findings suggest that religious conflicts are likely to last longer than non-religious ones. However, the study reveals that religion has no strong significant influence on conflict termination as well as on the reoccurrence of conflicts and the violence level.
Journal: Terrorism and Political Violence
Pages: 1454-1470
Issue: 7
Volume: 34
Year: 2022
Month: 10
X-DOI: 10.1080/09546553.2020.1792446
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1792446
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:7:p:1454-1470



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1788544_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Holger Marcks
Author-X-Name-First: Holger
Author-X-Name-Last: Marcks
Author-Name: Janina Pawelz
Author-X-Name-First: Janina
Author-X-Name-Last: Pawelz
Title: From Myths of Victimhood to Fantasies of Violence: How Far-Right Narratives of Imperilment Work
Abstract: 
 Why is far-right rhetoric so dangerous? In recent years, scholars and policy makers alike have striven to unpack the black box of extremists’ online communication and the rise of far-right violence. Particularly the role of social media in spreading hate speech and fostering radicalization has caught a lot of attention; however, there has been little success in pinning down the drivers of violence. Drawing on the concept of dangerous speech, we take a step back from the violent effects of far-right online communication. Instead, we examine its logical functioning to illuminate the upstream processes that constitute hate and legitimize violence. More concretely, we study how far-right narratives employed on social media mobilize emotions that prepare for the acceptance or even use of violence. Analyzing the argumentative structures of two anti-immigration campaigns in Germany, we find a network of narratives where narratives of imperilment—supported by narratives of conspiracy and inequality—converge into a greater story of national threat and awakening. By constructing a situation of collective self-defense, violence becomes a logical option, even if violent action is not explicitly proposed. Counter-narrative efforts should thus not only focus on hate speech but also address the myths of victimhood, which are constitutive of (violent) palingenetic fantasies.
Journal: Terrorism and Political Violence
Pages: 1415-1432
Issue: 7
Volume: 34
Year: 2022
Month: 10
X-DOI: 10.1080/09546553.2020.1788544
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1788544
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:7:p:1415-1432



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1777988_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: B. Heidi Ellis
Author-X-Name-First: B. Heidi
Author-X-Name-Last: Ellis
Author-Name: Alisa B. Miller
Author-X-Name-First: Alisa B.
Author-X-Name-Last: Miller
Author-Name: Ronald Schouten
Author-X-Name-First: Ronald
Author-X-Name-Last: Schouten
Author-Name: Naima Y. Agalab
Author-X-Name-First: Naima Y.
Author-X-Name-Last: Agalab
Author-Name: Saida M. Abdi
Author-X-Name-First: Saida M.
Author-X-Name-Last: Abdi
Title: The Challenge and Promise of a Multidisciplinary Team Response to the Problem of Violent Radicalization
Abstract: 
 Violent radicalization is a complex process that results from multiple influences and experiences across the settings and contexts of an individual’s life. No single pathway or characteristic determines who is at risk for it. Given this understanding, no single intervention aimed at this multiply-determined problem is likely to be successful if it is implemented in isolation. Multidisciplinary team approaches are increasingly seen as holding promise in the prevention and intervention of violent radicalization in the United States and internationally. A multidisciplinary team is typically a group of professionals who are members of different fields of study (psychology, medicine, social work, etc.) who provide a specific service to an individual. Team members independently focus on the issues in which they specialize and activities of the team are coordinated with a common goal. This paper aims to extend current knowledge by addressing questions related to challenges in implementing a multidisciplinary team approach with the capacity to address violent radicalization, presenting potential solutions to these challenges as well as highlighting one multidisciplinary team, Community Connect, that successfully worked with youth identified as being at risk for violence.
Journal: Terrorism and Political Violence
Pages: 1321-1338
Issue: 7
Volume: 34
Year: 2022
Month: 10
X-DOI: 10.1080/09546553.2020.1777988
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1777988
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:7:p:1321-1338



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1798198_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: Correction
Journal: Terrorism and Political Violence
Pages: i-i
Issue: 7
Volume: 34
Year: 2022
Month: 10
X-DOI: 10.1080/09546553.2020.1798198
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1798198
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:7:p:i-i



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1785877_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Huseyn Aliyev
Author-X-Name-First: Huseyn
Author-X-Name-Last: Aliyev
Title: Pro-government Anti-government Armed Groups? Toward Theorizing Pro-government “Government Challengers”
Abstract: 
 This study challenges the presentation of non-state armed groups as divided into anti-government rebels and pro-government proxies and proposes that some pro-government armed groups maintain explicit anti-government rhetoric. It is this anti-government agenda that enables “pro-government” groups to successfully recruit their members and to advance their interests. From Iraq’s Shiite militias to Lebanon’s Hezbollah and Afghan Uzbek warlords, there are numerous armed groups which, on the one hand, officially maintain pro-government stance and, on the other hand, explicitly criticize, oppose and challenge the state. On a theoretical level, this study seeks to demonstrate that a “pro-government anti-government” group is a distinct category of non-state armed groups that neither directly engages in armed confrontation with the state nor complies with its agenda and policies or fully accepts its legitimacy. On an empirical level, this paper explores why individuals mobilize for pro-government anti-government armed groups. Unique micro-level interview data with members of volunteer militia battalions in Ukraine are employed to provide insights into the functioning of pro-government anti-government militants. Drawing upon its empirical findings, this study proposes that pro-government “government challengers” emerge and persist because these groups are more efficient than the government in the provision of security and in promoting the incumbent’s ideology.
Journal: Terrorism and Political Violence
Pages: 1369-1385
Issue: 7
Volume: 34
Year: 2022
Month: 10
X-DOI: 10.1080/09546553.2020.1785877
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1785877
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:7:p:1369-1385

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1833861_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Eke McGowan
Author-X-Name-First: Eke
Author-X-Name-Last: McGowan
Title: Moral Injury in Provisional IRA Members: Preliminary Evidence of Moral Beliefs Injuring, Protecting & Disillusioning
Abstract: 
 Moral injury has recently gained much attention in the field of military psychiatry. However, it has not yet been applied to actors of non-state political violence. Investigating the incidence of moral injury in these populations would increase the understanding of the negative psychological effects of engagement in non-state political violence. This study examined whether moral injury could be applied to former Provisional IRA members who were active during the “Troubles” in Northern Ireland. Nine autobiographical sources from former Provisional IRA members were qualitatively analyzed through interpretative phenomenological analysis. This analysis revealed preliminary evidence of morally injurious experiences and symptoms, and how these symptoms were coped with through reparative actions. There was also evidence of moral disillusionment with the Provisional IRA, and evidence of protective factors that decreased susceptibility to moral injury. The preliminary evidence of moral injury in this population supports the applicability of the concept and indicates that further investigation is warranted.
Journal: Terrorism and Political Violence
Pages: 1698-1720
Issue: 8
Volume: 34
Year: 2022
Month: 11
X-DOI: 10.1080/09546553.2020.1833861
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1833861
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:8:p:1698-1720



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1828078_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Luca Raineri
Author-X-Name-First: Luca
Author-X-Name-Last: Raineri
Title: Explaining the Rise of Jihadism in Africa: The Crucial Case of the Islamic State of the Greater Sahara
Abstract: 
 While jihadism appears to be on the rise in Africa, the explanations of violent extremist groups’ capacity to foment jihadi insurgencies and mobilize recruits remain poorly understood. Recent studies have challenged the assumption that the rise of jihadism in Africa is the result of poor governance in areas of limited state reach, highlighting instead the significance of the (perception of) abuses perpetrated by state authorities. Looking at collective action and its structural determinants, it is rather state action—and not the lack thereof—that best explains the capacity of mobilization of jihadi insurgencies in African borderlands. In order to test this theory in a least-likely case, the article explores the genealogy and evolution of the Islamic State in the Greater Sahara (ISGS), mobilizing extensive qualitative evidence. Borrowing the analytical framework from civil war studies, it argues that the contentious political dynamics observed in Niger’s borderlands amount to a case of symmetric non-conventional warfare, where abuses perpetrated by state proxies trigger an escalation of homegrown terrorism. It therefore supplies a further specification of the theories investigating the complex interplay between the processes of jihadi mobilization/rebel governance and the practices of counter-terrorism in weak states.
Journal: Terrorism and Political Violence
Pages: 1632-1646
Issue: 8
Volume: 34
Year: 2022
Month: 11
X-DOI: 10.1080/09546553.2020.1828078
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1828078
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:8:p:1632-1646



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1808466_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Wojciech Kaczkowski
Author-X-Name-First: Wojciech
Author-X-Name-Last: Kaczkowski
Author-Name: K. M. Swartout
Author-X-Name-First: K. M.
Author-X-Name-Last: Swartout
Author-Name: L. Branum-Martin
Author-X-Name-First: L.
Author-X-Name-Last: Branum-Martin
Author-Name: J. G. Horgan
Author-X-Name-First: J. G.
Author-X-Name-Last: Horgan
Author-Name: A. F. Lemieux
Author-X-Name-First: A. F.
Author-X-Name-Last: Lemieux
Title: Impact of Perceived Peer Attitudes and Social Network Diversity on Violent Extremist Intentions
Abstract: 
 Perceived peer attitudes (PPA) often influence young men’s violent attitudes and behaviors, although people with higher social network diversity (SND) are less likely to adopt their close peers’ attitudes. There is currently limited research examining this role of peer networks in the development of violent extremism (VE). Consequently, the current study sought to answer the following questions: (1) How are PPA, personal attitudes, and VE intentions related to each other? (2) Does the relationship between PPA and VE intentions differ based on SND? The study sample consisted of 340 men (eighteen to twenty-nine years old) recruited via Amazon MTurk. Participants first indicated their most salient social group and listed their five closest male peers. Next, they reported their VE attitudes, intentions, and their peers’ attitudes. Overall, PPA were positively associated with VE intentions through the partial mediating effect of personal attitudes. SND moderated the relationship between PPA and VE attitudes: participants with more diverse networks were less likely to hold beliefs similar to their PPA. The study highlights the potential role of SND as a protective factor against the harmful effects of PPA. Notably, it underscores the need for social-ecological approaches to counter VE, offering community involvement and growth of social ties.
Journal: Terrorism and Political Violence
Pages: 1530-1548
Issue: 8
Volume: 34
Year: 2022
Month: 11
X-DOI: 10.1080/09546553.2020.1808466
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1808466
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:8:p:1530-1548



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1821668_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ariel Merari
Author-X-Name-First: Ariel
Author-X-Name-Last: Merari
Author-Name: Boaz Ganor
Author-X-Name-First: Boaz
Author-X-Name-Last: Ganor
Title: Interviews With, and Tests of, Palestinian Independent Assailants
Abstract: 
 This study was designed to investigate the background, psychological characteristics and motivations of independent actors who carried out attacks in Israel. It also examined the antecedent factors that influenced their decision to carry out an attack, and their retrospective attitudes to the act. Forty-five Palestinians who had carried out attacks against Israeli targets on their own initiative were interviewed in prison about their background, motivations, circumstances and process of the attack. Thirty-nine of them were also interviewed by a clinical psychologist and took a battery of psychological tests. Twenty-six of these were diagnosed as suffering from one or more of the following: psychotic background, severe personality disorder, and suicidality. A considerable number of the participants described personal, family or social problems that influenced their decision to carry out the attack. Three dominant motives for carrying out an attack were identified: suicidality, a psychotic state, and an ideological national-religious motivation. The characteristics of the attack were influenced by the dominant type of motivation. The discussion compares the findings of this study with those of a study on suicide bombers and with studies on behavioral characteristics of independent actors in other countries.
Journal: Terrorism and Political Violence
Pages: 1595-1616
Issue: 8
Volume: 34
Year: 2022
Month: 11
X-DOI: 10.1080/09546553.2020.1821668
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1821668
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:8:p:1595-1616



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1844673_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Barak Mendelsohn
Author-X-Name-First: Barak
Author-X-Name-Last: Mendelsohn
Title: Ayman al-Zawahiri and the Challenges of Succession in Terrorist Organizations
Abstract: 
 What challenges do newly appointed terrorist leaders face? The paper proposes four primary needs all new leaders consider, including acceptance by the organization’s members, assuming control, maintaining organizational coherence and unity, and overcoming counterterrorism pressures. The magnitude of each challenge may differ depending on the predecessor’s character, the organization’s institutionalization level, the group’s ideological and strategic coherence, the availability of material resources, and communal support. This analytical framework is then used to assist the paper’s second objective: understanding how Ayman al-Zawahiri, who succeeded bin Laden, negotiated these challenges and the tradeoffs he made. Shifts in Al Qaeda’s operational environment required al-Zawahiri to confront challenges more complex than his predecessor had faced, even as he had fewer tools to solve them. Facing authority crisis, magnified by the incoherence between Al Qaeda’s central leadership and its branches and Al Qaeda’s inability to control its branches, al-Zawahiri increased decentralization, embraced affiliates’ local focus, promoted efforts to raise Al Qaeda’s local appeal, and sought to reduce U.S. interest in targeting the group. He kept Al Qaeda alive, but saw its stature shrink significantly.
Journal: Terrorism and Political Violence
Pages: 1826-1845
Issue: 8
Volume: 34
Year: 2022
Month: 11
X-DOI: 10.1080/09546553.2020.1844673
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1844673
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:8:p:1826-1845



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1837118_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Göran Larsson
Author-X-Name-First: Göran
Author-X-Name-Last: Larsson
Title: Those Who Choose to Fight the Islamic State: Autobiographical Accounts of Western Volunteers
Abstract: 
 This article is a qualitative study of anti-IS fighters who have traveled from the West to join the military struggle in Syria and Iraq. while earlier studies have mainly analyzed open sources (i.e. social media or journalist’s reports), this article is based on an in-depth analysis of eight autobiographies written by individuals who traveled from Sweden, Norway, Denmark, the United Kingdom, Germany and the U.S. to take part in the fight against IS. What motives do they give for doing so, how are they treated by the police and journalists after they return from the wars in Syria and Iraq, and do they express other motives than those given by Westerners who have joined IS?
Journal: Terrorism and Political Violence
Pages: 1758-1773
Issue: 8
Volume: 34
Year: 2022
Month: 11
X-DOI: 10.1080/09546553.2020.1837118
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1837118
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:8:p:1758-1773



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1833862_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Scrivens
Author-X-Name-First: Ryan
Author-X-Name-Last: Scrivens
Author-Name: Thomas W. Wojciechowski
Author-X-Name-First: Thomas W.
Author-X-Name-Last: Wojciechowski
Author-Name: Richard Frank
Author-X-Name-First: Richard
Author-X-Name-Last: Frank
Title: Examining the Developmental Pathways of Online Posting Behavior in Violent Right-Wing Extremist Forums
Abstract: 
 Many researchers, practitioners, and policymakers are concerned about online communities that are known to facilitate violent right-wing extremism, but little is empirically known about these digital spaces in general and the developmental posting behaviors that make up these spaces in particular. In this study, group-based trajectory modeling—derived from a criminal career paradigm—was used to identify posting trajectories found in the open-access sections of the Iron March and Fascist Forge forums, both of which have gained notoriety for their members’ online advocacy of violence and acts of violence carried out by them. Multinomial logistic regression and analysis of variance were then used to assess whether posters’ time of entry into the violent forums predicted trajectory group assignment. Overall, the results highlight a number of similarities and differences in posting behaviors within and across platforms, many of which may inform future risk factor frameworks used by law enforcement and intelligence agencies to identify credible threats online. We conclude with a discussion of the implications of this analysis, followed by a discussion of study limitations and avenues for future research.
Journal: Terrorism and Political Violence
Pages: 1721-1738
Issue: 8
Volume: 34
Year: 2022
Month: 11
X-DOI: 10.1080/09546553.2020.1833862
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1833862
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:8:p:1721-1738



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1810025_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alex Williams
Author-X-Name-First: Alex
Author-X-Name-Last: Williams
Author-Name: Emily Corner
Author-X-Name-First: Emily
Author-X-Name-Last: Corner
Author-Name: Helen Taylor
Author-X-Name-First: Helen
Author-X-Name-Last: Taylor
Title: Vehicular Ramming Attacks: Assessing the Effectiveness of Situational Crime Prevention Using Crime Script Analysis
Abstract: 
 The theoretical basis of Situational Crime Prevention (SCP) posits that to reduce crime it is first necessary to understand the interaction between the physical environment and criminal decision making. Situational efforts are commonly applied to specific crimes that are frequent in nature and, due to regular interaction with situational determinants, occur within temporal and spatial clusters. However, SCP is also regularly employed to prevent less frequent crimes, such as terrorist events. The application of SCP has potential to be highly effective for the now common occurrence of ideologically-motivated vehicle ramming attacks (VRAs). However, as SCP measures must be targeted and specific to crime events, it is necessary to first identify common features of the events under scrutiny. One analytical method used to inform the application of SCP through identification of common features of VRAs is crime scripting. This paper develops a crime script of twenty VRAs between 2008 and 2019. The results are analyzed to evaluate the effectiveness of existing SCP initiatives, and identify further opportunities to implement SCP to prevent and mitigate against the impact of VRAs.
Journal: Terrorism and Political Violence
Pages: 1549-1563
Issue: 8
Volume: 34
Year: 2022
Month: 11
X-DOI: 10.1080/09546553.2020.1810025
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1810025
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:8:p:1549-1563



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1838904_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Amira Jadoon
Author-X-Name-First: Amira
Author-X-Name-Last: Jadoon
Author-Name: Julia Maria Lodoen
Author-X-Name-First: Julia Maria
Author-X-Name-Last: Lodoen
Author-Name: Charmaine Noelle Willis
Author-X-Name-First: Charmaine Noelle
Author-X-Name-Last: Willis
Author-Name: Nakissa Puneh Jahanbani
Author-X-Name-First: Nakissa Puneh
Author-X-Name-Last: Jahanbani
Title: Breaking the Glass Ceiling? Female Participation in Militant Organizations in Islamic State Affiliates in Southeast Asia
Abstract: 
 Prior research on female participation in militant organizations explores organizational and individual factors that influence women’s recruitment, and the roles women fulfill. However, most research focuses either on transnational organizations or local militant groups. Within this study, we explore how linkages with transnational groups shape female participation within their overseas affiliate organizations. We employ an original dataset of female militants arrested or killed between 2014 and 2019 in the Philippines, Malaysia, and Indonesia, accounting for organizational affiliation. Overall, we find that female participation in militant groups increased between 2015 and 2017, with most of the increase associated with the Islamic State. While most women with an Islamic State association assumed non-combat roles, more than a third assumed combatant roles, indicating the influence of country-level and regional dynamics. Based on our data, female combatants with an Islamic State association served exclusively as either suicide attackers or conducted bombings, diverging from the varied roles assumed by women combatants in other groups in the region. Overall, our findings highlight how the nature of transnational organizations can combine with the local dynamics of their affiliate groups to produce unique trends in the local female militant landscape.
Journal: Terrorism and Political Violence
Pages: 1774-1796
Issue: 8
Volume: 34
Year: 2022
Month: 11
X-DOI: 10.1080/09546553.2020.1838904
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1838904
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:8:p:1774-1796



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1830068_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Riley
Author-X-Name-First: John
Author-X-Name-Last: Riley
Author-Name: Mary Kate Schneider
Author-X-Name-First: Mary Kate
Author-X-Name-Last: Schneider
Title: The Disengagement Puzzle: An Examination of the Calculus to Exit a Rebellion
Abstract: 
 Why do rebels leave rebellions? Although much scholarly attention has been devoted to understanding why individuals join rebellions, relatively little is known about why they leave. This paper seeks to fill this deficit by exploring the decision-making process that rebels undertake when determining whether to stay or leave. Based on interview data collected from ten active rebels and four former rebels all engaged (or previously engaged) in conflicts in East Africa, we find that the reason why rebels joined the group influences their decision to leave or stay. Rebels who joined due to grievances are far less likely to escape opportunistically, while rebels who joined due to “greed” display a higher sensitivity to the hardships of rebel life and the pull of alternative options. Understanding why a person joins a rebellion helps predict the factors that will drive them to leave.
Journal: Terrorism and Political Violence
Pages: 1679-1697
Issue: 8
Volume: 34
Year: 2022
Month: 11
X-DOI: 10.1080/09546553.2020.1830068
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1830068
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:8:p:1679-1697



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1810026_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Benedetta Berti
Author-X-Name-First: Benedetta
Author-X-Name-Last: Berti
Title: War, Resistance, and “Combatant Identity:” Hezbollah’s Political Identity and the Legacy of Conflict
Abstract: 
 A key issue in analyzing how armed conflict shapes postwar politics pertains to the question of how rebel groups frame their wartime “combatant identity” in the context of their postwar political activism. As armed political organizations active in the midst of conflict, rebel groups’ identities often encompass a “combatant identity” and and what Canetti et al. have described as an “ethos of conflict,” centered on the legitimacy of the use of force, the rightfulness of the rebels’ goals and the defensive nature of their struggle, along with a narrative of victimization and patriotism. How does this identity crystallized in wartime shape political behavior in the aftermath of hostilities or after a political settlement has been reached? How is this combatant identity embedded, reframed and adapted to fit into a broader postwar political narrative? The article explores this question by analyzing the case of Hezbollah’s political and militant identity in the aftermath of the Lebanese civil war; underlying the group’s political, military and social orientation and contextualizing it as operating in a liminal, no-war, no-peace context defined by both the end of the internal civil war and the continuation of the open conflict with Israel. Hezbollah offers an interesting case to examine the resilience of the combatant framework during and in the aftermath of conflict. The article traces the evolution of Hezbollah’s combatant identity from the Lebanese civil war, through its post-agreement political transition, until the group’s involvement in the Syrian conflict. In doing so, it underlines how the group’s combatant identity remained resilient while also being fungible, allowing Hezbollah to preserve core ideological beliefs while shifting its discourse based on political expediency.
Journal: Terrorism and Political Violence
Pages: 1564-1579
Issue: 8
Volume: 34
Year: 2022
Month: 11
X-DOI: 10.1080/09546553.2020.1810026
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1810026
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:8:p:1564-1579



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1824911_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marco Gabbas
Author-X-Name-First: Marco
Author-X-Name-Last: Gabbas
Title: Maoism, Political Violence and Terrorism in Italy
Abstract: 
 When assessing political violence and terrorism in recent Western European history, the case of Italy stands out. The 1970s—the anni di piombo or “lead years”—saw an incredible level of political violence, leading certain observers to openly speak about terrorist violence. However, violence continued to a lesser extent even in the 1980s. This article deals with leftist political violence in that period and argues that Maoism was one of its triggers/inspirations. The Italian case stands out also because these high levels of leftist political violence were not linked to nationalist grievances, as was the case in Ireland (IRA) or the Basque Country (ETA). Maoism pushed many on the Italian revolutionary Left to take up arms against the bourgeois state. They did not take Mao’s proclamations of violence and revolution (“power comes from the barrel of the gun”) abstractly. As China opposed Soviet peaceful coexistence on an international level, the Italian revolutionary Left opposed it on a national ground. The pervasiveness of this Maoist call to arms in Italy can be seen looking at the example of the “new” Red Brigades at the turn of the twenty-first century.
Journal: Terrorism and Political Violence
Pages: 1617-1631
Issue: 8
Volume: 34
Year: 2022
Month: 11
X-DOI: 10.1080/09546553.2020.1824911
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1824911
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:8:p:1617-1631



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1817741_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ivan Y. Sun
Author-X-Name-First: Ivan Y.
Author-X-Name-Last: Sun
Author-Name: Yuning Wu
Author-X-Name-First: Yuning
Author-X-Name-Last: Wu
Author-Name: Ruth Triplett
Author-X-Name-First: Ruth
Author-X-Name-Last: Triplett
Author-Name: Rong Hu
Author-X-Name-First: Rong
Author-X-Name-Last: Hu
Title: Political Efficacy, Police Legitimacy, and Public Support for Counterterrorism Measures in China
Abstract: 
 The threat of terrorism has surfaced as a top priority in national and global security over the past two decades. Drawing upon survey data collected by the Chinese General Social Survey, this study assesses the relationships among political efficacy, police legitimacy, and public support for counterterrorism measures in China. The majority of surveyed Chinese people do not favor aggressive law enforcement actions even when a terrorist attack is imminent. Public support for different forms of antiterrorism means is inversely related to the level of coercion associated with each measure, with wiretapping receiving the highest support, followed by stop and search, and detention. Path analysis results showed that self-rated political knowledge lowers people’s positive evaluations of police legitimacy, whereas political influence strengthens such perception. Stronger senses of police legitimacy then lead to lower support for counterterrorism measures. Additionally, females and racial/ethnic minorities are less likely to favor aggressive antiterrorism activities, while older and college-educated people are more inclined to endorse counterterrorism measures. Implications for future research are discussed.
Journal: Terrorism and Political Violence
Pages: 1580-1594
Issue: 8
Volume: 34
Year: 2022
Month: 11
X-DOI: 10.1080/09546553.2020.1817741
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1817741
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:8:p:1580-1594



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1829859_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Timrah Schmutz
Author-X-Name-First: Timrah
Author-X-Name-Last: Schmutz
Title: “Lone Soldiers” in the Israeli Military—A Research Note on the Conceptualization of Foreign Fighters
Abstract: 
 This research note contributes to the growing body of knowledge on foreign fighters in international affairs. While most scholars in the field derive their understanding of the phenomenon from highly publicized cases of Western Muslims fighting alongside Jihadi groups in the Middle East, this article brings a new case study into the arena: Jewish foreign nationals who voluntarily enlist in the Israeli military, also known as lone soldiers. After a presentation of this to date unexplored case (i.a. through nineteen semi-structured interviews), the article delves into the conceptual realm, discussing whether Israel’s lone soldiers can be analyzed within the foreign-fighter framework in the first place. Based on the empirical findings and an interdisciplinary literature review on foreign fighters the article argues that lone soldiers do constitute a relevant case study. This research note further suggests that much of the controversy on conceptual matters could be avoided by understanding the phenomenon as an action (i.e., foreign fighting) rather than an actor (i.e., foreign fighter). Further research is warranted to support these findings.
Journal: Terrorism and Political Violence
Pages: 1665-1678
Issue: 8
Volume: 34
Year: 2022
Month: 11
X-DOI: 10.1080/09546553.2020.1829859
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1829859
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:8:p:1665-1678



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2068311_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Non-Western Responses to Terrorism
Journal: Terrorism and Political Violence
Pages: 1846-1847
Issue: 8
Volume: 34
Year: 2022
Month: 11
X-DOI: 10.1080/09546553.2022.2068311
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2068311
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:8:p:1846-1847



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1835654_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gregory J. Rousis
Author-X-Name-First: Gregory J.
Author-X-Name-Last: Rousis
Author-Name: F. Dan Richard
Author-X-Name-First: F. Dan
Author-X-Name-Last: Richard
Author-Name: Dong-Yuan Debbie Wang
Author-X-Name-First: Dong-Yuan Debbie
Author-X-Name-Last: Wang
Title: The Truth Is Out There: The Prevalence of Conspiracy Theory Use by Radical Violent Extremist Organizations
Abstract: 
 This project examined conspiracy theory use across three types of groups: radical violent extremists (RVE), nonviolent extremists, and moderates. Using the theory of significance quest, or the desire for one’s life to have meaning, the current project determined whether RVE groups were more likely to use conspiracy theories and promote loss of significance in violent passages than the other groups. Using text analysis software, researchers coded passages from six groups—two from each level of extremism—for conspiratorial and/or violent content. RVE groups were significantly more likely than the other groups to use conspiracy theories and promote violence. This pattern held for groups focused on radical Islamic fundamentalism as well as white supremacy groups. The pattern was more complex for loss of significance: in violent passages, neo-Nazis were significantly more likely than ISIS and Al Qaeda to promote loss of significance. Implications of the findings are discussed.
Journal: Terrorism and Political Violence
Pages: 1739-1757
Issue: 8
Volume: 34
Year: 2022
Month: 11
X-DOI: 10.1080/09546553.2020.1835654
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1835654
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:8:p:1739-1757



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1839427_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michelle Slone
Author-X-Name-First: Michelle
Author-X-Name-Last: Slone
Author-Name: Anat Shoshani
Author-X-Name-First: Anat
Author-X-Name-Last: Shoshani
Title: Effects of War and Armed Conflict on Adolescents’ Psychopathology and Well-Being: Measuring Political Life Events among Youth
Abstract: 
 Although research on the consequences of war exposure on children’s mental health has made significant progress in the past decades, a lack of valid measures for quantifying the incidence, severity and variability of exposure can hamper identification of at-risk children and mental health delivery in conflict-affected areas. The present study investigated the psychometric properties of a new political life events scale for youth (PLE-Y) that comprehensively assesses personal political violence exposure history. The PLE-Y was administered to 6,254 adolescents aged twelve to eighteen in two large samples in a region in Israel that has been characterized by high exposure to political violence. Adolescents were assessed for political life events exposure, psychiatric symptoms, emotional and behavioral problems, and subjective well-being. Exploratory and confirmatory factor analyses supported a two-factor structure of the PLE-Y (severe and mild), representing the severity levels of exposure. Results confirmed positive relations between severity of PLE exposure and psychiatric symptoms, emotional and behavioral difficulties, and lower subjective well-being. This study demonstrated the importance of taking into account the personal political violence exposure history and the subjective interpretations of impact of the events to accurately identify the mental health risks to youth who are chronically exposed to protracted political violence.
Journal: Terrorism and Political Violence
Pages: 1797-1809
Issue: 8
Volume: 34
Year: 2022
Month: 11
X-DOI: 10.1080/09546553.2020.1839427
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1839427
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:8:p:1797-1809



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2096342_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mohammed M. Hafez
Author-X-Name-First: Mohammed M.
Author-X-Name-Last: Hafez
Title: Jihad in the City: Militant Islam and Contentious Politics in Tripoli
Journal: Terrorism and Political Violence
Pages: 1848-1850
Issue: 8
Volume: 34
Year: 2022
Month: 11
X-DOI: 10.1080/09546553.2022.2096342
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2096342
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:8:p:1848-1850



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1839428_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Chris Wilson
Author-X-Name-First: Chris
Author-X-Name-Last: Wilson
Title: Nostalgia, Entitlement and Victimhood: The Synergy of White Genocide and Misogyny
Abstract: 
 Western countries are experiencing a wave of violent attacks against places of worship, stores, schools and other crowded locations. The perpetrators of these attacks explain their actions as necessary to stem an “invasion” of immigrants which threatens the very existence of the white race. At the same time, many of the same countries have experienced very similar attacks motivated by a particularly contemporary form of misogyny. Known as incels, an abbreviation of involuntary celibate, young men in this community believe they are denied sexual partners by feminism and societal norms of male attractiveness. These two series of attacks are generally understood to be separate (if overlapping) forms of extremism. In this article I contend that the concepts of white genocide central to white nationalism and misogynistic incelism are more intertwined than it appears. Misogyny and the notion of white genocide are mutually escalatory. Rather than separate and complementary forms of extremism, the two ideologies converge to create a single more volatile worldview, one which makes its proponents more prone to the use of violence. Misogyny and white genocide are synergistic, their effect greater than the sum of their parts.
Journal: Terrorism and Political Violence
Pages: 1810-1825
Issue: 8
Volume: 34
Year: 2022
Month: 11
X-DOI: 10.1080/09546553.2020.1839428
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1839428
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:8:p:1810-1825



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1804879_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John F. Morrison
Author-X-Name-First: John F.
Author-X-Name-Last: Morrison
Title: Talking Stagnation: Thematic Analysis of Terrorism Experts’ Perception of the Health of Terrorism Research
Abstract: 
 In 2014, Marc Sageman proposed that terrorism research had stagnated. The claim of stagnation has resulted in a period of collective review within terrorism studies. To date, the fruits of this review have revealed a more cautiously optimistic view of the field than that proposed by Sageman. This article aims to add to this review by analyzing the interviews of forty-three guests from the first season of the Talking Terror podcast. Presented is a thematic analysis of their views on the overall health of terrorism research. The interviewees included both pre-and post-9/11 researchers. Through this analysis four themes are identified: Interdisciplinary Research and Researchers, Data, Applied Research, and Area/Field. The majority of interviewees were more optimistic than Sageman in relation to the overall health of the area. Analysis of their responses is presented alongside some recommendations for the future direction of the area.
Journal: Terrorism and Political Violence
Pages: 1509-1529
Issue: 8
Volume: 34
Year: 2022
Month: 11
X-DOI: 10.1080/09546553.2020.1804879
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1804879
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:8:p:1509-1529



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1828079_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael H. Becker
Author-X-Name-First: Michael H.
Author-X-Name-Last: Becker
Author-Name: Scott H. Decker
Author-X-Name-First: Scott H.
Author-X-Name-Last: Decker
Author-Name: Gary LaFree
Author-X-Name-First: Gary
Author-X-Name-Last: LaFree
Author-Name: David C. Pyrooz
Author-X-Name-First: David C.
Author-X-Name-Last: Pyrooz
Author-Name: Kyle Ernest
Author-X-Name-First: Kyle
Author-X-Name-Last: Ernest
Author-Name: Patrick A. James
Author-X-Name-First: Patrick A.
Author-X-Name-Last: James
Title: A Comparative Study of Initial Involvement in Gangs and Political Extremism
Abstract: 
 There is a paucity of research comparing gang members and domestic extremists and extant studies find few explicit linkages. Despite this, there remains a great deal of interest in possible similarities between these criminal groups. Driving this interest is the possibility of adapting policies and practices aimed at preventing entry into criminal groups. A critical first step to determining compatibility is to examine the circumstances of the individuals who enter these organizations and better describe the entry processes. This study provides a unique comparison of entry into these groups by drawing on four broad empirically derived mechanisms of group entry using forty-five in-person interviews of U.S. gang members and thirty-eight life history narratives of individuals who radicalized in the United States. Our results reveal that each of the four conceptual categories appeared to influence initial involvement; however, no single mechanism described involvement in criminal groups or differentiated involvement across the gangs and extremist groups.
Journal: Terrorism and Political Violence
Pages: 1647-1664
Issue: 8
Volume: 34
Year: 2022
Month: 11
X-DOI: 10.1080/09546553.2020.1828079
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1828079
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:34:y:2022:i:8:p:1647-1664

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1856818_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Amber Hart
Author-X-Name-First: Amber
Author-X-Name-Last: Hart
Title: Right-Wing Waves: Applying the Four Waves Theory to Transnational and Transhistorical Right-Wing Threat Trends
Abstract: 
 The increasing global prominence of right-wing extremism and terrorism has been noted by scholars and government agencies alike. While right-wing terrorism has been documented throughout postwar history, groups have evolved, resulting in diverse materializations of violence perpetrated on behalf of varying ideologies and perceived threats. This paper draws upon Campion’s research into Australian right-wing extremism and terrorism, where three ideological threat narratives were identified. The aim of this research was to determine the applicability of Rapoport’s “wave” theory to the international evolution of extreme right-wing activity. In doing so, Campion’s framework is utilized and a case study analysis undertaken, investigating anti-communist, anti-immigration and anti-Islamic rhetoric on a transnational and transhistorical basis. It is argued that waves are found internationally, and that Rapoport’s model is therefore applicable to the right-wing milieu. The paper concludes that the extreme right is on the cusp of the next wave and discusses trends that may inform those in a position to counteract the forthcoming wave of activity. There remains a need for law enforcement and security agencies to monitor right-wing extremism and terrorism activity to remain attuned to the ever-evolving threat as the next wave manifests.
Journal: Terrorism and Political Violence
Pages: 1-16
Issue: 1
Volume: 35
Year: 2023
Month: 01
X-DOI: 10.1080/09546553.2020.1856818
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1856818
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:1:p:1-16



