Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701334_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nicholas Khoo
Author-X-Name-First: Nicholas
Author-X-Name-Last: Khoo
Title: Engaging China, With Strings Attached
Journal: Studies in Conflict & Terrorism
Pages: 151-154
Issue: 2
Volume: 23
Year: 2000
X-DOI: 10.1080/105761000265584
File-URL: http://hdl.handle.net/10.1080/105761000265584
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:23:y:2000:i:2:p:151-154



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701335_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: Book Reviews
Journal: Studies in Conflict & Terrorism
Pages: 155-160
Issue: 2
Volume: 23
Year: 2000
X-DOI: 10.1080/105761000265593
File-URL: http://hdl.handle.net/10.1080/105761000265593
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:23:y:2000:i:2:p:155-160



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701332_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lorenzo Valeri
Author-X-Name-First: Lorenzo
Author-X-Name-Last: Valeri
Title: Securing Internet Society: Toward an International Regime for Information Assurance
Abstract: The Internet is rapidly changing how states and international businesses operate and deliver services and goods to citizens and customers. This global information medium, however, has also become the vehicle for a new set of malicious activities carried out by hackers, terrorists, and rogue states. This article discusses a possible course of action to counter this growing international security threat: the development of an international regime for information assurance. Still, this regime cannot arise exclusively from the cooperative efforts of national government, but requires the active involvement of international businesses. This article, therefore, postulates that this regime can arise only if states and international businesses fully appreciate their respective interests in the areas of information security and assurance.
Journal: Studies in Conflict & Terrorism
Pages: 129-146
Issue: 2
Volume: 23
Year: 2000
X-DOI: 10.1080/105761000265566
File-URL: http://hdl.handle.net/10.1080/105761000265566
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:23:y:2000:i:2:p:129-146



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701333_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Karin Von Hippel
Author-X-Name-First: Karin
Author-X-Name-Last: Von Hippel
Title: Land Cruising the Road to Hell
Journal: Studies in Conflict & Terrorism
Pages: 147-150
Issue: 2
Volume: 23
Year: 2000
X-DOI: 10.1080/105761000265575
File-URL: http://hdl.handle.net/10.1080/105761000265575
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:23:y:2000:i:2:p:147-150



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701330_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Peter Chalk
Author-X-Name-First: Peter
Author-X-Name-Last: Chalk
Title: Southeast Asia and the Golden Triangle's Heroin Trade: Threat and Response
Abstract: The Golden Triangle of Southeast Asia lies at the heart of the global heroin trade, accounting for roughly 60 percent of all illicit opium production. Narcotics from this part of the world have had an insidious, corrosive, far reaching and, at times, highly destabilizing impact. In particular, they have been linked to an explosion of AIDS, social instability, a lack of economic performance, official corruption and the growing force of organized crime. These effects have been felt, in one form or another throughout Southeast Asia, North America, Australasia, and Northeast Asia. Dealing with the threat posed by the Golden Triangles heroin trade will require a fully inclusive strategy that emphasizes both supply disruption and demand reduction. While certain Southeast Asian states have pledged to intensify the scope and effectiveness of their drug policies, official apathy is widespread and continues to mitigate against effective counter-measures.
Journal: Studies in Conflict & Terrorism
Pages: 89-106
Issue: 2
Volume: 23
Year: 2000
X-DOI: 10.1080/105761000265548
File-URL: http://hdl.handle.net/10.1080/105761000265548
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:23:y:2000:i:2:p:89-106



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701331_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andrew Silke
Author-X-Name-First: Andrew
Author-X-Name-Last: Silke
Title: Drink, Drugs, and Rock'n'Roll: Financing Loyalist Terrorism in Northern Ireland — Part Two
Abstract: Though the main loyalist groups have now been observing cease-fires for nearly five years, the fund-raising activities of these organizations has continued unabated. Following from the previous article on this subject, this paper gives an account of the various fund-raising methods which are currently being used by the loyalists. Particular attention is focused on the controversial topic of drug dealing. Related to this topic, the article considers in detail the emergence in 1996 of the splinter group, the Loyalist Volunteer Force (LVF). The rise and subsequent fall of this faction provides a telling case study in the importance of understanding the fund-raising methods and policies of terrorist groups. The article concludes that the financial dimension to terrorism in Northern Ireland presents an as yet unrecognized and extremely serious obstale to lasting peace.
Journal: Studies in Conflict & Terrorism
Pages: 107-127
Issue: 2
Volume: 23
Year: 2000
X-DOI: 10.1080/105761000265557
File-URL: http://hdl.handle.net/10.1080/105761000265557
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:23:y:2000:i:2:p:107-127

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701340_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: J. J. Widen
Author-X-Name-First: J. J.
Author-X-Name-Last: Widen
Title: Contemplating a New Strategic Future
Journal: Studies in Conflict & Terrorism
Pages: 215-219
Issue: 3
Volume: 23
Year: 2000
X-DOI: 10.1080/105761000412797
File-URL: http://hdl.handle.net/10.1080/105761000412797
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:23:y:2000:i:3:p:215-219



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701338_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gavin Cameron
Author-X-Name-First: Gavin
Author-X-Name-Last: Cameron
Title: Freedom, Hate, and Violence on the American Right
Journal: Studies in Conflict & Terrorism
Pages: 197-204
Issue: 3
Volume: 23
Year: 2000
X-DOI: 10.1080/105761000412779
File-URL: http://hdl.handle.net/10.1080/105761000412779
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:23:y:2000:i:3:p:197-204



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701339_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Paul Dixon
Author-X-Name-First: Paul
Author-X-Name-Last: Dixon
Title: Understanding Unionism: Ideology and Politics
Journal: Studies in Conflict & Terrorism
Pages: 205-213
Issue: 3
Volume: 23
Year: 2000
X-DOI: 10.1080/105761000412788
File-URL: http://hdl.handle.net/10.1080/105761000412788
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:23:y:2000:i:3:p:205-213



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701336_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan C. Hendrickson
Author-X-Name-First: Ryan C.
Author-X-Name-Last: Hendrickson
Title: American War Powers and Terrorists: The Case of Usama Bin Laden
Abstract: During the Cold War, observers of American politics noted that an imperial presidency developed in regards to the decision to use force abroad. Although the Constitution and the War Powers Act of 1973 grant significant war powers to the Congress, Congress largely deferred and abdicated these powers to the commander in chief, as the President asserted essential unlimited constitutional authority. This practice held true when the United States used force against terrorist actors, such as President Ronald Reagans strikes against Muammar Qaddafi. However, President Clintons strikes against Usama Bin Laden represent a different example of the war powers interplay. Domestic political considerations for Clinton and the nature of the United States target presented new incentives and an unprecedented case of much closer consultation with Congress prior to using force.
Journal: Studies in Conflict & Terrorism
Pages: 161-174
Issue: 3
Volume: 23
Year: 2000
X-DOI: 10.1080/105761000412751
File-URL: http://hdl.handle.net/10.1080/105761000412751
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:23:y:2000:i:3:p:161-174



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701337_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ayla Hammond Schbley
Author-X-Name-First: Ayla Hammond
Author-X-Name-Last: Schbley
Title: Torn Between God, Family, and Money: The Changing Profile of Lebanon's Religious Terrorists
Abstract: Based upon this researcher's prior work and the conceptual denouement from geocultural immobility to religious terrorism, the author speculates that the reverse may be achieved and a zealot's motivation for religious terrorism might be purged once his or her basic Moslovian needs are fulfilled. Thus, this article attempts to empirically assess in some elements of Hizbullah, the effect of newly found wealth, money, and family exigencies on the Lebanese Shi'a's religious zealotry, his or her perceived religious commitments, and their acts of terrorism. This research concluded that Hizbullah in Lebanon, an organization originally established as a religious network with narrowly defined politico-socioeconomic goals, has eroded. Many of its individual cells now serve primarily their own self-interest instead of their perception of God's will. These cells are defying Hizbullah's main leadership wishes and committing criminal actions designed to serve cell or family interests. Its sophisticated network is already being used to transport and harbor criminals across the Mid-East and Europe. This research stress that the well-established Hizbullah cell organizations that protect each and every element and coordinate with other terrorist organizations are ripe to be exploited for international criminal activities. More importantly, this research attempts to explain and delineate the process by which nations may manage, control, reform, or even eliminate such international affliction.
Journal: Studies in Conflict & Terrorism
Pages: 175-196
Issue: 3
Volume: 23
Year: 2000
X-DOI: 10.1080/105761000412760
File-URL: http://hdl.handle.net/10.1080/105761000412760
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:23:y:2000:i:3:p:175-196



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701341_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John E. Peters
Author-X-Name-First: John E.
Author-X-Name-Last: Peters
Title: Book Reviews
Journal: Studies in Conflict & Terrorism
Pages: 221-234
Issue: 3
Volume: 23
Year: 2000
X-DOI: 10.1080/105761000412805
File-URL: http://hdl.handle.net/10.1080/105761000412805
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:23:y:2000:i:3:p:221-234

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701345_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: Book Reviews
Journal: Studies in Conflict & Terrorism
Pages: 289-304
Issue: 4
Volume: 23
Year: 2000
X-DOI: 10.1080/10576100050174995
File-URL: http://hdl.handle.net/10.1080/10576100050174995
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:23:y:2000:i:4:p:289-304



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701343_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Rachel Monaghan
Author-X-Name-First: Rachel
Author-X-Name-Last: Monaghan
Title: Single-Issue Terrorism: A Neglected Phenomenon?
Abstract: The willingness of some single-issue groups to use violence in the pursuit of their cause has received surprisingly little attention within the literature on terrorism. This article seeks to add to our understanding of this phenomenonnamely that of single-issue terrorismby focusing on the increasing tendency of groups within the British animal rights movement to utilize violent methods in order to achieve their objectives. The article will seek to further the argument that some single-issue groups have been willing to use violence in past campaigns, thereby highlighting the understudied nature of the phenomenon. This will be illustrated by examining the campaign of single-issue terrorism undertaken by the militant suffragettes in Britain in the 1910s.
Journal: Studies in Conflict & Terrorism
Pages: 255-265
Issue: 4
Volume: 23
Year: 2000
X-DOI: 10.1080/10576100050174977
File-URL: http://hdl.handle.net/10.1080/10576100050174977
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:23:y:2000:i:4:p:255-265



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701344_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andrew Tan
Author-X-Name-First: Andrew
Author-X-Name-Last: Tan
Title: Armed Muslim Separatist Rebellion in Southeast Asia: Persistence, Prospects, and Implications
Abstract: The persistence of armed Muslim separatist rebellion in Southeast Asia is demonstrated by the ongoing rebellions in Aceh and Mindanao. A strong regional identity infused with Islam has been a binding factor in these separatist movements. Their persistence demonstrates the failure of Indonesia and the Philippines in achieving legitimacy for their post-independence political structures as well as continued internal weakness. The prospects for their quick and peaceful resolution are not good. The external dimension of Muslim separatism has heightened mistrust among states in the region and raised apprehensions over the broader issue of Islamic fundamentalism and the implications for the region should Aceh and Mindanao achieve secession.
Journal: Studies in Conflict & Terrorism
Pages: 267-288
Issue: 4
Volume: 23
Year: 2000
X-DOI: 10.1080/10576100050174986
File-URL: http://hdl.handle.net/10.1080/10576100050174986
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:23:y:2000:i:4:p:267-288



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701342_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Samuel Peleg
Author-X-Name-First: Samuel
Author-X-Name-Last: Peleg
Title: Peace Now or Later?: Movement–Countermovement Dynamics and the Israeli Political Cleavage
Journal: Studies in Conflict & Terrorism
Pages: 235-254
Issue: 4
Volume: 23
Year: 2000
X-DOI: 10.1080/10576100050174968
File-URL: http://hdl.handle.net/10.1080/10576100050174968
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:23:y:2000:i:4:p:235-254

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701358_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Shawn McHale
Author-X-Name-First: Shawn
Author-X-Name-Last: McHale
Title: Voices from the Terror
Journal: Studies in Conflict & Terrorism
Pages: 149-151
Issue: 2
Volume: 24
Year: 2001
X-DOI: 10.1080/10576100121341
File-URL: http://hdl.handle.net/10.1080/10576100121341
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:24:y:2001:i:2:p:149-151



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701359_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: Book Reviews
Journal: Studies in Conflict & Terrorism
Pages: 153-158
Issue: 2
Volume: 24
Year: 2001
X-DOI: 10.1080/10576100118763
File-URL: http://hdl.handle.net/10.1080/10576100118763
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:24:y:2001:i:2:p:153-158



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701356_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Rogelio Alonso
Author-X-Name-First: Rogelio
Author-X-Name-Last: Alonso
Title: The Modernization in Irish Republican Thinking Toward the Utility of Violence
Abstract: For the last thirty years the Irish republican movementcomposed of the IRA and Sinn Feinhas resorted to armed struggle as part of its strategy against British power in Northern Ireland. The cease-fire announced by the terrorist group in 1994 and the peace process that followed has signaled a historic shift in the strategic thinking of republicans. The emergence of dissident groups that reject the politicization of the movement and advocate the maintenance of the military campaign has highlighted the challenges the republican leadership faces after their acceptance of the 1998 Belfast Agreement. This article explores all of these issues and the importance of the armed struggle in the shifting republican mentality.
Journal: Studies in Conflict & Terrorism
Pages: 131-144
Issue: 2
Volume: 24
Year: 2001
X-DOI: 10.1080/10576100120635
File-URL: http://hdl.handle.net/10.1080/10576100120635
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:24:y:2001:i:2:p:131-144



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701357_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Peter Chalk
Author-X-Name-First: Peter
Author-X-Name-Last: Chalk
Title: Six Deadly Flaws
Journal: Studies in Conflict & Terrorism
Pages: 145-148
Issue: 2
Volume: 24
Year: 2001
X-DOI: 10.1080/10576100118607
File-URL: http://hdl.handle.net/10.1080/10576100118607
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:24:y:2001:i:2:p:145-148



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701354_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Brad Whitsel
Author-X-Name-First: Brad
Author-X-Name-Last: Whitsel
Title: Ideological Mutation and Millennial Belief in the American Neo-Nazi Movement
Abstract: This article examines the process of ideological change that accompanied the evolution of the American neo-Nazi movement. The movement's psychological worldview has historically been dominated by a catastrophic millennial outlook that looks forward to the destruction of an environing order perceived to be degraded and beyond hope for renewal. By the 1970s, however, certain organizational changes had taken place in the movement that led to its fracture along separate philosophical tracks. While the millennial underpinnings of the American neo-Nazi movement's belief structure remained largely intact, highly idiosyncratic versions of the neoNazi Aryan myth began to emerge at this time. The ideological mutations that occurred came as a result of neo-Nazi groups adopting a "cultic milieu" existence in society's fringe underground of deviant beliefs. British sociologist Colin Campbell's overlooked theoretical concept of the cultic milieu may provide new insights into the process of ideological transformation in extremist groups.
Journal: Studies in Conflict & Terrorism
Pages: 89-106
Issue: 2
Volume: 24
Year: 2001
X-DOI: 10.1080/10576100117722
File-URL: http://hdl.handle.net/10.1080/10576100117722
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:24:y:2001:i:2:p:89-106



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701355_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joseph W. Foxell
Author-X-Name-First: Joseph W.
Author-X-Name-Last: Foxell
Title: Current Trends in Agroterrorism (Antilivestock, Anticrop, and Antisoil Bioagricultural Terrorism) and Their Potential Impact on Food Security
Abstract: The relatively indirect and indiscriminate nature of an agroterror attack meshes perfectly with the perceived shift in terrorism goals, which have ostensibly veered away from attempting to achieve specific political results and instead increasingly seek the destruction of "enemy" societies. This article presents the case specifically that access to agroterroritst weapons, the vulnerability of the agricultural infrastructure, the lack of reporting requirements for outbreaks of plant diseases, and a general shift in the motives of terrorists and the purpose of terrorist acts, all combine to make agroterrorism an increasingly likely threat.
Journal: Studies in Conflict & Terrorism
Pages: 107-129
Issue: 2
Volume: 24
Year: 2001
X-DOI: 10.1080/10576100151101623
File-URL: http://hdl.handle.net/10.1080/10576100151101623
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:24:y:2001:i:2:p:107-129

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701361_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Brian A. Jackson
Author-X-Name-First: Brian A.
Author-X-Name-Last: Jackson
Title: Technology Acquisition by Terrorist Groups: Threat Assessment Informed by Lessons from Private Sector Technology Adoption
Abstract: Because of the importance of technology to the operations of modern terrorist groups, the factors that affect the technological sophistication of extreme organizations are of great interest. In this article, the process through which terrorist groups seek out and deploy new technology is examined by bringing to bear the deep literature that exists on technology adoption by commercial organizations. A framework is described that delineates not only the factors that influence a group's decision-making processes surrounding new technology but also the obstacles that stand in the way of the successful absorption and use of unfamiliar technologies by a terrorist organization. This framework, by taking a holistic view of the entire technology adoption process, sets out a methodology to both more reasonably predict the outcome of a group's technology-seeking efforts and to speculate about its future innovation efforts. Such a technology focused viewpoint provides a route to more fully inform risk assessment, especially with regard to the low probabilityhigh consequence technologies that have served as the focus of much recent counterterrorist deliberation. The lessons provided by the framework with respect to weapons of mass destruction terrorism and to novel counterterrorist routes are discussed.
Journal: Studies in Conflict & Terrorism
Pages: 183-213
Issue: 3
Volume: 24
Year: 2001
X-DOI: 10.1080/10576100151130270
File-URL: http://hdl.handle.net/10.1080/10576100151130270
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:24:y:2001:i:3:p:183-213



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701362_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kirsten E. Schulze
Author-X-Name-First: Kirsten E.
Author-X-Name-Last: Schulze
Title: Camp David and the : An Assessment of the State of the Israeli-Palestinian Peace Process, July-December 2000
Abstract: This article examines the Al-Aqsa Intifada and its impact on the Israeli-Palestinian peace process. It is argued here that the Intifada was the result of long-term frustrations of the Palestinian people with the lack of change as well as the short-term need of the Palestinian leadership for an exit strategy after the Camp David summit. Palestinian strategy aimed at shifting the blame for the failure of Camp David from Yasser Arafat to Ehud Barak and to create maximum international solidarity to pressure Israel into concessions. Yet, closer analysis reveals that despite early successes, the Intifada strategy is one of diminishing returns. Conversely, Israeli crisis management, while taking some initial blows particularly in terms of public image, has proved relatively successful at preventing the erosion of Israeli positions on the ground. Ultimately, however, neither Palestinians nor Israelis will be able to achieve their respective aims of statehood and security without returning to the negotiating table.
Journal: Studies in Conflict & Terrorism
Pages: 215-233
Issue: 3
Volume: 24
Year: 2001
X-DOI: 10.1080/10576100151130298
File-URL: http://hdl.handle.net/10.1080/10576100151130298
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:24:y:2001:i:3:p:215-233



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701360_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard Falkenrath
Author-X-Name-First: Richard
Author-X-Name-Last: Falkenrath
Title: Analytic Models and Policy Prescription: Understanding Recent Innovation in U.S. Counterterrorism
Abstract: The threat of terrorism, particularly terrorism involving a weapon of mass destruction (WMD), has received enormous attention in the last decade. Since the mid1990s, the federal government has embarked on a concerted national effort to prepare the country for acts of WMD terrorism. A key component of the counterterrorism agenda is the domestic preparedness program, a series of initiatives aimed at reducing America's vulnerability to a WMD terrorist attack. However, there is a heated debate over whether or not the United States needs a domestic preparedness program at all. This article argues that much of the debate originates in disparate approaches to analyzing terrorism. Terrorism studies specialists use an internal model that analyzes the root causes, motives, and historical patterns of terrorism and concludes that the threat of WMD terrorism against the United States is not sufficient to warrant the domestic preparedness budget. Policy makers and national security experts, however, rely on an external risk assessment model that considers terrorism within the context of the many risks to American security. This assessment model evaluates WMD terrorism on the basis of risk and consequences, and reaches a logical conclusion that the potential for mass destruction not only merits, but also requires a level of domestic preparedness.
Journal: Studies in Conflict & Terrorism
Pages: 159-181
Issue: 3
Volume: 24
Year: 2001
X-DOI: 10.1080/10576100151130252
File-URL: http://hdl.handle.net/10.1080/10576100151130252
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:24:y:2001:i:3:p:159-181



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701363_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: Book Reviews
Journal: Studies in Conflict & Terrorism
Pages: 235-240
Issue: 3
Volume: 24
Year: 2001
X-DOI: 10.1080/10576100151130315
File-URL: http://hdl.handle.net/10.1080/10576100151130315
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:24:y:2001:i:3:p:235-240

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701367_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Chris Dishman
Author-X-Name-First: Chris
Author-X-Name-Last: Dishman
Title: Understanding Perspectives on WMD and Why They Are Important
Journal: Studies in Conflict & Terrorism
Pages: 303-313
Issue: 4
Volume: 24
Year: 2001
X-DOI: 10.1080/10576100118538
File-URL: http://hdl.handle.net/10.1080/10576100118538
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:24:y:2001:i:4:p:303-313



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701368_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: Book Reviews
Journal: Studies in Conflict & Terrorism
Pages: 315-318
Issue: 4
Volume: 24
Year: 2001
X-DOI: 10.1080/10576100119863
File-URL: http://hdl.handle.net/10.1080/10576100119863
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:24:y:2001:i:4:p:315-318



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701365_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David M. Jones
Author-X-Name-First: David M.
Author-X-Name-Last: Jones
Author-Name: Mike L. Smith
Author-X-Name-First: Mike L.
Author-X-Name-Last: Smith
Title: The Changing Security Agenda in Southeast Asia: Globalization, New Terror, and the Delusions of Regionalism
Abstract: The regional economic crisis of 199798 placed a large question mark over the advocacy, much proclaimed between 1990 and 1997, that ASEAN was at the centre of a shift in the global order toward a Pacific Century premised on the Association's practices of multilateral cooperation, dialogue, consensus, and non-interference. Does the aftermath of the crisis, and the new agenda posed by the forces of economic globalization and the seemingly irresolvable low intensity conflicts that bedevil Southeast Asia, require radical re-thinking of the relevance of security arrangements in Pacific Asia that are essentially the product of the Cold War era? This study examines this question by considering the curious external conditions in which ASEAN rose to international prominence, how ASEAN erroneously came to be seen in the 1990s as an apparently new form of security cooperation, and how rising levels of violent internal challenges generated by the forces of globalization threaten Southeast Asia's stability. The conclusion is that these forces have exposed ASEAN's constituting incoherence as an imitation community and that consequently it is ill equipped to contend with the pressures exerted by the global information age.
Journal: Studies in Conflict & Terrorism
Pages: 271-288
Issue: 4
Volume: 24
Year: 2001
X-DOI: 10.1080/10576100117412
File-URL: http://hdl.handle.net/10.1080/10576100117412
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:24:y:2001:i:4:p:271-288



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701366_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: William Rosenau
Author-X-Name-First: William
Author-X-Name-Last: Rosenau
Title: Aum Shinrikyo's Biological Weapons Program: Why Did it Fail?
Abstract: During the six years since the Aum Shinrikyo cult's nerve gas attack on the Tokyo subway system, the United States has undertaken a major effort to prevent and respond to terrorist acts involving nuclear, radiological, biological and chemical weapons. Given this high level of official activity, it is remarkable that Aum's protracted and costly, but ultimately unsuccessful, attempts to acquire and use mass-casualty biological agents has received scant analytical attention. Specifically, there has been relatively little focus on one critical question: Why did this apparently sophisticated and lavishly funded program ultimately fail? Aum's failure suggests that it may, in fact, be far more difficult to carry out a deadly bioterrorism attack than has sometimes been portrayed by government officials and the press. Despite its significant financial resources, dedicated personnel, motivation, and freedom from the scrutiny of the Japanese authorities, Aum was unable to achieve its objectives. The Aum case illustrates how acquiring virulent strains of biological agents can be a major hurdle for prospective bioterrorists. Cult-like terrorist organizations, the ones that appear to have the greatest interest in mass-casualty biological weapons, may be least suited to meet the complex demands associated with a bioweapon program. As the Aum example illustrates, a paranoid, fantasy-prone and sometimes violent atmosphere is not conducive to the sound scientific judgement needed to produce mass-casualty biological weapons.
Journal: Studies in Conflict & Terrorism
Pages: 289-301
Issue: 4
Volume: 24
Year: 2001
X-DOI: 10.1080/10576100120887
File-URL: http://hdl.handle.net/10.1080/10576100120887
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:24:y:2001:i:4:p:289-301



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_9701364_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Peter Chalk
Author-X-Name-First: Peter
Author-X-Name-Last: Chalk
Title: Separatism and Southeast Asia: The Islamic Factor in Southern Thailand, Mindanao, and Aceh
Abstract: Islamic insurgent movements in southern Thailand, the southern Philippines and Aceh represent, arguably, the most visible signs of armed separatism in Southeast Asia today. The roots of ethnoreligious unrest in each of these regions stem from the same basic factors: insensitivity to local concerns, regional neglect, military repression and the contemporary force of militant Islam. The longevity of the movements that have arisen in southern Thailand, the southern Philippines and Aceh has largely been determined by the degree of popular support each has been able to call on as well as operational considerations such as external support and access to weaponry.
Journal: Studies in Conflict & Terrorism
Pages: 241-269
Issue: 4
Volume: 24
Year: 2001
X-DOI: 10.1080/10576100116748
File-URL: http://hdl.handle.net/10.1080/10576100116748
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:24:y:2001:i:4:p:241-269

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_170374_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Edward Newman
Author-X-Name-First: Edward
Author-X-Name-Last: Newman
Title: Exploring the “Root Causes” of Terrorism
Abstract: This article attempts to clarify what is meant by “root causes” and considers if their analysis helps to explain and describe how, where, and why terrorism occurs. In attempting to explore—but not definitively resolve—these challenges, the article will attempt to delineate “root causes” into qualitative and quantitative variables that can be empirically tested in relation to contemporary terrorist activity. In so doing, it considers the relative merits of different methodologies for approaching “root causes.” The article concludes that indirect and underlying sources of conflict are significant to understanding specific incidents of terrorism and certain categories of terrorism; that “root causes” are less helpful in describing and explaining terrorism as a general phenomenon; and that root causes are of analytical use only in conjunction with precipitant factors.
Journal: Studies in Conflict & Terrorism
Pages: 749-772
Issue: 8
Volume: 29
Year: 2006
X-DOI: 10.1080/10576100600704069
File-URL: http://hdl.handle.net/10.1080/10576100600704069
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:29:y:2006:i:8:p:749-772



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_156173_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Assaf Moghadam
Author-X-Name-First: Assaf
Author-X-Name-Last: Moghadam
Title: Suicide Terrorism, Occupation, and the Globalization of Martyrdom: A Critique of 
Abstract: This article offers a three-pronged critique of Robert A. Pape's book Dying to Win. The first section of the article highlights problems related to the book's definition of key concepts, its assessment of existing research on suicide terrorism, and its presentation of data. The next section challenges the book's argument that suicide attacks have a high success rate of 54 percent. The alternative analysis offered here arrives at a significantly lower success rate of 24 percent. The last section argues that Pape exaggerates the link between occupation and suicide terrorism, especially with regard to the case of Al Qaeda. In this context, a distinction between traditional (localized) and contemporary (globalized) patterns of suicide attacks is introduced. It is argued that the occupation thesis may help explain the traditional (localized) pattern of suicide attacks, but falls short of illuminating the causes of the contemporary “globalization of martyrdom.”
Journal: Studies in Conflict & Terrorism
Pages: 707-729
Issue: 8
Volume: 29
Year: 2006
X-DOI: 10.1080/10576100600561907
File-URL: http://hdl.handle.net/10.1080/10576100600561907
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:29:y:2006:i:8:p:707-729



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_170165_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Rhonda Callaway
Author-X-Name-First: Rhonda
Author-X-Name-Last: Callaway
Author-Name: Julie Harrelson-Stephens
Author-X-Name-First: Julie
Author-X-Name-Last: Harrelson-Stephens
Title: Toward a Theory of Terrorism: Human Security as a Determinant of Terrorism
Abstract: In this article, we investigate the relationship between human rights conditions and terrorist activity. We begin by outlining a theory for the genesis and growth of terrorism and argue that states which deny subsistence rights along with civil and political rights create an environment that is conducive to the development of terrorism. However, we conclude that it is the denial of security rights that is a necessary condition for the creation and growth of terrorism. We then examine the causes of terrorism in Northern Ireland in light of this theory. Specifically, we explore the extent to which human rights abuses contributed to the formation and growth of terrorists within Northern Ireland. We find that limits on the civil and political rights of the Catholic minority in Northern Ireland played a significant role in the genesis of terrorism. More importantly, British abuses of security rights increased the number of Irish citizens who supported and participated in terrorist activity.
Journal: Studies in Conflict & Terrorism
Pages: 773-796
Issue: 8
Volume: 29
Year: 2006
X-DOI: 10.1080/10576100600701974A
File-URL: http://hdl.handle.net/10.1080/10576100600701974A
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:29:y:2006:i:8:p:773-796



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_170167_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alison Pargeter
Author-X-Name-First: Alison
Author-X-Name-Last: Pargeter
Title: North African Immigrants in Europe and Political Violence
Abstract: North African communities in Europe have been the focus of unprecedented attention since the attacks of 9/11, largely thanks to the wave of arrests of North Africans on terrorism related charges across the continent. Yet very little is known about exactly who these North African militants are, what is motivating them and how and why they became attracted to radical interpretations of Islam. It is often assumed that these radicals are linked to Al Qaeda and share the same broad internationalist vision. A closer look suggests that these first generation immigrants continue to be preoccupied as much by national politics as any notion of a globalized form of Islam. Little attention has also been paid to the complex relationship between these militant elements and the wider North African communities residing in Europe. Although the War on Terror has made many North African immigrants feel increasingly uncomfortable, it has arguably also enabled the more politicized moderate parts of the Islamist community to increase their role and influence, with questionable consequences for these communities as a whole.
Journal: Studies in Conflict & Terrorism
Pages: 731-747
Issue: 8
Volume: 29
Year: 2006
X-DOI: 10.1080/10576100600701990
File-URL: http://hdl.handle.net/10.1080/10576100600701990
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:29:y:2006:i:8:p:731-747

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_179070_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jessica Wolfendale
Author-X-Name-First: Jessica
Author-X-Name-Last: Wolfendale
Title: Terrorism, Security, and the Threat of Counterterrorism
Abstract: In America, Britain and Australia the threat of terrorism has been used to justify radical new legislation that gives police and intelligence agencies unprecedented powers to detain and question people believed to have information connected to terrorism. In this paper I explore the nature of the threat of non-state terrorism—threat to national security and the well-being of citizens. I argue that terrorism does not pose a threat sufficient to justify the kinds of counterterrorism legislation currently being enacted. Furthermore many of the current counterterrorism practices pose a greater threat to individual physical security and well-being than non-state terrorism. We should fear counterterrorism more than we fear terrorism.
Journal: Studies in Conflict & Terrorism
Pages: 75-92
Issue: 1
Volume: 30
Year: 2007
X-DOI: 10.1080/10576100600791231
File-URL: http://hdl.handle.net/10.1080/10576100600791231
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:30:y:2007:i:1:p:75-92



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_204896_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Paul Cruickshank
Author-X-Name-First: Paul
Author-X-Name-Last: Cruickshank
Author-Name: Mohannad Ali
Author-X-Name-First: Mohannad
Author-X-Name-Last: Ali
Title: Abu Musab Al Suri: Architect of the New Al Qaeda
Abstract: Drawing on new sources, the authors argue that Abu Musab al Suri (real name Mustafa Setmariam Nasar), now in U.S. custody, is the principle architect of Al Qaeda's post–9/11 structure and strategy. His vision, which predated 9/11, of transforming Al Qaeda from a vulnerable hierarchical organization into a resilient decentralized movement, was largely the formula Al Qaeda adopted after the collapse of the Taliban. The authors show how Setmariam, whose ideas have been disseminated widely on the Internet and whose disciples have gravitated to leadership positions in the international jihad, has influenced Al Qaeda's post–9/11 strategy, targeting, and doctrine.
Journal: Studies in Conflict & Terrorism
Pages: 1-14
Issue: 1
Volume: 30
Year: 2007
X-DOI: 10.1080/10576100601049928
File-URL: http://hdl.handle.net/10.1080/10576100601049928
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:30:y:2007:i:1:p:1-14



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_170168_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Margaret Kosal
Author-X-Name-First: Margaret
Author-X-Name-Last: Kosal
Title: Terrorism Targeting Industrial Chemical Facilities: Strategic Motivations and the Implications for U.S. Security
Abstract: Policy to reduce the threat of a terrorist attack against industrial chemical facilities—critical infrastructure with potential to cause mass casualties—is being driven by incomplete and, in some cases, incorrect assumptions. This article chronicles incidents by non-state actors directed at the chemical industry and explores the strategic considerations prompting groups to target the industry. By incorporating motivations for targeting infrastructure a more robust, comprehensive risk assessment is realized. Analysis challenging the “insider” threat paradigm and recommendations to ameliorate the potential effects are also presented. These are found to differ substantially from the leading policy measures currently advocated.
Journal: Studies in Conflict & Terrorism
Pages: 41-73
Issue: 1
Volume: 30
Year: 2007
X-DOI: 10.1080/10576100600702006A
File-URL: http://hdl.handle.net/10.1080/10576100600702006A
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:30:y:2007:i:1:p:41-73



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_205344_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bruce Hoffman
Author-X-Name-First: Bruce
Author-X-Name-Last: Hoffman
Title: What Went Wrong?
Journal: Studies in Conflict & Terrorism
Pages: 93-95
Issue: 1
Volume: 30
Year: 2007
X-DOI: 10.1080/10576100601054407
File-URL: http://hdl.handle.net/10.1080/10576100601054407
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:30:y:2007:i:1:p:93-95



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_195879_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Victor Asal
Author-X-Name-First: Victor
Author-X-Name-Last: Asal
Author-Name: Brian Nussbaum
Author-X-Name-First: Brian
Author-X-Name-Last: Nussbaum
Author-Name: D. Harrington
Author-X-Name-First: D.
Author-X-Name-Last: Harrington
Title: Terrorism as Transnational Advocacy: An Organizational and Tactical Examination
Abstract: This article attempts to shed light on the dynamics and machinations within terrorist organizations by incorporating a heretofore overlooked literature which is directly applicable, that of transnational advocacy networks (TANs). Terror networks have been described using every possible analogy, from multinational corporations to organized crime to the anthropomorphic classic “cut off the head, and the body will die.” In reality, terrorist organizations function in much the same way, and using many of the same techniques, as transnational advocacy networks concerned with issues like the environment or human rights. By describing these characteristics, and comparing TANs and Terror TANs (TTANs), this article aims to offer insight into the tactics and motivations that define modern, as well as the much heralded post-modern, terrorism.
Journal: Studies in Conflict & Terrorism
Pages: 15-39
Issue: 1
Volume: 30
Year: 2007
X-DOI: 10.1080/10576100600959713
File-URL: http://hdl.handle.net/10.1080/10576100600959713
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:30:y:2007:i:1:p:15-39

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_156174_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sandra R. Leavitt
Author-X-Name-First: Sandra R.
Author-X-Name-Last: Leavitt
Title: A Review Of “Rohan Gunaratna, Arabinda Acharya, and Sabrina Chua Conflict and Terrorism in Southern Thailand
Journal: Studies in Conflict & Terrorism
Pages: 370-373
Issue: 4
Volume: 30
Year: 2007
Month: 4
X-DOI: 10.1080/10576100600561915
File-URL: http://hdl.handle.net/10.1080/10576100600561915
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:30:y:2007:i:4:p:370-373



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_156385_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Scott R. Senjo
Author-X-Name-First: Scott R.
Author-X-Name-Last: Senjo
Title: A Review Of “Robert W. Taylor, Tory J. Caeti, D. Kall Loper, Eric J. Fritsch, and John Liederbach, Digital Crime and Digital Terrorism“
Journal: Studies in Conflict & Terrorism
Pages: 367-370
Issue: 4
Volume: 30
Year: 2007
Month: 4
X-DOI: 10.1080/10576100600564026
File-URL: http://hdl.handle.net/10.1080/10576100600564026
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:30:y:2007:i:4:p:367-370



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_193191_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Moniza Khokhar
Author-X-Name-First: Moniza
Author-X-Name-Last: Khokhar
Title: Reforming Militant Madaris in Pakistan
Abstract: 
 The madaris located in Pakistan have played an important role in spreading militant jihadist ideologies and some have even labeled the madaris “terrorist factories.” After the War on Terror began the Pakistani government was forced to deal with their violent religious schools. The federal government did produce a plan for reform; however, the already unimpressive strategies have not been followed through successfully and the militant schools still remain a major threat even today. The reform will need to focus on three different aspects of the madaris: the financing, the curriculum, and the state's authority over the institutions. In order for permanent reformation to occur, the Pakistani government will need to strictly implement policies that will demilitarize the madaris.
Journal: Studies in Conflict & Terrorism
Pages: 353-365
Issue: 4
Volume: 30
Year: 2007
Month: 4
X-DOI: 10.1080/10576100600932751
File-URL: http://hdl.handle.net/10.1080/10576100600932751
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:30:y:2007:i:4:p:353-365



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_219935_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Paul Hastert
Author-X-Name-First: Paul
Author-X-Name-Last: Hastert
Title: Al Qaeda and Iran: Friends or Foes, or Somewhere in Between?
Abstract: 
 The relationship between Al Qaeda and Iran has been one of continuing controversy even prior to 9/11 and is more relevant today as U.S. forces find themselves on battlefields where both have vital interests and roles. It's clear that Al Qaeda and Iran have longstanding issues with the United States, but despite the wild allegations, these two parties remain far apart based on religious differences and differing geopolitical aims. Still, the signs of cooperation between extremists in pursuit of a common aim remains clear and must be taken into account as the United States works to restore stability across the Middle East.
Journal: Studies in Conflict & Terrorism
Pages: 327-336
Issue: 4
Volume: 30
Year: 2007
Month: 4
X-DOI: 10.1080/10576100701200132
File-URL: http://hdl.handle.net/10.1080/10576100701200132
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:30:y:2007:i:4:p:327-336



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_219936_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Pete Lentini
Author-X-Name-First: Pete
Author-X-Name-Last: Lentini
Author-Name: Muhammad Bakashmar
Author-X-Name-First: Muhammad
Author-X-Name-Last: Bakashmar
Title: Jihadist Beheading: A Convergence of Technology, Theology, and Teleology?
Abstract: 
 Although contemporary jihadist terrorists are most well known for perpetrating operations that generate mass casualties, they also conduct violent acts that yield fewer victims, such as beheading hostages. Examining the religious and cultural contexts that surround jihadist beheadings, developments in new media, and drawing on examples from the Chechen Wars and the Iraq War, this article argues that jihadists have employed this tactic for a range of reasons, including obtaining ransom payments, hampering foreign investment, discrediting transitional states, and recruiting supporters. It also suggests that jihadists' beheading of their captives corresponds with aspects of cosmic war, particularly on how religious terrorists' desires to please a deity and secure a place of honor in the hereafter has devalued the lives of both captor and prisoner. Consequently, contemporary jihadist beheading is an outgrowth of the practice of terrorist hostage taking. As this article goes to press (February 2007) UK authorities disrupted a terrorist cell allegedly plotting to behead British Muslim soldiers who served in Afghanistan and Iraq, and to broadcast the filmed executions through jihadist websites. Journalists have described the intended beheadings and their dissemination as “Iraq-style.” There is no doubt that jihadist beheading became more widely known as a result of the Iraq conflict. However, the beheadings in Iraq were largely used to recruit future jihadists and to demonstrate jihadists' strength to their potential support base, the global Muslim community. In contrast, the alleged UK beheading plot was aimed at striking terror into Muslims living in the UK so that they would not support or serve their government. Indeed the Iraq beheadings were intended to persuade, and the UK plot was intended to dissuade. These alleged activities suggest that contemporary jihadist beheading is not only an extension of hostage-taking, it is also an independently evolving terrorist tactic.
Journal: Studies in Conflict & Terrorism
Pages: 303-325
Issue: 4
Volume: 30
Year: 2007
Month: 4
X-DOI: 10.1080/10576100701200140
File-URL: http://hdl.handle.net/10.1080/10576100701200140
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:30:y:2007:i:4:p:303-325



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_219937_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Seth G. Jones
Author-X-Name-First: Seth G.
Author-X-Name-Last: Jones
Title: Fighting Networked Terrorist Groups: Lessons from Israel
Abstract: 
 In Iraq and Afghanistan, the United States faced “networked” adversaries: insurgent groups that communicated and coordinated their political and military campaigns without a central command. The rise of networked groups is a direct result of the preponderance of U.S. military power. Consequently, this article asks: What strategies have been most effective in defeating networked groups? To answer this question, the article examines Israeli operations against Palestinian groups during Operation Defense Shield in 2002. It argues that the most effective strategy to defeat networked adversaries is to use networked strategies. In Israel, this meant establishing multiple units to penetrate Palestinian urban areas, swarm together from several directions, and kill or capture militants.
Journal: Studies in Conflict & Terrorism
Pages: 281-302
Issue: 4
Volume: 30
Year: 2007
Month: 4
X-DOI: 10.1080/10576100701200157
File-URL: http://hdl.handle.net/10.1080/10576100701200157
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:30:y:2007:i:4:p:281-302



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_219939_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anthony Vinci
Author-X-Name-First: Anthony
Author-X-Name-Last: Vinci
Title: Existential Motivations in the Lord's Resistance Army’s Continuing Conflict
Abstract: 
 This article argues that although the Lord's Resistance Army (LRA) may have begun its war for instrumental goals, such as to create political change, these goals have largely been replaced by existential motivations, in the sense that the LRA organization fights in order to continue providing security and a vocation to its members, which would be lost by a return to wider society. It is posited that the factor allowing for this turn from instrumental to existential motivation is that the LRA organization has effectively separated itself from wider society and created an autonomous political community. The implication of this is that it may be necessary to first reintegrate members of the LRA into the greater Acholi and Ugandan community and then to find a political settlement. The article also discusses lessons learned for dealing with other existentially motivated armed groups, such as Al Qaeda.
Journal: Studies in Conflict & Terrorism
Pages: 337-352
Issue: 4
Volume: 30
Year: 2007
Month: 4
X-DOI: 10.1080/10576100701200173
File-URL: http://hdl.handle.net/10.1080/10576100701200173
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:30:y:2007:i:4:p:337-352

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_739080_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mark Cochrane
Author-X-Name-First: Mark
Author-X-Name-Last: Cochrane
Title: Security Force Collusion in Northern Ireland 1969–1999: Substance or Symbolism?
Abstract: In order to thwart and prevent terrorism the State is compelled to use all of the covert capabilities at its disposal in order to protect the society it serves. One of its most effective weapons is the use of human intelligence. Often acquired through secret relationships with terrorists or those with the ability to access preemptive intelligence. This important work is contentious for any democratic society as such practices and relationships, should they become known, inevitably beg the question—How far is it permissible for the State to go? A case study of State efforts to combat terrorism in Northern Ireland presents the moral, ethical, and legal dilemmas encountered and the propaganda opportunity such activity presents its detractors and critics. This article will identify key aspects related to the intelligence war and the development and creation of the concept of “collusion,” a subjective issue, and one that has no legal definition.
Journal: Studies in Conflict & Terrorism
Pages: 77-97
Issue: 1
Volume: 36
Year: 2013
X-DOI: 10.1080/1057610X.2013.739080
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.739080
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:1:p:77-97



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_739078_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bryan Groves
Author-X-Name-First: Bryan
Author-X-Name-Last: Groves
Title: America's Trajectory in the Long War: Redirecting Our Efforts Toward Strategic Effects Versus Simply Tactical Gains
Abstract: After 9/11 the United States has a significant disconnect between its strategic and tactical efforts against violent global jihadists. Some American leaders and commanders are confusing effectiveness and success, improperly associating tactical disruption of enemy elements with strategic effect. While the country has won some important tactical victories, it is not clear that they are amounting to a strategic impact, or that the gains will last. The situation is complex, with various dynamics influencing America's prosecution of the Long War and its ability to be successful in the long term. This article looks at what those factors are and provides policy makers with tangible recommendations that, if implemented, will place America's counterterrorism efforts on a more strategic trajectory and hold greater promise of lasting impact.
Journal: Studies in Conflict & Terrorism
Pages: 26-48
Issue: 1
Volume: 36
Year: 2013
X-DOI: 10.1080/1057610X.2013.739078
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.739078
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:1:p:26-48



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_739077_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Seth Jones
Author-X-Name-First: Seth
Author-X-Name-Last: Jones
Author-Name: Patrick Johnston
Author-X-Name-First: Patrick
Author-X-Name-Last: Johnston
Title: The Future of Insurgency
Abstract: What are key historical trends in insurgencies? And what do these finding suggest about the future of insurgency? We examine four aspects: causes of insurgency, outside support, strategies, and tactics. Based on an examination of quantitative and qualitative data, we make several arguments about the future. China could become increasingly involved in supporting insurgencies and counterinsurgencies if its economic and military power continues to increase and its global interest expands. In addition, insurgent groups will likely require less time to achieve high levels of sophistication for improvised explosive devices and other asymmetric tactics, which we expect they will use against more powerful mechanized counterinsurgent forces. We also expect that insurgent groups may take advantage of commercially-available technology to communicate, distribute propaganda, and recruit individuals. In addition, insurgents will likely make further use of encryption, anonymizing services, location-masking tools, and other related technologies to protect their online activities.
Journal: Studies in Conflict & Terrorism
Pages: 1-25
Issue: 1
Volume: 36
Year: 2013
X-DOI: 10.1080/1057610X.2013.739077
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.739077
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:1:p:1-25



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_739079_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Benjamin Acosta
Author-X-Name-First: Benjamin
Author-X-Name-Last: Acosta
Author-Name: Steven Childs
Author-X-Name-First: Steven
Author-X-Name-Last: Childs
Title: Illuminating the Global Suicide-Attack Network
Abstract: This article examines the contemporary phenomenon of suicide attacks by fusing network analysis and time-series econometrics. We find that a global network of militant organizations drives the reproduction of the suicide-attack phenomenon, and brokers within the network mark the primary perpetrators and diffusers of the tactic. The introduction of a fourth level of analysis of political violence demonstrates that network connections between organizations form a system that perpetuates suicide attacks. An organization-level analysis reveals that ideological congruence facilitates the establishment of network connections. As exemplified by the wide range of employers and targets, and moreover by the generation of an autogamous function, contemporary suicide attacks represent a unique sociopolitical phenomenon. Accordingly, organizations that use the tactic warrant a distinct classification.
Journal: Studies in Conflict & Terrorism
Pages: 49-76
Issue: 1
Volume: 36
Year: 2013
X-DOI: 10.1080/1057610X.2013.739079
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.739079
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:1:p:49-76

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_823738_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ogen Goldman
Author-X-Name-First: Ogen
Author-X-Name-Last: Goldman
Title: The Importance of Voluntary Associations for Guerrilla Movements
Abstract: 
 The question I examine in this article is why is it that under certain circumstances a guerrilla movement succeeds while under others it fails? The hypotheses that I shall present below are the greater the number and variety of voluntary associations supporting the guerrilla movement, compared with the number of associations supporting the regime, the greater is the guerillas’ level of success. Voluntary associations can fulfill the guerrilla's basic needs: resources, organizational ability, and obligation. Achieving these needs assist the guerrilla in realizing: population support; inter-class allies; military force; governmental function, which in turn allows the realization of the political objectives.
Journal: Studies in Conflict & Terrorism
Pages: 789-818
Issue: 10
Volume: 36
Year: 2013
Month: 10
X-DOI: 10.1080/1057610X.2013.823738
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.823738
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:10:p:789-818



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_823752_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Henry Rome
Author-X-Name-First: Henry
Author-X-Name-Last: Rome
Title: Revisiting the “Problem From Hell”: Suicide Terror in Afghanistan
Abstract: 
 A hallmark of the resurgence of antigovernment forces in Afghanistan was the mass introduction of suicide terrorist attacks. Between 2005 and 2006, the incidence of suicide bombings increased more than fivefold, marking a sea change in the Afghan conflict. Despite the initial jump in the volume of suicide attacks and the fear of more violence, the number of attacks actually flat-lined while the level of other attacks increased. This study will argue that it is the competency of the attackers employed in Afghanistan, not the politics, technology, or targeting, that best explains the static level of suicide attacks.
Journal: Studies in Conflict & Terrorism
Pages: 819-838
Issue: 10
Volume: 36
Year: 2013
Month: 10
X-DOI: 10.1080/1057610X.2013.823752
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.823752
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:10:p:819-838



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_823754_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anne Lise Fimreite
Author-X-Name-First: Anne Lise
Author-X-Name-Last: Fimreite
Author-Name: Peter Lango
Author-X-Name-First: Peter
Author-X-Name-Last: Lango
Author-Name: Per Lægreid
Author-X-Name-First: Per
Author-X-Name-Last: Lægreid
Author-Name: Lise H. Rykkja
Author-X-Name-First: Lise H.
Author-X-Name-Last: Rykkja
Title: After Oslo and Utøya: A Shift in the Balance Between Security and Liberty in Norway?
Abstract: 
 The article addresses the challenges a society faces to when trying to balance security and liberty after a terrorist attack. A main question is to what extent attitudes toward counterterror measures changed in Norway after the massive terror attacks in July 2011. A hypothesis that people will be more in favor of such measures after a terror attack is examined using data from two surveys—one conducted in 2006 and one in August 2011, with additional results from a survey in 2012. The Norwegian response after the 2011 attacks is compared to the response to the same questions in the United States shortly after 11 September 2001. A main finding is that in Norway, in contrast to the United States, levels of support for counterterror measures declined immediately after the attacks. The authors argue that this can be explained partly by the different levels of trust in the two countries, and partly by differences in the political executive's framing of the crisis. In 2012, support of counterterror measures in Norway has risen to pre-2011 levels. This is related to the changed discourse after the publication of the report from the 22 July Commission.
Journal: Studies in Conflict & Terrorism
Pages: 839-856
Issue: 10
Volume: 36
Year: 2013
Month: 10
X-DOI: 10.1080/1057610X.2013.823754
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.823754
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:10:p:839-856



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_823761_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Matthias Basedau
Author-X-Name-First: Matthias
Author-X-Name-Last: Basedau
Author-Name: Johannes Vüllers
Author-X-Name-First: Johannes
Author-X-Name-Last: Vüllers
Author-Name: Peter Körner
Author-X-Name-First: Peter
Author-X-Name-Last: Körner
Title: What Drives Inter-Religious Violence? Lessons from Nigeria, Côte d’Ivoire, and Tanzania
Abstract: 
 Given its religious demography, sub-Saharan Africa seems particularly prone to the outbreak of violent clashes between Christians and Muslims. This article compares three sub-Saharan countries—Nigeria, Côte d’Ivoire, and Tanzania—that display different levels of inter-religious violence despite each having in common similar population ratios of Christians and Muslims, as well as all sharing a number of the classical risk factors for conflict onset. The analysis of these three case studies shows that higher levels of inter-religious violence result from horizontal inequalities and overlapping religious and ethnic group boundaries that, in the context of tense political transformation, consequently breed inter-religious grievances and violence. When theological ideas become politicized, inter-religious violence reaches its most intense level of expression.
Journal: Studies in Conflict & Terrorism
Pages: 857-879
Issue: 10
Volume: 36
Year: 2013
Month: 10
X-DOI: 10.1080/1057610X.2013.823761
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.823761
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:10:p:857-879



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_823765_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel Byman
Author-X-Name-First: Daniel
Author-X-Name-Last: Byman
Title: A Review of “Hezbollah: The Global Footprint of Lebanon's Party of God”
Journal: Studies in Conflict & Terrorism
Pages: 880-881
Issue: 10
Volume: 36
Year: 2013
Month: 10
X-DOI: 10.1080/1057610X.2013.823765
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.823765
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:10:p:880-881

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_832116_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Donald  Holbrook
Author-X-Name-First: Donald 
Author-X-Name-Last: Holbrook
Title: Alienating the Grassroots: Looking Back at Al Qaeda's Communicative Approach Toward Muslim Audiences
Abstract: 
 This article explores the way in which the Al Qaeda leadership appeals to and addresses different cohorts of Sunni Muslim audiences through its statements. This communicative approach is understood in the context of collective action frames from the social movement literature. The article analyzes the way in which communiqués from Osama bin Laden and Ayman al-Zawahiri have approached different Muslim audiences, defining three principal approaches: encouragement, excommunication, and exasperation. The article discusses how these approaches developed from the early 1990s up until the end of 2011, arguing that denunciation of Muslim publics has become an ever more prominent feature of this discourse.
Journal: Studies in Conflict & Terrorism
Pages: 883-898
Issue: 11
Volume: 36
Year: 2013
Month: 11
X-DOI: 10.1080/1057610X.2013.832116
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.832116
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:11:p:883-898



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_832113_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Eitan  Azani
Author-X-Name-First: Eitan 
Author-X-Name-Last: Azani
Title: The Hybrid Terrorist Organization: Hezbollah as a Case Study
Abstract: 
 Since 1982, Hezbollah has evolved from a “revolutionary vanguard” terrorist organization bent on violently overthrowing the Lebanese government to a hybrid terrorist organization that uses legitimate political tools to the same end. Today Hezbollah operates on the civilian plane of da’wa, social welfare, and religious education; the military–Resistance plane (jihad); and the political plane. In its drive to dominate Shi’ite society, Hezbollah overcame its chief rival, Amal, and now plays a decisive role in Lebanon's political system and the Middle East. Understanding Hezbollah's emergence as a prototypical hybrid terrorist organization is key to understanding global and local jihad movements.
Journal: Studies in Conflict & Terrorism
Pages: 899-916
Issue: 11
Volume: 36
Year: 2013
Month: 11
X-DOI: 10.1080/1057610X.2013.832113
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.832113
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:11:p:899-916



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_832115_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Younkyoo  Kim
Author-X-Name-First: Younkyoo 
Author-X-Name-Last: Kim
Author-Name: Stephen  Blank
Author-X-Name-First: Stephen 
Author-X-Name-Last: Blank
Title: Insurgency and Counterinsurgency in Russia: Contending Paradigms and Current Perspectives
Abstract: 
 The most outstanding trend in contemporary conflicts has been the fusion of the threats from terrorism and insurgency. Insurgent threats in many places on the globe today are mistaken as terrorist threats, and counterterrorism (CT) is deployed as the local insurgents come increasingly to resemble their transnational terrorist partners. Such an emphasis on the role of terrorism in insurgencies and the undue focus on CT risks strengthening, rather than severing, the connection between local insurgents and transnational terrorists. Russia's counterterrorist strategy inadvertently transformed the conflict from a contained, nationalist rebellion to a sprawling jihadi insurgency and perversely encouraged the group to resort even more to terrorist tactics. The Russian counterinsurgency has been unsuccessful, as the insurgents are neither demolished as a force nor are they isolated by society. Losing the hearts and minds among the Chechen people is a key reason behind why the Russian operation in Chechnya suffered failures. Too little attention was paid to winning over the “hearts and minds” of the people.
Journal: Studies in Conflict & Terrorism
Pages: 917-932
Issue: 11
Volume: 36
Year: 2013
Month: 11
X-DOI: 10.1080/1057610X.2013.832115
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.832115
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:11:p:917-932



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_832117_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Rachel  Monaghan
Author-X-Name-First: Rachel 
Author-X-Name-Last: Monaghan
Title: Not Quite Terrorism: Animal Rights Extremism in the United Kingdom
Abstract: 
 Political violence undertaken in the name of animal rights has been ongoing for some 35 years in the United Kingdom and yet such activity is commonly termed extremism, not terrorism. Existing counterterrorism measures have not been utilized by the state against individuals and groups engaged in such violence. This article explores the criminal justice response to the various types of political violence, which have been claimed by groups like the Animal Liberation Front (ALF), the Animal Rights Militia, the Justice Department, and the Provisional ALF. Moreover, the article argues that terrorist laws do not have to be used to effectively tackle single-issue terrorism such as animal rights extremism where activists employ tactics more commonly associated with a terrorist campaign.
Journal: Studies in Conflict & Terrorism
Pages: 933-951
Issue: 11
Volume: 36
Year: 2013
Month: 11
X-DOI: 10.1080/1057610X.2013.832117
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.832117
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:11:p:933-951



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_850889_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: Statement of Removal
Journal: Studies in Conflict & Terrorism
Pages: W1-W1
Issue: 11
Volume: 36
Year: 2013
Month: 11
X-DOI: 10.1080/1057610X.2013.850889
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.850889
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:11:p:W1-W1

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_842136_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Martin  Rudner
Author-X-Name-First: Martin 
Author-X-Name-Last: Rudner
Title: Al Qaeda's Twenty-Year Strategic Plan: The Current Phase of Global Terror
Abstract: 
 This study examines Al Qaeda's organizational dynamics, doctrinal precepts, strategic objectives, operational priorities, and tactical vectors in the context of its Twenty-Year Strategic Plan. This seven-stage Strategic Plan is addressed with a particular focus on its current phase (Stage 5), 2013–2016, involving the mobilization of Muslim forces for the “Declaration of the Caliphate.” In this regard, particular attention is paid to the Al Qaeda engagement in militant jihadist campaigns across the Middle East and other Muslim domains. The study concludes with an overall assessment of global threats and ongoing risks arising from the current phase of Al Qaeda's Twenty-Year Strategic Plan.
Journal: Studies in Conflict & Terrorism
Pages: 953-980
Issue: 12
Volume: 36
Year: 2013
Month: 12
X-DOI: 10.1080/1057610X.2013.842136
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.842136
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:12:p:953-980



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_842132_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel  Byman
Author-X-Name-First: Daniel 
Author-X-Name-Last: Byman
Title: Outside Support for Insurgent Movements
Abstract: 
 When assessing insurgencies, understanding the role of transnational factors is vital. This article explores how outside powers support an insurgency, focusing on four types of actors: states, diasporas, refugees, and other insurgencies. It also examines the pitfalls and limits of outside support and assesses why such support is so hard to stop. The article concludes by offering implications for the conflict in Syria and discussing several policy implications with a particular emphasis on why outside support is hard to stop.
Journal: Studies in Conflict & Terrorism
Pages: 981-1004
Issue: 12
Volume: 36
Year: 2013
Month: 12
X-DOI: 10.1080/1057610X.2013.842132
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.842132
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:12:p:981-1004



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_842123_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeff  Gruenewald
Author-X-Name-First: Jeff 
Author-X-Name-Last: Gruenewald
Author-Name: Steven  Chermak
Author-X-Name-First: Steven 
Author-X-Name-Last: Chermak
Author-Name: Joshua D. Freilich
Author-X-Name-First: Joshua D.
Author-X-Name-Last: Freilich
Title: Far-Right Lone Wolf Homicides in the United States
Abstract: 
 Little is known about the nature of far-right lone wolf terrorism and how this form of violence varies across different types of suspects. Relying on data from the Extremist Crime Database (ECDB), we comparatively examine characteristics of far-right homicides in the United States perpetrated by suspects with no evident affiliations with domestic terrorist organizations. Surprisingly, we found that this form of lone wolf terrorism has generally not increased during the past decade. We also found important differences, such as in suspects’ mental health, in statuses of homicide offenders who operate alone compared to those who associate or act with others.
Journal: Studies in Conflict & Terrorism
Pages: 1005-1024
Issue: 12
Volume: 36
Year: 2013
Month: 12
X-DOI: 10.1080/1057610X.2013.842123
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.842123
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:12:p:1005-1024



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_842135_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Paul B. Rich
Author-X-Name-First: Paul B.
Author-X-Name-Last: Rich
Title: Terror and Its Limits: The Historical Understanding of Terrorist Movements, States and Tribes in an Age of Cultural Anxiety
Abstract: 
 This article argues that much of the historical analysis of terror and terrorism in history has been weak in understanding the limits on terrorist activity and how terrorist campaigns eventually end. Reviewing three recent studies that examine various aspects of terrorism and the language of terror, the article seeks to show that states often play a major role in the way terrorist movements develop and eventually end up either defeated or moving into mainstream political engagement. The article points to a number of examples to illuminate this including the Carbonara in nineteenth century Italy, the Paris Commune and the ending segregation in the U.S. South in the 1960s.
Journal: Studies in Conflict & Terrorism
Pages: 1025-1044
Issue: 12
Volume: 36
Year: 2013
Month: 12
X-DOI: 10.1080/1057610X.2013.842135
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.842135
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:12:p:1025-1044



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_852398_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: Editorial Board EOV
Journal: Studies in Conflict & Terrorism
Pages: ebi-ebi
Issue: 12
Volume: 36
Year: 2013
Month: 12
X-DOI: 10.1080/1057610X.2013.852398
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.852398
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:12:p:ebi-ebi