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1895121_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Selin Bengi Gümrükçü
Author-X-Name-First: Selin Bengi
Author-X-Name-Last: Gümrükçü
Title: Ideology, Discourse, and Alliance Structures: Explaining Far-Right Political Violence in Turkey in the 1970s
Abstract: 
 During the 1970s, Turkey’s radical nationalist youth were ideologically and culturally shaped by their involvement in the idealist (ülkücü) movement. The idealists also played a significant role on the streets in fomenting the mass political violence that characterized Turkey at this time. Based on the social movements literature, this paper analyzes why and how far-right movements used political violence, departing from the case of the ülkücü movement in Turkey. In doing so, the paper employs Protest Event Analysis with an original dataset of 5,361 protest events for 1971–1985. The findings suggest that far-right violence was facilitated by discursive and political opportunities, namely the praise of ruling politicians and the non-critical rhetoric of and opportunities provided by the alliance structures.
Journal: Terrorism and Political Violence
Pages: 210-224
Issue: 1
Volume: 35
Year: 2023
Month: 01
X-DOI: 10.1080/09546553.2021.1895121
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1895121
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:1:p:210-224



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1860950_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jason Warner
Author-X-Name-First: Jason
Author-X-Name-Last: Warner
Author-Name: Stephanie Lizzo
Author-X-Name-First: Stephanie
Author-X-Name-Last: Lizzo
Title: The “Boko Haram Disaggregation Problem” and Comparative Profiles of Factional Violence: Challenges, Impacts, and Solutions in the Study of Africa’s Deadliest Terror Group(s)
Abstract: 
 This article introduces the “Boko Haram disaggregation problem,” or the often frequent failure by observers to disaggregate the group following its August 2016 split into two distinct factions, instead, labeling and studying all factions as “Boko Haram.” It asks: What are the origins of the “Boko Haram disaggregation problem,” and, given this phenomenon, what are the possibilities and constraints in understanding profiles of violence between the pre-2016 and post-2016 iterations of the group(s)? It argues that the “Boko Haram disaggregation problem” has origins both internal and external to the group(s), most prevalent in quantitative academic research. Highlighting the challenges of this phenomenon, it uses data from the Global Terrorism Database (GTD) from 2009 to 2018 to compare profiles of violence between various “Boko Haram” factions. In sum, it shows why beyond merely a methodological challenge, overcoming this phenomenon has real-world impacts for addressing the violence perpetrated by these groups.
Journal: Terrorism and Political Violence
Pages: 17-46
Issue: 1
Volume: 35
Year: 2023
Month: 01
X-DOI: 10.1080/09546553.2020.1860950
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1860950
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:1:p:17-46



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1862802_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Antje Gansewig
Author-X-Name-First: Antje
Author-X-Name-Last: Gansewig
Author-Name: Maria Walsh
Author-X-Name-First: Maria
Author-X-Name-Last: Walsh
Title: Preventing Violent Extremism with Former Extremists in Schools: A Media Analysis of the Situation in Germany
Abstract: 
 During recent years, the inclusion of former extremists in preventing and countering violent extremism (P/CVE) has increased internationally. This paper addresses the issue of the involvement of former extremists in school-based work to prevent violent extremism. It provides a media analysis of the content of 151 newspaper articles (published between 2001 and 2019) regarding 133 lectures given by former extremists in German schools. The analysis shows that the lectures contain mostly movement- and biography-based narration and points to some critical aspects (e.g., detailed depictions of violence, insensitive language). Furthermore, the findings indicate that some former extremists engaging in PVE might not have completed the deradicalization process. Moreover, certain former extremists could have further motives for engaging in prevention work in schools, in addition to making amends for previous actions. Among them appears the need for a compensation mechanism or a platform to advertise their activities. Therefore, we emphasize the importance of a differentiated view of former extremists’ role in PVE, especially when working with children and juveniles.
Journal: Terrorism and Political Violence
Pages: 47-64
Issue: 1
Volume: 35
Year: 2023
Month: 01
X-DOI: 10.1080/09546553.2020.1862802
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1862802
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:1:p:47-64



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1863793_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Yaniv Voller
Author-X-Name-First: Yaniv
Author-X-Name-Last: Voller
Title: Militias as a Tool for Encouraging Ethnic Defection: Evidence from Iraq and Sudan
Abstract: 
 Ethnic defection and pro-government militias are two recurring features of ethnic conflicts. There is a strong connection between these two elements, with incumbents using militias to absorb defectors from rebel constituencies into their ranks. However, relatively little work has been carried out on this link. Most works exploring ethnic defection have treated these defector militias, as the article refers to them, as the result of ethnic defection. This research offers an alternative hypothesis: Rather than tools for administrating and controlling defection, governments in ethnic civil wars often view militias as a tool for enhancing and facilitating ethnic defection. The socio-political functions of militias may triumph over military ones in governments’ consideration to form and sustain such defector militias. The article employs two case studies to support this hypothesis, these of the ethnic conflicts in northern Iraq and southern Sudan.
Journal: Terrorism and Political Violence
Pages: 65-82
Issue: 1
Volume: 35
Year: 2023
Month: 01
X-DOI: 10.1080/09546553.2020.1863793
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1863793
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:1:p:65-82



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1871898_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Christer Mattsson
Author-X-Name-First: Christer
Author-X-Name-Last: Mattsson
Author-Name: Thomas Johansson
Author-X-Name-First: Thomas
Author-X-Name-Last: Johansson
Title: Neo-Nazi Violence and Ideology: Changing Attitudes toward Violence in Sweden’s Skinhead and Post-Skinhead Eras
Abstract: 
 This study examines how ideology is narrated in the life stories of former and active Swedish neo-Nazis. Employing a social psychological and generational perspective toward the meaning-making process of the neo-Nazi ideology, this study investigates the role ideology plays in both former and active adherents’ narratives of engagement in the neo-Nazi movement. This study also analyzes the differences in how former and active neo-Nazis talk about violence and violent acts in the movement. In doing so, this study shows that there has been a decisive shift between activists from the skinhead era and post-skinhead era in respect to how they address and articulate ideological conviction and violence. Results also indicate that Sweden’s neo-Nazi movement has undergone an intellectualization process over the past few decades, with violence becoming increasingly politicized.
Journal: Terrorism and Political Violence
Pages: 104-117
Issue: 1
Volume: 35
Year: 2023
Month: 01
X-DOI: 10.1080/09546553.2021.1871898
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1871898
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:1:p:104-117



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2096343_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tingting Hu
Author-X-Name-First: Tingting
Author-X-Name-Last: Hu
Author-Name: Shuyong Li
Author-X-Name-First: Shuyong
Author-X-Name-Last: Li
Title: The Psychosocial Imaginaries of Defence Nationalism: Far-Right Extremism in Australia and the UK
Journal: Terrorism and Political Violence
Pages: 225-226
Issue: 1
Volume: 35
Year: 2023
Month: 01
X-DOI: 10.1080/09546553.2022.2096343
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2096343
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:1:p:225-226



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1876035_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Enshen Li
Author-X-Name-First: Enshen
Author-X-Name-Last: Li
Title: Can “Nudge” Salvage Community Policing against Terrorism?
Abstract: 
 Since the mid-2000s, the fear of “homegrown” terrorism in most developed democracies has prodded police to partner with local Muslim communities as a proactive and preventive approach to Islamic extremism. However, despite practical variations, this model of counterterrorism community policing (“CTCP”) has faced a comparable challenge—the lack of legal and moral legitimacy within counterterrorism law enforcement which erodes Muslim communities’ trust and confidence in policing. Drawing on common critiques of CTCP in the U.S., the U.K. and Australia, this article aims to proffer a behavioral-economics view to promote intended goals of CTCP. Borrowing the ideas of Nudge Theory, my discussion suggests that community engagement within CTCP could be stimulated more effectively through a subtle process of trust building whereby residents are coaxed toward cooperation through indirect encouragement, assistance and facilitation. Through a case study of CTCP in Muslim communities, it is argued that nudge entails the refrainment of the political and media narrative from conflating Islamist ideology with the prime source of domestic terrorist danger. At the grassroots level, the nudge-oriented CTCP is contingent upon community representatives taking on a more active and forefront role in CTCP with police reducing their visibility to only facilitate in the background.
Journal: Terrorism and Political Violence
Pages: 135-155
Issue: 1
Volume: 35
Year: 2023
Month: 01
X-DOI: 10.1080/09546553.2021.1876035
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1876035
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:1:p:135-155



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1888082_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lawrence E. Cline
Author-X-Name-First: Lawrence E.
Author-X-Name-Last: Cline
Title: Jihadist Movements in the Sahel: Rise of the Fulani?
Abstract: 
 Much of the attention paid to jihadist groups in the greater Sahel region have focused on the Tuareg movements. More recently, however, members of the Fulani ethnic group have become much more significant in the larger jihadist movement in the region. The Fulani-dominated Katiba Macina and Ansarul Islam have conducted major attacks and created a significant level of civilian displacement. Many of the Fulani operations to date clearly are a continuation of their earlier conflicts both with regional governments and other ethnic groups. The increased identification of the Fulani in the jihadist movement also provides a further example of how preexisting group grievances can be operationalized by leaders of violent groups into an ideological movement.
Journal: Terrorism and Political Violence
Pages: 175-191
Issue: 1
Volume: 35
Year: 2023
Month: 01
X-DOI: 10.1080/09546553.2021.1888082
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1888082
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:1:p:175-191



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1877673_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sadi Shanaah
Author-X-Name-First: Sadi
Author-X-Name-Last: Shanaah
Author-Name: Kumar Yogeeswaran
Author-X-Name-First: Kumar
Author-X-Name-Last: Yogeeswaran
Author-Name: Lara Greaves
Author-X-Name-First: Lara
Author-X-Name-Last: Greaves
Author-Name: Joseph A. Bulbulia
Author-X-Name-First: Joseph A.
Author-X-Name-Last: Bulbulia
Author-Name: Danny Osborne
Author-X-Name-First: Danny
Author-X-Name-Last: Osborne
Author-Name: M. Usman Afzali
Author-X-Name-First: M. Usman
Author-X-Name-Last: Afzali
Author-Name: Chris G. Sibley
Author-X-Name-First: Chris G.
Author-X-Name-Last: Sibley
Title: Hate Begets Warmth? The Impact of an Anti-Muslim Terrorist Attack on Public Attitudes toward Muslims
Abstract: 
 This article examines the impact of the March 15, 2019 far-right terrorist attack against Muslims in Christchurch, New Zealand on public opinion toward Muslims. It also examines whether the impact of the attack varies for individuals across the political spectrum. We make use of data from the 2019 New Zealand Attitudes and Values Study (N = 47,951) to compare the attitudes of New Zealanders before and after the attack. Using a range of statistical techniques, including regression discontinuity analysis, we find robust evidence that the attack led to an immediate increase in warmth toward Muslims. We also show that this increase was driven by both left-wing/liberal and right-wing/conservative individuals in the immediate days after the attack. Soon after the attack, however, attitudes toward Muslims among the politically conservative population tended to revert to pre-attack levels. By contrast, political liberals maintained their heightened level of positive attitudes for a longer period. We discuss the possible theoretical reasons for these findings.
Journal: Terrorism and Political Violence
Pages: 156-174
Issue: 1
Volume: 35
Year: 2023
Month: 01
X-DOI: 10.1080/09546553.2021.1877673
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1877673
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:1:p:156-174



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1876034_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: James Meernik
Author-X-Name-First: James
Author-X-Name-Last: Meernik
Author-Name: Kimi King
Author-X-Name-First: Kimi
Author-X-Name-Last: King
Title: Political Violence and Language Endangerment in Colombia
Abstract: 
 This paper develops an account of the relationship between language endangerment and conflict violence by combining insights from the fields of political science and linguistics. We develop a theoretical account of the manner in which the violence and disruption of community life jeopardizes the viability of communities that speak endangered languages. Our goals for this paper are to synthesize the contributions linguists and political scientists have made to the study of language endangerment and political violence; develop a theoretical account of language endangerment; and utilize statistical analysis to correlate factors related to political conflict and violence with language endangered communities. We test our theoretical model on language endangerment across the municipalities of Colombia and find support for our hypotheses.
Journal: Terrorism and Political Violence
Pages: 118-134
Issue: 1
Volume: 35
Year: 2023
Month: 01
X-DOI: 10.1080/09546553.2021.1876034
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1876034
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:1:p:118-134



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1866556_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mary Beth Altier
Author-X-Name-First: Mary Beth
Author-X-Name-Last: Altier
Title: Criminal or Terrorist? Fear, Bias, and Public Support for Prisoner Reentry Programs
Abstract: 
 The potential threat posed by returning and repatriated foreign fighters and the upcoming release of homegrown violent extremists from prisons in developed democracies has raised interest in terrorist rehabilitation programs. Few studies, however, systematically examine how the public views such programs. Drawing on research on public attitudes toward prisoner reentry in criminology and social psychological theory, this study offers a series of hypotheses about support for rehabilitation programming for terrorist offenders. These hypotheses are then tested through a survey experiment on a nationally representative sample of 1,021 adult citizens in the United States. The results show that the public is less supportive of postrelease rehabilitation programming for terrorists than other criminal offenders. Support is also lower when an Islamist, rather than a white nationalist, offender is referenced. Support increases when a referenced Islamist is described as a juvenile convicted of a less serious offense. Men, younger individuals, those with some college education, and self-identified liberals are more likely to support terrorist rehabilitation programming. Finally, irrespective of treatment, respondents are most likely to cite evidence of effectiveness as the factor that would increase their support for rehabilitation programming.
Journal: Terrorism and Political Violence
Pages: 83-103
Issue: 1
Volume: 35
Year: 2023
Month: 01
X-DOI: 10.1080/09546553.2020.1866556
File-URL: http://hdl.handle.net/10.1080/09546553.2020.1866556
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:1:p:83-103



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2096345_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Stephen Nemeth
Author-X-Name-First: Stephen
Author-X-Name-Last: Nemeth
Title: Monsters to Destroy: Understanding the War on Terror
Journal: Terrorism and Political Violence
Pages: 227-228
Issue: 1
Volume: 35
Year: 2023
Month: 01
X-DOI: 10.1080/09546553.2022.2096345
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2096345
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:1:p:227-228



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1891893_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Scrivens
Author-X-Name-First: Ryan
Author-X-Name-Last: Scrivens
Author-Name: Thomas W. Wojciechowski
Author-X-Name-First: Thomas W.
Author-X-Name-Last: Wojciechowski
Author-Name: Joshua D. Freilich
Author-X-Name-First: Joshua D.
Author-X-Name-Last: Freilich
Author-Name: Steven M. Chermak
Author-X-Name-First: Steven M.
Author-X-Name-Last: Chermak
Author-Name: Richard Frank
Author-X-Name-First: Richard
Author-X-Name-Last: Frank
Title: Comparing the Online Posting Behaviors of Violent and Non-Violent Right-Wing Extremists
Abstract: 
 Despite the ongoing need for researchers, practitioners, and policymakers to identify and assess the online activities of violent extremists prior to their engagement in violence offline, little is empirically known about their online behaviors generally or differences in their posting behaviors compared to non-violent extremists who share similar ideological beliefs particularly. In this study, we drew from a unique sample of violent and non-violent right-wing extremists to compare their posting behaviors within a sub-forum of the largest white supremacy web-forum. Analyses for the current study proceeded in three phases. First, we plotted the average posting trajectory for users in the sample, followed by an assessment of the rates at which they stayed active or went dormant in the sub-forum. We then used logistic regression to examine whether specific posting behaviors were characteristic of users’ violence status. The results highlight a number of noteworthy differences in the posting behaviors of violent and non-violent right-wing extremists, many of which may inform future risk factor frameworks used by law enforcement and intelligence agencies to identify credible threats online. We conclude with a discussion of the implications of this analysis, its limitations and avenues for future research.
Journal: Terrorism and Political Violence
Pages: 192-209
Issue: 1
Volume: 35
Year: 2023
Month: 01
X-DOI: 10.1080/09546553.2021.1891893
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1891893
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:1:p:192-209

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1905631_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Rogelio Alonso
Author-X-Name-First: Rogelio
Author-X-Name-Last: Alonso
Title: Why Did so Few Become Terrorists: A Comparative Study of Northern Ireland and the Basque Country
Abstract: 
 This article responds to the following research question: if a large number of people experienced in Northern Ireland and the Basque Country the same root causes that increased the likelihood of becoming involved in terrorism, why did so few become terrorists? The article provides an exploratory study of the factors that prevented individuals from joining terrorist organizations in the United Kingdom and Spain, where intense campaigns of violence took place since the late sixties for four decades. The article is based on twenty-seven semi-structured in-depth interviews with men and women who refrained from resorting to terrorism despite sharing similar structural and personal features with those who decided to engage in terrorism. It identifies a combination of inhibitor factors that prevented individuals from following terrorist pathways despite sharing some predisposing risk factors with those who did engage in terrorism as members of organizations like the IRA, the UVF, the UFF and ETA. It also assesses why some types of radicalization developed into violence while others did not as a result of certain barriers.
Journal: Terrorism and Political Violence
Pages: 264-283
Issue: 2
Volume: 35
Year: 2023
Month: 02
X-DOI: 10.1080/09546553.2021.1905631
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1905631
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:2:p:264-283



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1919097_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mauro Lubrano
Author-X-Name-First: Mauro
Author-X-Name-Last: Lubrano
Title: Stop the Machines: How Emerging Technologies are Fomenting the War on Civilization
Abstract: 
 The Fourth Industrial Revolution promises to transform contemporary societies. Similarly, emerging technologies are affording countless new applications that assure an overall and widespread improvement of living standards. At the same time, their potential misuse has sparked concerns. In particular, the possibility of terrorist organizations adopting such technologies has dominated the scholarly debate. Consequently, there is a growing literature that deals with the motivational and technical factors potentially underlying the malevolent resort to emerging technologies. Enthusiasm for emerging technologies is, however, only one side of the coin. The last decade has, indeed, witnessed a re-emergence of forms of Neo-Luddism. Nevertheless, a thorough understanding of these developments is still lacking. This paper investigates and maps the main debates and dynamics in the Anti-Technology Movement in order to understand the rationale behind—and the prospects of—this resurgence. In doing so, it focuses on two radical fringes, namely the Insurrectionary Anarchist Milieu and the Radical Environmentalist Milieu. The paper argues that, although based on different narratives and end goals, these milieus share a similar commitment and operational approaches as well as a marked apocalyptic millenarian thinking that has set them on an escalatory path.
Journal: Terrorism and Political Violence
Pages: 321-337
Issue: 2
Volume: 35
Year: 2023
Month: 02
X-DOI: 10.1080/09546553.2021.1919097
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1919097
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:2:p:321-337



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1938003_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel W. Snook
Author-X-Name-First: Daniel W.
Author-X-Name-Last: Snook
Author-Name: Ari D. Fodeman
Author-X-Name-First: Ari D.
Author-X-Name-Last: Fodeman
Author-Name: Scott M. Kleinmann
Author-X-Name-First: Scott M.
Author-X-Name-Last: Kleinmann
Author-Name: John G. Horgan
Author-X-Name-First: John G.
Author-X-Name-Last: Horgan
Title: Crisis as Catalyst: Crisis in Conversion to Islam Related to Radicalism Intentions
Abstract: 
 In Western democracies, Muslim converts are overrepresented in Islamist terrorism compared to born-and-raised Muslims. Consequently, researchers have begun to consider how the process of conversion to Islam might influence participation in terrorism, yet empirical data are lacking. To explore these connections, the present study measured the conversion experiences of Muslim converts, as well as their intentions to engage in radicalism. One hundred and seventy-seven U.S. Muslim converts completed the Radicalism Intentions Scale, which measures willingness to engage in violent and illegal political behaviors to support one’s group, and the Adult Religious Conversion Experience Questionnaire, which measures the components of conversion, including crisis. Crisis is an experience of stress or difficulty that contributes to the collapse of one’s pre-conversion belief system (e.g., when an alcoholic hits “bottom”). Results indicate that the level of crisis that converts experienced was the only conversion variable associated with converts’ radicalism intentions, which suggests that crisis may be an important construct in connecting the processes of conversion to Islam and participation in Islamist terrorism.
Journal: Terrorism and Political Violence
Pages: 452-469
Issue: 2
Volume: 35
Year: 2023
Month: 02
X-DOI: 10.1080/09546553.2021.1938003
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1938003
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:2:p:452-469



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1919637_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kiriloi M. Ingram
Author-X-Name-First: Kiriloi M.
Author-X-Name-Last: Ingram
Title: An Analysis of Islamic State’s Gendered Propaganda Targeted Towards Women: From Territorial Control to Insurgency
Abstract: 
 This article analyses Islamic State’s English language propaganda targeting Western women and how that messaging changed as the group shifted from territorial control back into an insurgency. It argues that Islamic State leverages five female representations in its appeals to women in order to construct and project an alternative gender order designed to further the group’s strategic objectives. As those objectives changed, so did the nature of its appeals and the female representations its propaganda emphasised. Based on primary source analysis, it draws on fifteen issues of Dabiq which spans a period of success for the group when it controlled territories and population centres (July 2014 to July 2016) and thirteen issues of Rumiyah which was a period characterised by strategic decline back into an insurgency (September 2016 to September 2017).
Journal: Terrorism and Political Violence
Pages: 338-354
Issue: 2
Volume: 35
Year: 2023
Month: 02
X-DOI: 10.1080/09546553.2021.1919637
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1919637
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:2:p:338-354



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1908270_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Fatima Mustafa
Author-X-Name-First: Fatima
Author-X-Name-Last: Mustafa
Title: Can Cellphone Shutdowns Stop Terrorist Violence? Evidence from Pakistan
Abstract: 
 While there has been growing concern about the use of technology by terrorist groups to organize and execute violence, there has been much less academic work on the effectiveness of governmental efforts to control the use of technology to prevent terrorist violence. Governments across the world have relied on network shutdowns to tackle violence, amongst other ends. Using data from one such country, Pakistan, this paper examines the effectiveness of disrupting cellphone networks as acounterterrorism strategy to tackle terrorist violence. This paper relies on daily data on terrorist violence in Pakistan from January 2012 to December 2017 combined with data on government-mandated cellphone shutdowns. The results show a statistically significant decline in the number of terrorist attacks on the day of cellphone shutdowns and an increase in terrorist attacks on the day after cellphone shutdown. Overall, it is argued that while cellphone shutdowns might displace terrorist violence from one day to the next, they are not an effective way to tackle terrorist violence.
Journal: Terrorism and Political Violence
Pages: 284-303
Issue: 2
Volume: 35
Year: 2023
Month: 02
X-DOI: 10.1080/09546553.2021.1908270
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1908270
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:2:p:284-303



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1916478_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Simon Taylor
Author-X-Name-First: Simon
Author-X-Name-Last: Taylor
Title: Status Quo Terrorism: State-Terrorism in South Africa during Apartheid
Abstract: 
 Defining state-terrorism is a contentious endeavor, with notably analytical impediments. Presented here is a definitive case of state-terrorism. As part of an effort to maintain the status quo of white hegemonic control, in 1979 the Apartheid state in South Africa created a police unit, known as Vlakplaas. Drawing from the Truth and Reconciliation Commission’s Final Report, clear evidence is presented demonstrating the Apartheid government’s use of Vlakplaas as an instrument of terrorism in order to instill terror in targeted audiences and to allay fears of the white electorate. As resistance to the status quo strengthened, so too did the terrorism methods used to maintain it. The methods used by Vlakplaas operatives included forms of violence that arguably ought to be considered state-terrorism—abductions, detentions, and torture—and methods traditionally associated with orthodox terrorism—bombings and killings.
Journal: Terrorism and Political Violence
Pages: 304-320
Issue: 2
Volume: 35
Year: 2023
Month: 02
X-DOI: 10.1080/09546553.2021.1916478
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1916478
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:2:p:304-320



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1941902_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Eray Arda Akartuna
Author-X-Name-First: Eray Arda
Author-X-Name-Last: Akartuna
Author-Name: Amy Elise Thornton
Author-X-Name-First: Amy Elise
Author-X-Name-Last: Thornton
Title: The Kurdistan Worker’s Party (PKK) in London: Countering Overseas Terrorist Financing and Support with “Nudge” and Situational Approaches
Abstract: 
 Overseas diasporas have long been exploited by terrorist organisations seeking funding and support from areas beyond their operation. The Kurdistan Worker’s Party (PKK), active in south-eastern Turkey, is no exception and maintains a significant international presence. This paper uses seventy-three survey responses and thirteen interviews amongst London’s Turkish and Kurdish diaspora to provide an original and comprehensive insight into the PKK’s overseas operations, including their offending patterns, methods, hotspots, offender/victim profiles and existing countermeasures. Respondents were also consulted on new community-based prevention measures designed to address limited law enforcement responses and the laissez-faire approaches of diaspora host countries. This strategy, which combines crime science and behavioural economic theories, consists of Clarke’s “Situational Crime Prevention” theory and Thaler and Sunstein’s “Nudge” theory (SCP+N). The results indicate that the PKK creates criminal opportunities by “legitimising” itself across diasporas by invoking ideological sympathy and social dependence (conceptualised as “constructed legitimisers”), ensuring minimal resistance to its activities. SCP+N is motivated as an effective counterstrategy, addressing both the rational and impulsive nature of offending. The overall theoretical contribution of this paper is to assess overseas terrorist financing through a prevention-oriented, situational and behavioural framework, and to propose a community-based strategy to effectively counter such activities.
Journal: Terrorism and Political Violence
Pages: 470-496
Issue: 2
Volume: 35
Year: 2023
Month: 02
X-DOI: 10.1080/09546553.2021.1941902
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1941902
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:2:p:470-496



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1903440_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mauro Lubrano
Author-X-Name-First: Mauro
Author-X-Name-Last: Lubrano
Title: Navigating Terrorist Innovation: A Proposal for a Conceptual Framework on How Terrorists Innovate
Abstract: 
 While many scholars acknowledge terrorist innovation as a crucial issue, it still remains a rather under-researched phenomenon. This paper intends to map the field in order to propose an original conceptualization of terrorist innovation. In doing so, it draws on the Terrorism Studies, Strategic Studies, and Business Studies literatures to propose a definition of terrorist innovation, while also distinguishing between the categories of tactical, operational, and strategic innovation. Additionally, enriched with empirical observations, the paper explores potential drivers of the innovation process. Finally, it provides a set of suggestions for future research.
Journal: Terrorism and Political Violence
Pages: 248-263
Issue: 2
Volume: 35
Year: 2023
Month: 02
X-DOI: 10.1080/09546553.2021.1903440
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1903440
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:2:p:248-263



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1924692_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: James Crossland
Author-X-Name-First: James
Author-X-Name-Last: Crossland
Title: Radical Warfare’s First “Superweapon”: The Fears, Perceptions and Realities of the Orsini Bomb, 1858-1896
Abstract: 
 This article retraces the forgotten legacy of a percussion triggered shrapnel scattering improvised explosive device (IED), known as the Orsini Bomb. Initially used in an attempt to assassinate Emperor Napoleon III in 1858, in the decades after, the Orsini Bomb was replicated, modified and deployed by regicides, insurgents and terrorists, and mythologised by the press as an omnipresent aspect of such forms of radical warfare. This article presents a “biography” of this unique IED, concluding, firstly, that Orsini’s design was an important point of reference in weapons manufacture for violent radicals even after the advent of dynamite in the 1860s and, secondly, that its reputation as a semiotic reference point for terrorist activity was enhanced by press reportage of its proliferation and use throughout the fin de siècle. In the final analysis, the Orsini Bomb became a transnationally recognised “brand” of weapon, synonymous with both assassination and insurgency. As such, the bomb’s reputation—often dwarfed in the historiography of political violence by dynamite—needs to be reconsidered.
Journal: Terrorism and Political Violence
Pages: 355-369
Issue: 2
Volume: 35
Year: 2023
Month: 02
X-DOI: 10.1080/09546553.2021.1924692
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1924692
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:2:p:355-369



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1935889_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Brian J. Phillips
Author-X-Name-First: Brian J.
Author-X-Name-Last: Phillips
Title: How Did 9/11 Affect Terrorism Research? Examining Articles and Authors, 1970–2019
Abstract: 
 Terrorism research increased markedly after the attacks of September 11, 2001 (9/11). How has research on this subject changed in the past twenty years? I examine data on more than 6,000 academic articles on terrorism between 1970 and 2019, and the more than 1,500 authors of multiple articles. This information comes from every article in the Web of Science database with “terrorism” or “terrorist” in the title. Several primary findings emerge. (1) The volume of terrorism research surged to record highs after 9/11, and has not decreased since. (2) Psychologists became the most numerous terrorism researchers after 9/11, displacing political scientists for about ten years. Research on health or medical aspects of terrorism jumped after 9/11. (3) The proportion of female scholars increased substantially after 9/11, outpacing the rise in academia generally. This is in part because scholars new to the field were often from disciplines with relatively high percentages of women, such as psychology. (4) Terrorism scholars were mostly based in North America or Western Europe before 9/11, but the number of countries with scholars publishing terrorism research expanded considerably after 2001. Overall, terrorism research has developed in many ways over the decades, but 9/11 led to fundamental changes.
Journal: Terrorism and Political Violence
Pages: 409-432
Issue: 2
Volume: 35
Year: 2023
Month: 02
X-DOI: 10.1080/09546553.2021.1935889
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1935889
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:2:p:409-432



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1938002_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bernhard Blumenau
Author-X-Name-First: Bernhard
Author-X-Name-Last: Blumenau
Author-Name: Johannes-Alexander Müller
Author-X-Name-First: Johannes-Alexander
Author-X-Name-Last: Müller
Title: International Organisations and Terrorism: Multilateral Antiterrorism Efforts, 1960–1990
Abstract: 
 This article examines early antiterrorism negotiations within international organisations (IOs) and their outcomes. It assesses how international cooperation emerged in specialised, regional, and global IOs and provides a long-term overview from the 1960s until the late 1980s. Drawing on primary sources and scholarly literature, this article identifies the patterns, trends, and key characteristics of the successfully adopted measures. It demonstrates that early multilateral antiterrorism efforts faced several obstacles (sovereignty, national interests, mistrust, and geopolitics), and, therefore, international negotiations fared better when following a piecemeal approach within specialised or regional organisations, where the focus could be on specific aspects of terrorism (e.g., hostage-takings). A key characteristic of the successfully adopted antiterrorism instruments was the aut dedere aut iudicare principle, which allowed states to maintain perceptions of sovereignty by either extraditing or trying a suspect. The antiterrorism efforts examined here were mostly preventative in design and worked to discourage future terrorists by ensuring that safe havens were closed and that perpetrators faced justice. The shift to suicide terrorism in the 1990s would instead require new international antiterrorism efforts to focus on pre-emptive strategies, depriving terrorists of the means to carry out attacks. The roots of these measures were laid in the 1980s.
Journal: Terrorism and Political Violence
Pages: 433-451
Issue: 2
Volume: 35
Year: 2023
Month: 02
X-DOI: 10.1080/09546553.2021.1938002
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1938002
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:2:p:433-451



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1931139_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Annekatrin Deglow
Author-X-Name-First: Annekatrin
Author-X-Name-Last: Deglow
Title: Losing Hearts and Minds: Civil Conflict, Counterinsurgency Policing and Postwar Crime in Insurgent Strongholds
Abstract: 
 Postwar countries often experience high levels of crime. A frequent explanation is that these countries exhibit inefficient and illegitimate state security apparatuses that cannot enforce law and order, and that contribute to an environment conducive to crime. Theoretical arguments outlining how an environment conducive to crime comes about as consequences of armed conflict have remained generic and empirical evidence is scant. Building on theoretical insights from the micro dynamics of civil wars, counterinsurgency policing and environmental criminology, this study makes a contribution by theoretically developing and empirically exploring how local conflict dynamics in insurgent strongholds shape police-community relations in a way that undermines the extent to which the police can handle crime in a postwar context. The suggested causal process is explored in the context of West Belfast (Northern Ireland) from 1969–2008. The analysis indicates overall support for it, though with important nuances.
Journal: Terrorism and Political Violence
Pages: 370-389
Issue: 2
Volume: 35
Year: 2023
Month: 02
X-DOI: 10.1080/09546553.2021.1931139
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1931139
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:2:p:370-389



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1903439_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sebastian Schutte
Author-X-Name-First: Sebastian
Author-X-Name-Last: Schutte
Author-Name: Constantin Ruhe
Author-X-Name-First: Constantin
Author-X-Name-Last: Ruhe
Author-Name: Niranjan Sahoo
Author-X-Name-First: Niranjan
Author-X-Name-Last: Sahoo
Title: How Fear of Violence Drives Intergroup Conflict: Evidence from a Panel Survey in India
Abstract: 
 Earlier research on ethnic and religious conflict has identified fear as an important motivation. While theoretically sound, this expectation has never been tested at larger scales in ongoing episodes of political violence. Instead, conceptual progress has been made in lab experiments. Combining insights from observational research and stylized experiments, we predict that fear for personal safety due to witnessed violence causes prejudice against out-groups, enhanced internal cohesion, and support for extremist actors. To test these predictions, we conducted surveys in the Indian State of Uttar Pradesh with identical respondents in three waves starting in January 2017. The surveys continued during the tense Legislative Assembly elections in the Spring. The results largely corroborate the theoretical expectations and present a hard in-vivo test of long-standing conjectures.
Journal: Terrorism and Political Violence
Pages: 229-247
Issue: 2
Volume: 35
Year: 2023
Month: 02
X-DOI: 10.1080/09546553.2021.1903439
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1903439
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:2:p:229-247



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1969858_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: Correction
Journal: Terrorism and Political Violence
Pages: 497-499
Issue: 2
Volume: 35
Year: 2023
Month: 02
X-DOI: 10.1080/09546553.2021.1969858
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1969858
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:2:p:497-499