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_747075_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gregory Miller
Author-X-Name-First: Gregory
Author-X-Name-Last: Miller
Title: Terrorist Decision Making and the Deterrence Problem
Abstract: An ongoing debate among policymakers and terrorism scholars concerns the effectiveness of deterrence as a counterterrorism tool. Absent from the debate is a discussion of the complex nature of terrorist decision making. Decisions are made at varying levels in a terrorist organization, often by actors having different motives, resulting in behavior that is not always fully rational. This article identifies several circumstances when terrorist behavior is not the product of an entirely unitary, rational decision-making process, and therefore highlights when deterrence policies will be least effective. It concludes with some policy implications for understanding when deterrence policies are most likely to succeed and how to address terrorism in other situations.
Journal: Studies in Conflict & Terrorism
Pages: 132-151
Issue: 2
Volume: 36
Year: 2013
X-DOI: 10.1080/1057610X.2013.747075
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.747075
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:2:p:132-151



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_747074_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: William Rosenau
Author-X-Name-First: William
Author-X-Name-Last: Rosenau
Title: “Our Backs Are Against the Wall”: The Black Liberation Army and Domestic Terrorism in 1970s America
Abstract: This article addresses the gap in the literature on U.S. domestic terrorism and counterterrorism in the 1970s by examining a once-notorious but now largely forgotten terrorist group, the Black Liberation Army (BLA). An outgrowth of the Black Panther Party, the BLA was directly responsible for at least 20 fatalities, making it amongst the most lethal “homegrown” U.S. groups of the period. This article seeks to shed new light on the BLA by exploring its relatively short but violent trajectory. By focusing on the group's origins, operations, ideology, and structure, the BLA can be understood as part of a wider landscape of homegrown political violence. The BLA emerged during the waning phase of a protest cycle that included the civil rights, Black Power, and anti-war movements. Like other terrorist groups before and after, the BLA claimed to be acting in self-defense and on behalf of the people, presenting itself as an army resisting police occupation of minority communities. With the collapse of the extreme Left in the mid-1970s, the BLA's prospects for creating a broader revolutionary base became remote. The article also examines law-enforcement responses to the BLA and the competing ways in which the Federal Bureau of Investigation and local police (and in particular, the New York Police Department) framed and countered the BLA threat.
Journal: Studies in Conflict & Terrorism
Pages: 176-192
Issue: 2
Volume: 36
Year: 2013
X-DOI: 10.1080/1057610X.2013.747074
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.747074
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:2:p:176-192



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_747071_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Boaz Ganor
Author-X-Name-First: Boaz
Author-X-Name-Last: Ganor
Author-Name: Ophir Falk
Author-X-Name-First: Ophir
Author-X-Name-Last: Falk
Title: De-Radicalization in Israel's Prison System
Abstract: An effective de-radicalization process in prisons is intended to facilitate the renouncement of violence and terrorism by those that have carried out such offenses. A key lesson that can be drawn from Israel's de-radicalization efforts is that it is possible, indeed recommended, to treat inmates—regardless of their level of radicalization—in a dignified and humane manner. However, Israel's ability to significantly de-radicalize security prisoners is limited if it is at all existent in its current form. Security prisoners with the potential for positive change should be placed in a different, perhaps foreign setting. This article provides an overview of Israel's prison system, the challenges it faces, its efforts to de-radicalize security inmates and suggests additional courses of action.
Journal: Studies in Conflict & Terrorism
Pages: 116-131
Issue: 2
Volume: 36
Year: 2013
X-DOI: 10.1080/1057610X.2013.747071
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.747071
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:2:p:116-131



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_747073_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anja Dalgaard-Nielsen
Author-X-Name-First: Anja
Author-X-Name-Last: Dalgaard-Nielsen
Title: Promoting Exit from Violent Extremism: Themes and Approaches
Abstract: A number of Western countries are currently adding exit programs targeting militant Islamists to their counterterrorism efforts. Drawing on research into voluntary exit from violent extremism, this article identifies themes and issues that seem to cause doubt, leading to exit. It then provides a perspective on how these natural sources of doubt might best be brought to bear in connection with an exit program by drawing on social psychology and research into persuasion and attitude change. It is argued that an external intervention should stay close to the potential exiter's own doubt, make the influence attempt as subtle as possible, use narratives and self-affirmatory strategies to reduce resistance to persuasion, and consider the possibility to promote attitudinal change via behavioral change as an alternative to seek to influence beliefs directly.
Journal: Studies in Conflict & Terrorism
Pages: 99-115
Issue: 2
Volume: 36
Year: 2013
X-DOI: 10.1080/1057610X.2013.747073
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.747073
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:2:p:99-115



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_747072_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bart Schuurman
Author-X-Name-First: Bart
Author-X-Name-Last: Schuurman
Title: Defeated by Popular Demand: Public Support and Counterterrorism in Three Western Democracies, 1963–1998
Abstract: Acquiring and maintaining public support is frequently cited as an important requirement for governments fighting non-state actors. But how exactly can public support influence the course of counterterrorism campaigns and thereby contribute to an escalation or de-escalation of violence? This article argues that public support can provide a mandate for action but that it can also set boundaries for the measures governments and their non-state adversaries can legitimately use. Fluctuations in the quantity and quality of public support for either side can expand or contract these boundaries, potentially instigating marked changes in conflict-related violence levels and affecting the efficacy of government countermeasures.
Journal: Studies in Conflict & Terrorism
Pages: 152-175
Issue: 2
Volume: 36
Year: 2013
X-DOI: 10.1080/1057610X.2013.747072
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.747072
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:2:p:152-175

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_755912_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Steven Chermak
Author-X-Name-First: Steven
Author-X-Name-Last: Chermak
Author-Name: Joshua Freilich
Author-X-Name-First: Joshua
Author-X-Name-Last: Freilich
Author-Name: Michael Suttmoeller
Author-X-Name-First: Michael
Author-X-Name-Last: Suttmoeller
Title: The Organizational Dynamics of Far-Right Hate Groups in the United States: Comparing Violent to Nonviolent Organizations
Abstract: Few studies have explored the factors that distinguish violent from nonviolent far-right hate groups. We examine four categories of factors on hate groups: (1) Organizational capacity, (2) Organizational constituency, (3) Strategic connectivity, and (4) Structural arrangements. Age and size, groups in conflict, groups led by charismatic leaders, groups that advocated for leaderless resistance tactics, and region increased a group's propensity to commit violence. Groups that published ideological literature were significantly less likely to be violent. By identifying factors that distinguish violent from nonviolent groups, this study helps us better understand characteristics of violent far-right hate groups in the United States.
Journal: Studies in Conflict & Terrorism
Pages: 193-218
Issue: 3
Volume: 36
Year: 2013
X-DOI: 10.1080/1057610X.2013.755912
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.755912
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:3:p:193-218



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_755913_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bridget Nolan
Author-X-Name-First: Bridget
Author-X-Name-Last: Nolan
Title: The Effects of Cleric Statements on Suicide Bombings in Pakistan, 2000–2010
Abstract: This article explores the relationship between suicide bombings and public cleric statements in Pakistan between 2000–2010. It establishes that bombings and statements increase over time, that cleric statements vary according to the bombing target, and that police and military targets most frequently garner clerics’ attention. An adaptation of Kaplan, Mintz, and Mishal's (2006) maximum likelihood estimation method determines whether cleric statements affect the bombing rate. The analysis shows that pro-suicide statements have a far greater effect on the bombing rate than anti-suicide statements, both in the magnitude of increased bombings and by the length of time over which they exert influence.
Journal: Studies in Conflict & Terrorism
Pages: 219-234
Issue: 3
Volume: 36
Year: 2013
X-DOI: 10.1080/1057610X.2013.755913
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.755913
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:3:p:219-234



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_755914_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: James Worrall
Author-X-Name-First: James
Author-X-Name-Last: Worrall
Title: Reading Booth in Beirut: Is Hizbollah an Emancipatory Actor?
Abstract: The concept of Emancipation has become increasingly important in security studies in recent years but how well does the idea travel outside of the Western context in which it was conceived and into the Middle East? This article examines Hizbollah's four main identities: religious, resistance, socioeconomic, and as allies/proxies of Iran and asks to what extent this key regional non-state actor sees itself as an emancipatory agent in its own terms and how this differs from the Emancipatory ideal of Critical Security Studies (CSS). Does Hizbollah's current makeup offer enough scope to pursue Emancipation in line with the CSS project? Since the precept of Jihad offers Muslims a theological justification to engage in a holy struggle for a moral, spiritual, or political goal, seemingly Hizbollah is uniquely positioned to offer the prospect of Emancipation for the traditionally downtrodden Shi’a citizens of Lebanon, but does their Islamic faith and their aim of adherence to the Islamic way of life which they interpret from the Qur’an and Sunnah proscribe their credentials as truly Emancipatory actors? The article uses this analysis to examine the extent to which the commitment to universal Emancipation, found in CSS, is reconcilable with its Western-orientated foundation when applied in a Middle Eastern context.
Journal: Studies in Conflict & Terrorism
Pages: 235-254
Issue: 3
Volume: 36
Year: 2013
X-DOI: 10.1080/1057610X.2013.755914
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.755914
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:3:p:235-254



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_755915_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Paul Rich
Author-X-Name-First: Paul
Author-X-Name-Last: Rich
Title: Understanding Terror, Terrorism, and Their Representations in Media and Culture
Abstract: This review article examines four recent books published on terrorism and insurgent warfare. It argues that the narrative developed from the early 1970s within terrorism studies or “terrorology” was considerably different from the discussion of terrorism in the post-1945 period and tended to marginalize the role of states in fomenting terror. The article looks at depictions of terrorism in both art and film as well the recent historiography of terrorism. The article argues that far more emphasis needs to be placed on the role of the French Revolution in the gestation of terrorism in the nineteenth century; by contrast the emphasis on late nineteenth century Russian terrorism has been rather exaggerated as many terrorist movement (such as that in 1880s Chicago) owed little to the Russian connection. Finally the article shows that the connection between terrorism and political nihilism has been overplayed and that few terrorist movements (as opposed to some terrorist theorists) were driven by a nihilist agenda.
Journal: Studies in Conflict & Terrorism
Pages: 255-277
Issue: 3
Volume: 36
Year: 2013
X-DOI: 10.1080/1057610X.2013.755915
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.755915
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:3:p:255-277

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_763599_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Christina Cliff
Author-X-Name-First: Christina
Author-X-Name-Last: Cliff
Author-Name: Andrew First
Author-X-Name-First: Andrew
Author-X-Name-Last: First
Title: Testing for Contagion/Diffusion of Terrorism in State Dyads
Abstract: This article tests the application of contagion/diffusion theories of political violence to terrorist activity. In order to apply theories of contagion/diffusion to terrorism, Granger causality analysis of terrorist activity in three state dyads—Lebanon–Israel, Peru–Colombia, India–Pakistan—is conducted. Within each dyad, terrorist activities in general and specific terrorist tactics in particular are analyzed. The test results show that there are correlations of terrorist events that indicate evidence of contagion and/or diffusion in all three dyads tested, although the patterns of contagion/diffusion are different for each dyad.
Journal: Studies in Conflict & Terrorism
Pages: 292-314
Issue: 4
Volume: 36
Year: 2013
X-DOI: 10.1080/1057610X.2013.763599
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.763599
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:4:p:292-314



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_763598_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jessica Davis
Author-X-Name-First: Jessica
Author-X-Name-Last: Davis
Title: Evolution of the Global : Female Suicide Bombers in Iraq
Abstract: Female suicide bombers are increasingly seen in conflicts throughout the world; in recent years, they have become much more prevalent in religious-fundamentalist conflict. Specifically, global jihadist groups are increasingly incorporating female suicide bombers into their operations, a significant ideological and operational shift for most of these groups. Jihadist groups are using women to fill a recruiting void, to achieve tactical surprise, and for strategic purposes. Female suicide bombers are likely to emerge in jihadist conflicts throughout the world, from Nigeria to Pakistan and beyond.
Journal: Studies in Conflict & Terrorism
Pages: 279-291
Issue: 4
Volume: 36
Year: 2013
X-DOI: 10.1080/1057610X.2013.763598
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.763598
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:4:p:279-291



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_763601_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alessandro Orsini
Author-X-Name-First: Alessandro
Author-X-Name-Last: Orsini
Title: A Day Among the Diehard Terrorists: The Psychological Costs of Doing Ethnographic Research
Abstract: This article describes the experience of a sociologist who made contact with a group of diehard terrorists responsible for multiple murders in order to conduct an ethnographic study. After outlining the sociological profile of the diehard terrorists, the author—making reference to the ethnographic studies of Jack Douglas, Martin Sanchez Jankowski, and Laud Humphreys—describes how he followed their traces. The aim of the article is to analyze the psychological costs that the sociologist must pay when he interacts with men and women who, in addition to proudly claiming credit for the homicides they have committed, affirm the importance of continuing to kill in order to salvage humanity's future.
Journal: Studies in Conflict & Terrorism
Pages: 337-351
Issue: 4
Volume: 36
Year: 2013
X-DOI: 10.1080/1057610X.2013.763601
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.763601
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:4:p:337-351



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_763600_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Justin Conrad
Author-X-Name-First: Justin
Author-X-Name-Last: Conrad
Author-Name: Daniel Milton
Author-X-Name-First: Daniel
Author-X-Name-Last: Milton
Title: Unpacking the Connection Between Terror and Islam
Abstract: Are countries with large Muslim populations more likely to experience or produce transnational terrorist attacks than countries with fewer Muslims? And if there is a difference, is it attributable to the influence of Islam, or to the economic, social, and political conditions that are common in predominantly Muslim countries? Analyzing all transnational terrorist attacks between 1973 and 2002, this study uses decomposition analysis to identify the relative contributions of the observable and behavioral characteristics of a state on the amount of terrorism that it experiences and produces. The results suggest that Muslim states do not systematically produce more terrorism than non-Muslim states once state repression, human rights abuses, and discrimination against minorities are taken into account.
Journal: Studies in Conflict & Terrorism
Pages: 315-336
Issue: 4
Volume: 36
Year: 2013
X-DOI: 10.1080/1057610X.2013.763600
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.763600
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:4:p:315-336

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_775417_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel Byman
Author-X-Name-First: Daniel
Author-X-Name-Last: Byman
Title: Fighting  Insurgencies: How Much Does Religion Really Matter?
Abstract: How do jihadist insurgencies differ from non-jihadist ones? Jihadist insurgents, like all insurgents, seek to control the government, need money and weapons, and thrive where government is weak. Yet their cause—jihad at local, regional, and global levels—gives them instant friends and resources, but also built-in enemies and burdens. Jihadist insurgents often organize, recruit, and fund-raise differently than traditional insurgent groups. The agendas of these militant groups often go against the local residents' sense of nationalism and anger these communities with their extreme interpretations of Islam. To take advantage of this, the United States can amplify local voices that are best able to discredit these insurgents and press allied regimes to disrupt the mosques, schools, and fund-raising networks that help support them. However, Washington should also recognize that weakening these groups at the local level may make them more likely to embrace international terrorism. Allied efforts to co-opt jihadists may make area societies and governments less favorable to other U.S. policies. Finally, failed democratization—a particularly salient issue given the Arab Spring—risks playing into the jihadist narrative.
Journal: Studies in Conflict & Terrorism
Pages: 353-371
Issue: 5
Volume: 36
Year: 2013
X-DOI: 10.1080/1057610X.2013.775417
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.775417
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:5:p:353-371



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_775478_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Paul Kamolnick
Author-X-Name-First: Paul
Author-X-Name-Last: Kamolnick
Title: Al Qaeda's  Crisis: Sayyid Imam and the Jurisprudence of Lawful Military 
Abstract: Militant Islamist Sayyid Imam's legal critique of Al Qaeda's anti-U.S. mass casualty terrorism holds great potential utility for counterterrorist messaging strategy. In this article, a jihad–realist Islamist theological–jurisprudential methodology is first defended as the means most productive for delegitimizing Al Qaeda among high value, religiously motivated recruits. Second, Sayyid Imam's specific allegations and detailed Sharia proofs against Al Qaeda are presented. Finally, implications are drawn for U.S. counterterrorist messaging focusing especially on the utility of wielding this theological–juridical approach as compared to other “counternarrative” approaches, and the vital need to accurately characterize Islamism and its relation to terrorism.
Journal: Studies in Conflict & Terrorism
Pages: 394-418
Issue: 5
Volume: 36
Year: 2013
X-DOI: 10.1080/1057610X.2013.775478
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.775478
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:5:p:394-418



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_775455_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Shale Horowitz
Author-X-Name-First: Shale
Author-X-Name-Last: Horowitz
Author-Name: Min Ye
Author-X-Name-First: Min
Author-X-Name-Last: Ye
Title: Targeting Civilians in Ethno-Territorial Wars: Power- and Preference-Based Sources of Ethnic Cleansing and Mass Killing Strategies
Abstract: In internal ethno-territorial conflicts, what explains why state or rebel group leaderships use civilian-targeting strategies—expulsion or mass killing strategies designed to punish enemy civilians or to decimate the enemy civilian presence on contested territory? One argument is that those living under the worst initial conditions—defined in terms of collective goods such as weak collective autonomy, policy outcomes, and material conditions—are most likely to target enemy group civilians. Another approach focuses on relative power—arguing that the enemy civilian population is targeted either because of weaker or stronger relative power. A third approach argues that differences in leadership preferences—in particular, more ideologically extreme or power-seeking preferences—are likely to drive direct assaults on enemy civilians. We examine these proposed mechanisms in terms of expected effects on benefits and costs in a simple ethno-territorial bargaining framework. We argue that relative power advantages and more extreme nationalist preferences seem most likely to predict decisions to target enemy civilian populations. We expect strongly power-seeking preferences to lead to civilian targeting more conditionally—where there is a greater internal political threat along with either greater relative power or a more moderate enemy. Last, we do not expect that variation in initial conditions will have a significant direct effect. We apply the framework to explain patterns of civilian targeting following the collapse of Yugoslavia in 1991. [Supplementary material is available for this article. Go to the publisher's online edition of Studies in Conflict & Terrorism for the following free supplemental resource: online appendix.]
Journal: Studies in Conflict & Terrorism
Pages: 372-393
Issue: 5
Volume: 36
Year: 2013
X-DOI: 10.1080/1057610X.2013.775455
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.775455
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:5:p:372-393



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_775501_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: James Khalil
Author-X-Name-First: James
Author-X-Name-Last: Khalil
Title: Know Your Enemy: On the Futility of Distinguishing Between Terrorists and Insurgents
Abstract: Academics and military analysts regularly attempt to distinguish terrorists from insurgents through focusing on the extent to which these adversaries (a) adopt nonviolent methods, (b) apply uncompromising forms of violence, (c) generate local support, (d) recruit and maintain manpower, and (e) control territory. In contrast, this article argues that attempts to distinguish between these adversaries inevitably fail, firstly, as they arbitrarily impose binary distinctions upon continuous variables (e.g., in levels of support, manpower figures), and secondly as there is a lack of agreement across these supposedly identifying characteristics. Thus, contrary to common wisdom, it is concluded that there is no contradiction in simultaneously labeling groups such as the Taliban and Al Qaeda as both terrorists and insurgents. Indeed, a complete understanding of these groups requires an assessment of their activities at both the tactical (as terrorists) and strategic (as insurgents) levels.
Journal: Studies in Conflict & Terrorism
Pages: 419-430
Issue: 5
Volume: 36
Year: 2013
X-DOI: 10.1080/1057610X.2013.775501
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.775501
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:5:p:419-430

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_784568_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Peter R. Neumann
Author-X-Name-First: Peter R.
Author-X-Name-Last: Neumann
Title: Options and Strategies for Countering Online Radicalization in the United States
Abstract: 
 The purpose of this article is to inform the debate about strategies and options for countering online radicalization within the U.S. domestic context. Its aim is to provide a better understanding of how the Internet facilitates radicalization; an appreciation of the dilemmas and tradeoffs that are involved in countering online radicalization within the United States; and ideas and best practices for making the emerging approach and strategy richer and more effective. It argues that online radicalization can be dealt with in three ways. Approaches aimed at restricting freedom of speech and removing content from the Internet are not only the least desirable, they are also the least effective. Instead, government should play a more energetic role in reducing the demand for radicalization and violent extremist messages—for example, by encouraging civic challenges to extremist narratives and by promoting awareness and education of young people. In the short term, the most promising way for dealing with the presence of violent extremists and their propaganda on the Internet is to exploit their online communications to gain intelligence and gather evidence in the most comprehensive and systematic fashion possible.
Journal: Studies in Conflict & Terrorism
Pages: 431-459
Issue: 6
Volume: 36
Year: 2013
Month: 6
X-DOI: 10.1080/1057610X.2013.784568
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.784568
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:6:p:431-459



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_784574_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Samuel C. Lindsey
Author-X-Name-First: Samuel C.
Author-X-Name-Last: Lindsey
Author-Name: Michael J. Williams
Author-X-Name-First: Michael J.
Author-X-Name-Last: Williams
Title: State-Sponsored Social Control of Illegitimate Social Movements: Strategies Used to Financially Damage Radical Islamic, Terrorist-Labeled Organizations
Abstract: 
 This article documents strategies and tactics of social control used by the U.S. government to detect and deter financing of radical Islamic, terrorist-labeled organizations. Through grounded theory, social control strategies were identified based on data from congressional committee hearings from 1999 to 2011. Findings revealed the presence of nine such strategies: (1) discover sources of funding, (2) deny or restrict access to money, (3) establish information networks and communication norms, (4) create derogatory labels, (5) influence the media, (6) impose legal sanctions, (7) offer financial incentives, (8) construct a shared collective identity, and (9) force terrorist-labeled organizations on the defensive.
Journal: Studies in Conflict & Terrorism
Pages: 460-476
Issue: 6
Volume: 36
Year: 2013
Month: 6
X-DOI: 10.1080/1057610X.2013.784574
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.784574
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:6:p:460-476



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_784603_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dan Cunningham
Author-X-Name-First: Dan
Author-X-Name-Last: Cunningham
Author-Name: Sean Everton
Author-X-Name-First: Sean
Author-X-Name-Last: Everton
Author-Name: Greg Wilson
Author-X-Name-First: Greg
Author-X-Name-Last: Wilson
Author-Name: Carlos Padilla
Author-X-Name-First: Carlos
Author-X-Name-Last: Padilla
Author-Name: Doug Zimmerman
Author-X-Name-First: Doug
Author-X-Name-Last: Zimmerman
Title: Brokers and Key Players in the Internationalization of the FARC
Abstract: 
 The Fuerzas Armadas Revolucionarias de Colombia (Revolutionary Armed Forces of Colombia—FARC) was originally founded to protect Colombian peasants from harsh landowner policies in exchange for food and supplies. Over time, it has evolved into an internationally connected, narco-trafficking organization that displays little concern for the peasants it once vowed to protect. In recent years, Colombian authorities have become more adept at countering the FARC, forcing it to operate increasingly outside of Colombia. The FARC's transformation from a local insurgency into an internationally connected one is the focus of this article. Using social network analysis it identifies key leaders who are tied to this transformation and discusses implications concerning the FARC's future.
Journal: Studies in Conflict & Terrorism
Pages: 477-502
Issue: 6
Volume: 36
Year: 2013
Month: 6
X-DOI: 10.1080/1057610X.2013.784603
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.784603
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:6:p:477-502



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_784611_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Yagil Henkin
Author-X-Name-First: Yagil
Author-X-Name-Last: Henkin
Title: Stoning the Dogs: Guerilla Mobilization and Violence in Rhodesia
Abstract: 
 Rhodesia, a breakaway British colony, was engulfed in an insurgency through much of its short history. African guerillas, rebelling against the white minority government, have killed many more African civilians during the war—the same group that formed their base of support—than either government soldiers or European civilians. The violence was not only intended to punish enemies of the guerilla—traitors or collaborators with the government. Nor was it the result of lack of popular support. Violence forced guerilla sympathizers to actively support the insurgency or participate in it, despite the considerable risks this participation carried. Political support should not be mistaken with mobilization. Without violence, the lack of benefits and the danger of government reprisal may have kept many from actively assisting the insurgency, despite politically identifying with the guerillas and hoping for their victory.
Journal: Studies in Conflict & Terrorism
Pages: 503-532
Issue: 6
Volume: 36
Year: 2013
Month: 6
X-DOI: 10.1080/1057610X.2013.784611
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.784611
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:6:p:503-532

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_793637_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David Vielhaber
Author-X-Name-First: David
Author-X-Name-Last: Vielhaber
Title: The Stasi–Meinhof Complex?
Abstract: 
 The extent of the East German Ministry for State Security's involvement with militant left-wing terrorist organizations that operated in West Germany remains one of the most contentious issues with respect to the legacy of left-wing terrorism in Germany. Fueled by new archival evidence and much speculation, the topic has been the subject of many unfounded and sensationalist assertions. This article seeks to provide a chronological reassessment based on the current state of knowledge, and thus seeks to make a contribution to a growing literature on state involvement with terrorist groups. While the East German spy agency at times colluded with terrorist groups, the degree of support fluctuated considerably and there is no evidence that a state actor “created” the armed groups or “directed” their activities.
Journal: Studies in Conflict & Terrorism
Pages: 533-546
Issue: 7
Volume: 36
Year: 2013
Month: 7
X-DOI: 10.1080/1057610X.2013.793637
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.793637
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:7:p:533-546



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_793617_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: S. D. Selvadurai
Author-X-Name-First: S. D.
Author-X-Name-Last: Selvadurai
Author-Name: M. L. R. Smith
Author-X-Name-First: M. L. R.
Author-X-Name-Last: Smith
Title: Black Tigers, Bronze Lotus: The Evolution and Dynamics of Sri Lanka's Strategies of Dirty War
Abstract: 
 Although much has been written on the Sri Lankan state's civil war with the Liberation Tigers of Tamil Eelam (LTTE), less has been said about how the conflict's dynamics evolved. How did the parties come to utilize the methods they did? Why did the war become so brutal, characterized by a predisposition toward extreme violence on both sides? Using the typology of “dirty war,” this investigation seeks to address such questions, demonstrating how the strategic choices of the main belligerents shaped the conflict. The analysis shows that while the conflict emerged out of deep-rooted social and ethnic divisions, these factors do not account for how the war came to be defined so comprehensively by the methods of dirty war. It finds that dirty war developed from a sporadic tactic to advance political goals to dominant military practice by a reciprocal process of escalation that eventually internalized dirty war as the accepted mode of strategic communication.
Journal: Studies in Conflict & Terrorism
Pages: 547-572
Issue: 7
Volume: 36
Year: 2013
Month: 7
X-DOI: 10.1080/1057610X.2013.793617
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.793617
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:7:p:547-572



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_793592_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Srobana Bhattacharya
Author-X-Name-First: Srobana
Author-X-Name-Last: Bhattacharya
Title: Strategic Interaction Between Rebels and the State: A Study of the Maoist Conflict in Nepal
Abstract: 
 The “people's war” in Nepal during 1996–2006, led to two significant outcomes—the elimination of monarchy and political victory for the Maoists. These political outcomes raise important questions about the process of Maoist conflict in Nepal. While several studies on political conflict are concerned about “why” such conflicts happen, I focus on “how” the strategy of conflict unfolded in Nepal. In this article, I argue that strategic interaction between rebels and the state explain why the conflict led to negotiated settlement in Nepal. To discuss the sequence of rebel–state interaction, I introduce a game theoretic model. In addition, I show how territorial control, target selection, and levels of violence used by the rebels in comparison to the state are crucial in understanding the conflict process. The case study in this article analyzes the relevance of rebel–state interaction to reveal micro processes of political conflict and further suggests that negotiation can become an important tactical choice in resolving conflict.
Journal: Studies in Conflict & Terrorism
Pages: 573-587
Issue: 7
Volume: 36
Year: 2013
Month: 7
X-DOI: 10.1080/1057610X.2013.793592
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.793592
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:7:p:573-587



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_793636_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Eric Jardine
Author-X-Name-First: Eric
Author-X-Name-Last: Jardine
Author-Name: Simon Palamar
Author-X-Name-First: Simon
Author-X-Name-Last: Palamar
Title: From Medusa Past Kantolo: Testing the Effectiveness of Canada's Enemy-Centric and Population-Centric Counterinsurgency Operational Strategies
Abstract: 
 Canada's counterinsurgency in Kandahar province, Afghanistan, involved two distinct operational strategies: an initial enemy-centric strategy and, after 2009, a population-centric strategy. Using insurgent-initiated attacks against civilians as a measure for the level of control and security provided by the counterinsurgency, this article tests the effectiveness of these two strategies using a quasi-experimental research design. This article finds that a population-centric counterinsurgency strategy that aimed to provide security to the population rather than destroy the insurgency resulted in the most controlled and secure environment for the civilian population. To the extent that a secure civilian population is important for successful counterinsurgency, the post-2009 population-centric operational strategy of the Canadian Forces, International Security Assistance Force (ISAF), and the United States increased the chances of a successful counterinsurgency in Afghanistan.
Journal: Studies in Conflict & Terrorism
Pages: 588-608
Issue: 7
Volume: 36
Year: 2013
Month: 7
X-DOI: 10.1080/1057610X.2013.793636
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.793636
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:7:p:588-608



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_793638_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mahmoud Eid
Author-X-Name-First: Mahmoud
Author-X-Name-Last: Eid
Title: The New Era of Media and Terrorism
Journal: Studies in Conflict & Terrorism
Pages: 609-615
Issue: 7
Volume: 36
Year: 2013
Month: 7
X-DOI: 10.1080/1057610X.2013.793638
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.793638
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:7:p:609-615

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_802972_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lawrence E. Cline
Author-X-Name-First: Lawrence E.
Author-X-Name-Last: Cline
Title: Nomads, Islamists, and Soldiers: The Struggles for Northern Mali
Abstract: 
 Mali has been faced with a series of uprisings by its Tuareg over a number of years. Although each of these rebellions was ended by a cease-fire, the Malian government never succeeded in instituting longer term peace agreements. The 2012 Tuareg rebellion has presented even more significant security threats. The environment in northern Mali now is marked by multiple armed groups, with multiple competing agendas. This complex situation, with Tuareg rebels, Islamists with varying goals, and local militias, with a pattern of varying levels of cooperation and conflict, will at best be very difficult to resolve in the long term. Combined with an almost complete security vacuum in northern Mali on the part of the government, this situation could be intractable even with external intervention. At the same time, the focus on counterterrorism in northern Mali may not be conducive to a long-term resolution of what in reality is a much more complicated security environment.
Journal: Studies in Conflict & Terrorism
Pages: 617-634
Issue: 8
Volume: 36
Year: 2013
Month: 8
X-DOI: 10.1080/1057610X.2013.802972
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.802972
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:8:p:617-634



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_802973_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bruce Hoffman
Author-X-Name-First: Bruce
Author-X-Name-Last: Hoffman
Title: Al Qaeda's Uncertain Future
Abstract: 
 This article considers the current state of the Al Qaeda terrorist movement and its likely future trajectory. It considers the principle assumptions both today and in the past about Al Qaeda and how they affect our understanding of the movement and the threat that it poses; Al Qaeda's current capacity for violence; and its ability to plan strategically and implement terrorist operations. The article further identifies nine key change drivers that will likely determine Al Qaeda's fate in the years to come before concluding that, even while the core Al Qaeda group may be in decline, Al Qaeda-ism, the movement's ideology, continues to resonate and attract new adherents. In sum, it argues that Al Qaeda remains an appealing brand most recently and most especially to extremist groups in North and West Africa and the Levant.
Journal: Studies in Conflict & Terrorism
Pages: 635-653
Issue: 8
Volume: 36
Year: 2013
Month: 8
X-DOI: 10.1080/1057610X.2013.802973
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.802973
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:8:p:635-653



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_802976_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Pete Simi
Author-X-Name-First: Pete
Author-X-Name-Last: Simi
Author-Name: Bryan F. Bubolz
Author-X-Name-First: Bryan F.
Author-X-Name-Last: Bubolz
Author-Name: Ann Hardman
Author-X-Name-First: Ann
Author-X-Name-Last: Hardman
Title: Military Experience, Identity Discrepancies, and Far Right Terrorism: An Exploratory Analysis
Abstract: 
 The relationship between far right extremism and military involvement is a complex problem and the dynamics that explain this relationship are not well understood. The present article addresses this gap by discussing the relationship between military experience, identity discrepancies, and far right terrorism. This article proposes that identity discrepancies occur when individuals experience involuntary role exits from the military or when individuals perceive that personal achievements earned while enlisted are unrecognized or unappreciated. Identity discrepancies may facilitate a change in behavior toward far right extremism and eventually terrorism. Case study examples are provided to illustrate this relationship.
Journal: Studies in Conflict & Terrorism
Pages: 654-671
Issue: 8
Volume: 36
Year: 2013
Month: 8
X-DOI: 10.1080/1057610X.2013.802976
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.802976
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:8:p:654-671



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_802975_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alessandro Orsini
Author-X-Name-First: Alessandro
Author-X-Name-Last: Orsini
Title: Interview With a Terrorist by Vocation: A Day Among the Diehard Terrorists, Part II
Abstract: 
 The interview that follows was conducted somewhere in Italy with a militant of the Red Brigades recently freed after spending 32 years and 6 months in prison. Taking up the sociological perspective of Max Weber, the author draws a distinction between “professional terrorist” and “vocational terrorist”. The terrorist by vocation differs from the professional terrorist in his profound faith in the mission he feels he must accomplish. He does not try to improve his social status and is not interested in the selfish pursuit of personal well-being. He gives up love, family, children and friendship. When he decides to join a terrorist group, he voluntarily severs any contact with his former life. He is a high school or university graduate and might choose a secure life and a good job but prefers to kill, accepting the risk of dying. The vocational terrorist is the terrorist in his incandescent state.
Journal: Studies in Conflict & Terrorism
Pages: 672-684
Issue: 8
Volume: 36
Year: 2013
Month: 8
X-DOI: 10.1080/1057610X.2013.802975
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.802975
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:8:p:672-684



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_802977_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anna Simons
Author-X-Name-First: Anna
Author-X-Name-Last: Simons
Title: Crooked Lessons from the Indian Wars
Abstract: 
 One aim of this article is to chide the U.S. military—and Americans overall—for not paying sufficient attention to our historic relations with American Indians. After all, American Indians are the non-Westerners we Americans should know best. A review of American Indian history can shed important light on our current encounters with tribal peoples elsewhere. At the same time, however, great care needs to be taken. Instead of just citing similarities—as analogies lead us to do—we must also take note of differences, which we can best do by using history as a foil.
Journal: Studies in Conflict & Terrorism
Pages: 685-697
Issue: 8
Volume: 36
Year: 2013
Month: 8
X-DOI: 10.1080/1057610X.2013.802977
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.802977
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:8:p:685-697

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_813244_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Boaz Ganor
Author-X-Name-First: Boaz
Author-X-Name-Last: Ganor
Author-Name: Miri Halperin Wernli
Author-X-Name-First: Miri
Author-X-Name-Last: Halperin Wernli
Title: The Infiltration of Terrorist Organizations Into the Pharmaceutical Industry: Hezbollah as a Case Study
Abstract: 
 Criminal syndicates and terrorist organizations are inherently different, one motivated by profit and the other by political goals. Yet their difference enables them to cooperate for their mutual benefit. Nowhere has this been more evident than in the drug trade; from harvesting and trafficking in illegal substances, it has been an easy transition to counterfeiting and disseminating medications. Hezbollah, in particular, has become involved in the production, smuggling and distribution of counterfeit medications in North America, Africa and the Middle East as a means of raising immense sums of money to finance its terrorist activities. Hezbollah's infiltration into the pharmaceuticals industry illustrates the danger posed by the marriage of terrorism and crime, which arises both from enhanced resources for terrorism, and from the corruption of a legitimate and necessary industry. Understanding the nature and extent of this danger is the first step in preparing to meet it.
Journal: Studies in Conflict & Terrorism
Pages: 699-712
Issue: 9
Volume: 36
Year: 2013
Month: 9
X-DOI: 10.1080/1057610X.2013.813244
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.813244
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:9:p:699-712



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_813248_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gaetano Joe Ilardi
Author-X-Name-First: Gaetano Joe
Author-X-Name-Last: Ilardi
Title: Interviews With Canadian Radicals
Abstract: 
 Based on in-depth interviews with seven Canadian radicals in 2011, this article provides a detailed and nuanced insight into these men's personal journeys into, and in some cases, exit from, the world of radical Islam. Reflecting on their motivation, emotions, and decision-making processes, these men's stories demonstrate that the radicalization experience is anything but straightforward in the sense of there being a single and unambiguous motivation that spurs individuals on. Rather, they reveal that they were drawn to, and remained involved with, the world of extremism for a variety of reasons, not all of which necessarily related to the existence of grievances, real or imagined. Moreover, the relative importance of these drivers appeared to be in a state of flux, depending on an individual's needs or circumstances at any given time. Indeed, the highly idiosyncratic and temporally specific nature of the radicalization process, as demonstrated by these men's accounts, does not bode well for government and law enforcement efforts to anticipate specific cases of radicalization.
Journal: Studies in Conflict & Terrorism
Pages: 713-738
Issue: 9
Volume: 36
Year: 2013
Month: 9
X-DOI: 10.1080/1057610X.2013.813248
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.813248
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:9:p:713-738



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_813264_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andrew Zammit
Author-X-Name-First: Andrew
Author-X-Name-Last: Zammit
Title: Explaining a Turning Point in Australian Jihadism
Abstract: 
 After 2003, Australia's domestic jihadist plots shifted from being externally guided to being entirely self-starting, which was out of sync with international trends. To identify the causes behind this turning point, this article first provides a brief overview of jihadist activity in Australia, showing how the post-2003 shift differentiates it from comparable countries. The article then examines several potential explanations for the shift that prove insufficient. Following that, the article demonstrates that the shift occurred because key facilitators between Australia and South Asia were removed or deterred. This factor, combined with the limited strategic importance of Australia, low levels of jihadist radicalization, and limited diaspora involvement from the countries most central to Al Qaeda operations, explains Australia's specific pattern of jihadist activity.
Journal: Studies in Conflict & Terrorism
Pages: 739-755
Issue: 9
Volume: 36
Year: 2013
Month: 9
X-DOI: 10.1080/1057610X.2013.813264
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.813264
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:9:p:739-755



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_813261_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard Reed
Author-X-Name-First: Richard
Author-X-Name-Last: Reed
Title: Life, Liberty, and the Pursuit of Anyone Who Gets in the Way: Lessons from a Comparative Analysis of U.S. Militias and Ulster Loyalists
Abstract: 
 This article presents a comparative analysis of the militia movement in the United States and the two major loyalist paramilitary organizations in Northern Ireland. The comparison reveals a similar history of economic transition that highlights the need to consider occupational factors in assessing the causes of violent extremism. The article reflects further on the evidence of a number of other similarities between the two groups: the preeminence of historical narratives, the tendency toward militancy and violence, and localist, antigovernment ideologies. It is argued that these similarities can be similarly understood within the same economic framework, and suggests further research in similarly comparative contexts would reveal greater insight.
Journal: Studies in Conflict & Terrorism
Pages: 756-776
Issue: 9
Volume: 36
Year: 2013
Month: 9
X-DOI: 10.1080/1057610X.2013.813261
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.813261
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:9:p:756-776



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_813273_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sharon L. Cardash
Author-X-Name-First: Sharon L.
Author-X-Name-Last: Cardash
Author-Name: Frank J. Cilluffo
Author-X-Name-First: Frank J.
Author-X-Name-Last: Cilluffo
Author-Name: Rain Ottis
Author-X-Name-First: Rain
Author-X-Name-Last: Ottis
Title: Estonia's Cyber Defence League: A Model for the United States?
Abstract: 
 The cyber threat spectrum that prevails today is both broad and deep. While we cannot protect everything, everywhere, all the time, we can and must make a concerted and sustained effort to shore up national defenses as they pertain to cybersecurity. Despite considerable differences of scale and scope, Estonia's made-in-country cyber solutions may hold promise for the United States, at least with some adjustments and tailoring to take into account differing requirements and traditions. There may be much to learn from a country that bills itself as “e-Estonia, the digital society,” and also delivers on that promise. Specifically, the country's Cyber Defence League is a concept and construct that may prove useful for the United States to consider and contemplate at a time when significant cyber threats continue to multiply, but the skilled personnel needed to counter the challenge are in short supply on the U.S. side.

Journal: Studies in Conflict & Terrorism
Pages: 777-787
Issue: 9
Volume: 36
Year: 2013
Month: 9
X-DOI: 10.1080/1057610X.2013.813273
File-URL: http://hdl.handle.net/10.1080/1057610X.2013.813273
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:36:y:2013:i:9:p:777-787

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_853604_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sarah  Marsden
Author-X-Name-First: Sarah 
Author-X-Name-Last: Marsden
Author-Name: Daiana  Marino
Author-X-Name-First: Daiana 
Author-X-Name-Last: Marino
Author-Name: Gilbert  Ramsay
Author-X-Name-First: Gilbert 
Author-X-Name-Last: Ramsay
Title: Forest Jihad: Assessing the Evidence for “Popular Resistance Terrorism”
Abstract: 
 Despite increasing concern over the potential threat from “forest jihad,” there has been no systematic attempt to assess whether such attacks are in fact taking place. Drawing on principles from the geospatial profiling of terrorist events, fire-risk prediction data, and information on jihadist convictions, this article offers a thorough review of the evidence to address this question. The available information suggests that so far, jihadists have not attempted to attack North American or European wildlands by means of arson. Despite calls for “popular resistance terrorism” in the jihadist literature, and the apparently low costs associated with this type of attack, jihadists have so far shown little appetite for “forest jihad.”
Journal: Studies in Conflict & Terrorism
Pages: 1-17
Issue: 1
Volume: 37
Year: 2014
Month: 1
X-DOI: 10.1080/1057610X.2014.853604
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.853604
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:1:p:1-17



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_853605_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Olli J. Teirilä
Author-X-Name-First: Olli J.
Author-X-Name-Last: Teirilä
Title: The Challenges to Cooperation Posed by the Nexus of Terrorism and Organized Crime: Comparing the Situations Between the Andean and the Sahel Regions
Abstract: 
 The recent conflict in the Sahel area is another case where the nexus of terrorism and organized crime causes challenges to the international community. Comparing the situation with that of the Andean region brings forth the challenges faced when dealing with this type of conflict: the states’ weak presence in the remote regions, the insurgents’ ability to offer income and “security” to the people, immediate threat to international investments, unresolved political/regional issues, the marriage of convenience of insurgents/terrorists and organized crime, internal divisions of the insurgent groups and also ideologies surviving or suffering after the elimination of their leaders.
Journal: Studies in Conflict & Terrorism
Pages: 18-40
Issue: 1
Volume: 37
Year: 2014
Month: 1
X-DOI: 10.1080/1057610X.2014.853605
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.853605
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:1:p:18-40



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_853602_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel E. Agbiboa
Author-X-Name-First: Daniel E.
Author-X-Name-Last: Agbiboa
Title: Peace at Daggers Drawn? Boko Haram and the State of Emergency in Nigeria
Abstract: 
 More than 3,500 people have died in Nigeria since 2009 when Boko Haram, a radical Islamist group from northeastern Nigeria, launched its violent campaign to wrest power from the Nigerian government and foist an Islamic state under the supreme law of Sharia. Attempts at negotiating with the group, including the recent amnesty offer extended to its members by the Nigerian government, have stalled due to distrust on both sides and the factionalized leadership of the group's different cells. This article provides a systematic account of Boko Haram's emergence, demands, and modus operandi. It also evaluates how the Nigerian government has responded to the group's threat and how they should respond. The socioeconomic approach of this article helps to explain the Boko Haram problem beyond a usual religious agenda and to evaluate the development of the group in the context of Nigeria's checkered political history and local economic grievances.
Journal: Studies in Conflict & Terrorism
Pages: 41-67
Issue: 1
Volume: 37
Year: 2014
Month: 1
X-DOI: 10.1080/1057610X.2014.853602
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.853602
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:1:p:41-67



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_853603_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lee  Jarvis
Author-X-Name-First: Lee 
Author-X-Name-Last: Jarvis
Author-Name: Stuart  Macdonald
Author-X-Name-First: Stuart 
Author-X-Name-Last: Macdonald
Author-Name: Lella  Nouri
Author-X-Name-First: Lella 
Author-X-Name-Last: Nouri
Title: The Cyberterrorism Threat: Findings from a Survey of Researchers
Abstract: 
 This article reports on a recent research project exploring academic perspectives on the threat posed by cyberterrorism. The project employed a survey method, which returned 118 responses from researchers working across 24 different countries. The article begins with a brief review of existing literature on this topic, distinguishing between those concerned by an imminent threat of cyberterrorism, and other, more skeptical, views. Following a discussion on method, the article's analysis section then details findings from three research questions: (1) Does cyberterrorism constitute a significant threat? If so, against whom or what?; (2) Has a cyberterrorism attack ever taken place?; and (3) What are the most effective countermeasures against cyberterrorism? Are there significant differences to more traditional forms of anti- or counterterrorism? The article concludes by reflecting on areas of continuity and discontinuity between academic debate on cyberterrorism and on terrorism more broadly.
Journal: Studies in Conflict & Terrorism
Pages: 68-90
Issue: 1
Volume: 37
Year: 2014
Month: 1
X-DOI: 10.1080/1057610X.2014.853603
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.853603
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:1:p:68-90



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_853606_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lauren  Vogel
Author-X-Name-First: Lauren 
Author-X-Name-Last: Vogel
Author-Name: Louise  Porter
Author-X-Name-First: Louise 
Author-X-Name-Last: Porter
Author-Name: Mark  Kebbell
Author-X-Name-First: Mark 
Author-X-Name-Last: Kebbell
Title: The Roles of Women in Contemporary Political and Revolutionary Conflict: A Thematic Model
Abstract: 
 Global population-level patterns in female participation in contemporary political and revolutionary conflict remain largely unknown as systematic empirical research in the area is lacking. Accordingly, this study systematically documented the participation of a comprehensive sample of women involved in conflict around the world. A statistically derived model of female participation is proposed that consists of four thematic roles representing specific patterns of activity: active, representing fighting and leadership activities; caring, representing traditional feminine tasks; support, representing logistically based tasks, and; ideological, representing activities that propagate the ideology of the group. The contribution of the model to theory, research, and practice is considered.
Journal: Studies in Conflict & Terrorism
Pages: 91-114
Issue: 1
Volume: 37
Year: 2014
Month: 1
X-DOI: 10.1080/1057610X.2014.853606
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.853606
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:1:p:91-114

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_941436_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Basia Spalek
Author-X-Name-First: Basia
Author-X-Name-Last: Spalek
Title: Community Engagement for Counterterrorism in Britain: An Exploration of the Role of “Connectors” in Countering Takfiri Jihadist Terrorism
Abstract: 
 So far there has been little substantive research about how individuals engaged in counterterrorism initiatives, whether as community members or police officers or other professionals, negotiate this challenging terrain. This article suggests that community-based approaches to counterterrorism rely on the careful construction of certain forms of community engagement, rather than an all-encompassing claim that “communities defeat terrorism.” This article explores this issue further through analyzing and exploring the role that connectors, rather than communities per se, may play in counterterrorism.
Journal: Studies in Conflict & Terrorism
Pages: 825-841
Issue: 10
Volume: 37
Year: 2014
Month: 10
X-DOI: 10.1080/1057610X.2014.941436
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.941436
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:10:p:825-841



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_941434_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gordon Clubb
Author-X-Name-First: Gordon
Author-X-Name-Last: Clubb
Title: “From Terrorists to Peacekeepers”: The IRA's Disengagement and the Role of Community Networks
Abstract: 
 Utilizing interviews with former Irish Republican Army (IRA) members, Loyalists, and community workers, the article looks at how militants in Northern Ireland have helped to prevent terrorism and political violence (TPV) by adopting roles in the community. By using mobile phones, a network of former combatants emerged around interface areas in the late 1990s to contain trigger causes of terrorism, providing a unique role that the state could not. The structure of the network encouraged militant groups to follow the IRA's example to disengage—thus creating a domino effect—and the co-operation between senior militants has limited the opportunities for other groups to mobilize a campaign of terrorism.
Journal: Studies in Conflict & Terrorism
Pages: 842-861
Issue: 10
Volume: 37
Year: 2014
Month: 10
X-DOI: 10.1080/1057610X.2014.941434
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.941434
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:10:p:842-861



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_941435_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Josef Schroefl
Author-X-Name-First: Josef
Author-X-Name-Last: Schroefl
Author-Name: Stuart J. Kaufman
Author-X-Name-First: Stuart J.
Author-X-Name-Last: Kaufman
Title: Hybrid Actors, Tactical Variety: Rethinking Asymmetric and Hybrid War
Abstract: 
 Wars like those in Iraq and Afghanistan should be understood as hybrid wars, wars in which elements of ethnic or tribal conflict, ideologically based insurgency, factional squabbling, and organized crime are inextricably intertwined, with the same actors playing multiple and partially conflicting roles. Hybrid war is inherently transnational, featuring transnational crime networks, “migrant warriors,” transnational diaspora links, legitimate international trade, and foreign intervention. It takes place in hybridized states reliant on local warlords and other actors whose power prevents effective state-building. In this context, while counterinsurgency doctrine prescribes appropriate military strategy and tactics, the core problem is more political than military. Since a hybridized client state is not likely to be politically reformable even if a foreign ally achieves military success, outside allies like the United States should generally refrain from boots-on-the-ground intervention, pursuing instead a diplomatic solution, even though such a deal is likely to be unpalatable.
Journal: Studies in Conflict & Terrorism
Pages: 862-880
Issue: 10
Volume: 37
Year: 2014
Month: 10
X-DOI: 10.1080/1057610X.2014.941435
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.941435
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:10:p:862-880



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_941437_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Stewart J. D’Alessio
Author-X-Name-First: Stewart J.
Author-X-Name-Last: D’Alessio
Author-Name: Lisa Stolzenberg
Author-X-Name-First: Lisa
Author-X-Name-Last: Stolzenberg
Author-Name: Dustin Dariano
Author-X-Name-First: Dustin
Author-X-Name-Last: Dariano
Title: Does Targeted Capture Reduce Terrorism?
Abstract: 
 From January 1979 to December 2009, the Maoist insurgent Shining Path committed a total of 9,034 violent acts in a concerted attempt to topple the Peruvian government. These acts of violence included bombings, armed assaults, and assassinations. The Shining Path's leader Abimael Guzmán was captured by the Peruvian government on 12 September 1992. Using quarterly data and an interrupted times-series AutoRegressive Integrative Moving Average (ARIMA) study design, we investigated the effect of Abimael Guzmán's capture on the ability of the Shining Path to wage its war against the Peruvian government. Maximum-likelihood results revealed that the frequency of terrorist acts committed by the Shining Path dropped by 143 incidents per quarter a short time after Guzmán was captured. The analysis also evinced a positive relationship between the lethality of attacks and the frequency of the Shining Path's terrorist activity. We conclude that targeted capture shows some promise as an effective counterterrorism strategy, at least for terrorist groups such as the Shining Path that have a top-down type of organizational structure.
Journal: Studies in Conflict & Terrorism
Pages: 881-894
Issue: 10
Volume: 37
Year: 2014
Month: 10
X-DOI: 10.1080/1057610X.2014.941437
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.941437
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:10:p:881-894

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_952511_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anneli Botha
Author-X-Name-First: Anneli
Author-X-Name-Last: Botha
Title: Political Socialization and Terrorist Radicalization Among Individuals Who Joined al-Shabaab in Kenya
Abstract: 
 Islamist extremism through al-Shabaab is increasing its foothold in Kenya. In contrast to the common perception—as depicted through government responses—radicalization and recruitment extends well beyond Somali and Kenyan–Somali nationals. Instead of exclusively focusing on external or environmental factors, the study on which this article is based analyzed the personal background of those being radicalized. This article will focus on the role the family and peers play in the political socialization process while analyzing factors influencing radicalization, most notably religious identity, economic, political, and educational background of al-Shabaab members. Based on interviews with al-Shabaab and family members the last part of the article evaluates when, why, and how respondents joined al-Shabaab. Through answering these key questions the Kenyan government and other agencies assisting in preventing radicalization can develop more effective counterradicalization and counterterrorism strategies based on empirical evidence.
Journal: Studies in Conflict & Terrorism
Pages: 895-919
Issue: 11
Volume: 37
Year: 2014
Month: 11
X-DOI: 10.1080/1057610X.2014.952511
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.952511
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:11:p:895-919



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_952262_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Govinda Clayton
Author-X-Name-First: Govinda
Author-X-Name-Last: Clayton
Author-Name: Andrew Thomson
Author-X-Name-First: Andrew
Author-X-Name-Last: Thomson
Title: The Enemy of My Enemy is My Friend  …  The Dynamics of Self-Defense Forces in Irregular War: The Case of the Sons of Iraq
Abstract: 
 This article assesses the effect that leveraging civilian defense force militias has on the dynamics of violence in civil war. We argue that the delegation of security and combat roles to local civilians shifts the primary targets of insurgent violence toward civilians, in an attempt to deter future defections, and re-establish control over the local population. This argument is assessed through an analysis of the Sunni Awakening and ancillary Sons of Iraq paramilitary program. The results suggest that at least in the Al-Anbar province of Iraq, the utilization of the civilian population in counterinsurgent roles had significant implications for the targets of insurgent violence.
Journal: Studies in Conflict & Terrorism
Pages: 920-935
Issue: 11
Volume: 37
Year: 2014
Month: 11
X-DOI: 10.1080/1057610X.2014.952262
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.952262
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:11:p:920-935



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_952260_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Noel Anderson
Author-X-Name-First: Noel
Author-X-Name-Last: Anderson
Title: Peacekeepers Fighting a Counterinsurgency Campaign: A Net Assessment of the African Union Mission in Somalia
Abstract: 
 In response to Somalia's decades-long political and humanitarian crises, the African Union has deployed a peace support operation known as the African Union Mission in Somalia. Tasked to help eliminate an ongoing insurgency, the mission has seen heavy combat as it fights to reclaim territory held by the al-Shabaab militant organization. This article applies the techniques of open source campaign analysis to assess the mission's prospects for long-term success. The prognosis is not good. Analysis reveals a range of vulnerabilities that threaten the deployment's core security objectives, suggesting that the optimism many have expressed for the mission is misplaced.
Journal: Studies in Conflict & Terrorism
Pages: 936-958
Issue: 11
Volume: 37
Year: 2014
Month: 11
X-DOI: 10.1080/1057610X.2014.952260
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.952260
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:11:p:936-958



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_952261_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Becker
Author-X-Name-First: Michael
Author-X-Name-Last: Becker
Title: Explaining Lone Wolf Target Selection in the United States
Abstract: 
 The rise in lone wolf terrorist attacks worldwide in recent decades makes understanding the types of targets lone wolves choose a crucial locus of research, yet this topic remains understudied. In light of this lacuna, this article analyzes 84 lone wolf terrorist attacks that occurred in the United States between 1940 and 2012, identifies patterns in lone wolf target selection, and proposes and tests causal explanations for these patterns. I find that (1) a majority of lone wolves select civilian targets in familiar areas and (2) this is due to their relative weakness and their ideology.
Journal: Studies in Conflict & Terrorism
Pages: 959-978
Issue: 11
Volume: 37
Year: 2014
Month: 11
X-DOI: 10.1080/1057610X.2014.952261
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.952261
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:11:p:959-978

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_962441_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Stefan Malthaner
Author-X-Name-First: Stefan
Author-X-Name-Last: Malthaner
Author-Name: Peter Waldmann
Author-X-Name-First: Peter
Author-X-Name-Last: Waldmann
Title: The Radical Milieu: Conceptualizing the Supportive Social Environment of Terrorist Groups
Abstract: 
 Terrorist groups are not completely isolated, socially “free-floating” entities, but emerge from and operate within a specific, immediate social environment—what we call the radical milieu—which shares their perspective and objectives, approves of certain forms of violence, and (at least to a certain extent) supports the violent group morally and logistically. In this article we introduce an approach to conceptualize and analyze this formative and supportive social environment of clandestine groups, addressing the questions of how the radical milieu emerges, what forms it takes, and what role it plays in shaping the development of violent groups. Our focus, thereby, rests on relationship-patterns between violent groups and radical milieus as well as on processes of interaction between radical milieus and their broader political and societal environment, which may entail dynamics of support and control but also isolation and radicalization.
Journal: Studies in Conflict & Terrorism
Pages: 979-998
Issue: 12
Volume: 37
Year: 2014
Month: 12
X-DOI: 10.1080/1057610X.2014.962441
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.962441
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:12:p:979-998



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_962438_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Enzo Nussio
Author-X-Name-First: Enzo
Author-X-Name-Last: Nussio
Author-Name: Ben Oppenheim
Author-X-Name-First: Ben
Author-X-Name-Last: Oppenheim
Title: Anti-Social Capital in Former Members of Non-State Armed Groups: A Case Study of Colombia
Abstract: 
 Illegal organizations, like mafia syndicates, gangs, and insurgencies, are often highly cohesive and hostile toward the outside world. Such groups cultivate a particular form of “anti-social” capital, which relies on ingroup bonding and limits outgroup bridging for the purpose of commissioning illicit acts. We argue that experiences within the group leave members with varying intensities of anti-social capital, and that higher intensities lead to significantly weaker relationships with political institutions and civil society, even many years after they exit the group. We test this theory using survey data from 1,485 former members of insurgent and paramilitary groups in Colombia, along with insights from 68 qualitative interviews. We find strong evidence that anti-social capital has individually varying and sticky effects on former members. These effects are pervasive and intense, and exhibit surprising and counterintuitive properties: former members of pro-state militia with higher levels of anti-social capital are systematically less likely to trust political institutions, while members of peasant-based insurgent groups with high levels of anti-social capital are less likely to participate in their communities.
Journal: Studies in Conflict & Terrorism
Pages: 999-1023
Issue: 12
Volume: 37
Year: 2014
Month: 12
X-DOI: 10.1080/1057610X.2014.962438
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.962438
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:12:p:999-1023



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_962440_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kersti Larsdotter
Author-X-Name-First: Kersti
Author-X-Name-Last: Larsdotter
Title: Fighting Transnational Insurgents: The South African Defence Force in Namibia, 1966–1989
Abstract: 
 Transnational insurgents are a common feature of contemporary wars, but research on how to address this problem is still scarce. This article examines the South African Defence Force's (SADF) counterinsurgency against Namibian transnational insurgents. It concludes that the South African forces focused a large amount of their efforts outside the borders of Namibia. Highly coercive operations in Angola and Zambia created the space for hearts and minds activities in Namibia, as well as forcing neighboring states to end their support for the insurgents. Although the war in Namibia is somewhat different from contemporary wars, SADF's cross-border strategy gives us some important insights into the regional dynamics of civil wars.
Journal: Studies in Conflict & Terrorism
Pages: 1024-1038
Issue: 12
Volume: 37
Year: 2014
Month: 12
X-DOI: 10.1080/1057610X.2014.962440
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.962440
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:12:p:1024-1038



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_962439_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Carlo Koos
Author-X-Name-First: Carlo
Author-X-Name-Last: Koos
Title: Why and How Civil Defense Militias Emerge: The Case of the Arrow Boys in South Sudan
Abstract: 
 This article uses a collective-action framework to study the mobilization of the Arrow Boys (AB), a community defense militia in South Sudan. Drawing on general collective-action explanations, this article argues that the mobilization of the AB was facilitated by two factors: (1) a strong overlap of the fighter's private and the community's public benefit and (2) close social relationships and expectations within the community. The article supports these theoretical claims by, first, examining the scope conditions under which the AB formed and, second, drawing on individual interviews with AB members from Western Equatoria in South Sudan.
Journal: Studies in Conflict & Terrorism
Pages: 1039-1057
Issue: 12
Volume: 37
Year: 2014
Month: 12
X-DOI: 10.1080/1057610X.2014.962439
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.962439
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:12:p:1039-1057



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_962899_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: Editorial Board EOV
Journal: Studies in Conflict & Terrorism
Pages: ebi-ebi
Issue: 12
Volume: 37
Year: 2014
Month: 12
X-DOI: 10.1080/1057610X.2014.962899
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.962899
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:12:p:ebi-ebi

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_862901_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Aurélie  Campana
Author-X-Name-First: Aurélie 
Author-X-Name-Last: Campana
Author-Name: Jean-François  Ratelle
Author-X-Name-First: Jean-François 
Author-X-Name-Last: Ratelle
Title: A Political Sociology Approach to the Diffusion of Conflict from Chechnya to Dagestan and Ingushetia
Abstract: 
 This article seeks to foster a better understanding of the diffusion of conflict in the North Caucasus. We argue that diffusion of conflict is a dynamic and adaptive process in which outcomes are shaped by the intersection of three social mechanisms—attribution of similarity, brokerage, and outbidding—and the political, social, and religious contexts. We suggest that a distinction should be made between horizontal and vertical processes of diffusion. We also approach the empirical diffusion of conflict from a different perspective, showing that non-Chechen actors have played a key role in both the diffusion process and its outcomes.
Journal: Studies in Conflict & Terrorism
Pages: 115-134
Issue: 2
Volume: 37
Year: 2014
Month: 2
X-DOI: 10.1080/1057610X.2014.862901
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.862901
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:2:p:115-134