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1933957_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sofia Lygren
Author-X-Name-First: Sofia
Author-X-Name-Last: Lygren
Author-Name: Jacob Aasland Ravndal
Author-X-Name-First: Jacob Aasland
Author-X-Name-Last: Ravndal
Title: Why Reciprocal Intergroup Radicalisation Happened between Islamists and Anti-Islamists in Britain but Not in Norway
Abstract: 
 Between 2009 and 2015, both Islamist and anti-Islamist protest groups were active in Britain and Norway. However, while these opposing groups regularly clashed violently in the U.K., such interactions never occurred in Norway. This paper seeks to explain why seemingly similar group dyads produced different outcomes in different cases. In doing so, we trace relevant causal mechanisms derived from social movement theory in a comparative case study design. The paper can also be read as a response to Busher and Macklin’s call for improving conceptual clarity in research on “cumulative extremism.” Part of our response is introducing an alternative concept: Reciprocal intergroup radicalisation (RIR). Our analysis further shows that in Britain, RIR was fuelled by the presence of militant activists on both sides, a competent leadership, a central enemy image of the adversary, and a perception of unjust repression by security authorities. Conversely, the absence of these factors contained RIR between the Norwegian groups. In conclusion, our paper cautions against exaggerating the threat from RIR as multiple conditions must combine for RIR to occur. Even in Britain, by many considered a hotbed for RIR, the combined presence of these conditions was short lived.
Journal: Terrorism and Political Violence
Pages: 390-408
Issue: 2
Volume: 35
Year: 2023
Month: 02
X-DOI: 10.1080/09546553.2021.1933957
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1933957
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:2:p:390-408

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1967148_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Steven T. Zech
Author-X-Name-First: Steven T.
Author-X-Name-Last: Zech
Author-Name: Joshua Eastin
Author-X-Name-First: Joshua
Author-X-Name-Last: Eastin
Title: State, Society, and Pro-Government Militias in the Philippines
Abstract: 
 Examining militia relationships with the government and civilian populations can help scholars and policymakers better assess differences in militia form, function, and behavior. In this article, we examine the Civilian Armed Forces Geographical Units (CAFGU), a pro-government militia in the Philippines, to better understand how militia participants view insurgents, politicians, state security forces, and civilians based on their experiences serving in the group. We argue that analyzing these beliefs is critical to understanding how militias influence civilian security and the risk of political violence in conflict-contested areas, as well as the trajectory of civil conflict in states like the Philippines that rely on militias to perform core security functions. We base the analysis on surveys and interviews with CAFGU members and civilians living in the Eastern Visayas, a region of active and ongoing conflict, where insurgents and other armed militants advance their aims through acts of violence and terrorism. In doing so, we contribute to a growing literature on the role that militias play in civil war, as well as the implications that follow when states choose to arm “civilians” to aid in counterinsurgency and conflict suppression.
Journal: Terrorism and Political Violence
Pages: 615-633
Issue: 3
Volume: 35
Year: 2023
Month: 04
X-DOI: 10.1080/09546553.2021.1967148
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1967148
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:3:p:615-633



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1957675_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: HÃ¥vard Haugstvedt
Author-X-Name-First: HÃ¥vard
Author-X-Name-Last: Haugstvedt
Author-Name: Daniel Koehler
Author-X-Name-First: Daniel
Author-X-Name-Last: Koehler
Title: Armed and Explosive? An Explorative Statistical Analysis of Extremist Radicalization Cases with Military Background
Abstract: 
 Extremist infiltration of armed forces, and the spread of violent radicalization among service members and former soldiers, are a growing international concern. With an increased number of active duty and former soldiers involved in extremist and terrorist milieus, the public fears that national security might be compromised by potential terrorists using their training, equipment, and networks against the countries they swore to protect. This is a serious impediment to the trust in authorities for many nations. However, little empirical research exists on either the scope of the problem, or the specific risk factors that might be involved in turning military personnel toward extremism. In this paper, we utilize the “Profiles of Individual Radicalization in the United States” (PIRUS) dataset to shed light on the vulnerability and risk factors into the extremist radicalization of military personnel. Our findings indicate that far-right radicalized individuals with military backgrounds are more likely to suffer from trauma, a diminution of social standing, having difficulties in romantic relationships, and exclusion from participation in social groups or organizations, compared to far-right radicalized individuals without military backgrounds. Mental illness, grievance, and anger toward society are also more present in the far-right military group compared to the non-military group.
Journal: Terrorism and Political Violence
Pages: 518-532
Issue: 3
Volume: 35
Year: 2023
Month: 04
X-DOI: 10.1080/09546553.2021.1957675
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1957675
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:3:p:518-532



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1970542_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Shane Satterley
Author-X-Name-First: Shane
Author-X-Name-Last: Satterley
Author-Name: Halim Rane
Author-X-Name-First: Halim
Author-X-Name-Last: Rane
Author-Name: Riyad H. Rahimullah
Author-X-Name-First: Riyad H.
Author-X-Name-Last: Rahimullah
Title: Fields of Educational Interest and an Islamist Orientation in Australia
Abstract: 
 This article contributes to our understanding of Islamist extremism by examining the relationship between early educational interests and ideas associated with Islamist-jihadist ideology. The article uses data collected through the Islam in Australia survey and specifically compares STEM (science, technology, engineering and mathematics) with HSS (humanities and social science) fields of educational interest in relation to respondents’ identification with political Islamist and militant typologies, identification with Islam as a political system, understandings of jihad and views on the caliphate as an Islamic religious obligation. The article found Muslim Australians who expressed an interest in STEM fields at high school were more likely than those interested in HSS to: (1) identify with the political Islamist and militant typology; (2) believe Islam advocates a political system; (3) believe establishing a caliphate is a religious obligation; and (4) define jihad as defensive and offensive rather than as defensive only. As discussed in the article, these findings support those of other research), which have identified an overrepresentation of STEM and an underrepresentation of HSS among Islamist-jihadists. This article adds weight to the assertion that the mindset of Islamist-jihadists, may be present prior to undertaking tertiary education and may predispose some to support extremist ideologies. This paper finds that an Islamist-jihadist ideological orientation has a relationship with the STEM fields broadly and Islamic studies specifically during adolescence.
Journal: Terrorism and Political Violence
Pages: 694-711
Issue: 3
Volume: 35
Year: 2023
Month: 04
X-DOI: 10.1080/09546553.2021.1970542
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1970542
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:3:p:694-711



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1964964_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Wesley S. McCann
Author-X-Name-First: Wesley S.
Author-X-Name-Last: McCann
Title: Islamic Extremism and CBRN Terrorism
Abstract: 
 The extant literature on the relationship between religious ideology and CBRN weapons pursuit lacks a strong empirical basis. To address this, the current study utilizes a new dataset—the CBRN Terrorism Database (CTD)—to evaluate whether Islamic actors are more or less likely to pursue CBRN weapons. Binary logistic regression models are used on several different constrained subsamples to assess the relationship between ideology, group-, and country-level factors and CBRN weapons pursuit. Across the models, the strongest predictors of pursuit are whether the actor is an individual, is inspired by an Islamic ideology, and resides in a country with low levels of ethnic fractionalization. Other factors are important under specific contexts, but Islamic groups are significantly more likely to pursue CBRN weapons as well. Implications and recommendations are discussed.
Journal: Terrorism and Political Violence
Pages: 594-614
Issue: 3
Volume: 35
Year: 2023
Month: 04
X-DOI: 10.1080/09546553.2021.1964964
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1964964
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:3:p:594-614



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1957847_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel Koehler
Author-X-Name-First: Daniel
Author-X-Name-Last: Koehler
Title: “The Fighting Made Me Feel Alive”: Women’s Motivations for Engaging in Left-wing Terrorism: A Thematic Analysis
Abstract: 
 Even though it is well documented that women have had, and continue to have, much more prominent positions and stronger participation in violent left-wing extremism and terrorism compared to other forms of political violence, the literature on their motivations to join militant left-wing milieus and groups is under-developed. Compared to female members of violent extreme right, jihadist, or ethno-separatist groups, little is known about the drivers involved in motivating women to join the violent far left. My study examines thirteen autobiographies of German and American women who were active in various forms of left-wing terrorism to shed light on their motivational themes for joining those militant groups. The analysis identified four key motivational themes across the autobiographical materials: living a completely authentic life as political warriors (consequentialism), being part of a global rebellion (internationalism), moral superiority of the cause, and responding to intolerable prison conditions caused by illegitimate governmental force or police brutality. The findings highlight the importance of understanding women’s involvement in terrorism through their own complex decisions and agency.
Journal: Terrorism and Political Violence
Pages: 553-568
Issue: 3
Volume: 35
Year: 2023
Month: 04
X-DOI: 10.1080/09546553.2021.1957847
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1957847
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:3:p:553-568



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1970541_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: HÃ¥vard Haugstvedt
Author-X-Name-First: HÃ¥vard
Author-X-Name-Last: Haugstvedt
Author-Name: Svein Erik Tuastad
Author-X-Name-First: Svein Erik
Author-X-Name-Last: Tuastad
Title: “It Gets a Bit Messy”: Norwegian Social Workers’ Perspectives on Collaboration with Police and Security Service on Cases of Radicalisation and Violent Extremism
Abstract: 
 Social workers are a part of the prevention efforts against radicalisation and violent extremism in the Nordic countries. While multi-agency cooperation is not new in Norway, municipal cooperation with the police security service is. This cooperation, particularly its unintended consequences with a specific focus on the securitisation of “soft professionals” in the public sector, has been scarcely researched. We address this gap with findings from a qualitative study based on seventeen individual in-depth interviews and two focus-group interviews with experienced social workers in Norway. Abbott’s theory of jurisdiction serves as our theoretical framework. Our findings suggest that social workers in some cases appear subordinate to law enforcement personnel. Further, the lack of clarity of roles and responsibilities raises ethical and professional dilemmas, especially regarding work transparency and client confidentiality, indicating an outside influence of security onto prevention work. An unintended consequence of this is the risk of lower levels of trust between prevention workers and their target group and a reduced ability to support at-risk individuals. Clarification of the roles and responsibilities of all partners involved in multi-agency PVE should be given attention from both policymakers and practitioners.
Journal: Terrorism and Political Violence
Pages: 677-693
Issue: 3
Volume: 35
Year: 2023
Month: 04
X-DOI: 10.1080/09546553.2021.1970541
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1970541
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:3:p:677-693



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1957674_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Henrik Gråtrud
Author-X-Name-First: Henrik
Author-X-Name-Last: Gråtrud
Title: Urban Terrorism in the Arab World: Introducing a Dataset of Jihadist Attack Plots in Jordan
Abstract: 
 Few regions have been more plagued by terrorism than the Arab world. However, knowledge of the phenomenon’s nature is limited by a lack of attack plot data for most Arab countries. This article contributes to addressing this gap by presenting a dataset of jihadist incidents in Jordan from 1994 until the end of 2018. Based on recent progress in measuring terrorism, the dataset does not only include launched attacks but also foiled and failed attack plots to give a more accurate and comprehensive overview of the threat. It provides answers to fundamental descriptive questions such as how many plots there have been, which jihadist actors have been responsible, and what type of attacks they have attempted to carry out. This work matters because it reveals the main characteristics of the jihadist terrorist threat to the Kingdom. This enables future studies to provide more empirically based explanations of what causes jihadist terrorism in Jordan than previously possible.
Journal: Terrorism and Political Violence
Pages: 501-517
Issue: 3
Volume: 35
Year: 2023
Month: 04
X-DOI: 10.1080/09546553.2021.1957674
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1957674
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:3:p:501-517



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1962308_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: S. L. Carthy
Author-X-Name-First: S. L.
Author-X-Name-Last: Carthy
Author-Name: K. M. Sarma
Author-X-Name-First: K. M.
Author-X-Name-Last: Sarma
Title: Countering Terrorist Narratives: Assessing the Efficacy and Mechanisms of Change in Counter-narrative Strategies
Abstract: 
 This study presents the findings of a laboratory-based experiment testing hypothesised processes implicated in the prevention of violent radicalisation through counter-narratives. The central aims of the study were to contribute to counter-narrative theory, whilst highlighting the value of experimental methodologies that can be deployed in this area of scientific enquiry. Two counter-narrative strategies were evaluated against a dominant terrorist narrative. Considering the role of cognition in the processing of narrative-related information, participants’ (n = 150) Cognitive Reflection and Need for Cognition were measured before they were randomly assigned to a narrative that legitimized terrorist violence, one of two counter-narratives, or a control. Returning autonomy to the target by having them actively counter terrorist rhetoric themselves was found to be more effective than offering generic counter-narratives. Notwithstanding the challenges and limitations associated with measuring violent radicalization-related constructs, the findings of the experiment demonstrate the extent to which individuals vary in their susceptibility to violent, terrorist narratives, as well as attempts to counter them.
Journal: Terrorism and Political Violence
Pages: 569-593
Issue: 3
Volume: 35
Year: 2023
Month: 04
X-DOI: 10.1080/09546553.2021.1962308
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1962308
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:3:p:569-593



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1957846_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Olivier J. Walther
Author-X-Name-First: Olivier J.
Author-X-Name-Last: Walther
Author-Name: Steven M. Radil
Author-X-Name-First: Steven M.
Author-X-Name-Last: Radil
Author-Name: David G. Russell
Author-X-Name-First: David G.
Author-X-Name-Last: Russell
Author-Name: Marie Trémolières
Author-X-Name-First: Marie
Author-X-Name-Last: Trémolières
Title: Introducing the Spatial Conflict Dynamics Indicator of Political Violence
Abstract: 
 While the location of violent events and their propensity to cluster together in space is increasingly well known, a deeper exploration of their spatiality and spatial evolution over time remains an emerging frontier in “Big Data”-driven conflict studies. The new Spatial Conflict Dynamics indicator (SCDi) introduced in this article contributes to fill this gap, by measuring both the intensity and spatial concentration of political violence at the subnational level. Articulating between point pattern and areal spatial analyses, the SCDi allows conflict researchers and analysts to not just map which regions experience the most violence but to track how the geography of conflict evolves over time. The SCDi identifies four spatial typologies of violence and can leverage political event data from most datasets with locational information and can be used for analyses across large multi-state regions, within a single state, or in more localized contexts. In this paper, we illustrate the SCDi with an application to the case of North and West Africa, analyzing over 30,000 discrete events through a twenty-two-year time span and across a twenty-two-state geographical area. We perform a longitudinal analysis of the SCDi typologies to show how the indicator can inform a theory of the spatial lifecycle of violence in the region. The indicator, therefore, has potential as both an analytic tool and a window on conflict episodes, showing how they can change from conflict initiation through resolution.
Journal: Terrorism and Political Violence
Pages: 533-552
Issue: 3
Volume: 35
Year: 2023
Month: 04
X-DOI: 10.1080/09546553.2021.1957846
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1957846
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:3:p:533-552



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1972977_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Oluf Gøtzsche-Astrup
Author-X-Name-First: Oluf
Author-X-Name-Last: Gøtzsche-Astrup
Author-Name: Lasse Lindekilde
Author-X-Name-First: Lasse
Author-X-Name-Last: Lindekilde
Author-Name: Anna-Maria Fjellman
Author-X-Name-First: Anna-Maria
Author-X-Name-Last: Fjellman
Title: Perceived Legitimacy of CVE Policies and the Willingness to Report Concerns of Radicalization to Authorities in the Nordic Countries
Abstract: 
 Approaches to countering violent extremism (CVE) increasingly call upon ordinary citizens to report concerns regarding radicalization to authorities. However, knowledge about the factors determining their willingness to report remains limited. This paper addresses this void by asking under what circumstances members of the public are willing to report concerns of radicalization to authorities. The paper reports findings from a large-scale, comparative survey experiment fielded to nationally representative samples in Sweden, Denmark, Norway and Finland (n = 7,389) as well as eight city representative samples (two in each country, n = 6,603). We investigate how perceptions of the appropriateness, inclusiveness, implementation and outcome of CVE policies combine in forming perceptions of the legitimacy of CVE policy, and how manipulations of perceived legitimacy shape willingness to collaborate with authorities. Both cross-country and cross-city differences in willingness to report concerns of radicalization are explored. The results show that the more legitimate citizens perceive CVE policies to be, the more willing they are to contact authorities to report concerns of radicalization, while perceptions of CVE policies as illegitimate lead to a preference for reactions involving “intimates” of the individual in question and short of reporting to authorities. The implications of the findings for CVE practices are discussed.
Journal: Terrorism and Political Violence
Pages: 712-728
Issue: 3
Volume: 35
Year: 2023
Month: 04
X-DOI: 10.1080/09546553.2021.1972977
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1972977
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:3:p:712-728



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1967935_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Hollie Nyseth Brehm
Author-X-Name-First: Hollie
Author-X-Name-Last: Nyseth Brehm
Author-Name: Amanda Lea Robinson
Author-X-Name-First: Amanda Lea
Author-X-Name-Last: Robinson
Author-Name: Mini Saraswati
Author-X-Name-First: Mini
Author-X-Name-Last: Saraswati
Title: Triggers of Escalations in Violence Against Civilians by Non-State Actors in Africa
Abstract: 
 Although past research has addressed why civilians are targeted, we know less about why non-state actors escalate violence against civilians at particular times. This article seeks to identify the events that trigger spikes in violence against civilians committed by non-state actors. We employ an innovative method to identify twenty-four such escalations in Africa committed by twenty different non-state groups between 1989 and 2015. Rigorous case studies reveal three major types of triggers, including situations in which (1) groups lose relative power, (2) groups gain relative power, and (3) opponents attack civilians. Specifically, we find that opponent military advances—which results in a relative loss of power for the non-state actor—are the most common trigger. More broadly, 75 percent of all escalations are tied to a group’s relative loss in power. These results improve understandings of civilian targeting by non-state actors and may inform efforts to forecast such violence before it occurs.
Journal: Terrorism and Political Violence
Pages: 658-676
Issue: 3
Volume: 35
Year: 2023
Month: 04
X-DOI: 10.1080/09546553.2021.1967935
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1967935
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:3:p:658-676



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1967149_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jonas R. Kunst
Author-X-Name-First: Jonas R.
Author-X-Name-Last: Kunst
Author-Name: Milan Obaidi
Author-X-Name-First: Milan
Author-X-Name-Last: Obaidi
Author-Name: Ann-Cathrin Coenen
Author-X-Name-First: Ann-Cathrin
Author-X-Name-Last: Coenen
Author-Name: Vilde D. Vasseljen
Author-X-Name-First: Vilde D.
Author-X-Name-Last: Vasseljen
Author-Name: Paul Gill
Author-X-Name-First: Paul
Author-X-Name-Last: Gill
Title: What Makes a Terrorist? Muslims’ and non-Muslims’ Lay Perceptions of Risk Factors and Their Consequences for Counterterrorism Policy Support
Abstract: 
 The question of why people become terrorists has preoccupied scholars and policy makers for decades. Yet, very little is known about how lay people perceive individuals at risk of becoming terrorists. In two studies conducted in the U.K., we aimed to fill this gap. Study 1 showed that Muslims and non-Muslims perceived a potential minority-group terrorist in terms of both structural (e.g., life-history, social) and individual risk factors (e.g., personality, psychopathology, ideology). In Study 2, Muslims and non-Muslims perceived a potential right-wing majority-group terrorist as having more individual predispositions to terrorism than a potential left-wing majority-group terrorist. Importantly, in both studies, individualist perceptions such as psychopathology were positively associated with support for stricter law enforcement, whereas structuralist perceptions such as adverse childhood experiences were positively associated with support for social interventions. Lay people seem to have multifactorial understandings of individuals at risk of becoming terrorists, which influence their counterterrorism policy support.
Journal: Terrorism and Political Violence
Pages: 634-657
Issue: 3
Volume: 35
Year: 2023
Month: 04
X-DOI: 10.1080/09546553.2021.1967149
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1967149
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:3:p:634-657



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2131295_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gizem AkÅŸit Ergen
Author-X-Name-First: Gizem
Author-X-Name-Last: AkÅŸit Ergen
Title: Battle for Allegiance: Governments, Terrorist Groups, and Constituencies in Conflict
Journal: Terrorism and Political Violence
Pages: 729-730
Issue: 3
Volume: 35
Year: 2023
Month: 04
X-DOI: 10.1080/09546553.2022.2131295
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2131295
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:3:p:729-730



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2131296_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Keeley Townsend
Author-X-Name-First: Keeley
Author-X-Name-Last: Townsend
Title: A Call to Dissent: Defending Democracy Against Extremism and Populism
Journal: Terrorism and Political Violence
Pages: 731-732
Issue: 3
Volume: 35
Year: 2023
Month: 04
X-DOI: 10.1080/09546553.2022.2131296
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2131296
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:3:p:731-732

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1982704_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Edwar E. Escalante
Author-X-Name-First: Edwar E.
Author-X-Name-Last: Escalante
Title: A Self-defense Network against Terrorism and Crime: Evidence from Peru
Abstract: 
 According to prevailing evidence, self-enforcing agreements do not scale up. In self-governing societies, small groups are able to provide order and security when the group is small; but when groups are larger, collective action seems to be more efficient if undertaken by state-like institutions. However, an effective provision of national security may result from a bottom-up development of rules and institutions. This paper covers a case in which thousands of peasants built multicommunity partnerships that scaled up to produce public goods with no central direction. The organizational patterns of these peasant partnerships resulted in a vast rural movement that played a decisive role in defeating crime and terrorism in Peru between 1980 and 2000. The intergroup interactions reflected a polycentric order that served to discover the boundaries of the new jurisdictions.
Journal: Terrorism and Political Violence
Pages: 828-845
Issue: 4
Volume: 35
Year: 2023
Month: 05
X-DOI: 10.1080/09546553.2021.1982704
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1982704
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:4:p:828-845



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1974845_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Renata Franc
Author-X-Name-First: Renata
Author-X-Name-Last: Franc
Author-Name: Tomislav Pavlović
Author-X-Name-First: Tomislav
Author-X-Name-Last: Pavlović
Title: Inequality and Radicalisation: Systematic Review of Quantitative Studies
Abstract: 
 This systematic review sought to synthesize and evaluate the quantitative findings regarding the inequality-radicalization relationship while considering their multidimensionality. The comprehensive search resulted in the screening of more than 5,000 items and the final inclusion of 141 publications. The findings of narrative synthesis suggested that socio-political inequality is more consistently positively related to terrorism/cognitive radicalization than economic inequality, which is more relevant for behavioral radicalization. The findings are discussed in terms of the importance of differentiating between dimensions, indicators, and levels of inequality and radicalization, complex relations, as well as shortcomings of existing evidence base and opportunities for improvement.
Journal: Terrorism and Political Violence
Pages: 785-810
Issue: 4
Volume: 35
Year: 2023
Month: 05
X-DOI: 10.1080/09546553.2021.1974845
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1974845
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:4:p:785-810



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1977282_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ido Levy
Author-X-Name-First: Ido
Author-X-Name-Last: Levy
Title: Lethal Beliefs: Ideology and the Lethality of Terrorist Organizations
Abstract: 
 Open-source data and studies indicate the higher lethality rates of jihadist groups versus other types of terrorist organizations. I argue jihadist groups are more lethal than other groups due to their higher ideological intensity, determined by observing how ideology corresponds to a group’s goals, internal cohesion, and external affinity. I use data from the Global Terrorism Database (GTD) and Revolutionary and Militant Organizations dataset (REVMOD) to create two samples of terrorist organizations coded by ideological affiliation. My findings confirm the higher lethality of jihadists in general and of apocalyptic jihadists in particular. Jihadist groups kill more per attack and have higher kill-wound ratios than other groups. Attachment to suicide terrorism largely accounts for higher jihadist lethality.
Journal: Terrorism and Political Violence
Pages: 811-827
Issue: 4
Volume: 35
Year: 2023
Month: 05
X-DOI: 10.1080/09546553.2021.1977282
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1977282
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:4:p:811-827



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1987893_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Steven E. Finkel
Author-X-Name-First: Steven E.
Author-X-Name-Last: Finkel
Author-Name: John F. McCauley
Author-X-Name-First: John F.
Author-X-Name-Last: McCauley
Author-Name: Michael Neureiter
Author-X-Name-First: Michael
Author-X-Name-Last: Neureiter
Author-Name: Christopher A. Belasco
Author-X-Name-First: Christopher A.
Author-X-Name-Last: Belasco
Title: Where Terror Lies: Misrepresentation of Extremist Attitudes and Terrorist Attacks in the Sahel
Abstract: 
 Researchers have commonly treated misrepresentations in survey responses as an impediment to the accurate measurement of a variable or construct of substantive importance. This study builds on that approach and considers whether misreporting bias regarding support for violent extremism—both under- and over-reporting—may then have consequences for how terrorist violence itself unfolds. Using data from nearly 4,000 respondents in thirty-five communes in Burkina Faso, Chad, and Niger collected just prior to a recent wave of terrorist attacks, we find that communes where individuals under-report their true support for violent extremism—as measured with unobtrusive experimental methods—have a greater probability of experiencing subsequent Islamist attacks, controlling for socio-demographic characteristics of the commune, country-level proximity effects, and other time-varying factors. The findings raise important considerations regarding the measurement of extremist support, and they suggest a new tool for identifying communities potentially susceptible to terrorist violence.
Journal: Terrorism and Political Violence
Pages: 888-907
Issue: 4
Volume: 35
Year: 2023
Month: 05
X-DOI: 10.1080/09546553.2021.1987893
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1987893
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:4:p:888-907



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1987896_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mohammed Ibrahim Shire
Author-X-Name-First: Mohammed
Author-X-Name-Last: Ibrahim Shire
Title: Provocation and Attrition Strategies in Transnational Terrorism: The Case of Al-Shabaab
Abstract: 
 Scholars have identified a range of terrorist strategies that militant groups employ to influence intended audiences, but there is scant empirical validation. Following Kenya’s invasion of Somalia in late 2011, Al-Shabaab executed retaliatory terrorist attacks in Kenya with the strategic aim to compel the withdrawal of Kenyan troops from Somalia. Drawing on unique in-depth interviews with Al-Shabaab defectors and civilian witnesses to counterterrorism measures in Kenya, this article investigates the strategic motives underlying Al-Shabaab’s transnational terrorist operations and assesses the effect these have had on the intended audiences. The empirical findings reveal that the attrition strategy has underpinned Al-Shabaab’s major terrorist attacks (large-scale events) whilst their minor terrorist attacks (small-scale events) have been motivated by the provocation strategy, aimed at eliciting a repressive state overreaction against Kenya’s Somali and Muslim minorities. Whilst the major terrorist attacks succeeded in fomenting the Kenyan public’s anti-war views, this did not result in troop withdrawal; the minor terrorist attacks, however, engendered harsh state repression and draconian measures against Kenya’s Somali and Muslim minorities, ultimately exacerbating existing grievances and channelling fresh recruits to Al-Shabaab. This article contributes to the growing literature on terrorist strategies, offering nuanced empirical insights to understanding the strategic motives underpinning transnational terrorist campaigns. The article demonstrates that transnational terrorism campaigns are rooted in the strategic need to influence different audiences abroad. Depending on militant groups’ short- and long-term objectives, the type of attack indicates the type of terrorist strategy they will employ.
Journal: Terrorism and Political Violence
Pages: 945-970
Issue: 4
Volume: 35
Year: 2023
Month: 05
X-DOI: 10.1080/09546553.2021.1987896
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1987896
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:4:p:945-970



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1987895_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kristy Campion
Author-X-Name-First: Kristy
Author-X-Name-Last: Campion
Title: Defining Ecofascism: Historical Foundations and Contemporary Interpretations in the Extreme Right
Abstract: 
 The terrorist attacks in Christchurch in March 2019 and El Paso five months later emphasised the renewed relevance of ecofascism to the extreme right. This study advances an integrated definition of ecofascism with respect to the historical and contemporary extreme right. It found ecofascism to be a reactionary and revolutionary ideology that champions the regeneration of an imagined community through a return to a romanticised, ethnopluralist vision of the natural order. Ecofascists believe that their chosen community has weakened because the connection to nature has been disrupted by the forces of modernity, spanning industrialisation, urbanisation, multiculturalism, materialism, and individualism. Ecofascists therefore seek the complete rebirth of their imagined community through a return to nature, which they believe will restore the people to a state of authenticity and dominance. Because the community is based on racial constructs, the ecofascist vision of ecological harmony manifests as racial segregation based on place. This provides a platform for ecofascists to justify expelling or destroying people they deem unnatural or disruptive to the ecosystem. In settler societies, ecofascism provides the premise by which immigrants can reject and expel other immigrants, while simultaneously claiming an authentic connection with nature.
Journal: Terrorism and Political Violence
Pages: 926-944
Issue: 4
Volume: 35
Year: 2023
Month: 05
X-DOI: 10.1080/09546553.2021.1987895
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1987895
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:4:p:926-944



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1998007_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Regine Schwab
Author-X-Name-First: Regine
Author-X-Name-Last: Schwab
Title: Escalate or Negotiate? Constraint and Rebel Strategic Choices Towards Rivals in the Syrian Civil War
Abstract: 
 Theories of interaction among rebel groups in civil wars, like other works in the armed conflict literature, continue to see force as foundational to the trajectory and outcome of conflict. But evidence from inter-rebel conflicts in the Syrian war, which has been one of the major civil wars of our times, shows that military force is not always the preferred tool even in situations where violence is presumably cheap: in conflicts between dominant rebel groups and weaker rivals. Rather than using force, Jabhat al-Nusra, one of the strongest groups in the Syrian conflict, frequently chose to negotiate with rivals. Existing theories of inter-rebel conflict fail to explain such variation in responses. As an explanation of this puzzle of non-force, I argue that the constraint emanating from the conflict with the main enemy determines rebels’ strategies towards rivals. To investigate this argument, the paper draws on the triangulation of original data on inter-rebel conflicts in Syria, encompassing written agreements between Jabhat al-Nusra and other rebel groups, a database of important military operations in the Syrian civil war since 2011, and interviews with civil and military participants in the insurgency. The findings have important implications not only for our understanding of inter-rebel dynamics in the Syrian conflict but also for other complex civil wars concerning the relationship between inter-rebel negotiation, cooperation, success, and war duration.
Journal: Terrorism and Political Violence
Pages: 1007-1026
Issue: 4
Volume: 35
Year: 2023
Month: 05
X-DOI: 10.1080/09546553.2021.1998007
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1998007
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:4:p:1007-1026



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1989415_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Álvaro Vicente
Author-X-Name-First: Álvaro
Author-X-Name-Last: Vicente
Title: Social Ties and Jihadist Participation: A Mixed-Methods Approach to the Differential Recruitment of Radicalized Youth in Spain
Abstract: 
 The relationship between social ties and jihadist participation has garnered substantial attention from terrorism scholars. However, further research is needed to understand what specific properties of interpersonal bonds influence terrorist involvement and how they operate. Drawing on social network theory, the current study tests the effects of the type, number, and strength of interpersonal ties with jihadist activists in explaining the occurrence and absence of individual engagement in jihadist activities. For that purpose, this paper analyzes the social links of twenty-three youths involved in terrorism and twenty-one youths who, despite their attitudinal affinity with jihadism, did not take part in such actions. Combining quantitative and qualitative data and methods of analysis, the study found empirical evidence that participation in jihadism is affected by the number of connections between young people and the global jihadist movement. It also found partial support for the relationship between tie strength and jihadist involvement. However, it rejected the assumption that the type of social tie influences participation.
Journal: Terrorism and Political Violence
Pages: 988-1006
Issue: 4
Volume: 35
Year: 2023
Month: 05
X-DOI: 10.1080/09546553.2021.1989415
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1989415
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:4:p:988-1006



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1974004_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Glen Biglaiser
Author-X-Name-First: Glen
Author-X-Name-Last: Biglaiser
Author-Name: Lance Y. Hunter
Author-X-Name-First: Lance Y.
Author-X-Name-Last: Hunter
Author-Name: Ronald J. McGauvran
Author-X-Name-First: Ronald J.
Author-X-Name-Last: McGauvran
Title: Domestic Terrorism and Sovereign Bond Ratings in the Developing World
Abstract: 
 Since the 1990s, credit rating agencies have played a prominent financial role in developing countries, rating their sovereign bonds and determining capital costs. Over much the same years, domestic terrorism has expanded, increasing market disruptions in countries. Despite the heightened costs related to rebel attacks, few studies investigate the impact of domestic terrorism on bond ratings. Using a sample of seventy-one developing countries between 1996 and 2018, we find that domestic terrorist incidents result in sovereign bond downgrades for countries that receive ratings. Further, when we disaggregate terrorist events by target type, we observe that attacks directed at the government, military and police, business, non-governmental organizations, and private citizens/property have a larger effect than other terrorist incidents. We argue that specific domestic terrorist attacks increase economic instability, leading to capital flight, and a shifting of resources from productive economic sectors to counterterrorism. The resulting economic changes weaken a country’s economy and increase debt nonpayment risk.
Journal: Terrorism and Political Violence
Pages: 754-784
Issue: 4
Volume: 35
Year: 2023
Month: 05
X-DOI: 10.1080/09546553.2021.1974004
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1974004
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:4:p:754-784



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1988938_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kayla McMinimy
Author-X-Name-First: Kayla
Author-X-Name-Last: McMinimy
Author-Name: Carol K. Winkler
Author-X-Name-First: Carol K.
Author-X-Name-Last: Winkler
Author-Name: Ayse Deniz Lokmanoglu
Author-X-Name-First: Ayse Deniz
Author-X-Name-Last: Lokmanoglu
Author-Name: Monerah Almahmoud
Author-X-Name-First: Monerah
Author-X-Name-Last: Almahmoud
Title: Censoring Extremism: Influence of Online Restriction on Official Media Products of ISIS
Abstract: 
 Recognizing that militant, non-state groups utilize social media and online platforms to reach members, sympathizers, and potential recruits, state agencies and social media corporations now increasingly regulate access to accounts affiliated with such groups. Scholars examining deplatforming efforts have, to date, focused on the extent of audience loss after account restrictions and the identification of strategies for regrouping online followers on the same or different platforms over time. Left unexplored is if and how militant non-state groups adapt their official messaging strategies in response to platform restrictions despite continuing online access to them. To begin to fill that gap, this study compares ISIS’s 550 images displayed in the group’s official newsletter al-Naba six months before and after Europol’s November 2019 take-down of terrorist affiliated accounts, groups, channels, and bots on Telegram. It conducts a content analysis of images related to militaries and their outcomes, non-military activities and their outcomes, and presentational forms. The findings demonstrate that ISIS visually emphasizes its standard priming approach but shifts its agenda-setting strategy. While retaining some of its standard visual framing practices, the group also alters frames, particularly those related to images showing opposing militaries and military outcome.
Journal: Terrorism and Political Violence
Pages: 971-987
Issue: 4
Volume: 35
Year: 2023
Month: 05
X-DOI: 10.1080/09546553.2021.1988938
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1988938
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:4:p:971-987



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1972978_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jorge Santos-Hermoso
Author-X-Name-First: Jorge
Author-X-Name-Last: Santos-Hermoso
Author-Name: José Luis González-Álvarez
Author-X-Name-First: José Luis
Author-X-Name-Last: González-Álvarez
Author-Name: Andrea Macía Vázquez
Author-X-Name-First: Andrea
Author-X-Name-Last: Macía Vázquez
Author-Name: Florencia Pozuelo Rubio
Author-X-Name-First: Florencia
Author-X-Name-Last: Pozuelo Rubio
Author-Name: Sandra Chiclana
Author-X-Name-First: Sandra
Author-X-Name-Last: Chiclana
Title: Jihadist Extremism in Spanish Prisons: Characterisation of the Inmates Linked to Jihadist Radicalisation and Analysis of Their Behaviour in Prison
Abstract: 
 In Spain, 10.1 percent of jihadist terrorists were radicalised in prison. The objective of this paper is to elaborate on the analysis of the phenomenon of jihadist radicalisation in Spain’s prisons by analysing the inmates linked to jihadist radicalisation who are included in groups A, B and C. The results show that the profile of the inmates linked to jihadist radicalisation has not undergone major changes, although a drop in age and an increase in the number of cases of Spanish nationality can be observed. When the inmates included in the three groups were compared at the time of the investigation (August 2019), it was found that they are of a similar age, that Spanish citizens are more common in group A, mental disorders are more common in group C and that both group B as well as C exhibit a more extensive criminal record and more admissions to prison. Important differences were found with regard to the behaviour in prison, namely that the inmates in group A are not individuals who repeatedly employ violence, while the inmates in group C exhibit a very pronounced antisocial profile, with frequent use of both verbal and physical violence in their day-to-day life in prison.
Journal: Terrorism and Political Violence
Pages: 733-753
Issue: 4
Volume: 35
Year: 2023
Month: 05
X-DOI: 10.1080/09546553.2021.1972978
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1972978
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:4:p:733-753



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1986393_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Shkolnik
Author-X-Name-First: Michael
Author-X-Name-Last: Shkolnik
Title: Repression or Reward: Assessing the Impact of Israeli Counterinsurgency Measures on Diverse Perpetrators of Palestinian Militancy
Abstract: 
 This study quantitatively assesses the impact of Israeli government actions on Palestinian militant attacks according to different categories: Islamists (Hamas and the Palestinian Islamic Jihad), nationalists (Fatah and Palestine Liberation Organization-affiliated groups), and unknown assailants from 1987–2004. Few large-n studies disaggregate among Palestinian factions. This study, however, identifies the scope of factional responses to counterinsurgency measures based on similar constituency pressures and divergent organizational objectives. For example, both indiscriminate repression targeting the wider population and discriminate concessions that reward suspected militants embolden armed actors to increase attacks across the Palestinian spectrum. But Islamists with maximalist goals significantly ramp up attacks to derail peace process-related events and disrupt concessions that benefit Palestinian society. Islamist factions fight to prevent the emergence of a two-state solution and avoid being sidelined by leading nationalist organizations, who have relatively limited objectives and are more likely to strategically reduce attacks to accommodate peace efforts. Additional findings point to other determinants of militant attacks, including religious and national holidays in multi-party armed conflicts. By analyzing diverse sets of armed actors among a broader national movement, this study contributes to research on counterinsurgency, rebel fragmentation, conflict management, and the strategic logics of terrorism.
Journal: Terrorism and Political Violence
Pages: 866-887
Issue: 4
Volume: 35
Year: 2023
Month: 05
X-DOI: 10.1080/09546553.2021.1986393
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1986393
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:4:p:866-887



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1987894_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nazli Avdan
Author-X-Name-First: Nazli
Author-X-Name-Last: Avdan
Author-Name: James A. Piazza
Author-X-Name-First: James A.
Author-X-Name-Last: Piazza
Author-Name: Michael J. Soules
Author-X-Name-First: Michael J.
Author-X-Name-Last: Soules
Title: Silver Lining? The Effects of Epidemics on Terrorist Groups
Abstract: 
 In this study we examine the effects of epidemics on terrorist groups’ attack capacities. We consider two theoretical relationships between epidemics and terrorist groups. By weakening government counterterrorism defenses and increasing popular grievances, epidemics can provide a strategic environment that is conducive to terrorist groups, enhancing their capacity to commit more attacks, yield higher casualties and launch more logistically complex attacks. Conversely, epidemics can impair the abilities of terrorist groups to launch attacks by eroding group capacity and access to resources while incentivizing the state to increase its surveillance and policing capabilities. We test these two competing arguments using a database of over 620 terrorist groups for the period of 1970 to 2016. Our findings support the second argument. Terrorist groups based or operating in countries experiencing more and more intense epidemics commit fewer attacks, generally produce fewer casualties, commit a lower ratio of transnational to domestic attacks and less frequently use multi-mode attacks. We conclude with a discussion of the implications of these findings.
Journal: Terrorism and Political Violence
Pages: 908-925
Issue: 4
Volume: 35
Year: 2023
Month: 05
X-DOI: 10.1080/09546553.2021.1987894
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1987894
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:4:p:908-925



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1984236_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Adrian Cherney
Author-X-Name-First: Adrian
Author-X-Name-Last: Cherney
Author-Name: Emma Belton
Author-X-Name-First: Emma
Author-X-Name-Last: Belton
Title: The Evaluation of Case-managed Programs Targeting Individuals at Risk of Radicalisation
Abstract: 
 There currently exists little evidence on the effectiveness of case-managed programs targeting radicalised individuals. This paper provides results from an evaluation of two case-managed interventions implemented by police in Australia, referred to as Intervention 1 and Intervention 2. Drawing on client case note data and interviews, the paper provides quantitative and qualitative results. It examines client change using a five-point metric and details two individual case studies. Results provide data on radicalised behaviours, intervention goals and services offered to clients. Individual client progress is explored, and the overall effectiveness of both programs examined. The results show a positive relationship between client change and different measures of engagement. Limitations of the evaluation methodology and data sources are acknowledged and addressed. Lessons are highlighted relating to the assessment of client change, program evaluation and the role of interventions in supporting disengagement.
Journal: Terrorism and Political Violence
Pages: 846-865
Issue: 4
Volume: 35
Year: 2023
Month: 05
X-DOI: 10.1080/09546553.2021.1984236
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1984236
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:4:p:846-865

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1998008_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Chamin Herath
Author-X-Name-First: Chamin
Author-X-Name-Last: Herath
Author-Name: Joe Whittaker
Author-X-Name-First: Joe
Author-X-Name-Last: Whittaker
Title: Online Radicalisation: Moving Beyond a Simple Dichotomy
Abstract: 
 Online radicalisation to terrorism has become a pervasive policy concern over the last decade. However, as a concept it lacks clarity and empirical support. In this article, we add an empirical and theoretical lens to this problem by analysing the trajectories of 231 Islamic State terrorists. We use cluster analyses to create typologies of individuals’ different online and offline antecedent behaviours, including the ways in which they engaged in networks with co-ideologues and how they prepared for their events. The findings suggest four types of pathway within our dataset: (1) The “Integrated” pathway which has high network engagement both online and offline, mostly made up of individuals that plotted as part of a group; (2) The “Encouraged” pathway contains individuals that acted more in the online domain at the expense of offline; (3) Terrorists in the “Isolated” pathway are defined by a lack of interaction across either domain; (4) The “Enclosed” pathway encompassed actors that displayed greater offline network activity, but still utilised the Internet for planning their activity. These typologies help to move beyond the dichotomy of online or offline radicalisation; there remain few individuals that either exclusively use the Internet or do not use it at all. Rather, we can conceptualise Internet usage on a spectrum in which these four types all sit.
Journal: Terrorism and Political Violence
Pages: 1027-1048
Issue: 5
Volume: 35
Year: 2023
Month: 07
X-DOI: 10.1080/09546553.2021.1998008
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1998008
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:5:p:1027-1048



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_1999934_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Steve Wood
Author-X-Name-First: Steve
Author-X-Name-Last: Wood
Title: Is It Time to De-Proscribe Terrorist Organisations in Northern Ireland?
Abstract: 
 In 2017 an application to de-proscribe The Red Hand Commando (RHC) loyalist paramilitary organisation was submitted by an organisation known as the Loyalist Communities Council (LCC) which has the backing of other proscribed loyalist groups including the Ulster Defence Association (UDA), the Ulster Volunteer Force (UVF) and RHC. The application was understandably considered negatively by some relatives of RHC victims as well as by Sinn Féin. The application was rejected for failing to comply with the necessary process of de-proscription which reinforces the criticism and difficulty for proscribed organisations that are no longer engaged in terrorism to de-proscribe. If the Northern Ireland Assembly and Commissions set up in Northern Ireland (NI) following the Good Friday Agreement (GFA) with support from the Police Service of Northern Ireland (PSNI) are to dismantle paramilitary groups, then they must take bold decisions and decide whether it is time to support the de-proscription of paramilitary groups that have relinquished political violence. This article recommends that agencies should set out a staged process which can be followed by proscribed organisations in NI interested in applying for de-proscription thereby enabling them to self-evaluate whether or not they are ready for de-proscription.
Journal: Terrorism and Political Violence
Pages: 1049-1064
Issue: 5
Volume: 35
Year: 2023
Month: 07
X-DOI: 10.1080/09546553.2021.1999934
File-URL: http://hdl.handle.net/10.1080/09546553.2021.1999934
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:5:p:1049-1064



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2003785_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gian Maria Campedelli
Author-X-Name-First: Gian Maria
Author-X-Name-Last: Campedelli
Author-Name: Iain Cruickshank
Author-X-Name-First: Iain
Author-X-Name-Last: Cruickshank
Author-Name: Kathleen M. Carley
Author-X-Name-First: Kathleen M.
Author-X-Name-Last: Carley
Title: Multi-Modal Networks Reveal Patterns of Operational Similarity of Terrorist Organizations
Abstract: 
 Capturing dynamics of operational similarity among terrorist groups is critical to provide actionable insights for counterterrorism and intelligence monitoring. Yet, in spite of its theoretical and practical relevance, research addressing this problem is currently lacking. We tackle this problem proposing a novel computational framework for detecting clusters of terrorist groups sharing similar behaviors, focusing on groups’ yearly repertoire of deployed tactics, attacked targets, and utilized weapons. Specifically considering those organizations that have plotted at least fifty attacks from 1997 to 2018, accounting for a total of 105 groups responsible for more than 42,000 events worldwide, we offer three sets of results. First, we show that over the years global terrorism has been characterized by increasing operational cohesiveness. Second, we highlight that year-to-year stability in co-clustering among groups has been particularly high from 2009 to 2018, indicating temporal consistency of similarity patterns in the last decade. Third, we demonstrate that operational similarity between two organizations is driven by three factors: (a) their overall activity; (b) the difference in the diversity of their operational repertoires; (c) the difference in a combined measure of diversity and activity. Groups’ operational preferences, geographical homophily and ideological affinity have no consistent role in determining operational similarity.
Journal: Terrorism and Political Violence
Pages: 1065-1084
Issue: 5
Volume: 35
Year: 2023
Month: 07
X-DOI: 10.1080/09546553.2021.2003785
File-URL: http://hdl.handle.net/10.1080/09546553.2021.2003785
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:5:p:1065-1084



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2010716_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Matteo Vergani
Author-X-Name-First: Matteo
Author-X-Name-Last: Vergani
Author-Name: Thierno Diallo
Author-X-Name-First: Thierno
Author-X-Name-Last: Diallo
Author-Name: Fethi Mansouri
Author-X-Name-First: Fethi
Author-X-Name-Last: Mansouri
Author-Name: Kevin Dunn
Author-X-Name-First: Kevin
Author-X-Name-Last: Dunn
Author-Name: Rachel Sharples
Author-X-Name-First: Rachel
Author-X-Name-Last: Sharples
Author-Name: Yin Paradies
Author-X-Name-First: Yin
Author-X-Name-Last: Paradies
Author-Name: Amanuel Elias
Author-X-Name-First: Amanuel
Author-X-Name-Last: Elias
Title: Racist and Anti-diversity Attitudes as Predictors of Support for Political Violence among Supporters of Mainstream Political Parties
Abstract: 
 Although there are widespread concerns about support for political violence among people affiliated with mainstream political parties, this topic remains largely under-researched. This article examines the relationship between the respondents’ support for political violence and their endorsement of social and political positions that are highly divisive between the left and the right. We collected survey data from a sample of 4,019 respondents from Victoria (Australia). Our analyses distinguished between people affiliated with left-wing parties, right-wing parties, and people with no party affiliation, and found that support for racist and anti-diversity positions is significantly associated with support for political violence across the three groups. Specifically, having negative attitudes to ethnic and religious minorities and having negative attitudes to diversity are significant predictors of support for political violence in the right-wing group. Having negative attitudes to diversity is a predictor of support for political violence in the left-wing group. Having anti-Muslim prejudice is a predictor of support for political violence among people with no party affiliation. Other significant predictors are having anti-democratic views (across the three groups) being male and being young (in the left-wing and right-wing groups) and having experienced discrimination (in the the left-wing group).
Journal: Terrorism and Political Violence
Pages: 1085-1105
Issue: 5
Volume: 35
Year: 2023
Month: 07
X-DOI: 10.1080/09546553.2021.2010716
File-URL: http://hdl.handle.net/10.1080/09546553.2021.2010716
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:5:p:1085-1105



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2019023_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Matthew Bamber
Author-X-Name-First: Matthew
Author-X-Name-Last: Bamber
Author-Name: Isak Svensson
Author-X-Name-First: Isak
Author-X-Name-Last: Svensson
Title: Resisting Radical Rebels: Variations in Islamist Rebel Governance and the Occurrence of Civil Resistance
Abstract: 
 During the Syrian civil war, different types of Salafi-Jihadi rebel groups controlled territory and established governance over civilians. Their governing strategies have been markedly diverse. In this study, we explore how this governance variation can help to explain the occurrence of civil resistance. We suggest that different types of rebel governance structures provide political opportunities for civilians to mobilize against those rebel groups through public demonstrations. In particular, we argue that it is middle-ranged opportunity structures of rebel governance that strongest incentivizes civil resistance, by giving enough space for civilian mobilization but fewer alternative channels of expressing discontent. This argument is explored through an analysis of the variation between the three main Salafi-Jihadi rebel groups in Syria—IS, HTS and Ahrar al-Sham. We show how differences in the groups’ four rebel governance dimensions—rebel collaboration, civilian inclusion, alliance structure, and repression—impact the political opportunities for civilians to mobilize against these groups. We find that HTS, the group that is in the middle range across these four governance dimensions, provided greater opportunity for civilian protests. This study uses a new dataset of civilian resistance events in Syria as well as interviews with civilians governed by these groups.
Journal: Terrorism and Political Violence
Pages: 1126-1146
Issue: 5
Volume: 35
Year: 2023
Month: 07
X-DOI: 10.1080/09546553.2021.2019023
File-URL: http://hdl.handle.net/10.1080/09546553.2021.2019023
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:5:p:1126-1146



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2035366_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Konstantinos Kavrakis
Author-X-Name-First: Konstantinos
Author-X-Name-Last: Kavrakis
Title: Identity and Ideology through the Frames of Al Qaeda and Islamic State
Abstract: 
 This study employs frame theory tools to describe the identity and ideology of Al Qaeda (AQ) and the Islamic State (IS). The aim is to identify elements that make the two groups’ mobilization effective. The article utilizes the concept of identity fields, to explore how the two groups divide in-group and out-group identities in protagonists, antagonists, and audiences and the concept of core framing tasks to examine how their ideology materializes in diagnoses, prognoses, and calls to arms. The results indicate that AQ frames its identity as the protector of Muslims from the evil West and IS as the sole legitimate religious authority guiding Muslims to true Islam. AQ and IS prioritize and contextualize their ideological frames differently, despite both adhering to the same ideology, namely Salafism-Jihadism. AQ mobilization tends to rely more on political frames whereas IS framing is almost exclusively religious. Both groups, however, appropriate political and religious frames already extant in the minds of Muslim audiences in order to mobilize potential adherents.
Journal: Terrorism and Political Violence
Pages: 1235-1252
Issue: 5
Volume: 35
Year: 2023
Month: 07
X-DOI: 10.1080/09546553.2022.2035366
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2035366
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:5:p:1235-1252



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2204032_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kyle Burke
Author-X-Name-First: Kyle
Author-X-Name-Last: Burke
Title: Culture and Violence in the British Far Right
Journal: Terrorism and Political Violence
Pages: 1255-1259
Issue: 5
Volume: 35
Year: 2023
Month: 07
X-DOI: 10.1080/09546553.2023.2204032
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2204032
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:5:p:1255-1259



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2204027_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Fabrizio Leonardo Cuccu
Author-X-Name-First: Fabrizio Leonardo
Author-X-Name-Last: Cuccu
Title: The UN and Counter-Terrorism: Global Hegemonies, Power and Identities
Journal: Terrorism and Political Violence
Pages: 1253-1254
Issue: 5
Volume: 35
Year: 2023
Month: 07
X-DOI: 10.1080/09546553.2023.2204027
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2204027
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:5:p:1253-1254



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2023504_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sahar Rasoulikolamaki
Author-X-Name-First: Sahar
Author-X-Name-Last: Rasoulikolamaki
Author-Name: Surinderpal Kaur
Author-X-Name-First: Surinderpal
Author-X-Name-Last: Kaur
Title: The Representational Strategies of Lionization and Victimization in ISIS’s Online Magazine, Dabiq
Abstract: 
 This paper is a multimodal critical discourse study of self-representation in ISIS’s e-magazine, Dabiq, employing Social Movement Theory and Van Leeuwen’s Socio-semantic Inventory. By analyzing the linguistic and non-linguistic features in the representation of social actors and actions in Dabiq, ISIS’s implied ideology at the macro level, which is to convince the prospective recruits and at the same time, to legitimize its brutality, is revealed from both textual and visual perspectives. The results showed an interplay of the contradictory representational choices, namely “lionization” and “victimization” that has enabled ISIS to create a powerful narrative. By portraying its so-called “knights” as undefeatable lions and glorifying their acts of violence, while, excluding its killed, injured or imprisoned agents both textually and visually, ISIS has attempted to provoke admiration among its current or potential followers. Significantly, they simultaneously depict an air of victimhood to further legitimize their act of terror and represent themselves as the godsent saviours of the victims, and confer a sense of security in their hearts. Victimization, however, has rarely been applied to the Mujahidin of the State who are fighting at forefronts, but rather to the State itself as a territory (Caliphate) and to the Muslims who are presumably plagued by the enemies’ transgression and injustice.
Journal: Terrorism and Political Violence
Pages: 1161-1180
Issue: 5
Volume: 35
Year: 2023
Month: 07
X-DOI: 10.1080/09546553.2021.2023504
File-URL: http://hdl.handle.net/10.1080/09546553.2021.2023504
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:5:p:1161-1180



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2021892_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Hadi Wahab
Author-X-Name-First: Hadi
Author-X-Name-Last: Wahab
Title: Sectarian Identity and Mobilization Amongst the Druze: How Do Sectarian Minorities Respond to Religious Terrorism?
Abstract: 
 Taking its point of departure in the sectarian dynamics in the Middle East, namely the Sunni–Shiʿa schism that is taking the largest share in the current debates, this article studies sectarian identity and religious terrorism against the Druze minority during Syria’s sect-coded civil war. It argues that while religion can act as a mobilizational tool and marker of group solidarity amongst Druze as well as amongst Sunni and Shiʿa, the Druze did not instrumentalize sectarian identity to implement their geopolitical agenda. Rather, for far too long the Druze used sectarian identity as a defense mechanism to unite against violent motifs and actions by the sectarian “other.” The latter, for our purposes, happens to be Sunni jihadist groups such as Daesh (The Islamic State or ISIS) and Jabhat al-Nusra (JAN). Further, Druze is not a tabshiri sect. Put it another way, it is a sectarian minority that prevents conversions. Therefore, for the Druze, sectarian identity had always been a marker of group solidarity only. This article brings to the fore the response of sectarian minorities to religious terrorism following the Arab Uprisings era, and stresses that sectarian mobilization has parallel means but not always similar ends.
Journal: Terrorism and Political Violence
Pages: 1147-1160
Issue: 5
Volume: 35
Year: 2023
Month: 07
X-DOI: 10.1080/09546553.2021.2021892
File-URL: http://hdl.handle.net/10.1080/09546553.2021.2021892
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:5:p:1147-1160



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2031997_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Rogelio Alonso
Author-X-Name-First: Rogelio
Author-X-Name-Last: Alonso
Title: Responding Non-Violently to ETA’s Violence: The Motivations and Emotions of Victims of Terrorism in Spain
Abstract: 
 Terrorism studies have devoted considerable attention to the motivations and emotions of perpetrators but far less to those of victims of terrorism. This articles fills this gap by analyzing the reasons why victims of ETA’s terrorism in Spain avoided resorting to violence despite their grievances and victimization. Victims of ETA’s terrorism experienced injustice, distrust, vulnerability, helplessness, and superiority: a set of shared beliefs that in other contexts led individuals to engage in violence. However, victims of ETA’s terrorism did not respond violently, many of them also engaging in social mobilization and protest. The article analyzes how victims channeled their emotions after their victimization so that self-control prevailed when feelings of rage and revenge arose. This analysis confirms that individuals are not merely recipients of stimuli, but active constructors of meanings. It also allows to contrast the rationality and emotionality of the victims’ response to terrorism with that of their victimizers.
Journal: Terrorism and Political Violence
Pages: 1181-1199
Issue: 5
Volume: 35
Year: 2023
Month: 07
X-DOI: 10.1080/09546553.2022.2031997
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2031997
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:5:p:1181-1199



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2032675_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Edward M. Crenshaw
Author-X-Name-First: Edward M.
Author-X-Name-Last: Crenshaw
Author-Name: Kristopher K. Robison
Author-X-Name-First: Kristopher K.
Author-X-Name-Last: Robison
Title: Making War on the Fabric of Society: A Cross-National Analysis of Terrorism, Urban Public Space and Generalized Social Trust in Europe
Abstract: 
 Statements by politicians and pundits around the world suggest that terrorism uniquely threatens social order. Unfortunately, our knowledge about how terrorism affects generalized trust and social capital, which many view as foundations of civil society, is quite limited. In this paper we theorize that terrorism damages generalized social trust via its pernicious influence on the perceptions of safety and security in urban public spaces, particularly in those urban places that are the most socially salient to national identity and the most connected to global society (i.e., primate capitals). Using aggregated survey data from European countries in the European Social Survey (Waves 1–6), we find that terrorism, whether committed in urban or rural areas, has no direct effect on social trust. Nonetheless, urban terrorism interacts with urban primacy to arrest the development of generalized social trust. We conclude that the effects of chronic terrorism likely go beyond economics and politics, perhaps damaging the fabric of society itself.
Journal: Terrorism and Political Violence
Pages: 1200-1216
Issue: 5
Volume: 35
Year: 2023
Month: 07
X-DOI: 10.1080/09546553.2022.2032675
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2032675
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:5:p:1200-1216



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2017895_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sally Sharif
Author-X-Name-First: Sally
Author-X-Name-Last: Sharif
Title: How Wartime Bonds Affect Ex-Combatant Political Attitudes: A Natural Experiment with the FARC
Abstract: 
 What determines political attitudes of ex-combatant after conflict, specifically the inclination towards rearmament? And to what extent do these attitudes depend on ex-combatants’ individual profiles? I argue that ex-combatant political attitudes are determined by whether wartime bonds are maintained after conflict. The argument indirectly implies that the impact of individual characteristics, such as gender, age, education, time in conflict, and family relations, fade in the face of group-level factors determined both during and after conflict. The argument highlights the challenge of post-conflict peacebuilding, where keeping intact the organizational structure of rebel groups might lead to peace but discourage reintegration into the country’s political (non-rebel) institutions. The Colombian Disarmament, Demobilization, and Reintegration (DDR) program’s design with a long demobilization process in camps lends itself to a natural experiment to distinguish community effects from individual-level influencers of ex-combatant political attitudes. Relying on data I have collected through 121 semi-structured, in-depth interviews with FARC ex-combatants residing in five ETCR, I find ex-combatants that have maintained their primary group cohesion in the post-conflict era have stronger secondary group cohesion, more favorable attitudes towards DDR, and less enthusiasm towards rearming. However, they have less trust in the government.
Journal: Terrorism and Political Violence
Pages: 1106-1125
Issue: 5
Volume: 35
Year: 2023
Month: 07
X-DOI: 10.1080/09546553.2021.2017895
File-URL: http://hdl.handle.net/10.1080/09546553.2021.2017895
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:5:p:1106-1125



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2035364_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tanja Marie Hansen
Author-X-Name-First: Tanja Marie
Author-X-Name-Last: Hansen
Title: Time Is of the Essence: Temporality and Competition as Drivers of Terrorist Credit-Taking
Abstract: 
 Despite widespread focus on the communicative function of terrorism, terrorists frequently forgo claiming responsibility for their attacks. So why don’t terrorists claim their attacks? The scholars who have attempted to answer this question have primarily focused on group- and target-based differences. I propose an alternative theory, emphasizing the importance of temporality. Intuitively, the passing of time following group entry should change the utility of verbal claims of responsibility as an emerging group cannot rely on a previously established reputation. Levels of terrorist competition over time further influence verbal credit-taking-especially when competitors share attack styles-leading to decreased credit-taking over time in terrorist monopolies relative to competitive settings. I explore these dynamics through case-studies of Canada and Ireland during the 1960–1970s. Canada poses a monopoly case, whereas the Irish case experienced extensive intra- and inter-group competition. Coding newspaper articles, I appended the Canadian Incident Database with a measure of verbal credit-taking and juxtaposed it with Domestic Terrorist Victims data. Results show the expected newcomer dynamic, backing a temporal theory, yet neither intra- nor inter-group competition showed any effect despite the most-likely nature of the cases.
Journal: Terrorism and Political Violence
Pages: 1217-1234
Issue: 5
Volume: 35
Year: 2023
Month: 07
X-DOI: 10.1080/09546553.2022.2035364
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2035364
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:5:p:1217-1234

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2038576_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Shpend Kursani
Author-X-Name-First: Shpend
Author-X-Name-Last: Kursani
Author-Name: Krzysztof Krakowski
Author-X-Name-First: Krzysztof
Author-X-Name-Last: Krakowski
Title: Frustrated Aspirations and Different Types of Political Violence: Evidence from “Folk Knowledge” in Kosovo
Abstract: 
 What are society’s views on the drivers of religious extremism and other types of political violence? We address this question by conducting a large-N vignette experiment in Kosovo. We expose a random sample of the population to hypothetical situations that describe other people’s engagement in religious extremism, ethnic riots, and violent protest. We find that frustrated aspirations of vignette characters—signaled as a mismatch between the characters’ education and their labor market outcomes—are associated with increased expectations of engagement in all types of political violence. This result holds for Muslim Albanians and Christian Serbs.
Journal: Terrorism and Political Violence
Pages: 1299-1316
Issue: 6
Volume: 35
Year: 2023
Month: 08
X-DOI: 10.1080/09546553.2022.2038576
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2038576
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:6:p:1299-1316



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2042269_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marius Linge
Author-X-Name-First: Marius
Author-X-Name-Last: Linge
Author-Name: Sveinung Sandberg
Author-X-Name-First: Sveinung
Author-X-Name-Last: Sandberg
Author-Name: Sébastien Tutenges
Author-X-Name-First: Sébastien
Author-X-Name-Last: Tutenges
Title: Confluences of Street Culture and Jihadism: The Spatial, Bodily, and Narrative Dimensions of Radicalization
Abstract: 
 Research on the new crime-terror nexus has focused on examining the confluences of criminal and jihadist milieus. This article contributes to this research, using insights from criminological theory and analyzing data from interviews with Muslim men who have been exposed to jihadism and have a background in street life and crime. We propose that the connection between street crime and jihadism can be seen in three decisive points of confluence: places, bodies, and narratives. We show how specific places (e.g. prisons) enable the encounter between particular bodies (e.g. violently competent bodies) and the engagement or disengagement with certain extremist narratives (e.g. stories of redemption through violence). The crime-terror literature emphasizes that these points of confluence are sources of radicalization. We expand upon this by arguing that they may also serve as venues for resisting or rejecting politico-religious extremism. The study demonstrates that radicalization is only one possible outcome of the confluences between street culture and jihadism.
Journal: Terrorism and Political Violence
Pages: 1373-1388
Issue: 6
Volume: 35
Year: 2023
Month: 08
X-DOI: 10.1080/09546553.2022.2042269
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2042269
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:6:p:1373-1388



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2045964_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kathrine Elmose Jørgensen
Author-X-Name-First: Kathrine
Author-X-Name-Last: Elmose Jørgensen
Title: “I Don’t Justify Anything Regarding My Son:” Danish Foreign Fighters’ Initial Attraction and Reaffirmed Commitment to Islamic State and Al Qaeda—Testimonies from Five Relatives
Abstract: 
 Relatives are a potentially rich source of insight regarding foreign fighters’ pathways into Islamist fundamentalism. However, a small fraction of the literature that explores Salafi-jihadist trajectories examines the testimonies of extremists’ families. Based on qualitative interviews with relatives of five Danish, non-returned male foreign fighters, this article explores how and why—according to their relatives—the men were initially attracted and reaffirmed their commitment to violent jihadism. Findings reveal tensions within the data between ascribing responsibility to the men and mitigating their responsibility. Yet, the article suggests that the relatives’ testimonies should not be perceived simply as using “neutralization techniques” nor as exculpatory narratives, since there is a tendency for the relatives to acknowledge and even accept the men’s deviance.
Journal: Terrorism and Political Violence
Pages: 1422-1439
Issue: 6
Volume: 35
Year: 2023
Month: 08
X-DOI: 10.1080/09546553.2022.2045964
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2045964
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:6:p:1422-1439



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2042268_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anton Törnberg
Author-X-Name-First: Anton
Author-X-Name-Last: Törnberg
Author-Name: Mattias Wahlström
Author-X-Name-First: Mattias
Author-X-Name-Last: Wahlström
Author-Name: MÃ¥ns Lundstedt
Author-X-Name-First: MÃ¥ns
Author-X-Name-Last: Lundstedt
Author-Name: Hans Ekbrand
Author-X-Name-First: Hans
Author-X-Name-Last: Ekbrand
Title: Local Conditions for Anti-immigrant Violence: A Qualitative Comparative Analysis (QCA) of Asylum Housing Attacks in Sweden
Abstract: 
 This study uses a novel approach to identifying local contextual conditions conducive, alone or in combination to far-right political violence. The studied case is asylum housing attacks occurring in Sweden 2015–16. Using a fuzzy-set qualitative comparative analysis of eighty-six Swedish municipalities, forty-two of which have experienced arson attacks against refugee housing facilities, we operationalize and test four hypotheses derived from the literature. These assumed the causal impact of (1) objective grievances, (2) mediated grievances combined with lack of political opportunities, (3) independent alternative media effects, and (4) broader far-right mobilization. In contrast to a number of previous studies, none of the three first hypotheses received support. No operationalization of objective grievances, such as influxes of immigrants, poverty, or unemployment distinguished the municipalities where attacks had occurred. Nor did the local level of discursive or political opportunities. Only one of our expected causal pathways—arson attacks as an extension of a broader local far-right mobilization in the context of a supportive local public opinion—was a sufficient condition for a large proportion of our positive cases.
Journal: Terrorism and Political Violence
Pages: 1353-1372
Issue: 6
Volume: 35
Year: 2023
Month: 08
X-DOI: 10.1080/09546553.2022.2042268
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2042268
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:6:p:1353-1372



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2042270_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Scrivens
Author-X-Name-First: Ryan
Author-X-Name-Last: Scrivens
Title: Examining Online Indicators of Extremism among Violent and Non-Violent Right-Wing Extremists
Abstract: 
 Although there is an ongoing need for law enforcement and intelligence agencies to identify and assess the online activities of violent extremists prior to their engagement in violence offline, little is empirically known about their online posting patterns generally or differences in their online patterns compared to non-violent extremists who share similar ideological beliefs particularly. Even less is empirically known about how their online patterns compare to those who post in extremist spaces in general. This study addresses this gap through a content analysis of postings from a unique sample of violent and non-violent right-wing extremists as well as from a sample of postings within a sub-forum of the largest white supremacy web-forum, Stormfront. Here the existence of extremist ideologies, personal grievances, and violent extremist mobilization efforts were quantified within each of the three sample groups. Several notable differences in posting patterns were observed across samples, many of which may inform future risk factor frameworks used by law enforcement and intelligence agencies to identify credible threats online. This study concludes with a discussion of the implications of the analysis, its limitations, and avenues for future research.
Journal: Terrorism and Political Violence
Pages: 1389-1409
Issue: 6
Volume: 35
Year: 2023
Month: 08
X-DOI: 10.1080/09546553.2022.2042270
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2042270
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:6:p:1389-1409



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2050221_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Manuel R. Torres-Soriano
Author-X-Name-First: Manuel R.
Author-X-Name-Last: Torres-Soriano
Title: The Role of Honeypots and Sabotage in State-Based Operations Against Online Jihadism, 2001-2020
Abstract: 
 This article offers a descriptive analysis of intelligence operations carried out by the United States and its allies against the presence of jihadist groups on the Internet during the period 2001–2020. In contrast to actions aimed at eliminating the virtual spaces in which terrorists operate, the intelligence operations analysed here are designed to erode terrorists’ trust in such spaces without compromising intelligence sources. The article argues that the combination of cyberattacks and psychological operations in the form of honeypots and sabotage have achieved considerable success in terms of reducing terrorist activities on the Internet and undermining the effectiveness of propaganda initiatives undertaken by terrorist groups.
Journal: Terrorism and Political Violence
Pages: 1440-1450
Issue: 6
Volume: 35
Year: 2023
Month: 08
X-DOI: 10.1080/09546553.2022.2050221
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2050221
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:6:p:1440-1450



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2038575_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Miron Lakomy
Author-X-Name-First: Miron
Author-X-Name-Last: Lakomy
Title: Why Do Online Countering Violent Extremism Strategies Not Work? The Case of Digital Jihad
Abstract: 
 This article discusses the reasons why content moderation and control in cyberspace, being a primary means of online countering violent extremism (CVE), does not work as intended. It makes four main arguments. Firstly, despite years of efforts from CVE stakeholders, the propaganda of militant Islamist VEOs is still easily accessible on the Internet. This study has mapped hundreds of addresses engaged in digital jihadist activities at the turn of 2020–2021. It effectively proves that the current approach to online CVE brought few tangible effects. Secondly, these programs have been unevenly applied to militant Islamist organizations. There have been groups which represent violent extremist ideology but are not actively combated by stakeholders. As a result, these groups have been able to establish a solid foothold on the surface web. Thirdly, the efficiency of CVE strategies based on content takedowns are decreased by the relative ease of terrorists reestablishing banned communication channels, the availability of vast alternatives for online propaganda dissemination, the introduction of impractical legislation by governments, overlapping jurisdictions on the Internet and the “Streisand effect.” Finally, adequate strategies aimed at curbing digital jihad should be primarily based on offline and online activities which fall outside of the remit of CVE.
Journal: Terrorism and Political Violence
Pages: 1261-1298
Issue: 6
Volume: 35
Year: 2023
Month: 08
X-DOI: 10.1080/09546553.2022.2038575
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2038575
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:6:p:1261-1298