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_862900_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Benjamin  Acosta
Author-X-Name-First: Benjamin 
Author-X-Name-Last: Acosta
Title: Live to Win Another Day: Why Many Militant Organizations Survive Yet Few Succeed
Abstract: 
 Militant organizations pursue two common aims: to survive and to achieve the goals that define their raison d’être. Yet, elements that sustain the life spans of militant organizations are not necessarily the same components that advance the accomplishment of their core, or “outcome,” goals. Further, some organizational practices, such as the use of suicide attacks, generate a tradeoff that bolsters survivability while detracting from the effective pursuit of outcome goals. This study demonstrates that three operating conditions explain variation in the duration and achievement of contemporary militant organizations: receptiveness to tradeoffs, levels of external support, and the nature of adversaries. As such, the unique effects of different operating conditions reveal why many militant organizations survive for long periods of time but only a few achieve the goals that justify their existence.
Journal: Studies in Conflict & Terrorism
Pages: 135-161
Issue: 2
Volume: 37
Year: 2014
Month: 2
X-DOI: 10.1080/1057610X.2014.862900
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.862900
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:2:p:135-161



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_862904_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Goran  Peic
Author-X-Name-First: Goran 
Author-X-Name-Last: Peic
Title: Civilian Defense Forces, State Capacity, and Government Victory in Counterinsurgency Wars
Abstract: 
 Given the onset of a violent rebellion by an armed non-state group, how do states re-establish intra-state peace and hence fulfill their basic function as providers of internal security? In this article I argue that one way governments perform this core function is by recruiting non-combatants into local self-defense units called civilian defense forces (CDFs). By providing for local security, leveraging their superior local knowledge, and provoking insurgent reprisals against civilians, CDF units facilitate the influx of tactical intelligence as well as isolate insurgents from non-combatant populations physically as well as politically. Consistent with the argument, statistical analyses of two different cross-national data sets of insurgencies from 1944 to 2006 reveal that a state is 53 percent more likely to vanquish a guerrilla threat if the incumbent deploys CDFs. The analyses also cast doubt on a recent claim in the literature that incumbent force mechanization adversely affects the states’ ability to counter insurgent threats. Given that CDF deployment is a more easily manipulable variable than most other elements of state power, CDFs appear to be an effective instrument of counterinsurgency deserving of further academic and policy attention.
Journal: Studies in Conflict & Terrorism
Pages: 162-184
Issue: 2
Volume: 37
Year: 2014
Month: 2
X-DOI: 10.1080/1057610X.2014.862904
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.862904
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:2:p:162-184



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_862903_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andrei  Miroiu
Author-X-Name-First: Andrei 
Author-X-Name-Last: Miroiu
Title: Military Operations in Romanian Anti-Partisan Warfare, 1944–1958
Abstract: 
 Romanian anti-communist armed resistance has received relatively little attention outside the country, despite its resemblance to other small, diffused, headless insurgencies being fought in the first decades of the twenty-first century. This article deals with military operations mounted against the partisans, with a special focus on tactics such as cordoning, checkpoints, patrols, sweeps, ambushes, and informed strikes. Based mostly on primary sources, it highlights success and failure against determined and elusive guerrillas.
Journal: Studies in Conflict & Terrorism
Pages: 185-197
Issue: 2
Volume: 37
Year: 2014
Month: 2
X-DOI: 10.1080/1057610X.2014.862903
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.862903
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:2:p:185-197



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_862902_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: James  Khalil
Author-X-Name-First: James 
Author-X-Name-Last: Khalil
Title: Radical Beliefs and Violent Actions Are Not Synonymous: How to Place the Key Disjuncture Between Attitudes and Behaviors at the Heart of Our Research into Political Violence
Abstract: 
 This article develops and elaborates on three core points. First, as with research into other social science themes, it is argued that it is necessary to apply the logic of correlation and causality to the study of political violence. Second, it highlights the critical disjuncture between attitudes and behaviors. Many or most individuals who support the use of political violence remain on the sidelines, including those who sympathize with insurgents in Afghanistan (reportedly 29 percent in 2011), and those supportive of “suicide attacks” in the Palestinian Territories (reportedly reaching 66 percent in 2005). Conversely, those responsible for such behaviors are not necessarily supportive of the ostensible political aims. Third, it is argued that the motives that drive these attitudes and behaviors are often (or, some would argue, always) distinct. While the former are motivated by collective grievances, there is substantial case study evidence that the latter are commonly driven by economic (e.g., payments for the emplacement of improvised explosive devices), security-based (i.e., coercion) and sociopsychological (e.g., adventure, status, and vengeance) incentives. Thus, it is necessary for the research community to treat attitudes and behaviors as two separate, albeit interrelated, lines of inquiry.
Journal: Studies in Conflict & Terrorism
Pages: 198-211
Issue: 2
Volume: 37
Year: 2014
Month: 2
X-DOI: 10.1080/1057610X.2014.862902
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.862902
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:2:p:198-211

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_872023_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anthony  Richards
Author-X-Name-First: Anthony 
Author-X-Name-Last: Richards
Title: Conceptualizing Terrorism
Abstract: 
 This article argues that, while there have always been good reasons for striving for a universally agreed definition of terrorism, there are further reasons for doing so in the post 9/11 environment, notwithstanding the formidable challenges that confront such an endeavour. Arguing that the essence of terrorism lies in its intent to generate a psychological impact beyond the immediate victims, it will propose three preliminary assumptions: that there is no such thing as an act of violence that is in and of itself inherently terrorist, that terrorism is best conceptualized as a particular method of political violence rather than defined as inherent to any particular ideology or perpetrator, and that non-civilians and combatants can also be victims of terrorism. It will then outline the implications that these assumptions have for the definitional debate.
Journal: Studies in Conflict & Terrorism
Pages: 213-236
Issue: 3
Volume: 37
Year: 2014
Month: 3
X-DOI: 10.1080/1057610X.2014.872023
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.872023
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:3:p:213-236



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_872022_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alexandra Pocek Joosse
Author-X-Name-First: Alexandra Pocek
Author-X-Name-Last: Joosse
Author-Name: H. Brinton Milward
Author-X-Name-First: H. Brinton
Author-X-Name-Last: Milward
Title: Organizational Versus Individual Attribution: A Case Study of Jemaah Islamiyah and the Anthrax Plot
Abstract: 
 Recent studies have taken an important first step in examining which terrorist groups, based on their organizational characteristics and the characteristics of the environment in which they operate, are more likely to pursue chemical, biological, radiological, and nuclear (CBRN) weapons. This approach, however, assumes that individuals who perpetrate events act on behalf of the organization to which they primarily belong. Using the case of Jemaah Islamiyah's alleged attempt to develop the pathogenic bacterium Bacillus anthracis, or anthrax, the authors demonstrate the importance of including individual-level variables to the analysis. In particular, the attendance by several key Jemaah Islamiyah members at an Al Qaeda-affiliated training camp is argued to set a chain of events into motion that ended in their involvement in the anthrax cultivation program.
Journal: Studies in Conflict & Terrorism
Pages: 237-257
Issue: 3
Volume: 37
Year: 2014
Month: 3
X-DOI: 10.1080/1057610X.2014.872022
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.872022
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:3:p:237-257



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_872024_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lian  Zucker
Author-X-Name-First: Lian 
Author-X-Name-Last: Zucker
Author-Name: Edward H. Kaplan
Author-X-Name-First: Edward H.
Author-X-Name-Last: Kaplan
Title: Mass Casualty Potential of Qassam Rockets
Abstract: 
 In spite of the bombardment of southern Israel by thousands of Qassam rockets fired from the Gaza Strip, comparatively few people have been injured or killed. This has led some observers to dismiss Qassams as more of a symbolic than lethal threat. However, southern Israeli towns feature robust civil defense systems that include safe rooms, bomb shelters, early detection alarms, and missile defense. How many casualties would occur were such systems not in place? This article applies shrapnel-casualty and spatial allocation models to the population of the southern Israeli town of Sderot to estimate casualties per randomly aimed rocket fired into the unprepared town; that is, in the absence of civil defense (technical details appear in the Appendix). Assuming an injury radius of only 5 meters from impact, the modeled expected casualties per rocket are between three (best-case) and nine (worst-case) times higher than Sderot's observed casualties-to-rocket ratio, suggesting that Qassam-like terror attacks on unprotected urban locations could prove much more serious than what one would expect based solely on the observed number of casualties in Sderot.
Journal: Studies in Conflict & Terrorism
Pages: 258-266
Issue: 3
Volume: 37
Year: 2014
Month: 3
X-DOI: 10.1080/1057610X.2014.872024
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.872024
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:3:p:258-266



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_872021_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Luke M. Gerdes
Author-X-Name-First: Luke M.
Author-X-Name-Last: Gerdes
Author-Name: Kristine  Ringler
Author-X-Name-First: Kristine 
Author-X-Name-Last: Ringler
Author-Name: Barbara  Autin
Author-X-Name-First: Barbara 
Author-X-Name-Last: Autin
Title: Assessing the Abu Sayyaf Group's Strategic and Learning Capacities
Abstract: 
 It remains unclear whether the Abu Sayyaf Group (ASG) is a well-structured terror organization that poses a strategic threat, or a loosely organized collection of bandits that poses limited risk. Efforts to assess the nature of the organization are complicated by flaws in existing datasets on Violent Non-State Actors (VNSAs). ASG's role in kidnappings serves as a test-case to estimate incongruities among four major datasets on VNSAs. Original data collected at the agent level provides an additional point of comparison and also serves to test the efficacy of ASG's knowledge-dissemination structures, which are key in determining VNSAs' strategic capacities.
Journal: Studies in Conflict & Terrorism
Pages: 267-293
Issue: 3
Volume: 37
Year: 2014
Month: 3
X-DOI: 10.1080/1057610X.2014.872021
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.872021
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:3:p:267-293

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_879380_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ophir Falk
Author-X-Name-First: Ophir
Author-X-Name-Last: Falk
Title: Permissibility of Targeted Killing
Abstract: 
 Targeted killing has become an increasingly prevalent tactic employed by states in their efforts to counter terrorism. Despite its widespread use, the criteria for targeted killing permissibility have remained vague. This article identifies and evaluates the circumstances under which targeted killings can be considered permissible and looks at on-the-ground implementation by Israel and the United States. While both Israel and the United States may have largely adhered to the laws of armed conflict, in practice, discrepancies in implementation exist. This is primarily due to the ambiguity of the “distinction” and “proportionality” principles, two key legal and moral criteria that need further clarification.
Journal: Studies in Conflict & Terrorism
Pages: 295-321
Issue: 4
Volume: 37
Year: 2014
Month: 4
X-DOI: 10.1080/1057610X.2014.879380
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.879380
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:4:p:295-321



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_879381_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Süleyman Özeren
Author-X-Name-First: Süleyman
Author-X-Name-Last: Özeren
Author-Name: Murat Sever
Author-X-Name-First: Murat
Author-X-Name-Last: Sever
Author-Name: Kamil Yilmaz
Author-X-Name-First: Kamil
Author-X-Name-Last: Yilmaz
Author-Name: Alper Sözer
Author-X-Name-First: Alper
Author-X-Name-Last: Sözer
Title: Whom Do They Recruit?: Profiling and Recruitment in the PKK/KCK
Abstract: 
 Terrorist organizations use a proactive strategy in identifying potential candidates for recruitment. In such a strategy, miscellaneous vulnerabilities, grievances, and feeling destitute, inter alia, render certain individuals perfect candidates for terrorist organizations. It is therefore crucial to have an integrative approach to understand the interplay between the profiles of terrorists and their reasons to join terrorist groups on the one hand and processes of recruitment on the other. Proceeding from such a fulcrum, this article provides a general profile of the Kurdistan Workers’ Party [PKK]/Kurdistan Communities Union [KCK] members and various recruitment techniques used by this group. To this end, records of 2,270 group members were content analyzed, in addition to face-to-face interviews with 42 group members and a range of individuals from public and private institutions. Our findings suggest that a variety of individual and organizational factors influence individual paths toward terrorism.
Journal: Studies in Conflict & Terrorism
Pages: 322-347
Issue: 4
Volume: 37
Year: 2014
Month: 4
X-DOI: 10.1080/1057610X.2014.879381
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.879381
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:4:p:322-347



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_879436_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David C. Hofmann
Author-X-Name-First: David C.
Author-X-Name-Last: Hofmann
Author-Name: Lorne L. Dawson
Author-X-Name-First: Lorne L.
Author-X-Name-Last: Dawson
Title: The Neglected Role of Charismatic Authority in the Study of Terrorist Groups and Radicalization
Abstract: 
 Recent scholarship has called for additional research into the role of charismatic authority in terrorist groups and the process of radicalization. However, the sociological concepts of charisma and charismatic authority are being widely misused in terrorism studies. Current radicalization research often indirectly flirts with core concepts of charismatic authority, but fails to properly tap into its analytical utility. This article proposes to begin addressing this gap in knowledge in three ways, with: (1) a synthesis of social scientific research on charismatic authority, (2) a critical analysis of how charismatic authority is being misused and overlooked in the terrorist radicalization literature, and (3) an exploration of challenges and opportunities for future research concerning charismatic authority and terrorist radicalization.
Journal: Studies in Conflict & Terrorism
Pages: 348-368
Issue: 4
Volume: 37
Year: 2014
Month: 4
X-DOI: 10.1080/1057610X.2014.879436
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.879436
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:4:p:348-368



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_879379_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anne Aly
Author-X-Name-First: Anne
Author-X-Name-Last: Aly
Author-Name: Elisabeth Taylor
Author-X-Name-First: Elisabeth
Author-X-Name-Last: Taylor
Author-Name: Saul Karnovsky
Author-X-Name-First: Saul
Author-X-Name-Last: Karnovsky
Title: Moral Disengagement and Building Resilience to Violent Extremism: An Education Intervention
Abstract: 
 This article reports on the development of an education intervention, the Beyond Bali Education Resource funded by the Australian Governments’ Building Community Resilience Grants of the Federal Attorney General's Department, that applies a conceptual framework grounded in moral disengagement theory. Beyond Bali is a five module program for schools that is specifically designed to build social cognitive resilience to violent extremism by engaging self-sanctions and preparing students to challenge the influence of violent extremism that can lead to moral disengagement. The theory of moral disengagement has been applied to the study of radicalization to violent extremism to explain how individuals can cognitively reconstruct the moral value of violence and carry out inhumane acts. The mechanisms of moral disengagement through which individuals justify violence, dehumanize victims, disregard the harmful consequences of violence and absolve themselves of blame have been used in the construction of violent extremist narratives. However, they have not been applied to the development of intervention strategies that aim to counter the radicalizing influences of violent extremist narratives.
Journal: Studies in Conflict & Terrorism
Pages: 369-385
Issue: 4
Volume: 37
Year: 2014
Month: 4
X-DOI: 10.1080/1057610X.2014.879379
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.879379
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:4:p:369-385

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_893403_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Pablo Brum
Author-X-Name-First: Pablo
Author-X-Name-Last: Brum
Title: Revisiting Urban Guerrillas: Armed Propaganda and the Insurgency of Uruguay's MLN-Tupamaros, 1969–70
Abstract: 
 This article studies a singular aspect of the urban insurgency of Uruguay's MLN-Tupamaros: the tactic of armed propaganda. The Tupamaros applied the method mainly at the peak of their existence, in the years 1969–70. Afterward they opted predominantly for others, such as terrorism. By comparing the two periods, I argue that armed propaganda helped the organization to thrive, while the latter was an important cause of its demise. The conclusion suggests that armed propaganda led the Tupamaros to significant accomplishments, but also that switching tactics was a major determinant in their defeat.
Journal: Studies in Conflict & Terrorism
Pages: 387-404
Issue: 5
Volume: 37
Year: 2014
Month: 5
X-DOI: 10.1080/1057610X.2014.893403
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.893403
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:5:p:387-404



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_893404_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bernhard Blumenau
Author-X-Name-First: Bernhard
Author-X-Name-Last: Blumenau
Title: The European Communities’ Pyrrhic Victory: European Integration, Terrorism, and the Dublin Agreement of 1979
Abstract: 
 This article looks at the European Communities’ efforts against terrorism in the 1970s. It argues that in spite of the high ambitions to improve European legal integration, the attempts to develop an antiterrorism agreement were quite obviously a failure. Although the Dublin Agreement was adopted in 1979 after cumbersome and lengthy negotiations, it fell short of showing the member states’ unity and resolve to fight terrorism, and it never entered into force. The tedious negotiations drained the member states’ energy and willingness to such an extent that no other steps toward judicial integration or antiterrorism treaties were taken.
Journal: Studies in Conflict & Terrorism
Pages: 405-421
Issue: 5
Volume: 37
Year: 2014
Month: 5
X-DOI: 10.1080/1057610X.2014.893404
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.893404
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:5:p:405-421



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_893480_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Erin M. Kearns
Author-X-Name-First: Erin M.
Author-X-Name-Last: Kearns
Author-Name: Brendan Conlon
Author-X-Name-First: Brendan
Author-X-Name-Last: Conlon
Author-Name: Joseph K. Young
Author-X-Name-First: Joseph K.
Author-X-Name-Last: Young
Title: Lying About Terrorism
Abstract: 
 Conventional wisdom holds that terrorism is committed for strategic reasons as a form of costly signaling to an audience. However, since over half of terrorist attacks are not credibly claimed, conventional wisdom does not explain many acts of terrorism. This article suggests that there are four lies about terrorism that can be incorporated in a rationalist framework: false claiming, false flag, the hot-potato problem, and the lie of omission. Each of these lies about terrorism can be strategically employed to help a group achieve its desired goal(s) without necessitating that an attack be truthfully claimed.
Journal: Studies in Conflict & Terrorism
Pages: 422-439
Issue: 5
Volume: 37
Year: 2014
Month: 5
X-DOI: 10.1080/1057610X.2014.893480
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.893480
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:5:p:422-439



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_893405_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Petter Nesser
Author-X-Name-First: Petter
Author-X-Name-Last: Nesser
Title: Toward an Increasingly Heterogeneous Threat: A Chronology of Jihadist Terrorism in Europe 2008–2013
Abstract: 
 The 2012 Toulouse and Montauban shootings and the grisly murder of Drummer Lee Rigby in Woolwich in 2013 are stark reminders of a continued terrorist threat posed by jihadist terrorists in Europe. Whereas the 2011 death of Osama bin Laden and the advent of the “Arab Spring” fed expectations that international jihadism was a spent force, attack activity in Europe does not only seem to persist, but as will be shown here, the region has actually faced an increase in terrorist plots over the past few years.
Journal: Studies in Conflict & Terrorism
Pages: 440-456
Issue: 5
Volume: 37
Year: 2014
Month: 5
X-DOI: 10.1080/1057610X.2014.893405
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.893405
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:5:p:440-456

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_903374_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Isaac Kfir
Author-X-Name-First: Isaac
Author-X-Name-Last: Kfir
Title: Sectarian Violence and Social Group Identity in Pakistan
Abstract: 
 Individual basic security is limited in Pakistan as the state is institutionally weak. One way to attain basic security is by joining groups who provide security and services. Consequently, groups not part of the political mainstream, to attract a following, must therefore show that they are sufficiently powerful to obtain concessions from established actors. Thus, by engaging in violence primarily of a sectarian nature, the Pakistani Taliban sustains itself as a unified force while also highlighting that it is a powerful group, which in turn it hopes would enable it to curve a political space and win concessions from the established elite. Using social group identity theory, club goods, and the economics of extremism, the article highlights why the Pakistani Taliban has increasingly attacked minorities and why more must be done to address sectarian violence.
Journal: Studies in Conflict & Terrorism
Pages: 457-472
Issue: 6
Volume: 37
Year: 2014
Month: 6
X-DOI: 10.1080/1057610X.2014.903374
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.903374
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:6:p:457-472



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_903451_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kirstin J. H. Brathwaite
Author-X-Name-First: Kirstin J. H.
Author-X-Name-Last: Brathwaite
Title: Repression and the Spread of Ethnic Conflict in Kurdistan
Abstract: 
 Why do ethnic conflicts spread to neighboring states? This article examines the effect of transborder ethnic groups on the spread of ethnic conflict. It argues that when a transborder ethnic group is in conflict in one state, neighboring states perceive a threat from members of that ethnic group residing in their own territory, leading the state to take preemptive repressive action. This repression in turn changes the ethnic group's security situation within the state and can result in violence and thus ethnic conflict. Ethnic conflict spread is not determined by the actions of either the ethnic group or the state alone, but is a product of threat perception and interaction between the two groups. This argument is tested in a set of cases in a region where an ethnic conflict seems to have spread—the Kurds in Iran, Iraq, Syria and Turkey from 1961–2003.
Journal: Studies in Conflict & Terrorism
Pages: 473-491
Issue: 6
Volume: 37
Year: 2014
Month: 6
X-DOI: 10.1080/1057610X.2014.903451
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.903451
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:6:p:473-491



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_903452_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Arzu Kibris
Author-X-Name-First: Arzu
Author-X-Name-Last: Kibris
Title: The Polarization Trap
Abstract: 
 This article studies the association between ethnic conflicts and political attitudes. It employs a new data set on the casualties of the ethnic conflict in Turkey to identify the effects of the Kurdish insurgency on the electoral behavior of the Turkish voters. The results indicate that the conflict leads to the political polarization of the society along ethnic nationalist lines. Further investigation of the data also provides some empirical support for the constructivist argument that the salience of ethnic identities is subject to change in response to external stimuli, of which ethnic conflict constitutes a drastic example.
Journal: Studies in Conflict & Terrorism
Pages: 492-522
Issue: 6
Volume: 37
Year: 2014
Month: 6
X-DOI: 10.1080/1057610X.2014.903452
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.903452
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:6:p:492-522



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_893406_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John C. Amble
Author-X-Name-First: John C.
Author-X-Name-Last: Amble
Author-Name: Alexander Meleagrou-Hitchens
Author-X-Name-First: Alexander
Author-X-Name-Last: Meleagrou-Hitchens
Title: Jihadist Radicalization in East Africa: Two Case Studies
Abstract: 
 Al-Shabaab, the Somali militia currently fighting against African forces in Somalia, has seen varying degrees of success in its regional recruitment efforts. As it continues to struggle against the forces of the African Union Mission in Somalia (AMISOM), the militia has tried to step up these efforts. To this end, the group has seen significant success in countries such as Kenya, while it has struggled in Somaliland. The strategies and tactics employed by al-Shabaab in order to successfully recruit vary depending on geographical location, as do the motivations to join, and drawing on fieldwork in both Kenya and Somaliland this study will compare and contrast the effectiveness al-Shabaab recruitment in both of these countries. In doing so, it will examine which local conditions either enhance or limit these efforts, identifying some of the determinants of the success and failure of jihadist recruitment in east Africa.
Journal: Studies in Conflict & Terrorism
Pages: 523-540
Issue: 6
Volume: 37
Year: 2014
Month: 6
X-DOI: 10.1080/1057610X.2014.893406
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.893406
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:6:p:523-540

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_913118_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Matthew Morehouse
Author-X-Name-First: Matthew
Author-X-Name-Last: Morehouse
Title: It's Easier to Decapitate a Snake than It Is a Hydra: An Analysis of Colombia's Targeted Killing Program
Abstract: 
 While the use of targeted killings by the United States and Israel has received the most press coverage, Colombia has also utilized targeted killings in its conflict with the Revolutionary Armed Forces of Colombia (FARC). Utilizing an original dataset, this study quantitatively gauges the effectiveness of Colombia's targeted killing program, by examining the influence of FARC leadership deaths upon the number and severity of FARC attacks during the years 2004 to 2011. The results suggest that the Colombian government's killing of FARC leaders has been effective in decreasing the number of attacks, but not the severity of attacks
Journal: Studies in Conflict & Terrorism
Pages: 541-566
Issue: 7
Volume: 37
Year: 2014
Month: 7
X-DOI: 10.1080/1057610X.2014.913118
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.913118
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:7:p:541-566



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_913120_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Stephen Tankel
Author-X-Name-First: Stephen
Author-X-Name-Last: Tankel
Title: Indian Jihadism: The Evolving Threat
Abstract: 
 India has been confronting jihadist violence for decades. Although expeditionary terrorism by Pakistani militants typically receives the most focus, indigenous actors, many benefitting from Pakistani support, are responsible for the majority of jihadist attacks in India. Yet the dynamics of Indian jihadism remain under-explored. This article examines the Indian Mujahideen (IM), which constitutes the primary indigenous jihadist threat. It argues the IM is best understood as a label for a network of modules, with a loose leadership, that is connected to smaller, self-organizing clusters of would-be militants as well as to foreign militant groups like the Pakistani Lashkar-e-Taiba.
Journal: Studies in Conflict & Terrorism
Pages: 567-585
Issue: 7
Volume: 37
Year: 2014
Month: 7
X-DOI: 10.1080/1057610X.2014.913120
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.913120
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:7:p:567-585



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_913121_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sivan Hirsch-Hoefler
Author-X-Name-First: Sivan
Author-X-Name-Last: Hirsch-Hoefler
Author-Name: Cas Mudde
Author-X-Name-First: Cas
Author-X-Name-Last: Mudde
Title: “Ecoterrorism”: Terrorist Threat or Political Ploy?
Abstract: 
 This article examines the phenomenon of “ecoterrorism” from a conceptual and empirical perspective. We explore the political and academic debates over the meaning and use of the term ecoterrorism, and assess the validity of the concept of “ecoterrorism” and of the alleged threat of the Radical Environmentalist and Animal Rights (REAR) movement by analyzing the characteristics of both the movement and its actions. Our analysis shows that the term ecoterrorism should only be used for a small proportion of the actions of REAR movement. Consequently, counterterrorist measures should only target these terrorist minorities, rather than all groups and the broader movement.
Journal: Studies in Conflict & Terrorism
Pages: 586-603
Issue: 7
Volume: 37
Year: 2014
Month: 7
X-DOI: 10.1080/1057610X.2014.913121
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.913121
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:7:p:586-603



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_913122_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Matteo Vergani
Author-X-Name-First: Matteo
Author-X-Name-Last: Vergani
Title: Neo-Jihadist Prosumers and Al Qaeda Single Narrative: The Case Study of Giuliano Delnevo
Abstract: 
 Scholars in the field of terrorism and violent extremism often refer to the so-called Al Qaeda single narrative. This article suggests that the Internet challenges the existence of a “single narrative,” by arguing that neo-jihadist prosumers may reinterpret Al Qaeda's narrative and create hybrid symbols and identities. The article discusses the case study of an Italian neo-jihadist allegedly killed in Syria, Giuliano Delnevo, presenting research on his YouTube and Facebook production. Delnevo's narrative, which emerges from the diverse messages circulating on the Internet, recasts the Al Qaeda narrative by hybridizing it with other cultural backgrounds and political symbols.
Journal: Studies in Conflict & Terrorism
Pages: 604-617
Issue: 7
Volume: 37
Year: 2014
Month: 7
X-DOI: 10.1080/1057610X.2014.913122
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.913122
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:7:p:604-617

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_921765_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Emmanuel Karagiannis
Author-X-Name-First: Emmanuel
Author-X-Name-Last: Karagiannis
Title: Comparative Islamist Perspectives on the Politics of Energy in the Middle East and Beyond
Abstract: 
 The article will describe the general Islamic approach on energy based on the Sunnah of Prophet Muhammad, as well as the writings of prominent Muslim thinkers. Then it will examine and compare the energy perspectives of four Islamist groups: Hizballah, Hizb ut-Tahrir, the Muslim Brotherhood, and Al Qaeda. It will be argued that Islamist groups have attempted to achieve their external energy objectives by either using violence or exercising political blackmail against their opponents. Moreover, Islamists have developed globalized, glocalized, or localized “scale of engagement,” depending on the targeted audience. Finally, the article will examine the security implications stemming from Islamists’ interest in energy issues.
Journal: Studies in Conflict & Terrorism
Pages: 619-637
Issue: 8
Volume: 37
Year: 2014
Month: 8
X-DOI: 10.1080/1057610X.2014.921765
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.921765
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:8:p:619-637



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_921767_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Stefan Malthaner
Author-X-Name-First: Stefan
Author-X-Name-Last: Malthaner
Title: Contextualizing Radicalization: The Emergence of the “Sauerland-Group” from Radical Networks and the Salafist Movement
Abstract: 
 This article proposes an analytical perspective on jihadist radicalization that focuses on the immediate social environment from which clandestine violent groups emerge, to which they remain socially and symbolically connected, and from which they receive some degree of support. Based on a detailed analysis of the “Sauerland-Group” it traces relational dynamics shaping individual pathways as well as processes of group formation within local Salafist milieus, the wider Salafist movement, and radical jihadist networks. It argues that one characteristic feature of “homegrown” jihadist groups is their simultaneous connection to and embeddedness in various different social contexts as well as the fluid, ad-hoc character of the clandestine group and its ambivalent relation with its supportive social environment.
Journal: Studies in Conflict & Terrorism
Pages: 638-653
Issue: 8
Volume: 37
Year: 2014
Month: 8
X-DOI: 10.1080/1057610X.2014.921767
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.921767
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:8:p:638-653



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_921770_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Javier Jordan
Author-X-Name-First: Javier
Author-X-Name-Last: Jordan
Title: The Evolution of the Structure of Jihadist Terrorism in Western Europe: The Case of Spain
Abstract: 
 This article studies the structure of jihadist terrorism in the West from the perspective of the existence or absence of links between grassroots militants and organizations such as Al Qaeda Central and its regional affiliates. It undertakes a comprehensive case study of jihadist militancy in a European country (Spain) over a period of almost two decades, from 1995 until December 2013. The study analyzes the results of 64 antiterrorist operations carried out during this time.
Journal: Studies in Conflict & Terrorism
Pages: 654-673
Issue: 8
Volume: 37
Year: 2014
Month: 8
X-DOI: 10.1080/1057610X.2014.921770
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.921770
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:8:p:654-673



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_921768_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Moran Yarchi
Author-X-Name-First: Moran
Author-X-Name-Last: Yarchi
Title: The Effect of Female Suicide Attacks on Foreign Media Framing of Conflicts: The Case of the Palestinian–Israeli Conflict
Abstract: 
 The study examines the effect of female suicide attacks on foreign media framing of conflicts. Examining the Palestinian–Israeli conflict, 2,731 articles were sampled that covered terrorist events (American, British, and Indian press); 625 appeared in the week following a female's suicide attack, 97 reported an attack by a female perpetrator. The findings suggest that foreign media discourse around female suicide bombers promotes more messages about the society within which the terrorists are embedded. Since the coverage of female terrorists tends to provide more detailed information about the perpetrator, it focuses more on the terror organizations’ side of the conflict's story.
Journal: Studies in Conflict & Terrorism
Pages: 674-688
Issue: 8
Volume: 37
Year: 2014
Month: 8
X-DOI: 10.1080/1057610X.2014.921768
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.921768
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:8:p:674-688



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_921769_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jesse Paul Lehrke
Author-X-Name-First: Jesse Paul
Author-X-Name-Last: Lehrke
Author-Name: Rahel Schomaker
Author-X-Name-First: Rahel
Author-X-Name-Last: Schomaker
Title: Mechanisms of Convergence in Domestic Counterterrorism Regulations: American Influence, Domestic Needs, and International Networks
Abstract: 
 This article seeks to determine the mechanism(s) behind the convergence of domestic counterterrorism regulations that has been noted across many Organisation for Economic Co-operation and Development (OECD) countries. Four hypotheses are developed and tested through regression analyses. These hypotheses examine (1) U.S. influence, operationalized though a unique U.S. footprint indicator; (2) national characteristics; (3) the extent to which states’ domestic structures match; and (4) international networks. We find little support that U.S. influence matters. The international influence that does exist seems to operate through networks promoting learning, especially following a rise in the general global threat level. National characteristics as a driver also find some support.
Journal: Studies in Conflict & Terrorism
Pages: 689-712
Issue: 8
Volume: 37
Year: 2014
Month: 8
X-DOI: 10.1080/1057610X.2014.921769
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.921769
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:8:p:689-712

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_931224_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Peter Shirlow
Author-X-Name-First: Peter
Author-X-Name-Last: Shirlow
Author-Name: Colin Coulter
Author-X-Name-First: Colin
Author-X-Name-Last: Coulter
Title: Northern Ireland: 20 Years After the Cease-Fires
Abstract: 
 In the closing months of 1994, the principal paramilitary organizations in Northern Ireland declared that their campaigns of violence were at an end. The cease-fires called by republican and loyalist groupings represented the most significant heralds of a complex process of conflict transformation that continues to unfold even twenty years on. In this introduction, we set out to map the key developments that have shaped the tortuous narrative of the Northern Irish ‘peace process’, thereby providing the historical backdrop for the articles that follow. While remarkable progress has been made over the two decades since the paramilitary cease-fires, the political context and future of the region remain rather more fraught than is often assumed abroad. It is perhaps best, then, to speak of the six counties in terms not of resolution but rather of ambiguity. Twenty years on from the optimism that greeted the paramilitary cease-fires, Northern Ireland retains the essential ‘inbetweenness’ of a political space that has moved from a ‘long war’ through a ‘long peace’ and into a profoundly undecided future.
Journal: Studies in Conflict & Terrorism
Pages: 713-719
Issue: 9
Volume: 37
Year: 2014
Month: 9
X-DOI: 10.1080/1057610X.2014.931224
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.931224
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:9:p:713-719



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_931211_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kevin Bean
Author-X-Name-First: Kevin
Author-X-Name-Last: Bean
Title: Endings and Beginnings? Republicanism Since 1994
Abstract: 
 This article traces the political and ideological development of the various strands of Irish Republicanism since 1994, with particular focus on the transition of the Provisional movement from insurgency to government party. In particular, it explores some of the external and internal dynamics shaping this process, such as the origins of Provisionalism as a social movement organization and the changing relationship between the nationalist population and the British state. It concludes by considering both the possible future trajectory of the Provisionals and the potential of dissident republicans to mount a serious political challenge to the status quo in Northern Ireland.
Journal: Studies in Conflict & Terrorism
Pages: 720-732
Issue: 9
Volume: 37
Year: 2014
Month: 9
X-DOI: 10.1080/1057610X.2014.931211
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.931211
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:9:p:720-732



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_931215_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Peter Shirlow
Author-X-Name-First: Peter
Author-X-Name-Last: Shirlow
Title: Rejection, Shaming, Enclosure, and Moving On: Variant Experiences and Meaning Among Loyalist Former Prisoners
Abstract: 
 This article unpacks the variant meanings, perceptions, and experiences of violent enactment and stigmatic shaming among loyalists with regard to rejection, harm, and masking. What we locate is a landscape of variable emotions, experiences, neutralization techniques, dependences, and embedded forms of fatalism as well as resilience. Attending to those alternate positions and well-beings is important in considering the capacity of re-integration and the presently uneven nature of it. In adopting an account-driven format we present and analyze how involvement in violent conflict can, on the one hand, provoke persistence and senses of transitional thinking and on the other engender rejection and related fatalistic attitudes.
Journal: Studies in Conflict & Terrorism
Pages: 733-746
Issue: 9
Volume: 37
Year: 2014
Month: 9
X-DOI: 10.1080/1057610X.2014.931215
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.931215
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:9:p:733-746



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_931210_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Fidelma Ashe
Author-X-Name-First: Fidelma
Author-X-Name-Last: Ashe
Author-Name: Ken Harland
Author-X-Name-First: Ken
Author-X-Name-Last: Harland
Title: Troubling Masculinities: Changing Patterns of Violent Masculinities in a Society Emerging from Political Conflict
Abstract: 
 Men's dominance of the political and military dimensions of the Northern Ireland conflict has meant that the story of the conflict has generally been a story about men. Ethno-nationalist antagonism reinforced men's roles as protectors and defenders of ethno-national groups and shaped violent expressions of masculinities. Due to the primacy of ethno-nationalist frameworks of analysis in research on the conflict, the relationships between gender and men's violence have been under-theorized. This article employs the framework of Critical Studies of Men and Masculinities to examine these relationships and also explores the changing patterns of men's violence in Northern Ireland.
Journal: Studies in Conflict & Terrorism
Pages: 747-762
Issue: 9
Volume: 37
Year: 2014
Month: 9
X-DOI: 10.1080/1057610X.2014.931210
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.931210
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:9:p:747-762



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_931212_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Colin Coulter
Author-X-Name-First: Colin
Author-X-Name-Last: Coulter
Title: Under Which Constitutional Arrangement Would You Still Prefer to be Unemployed? Neoliberalism, the Peace Process, and the Politics of Class in Northern Ireland
Abstract: 
 This article seeks to critically examine the political economy of the Northern Irish “peace process.” When the principal paramilitary organizations in the region declared cease-fires in 1994, it was widely assumed that political progress would be followed by economic prosperity. However, this “peace dividend” has never fully materialized. Those working-class communities that were at the center of the Troubles have derived little economic benefit over the last two decades. Indeed, if anything the already substantial class divisions in the six counties have become more pronounced over the course of the peace process. The article concludes by suggesting that these widening socioeconomic disparities have the potential to undermine the prevailing political settlement in Northern Ireland.
Journal: Studies in Conflict & Terrorism
Pages: 763-776
Issue: 9
Volume: 37
Year: 2014
Month: 9
X-DOI: 10.1080/1057610X.2014.931212
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.931212
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:9:p:763-776



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_931214_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Katy Hayward
Author-X-Name-First: Katy
Author-X-Name-Last: Hayward
Author-Name: Milena Komarova
Author-X-Name-First: Milena
Author-X-Name-Last: Komarova
Title: The Limits of Local Accommodation: Why Contentious Events Remain Prone to Conflict in Northern Ireland
Abstract: 
 This article examines the difficulties of finding local solutions to the problem of contentious events in contemporary Northern Ireland. In so doing, it offers a sociological perspective on fundamental divisions in Northern Ireland: between classes and between communities. It shows how its chosen case study—parades and associated protests in north Belfast—exemplifies the most fundamental problem that endures in post-Agreement Northern Ireland, namely that political authority is not derived from a common civic culture (as is the norm in Western liberal democracy) but rather that legitimacy is still founded on the basis of the culture of either one or the other community. Haugaard's reflections on authority and legitimacy are used to explore Northern Ireland's atypical experience of political conflict vis-à-vis the Western liberal democratic model. The Bourdieusian concepts of field illusio and doxa help to explain why it is that parading remains such an important political and symbolic touchstone in this society.
Journal: Studies in Conflict & Terrorism
Pages: 777-791
Issue: 9
Volume: 37
Year: 2014
Month: 9
X-DOI: 10.1080/1057610X.2014.931214
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.931214
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:9:p:777-791



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_931213_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Brendan Browne
Author-X-Name-First: Brendan
Author-X-Name-Last: Browne
Author-Name: Clare Dwyer
Author-X-Name-First: Clare
Author-X-Name-Last: Dwyer
Title: Navigating Risk: Understanding the Impact of the Conflict on Children and Young People in Northern Ireland
Abstract: 
 Twenty years on from the 1994 cease-fires, Northern Ireland is a markedly safer place for children and young people to grow up. However, for a significant number, growing up in post-conflict Northern Ireland has brought with it continued risks and high levels of marginalization. Many young people growing up on the sharp edge of the transition have continued to experience troubling levels of poverty, lower educational attainment, poor standards of childhood health, and sustained exposure to risk-laden environments. Reflecting on interdisciplinary research carried out since the start of the “transition” to peace, this article emphasizes the impact that embedded structural inequalities continue to have on the social, physical, mental, and emotional well-being of many children and young people. In shining a light on the enduring legacy of the conflict, this article moves to argue that greater attention needs to be given to the ongoing socioeconomic factors that result in limited lifetime opportunities, marginalization, and sustained poverty for many young people growing up in “peacetime” Northern Ireland.
Journal: Studies in Conflict & Terrorism
Pages: 792-805
Issue: 9
Volume: 37
Year: 2014
Month: 9
X-DOI: 10.1080/1057610X.2014.931213
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.931213
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:9:p:792-805



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_931217_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Liam O’Dowd
Author-X-Name-First: Liam
Author-X-Name-Last: O’Dowd
Title: Symmetrical Solutions, Asymmetrical Realities: Beyond the Politics of Paralysis?
Abstract: 
 The historic significance of the Good Friday Agreement and its role in ending organized political violence is acknowledged at the outset. The article then goes on to probe the roots of the political paralysis built into the architecture of the Agreement that are predicated on a misplaced political and cultural symmetry between the “two communities.” It is suggested that the institutionalized relationship between Northern Ireland and the rest of the U.K. facilitates a cross-party, populist, socio-economic consensus among the nationalist and unionist political parties on the welfare state, taxation and maintaining the massive British subvention to the region. This in turn allows them to concentrate on a divisive culturalist politics, i.e., on antagonistic forms of cultural and identity politics over such issues as flags, parades, and the legacy of the “Troubles” which spills over into gridlock into many areas of regional administration. The article argues for a much broader understanding of culture and identity rooted in the different, if overlapping and interdependent, material realities of both communities while challenging the idea of two cultures/identities as fixed, mutually exclusive, non-negotiable and mutually antagonistic. It then focuses on the importance of Belfast as a key arena which will determine the long-term prospects of an alternative and more constructive form of politics, and enable a fuller recognition of the fundamental asymmetries and inter-dependence between the “two communities.” In the long run, this involves re-defining and reconstructing what is meant by the “Union” and a “United Ireland.”
Journal: Studies in Conflict & Terrorism
Pages: 806-814
Issue: 9
Volume: 37
Year: 2014
Month: 9
X-DOI: 10.1080/1057610X.2014.931217
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.931217
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:9:p:806-814



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_931216_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Arthur Aughey
Author-X-Name-First: Arthur
Author-X-Name-Last: Aughey
Title: Northern Ireland: 20 Years On
Abstract: 
 To speak of what is exceptional about Northern Ireland today requires a provocative sense of irony, for constitutionally it can be argued Northern Ireland has become one of the most stable parts of the United Kingdom. The fact if not the value of the Union has become more deeply entrenched as both the fact and the value of the Union have come more openly into play elsewhere, even in England. Nevertheless, Northern Ireland is not immune from larger political developments and fantastic uncertainties attend consideration of the next twenty years at different levels of analysis. This article considers these uncertainties according to two possible scenarios, one involving a nationalist narrative and the other involving a unionist narrative. The key issues in each scenario and narrative are the constitutional debate in the United Kingdom, especially the referendum on Scottish independence; the future of the European Union and the United Kingdom's relationship to it; and the changing electoral demographic within Northern Ireland. If Northern Ireland's future is inextricably linked to uncertainty this makes it the rule and not the exception today.
Journal: Studies in Conflict & Terrorism
Pages: 815-823
Issue: 9
Volume: 37
Year: 2014
Month: 9
X-DOI: 10.1080/1057610X.2014.931216
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.931216
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:37:y:2014:i:9:p:815-823

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_974948_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jytte Klausen
Author-X-Name-First: Jytte
Author-X-Name-Last: Klausen
Title: Tweeting the Jihad: Social Media Networks of Western Foreign Fighters in Syria and Iraq
Abstract: 
 Social media have played an essential role in the jihadists’ operational strategy in Syria and Iraq, and beyond. Twitter in particular has been used to drive communications over other social media platforms. Twitter streams from the insurgency may give the illusion of authenticity, as a spontaneous activity of a generation accustomed to using their cell phones for self-publication, but to what extent is access and content controlled? Over a period of three months, from January through March 2014, information was collected from the Twitter accounts of 59 Western-origin fighters known to be in Syria. Using a snowball method, the 59 starter accounts were used to collect data about the most popular accounts in the network-at-large. Social network analysis on the data collated about Twitter users in the Western Syria-based fighters points to the controlling role played by feeder accounts belonging to terrorist organizations in the insurgency zone, and by Europe-based organizational accounts associated with the banned British organization, Al Muhajiroun, and in particular the London-based preacher, Anjem Choudary.
Journal: Studies in Conflict & Terrorism
Pages: 1-22
Issue: 1
Volume: 38
Year: 2015
Month: 1
X-DOI: 10.1080/1057610X.2014.974948
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.974948
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:1:p:1-22



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_974408_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Christopher McIntosh
Author-X-Name-First: Christopher
Author-X-Name-Last: McIntosh
Title: Counterterrorism as War: Identifying the Dangers, Risks, and Opportunity Costs of U.S. Strategy Toward Al Qaeda and Its Affiliates
Abstract: 
 The U.S. war on Al Qaeda is well into its second decade—why has this particular conflict been so difficult to end? This article argues it is not due to the strategic acumen of Al Qaeda, but because of the problems intrinsic to relying on war as the framework for U.S. counterterrorism policy. The normal means of ending wars are complicated with a terrorist enemy and at odds with strategies that have historically had success at the end stages of counterterror campaigns. Continuing along the current path risks an ongoing war the United States will likely neither win nor fully end.
Journal: Studies in Conflict & Terrorism
Pages: 23-38
Issue: 1
Volume: 38
Year: 2015
Month: 1
X-DOI: 10.1080/1057610X.2014.974408
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.974408
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:1:p:23-38



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_974400_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ethem Ilbiz
Author-X-Name-First: Ethem
Author-X-Name-Last: Ilbiz
Author-Name: Benjamin L. Curtis
Author-X-Name-First: Benjamin L.
Author-X-Name-Last: Curtis
Title: Trendsetters, Trend Followers, and Individual Players: Obtaining Global Counterterror Actor Types from Proscribed Terror Lists
Abstract: 
 This article seeks to conceptualize global counterterror actor types by examining the designated terrorist organizations lists of six countries; the United States, the United Kingdom, Australia, Canada, Russia, and China. It is argued that these countries should be placed into one of three distinct categories: Trendsetters, Trend Followers, and Individual Players. Being able to classify countries according to these categories is important for global policymakers. It raises awareness of the differences between countries, and emphasizes that “one-fits-all” policies are inappropriate and have little chance of achieving global endorsement.
Journal: Studies in Conflict & Terrorism
Pages: 39-61
Issue: 1
Volume: 38
Year: 2015
Month: 1
X-DOI: 10.1080/1057610X.2014.974400
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.974400
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:1:p:39-61



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_976011_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Adam Roberts
Author-X-Name-First: Adam
Author-X-Name-Last: Roberts
Title: Terrorism Research: Past, Present, and Future
Abstract: 
 Research on terrorism and counterterrorism draws on many disciplines, including Politics, History, Sociology and Anthropology. Yet there are concerns about scope, methodology, impact, and the level of public debate. An agreed definition of terrorism is unattainable: there should be more focus on particular acts rather than labelling whole movements. The threat of terrorism should be kept in proportion. Understanding its causes, and associated belief-systems, is crucial to conducting effective counterterrorist operations. Evaluations of the effectiveness of both terrorism and counterterrorism need to encompass more factors, including terrorism's deadliest legacies: wars on terror that fail, and a habit of violence.
Journal: Studies in Conflict & Terrorism
Pages: 62-74
Issue: 1
Volume: 38
Year: 2015
Month: 1
X-DOI: 10.1080/1057610X.2014.976011
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.976011
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:1:p:62-74



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_974405_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bruce Hoffman
Author-X-Name-First: Bruce
Author-X-Name-Last: Hoffman
Title: A First Draft of the History of America's Ongoing Wars on Terrorism
Abstract: 
 This research note attempts to map the Al Qaeda movement's trajectory from the 11 September 2001 attacks to the stunning events of 2014—which saw the continued rise of the Islamic State of Iraq and Syria (ISIS), its expulsion from the Al Qaeda movement, followed by ISIS's stunning thrust into Iraq, its declaration of a caliphate, and the re-engagement of American military forces in this region. It attempts to place in context the Al Qaeda movement's evolution to explain why the United States under President Barack Obama, despite hopes and expectations to the contrary, is still enmeshed in the war on terrorism proclaimed by George W. Bush over a decade ago.
Journal: Studies in Conflict & Terrorism
Pages: 75-83
Issue: 1
Volume: 38
Year: 2015
Month: 1
X-DOI: 10.1080/1057610X.2014.974405
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.974405
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:1:p:75-83

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1059103_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Luis de la Calle
Author-X-Name-First: Luis
Author-X-Name-Last: de la Calle
Author-Name: Ignacio Sánchez-Cuenca
Author-X-Name-First: Ignacio
Author-X-Name-Last: Sánchez-Cuenca
Title: How Armed Groups Fight: Territorial Control and Violent Tactics
Abstract: 
 This article analyzes the choice of tactics by armed groups. We claim this choice is largely determined by the capacity of the rebel groups to control territory. Groups that are not able to liberate territory remain underground and have to rely mainly on bombings. Groups with territorial control engage in guerrilla-like attacks in which there is a physical encounter with the enemy. This conjecture is tested and largely confirmed at three levels: a cross-sectional analysis of the distribution of tactics in 122 armed groups, using compositional data analysis; a geographical analysis of the distribution of tactics in the largest cities as opposed to the rest of the country; and a case study of Hezbollah.
Journal: Studies in Conflict & Terrorism
Pages: 795-813
Issue: 10
Volume: 38
Year: 2015
Month: 10
X-DOI: 10.1080/1057610X.2015.1059103
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1059103
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:10:p:795-813



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1059102_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Stefano Bonino
Author-X-Name-First: Stefano
Author-X-Name-Last: Bonino
Author-Name: Lambros George Kaoullas
Author-X-Name-First: Lambros George
Author-X-Name-Last: Kaoullas
Title: Preventing Political Violence in Britain: An Evaluation of over Forty Years of Undercover Policing of Political Groups Involved in Protest
Abstract: 
 This article offers a first academic evaluation of the Special Demonstration Squad and the National Public Order Intelligence Unit, two British undercover police units working for the Metropolitan Police Service at different times between 1968 and 2011. It provides a historical overview of their infiltration of political groups involved in protest for the purpose of gathering criminal and political intelligence aimed at preventing violence, public disorder, and subversion. It discusses the controversies surrounding these units, and the related institutional responses, and offers an attempt at understanding their operations within the remit of intelligence-led policing and against a political culture that prioritizes action over inaction in reducing risks and threats to the State and society.
Journal: Studies in Conflict & Terrorism
Pages: 814-840
Issue: 10
Volume: 38
Year: 2015
Month: 10
X-DOI: 10.1080/1057610X.2015.1059102
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1059102
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:10:p:814-840



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1056631_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alexander Dukalskis
Author-X-Name-First: Alexander
Author-X-Name-Last: Dukalskis
Title: Why Do Some Insurgent Groups Agree to Cease-Fires While Others Do Not? A Within-Case Analysis of Burma/Myanmar, 1948–2011
Abstract: 
 This article uses Burma/Myanmar from 1948 to 2011 as a within-case context to explore why some armed insurgent groups agree to cease-fires while others do not. Analyzing 33 armed groups it finds that longer-lived groups were less likely to agree to cease-fires with the military government between 1989 and 2011. The article uses this within-case variation to understand what characteristics would make an insurgent group more or less likely to agree to a cease-fire. The article identifies four armed groups for more in-depth qualitative analysis to understand the roles of the administration of territory, ideology, and legacies of distrust with the state as drivers of the decision to agree to or reject a cease-fire.
Journal: Studies in Conflict & Terrorism
Pages: 841-863
Issue: 10
Volume: 38
Year: 2015
Month: 10
X-DOI: 10.1080/1057610X.2015.1056631
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1056631
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:10:p:841-863



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1049855_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lisa Karlborg
Author-X-Name-First: Lisa
Author-X-Name-Last: Karlborg
Title: The Ambiguous Host-Citizen Contract: An Evolving Notion of Duty in the U.S. Military Quest for Local Legitimacy
Abstract: 
 The article explores how the recent quest for local legitimacy in Iraq and Afghanistan has shaped the U.S. military notion of duty toward host citizens. It argues that military duty is conceptualized as a “host-citizen contract.” Based on a qualitative comparison of the 2006 and 2014 versions of FM3-24, the U.S. counterinsurgency field manual, it finds that U.S. forces are obligated to suppress insurgents, build host-nation agency, and protect the host population in exchange for legitimacy. The article's main finding is that the notion of legitimacy has changed in ways that fundamentally limit the scope of duty and justify a breach of contract should the host nation fail to comply.
Journal: Studies in Conflict & Terrorism
Pages: 864-884
Issue: 10
Volume: 38
Year: 2015
Month: 10
X-DOI: 10.1080/1057610X.2015.1049855
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1049855
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:10:p:864-884



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1046302_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kathleen Bouzis
Author-X-Name-First: Kathleen
Author-X-Name-Last: Bouzis
Title: Countering the Islamic State: U.S. Counterterrorism Measures
Abstract: 
 This research note discusses the tactics and strategies of the United States to counter the Islamic State in Iraq and the Levant (ISIL) from the onset of Operation Inherent Resolve beginning on 8 August 2014 and continuing into early 2015. Through both kinetic and non-kinetic actions, the United States and its coalition has sought to degrade and defeat ISIL. But how effective have these measures been with regard to the group's ability to maintain control over parts of the Iraqi population and territory? ISIL's fast growing affiliate network poses a unique challenge and this study suggests that the kinetic measures of Operation Inherent Resolve have weakened ISIL's tactical capabilities but U.S. efforts to stem the group's recruitment have not been as successful.
Journal: Studies in Conflict & Terrorism
Pages: 885-897
Issue: 10
Volume: 38
Year: 2015
Month: 10
X-DOI: 10.1080/1057610X.2015.1046302
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1046302
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:10:p:885-897

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1072390_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeffrey Scott Bachman
Author-X-Name-First: Jeffrey Scott
Author-X-Name-Last: Bachman
Title: The Lawfulness of U.S. Targeted Killing Operations Outside Afghanistan
Abstract: 
 Targeted killing operations conducted outside Afghanistan have prompted debate regarding their lawfulness. For opponents of targeted killing operations, the debate tends to center on the number of civilians killed. Proponents respond by questioning the credibility and validity of the methods employed to determine the number of civilian casualties. This debate is important, but it also obscures the fact that the lawfulness of targeting killings is not determined by whether civilians were killed alone, while also lending legitimacy to unsubstantiated claims that the United States is engaged in an armed conflict with Al Qaeda and “associated forces.” This article classifies the hostilities in Pakistan, Yemen, and Somalia. It then applies the applicable body of law to targeted killing operations in each of these respective states based on how the hostilities were classified.
Journal: Studies in Conflict & Terrorism
Pages: 899-918
Issue: 11
Volume: 38
Year: 2015
Month: 11
X-DOI: 10.1080/1057610X.2015.1072390
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1072390
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:11:p:899-918



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1063838_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Milos Popovic
Author-X-Name-First: Milos
Author-X-Name-Last: Popovic
Title: The Perils of Weak Organization: Explaining Loyalty and Defection of Militant Organizations Toward Pakistan
Abstract: 
 Why do some militant groups defect against their sponsors, while others remain loyal? Pakistan's sponsorship of Jaish-e-Mohammad and Lashkar-e-Taiba offers a controlled case comparison as the former turned its guns against Islamabad, while the latter remained obedient despite a similar strength, ethnic ties to the regime, and the presence of alternative supporters. What explains Jaish's defection and Lashkar's loyalty? Drawing on organizational and principal-agent theory, I argue that militant organizations that are more decentralized and factionalized are more likely to turn on their sponsors, because their weak command and control as well as dispersed decision making limit the militant leaders' ability to follow through on their commitments to the sponsors and makes it more difficult for the sponsors to discipline the militant organization. When a sponsor attempts to coerce such organizations into submission by detaining militant leaders, freezing or confiscating their material assets the rank-and-file is likely to turn guns against the sponsor.
Journal: Studies in Conflict & Terrorism
Pages: 919-937
Issue: 11
Volume: 38
Year: 2015
Month: 11
X-DOI: 10.1080/1057610X.2015.1063838
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1063838
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:11:p:919-937



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1066214_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Karl Kaltenthaler
Author-X-Name-First: Karl
Author-X-Name-Last: Kaltenthaler
Author-Name: William Miller
Author-X-Name-First: William
Author-X-Name-Last: Miller
Title: Ethnicity, Islam, and Pakistani Public Opinion toward the Pakistani Taliban
Abstract: 
 This article argues that an Islamist militant group with a relatively homogenous ethnic make-up is more likely to be supported by those of the same ethnicity even if the group makes no reference to and even downplays the importance of ethnicity. Using survey data from an original survey carried out in Pakistan in 2013, with 7,656 respondents, this hypothesis is tested in a multiple regression analysis of support for the Pakistani Taliban. The results demonstrate that co-ethnicity between the respondent and the Islamist militant group is the most important predictor of support for the militant group.
Journal: Studies in Conflict & Terrorism
Pages: 938-957
Issue: 11
Volume: 38
Year: 2015
Month: 11
X-DOI: 10.1080/1057610X.2015.1066214
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1066214
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:11:p:938-957



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1051375_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mohammed Hafez
Author-X-Name-First: Mohammed
Author-X-Name-Last: Hafez
Author-Name: Creighton Mullins
Author-X-Name-First: Creighton
Author-X-Name-Last: Mullins
Title: The Radicalization Puzzle: A Theoretical Synthesis of Empirical Approaches to Homegrown Extremism
Abstract: 
 Why and how do individuals residing in relatively peaceful and affluent Western societies come to embrace extremist ideologies that emanate from distant places? We summarize the most recent empirical literature on the causes and dynamics of radicalization, and evaluate the state of the art in the study of Islamist homegrown extremism in the West. We propose a theoretical synthesis based on four factors that come together to produce violent radicalization: personal and collective grievances, networks and interpersonal ties, political and religious ideologies, and enabling environments and support structures. We propose adopting a “puzzle” metaphor that represents a multifactor and contextualized approach to understanding how ordinary individuals transform into violent extremists. We concluded with three recommendations to strengthen the empirical foundations of radicalization studies.
Journal: Studies in Conflict & Terrorism
Pages: 958-975
Issue: 11
Volume: 38
Year: 2015
Month: 11
X-DOI: 10.1080/1057610X.2015.1051375
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1051375
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:11:p:958-975



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1061296_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Adeniyi S. Basiru
Author-X-Name-First: Adeniyi S.
Author-X-Name-Last: Basiru
Title: A review of "Boko Haram: Islamism, Politics, Security and the State in Nigeria," edited by Marc-Antoine Pérouse de Montclos
Journal: Studies in Conflict & Terrorism
Pages: 976-978
Issue: 11
Volume: 38
Year: 2015
Month: 11
X-DOI: 10.1080/1057610X.2015.1061296
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1061296
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:11:p:976-978

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1076277_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dorle Hellmuth
Author-X-Name-First: Dorle
Author-X-Name-Last: Hellmuth
Title: Countering Jihadi Terrorists and Radicals the French Way
Abstract: 
 The 2015 Charlie Hebdo attacks warrant a detailed profile of the French approach to countering Jihadi terrorism. Much has been written about the tough French counterterrorism regime, which originated in 1986 and remains unique among Western democracies. There has been less analysis of France's lengthy list of post-9/11 reforms, and even less discussion of the French approach to counterradicalization. In fact, France was among only few European countries that did not engage in any “soft” counterradicalization programs after the 2004 Madrid and the 2005 London bombings. The mass exodus of foreign fighters to Syria led to a first national counterradicalization plan in 2014. In response to the Paris attacks, much in line with its security-oriented methods and outlook, the French government increased counterterrorism spending and surveillance powers. Various other measures are noteworthy, however, as they focus on prison radicalization and represent an effort to strengthen the counterradicalization campaign.
Journal: Studies in Conflict & Terrorism
Pages: 979-997
Issue: 12
Volume: 38
Year: 2015
Month: 12
X-DOI: 10.1080/1057610X.2015.1076277
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1076277
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:12:p:979-997



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1076640_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Yair Galily
Author-X-Name-First: Yair
Author-X-Name-Last: Galily
Author-Name: Moran Yarchi
Author-X-Name-First: Moran
Author-X-Name-Last: Yarchi
Author-Name: Ilan Tamir
Author-X-Name-First: Ilan
Author-X-Name-Last: Tamir
Title: From Munich to Boston, and from Theater to Social Media: The Evolutionary Landscape of World Sporting Terror
Abstract: 
 Modern terrorist attacks are usually characterized by intentionally extreme public displays of massive violence to get wide propagation, courtesy of the media. This article uses large-scale, world sporting events, from the 1972 Munich massacre to the 2013 Boston Marathon bombing to document and analyze how terror acts grew and acclimatized into a reality in which the symbiotic, massive linkage between two gigantic entities—sports and the media—allows terrorism to prosper.
Journal: Studies in Conflict & Terrorism
Pages: 998-1007
Issue: 12
Volume: 38
Year: 2015
Month: 12
X-DOI: 10.1080/1057610X.2015.1076640
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1076640
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:12:p:998-1007



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1076644_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Moran Yarchi
Author-X-Name-First: Moran
Author-X-Name-Last: Yarchi
Author-Name: Yair Galily
Author-X-Name-First: Yair
Author-X-Name-Last: Galily
Author-Name: Ilan Tamir
Author-X-Name-First: Ilan
Author-X-Name-Last: Tamir
Title: Rallying or Criticizing? Media Coverage of Authorities' Reaction to Terror Attacks Targeting Sporting Events
Abstract: 
 The reaction of authorities to terror attacks or threats has the potential to attract both support and criticism. The current study aims to examine the international media's discourse surrounding authorities' reaction to sporting events that have suffered from terror attacks or terror threats. A comparison is made between events that are canceled and events that take place as planned despite the attack or threat. Our findings indicate no significant differences between the coverage of events that are canceled and those that continue as planned. The evidence actually exhibits greater levels of support rather than criticism of authorities in international media coverage.
Journal: Studies in Conflict & Terrorism
Pages: 1008-1021
Issue: 12
Volume: 38
Year: 2015
Month: 12
X-DOI: 10.1080/1057610X.2015.1076644
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1076644
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:12:p:1008-1021



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1076695_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ramón Spaaij
Author-X-Name-First: Ramón
Author-X-Name-Last: Spaaij
Author-Name: Mark S. Hamm
Author-X-Name-First: Mark S.
Author-X-Name-Last: Hamm
Title: Endgame? Sports Events as Symbolic Targets in Lone Wolf Terrorism
Abstract: 
 This article explores how terrorists acting alone or in small groups have used sports events as symbolic targets in their performance of terrorism. Drawing on a comparative analysis of the attacks on the 1996 Atlanta Olympic Games and the 2013 Boston Marathon, it is argued that terrorist target selection of major sports events should be understood in relation to the grievances and desires of the perpetrators. The article finds that rather than being the primary target of their attacks, sports events are among a broader range of densely crowded spaces that terrorist actors may seek to target as part of their violent struggle against their adversaries. The findings are contextualized in relation to broader patterns and trends in lone wolf terrorism, including the significance of a copycat phenomenon and inspiration effect.
Journal: Studies in Conflict & Terrorism
Pages: 1022-1037
Issue: 12
Volume: 38
Year: 2015
Month: 12
X-DOI: 10.1080/1057610X.2015.1076695
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1076695
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:12:p:1022-1037



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1099991_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Gearson
Author-X-Name-First: John
Author-X-Name-Last: Gearson
Author-Name: Hugo Rosemont
Author-X-Name-First: Hugo
Author-X-Name-Last: Rosemont
Title: CONTEST as Strategy: Reassessing Britain's Counterterrorism Approach
Abstract: 
 The appropriateness of the United Kingdom's counterterrorism strategy, known as CONTEST, divides opinion. This article reassesses CONTEST as strategy rather than simply examining its effectiveness as policy, or critiquing its individual parts. Reviewing the development of CONTEST in the context of wider analytical discussions on what makes for good strategy, the authors argue that several important strands of CONTEST are either underdeveloped or not yet as “strategic” as some analysts and the U.K. government itself have professed them to be. Fresh thinking on aspects of counterterrorism is urgently needed to counter the challenge of contemporary and future terrorism.
Journal: Studies in Conflict & Terrorism
Pages: 1038-1064
Issue: 12
Volume: 38
Year: 2015
Month: 12
X-DOI: 10.1080/1057610X.2015.1099991
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1099991
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:12:p:1038-1064



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1107438_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: Corrigendum
Journal: Studies in Conflict & Terrorism
Pages: 1065-1065
Issue: 12
Volume: 38
Year: 2015
Month: 12
X-DOI: 10.1080/1057610X.2015.1107438
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1107438
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:12:p:1065-1065



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1074814_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: Editorial Board EOV
Journal: Studies in Conflict & Terrorism
Pages: ebi-ebi
Issue: 12
Volume: 38
Year: 2015
Month: 12
X-DOI: 10.1080/1057610X.2015.1074814
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1074814
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:12:p:ebi-ebi

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_977605_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Elizabeth Grimm Arsenault
Author-X-Name-First: Elizabeth Grimm
Author-X-Name-Last: Arsenault
Author-Name: Tricia Bacon
Author-X-Name-First: Tricia
Author-X-Name-Last: Bacon
Title: Disaggregating and Defeating Terrorist Safe Havens
Abstract: 
 Terrorist organizations’ physical safe havens continue to shape the terrorist threat to the United States by extending the groups’ longevity and increasing the threat they pose. As a result, eliminating terrorist safe havens has been a key component of U.S. counterterrorism policy since at least 2001. However, some scholars challenged the post-9/11 policy consensus that terrorists find sanctuary in weak states and so-called ungoverned spaces. This article seeks to bridge this gap between scholarship and policy by offering a typology for disaggregating different kinds of terrorist safe havens. Our typology operates on two axes based on host government will (i.e., the host government's posture toward each group with haven inside its borders), as well as government capability, (specifically whether the host government possesses the specific capabilities needed to oust each group). This intersection of will and capability produces three types of havens. We briefly illustrate each type of haven using the exemplar case study of Pakistan—a location often described as an overarching safe haven, but which is actually home to several sanctuaries—and offer policy recommendations for addressing them. A need exists to disaggregate and identify how the United States can approach haven elimination. This typology and the analysis that stems from it offer a starting point for devising such strategies.
Journal: Studies in Conflict & Terrorism
Pages: 85-112
Issue: 2
Volume: 38
Year: 2015
Month: 2
X-DOI: 10.1080/1057610X.2014.977605
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.977605
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:2:p:85-112



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_979605_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ben Rich
Author-X-Name-First: Ben
Author-X-Name-Last: Rich
Author-Name: Dara Conduit
Author-X-Name-First: Dara
Author-X-Name-Last: Conduit
Title: The Impact of Jihadist Foreign Fighters on Indigenous Secular-Nationalist Causes: Contrasting Chechnya and Syria
Abstract: 
 Jihadist foreign fighters have become common in civil conflicts in Muslim countries. While research exists on the impact they have upon returning home, less attention has been given to their influence on the opposition cause that they mobilize in support of. This article looks at the impact that jihadist foreign fighters on the Chechen and Syrian resistance causes, evaluating their influence on oppositional cohesion and ideology, domestic and international perceptions of the movements, and on governmental narratives regarding the conflicts the foreign fighters engage in. It is concluded that foreign fighters have overwhelmingly damaged the Chechen and Syrian opposition movements, making the likelihood of opposition success more remote.
Journal: Studies in Conflict & Terrorism
Pages: 113-131
Issue: 2
Volume: 38
Year: 2015
Month: 2
X-DOI: 10.1080/1057610X.2014.979605
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.979605
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:2:p:113-131



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_977000_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Spyridon Plakoudas
Author-X-Name-First: Spyridon
Author-X-Name-Last: Plakoudas
Title: Strategy in Counterinsurgency: A Distilled Approach
Abstract: 
 How does an established state authority respond to an insurgency? How does such an authority plan and carry out its struggle to counter an armed non-state actor and why? The issue of strategy in counterinsurgency (COIN) remains a rather contentious subject and several practitioners and theorists on COIN have prescribed various remedies to the same problem. This article offers a re-evaluation of the concept of strategy in COIN and outlines the practices and mentalities that counterinsurgents should adopt (and avoid) to successfully counter an insurgency.
Journal: Studies in Conflict & Terrorism
Pages: 132-145
Issue: 2
Volume: 38
Year: 2015
Month: 2
X-DOI: 10.1080/1057610X.2014.977000
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.977000
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:2:p:132-145



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_981103_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Stephen Ceccoli
Author-X-Name-First: Stephen
Author-X-Name-Last: Ceccoli
Author-Name: John Bing
Author-X-Name-First: John
Author-X-Name-Last: Bing
Title: Explaining Divergent Attitudes Toward Lethal Drone Strikes
Abstract: 
 Although lethal drone strikes have become a central component of the U.S. campaign against international terrorism, the program remains a low salience issue with considerable bi-partisan consensus and a supportive U.S. general public. This article explains American attitudes toward lethal drone strikes by testing arguments based on partisanship and ideology, core values and abstract beliefs, and elite cues. Results suggest that respondent core values and governmental cues offer important insights. Consequently, the political environment under certain conditions may not frame important issues in such a way that the general public is likely to gain a knowledgeable understanding of the alternatives.
Journal: Studies in Conflict & Terrorism
Pages: 146-166
Issue: 2
Volume: 38
Year: 2015
Month: 2
X-DOI: 10.1080/1057610X.2014.981103
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.981103
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:2:p:146-166

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_986979_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ramón Spaaij
Author-X-Name-First: Ramón
Author-X-Name-Last: Spaaij
Author-Name: Mark S. Hamm
Author-X-Name-First: Mark S.
Author-X-Name-Last: Hamm
Title: Key Issues and Research Agendas in Lone Wolf Terrorism
Abstract: 
 This article builds on recent contributions to the academic literature on lone wolf terrorism to critically examine key issues that are germane to the current state of play in this field of study. It finds that, overall, the recent academic literature still suffers from considerable problems regarding quality and rigor, including definitional, conceptual, methodological, and inference issues. By providing a critique of these issues, the article attempts to advance the scholarly debate on lone wolf terrorism and inspire greater dialogue and collaboration between scholars. Directions for future research are also outlined.
Journal: Studies in Conflict & Terrorism
Pages: 167-178
Issue: 3
Volume: 38
Year: 2015
Month: 3
X-DOI: 10.1080/1057610X.2014.986979
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.986979
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:3:p:167-178



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_987593_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alessandro Orsini
Author-X-Name-First: Alessandro
Author-X-Name-Last: Orsini
Title: Are Terrorists Courageous? Micro-Sociology of Extreme Left Terrorism
Abstract: 
 This article contests the affirmation—based on common sense—according to which terrorists simply need courage. The typical terrorist act can be considered part of the sociological category known as “vile violence” that is the act of striking out at a victim after having placed him or her in a desperate situation that does not allow for any escape. This article is based on primary and secondary sources, such as the analysis of thirty-five homicides committed in Italy by six terrorist units of the extreme left; interviews with extreme left terrorists; interviews with victims of extreme left terrorists; autobiographies of extreme left terrorists; autobiographies of victims of extreme left terrorists; video interviews of extreme left terrorists; and written statements of the investigating magistrates.
Journal: Studies in Conflict & Terrorism
Pages: 179-198
Issue: 3
Volume: 38
Year: 2015
Month: 3
X-DOI: 10.1080/1057610X.2014.987593
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.987593
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:3:p:179-198



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_982384_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Hendrik Hegemann
Author-X-Name-First: Hendrik
Author-X-Name-Last: Hegemann
Author-Name: Martin Kahl
Author-X-Name-First: Martin
Author-X-Name-Last: Kahl
Title: Constructions of Effectiveness and the Rationalization of Counterterrorism Policy: The Case of Biometric Passports
Abstract: 
 This article argues that counterterrorism effectiveness is a distinct, discursive construction that politicians use to offer a rationalization of measures adopted under conditions of inherent uncertainty. Even in the face of multiple limits of knowability, decision makers need to offer “rational” justifications complying with persisting expectations of “evidence-based” policy and sound deliberation in modern societies. This article develops a new perspective on the political role of counterterrorism effectiveness highlighting the symbolic importance of knowledge claims and prevailing standards of modern rationality. It illustrates its arguments through a case study on the justification of biometric passports as an effective counterterrorist tool.
Journal: Studies in Conflict & Terrorism
Pages: 199-218
Issue: 3
Volume: 38
Year: 2015
Month: 3
X-DOI: 10.1080/1057610X.2014.982384
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.982384
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:3:p:199-218



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_981989_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nadir Gergin
Author-X-Name-First: Nadir
Author-X-Name-Last: Gergin
Author-Name: Haci Duru
Author-X-Name-First: Haci
Author-X-Name-Last: Duru
Author-Name: Hakan Cem Çetin
Author-X-Name-First: Hakan Cem
Author-X-Name-Last: Çetin
Title: Profile and Life Span of the PKK Guerillas
Abstract: 
 This study attempts to explore the span of a life in a specific terrorist organization, the Kurdistan Workers Party (PKK). It suggests the following: The average lifespan of a person in the PKK is about two-and-a-half years (i.e., not a very long one). Females join the PKK at a younger age (about 1.4 years) and die at a younger age (about 1.4 years) compared to males, but their lifespan is not any different than that of males. The age at which a PKK member joins the organization, and the age at which (s)he dies varies by year. The age at which a PKK member joins the organization, and the age at which (s)he dies varies by where (s)he comes from. Still, another interesting observation is that the average lifespan of a PKK member varies by where (s)he comes from.
Journal: Studies in Conflict & Terrorism
Pages: 219-232
Issue: 3
Volume: 38
Year: 2015
Month: 3
X-DOI: 10.1080/1057610X.2014.981989
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.981989
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:3:p:219-232

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_997510_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Isaac Kfir
Author-X-Name-First: Isaac
Author-X-Name-Last: Kfir
Title: Social Identity Group and Human (In)Security: The Case of Islamic State in Iraq and the Levant (ISIL)
Abstract: 
 The article uses social identity group theory and human insecurity to examine the rise of the Islamic State in Iraq and the Levant (ISIL). After first defining social group identity and its characteristics, the article reviews the Al Qaeda ideology that serves as the foundation of ISIL, before turning attention to the message and legacy of Abu Musab al-Zarqawi and their profound influence on ISIL. The article concludes by arguing that only by ending the marketplace of identities can stability be restored to Iraq and Syria.
Journal: Studies in Conflict & Terrorism
Pages: 233-252
Issue: 4
Volume: 38
Year: 2015
Month: 4
X-DOI: 10.1080/1057610X.2014.997510
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.997510
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:4:p:233-252



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_994349_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John McCoy
Author-X-Name-First: John
Author-X-Name-Last: McCoy
Author-Name: W. Andy Knight
Author-X-Name-First: W. Andy
Author-X-Name-Last: Knight
Title: Homegrown Terrorism in Canada: Local Patterns, Global Trends
Abstract: 
 The article examines how global trends related to militant Islamism have influenced patterns of homegrown terrorism in Canada. It seeks to understand how an evolving movement has shaped three case studies, two cases of homegrown terrorism, the case of Momin Khawaja, the “Toronto 18” plot, and the emerging trend of extremist travelers. Recognizing the notable gap in the literature, a growing number of cases of homegrown terrorism and extremism in Canada suggest that further study is required. The article asks why Canadians choose to participate in this movement and why militant Islamist movements are actively recruiting them.
Journal: Studies in Conflict & Terrorism
Pages: 253-274
Issue: 4
Volume: 38
Year: 2015
Month: 4
X-DOI: 10.1080/1057610X.2014.994349
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.994349
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:4:p:253-274



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_995565_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ora Szekely
Author-X-Name-First: Ora
Author-X-Name-Last: Szekely
Title: Doing Well by Doing Good: Understanding Hamas's Social Services as Political Advertising
Abstract: 
 Like many nonstate military actors, Hamas has long provided social services to its constituents, but the mechanism by which charity leads to increased public support is poorly understood. This article argues that providing charity benefits nonstate actors not because it isolates recipients or acts as a bribe but because it allows organizations like Hamas to overcome the legacies of their own military activities and extremist ideologies. Service provision allows them to demonstrate that they are not merely soldiers or ideologues, but capable bureaucrats and managers as well.
Journal: Studies in Conflict & Terrorism
Pages: 275-292
Issue: 4
Volume: 38
Year: 2015
Month: 4
X-DOI: 10.1080/1057610X.2014.995565
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.995565
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:4:p:275-292



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_991165_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Matt Qvortrup
Author-X-Name-First: Matt
Author-X-Name-Last: Qvortrup
Title: T-Test for Terrorism: Did the Introduction of Proportional Representation Reduce the Terrorist Threat? A Time-Series Case Study of Algeria and Northern Ireland
Abstract: 
 Can electoral reform lead to a reduction in the number of terrorist incidents? Economists have shown that the introduction of constitutional institutions such as courts in the early eighteenth century had a direct effect on investment. Could there be a similar link between the introduction of proportional representation (PR) electoral systems and a reduction in the number of terrorist attacks? Previous studies using cross-sectional data have found a negative correlation between the presence of PR-electoral systems and the number of terrorist incidents. However, earlier studies were based on aggregate figures, not on time-series data. They did not provide a direction that could be used to measure the possible effect of the introduction of PR. This research note addresses this problem. Using a paired samples t-test it is possible to show that the introduction of proportional representation in Northern Ireland and Algeria led to a marked reduction in the number of terrorist attacks. The note thus adds strength to earlier studies.
Journal: Studies in Conflict & Terrorism
Pages: 293-304
Issue: 4
Volume: 38
Year: 2015
Month: 4
X-DOI: 10.1080/1057610X.2014.991165
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.991165
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:4:p:293-304



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1004893_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dennis Pluchinsky
Author-X-Name-First: Dennis
Author-X-Name-Last: Pluchinsky
Title: “Special” Communiqué Issued by the Belgian Marxist Terrorist Group, “Communist Combatant Cells” (CCC)
Abstract: 
 This section of Studies in Conflict & Terrorism is dedicated to the reprinting of selected, translated terrorist communiqués that provide insights into the mindset, worldview, or operational thinking of a group. In terms of communiqués, this section employs the following typology of terrorist communiqués. There are three types of terrorist communiqués: attack, strategic, and special. Attack communiqués are issued to claim responsibility for an attack, explain the target selected, and provide the political rationale for attacking the target. A strategic communiqué is a longer document that is issued to provide strategic direction or commentary on political events, issues, and developments relevant to the group's cause and constituency. It can be used to explain changes of strategy or reinforce the strategic direction of the group. The special communiqué is similar to the attack communiqué in that it is event-driven but addresses non-attack events like anniversary dates, hunger strikes, elections, deaths of leaders, ceasefires, issuing threats or warnings, annual progress reports, issuing apologies, and so on. All three communiqués are issued publicly and intended to influence various audiences.
Journal: Studies in Conflict & Terrorism
Pages: 305-309
Issue: 4
Volume: 38
Year: 2015
Month: 4
X-DOI: 10.1080/1057610X.2015.1004893
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1004893
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:4:p:305-309

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1018024_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: R. Kim Cragin
Author-X-Name-First: R. Kim
Author-X-Name-Last: Cragin
Title: Semi-Proxy Wars and U.S. Counterterrorism Strategy
Abstract: 
 On 4 February 2014, Al Qaeda leaders in Pakistan (aka Al Qaeda Central) repudiated Abu Bakr al-Baghdadi, the leader of Al Qaeda in Iraq. Ayman al-Zawahiri declared that al-Baghdadi and his newly formed Islamic State in Iraq and the Levant (ISIL) were no longer part of Al Qaeda's organization and Al Qaeda Central could not be held responsible for ISIL's behavior. It represents the first time that Al Qaeda Central has renounced an affiliate publicly. The announcement was driven by months of fighting between ISIL and Jabhat al-Nusra, another Al Qaeda affiliate in Syria. In fact, in Syria, Al Qaeda fighters are competing against each other for influence, as well as against other opposition groups, the Syrian regime, the Islamic Revolutionary Guard Corps, Iraqi militiamen, and Lebanese Hezbollah. This chaotic, semi-proxy war is unlike any previous problem encountered, made even more challenging by the limited U.S. presence on-the-ground. More worrisome, this semi-proxy war also has spread beyond Syria. Similar dynamics have emerged in Iraq, Yemen, and Lebanon to a certain extent. This article argues that these dynamics necessitate a twist in U.S. counterterrorism strategy.
Journal: Studies in Conflict & Terrorism
Pages: 311-327
Issue: 5
Volume: 38
Year: 2015
Month: 5
X-DOI: 10.1080/1057610X.2015.1018024
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1018024
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:5:p:311-327



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1013776_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marion Van San
Author-X-Name-First: Marion
Author-X-Name-Last: Van San
Title: Striving in the Way of God: Justifying Jihad by Young Belgian and Dutch Muslims
Abstract: 
 Since March 2013, the news has been dominated by young Muslims from European countries leaving for Syria to join the armed struggle against the Assad regime. This is especially remarkable in light of the fact that it would appear that, until very recently, European foreign fighters were far and few between. The armed struggle is a topic that is widely discussed among young Muslims on social media such as Facebook. During the research on which this article is based, I analyzed conversations between young Muslims on Facebook and also conducted interviews with a number of them. The key question was: Why is it that so many young people use social media to profess their willingness to sacrifice their lives in armed struggle while at the same time most of them are not prepared to turn their words into deeds? Despite all the media reports, the fact remains that of the large number of young Muslims who are potentially ready to go into battle, the vast majority prefer to stay at home for the time being. When I confronted the participants in these discussions with this inconsistency they offered a number of reasons as to why martyrdom was not yet granted to them. The way in which these considerations shape their lives and the role played by their religious convictions form the subject of this article.
Journal: Studies in Conflict & Terrorism
Pages: 328-342
Issue: 5
Volume: 38
Year: 2015
Month: 5
X-DOI: 10.1080/1057610X.2015.1013776
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1013776
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:5:p:328-342



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1005459_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marco Nilsson
Author-X-Name-First: Marco
Author-X-Name-Last: Nilsson
Title: Foreign Fighters and the Radicalization of Local Jihad: Interview Evidence from Swedish Jihadists
Abstract: 
 Modern jihadism has experienced two distinct crises. The present study analyzes recent developments in jihadism, which can be seen in connection with efforts to solve the latest recruitment crisis of global jihad, and is based on comparative interviews with eight Swedish jihadists defined as foreign fighters. The study identifies three new trends evident in the interviews comparing jihadists active in Syria with those who fought in Afghanistan and Bosnia: socialization to global jihad, normalization of jihad, and an increasing use of the doctrine of takfir (i.e., ex-communication). This can be described as indicating the radicalization of local jihad, as the territorially based jihad, championed by Abdullah Azzam, and the global jihad of Osama bin Laden meet in the territorial realities of Syria and Iraq.
Journal: Studies in Conflict & Terrorism
Pages: 343-358
Issue: 5
Volume: 38
Year: 2015
Month: 5
X-DOI: 10.1080/1057610X.2015.1005459
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1005459
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:5:p:343-358



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1009799_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Veronica Strandh
Author-X-Name-First: Veronica
Author-X-Name-Last: Strandh
Author-Name: Niklas Eklund
Author-X-Name-First: Niklas
Author-X-Name-Last: Eklund
Title: Swedish Counterterrorism Policy: An Intersection Between Prevention and Mitigation?
Abstract: 
 The aim of this article is to analyze how and why Swedish counterterrorism policy has changed since 2001. It raises the issue of how counterterrorism interacts with other factors on the governmental agenda, which priorities are made, and how these can be understood. Although much empirical evidence on the real political influence of emergent interagency networks is still lacking in the case of Sweden, an attempt is made here to analyze the importance of focusing events. In the light of the Swedish national strategy for counterterrorism, the article analyzes the content of annual reports from the Swedish Security Service. The article also explores linkages between the counterterrorism and crisis management literatures, and argues that the reassuring overtones in Swedish counterterrorism policy of late can be understood not only as the result of changes in threat perception and policy, but also in institutional change.
Journal: Studies in Conflict & Terrorism
Pages: 359-379
Issue: 5
Volume: 38
Year: 2015
Month: 5
X-DOI: 10.1080/1057610X.2015.1009799
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1009799
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:5:p:359-379



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_995988_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Liana Eustacia Reyes
Author-X-Name-First: Liana Eustacia
Author-X-Name-Last: Reyes
Author-Name: Shlomi Dinar
Author-X-Name-First: Shlomi
Author-X-Name-Last: Dinar
Title: The Convergence of Terrorism and Transnational Crime in Central Asia
Abstract: 
 This article examines the convergence among ethnic groups, narco-traffickers, insurgents, and terror organizations in Central Asia. It analyzes the lucrative business of drug trafficking and the diffusion of globalization, which have undoubtedly brought these once disparate groups together. It will explore how the increasing movement of illicit goods and people, proliferation of transportation technology, growing infrastructure, cooperative ethnicities, as well as a shared need for funding, have provided these groups with an opportunity to consolidate their efforts in ways that were not possible in the past.
Journal: Studies in Conflict & Terrorism
Pages: 380-393
Issue: 5
Volume: 38
Year: 2015
Month: 5
X-DOI: 10.1080/1057610X.2014.995988
File-URL: http://hdl.handle.net/10.1080/1057610X.2014.995988
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:5:p:380-393

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1008341_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joel A. Capellan
Author-X-Name-First: Joel A.
Author-X-Name-Last: Capellan
Title: Lone Wolf Terrorist or Deranged Shooter? A Study of Ideological Active Shooter Events in the United States, 1970–2014
Abstract: 
 This study explores the threat of ideological active shooter attacks in the United States. In particular, to understand if these events constitute a new brand of “lone wolf terrorism” or if they are simply “deranged shooters” that happen to be ideological. The results show that ideological and non-ideological active shooters share very similar profiles. Despite the similarities, ideological extremism seems to influence the way these offenders prepare, execute, and conclude their attacks. Most ideological active shooters are “loners” whose attacks tend to be motivated by ideology. Given their sophistication and lethality, ideological active shooters represent a serious threat to national security.
Journal: Studies in Conflict & Terrorism
Pages: 395-413
Issue: 6
Volume: 38
Year: 2015
Month: 6
X-DOI: 10.1080/1057610X.2015.1008341
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1008341
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:6:p:395-413



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1004891_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Matteo Vergani
Author-X-Name-First: Matteo
Author-X-Name-Last: Vergani
Author-Name: Sean Collins
Author-X-Name-First: Sean
Author-X-Name-Last: Collins
Title: Radical Criminals in the Grey Area: A Comparative Study of Mexican Religious Drug Cartels and Australian Outlaw Motorcycle Gangs
Abstract: 
 This article defines and assesses the ideal-type of the radical criminal as the analytical framework for a comparative qualitative study of Mexican religious drug cartels and Australian outlaw motorcycle gangs and concludes that radical criminals operate in both weak and failed states and stable democracies. The article participates in the wider discussion concerning the existence (and the features) of a grey area between criminal and political violence, through the lens of the radical criminal ideal-type.
Journal: Studies in Conflict & Terrorism
Pages: 414-432
Issue: 6
Volume: 38
Year: 2015
Month: 6
X-DOI: 10.1080/1057610X.2015.1004891
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1004891
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:6:p:414-432



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1009798_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeff Gruenewald
Author-X-Name-First: Jeff
Author-X-Name-Last: Gruenewald
Author-Name: Kayla Allison-Gruenewald
Author-X-Name-First: Kayla
Author-X-Name-Last: Allison-Gruenewald
Author-Name: Brent R. Klein
Author-X-Name-First: Brent R.
Author-X-Name-Last: Klein
Title: Assessing the Attractiveness and Vulnerability of Eco-Terrorism Targets: A Situational Crime Prevention Approach
Abstract: 
 This study assesses the vulnerability and attractiveness of eco-terrorism targets in the United States based on a Situational Crime Prevention approach. Data from the American Terrorism Study are extracted for eight different attributes of terrorism targets, including exposed, vital, iconic, legitimate, destructible, occupied, near, and easy. Descriptive findings generally support expectations that eco-terrorists select targets based on their vulnerability and attractiveness. The study concludes with several implications for homeland security policy and a call for further exploration into new and alternative operationalizations of eco-terrorism target attributes.
Journal: Studies in Conflict & Terrorism
Pages: 433-455
Issue: 6
Volume: 38
Year: 2015
Month: 6
X-DOI: 10.1080/1057610X.2015.1009798
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1009798
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:6:p:433-455



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1006451_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Martin Jander
Author-X-Name-First: Martin
Author-X-Name-Last: Jander
Title: German Leftist Terrorism and Israel: Ethno-Nationalist, Religious-Fundamentalist, or Social-Revolutionary?
Abstract: 
 The relationship of the three leftist terrorist organizations in the Federal Republic of Germany to Israel can be summarized, in somewhat abbreviated fashion, as follows: All three groups, the Red Army Faction (Rote Armee Fraktion; RAF), June 2 Movement (Bewegung 2. Juni), and Revolutionary Cells (Revolutionäre Zellen), and the milieu from which they emerged in West Berlin, Munich, Heidelberg, Hamburg, and Frankfurt, hated America, Americans, Israel, and Jews. They participated in the international terror war against Israel and did not shy away from attacks on Jews and Jewish facilities in the Federal Republic of Germany. The three organizations mentioned, for all their differences, are, to be reckoned among the organizations coming out of leftist traditions that, like the Socialist Unity Party of Germany (Sozialistische Einheitspartei Deutschlands), after the end of the Shoah and the Second World War, and in the name of a supposed struggle against fascism, conducted antisemitic propaganda, supported the war of terror against Israel, and publicly justified and supported those groups and institutions working in the same direction.
Journal: Studies in Conflict & Terrorism
Pages: 456-477
Issue: 6
Volume: 38
Year: 2015
Month: 6
X-DOI: 10.1080/1057610X.2015.1006451
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1006451
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:6:p:456-477



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1005462_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Diego Muro
Author-X-Name-First: Diego
Author-X-Name-Last: Muro
Title: Healing through Action? The Political Mobilization of Victims of Al Qaeda-Inspired Violence in Spain and the United Kingdom
Abstract: 
 Spain and the United Kingdom have experienced similar types of political violence. Since the 1960s, both countries have suffered casualties as a result of long-standing ethno-nationalist conflicts as well as terrorist attacks by Al Qaeda–inspired groups. In spite of these similarities, the two countries display a striking variation in the attitudes to victims. In Spain, Associations of Victims of Terrorism have been highly visible and influential, whereas United Kingdom-based organizations have not captured the public's imagination and the attention of policymakers in the same way. Spanish associations of victims have been present in the public sphere and have routinely provided their opinions on counterterrorist policy and appropriate government legislation whereas this sort of political activity is difficult to trace in the United Kingdom. As a result of this puzzle, the article tries to answer the following question: Why are associations of victims of terrorism by Al Qaeda–inspired attacks more influential in Spain than in the United Kingdom? The article will argue that political and sociocultural variables account for the difference. More specifically, the article demonstrates that the experience of both ethno-nationalist and jihadist political violence has affected party systems and cultural frames differently, hence providing distinct sets of political opportunities for victims’ associations to carry out their lobbying strategies.
Journal: Studies in Conflict & Terrorism
Pages: 478-493
Issue: 6
Volume: 38
Year: 2015
Month: 6
X-DOI: 10.1080/1057610X.2015.1005462
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1005462
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:6:p:478-493

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1025611_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anita Peresin
Author-X-Name-First: Anita
Author-X-Name-Last: Peresin
Author-Name: Alberto Cervone
Author-X-Name-First: Alberto
Author-X-Name-Last: Cervone
Title: The Western Muhajirat of ISIS
Abstract: 
 An unprecedented number of Western women have recently joined the Islamic State of Iraq and Syria (ISIS). The group has envisaged strictly non-combat roles for them, but violence is an essential part of their embraced ideology and several signs suggest that they could claim a more militant role. Their marginalization, however, is essential for the preservation of ISIS's power system and it is consequently unlikely that it would accommodate such aspiration, at least in the areas of the proclaimed caliphate. It could be different in the West, where women returning from conflict areas or those, even more numerous, anxious to join but unable to travel, could engage in violent acts.
Journal: Studies in Conflict & Terrorism
Pages: 495-509
Issue: 7
Volume: 38
Year: 2015
Month: 7
X-DOI: 10.1080/1057610X.2015.1025611
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1025611
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:7:p:495-509



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1022443_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Natalie Delia Deckard
Author-X-Name-First: Natalie
Author-X-Name-Last: Delia Deckard
Author-Name: Atta Barkindo
Author-X-Name-First: Atta
Author-X-Name-Last: Barkindo
Author-Name: David Jacobson
Author-X-Name-First: David
Author-X-Name-Last: Jacobson
Title: Religiosity and Rebellion in Nigeria: Considering Boko Haram in the Radical Tradition
Abstract: 
 Testing social movement theory positing that radical organizations are ideologically driven at their core, but are supported by civilians who are driven by social factors, this research interrogates the disparity between radical group ideology and supporter belief set in the context of present-day Nigeria. Content analysis of randomly selected Boko Haram publications establishes the high, and increasing, levels of religiosity exhibited by the violent social movement itself. In contrast, a large-N survey of Nigerians conducted in 2012 and 2013 shows that high levels of religiosity do not significantly predict willingness to justify violence, commitment to non-state violent actors, or positive attitude toward Boko Haram among Nigerians as a whole, but rather the opposite. Given these findings, Boko Haram may be better understood within the tradition of radical extremist movements across the ideological spectrum, even while it frames its struggle as that of a distinctly religious movement.
Journal: Studies in Conflict & Terrorism
Pages: 510-528
Issue: 7
Volume: 38
Year: 2015
Month: 7
X-DOI: 10.1080/1057610X.2015.1022443
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1022443
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:7:p:510-528



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1016312_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Matthew Testerman
Author-X-Name-First: Matthew
Author-X-Name-Last: Testerman
Title: Removing the Crutch: External Support and the Dynamics of Armed Conflict
Abstract: 
 Empirical analysis of civil wars wherein rebels receive support from outside states or actors confirms the expectation that such external support is correlated with conflicts that, on average, are longer than civil wars without external support. When this assistance is lost, the empirical results are at odds with the expectation that these wars should end more rapidly. Instead, wars in which there is a break in external support are more likely to continue into the next calendar year than even those wars with continued external support. This counterintuitive finding suggests a re-evaluation of theoretical foundations of external support to rebel groups.
Journal: Studies in Conflict & Terrorism
Pages: 529-542
Issue: 7
Volume: 38
Year: 2015
Month: 7
X-DOI: 10.1080/1057610X.2015.1016312
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1016312
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:7:p:529-542



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1025609_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kenneth Pennington
Author-X-Name-First: Kenneth
Author-X-Name-Last: Pennington
Author-Name: Orla Lynch
Author-X-Name-First: Orla
Author-X-Name-Last: Lynch
Title: Counterterrorism, Community Policing and the Flags Protests: An Examination of Police Perceptions of Northern Ireland's Operation Dulcet
Abstract: 
 In 2013 Northern Ireland (NI) witnessed the most protracted period of public-disorder ever seen in the United Kingdom. After Belfast City Council voted to fly the Union flag in-line with the manner adopted in the rest of the United Kingdom, loyalist protestors blocked roads, attacked offices, and held marches through Belfast city center. During what became known as Operation Dulcet, police had to respond to the protests and violence, mindful of existing tensions in NI. This article reports on data collected from interviews conducted with officers involved in the policing of these events. The findings demonstrate that the police response was understood using narratives concerning the primacy of human rights, a focus on perceived proportionality, and ultimately, related to the potential violence linked to historic conceptions of community divisions in NI.
Journal: Studies in Conflict & Terrorism
Pages: 543-559
Issue: 7
Volume: 38
Year: 2015
Month: 7
X-DOI: 10.1080/1057610X.2015.1025609
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1025609
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:7:p:543-559



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1022093_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Haroro J. Ingram
Author-X-Name-First: Haroro J.
Author-X-Name-Last: Ingram
Title: An Analysis of the Taliban in Khurasan's Azan (Issues 1–5)
Abstract: 
 This article analyzes issues 1–5 of the Taliban in Khurasan's Azan magazine. It applies an interpretive framework for analyzing radical narratives, based on a multidisciplinary conceptualization of the radicalization process, to explore how Azan attempts to appeal to its audiences by leveraging ingroup, Other, crisis and solution constructs via value-, crisis-, and dichotomy-reinforcing narratives. Two key findings emerge. First, Azan prioritizes content that empowers its readership toward action with narratives that link ingroup and solution constructs. Second, Azan uses a variety of narrative approaches in order to appeal to a potentially diverse readership at different stages of radicalization.
Journal: Studies in Conflict & Terrorism
Pages: 560-579
Issue: 7
Volume: 38
Year: 2015
Month: 7
X-DOI: 10.1080/1057610X.2015.1022093
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1022093
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:7:p:560-579

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1031556_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel Byman
Author-X-Name-First: Daniel
Author-X-Name-Last: Byman
Title: The Homecomings: What Happens When Arab Foreign Fighters in Iraq and Syria Return?
Abstract: 
 What threat do foreign Arab jihadists returning from the war in Syria and Iraq pose to their home states and the broader Arab world? Foreign fighters come back as hardened veterans, steady in the face of danger and skilled in the use of weapons and explosives. While in the conflict zone, they will form networks with other radicals, embrace techniques like suicide bombings and beheadings, and establish ties to jihadists around the world. Different countries have different mitigating factors that limit the danger. The presence or absence of strong and focused security services is particularly important. Returnees' ambition, regional focus, lack of discipline, and brutality often mean they create more enemies than they vanquish and anger local populations. Most terrorism will be locally and regionally focused, with international terrorism probably less of a priority. Area regimes can reduce the risk of bleedout by hindering the travel of volunteers and constraining their ability to organize, stressing the internecine nature of the violence in the Sunni Muslim community, and developing effective de-radicalization programs. Regional and international cooperation to monitor and disrupt travel is also valuable. Many regimes, however, are also likely to take advantage of the jihadists' presence to gain more support from the United States, delay democratic reforms, and crackdown on non-jihadist opposition. Improving intelligence sharing and offensive counterintelligence is important, and the United States can play an important facilitating role.
Journal: Studies in Conflict & Terrorism
Pages: 581-602
Issue: 8
Volume: 38
Year: 2015
Month: 8
X-DOI: 10.1080/1057610X.2015.1031556
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1031556
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:8:p:581-602



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1038105_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Timothy Holman
Author-X-Name-First: Timothy
Author-X-Name-Last: Holman
Title: Belgian and French Foreign Fighters in Iraq 2003–2005: A Comparative Case Study
Abstract: 
 Efforts to understand the distinction between foreign fighting and domestic terrorist acts have focused for the most part at the macro level. This study investigates if this difference is observed at the network level. The Iraq foreign fighter mobilization, which was significant, both numerically and, in terms of its visibility, is used for this analysis. The participation of Belgian and French foreign fighters is examined due to the perceived level of threat they posed in the period 2003–2005 and while absolute numbers are relatively low, these two countries may have provided just under a quarter of the all European foreign fighters in this period. Observations are generated and then compared to research on domestic attack networks in Europe and the United Kingdom. The article finds that the two networks were involved in foreign fighter activity and did not engage in domestic attack activity. Involvement in domestic attacks occurred at a later time via individuals who had left the network, individuals on the periphery of the original foreign fighter network or individuals who unsuccessfully attempted to engage in foreign fighter activity.
Journal: Studies in Conflict & Terrorism
Pages: 603-621
Issue: 8
Volume: 38
Year: 2015
Month: 8
X-DOI: 10.1080/1057610X.2015.1038105
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1038105
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:8:p:603-621



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1030194_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Shawn Teresa Flanigan
Author-X-Name-First: Shawn Teresa
Author-X-Name-Last: Flanigan
Author-Name: Cheryl O'brien
Author-X-Name-First: Cheryl
Author-X-Name-Last: O'brien
Title: Service-Seeking Behavior, Perceptions of Armed Actors, and Preferences Regarding Governance: Evidence from the Palestinian Territories
Abstract: 
 Armed non-state actors, such as Hezbollah and Hamas, are visibly engaged in providing social welfare in addition to participating in violence. A number of scholars have suggested that there is a relationship between service provision by terrorist organizations and support from service recipients, and have indicated that terrorist organizations use service provision strategically for this purpose. However, few studies have examined the experiences and opinions of service recipients themselves to understand if services do indeed influence populations' political loyalties and opinions regarding violent activities. Using data from more than 1,000 low to moderate income individuals in Palestine, this study seeks to understand if and how receiving services from a specific organization engenders loyalty to the organization, passive acceptance and/or favorable approval of the organizations' violent activities, and the likelihood of participation in the organization's violent activities. This paper explores if and how provision of aid and “governance” services by armed non-state actors is correlated with various aspects of individuals' experiences of conflict, such as their opinions about the use of violence and various strategies for attaining peace, their fellow community members' likelihood to join armed groups and engage in fighting, and their preferences regarding state structure and legal system.
Journal: Studies in Conflict & Terrorism
Pages: 622-651
Issue: 8
Volume: 38
Year: 2015
Month: 8
X-DOI: 10.1080/1057610X.2015.1030194
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1030194
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:8:p:622-651



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1030190_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Brandon M. Boylan
Author-X-Name-First: Brandon M.
Author-X-Name-Last: Boylan
Title: Sponsoring Violence: A Typology of Constituent Support for Terrorist Organizations
Abstract: 
 Terrorist organizations rely on support from their constituencies to survive. Constituent support can be categorized by constituents' behavior (active or passive) and the inducement strategy used by terrorist organizations to obtain it (enticements or coercion). These two dimensions overlap, producing a typology of constituent support for terrorist organizations. Four types of support are thus identified: impelled (active and enticed), auspicious (passive and enticed), compelled (active and coerced), and deterred (passive and coerced). Although types often co-exist and transform from one to another over time, each is a distinct lens to view constituent support and can improve upon state counterterrorism strategies.
Journal: Studies in Conflict & Terrorism
Pages: 652-670
Issue: 8
Volume: 38
Year: 2015
Month: 8
X-DOI: 10.1080/1057610X.2015.1030190
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1030190
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:8:p:652-670



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1042267_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alexander Knorr
Author-X-Name-First: Alexander
Author-X-Name-Last: Knorr
Title: Economic Factors for Piracy: The Effect of Commodity Price Shocks
Abstract: 
 This study treats piracy as a civil conflict event where participants are substituting from legal work to illegal activity in response to lower commodity prices (opportunity cost effect). The analysis exploits exogenous variation in nine different commodity prices across seventeen countries around the globe. Results show that as commodity prices decrease maritime piracy attacks increase, which is consistent with results found in civil conflict literature. In the context of actual commodity shocks these piracy attacks represent increases ranging from .452 to 2.59 more attacks per year in the ordinary least squares and .495 to 20.71 attacks per year in the Poisson specification.
Journal: Studies in Conflict & Terrorism
Pages: 671-689
Issue: 8
Volume: 38
Year: 2015
Month: 8
X-DOI: 10.1080/1057610X.2015.1042267
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1042267
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:8:p:671-689

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1049052_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tatjana Stankovic
Author-X-Name-First: Tatjana
Author-X-Name-Last: Stankovic
Title: Microdisarmament and Compliance Costs: An Analysis of Disarmament, Demobilization, and Reintegration Programs
Abstract: 
 Focusing on disarmament, demobilization, and reintegration programs, this article considers why some armed groups disarm and demobilize, while others refuse to do so. Previous research focused on intergroup rivalries and identified enforcement as a critical barrier. This study considers the effect of (1) war benefits and (2) intragroup dynamics and argues that distribution problems obstruct conflict resolution. Using a simple game-theoretic model, the article demonstrates that optimal programs (1) consider that combatants' cost of supporting peace varies and (2) require a mix of positive and negative incentives to motivate all ex-combatants to participate and comply with program requirements.
Journal: Studies in Conflict & Terrorism
Pages: 691-709
Issue: 9
Volume: 38
Year: 2015
Month: 9
X-DOI: 10.1080/1057610X.2015.1049052
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1049052
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:9:p:691-709



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1048100_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David C. Hofmann
Author-X-Name-First: David C.
Author-X-Name-Last: Hofmann
Title: Quantifying and Qualifying Charisma: A Theoretical Framework for Measuring the Presence of Charismatic Authority in Terrorist Groups
Abstract: 
 In the past four decades, there has been increased multidisciplinary scholarly interest in the study of charismatic authority. However, there has yet to be any systematic examination of charismatic authority in the context of terrorism, despite widespread acknowledgment of the importance of charismatic leaders in the recruitment, radicalization, and operation of terrorist groups. This article seeks to contribute to future empirical research by presenting a theoretical framework for measuring the presence of charismatic authority in terrorist groups that is based on Max Weber's seminal work on legitimate domination (herrschaft) and on theoretical insights drawn from the study of charismatic authority in new religious movements. The framework is then applied to an illustrative case study of the relationship between charismatic authority and the radicalization process within the far-right terrorist group “the Covenant, the Sword, and the Arm of the Lord.” The article concludes with a discussion of findings and suggestions for future research.
Journal: Studies in Conflict & Terrorism
Pages: 710-733
Issue: 9
Volume: 38
Year: 2015
Month: 9
X-DOI: 10.1080/1057610X.2015.1048100
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1048100
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:9:p:710-733



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1038106_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Suttmoeller
Author-X-Name-First: Michael
Author-X-Name-Last: Suttmoeller
Author-Name: Steven Chermak
Author-X-Name-First: Steven
Author-X-Name-Last: Chermak
Author-Name: Joshua D. Freilich
Author-X-Name-First: Joshua D.
Author-X-Name-Last: Freilich
Title: The Influence of External and Internal Correlates on the Organizational Death of Domestic Far-Right Extremist Groups
Abstract: 
 The domestic far-right movement has existed in the United States for many years. During that time, groups have appeared, disappeared, and reappeared. Unfortunately, very little is known about what causes these groups to disband. An interdisciplinary approach identified external and internal correlates of organizational death to empirically test which of these correlates influences whether a group dies. Results from this study provided empirical support for some previously only anecdotal explanations for organizational death, while also undermining other claims.
Journal: Studies in Conflict & Terrorism
Pages: 734-758
Issue: 9
Volume: 38
Year: 2015
Month: 9
X-DOI: 10.1080/1057610X.2015.1038106
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1038106
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:9:p:734-758



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1038107_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jacqueline S. Bruscella
Author-X-Name-First: Jacqueline S.
Author-X-Name-Last: Bruscella
Title: “It's More Than Just a Name”: A Theoretical Approach to Eradicating Terrorism Through Propositions of Organizational Naming
Abstract: 
 The following article is divided into two parts, each offering a series of propositions highlighting the effects and implications of organizational naming and labeling practices and their subsequent effects on the framing of terrorist organizations and activity. In the first half, the author will highlight the importance of organizational naming and labeling in terms of how it shapes terrorism discourse. Then, the author will discuss the importance of recognizing the implications of how the events of 11 September 2001 were framed by then president George W. Bush. Important to both discussions is the relevance of organizational communication theory, particularly in terms of individual sensemaking and the communicative constitution of organizations.
Journal: Studies in Conflict & Terrorism
Pages: 759-775
Issue: 9
Volume: 38
Year: 2015
Month: 9
X-DOI: 10.1080/1057610X.2015.1038107
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1038107
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:9:p:759-775



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1039421_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ngonidzashe Marongwe
Author-X-Name-First: Ngonidzashe
Author-X-Name-Last: Marongwe
Title: International Terrorism Potential in Southern Africa
Abstract: 
 This article discusses the potential factors for the development of international terrorism in southern Africa. While the region has seemingly been spared the terror attacks that have ravaged most other parts of the continent, and the globe at large, it is not immune to these attacks. Using a survey of the Southern African Development Community (SADC) countries, particularly the Democratic Republic of the Congo, Mozambique, South Africa, Mauritius, Zimbabwe, and Tanzania, which illuminate some of the permissive factors, the article asks, largely, first, to what extent is southern Africa at risk of global terrorism? And, second, in what ways can southern African states reduce the risk of terrorism in the region? Broadly, the article contends that, like most developing countries, including those from other parts of Africa, there exist permissive, both root and trigger, factors including insecure borders, democratization challenges, poverty, urban centers and variegated forms of both sub-state and state terrorism, that could provide useful platforms for the growth of international terrorism.
Journal: Studies in Conflict & Terrorism
Pages: 776-793
Issue: 9
Volume: 38
Year: 2015
Month: 9
X-DOI: 10.1080/1057610X.2015.1039421
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1039421
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:38:y:2015:i:9:p:776-793

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1084802_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David Martin Jones
Author-X-Name-First: David Martin
Author-X-Name-Last: Jones
Author-Name: M.L.R. Smith
Author-X-Name-First: M.L.R.
Author-X-Name-Last: Smith
Title: The Rise of Dark Americana: Depicting the “War on Terror” On-Screen
Abstract: 
 In the wake of the 9/11 attacks the American film industry took a while to react to the Islamist threat at home and abroad. From 2005, however, Hollywood responded to the threat to the homeland and the War on Terror “over there” in Iraq and Afghanistan in a variety of ways. This article examines the nature of that response and whether it evinces, as critics allege, that the American film industry reflects and shapes a capitalist and imperialist agenda. More particularly, by evaluating the cinematic treatment of both the Iraq war and the problem of surveillance, rendition, and homeland security, the analysis explores what this distinctive on-screen genre tells about how the U.S. cultural mainstream has dealt with the challenge global jihadism poses to American values. The analysis suggests that post-9/11 movie making, while sometimes bleak and often clichéd, is cognizant of the gray area morality inherent in fighting the “War on Terror,” and is still thus able to offer some possibilities for sophisticated reflection.
Journal: Studies in Conflict & Terrorism
Pages: 1-21
Issue: 1
Volume: 39
Year: 2016
Month: 1
X-DOI: 10.1080/1057610X.2015.1084802
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1084802
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:1:p:1-21



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1084162_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dan Miodownik
Author-X-Name-First: Dan
Author-X-Name-Last: Miodownik
Author-Name: Lilach Nir
Author-X-Name-First: Lilach
Author-X-Name-Last: Nir
Title: Receptivity to Violence in Ethnically Divided Societies: A Micro-Level Mechanism of Perceived Horizontal Inequalities
Abstract: 
 Although past scholarship shows that group inequalities in economic and political power (“Horizontal Inequalities”) correlate with dissent, violence, and civil wars, there is no direct empirical test of the perceptual explanation for this relationship at the individual level. Such explanation is vital to understanding how integration, inclusion in power-sharing agreements, and exclusion from political power filter down to mass publics. Moreover, subjective perceptions of group conditions do not always correspond to objective group realities. We hypothesize subjective perceptions attenuate the effect of objective exclusion on support for violence in ethnically divided societies. Cross-national comparative multilevel analyses of the 2005/6 Afrobarometer dataset (N = 19,278) confirm that subjective perceptions both amplify the effect of exclusion on acceptance of violence and alter the readiness of included groups to dissent. These findings carry implications for research, state-building, and conflict management.
Journal: Studies in Conflict & Terrorism
Pages: 22-45
Issue: 1
Volume: 39
Year: 2016
Month: 1
X-DOI: 10.1080/1057610X.2015.1084162
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1084162
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:1:p:22-45



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1084161_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Zekulin
Author-X-Name-First: Michael
Author-X-Name-Last: Zekulin
Title: Endgames: Improving Our Understanding of Homegrown Terrorism
Abstract: 
 This article examines how the phenomenon of homegrown terrorism has evolved over the past decade. It argues that there have been significant developments that impact how we conceptualize and study it and offers two suggestions moving forward. It argues that re-branding it Islamist-inspired homegrown terrorism (IIHGT) better captures the nuances of this phenomenon and that sub-dividing it by “endgame,” the action the radicalized individual pursues creates the opportunity for a more robust analysis and provides a better way to compare incidents and identify traits that our current efforts overlook. Focusing on the action component may also provide a new way to investigate radicalization as the different endgames represent an escalation in violence, suggesting different degrees of radicalization might also be present.
Journal: Studies in Conflict & Terrorism
Pages: 46-66
Issue: 1
Volume: 39
Year: 2016
Month: 1
X-DOI: 10.1080/1057610X.2015.1084161
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1084161
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:1:p:46-66



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1099995_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jytte Klausen
Author-X-Name-First: Jytte
Author-X-Name-Last: Klausen
Author-Name: Selene Campion
Author-X-Name-First: Selene
Author-X-Name-Last: Campion
Author-Name: Nathan Needle
Author-X-Name-First: Nathan
Author-X-Name-Last: Needle
Author-Name: Giang Nguyen
Author-X-Name-First: Giang
Author-X-Name-Last: Nguyen
Author-Name: Rosanne Libretti
Author-X-Name-First: Rosanne
Author-X-Name-Last: Libretti
Title: Toward a Behavioral Model of “Homegrown” Radicalization Trajectories
Abstract: 
 This research note presents a dynamic risk assessment model of homegrown terrorists. The model was tested in a study of convicted “homegrown” American terrorism offenders inspired by Al Qaeda's ideology. The New York Police Department model developed by Silber and Bhatt was chosen as the basis for creating a typology of overt and detectable indicators of individual behaviors widely thought to be associated with extremism. Twenty-four specific cues associated with each stage of radicalization were used to code and estimate the sequencing of behaviors and the duration of the average radicalization trajectory. Sixty-eight cases have been analyzed thus far. A decision was made to publish the initial results when it became apparent that the model was an effective tool for the evaluation of terrorist offenders.
Journal: Studies in Conflict & Terrorism
Pages: 67-83
Issue: 1
Volume: 39
Year: 2016
Month: 1
X-DOI: 10.1080/1057610X.2015.1099995
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1099995
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:1:p:67-83

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1139373_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ian R. Pelletier
Author-X-Name-First: Ian R.
Author-X-Name-Last: Pelletier
Author-Name: Leif Lundmark
Author-X-Name-First: Leif
Author-X-Name-Last: Lundmark
Author-Name: Rachel Gardner
Author-X-Name-First: Rachel
Author-X-Name-Last: Gardner
Author-Name: Gina Scott Ligon
Author-X-Name-First: Gina Scott
Author-X-Name-Last: Ligon
Author-Name: Ramazan Kilinc
Author-X-Name-First: Ramazan
Author-X-Name-Last: Kilinc
Title: Why ISIS's Message Resonates: Leveraging Islam, Sociopolitical Catalysts, and Adaptive Messaging
Abstract: 
 How does the Islamic State in Iraq and Syria (ISIS) leverage Islamic Law to support their strategic objectives? Islam, as most religions, is a defining catalyst of group identity. ISIS has capitalized on this, using it as a vehicle to legitimize its interpretation of Islamic Law. This study builds on Social Movement Theory to develop and test a conceptual framework of ISIS messaging strategies. This framework highlights the progression of the organization's message from mainstream Islamic Law to radical unified reinterpretation. ISIS leaders' speeches are used to test the model. Ultimately, study findings inform countermessaging strategies and identify mobilization mechanisms.
Journal: Studies in Conflict & Terrorism
Pages: 871-899
Issue: 10
Volume: 39
Year: 2016
Month: 10
X-DOI: 10.1080/1057610X.2016.1139373
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1139373
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:10:p:871-899



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1145957_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mounah Abdel-Samad
Author-X-Name-First: Mounah
Author-X-Name-Last: Abdel-Samad
Title: ISIS as an Existential Threat to the Druze: The Struggle for Survival
Abstract: 
 Faced with an existential threat by the Islamic State of Iraq and Syria on one hand, and the repressive regime of Bashar Al-Assad on the other, the Druze community in Syria is faced with a dilemma of what political and military position to take. This study examines a variety of internal and external factors that affect the Druze's political and military choices in Syria, and finds that their best choice is to remain neutral in the conflict. I argue that any political and military choice by the Druze in Syria besides neutrality risks endangering the survival of the entire community. This article examines how internal organizational factors and the international community's divided position play important roles in understanding the Druze's decision to maintain a position of neutrality.
Journal: Studies in Conflict & Terrorism
Pages: 900-911
Issue: 10
Volume: 39
Year: 2016
Month: 10
X-DOI: 10.1080/1057610X.2016.1145957
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1145957
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:10:p:900-911



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1148934_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Devorah Margolin
Author-X-Name-First: Devorah
Author-X-Name-Last: Margolin
Title: A Palestinian Woman's Place in Terrorism: Organized Perpetrators or Individual Actors?
Abstract: 
 This article analyzes a novel comprehensive database of attacks by Palestinian women between 1965 and 1995. During this period, women's participation in terrorism evolved and their participation can be divided into two distinct eras, before and after 1986. The article argues that the entrance of religious terrorist organizations into politics and the First Intifada changed Palestinian terrorism. While more attacks by women occurred after 1986, they were mostly low intensity attacks, aimed at military targets, with low success rates. Despite women's participation, the patriarchal structure of society is also reflected in Palestinian terrorist organizations. However, as women's roles in society expanded, so too did their roles within terrorist organizations.
Journal: Studies in Conflict & Terrorism
Pages: 912-934
Issue: 10
Volume: 39
Year: 2016
Month: 10
X-DOI: 10.1080/1057610X.2016.1148934
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1148934
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:10:p:912-934



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1144918_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bruno S. Sergi
Author-X-Name-First: Bruno S.
Author-X-Name-Last: Sergi
Author-Name: Giacomo Morabito
Author-X-Name-First: Giacomo
Author-X-Name-Last: Morabito
Title: The Pirates' Curse: Economic Impacts of the Maritime Piracy
Abstract: 
 During the last decades, the activities of pirates have increased exponentially in Eastern Africa, with their attacks becoming considerably more violent. In addition to the intrastate and interstate conflicts, the lack of state capacity and the presence of terrorist groups, maritime piracy represents a serious and sustained threat to economic security. Indeed, from an economic point of view, pirates affect international trade through an increasing insecurity related to the prompt delivery of the goods transported. The aim of this work is to explore the main works on maritime piracy analyzed in quantitative economics.
Journal: Studies in Conflict & Terrorism
Pages: 935-952
Issue: 10
Volume: 39
Year: 2016
Month: 10
X-DOI: 10.1080/1057610X.2016.1144918
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1144918
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:10:p:935-952

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1151679_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Celine Marie I. Novenario
Author-X-Name-First: Celine Marie I.
Author-X-Name-Last: Novenario
Title: Differentiating Al Qaeda and the Islamic State Through Strategies Publicized in Jihadist Magazines
Abstract: 
 As Al Qaeda and the Islamic State vie for ascendancy in the jihad movement, policymakers grapple with distinguishing the threat posed by these groups. Proceeding from the terrorists’ view of media as a critical arena of jihad, this study applies content analysis to Al Qaeda- and Islamic State-produced magazines in order to empirically differentiate the two groups through the strategies publicized therein. Findings reveal that Al Qaeda consistently employs attrition to compel changes in the West's policy and behavior, while the Islamic State has shifted from intimidating populations to outbidding competing groups to solidify its claim to the Caliphate.
Journal: Studies in Conflict & Terrorism
Pages: 953-967
Issue: 11
Volume: 39
Year: 2016
Month: 11
X-DOI: 10.1080/1057610X.2016.1151679
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1151679
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:11:p:953-967



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1159430_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Manuel R. Torres-Soriano
Author-X-Name-First: Manuel R.
Author-X-Name-Last: Torres-Soriano
Title: The Caliphate Is Not a Tweet Away: The Social Media Experience of Al Qaeda in the Islamic Maghreb
Abstract: 
 This article offers a descriptive analysis of the propaganda activities of Al Qaeda in the Islamic Maghreb on Internet social media. It examines the group's propaganda actions from its creation in 1998 until the end of 2015 and argues that the use of social media, Twitter in particular, has failed to offer any real remedy to its mediocre propaganda actions. During the period in which its Twitter profiles were active, the organization continued to manifest the same problems, including a shortage of qualified human resources and poor internal coordination, which had prevented it from engaging in efficient propaganda activity previously. The study of the social media experience of the group offers further evidence of the vulnerabilities of this Maghrebi jihadist organization.
Journal: Studies in Conflict & Terrorism
Pages: 968-981
Issue: 11
Volume: 39
Year: 2016
Month: 11
X-DOI: 10.1080/1057610X.2016.1159430
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1159430
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:11:p:968-981



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1154365_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Rogelio Alonso
Author-X-Name-First: Rogelio
Author-X-Name-Last: Alonso
Author-Name: Javier Díaz Bada
Author-X-Name-First: Javier Díaz
Author-X-Name-Last: Bada
Title: What Role Have Former ETA Terrorists Played in Counterterrorism and Counterradicalization Initiatives in Spain?
Abstract: 
 This article responds to the following research question: what role have former Euskadi Ta Askatasuna (ETA) members played in counterterrorism and counterradicalization initiatives vis-à-vis the terror group in Spain? Our analysis of the role played by former ETA members so far demonstrates that only a minority of former ETA terrorists have disengaged from the terrorist organization and at the same time voiced some criticism of their past violent activities. Such a step, although a positive one, is part of a process that in most of the cases analyzed has to be deemed as incomplete due to deficits, some of them very significant, which considerably limit their effectiveness in countering terrorism and radicalization.
Journal: Studies in Conflict & Terrorism
Pages: 982-1006
Issue: 11
Volume: 39
Year: 2016
Month: 11
X-DOI: 10.1080/1057610X.2016.1154365
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1154365
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:11:p:982-1006



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1154750_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marco Nilsson
Author-X-Name-First: Marco
Author-X-Name-Last: Nilsson
Title: Mental Strategies for Fighting the IS: A Field Study of the Peshmerga Soldiers in Northern Iraq
Abstract: 
 This study analyzes the war against the Islamic State (IS), specifically on the front in northern Iraq, and the mental strategies that the Kurdish Peshmerga soldiers use to maintain their combat motivation. For this field study, dozens of soldiers of various ranks were interviewed and observed on three fronts outside of Mosul, Erbil, and Kirkuk in February 2014. While some mental strategies are nearly universal, others depend on the characteristics of the fighting force and the threat that they face. The article identifies five distinct mental strategies for dealing with the stress of fighting the IS: simultaneous dehumanization and humanization of the enemy, seeing a larger cause, use of humor, religious identity, and martyrdom. The findings suggest that factors beyond primary group cohesion, on which much previous research has focused, can play an important role in increasing soldiers’ fighting power.
Journal: Studies in Conflict & Terrorism
Pages: 1007-1018
Issue: 11
Volume: 39
Year: 2016
Month: 11
X-DOI: 10.1080/1057610X.2016.1154750
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1154750
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:11:p:1007-1018



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1154364_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Chris Quillen
Author-X-Name-First: Chris
Author-X-Name-Last: Quillen
Title: The Islamic State's Evolving Chemical Arsenal
Abstract: 
 This article examines the growing chemical weapon capabilities of the Islamic State from the crude poisons and toxins of its founding father Abu Mus'ab al-Zarqawi to the current battlefield use of indigenously produced mustard gas in Iraq and Syria. By examining this evolution as a phenomenon separate from Al Qaeda, a clearer picture emerges of a dedicated and increasingly successful chemical weapons program that threatens military forces and civilian populations around the world.
Journal: Studies in Conflict & Terrorism
Pages: 1019-1030
Issue: 11
Volume: 39
Year: 2016
Month: 11
X-DOI: 10.1080/1057610X.2016.1154364
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1154364
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:11:p:1019-1030