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2038577_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nils Hägerdal
Author-X-Name-First: Nils
Author-X-Name-Last: Hägerdal
Author-Name: Peter Krause
Author-X-Name-First: Peter
Author-X-Name-Last: Krause
Title: Blowback Operations as Rebel Strategy: How Sectarian Violence Spread from Syria into Lebanon, 2013–14
Abstract: 
 Why and how do conflict and violence spread across international borders? This article introduces a new theoretical framework for blowback operations, where a civil war combatant launches terrorist attacks in the home country of a foreign actor to compel this actor to end a military intervention. Using this framework, we explain how military intervention by Hezbollah in Syria sparked a bombing campaign by Sunni jihadi groups inside Lebanon. Novel quantitative and qualitative evidence reveals how perpetrators deployed violence strategically to maximize their coercive leverage. Rather than indiscriminately attacking Lebanese Shia civilians—as their hardline sectarian discourse would suggest—Jihadi groups, including local Al Qaeda and ISIS affiliates, primarily targeted Hezbollah political strongholds to force it to withdraw from Syria. Hezbollah, seeking domestic stability due to its strong position in the Lebanese political system, generally responded with restraint and thereby avoided escalating the episode into civil war. The growing reach and prominence of armed non-state actors, especially across the Middle East, increasingly make their cross-border operations an important feature of sub-state conflict.
Journal: Terrorism and Political Violence
Pages: 1317-1335
Issue: 6
Volume: 35
Year: 2023
Month: 08
X-DOI: 10.1080/09546553.2022.2038577
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2038577
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:6:p:1317-1335



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2043287_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Isaac Mensah
Author-X-Name-First: Isaac
Author-X-Name-Last: Mensah
Title: The African Union’s Policy Frameworks, Institutional Mechanisms and Challenges in Countering Terrorism in Africa
Abstract: 
 This article discusses the normative framework and institutional mechanisms for African counterterrorism cooperation. These frameworks have been discussed in sequential order showing how they relate to and complement each other in their efforts to counter terrorism in Africa. The first section focuses on the evolution of the counterterrorism agenda in Africa from 1992 to 1994. The second part discusses the main African Union (AU) counterterrorism legislative framework whereas the third section discusses the institutional mechanisms provided by the 2004 Protocol for the implementation of the provisions of the OAU Convention. Finally, the article discusses the challenges of the AU counterterrorism regime and concludes that the implementation of the AU counterterrorism framework is counterproductive.
Journal: Terrorism and Political Violence
Pages: 1410-1421
Issue: 6
Volume: 35
Year: 2023
Month: 08
X-DOI: 10.1080/09546553.2022.2043287
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2043287
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:6:p:1410-1421



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2038578_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Steffen Selmer Andersen
Author-X-Name-First: Steffen Selmer
Author-X-Name-Last: Andersen
Title: Perceived Policy Illegitimacy Leads to Acceptance of Political Violence: Evidence from a Nationally Representative Survey Experiment in Denmark
Abstract: 
 Unfortunately, the question of which factors that might drive citizens to accept and engage in violence remains pivotal. When answering it, scholars have been preoccupied with psychological and psychopathological factors, often in interplay with social networks, recruitment and intergroup dynamics. They seldom mention the importance of citizens’ perceptions of policy illegitimacy despite it being central to the stated rationale for political violence in many instances. This shortcoming along with a lack of experimental studies limits our evidence of policy illegitimacy’s role in relation to acceptance of political violence. By using a novel experimental survey design with more than 1,500 respondents, this article tests whether policy illegitimacy increases acceptance of political violence and (if so) under which circumstances. In a nationally representative sample, treated respondents interacted with a fictional policy designed to induce policy illegitimacy. Treated respondents reported a significantly higher willingness to accept violence compared to those in the control condition. The effect was stable across ideological divides and other prevalent explanations in the literature. This study offers a promising starting point for “bringing policy back” as a potential explanation for acceptance of political violence along with pushing the still neglected experimental research agenda in this research area.
Journal: Terrorism and Political Violence
Pages: 1336-1352
Issue: 6
Volume: 35
Year: 2023
Month: 08
X-DOI: 10.1080/09546553.2022.2038578
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2038578
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:6:p:1336-1352

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2054338_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Shale Horowitz
Author-X-Name-First: Shale
Author-X-Name-Last: Horowitz
Title: Sources of Conventional and Guerrilla Strategies in Ethno-Territorial Civil Wars
Abstract: 
 In ethno-territorial civil wars, which factors influence whether rebels choose and retain conventional warfare as their primary military strategy throughout the conflict, or whether they use guerrilla warfare as a primary strategy during periods judged to be less advantageous to conventional warfare? The existing literature almost exclusively emphasizes relative power as the determining factor: rebels use guerrilla warfare because they typically lack the capability to fight conventional wars effectively against states. I find some support for this hypothesis: ethno-territorial rebels are much more likely to fight exclusively conventional wars when external states intervene conventionally on the rebel side. I also find that rebel leaders with more intense, far-reaching nationalist goals are more likely to employ guerrilla warfare as a primary war strategy. For such leaders, the higher costs of using guerrilla methods pending an eventual transition to conventional warfare are made more acceptable by a higher valuation of the far-reaching gains delivered by military victory—gains expected to be made more likely by interim periods in which guerrilla warfare is the primary strategy. Turning to other factors, I do not find that status quo conditions or a high level of state democracy have a significant influence.
Journal: Terrorism and Political Violence
Pages: 1451-1467
Issue: 7
Volume: 35
Year: 2023
Month: 10
X-DOI: 10.1080/09546553.2022.2054338
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2054338
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:7:p:1451-1467



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2059351_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel P. Aldrich
Author-X-Name-First: Daniel P.
Author-X-Name-Last: Aldrich
Author-Name: Raghunath Mahabir
Author-X-Name-First: Raghunath
Author-X-Name-Last: Mahabir
Title: Countering Violent Extremism in Trinidad and Tobago: An Evaluation
Abstract: 
 This paper investigates the history of violent extremism and evaluates the status of countering violent extremism (CVE) policies in Trinidad and Tobago, focusing on government, international partners, and NGO programming. Through more than twenty extended interviews with grassroots organizations, politicians, and members of the security administration alongside an exploration of budgetary and personnel data, we seek to illuminate major challenges to official policies and actual, on the ground practices. on the ground practices. Our evaluation of extremist manifestation, government rebalancing, and cross sectoral alignment shows that while authorities in Trinidad and Tobago have recognized the power of non-state actor centered, bottom-up policies in reducing support for terrorism, most visible operations continue to rely on top down, state centric ones. This paper brings with it concrete recommendations for law enforcement, community builders, and residents alike.
Journal: Terrorism and Political Violence
Pages: 1486-1501
Issue: 7
Volume: 35
Year: 2023
Month: 10
X-DOI: 10.1080/09546553.2022.2059351
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2059351
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:7:p:1486-1501



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2054702_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tanjev Schultz
Author-X-Name-First: Tanjev
Author-X-Name-Last: Schultz
Title: Transatlantic Ties of the Far Right: The NSU Case in Germany and its Links to Actors and Incidents in the USA
Abstract: 
 The “National Socialist Underground” (NSU) is one of the most severe cases of terrorism in Germany after World War II. For more than twelve years, three neo-Nazis had lived under false identities in Germany. The group murdered ten people and committed several crimes. At first sight, this seems to be a case of domestic terrorism, but a closer look exposes transnational facets and turns it into an example of transatlantic ties between far-right groups. In their strategy and in their ideology, the German neo-Nazis and their circle of friends and supporters have been influenced by actors and incidents in the U.S. As the article shows, a powerful tradition of anti-Americanism in the milieu of Germany’s far right does not contradict an alliance of anti-Semites and white supremacists in both countries. Drawing on police files, intelligence reports, parliamentary hearings and court proceedings, the article lays out and analyzes the intertwining of German and U.S. militant right-wing actors. It examines references and connections to the Ku Klux Klan, “The Turner Diaries,” and to the U.S. terrorist group “The Order.”
Journal: Terrorism and Political Violence
Pages: 1468-1485
Issue: 7
Volume: 35
Year: 2023
Month: 10
X-DOI: 10.1080/09546553.2022.2054702
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2054702
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:7:p:1468-1485



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2131297_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Karmvir Padda
Author-X-Name-First: Karmvir
Author-X-Name-Last: Padda
Title: Countering Violent Extremism: Making Gender Matter
Journal: Terrorism and Political Violence
Pages: 1620-1621
Issue: 7
Volume: 35
Year: 2023
Month: 10
X-DOI: 10.1080/09546553.2022.2131297
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2131297
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:7:p:1620-1621



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2060081_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Fatih Erol
Author-X-Name-First: Fatih
Author-X-Name-Last: Erol
Title: Terrorism Mortality Salience Manipulation: A Causal Mediation Analysis
Abstract: 
 Building upon past findings on terrorism and individual-level politically conservative self-identification, I evaluate the effect of terrorism mortality reminders on conservative self-placement with three survey experiments, using non-representative Facebook samples in Turkey (2018, 2020). The scant existing experimental findings outside the usual Northwestern European and North American environment make it difficult to assess how the context (e.g., the longevity and diversity of terrorism problems in a country) can explain the alignment between terrorism threats and conservatism. In non-Western areas such as Turkey, with various types of terrorism over time, the link between terrorism threat and conservatism may remain uniform. However, the fear of death in a terrorist attack elicited by the terrorism mortality salience would create psychological strain and make individuals suppress terrorism-related death-thoughts by moving away from conservatism, reminding them of the human body’s vulnerability to threats and igniting fearfulness. Using the Terror Management Theory perspective, this study explored the causal mechanism running from terrorism mortality reminder to terrorism mortality fear to conservative self-identification. In all three studies, conservatism decreased when the respondents felt fearful of terrorism mortality and the treated respondents became more conservative if the terrorism mortality fear was kept at its average value (as a covariate).
Journal: Terrorism and Political Violence
Pages: 1536-1555
Issue: 7
Volume: 35
Year: 2023
Month: 10
X-DOI: 10.1080/09546553.2022.2060081
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2060081
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:7:p:1536-1555



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2064746_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Suraj Lakhani
Author-X-Name-First: Suraj
Author-X-Name-Last: Lakhani
Author-Name: Susann Wiedlitzka
Author-X-Name-First: Susann
Author-X-Name-Last: Wiedlitzka
Title: “Press F to Pay Respects”: An Empirical Exploration of the Mechanics of Gamification in Relation to the Christchurch Attack
Abstract: 
 There has been a long-standing yet largely unreported intersection between video-gaming and violent extremism, spanning across jihadist, far-right, and other types of ideologies. Within this framework, until late, scant attention has been paid to the concept of “gamification”; i.e. the application of gaming and game-design principles within non-gaming environments. This paper contributes to this newly emerging area of study by exploring the theoretical underpinnings of gamification and applying these principles to a prominent empirical example: the Christchurch attack in New Zealand in 2019. With a particular focus on the (“setup,” “rule,” and “progression”) “mechanics” of gamification, this article explores two aspects. The first considers how the assailant (intentionally or otherwise) designed and constructed the game; undertaken through an empirical analysis of their manifesto, live-stream video, and original post on the imageboard 8chan (or Infinite Chan). This will be complimented by the second aspect which explores how the game was, in turn, “gamified” through audience reaction to and interaction on the original 8chan post. The article concludes by discussing whether the gamification of the Christchurch attack serves as a framework for future attacks.
Journal: Terrorism and Political Violence
Pages: 1586-1603
Issue: 7
Volume: 35
Year: 2023
Month: 10
X-DOI: 10.1080/09546553.2022.2064746
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2064746
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:7:p:1586-1603



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2061960_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Zachary Kallenborn
Author-X-Name-First: Zachary
Author-X-Name-Last: Kallenborn
Author-Name: Gary Ackerman
Author-X-Name-First: Gary
Author-X-Name-Last: Ackerman
Author-Name: Philipp C. Bleek
Author-X-Name-First: Philipp C.
Author-X-Name-Last: Bleek
Title: A Plague of Locusts? A Preliminary Assessment of the Threat of Multi-Drone Terrorism
Abstract: 
 Emerging technologies provide new opportunities for terrorist organizations. Future terrorists may use multiple drones—either en masse or coordinated with each other in cruder or more sophisticated ways—to cause harm, potentially at scale. This study explores the topic via theoretical exploration and threat assessment. The first half explores relevant literatures on terrorist innovation; suicide bombing; airpower; and chemical, biological, radiological, and nuclear (CBRN) terrorism. The second half builds on the literature review to provide a systematic, albeit preliminary, threat assessment, examining the threat as a function of motivations and capabilities, and elucidates the characteristics of groups that may be drawn to this technology. Policy recommendations to ameliorate this emerging threat conclude.
Journal: Terrorism and Political Violence
Pages: 1556-1585
Issue: 7
Volume: 35
Year: 2023
Month: 10
X-DOI: 10.1080/09546553.2022.2061960
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2061960
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:7:p:1556-1585



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2059352_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Rueben Dass
Author-X-Name-First: Rueben
Author-X-Name-Last: Dass
Author-Name: Jasminder Singh
Author-X-Name-First: Jasminder
Author-X-Name-Last: Singh
Title: Pathways to the Caliphate: Mapping Malaysian Foreign Fighter Networks in Iraq and Syria from 2012-2019
Abstract: 
 Utilizing social media profiles, court documents and media reports, this article analyzes the Malaysian foreign fighter networks in Iraq and Syria between 2012 and 2019. It is found that the Malaysian foreign fighter phenomenon is primarily driven by charismatic personalities, i.e., influential figures who were able to attract individuals into the Middle East. The attempted movement of fighters into Iraq and Syria can be divided into three phases corresponding to three personalities; the first led by Al Qaeda linked Yazid Sufaat, the second by Ajnad al-Sham linked Lotfi Ariffin and the third by Islamic State (IS) linked Muhammad Wanndy Mohd Jedi. Contrary to popular belief, the first wave of Malaysian militants had joined Syrian-based rebel groups like Ajnad al-Sham instead of IS with the shift occurring after Lotfi Ariffin’s death in September 2014. The three phases also highlight the shift in recruitment strategy from physical recruitment to the purely online sphere. A radicalization driver model of Malaysian fighters is proposed and it is argued that the two main factors that drove Malaysian fighters into the conflict zones are (1) External factors: charismatic personalities; romanticization of jihad; moral factors and ideological factors; and (2) Internal factors: discontent with the government.
Journal: Terrorism and Political Violence
Pages: 1502-1535
Issue: 7
Volume: 35
Year: 2023
Month: 10
X-DOI: 10.1080/09546553.2022.2059352
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2059352
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:7:p:1502-1535



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2066526_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Noah Turner
Author-X-Name-First: Noah
Author-X-Name-Last: Turner
Author-Name: Thomas J. Holt
Author-X-Name-First: Thomas J.
Author-X-Name-Last: Holt
Author-Name: Russell Brewer
Author-X-Name-First: Russell
Author-X-Name-Last: Brewer
Author-Name: Jesse Cale
Author-X-Name-First: Jesse
Author-X-Name-Last: Cale
Author-Name: Andrew Goldsmith
Author-X-Name-First: Andrew
Author-X-Name-Last: Goldsmith
Title: Exploring the Relationship between Opportunity and Self-Control in Youth Exposure to and Sharing of Online Hate Content
Abstract: 
 The rise of the Internet has dramatically increased the degree to which youth may be exposed to online hate content, and simplified the process of sharing this content with others. Viewing messages that contain hate speech or language vilifying others can increase an individual’s risk of radicalization to extremist views and the acceptance of violent ideologies. Researchers have begun to explore the risk factors for exposure to such content, with prior studies demonstrating a relationship between low self-control and online activities being important correlates. Few studies have utilized youth samples to assess these relationships, or explored the voluntary consumption and sharing of content. This study attempts to address this gap in the literature using self-report responses provided by a sample of 1,193 youths in South Australia. A series of quantitative models are estimated assessing the relationships between self-control, opportunities to view content using both on and off-line measures, and four dependent variables related to exposure to or sharing of hate content. The implications of this analysis for our understanding of the utility of criminological theory to radicalization and countering violent extremism are discussed in detail.
Journal: Terrorism and Political Violence
Pages: 1604-1619
Issue: 7
Volume: 35
Year: 2023
Month: 10
X-DOI: 10.1080/09546553.2022.2066526
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2066526
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:7:p:1604-1619



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2131315_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Markus Schindler
Author-X-Name-First: Markus
Author-X-Name-Last: Schindler
Title: Extremism: A Philosophical Analysis
Journal: Terrorism and Political Violence
Pages: 1622-1623
Issue: 7
Volume: 35
Year: 2023
Month: 10
X-DOI: 10.1080/09546553.2022.2131315
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2131315
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:7:p:1622-1623

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2074294_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Meirav Mishali-Ram
Author-X-Name-First: Meirav
Author-X-Name-Last: Mishali-Ram
Title: The Evolution of Transnational Jihad: Identities, Grievances, and Legitimacy Crisis in Arab States
Abstract: 
 This study examines change in the transnationalism of jihad in the light of political processes in Arab states. Reviewing transnational Sunni jihadism from the Soviet-Afghan war in the 1980s until the demise of the Islamic caliphate in 2019 the article identifies the inception, maturation, and diffusion phases in the evolution of transnational jihad, and traces fluctuations from localism to internationalism and back. The study highlights the link between political dynamics at the state level and jihadist behavior at the transnational level, showing the importance of issues of identity, grievances, and legitimacy in Arab states for understanding global jihad.
Journal: Terrorism and Political Violence
Pages: 1650-1665
Issue: 8
Volume: 35
Year: 2023
Month: 11
X-DOI: 10.1080/09546553.2022.2074294
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2074294
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:8:p:1650-1665



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2082288_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tiana Gaudette
Author-X-Name-First: Tiana
Author-X-Name-Last: Gaudette
Author-Name: Ryan Scrivens
Author-X-Name-First: Ryan
Author-X-Name-Last: Scrivens
Author-Name: Vivek Venkatesh
Author-X-Name-First: Vivek
Author-X-Name-Last: Venkatesh
Title: Disengaged but Still Radical? Pathways Out of Violent Right-Wing Extremism
Abstract: 
 Research has overwhelmingly focused on pathways into violent extremism, but few empirically grounded analyses have examined pathways out of violent extremism. Even less is empirically known about the interactions between processes of disengagement and deradicalization from violent extremism. To address this gap, in-depth interviews were conducted with ten Canadian former right-wing extremists who were actively involved in violent racist skinhead groups, with interview questions provided by thirty Canadian law enforcement officials and ten local community activists. Participants were asked about their pathways out of violent extremism with a particular emphasis on processes of disengagement and deradicalization. Overall, our study findings highlight the multifaceted and multidimensional nature of pathways out of violent extremism as well as how radical beliefs persist beyond disengagement from violent extremism. We conclude with a discussion of the study limitations and avenues for future research.
Journal: Terrorism and Political Violence
Pages: 1775-1800
Issue: 8
Volume: 35
Year: 2023
Month: 11
X-DOI: 10.1080/09546553.2022.2082288
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2082288
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:8:p:1775-1800



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2076600_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Steffen Selmer Andersen
Author-X-Name-First: Steffen Selmer
Author-X-Name-Last: Andersen
Title: Accepting Violence? A Laboratory Experiment of the Violent Consequences of Deliberation in Politically Aggrieved Enclaves
Abstract: 
 Do discussions in echo chambers break down barriers on the acceptance political violence? We know from research within political science, social psychology and communication that deliberation in echo chambers—called enclave deliberation—works as a driver for the amplification of existing political attitudes. Moreover, scholars of radicalization have argued that enclave deliberation can lead to extremist ideas and the acceptance of political violence in response to political grievances. Yet, amplification of attitudes, even into extremist ideas, is not the same as accepting violence. We still lack causal backing for the widespread claim that enclave deliberation fuels acceptance of political violence. Utilizing a novel laboratory experiment with 188 participants, this article delivers causal evidence suggesting that enclave deliberation increases politically aggrieved group members’ acceptance of violence. In addition, I find causal evidence supporting the claim that enclave deliberation amplifies existing political attitudes and makes group members’ opinions less diverse.
Journal: Terrorism and Political Violence
Pages: 1685-1703
Issue: 8
Volume: 35
Year: 2023
Month: 11
X-DOI: 10.1080/09546553.2022.2076600
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2076600
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:8:p:1685-1703



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2075265_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anup Phayal
Author-X-Name-First: Anup
Author-X-Name-Last: Phayal
Title: Should I Signal Trust? Effect of Terrorism on Interpersonal Trust in Post-Conflict and Non-Post-Conflict Countries
Abstract: 
 Generalized interpersonal trust is an essential component of a functioning society. While some studies have examined how the perception of terrorism affects trust, cross-national works investigating the impact of actual terrorist attacks on individual trust remain mixed. In this paper, I use insights from existing studies to disaggregate generalized interpersonal trust in response to terrorism in two distinct dimensions, prosocial motivation, and strategic signaling. While threat perception from terrorism lowers interpersonal trust in all contexts, I argue that actual events distinctively shape a person’s interpersonal trust. In a relatively stable and secure context of a non-post-conflict country, individuals living closer to terrorist incidents express increased interpersonal trust. But in post-conflict countries, those closer to terrorist incidents tend to show more distrust. To test the argument, I use the World Values Survey dataset of fifty-two states and create a terrorism scale for 717 survey regions within the countries, considering their spatial and temporal closeness to each terrorist incident. Results obtained from three-level hierarchical models (state, region, and individual) are robust and contribute to our understanding of how terrorism shapes interpersonal trust in different contexts.
Journal: Terrorism and Political Violence
Pages: 1666-1684
Issue: 8
Volume: 35
Year: 2023
Month: 11
X-DOI: 10.1080/09546553.2022.2075265
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2075265
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:8:p:1666-1684



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2077730_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Constantin Iordachi
Author-X-Name-First: Constantin
Author-X-Name-Last: Iordachi
Author-Name: Goran Miljan
Author-X-Name-First: Goran
Author-X-Name-Last: Miljan
Title: “Why We Have Become Revolutionaries and Murderers”: Radicalization, Terrorism, and Fascism in the Ustaša–Croatian Revolutionary Organization
Abstract: 
 This article advances an interdisciplinary and multifactorial socio-cultural approach to the fascistization of the Ustaša in interwar Yugoslavia, leading to terrorism and racial cleansing. It concentrates on the life-trajectories of Mijo Babić and Zvonimir Pospišil, two nationalist activists notoriously known as the first Ustaša terrorists. Drawing on the previously unknown political memoirs of Pospišil and Babić, the article argues that the two activists bridged several phases of cumulative radicalization in the Ustaša organization, from the adoption of political violence at the grass-root level in the 1920s to international terrorism in the 1930s and then state-sponsored genocide in the first half of the 1940s. The article points out that Ustaša underwent most forms of political radicalization to terrorism identified by McCauley and Moskalenko, but it also adds to their typology a case of radicalization to mass violence in the regime phase. Ustaša’s trajectory thus illustrates a rare process of transition from the radicalization of an oppositional, non-state group to mass radicalization leading to racial genocidal policies under a fascist-totalitarian regime. It is hoped that the biographical approach to radicalization advanced by the article contributes to a better understanding of politically motivated terrorism and mass violence in post-1918 Europe.
Journal: Terrorism and Political Violence
Pages: 1704-1723
Issue: 8
Volume: 35
Year: 2023
Month: 11
X-DOI: 10.1080/09546553.2022.2077730
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2077730
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:8:p:1704-1723



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2080063_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sadi Shanaah
Author-X-Name-First: Sadi
Author-X-Name-Last: Shanaah
Author-Name: Charlotte Heath-Kelly
Author-X-Name-First: Charlotte
Author-X-Name-Last: Heath-Kelly
Title: What Drives Counter-Extremism? The Extent of P/CVE Policies in the West and Their Structural Correlates
Abstract: 
 Counter-extremism (P/CVE) policies have shot to global prominence rapidly, yet there are large discrepancies in their implementation both between, and inside, countries. In this paper, we construct and present a robust index of P/CVE policies in Western countries (N = 38), based on data submitted by national experts, which we then use to test three hypothesized structural correlates of the extent of P/CVE implementation: threat of terrorism (measured as the number of past attacks/victims), size of Muslim minorities (Muslim communities have been “securitised” as potential threats in the post 9/11 period), and neoliberal governance (drawing on criminological literature that connects neoliberalism to anticipatory crime control). We find the first two structural factors to be positively and significantly correlated to the intensity of P/CVE deployment, while neoliberal governance negatively and significantly. In the discussion, we highlight the usefulness of a complementary in-depth qualitative research inspired by these findings.
Journal: Terrorism and Political Violence
Pages: 1724-1752
Issue: 8
Volume: 35
Year: 2023
Month: 11
X-DOI: 10.1080/09546553.2022.2080063
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2080063
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:8:p:1724-1752



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2074293_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Hampton Stall
Author-X-Name-First: Hampton
Author-X-Name-Last: Stall
Author-Name: David Foran
Author-X-Name-First: David
Author-X-Name-Last: Foran
Author-Name: Hari Prasad
Author-X-Name-First: Hari
Author-X-Name-Last: Prasad
Title: Kyle Rittenhouse and the Shared Meme Networks of the Armed American Far-Right: An Analysis of the Content Creation Formula, right-wing Injection of Politics, and Normalization of Violence
Abstract: 
 This paper analyzes the meaning of iconography that constitute memes by reviewing a collection of memes propagated on social media related to the Kyle Rittenhouse shooting of protestors in Wisconsin. The authors collected 355 images from 37,774 tweets, supplemented by images found in Facebook groups, militia forums, and right-wing meme repositories related to Kyle Rittenhouse. The paper leads with an introduction to the American “alt-right” movement and the Rittenhouse shootings. The paper’s methodology deconstructs each meme into a set of constituent parts. This provides a process for classifying memes based on their templates, “aesthetic,” branding, events, iconography, and seemingly ambiguous references. This allows researchers to better attribute memes to specific socio-political and cultural groups, analyze the intent of the messaging, and situate memes in the broader knowledge base that, over time, solidifies into its own entity with its own kind of social and political agency.
Journal: Terrorism and Political Violence
Pages: 1625-1649
Issue: 8
Volume: 35
Year: 2023
Month: 11
X-DOI: 10.1080/09546553.2022.2074293
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2074293
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:8:p:1625-1649



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2081077_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Amanda Hall
Author-X-Name-First: Amanda
Author-X-Name-Last: Hall
Title: Vanity of the Bonfires? Eleventh Night Bonfires and Loyalist Influence After Negotiated Settlement in Northern Ireland
Abstract: 
 Cultural events can mask latent potential for a resurgence of violence following negotiated settlement, building sectarian identities and support through otherwise-legitimate forms of expression. This article examines this phenomenon in Northern Ireland, investigating how Loyalists utilize Eleventh Night bonfires. It is argued that, in becoming more professional in construction and more sectarian in imagery, bonfires build and maintain paramilitary power, generate political capital within Unionism, and reinforce boundaries between groups. Bonfires are a key part of the culture war which has developed in Northern Ireland, raising vital questions about the role of culture following negotiated settlement in deeply-divided societies more broadly.
Journal: Terrorism and Political Violence
Pages: 1753-1774
Issue: 8
Volume: 35
Year: 2023
Month: 11
X-DOI: 10.1080/09546553.2022.2081077
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2081077
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:35:y:2023:i:8:p:1753-1774

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2083507_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jessica Davis
Author-X-Name-First: Jessica
Author-X-Name-Last: Davis
Title: Understanding the Effects and Impacts of Counter-Terrorist Financing Policy and Practice
Abstract: 
 After twenty years of global counterterrorist financing (CTF) policy and practice, there is little consensus on what these have achieved, and little empirical evidence to determine if, or how, CTF works to reduce the financing of terrorism or terrorism more broadly. In many cases, the lack of clarity on these issues is due to poor articulation of the specific approaches to countering the financing of terrorism (CTF). The main approaches considered in the literature are the criminalization of terrorist financing and the financial exclusion (sanctions) approach, but there are many other identifiable policy approaches to CTF. In order to clarify our understanding of CTF, I examined over 550 pieces of scholarly literature covering both terrorist financing and CTF to develop a typology of seven main approaches to CTF, some of which have been studied and evaluated far more than others, but all of which are part of the “bucket” of policy options available to states. These different CTF approaches need to be considered and evaluated individually in order to design better policies and practices.
Journal: Terrorism and Political Violence
Pages: 1-17
Issue: 1
Volume: 36
Year: 2024
Month: 01
X-DOI: 10.1080/09546553.2022.2083507
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2083507
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:1:p:1-17



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2119848_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Thomas J. Holt
Author-X-Name-First: Thomas J.
Author-X-Name-Last: Holt
Author-Name: Steven M. Chermak
Author-X-Name-First: Steven M.
Author-X-Name-Last: Chermak
Author-Name: Joshua D. Freilich
Author-X-Name-First: Joshua D.
Author-X-Name-Last: Freilich
Author-Name: Noah Turner
Author-X-Name-First: Noah
Author-X-Name-Last: Turner
Author-Name: Emily Greene-Colozzi
Author-X-Name-First: Emily
Author-X-Name-Last: Greene-Colozzi
Title: Assessing Racial and Ethnically Motivated Extremist Cyberattacks Using Open Source Data
Abstract: 
 Over the last twenty years, researchers have noted the range of violent and financial crimes performed by racial and ethnically-motivated actors. There is also substantial evidence demonstrating the ways that these actors utilize the Internet and various online communications platforms as a resource to recruit others and coordinate criminal activities. As virtually all aspects of modern interpersonal communication, commerce, and government depend on the Internet, these resources are a likely target for ideologically-motivated attacks. There is, however, little research considering the extent to which these resources have been targeted by racial and ethnically-motivated actors. This study attempted to address this gap in the literature through an analysis of the Extremist CyberCrime Database (ECCD), a unique open-source repository of cyberattacks performed against U.S. targets from 1998 to 2020. The findings demonstrate that cyberattacks performed by these actors are performed with less frequency than offline crimes. The implications of this analysis for our understanding of extremism are explored in depth.
Journal: Terrorism and Political Violence
Pages: 113-126
Issue: 1
Volume: 36
Year: 2024
Month: 01
X-DOI: 10.1080/09546553.2022.2119848
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2119848
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:1:p:113-126



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2088364_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Hyeseung Choi
Author-X-Name-First: Hyeseung
Author-X-Name-Last: Choi
Author-Name: Minyoung Choi
Author-X-Name-First: Minyoung
Author-X-Name-Last: Choi
Author-Name: Jae-Suk Yang
Author-X-Name-First: Jae-Suk
Author-X-Name-Last: Yang
Title: Longevity of Partnering Terrorist Organization: An Empirical Study Using A Network Diffusion Model
Abstract: 
 Cooperation between two terrorist groups benefits both, but there are also risks. This paper focuses on these risks, especially how the demise of one group affects the longevity of the remaining groups. Using a generalized equation estimations (GEE) model with data from the Global Terrorism Database (GTD) from 2001 to 2016, this paper analyses how the disbanding of one partner terrorist group with the same ideology and regime type affects the longevity of the remaining groups in a cooperative relationship. The results indicate that when a partnering terrorist group with religious ideology ceases to exist, remaining groups have a better chance of survival as compared to those with other ideologies. In addition, when two groups are based in democratic nations and one partner disbands, the remaining group is more likely to disband. Moreover, if collaborating groups operate under different regime types and one group disbands, the remaining terrorist groups are less likely to disband as compared to those groups operating under regimes of the same type.
Journal: Terrorism and Political Violence
Pages: 39-54
Issue: 1
Volume: 36
Year: 2024
Month: 01
X-DOI: 10.1080/09546553.2022.2088364
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2088364
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:1:p:39-54



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2122815_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel W. Snook
Author-X-Name-First: Daniel W.
Author-X-Name-Last: Snook
Author-Name: Ari D. Fodeman
Author-X-Name-First: Ari D.
Author-X-Name-Last: Fodeman
Author-Name: Katharina Meredith
Author-X-Name-First: Katharina
Author-X-Name-Last: Meredith
Author-Name: John G. Horgan
Author-X-Name-First: John G.
Author-X-Name-Last: Horgan
Title: The Politics of Perception: Political Preference Strongly Associated with Different Perceptions of Islamist and Right-Wing Terrorism Risk
Abstract: 
 Islamist and extreme right-wing (XRW) terrorism represent about equal levels of risk in terms of casualties in the U.S. over the past decade, yet Islamist terrorists receive far more news coverage, have more serious charges filed against them, are considered more deserving of torture and detainment, and receive harsher prison sentences than XRW terrorists. That Islamist and XRW terrorism elicit such different responses raises the question: Do Americans perceive the risk of Islamist and XRW terrorism differently? To investigate, we measured risk perceptions for Islamist and XRW terrorism in a nationally representative sample of 405 U.S. residents. How Americans perceived the risk of terrorism was strongly associated with their political preferences, such that conservatives perceived Islamist terrorism as the greater risk and liberals perceived XRW terrorism as the greater risk. The political orientation of the news media participants consumed was also significantly related to which type of terrorism they perceived to be a greater risk, in the same pattern. Our results indicate that perceived risk for these types of terrorism tends to be polarized along political fault lines, with implications for risk communication regarding terrorism.
Journal: Terrorism and Political Violence
Pages: 127-144
Issue: 1
Volume: 36
Year: 2024
Month: 01
X-DOI: 10.1080/09546553.2022.2122815
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2122815
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:1:p:127-144



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2098725_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael K. Logan
Author-X-Name-First: Michael K.
Author-X-Name-Last: Logan
Author-Name: Steven Windisch
Author-X-Name-First: Steven
Author-X-Name-Last: Windisch
Author-Name: Pete Simi
Author-X-Name-First: Pete
Author-X-Name-Last: Simi
Title: Adverse Childhood Experiences (ACE), Adolescent Misconduct, and Violent Extremism: A Comparison of Former Left-Wing and Right-Wing Extremists
Abstract: 
 The current paper compares the prevalence and nature of childhood adversity among twenty former left-wing and right-wing extremists. Findings from the Adverse Childhood Experiences (ACE) questionnaire suggest that exposure to childhood adversity was common in the early lives of both extremist types. For example, 50 percent of LWE and 70 percent of RWE experienced four or more ACE exposures during the first eighteen years of their life. The results also demonstrate that participants in both samples experienced a range of adolescent conduct problems. These conduct issues highlight the cascading effects of childhood adversity, where negative events help produce a downward spiral that ultimately increases a person’s susceptibility to extremism. Despite the relatively small sample, findings from this exploratory study build on the risk factor model of violent extremism by highlighting childhood adversity and adolescent misconduct as nonideological precursors to violent extremism among different types of extremists.
Journal: Terrorism and Political Violence
Pages: 55-74
Issue: 1
Volume: 36
Year: 2024
Month: 01
X-DOI: 10.1080/09546553.2022.2098725
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2098725
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:1:p:55-74