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1159070_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sofia Pinero Kluch
Author-X-Name-First: Sofia Pinero
Author-X-Name-Last: Kluch
Author-Name: Alan Vaux
Author-X-Name-First: Alan
Author-X-Name-Last: Vaux
Title: The Non-Random Nature of Terrorism: An Exploration of Where and How Global Trends of Terrorism Have Developed Over 40 Years
Abstract: 
 We examined the geographic concentration and persistence of terrorism using the Global Terrorism Database (GTD). The GTD logs all terrorist incidents worldwide using open-source media, and, for 1970–2013, includes over 125,000 incidents from over 200 countries and territories. We examined regional and country-level data; different terrorism forms, severity levels, and timeframes (entire period, five-year periods, and annual); and multiple definitions of “elevated” terrorism. The findings reveal that terrorism is concentrated geographically and temporally. Most countries experience peace or very low levels of terrorism; only a few experience substantial outbreaks; very few experience prolonged terrorism; and even fewer, prolonged severe terrorism.
Journal: Studies in Conflict & Terrorism
Pages: 1031-1049
Issue: 12
Volume: 39
Year: 2016
Month: 12
X-DOI: 10.1080/1057610X.2016.1159070
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1159070
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:12:p:1031-1049



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1159429_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Henrik Gråtrud
Author-X-Name-First: Henrik
Author-X-Name-Last: Gråtrud
Title: Islamic State Nasheeds As Messaging Tools
Abstract: 
 Although jihadi nasheeds play an important role in the Islamic State's propaganda, there is scant literature on the topic. This article is an exploratory study on seventeen Islamic State nasheeds released between December 2013 and March 2015. The main argument is that Islamic State nasheeds are effective messaging tools because they focus on a limited number of themes that have broad appeal among Muslims. The nasheeds differ from other Islamic State propaganda in their almost exclusive focus on war and fighting, rather than on the softer sides of life in the Islamic State.
Journal: Studies in Conflict & Terrorism
Pages: 1050-1070
Issue: 12
Volume: 39
Year: 2016
Month: 12
X-DOI: 10.1080/1057610X.2016.1159429
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1159429
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:12:p:1050-1070



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1184064_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Moran Yarchi
Author-X-Name-First: Moran
Author-X-Name-Last: Yarchi
Title: Terror Organizations' Uses of Public Diplomacy: Limited versus Total Conflicts
Abstract: 
 In the last few decades, terrorism has become a global threat and challenge, which many countries have had to face and fight. Conflicts involving terror organizations are, to a large extent, battles of ideas, and are not focused only on physical violence or military confrontation. This reality creates a need to better understand the tools through which terror organizations promote their messages, and to distinguish between different types of terror organizations. The current study examines different types of terror organizations' messages targeting foreign audiences. The analysis focuses on the organizations' usage of public diplomacy in promoting their messages and distinguishes between the different types of organizations (limited- versus total-conflict). Messages promoted by four terror organizations—Hamas and Hezbollah (limited-conflict organizations) and Al Qaeda and the Islamic State (total-conflict organizations)—are analyzed. The findings reveal that while limited-conflict organizations communicate with the international community, and use public diplomacy to try to change the international environment in which they operate, total-conflict organizations do not use public diplomacy; they talk about the international community rather than communicating with it.
Journal: Studies in Conflict & Terrorism
Pages: 1071-1083
Issue: 12
Volume: 39
Year: 2016
Month: 12
X-DOI: 10.1080/1057610X.2016.1184064
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1184064
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:12:p:1071-1083



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1159069_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Barbara Zanchetta
Author-X-Name-First: Barbara
Author-X-Name-Last: Zanchetta
Title: Between Cold War Imperatives and State-Sponsored Terrorism: The United States and “Operation Condor”
Abstract: 
 Operation Condor was a transnational network of organized state-sponsored terrorism that targeted Communist “subversion.” It was operational in the second half of the 1970s. The key member countries were Chile, Argentina, Uruguay, Bolivia, Paraguay, and Brazil (Peru and Equador joined the network later on, with a more marginal role). Based on declassified documents from the United Nations High Commissioner for Refugees in Geneva and on U.S. documents of various origin, this article will assess the development of the Condor network and the U.S. reaction to such manifest acts of state-sponsored terrorism.
Journal: Studies in Conflict & Terrorism
Pages: 1084-1102
Issue: 12
Volume: 39
Year: 2016
Month: 12
X-DOI: 10.1080/1057610X.2016.1159069
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1159069
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:12:p:1084-1102



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1216934_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: Editorial Board EOV
Journal: Studies in Conflict & Terrorism
Pages: ebi-ebi
Issue: 12
Volume: 39
Year: 2016
Month: 12
X-DOI: 10.1080/1057610X.2016.1216934
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1216934
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:12:p:ebi-ebi

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1100010_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marco Marsili
Author-X-Name-First: Marco
Author-X-Name-Last: Marsili
Title: The Islamic State: A Clash within the Muslim Civilization for the New Caliphate
Abstract: 
 This study analyzes the political reasons that allowed the Islamic State to expand successfully in Syria and Iraq, by enabling to “franchise” worldwide, and the role of the regional governments in this issue. The article provides a different explanation from the classic approach of the “clash of civilizations” theorized by Samuel P. Huntington, ascribing responsibility for the growth and expansion of the Islamic State to the complex framework of geopolitical alliances within the Muslim civilization and the Arab world. The article highlights the attempt by Turkey to establish itself as a regional power and guidance of the Islamic world, by resurrecting the Caliphate, and, based on this, explains the contrast with the Islamic State, whose goal is the foundation of a globalized Caliphate. The plans of the Turkish President Erdoğan for a Great Turkey, allied with Egypt, have foundered with the coup that ousted the Muslim Brotherhood from power. The study relates the connection of Ankara with the Kurds, regarding the management of the crisis in Syria and Iraq, and the Turkish liaison with regional powers (Iran, Egypt, Saudi Arabia, and Israel) and other powers (Russia, China, and the United States).
Journal: Studies in Conflict & Terrorism
Pages: 85-105
Issue: 2
Volume: 39
Year: 2016
Month: 2
X-DOI: 10.1080/1057610X.2015.1100010
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1100010
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:2:p:85-105



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1092842_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Brecht Volders
Author-X-Name-First: Brecht
Author-X-Name-Last: Volders
Title: Assessing the Terrorist Threat: Impact of the Group's Organizational Design?
Abstract: 
 Each terrorist organization faces a critical tradeoff between effectively managing the organization's violent behavior while remaining secure from counterterrorism efforts. Drawing on organization theory and terrorism literature, this article develops theoretical linkages between the organizational design of a terrorist group and this critical tradeoff. It considers the impact of four key design parameters: membership, operational space and time, formalization, and centralization. The first two structural parameters construct the physical anatomy of a terrorist organization. The latter two structuring parameters prescribe or restrict the behavior within this organizational context. Net advantages by means of rising structural design parameter values are increasingly offset by the organizational strength and security vulnerabilities that inherently follow from the rising structuring parameters.
Journal: Studies in Conflict & Terrorism
Pages: 106-127
Issue: 2
Volume: 39
Year: 2016
Month: 2
X-DOI: 10.1080/1057610X.2015.1092842
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1092842
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:2:p:106-127



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1093889_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mustafa Cosar Unal
Author-X-Name-First: Mustafa Cosar
Author-X-Name-Last: Unal
Title: Opening a Door for Return to Home: Impact and Effectiveness of Turkish Repentance Laws
Abstract: 
 This study analyzes the impact of the Turkish Repentance Laws in undermining the Kurdistan Workers Party (PKK). Did the repentance laws increase the PKK surrender, thereby decreasing the PKK violence? Vector Auto-Regression analysis indicates that enactment of repentance laws did not have any significant impact on PKK surrenders, failing to significantly decrease PKK violence. Yet it does not establish any meaningful relationship between the use of force and PKK surrenders. Descriptive analyses show the significant number of surrenders took place in 1993–94, 2001, and 2003, while the highest number of penitents submitted to the “Return to Home Law” in 2003. These values relate to a specific context. This study, however, asserts that surrendered and applicant PKK members were too few to influence the overall conflict, concluding that, in addition to what these laws mean to the penitents, the success/failure of repentance policies are related to the nature of Turkey's counterinsurgency and their respective context.
Journal: Studies in Conflict & Terrorism
Pages: 128-164
Issue: 2
Volume: 39
Year: 2016
Month: 2
X-DOI: 10.1080/1057610X.2015.1093889
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1093889
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:2:p:128-164



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1084165_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lance Y. Hunter
Author-X-Name-First: Lance Y.
Author-X-Name-Last: Hunter
Title: Terrorism, Civil Liberties, and Political Rights: A Cross-National Analysis
Abstract: 
 This article examines the effect terrorism has on civil liberties and political rights across a wide range of democracies and regions. This study includes an analysis of the influence domestic and international terrorist attacks have on civil liberties and political rights in 48 democratic states from 1971–2007. The results from a time series cross-national analysis reveal that terrorism weakens civil liberties and political rights. However, certain types of democracies are more affected by terrorism than others. These findings have important implications for democracy and counterterrorism strategies in democratic states.
Journal: Studies in Conflict & Terrorism
Pages: 165-193
Issue: 2
Volume: 39
Year: 2016
Month: 2
X-DOI: 10.1080/1057610X.2015.1084165
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1084165
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:2:p:165-193

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1119546_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gabriel Weimann
Author-X-Name-First: Gabriel
Author-X-Name-Last: Weimann
Title: Going Dark: Terrorism on the Dark Web
Abstract: 
 The terms Deep Web, Deep Net, Invisible Web, or Dark Web refer to the content on the World Wide Web that is not indexed by standard search engines. One can describe the Internet as composed of layers: the “upper” layer, or the Surface Web, can easily be accessed by regular searches. However, “deeper” layers, the content of the Deep Web, have not been indexed by traditional search engines such as Google. Michael K. Bergman who wrote the seminal paper on the Deep Web, compared searching the Internet to dragging a net across the surface of the ocean: a great deal may be caught in the net, but there is a wealth of information that is deeper and therefore missed. In fact, most of the Web's information is buried far down on sites, and standard search engines are unable to access it.
Journal: Studies in Conflict & Terrorism
Pages: 195-206
Issue: 3
Volume: 39
Year: 2016
Month: 3
X-DOI: 10.1080/1057610X.2015.1119546
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1119546
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:3:p:195-206



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1104025_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ariel I. Ahram
Author-X-Name-First: Ariel I.
Author-X-Name-Last: Ahram
Title: Pro-Government Militias and the Repertoires of Illicit State Violence
Abstract: 
 Most studies of pro-government militias (PGMs) take a narrowly functionalist approach. This article sees PGMs as the product of broader processes of state formation and regime dynamics that generate distinctive repertoires of violence. The article uses a cross-national dataset to shows that low state capacity is singularly correlated with the appearance and activity of all forms of PGMs. Once militias are active, they tend to endure even after initial conditions change, suggesting a strong measure of path dependence in how states PGMs evolve. Democracy curbs the activity of semi-official PGMs but not informal ones. Different authoritarian regime sub-types have varying propensities for militia activity. These findings have major implications for efforts to address state frailty.
Journal: Studies in Conflict & Terrorism
Pages: 207-226
Issue: 3
Volume: 39
Year: 2016
Month: 3
X-DOI: 10.1080/1057610X.2015.1104025
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1104025
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:3:p:207-226



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1099994_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel Detzi
Author-X-Name-First: Daniel
Author-X-Name-Last: Detzi
Author-Name: Steven Winkleman
Author-X-Name-First: Steven
Author-X-Name-Last: Winkleman
Title: Hitting Them Where it Hurts: A Joint Interagency Network to Disrupt Terrorist Financing in West Africa
Abstract: 
 Illicit trafficking networks in West Africa are a major funding source for violent extremist groups in the region. Although the United States has formed interagency constructs in the Caribbean and in Europe to counter illicit trafficking, there is a gap in West Africa. The corridor of smuggling routes from the shores of West Africa into North Africa provides extremist groups with the financing they need to continue their activities. By forming a third interagency organization in West Africa, the United States and its partners could strike a significant blow to violent extremist groups, which continue to threaten U.S. interests in the region.
Journal: Studies in Conflict & Terrorism
Pages: 227-239
Issue: 3
Volume: 39
Year: 2016
Month: 3
X-DOI: 10.1080/1057610X.2015.1099994
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1099994
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:3:p:227-239



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1093887_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Victor Asal
Author-X-Name-First: Victor
Author-X-Name-Last: Asal
Author-Name: Kathleen Deloughery
Author-X-Name-First: Kathleen
Author-X-Name-Last: Deloughery
Author-Name: Amanda Murdie
Author-X-Name-First: Amanda
Author-X-Name-Last: Murdie
Title: Responding to Terrorism? Human Rights Organization Shaming and Terrorist Attacks
Abstract: 
 Why do Human Rights Organizations (HROs) target or “shame” countries for human rights abuses? The literature using country-level factors to explain why one country is likely to be targeted over another is growing but many questions still remain. Terrorist activity in a country should have a positive effect on the amount of shaming directed at a country. HROs are in the publicity business and have organizational interests to shame states already receiving attention. Findings show that there is a connection between certain types of transnational terrorist incidents occur in a country and the amount of HRO shaming of governments, even after accounting for the human rights practices within the state. 
Journal: Studies in Conflict & Terrorism
Pages: 240-259
Issue: 3
Volume: 39
Year: 2016
Month: 3
X-DOI: 10.1080/1057610X.2015.1093887
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1093887
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:3:p:240-259



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1108086_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel Byman
Author-X-Name-First: Daniel
Author-X-Name-Last: Byman
Title: Intelligence and Its Critics
Journal: Studies in Conflict & Terrorism
Pages: 260-280
Issue: 3
Volume: 39
Year: 2016
Month: 3
X-DOI: 10.1080/1057610X.2015.1108086
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1108086
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:3:p:260-280

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1117325_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Leena Malkki
Author-X-Name-First: Leena
Author-X-Name-Last: Malkki
Author-Name: Teemu Sinkkonen
Author-X-Name-First: Teemu
Author-X-Name-Last: Sinkkonen
Title: Political Resilience to Terrorism in Europe: Introduction to the Special Issue
Journal: Studies in Conflict & Terrorism
Pages: 281-291
Issue: 4
Volume: 39
Year: 2016
Month: 4
X-DOI: 10.1080/1057610X.2016.1117325
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1117325
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:4:p:281-291



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1117326_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Phil Edwards
Author-X-Name-First: Phil
Author-X-Name-Last: Edwards
Title: Closure through Resilience: The Case of Prevent
Abstract: 
 This article argues that systemic resilience in the face of terrorism is best conceptualized as a response to disruption of the political sphere, brought about by the forceful incursion of a would-be political actor. The ideological negotiation required to deal with political disruption is related to the “cycle of contention” model: engagement may take inclusive or exclusive forms, with consequences for the openness and hence the future resilience of the system. When the arguments used to support the British government's “Prevent” counterradicalization initiative are analyzed in these terms, the engagement is shown to be emphatically exclusive.
Journal: Studies in Conflict & Terrorism
Pages: 292-307
Issue: 4
Volume: 39
Year: 2016
Month: 4
X-DOI: 10.1080/1057610X.2016.1117326
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1117326
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:4:p:292-307



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1117328_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Charlotte Heath-Kelly
Author-X-Name-First: Charlotte
Author-X-Name-Last: Heath-Kelly
Title: Building a New Utøya; Re-Placing the Oslo Bombsite—Counterfactual Resilience at Postterrorist Sites
Abstract: 
 Resilience strategies aim to build “resilience” before disasters strike; utilizing preemptive techniques to predict emergencies and prepare systems to manage their consequences. But what can we learn about resilience from responses to disasters that have already happened? This article draws on fieldwork at postterrorist sites in Norway: the Oslo Government Quarter and Utøya island. While resilience policy develops plans for infrastructural recovery after the next disaster, the curators of postterrorist sites rebuild and reclaim existing disaster space. They apply a retrospective framing of recovery. The article explores this work and questions its absence from policy understandings of resilience.
Journal: Studies in Conflict & Terrorism
Pages: 308-325
Issue: 4
Volume: 39
Year: 2016
Month: 4
X-DOI: 10.1080/1057610X.2016.1117328
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1117328
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:4:p:308-325



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1117330_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Teemu Sinkkonen
Author-X-Name-First: Teemu
Author-X-Name-Last: Sinkkonen
Title: Can Political Leaders Make a Difference? Norwegian versus Spanish Experiences in Responding to Terrorist Attacks
Abstract: 
 This article compares the public communication of Norwegian Prime Minister Stoltenberg after the attacks of 22 July 2011 and Spanish Prime Minister Aznar after the Madrid train bombing on 11 March 2004. These two political leaders opted for very different styles of crisis communication in the direct aftermath of the attacks. There is also a great difference in how the attacks influenced their political support. By focusing on these two cases, the article asks whether political leaders can make a difference when it comes to the public response to terrorist attacks.
Journal: Studies in Conflict & Terrorism
Pages: 326-341
Issue: 4
Volume: 39
Year: 2016
Month: 4
X-DOI: 10.1080/1057610X.2016.1117330
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1117330
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:4:p:326-341



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1117332_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Leena Malkki
Author-X-Name-First: Leena
Author-X-Name-Last: Malkki
Title: International Pressure to Perform: Counterterrorism Policy Development in Finland
Abstract: 
 The major terrorist attacks in Western countries during the last fifteen years have had consequences way beyond the countries in which they have happened. The article provides a primary source–based account of the development of counterterrorism policy in Finland, which is one of those countries with a low national threat level. The article demonstrates the significant role that international pressure, through obligations, recommendations, and social learning, plays in developing national counterterrorist policies. The article calls also into question whether the pressure to comply with international pressure always contributes toward sound national counterterrorism policies that foster political resilience to terrorism.
Journal: Studies in Conflict & Terrorism
Pages: 342-362
Issue: 4
Volume: 39
Year: 2016
Month: 4
X-DOI: 10.1080/1057610X.2016.1117332
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1117332
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:4:p:342-362



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1117334_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Javier Argomaniz
Author-X-Name-First: Javier
Author-X-Name-Last: Argomaniz
Author-Name: Peter Lehr
Author-X-Name-First: Peter
Author-X-Name-Last: Lehr
Title: Political Resilience and EU Responses to Aviation Terrorism
Abstract: 
 In this article, we examine how European authorities have responded to reported threats to aviation resulting from individual terrorist tactics. We do so by applying the notion of political resilience and drawing on Palonen's “policy, polity, politicking, and politicization” model as well as on Malcolm Anderson's concept of “politics of the latest outrage.” We argue that the European Union response to aviation terrorism has created polity transformation and generated a long list of new policies but has also in the process become politicized and subject of politicking, with some high-profile measures being criticized for having a deleterious impact on passengers' rights.
Journal: Studies in Conflict & Terrorism
Pages: 363-379
Issue: 4
Volume: 39
Year: 2016
Month: 4
X-DOI: 10.1080/1057610X.2016.1117334
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1117334
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:4:p:363-379

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1116277_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kurt Braddock
Author-X-Name-First: Kurt
Author-X-Name-Last: Braddock
Author-Name: John Horgan
Author-X-Name-First: John
Author-X-Name-Last: Horgan
Title: Towards a Guide for Constructing and Disseminating Counternarratives to Reduce Support for Terrorism
Abstract: 
 Despite widespread recognition that the use of counternarratives is an important strategic component of countering violent extremism, to date, there are no comprehensive guidelines on how to develop and distribute counternarratives to effectively reduce support for terrorism. To redress this, we offer communication and psychology theory-based procedures for (1) analyzing terrorist narratives, (2) constructing counternarratives that challenge terrorist narratives, and (3) disseminating the counternarratives to overcome barriers to persuasion. Analysts and practitioners can use such guidelines in developing counternarratives to reduce support for violent extremism.
Journal: Studies in Conflict & Terrorism
Pages: 381-404
Issue: 5
Volume: 39
Year: 2016
Month: 5
X-DOI: 10.1080/1057610X.2015.1116277
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1116277
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:5:p:381-404



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1106762_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marcus Schulzke
Author-X-Name-First: Marcus
Author-X-Name-Last: Schulzke
Title: The Antinomies of Population-Centric Warfare: Cultural Respect and the Treatment of Women and Children in U.S. Counterinsurgency Operations
Abstract: 
 There is tension between three of the U.S. counterinsurgency doctrine's central goals: the restoration of security, democratization, and cultural respect. These goals are particularly difficult to reconcile when it comes to the treatment of women and children in contested areas. Those groups have unique security concerns that are margin-alized in the U.S. military's conceptions of security and they may be victims of violence that is tacitly permitted by efforts to show cultural respect. After discussing these problems as they appear in U.S. counterinsurgency doctrine the author shows how they shape events in real operations with the help of interviews conducted with veterans of the wars in Afghanistan and Iraq.
Journal: Studies in Conflict & Terrorism
Pages: 405-422
Issue: 5
Volume: 39
Year: 2016
Month: 5
X-DOI: 10.1080/1057610X.2015.1106762
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1106762
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:5:p:405-422



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1099996_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Eran Zohar
Author-X-Name-First: Eran
Author-X-Name-Last: Zohar
Title: A New Typology of Contemporary Armed Non-State-Actors: Interpreting The Diversity
Abstract: 
 This study analyzes contemporary non-state-actors (NSAs) finding four major categories: secessionist organizations fighting for a federal regime or full independence. These have a homogenous character and are domestically oriented. Secessionist NSAs that enjoy strong sponsorship are running a state within a state, possessing regular forces. Second, radical left revolutionary NSAs are fighting to overthrow the existing social order and to relocate power within a country. Arming with limited weaponry that they steal and purchase, they wage guerrilla war from dense jungles and rough mountains. Sectarian-based revolutionary NSAs seek regime change to stop state marginalization. They could evolve into a regular force, armed with heavy weapons. The fourth category and the most powerful is the global revolutionary organizations. They are religious based, seeking to impose Islamic rule in their own countries or worldwide through jihad. They are transnational, specializing in suicide bombing and sophisticated martyrdom assaults.
Journal: Studies in Conflict & Terrorism
Pages: 423-450
Issue: 5
Volume: 39
Year: 2016
Month: 5
X-DOI: 10.1080/1057610X.2015.1099996
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1099996
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:5:p:423-450



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1108087_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dimitrios Anagnostakis
Author-X-Name-First: Dimitrios
Author-X-Name-Last: Anagnostakis
Title: Securing the Transatlantic Maritime Supply Chains from Counterterrorism: EU–U.S. Cooperation and the Emergence of a Transatlantic Customs Security Regime
Abstract: 
 This article offers an analysis of the cooperation between the European Union (EU) and the United States on customs security in the context of the two actors' fight against terrorism. While other aspects of EU–U.S. counterterrorism cooperation have received some scholarly attention, not so much research has focused on security cooperation in the EU–U.S. customs and supply chain. To investigate the emergence of transatlantic cooperation in this field this article employs regime theory in examining the 2004 EU–U.S. customs security agreement, the 2012 EU–U.S. mutual recognition decision, and the transatlantic disagreement on the U.S. 100 percent scanning rule.
Journal: Studies in Conflict & Terrorism
Pages: 451-471
Issue: 5
Volume: 39
Year: 2016
Month: 5
X-DOI: 10.1080/1057610X.2015.1108087
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1108087
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:5:p:451-471



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1144946_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Becker
Author-X-Name-First: Michael
Author-X-Name-Last: Becker
Title: A Response to “Key Issues and Research Agendas in Lone Wolf Terrorism”
Journal: Studies in Conflict & Terrorism
Pages: 472-476
Issue: 5
Volume: 39
Year: 2016
Month: 5
X-DOI: 10.1080/1057610X.2016.1144946
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1144946
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:5:p:472-476

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1116269_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael J. Suttmoeller
Author-X-Name-First: Michael J.
Author-X-Name-Last: Suttmoeller
Author-Name: Steven M. Chermak
Author-X-Name-First: Steven M.
Author-X-Name-Last: Chermak
Author-Name: Joshua D. Freilich
Author-X-Name-First: Joshua D.
Author-X-Name-Last: Freilich
Title: Only the Bad Die Young: The Correlates of Organizational Death for Far-Right Extremist Groups
Abstract: 
 The domestic far-right movement has existed in the United States for many years. During that time, groups have appeared, disappeared, and reappeared. Unfortunately, very little is known about what causes these groups to disband. Prior research has focused on long-lived groups, but the majority of extremist or terrorist groups fail to survive for an extended period of time. This study examined a variety of external and internal correlates of organizational death identified from both terrorism and organizational literature, to empirically test which correlates lead to a group dying young.
Journal: Studies in Conflict & Terrorism
Pages: 477-499
Issue: 6
Volume: 39
Year: 2016
Month: 6
X-DOI: 10.1080/1057610X.2015.1116269
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1116269
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:6:p:477-499



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1127111_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sivan Hirsch-Hoefler
Author-X-Name-First: Sivan
Author-X-Name-Last: Hirsch-Hoefler
Author-Name: Daphna Canetti
Author-X-Name-First: Daphna
Author-X-Name-Last: Canetti
Author-Name: Ehud Eiran
Author-X-Name-First: Ehud
Author-X-Name-Last: Eiran
Title: Radicalizing Religion? Religious Identity and Settlers' Behavior
Abstract: 
 Does religious identity prompt radical action? This article presents a model of individual-level radical action. Drawing mostly on collective action theory the article posits that organizational membership drives the effect of religious identity on individual-level radical action. Using survey data the article assesses the behavior of Jewish settlers in the West Bank in the face of the 2005 Gaza withdrawal. The article finds that contra the prevailing view, which holds that religious identity alone is sufficient to trigger violence, evidence suggests that organizational membership is a mechanism bridging religious identity and radical action. Longstanding arguments tying radical actions solely to religion may require substantial revision.
Journal: Studies in Conflict & Terrorism
Pages: 500-518
Issue: 6
Volume: 39
Year: 2016
Month: 6
X-DOI: 10.1080/1057610X.2015.1127111
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1127111
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:6:p:500-518



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1116274_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Annette Ranko
Author-X-Name-First: Annette
Author-X-Name-Last: Ranko
Author-Name: Justyna Nedza
Author-X-Name-First: Justyna
Author-X-Name-Last: Nedza
Title: Crossing the Ideological Divide? Egypt's Salafists and the Muslim Brotherhood after the Arab Spring
Abstract: 
 An important strand in the literature has stressed the analytical distinction between the Muslim Brotherhood's brand of Islamism and the Salafist movement. This article examines the shifts that have occurred within these two movements in Egypt since the Arab Spring. It specifically asks whether approximations between them in terms of strategies of actions have been paralleled by ideological approximations. The article argues that both movements have seen increased diversification which has—especially at the fringes—involved a reshaping of identities and ideological approximations that may facilitate cooperation between segments of these movements in the future.
Journal: Studies in Conflict & Terrorism
Pages: 519-541
Issue: 6
Volume: 39
Year: 2016
Month: 6
X-DOI: 10.1080/1057610X.2015.1116274
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1116274
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:6:p:519-541



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1124628_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Jonsson
Author-X-Name-First: Michael
Author-X-Name-Last: Jonsson
Author-Name: Elliot Brennan
Author-X-Name-First: Elliot
Author-X-Name-Last: Brennan
Author-Name: Christopher O'Hara
Author-X-Name-First: Christopher
Author-X-Name-Last: O'Hara
Title: Financing War or Facilitating Peace? The Impact of Rebel Drug Trafficking on Peace Negotiations in Colombia and Myanmar
Abstract: 
 Rebel involvement in drug trafficking is broadly found to prolong and intensify civil wars. Being an illicit good with strong demand, high profit margins, limited barriers to entry, and few interdiction opportunities, narcotic drugs disproportionately benefit rebel groups as a source of funding in civil wars. Furthermore, drug trafficking is believed to prolong civil wars by creating war economies that benefit rebel groups, making them reluctant to engage in peace negotiations. However, recent peace agreements suggest that drug trafficking can in some cases be used to “buy off” rebel leaders, whereas other insurgents willingly relinquish this source of funding. This article compares attempts at conflict resolution in Colombia and Myanmar, focusing on the impact drug trafficking by Fuerzas Armadas Revolucionarias de Colombia (Revolutionary Armed Forces of Colombia) and United Wa State Army has on contemporary peace negotiations.
Journal: Studies in Conflict & Terrorism
Pages: 542-559
Issue: 6
Volume: 39
Year: 2016
Month: 6
X-DOI: 10.1080/1057610X.2015.1124628
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1124628
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:6:p:542-559



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1120099_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Emily Corner
Author-X-Name-First: Emily
Author-X-Name-Last: Corner
Author-Name: Paul Gill
Author-X-Name-First: Paul
Author-X-Name-Last: Gill
Author-Name: Oliver Mason
Author-X-Name-First: Oliver
Author-X-Name-Last: Mason
Title: Mental Health Disorders and the Terrorist: A Research Note Probing Selection Effects and Disorder Prevalence
Abstract: 
 Recent research on lone-actor terrorism has found a high prevalence of mental health disorders among these offenders. This research note addresses two shortcomings in these existing studies. First, it investigates whether selection effects are present in the selection process of terrorist recruits. Second, it builds on the argument that mental health problems and terrorist behavior should not be treated as a yes/no dichotomy. Descriptive results of mental health disorders are outlined utilizing a number of unique datasets.
Journal: Studies in Conflict & Terrorism
Pages: 560-568
Issue: 6
Volume: 39
Year: 2016
Month: 6
X-DOI: 10.1080/1057610X.2015.1120099
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1120099
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:6:p:560-568

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1140998_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joshua D. Freilich
Author-X-Name-First: Joshua D.
Author-X-Name-Last: Freilich
Author-Name: Gary LaFree
Author-X-Name-First: Gary
Author-X-Name-Last: LaFree
Title: Measurement Issues in the Study of Terrorism: Introducing the Special Issue
Abstract: 
 In this article, we introduce readers to a special issue of Studies in Conflict & Terrorism on measurement issues in the study of terrorism. In recent years scholarly interest in terrorism has increased and systematic methods are now more commonly used. Terrorism works that analyze data highlight substantive findings as opposed to measurement issues. A study's substantive findings are only meaningful though if it correctly addresses the measurement issues that invariably arise during the research process. In addition to summarizing the eight articles in this special issue, we outline the strengths and weaknesses of various measurement strategies and assess their contributions to our understanding of terrorism. The major goal is to place the special issue's contributions in context and highlight under-explored issues that future research could address.
Journal: Studies in Conflict & Terrorism
Pages: 569-579
Issue: 7-8
Volume: 39
Year: 2016
Month: 7
X-DOI: 10.1080/1057610X.2016.1140998
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1140998
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:7-8:p:569-579



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1142241_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jasper L. De Bie
Author-X-Name-First: Jasper L.
Author-X-Name-Last: De Bie
Author-Name: Christianne J. De Poot
Author-X-Name-First: Christianne J.
Author-X-Name-Last: De Poot
Title: Studying Police Files with Grounded Theory Methods to Understand Jihadist Networks
Abstract: 
 This article focuses on a challenge in the current terrorism literature, namely the methodological justification concerning the collection and analysis of empirical data. Lack of detailed methodological accounts of the collection and analysis of the data makes it difficult to evaluate presented findings, especially if these data are confidential or focused on specific aspects of the phenomenon. This article offers an extensive overview of the methodological procedures conducted in a large empirical research project on jihadist networks based on confidential police files (2000–2013), interviews, and trial observations. The article illustrates how grounded theory–based methods can be used to collect and analyze such data and to develop and test new theories in this research field.
Journal: Studies in Conflict & Terrorism
Pages: 580-601
Issue: 7-8
Volume: 39
Year: 2016
Month: 7
X-DOI: 10.1080/1057610X.2016.1142241
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1142241
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:7-8:p:580-601



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1141009_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel J. Harris
Author-X-Name-First: Daniel J.
Author-X-Name-Last: Harris
Author-Name: Pete Simi
Author-X-Name-First: Pete
Author-X-Name-Last: Simi
Author-Name: Gina Ligon
Author-X-Name-First: Gina
Author-X-Name-Last: Ligon
Title: Reporting Practices of Journal Articles that Include Interviews with Extremists
Abstract: 
 The number of journal articles that rely on data derived from interviews with extremists has increased substantially over the past decade. This burgeoning invites the possibility that standardized reporting practices have not been explicitly clarified. To date, there has not been an adequate review of the methodological transparency of journal articles that include interviews with extremists. After content analyzing 48 articles involving such interviews, we found that field-wide methodological transparency is lacking. Recommendations are made with regard to enhancing methodological transparency, with the implication that consensus on optimal reporting practices within the extremism literature should be reached soon.
Journal: Studies in Conflict & Terrorism
Pages: 602-616
Issue: 7-8
Volume: 39
Year: 2016
Month: 7
X-DOI: 10.1080/1057610X.2016.1141009
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1141009
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:7-8:p:602-616



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1141000_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gary A. Ackerman
Author-X-Name-First: Gary A.
Author-X-Name-Last: Ackerman
Author-Name: Lauren E. Pinson
Author-X-Name-First: Lauren E.
Author-X-Name-Last: Pinson
Title: Speaking Truth to Sources: Introducing a Method for the Quantitative Evaluation of Open Sources in Event Data
Abstract: 
 Open-source event data sets frequently used for social science analysis rarely provide any transparent explanation of the credibility of sources or the validity of data thereby obtained. We develop a sample Source Evaluation Schema for the purpose of operationalizing measures of open-source event validity at the case, source, and variable levels. Based on our findings, we argue that explicitly incorporating and disclosing credibility and validity levels allows for greater flexibility in tailoring the inclusion of cases for researchers' specific analytical requirements. By facilitating more transparent analyses, the inclusion of such measures in similar datasets can result in more defensible conclusions, especially in highly charged political and security contexts such as those surrounding terrorism.
Journal: Studies in Conflict & Terrorism
Pages: 617-640
Issue: 7-8
Volume: 39
Year: 2016
Month: 7
X-DOI: 10.1080/1057610X.2016.1141000
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1141000
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:7-8:p:617-640



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1141004_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Brandon Behlendorf
Author-X-Name-First: Brandon
Author-X-Name-Last: Behlendorf
Author-Name: Jyoti Belur
Author-X-Name-First: Jyoti
Author-X-Name-Last: Belur
Author-Name: Sumit Kumar
Author-X-Name-First: Sumit
Author-X-Name-Last: Kumar
Title: Peering through the Kaleidoscope: Variation and Validity in Data Collection on Terrorist Attacks
Abstract: 
 The nature of underreporting terrorism in developing countries is often acknowledged but poorly understood. Focusing on India, we triangulate terrorist attacks captured across three media-based datasets (Global Terrorism Database, South Asia Terrorism Portal, Worldwide Incident Terrorism System) against official police records from Andhra Pradesh. Results suggest that media-based datasets capture the geographic prevalence of terrorism yet severely underestimate the frequency of violence, biasing toward lethal bombings. Considerable variation is present for attacks targeting specific classes or types of actors. Similar to other crimes, the results suggest that existing terrorism databases represent a select version of violence in these countries, discounting the prevalence and regularity of non-lethal violent activity.
Journal: Studies in Conflict & Terrorism
Pages: 641-667
Issue: 7-8
Volume: 39
Year: 2016
Month: 7
X-DOI: 10.1080/1057610X.2016.1141004
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1141004
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:7-8:p:641-667



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1141019_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: William S. Parkin
Author-X-Name-First: William S.
Author-X-Name-Last: Parkin
Author-Name: David A. Green
Author-X-Name-First: David A.
Author-X-Name-Last: Green
Title: Terrorism in the News: The Efficiency and Impact of Sampling Methods on Data Collection and Content Analysis
Abstract: 
 This study identifies the most efficient methodology for sampling from a population of New York Times articles related to terrorism, which were generated through keyword searching. Efficiency was based on which sample statistic was closest to the population parameters of interest. The smallest sample size, where 68 percent of the sample statistics were within one standard deviation of the population mean and 95 percent of the sample statistics were within two standard deviations of the population mean, were identified as the most efficient. In addition, we determine whether the frequency of news articles is correlated to the temporal distribution of terrorist incidents found in the Global Terrorism Database, which could possibly be utilized to more efficiently sample from the population. Our findings confirm prior research that shows that sampling efficiency is related to the weekly news cycle and, contrary to prior research, the sample must include between 20 to 29 constructed weeks to achieve representativeness of an entire year of coverage for a population generated through keyword searches. In addition, the study also found that there was a limited relationship between the frequency of terrorist incidents and the amount of terrorism coverage in the news.
Journal: Studies in Conflict & Terrorism
Pages: 668-686
Issue: 7-8
Volume: 39
Year: 2016
Month: 7
X-DOI: 10.1080/1057610X.2016.1141019
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1141019
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:7-8:p:668-686



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1141012_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ashmini G. Kerodal
Author-X-Name-First: Ashmini G.
Author-X-Name-Last: Kerodal
Author-Name: Joshua D. Freilich
Author-X-Name-First: Joshua D.
Author-X-Name-Last: Freilich
Author-Name: Steven M. Chermak
Author-X-Name-First: Steven M.
Author-X-Name-Last: Chermak
Title: Commitment to Extremist Ideology: Using Factor Analysis to Move beyond Binary Measures of Extremism
Abstract: 
 This study article focuses on American far-right (FR) extremists who committed ideologically motivated violent or financial crimes in the United States. We examine three research questions. First, are certain types of FR ideological beliefs associated with different types of criminal behavior? Second, can the various indicators of FR ideology be used to create a scalar measure of commitment to FR ideology? Third, which typology of the FR movement provides the most reliable measure of FR extremism? We use data from the United States Extremist Crime Database to measure indicators of FR ideology in a sample of 305 FRs who committed a financial crime or homicide between 2006 and 2010 in the United States. Conspiratorial, antigovernment, and antitax beliefs were positively associated with risk of financial crimes, while xenophobic, survivalist, and anti–gun control beliefs were positively associated with risk of violent crimes. A factor analysis created a commitment to FR ideology scale and identified four sub-types of FRs: Conspiracy Theorist, Survivalist, Movement Participant, and Proud far-rightist. The factor analysis did not support the prevailing typologies. Importantly though, these typologies were useful in predicting criminal behavior patterns of far rightists. We outline a number of other measurement issues for future research to address.
Journal: Studies in Conflict & Terrorism
Pages: 687-711
Issue: 7-8
Volume: 39
Year: 2016
Month: 7
X-DOI: 10.1080/1057610X.2016.1141012
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1141012
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:7-8:p:687-711



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1141003_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Katharine A. Boyd
Author-X-Name-First: Katharine A.
Author-X-Name-Last: Boyd
Title: Modeling Terrorist Attacks: Assessing Statistical Models to Evaluate Domestic and Ideologically International Attacks
Abstract: 
 Many prior studies have analyzed how country characteristics affect the rate of terrorist violence and there is a growing literature on how group traits influence terrorist violence. The current study expands on this literature by using multilevel modeling to assess both these units of analysis on the rate of domestic attacks and the rate of attacks against foreign targets. Using data from the Big Allied and Dangerous and the Global Terrorism Database, a cross-national sample of 224 terrorist groups are modeled in relation to their countries of origin to assess rates of domestic attacks. In this cross-sectional study many of these terrorist groups target multiple foreign countries. Multiple membership random effects modeling (MMREM) is used to assess the impact of multiple countries targeted by a group. The results of the study indicate that multilevel modeling provides an improved statistical fit and the MMREM model provides an improved measurement for analyzing attacks targeting foreign countries.
Journal: Studies in Conflict & Terrorism
Pages: 712-748
Issue: 7-8
Volume: 39
Year: 2016
Month: 7
X-DOI: 10.1080/1057610X.2016.1141003
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1141003
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:7-8:p:712-748



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1141005_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Shuki J. Cohen
Author-X-Name-First: Shuki J.
Author-X-Name-Last: Cohen
Title: Mapping the Minds of Suicide Bombers using Linguistic Methods: The Corpus of Palestinian Suicide Bombers' Farewell Letters (CoPSBFL)
Abstract: 
 This study proposes a novel methodology for the study of the mindset, motives, and cognitive style of individual suicide bombers in Israel/Palestine, based on a comprehensive corpus of personal farewell letters (which also serve as last wills) that were written by suicide bombers to their family during the Second Intifada (2000–2006). To avoid privileging certain a priori sentiments, motivations, or concepts over others, I used a programmatic “bottom-up” sequence of quantitative psycholinguistic procedures, in which prominent themes or concepts from one level of analysis are further qualified and contextualized in the next. This afforded a minimally biased view of the cognitive content of Palestinian suicide bombers, including the sentiments, motivations, and concepts that they were more preoccupied with, and the context in which these ideas were expressed. The results are largely consistent with theories of political violence that place pro-social sentiments at the forefront of the motivations for suicide terrorism, and paramount to antisocial sentiments such as hatred and revenge. Since the linguistic patterns that were uncovered in this analysis cannot be controlled consciously, and the farewell letters of suicide bombers have rarely been rigorously analyzed linguistically, this study may provide an unprecedented glimpse into the cognitive style and content of individual suicide bombers—a glimpse that is minimally biased by political, partisan, or sectarian preconceptions.
Journal: Studies in Conflict & Terrorism
Pages: 749-780
Issue: 7-8
Volume: 39
Year: 2016
Month: 7
X-DOI: 10.1080/1057610X.2016.1141005
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1141005
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:7-8:p:749-780

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1119544_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Emrullah Uslu
Author-X-Name-First: Emrullah
Author-X-Name-Last: Uslu
Title: Jihadist Highway to Jihadist Haven: Turkey's Jihadi Policies and Western Security
Abstract: 
 Turkish support to jihadists is not merely a tactic aimed at removing Assad from power. It stems from a strategic decision on the part of Turkish authorities to influence Middle East affairs through non-state actors, much as Iran has been doing for some time. Turkey's support of jihadists transiting into Syria and its establishment of close ties with Hamas and the Muslim Brotherhood are joint aspects of this strategy. Turkish authorities have permitted Al Qaeda sympathizers to use pro-government media to promote their beliefs. The authorities have adopted a new political language that fuels anti-American and anti-Western sentiments. Prosecutors who have attempted to prevent shipments of weapons to Al Qaeda–affiliated groups in Syria have been fired and in some cases incarcerated. Indeed, by now Turkish prosecutors and the Turkish National Police are thoroughly intimidated. Not a single counterterror operation has been launched to disrupt Islamic State of Iraq and Syria (ISIS)’s networks or recruitment activities. The Turkish National Intelligence Organization has been given full responsibility to deal with jihadist activities, without any active oversight, and the police are loath to venture into their territory. As a member of the North Atlantic Treaty Organization, Turkey's jihadi policies have direct and indirect impact on Western security. This article examines Turkey's jihadi policies by examining official statements, media reports, interviews, and fieldwork.
Journal: Studies in Conflict & Terrorism
Pages: 781-802
Issue: 9
Volume: 39
Year: 2016
Month: 9
X-DOI: 10.1080/1057610X.2015.1119544
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1119544
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:9:p:781-802



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1131030_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kyle T. Kattelman
Author-X-Name-First: Kyle T.
Author-X-Name-Last: Kattelman
Title: Party Structure, Information, and Coalition Durability: The Relevance of NATO in the Global War on Terror
Abstract: 
 Using the test cases of Afghanistan and Iraq, this study illustrates how alliances work to mitigate the conflicting frames that party structure and media access provide in the Global War on Terror, which leads to more cohesiveness in the North Atlantic Treaty Organization (NATO)–led coalition in Afghanistan as opposed to the U.S.-led coalition in Iraq. The approach utilized here extends the theory on alliance capability and uncertainty by arguing that alliances reduce uncertainty among member states on a strategic objective. This is particularly relevant when examining asymmetric, limited conflicts, where party structures and media access can work to disseminate conflicting frames to a domestic populace, who then can pressure their leader to withdraw from a coalition. The implications of these findings lend support to the continued relevance of NATO in the twenty-first-century security arena.
Journal: Studies in Conflict & Terrorism
Pages: 803-818
Issue: 9
Volume: 39
Year: 2016
Month: 9
X-DOI: 10.1080/1057610X.2015.1131030
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1131030
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:9:p:803-818



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1139375_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Barbara Perry
Author-X-Name-First: Barbara
Author-X-Name-Last: Perry
Author-Name: Ryan Scrivens
Author-X-Name-First: Ryan
Author-X-Name-Last: Scrivens
Title: Uneasy Alliances: A Look at the Right-Wing Extremist Movement in Canada
Abstract: 
 Despite the Canadian Security Intelligence Service's recent concern with the growing threat from right-wing extremists nationwide, we have little contemporary scholarship on the far right movement in Canada and fewer attempts to systematically analyze their ideologies and activities. Drawing on a three-year study involving interviews with Canadian law enforcement officials, community organizations, and right-wing activists, as well as analyses of open source intelligence, this article examines the endogenous factors that facilitate and inhibit the right-wing extremist movement in Canada. Findings suggest that strengths and weaknesses of the groups themselves can be exploited as a means of debilitating them.
Journal: Studies in Conflict & Terrorism
Pages: 819-841
Issue: 9
Volume: 39
Year: 2016
Month: 9
X-DOI: 10.1080/1057610X.2016.1139375
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1139375
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:9:p:819-841



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1144917_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gordon Clubb
Author-X-Name-First: Gordon
Author-X-Name-Last: Clubb
Title: The Role of Former Combatants in Preventing Youth Involvement in Terrorism in Northern Ireland: A Framework for Assessing Former Islamic State Combatants
Abstract: 
 The article engages with emerging debates on the potential role returning Islamic State fighters may have in preventing violence and whether nonviolent radical ideology acts as a conveyor-belt or firewall to violence. Rather than focusing on former combatant ideologies, it demonstrates how framing processes—not ideology per se—are more salient indicators of whether former combatants will act as conveyor-belts or firewalls to violence. The analytical framework developed for analyzing framing processes is then applied to the case of Northern Ireland. It argues that ideology shapes and constrains the type of antiviolence framing that may emerge, which provides a middle ground between the two perspectives in the literature. Furthermore, the article highlights the importance of network structures, incentives, and opportunities insofar as these can shape antiviolence framing and improve resonance among audiences. While recognizing the differences between cases, the framework is then used to argue that former Islamic State combatants can play a preventative role depending on whether their antiviolence framing is based on durable structural conditions, de-glamorizes violence, and is supported by networks that incentivize its diffusion—not on whether they have denounced their ideology.
Journal: Studies in Conflict & Terrorism
Pages: 842-861
Issue: 9
Volume: 39
Year: 2016
Month: 9
X-DOI: 10.1080/1057610X.2016.1144917
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1144917
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:9:p:842-861



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1129820_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: George Kassimeris
Author-X-Name-First: George
Author-X-Name-Last: Kassimeris
Title: Greece's Terrorism Problem: A Reassessment
Abstract: 
 The collapse of Greece's premier terrorist organization, the 17 November (17N) group, back in the summer of 2002 was a truly dramatic event, considering 17N's 27-year career, but it was not such a watershed event in the country's history as it was presented at the time by the mainstream political and media establishments. 17N's dismantling and imprisonment, far from demoralizing and emasculating the armed struggle movement, led to the emergence of new urban guerrilla groups and the increase and intensification of revolutionary violence. This article reassesses Greece's persistent terrorism problem by focusing on the nature, threat, and operational evolution of a new generation of political militancy.
Journal: Studies in Conflict & Terrorism
Pages: 862-870
Issue: 9
Volume: 39
Year: 2016
Month: 9
X-DOI: 10.1080/1057610X.2015.1129820
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1129820
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:39:y:2016:i:9:p:862-870

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1157402_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anne Aly
Author-X-Name-First: Anne
Author-X-Name-Last: Aly
Author-Name: Stuart Macdonald
Author-X-Name-First: Stuart
Author-X-Name-Last: Macdonald
Author-Name: Lee Jarvis
Author-X-Name-First: Lee
Author-X-Name-Last: Jarvis
Author-Name: Thomas M. Chen
Author-X-Name-First: Thomas M.
Author-X-Name-Last: Chen
Title: Introduction to the Special Issue: Terrorist Online Propaganda and Radicalization
Abstract: 
 The Internet is a transformative technology that terrorists are exploiting for the spread of propaganda and radicalizing new recruits. While Al Qaeda has a longer history, Islamic State is conducting a modern and sophisticated media campaign centered around online social networking. This article introduces and contextualizes the contributions to this Special Issue by examining some of the ways in which terrorists make use of the Internet as part of their broader media strategies.
Journal: Studies in Conflict & Terrorism
Pages: 1-9
Issue: 1
Volume: 40
Year: 2017
Month: 1
X-DOI: 10.1080/1057610X.2016.1157402
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1157402
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:1:p:1-9



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1157403_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Martin Rudner
Author-X-Name-First: Martin
Author-X-Name-Last: Rudner
Title: “Electronic Jihad”: The Internet as Al Qaeda's Catalyst for Global Terror
Abstract: 
 The Internet has emerged as a key technology for Al Qaeda and other jihadist movements waging their so-called electronic jihad across the Middle East and globally, with digital multiplier effects. This study will examine the evolving doctrine of “electronic jihad” and its impact on the radicalization of Muslims in Western diaspora communities The study describes Internet-based websites that served as online libraries and repositories for jihadist literature, as platforms for extremist preachers and as forums for radical discourse. Furthermore, the study will then detail how Internet connectivity has come to play a more direct operational role for jihadi terrorist-related purposes, most notably for inciting prospective cadres to action; for recruiting jihadist operatives and fighters; for providing virtual training in tactical methods and manufacture of explosives; for terrorism financing; and for actual planning and preparations for specific terror attacks. Whereas contemporary jihadist militants may be shifting from the World Wide Web to social media, such as Facebook, YouTube, and Twitter for messaging and communications, nevertheless the Internet-based electronic jihad remains a significant catalyst for promoting jihadist activism and for facilitating terrorist operations.
Journal: Studies in Conflict & Terrorism
Pages: 10-23
Issue: 1
Volume: 40
Year: 2017
Month: 1
X-DOI: 10.1080/1057610X.2016.1157403
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1157403
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:1:p:10-23



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1157404_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David Mair
Author-X-Name-First: David
Author-X-Name-Last: Mair
Title: #Westgate: A Case Study: How al-Shabaab used Twitter during an Ongoing Attack
Abstract: 
 During the Westgate terrorist attack of 2013, al-Shabaab used Twitter to claim responsibility for and live tweet throughout the attack. This article analyzes 556 of these tweets to understand the motivations for using Twitter during ongoing terrorist operations and builds up a picture of how al-Shabaab interacted with Twitter throughout the Westgate attack. Conclusions arising from the analysis include that al-Shabaab were primarily concerned with controlling the narrative of the attack and retaining an audience. In addition, the tweets were aimed at a specific geographical audience, indicating that the Westgate attack was primarily motivated by territorial concerns.
Journal: Studies in Conflict & Terrorism
Pages: 24-43
Issue: 1
Volume: 40
Year: 2017
Month: 1
X-DOI: 10.1080/1057610X.2016.1157404
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1157404
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:1:p:24-43



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1157406_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Angela Gendron
Author-X-Name-First: Angela
Author-X-Name-Last: Gendron
Title: The Call to Jihad: Charismatic Preachers and the Internet
Abstract: 
 A range of psychological, social, and environmental factors render some individuals more susceptible to militant Islam than others. Research also suggests that there are certain “triggers,” which help to explain why it is that only some individuals exposed to the same societal structural influences turn to violence. This article seeks to contribute to future empirical research in this area by studying the significance of certain “charismatic” preachers in this process and examining the role the Internet plays in strengthening the charismatic bond. Difficulties in defining and measuring “charisma” may help in part to explain the paucity of research on this aspect of radicalization but since charismatic authority derives from the bond between preacher and follower, an examination of the activities, strategies, and techniques used to build relationships and win adherents to Salafi-jihadism may provide valuable insights for countering radicalization.
Journal: Studies in Conflict & Terrorism
Pages: 44-61
Issue: 1
Volume: 40
Year: 2017
Month: 1
X-DOI: 10.1080/1057610X.2016.1157406
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1157406
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:1:p:44-61



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1157407_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anne Aly
Author-X-Name-First: Anne
Author-X-Name-Last: Aly
Title: Brothers, Believers, Brave Mujahideen: Focusing Attention on the Audience of Violent Jihadist Preachers
Abstract: 
 The exponential growth in the use of the Internet and social media by terrorist actors and violent extremists has generated research interest into terrorism and the Internet. Much of this research is focused on the kinds of messages being spread via the various media platforms that host violent extremist content. This research has yielded significant insights into how organizations such as Al Qaeda and Islamic State craft their messages, the mediums they use to disseminate their messages, and the ways in which they reach their audiences. Yet we are still no closer to understanding why certain messaging appeals to certain people in certain ways and not to others. Within the literature on terrorism and the Internet, the audience—those individuals who receive messages, make meaning from them and then decide whether to act on them—is conspicuously missing. As a result, research into terrorism and the Internet can only hypothesize about the nature and extent of influence that terrorist messages wield. It is often based on an assumption that the violent extremist narrative works like a magic bullet to radicalize audiences already vulnerable and predisposed to becoming violent. Utilizing media theory approaches to studying the audience as an active agent in meaning-making, this article proposes a research framework for developing the current focus on terrorism and the Internet.
Journal: Studies in Conflict & Terrorism
Pages: 62-76
Issue: 1
Volume: 40
Year: 2017
Month: 1
X-DOI: 10.1080/1057610X.2016.1157407
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1157407
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:1:p:62-76



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1157408_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Maura Conway
Author-X-Name-First: Maura
Author-X-Name-Last: Conway
Title: Determining the Role of the Internet in Violent Extremism and Terrorism: Six Suggestions for Progressing Research
Abstract: 
 Some scholars and others are skeptical of a significant role for the Internet in processes of violent radicalization. There is increasing concern on the part of other scholars, and increasingly also policymakers and publics, that easy availability of violent extremist content online may have violent radicalizing effects. This article identifies a number of core questions regarding the interaction of violent extremism and terrorism and the Internet, particularly social media, that have yet to be adequately addressed and supplies a series of six follow-up suggestions, flowing from these questions, for progressing research in this area. These suggestions relate to (1) widening the range of types of violent online extremism being studied beyond violent jihadis; (2) engaging in more comparative research, not just across ideologies, but also groups, countries, languages, and social media platforms; (3) deepening our analyses to include interviewing and virtual ethnographic approaches; (4) up-scaling or improving our capacity to undertake “big data” collection and analysis; (5) outreaching beyond terrorism studies to become acquainted with, for example, the Internet Studies literature and engaging in interdisciplinary research with, for example, computer scientists; and (6) paying more attention to gender as a factor in violent online extremism.
Journal: Studies in Conflict & Terrorism
Pages: 77-98
Issue: 1
Volume: 40
Year: 2017
Month: 1
X-DOI: 10.1080/1057610X.2016.1157408
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1157408
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:1:p:77-98

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1239990_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Richard H. Shultz
Author-X-Name-First: Richard H.
Author-X-Name-Last: Shultz
Title: U.S. Counterterrorism Operations during the Iraq War: A Case Study of Task Force 714
Abstract: 
 U.S. counterterrorism (CT) forces that deployed to Iraq in 2003 as Task Force 714 (TF 714) faced an ugly surprise. Tasked to dismantle the al-Qaeda in Iraq (AQI) dominated insurgency, the organization could not achieve that mission. General Stanley McChrystal, who commanded TF 714 concluded, “we were losing to an enemy … we should have dominated.” But TF 714 transformed in the midst of war and during 2006-2009 was able to largely dismantle AQI's clandestine networks to a degree that they could no longer function in a cohesive manner. By developing the capacity to operate inside those networks, TF 714 was able, in the words of General McChrystal, to “claw the guts out of AQI.” This transformation runs counter to what organizational experts identify as barriers inhibiting militaries from learning, innovating, and changing, especially in wartime. To decipher the puzzle of how TF 714 overcame these barriers, two questions are addressed in this study: 1) How did TF 714 transform from a specialized and compartmented unit customized for executing infrequent CT missions in peacetime to a wartime industrial-strength CT machine that by 2009 dismantled AQI's networks that operated across Iraq; and 2) Why was TF 714 able to achieve this remarkable transformation? 
Journal: Studies in Conflict & Terrorism
Pages: 809-837
Issue: 10
Volume: 40
Year: 2017
Month: 10
X-DOI: 10.1080/1057610X.2016.1239990
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1239990
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:10:p:809-837



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1248665_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jan Angstrom
Author-X-Name-First: Jan
Author-X-Name-Last: Angstrom
Title: Escalation, Emulation, and the Failure of Hybrid Warfare in Afghanistan
Abstract: 
 In this article, I argue that hybridization is a contingent result of the dynamics of some conflicts but not others. In particular, faced with opponents with great power, weaker powers seek a situation of asymmetry to gain victory. Drawing on within-case analysis of the conduct of war during the past thirty years in Afghanistan, I demonstrate that what we now consider to be “hybrid” represents an important continuity and strategic option in Afghan warfare. Still, the analysis also demonstrates that choosing “hybrid” has not been a strategy that has worked. Hezb-i-Islami's rather limited attempt for conventionalization of the war against the forces of Dostum and Massoud in 1992 failed and the Taliban's more far-reaching attempt for conventionalization has so far also failed to reap strategic success. This suggests that the threat of hybrid war is inflated.
Journal: Studies in Conflict & Terrorism
Pages: 838-856
Issue: 10
Volume: 40
Year: 2017
Month: 10
X-DOI: 10.1080/1057610X.2016.1248665
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1248665
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:10:p:838-856



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1239991_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Merouan Mekouar
Author-X-Name-First: Merouan
Author-X-Name-Last: Mekouar
Title: Police Collapse in Authoritarian Regimes: Lessons from Tunisia
Abstract: 
 The quick unraveling of authoritarian systems specifically designed to bear social pressure during revolutions is puzzling. Building on the 2011 Tunisian revolution, this article analyzes the collapse of the police apparatus during the 2011 revolution. In line with Way and Levitsky's study of authoritarian collapse, this article shows that the low cohesion and low scope of the security forces is one of the main factors explaining the rapid collapse of one of the Arab world's seemingly most solid repressive systems. At the theoretical level, this article will demonstrate that preference falsification is a double-edged sword. On the one hand, it can nourish authoritarian resilience. On the other, it can also weaken repressive regimes by making core members of the regime overestimate the loyalty of the low-ranking members of the security apparatus.
Journal: Studies in Conflict & Terrorism
Pages: 857-869
Issue: 10
Volume: 40
Year: 2017
Month: 10
X-DOI: 10.1080/1057610X.2016.1239991
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1239991
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:10:p:857-869



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1239992_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Radha Sarkar
Author-X-Name-First: Radha
Author-X-Name-Last: Sarkar
Author-Name: Amar Sarkar
Author-X-Name-First: Amar
Author-X-Name-Last: Sarkar
Title: The Rebels' Resource Curse: A Theory of Insurgent–Civilian Dynamics
Abstract: 
 The relationship between armed rebels and local civilians is among the least understood aspects of insurgency. This article posits a novel theory, the rebels' resource curse, to argue that the interaction between rebel groups and local communities can be traced to the availability of revenue-generating resources. The theory is developed using a case study comparison approach to critically analyze how access to revenue-generating resources among the Naxalites in India and the Fuerzas Armadas Revolucionarias de Colombia (Revolutionary Armed Forces of Colombia) in Colombia affect these insurgent-civilian interactions. The theory proposes that insurgents face a resource curse similar to that faced by states. Rather than resource wealth contributing to greater social engagement and fruitful insurgent–civilian interactions, it appears to precipitate isolationist, and even exploitative and violent relations between insurgents and local civilian populations. Conversely, resource scarcity predicts a greater degree of social integration and cohesion between civilians and insurgents. The framework of the rebels' resource curse can also be applied productively to other insurgent groups, enhancing our understanding of the social realities of insurgency.
Journal: Studies in Conflict & Terrorism
Pages: 870-898
Issue: 10
Volume: 40
Year: 2017
Month: 10
X-DOI: 10.1080/1057610X.2016.1239992
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1239992
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:10:p:870-898

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1248666_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Max Abrahms
Author-X-Name-First: Max
Author-X-Name-Last: Abrahms
Author-Name: Nicholas Beauchamp
Author-X-Name-First: Nicholas
Author-X-Name-Last: Beauchamp
Author-Name: Joseph Mroszczyk
Author-X-Name-First: Joseph
Author-X-Name-Last: Mroszczyk
Title: What Terrorist Leaders Want: A Content Analysis of Terrorist Propaganda Videos
Abstract: 
 In recent years, a growing body of empirical research suggests that indiscriminate violence against civilian targets tends to carry substantial political risks compared to more selective violence against military targets. To better understand why terrorist groups sometimes attack politically suboptimal targets, scholars are increasingly adopting a principal-agent framework where the leaders of terrorist groups are understood as principals and lower level members as agents. According to this framework, terrorist leaders are thought to behave as essentially rational political actors, whereas lower level members are believed to harbor stronger non-political incentives for harming civilians, often in defiance of leadership preferences. We test this proposition with an original content analysis of terrorist propaganda videos. Consistent with the principal–agent framework, our analysis demonstrates statistically that terrorist leaders tend to favor significantly less indiscriminate violence than their operatives actually commit, providing unprecedented insight into the incentive structure of terrorist leaders relative to the rank-and-file.
Journal: Studies in Conflict & Terrorism
Pages: 899-916
Issue: 11
Volume: 40
Year: 2017
Month: 11
X-DOI: 10.1080/1057610X.2016.1248666
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1248666
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:11:p:899-916