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2106856_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Katharine Petrich
Author-X-Name-First: Katharine
Author-X-Name-Last: Petrich
Author-Name: Victor Asal
Author-X-Name-First: Victor
Author-X-Name-Last: Asal
Title: I’d Like to Speak to the Person in Charge: Measuring Dominant Ethnopolitical Organizations in the Middle East
Abstract: 
 Why do some organizations come to represent their communities while others remain footnotes of history? While ethnopolitics exist worldwide, there is no consensus about which organizations “rise to the top” to become the standard bearers for their communities and causes. In the developing world, the answer is often presumed to be the willingness to use violence, exercising territorial control, or securing support from external actors like foreign states. This article tests these assumptions using the Minorities at Risk Organizational Behavior (MAROB) dataset, and finds that contrary to much of the policy literature and popular news media, the factors which predict ethnopolitical organizational dominance are instead the provision of social services, incorporating a gender inclusive ideology, and maintaining clear and consolidated leadership in the form of a single individual. These findings have clear policy implications for both domestic and international engagement with ethnopolitical groups.
Journal: Terrorism and Political Violence
Pages: 75-89
Issue: 1
Volume: 36
Year: 2024
Month: 01
X-DOI: 10.1080/09546553.2022.2106856
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2106856
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:1:p:75-89



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2117619_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jennifer Varriale Carson
Author-X-Name-First: Jennifer Varriale
Author-X-Name-Last: Carson
Author-Name: Noah Daniel Turner
Author-X-Name-First: Noah Daniel
Author-X-Name-Last: Turner
Title: The Role of Ideology in Terrorist Attack Intentions and Outcomes
Abstract: 
 This study seeks to investigate whether ideological elements, namely that of audience and othering, are related to attack-level objectives and effects. Prior research has established a strong connection between ideological subscription and violent attack outcomes, but few studies have sought to examine the full spectrum of ideologies. Moreover, little empirical attention has been given to examining how ideological affiliation may correlate with violent intentions in terrorist attacks; namely, an actor’s intention to kill or commit a mass casualty incident. To address these research gaps, we pose the question: Is a U.S. terrorist attack’s ideological component correlated with its both intentions and outcomes? Utilizing a sample of 2,275 terrorist incidents from the Global Terrorism Database (GTD), we examine our research question through a series of models with sensitivity checks using logistic regression and zero-inflated negative binomial analyses. In sum, our results are consistent with the premise that ideology does matter, particularly if this ideology involves a defined other.
Journal: Terrorism and Political Violence
Pages: 90-112
Issue: 1
Volume: 36
Year: 2024
Month: 01
X-DOI: 10.1080/09546553.2022.2117619
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2117619
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:1:p:90-112



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2083508_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mark Berlin
Author-X-Name-First: Mark
Author-X-Name-Last: Berlin
Author-Name: Sam Biasi
Author-X-Name-First: Sam
Author-X-Name-Last: Biasi
Author-Name: Tyler B. Parker
Author-X-Name-First: Tyler B.
Author-X-Name-Last: Parker
Title: Jihadist Journalism: Exploring the Geographic Coverage of al-Masra Newspaper
Abstract: 
 Recent terrorism research has explored jihadist groups’ discourse surrounding different countries by exploring the content of various magazines. We build on existing literature by examining al-Masra, an Arabic-language newspaper linked to Al Qaeda in the Arabian Peninsula (AQAP). We created an original dataset from 1,250 articles in fifty-eight al-Masra editions, utilizing content analysis to code for each article’s main country of focus. Overall, we found that fifty-four countries formed the central focus of at least one al-Masra article. Although the United States was the most covered country, the combined coverage provided to countries in the Middle East and North Africa, South Asia, and sub-Saharan Africa far outweighed al-Masra’s concentration on “the West.” Despite al-Masra’s stated commitment to covering global Muslim affairs, however, a number of countries with large Muslim populations, including Bangladesh, Indonesia, and Nigeria, received little attention. Interestingly, al-Masra’s focus on certain countries varied over time. While coverage of Libya, Somalia, and Syria decreased during 2017, al-Masra’s concentration on the United States increased over time, especially following Donald Trump’s electoral victory. This article contributes to research on terrorist media campaigns and framing strategies by examining an understudied Arabic-language jihadist publication and its propaganda related to dozens of countries.
Journal: Terrorism and Political Violence
Pages: 18-38
Issue: 1
Volume: 36
Year: 2024
Month: 01
X-DOI: 10.1080/09546553.2022.2083508
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2083508
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:1:p:18-38

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2144730_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andrea Michelle Morris
Author-X-Name-First: Andrea Michelle
Author-X-Name-Last: Morris
Title: Who Becomes a Foreign Fighter? Characteristics of the Islamic State’s Soldiers
Abstract: 
 Contemporary conflicts are becoming increasingly transnational in nature. In particular, individuals are leaving their homelands to participate in foreign conflicts at an unprecedented rate. This paper analyzes the foreign fighter phenomenon in the context of the Islamic State. Using primary source data on individual ISIS members from the Middle East, this paper contributes to the literature with two key findings. The first affirms previous work on terrorist participants and finds that those who join the Islamic State are more educated and younger than others from the same country. Second, other characteristics that are thought to correlate with joining a terrorist organization, such as prior occupation and marital status, have an inconsistent association and vary by country. Specifically, individuals with a university education and who also hold an unskilled job have the highest likelihood of joining ISIS. Overall, the results suggest that relative deprivation drives participation in foreign fighting.
Journal: Terrorism and Political Violence
Pages: 246-264
Issue: 2
Volume: 36
Year: 2024
Month: 02
X-DOI: 10.1080/09546553.2022.2144730
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2144730
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:2:p:246-264



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2139689_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mika Josephine Moeller
Author-X-Name-First: Mika Josephine
Author-X-Name-Last: Moeller
Author-Name: Herbert Scheithauer
Author-X-Name-First: Herbert
Author-X-Name-Last: Scheithauer
Title: Developmental and Biographical Issues in Radicalization Pathways: A Comparative Case Analysis of Homegrown German Convicts of Islamist Terrorism-Related Offenses
Abstract: 
 In this paper, developmental and biographical issues in individual biographical pathways of radicalization are examined from birth through to conviction for Islamist terrorism-related offenses. The source of data was court files of forty-five homegrown Germans convicted of Islamist terrorism-related offenses (age range at the time of the crime: 15 to 38; mean: 24 years, SD: 5; four female convicts). Using coding and constant case comparison techniques, a multiple comparative case analysis was conducted. This article gives an account of what individuals who were later convicted of Islamist terrorism-related offenses experienced in their life course and when. Patterns of relations between the biographical experiences and developmental psychological phases are identified, visually represented, and measured using odds ratios. In particular, the importance of the distinction between the developmental psychological phases of adolescence, emerging adulthood, and adulthood is emphasized and its meaning for radicalization processes is discussed. The interplay of cumulative vulnerabilities and developmental psychological phases are discussed. Guidance is provided on which topics are best addressed in prevention interventions and at what times.
Journal: Terrorism and Political Violence
Pages: 214-233
Issue: 2
Volume: 36
Year: 2024
Month: 02
X-DOI: 10.1080/09546553.2022.2139689
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2139689
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:2:p:214-233



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2122816_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jayme R. Schlesinger
Author-X-Name-First: Jayme R.
Author-X-Name-Last: Schlesinger
Author-Name: Andrey Tomashevskiy
Author-X-Name-First: Andrey
Author-X-Name-Last: Tomashevskiy
Title: Terror, Political Risk, and Effect on Foreign Direct Investment
Abstract: 
 Terrorist attacks have important social, political, and economic effects. One of the effects of terrorism involves the impact on foreign direct investment (FDI). While existing research suggests that terrorism negatively impacts FDI by increasing political risks, it is unclear how the effects of terrorism are conditioned by host country institutions. Political institutions may affect investors’ perceptions of political risk following a terrorist attack by shaping expectations of future political risk. We argue that the conditional effect of institutions and terrorism is non-linear: Terrorism has a negative effect on FDI inflows to countries with a medium level of institutional effectiveness only. Using quantitative analyses of FDI flows and political risk ratings, we show that terrorism has no effect on FDI in host countries with very high or very low levels of political institutional effectiveness. In a qualitative analysis of FDI and terrorism during the civil wars in Algeria and El Salvador, we demonstrate that concerns about institutional effectiveness played an important role in producing disinvestment by foreign investors. This research contributes to the literature on the determinants of FDI, effects of terrorism and political risk, and suggests that institutions play an important role in affecting how investors perceive political risk.
Journal: Terrorism and Political Violence
Pages: 145-165
Issue: 2
Volume: 36
Year: 2024
Month: 02
X-DOI: 10.1080/09546553.2022.2122816
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2122816
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:2:p:145-165



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2129015_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ezenwa E. Olumba
Author-X-Name-First: Ezenwa E.
Author-X-Name-Last: Olumba
Title: The Politics of Eco-Violence: Why Is Conflict Escalating in Nigeria’s Middle Belt?
Abstract: 
 In Nigeria’s Middle Belt, competition for land and other resources has intensified between nomadic Fulani herders and sedentary farmers. What were initially sporadic conflicts over cropland and water resources have transformed into daily occurrences of mass violence. While extant research centres on the root causes of such conflicts, the reasons for their escalation remain insufficiently understood. This article examines how political developments have contributed to the escalation of conflicts. Using the Homer-Dixon model and secondary sources, the findings show that changes in Nigeria’s “political opportunity structure” since 2014 were catalysts for escalating violent conflicts. The consequences were the unvarnished adoption of nepotistic domestic policies and alliances between elites and militia members, which escalated the violent conflicts. This article advocates the devolution of natural resources and security governance to prevent leaders from leveraging shifts in political opportunity structures to favour a specific demographic group.
Journal: Terrorism and Political Violence
Pages: 180-197
Issue: 2
Volume: 36
Year: 2024
Month: 02
X-DOI: 10.1080/09546553.2022.2129015
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2129015
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:2:p:180-197



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2143352_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Molly Amman
Author-X-Name-First: Molly
Author-X-Name-Last: Amman
Author-Name: Reid Meloy
Author-X-Name-First: Reid
Author-X-Name-Last: Meloy
Title: Incitement to Violence and Stochastic Terrorism: Legal, Academic, and Practical Parameters for Researchers and Investigators
Abstract: 
 In the U.S., legal incitement is generally understood as speech that is intended to incite or produce imminent lawless action, and is likely, in fact, to do so. It is an a old construct extending back to ancient Greece. In contrast, stochastic terrorism is a relatively new academic term describing an unpredicted act of targeted violence stemming from political demagoguery. Both constructs are hard problems in a liberal democratic society. How do we think about such issues of speech involving both persuasion and influence that may lead to intentional harm of others? In furtherance of understanding such historical attacks and those that may unfold in the future, we juxtapose the concepts of stochastic terrorism and incitement to violence, and define the legal, academic, and practical parameters of these concepts for researchers and investigators who are not formally trained in the law. There are points of both convergence and divergence regarding these terms, both legally and psychologically, which may help clarify their application to academic research, legal opinion, and other real world problems.
Journal: Terrorism and Political Violence
Pages: 234-245
Issue: 2
Volume: 36
Year: 2024
Month: 02
X-DOI: 10.1080/09546553.2022.2143352
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2143352
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:2:p:234-245



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2130057_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Flavin
Author-X-Name-First: Michael
Author-X-Name-Last: Flavin
Title: Four Typologies of Leadership Applied to a Survey of the Provisional IRA and Sinn Féin in the Troubles
Abstract: 
 This paper surveys leadership in the Provisional IRA and Sinn Féin in The Troubles (1968–1998), using four typologies to frame its analysis: position-based leadership; person-based leadership; results-based leadership; and process-based leadership. The paper considers the question—Are the four typologies a useful way of analysing leadership within the Provisional IRA and Sinn Féin in The Troubles? The paper examines milestone points in The Troubles, including the formation and coming to prominence of Provisional IRA; the conflict in the prison system culminating in the hunger strikes of the early 1980s; the growth of the political party Sinn Féin; and the peace talks which brought about the end of The Troubles. The paper argues that, over time, the Provisional IRA and Sinn Féin shifted towards process-based leadership as they moved from an armed struggle to political engagement. Position-based and person-based leadership were also evident as key figures switched towards electoral participation. Political engagement also served results-based leadership, given Sinn Féin’s electoral presence and influence in both Northern Ireland and the Republic of Ireland.
Journal: Terrorism and Political Violence
Pages: 198-213
Issue: 2
Volume: 36
Year: 2024
Month: 02
X-DOI: 10.1080/09546553.2022.2130057
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2130057
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:2:p:198-213



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2129014_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Shannon Zimmerman
Author-X-Name-First: Shannon
Author-X-Name-Last: Zimmerman
Title: The Ideology of Incels: Misogyny and Victimhood as Justification for Political Violence
Abstract: 
 A new group of socio-political actors has emerged from the depths of the internet. Thriving in the online Manosphere, the involuntary celibates, or “Incels,” are men who feel they have been victimized by feminism. Initially just another misogynist social group online, this article argues that Incels are moving beyond social commentary to become a political movement. This article demonstrates that Incels have begun to craft a particularly violent political ideology drawing on a unique form of misogyny rooted in the construction of a counternarrative to hegemonic masculinity. Using critical narrative analysis, this article assesses the discourse and narratives used by the Incels to create their unique worldview and identifies core components of their emerging political ideology to understand how this group may justify the use of political violence as part of their political movement.
Journal: Terrorism and Political Violence
Pages: 166-179
Issue: 2
Volume: 36
Year: 2024
Month: 02
X-DOI: 10.1080/09546553.2022.2129014
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2129014
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:2:p:166-179



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2131318_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Neela Hassan
Author-X-Name-First: Neela
Author-X-Name-Last: Hassan
Title: Religion, Extremism and Violence in South Asia
Journal: Terrorism and Political Violence
Pages: 265-266
Issue: 2
Volume: 36
Year: 2024
Month: 02
X-DOI: 10.1080/09546553.2022.2131318
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2131318
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:2:p:265-266

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2151905_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Christopher Whyte
Author-X-Name-First: Christopher
Author-X-Name-Last: Whyte
Title: Terror through the Looking Glass: Information Orientations and the Lens of Web Search Engines
Abstract: 
 Researchers and pundits alike regularly describe terrorism as being a theatrical performance that depends on publicity to build recognition, garner attention and command legitimation. Clearly, the mechanical contours of the information environment matter when it comes to determining the opportunities and challenges for both terrorist and counterterrorist success. This article addresses arguably the most singularly significant intermediary for information access in modern society: web search engines. These information gatekeepers play a crucial role in guiding both government and non-state approaches to terror. That said, these tools are associated with bias and malperformance on a number of fronts. This study examines the degree to which different search engine usage might present a differential view of terrorism to different users. I turn to agent-based digital infrastructure as a basis for studying divergent information experiences with a major terrorist incident, specifically the suicide bombing and subsequent small arms attacks on the Hamid Karzai International Airport in Kabul, Afghanistan on August 26, 2021. The results are striking, confirming that there is substantial and clear variation in the outputs based around a host of factors—variable queries and query styles, information orientations and subsequent personalization, geographic location and, of course, search engine choice.
Journal: Terrorism and Political Violence
Pages: 300-326
Issue: 3
Volume: 36
Year: 2024
Month: 04
X-DOI: 10.1080/09546553.2022.2151905
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2151905
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:3:p:300-326



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2145194_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: José Luis González-Álvarez
Author-X-Name-First: José Luis
Author-X-Name-Last: González-Álvarez
Author-Name: Jorge Santos-Hermoso
Author-X-Name-First: Jorge
Author-X-Name-Last: Santos-Hermoso
Author-Name: Ángel Gómez
Author-X-Name-First: Ángel
Author-X-Name-Last: Gómez
Author-Name: José Luis López-Novo
Author-X-Name-First: José Luis
Author-X-Name-Last: López-Novo
Author-Name: Sara Buquerín-Pascual
Author-X-Name-First: Sara
Author-X-Name-Last: Buquerín-Pascual
Author-Name: Florencia Pozuelo-Rubio
Author-X-Name-First: Florencia
Author-X-Name-Last: Pozuelo-Rubio
Author-Name: Carlos Fernández-Gómez
Author-X-Name-First: Carlos
Author-X-Name-Last: Fernández-Gómez
Author-Name: Sandra Chiclana
Author-X-Name-First: Sandra
Author-X-Name-Last: Chiclana
Title: A Theoretical, Empirical, and Methodologically Based Instrument to Assess the Risk of Violent Jihadist Radicalization in Prisons: The DRAVY-3
Abstract: 
 A main goal of the Spanish National Counter-Terrorism Strategy is to improve the detection and control of inmates who may participate or collaborate with terrorist groups after release convicted and detained inmates linked to terrorist acts, as well as of those individuals involved, during their stay in prison, in violent extremist recruitment or indoctrination. This manuscript introduces an instrument for assessing the risk of violent jihadist radicalization in prisons, the Detention of Violent Jihadists Radicalization (DRAVY-3 for its Spanish initials). This instrument was built on tools already existing, a review of the literature, the experience of the prison staff, indicators suggested by researchers from two institutions, a field study conducted with Muslim inmates (jihadists and non-jihadists), and the results of six implementations of two preliminary versions. The DRAVY-3 was tested by evaluating 570 inmates from five groups (related to jihadist terrorism and controls). The analyses showed that the indicators are distributed into three scales: violence in general, violence of jihadist aetiology, and radicalism. Analyses also informed that a combination of indicators confirm an index of prediction of the level of danger. Results demonstrate the internal strength of the instrument and its capacity to detect potential radicalization leading to violence.
Journal: Terrorism and Political Violence
Pages: 283-299
Issue: 3
Volume: 36
Year: 2024
Month: 04
X-DOI: 10.1080/09546553.2022.2145194
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2145194
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:3:p:283-299



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2145193_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Caitlin Clemmow
Author-X-Name-First: Caitlin
Author-X-Name-Last: Clemmow
Author-Name: Isabelle van der Vegt
Author-X-Name-First: Isabelle
Author-X-Name-Last: van der Vegt
Author-Name: Bettina Rottweiler
Author-X-Name-First: Bettina
Author-X-Name-Last: Rottweiler
Author-Name: Sandy Schumann
Author-X-Name-First: Sandy
Author-X-Name-Last: Schumann
Author-Name: Paul Gill
Author-X-Name-First: Paul
Author-X-Name-Last: Gill
Title: Crowdsourcing Samples for Research on Violent Extremism: A Research Note
Abstract: 
 As research on violent extremism continues to progress beyond some of the field’s earlier challenges, new ways of gathering primary source data are becoming increasingly popular. One such data collection methodology implemented widely across parallel fields is crowdsourcing: the process of gathering information, or input, from large numbers of people, either for payment or not, online. In this research note, we present a brief introduction to crowdsourcing, highlight a popular platform for gathering samples online, Prolific, and present four studies conducted by the research team to demonstrate the unique benefits and challenges of crowdsourcing samples online for research on violent extremism.
Journal: Terrorism and Political Violence
Pages: 267-282
Issue: 3
Volume: 36
Year: 2024
Month: 04
X-DOI: 10.1080/09546553.2022.2145193
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2145193
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:3:p:267-282



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2158083_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Casper S. van Nassau
Author-X-Name-First: Casper S.
Author-X-Name-Last: van Nassau
Author-Name: Christianne J. de Poot
Author-X-Name-First: Christianne J.
Author-X-Name-Last: de Poot
Title: The Relational Dimension of Radicalization: Context and Tie Formation in Dutch Salafi-Jihadi Networks
Abstract: 
 Despite the widely held notion that processes of radicalization tend to happen in relation to others, systematic evidence on the social context in which actors meet and form ties is scarce. This is problematic, as without a more thorough understanding of the relational dimension of radicalization, any strategy to intervene may turn out less effective than perhaps hoped for. Based on our access to detailed police information on eleven Dutch Salafi-Jihadi networks (2001–2014; 273 actors), this article presents a descriptive analysis of the social context in which actors meet and form ties. In most networks, we observe pre-existing family and friendship ties, actors to frequent Salafi mosques and radicalizing settings, and committed actors engaged in functional roles. We also find indications for these elements to facilitate actors to form ties. It is important to note however that we also observe exceptions, both in terms of prevalence and impact of the relational factors we study. In the article, we describe our detailed empirical findings and reflect on the (differential) social context is which actors participating in Dutch Salafi-Jihadi networks meet and form ties.
Journal: Terrorism and Political Violence
Pages: 366-381
Issue: 3
Volume: 36
Year: 2024
Month: 04
X-DOI: 10.1080/09546553.2022.2158083
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2158083
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:3:p:366-381



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2156044_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kevin D. Dayaratna
Author-X-Name-First: Kevin D.
Author-X-Name-Last: Dayaratna
Author-Name: Chandler Hubbard
Author-X-Name-First: Chandler
Author-X-Name-Last: Hubbard
Author-Name: Mary Catherine Legreid
Author-X-Name-First: Mary Catherine
Author-X-Name-Last: Legreid
Title: Bayesian Inferences for Counterterrorism Policy: A Retrospective Case Study of the U.S. War in Afghanistan
Abstract: 
 This study employs hierarchical Bayesian analysis of terrorist attacks to provide a retrospective analysis of the war in Afghanistan between 2002 and 2018. We examine the relationship between U.S. troop levels, target type, and the severity of attacks in terms of the number killed or wounded. We find that although some targets might have become better fortified after enduring attacks (such as police departments), terrorists would subsequently succeed in either attacking other targets (such as educational institutions) or even those same targets in subsequent years. Our analysis also finds that increases in U.S. troop levels throughout much of the conflict did not seem to quell violence, although explanations of this phenomenon are considerably more nuanced after taking expert opinion into account. We hope our analysis provides a useful retrospective analysis of the U.S. War in Afghanistan for policymakers to assess how or if security measures in the country could have been improved over the course of the conflict. Our modeling framework, however, is easily generalizable to other conflicts worldwide and thus provides a useful statistical tool for analyzing terrorism in many other settings as well.
Journal: Terrorism and Political Violence
Pages: 327-343
Issue: 3
Volume: 36
Year: 2024
Month: 04
X-DOI: 10.1080/09546553.2022.2156044
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2156044
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:3:p:327-343



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2157267_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Emilia Lounela
Author-X-Name-First: Emilia
Author-X-Name-Last: Lounela
Author-Name: Shane Murphy
Author-X-Name-First: Shane
Author-X-Name-Last: Murphy
Title: Incel Violence and Victimhood: Negotiating Inceldom in Online Discussions of the Plymouth Shooting
Abstract: 
 Incels (“involuntary celibates”) are online communities of young men, broadly aligned by anti-feminism, concern over an inability to form sexual relationships with women, and a strong negative focus on their own appearance. Incels have been linked to violent misogyny and several mass killings. Using critical discourse analysis on data from nine different incel online forums, this article explores how incels discussed the Plymouth shooting in August 2021, often reported as an incel attack, looking at the discourses which are invoked to justify or delegitimize violence. As well as violent rhetoric, our research also pays attention to anti-violent rhetoric in incel communities, an area not yet discussed in the literature regarding incels, but which may be invaluable to those hoping to address the issue of incel violence. Our findings identify significant differences in the way the shooting is discussed across different incel forums, and reveal that both pro and anti-violence discourses frequently invoke lookism and mental health to justify victimhood.
Journal: Terrorism and Political Violence
Pages: 344-365
Issue: 3
Volume: 36
Year: 2024
Month: 04
X-DOI: 10.1080/09546553.2022.2157267
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2157267
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:3:p:344-365



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2161373_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Stephane Baele
Author-X-Name-First: Stephane
Author-X-Name-Last: Baele
Author-Name: Lewys Brace
Author-X-Name-First: Lewys
Author-X-Name-Last: Brace
Author-Name: Debbie Ging
Author-X-Name-First: Debbie
Author-X-Name-Last: Ging
Title: A Diachronic Cross-Platforms Analysis of Violent Extremist Language in the Incel Online Ecosystem
Abstract: 
 The emergence and growth of incel subculture online has triggered a considerable body of research to date, most of which analyzing its worldview or mapping its position and connections within the broader manosphere. While this research has considerably enhanced our understanding of the incel phenomenon, it tends to offer a somewhat static, one-dimensional portrayal of what is—like all online subcultures and communities—a highly dynamic and multi-layered environment. Consequently, we lack sufficiently nuanced answers to what is arguably a critical question for law enforcement and academics alike: is this a violent extremist ideology? Using a uniquely extensive corpus covering a range of online spaces constitutive of the incelosphere spanning several years, we analyze the evolution of incel language across both time and platforms. Specifically, we test whether this language has grown more extreme over time as online spaces shutdown and others emerged. Our findings demonstrate that, while levels of violent extremist language do vary across the incelosphere, they have steadily increased in the main online spaces over the past 6 years. Further, we demonstrate that, while activity on these online spaces is responsive to offline events, the impact of these on violent extremist ideation is not uniform.
Journal: Terrorism and Political Violence
Pages: 382-405
Issue: 3
Volume: 36
Year: 2024
Month: 04
X-DOI: 10.1080/09546553.2022.2161373
File-URL: http://hdl.handle.net/10.1080/09546553.2022.2161373
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:3:p:382-405



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2322325_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeffrey Kaplan
Author-X-Name-First: Jeffrey
Author-X-Name-Last: Kaplan
Title: In Memory of David C. Rapoport
Journal: Terrorism and Political Violence
Pages: 406-407
Issue: 3
Volume: 36
Year: 2024
Month: 04
X-DOI: 10.1080/09546553.2024.2322325
File-URL: http://hdl.handle.net/10.1080/09546553.2024.2322325
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:3:p:406-407

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2183052_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ronit Berger Hobson
Author-X-Name-First: Ronit
Author-X-Name-Last: Berger Hobson
Author-Name: Assaf Moghadam
Author-X-Name-First: Assaf
Author-X-Name-Last: Moghadam
Title: Terrorism, Guerrilla, and the Labeling of Militant Groups
Abstract: 
 Terrorist organizations are presumed to specialize in the planning and execution of acts of terrorism, but to what extent do these groups actually employ terrorism? The answer can help inform the debate over whether such groups should be labeled terrorist organizations at all. We explore these questions by examining the relative use of terrorism vis-à-vis guerrilla tactics among 1,013 groups listed in the Global Terrorism Database from 1970 to 2019. We find, first, that “terrorist groups” have historically relied on a combination of terrorist and guerrilla tactics. Second, while terrorism has been the preferred mode of warfare in the first four decades examined, guerrilla tactics have predominated in the 2010s. Our findings imply that the use of the “terrorist group” label had empirical justifications in the first four, although not the most recent decade under review. The data support calls for the adoption of value-neutral labels for contemporary militant groups.
Journal: Terrorism and Political Violence
Pages: 567-584
Issue: 4
Volume: 36
Year: 2024
Month: 05
X-DOI: 10.1080/09546553.2023.2183052
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2183052
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:4:p:567-584



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2169141_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Abdullah Alrhmoun
Author-X-Name-First: Abdullah
Author-X-Name-Last: Alrhmoun
Author-Name: Charlie Winter
Author-X-Name-First: Charlie
Author-X-Name-Last: Winter
Author-Name: János Kertész
Author-X-Name-First: János
Author-X-Name-Last: Kertész
Title: Automating Terror: The Role and Impact of Telegram Bots in the Islamic State’s Online Ecosystem
Abstract: 
 In this article, we use network science to explore the topology of the Islamic State’s “terrorist bot” network on the online social media platform Telegram, empirically identifying its connections to the Islamic State supporter-run groups and channels that operate across the platform, with which these bots form bipartite structures. As part of this, we examine the diverse activities of the bots to determine the extent to which they operate in synchrony with one another as well as explore their impacts. We show that these bots are mainly clustered around two communities of Islamic State supporters, or “munasirun,” with one community focusing on facilitating discussion and exchange, and the other one augmenting content distribution efforts. Operating as such, this network of bots is used to lubricate and augment the Islamic State’s influence activities, including facilitating content amplification and community cultivation efforts, and connecting people with the movement based on common behaviors, shared interests, and/or ideological proximity while minimizing risk for the broader organization.
Journal: Terrorism and Political Violence
Pages: 409-424
Issue: 4
Volume: 36
Year: 2024
Month: 05
X-DOI: 10.1080/09546553.2023.2169141
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2169141
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:4:p:409-424



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2180287_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Keren L. G. Snider
Author-X-Name-First: Keren L. G.
Author-X-Name-Last: Snider
Author-Name: Amir Hefetz
Author-X-Name-First: Amir
Author-X-Name-Last: Hefetz
Author-Name: Daphna Canetti
Author-X-Name-First: Daphna
Author-X-Name-Last: Canetti
Title: Terrorized by Immigration? Threat Perceptions and Policy Preferences
Abstract: 
 Does exposure to terrorism affect attitudes toward immigration policy? If so, is it the sense of threat that impacts these attitudes? Previous studies could not find conclusive evidence of increasing hostility toward out-groups as a direct consequence of terrorist events, as they struggle to separate attitudinal migration policy preferences and reactions to terrorism. Drawing on intergroup threat theory, we conducted two original public opinion polls (N = 954) in Israel, using a unique model that refined both the measure of the intensity of exposure to terrorism–more intensive (Study 1) and less intensive (Study 2)—and differences in the measure of different levels of geographic proximity to the attacks (high/low). Results indicate that in times of intense terror attacks, high levels of exposure to such attacks affect people’s conflict-related threat perceptions, which drive their support for exclusionary migration policies. These findings improve our understanding of the spillover effects of terrorism on public opinion about migrants who are not involved in the conflict that prompts the terror attacks.
Journal: Terrorism and Political Violence
Pages: 552-566
Issue: 4
Volume: 36
Year: 2024
Month: 05
X-DOI: 10.1080/09546553.2023.2180287
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2180287
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:4:p:552-566



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2169143_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mary Bunn
Author-X-Name-First: Mary
Author-X-Name-Last: Bunn
Author-Name: Enryka Christopher
Author-X-Name-First: Enryka
Author-X-Name-Last: Christopher
Author-Name: Chloe Polutnik-Smith
Author-X-Name-First: Chloe
Author-X-Name-Last: Polutnik-Smith
Author-Name: John McCoy
Author-X-Name-First: John
Author-X-Name-Last: McCoy
Author-Name: Rosie Hanneke
Author-X-Name-First: Rosie
Author-X-Name-Last: Hanneke
Author-Name: Michael King
Author-X-Name-First: Michael
Author-X-Name-Last: King
Author-Name: B. Heidi Ellis
Author-X-Name-First: B. Heidi
Author-X-Name-Last: Ellis
Author-Name: Emma Cardeli
Author-X-Name-First: Emma
Author-X-Name-Last: Cardeli
Author-Name: Stevan Weine
Author-X-Name-First: Stevan
Author-X-Name-Last: Weine
Title: Rehabilitation and Reintegration of Women and Children Returning from Violent Extremist Contexts: A Rapid Review to Inform Program and Policy Development
Abstract: 
 This rapid review used a systematic approach to examine the available literature on rehabilitation and reintegration (R&R) programs for women and children returning from contexts of violent extremism, examining common assumptions, inputs, activities and outcomes across diverse settings. Fifty-one documents including peer reviewed articles and grey literature were included in the analysis. The most common program activities identified included mental health services, community level social programs, promoting school and vocational enrollment, regular health services, and parenting training & education, though there was a lack of consensus around core program components. The analysis points to the need for a robust set of inputs and resources to implement R&R programs including government officials, child welfare, mental health professionals, teachers, law enforcement, healthcare, community leaders, and extended family. The review also uncovered a number of gaps. This includes the need to create clear and analytically distinct definitions of rehabilitation and reintegration that are applicable and relevant to key stakeholders, delineating age-appropriate activities and outcomes for young children, youth, and adults, defining frameworks for service delivery and coordination of stakeholders, and placing R&R programs within existing domains of public safety and restorative justice.
Journal: Terrorism and Political Violence
Pages: 455-487
Issue: 4
Volume: 36
Year: 2024
Month: 05
X-DOI: 10.1080/09546553.2023.2169143
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2169143
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:4:p:455-487



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2171868_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Francesco Marone
Author-X-Name-First: Francesco
Author-X-Name-Last: Marone
Title: Notes from the Underground: Profiles and Mobilization Dynamics of Pro-Russia Western Fighters in the Donbas—Insights from Italy
Abstract: 
 The Ukrainian crisis has caused important repercussions at the international level, including the influx of thousands of voluntary fighters from abroad. According to recent estimates, from 2014 until the 2022 Russian invasion of Ukraine, approximately 1,000 Westerners travelled to the disputed region of the Donbas (Eastern Ukraine), on both sides of the conflict (Ukrainian forces and Russia-supported “separatist” militias). This article intends to offer an original contribution to the empirical study of the mobilization of Western fighters in the Donbas, by taking into account, for the first time, the national case of Italy (one of the countries most affected by the phenomenon in the West). In particular, based on detailed primary and secondary sources, the paper examines in depth a relatively large Italian network of pro-separatist fighters and direct supporters, including far-right militants, and analyzes their profiles and mobilization dynamics, drawing upon the literature on social movements and contentious politics.
Journal: Terrorism and Political Violence
Pages: 512-532
Issue: 4
Volume: 36
Year: 2024
Month: 05
X-DOI: 10.1080/09546553.2023.2171868
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2171868
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:4:p:512-532



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2169144_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Johan Axelsson
Author-X-Name-First: Johan
Author-X-Name-Last: Axelsson
Author-Name: Leni Eriksson
Author-X-Name-First: Leni
Author-X-Name-Last: Eriksson
Author-Name: Lina Grip
Author-X-Name-First: Lina
Author-X-Name-Last: Grip
Title: Managing Violent Extremist Clients in Prison and Probation Services: A Scoping Review
Abstract: 
 The literature on terrorism and the rehabilitation of terrorists is growing continuously, but primary studies of high quality are still scarce. In many countries, the number of clients convicted of terrorist offences is increasing. As such, prison and probation services serve as important actors in the prevention of recidivism and radicalisation. This scoping review identifies viable management and treatment methods and approaches to (a) prevent violent extremism in prison and probation services, and (b) manage violent extremist clients in prison and probation services. The findings of twenty-seven primary studies highlight the importance of so-called soft approaches by building trust and resilience among violent extremist clients, and facilitating their prosocial engagement. Strength-based models could be considered as an alternative to the predominant risk-oriented practices in prison and probation services.
Journal: Terrorism and Political Violence
Pages: 488-511
Issue: 4
Volume: 36
Year: 2024
Month: 05
X-DOI: 10.1080/09546553.2023.2169144
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2169144
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:4:p:488-511



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2178305_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeremy J. J. Rappel
Author-X-Name-First: Jeremy J. J.
Author-X-Name-Last: Rappel
Author-Name: David D. Vachon
Author-X-Name-First: David D.
Author-X-Name-Last: Vachon
Title: The Role of Basic Psychological Needs in Right-Wing Extremism Risk Among American Conservatives
Abstract: 
 Modern psychological theories of violent extremism stress the roles of social connections and personal meaning as motivators for individuals to participate in extremist groups. Personal meaning and social connections are both important aspects of Basic Psychological Needs Theory, a motivation framework commonly used in workplace and educational psychology. This study sought to assess the relationship between Basic Psychological Needs and extremism among (N = 361) self-identified American conservatives. Psychological Need fulfilment was strongly negatively associated with endorsement of extremism (range of rs = −.43 to −.68). In addition, Psychological Need fulfilment explained incremental variance in extremism scores after accounting for other psychological characteristics, including aggression, psychopathy, empathy, and Five-Factor Model personality traits. These findings suggest that Basic Psychological Needs may be a useful framework to expand our understanding of the etiology of extremism, and that prosocial alternatives for meeting these needs may reduce the risk of engaging in extremist behaviors.
Journal: Terrorism and Political Violence
Pages: 533-551
Issue: 4
Volume: 36
Year: 2024
Month: 05
X-DOI: 10.1080/09546553.2023.2178305
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2178305
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:4:p:533-551



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2169142_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: B. Heidi Ellis
Author-X-Name-First: B. Heidi
Author-X-Name-Last: Ellis
Author-Name: Michael King
Author-X-Name-First: Michael
Author-X-Name-Last: King
Author-Name: Emma Cardeli
Author-X-Name-First: Emma
Author-X-Name-Last: Cardeli
Author-Name: Enryka Christopher
Author-X-Name-First: Enryka
Author-X-Name-Last: Christopher
Author-Name: Seetha Davis
Author-X-Name-First: Seetha
Author-X-Name-Last: Davis
Author-Name: Sewit Yohannes
Author-X-Name-First: Sewit
Author-X-Name-Last: Yohannes
Author-Name: Mary Bunn
Author-X-Name-First: Mary
Author-X-Name-Last: Bunn
Author-Name: John McCoy
Author-X-Name-First: John
Author-X-Name-Last: McCoy
Author-Name: Stevan Weine
Author-X-Name-First: Stevan
Author-X-Name-Last: Weine
Title: Supporting Women and Children Returning from Violent Extremist Contexts: Proposing a 5R Framework to Inform Program and Policy Development
Abstract: 
 Women and children returning from areas formerly controlled by the Islamic State typically have experienced high levels of trauma and indoctrination, further complicating politically fraught efforts at reintegration and resettlement. Consequently, countries around the world are grappling with how best to manage the return of these women and children. To help better understand which types of programming can contribute to the successful, non-violent reintegration of these individuals, we incorporated ideas from existing Repatriation and Rehabilitation (R&R) literature, field practitioners, R&R subject matter experts, and literature from adjacent fields (e.g., refugee resettlement, criminal justice, psychological resilience) into a recommended best practice approach to supporting returning women and children. We propose a shift from “R&R” programming to what we call the “5R” framework: Repatriation/Resettlement, Reintegration, Rehabilitation, and Resilience. This shift provides conceptual clarity related to how different program elements target proximal goals (e.g., wellbeing and personal safety, belonging and opportunity, non-violence, and dignity), and how programming can shift from more centrally- and government-held services to informal and community-based supports.
Journal: Terrorism and Political Violence
Pages: 425-454
Issue: 4
Volume: 36
Year: 2024
Month: 05
X-DOI: 10.1080/09546553.2023.2169142
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2169142
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:4:p:425-454

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2204033_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Drone Activity and Cyber Terrorism
Journal: Terrorism and Political Violence
Pages: 716-721
Issue: 5
Volume: 36
Year: 2024
Month: 07
X-DOI: 10.1080/09546553.2023.2204033
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2204033
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:5:p:716-721



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2187635_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ayhan Sari
Author-X-Name-First: Ayhan
Author-X-Name-Last: Sari
Title: Part-Time Foreign Jihadist Fighters in the Syrian Civil War
Abstract: 
 This study examines the reasoning behind the decision of some Muslims to become foreign jihadist fighters and the manner in which they carried out their jihad. Through participant observation and interviews with a religious group in Istanbul made up of active fighters and supporters of the Syrian jihad, this paper’s findings suggest that the radicalization process is driven by Islamic ideology, perceived discrimination and injustice against Muslims, as well as by the perceived obligation to defend Muslim communities under threat. However, contrary to popular belief, the objective of jihad is not solely to attain martyrdom or defeat the enemy. Fulfilling daily tasks, such as digging trenches or cooking meals for fellow fighters, can also be seen as ways to attain divine approval. The Syrian Civil War is viewed by many foreign jihadist fighters as a chance to participate in jihad, after which they plan to return to their normal lives, with this process potentially repeating itself multiple times throughout their lifetime.
Journal: Terrorism and Political Violence
Pages: 585-598
Issue: 5
Volume: 36
Year: 2024
Month: 07
X-DOI: 10.1080/09546553.2023.2187635
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2187635
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:5:p:585-598



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2189968_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Brian J. Phillips
Author-X-Name-First: Brian J.
Author-X-Name-Last: Phillips
Author-Name: Alexander Schiele
Author-X-Name-First: Alexander
Author-X-Name-Last: Schiele
Title: Dogs and Cats Living Together? Explaining the Crime-Terror Nexus
Abstract: 
 Why do some terrorist groups cooperate with criminal organizations? This behavior is puzzling because there are reputational reasons for each of these kinds of groups to avoid the other, yet such cooperation seems to be increasingly common. The growing literature on the “crime-terror-nexus” examines terrorist-criminal cooperation, but questions remain. We discuss relevant research, and present hypotheses. Analysis of nearly 400 terrorist organizations using a newly-coded measure of inter-organizational cooperation suggests that certain types of terrorist groups are more likely to work with organized crime: those that are involved in the drug trade, cooperate with other terrorist groups, are older, or are more lethal. These relationships are robust. We also find some evidence that the crime-terror nexus is more likely for groups that have state sponsors, have larger memberships, operate in more capable countries, or operate in less-democratic countries. There is also some evidence that ethnically-motivated terrorist groups are less likely to cooperate with organized crime. Interestingly, there is little or no support for the idea that the nexus is related to territorial control or religious ideology. These findings go against some previous research and suggest steps for future analysis.
Journal: Terrorism and Political Violence
Pages: 699-715
Issue: 5
Volume: 36
Year: 2024
Month: 07
X-DOI: 10.1080/09546553.2023.2189968
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2189968
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:5:p:699-715



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2188961_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jessica Trisko Darden
Author-X-Name-First: Jessica
Author-X-Name-Last: Trisko Darden
Author-Name: Duenya Hassan
Author-X-Name-First: Duenya
Author-X-Name-Last: Hassan
Title: Citizenship, Family Law, and the Repatriation of Islamic State Affiliates in MENA
Abstract: 
 Since the fall of Islamic State’s so-called caliphate in March 2019, the United States and other international actors have repeatedly urged states to repatriate their citizens. Analyses of this issue too often focus on citizens of Western countries despite the fact that they constitute only a small fraction of the group’s members and affiliates. Focusing on Middle East and North African (MENA) countries, we contend that citizenship law and family law play a central role in determining an individual’s prospects for repatriation by forming the basis of a state’s articulation of who belongs to the nation and who the state is responsible for. We identify important sub-regional patterns that shape the repatriation of Islamic State affiliates through the differential treatment of women in MENA citizenship and nationality law and family law. In addition, we find that the distinction between custodian and guardian in MENA family law provides a useful basis for the related challenge of reintegrating female-headed family units as well as orphaned children.
Journal: Terrorism and Political Violence
Pages: 599-613
Issue: 5
Volume: 36
Year: 2024
Month: 07
X-DOI: 10.1080/09546553.2023.2188961
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2188961
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:5:p:599-613



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2188963_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Henar Criado
Author-X-Name-First: Henar
Author-X-Name-Last: Criado
Author-Name: Francisco Herreros
Author-X-Name-First: Francisco
Author-X-Name-Last: Herreros
Author-Name: Alvaro Martín-Hernández
Author-X-Name-First: Alvaro
Author-X-Name-Last: Martín-Hernández
Author-Name: Jordi Domenech
Author-X-Name-First: Jordi
Author-X-Name-Last: Domenech
Title: The Long Shadow of Violence: Legacies of Civil Wars and Support for Terrorism in the Basque Country
Abstract: 
 This article analyses how events of political violence in the distant past affect the outbreak of terrorism in the present. Civil wars leave a legacy of distrust that can persist through generations, paving the way to violent responses to perceived threats. We claim that part of the explanation for the counterintuitive terrorism phenomenon in a prosperous and relatively egalitarian region such as the Basque Country (and, potentially, other cases of terrorism) lies in the legacies of political violence in the distant past. Those communities where support for Carlism, one of the warring factions in nineteenth-century civil wars, was strong, were more likely to support terrorism a century later. The article also shows that the transmission of these legacies was robust in communities that have remained largely isolated in the century that separates the civil war from the terrorism of the 1970s.
Journal: Terrorism and Political Violence
Pages: 614-637
Issue: 5
Volume: 36
Year: 2024
Month: 07
X-DOI: 10.1080/09546553.2023.2188963
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2188963
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:5:p:614-637



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2188964_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sara K. Thompson
Author-X-Name-First: Sara K.
Author-X-Name-Last: Thompson
Author-Name: Michele Grossman
Author-X-Name-First: Michele
Author-X-Name-Last: Grossman
Author-Name: Paul Thomas
Author-X-Name-First: Paul
Author-X-Name-Last: Thomas
Title: Needs, Rights and Systems: Increasing Canadian Intimate Bystander Reporting on Radicalizing to Violence
Abstract: 
 The first people to suspect or know about someone involved in acts of violent extremism will often be those closest to them: their friends, family and community insiders. They are ideally placed to play particular roles: (a) to notice any changes or early warning signs that someone is considering violent action to harm others, and (b) to influence and facilitate vulnerable individuals to move away from violent extremist involvements. The willingness of those close to potential or suspected violent actors to come forward and share their knowledge and concerns with authorities is thus a critical element in efforts to prevent violent extremist action. This Canadian study replicates the focus and methodology of three previous Community Reporting Thresholds studies with an increased scope and sample size. Our findings highlight the ways in which Canadian community respondents framed their understanding of and engagement with reporting as intimate bystanders on someone close radicalising to violence in relation to three main domains: needs-based, rights-based and systems-based. This paper will explore what we have learned from data across three Canadian cities with a particular emphasis on how the domains of needs, rights and systems are conceptualized and enacted by Canadian respondents.
Journal: Terrorism and Political Violence
Pages: 638-659
Issue: 5
Volume: 36
Year: 2024
Month: 07
X-DOI: 10.1080/09546553.2023.2188964
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2188964
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:5:p:638-659



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2189963_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Fatma Anıl Öztop
Author-X-Name-First: Fatma Anıl
Author-X-Name-Last: Öztop
Author-Name: Nesrin Kenar
Author-X-Name-First: Nesrin
Author-X-Name-Last: Kenar
Author-Name: Ali Poyraz Gürson
Author-X-Name-First: Ali Poyraz
Author-X-Name-Last: Gürson
Title: Religion, Family Pressure, Life Conditions: Turkish Female Foreign Fighters in Their Own Words
Abstract: 
 The article aims to contribute to the discussion why and how women join violent extremist groups by exploring the motivational factors among Turkish ISIS women, zooming in on the level of agency in their decision. Our focus was on Turkish women as there have been no previous studies of this cohort. We used thematic analysis of the transcripts from interviews with thirty-seven Turkish ISIS women. Our analysis revealed three main motivational factors: religion, family pressure, and escaping life conditions. The first main finding of the study is that the twenty-two women who viewed religion as more than a belief were motivated by political and ideological factors and had agency and choice. Secondly, the twelve women who are motivated by family pressure continued to strictly adhere to their traditional roles as dutiful daughters or dutiful wives to their militant fathers or husbands. Thirdly, the three women who often emphasized the oppressive conditions under which they lived and a desire to gain independence and wanted to be accepted, respected, and valued prioritized escaping current life conditions. The study indicates that Turkish ISIS women are driven by different motivational factors and that most of the women in the study made a rational choice to join ISIS, be it out of political or ideological motivations or to escape oppression. In this context, the findings reported here shed light on the fact that women, like men, may resort to violence as the best means of achieving their political purpose.
Journal: Terrorism and Political Violence
Pages: 660-678
Issue: 5
Volume: 36
Year: 2024
Month: 07
X-DOI: 10.1080/09546553.2023.2189963
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2189963
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:5:p:660-678



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2189966_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jan Jämte
Author-X-Name-First: Jan
Author-X-Name-Last: Jämte
Author-Name: MÃ¥ns Lundstedt
Author-X-Name-First: MÃ¥ns
Author-X-Name-Last: Lundstedt
Author-Name: Magnus Wennerhag
Author-X-Name-First: Magnus
Author-X-Name-Last: Wennerhag
Title: When Do Radical Flanks Use Violence? Conditions for Violent Protest in Radical Left-Libertarian Activism in Sweden, 1997–2016
Abstract: 
 Descriptions of social movement factionalism are often based on the dichotomous conception of lawful moderates and violent radicals. In this article, we nuance this distinction by illustrating the complexity of radical flanks through an empirically grounded analysis of protest tactics, in which we ask under what conditions radical flanks are likely to use violent protest tactics. Exploring dominant explanations of political violence, the article shows the necessity of understanding the use of violent protest tactics as part of cognitive and relational processes. The use of violent tactics varies greatly across frames and protest issues, pointing to how different logics of protest are tied to different frames. Also, the use of violence is affected by the presence or absence of moderate allies; the likelihood of violence clearly decreases when radicals and moderates form coalitions when organising protests. The analysis is based on a protest event data set covering over 3,900 nonviolent and violent events by the Radical Left-Libertarian Movement in Sweden, 1997–2016. Notably, the results hold over this entire twenty-year period, suggesting that they are robust and provide a better explanation than historically contingent causes.
Journal: Terrorism and Political Violence
Pages: 679-698
Issue: 5
Volume: 36
Year: 2024
Month: 07
X-DOI: 10.1080/09546553.2023.2189966
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2189966
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:5:p:679-698

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2190413_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: James Khalil
Author-X-Name-First: James
Author-X-Name-Last: Khalil
Author-Name: Lorne L. Dawson
Author-X-Name-First: Lorne L.
Author-X-Name-Last: Dawson
Title: Understanding Involvement in Terrorism and Violent Extremism: Theoretical Integration through the ABC Model
Abstract: 
 Scholars seeking to understand why individuals become involved in terrorism and violent extremism rely on a multitude of theoretical frameworks. While these are commonly interpreted as being in antagonistic opposition, the core premise of this article is that further advances in our understanding of this violence are contingent upon us treating them as complementary. Limiting ourselves to three frameworks that are perhaps most in tension, we survey the core premises of the rational choice perspective (RCP), the social identity perspective (SIP), and the ideological perspective (IP), identifying opportunities for theoretical integration. We argue that individuals are driven to involvement in this violence by both personal rewards and collective objectives, making both the RCP and SIP frameworks indispensable. We also conclude that SIP interpretations are incomplete without the IP, as ideologies play a pivotal role in constructing and amplifying ingroup and outgroup identities. The RCP is also deficient in the absence of the IP as many rewards that motivate involvement can only be understood through reference to the ideational context in which they are conferred. Systematic recognition and application of this theoretical complementarity is facilitated, we further argue, by the Attitudes-Behaviors Corrective (ABC) Model, which we apply as a heuristic device throughout the article.
Journal: Terrorism and Political Violence
Pages: 757-772
Issue: 6
Volume: 36
Year: 2024
Month: 08
X-DOI: 10.1080/09546553.2023.2190413
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2190413
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:6:p:757-772



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2214238_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kristin Alve Glad
Author-X-Name-First: Kristin Alve
Author-X-Name-Last: Glad
Author-Name: Grete Dyb
Author-X-Name-First: Grete
Author-X-Name-Last: Dyb
Author-Name: Per Hellevik
Author-X-Name-First: Per
Author-X-Name-Last: Hellevik
Author-Name: Hilde Michelsen
Author-X-Name-First: Hilde
Author-X-Name-Last: Michelsen
Author-Name: Synne Øien Stensland
Author-X-Name-First: Synne
Author-X-Name-Last: Øien Stensland
Title: “I Wish You Had Died on Utøya”: Terrorist Attack Survivors’ Personal Experiences with Hate Speech and Threats
Abstract: 
 We aimed to explore how many of the politically active, highly media-exposed, young survivors of the terrorist attack on Utøya island, Norway, have had personal experiences with hate speech and threats post-terror. Further, we aimed to examine the nature of these experiences, and the impact and consequences they have had for the directly affected. Approximately 8.5 years after the politically motivated terrorist attack on Utøya island in 2011, 289 survivors (51.2 percent females, M age = 27.7, SD = 4.6) were interviewed about their personal experiences with hate speech and threats. Responses were systematically analyzed using thematic analysis. In total, ninety-nine participants (34 percent) had experienced hate speech and/or threats post-terror, of whom a majority believed that this was related to their status as a survivor of the attack. Thematically, the hate/threats mainly revolved around wishes that the survivors had died in the attack, death threats, support for the terrorist, severe accusations related to the attack, and conspiracy theories. This had affected the survivors both emotionally (e.g., inducing fear and anger, but also robustness) and behaviorally (e.g., social and political withdrawal). Immediate measures and long-term strategies need to be developed to mitigate the personal harm and threat to democracy that experiences with hate speech/threats may cause.
Journal: Terrorism and Political Violence
Pages: 834-850
Issue: 6
Volume: 36
Year: 2024
Month: 08
X-DOI: 10.1080/09546553.2023.2214238
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2214238
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:6:p:834-850



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2189972_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Austin C. Doctor
Author-X-Name-First: Austin C.
Author-X-Name-Last: Doctor
Author-Name: Samuel T. Hunter
Author-X-Name-First: Samuel T.
Author-X-Name-Last: Hunter
Author-Name: Gina S. Ligon
Author-X-Name-First: Gina S.
Author-X-Name-Last: Ligon
Title: Militant Leadership and Terrorism in Armed Conflict
Abstract: 
 The lethality and the frequency of terrorist attacks conducted by militant organizations vary considerably. Some militants perpetrate extreme and systemic levels of terrorist violence, some only do so occasionally, and others never conduct terror operations. To predict group-level differences in this outcome, we draw on conceptual frameworks in the political science and psychology fields to argue that prior military experience shapes leaders’ willingness to engage in terrorist violence. But not all experiences are created equal. We argue that formal experiences such as those associated with military training serve as a restricting influence on terrorist violence, while less formal and less structured experiences such as time in active combat are associated with increases in future terrorist violence. Using new data on the individual backgrounds of militant leaders active between 1989 and 2013, we find support for our hypotheses. This study contributes to the academic literature by bringing the leader back into explanations of wartime terrorist activity. Our findings also carry notable policy implications for policy makers, warfighters, and counterterrorism practitioners.
Journal: Terrorism and Political Violence
Pages: 740-756
Issue: 6
Volume: 36
Year: 2024
Month: 08
X-DOI: 10.1080/09546553.2023.2189972
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2189972
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:6:p:740-756



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2189970_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dominique Vink
Author-X-Name-First: Dominique
Author-X-Name-Last: Vink
Author-Name: Tahir Abbas
Author-X-Name-First: Tahir
Author-X-Name-Last: Abbas
Author-Name: Yannick Veilleux-Lepage
Author-X-Name-First: Yannick
Author-X-Name-Last: Veilleux-Lepage
Author-Name: Richard McNeil-Willson
Author-X-Name-First: Richard
Author-X-Name-Last: McNeil-Willson
Title: “Because They Are Women in a Man’s World”: A Critical Discourse Analysis of Incel Violent Extremists and the Stories They Tell
Abstract: 
 This study is a critical discourse analysis of the misogynistic narratives shared by three incel violent extremists: Elliot Rodger, Alek Minassian, and Scott Beierle. Utilizing Kate Manne’s give/take model, which suggests a wider cultural pattern of misogyny serving to uphold patriarchy, this study finds that incel men expect women to provide feminine-coded services while men are entitled to assume masculine-coded privileges. Feminine-coded services that “she” is expected to provide to “him” are emotional, social, and reproductive. As incels assume masculine-coded privileges related to authority, power, and status, “she will give” and “he will take”; otherwise, “she will be punished.”
Journal: Terrorism and Political Violence
Pages: 723-739
Issue: 6
Volume: 36
Year: 2024
Month: 08
X-DOI: 10.1080/09546553.2023.2189970
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2189970
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:6:p:723-739



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2204030_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Neil Shortland
Author-X-Name-First: Neil
Author-X-Name-Last: Shortland
Title: Watching Murder: ISIS, Death Videos and Radicalization
Journal: Terrorism and Political Violence
Pages: 851-852
Issue: 6
Volume: 36
Year: 2024
Month: 08
X-DOI: 10.1080/09546553.2023.2204030
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2204030
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:6:p:851-852



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2202779_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Samuel Miller
Author-X-Name-First: Samuel
Author-X-Name-Last: Miller
Title: Supreme Gentlemen: The Path of Radicalization for the Incel Community’s Lone Wolves
Abstract: 
 Several men committed mass violence in the past decade because they believed women were denying them the sex they felt they deserved. In the wake of their attacks, investigators found references to an online community known as Incels in their manifestoes and social media posts. Members of this community typically adhere to misogynistic beliefs that deny women their autonomy, deride sexually active men, and condone violence against both. Using Hamm and Spaaij’s lone-wolf radicalization model, this article argues that the most violent members of the Incel community engaged in lone-wolf terrorism based upon their grievances with women. Furthermore, this article suggests that the influential impact of misogyny as a political element can contribute to lone-wolf terrorism. Accounting for these aspects will require modifications to the radicalization model that include factors such as domestic violence and misogyny.
Journal: Terrorism and Political Violence
Pages: 818-833
Issue: 6
Volume: 36
Year: 2024
Month: 08
X-DOI: 10.1080/09546553.2023.2202779
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2202779
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:6:p:818-833



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2198608_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jennifer Dowling
Author-X-Name-First: Jennifer
Author-X-Name-Last: Dowling
Title: Pulling the Brakes on Political Violence: How Internal Brakes Limited Violent Escalation from the Provisional IRA in Pre- and Post-Good Friday Northern Ireland
Abstract: 
 Under what circumstances do paramilitary groups place limits on their use of political violence? This article considers why one of the most prominent paramilitary groups active during the “Troubles” in Northern Ireland, the Provisional IRA (PIRA), exercised restraint and limited their use of political violence, both in the lead up to, and in the wake of the Good Friday Agreement. It applies Busher, Holbrook, and Macklin’s “internal brakes” typology to understand why despite the PIRA’s proven capacity to sustain a campaign of armed violence for more than thirty years, they reined in on paramilitarism during the 1990s peace process. Through the lens of various brakes, the analysis identifies seven developments that were particularly salient in limiting the PIRA’s use of armed violence. These developments included: a weakened capacity to continue their armed campaign, waning popular support, an opening of political opportunities, the need to maintain ties with strategically important non-violent allies, the gradual softening of out-group boundaries, the decommissioning process, as well as the creation of spaces for non-violent activism within the wider movement. This study’s findings contribute to the scholarly debate on understanding how militant groups manage the parameters of their violence, highlighting several factors that may mitigate the risk of extremist views escalating to political violence.
Journal: Terrorism and Political Violence
Pages: 773-789
Issue: 6
Volume: 36
Year: 2024
Month: 08
X-DOI: 10.1080/09546553.2023.2198608
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2198608
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:6:p:773-789



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2199873_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Zacharias Pieri
Author-X-Name-First: Zacharias
Author-X-Name-Last: Pieri
Author-Name: Mary-Jane Fox
Author-X-Name-First: Mary-Jane
Author-X-Name-Last: Fox
Author-Name: Lily Lousada
Author-X-Name-First: Lily
Author-X-Name-Last: Lousada
Author-Name: Jacob Zenn
Author-X-Name-First: Jacob
Author-X-Name-Last: Zenn
Title: Boko Haram’s Child Soldiers: Media Mujahids, Martyrs, and Militants
Abstract: 
 This article investigates the lived experiences and roles of children under Boko Haram’s two factions. Unlike case studies of Islamic State “cubs,” children in Boko Haram have been neglected in the literature. Filling that gap, this article analyzes more than thirty videos and photograph sets from the two factions. Visual ethnography is utilized to examine material depicting children in both “staged” and “unstaged” roles in Boko Haram, and in ways to maximize impacts on viewers. The four main activities of the children in videos and photographs include combat and training with weapons as well as participating in Islamic education; gathering for prayer; using technology to create media content, including filming battles; and, in the case of the Chibok schoolgirls, being filmed as hostages or, eventually, as loyal members. The videos of the Chibok girls also reveal how children are gendered in Boko Haram. Child soldiers is an issue at the forefront of the paper’s framing. Given the depictions of children in our data, we move beyond labeling child soldiers as all those under eighteen and differentiate between those under fifteen and those between fifteen and eighteen years old.
Journal: Terrorism and Political Violence
Pages: 790-817
Issue: 6
Volume: 36
Year: 2024
Month: 08
X-DOI: 10.1080/09546553.2023.2199873
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2199873
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:6:p:790-817

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2215348_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Adrian Cherney
Author-X-Name-First: Adrian
Author-X-Name-Last: Cherney
Author-Name: Daniel Koehler
Author-X-Name-First: Daniel
Author-X-Name-Last: Koehler
Title: What Does Sustained Desistance from Violent Extremism Entail: A Proposed Theory of Change and Policy Implications
Abstract: 
 While much is known about factors associated with deradicalisation and disengagement from violent extremism and terrorism, the underlying mechanisms at play have been under theorised. Literature on criminal desistance has a lot to offer in understanding the process of exiting from extremism, particularly in how it proceeds, the mechanisms at play and why it may or may not be sustained—what we term as the sustainability problem. We draw on criminal desistance scholarship to theoretically unpack the change processes underpinning desistance from extremism and why it is a challenging process for individuals. We propose a theory of cognitive transformation and explore the role of agentic change and external influences on the sustainability of desistance. We link our proposed theory of change to practical implications relating to the role of formal agents and how desistance from extremism can be supported, undermined, and assessed as authentic. Limitations with the theory of change are considered, as well directions for future research.
Journal: Terrorism and Political Violence
Pages: 871-886
Issue: 7
Volume: 36
Year: 2024
Month: 10
X-DOI: 10.1080/09546553.2023.2215348
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2215348
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:7:p:871-886



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2291315_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tim Wilson
Author-X-Name-First: Tim
Author-X-Name-Last: Wilson
Title: Fighting Terror After Napoleon: How Europe Became Secure After 1815
Journal: Terrorism and Political Violence
Pages: 982-983
Issue: 7
Volume: 36
Year: 2024
Month: 10
X-DOI: 10.1080/09546553.2023.2291315
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2291315
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:7:p:982-983



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2222810_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Chris Chinda
Author-X-Name-First: Chris
Author-X-Name-Last: Chinda
Author-Name: Cigdem Unal
Author-X-Name-First: Cigdem
Author-X-Name-Last: Unal
Author-Name: Zoe Marchment
Author-X-Name-First: Zoe
Author-X-Name-Last: Marchment
Author-Name: Paul Gill
Author-X-Name-First: Paul
Author-X-Name-Last: Gill
Title: The Impact of Public Holidays on Insurgent Attacks: The Case of Thailand
Abstract: 
 This paper analyzes Malay-Muslim insurgents’ attacks in the three southern provinces of Thailand between the years of 2010–2021 and identifies the role of public holidays on the level of violence. The existing literature suggests terrorists consider holidays during attack planning. However, there is a lack of agreement on the effect direction. Some studies have found that holidays are a force for peace while others have found they can act as trigger for more violence. Applying environmental criminology to the timing of terrorist attacks, we argue that the type of the holiday matters. Therefore, we analyze public (secular), Islamic, and Buddhist holidays separately. We show that Islamic holidays witness increased violence while Buddhist and public holidays see reductions. We discuss that Islamic holidays increase the Malay-Muslim insurgents’ motivation to attack by assigning to those dates a higher symbolic value. On the other hand, on Buddhist and public holidays, insurgents may hesitate to attack to avoid the adverse effects of losing public support and triggering a backlash. The results demonstrate the necessity to analyze the temporal dynamics of terrorist attacks.
Journal: Terrorism and Political Violence
Pages: 903-918
Issue: 7
Volume: 36
Year: 2024
Month: 10
X-DOI: 10.1080/09546553.2023.2222810
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2222810
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:7:p:903-918



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2236222_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Julia Ebner
Author-X-Name-First: Julia
Author-X-Name-Last: Ebner
Author-Name: Christopher Kavanagh
Author-X-Name-First: Christopher
Author-X-Name-Last: Kavanagh
Author-Name: Harvey Whitehouse
Author-X-Name-First: Harvey
Author-X-Name-Last: Whitehouse
Title: Assessing Violence Risk among Far-Right Extremists: A New Role for Natural Language Processing
Abstract: 
 A growing body of research suggests that an individual’s willingness to fight and die for groups is rooted in the fusion of personal and group identities, especially when the group is threatened, violence is condoned, and the group’s enemies are dehumanised or demonised. Here we consider whether the language used by extremists can help with early detection of these risk factors associated with violent extremism. We applied a new fusion-based linguistic violence risk assessment framework to a range of far-right extremist online groups from across the violence spectrum. We conducted an R-based NLP analysis to produce a Violence Risk Index, integrating statistically significant linguistic markers of terrorist manifestos as opposed to non-violent communiqués into one weighted risk assessment score for each group. The language-based violence risk scores for the far-right extremist groups were then compared to those of non-extremist control groups. We complemented our quantitative NLP analysis with qualitative insights that contextualise the violence markers detected in each group. Our results show that the fusion markers combined with several other variables identified across the different online datasets are indeed indicative of the real-world violence level associated with the relevant groups, pointing to new ways of detecting and preventing violent terrorism.
Journal: Terrorism and Political Violence
Pages: 944-961
Issue: 7
Volume: 36
Year: 2024
Month: 10
X-DOI: 10.1080/09546553.2023.2236222
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2236222
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:7:p:944-961



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2236230_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sophia Moskalenko
Author-X-Name-First: Sophia
Author-X-Name-Last: Moskalenko
Author-Name: Tomislav Pavlović
Author-X-Name-First: Tomislav
Author-X-Name-Last: Pavlović
Author-Name: Brett Burton
Author-X-Name-First: Brett
Author-X-Name-Last: Burton
Title: QAnon Beliefs, Political Radicalization and Support for January 6th Insurrection: A Gendered Perspective
Abstract: 
 This study measured political radicalization and support for the January 6th riot alongside a measure of QAnon conspiracy beliefs in an online survey of 429 U.S.-based participants. The study aimed to investigate how conspiracy theories associated with the QAnon movement relate to support for the January 6th Capitol Hill riot and political radicalization, as well as explore the contribution of the Big 5 personality traits. Additionally, the study explored the gender dimension of QAnon-related radicalization. Belief in QAnon conspiracy theories correlated with intentions for radical political action, and with support for the January 6th insurrection. Agreeableness negatively correlated with QAnon beliefs. In our sample, more women reported believing QAnon conspiracy theories, and their average endorsement of QAnon conspiracies was higher than that of men. In women in our study, support for January 6th riot was positively related to Openness to Experiences, and activism and radicalism were positively related to extraversion; these relationships were reversed among men. These gender differences suggest a different psychology underlying QAnon’s appeal for men versus women, and radicalization stemming from beliefs in QAnon conspiracy theories.
Journal: Terrorism and Political Violence
Pages: 962-981
Issue: 7
Volume: 36
Year: 2024
Month: 10
X-DOI: 10.1080/09546553.2023.2236230
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2236230
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:7:p:962-981



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2217930_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jonathan Fox
Author-X-Name-First: Jonathan
Author-X-Name-Last: Fox
Author-Name: Meirav Mishali-Ram
Author-X-Name-First: Meirav
Author-X-Name-Last: Mishali-Ram
Author-Name: Ariel Zellman
Author-X-Name-First: Ariel
Author-X-Name-Last: Zellman
Author-Name: Matthias Basedau
Author-X-Name-First: Matthias
Author-X-Name-Last: Basedau
Title: Mobilizing for Jihad: How Political Exclusion and Organized Protest Contribute to Foreign Fighter Outflows
Abstract: 
 This article adds to a growing literature explaining driving forces behind Muslim foreign fighters in Jihadist conflicts. Employing quantitative analyses, we examine counts of Muslim foreign fighters from non-Muslim majority countries in Iraq and Syria from 2011 to 2015. We find that greater numbers of foreign fighters come from countries where Muslim minorities are politically organized, excluded from policymaking processes, and engaged in peaceful mobilization than countries where these conditions are otherwise absent. These results contribute to a more nuanced understanding of the mechanisms by which aggrieved individuals tend to be recruited in larger numbers to participate in foreign wars.
Journal: Terrorism and Political Violence
Pages: 887-902
Issue: 7
Volume: 36
Year: 2024
Month: 10
X-DOI: 10.1080/09546553.2023.2217930
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2217930
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:7:p:887-902



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2223694_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ariel Koch
Author-X-Name-First: Ariel
Author-X-Name-Last: Koch
Author-Name: Karine Nahon
Author-X-Name-First: Karine
Author-X-Name-Last: Nahon
Author-Name: Assaf Moghadam
Author-X-Name-First: Assaf
Author-X-Name-Last: Moghadam
Title: White Jihad: How White Supremacists Adopt Jihadi Narratives, Aesthetics, and Tactics
Abstract: 
 This article explores the growing trend of “white jihad” by examining how white supremacists have incorporated jihadi language, motifs, and tactics into their ecosystem. Using observation and content analysis of various primary sources associated with the neo-Nazi movement, we highlight the core issues and themes around which the two movements have coalesced; identify key facilitating actors who have advanced the convergence of elements of the far right and the jihadist movements; and identify operational threats that emanate from this cross-ideological encounter.
Journal: Terrorism and Political Violence
Pages: 919-943
Issue: 7
Volume: 36
Year: 2024
Month: 10
X-DOI: 10.1080/09546553.2023.2223694
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2223694
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:7:p:919-943



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2214240_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Martin Laryš
Author-X-Name-First: Martin
Author-X-Name-Last: Laryš
Title: “White Jihad” and “White Sharia”: Jihadism as an Instrument of Intra-Extremist Outbidding among Right-Wing Extremists
Abstract: 
 Militant right-wing extremists frequently victimize Islam and Muslims, who are denigrated as violent criminals and terrorists. Muslim immigrants are primary targets of hate crimes committed by right-wing extremists. Surprisingly and counter-intuitively, some right-wing extremists admire jihadists and seek inspiration from jihadism. The extant literature explains it by focusing on the ideological overlapping, fusion, and fluidity between various extremist beliefs. However, such concepts fail to explain why some right-wing extremists endorse jihadi propaganda and violence while others do not. The article introduces the concept of intra-extremist outbidding—borrowing concepts and imageries from diametrically opposed types of extremism and belief systems to outbid competing groups from their own milieu—as a valuable explanation of why some most extreme right-wing groups compete for devoted membership by endorsing jihadi violence and jihadism.
Journal: Terrorism and Political Violence
Pages: 853-870
Issue: 7
Volume: 36
Year: 2024
Month: 10
X-DOI: 10.1080/09546553.2023.2214240
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2214240
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:7:p:853-870