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1253941_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David Lowe
Author-X-Name-First: David
Author-X-Name-Last: Lowe
Title: Prevent Strategies: The Problems Associated in Defining Extremism: The Case of the United Kingdom
Abstract: 
 As the United Kingdom has placed some of its Prevent strategy on a statutory footing and is proposing to introduce a Counter-Extremism Bill, this article argues that a legal definition of extremism must be carefully drafted to provide legal certainty. The main recommendation is that all forms of violent and nonviolent extremism comes under the definition, ensuring it is differentiated from activism. Activism may hold radical views counter to the mainstream opinion, but it is required in liberal democracies as it encourages healthy debate and can prevent the policing of thought in any government strategy or legislation.
Journal: Studies in Conflict & Terrorism
Pages: 917-933
Issue: 11
Volume: 40
Year: 2017
Month: 11
X-DOI: 10.1080/1057610X.2016.1253941
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1253941
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:11:p:917-933



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1250553_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nazli Avdan
Author-X-Name-First: Nazli
Author-X-Name-Last: Avdan
Author-Name: Gary Uzonyi
Author-X-Name-First: Gary
Author-X-Name-Last: Uzonyi
Title: V for Vendetta: Government Mass Killing and Domestic Terrorism
Abstract: 
 Scholarship explores the impact of human rights abuse and state repression on terrorism. Heretofore, scholarship has ignored the impact of government-sponsored killings on domestic terrorism. This article proposes that mass killings create a focal point for terrorist mobilization. The vendetta agenda fuels violence by animating retributory violence. Additionally, mass atrocities create a permissive environment for violent nonstate activity. A spiral of violence ensues whereby groups resort to terrorism. Utilizing data from the Global Terrorism Database, 1971–2011, the study shows that mass killings significantly increase domestic terrorism. It contributes to emerging scholarship examining how state policies influence terrorist activity.
Journal: Studies in Conflict & Terrorism
Pages: 934-965
Issue: 11
Volume: 40
Year: 2017
Month: 11
X-DOI: 10.1080/1057610X.2016.1250553
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1250553
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:11:p:934-965



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1258863_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Simon Mabon
Author-X-Name-First: Simon
Author-X-Name-Last: Mabon
Title: Nationalist Jāhiliyyah and the Flag of the Two Crusaders, or: ISIS, Sovereignty, and the “Owl of Minerva”
Abstract: 
 This article argues that by understanding Islamic State of Iraq and Syria (ISIS) state-building processes we are able to understand how ISIS has developed while also developing a united citizenship body built from people in Iraq and Syria and those making hijra. The fragmentation of Iraq and Syria resulted in conditions that would prove conducive to the group's expansion and identifying these conditions is imperative to understanding Sunni extremism in the Middle East. The article argues that ISIS builds citizenship in two ways: first, by developing asabiyya—group feeling—among Sunni and second, by securitizing the Shi'a threat. Identifying and engaging with the concepts of sovereignty and citizenship helps to develop much stronger policy responses.
Journal: Studies in Conflict & Terrorism
Pages: 966-985
Issue: 11
Volume: 40
Year: 2017
Month: 11
X-DOI: 10.1080/1057610X.2016.1258863
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1258863
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:11:p:966-985

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1253984_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Basia Spalek
Author-X-Name-First: Basia
Author-X-Name-Last: Spalek
Author-Name: Douglas Weeks
Author-X-Name-First: Douglas
Author-X-Name-Last: Weeks
Title: Community-Based Counterterrorism
Journal: Studies in Conflict & Terrorism
Pages: 987-990
Issue: 12
Volume: 40
Year: 2017
Month: 12
X-DOI: 10.1080/1057610X.2016.1253984
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1253984
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:12:p:987-990



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1253985_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Basia Spalek
Author-X-Name-First: Basia
Author-X-Name-Last: Spalek
Author-Name: Douglas Weeks
Author-X-Name-First: Douglas
Author-X-Name-Last: Weeks
Title: The Role of Communities in Counterterrorism: Analyzing Policy and Exploring Psychotherapeutic Approaches within Community Settings
Abstract: 
 The role of communities in preventing or responding to terrorism and political violence is increasingly finding prominence within government strategies, nationally and internationally. At the same time, implementation of effective community-based partnerships has been nominal. Adding additional complexity to this problem are policies such as Prevent in Britain, which was arguably developed with good intentions but has received significant and sustained criticism by the very communities it sought to engage with. The result has been ongoing discussions within community practice and research arenas associated with radicalization, extremism, and terrorism, as to the role, if any, that communities might play in the counterterrorism environment. This article explores that environment and highlights some of the community-based perceptions and initiatives that prevail in the United Kingdom. In particular, innovations around the development of psychotherapeutic frameworks of understanding in relation to counterterrorism are discussed, alongside the role of connectors.
Journal: Studies in Conflict & Terrorism
Pages: 991-1003
Issue: 12
Volume: 40
Year: 2017
Month: 12
X-DOI: 10.1080/1057610X.2016.1253985
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1253985
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:12:p:991-1003



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1253986_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tufyal Choudhury
Author-X-Name-First: Tufyal
Author-X-Name-Last: Choudhury
Title: Campaigning on Campus: Student Islamic Societies and Counterterrorism
Abstract: 
 Cooperation in counterterrorism policing increases when communities can be confident that legislation and policy is not implemented in an arbitrary or discriminatory fashion: the ability to challenge executive overstretch, abuse, or misapplication of powers is vital for maintaining procedural justice. Through examining the experiences of the Federation of Student Islamic Societies, one of the oldest British Muslim civil society organizations, we see how key structural features of the counterterrorism legal and policy framework—the wide definition of terrorism, the broad discretion in the use of stop and search powers at ports, and the expansion of Prevent into the opaque terrain of nonviolent extremism—undermine cooperation.
Journal: Studies in Conflict & Terrorism
Pages: 1004-1022
Issue: 12
Volume: 40
Year: 2017
Month: 12
X-DOI: 10.1080/1057610X.2016.1253986
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1253986
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:12:p:1004-1022



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1253987_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Adrian Cherney
Author-X-Name-First: Adrian
Author-X-Name-Last: Cherney
Author-Name: Kristina Murphy
Author-X-Name-First: Kristina
Author-X-Name-Last: Murphy
Title: Police and Community Cooperation in Counterterrorism: Evidence and Insights from Australia
Abstract: 
 Effectively engaging the Muslim community is a challenge for police given many Muslims feel unfairly targeted by counterterrorism policies and laws because of their faith. This article explores how such perceptions influence the willingness of Muslims to voluntarily cooperate in counterterrorism efforts, drawing on data collected from Muslims living in Australia. We test whether procedural justice policing can help buffer this perception of being targeted as a security threat and whether it can enhance Muslims' willingness to cooperate with police. Efforts by the Australian Federal Police to engage Muslim communities in Australia are also examined. The implications of the results for community-based approaches to counterterrorism are discussed.
Journal: Studies in Conflict & Terrorism
Pages: 1023-1037
Issue: 12
Volume: 40
Year: 2017
Month: 12
X-DOI: 10.1080/1057610X.2016.1253987
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1253987
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:12:p:1023-1037



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1253988_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Aziz Z. Huq
Author-X-Name-First: Aziz Z.
Author-X-Name-Last: Huq
Title: Community-Led Counterterrorism
Abstract: 
 This article explores the idea that nonstate actors embedded in geographically and religiously defined communities have a distinctive role to play in responding to growing terrorist recruitment efforts in Europe and North America. The resulting “community-led counterterrorism” works through at least two causal channels, which I label “ideological competition” and “ethical anchoring.” Existing counterterrorism policing strategies do not harness these mechanisms and may well undermine them. Community-led counterterrorism thus presents an untapped opportunity, even as it raises new and difficult ethical questions for both Muslim minority communities in the West, as well as liberal democracies.
Journal: Studies in Conflict & Terrorism
Pages: 1038-1053
Issue: 12
Volume: 40
Year: 2017
Month: 12
X-DOI: 10.1080/1057610X.2016.1253988
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1253988
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:12:p:1038-1053



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1253989_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Robert Lambert
Author-X-Name-First: Robert
Author-X-Name-Last: Lambert
Author-Name: Tim Parsons
Author-X-Name-First: Tim
Author-X-Name-Last: Parsons
Title: Community-Based Counterterrorism Policing: Recommendations for Practitioners
Abstract: 
 This article presents recommendations for practitioners of community-based counterterrorism policing. The recommendations are located and explained within two broad propositions: recognize the implications and limitations of policing by consent, and respect the legitimate religious beliefs of all communities. Highlighting tensions between high and low policing and between policing and government imperatives, the article helps illustrate how different aspects of counterterrorism policy and practice may sometimes be at odds with one another. The recommendations are aimed at recognizing and, where practicable, reconciling such tensions. They arise from the authors' engagement with the issues in London and are understood to have application in other towns and cities in the United Kingdom and the West, particularly in communities and neighborhoods where Muslim citizens are the principal recipients of this form of policing.
Journal: Studies in Conflict & Terrorism
Pages: 1054-1071
Issue: 12
Volume: 40
Year: 2017
Month: 12
X-DOI: 10.1080/1057610X.2016.1253989
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1253989
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:12:p:1054-1071



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1253990_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Carmel Joyce
Author-X-Name-First: Carmel
Author-X-Name-Last: Joyce
Author-Name: Orla Lynch
Author-X-Name-First: Orla
Author-X-Name-Last: Lynch
Title: “Doing Peace”: The Role of Ex-Political Prisoners in Violence Prevention Initiatives in Northern Ireland
Abstract: 
 While a considerable amount of research has been conducted on community-based initiatives aimed at preventing violence, including the role of the ex-political prisoner community in preventative and counterterrorism work, little is known about how the ex-prisoners themselves manage their identity transition between the role they occupied during the conflict and their current role in violence prevention. We argue that it is important to consider the perspective of ex-prisoners who are both architects of their own process of desistance from political violence, as well active leaders of bespoke desistance programs. While many researchers have recognized the utility of the role of ex-prisoners in violence prevention work, theoretically, the way in which ex-prisoners do violence prevention through their use of language and intergroup contact and other resources, is poorly understood. Ultimately, the aim of the article is twofold: to understand the resources (discursive or otherwise) that the community of ex-political prisoners use in their preventative work and (2) to understand how this community understand their role in desistance programs in the context of their personal involvement in violent conflict, including the ways in which participants manage their identity transition.
Journal: Studies in Conflict & Terrorism
Pages: 1072-1090
Issue: 12
Volume: 40
Year: 2017
Month: 12
X-DOI: 10.1080/1057610X.2016.1253990
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1253990
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:12:p:1072-1090



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1253991_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tanya Silverman
Author-X-Name-First: Tanya
Author-X-Name-Last: Silverman
Title: U.K. Foreign Fighters to Syria and Iraq: The Need for a Real Community Engagment Approach
Abstract: 
 A growing number of British youth are traveling to join the Islamic State of Iraq and Syria and participate in the conflict. In this modern iteration of “foreign fighters” community driven countering violent extremism (CVE) efforts remain necessary as the age of travelers to the conflict zone from geographical hotspots in the United Kingdom decreases, and numbers of those going increases. It is their immediate environments—their communities—which can help to prevent violent radicalization and subsequent travel to conflict. Weaknesses in the government's approaches to community engagement can lessen the efficacy of community CVE capacity. This article aims to highlight some of these weaker U.K. government approaches while suggesting ways to improve community engagement that can strengthen CVE efforts.
Journal: Studies in Conflict & Terrorism
Pages: 1091-1107
Issue: 12
Volume: 40
Year: 2017
Month: 12
X-DOI: 10.1080/1057610X.2016.1253991
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1253991
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:12:p:1091-1107



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1383716_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: Editorial Board EOV
Journal: Studies in Conflict & Terrorism
Pages: (1108)-(1108)
Issue: 12
Volume: 40
Year: 2017
Month: 12
X-DOI: 10.1080/1057610X.2017.1383716
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1383716
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:12:p:(1108)-(1108)

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1177998_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Temitope B. Oriola
Author-X-Name-First: Temitope B.
Author-X-Name-Last: Oriola
Title: “Unwilling Cocoons”: Boko Haram's War Against Women
Abstract: 
 The kidnapping of 276 girls at Government Secondary School Chibok, Borno State, Nigeria, on 14 April 2014 has brought into international prominence the organization Jama'atu Ahlis Suna Lidda'awati Wal Jihad or Boko Haram. This incident heralded a new trajectory in Boko Haram's tactics and strategies. This article focuses on Boko Haram's strategic deployment of sexual and gender-based violence (SGBV) against women. The gendered performativity of Boko Haram, its methodology for sourcing for women and young girls, and its concomitant utilitarian/instrumental approach vis-à-vis SGBV against women are analyzed against the backdrop of the political economy and patriarchal ideational infrastructure of the Nigerian society. The article argues that Boko Haram's deployment of SGBV against women is an extension of the “repertoire of violence” ingrained in the sociopolitical and cultural milieu of Boko Haram's primary area of operation. Boko Haram's instrumental approach to SGBV is fourfold and hinges on the sociobiological utility of women. Boko Haram construes women as the bearers of its future despite its brutality toward them. The consequence is a strategic plan for procreation of a new generation of children raised through the cyclical constellation of mass rape of women, consequent impregnation and kidnapping the offspring of such rapes. Overall, this article contributes to the burgeoning scholarly literature on Boko Haram's terrorist activities.
Journal: Studies in Conflict & Terrorism
Pages: 99-121
Issue: 2
Volume: 40
Year: 2017
Month: 2
X-DOI: 10.1080/1057610X.2016.1177998
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1177998
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:2:p:99-121



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1174501_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marco Pinfari
Author-X-Name-First: Marco
Author-X-Name-Last: Pinfari
Title: Framing through Paradox: Egypt and the “Obama Supports Terrorism” Campaign
Abstract: 
 This article presents and analyzes the “Obama supports terrorism” campaign, which was launched in Egypt in late June 2013 and was instrumental to the framing of some Islamist groups as terrorist both before and after the 3 July 2013 coup. The analysis of the visual material of the campaign highlights its reliance on various Western discourses from the War on Terror, including some whose religious and racial content is an odd fit for a non-Western, Muslim country like Egypt. Yet, despite the lack of a clear and unified causal narrative to justify such framing, the success of the campaign was crucially aided by the symbolic and rhetorical power its slogan, which provided a credible “schema of interpretation” for its supporters.
Journal: Studies in Conflict & Terrorism
Pages: 122-138
Issue: 2
Volume: 40
Year: 2017
Month: 2
X-DOI: 10.1080/1057610X.2016.1174501
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1174501
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:2:p:122-138



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1168656_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Stephen F. Pires
Author-X-Name-First: Stephen F.
Author-X-Name-Last: Pires
Author-Name: Rob T. Guerette
Author-X-Name-First: Rob T.
Author-X-Name-Last: Guerette
Author-Name: Auzeen Shariati
Author-X-Name-First: Auzeen
Author-X-Name-Last: Shariati
Title: Specifying Kidnapping for Ransom Epidemics at the Global Level: A Matched-Case Control Design
Abstract: 
 Criminal groups around the world frequently rely on kidnapping for ransom (K&R) to fund and further their cause. Some case studies suggest war torn, fragile, and corrupt countries experience K&R epidemics more often. While such factors may be present in some countries experiencing K&R epidemics, it remains to be seen if these failed state factors are generalizable to all nations. To date, no research has systematically examined the conditions that might facilitate K&R epidemics. This study used a case-control design comparing countries with high rates of K&R (experimental) to countries without a K&R problem (control). Findings suggest that problem K&R countries were less secure, less peaceful, and unevenly developed in relation to social and economic indicators. Better understanding of the conditions involving K&R problems offers to improve foresight and the development of effective policy responses.
Journal: Studies in Conflict & Terrorism
Pages: 139-156
Issue: 2
Volume: 40
Year: 2017
Month: 2
X-DOI: 10.1080/1057610X.2016.1168656
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1168656
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:2:p:139-156



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1184060_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Laura N. Bell
Author-X-Name-First: Laura N.
Author-X-Name-Last: Bell
Title: Terrorist Assassinations and Target Selection
Abstract: 
 This research note examines political institutional changes in the aftermath of terrorist assassinations. Contemporary assassinations are more often a component of wider campaigns of political violence rather than a singular attack on a head of state. The Global Terrorism Database counts 16,831 terrorist assassinations from 1970–2014, indicating significant frequency of these events and includes a wide range of targets from law enforcement officials to foreign diplomats. Utilizing survival analysis, the span of time from a terrorist assassination event to a change in political institutions within states is measured between target types. Outcome differences between target types are identified.
Journal: Studies in Conflict & Terrorism
Pages: 157-171
Issue: 2
Volume: 40
Year: 2017
Month: 2
X-DOI: 10.1080/1057610X.2016.1184060
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1184060
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:2:p:157-171

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1184062_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Brandon Colas
Author-X-Name-First: Brandon
Author-X-Name-Last: Colas
Title: What Does Dabiq Do? ISIS Hermeneutics and Organizational Fractures within Dabiq Magazine
Abstract: 
 The Islamic State of Iraq and Syria (ISIS)'s flagship English-language magazine, Dabiq, is a puzzle. The magazine is not, despite appearances, primarily designed for direct recruiting efforts or inciting violence against the West. In fact, the primary audiences of Dabiq are English-speaking second generation Muslims or converts, Western policymakers, and a third group of current or would-be members of ISIS who are not integrating with the organization itself. The third audience—those members who are failing to function within the organization—is strange to include in an English-language magazine. Why publish organizational weaknesses, in English? One possibility for this puzzle is that the fundamentalist hermeneutics of ISIS is reflected in their own media efforts. One of the assumptions that ISIS holds about their sacred texts is that each text carries a single meaning that reflects the author's original intent. There might be multiple applications of that intent, but each text can only have one intent, and therefore one meaning. Following this logic, a message meant for one person is unlikely to be of utility for another, and so this may be why ISIS exposes their weaknesses as part of the process of correcting their own members.
Journal: Studies in Conflict & Terrorism
Pages: 173-190
Issue: 3
Volume: 40
Year: 2017
Month: 3
X-DOI: 10.1080/1057610X.2016.1184062
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1184062
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:3:p:173-190



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1274216_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lorne L. Dawson
Author-X-Name-First: Lorne L.
Author-X-Name-Last: Dawson
Author-Name: Amarnath Amarasingam
Author-X-Name-First: Amarnath
Author-X-Name-Last: Amarasingam
Title: Talking to Foreign Fighters: Insights into the Motivations for Hijrah to Syria and Iraq
Abstract: 
 Little of the discussion of foreign fighters in Syria and Iraq is informed by primary data derived from talking with the foreign fighters. This article reports some initial findings from interviews with twenty foreign fighters in Syria. The findings are compared with three other recent studies of European foreign fighters, and aspiring fighters, based on some primary data. While those studies emphasize the role of low social and economic prospects in motivating the choice to go, this study found little evidence of such factors, and alternatively argues more attention should be given to existential concerns and the role of religiosity. Consideration is also given to the methodological challenges posed by using of terrorists' accounts of their motivations.
Journal: Studies in Conflict & Terrorism
Pages: 191-210
Issue: 3
Volume: 40
Year: 2017
Month: 3
X-DOI: 10.1080/1057610X.2016.1274216
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1274216
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:3:p:191-210



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1188533_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Samuel Oyewole
Author-X-Name-First: Samuel
Author-X-Name-Last: Oyewole
Title: Making the Sky Relevant to Battle Strategy: Counterinsurgency and the Prospects of Air Power in Nigeria
Abstract: 
 One of the most important roles in counterinsurgency (COIN) is to maintain adequate security presence to protect lives and properties of the affected population and restore law and order in the society. Accordingly, the state of affairs in Nigeria's COIN theater has been affected by the quantity and quality of security presence, most especially the ability of the operatives to gather timely and relevant information and mobilize for prompt response. Although the roles of the ground operatives have dominated public attention, the local air force and the complementary air powers have affected the security situations with the level of their presence or absence in the sky for intelligence, surveillance, and reconnaissance; firepower; and transportation in the theater. This study examines the relevance of security presence to achieve the objective of COIN and the prospects of air power in this arrangement in Nigeria and the Lake Chad region.
Journal: Studies in Conflict & Terrorism
Pages: 211-231
Issue: 3
Volume: 40
Year: 2017
Month: 3
X-DOI: 10.1080/1057610X.2016.1188533
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1188533
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:3:p:211-231



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1184061_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Benjamin Acosta
Author-X-Name-First: Benjamin
Author-X-Name-Last: Acosta
Author-Name: Kristen Ramos
Author-X-Name-First: Kristen
Author-X-Name-Last: Ramos
Title: Introducing the 1993 Terrorism and Political Violence Dataset
Abstract: 
 The introduction of the Global Terrorism Database (GTD) nearly a decade ago sparked a revolution in terrorism studies. However, one major flaw in the database continues to plague GTD users. Data lost prior to digitalization, along with unsuccessful data recollection efforts, have left GTD without data on events that took place during the year 1993. The missing data prevents researchers from using the entirety of GTD's annual range (1970–2014) to conduct reliable time-series analyses. Additionally, it has likely contributed to the formation of theories and claims on faulty empirical ground. To remedy the problem, we have collected data on 4,206 unique terror-attack incidents, with the aim of documenting the universe of 1993 terrorism events. This article showcases our 1993 dataset and illustrates the importance of terrorism events in 1993 for the development of conflicts in Israel, Afghanistan, Colombia, and India.
Journal: Studies in Conflict & Terrorism
Pages: 232-247
Issue: 3
Volume: 40
Year: 2017
Month: 3
X-DOI: 10.1080/1057610X.2016.1184061
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1184061
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:3:p:232-247



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1188535_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Randy Borum
Author-X-Name-First: Randy
Author-X-Name-Last: Borum
Author-Name: Robert Fein
Author-X-Name-First: Robert
Author-X-Name-Last: Fein
Title: The Psychology of Foreign Fighters
Abstract: 
 The recent influx of foreign fighters into Syria, particularly those aligning with the Islamic State, has brought renewed attention to the security threat posed by people who cross borders to participate in armed conflict. Although foreign fighters have rarely, if ever, constituted the majority of combatants in a war or insurgency, understanding their role is critical for conflict analysis and prevention. This review focuses on behavioral aspects of the foreign fighter phenomenon. Although other books and articles have focused wholly, or in part, on historical dimensions, the behavioral and social science literature on foreign fighters is much more limited. This review first explores the definitions of “foreign fighter” terminology, then analyzes what is known about their motivations and their pathways toward engaging in armed conflict on foreign soil. It examines recruitment strategies and the role of “radicalization” in feeding the transnational insurgent supply, and finally describes more specifically, the nature of foreign fighter involvement in more recent armed conflicts (e.g., Syria, Chechnya, Iraq, and Afghanistan), and speculates about the prospects for their future involvement.
Journal: Studies in Conflict & Terrorism
Pages: 248-266
Issue: 3
Volume: 40
Year: 2017
Month: 3
X-DOI: 10.1080/1057610X.2016.1188535
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1188535
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:3:p:248-266

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1206734_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John McCoy
Author-X-Name-First: John
Author-X-Name-Last: McCoy
Author-Name: W. Andy Knight
Author-X-Name-First: W. Andy
Author-X-Name-Last: Knight
Title: Homegrown Violent Extremism in Trinidad and Tobago: Local Patterns, Global Trends
Abstract: 
 The article examines the subject of homegrown violent extremism related to militant Islamism in the dual-Island Caribbean state of Trinidad and Tobago (T & T). It employs original research drawn from a series of semi-structured interviews and focus groups conducted between November 2015 and January 2016. Tracing the evolution of endogenous forms of radicalism and extremism the article considers how globalized-exogenous forms of militant Islamism associated with Al Qaeda and its offshoots, such as the so-called Islamic State, have impacted local patterns of violent extremism. The case study draws attention to a state and a region that have received scant attention in terrorism studies. As demonstrated by the article, this oversight is imprudent. There are a number of noteworthy findings from this case study for terrorism studies scholars: the unique historical legacy of radicalism, extremism and insurrection among T & T's Islamists; the country's markedly high levels of extremist travelers on a per capita basis and the high rate of religious converts among those travelers; the inter-linkages between criminality and political violence; and the potential threat posed by Trinidadian and Tobagonian militancy regionally.
Journal: Studies in Conflict & Terrorism
Pages: 267-299
Issue: 4
Volume: 40
Year: 2017
Month: 4
X-DOI: 10.1080/1057610X.2016.1206734
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1206734
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:4:p:267-299



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1205368_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Brian M. Perkins
Author-X-Name-First: Brian M.
Author-X-Name-Last: Perkins
Title: Yemen: Between Revolution and Regression
Abstract: 
 Yemen once again descended into chaos in November 2014, when the Houthis seized control of Sana'a. Saudi Arabia and its Gulf Cooperation Council partners, along with mainstream media, characterized the conflict as a sectarian proxy-war with Iran. However, this narrative fails to acknowledge the trajectory of Yemen's Arab Spring revolt. This article refutes this narrative by using theories of revolution to connect the Arab Spring revolt to the current conflict. Situating Yemen within a broader revolutionary moment sheds light on patterns of revolution in Third World societies and the likely outcome of the current conflict.
Journal: Studies in Conflict & Terrorism
Pages: 300-317
Issue: 4
Volume: 40
Year: 2017
Month: 4
X-DOI: 10.1080/1057610X.2016.1205368
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1205368
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:4:p:300-317



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1194025_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Innocent Chiluwa
Author-X-Name-First: Innocent
Author-X-Name-Last: Chiluwa
Title: The Discourse of Terror Threats: Assessing Online Written Threats by Nigerian Terrorist Groups
Abstract: 
 Online threats by terrorist groups are viewed as a special type of discourse that sends menacing explicit messages, expressing not only an intention to cause a direct physical harm to the threatened, but also to show a commitment to destroy public property or cause a change of system or government. This study applies critical discourse analysis with some insights from pragmatics to analyze the discourse-pragmatic contents of terror threats by two terrorist groups in Nigeria—Boko Haram and Ansaru. Explicit and implied threats are examined from seven online publications by these groups written between 2009 and 2012. This study shows that terror threats by Nigerian terrorist groups are intertextually and ideologically related to threats associated with Al Qaeda and global jihad, which also goes further to establish their strong link and influence with other terror groups around the world. The findings also show that the structure of terror threats is significantly different from the conventional formula for verbal threats.
Journal: Studies in Conflict & Terrorism
Pages: 318-338
Issue: 4
Volume: 40
Year: 2017
Month: 4
X-DOI: 10.1080/1057610X.2016.1194025
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1194025
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:4:p:318-338



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1197692_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: C. Christine Fair
Author-X-Name-First: C. Christine
Author-X-Name-Last: Fair
Author-Name: Jacob S. Goldstein
Author-X-Name-First: Jacob S.
Author-X-Name-Last: Goldstein
Author-Name: Ali Hamza
Author-X-Name-First: Ali
Author-X-Name-Last: Hamza
Title: Can Knowledge of Islam Explain Lack of Support for Terrorism? Evidence from Pakistan
Abstract: 
 In this research note we employ the work of Wiktorowicz who suggests that persons who are knowledgeable of Islam may be more capable of critically evaluating the claims of militant recruiters and ideologues and thus be more resistant to their appeals than those who are not knowledgeable. This gives rise to an interesting research question: Does knowledge of Islam reduce support for Islamist militancy? To evaluate this research question, we employ data derived from a nationally representative survey fielded among 16,279 Pakistanis in 2011. Using several survey items, we construct a “knowledge index” to measure respondents’ basic knowledge of Islam, which is our principal independent variable. To operationalize support for militancy we use two survey items that query respondents about their support for two prominent Islamist militant groups based in and from Pakistan: the Afghan Taliban as well the sectarian group, Sipah-e-Sahaba-e-Pakistan (also known as Lashkar-e-Jhangvi and Ahle Sunnat Wal Jamaat). We use ordinary least squares regression to evaluate the impact of our independent variables upon support for these two groups, controlling for other relevant factors. We find that knowledge of Islam does predict less support for these two groups; however, other variables such as sectarian organization and ethnicity have greater predictive power.
Journal: Studies in Conflict & Terrorism
Pages: 339-355
Issue: 4
Volume: 40
Year: 2017
Month: 4
X-DOI: 10.1080/1057610X.2016.1197692
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1197692
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:4:p:339-355

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1212551_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Haroro J. Ingram
Author-X-Name-First: Haroro J.
Author-X-Name-Last: Ingram
Title: An Analysis of Inspire and Dabiq: Lessons from AQAP and Islamic State's Propaganda War
Abstract: 
 This study analyzes how Inspire and Dabiq seek to appeal to and radicalize English-speaking Muslims. It examines how each magazine strategically designs ingroup, Other, crisis, and solution constructs and interplays these via value-, dichotomy-, and crisis-reinforcing narratives. This analysis also explores how narrative, imagery, and counternarrative messaging are used to shape readers' perceptions and polarize their support. While both magazines are dominated by narratives designed to empower readers toward action, Inspire relies heavily on identity-choice appeals while Dabiq tends to balance identity- and rational-choice messaging. This study concludes by identifying key lessons for counterterrorism strategic communications campaign and message design.
Journal: Studies in Conflict & Terrorism
Pages: 357-375
Issue: 5
Volume: 40
Year: 2017
Month: 5
X-DOI: 10.1080/1057610X.2016.1212551
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1212551
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:5:p:357-375



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1210891_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ioana Emy Matesan
Author-X-Name-First: Ioana Emy
Author-X-Name-Last: Matesan
Author-Name: Ronit Berger
Author-X-Name-First: Ronit
Author-X-Name-Last: Berger
Title: Blunders and Blame: How Armed Non-State Actors React to Their Mistakes
Abstract: 
 Armed non-state actors make mistakes. Why this phenomenon occurs, and how organizations respond to their blunders, has remained understudied. This article draws on interdisciplinary research to examine sources of errors, and offers a public sensitivity argument to explain why groups claim and even apologize for their blunders. The quantitative analysis finds that all armed groups, regardless of ideology and organizational structure, are willing to apologize when there are unintended high casualty rates. A detailed analysis of three Provisional Irish Republican Army incidents reveals that public opinion is sensitive to the nature of the victims, and shows how public condemnation can impact organizational behavior.
Journal: Studies in Conflict & Terrorism
Pages: 376-398
Issue: 5
Volume: 40
Year: 2017
Month: 5
X-DOI: 10.1080/1057610X.2016.1210891
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1210891
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:5:p:376-398



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1212548_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kevin M. Fitzpatrick
Author-X-Name-First: Kevin M.
Author-X-Name-Last: Fitzpatrick
Author-Name: Jeff Gruenewald
Author-X-Name-First: Jeff
Author-X-Name-Last: Gruenewald
Author-Name: Brent L. Smith
Author-X-Name-First: Brent L.
Author-X-Name-Last: Smith
Author-Name: Paxton Roberts
Author-X-Name-First: Paxton
Author-X-Name-Last: Roberts
Title: A Community-Level Comparison of Terrorism Movements in the United States
Abstract: 
 The aim of this article is to identify characteristics of communities where persons indicted under terrorism charges lived, planned, and prepared prior to carrying out a terrorist act. Guided by a model of community deterioration and using data from the Terrorism and Extremist Violence in the United States database, findings indicate: (1) half of all census tracts where terrorists planned and prepared for attacks were located in the western United States; nearly one fourth were in the Northeast; (2) nationally, terrorist pre-incident activity is more likely to occur in census tracts with lower percentages of high school graduates for Al Qaeda and associated movements (AQAM) terrorism but not for far-right terrorism, higher percentages of households living below the poverty level, more urban places, and more unemployed; and (3) communities with terrorist pre-incident activity are different types of places compared to those where there was no pre-incident activity, generally between different regions of the country, and specifically in terms of differences across far-right and AQAM terrorist movements.
Journal: Studies in Conflict & Terrorism
Pages: 399-418
Issue: 5
Volume: 40
Year: 2017
Month: 5
X-DOI: 10.1080/1057610X.2016.1212548
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1212548
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:5:p:399-418



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1214434_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Arnim Langer
Author-X-Name-First: Arnim
Author-X-Name-Last: Langer
Author-Name: Amélie Godefroidt
Author-X-Name-First: Amélie
Author-X-Name-Last: Godefroidt
Author-Name: Bart Meuleman
Author-X-Name-First: Bart
Author-X-Name-Last: Meuleman
Title: Killing People, Dividing a Nation? Analyzing Student Perceptions of the Boko Haram Crisis in Nigeria
Abstract: 
 The causes and consequences of the Boko Haram insurgency as well as its possible solutions have been subjected to different interpretations among scholars, politicians, and journalists. Little is known, however, about how the Nigerian populace thinks about the uprising. The present study contributes to the literature on Boko Haram by analyzing the perceptions of Nigerian students vis-à-vis Boko Haram's agenda and the government's response. The results demonstrate a north–south divide with Christians or Igbo and Muslims or Hausa-Fulani holding different ideas on the causes of the crisis, being differently affected by it, and slightly disagreeing on the desirability of military government responses. In conclusion, perceptions on Boko Haram lay bare ethno-religious fault lines reflecting existing grievances, thereby possibly undermining efforts at nation-building and peaceful coexistence in the multi-ethnic Nigerian society.
Journal: Studies in Conflict & Terrorism
Pages: 419-738
Issue: 5
Volume: 40
Year: 2017
Month: 5
X-DOI: 10.1080/1057610X.2016.1214434
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1214434
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:5:p:419-738

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1221258_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Simon Cottee
Author-X-Name-First: Simon
Author-X-Name-Last: Cottee
Title: “What ISIS Really Wants” Revisited: Religion Matters in Jihadist Violence, but How?
Abstract: 
 In his influential and provocative article on “What ISIS Really Wants,” published in The Atlantic in March 2015, Graeme Wood argued that “the Islamic state is Islamic. Very Islamic.” He also sought to challenge what he diagnosed as a “western bias” among academics and policymakers toward religious ideology, whereby religious doctrines or beliefs are relegated to the status of epiphenomena rather than taken seriously as causal properties in their own right. Wood's article sparked a wider—and still ongoing—debate over the relationship between Islam and jihadist violence. For one side in this debate, Islamic State of Iraq and Syria (ISIS) is inexplicable without reference to Islamic scripture; indeed, some commentators and politicians have even argued that it represents the “true” face of Islam; for the other side, ISIS is a hideous distortion of Islam's “true” teachings, and is inexplicable without reference to the wider political circumstances in which it emerged and to which it is a response. This article attempts to forge a middle way between these two polarized viewpoints by arguing that any comprehensive account of ISIS must recognize both its secular and theological bases. More specifically, and drawing on the work of the intellectual historian Quentin Skinner, it argues that Wood's critics, in their understandable but misplaced eagerness to detach Islam from jihadist violence, fail to accord proper causal weight to the legitimizing role of revolutionary Islamic ideas—and the innovating ideologists who develop these—in the commission of this violence.
Journal: Studies in Conflict & Terrorism
Pages: 439-454
Issue: 6
Volume: 40
Year: 2017
Month: 6
X-DOI: 10.1080/1057610X.2016.1221258
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1221258
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:6:p:439-454



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1221265_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dina Esfandiary
Author-X-Name-First: Dina
Author-X-Name-Last: Esfandiary
Author-Name: Ariane M. Tabatabai
Author-X-Name-First: Ariane M.
Author-X-Name-Last: Tabatabai
Title: A Comparative Study of U.S. and Iranian Counter-ISIS Strategies
Abstract: 
 The Islamic State in Iraq and Syria (ISIS)'s activities now go beyond insurgency and conventional operations in the territories it controls in the Middle East. It poses a threat to U.S. interests and allies in Europe, and a serious threat to Iran and its borders. While Washington formed an international coalition encompassing many European and Middle Eastern states to combat ISIS, it only coordinates some tactical and operation-level efforts with a key player on the ground: Iran. For its part, Iran is leveraging similar counter-ISIS tools as those adopted by the United States, despite their strategies differing fundamentally.
Journal: Studies in Conflict & Terrorism
Pages: 455-469
Issue: 6
Volume: 40
Year: 2017
Month: 6
X-DOI: 10.1080/1057610X.2016.1221265
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1221265
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:6:p:455-469



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1221253_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Antony Field
Author-X-Name-First: Antony
Author-X-Name-Last: Field
Title: The Dynamics of Terrorism and Counterterrorism: Understanding the Domestic Security Dilemma
Abstract: 
 This article argues that the concept of the “domestic security dilemma” can help us to better understand public opposition to government counterterrorism policies. It examines the concept of the “security dilemma” in international relations theory and argues that this concept can also be applied to the analysis of domestic security politics. The article explains that when the government takes actions intended to make people safer from terrorist threats, it often has the unintended consequence of heightening concerns about government oppression. Thus, counterterrorism represents a “domestic security dilemma”—a situation where security tradeoffs have consistently undermined anticipated security gains.
Journal: Studies in Conflict & Terrorism
Pages: 470-483
Issue: 6
Volume: 40
Year: 2017
Month: 6
X-DOI: 10.1080/1057610X.2016.1221253
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1221253
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:6:p:470-483



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1221255_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Pierre Losson
Author-X-Name-First: Pierre
Author-X-Name-Last: Losson
Title: Does the International Trafficking of Cultural Heritage Really Fuel Military Conflicts?
Abstract: 
 General media outlets are increasingly arguing that the looting of cultural heritage artifacts contributes to the funding of terrorist groups such as Islamic State of Iraq and Syria (ISIS). This article reexamines this claim in light of the political science literature on internal conflicts duration. While we do know that armed conflicts contribute to an increase of looting activities in the territories at war, it is still too early to generalize the ISIS case and conclude that these activities contribute to significantly funding armed non-state actors and to prolonging internal armed conflicts. However, establishing this link may add political weight to archeologists' and art historians' efforts to curb the international trafficking of looted objects.
Journal: Studies in Conflict & Terrorism
Pages: 484-495
Issue: 6
Volume: 40
Year: 2017
Month: 6
X-DOI: 10.1080/1057610X.2016.1221255
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1221255
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:6:p:484-495



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1221256_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Eleanor Beevor
Author-X-Name-First: Eleanor
Author-X-Name-Last: Beevor
Title: Coercive Radicalization: Charismatic Authority and the Internal Strategies of ISIS and the Lord's Resistance Army
Abstract: 
 A framework for understanding Islamic State of Iraq and al-Sham (ISIS)'s apocalyptic theology as an internal strategy to “coercively radicalize” its captive subjects is presented, by comparison to the Lord's Resistance Army (LRA), which shares key stages of captive indoctrination with ISIS. A violent experience of “entry,” religious rules learned in an “assimilation” process, and millenarian “grand narratives” framing violence as purification, are examined. These stages construct an image of group leaders as divinely endowed with spiritual knowledge and access (i.e., charismatic authority). This can create a sense of dependency on the leaders and their instructions, potentially motivating violent and altruistic behavior from initially unwilling subjects.
Journal: Studies in Conflict & Terrorism
Pages: 496-521
Issue: 6
Volume: 40
Year: 2017
Month: 6
X-DOI: 10.1080/1057610X.2016.1221256
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1221256
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:6:p:496-521

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1237224_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Louise Kettle
Author-X-Name-First: Louise
Author-X-Name-Last: Kettle
Author-Name: Andrew Mumford
Author-X-Name-First: Andrew
Author-X-Name-Last: Mumford
Title: Terrorist Learning: A New Analytical Framework
Abstract: 
 Terrorists learn every day to gain further knowledge on how to achieve their violent objectives. Consequently, understanding terrorist learning forms a crucial part of the fight to counter terrorism. However, while existing literature within terrorism studies has examined a number of different parts of the learning process, there currently fails to exist a comprehensive framework to encompass the learning process as a whole. This article will rectify this oversight by drawing on wider learning literature to develop a new analytical framework for terrorist learning that provides a definition, considers the actors involved and identifies processes and outcomes. Consequently, the full landscape of current and potential research in this important area is revealed.
Journal: Studies in Conflict & Terrorism
Pages: 523-538
Issue: 7
Volume: 40
Year: 2017
Month: 7
X-DOI: 10.1080/1057610X.2016.1237224
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1237224
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:7:p:523-538



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1237226_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Maria Rasmussen
Author-X-Name-First: Maria
Author-X-Name-Last: Rasmussen
Title: Terrorist Learning: A Look at the Adoption of Political Kidnappings in Six Countries, 1968–1990
Abstract: 
 This article studies the epidemic of kidnappings across six countries between 1968 and 1990. The goal is to identify those factors that determine the operational decisions made by terrorists. Why and how do terrorists decide to engage in certain types of actions but not others? The article discusses a number of scholarly approaches, and the variables these studies have put forward to explain the decision-making processes within terrorist organizations. The argument made here is that the groups' ideological preferences, strategic analysis, and need to attract media attention did not appear to exert much influence in the terrorists' decision to kidnap. Organizational resources and the nature of the security environment in which the terrorists operated had some bearing. However, kidnappings became attractive when terrorists made a pragmatic evaluation of the reaction by governments and the public and consequently of the costs or benefits of a particular course of action. The decision to carry out a campaign of kidnappings, or to abstain from kidnapping, should be interpreted as clear evidence of terrorist learning. Two types of learning appear to have influenced the adoption of kidnappings: learning by observing others and learning by doing.
Journal: Studies in Conflict & Terrorism
Pages: 539-556
Issue: 7
Volume: 40
Year: 2017
Month: 7
X-DOI: 10.1080/1057610X.2016.1237226
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1237226
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:7:p:539-556



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1237222_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Adrian Guelke
Author-X-Name-First: Adrian
Author-X-Name-Last: Guelke
Title: Irish Republican Terrorism: Learning from and Teaching Other Countries
Abstract: 
 Violent nationalism in Northern Ireland has drawn inspiration from a tradition of physical-force republicanism that dates back centuries. The consequence has been a strong tendency for Irish republicans to draw on that history as a source of ideas for their conduct of campaigns of violence. However, during Northern Ireland's most recent Troubles from the late 1960s to the 1990s, external influence on the republican movement was evident in some of the tactics adopted and, even more strongly, in the turn toward negotiations. At the same time, Irish republicans have directly assisted other groups from Spain to South Africa in the employment of particular means such as the culvert bomb. But it is more striking that republicans have tended to eschew some of the means that have been widely associated with terrorism elsewhere since the 1960s such as the hijacking of aircraft for the taking of hostages. Transnational influences on Irish nationalists have been greater at the level of political ideas and as a source of legitimization than as a model for their own campaigns.
Journal: Studies in Conflict & Terrorism
Pages: 557-572
Issue: 7
Volume: 40
Year: 2017
Month: 7
X-DOI: 10.1080/1057610X.2016.1237222
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1237222
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:7:p:557-572



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1237221_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Paul Gill
Author-X-Name-First: Paul
Author-X-Name-Last: Gill
Title: Tactical Innovation and the Provisional Irish Republican Army
Abstract: 
 This article provides an overview of Provisional Irish Republican Army (PIRA) innovations with regards to improvised explosive devices (IEDs). It situates PIRA's tactical innovations within the broad organizational psychology literature focused on the nature and drivers of creativity and innovation. This discussion helps frame the two empirical analyses that follow. The first analysis provides a graphical timeline of PIRA's radical innovations (and their drivers) in relation to IED technology. This helps provide a sense of the specific occasions in which PIRA innovations were numerous and when they were sparse. The second analysis looks at the locations in which PIRA radical innovations debuted. This provides us with an understanding of the specific PIRA units responsible for these innovations. The results demonstrate that while PIRA operations spanned the six counties of Northern Ireland for 29 years, radical IED innovations were conceived, developed, and initially implemented within only two areas of operations for only seven of those years.
Journal: Studies in Conflict & Terrorism
Pages: 573-585
Issue: 7
Volume: 40
Year: 2017
Month: 7
X-DOI: 10.1080/1057610X.2016.1237221
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1237221
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:7:p:573-585



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1237225_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John F. Morrison
Author-X-Name-First: John F.
Author-X-Name-Last: Morrison
Title: Copying to be Different: Violent Dissident Irish Republican Learning
Abstract: 
 While the impact of the Troubles retains centrality within much of Northern Irish political life, the spectre of almost daily violence is becoming a more distant memory. Peace has come to the region. In spite of this, however, there are those who wish to maintain the utility of violence to achieve their stated aims. Most dominant among these are the violent dissident republican groups. No longer is their existence solely defined by their desire to bring about a united Ireland. In order to have any opportunity of longevity, they must first legitimize their continued existence, and in turn distance themselves from their former Provisional comrades. This article assesses how groups, such as the Continuity Irish Republican Army (IRA), Óglaigh na hÉireann, and the IRA/New IRA utilize the lessons learned from their Provisional history to differentiate themselves from the politicized dominance of Sinn Féin. This evaluation is carried out through the analysis of interviews with leadership and rank and file members of both political and paramilitary dissident groupings, which is complemented by the analysis of the Violent Dissident Republican events database. These sources are supplemented with the assessment of organizational statements, from 2007 to the present day. The article focuses on violent, and nonviolent, learning.
Journal: Studies in Conflict & Terrorism
Pages: 586-602
Issue: 7
Volume: 40
Year: 2017
Month: 7
X-DOI: 10.1080/1057610X.2016.1237225
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1237225
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:7:p:586-602



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1237219_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mia Bloom
Author-X-Name-First: Mia
Author-X-Name-Last: Bloom
Title: Constructing Expertise: Terrorist Recruitment and “Talent Spotting” in the PIRA, Al Qaeda, and ISIS
Abstract: 
 The academic literature is divided with regard to whether terrorist recruits are dangerous masterminds, “malevolently creative,” and capable of perpetrating well-planned mass casualty attacks in the heart of European capitals. Or whether they are imbeciles, incapable of carrying out the most basic tasks, who mostly end up blowing themselves up by accident. This duality about the capabilities of terrorists is reflected in analyses of terrorist incidents. In fact, both depictions of terrorist recruits are accurate. Acuity and professionalism are not movement dependent (the same group may attract a variety of recruits) and might, instead, reflect a recruitment cycle that terrorist groups experience—one that alternates between labor-intensive and expertise-intensive periods of recruitment. The phases may shift because of external pressures (periods of territorial expansion/contraction) and opportunities (need for better quality recruits) with associated shifts in how groups use propaganda to attract a different quality of recruit during different periods of time. A possible first step toward hindering terrorist recruitment is to better understand the ways in which terrorist organizations work—where and when they recruit, whom they target, and the different propaganda messages used for selective/targeted recruitment. A clearer picture of the process could provide opportunities to counter a group's appeal, replenish their ranks, and inoculate vulnerable populations against recruitment. Case studies of three different terrorist organizations (Al Qaeda, the Islami State in Iraq and Syria [ISIS], and the Provisional Irish Republican Army [PIRA]) presented here posit that there exists a terrorism “recruitment cycle” that alternates between labor and expertise focus, uses different recruitment strategies and different propaganda messaging depending on this cycle.
Journal: Studies in Conflict & Terrorism
Pages: 603-623
Issue: 7
Volume: 40
Year: 2017
Month: 7
X-DOI: 10.1080/1057610X.2016.1237219
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1237219
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:7:p:603-623



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1237228_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Rashmi Singh
Author-X-Name-First: Rashmi
Author-X-Name-Last: Singh
Title: A Preliminary Typology Mapping Pathways of Learning and Innovation by Modern Jihadist Groups
Abstract: 
 The importance of understanding how terrorist organizations learn and innovate cannot be overstated. Yet there is a remarkable paucity of literature systematically addressing this subject. This article contributes to an evolving conceptualization in this area by proposing a preliminary typology of learning and innovation as undertaken by modern jihadist groups. It identifies and discusses four categories: (a) intergroup learning within a single domestic setting; (b) intergroup learning between two or more local groups across a state or national boundary; (c) intergroup learning between a transnational group and one or more domestic groups; and finally (d) intragroup learning or “self-learning.”
Journal: Studies in Conflict & Terrorism
Pages: 624-644
Issue: 7
Volume: 40
Year: 2017
Month: 7
X-DOI: 10.1080/1057610X.2016.1237228
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1237228
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:7:p:624-644



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1221252_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John G. Horgan
Author-X-Name-First: John G.
Author-X-Name-Last: Horgan
Author-Name: Max Taylor
Author-X-Name-First: Max
Author-X-Name-Last: Taylor
Author-Name: Mia Bloom
Author-X-Name-First: Mia
Author-X-Name-Last: Bloom
Author-Name: Charlie Winter
Author-X-Name-First: Charlie
Author-X-Name-Last: Winter
Title: From Cubs to Lions: A Six Stage Model of Child Socialization into the Islamic State
Abstract: 
 Using the Islamic State in Iraq and al-Sham (ISIS) as a case study, we explore the process by which children evolve from novice recruits to fully fledged members of a violent extremist movement. From currently available data, we propose six stages of child socialization to ISIS—Seduction, Schooling, Selection, Subjugation, Specialization, and Stationing. Furthermore, we explore this process in the context of “Community of Practice” (COP) as developed by Wenger and Lave. COP models highlight how newcomers learn and pass through degrees of involvement from the periphery of an organization to the inside. In subsequent research, Hundeide highlighted how “contracts of deep commitment” and “conversion” constitute important social and psychological elements of communities of practice. We regard such qualities as intrinsic to children's involvement in ISIS. We conclude with implications drawn from the disengagement and reintegration experiences of former child soldiers in other contexts.
Journal: Studies in Conflict & Terrorism
Pages: 645-664
Issue: 7
Volume: 40
Year: 2017
Month: 7
X-DOI: 10.1080/1057610X.2016.1221252
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1221252
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:7:p:645-664

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1237217_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: R. Kim Cragin
Author-X-Name-First: R. Kim
Author-X-Name-Last: Cragin
Author-Name: Phillip Padilla
Author-X-Name-First: Phillip
Author-X-Name-Last: Padilla
Title: Old Becomes New Again: Kidnappings by Daesh and Other Salafi-Jihadists in the Twenty-First Century
Abstract: 
 Daesh fighters have taken hostage over 100 foreigners in Syria, Iraq, and elsewhere since 2012. The kidnappings drew international attention in August 2014, when American journalist James Foley was decapitated and a video of his death was posted online. But the pattern of kidnappings and gruesome videos distributed by violent Salafi-jihadists extends back over a decade to the killing of Daniel Pearl in 2002. This article traces shifts in the strategic rationale of Al Qaeda and Daesh for beheading Western hostages. It argues that terrorists altered their calculations on foreign hostages beginning in 2012 and U.S. counterterrorism policy does not take these shifts into account.
Journal: Studies in Conflict & Terrorism
Pages: 665-683
Issue: 8
Volume: 40
Year: 2017
Month: 8
X-DOI: 10.1080/1057610X.2016.1237217
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1237217
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:8:p:665-683



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1231566_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Arie Perliger
Author-X-Name-First: Arie
Author-X-Name-Last: Perliger
Title: The Role of Civil Wars and Elections in Inducing Political Assassinations
Abstract: 
 Political assassinations can dramatically impact political and social dynamics, especially in times of violent political conflicts or electoral competition. The current study explores if and how specific social and political events facilitate the occurrence of political assassinations. After an examination of the logic of political assassinations, a theoretical framework is presented, which explains the role of civil wars and electoral processes as facilitators of different types of political assassinations. The theory is tested via a dataset of political assassinations worldwide between the years 1946–2013. The findings confirm that different sets of structural and contextual factors facilitate assassinations against heads of state, legislators, and leaders of opposition movements/parties. In addition, the findings illustrate the tendency of elections, especially in nonliberal settings and in polarized societies, to facilitate political assassinations rather than to calm the political environment. In contrast, civil wars have a more limited impact on the probability of assassinations, and their intensity and endurance mainly enhance the risk of assassinations of legislators.
Journal: Studies in Conflict & Terrorism
Pages: 684-700
Issue: 8
Volume: 40
Year: 2017
Month: 8
X-DOI: 10.1080/1057610X.2016.1231566
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1231566
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:8:p:684-700



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1223979_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Elisaveta P. Petkova
Author-X-Name-First: Elisaveta P.
Author-X-Name-Last: Petkova
Author-Name: Stephanie Martinez
Author-X-Name-First: Stephanie
Author-X-Name-Last: Martinez
Author-Name: Jeffrey Schlegelmilch
Author-X-Name-First: Jeffrey
Author-X-Name-Last: Schlegelmilch
Author-Name: Irwin Redlener
Author-X-Name-First: Irwin
Author-X-Name-Last: Redlener
Title: Schools and Terrorism: Global Trends, Impacts, and Lessons for Resilience
Abstract: 
 This study characterizes trends in the frequency and characteristics of terrorist attacks in child-serving educational institutions around the world, examining the specific vulnerabilies of children and schools with regard to terrorist violence, as well as the various impacts that violence has on children, communities, and societies. Following the analysis of available data on terrorist attacks against educational institutions, vulnerabilities, and impacts, the study concludes with a discussion of what still needs to be understood in the intersection of child vulnerability and terrorism, and provides recommendations for improving resilience to terrorist attacks against child-serving educational institutions.
Journal: Studies in Conflict & Terrorism
Pages: 701-711
Issue: 8
Volume: 40
Year: 2017
Month: 8
X-DOI: 10.1080/1057610X.2016.1223979
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1223979
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:8:p:701-711



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1234313_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: René Karpantschof
Author-X-Name-First: René
Author-X-Name-Last: Karpantschof
Author-Name: Flemming Mikkelsen
Author-X-Name-First: Flemming
Author-X-Name-Last: Mikkelsen
Title: The Rise and Transformation of the Radical Right Movement in Denmark, 1980–2015
Abstract: 
 This article examines the rise and subsequent development and transformation of the new radical right movement in Denmark from 1980–2015. The Danish radical right emerged from xenophobic subcultures as a reaction to increasing immigration during the 1980s and evolved into a social movement of nationalist associations, militant skinheads, and neo-Nazis that attempted to conquer the streets. This attempt was met by an antiracist countermovement, which built up a coalition of left-wing militants and moderate political organizations that put a temporary end to the radical right as a social movement during the second half of the 1990s. However, from 2001 national and international circumstances offered new opportunities for the Danish radical right both in the streets and as a parliamentary voice.
Journal: Studies in Conflict & Terrorism
Pages: 712-730
Issue: 8
Volume: 40
Year: 2017
Month: 8
X-DOI: 10.1080/1057610X.2016.1234313
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1234313
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:8:p:712-730

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1236571_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Vaughan Phillips
Author-X-Name-First: Vaughan
Author-X-Name-Last: Phillips
Title: The Islamic State's Strategy: Bureaucratizing the Apocalypse through Strategic Communications
Abstract: 
 To understand the Islamic State's strategy, we have to look at the way the group twins Maoist and post-Maoist strategies, previously considered strategically incompatible. By establishing a state that it claims to embody the Caliphate, it not only gains revenue and resources, but also generates a seductive “brand” with a compelling message that it “sells” via the Internet. This brand, based on Propaganda of the Deed, synergizes its physical and digital activities to create a virtuous circle that is very close to being self-sustaining. As such it represents a new insurgent model that corroborates the News Wars thesis.
Journal: Studies in Conflict & Terrorism
Pages: 731-757
Issue: 9
Volume: 40
Year: 2017
Month: 9
X-DOI: 10.1080/1057610X.2016.1236571
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1236571
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:9:p:731-757



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1235352_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeremy D. Mayer
Author-X-Name-First: Jeremy D.
Author-X-Name-Last: Mayer
Author-Name: Naoru Koizumi
Author-X-Name-First: Naoru
Author-X-Name-Last: Koizumi
Title: Is There a Culture or Religion of Torture? International Support for Brutal Treatment of Suspected Terrorists
Abstract: 
 Do certain cultures or religions predispose citizens to support the deployment of torture against suspected terrorists? Based on an international survey of 31 different countries, we examine how religion and culture affect respondents' position on torture. We find that at the individual level, the nonreligious are resolutely opposed to torture, and that Christians, Buddhists, Hindus, Jews, and other faiths are more supportive. Among world cultures, Muslim/African cultures are most opposed to the torture of terrorists, while Confucian, English-speaking, and South Asian cultures are the most supportive of it. We also find that the use of torture has less support in countries that are suffering from terrorism, once religion and culture are considered.
Journal: Studies in Conflict & Terrorism
Pages: 758-771
Issue: 9
Volume: 40
Year: 2017
Month: 9
X-DOI: 10.1080/1057610X.2016.1235352
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1235352
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:9:p:758-771



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1236569_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Isaac Kfir
Author-X-Name-First: Isaac
Author-X-Name-Last: Kfir
Title: Al-Shabaab, Social Identity Group, Human (In)Security, and Counterterrorism
Abstract: 
 This article examines the link between human security, social identity, and al-Shabaab. The first section explores how social identity group theory can help explain al-Shabaab's recruitment. The second part focuses on the counterterrorism campaign against al-Shabaab, which involves decapitation, aggressive peacekeeping through a proxy in the shape of the African Union Mission in Somalia, and the role of a domestic de-radicalization program. The article concludes that al-Shabaab's allure is in decline and the group is facing internal turmoil, which makes its overtures toward the Islamic State of Iraq and the Levant very dangerous, as al-Shabaab could act as an effective conduit between the Arabian Peninsula and Africa.
Journal: Studies in Conflict & Terrorism
Pages: 772-789
Issue: 9
Volume: 40
Year: 2017
Month: 9
X-DOI: 10.1080/1057610X.2016.1236569
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1236569
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:9:p:772-789



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1239430_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daren G. Fisher
Author-X-Name-First: Daren G.
Author-X-Name-Last: Fisher
Author-Name: Alexander A. Meitus
Author-X-Name-First: Alexander A.
Author-X-Name-Last: Meitus
Title: Uprooting or Sowing Violence?: Coca Eradication and Guerrilla Violence in Colombia
Abstract: 
 Belligerent nonstate actors including terrorist organizations often exploit illicit economies to fund their activities. In Colombia numerous belligerent groups are involved in illegal narcotics markets. For more than 20 years, the Colombian government has responded with targeted eradication of illicit crops, intending to undermine the groups' sources of revenue while simultaneously disrupting the illicit drug economy. Despite its duration, this policy's effect on guerrilla violence remains unclear. Examining the potential for violent backlash to these tactics, this research note assesses the impact of aerial coca crop eradication in Colombia from 2004–2005 on domestic Colombian guerrilla kidnappings, assassinations, and terrorism.
Journal: Studies in Conflict & Terrorism
Pages: 790-807
Issue: 9
Volume: 40
Year: 2017
Month: 9
X-DOI: 10.1080/1057610X.2016.1239430
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1239430
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:40:y:2017:i:9:p:790-807

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1266896_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Vita Roy
Author-X-Name-First: Vita
Author-X-Name-Last: Roy
Title: Natural Resource Production and the Risk of Conflict Recurrence
Abstract: 
 Do different types of natural resources have varying impacts on the risk of conflict recurrence? Using a classification of high-value natural resources according to their lootability and obstructability, this article develops a framework bridging research on natural resources and conflict recurrence. I find evidence for the destabilizing character of easily lootable resources that is coherent across different conflict data. Non-lootable resources show little robust effects at first sight; but when introducing a measure of obstructability, the analysis uncovers varying effects of obstructable and non-obstructable resources that interact with the mode of conflict termination. Overall, the results underline the importance of attending to the lootability and obstructability dimension of natural resources when researching post-conflict risks in resource endowed states.
Journal: Studies in Conflict & Terrorism
Pages: 1-23
Issue: 1
Volume: 41
Year: 2018
Month: 1
X-DOI: 10.1080/1057610X.2016.1266896
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1266896
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:1:p:1-23



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1283194_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Victor Asal
Author-X-Name-First: Victor
Author-X-Name-Last: Asal
Author-Name: R. William Ayres
Author-X-Name-First: R. William
Author-X-Name-Last: Ayres
Title: Attention Getters: Diaspora Support for Ethno–Political Organizations in the Middle East
Abstract: 
 Why do some ethno-political organizations get support from their diaspora while others do not? There is little analysis that examines why some organizations (both violent and nonviolent) get support. Using data on 112 organizations in the Middle East we examine how factors like the power of the organization, ideology, political behavior, and government treatment might impact the likelihood of an organization getting support from its diaspora. We argue that contentious political behavior should have the largest impact on such support. We find that those that do the best job of getting attention through visible action get the most support.
Journal: Studies in Conflict & Terrorism
Pages: 24-38
Issue: 1
Volume: 41
Year: 2018
Month: 1
X-DOI: 10.1080/1057610X.2017.1283194
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1283194
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:1:p:24-38