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2243349_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Isgard Ohls
Author-X-Name-First: Isgard
Author-X-Name-Last: Ohls
Author-Name: Diba S. Hosseini
Author-X-Name-First: Diba S.
Author-X-Name-Last: Hosseini
Author-Name: Aleksandra Spasojevic
Author-X-Name-First: Aleksandra
Author-X-Name-Last: Spasojevic
Author-Name: Felix Brandes
Author-X-Name-First: Felix
Author-X-Name-Last: Brandes
Author-Name: Rashid Bajwa
Author-X-Name-First: Rashid
Author-X-Name-Last: Bajwa
Author-Name: Kaser Ahmed
Author-X-Name-First: Kaser
Author-X-Name-Last: Ahmed
Author-Name: Jürgen Gallinat
Author-X-Name-First: Jürgen
Author-X-Name-Last: Gallinat
Author-Name: Anne Karow
Author-X-Name-First: Anne
Author-X-Name-Last: Karow
Author-Name: Marc Allroggen
Author-X-Name-First: Marc
Author-X-Name-Last: Allroggen
Title: A Systematic Review of the Risk and Protective Factors for Processes Associated with Islamist Radicalization and Extremism
Abstract: 
 Islamist radicalization is a global phenomenon and is currently a major subject of concern. Our objective is to systematically review the literature for evidence exploring risk and protective factors for and against Islamist radicalization. The following databases PsycINFO, Web of Science, Embase, PubMed and Google Scholar (complementary research) were systematically searched for English and WISO for German papers. The results of the review lend support to the notion that accumulated risk factors in the absence of protective factors may accelerate the process of Islamist radicalization. Consensus is increasing in respect to the empirical evidence that there is neither a typical set of characteristics nor a specific personality profile those individuals who come to islamistically radicalize share. Despite this heterogeneity, the current review captures eight domains of risk and protective factors for Islamist radicalization.
Journal: Terrorism and Political Violence
Pages: 1027-1047
Issue: 8
Volume: 36
Year: 2024
Month: 11
X-DOI: 10.1080/09546553.2023.2243349
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2243349
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:8:p:1027-1047



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2252104_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Emine Arı
Author-X-Name-First: Emine
Author-X-Name-Last: Arı
Author-Name: ReÅŸat Bayer
Author-X-Name-First: ReÅŸat
Author-X-Name-Last: Bayer
Author-Name: Özge Kemahlıoğlu
Author-X-Name-First: Özge
Author-X-Name-Last: Kemahlıoğlu
Title: Breaking the Bank: Effects of Domestic Conflict on the Banking Sector in Turkey
Abstract: 
 Although banks occupy a central role in most (post-)conflict situations, there is a perplexing lack of attention to them in studies of political violence. As a case experiencing domestic conflict with varying degrees in the last decades, Turkey offers opportunities to understand how the banking sector, including state deposit banks, responds to such political violence. We focus on the short-term impact of political violence and address the following questions: Do all actors in the sector respond in similar ways to security threats? Is there variation according to conflict intensity? We shed light on these puzzles with an analysis of original data on bank ownership, bank branches, bank deposit amounts, and bank credits. We show that banks with profit incentives respond to conflict by lowering their presence in provinces hit by these attacks. In comparison, our finding that deposits in high conflict intensity areas are not affected suggests that it is indeed economic actors outside high intensity regions that are more sensitive to short-time changes in security compared to local ones. Overall, the results demonstrate that political violence hurts banks’ presence in conflict locations and their presence matters through credit provision to these areas.
Journal: Terrorism and Political Violence
Pages: 1083-1104
Issue: 8
Volume: 36
Year: 2024
Month: 11
X-DOI: 10.1080/09546553.2023.2252104
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2252104
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:8:p:1083-1104



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2291327_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Shaun McDaid
Author-X-Name-First: Shaun
Author-X-Name-Last: McDaid
Title: Foreign Fighters in Ukraine: The Brown-Red Cocktail
Journal: Terrorism and Political Violence
Pages: 1127-1128
Issue: 8
Volume: 36
Year: 2024
Month: 11
X-DOI: 10.1080/09546553.2023.2291327
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2291327
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:8:p:1127-1128



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2240446_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael C. Zeller
Author-X-Name-First: Michael C.
Author-X-Name-Last: Zeller
Author-Name: Michael Vaughan
Author-X-Name-First: Michael
Author-X-Name-Last: Vaughan
Title: Proscribing Right-Wing Extremist Organizations in Europe: Variations, Trends, and Prospects
Abstract: 
 Among the legal instruments that address organized right-wing extremism in Europe, proscription is one of the most severe. Yet there is scant comparative work on where, how frequently, and against which right-wing extremist organization proscriptions have been applied. This article presents a new dataset on Proscribed Right-wing Extremist Organizations (PREOs) in Europe. A typology of countries’ proscriptive regimes illuminates how proscription by executive decrees is more frequent than proscription by judicial ruling, and how proscription by executive decrees appears to be more responsive to high-profile incidents of extremist violence. We complement this descriptive overview with a close investigation of patterns in Germany, the state that has most frequently used proscription against right-wing extremist organizations. Furthermore, the article presents paired case studies of the proscriptions of Blood & Honour in Germany (by executive decree) and the Nordic Resistance Movement in Finland (by judicial ruling), which point to the causal factors underlying proscription of right-wing extremist organizations.
Journal: Terrorism and Political Violence
Pages: 985-1007
Issue: 8
Volume: 36
Year: 2024
Month: 11
X-DOI: 10.1080/09546553.2023.2240446
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2240446
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:8:p:985-1007



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2244083_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Krona
Author-X-Name-First: Michael
Author-X-Name-Last: Krona
Author-Name: Olivia Caskey
Author-X-Name-First: Olivia
Author-X-Name-Last: Caskey
Title: The Gangster and the Bride: The Media Representation of Masculinity and Femininity in News Coverage of Jihadi Terrorists
Abstract: 
 When European nationals left to join Islamic State, the media extensively reported on many of these individuals. Women’s news coverage had a recurrent narrative—the “jihadi bride.” Academic research has strived to analyse the nature of this coverage, effectively critiquing the narrative. Male jihadists have received limited attention in research on the roles of gender and media. This article seeks to contribute to a gap in knowledge concerning the comparative aspects of gendered representations by evaluating the differences between male and female news media coverage of two high-profile cases: the British woman Shamima Begum and the German man Denis Cuspert. Key findings show that Begum is primarily framed as a reject of British society and a “doubly deviant” woman. Cuspert is portrayed as radical, charismatic, active, and influential over youth. While aligning with previous research on gendered media tropes, this study advances knowledge by demonstrating how each individual’s framing does not merely emphasise gendered personality traits but also connects to broader societal and political factors in domestic contemporary cultural settings.
Journal: Terrorism and Political Violence
Pages: 1048-1063
Issue: 8
Volume: 36
Year: 2024
Month: 11
X-DOI: 10.1080/09546553.2023.2244083
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2244083
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:8:p:1048-1063



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2252917_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ilayda B. Onder
Author-X-Name-First: Ilayda B.
Author-X-Name-Last: Onder
Title: Target Hardening and Non-State Armed Groups’ Target Selection: Evidence from India
Abstract: 
 This study explores the variation in the non-state armed group (NSAGs)'s behavior concerning target selection. Scholars of transnational terrorism have investigated transnational NSAGs' target selection. However, we are still missing out on the most common form of terrorism, terrorism perpetrated by domestic NSAGs involved in civil conflicts. This paper’s novel contribution is to the understanding of domestic NSAGs’ strategic logic. I argue that hardening makes soft targets, including civilians, attractive targets when hard targets are no longer attractive. NSAGs tactically adapt to hardening by switching to soft targets or by displacing attacks to adjacent locations within their home country. The empirical results from data on relevant state-group dyads in India between 2004–2016 show that domestic NSAGs (1) switch to soft targets when faced with hardening, (2) less frequently target soft targets when more of their attacks against hard targets have been logistically successful, and (3) commit more attacks in their primary area of operation when more of their attacks in that location have been logistically successful. These findings emphasize a variety of ways through which domestic NSAGs adapt their tactics and underscore potential costs for target hardening.
Journal: Terrorism and Political Violence
Pages: 1105-1126
Issue: 8
Volume: 36
Year: 2024
Month: 11
X-DOI: 10.1080/09546553.2023.2252917
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2252917
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:8:p:1105-1126



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2248269_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Caroline Da Silva
Author-X-Name-First: Caroline
Author-X-Name-Last: Da Silva
Author-Name: Nicolas Amadio
Author-X-Name-First: Nicolas
Author-X-Name-Last: Amadio
Author-Name: Rachel Sarg
Author-X-Name-First: Rachel
Author-X-Name-Last: Sarg
Author-Name: Bruno Domingo
Author-X-Name-First: Bruno
Author-X-Name-Last: Domingo
Author-Name: Massil Benbouriche
Author-X-Name-First: Massil
Author-X-Name-Last: Benbouriche
Title: A Decade of Media Coverage of the Social Reintegration of Terrorism-Related Convicts: France as a Case Study
Abstract: 
 The social reintegration of terrorism-related convicts in Europe is a pressing issue. Public opinion can play an essential role in this by making it easier or more difficult to implement (and succeed with) social reintegration strategies. Considering the media’s influence on shaping public opinions, attitudes, and social representations, the present research offers a case study by reviewing a decade (2011–2022) of media coverage of the social reintegration of terrorism-related convicts in the seven most read national daily newspapers in France. Results reveal that the topic is very little covered, with 395 newspaper articles published over a decade, and mostly discussing deradicalization, specifically, rather than social reintegration at large. Cluster analysis via Reinert’s method reveals that when the topic is discussed it revolves around political and security management (political discourse and security measures), target population (radical Muslims and returnees), and tertiary prevention programs (programs in prison and open settings). A time series analysis of clusters shows their chronological evolution. These findings and their implications for generating (mis)trust in the social reintegration of terrorism-related convicts amongst the general public are discussed.
Journal: Terrorism and Political Violence
Pages: 1064-1082
Issue: 8
Volume: 36
Year: 2024
Month: 11
X-DOI: 10.1080/09546553.2023.2248269
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2248269
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:8:p:1064-1082



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2242511_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Elad Ben-Dror
Author-X-Name-First: Elad
Author-X-Name-Last: Ben-Dror
Author-Name: Netanel Flamer
Author-X-Name-First: Netanel
Author-X-Name-Last: Flamer
Title: Missing the Spoiler: Israel’s Policy with Regard to Hamas during the Oslo Talks and the First Stages of the Implementation of the Oslo Accords
Abstract: 
 The article examines how Israel related to the threat that Hamas posed to the peace process, both during the talks that led to the signing of the Declaration of Principles (December 1992–September 1993) and then until the signing of the Oslo 2 agreement (September 1995). The Israeli negotiators and leaders were locked into the idea that the PLO would “deal with Hamas” because of its clear interest to do so. During the talks, however, there was no detailed discussion of the matter. Instead, the negotiators focused—and with full justification—on the important achievement of an accord with the PLO and its agreement to refrain from terrorism. This, reinforced by the assumption that the PLO would suppress Hamas, paved the way for the signing of the Declaration of Principles without any concrete attention to Hamas. Thus Hamas terrorism proved to be a major obstacle to the fulfillment of the Oslo Accords. Hamas bomb attacks killed many Israelis and undermined Israelis’ faith in the process. In parallel, the IDF activity to thwart Hamas, which involved major operations on the ground, as well as the accords’ failure to produce an economic upturn for the Palestinians, diminished their support for the agreement.
Journal: Terrorism and Political Violence
Pages: 1008-1026
Issue: 8
Volume: 36
Year: 2024
Month: 11
X-DOI: 10.1080/09546553.2023.2242511
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2242511
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:36:y:2024:i:8:p:1008-1026

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2259506_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Oldrich Bures
Author-X-Name-First: Oldrich
Author-X-Name-Last: Bures
Author-Name: Alexandr Burilkov
Author-X-Name-First: Alexandr
Author-X-Name-Last: Burilkov
Title: Armed to Kill: A Cross-Sectional Analysis Examining the Links between Firearms Availability, Gun Control, and Terrorism Using the Global Terrorism Database and the Small Arms Survey
Abstract: 
 According to the Global Terrorism Database, the use of firearms in terrorist attacks has been on the rise, and firearms-based attacks are the most lethal. In the aftermath of mass-casualty attacks perpetrated with firearms, policymakers across the world advocate tightened gun control to restrict terrorists’ access to both licit and illicit guns. However, academic research on the linkages between firearms availability, gun control legislation, and terrorism is scarce. This study fills this research gap by conducting a systematic cross-sectional analysis of the linkage between gun control, licit and illicit stocks of firearms, and terrorist attacks in 2015–2019, based on a novel dataset incorporating the Global Terrorism Database and the Small Arms Survey. Our estimation using OLS regression shows a strong relationship between the availability of firearms and the incidence of gun-based terrorism, especially for lone wolf attacks. Furthermore, terrorists in stable, democratic countries are comparatively more likely to select firearms as their weapon of choice. Conversely, strict gun control only slightly alleviates the overall risk of terrorism in stable countries but does not impact weapon selection. In unstable countries in the grip of intrastate conflict, gun control significantly reduces lone wolf-style attacks, while organized multi-perpetrator attacks are not deterred.
Journal: Terrorism and Political Violence
Pages: 41-55
Issue: 1
Volume: 37
Year: 2025
Month: 01
X-DOI: 10.1080/09546553.2023.2259506
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2259506
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:37:y:2025:i:1:p:41-55



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2275055_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David Malet
Author-X-Name-First: David
Author-X-Name-Last: Malet
Author-Name: Joshua Farrell-Molloy
Author-X-Name-First: Joshua
Author-X-Name-Last: Farrell-Molloy
Author-Name: Joseph Young
Author-X-Name-First: Joseph
Author-X-Name-Last: Young
Title: Foreign Fighter Mobilization: YPG Volunteers in Their Own Words
Abstract: 
 This article presents data from interviews with eighteen individuals from Western countries who volunteered to fight in Syria with the Kurdish YPG against the Islamic State. We find that, despite predictions in the literature about ideological or religious indoctrination as the primary factor motivating foreign fighter mobilization, respondents described their decisions to join YPG determined by two individual-level factors: The first was precipitating new information, such as viewing war crimes videos, which was an emotional tipping point for volunteers already interested in the conflict. The second factor was the preconditions, or permissive conditions, that permitted them to leave their home countries, such as the end of a lease. The data adds richness to models of militant activity by indicating that it may not be a linear transmissive process but one that is dependent on the alignment of variables specific to the subject.
Journal: Terrorism and Political Violence
Pages: 93-110
Issue: 1
Volume: 37
Year: 2025
Month: 01
X-DOI: 10.1080/09546553.2023.2275055
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2275055
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:37:y:2025:i:1:p:93-110



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2275058_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Hanna Paalgard Munden
Author-X-Name-First: Hanna Paalgard
Author-X-Name-Last: Munden
Title: Cognitive Distortions in Men Who Have Exited White Supremacist Groups
Abstract: 
 Despite reports of longterm cognitive and emotional difficulties after exiting right-wing extremist groups, the latter stages of the extremist group member’s trajectory have been given little attention.1 This paper argues that clinical psychological theory has been underutilised in terrorism and extremism research in general, and, more specifically, that it can make a significant contribution to the understanding of the development and maintenance of unhelpful thinking that can hamper and prolong the reintegration process. The empirical data presented consists of sixteen life-history interviews and one group interview with three men who were former members of white supremacist groups. By applying codebook thematic analysis, five automatic cognitive distortions that developed during group membership and persisted after leaving were identified. These distortions offer a clinical explanation for the unwanted negative and automatic group-related cognitions and concomitant emotions that continue long after leaving. It is argued that CVE interventions should be informed by a recognition of the ways in which cognitive distortions can negatively affect the exit process.
Journal: Terrorism and Political Violence
Pages: 136-151
Issue: 1
Volume: 37
Year: 2025
Month: 01
X-DOI: 10.1080/09546553.2023.2275058
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2275058
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:37:y:2025:i:1:p:136-151



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2256399_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sambuddha Ghatak
Author-X-Name-First: Sambuddha
Author-X-Name-Last: Ghatak
Title: Taming the Beast: Democratic Institutions and Terrorist Groups’ Involvement in Civil War
Abstract: 
 Most scholarly literature explores the relationship between regime type and terrorism, while little attention has been paid to the influence of regime on terrorist groups’ decision to engage in civil war. This paper argues that the onset of civil war involving terrorist organizations is conditioned by regime type. Democratic regimes create conditions that prevent the onset of civil war involving terrorist organizations, although similar regimes might provide the opportunities for such groups to emerge in the first place. The pacifying effect of democracy on terrorist organizations’ decision-making calculus is, however, mediated through a set of democratic institutions. Empirical tests on a global dataset of terrorist organizations show that democratic institutions such as political rights, repression (lack of), rule of law, civil liberties and high state capacity indeed mediate the effects of a democratic regime in lowering the likelihood of civil war onset involving terrorist organizations.
Journal: Terrorism and Political Violence
Pages: 19-40
Issue: 1
Volume: 37
Year: 2025
Month: 01
X-DOI: 10.1080/09546553.2023.2256399
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2256399
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:37:y:2025:i:1:p:19-40



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2259992_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Todd Sandler
Author-X-Name-First: Todd
Author-X-Name-Last: Sandler
Title: An Economic Perspective on Terrorism and Counterterrorism
Abstract: 
 This occasional-series paper offers an economic perspective on the study of terrorism and counterterrorism. At the outset, the paper identifies how the economic perspective enriches terrorism analysis by stressing rational choice of myriad agents (e.g., the terrorist groups, their supporters, and targeted governments) subject to constraints. Game-theoretic strategic rational choice allows allied and adversarial agents to incorporate the responses of others into their interdependent choices. Economists’ theoretical paradigms are judged by their success in predicting agents’ behavior and informing effective policies. Since 9/11, many political scientists, operation researchers, sociologists, and others applied economic methods to their study of terrorism. To illustrate selected applications of the economic approach, the paper considers findings from economic studies on bargaining and making concessions during hostage incidents, judging the effectiveness of counterterrorism strategies, identifying the economic consequences of terrorism, and finding adequate identification strategies in empirical studies. Future directions and some shortcomings of the economic approach complete the study.
Journal: Terrorism and Political Violence
Pages: 56-72
Issue: 1
Volume: 37
Year: 2025
Month: 01
X-DOI: 10.1080/09546553.2023.2259992
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2259992
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:37:y:2025:i:1:p:56-72



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2275057_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Seden Akcinaroglu
Author-X-Name-First: Seden
Author-X-Name-Last: Akcinaroglu
Author-Name: Moyan Shi
Author-X-Name-First: Moyan
Author-X-Name-Last: Shi
Title: Exploring the Impact of Cryptocurrency on Terrorism
Abstract: 
 The nexus between economic motivations and terrorist activities has been extensively theorized, but existing explanations often overlook the contemporary shifts in terrorist financing ushered in by technological advancements. The advent of cryptocurrencies, with their hallmarks of anonymity, decentralization, liquidity, usability, and profitability, has bestowed upon terrorist groups new avenues for raising funds while remaining largely clandestine. This exploratory research delves into the repercussions of this digital financial realm, examining how Bitcoin popularity, price volatility, and regulatory frameworks influence the operational latitude of terrorist groups. Drawing on the Global Terrorism Database (GTD) for terrorist attack data, coupled with Google Trends data on “bitcoin” searches from 2009 to 2020 as an indicator of cryptocurrency popularity in each country, the study uncovers a nuanced dynamic. While the rising prominence of cryptocurrencies subtly amplifies the operational sphere for terrorist outfits, the uncertain nature of Bitcoin prices as well as the legal and regulatory landscape act as deterrents.
Journal: Terrorism and Political Violence
Pages: 111-135
Issue: 1
Volume: 37
Year: 2025
Month: 01
X-DOI: 10.1080/09546553.2023.2275057
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2275057
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:37:y:2025:i:1:p:111-135



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2260001_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tanja Marie Hansen
Author-X-Name-First: Tanja Marie
Author-X-Name-Last: Hansen
Author-Name: Jens Lemb
Author-X-Name-First: Jens
Author-X-Name-Last: Lemb
Title: Location, Location, Location: Disentangling Drivers of Terrorist Credit-Taking
Abstract: 
 Most academic definitions of terrorism emphasize the communicative function of terrorism. The aim of terrorist violence is widely held to be to gain publication for a political or religious cause. Despite this emphasis on communication, terrorists rarely seek attention by claiming responsibility for attacks. According to the Global Terrorism Database, claims of responsibility are only issued for approximately every sixth attack. This raises the question: Why do terrorists abstain from the easy “win” of claiming their attacks? Previous research has theorized that factors like state sponsorship, principal-agent problems, casualty levels, and inter-group competition are important factors in explaining variation in terrorist credit-taking propensities. In this paper, we diverge from the tried and trusted deductive approach and instead utilize an inductive approach. We apply machine learning techniques using Random Forests to predict claims of responsibility. Our initial results indicate that geographical factors, like country of attack, are the strongest predictors of claims—something largely overlooked by existing research. In our analysis, the predictive power of geographical factors thus exceeds that of explanations from the literature based on characteristics of the target of the attack, e.g. number of fatalities and wounded.
Journal: Terrorism and Political Violence
Pages: 73-92
Issue: 1
Volume: 37
Year: 2025
Month: 01
X-DOI: 10.1080/09546553.2023.2260001
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2260001
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:37:y:2025:i:1:p:73-92



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2255902_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Rik Peels
Author-X-Name-First: Rik
Author-X-Name-Last: Peels
Title: What Is It to Explain Extremism?
Abstract: 
 This article explores what it is to explain extremism. Rather than providing yet another explanation of extremism, it takes a bird’s eye point of view at existing explanations of extremism. What is it that scholars are doing in seeking explanations of extremism? This article answers this question by considering four issues. First, exactly what is the explanandum for explanations of extremism, what is it that we seek to explain? Second, what is it to explain extremism rather than describing, interpreting, understanding, or predicting it? Third, how can explanations of extremism be categorized and what does that mean for the extent to which can they be combined? Fourth, what semantics is useful in construing an explanation of extremism? It turns out that most insights equally apply to explanations of related yet distinct phenomena, such as fundamentalism, fanaticism, conspiracy theorizing, and terrorism. The article concludes by providing five concrete guidelines that will help fine-tune and compare various explanations of extremism.
Journal: Terrorism and Political Violence
Pages: 1-18
Issue: 1
Volume: 37
Year: 2025
Month: 01
X-DOI: 10.1080/09546553.2023.2255902
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2255902
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:37:y:2025:i:1:p:1-18

Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2285320_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kayla McMinimy
Author-X-Name-First: Kayla
Author-X-Name-Last: McMinimy
Author-Name: Carol Winkler
Author-X-Name-First: Carol
Author-X-Name-Last: Winkler
Author-Name: Virginia Massignan
Author-X-Name-First: Virginia
Author-X-Name-Last: Massignan
Author-Name: Mor Yachin
Author-X-Name-First: Mor
Author-X-Name-Last: Yachin
Author-Name: Katerina Papatheodorou
Author-X-Name-First: Katerina
Author-X-Name-Last: Papatheodorou
Title: Image Content Indicators of Extremist Group Evolution: A Comparative Study of MENA-Based and Far-Right Groups
Abstract: 
 Policymakers, researchers, and responders alike focus on the evolution of terrorist and other groups associated with political violence. This study offers a comparative analysis of the images of ISIS and U.S. far-right groups’ use of flag images, as such emblems contribute to community building, heighten emotional responses, and have political import. It adds to previous work by comparing groups across the ideological spectrum, by recognizing differences in media operations present as groups evolve, and by focusing on visual messaging that is vital for influence in the online environment. Using chi-square analyses, it compares almost 5000 images that include flags from ISIS publications between 2014 and 2020 with 600 images focused on the far-right events at the Unite the Right Rally and the January 6 attack on the U.S. Capitol. Specifically, it looks at the compositional elements of the flags appearing in the images, the immediate media context within the photographic frame, and the broader regulatory, political, religious, and economic situational contexts. The findings indicate that while the far right and ISIS both heavily rely on flags in their visual images, eight key differences emerge as related to the groups, their contexts, and the evolution of the media systems.
Journal: Terrorism and Political Violence
Pages: 223-238
Issue: 2
Volume: 37
Year: 2025
Month: 02
X-DOI: 10.1080/09546553.2023.2285320
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2285320
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:37:y:2025:i:2:p:223-238



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2291398_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David Lowe
Author-X-Name-First: David
Author-X-Name-Last: Lowe
Title: Hate Crime in Northern Ireland: The Need for Legislation and a Bespoke Version of the Prevent Strategy
Abstract: 
 Following the rise in hate crime in Northern Ireland, in 2019 the Northern Ireland Assembly appointed Judge Marrinan to conduct a review into hate crime. Publishing his findings in his review in December 2020, this article examines the key recommendations that should be included in a Hate Crime Bill. As the Assembly is currently suspended, the article examines the hate crime statistics recorded following the publication of the review to illustrate why it is imperative that when it reconvenes, the Assembly introduce a Hate Crime Bill at the earliest opportunity. The article also argues that a prevention programme is introduced alongside the Bill to safeguard and prevent young people being drawn towards paramilitary activity along with hate crime and non-paramilitary terrorist activity. Young people are the focus of introducing an initial programme with the demographics in the hate crime statistics revealing a high number of offenders are that category. Following an examination of current programmes in place and the threat posed by paramilitaries and extremists, including the far right and extreme far right (neo-Nazis), the article recommends the current WRAP programme is developed to help and safeguard young people drawn to the paramilitaries to include hate crime and extremist related terrorism.
Journal: Terrorism and Political Violence
Pages: 262-283
Issue: 2
Volume: 37
Year: 2025
Month: 02
X-DOI: 10.1080/09546553.2023.2291398
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2291398
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:37:y:2025:i:2:p:262-283



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2285939_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel Tuki
Author-X-Name-First: Daniel
Author-X-Name-Last: Tuki
Title: Violent Conflict and Hostility Towards Ethnoreligious Outgroups in Nigeria
Abstract: 
 This study examined the effect of exposure to violent conflict on hostility towards ethnic and religious outgroups among Nigeria’s population and among its two major religious groups (i.e., Christians and Muslims). Violent conflict had a robust positive effect on outgroup hostility among the Nigerian population and among Christians. A plausible mechanism behind this finding is that the threat posed by violent conflict strengthens ingroup cohesion, erodes trust in outgroup members, and makes intergroup boundaries salient. This is especially so when the opposite party to the conflict constitutes a distinct cultural outgroup. The main conflict affecting Christians involves nomadic pastoralists of Fulani ethnicity, who are Muslims. Among Muslims, violent conflict rather had a weak positive effect on outgroup hostility that was not robust to alternative operationalizations of outgroup hostility. The null effect might be because the main conflict affecting Muslims—the Boko Haram insurgency—does not involve Christians. A significant number of Muslims are also affected by conflicts involving nomadic Fulani pastoralists.
Journal: Terrorism and Political Violence
Pages: 239-261
Issue: 2
Volume: 37
Year: 2025
Month: 02
X-DOI: 10.1080/09546553.2023.2285939
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2285939
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:37:y:2025:i:2:p:239-261



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2283565_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Matteo Vergani
Author-X-Name-First: Matteo
Author-X-Name-Last: Vergani
Author-Name: Thierno Diallo
Author-X-Name-First: Thierno
Author-X-Name-Last: Diallo
Author-Name: Kerry O’Brien
Author-X-Name-First: Kerry
Author-X-Name-Last: O’Brien
Title: Measuring the Potential for Hateful Behaviours: Development and Validation of the Hate Behaviours Scale (HBS)
Abstract: 
 This article introduces and reports the psychometric properties of the Hate Behaviours Scale (HBS), which assesses individual intentions to engage in a range of violent and non-violent hateful behaviours against various target groups. Three independent U.S. adult samples (total n = 3524) were used to gather data on the scale and associated covariates and constructs. The twelve-item HBS is comprised of three subscales; Discrimination, Defensive Violence and Belligerent Violence. The higher scores on the HBS were significantly associated with past behaviours such as attending a protest against the target group (β = 0.57, p < .001), having physically hit a member of the target group (β = 0.57, p < .001), and sharing an offensive joke online about the target group (β = 0.51, p < .001). This new measure provides a modifiable, easy to use, reliable and valid multi-component scale for assessing hate against different target groups. It should allow researchers to reliably assess individual levels of hate, and establish relationships with other demographic, social, situational, and psychological characteristics. The HBS provides a short and cost-effective tool to inform and evaluate counter violent extremism interventions aimed at reducing the potential for hateful behaviours.
Journal: Terrorism and Political Violence
Pages: 205-222
Issue: 2
Volume: 37
Year: 2025
Month: 02
X-DOI: 10.1080/09546553.2023.2283565
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2283565
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:37:y:2025:i:2:p:205-222



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2314564_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Stuart Gottlieb
Author-X-Name-First: Stuart
Author-X-Name-Last: Gottlieb
Author-Name: Matthew Oey
Author-X-Name-First: Matthew
Author-X-Name-Last: Oey
Title: Sri Lanka’s Easter Sunday Massacre: Lessons for the International Community
Journal: Terrorism and Political Violence
Pages: 284-285
Issue: 2
Volume: 37
Year: 2025
Month: 02
X-DOI: 10.1080/09546553.2024.2314564
File-URL: http://hdl.handle.net/10.1080/09546553.2024.2314564
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:37:y:2025:i:2:p:284-285



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2282464_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Helena Knupfer
Author-X-Name-First: Helena
Author-X-Name-Last: Knupfer
Author-Name: Ruta Kaskeleviciute
Author-X-Name-First: Ruta
Author-X-Name-Last: Kaskeleviciute
Author-Name: Jörg Matthes
Author-X-Name-First: Jörg
Author-X-Name-Last: Matthes
Title: Silent Sympathy: News Attention, Subtle Support for Far-Right Extremism, and Negative Attitudes Toward Muslims
Abstract: 
 Right-wing terrorist (RWT) incidents targeting Muslims have become more frequent and news reporting about these incidents can trigger a variety of cognitions and behaviors in audiences. While some studies report more tolerance and openness in response to RWT, hate crimes against minorities can increase in their aftermath. To date, we know little about the associations between following news reporting about RWT and attitudes toward Muslims as one of the main target groups of modern RWT. Using a young, quota-based German sample (aged 16–25, N = 865), we build on Terror Management and Social Identity Theory to shed light on the relationships between attention to RWT in the media, threat attributed to RWT, and negative attitudes toward Muslims. Additionally, a measure of subtle support for far-right extremist stances (SSE) was included, accounting for moderation effects. Results suggested that attention to RWT was positively related to perceived threat. This association was weaker in individuals with higher levels of SSE. Attributing more threat was associated with less negative attitudes toward Muslims, independent of SSE. Media attention only had a (positive) association with negative attitudes in individuals with moderate to high levels of SSE. Implications and limitations are discussed.
Journal: Terrorism and Political Violence
Pages: 186-204
Issue: 2
Volume: 37
Year: 2025
Month: 02
X-DOI: 10.1080/09546553.2023.2282464
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2282464
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:37:y:2025:i:2:p:186-204



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2282461_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lindsay Hahn
Author-X-Name-First: Lindsay
Author-X-Name-Last: Hahn
Author-Name: Katherine Schibler
Author-X-Name-First: Katherine
Author-X-Name-Last: Schibler
Author-Name: Zena Toh
Author-X-Name-First: Zena
Author-X-Name-Last: Toh
Author-Name: Tahleen A. Lattimer
Author-X-Name-First: Tahleen A.
Author-X-Name-Last: Lattimer
Author-Name: John O’Leary
Author-X-Name-First: John
Author-X-Name-Last: O’Leary
Author-Name: Ramón Spaaij
Author-X-Name-First: Ramón
Author-X-Name-Last: Spaaij
Title: Investigating the Role of Morality in Lone-Actor Terrorist Motivations and Attack Severity
Abstract: 
 Extending previous work suggesting that group-based extremist violence is morally-motivated, we investigated whether lone-actor terrorists are similarly morally-driven, and if so, whether their moral motivations may predict the severity of their attacks. Examining a database containing details of n = 121 lone-actor terrorist attacks, we applied a coding scheme derived from moral foundations theory to extract the main moral motivation driving each violent lone-actor, if any. Using the results of the content analysis, we then examined whether actors’ moral motivations predicted the injuries and fatalities associated with their attacks. Findings suggested: (1) ingroup loyalty-motivated attacks were 2.42 times deadlier and care-motivated acts were 10.73 times more injurious compared to acts driven by other motivations, (2) lone-actors were most likely to be driven by binding motivations overall, and (3) lone-actors’ moral motivations largely align with the moral motivation of extremist groups for which they have an affinity. We discuss the utility of moral foundations theory for describing, explaining, and predicting the moral motivations of violent actors.
Journal: Terrorism and Political Violence
Pages: 169-185
Issue: 2
Volume: 37
Year: 2025
Month: 02
X-DOI: 10.1080/09546553.2023.2282461
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2282461
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:37:y:2025:i:2:p:169-185



Template-Type: ReDIF-Article 1.0
# input file: FTPV_A_2276300_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Harmonie Toros
Author-X-Name-First: Harmonie
Author-X-Name-Last: Toros
Title: Bad Men, Good Men, and Loving Women: Gender Constructions in British State Messaging on Counterterrorism, Countering Violent Extremism and Preventing Violent Extremism
Abstract: 
 The United Kingdom presents itself as a leader in counterterrorism (CT), countering violent extremism (CVE) and preventing violent extremism (PVE). The Action Counters Terrorism Campaign is a public-facing campaign of the U.K. government aimed at raising the public’s awareness of how it can support its CT/CVE/PVE efforts. A narrative analysis of the campaign’s YouTube channel (2017–2020) reveals a clear dominant narrative that “ordinary people” can assist in CT/CVE/PVE by being alert and following basic rules (such as Run, Hide, Tell). However, a gendered narrative analysis reveals far more surprising results: The terrorist threat is understood as exclusively male and only men are viewed as at risk of radicalization. Women are predominantly portrayed in relation to men in their lives. Through their love and care, women can support efforts to save men by noticing when “something is wrong.” This article reveals how the gendered constructions of the British awareness campaign are so engrained in a powerful metanarrative of gender and political violence that they ignore even widespread public security debates, such as those surrounding British girls and women joining ISIS. It concludes that a narrative analysis must include a gendered analysis to understand the political and security implications of CT/CVE/PVE narratives.
Journal: Terrorism and Political Violence
Pages: 153-168
Issue: 2
Volume: 37
Year: 2025
Month: 02
X-DOI: 10.1080/09546553.2023.2276300
File-URL: http://hdl.handle.net/10.1080/09546553.2023.2276300
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:ftpvxx:v:37:y:2025:i:2:p:153-168