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1266824_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marion van San
Author-X-Name-First: Marion
Author-X-Name-Last: van San
Title: Belgian and Dutch Young Men and Women Who Joined ISIS: Ethnographic Research among the Families They Left Behind
Abstract: 
 Since the end of 2012 a sizeable number of Belgian and Dutch young men and women have joined the armed conflict in Syria. According to recent estimates, there are 632 Belgian and 260 Dutch foreign fighters in Syria. Very little is known about the families these men and women come from. The research on which this article is based comprised ethnographic research among 26 families with at least one member who has left for Syria to join the armed struggle. In addition, former teachers of these youngsters were asked to reflect on their students' actions. The central question of this article is whether or not the families of youngsters who left for Syria played a supporting role in the departure decision and, therefore, the process of radicalization of the young men and women. To answer this question the families' perception of the armed struggle is described. Also discussed are signals of radicalization present prior to the youngsters' departure and actions taken by the families to prevent departure or alternatively facilitate their trip.
Journal: Studies in Conflict & Terrorism
Pages: 39-58
Issue: 1
Volume: 41
Year: 2018
Month: 1
X-DOI: 10.1080/1057610X.2016.1266824
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1266824
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:1:p:39-58



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1287501_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Battersby
Author-X-Name-First: John
Author-X-Name-Last: Battersby
Title: Terrorism Where Terror Is Not: Australian and New Zealand Terrorism Compared
Abstract: 
 Despite many commonalities in national security priorities, Australia and New Zealand approach the threat of terrorism quite differently. Both had twentieth-century manifestations of domestic terrorism which were generally downplayed. The emergence of jihadist-inspired threats globally have affected Australia much more than New Zealand, and Australian counterterrorism strategy has developed significantly since 9/11. New Zealand has watched global events so far untouched by any jihadist threat, and has implemented few effective counterterrorism measures. The reasons for the differing experience, it is contended here, are the varying historical perceptions of threat, and consequent differing approaches each country has taken to mitigate perceived threat.
Journal: Studies in Conflict & Terrorism
Pages: 59-76
Issue: 1
Volume: 41
Year: 2018
Month: 1
X-DOI: 10.1080/1057610X.2017.1287501
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1287501
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:1:p:59-76

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1510881_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bruce Hoffman
Author-X-Name-First: Bruce
Author-X-Name-Last: Hoffman
Title: Michael Sheehan, February 10, 1955-JULY 30, 2018
Journal: Studies in Conflict & Terrorism
Pages: 755-756
Issue: 10
Volume: 41
Year: 2018
Month: 10
X-DOI: 10.1080/1057610X.2018.1510881
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1510881
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:10:p:755-756



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1348096_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Seth Cantey
Author-X-Name-First: Seth
Author-X-Name-Last: Cantey
Title: Beyond the Pale? Exploring Prospects for Negotiations with Al Qaeda and the Islamic State
Abstract: 
 This article argues that prospects for negotiations with Al Qaeda and the Islamic State have been undertheorized. Drawing on nearly two thousand pages of primary source material— all issues of Inspire and Dabiq magazines published at the time of writing—it examines these groups' statements about their motivations for violence, their objectives, and their views about the possibility of dialogue with the West. It finds stark differences in all three areas and suggests that assumptions that have prevented theorizing about negotiations with these groups should be revisited.
Journal: Studies in Conflict & Terrorism
Pages: 757-775
Issue: 10
Volume: 41
Year: 2018
Month: 10
X-DOI: 10.1080/1057610X.2017.1348096
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1348096
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:10:p:757-775



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1353355_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Amira Jadoon
Author-X-Name-First: Amira
Author-X-Name-Last: Jadoon
Title: Persuasion and Predation: The Effects of U.S. Military Aid and International Development Aid on Civilian Killings
Abstract: 
 Powerful states frequently employ foreign aid to pursue international security objectives. Yet aid's effectiveness will be undermined if it exacerbates the effects of conflict on civilians within recipient states. This article investigates how international development aid and U.S. military aid influence recipient governments' incentives and ability to target civilians. U.S. military aid has a persuasion effect on state actors, which decreases a recipient state's incentives and necessity to target civilians. Development aid flows, however, trigger a predation effect in some environments, exacerbating civilian targeting. An analysis of aid flows in 135 countries on civilian killings between 1989–2011 provides support for both the persuasion and predation effects associated with aid.
Journal: Studies in Conflict & Terrorism
Pages: 776-800
Issue: 10
Volume: 41
Year: 2018
Month: 10
X-DOI: 10.1080/1057610X.2017.1353355
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1353355
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:10:p:776-800



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1433447_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Karl Kaltenthaler
Author-X-Name-First: Karl
Author-X-Name-Last: Kaltenthaler
Author-Name: Daniel Silverman
Author-X-Name-First: Daniel
Author-X-Name-Last: Silverman
Author-Name: Munqith Dagher
Author-X-Name-First: Munqith
Author-X-Name-Last: Dagher
Title: Identity, Ideology, and Information: The Sources of Iraqi Public Support for the Islamic State
Abstract: 
 This article explores the amount and sources of support for the Islamic State among Iraqis. We argue that, in addition to shared identity and ideology, a neglected factor in debates about support for Islamist militancy is the messaging and information that individuals receive about a given group. We test these arguments using regression analysis on public opinion data collected in Iraq in April 2015. The analyses largely support our contentions, showing that exposure to news coverage of the Islamic State in Iraq and the Levant substantially reduces support for the group, even among alienated Sunnis or ideological Islamists.
Journal: Studies in Conflict & Terrorism
Pages: 801-824
Issue: 10
Volume: 41
Year: 2018
Month: 10
X-DOI: 10.1080/1057610X.2018.1433447
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1433447
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:10:p:801-824



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1348099_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andreas E. Feldmann
Author-X-Name-First: Andreas E.
Author-X-Name-Last: Feldmann
Title: Revolutionary Terror in the Colombian Civil War
Abstract: 
 This article investigates the use of terror in Colombia's civil war by examining the behavior of the Revolutionary Armed Forces of Colombia (FARC) and the National Liberation Army (ELN). Relying on an extensive database covering 25 years of conflict, the article traces the way in which the FARC and ELN have employed terror as part of their overall insurrectional strategy. I argue that, while ideology plays an important role in inspiring revolutionary terrorism, these groups' terror practices evolved over time and were driven principally by military strategies. Changing conditions in the theater of war, particularly growing competition with paramilitary forces, in turn, influenced these strategies. The article also discusses some interesting differences between the two groups' terror practices.
Journal: Studies in Conflict & Terrorism
Pages: 825-846
Issue: 10
Volume: 41
Year: 2018
Month: 10
X-DOI: 10.1080/1057610X.2017.1348099
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1348099
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:10:p:825-846

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1532175_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bruce Hoffman
Author-X-Name-First: Bruce
Author-X-Name-Last: Hoffman
Title: Walter Laqueur, 26 May 1921–30 September 2018
Journal: Studies in Conflict & Terrorism
Pages: 847-849
Issue: 11
Volume: 41
Year: 2018
Month: 11
X-DOI: 10.1080/1057610X.2018.1532175
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1532175
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:11:p:847-849



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1352280_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Elizabeth Pearson
Author-X-Name-First: Elizabeth
Author-X-Name-Last: Pearson
Title: Online as the New Frontline: Affect, Gender, and ISIS-Take-Down on Social Media
Abstract: 
 Using a dataset of more than 80 accounts during 2015, this article explores the gendered ways in which self-proclaiming Twitter Islamic State of Iraq and Syria (ISIS) supporters construct community around “suspension.” The article argues that suspension is an integral event in the online lives of ISIS supporters, which is reproduced in online identities. The highly gendered roles of ISIS males and females frame responses to suspension, enforcing norms that benefit the group: the shaming of men into battle and policing of women into modesty. Both male and female members of “Wilayat Twitter” regard online as a frontline, with suspension an act of war against the “baqiya family.” The findings have implications for broader repressive measures against ISIS online.
Journal: Studies in Conflict & Terrorism
Pages: 850-874
Issue: 11
Volume: 41
Year: 2018
Month: 11
X-DOI: 10.1080/1057610X.2017.1352280
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1352280
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:11:p:850-874



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1348742_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Adam Lankford
Author-X-Name-First: Adam
Author-X-Name-Last: Lankford
Title: A Psychological Re-Examination of Mental Health Problems among the 9/11 Terrorists
Abstract: 
 More than 15 years have passed since the terrorist attacks of 11 September 2001, and a comprehensive re-examination of the 9/11 attackers is now warranted. Research on the psychology of terrorists has evolved dramatically, and there is also new information on some offenders. The present study provides the available psychological and psychiatric evidence on each of the 9/11 pilots, muscle hijackers, and thwarted hijackers who intended to participate in the “planes operation.” Overall, findings suggest that the 9/11 terrorists may have had significantly more mental health problems than previously assumed, and the leaders who planned 9/11 personally approved suicide attackers with prior histories of mental illness. By widely publicizing this information, security officials may be able to more effectively delegitimize suicide terrorism and reduce the number of individuals who would consider funding, supporting, or committing these deadly attacks.
Journal: Studies in Conflict & Terrorism
Pages: 875-898
Issue: 11
Volume: 41
Year: 2018
Month: 11
X-DOI: 10.1080/1057610X.2017.1348742
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1348742
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:11:p:875-898



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1348101_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Simon Perry
Author-X-Name-First: Simon
Author-X-Name-Last: Perry
Author-Name: Badi Hasisi
Author-X-Name-First: Badi
Author-X-Name-Last: Hasisi
Author-Name: Gali Perry
Author-X-Name-First: Gali
Author-X-Name-Last: Perry
Title: Who is the Lone Terrorist? A Study of Vehicle-Borne Attackers in Israel and the West Bank
Abstract: 
 Lone actor terrorism has become a significant challenge for Western democracies. Previous studies have failed to point out a comprehensive profile of lone terrorists, and suggested that examining more specific sub-groups of lone actors, sharing contextual factors or ideology, may produce such a profile. The current study examines the sub-group of vehicle-borne lone terrorists, who committed their attacks in Israel and the West Bank between January 2000 and March 2016. Based on confidential and open-source data, we find that general sociodemographic characteristics did not produce a unique profile of attackers. However, a deeper examination of behavioral factors preceding the attack yields common traits. Specifically, we find that previous experience—both in different forms of unlawful behavior and in training related to the attack method—was significantly related to a successful attack. Similarities in regards to the triggers for the attack and personal motivations also emerge, suggesting that while operating independently, lone actors are very much influenced by ongoing events. We conclude that focusing on a sub-group of lone attackers following a spatio-methodological-oriented approach contributes to the construction of a profile for lone terrorists, and discuss these findings in the context of mitigation.
Journal: Studies in Conflict & Terrorism
Pages: 899-913
Issue: 11
Volume: 41
Year: 2018
Month: 11
X-DOI: 10.1080/1057610X.2017.1348101
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1348101
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:11:p:899-913



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1348100_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Christopher Day
Author-X-Name-First: Christopher
Author-X-Name-Last: Day
Title: Civil War and Rebellion
Journal: Studies in Conflict & Terrorism
Pages: 914-930
Issue: 11
Volume: 41
Year: 2018
Month: 11
X-DOI: 10.1080/1057610X.2017.1348100
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1348100
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:11:p:914-930

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1361281_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel Byman
Author-X-Name-First: Daniel
Author-X-Name-Last: Byman
Title: How States Exploit Jihadist Foreign Fighters
Abstract: 
 Jihadist foreign fighters are frequently described as non-state actors whose prominence challenges the traditional, state-dominated international system and our understanding of it. In practice, however, foreign fighters rely heavily on the very states they reject. Some of the most important foreign fighter movements in the world today receive massive and explicit state support, while still others rely on states to tolerate their fund-raising, transit, recruitment, and other core activities. Yet the scope, scale, and nature of this reliance varies tremendously, as does its overall impact. To stop or at least limit these flows, it is vital to change the policies and capacities of these state backers.
Journal: Studies in Conflict & Terrorism
Pages: 931-945
Issue: 12
Volume: 41
Year: 2018
Month: 12
X-DOI: 10.1080/1057610X.2017.1361281
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1361281
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:12:p:931-945



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1361282_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andrew Barr
Author-X-Name-First: Andrew
Author-X-Name-Last: Barr
Author-Name: Alexandra Herfroy-Mischler
Author-X-Name-First: Alexandra
Author-X-Name-Last: Herfroy-Mischler
Title: ISIL's Execution Videos: Audience Segmentation and Terrorist Communication in the Digital Age
Abstract: 
 This article offers a bottom-up understanding of the media strategy employed by the Islamic State of Iraq and the Levant (ISIL) as it relates to the production and dissemination of its hostage execution videos. Through an empirical analysis of sixty-two videos of executions produced by ISIL in the year following its establishment as the “Islamic State” in 2014, this study examines the videos as a major component of ISIL's media strategy. Through these media products, ISIL seeks to spread a political message aimed at both local and global, ingroup and outgroup consumption through audience segmentation, while striving to influence both local and global audiences through the use and production of graphic violence. This article also discusses the strategy governing the production and release of ISIL's execution videos; how it relies on the global media to transmit its intertwined political and religious agenda in the digital media age.
Journal: Studies in Conflict & Terrorism
Pages: 946-967
Issue: 12
Volume: 41
Year: 2018
Month: 12
X-DOI: 10.1080/1057610X.2017.1361282
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1361282
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:12:p:946-967



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1365464_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Iwa Salami
Author-X-Name-First: Iwa
Author-X-Name-Last: Salami
Title: Terrorism Financing with Virtual Currencies: Can Regulatory Technology Solutions Combat This?
Abstract: 
 This article considers the terrorism financing risk associated with the growth of Financial Technology innovations and in particular, focuses on virtual currency products and services. The ease with which cross-border payments by virtual currencies are facilitated, the anonymity surrounding their usage, and their potential to be converted into the fiat financial system, make them ideal for terrorism financing and therefore calls for a coordinated global regulatory response. This article considers the extent of the risk of terrorism financing through virtual currencies in “high risk” States by focusing on countries that have been recently associated with terrorism activities. It assesses the robustness of their financial regulatory and law enforcement regimes in combating terrorism financing and considers the extent to which Regulatory Technology and its global standardization, can mitigate this risk.
Journal: Studies in Conflict & Terrorism
Pages: 968-989
Issue: 12
Volume: 41
Year: 2018
Month: 12
X-DOI: 10.1080/1057610X.2017.1365464
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1365464
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:12:p:968-989



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1366621_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anne Marie Baylouny
Author-X-Name-First: Anne Marie
Author-X-Name-Last: Baylouny
Author-Name: Creighton A. Mullins
Author-X-Name-First: Creighton A.
Author-X-Name-Last: Mullins
Title: Cash is King: Financial Sponsorship and Changing Priorities in the Syrian Civil War
Abstract: 
 The role of resources in war has been much debated. What happens when foreign patrons provide lavish amounts of cash to rebels, without mechanisms of accountability? This article analyzes three major sources of funding and their micro-level effects on insurgent-groups in the Syrian civil war. Recipients of funding demonstrated opportunism in actions, alliances, and ideologies, directly related to the funding source. Funders thus set the agenda of the war, promoting Islamist ideologies and regional over local issues. Private donors rivaled state sponsors, in what may be a harbinger of future globalization trends.
Journal: Studies in Conflict & Terrorism
Pages: 990-1010
Issue: 12
Volume: 41
Year: 2018
Month: 12
X-DOI: 10.1080/1057610X.2017.1366621
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1366621
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:12:p:990-1010

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1249773_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David McIlhatton
Author-X-Name-First: David
Author-X-Name-Last: McIlhatton
Author-Name: Rachel Monaghan
Author-X-Name-First: Rachel
Author-X-Name-Last: Monaghan
Title: Special Issue: Contemporary Issues and Innovation in Counterterrorism
Journal: Studies in Conflict & Terrorism
Pages: 77-78
Issue: 2
Volume: 41
Year: 2018
Month: 2
X-DOI: 10.1080/1057610X.2016.1249773
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1249773
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:2:p:77-78



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1249780_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nicholas Ryder
Author-X-Name-First: Nicholas
Author-X-Name-Last: Ryder
Title: Out with the Old and … In with the Old? A Critical Review of the Financial War on Terrorism on the Islamic State of Iraq and Levant
Abstract: 
 The aim of this article is to critically consider the effectiveness of the “Financial War on Terrorism” on the funding streams of the Islamic State of Iraq and Levant (ISIL). The article begins by identifying that the origins of the “Financial War on Terrorism” can be found in the international efforts to tackle money laundering. It then moves on to consider if the “Financial War on Terrorism” is able to tackle the funding streams of ISIL. The article concludes that the “Financial War on Terrorism” is no longer fit for the purpose to tackle the funding streams of ISIL.
Journal: Studies in Conflict & Terrorism
Pages: 79-95
Issue: 2
Volume: 41
Year: 2018
Month: 2
X-DOI: 10.1080/1057610X.2016.1249780
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1249780
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:2:p:79-95



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1249779_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Matt Qvortrup
Author-X-Name-First: Matt
Author-X-Name-Last: Qvortrup
Title: The Logic of Constitutional Engineering: Institutional Design and Counterterrorism from Aristotle to Arend Lijphart
Abstract: 
 Originally conceived by Aristotle and Thomas Hobbes, comparative constitutional engineering in its modern form is a relatively new field of political science. It is based on the premise that political behavior and policy outcomes can be affected and shaped by institutional design such as, above all, electoral systems. The article provides an overview of the empirical literature underlying this branch of institutional counterterrorism. The article presents the logic of constitutional engineering from its classical origins and especially through the work of Arend Lijphart. It is suggested that Lijphart provides a new paradigm in the sense employed by Thomas Kuhn. The article provides original research in support of this showing that the presence of consensus institutions has better explanatory value than most social factors.
Journal: Studies in Conflict & Terrorism
Pages: 96-108
Issue: 2
Volume: 41
Year: 2018
Month: 2
X-DOI: 10.1080/1057610X.2016.1249779
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1249779
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:2:p:96-108



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1249775_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Stefano Armenia
Author-X-Name-First: Stefano
Author-X-Name-Last: Armenia
Author-Name: Georgios Tsaples
Author-X-Name-First: Georgios
Author-X-Name-Last: Tsaples
Title: Individual Behavior as a Defense in the “War on Cyberterror”: A System Dynamics Approach
Abstract: 
 The problem of cyberterrorism, despite its contested nature, is an important area of research. Scholars agree that the most dangerous targets for such attacks are critical infrastructure and organizations that are vital to society due to their interconnectedness to the modern world and their increasing reliance on the cyber domain for their operations. Thus, their security and protection against cyberterrorism is of elevated importance. Given the lack of documented cases of cyberterrorism, the purpose of this article is to simulate the threat of a terrorist act on a critical infrastructure, using a computer virus and to investigate how the individual behavior of employees affects security.
Journal: Studies in Conflict & Terrorism
Pages: 109-132
Issue: 2
Volume: 41
Year: 2018
Month: 2
X-DOI: 10.1080/1057610X.2016.1249775
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1249775
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:2:p:109-132



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1249776_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David BaMaung
Author-X-Name-First: David
Author-X-Name-Last: BaMaung
Author-Name: David McIlhatton
Author-X-Name-First: David
Author-X-Name-Last: McIlhatton
Author-Name: Murdo MacDonald
Author-X-Name-First: Murdo
Author-X-Name-Last: MacDonald
Author-Name: Rona Beattie
Author-X-Name-First: Rona
Author-X-Name-Last: Beattie
Title: The Enemy Within? The Connection between Insider Threat and Terrorism
Abstract: 
 While the threat from terrorism has gained widespread acknowledgment over the last decade, the infiltration of organizations by “terrorist” insiders has not, and the potential dangers these individuals present has not been fully explored. There is a need to understand the wider aspects of insider threats, including motivations and attack methodologies, and to be able to demonstrate the potential devastation that could be caused. Organizations can attempt to mitigate the potential for insider infiltration by both terrorist and other hostile actors, and if such individuals were within an organization, there are procedures and strategies that can be employed to prevent exploitation of existing organizational vulnerabilities and detection of insiders. This article provides an informed and new approach to the connection between insider threat and terrorism.
Journal: Studies in Conflict & Terrorism
Pages: 133-150
Issue: 2
Volume: 41
Year: 2018
Month: 2
X-DOI: 10.1080/1057610X.2016.1249776
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1249776
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:2:p:133-150



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1249777_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joan Condell
Author-X-Name-First: Joan
Author-X-Name-Last: Condell
Author-Name: Priyanka Chaurasia
Author-X-Name-First: Priyanka
Author-X-Name-Last: Chaurasia
Author-Name: James Connolly
Author-X-Name-First: James
Author-X-Name-Last: Connolly
Author-Name: Patheepan Yogarajah
Author-X-Name-First: Patheepan
Author-X-Name-Last: Yogarajah
Author-Name: Girijesh Prasad
Author-X-Name-First: Girijesh
Author-X-Name-Last: Prasad
Author-Name: Rachel Monaghan
Author-X-Name-First: Rachel
Author-X-Name-Last: Monaghan
Title: Automatic Gait Recognition and its Potential Role in Counterterrorism
Abstract: 
 Closed-circuit television footage can be used to assemble an often-complex picture of an incident and aid in the identification of suspects after a crime or terrorist attack has occurred. For example, such footage allowed the police to not only identify the 7/7 London bombers but also to piece together the details of the bombers' movements prior to the attack. In the case of the London bombers little attempt was made to disguise their identities but where such identities are concealed it is possible to identify suspects based on other unique biometric characteristics such as the style of walk, referred to as gait. Gait feature–based individual identification has received increased attention from biometrics researchers. In this article, we propose a novel gait biometric methodology that could contribute to the counterterrorism effort and the identification of individuals involved in crime.
Journal: Studies in Conflict & Terrorism
Pages: 151-168
Issue: 2
Volume: 41
Year: 2018
Month: 2
X-DOI: 10.1080/1057610X.2016.1249777
File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1249777
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:2:p:151-168

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1283198_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Meirav Mishali-Ram
Author-X-Name-First: Meirav
Author-X-Name-Last: Mishali-Ram
Title: Foreign Fighters and Transnational Jihad in Syria
Abstract: 
 Foreign fighters arrive in Syria from across the Muslim world, yet the configuration of their countries of origin remains a puzzle. Examining alternative explanations for joining transnational jihad, the article draws insights from the cases of Tunisia and Saudi Arabia, two major countries of foreign fighters' origin, compared with Egypt, from where limited figures of volunteers have joined the Syrian war. The article shows that the sources of volunteering fighters may be well understood in combined terms of religious sentiments and national politics. Foreign fighters come largely from Muslim countries where restrained state–Islamists relations channel Islamic grievances to transnational arenas.
Journal: Studies in Conflict & Terrorism
Pages: 169-190
Issue: 3
Volume: 41
Year: 2018
Month: 3
X-DOI: 10.1080/1057610X.2017.1283198
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1283198
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:3:p:169-190



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1283197_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joas Wagemakers
Author-X-Name-First: Joas
Author-X-Name-Last: Wagemakers
Title: Jihadi-Salafism in Jordan and the Syrian Conflict: Divisions Overcome Unity
Abstract: 
 Over the last decade, a rift has emerged among Jihadi-salafis in Jordan between the “Zarqawiyyun”—who see Abu Mus‘ab al-Zarqawi as their model and concentrate on combat—and the “Maqdisiyyun”—who want more scholarly guidance, emphasize the establishment of an Islamic State and follow Abu Muhammad al-Maqdisi. The conflict in Syria, however, offered options for both: a jihad against a reviled regime and the possibility to set up an Islamic state. It thus had the potential to unite the “Zarqawiyyun” and the “Maqdisiyyun.” This article analyzes why this did not happen.
Journal: Studies in Conflict & Terrorism
Pages: 191-212
Issue: 3
Volume: 41
Year: 2018
Month: 3
X-DOI: 10.1080/1057610X.2017.1283197
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1283197
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:3:p:191-212



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1283195_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Isabel Woodford
Author-X-Name-First: Isabel
Author-X-Name-Last: Woodford
Author-Name: M. L. R. Smith
Author-X-Name-First: M. L. R.
Author-X-Name-Last: Smith
Title: The Political Economy of the Provos: Inside the Finances of the Provisional IRA—A Revision
Abstract: 
 Few academically rigorous accounts exist of the financial activities that sustained the rise of the Provisional Irish Republican Army (PIRA) during the Northern Ireland Troubles. Through a sustained methodology this study seeks to challenge some popular preconceptions and address omissions in the limited historical record. The article explores the organization's evolving financial sophistication by analyzing PIRA's acquisition of capital rather than its arms dealings. Using a new quantitative evaluation, this investigation confronts the prevailing understanding that Irish-American funds were of unrivaled significance to PIRA. It points to an array of domestic fund-raisers that collectively provided the overwhelming bulk of revenue. The study reveals also how PIRA developed an extensive reliance on criminal gangs for its expertise in illegal fund-raising, suggesting that moneymaking schemes were perceived as a necessary but unpopular by-product of the greater political objective. Finally, this article briefly explores how the British authorities sought to interdict PIRA's funding. While the general perception is that little was done to counteract PIRA's financing initiatives in the early phases of its violent campaign, this study, nevertheless, reveals that a subtle counterfinance initiative did take place in Belfast across the 1970s. Overall, the analysis enables a more rounded comprehension of the group's financial resilience.
Journal: Studies in Conflict & Terrorism
Pages: 213-240
Issue: 3
Volume: 41
Year: 2018
Month: 3
X-DOI: 10.1080/1057610X.2017.1283195
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1283195
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:3:p:213-240



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1283196_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anna Getmansky
Author-X-Name-First: Anna
Author-X-Name-Last: Getmansky
Author-Name: Tolga Sinmazdemir
Author-X-Name-First: Tolga
Author-X-Name-Last: Sinmazdemir
Title: Settling on Violence: Expansion of Israeli Outposts in the West Bank in Response to Terrorism
Abstract: 
 How does terrorism affect land control in intrastate conflicts? This article explores this question in the case of the Israeli–Palestinian conflict during the Second Intifada (2000–2005), and shows that Palestinian attacks led to an expansion of Israeli outposts in the disputed territories of the West Bank. Following suicide attacks, there is an increase in outposts in home districts of the perpetrators. The number of outposts also increases following deadly attacks against Israelis in West Bank districts where these attacks take place. These results suggest that Israeli settlers use outpost expansion as retaliation against Palestinian communities they perceive to be involved in violence, and this shifts territorial control against Palestinians.
Journal: Studies in Conflict & Terrorism
Pages: 241-259
Issue: 3
Volume: 41
Year: 2018
Month: 3
X-DOI: 10.1080/1057610X.2017.1283196
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1283196
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:3:p:241-259

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1290428_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gary LaFree
Author-X-Name-First: Gary
Author-X-Name-Last: LaFree
Author-Name: Min Xie
Author-X-Name-First: Min
Author-X-Name-Last: Xie
Author-Name: Aila M. Matanock
Author-X-Name-First: Aila M.
Author-X-Name-Last: Matanock
Title: The Contagious Diffusion of Worldwide Terrorism: Is It Less Common Than We Might Think?
Abstract: 
 Studies of the contagious spread of insurgency and conflict across national boundaries has generated a good deal of empirical research over time. While the contagious spread of terrorism has also been a policy concern, few empirical studies exist on the extent to which terrorism spreads contagiously. This article uses methods developed by criminologists to study the spread of crime to examine the worldwide diffusion of terrorism from 1970 to 2013. We distinguish between contagious increases (based on shared borders) and non-contagious increases (where no borders are shared). We define the “domino effect” as a particular type of contagious diffusion where high levels of terrorism spread to an adjoining country but also remain high in the host country. Our analysis shows that both contagious and non-contagious diffusion has been rare over the past 43 years, non-contagious diffusion is more common than contagious, and when contagious diffusion occurs, it is very likely to occur according to the domino effect.
Journal: Studies in Conflict & Terrorism
Pages: 261-280
Issue: 4
Volume: 41
Year: 2018
Month: 4
X-DOI: 10.1080/1057610X.2017.1290428
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1290428
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:4:p:261-280



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1284447_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: William Adair Davies
Author-X-Name-First: William Adair
Author-X-Name-Last: Davies
Title: Counterterrorism Effectiveness to Jihadists in Western Europe and the United States: We Are Losing the War on Terror
Abstract: 
 A comparative analysis of Islamic extremism post-9/11 to 2015 and the effectiveness of the counterterrorism (CT) authorities to counter it in both Western Europe and the United States was conducted. Four measures of effectiveness revealed that 2010–2015 saw a gradual increase in jihadi attacks and in casualties emanating from these attacks, and more jihadists, foreign fighters, and material supporters. Additionally, 2013–2015 saw a 22 percent reduction both in Western Europe and the U.S. CT agencies' ability to counter Islamic extremism. We are losing the War on Terror and our citizens are less safe than they were six years ago. Further analysis revealed that singleton jihadists: (1) were much harder than group-based jihadists to uncover, (2) have been increasing since 2009, and (3) have generated over 70 percent of all jihadi violence. Finally, numerous similarities exist between Western Europe and the United States with respect to jihadism in their homelands and their respective CT effectiveness, indicating close cross-Atlantic CT collaboration since 9/11. This in-depth analysis provides essential threat/hazard information to security, law enforcement, intelligence, and policymaking personnel and the greater homeland security communities.
Journal: Studies in Conflict & Terrorism
Pages: 281-296
Issue: 4
Volume: 41
Year: 2018
Month: 4
X-DOI: 10.1080/1057610X.2017.1284447
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1284447
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:4:p:281-296



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1283199_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Or Honig
Author-X-Name-First: Or
Author-X-Name-Last: Honig
Author-Name: Ariel Reichard
Author-X-Name-First: Ariel
Author-X-Name-Last: Reichard
Title: Evidence-Fabricating in Asymmetric Conflicts: How Weak Actors Prove False Propaganda Narratives
Abstract: 
 As part of their common efforts to undermine public support for their militarily-stronger adversaries' war efforts, insurgents and other militarily weak actors often accuse governments of fighting in a brutal manner and of committing brutal acts such as deliberately targeting innocent civilians. While sometimes there is sufficient evidence to support this claim of the government's deliberate brutality, other times militarily-weak actors will lack sufficient evidence to support this allegation. In such situation of lack of evidence, instead of making only those minimal allegations which can still be support by existing available facts, some weak actors decide nevertheless to make unsubstantiated claims and resort to fabricating the necessary evidence. This behavior presents a challenge not only for many counterinsurgent governments but also for the larger international community (most notably by diverting attention away from real atrocities). We identify some of the most common evidence-forging techniques recently employed by weak actors designed to create the factual basis to support of their chosen (often false) narratives of government brutality. The study also discusses some implications for international actors to prevent rewarding faking of atrocities.
Journal: Studies in Conflict & Terrorism
Pages: 297-318
Issue: 4
Volume: 41
Year: 2018
Month: 4
X-DOI: 10.1080/1057610X.2017.1283199
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1283199
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:4:p:297-318



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1284448_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Pamir H. Sahill
Author-X-Name-First: Pamir H.
Author-X-Name-Last: Sahill
Title: The Terror Speaks: Inside Pakistan's Terrorism Discourse and National Action Plan
Abstract: 
 This article, employing a poststructuralist Critical Discourse Analysis, reveals cracks, discrepancies, and inconsistencies in Pakistan's discourse on terrorism and practice. I argue that Pakistan continuously constructs a “monstrous enemy” and magnifies it in a way that conceals alternative representations of reality that could show that the state, by presenting itself as a victim of terrorism, is using phenomena of political violence to serve its political objectives inside and outside the boundaries of the state. The article argues that after a militant attack on a school in northwest Pakistan, critical, liberal, and dissenting narratives mingled with the dominant state discourse in a fashion that strengthen illiberal practices in the country, thus undermining the ideals of democracy.
Journal: Studies in Conflict & Terrorism
Pages: 319-337
Issue: 4
Volume: 41
Year: 2018
Month: 4
X-DOI: 10.1080/1057610X.2017.1284448
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1284448
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:4:p:319-337

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1314653_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Eran Shor
Author-X-Name-First: Eran
Author-X-Name-Last: Shor
Author-Name: Leonardo Baccini
Author-X-Name-First: Leonardo
Author-X-Name-Last: Baccini
Author-Name: Chi-Ting Tsai
Author-X-Name-First: Chi-Ting
Author-X-Name-Last: Tsai
Author-Name: Tai-Ho Lin
Author-X-Name-First: Tai-Ho
Author-X-Name-Last: Lin
Author-Name: Titus C. Chen
Author-X-Name-First: Titus C.
Author-X-Name-Last: Chen
Title: Counterterrorist Legislation and Respect for Civil Liberties: An Inevitable Collision?
Abstract: 
 The literature on counterterrorist measures often emphasizes the potential harmful effects of such measures on human rights and civil liberties. While recent research has examined the effects of counterterrorist legislation on the violation of physical integrity rights (e.g., torture and extrajudicial killings), no quantitative cross-national study has looked at the consequences for civil liberties. Still, case studies in a variety of countries suggest that counterterrorist legislation indeed leads to various infringements of liberties such as the freedoms of expression, religion, assembly, and movement. We conduct a cross-national time series analysis of counterterrorist legislation and consequent repression of civil liberties for the years 1976–2009. We find that the effects of legislation vary by levels of initial repression. Legislation has a negative effect on respect for civil liberties in countries with moderate levels of repression. However, this effect diminishes in non-repressive countries and reverses in countries with high levels of repression.
Journal: Studies in Conflict & Terrorism
Pages: 339-364
Issue: 5
Volume: 41
Year: 2018
Month: 5
X-DOI: 10.1080/1057610X.2017.1314653
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1314653
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:5:p:339-364



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1290429_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael J. Suttmoeller
Author-X-Name-First: Michael J.
Author-X-Name-Last: Suttmoeller
Author-Name: Steven M. Chermak
Author-X-Name-First: Steven M.
Author-X-Name-Last: Chermak
Author-Name: Joshua D. Freilich
Author-X-Name-First: Joshua D.
Author-X-Name-Last: Freilich
Title: Is More Violent Better? The Impact of Group Participation in Violence on Group Longevity for Far-Right Extremist Groups
Abstract: 
 Recent research has begun to explore the causes of organizational death for domestic far-right extremist groups. An important aspect that has not been examined is whether or not a group's participation in violence influences its longevity. This study addresses this gap in the literature by examining over 400 domestic far-right extremist groups that persisted for varying lengths of time to determine whether or not group participation in violence influences their longevity. Additionally, this study also examines whether a variety of external (environmental) and internal correlates influence the longevity of violent and nonviolent groups differently.
Journal: Studies in Conflict & Terrorism
Pages: 365-387
Issue: 5
Volume: 41
Year: 2018
Month: 5
X-DOI: 10.1080/1057610X.2017.1290429
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1290429
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:5:p:365-387



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1300758_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Annegret Kuhn
Author-X-Name-First: Annegret
Author-X-Name-Last: Kuhn
Title: Explaining Ethnic Mobilization against Resource Extraction: How Collective Action Frames, Motives, and Opportunities Interact
Abstract: 
 The causal mechanisms linking natural resources and ethnic mobilization remain highly contested in the literature. Using novel data generated from interviews with ethnic representatives in Bolivia, the article addresses this research gap by combining a most similar systems design comparison of two local cases with a deviant case analysis. Results indicate that while resource-related grievances are a necessary motive for contention in terms of resource extraction, they have to concur with opportunity factors in the sense of strong local organizational capacities. Both explanatory conditions are, moreover, necessarily embedded in contentious collective action frames of a noncompliant and discriminatory state.
Journal: Studies in Conflict & Terrorism
Pages: 388-407
Issue: 5
Volume: 41
Year: 2018
Month: 5
X-DOI: 10.1080/1057610X.2017.1300758
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1300758
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:5:p:388-407



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1300757_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mohammad E. A. Alqattan
Author-X-Name-First: Mohammad E. A.
Author-X-Name-Last: Alqattan
Author-Name: Tim Gray
Author-X-Name-First: Tim
Author-X-Name-Last: Gray
Author-Name: Selina M. Stead
Author-X-Name-First: Selina M.
Author-X-Name-Last: Stead
Title: The Forgotten Pirates: Iraqi and Iranian Pirates in the Arabian Gulf Who Have Never Been Reported to the International Maritime Bureau
Abstract: 
 If piracy attacks are unreported, a misleading impression is given of piracy situations in regions where there could be serious consequences for ships traveling in waterways on the assumption that they are piracy-free waters. However, sometimes not reporting piracy attacks could help to contain piracy before it expands, because reporting can lead to the media over-focusing on piratical incidents, and armed guards being deployed on ships, which causes pirates to use heavier arms and escalates the level of conflict. Piracy that took place during 2003–2012 in the north and the center of the Arabian Gulf has never been reported to the International Maritime Bureau. The present article examines this case of unreporting, and discusses its causes and consequences.
Journal: Studies in Conflict & Terrorism
Pages: 408-417
Issue: 5
Volume: 41
Year: 2018
Month: 5
X-DOI: 10.1080/1057610X.2017.1300757
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1300757
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:5:p:408-417

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1325649_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marco Nilsson
Author-X-Name-First: Marco
Author-X-Name-Last: Nilsson
Title: Interviewing Jihadists: On the Importance of Drinking Tea and Other Methodological Considerations
Abstract: 
 The field of terrorism research has arguably long been characterized by a separation of the scholars from their subject of inquiry. Interviews can be used to bridge this chasm, but making contact with potential interviewees, conducting interviews, and analyzing the data pose unique challenges when conducting research into jihadists, especially active ones. This article focuses on the author's experience of interviewing both former and active jihadi foreign fighters. It is specifically intended to contribute to a better methodological understanding of conducting first-hand empirical research into jihadi foreign fighters and builds on fieldwork conducted in Sweden, Iraq, and Lebanon.
Journal: Studies in Conflict & Terrorism
Pages: 419-432
Issue: 6
Volume: 41
Year: 2018
Month: 6
X-DOI: 10.1080/1057610X.2017.1325649
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1325649
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:6:p:419-432



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1323467_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Debra Smith
Author-X-Name-First: Debra
Author-X-Name-Last: Smith
Title: So How Do You Feel about That? Talking with Provos about Emotion
Abstract: 
 Participation in political violence draws on identities and world views that have been shaped and influenced by emotion. This article uses data drawn from interviews conducted with 15 former members of the Provisional Irish Republican Army to highlight some of the ways that emotion is intertwined with decisions to use violence in pursuit of a substate political goal. Six themes emerge that help to demonstrate how participant's emotional lives have helped to build the identities, beliefs, and motivations that have led to violent acts. The study illuminates how the experience, elicitation, and management of emotions played an integral role in the participant's trajectory towards violence.
Journal: Studies in Conflict & Terrorism
Pages: 433-449
Issue: 6
Volume: 41
Year: 2018
Month: 6
X-DOI: 10.1080/1057610X.2017.1323467
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1323467
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:6:p:433-449



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1323469_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lukáš Tichý
Author-X-Name-First: Lukáš
Author-X-Name-Last: Tichý
Author-Name: Jan Eichler
Author-X-Name-First: Jan
Author-X-Name-Last: Eichler
Title: Terrorist Attacks on the Energy Sector: The Case of Al Qaeda and the Islamic State
Abstract: 
 The article focuses on the attitudes of two militant Islamist groups, Al Qaeda and the Islamic State, toward the issue of terrorist attacks in the energy sector. The main aim of the article is both to analyze the importance of attacks on energy infrastructure for the strategies of these two organizations, and to describe specific examples and manifestations of terrorist activities from the side of Al Qaeda and the Islamic State with regard to the energy sector in the Middle East and North Africa. The article is based on the concept of terrorist attacks on the energy sector.
Journal: Studies in Conflict & Terrorism
Pages: 450-473
Issue: 6
Volume: 41
Year: 2018
Month: 6
X-DOI: 10.1080/1057610X.2017.1323469
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1323469
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:6:p:450-473



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1323468_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gaetano Joe Ilardi
Author-X-Name-First: Gaetano Joe
Author-X-Name-Last: Ilardi
Title: A Homegrown Terrorist Cell: Observations of a Police Undercover Operative
Abstract: 
 On 10 October 2004, an improvised explosive device was detonated in bush land in the vicinity of Mount Disappointment on the outskirts of Melbourne, Australia. A relatively small device, it was assembled and detonated by one of the two men present, a Victoria Police officer and undercover operative known as Security Intelligence Officer 39, or SIO39. The other person was the leader of a homegrown terrorist cell, who in the months preceding had assembled a group of a dozen individuals who became the subject of Australia's largest counterterrorism investigation known as Operation Pendennis. This article, which is based on in-depth interviews with SIO39, provides unique insights into a range of activities and behaviors peculiar to this cohort. Commencing his association with the group early in its development, SIO39 was privy to some of its key evolutionary stages, from a collection of individuals meeting more or less in the open, to a clandestine body that clearly harbored terrorist intent and undertook a number of overt acts to advance its violent objectives.
Journal: Studies in Conflict & Terrorism
Pages: 474-490
Issue: 6
Volume: 41
Year: 2018
Month: 6
X-DOI: 10.1080/1057610X.2017.1323468
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1323468
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:6:p:474-490

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1311101_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Javier Argomaniz
Author-X-Name-First: Javier
Author-X-Name-Last: Argomaniz
Author-Name: Orla Lynch
Author-X-Name-First: Orla
Author-X-Name-Last: Lynch
Title: Introduction to the Special Issue: The Complexity of Terrorism—Victims, Perpetrators and Radicalization
Abstract: 
 This special issue examines the complex relationship between radicalization, victimhood. and political violence. The interrelatedness of victims and perpetrators has been long recognized in the fields of criminology and victimology but it is has been often ignored in the case of terrorism and political violence. The key aim of this issue therefore is to assist in enhancing our understanding of this interrelatedness with a particular focus on the relevance of narratives, roles, and identities of victimhood for both the victims and perpetrators. A second, more policy-relevant dimension is to examine the role of victims and perpetrators in the prevention of terrorism and political violence.
Journal: Studies in Conflict & Terrorism
Pages: 491-506
Issue: 7
Volume: 41
Year: 2018
Month: 7
X-DOI: 10.1080/1057610X.2017.1311101
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1311101
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:7:p:491-506



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1311102_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Carmel Joyce
Author-X-Name-First: Carmel
Author-X-Name-Last: Joyce
Author-Name: Orla Lynch
Author-X-Name-First: Orla
Author-X-Name-Last: Lynch
Title: The Construction and Mobilization of Collective Victimhood by Political Ex-Prisoners in Northern Ireland
Abstract: 
 This article attempts to challenge binary notions of “victim” and “perpetrator” categories by taking into account the complex interaction of actors who both participate in, and are impacted by, terrorist violence. Semi-structured interviews were conducted with self-identified Republican (n = 25) and Loyalist (n = 27) ex-prisoners in Northern Ireland who are currently involved in self-described peace initiatives. Results suggest that political ex-prisoners evoke notions of collective victimization as a vehicle to bridge their transition from “paramilitary” to “peace maker” in this context. The implications are discussed in terms of understanding the functionality of collective victimhood for those who controversially adopt the label.
Journal: Studies in Conflict & Terrorism
Pages: 507-522
Issue: 7
Volume: 41
Year: 2018
Month: 7
X-DOI: 10.1080/1057610X.2017.1311102
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1311102
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:7:p:507-522



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1311107_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Douglas Weeks
Author-X-Name-First: Douglas
Author-X-Name-Last: Weeks
Title: Doing Derad: An Analysis of the U.K. System
Abstract: 
 Since 2005, Britain has utilized a handful of interventionists to engage with those at risk of violent extremism and those convicted of terrorism related charges in order to manage its risk of terrorism. The goal of the interventionists is to “deradicalize” those that they interact with to facilitate their reintegration in society. This article discusses the mentoring environment in the United Kingdom, how intervention providers establish their credibility with individuals, communities, and government, some of the structural safeguards and their impact on mentoring, how success is conceived, and the absence of reporting.
Journal: Studies in Conflict & Terrorism
Pages: 523-540
Issue: 7
Volume: 41
Year: 2018
Month: 7
X-DOI: 10.1080/1057610X.2017.1311107
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1311107
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:7:p:523-540



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1311110_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Antony Pemberton
Author-X-Name-First: Antony
Author-X-Name-Last: Pemberton
Author-Name: Pauline G. M. Aarten
Author-X-Name-First: Pauline G. M.
Author-X-Name-Last: Aarten
Title: Narrative in the Study of Victimological Processes in Terrorism and Political Violence: An Initial Exploration
Abstract: 
 Narrative is intimately connected to victimization and radicalization. Trouble, the notion that drives narrative, is often coupled with victimization: the experience of suffering intentional harm. This experience can play a turning point in the stories that radicals construct about their own lives and thus play a role in their pathway to radicalization. In this article, three main themes of narrative will be further explored in relation to victimization and radicalization: identity, emotions, and culture. Central in this article is the discussion on how narrative can contribute to theory and research into victimological processes in radicalization, while offering new means to further develop key constructs.
Journal: Studies in Conflict & Terrorism
Pages: 541-556
Issue: 7
Volume: 41
Year: 2018
Month: 7
X-DOI: 10.1080/1057610X.2017.1311110
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1311110
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:7:p:541-556



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1311111_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Pauline G. M. Aarten
Author-X-Name-First: Pauline G. M.
Author-X-Name-Last: Aarten
Author-Name: Eva Mulder
Author-X-Name-First: Eva
Author-X-Name-Last: Mulder
Author-Name: Antony Pemberton
Author-X-Name-First: Antony
Author-X-Name-Last: Pemberton
Title: The Narrative of Victimization and Deradicalization: An Expert View
Abstract: 
 While the study of victimology and radicalization mainly focuses on those who suffered from terrorist attacks, this article explores the role of victimological processes in deradicalization. Experts from different international deradicalization initiatives were interviewed. Using the narrative framework with its three key concepts—identity, emotion, and culture—as set forth by Pemberton and Aarten in this issue, the relationship between victimization and deradicalization is more thoroughly examined. Key findings include the delicacy of the term “victim” in radicals' narrative identity, the power of narrative in triggering and transmitting emotions, and the importance of a former radical that acknowledges the narratives of the radical and offers alternative narratives to their radicalized ideologies.
Journal: Studies in Conflict & Terrorism
Pages: 557-572
Issue: 7
Volume: 41
Year: 2018
Month: 7
X-DOI: 10.1080/1057610X.2017.1311111
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1311111
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:7:p:557-572



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1311113_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Javier Argomaniz
Author-X-Name-First: Javier
Author-X-Name-Last: Argomaniz
Title: A Battle of Narratives: Spanish Victims Organizations International Action to Delegitimize Terrorism and Political Violence
Abstract: 
 Spanish victims groups have provided a visible contribution to European terrorist violence prevention efforts. Instrumental and knowledge transfer motivations partly explain this interest but a separate driver that requires more attention is their opposition to the international narrative that legitimizes Euskadi Ta Askatasuna's violence promulgated by the political movement of the Basque Patriotic Left. This has resulted in a “battle of narratives” played out at the international level in order to shape the future of Basque politics where victims are challenging a discourse that frames the past in a way that justifies terrorism and that leaves the door open to a future return to violence.
Journal: Studies in Conflict & Terrorism
Pages: 573-588
Issue: 7
Volume: 41
Year: 2018
Month: 7
X-DOI: 10.1080/1057610X.2017.1311113
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1311113
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:7:p:573-588



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1311114_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Max Taylor
Author-X-Name-First: Max
Author-X-Name-Last: Taylor
Title: Rebalancing the Agenda
Abstract: 
 In welcoming the recognition that victimization through terrorism is a significant factor in our thinking about terrorism, a case is made for greater engagement of Civil Society, through nongovernmental organizations, in the development of policy in this area. It argues for a rebalancing of policy toward the “passive victims” of terrorist activity, and a recognition that the lived experience of harm done by terrorism is not mitigated by either context or alleged justification. A case is also made for using the study of victimization as a focus for interdisciplinary work on terrorism, recognizing that expertise in this area lies both within and outwith government.
Journal: Studies in Conflict & Terrorism
Pages: 589-593
Issue: 7
Volume: 41
Year: 2018
Month: 7
X-DOI: 10.1080/1057610X.2017.1311114
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1311114
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:7:p:589-593



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1369656_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: The Editors
Title: Correction to: Argomaniz, A Battle of Narratives: Spanish Victims Organizations International Action to Delegitimize Terrorism and Political Violence
Journal: Studies in Conflict & Terrorism
Pages: 594-594
Issue: 7
Volume: 41
Year: 2018
Month: 7
X-DOI: 10.1080/1057610X.2017.1369656
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1369656
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:7:p:594-594

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1338053_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Temitope B. Oriola
Author-X-Name-First: Temitope B.
Author-X-Name-Last: Oriola
Author-Name: Olabanji Akinola
Author-X-Name-First: Olabanji
Author-X-Name-Last: Akinola
Title: Ideational Dimensions of the Boko Haram Phenomenon
Abstract: 
 This article draws on frame theory to explore the ideational dimensions of the Boko Haram phenomenon. Speech acts by Boko Haram's leaders are analyzed to interrogate how the organization conducts its three core framing tasks. The article argues that Boko Haram deploys three major master frames. These are the return to true Islam frame, the injustice frame, and the war against the infidel frame. Boko Haram's framing strategies draw on the social conditions and cultural reservoir in its domain of operations. This includes antipathy toward the West and Western education, patriarchal beliefs about gender roles and the “place” of women, and the contours of a widely popular Islamic movement that emerged in the early 1800s. Boko Haram's framing approach is also shaped by state repression and the post-9/11 cosmic war discourse. Overall, the article contributes to the limited literature on nonstructural aspects of Boko Haram's terrorist activities.
Journal: Studies in Conflict & Terrorism
Pages: 595-618
Issue: 8
Volume: 41
Year: 2018
Month: 8
X-DOI: 10.1080/1057610X.2017.1338053
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1338053
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:8:p:595-618



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1338055_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel Kirkpatrick
Author-X-Name-First: Daniel
Author-X-Name-Last: Kirkpatrick
Title: Why Negotiate When You Can Criminalize? Lessons for Conflict Transformation from Northern Ireland and South Africa
Abstract: 
 Research on negotiating with criminalized actors generally assumes the criminal label as a given, neglecting the significance of criminalization itself. This article addresses this gap arguing that the processes of criminalization and decriminalization embody important incentive structures affecting peace negotiations. Specifically, for conflict transformation to effectively occur, criminalization needs to be orientated away from a criminalization of actors and on to specific acts to legitimize nonviolent political expression and negotiations. These arguments will be advanced through a comparative study of Northern Ireland and South Africa, adopting a conflict transformation framework, and drawing on original interviews and archival material.
Journal: Studies in Conflict & Terrorism
Pages: 619-637
Issue: 8
Volume: 41
Year: 2018
Month: 8
X-DOI: 10.1080/1057610X.2017.1338055
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1338055
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:8:p:619-637



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1338052_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Susan Virginia Norman
Author-X-Name-First: Susan Virginia
Author-X-Name-Last: Norman
Title: Narcotization as Security Dilemma: The FARC and Drug Trade in Colombia
Abstract: 
 This article addresses the relationship between the Revolutionary Armed Forces of Colombia (FARC) and the cocaine trade in Colombia, and implications for the FARC's complete demobilization under the 2016 peace agreement. The article identifies two phases of FARC interaction with drug markets. During the regulation phase (1982–1991), the FARC regulated the coca economy and charged protection rents. During vertical integration (1991–present), the FARC directly participated in drug markets. Contrary to conventional approaches, the article adopts the concept of the security dilemma to argue that FARC integration in drug markets was a strategic response to threats from paramilitaries and narcotics traffickers.
Journal: Studies in Conflict & Terrorism
Pages: 638-659
Issue: 8
Volume: 41
Year: 2018
Month: 8
X-DOI: 10.1080/1057610X.2017.1338052
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1338052
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:8:p:638-659



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1338051_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daphna Canetti
Author-X-Name-First: Daphna
Author-X-Name-Last: Canetti
Author-Name: Sivan Hirsch-Hoefler
Author-X-Name-First: Sivan
Author-X-Name-Last: Hirsch-Hoefler
Author-Name: Carmit Rapaport
Author-X-Name-First: Carmit
Author-X-Name-Last: Rapaport
Author-Name: Robert D. Lowe
Author-X-Name-First: Robert D.
Author-X-Name-Last: Lowe
Author-Name: Orla T. Muldoon
Author-X-Name-First: Orla T.
Author-X-Name-Last: Muldoon
Title: Psychological Barriers to a Peaceful Resolution: Longitudinal Evidence from the Middle East and Northern Ireland
Abstract: 
 Does individual-level exposure to political violence prompt conciliatory attitudes? Does the answer vary by phase of conflict? The study uses longitudinal primary datasets to test the hypothesis that conflict-related experiences impact conciliation. Data were collected from Israeli Jews, Palestinians, and Protestants and Catholics in Northern Ireland. Across both contexts, and among both parties to each conflict, psychological distress and threat perceptions had a polarizing effect on conciliatory preferences. The study highlights that experiences of political violence are potentially a crucial source of psychological distress, and consequently, a continuing barrier to peace. This has implications in peacemaking, implying that alongside removing the real threat of violence, peacemakers must also work toward the social and political inclusion of those most affected by previous violence.
Journal: Studies in Conflict & Terrorism
Pages: 660-676
Issue: 8
Volume: 41
Year: 2018
Month: 8
X-DOI: 10.1080/1057610X.2017.1338051
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1338051
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:8:p:660-676

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1338414_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Moran Yarchi
Author-X-Name-First: Moran
Author-X-Name-Last: Yarchi
Title: Two Stories for Two Nations: Public Diplomacy in the Israeli–Palestinian Conflict
Abstract: 
 A substantial part of asymmetric conflicts is the “image war” that takes place in the foreign media. This study examines the circumstances that explain the degree to which political actors successfully promote their preferred frames regarding the conflict in which they are involved to the foreign press. The study examines Israel and the Palestinians’ ability to promote their messages in various events over the last decade. Seven factors were examined, divided into three groups: focal event factors, political context factors, and message context factors. Separate examination of each predictor, followed by analysis of their shared effect, reveals that most factors have an impact on how successful political actors are at promoting their preferred frames to the foreign press. Our findings suggests that the media place greater emphasis on focal event factors when covering conflicts, and that events have a greater impact than cultural assumptions in terms of how foreign media frame news stories.
Journal: Studies in Conflict & Terrorism
Pages: 677-695
Issue: 9
Volume: 41
Year: 2018
Month: 9
X-DOI: 10.1080/1057610X.2017.1338414
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1338414
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:9:p:677-695



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1338054_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alon Burstein
Author-X-Name-First: Alon
Author-X-Name-Last: Burstein
Title: Ideological Rigidity and Flexibility of Secular and Religious Terror Groups: The Case of the Palestine Liberation Organization and the Palestinian Hamas
Abstract: 
 This article explores the ideological rigidity of secular and religious terror groups. Analyzing leaflets disseminated by two Palestinian groups during the First Intifada, it examines if and how each shifted its identity and goals in response to repression, political shifts, or resource changes. The results suggest that while similar catalysts led to ideological reformation among the secular and the religious group, the extent of ideological change within the religious group was more limited. The article argues for the need to disaggregate ideological analysis further in order to identify more subtle shifts, alterations, and omissions, in the positions held by religious terror groups, moving past the exploration of if such changes exist in ideological templates and instead focusing on the extent and type of alterations the different groups allow.
Journal: Studies in Conflict & Terrorism
Pages: 696-721
Issue: 9
Volume: 41
Year: 2018
Month: 9
X-DOI: 10.1080/1057610X.2017.1338054
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1338054
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:9:p:696-721



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1341825_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Christina Cliff
Author-X-Name-First: Christina
Author-X-Name-Last: Cliff
Title: The Coming Genocide? Burundi's Past, Present, and Potentially Deadly Future
Abstract: 
 The Great Lakes region of Africa is the most conflict-prone region of the world and one current concern is political violence in Burundi. This research investigates whether Burundi is on the precipice of a genocide. Burundi's weak democratic norms, genocidal history, and the impact of contagion and diffusion of violence in the region provide a number of the conditions that could contribute to a genocide. This research investigates the past and present conflict variables of the Great Lakes region with a focus on Burundi and assesses the potential that the ongoing political violence in Burundi will lead to genocide.
Journal: Studies in Conflict & Terrorism
Pages: 722-735
Issue: 9
Volume: 41
Year: 2018
Month: 9
X-DOI: 10.1080/1057610X.2017.1341825
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1341825
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:9:p:722-735



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1338057_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Abdullah bin Khaled al-Saud
Author-X-Name-First: Abdullah
Author-X-Name-Last: bin Khaled al-Saud
Title: The Spiritual Teacher and His Truants: The Influence and Relevance of Abu Mohammad al-Maqdisi
Abstract: 
 Abu Mohammad al-Maqdisi is one of the most important spiritual fathers of the ideology and movement that has come to be known as Salafi-jihadism. Based on primary source materials produced by al-Maqdisi and other important relevant actors at different times and places, this article shows how he developed the ideas that have influenced his disciples and protégés, most prominently Abu Mus'ab al-Zarqawi, the founder of Al Qaeda in Iraq and “godfather” of the Islamic State, and Turki al-Binali, the Islamic State's current Grand Mufti. It also explains how and why, in later years, his disciples turned against him and, despite his repeated efforts, refused to allow him to play the role of the “critical friend,” much less regain control of the movement. The article seeks to expose the intra-jihadist frictions and debates involving al-Maqdisi during different times and contexts, especially the more recent ones between him and Islamic State of Iraq and the Levant. Indeed, it becomes obvious how al-Maqdisi has been trying to regain his lost influence and relevance among the most radical strands within his chosen movement for years. What this shows is that, amidst the fast-changing environment in which Salafi-jihadism has evolved, praxis trumps theory, and a reputation of steadfastness, zealousness, and unwavering convictions matter more to prospective radicals than a reputation of religious knowledge and scholarship.
Journal: Studies in Conflict & Terrorism
Pages: 736-754
Issue: 9
Volume: 41
Year: 2018
Month: 9
X-DOI: 10.1080/1057610X.2017.1338057
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1338057
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:41:y:2018:i:9:p:736-754

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1513684_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Maura Conway
Author-X-Name-First: Maura
Author-X-Name-Last: Conway
Author-Name: Stuart Macdonald
Author-X-Name-First: Stuart
Author-X-Name-Last: Macdonald
Title: Introduction to the Special Issue: Islamic State’s Online Activity and Responses, 2014–2017
Journal: Studies in Conflict & Terrorism
Pages: 1-4
Issue: 1-2
Volume: 42
Year: 2019
Month: 2
X-DOI: 10.1080/1057610X.2018.1513684
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1513684
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:1-2:p:1-4



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1513689_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Maxime Bérubé
Author-X-Name-First: Maxime
Author-X-Name-Last: Bérubé
Author-Name: Benoit Dupont
Author-X-Name-First: Benoit
Author-X-Name-Last: Dupont
Title: Mujahideen Mobilization: Examining the Evolution of the Global Jihadist Movement’s Communicative Action Repertoire
Abstract: 
 Drawing on Tilly’s notion of “repertoire of action,” this article shows how the evolution of the global jihadist movement’s communicative action repertoire has increased the potential resonance of its discourse. It foresees the construction of the global jihadist movement’s discourse of mobilization as the result of the evolution of its network of actors, the context in which its communications are undertaken, and its adaptation to new communication technologies. Accordingly, it argues that the decentralization of the global jihadist movement has led to a widening of its communicative action repertoire and a diversification of its discourse offering.
Journal: Studies in Conflict & Terrorism
Pages: 5-24
Issue: 1-2
Volume: 42
Year: 2019
Month: 2
X-DOI: 10.1080/1057610X.2018.1513689
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1513689
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:1-2:p:5-24



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1513692_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gunnar J. Weimann
Author-X-Name-First: Gunnar J.
Author-X-Name-Last: Weimann
Title: Competition and Innovation in a Hostile Environment: How Jabhat Al-Nusra and Islamic State Moved to Twitter in 2013–2014
Abstract: 
 Social media offer unprecedented opportunities to terrorist groups to spread their message and target specific audiences for indoctrination and recruitment. In 2013 and 2014, social media, in particular Twitter, overtook Internet forums as preferred space for jihadist propaganda. This article looks into Arabic statements by Jabhat al-Nusra, Islamic State and jihadist forum administrators and online activists to argue that, beside the easier use of social media and disruption and infiltration of the forums, the conflict between the jihadist groups accelerated the migration to social media and the building of a presence on Twitter that provided relative resilience to suspensions.
Journal: Studies in Conflict & Terrorism
Pages: 25-42
Issue: 1-2
Volume: 42
Year: 2019
Month: 2
X-DOI: 10.1080/1057610X.2018.1513692
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1513692
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:1-2:p:25-42



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1513691_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Imogen Richards
Author-X-Name-First: Imogen
Author-X-Name-Last: Richards
Title: A Dialectical Approach to Online Propaganda: Australia’s United Patriots Front, Right-Wing Politics, and Islamic State
Abstract: 
 This article examines how the United Patriots Front (UPF), an Australian far-right organization, has communicated its ideology with reference to right-wing politics in Australia, Western Europe, and the United States, and through allusions to Islamic State. The investigation uses critical discourse and documentary analysis and a framework derived from the theory of Pierre Bourdieu to analyze textual and audiovisual postings on UPF Facebook pages, YouTube channels, and Twitter accounts. Relevant to the discussion are Bourdieu’s interdependent theories on “doxa” as a condition in which socially constructed phenomena appear self-evident, and “habitus” and “field,” which explain how structures and agents, through their reflexive behavior, become dialectically situated.
Journal: Studies in Conflict & Terrorism
Pages: 43-69
Issue: 1-2
Volume: 42
Year: 2019
Month: 2
X-DOI: 10.1080/1057610X.2018.1513691
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1513691
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:1-2:p:43-69



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1513693_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mark D. Robinson
Author-X-Name-First: Mark D.
Author-X-Name-Last: Robinson
Author-Name: Cori E. Dauber
Author-X-Name-First: Cori E.
Author-X-Name-Last: Dauber
Title: Grading the Quality of ISIS Videos: A Metric for Assessing the Technical Sophistication of Digital Video Propaganda
Abstract: 
 This article offers a method for systematically grading the quality of Islamic State of Iraq and Syria (ISIS) videos based on technical production criteria. Using this method revealed moments when ISIS production capacity was severely debilitated (Fall 2015) and when they began to rebuild (Spring 2016), which the article details. Uses for this method include evaluating propaganda video output across time and across groups, and the ability to assess kinetic actions against propaganda organizations. This capacity will be critical as Islamic State media production teams will be pushed out of its territory as the State collapses.
Journal: Studies in Conflict & Terrorism
Pages: 70-87
Issue: 1-2
Volume: 42
Year: 2019
Month: 2
X-DOI: 10.1080/1057610X.2018.1513693
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1513693
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:1-2:p:70-87



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1513694_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lauren R. Shapiro
Author-X-Name-First: Lauren R.
Author-X-Name-Last: Shapiro
Author-Name: Marie-Helen Maras
Author-X-Name-First: Marie-Helen
Author-X-Name-Last: Maras
Title: Women’s Radicalization to Religious Terrorism: An Examination of ISIS Cases in the United States
Abstract: 
 American women joining Islamic State of Iraq and Syria (ISIS) have increased and their roles evolved beyond auxiliary and domestic provisions, demonstrating both agency and tenacity for pursuing, recruiting, supporting, and spreading extreme Islamist ideals and terrorism. Social learning theory was applied to information gained from open-source court cases as a way of examining how thirty-one U.S. women acquired, maintained, and acted pursuant to radicalization to religious terrorism for ISIS. Internet functionalities, reasons, roles, and support types for radicalization and illegal activities for ISIS were examined using self-, dyad-, and group-classifications. A gendered interventive program based on social learning theory’s extinguishing of radicalized ideology and behavior was outlined.
Journal: Studies in Conflict & Terrorism
Pages: 88-119
Issue: 1-2
Volume: 42
Year: 2019
Month: 2
X-DOI: 10.1080/1057610X.2018.1513694
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1513694
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:1-2:p:88-119



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1513696_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Amy-Louise Watkin
Author-X-Name-First: Amy-Louise
Author-X-Name-Last: Watkin
Author-Name: Seán Looney
Author-X-Name-First: Seán
Author-X-Name-Last: Looney
Title: “The Lions of Tomorrow”: A News Value Analysis of Child Images in Jihadi Magazines
Abstract: 
 This article reports and discusses the results of a study that investigated photographic images of children in five online terrorist magazines to understand the roles of children in these groups. The analysis encompasses issues of Inspire, Dabiq, Jihad Recollections (JR), Azan, and Gaidi Mtanni (GM) from 2009 to 2016. The total number of images was ninety-four. A news value framework was applied that systematically investigated what values the images held that resulted in them being “newsworthy” enough to be published. This article discusses the key findings, which were that Dabiq distinguished different roles for boys and girls, portrayed fierce and prestigious boy child perpetrators, and children flourishing under the caliphate; Inspire and Azan focused on portraying children as victims of Western-backed warfare; GM portrayed children supporting the cause peacefully; and JR contained no re-occurring findings.
Journal: Studies in Conflict & Terrorism
Pages: 120-140
Issue: 1-2
Volume: 42
Year: 2019
Month: 2
X-DOI: 10.1080/1057610X.2018.1513696
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1513696
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:1-2:p:120-140



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1513984_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Maura Conway
Author-X-Name-First: Maura
Author-X-Name-Last: Conway
Author-Name: Moign Khawaja
Author-X-Name-First: Moign
Author-X-Name-Last: Khawaja
Author-Name: Suraj Lakhani
Author-X-Name-First: Suraj
Author-X-Name-Last: Lakhani
Author-Name: Jeremy Reffin
Author-X-Name-First: Jeremy
Author-X-Name-Last: Reffin
Author-Name: Andrew Robertson
Author-X-Name-First: Andrew
Author-X-Name-Last: Robertson
Author-Name: David Weir
Author-X-Name-First: David
Author-X-Name-Last: Weir
Title: Disrupting Daesh: Measuring Takedown of Online Terrorist Material and Its Impacts
Abstract: 
 This article contributes to public and policy debates on the value of social media disruption activity with respect to terrorist material. In particular, it explores aggressive account and content takedown, with the aim of accurately measuring this activity and its impacts. The major emphasis of the analysis is the so-called Islamic State (IS) and disruption of their online activity, but a catchall “Other Jihadi” category is also utilized for comparison purposes. Our findings challenge the notion that Twitter remains a conducive space for pro-IS accounts and communities to flourish. However, not all jihadists on Twitter are subject to the same high levels of disruption as IS, and we show that there is differential disruption taking place. IS’s and other jihadists’ online activity was never solely restricted to Twitter; it is just one node in a wider jihadist social media ecology. This is described and some preliminary analysis of disruption trends in this area supplied too.
Journal: Studies in Conflict & Terrorism
Pages: 141-160
Issue: 1-2
Volume: 42
Year: 2019
Month: 2
X-DOI: 10.1080/1057610X.2018.1513984
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1513984
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:1-2:p:141-160



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1513697_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Benjamin J. Lee
Author-X-Name-First: Benjamin J.
Author-X-Name-Last: Lee
Title: Informal Countermessaging: The Potential and Perils of Informal Online Countermessaging
Abstract: 
 Online countermessaging—communication that seeks to disrupt the online content disseminated by extremist groups and individuals—is a core component of contemporary counterterrorism strategies. Countermessaging has been heavily criticized, not least on the grounds of effectiveness. Whereas current debates are focused on the role of government and large organizations in developing and disseminating countermessages, this article argues that such approaches overlook the informal production of countermessages. Recognizing the appetite for “natural world” content among those engaged in countermessaging, this article highlights some of the potential benefits of informal approaches to countermessaging. At the same time, the article also acknowledges the risks that may result from closer working between countermessaging organizations and informal actors.
Journal: Studies in Conflict & Terrorism
Pages: 161-177
Issue: 1-2
Volume: 42
Year: 2019
Month: 2
X-DOI: 10.1080/1057610X.2018.1513697
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1513697
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:1-2:p:161-177



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1513698_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tom Keatinge
Author-X-Name-First: Tom
Author-X-Name-Last: Keatinge
Author-Name: Florence Keen
Author-X-Name-First: Florence
Author-X-Name-Last: Keen
Title: Social Media and (Counter) Terrorist Finance: A Fund-Raising and Disruption Tool
Abstract: 
 The proliferation of social media has created a terrorist finance vulnerability due to the ease with which propaganda can be spread, promoting fund-raising for a certain cause. Social media companies recognize the importance of preventing violent extremist and terrorist content, but less attention is paid to their fund-raising role. As well as presenting a threat, the movement of terrorist fund-raising activities online creates a disruption opportunity. This article argues that social media companies need to display greater awareness of their vulnerability to supporting terrorist financing and greater collaboration with law enforcement and financial institutions to strengthen the integrity of the system against abuse.
Journal: Studies in Conflict & Terrorism
Pages: 178-205
Issue: 1-2
Volume: 42
Year: 2019
Month: 2
X-DOI: 10.1080/1057610X.2018.1513698
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1513698
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:1-2:p:178-205



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1513986_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gareth Mott
Author-X-Name-First: Gareth
Author-X-Name-Last: Mott
Title: A Storm on the Horizon? “Twister” and the Implications of the Blockchain and Peer-to-Peer Social Networks for Online Violent Extremism
Abstract: 
 “Twister,” developed by Miguel Freitas, is a social network platform centered around micro-blogging, much like Twitter. However, rather than relying on centralized servers owned and maintained by a single firm, Twister users operate a blockchain combined with distributed hash table (DHT)–like and BitTorrent-like protocols to both make posts and send private messages, and also to receive entries from other users. Twister’s raison d’etre is that it offers a social networking platform that cannot be censored and cannot itself censor. The software does not record the Internet Protocol addresses users use to access the service, nor does it notify other users of an account’s online/offline status. Growing adoption of blockchain services means that it is possible that the concept of decentralized social networks could become a norm. It is suggested in this article that blockchain-based peer-to-peer social networks present challenges to the current counterextremist practices for content removal and censorship. While there are methods to disrupt usage of blockchain-based peer-to-peer services, these approaches may have the net harm of curtailing bona fide use of legal and novel technologies. Given this opportunity cost, non-transitory online violent extremist content may need to be tolerated.
Journal: Studies in Conflict & Terrorism
Pages: 206-227
Issue: 1-2
Volume: 42
Year: 2019
Month: 2
X-DOI: 10.1080/1057610X.2018.1513986
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1513986
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:1-2:p:206-227

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1430656_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Hamoon Khelghat-Doost
Author-X-Name-First: Hamoon
Author-X-Name-Last: Khelghat-Doost
Title: The Strategic Logic of Women in Jihadi Organizations
Abstract: 
 Despite the traditional restrictive views of Islamic jurisprudence on women's social activities, the level of women's incorporation into jihadi organizations is growing rapidly in both numbers and roles. This article argues that this increase reflects a strategic logic—jihadi groups integrate women to enhance organizational success. The article develops a typology of jihadi organizations: operation-based and state building and argues that the strategic logic of women in operation-based organizations lays in the tactical advantages women provide them. However, for state-building jihadi groups, the strategic logic of women is geared toward addressing the challenges facing a functioning state.
Journal: Studies in Conflict & Terrorism
Pages: 853-877
Issue: 10
Volume: 42
Year: 2019
Month: 10
X-DOI: 10.1080/1057610X.2018.1430656
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1430656
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:10:p:853-877



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1431316_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Moamen Gouda
Author-X-Name-First: Moamen
Author-X-Name-Last: Gouda
Author-Name: Marcus Marktanner
Author-X-Name-First: Marcus
Author-X-Name-Last: Marktanner
Title: Muslim Youth Unemployment and Expat Jihadism: Bored to Death?
Abstract: 
 Empirical studies analyzing the push factors of expat jihadism are scarce and typically give contradictory results. We hypothesize that youth unemployment, as opposed to overall unemployment, is a significant determinant of foreign fighters flow to join the Islamic State. Moreover, we also consider the interaction between youth unemployment and the Muslim population share as another meaningful variables affecting expat jihadism. Controlling for several variables including gross domestic product per capita; Gini; geographical proximity; the share of manufactures and services as a percentage of Gross Domestic Product; Polity score; and fractionalization, we provide strong evidence for the hypothesis that Muslim youth unemployment is a driver of expat jihadism not only for Muslim-majority countries, but globally.
Journal: Studies in Conflict & Terrorism
Pages: 878-897
Issue: 10
Volume: 42
Year: 2019
Month: 10
X-DOI: 10.1080/1057610X.2018.1431316
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1431316
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:10:p:878-897



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1432046_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Peter J. Phillips
Author-X-Name-First: Peter J.
Author-X-Name-Last: Phillips
Author-Name: Gabriela Pohl
Author-X-Name-First: Gabriela
Author-X-Name-Last: Pohl
Title: Terrorism Watch Lists, Suspect Ranking and Decision-Making Biases
Abstract: 
 The large number of names on terrorism watch lists raises the problem of monitoring. Given the existing resource constraints and other logistical considerations, efficient and accurate ranking of individuals in terms of threat posed is of paramount importance. This process, however, may be impacted by reference points, diminishing sensitivity, loss aversion, and other aspects of the human decision-making process that introduce biases. This article explores the relevance of decision-making processes and biases to the specific task of ranking and monitoring individuals whose names have been placed on a terrorism watch list.
Journal: Studies in Conflict & Terrorism
Pages: 898-914
Issue: 10
Volume: 42
Year: 2019
Month: 10
X-DOI: 10.1080/1057610X.2018.1432046
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1432046
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:10:p:898-914



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1430658_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: İ. Aytaç Kadıoğlu
Author-X-Name-First: İ. Aytaç
Author-X-Name-Last: Kadıoğlu
Title: The Oslo Talks: Revealing the Turkish Government's Secret Negotiations with the PKK
Abstract: 
 This article explores the extent to which the secret talks influenced the path of official negotiations toward ending Turkey's Kurdish conflict, which the scholarly literature has yet to assess. Utilizing interviews with key political actors, this article aims to close this gap by assessing the Oslo talks (2006–2011) as the most comprehensive secret contact between the Turkish government and Kurdistan Workers' Party. It demonstrates that the secret track is not merely a “pre-negotiation” stage aimed at de-escalating the violent conflict ahead of official talks, but also a crucial part of the negotiation stage aimed at establishing a final political agreement.
Journal: Studies in Conflict & Terrorism
Pages: 915-933
Issue: 10
Volume: 42
Year: 2019
Month: 10
X-DOI: 10.1080/1057610X.2018.1430658
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1430658
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:10:p:915-933

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1430654_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Eric Rahman
Author-X-Name-First: Eric
Author-X-Name-Last: Rahman
Author-Name: Siniša Vuković
Author-X-Name-First: Siniša
Author-X-Name-Last: Vuković
Title: Sympathy for the Devil: When and How to Negotiate with Criminal Gangs—Case of El Salvador
Abstract: 
 Criminal gangs, while posing the most substantial threat to security in the Western hemisphere, fall outside the scope of contemporary studies in the field of mediation and negotiation. The prevailing wisdom that gangs are unmanageable due to their apolitical nature and the high political cost of dialogue has led to an approach that relies heavily on the security sector. While the security sector can and must play a role, confrontation alone has proven insufficient. The three-step theory presented in this article seeks to explain how and when to engage in dialogue as an alternative means of confronting criminal gangs. The success of this process, a reduction in violence and criminality through the transformation of gang-related conflict, hinges on sequencing and begins with state-sponsored mediation conducted in secret to establish a cease-fire between the gangs, then enters the phase of public negotiation between the state and the gangs, and finally concludes with a process of mainstreaming the reformed structures into society. This theory assumes that mediators can work with the gangs through a process of assisted articulation to develop a negotiating position, opening a zone of possible agreement between the government and the gangs. El Salvador offers a compelling example of how a society steeped in gang violence might pursue dialogue while also highlighting the threats posed to any negotiation.
Journal: Studies in Conflict & Terrorism
Pages: 935-952
Issue: 11
Volume: 42
Year: 2019
Month: 11
X-DOI: 10.1080/1057610X.2018.1430654
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1430654
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:11:p:935-952



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1431270_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kenneth L. Lasoen
Author-X-Name-First: Kenneth L.
Author-X-Name-Last: Lasoen
Title: War of Nerves: The Domestic Terror Threat and the Belgian Army
Abstract: 
 The terror threat emanating from Daesh-inspired violent radicalization has made the vulnerability of soft targets and the means to defend them a pressing security challenge. Belgium responded to the threat by deploying the army to help protect the public space against terrorist attacks. This article explores the Belgian case of a counterterrorism mission by the military on home soil, but also looks at the wider security challenges posed by an asymmetric threat to the most vulnerable aspects of daily life, exploiting the openness and mobility of society. The study will also examine alternative ways to employ the necessary military skills and expertise to counter the threat to soft targets, from a re-examination of deterrence theory and by the utility of force, and introducing the concept of “marketing for counterterrorism” as a corollary to cognitive defense. It concludes with what tactical opportunities and policy prescriptions are presented for homeland security.
Journal: Studies in Conflict & Terrorism
Pages: 953-971
Issue: 11
Volume: 42
Year: 2019
Month: 11
X-DOI: 10.1080/1057610X.2018.1431270
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1431270
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:11:p:953-971



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1431363_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jennifer Boutz
Author-X-Name-First: Jennifer
Author-X-Name-Last: Boutz
Author-Name: Hannah Benninger
Author-X-Name-First: Hannah
Author-X-Name-Last: Benninger
Author-Name: Alia Lancaster
Author-X-Name-First: Alia
Author-X-Name-Last: Lancaster
Title: Exploiting the Prophet's Authority: How Islamic State Propaganda Uses Hadith Quotation to Assert Legitimacy
Abstract: 
 Through its prolific propaganda, the self-declared Islamic State (IS) seeks to attract new recruits, motivate existing members, and assert the group's legitimacy. This study addresses the question of how IS attempts to legitimize itself through its official rhetoric by exploring its invocation of religious authority via reference to sacred Islamic texts. The study focuses on a specific category of religious scripture: the collected words and actions of the Prophet Muhammad, known as the hadith. The body of hadith has historically served as a bridge of authority from past to present, linking later individuals and groups to the legacy of the Prophet. Related studies have demonstrated that within the Arabic-speaking community in general, citing hadith and Qur'an is an everyday rhetorical strategy for argumentation across all topics, secular and sacred. This article takes an in-depth look at the hadith quotations included in a sample of official IS propaganda to compare the relative frequency of specific themes and to determine which hadith compilations IS publicists prefer. The study compares the quotation of hadith across media platforms (videos, newsletters, and magazines), genres (print and video), and languages (Arabic and English). The findings show that IS messaging tends to quote hadith from canonical Sunni collections. The study highlights important differences between English and Arabic language propaganda, noting in particular that English-language propaganda focuses more on apocalyptic prophecies than Arabic-language materials. Case studies illustrate how IS selectively draws on the vast body of hadith literature as part of the group's strategic framing.
Journal: Studies in Conflict & Terrorism
Pages: 972-996
Issue: 11
Volume: 42
Year: 2019
Month: 11
X-DOI: 10.1080/1057610X.2018.1431363
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1431363
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:11:p:972-996



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1431365_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Brian J. Phillips
Author-X-Name-First: Brian J.
Author-X-Name-Last: Phillips
Title: Terrorist Group Rivalries and Alliances: Testing Competing Explanations
Abstract: 
 Terrorist group rivalries and alliances have important consequences, but the sources of these relationships are debated. This article offers a side-by-side examination of correlates of terrorist rivalries and alliances. Global analyses of hundreds of terrorist groups find violent rivalry is associated with drug trafficking, state sponsorship, ethnic motivation, and operating in a civil conflict country. Alliances are associated with territorial control, intermediate membership size, and religious motivation. The idea that alliances are an indicator of weakness does not find much support. When relationships are disaggregated into theoretically relevant categories (inter-field and intra-field rivalries, and domestic and international alliances), further distinctions appear.
Journal: Studies in Conflict & Terrorism
Pages: 997-1019
Issue: 11
Volume: 42
Year: 2019
Month: 11
X-DOI: 10.1080/1057610X.2018.1431365
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1431365
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:11:p:997-1019

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1434039_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mariya Y. Omelicheva
Author-X-Name-First: Mariya Y.
Author-X-Name-Last: Omelicheva
Author-Name: Lawrence Markowitz
Author-X-Name-First: Lawrence
Author-X-Name-Last: Markowitz
Title: Does Drug Trafficking Impact Terrorism? Afghan Opioids and Terrorist Violence in Central Asia
Abstract: 
 The relationship between drug trafficking and terrorism remains a contentious issue. While some assert that drug trafficking is a strong predictor of terrorism, others contest this observation. This study focuses on the impact of the Afghan opioid trade on terrorist violence in Central Asia, a region of drug transit states. We employ Geographic Information Systems–enabled visualizations of the drug trade and terrorism as well as statistical tests to study the drug–terror relationship at the subnational level. Our findings lend support to the argument that the drug trade facilitates terrorism, but we also find that the drug–terror relationship is multifaceted, complex, and intimately linked to the state.
Journal: Studies in Conflict & Terrorism
Pages: 1021-1043
Issue: 12
Volume: 42
Year: 2019
Month: 12
X-DOI: 10.1080/1057610X.2018.1434039
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1434039
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:12:p:1021-1043



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1434858_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Caitlin Ambrozik
Author-X-Name-First: Caitlin
Author-X-Name-Last: Ambrozik
Title: Community Stakeholder Responses to Countering Violent Extremism Locally
Abstract: 
 In the United States, despite federal efforts to empower communities to form local governance networks to develop and implement collaborative countering violent extremism (CVE) programs, local CVE governance networks are rare. Why do CVE governance networks emerge within only some communities? I argue that three factors—interest in CVE, capacity to participate, and facilitation—determine the prospects for the emergence of a CVE governance network within a community. The article uses a matching technique to identify and compare the community stakeholder responses to CVE in two communities—Houston, TX and Columbus, OH. Survey research of stakeholders who participated in Houston and stakeholders most likely to participate in Columbus but did not highlights the importance of the three factors. By focusing on these drivers of collaborative governance, the article provides an explanation for the lack of CVE collaboration in the United States.
Journal: Studies in Conflict & Terrorism
Pages: 1044-1068
Issue: 12
Volume: 42
Year: 2019
Month: 12
X-DOI: 10.1080/1057610X.2018.1434858
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1434858
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:12:p:1044-1068



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1434860_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Newell
Author-X-Name-First: Michael
Author-X-Name-Last: Newell
Title: The Strategy of Exclusion in American Counterterrorism
Abstract: 
 While garnering heightened attention following the Trump administration's travel restrictions, exclusionary tactics in counterterrorism have a much lengthier history. Given that some terrorism studies scholars identify social and political exclusion as an explanation for the resort to terrorist violence, the selection of a strategy of exclusion is significant. In this article, I identify the elements of a strategy of exclusion and the logic behind this strategy. In particular, I examine the origins and persistence of this strategy in the U.S. context. Rather than a contemporary anomaly, exclusion was among the first strategies the United States added to its counterterrorist tool-kit, and has remained among the most consistent strategies relied on. I trace the history of this strategy from its origins in immigration restrictions passed following the assassination of President McKinley by an anarchist through the contemporary War on Terror. Controversy surrounding this strategy, its negative effects on nonviolent immigrant populations, and its failure to prevent further acts of terrorism suggest it was historically ineffective and may also be so today.
Journal: Studies in Conflict & Terrorism
Pages: 1069-1089
Issue: 12
Volume: 42
Year: 2019
Month: 12
X-DOI: 10.1080/1057610X.2018.1434860
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1434860
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:12:p:1069-1089



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1438062_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: James D. Boys
Author-X-Name-First: James D.
Author-X-Name-Last: Boys
Title: The Clinton Administration's Development and Implementation of Rendition (1993–2001)
Abstract: 
 A firestorm of protest greeted revelations of the rendition program when it was made public during the George W. Bush administration. The operational and political basis for the rendition initiative, however, had been established years before George W. Bush became president and was viewed as 'a new art form' by the Clinton administration. Despite significant efforts to distinguish between the two administrations, the evolution of the rendition initiative during the 1990s reveals far greater continuity than has been widely acknowledged. This paper examines the manner in which the Clinton administration utilized rendition in its own war on terror, years before George W. Bush came to power, with little public scrutiny or outrage. 
Journal: Studies in Conflict & Terrorism
Pages: 1090-1102
Issue: 12
Volume: 42
Year: 2019
Month: 12
X-DOI: 10.1080/1057610X.2018.1438062
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1438062
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:12:p:1090-1102

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1373895_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tricia Bacon
Author-X-Name-First: Tricia
Author-X-Name-Last: Bacon
Author-Name: Elizabeth Grimm Arsenault
Author-X-Name-First: Elizabeth Grimm
Author-X-Name-Last: Arsenault
Title: Al Qaeda and the Islamic State's Break: Strategic Strife or Lackluster Leadership?
Abstract: 
 Employing counterfactuals to assess individual and systemic explanations for the split between Al Qaeda and the Islamic State of Iraq and al-Sham (ISIS), this article concludes that individual leaders factor greatly into terrorist alliance outcomes. Osama bin Laden was instrumental in keeping Al Qaeda and ISIS allied as he prioritized unity and handled internal disputes more deftly than his successor, Dr. Ayman al-Zawahiri. Although a troubled alliance, strategic differences between Al Qaeda and ISIS were not sufficient to cause the split. Rather, the capabilities of Al Qaeda's leader determined the group's ability to prevent alliance ruptures.
Journal: Studies in Conflict & Terrorism
Pages: 229-263
Issue: 3
Volume: 42
Year: 2019
Month: 3
X-DOI: 10.1080/1057610X.2017.1373895
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1373895
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:3:p:229-263



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1373427_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David Parker
Author-X-Name-First: David
Author-X-Name-Last: Parker
Author-Name: Julia M. Pearce
Author-X-Name-First: Julia M.
Author-X-Name-Last: Pearce
Author-Name: Lasse Lindekilde
Author-X-Name-First: Lasse
Author-X-Name-Last: Lindekilde
Author-Name: M. Brooke Rogers
Author-X-Name-First: M. Brooke
Author-X-Name-Last: Rogers
Title: Challenges for Effective Counterterrorism Communication: Practitioner Insights and Policy Implications for Preventing Radicalization, Disrupting Attack Planning, and Mitigating Terrorist Attacks
Abstract: 
 Growing concerns about small-scale, low sophistication terrorist attacks, and the difficulties they present for security services, make public coproduction of security increasingly necessary. Communication to ensure that the public(s) is aware of the role they can play will be central to this. This article, based on interviews with thirty expert practitioners, explores challenges associated with communication designed to prevent radicalization, interdict attack planning and mitigate the impacts of a terrorist attack in the United Kingdom and Denmark. The interplay between these challenges and the contemporary terrorist context are analyzed, highlighting that new, or adapted, communications and approaches may be necessary.
Journal: Studies in Conflict & Terrorism
Pages: 264-291
Issue: 3
Volume: 42
Year: 2019
Month: 3
X-DOI: 10.1080/1057610X.2017.1373427
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1373427
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:3:p:264-291



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1374672_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Minwoo Yun
Author-X-Name-First: Minwoo
Author-X-Name-Last: Yun
Author-Name: Eunyoung Kim
Author-X-Name-First: Eunyoung
Author-X-Name-Last: Kim
Title: An Ethnographic Study on the Indonesian Immigrant Community and its Islamic Radicalization in South Korea
Abstract: 
 Contrary to popular belief, South Korea is not immune from the growth of Islamic radicalism. Although no serious terrorist attack has yet occurred within the country, some worrisome incidents have been reported. Recently, an Indonesian man was arrested on the grounds that he publicly supported the Al Nusra Front, a known Al Qaeda–affiliated terrorist organization, and even attempted to depart for Syria to join the organization. The current study is a response to such an incident. It investigates whether such an incident is an isolated exception or a harbinger of the Islamic radicalization process within South Korea, particularly within the Muslim immigrant community. The current study focuses primarily on the Indonesian immigrant community within South Korea but also investigates other Muslim communities when needed, as Muslim immigrant communities are often intermingled and share similar features. The study found some worrisome developments of Islamic radicalization within the Indonesian immigrant community in particular and the Muslim immigrant community in general. Using the enculturation stress model, the current study explains that such Islamic radicalization is a pathway of the collective response to cultural adaptation stress that most Indonesian and other Muslim immigrants face within South Korea. To conduct the study, ethnographic qualitative interviews were used. Indonesian immigrants, their Korean spouses, civilian activists, civilian aid workers, government officials, police officers, immigrant agency officials, and security officials were contacted and interviewed. Each interview lasted between approximately one and four hours. The limitations of the study are also discussed.
Journal: Studies in Conflict & Terrorism
Pages: 292-313
Issue: 3
Volume: 42
Year: 2019
Month: 3
X-DOI: 10.1080/1057610X.2017.1374672
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1374672
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:3:p:292-313



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1461320_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ahmed M. Abozaid
Author-X-Name-First: Ahmed M.
Author-X-Name-Last: Abozaid
Title: Correspondence to “An Ethnographic Study on the Indonesian Immigrant Community and its Islamic Radicalization in South Korea”
Journal: Studies in Conflict & Terrorism
Pages: 314-319
Issue: 3
Volume: 42
Year: 2019
Month: 3
X-DOI: 10.1080/1057610X.2018.1461320
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1461320
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:3:p:314-319



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1461321_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Minwoo Yun
Author-X-Name-First: Minwoo
Author-X-Name-Last: Yun
Author-Name: Eunyoung Kim
Author-X-Name-First: Eunyoung
Author-X-Name-Last: Kim
Title: Response: Guilty of not critical and unpleasant findings: Endless arguments of definitions of terrorism: Correspondence from Abozaid
Journal: Studies in Conflict & Terrorism
Pages: 320-327
Issue: 3
Volume: 42
Year: 2019
Month: 3
X-DOI: 10.1080/1057610X.2018.1461321
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1461321
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:3:p:320-327



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1518205_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gina Bennett
Author-X-Name-First: Gina
Author-X-Name-Last: Bennett
Title: What I Have Learned About Countering Terrorismϕ
Abstract: 
 As a counterterrorism officer of thirty years, I have a healthy respect for history. Yet I also know that hindsight changes what you think about what you once thought. My observations about terrorism trends and counterterrorism strategies over the years are not what they once were. What I think now is more aligned with how I feel, and therefore, much clearer. Until recently, I had always based my observations about national security in my experiences as a counterterrorism analyst. I have come to realize that the lessons I believe are the most valid are not a result of my career experiences but from allowing the rest of my life to shed light on my career.
Journal: Studies in Conflict & Terrorism
Pages: 328-334
Issue: 3
Volume: 42
Year: 2019
Month: 3
X-DOI: 10.1080/1057610X.2018.1518205
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1518205
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:3:p:328-334

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1585533_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gordon McCormick
Author-X-Name-First: Gordon
Author-X-Name-Last: McCormick
Title: Ernesto (Che) Guevara: The Last ‘Heroic’ Guerrilla
Journal: Studies in Conflict & Terrorism
Pages: 335-335
Issue: 4
Volume: 42
Year: 2019
Month: 4
X-DOI: 10.1080/1057610X.2019.1585533
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1585533
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:4:p:335-335



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1398319_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gordon H. McCormick
Author-X-Name-First: Gordon H.
Author-X-Name-Last: McCormick
Author-Name: Mark T. Berger
Author-X-Name-First: Mark T.
Author-X-Name-Last: Berger
Title: Ernesto (Che) Guevara: The Last “Heroic” Guerrilla
Abstract: 
 We take the opportunity presented by the fiftieth anniversary of the death of Che Guevara to reexamine his life and revolutionary program and the legacy he left behind. Attention is given to the formative influences that led to his introduction to Fidel Castro and his involvement in the Cuban revolution. We take a close look at the stylized theory of revolution that emerged from this experience, his reflective writings on the subject, and his subsequent attempts to generalize and apply his revolutionary model in the Congo and Bolivia. This model is critically interpreted and evaluated through the lense of his eleven month Bolivian campaign. We conclude by examining the ‘paradox’ of Che Guevara. He was a failed guerrilla who remains an iconic symbol of the revolutionary Left. He was an authentic true believer who dreamed that it might be possible to one day forge a utopian society of ‘new men’ and yet, fifty years after his death, his revolutionary project is farther away from being realized than ever. His heroic image, in the meantime, has evolved to become one of the most successful capitalist brands in history.
Journal: Studies in Conflict & Terrorism
Pages: 336-362
Issue: 4
Volume: 42
Year: 2019
Month: 4
X-DOI: 10.1080/1057610X.2017.1398319
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1398319
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:4:p:336-362



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1373428_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Victor Asal
Author-X-Name-First: Victor
Author-X-Name-Last: Asal
Author-Name: Daniel Gustafson
Author-X-Name-First: Daniel
Author-X-Name-Last: Gustafson
Author-Name: Peter Krause
Author-X-Name-First: Peter
Author-X-Name-Last: Krause
Title: It Comes with the Territory: Why States Negotiate with Ethno-Political Organizations
Abstract: 
 Given that minority ethno-political organizations are generally weaker than states yet seek to change their policies or remove the ruling regime from power, why would negotiation occur? States prefer to ignore or repress such organizations, which typically have little to offer in return amidst negotiations that can legitimize them while delegitimizing the state. When a challenging organization establishes governing structures and controls movement in part of a state's territory, however, it can easily inflict significant economic and political costs on the state while also possessing a valuable asset to exchange for concessions. An organization with territorial control cannot be ignored, while the state will have a strong incentive to negotiate before the state loses more face, the group gains more legitimacy, neighboring states are more likely to invade, and the international community is more likely to formally recognize any facts on the ground as a new status quo. Our analysis of 118 organizations in the Middle East and North Africa from 1980–2004 reveals that territorial control is the most important determinant of intrastate negotiation. In regards to existing scholarship, this suggests that a certain type of successful violence works—not all violence and not only nonviolence—while certain types of strong organizations—those that control territory—are more likely to reach negotiations with the state than weak ones.
Journal: Studies in Conflict & Terrorism
Pages: 363-382
Issue: 4
Volume: 42
Year: 2019
Month: 4
X-DOI: 10.1080/1057610X.2017.1373428
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1373428
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:4:p:363-382



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1385903_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Miron Lakomy
Author-X-Name-First: Miron
Author-X-Name-Last: Lakomy
Title: Let's Play a Video Game: Jihadi Propaganda in the World of Electronic Entertainment
Abstract: 
 This article argues that video games have become a valid and increasingly significant means of jihadist digital propaganda. “Gaming jihad” has recently shown interesting alterations, mostly due to actions undertaken by the so called Islamic State and its cyber-partisans, which have discovered new ways of using this flexible and immersive medium. Similar to more conventional forms of its online propaganda, which have been imitated by other Islamist terrorist groups for years, the “Caliphate's” exploitation of electronic entertainment software may be a forerunner for the increased interest of other violent extremist organizations in this medium.
Journal: Studies in Conflict & Terrorism
Pages: 383-406
Issue: 4
Volume: 42
Year: 2019
Month: 4
X-DOI: 10.1080/1057610X.2017.1385903
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1385903
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:4:p:383-406



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1373430_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Aaron Safer-Lichtenstein
Author-X-Name-First: Aaron
Author-X-Name-Last: Safer-Lichtenstein
Title: An Explicit Consideration of Unintended Consequences from Counterterrorism Policy: The Case of Radical Eco-Groups
Abstract: 
 Criminologists and terrorism specialists alike have conducted research on the deterrent effect of policies; however, to date, only criminologists have thoroughly examined the associated displacement of crime and diffusion of benefits. Using data from the Eco-Incidents Database, this study first examines the deterrent effect of government efforts targeting animal rights and environmental terrorism over several years. Next, it extends this application by examining nonterrorist actions by both terrorist groups and nonterrorist groups to see if deterrent actions have any unintended consequences. Results show no evidence of displacement, but rather that several government actions evidenced a diffusion of benefits.
Journal: Studies in Conflict & Terrorism
Pages: 407-428
Issue: 4
Volume: 42
Year: 2019
Month: 4
X-DOI: 10.1080/1057610X.2017.1373430
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1373430
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:4:p:407-428



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1385182_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: James Khalil
Author-X-Name-First: James
Author-X-Name-Last: Khalil
Title: A Guide to Interviewing Terrorists and Violent Extremists
Abstract: 
 The quality of studies drawing primary data from terrorists and violent extremist respondents varies substantially, with this body of literature exhibiting a variety of repeating methodological issues. For instance, researchers often uncritically accept interviewee responses at face value, overlook key theoretical insights, downplay or neglect potentially important explanatory variables, fail to offer sufficient information about their sampling methods, and deliver findings with inferences beyond what their sample allows. Indeed, certain studies demonstrate a number of these flaws, including the United Nations Development Programme's recently published Journey to Extremism in Africa report. Within this context, the dual purposes of this article are (a) to discuss ways to overcome these specific methodological problems, and (b) to provide broader guidance for face-to-face research with such respondents.
Journal: Studies in Conflict & Terrorism
Pages: 429-443
Issue: 4
Volume: 42
Year: 2019
Month: 4
X-DOI: 10.1080/1057610X.2017.1385182
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1385182
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:4:p:429-443

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1393897_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Laura Huey
Author-X-Name-First: Laura
Author-X-Name-Last: Huey
Author-Name: Rachel Inch
Author-X-Name-First: Rachel
Author-X-Name-Last: Inch
Author-Name: Hillary Peladeau
Author-X-Name-First: Hillary
Author-X-Name-Last: Peladeau
Title: “@ me if you need shoutout”: Exploring Women's Roles in Islamic State Twitter Networks
Abstract: 
 This article investigates the social media content of women who are affiliated with the Islamic State. Throughout one year, ninety-three Twitter accounts were tracked to explore the patterns of engagement by pro–Islamic State women online and examine how these patterns illuminate the roles that pro–Islamic State women occupy on social media networks. The study reveals that women who associate with the Islamic State mostly preserve the traditional gendered role of support in the online realm. However, support is not their exclusive role and some women are active in the organization, using Twitter to recruit, promote, and even commit terrorist violence.
Journal: Studies in Conflict & Terrorism
Pages: 445-463
Issue: 5
Volume: 42
Year: 2019
Month: 5
X-DOI: 10.1080/1057610X.2017.1393897
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1393897
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:5:p:445-463



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1392097_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael H. Creswell
Author-X-Name-First: Michael H.
Author-X-Name-Last: Creswell
Title: Wasted Words? The Limitations of U.S. Strategic Communication and Public Diplomacy
Abstract: 
 For America's foes in Afghanistan and the Middle East, triumph on the battlefield is less important than winning the battle of perceptions. In response, the United States has turned to Strategic Communication and Public Diplomacy (SC-PD) to engage key audiences in ways that advance U.S. interests and to win the political-ideological contest for domestic and international legitimacy. But are these strategies effective? While winning hearts and minds is politically important, SC-PD—even at its best—is much less effective than other well-crafted and mutually supportive policies and strategies. Moreover, there are structural obstacles that greatly limit the effectiveness of SC-PD.
Journal: Studies in Conflict & Terrorism
Pages: 464-492
Issue: 5
Volume: 42
Year: 2019
Month: 5
X-DOI: 10.1080/1057610X.2017.1392097
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1392097
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:5:p:464-492



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1403152_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anneli Botha
Author-X-Name-First: Anneli
Author-X-Name-Last: Botha
Author-Name: Mahdi Abdile
Author-X-Name-First: Mahdi
Author-X-Name-Last: Abdile
Title: Reality Versus Perception: Toward Understanding Boko Haram in Nigeria
Abstract: 
 This article will explore the perception of individuals associated with civil society and working in Boko Haram–affected areas. This will compare the reality as reflected by former Boko Haram members. Central to this analysis will be who, why, and how individuals get involved in Boko Haram. Comparing perceptions with empirical evidence, civil society actors, but also policymakers tasked with addressing violent extremism, are reminded not to rely on perceptions when developing and implementing preventative measures and countermeasures. Additionally, a larger than expected former female Boko Haram sample was included that allowed a comparison to be made between the male and female samples, with specific reference to why and how women became members of Boko Haram.
Journal: Studies in Conflict & Terrorism
Pages: 493-519
Issue: 5
Volume: 42
Year: 2019
Month: 5
X-DOI: 10.1080/1057610X.2018.1403152
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1403152
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:5:p:493-519



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1393902_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Stephane J. Baele
Author-X-Name-First: Stephane J.
Author-X-Name-Last: Baele
Author-Name: Olivier C. Sterck
Author-X-Name-First: Olivier C.
Author-X-Name-Last: Sterck
Author-Name: Thibaut Slingeneyer
Author-X-Name-First: Thibaut
Author-X-Name-Last: Slingeneyer
Author-Name: Gregoire P. Lits
Author-X-Name-First: Gregoire P.
Author-X-Name-Last: Lits
Title: What Does the “Terrorist” Label Really Do? Measuring and Explaining the Effects of the “Terrorist” and “Islamist” Categories
Abstract: 
 Many scholars and practitioners claim that labeling groups or individuals as “terrorists” does not simply describe them but also shapes public attitudes, due to the label's important normative and political charge. Yet is there such a “terrorist label effect”? In view of surprisingly scant evidence, the present article evaluates whether or not the terrorist label—as well as the “Islamist” one—really impacts both the audience's perception of the security environment and its security policy preferences, and if yes, how and why. To do so, the article implements a randomized-controlled vignette experiment where participants (N = 481) first read one out of three press articles, each depicting a street shooting in the exact same way but labeling the author of the violence with a different category (“terrorist”/“shooter”/“Islamist”). Participants were then asked to report on both their perceptions and their policy preferences. This design reveals very strong effects of both the “terrorist” and “Islamist” categories on each dimension. These effects are analyzed through the lenses of social and cognitive psychology, in a way that interrogates the use of the terrorist category in society, the conflation of Islamism with terrorism, and the press and policymakers' lexical choices when reporting on political violence.
Journal: Studies in Conflict & Terrorism
Pages: 520-540
Issue: 5
Volume: 42
Year: 2019
Month: 5
X-DOI: 10.1080/1057610X.2017.1393902
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1393902
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:5:p:520-540

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1394653_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Omar Ashour
Author-X-Name-First: Omar
Author-X-Name-Last: Ashour
Title: Sinai's Insurgency: Implications of Enhanced Guerilla Warfare
Abstract: 
 This article aims to explain the endurance of Sinai's insurgency despite its limited military capacity and resources, and the overwhelming man- and fire-power of the incumbent's regular and tribal forces. After reviewing the literature on how insurgents beat or survive strong incumbents, the article offers a short overview of historical developments and socio-political causes leading to the rise of Sinai Province and its military build-up. It then analyses, qualitatively and quantitatively, how Sinai Province fight, based on its original documents and releases as well as on interviews with individuals who fought against it. Finally, the article concludes with an explanation of why did the insurgency survive and, at times, expanded based on the quality of its military tactics. It also provides policy implications, as a result.
Journal: Studies in Conflict & Terrorism
Pages: 541-558
Issue: 6
Volume: 42
Year: 2019
Month: 6
X-DOI: 10.1080/1057610X.2017.1394653
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1394653
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:6:p:541-558



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1404000_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Steven Windisch
Author-X-Name-First: Steven
Author-X-Name-Last: Windisch
Author-Name: Gina Scott Ligon
Author-X-Name-First: Gina
Author-X-Name-Last: Scott Ligon
Author-Name: Pete Simi
Author-X-Name-First: Pete
Author-X-Name-Last: Simi
Title: Organizational [Dis]trust: Comparing Disengagement Among Former Left-Wing and Right-Wing Violent Extremists
Abstract: 
 In order to move beyond the existing push/pull framework to understand disengagement, we apply a systematic coding scheme derived from Mayer and colleagues' integrative model of organizational trust to examine why people leave extremist groups. In doing so, we also rely on in-depth life history interviews with twenty former left- and right-wing extremists to examine whether antecedents of distrust vary between the two groups. Findings suggest substantial similarities and important differences between left- and right-wing extremists' decision to leave. In particular, perceptions of poor planning and organization, low-quality personnel and vindictive behavior generate perceptions of organizational distrust and disillusionment. Although findings from the current study are based on a relatively small sample, notable similarities were identified between both groups regarding sources of distrust (e.g., leaders, group members). We also identified differences regarding the role of violence in weakening solidarity and nurturing disillusionment with extremist activities. We conclude this article with suggestions for future research that extend the study of terrorism and that may have significance for how practitioners address countering violent extremism initiatives.
Journal: Studies in Conflict & Terrorism
Pages: 559-580
Issue: 6
Volume: 42
Year: 2019
Month: 6
X-DOI: 10.1080/1057610X.2017.1404000
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1404000
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:6:p:559-580



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1402430_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kevin Hearty
Author-X-Name-First: Kevin
Author-X-Name-Last: Hearty
Title: Spoiling Through Performative Nonviolence: Ritualistic Funerary Practice as a Violent Dissident Irish Republican (VDR) Spoiling Tactic
Abstract: 
 This article assesses how Violent Dissident Irish Republican (VDR) groups have turned to funerary practice as a spoiling tactic in post–Good Friday Agreement Northern Ireland. In doing so it moves the lens of interrogation away from the residual violence exercised by these groups and onto other nonviolent mechanisms and strategies. Locating this discussion within the wider study of the VDR phenomenon, the article asserts that militarized and ritualized funerals possess propagandistic and mobilizational benefits that make them particularly conducive to spoiling activity in a post-conflict site that is increasingly embracing the process of normalization.
Journal: Studies in Conflict & Terrorism
Pages: 581-599
Issue: 6
Volume: 42
Year: 2019
Month: 6
X-DOI: 10.1080/1057610X.2017.1402430
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1402430
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:6:p:581-599



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1402429_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ophir Falk
Author-X-Name-First: Ophir
Author-X-Name-Last: Falk
Author-Name: Amir Hefetz
Author-X-Name-First: Amir
Author-X-Name-Last: Hefetz
Title: Minimizing Unintended Deaths Enhanced the Effectiveness of Targeted Killing in the Israeli–Palestinian Conflict
Abstract: 
 Targeted killing has become a primary counterterrorism measure used by a number of countries in their confrontation with lethal threats. This article focuses on the impact of unintended deaths on the effectiveness of targeted killing. The article evaluates the effectiveness of targeted killings carried out in the Israeli–Palestinian conflict theater that resulted in unintended deaths, compared to the effectiveness of targeted killings where the intended target is the sole person killed. Using multivariate analysis, we demonstrate that targeted killings with unintended deaths were followed by a greater number of suicide bombings and associated casualties compared with targeted killings with no unintended deaths. Based on these findings, nations involved in such conflicts should strive to inflict as few unintended deaths as possible, not only because it is morally right, but also because it is more effective in mitigating terrorism.
Journal: Studies in Conflict & Terrorism
Pages: 600-616
Issue: 6
Volume: 42
Year: 2019
Month: 6
X-DOI: 10.1080/1057610X.2017.1402429
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1402429
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:6:p:600-616

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1407480_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Matthew M. Sweeney
Author-X-Name-First: Matthew M.
Author-X-Name-Last: Sweeney
Title: Leaderless Resistance and the Truly Leaderless: A Case Study Test of the Literature-Based Findings
Abstract: 
 The literature on leaderless resistance is conceptually cloudy. Nevertheless, such literature has bounded the theoretical framework of leaderless resistance around four criteria. These criteria are leaderless resistors cannot be members of organizations they represent; leaderless resistance is a tactical manifestation of an organization; the goal of leaderless resistance is to insulate members and leaders from prosecution; and leaderless resistance arises from organizational failure. Using a case study of the Phineas Priesthood, this work tests these boundaries via a directed content analysis of the Priesthood's ideological manifesto. This research finds that leaderless resistance is theoretically problematic and too often lone wolves and leader resistors are viewed equivalent when they are theoretically different. Scholars must theoretically differentiate between individuals who ascribe to leaderless concepts, organizations, or groups versus those who develop an ideological framework and exist outside a concept, organization, or group.
Journal: Studies in Conflict & Terrorism
Pages: 617-635
Issue: 7
Volume: 42
Year: 2019
Month: 7
X-DOI: 10.1080/1057610X.2017.1407480
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1407480
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:7:p:617-635



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1404004_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Reinier Bergema
Author-X-Name-First: Reinier
Author-X-Name-Last: Bergema
Author-Name: Marion van San
Author-X-Name-First: Marion
Author-X-Name-Last: van San
Title: Waves of the Black Banner: An Exploratory Study on the Dutch Jihadist Foreign Fighter Contingent in Syria and Iraq
Abstract: 
 Since the violent escalation of the Syrian conflict, 280 Dutch nationals have been flocking to Syria and Iraq to join jihadist terrorist organizations. Attempts to create a more comprehensive understanding of the backgrounds of these jihadist foreign fighters often rely on small-N, qualitative analysis. This exploratory study systematically assesses the backgrounds of 217 Dutch jihadist foreign fighters. Additionally, it further differentiates the different “waves” of fighters since late 2012, by looking at their characteristics and comparing their composition.
Journal: Studies in Conflict & Terrorism
Pages: 636-661
Issue: 7
Volume: 42
Year: 2019
Month: 7
X-DOI: 10.1080/1057610X.2017.1404004
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1404004
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:7:p:636-661



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1407075_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Stijn Sieckelinck
Author-X-Name-First: Stijn
Author-X-Name-Last: Sieckelinck
Author-Name: Elga Sikkens
Author-X-Name-First: Elga
Author-X-Name-Last: Sikkens
Author-Name: Marion van San
Author-X-Name-First: Marion
Author-X-Name-Last: van San
Author-Name: Sita Kotnis
Author-X-Name-First: Sita
Author-X-Name-Last: Kotnis
Author-Name: Micha De Winter
Author-X-Name-First: Micha
Author-X-Name-Last: De Winter
Title: Transitional Journeys Into and Out of Extremism. A Biographical Approach
Abstract: 
 This article describes an empirical study into processes of homegrown radicalization and de-radicalization of young people. Researchers in Denmark and the Netherlands set out to answer the question regarding what pathways in and out of extremism (mainly far-right or Islamist) look like “from the inside.” The analysis is informed by grounded theory, based on interviews (N = 34) with “formers” and their family members on their life courses. The study shows that radicalization often concurs with distinct social–emotional developmental challenges that young people face in the transition between youth and adulthood. A practical implication of the marked transitional sequences in these processes is that each type of radical journey may call for a different type of (re)action.
Journal: Studies in Conflict & Terrorism
Pages: 662-682
Issue: 7
Volume: 42
Year: 2019
Month: 7
X-DOI: 10.1080/1057610X.2017.1407075
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1407075
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:7:p:662-682



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1402432_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sagi Polka
Author-X-Name-First: Sagi
Author-X-Name-Last: Polka
Title: Hamas as a Wasati (Literally: Centrist) Movement: Pragmatism within the Boundaries of the Sharia
Abstract: 
 This article examines Hamas as a test case for the struggle within Islam between two rival ideological streams: wasatiyya, whose principles were formulated by Sheikh Yusuf al-Qaradawi (b. 1926), and Salafi-jihadism, which is the wellspring of global jihad. Hamas is a wasati movement, and its wasati principles serve as the basis for its polemic with Salafi-jihadists, who accuse both it and al-Qaradawi of heresy. The article also shows how the principles of wasatiyya afford Hamas flexibility and allow it to adopt pragmatic positions by distinguishing between immutable long-term goals and flexible means of pursuing them. Hamas translates the principles of wasati jurisprudence into practical political and military ones.
Journal: Studies in Conflict & Terrorism
Pages: 683-713
Issue: 7
Volume: 42
Year: 2019
Month: 7
X-DOI: 10.1080/1057610X.2017.1402432
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1402432
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:7:p:683-713

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1425112_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Huseyn Aliyev
Author-X-Name-First: Huseyn
Author-X-Name-Last: Aliyev
Title: When and How Do Militias Disband? Global Patterns of Pro-Government Militia Demobilization in Civil Wars
Abstract: 
 The research to date on pro-governm`ent militias demonstrates that numerous pro-regime militia groups were actively deployed in civil wars over the last half a century. As hundreds of militia groups emerged amid civil warfare, hundreds more were disbanded, integrated into regular military, or transformed into political forces. This study seeks to improve our understanding of global patterns of militia demobilization. In contrast to the growing body of literature that explores the emergence of militias or examines their relationship with the state, studies on the demise of pro-government militias are notable by their absence. Statistical analysis of 220 pro-government militias involved in seventy-five civil wars from 1981 to 2011, based on a recent database of pro-government militias, demonstrates that the disappearance of militias has little to do with the termination of armed conflict. This study is the first to investigate when and under which conditions militias created to assist governments in fighting civil wars disband.
Journal: Studies in Conflict & Terrorism
Pages: 715-734
Issue: 8
Volume: 42
Year: 2019
Month: 8
X-DOI: 10.1080/1057610X.2018.1425112
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1425112
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:8:p:715-734



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1425087_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Douglas Weeks
Author-X-Name-First: Douglas
Author-X-Name-Last: Weeks
Title: Barking Mosque and Quintessential Insight: Overcoming the Problematic Government/Community Counterterrorism Partnership in the UK
Abstract: 
 This article looks specifically at the front end of the radicalization problem and argues that vulnerability to political violence is first and foremost a social problem. The article explores the historical counterradicalization approach in Britain and the government/community relationship, and argues that addressing the disaffection that comes with social vulnerability is the key to building resilience to radicalization. Last, the article profiles a holistic counterradicalization response undertaken by Quintessential Insight and the Barking Mosque whereby social vulnerability is reduced, individuals and communities are empowered, social and political agency is maximized, social contracts are restored, and resilience to radicalization is increased.
Journal: Studies in Conflict & Terrorism
Pages: 735-754
Issue: 8
Volume: 42
Year: 2019
Month: 8
X-DOI: 10.1080/1057610X.2018.1425087
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1425087
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:8:p:735-754



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1415786_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Saira Bano Orakzai
Author-X-Name-First: Saira Bano
Author-X-Name-Last: Orakzai
Title: Pakistan's Approach to Countering Violent Extremism (CVE): Reframing the Policy Framework for Peacebuilding and Development Strategies
Abstract: 
 Countering violent extremism (CVE) is one of the central focuses of the government of Pakistan. This article examines the current CVE policy framework and questions the existing paradigm of CVE policies in Pakistan. The article employs R. Kim Cragin's model of “resisting violent extremism” to suggest the need for a paradigm change in Pakistan's CVE policy framework, especially after the launch of another military operation in 2017. After a decade of security-centric counterterrorism policies, such a change requires balancing security-, development-, and prevention-centric policies in order to redefine Pakistan's policy framework.
Journal: Studies in Conflict & Terrorism
Pages: 755-770
Issue: 8
Volume: 42
Year: 2019
Month: 8
X-DOI: 10.1080/1057610X.2017.1415786
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1415786
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:8:p:755-770



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1419554_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bart Schuurman
Author-X-Name-First: Bart
Author-X-Name-Last: Schuurman
Author-Name: Lasse Lindekilde
Author-X-Name-First: Lasse
Author-X-Name-Last: Lindekilde
Author-Name: Stefan Malthaner
Author-X-Name-First: Stefan
Author-X-Name-Last: Malthaner
Author-Name: Francis O'Connor
Author-X-Name-First: Francis
Author-X-Name-Last: O'Connor
Author-Name: Paul Gill
Author-X-Name-First: Paul
Author-X-Name-Last: Gill
Author-Name: Noémie Bouhana
Author-X-Name-First: Noémie
Author-X-Name-Last: Bouhana
Title: End of the Lone Wolf: The Typology that Should Not Have Been
Abstract: 
 This research note argues that the “lone wolf” typology should be fundamentally reconsidered. Based on a three-year empirical research project, two key points are made to support this argument. First, the authors found that ties to online and offline radical milieus are critical to lone actors' adoption and maintenance of both the motive and capability to commit acts of terrorism. Second, in terms of pre-attack behaviors, the majority of lone actors are not the stealthy and highly capable terrorists the “lone wolf” moniker alludes to. These findings not only urge a reconsideration of the utility of the lone-wolf concept, they are also particularly relevant for counterterrorism professionals, whose conceptions of this threat may have closed off avenues for detection and interdiction that do, in fact, exist.
Journal: Studies in Conflict & Terrorism
Pages: 771-778
Issue: 8
Volume: 42
Year: 2019
Month: 8
X-DOI: 10.1080/1057610X.2017.1419554
File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1419554
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:8:p:771-778

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1425109_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Brandon Colas
Author-X-Name-First: Brandon
Author-X-Name-Last: Colas
Title: Understanding the Idea: Dynamic Equivalence and the Accurate Translation of Jihadist Concepts
Abstract: 
 This article argues that inaccurate translation of commonly-transliterated jihadist terms poses a major difficulty to scholars and policy makers who are seeking to understand the appeal and potential weaknesses of jihadist movements. Jihadist English-language propaganda is filled with transliterated terms, usually from Arabic. Although these transliterated terms (such as jihad and sharia) are extremely common, the shorthand English translations of these terms (such as “holy war” and “Islamic law”) often fail to accurately convey the connotative meaning experienced by the jihadist groups using them.The translation theory of dynamic equivalence suggests that accurate translation consists not of word-for-word correspondence between an original source language and a reception language, but instead by finding concepts in the reception language that provide the same sense of emotive meaning that exists in the community using the source language. This concept-to-concept model of translation offers insights into both the community using the source language and the community for which the scholar is writing.A brief overview of dynamic equivalence and its merits for translation is followed by redefinitions of ten commonly-transliterated Arabic words found within the ISIS publication Dabiq. A refined understanding of some of these jihadist terms provides insights into both the appeal and weaknesses of jihadist groups. This model of translation and these improved definitions can serve as the foundation for a longer-term project providing an updated, comprehensive lexicon of jihadist terms.
Journal: Studies in Conflict & Terrorism
Pages: 779-797
Issue: 9
Volume: 42
Year: 2019
Month: 9
X-DOI: 10.1080/1057610X.2018.1425109
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1425109
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:9:p:779-797



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1427842_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Elena Pokalova
Author-X-Name-First: Elena
Author-X-Name-Last: Pokalova
Title: Driving Factors behind Foreign Fighters in Syria and Iraq
Abstract: 
 With the rise of the self-proclaimed Islamic State of Iraq and Syria (ISIS), the phenomenon of foreign fighters became a significant security concern. Governments around the world have become preoccupied with the possibility of their citizens leaving for combat zones and then coming back with training and experience. While previously foreign fighters participated in such conflicts as Afghanistan, Bosnia, or Chechnya, today ISIS has attracted record numbers of individuals from various backgrounds. This article examines factors that might be connected with the outflow of foreign fighters to Syria and Iraq. The analysis is based on 190 countries with 103 of them serving as countries of origin for 33,815 foreign fighters. Negative binomial regression is used to evaluate the connection of political, economic, demographic, and social factors to numbers of foreign fighters. The findings indicate that more foreign fighters come from countries with higher Human Development Index levels, unemployment rates, percentages of youth, population size, percentages of Muslim population, emigration levels, Internet penetration, and the presence of Al Qaeda cells. However, the findings further indicate that the effect of these variables is not uniform across majority Muslim and majority non-Muslim countries.
Journal: Studies in Conflict & Terrorism
Pages: 798-818
Issue: 9
Volume: 42
Year: 2019
Month: 9
X-DOI: 10.1080/1057610X.2018.1427842
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1427842
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:9:p:798-818



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1430618_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Russell Lundberg
Author-X-Name-First: Russell
Author-X-Name-Last: Lundberg
Title: Archetypal Terrorist Events in the United States
Abstract: 
 This research presents a typology of terrorist events rather than the more common typologies of terrorist groups and ideologies. Archetypal analysis, a quantitative methodology to identify pure types, was used with data in START's Global Terrorism Database to identify archetypal attacks in the United States. A set of seven archetypal events was identified including abortion bombings, poisonings, Aryan hate, hostage-taking, fire/bomb for damage, assassination, and the catastrophic Big Bad. These archetypes may be useful for training and exercising for events with additional potential value for developing theory of terrorist events.
Journal: Studies in Conflict & Terrorism
Pages: 819-835
Issue: 9
Volume: 42
Year: 2019
Month: 9
X-DOI: 10.1080/1057610X.2018.1430618
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1430618
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:9:p:819-835



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1432027_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alexandra Phelan
Author-X-Name-First: Alexandra
Author-X-Name-Last: Phelan
Title: Engaging Insurgency: The Impact of the 2016 Colombian Peace Agreement on FARC's Political Participation
Abstract: 
 The 2016 Peace Agreement between the Colombian government and the Revolutionary Armed Forces of Colombia—People's Army (the FARC-EP or FARC) commits to reforming political participation, especially of traditionally marginalized sectors throughout the country to consolidate Colombian democracy. While the Peace Agreement provides implementation mechanisms that support the insurgency's transition from armed group to political party, it also complements the FARC's political strategy that has traditionally maintained consistency. This article argues that the 2016 Peace Agreement has the potential to enhance democratic, political, and societal participation by engaging with FARC in two key ways—by attempting to reconcile key FARC grievances and containing specific mechanisms that increase participation of traditionally marginalized groups in Colombia. This article argues that the Agreement has impacted positively on FARC's political participation and given it incentives to pursue its political strategy democratically. Likewise, the Agreement has provided a positive-sum outcome for the Colombian government to strengthen its democratic legitimacy by placing emphasis on structural reform.
Journal: Studies in Conflict & Terrorism
Pages: 836-852
Issue: 9
Volume: 42
Year: 2019
Month: 9
X-DOI: 10.1080/1057610X.2018.1432027
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1432027
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:42:y:2019:i:9:p:836-852

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1471965_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dr Bernhard Blumenau
Author-X-Name-First: Dr Bernhard
Author-X-Name-Last: Blumenau
Author-Name: Professor Jussi M. Hanhimäki
Author-X-Name-First: Professor Jussi M.
Author-X-Name-Last: Hanhimäki
Title: Introduction
Journal: Studies in Conflict & Terrorism
Pages: 1-4
Issue: 1
Volume: 43
Year: 2020
Month: 1
X-DOI: 10.1080/1057610X.2018.1471965
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1471965
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:1:p:1-4



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1471967_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Felicitas Fischer von Weikersthal
Author-X-Name-First: Felicitas Fischer
Author-X-Name-Last: von Weikersthal
Title: From Terrorists to Statesmen: Terrorism and Polish Independence
Abstract: 
 This article examines the legacies of radical and terrorist pasts in Józef Piłsudski's “moral dictatorship” in interwar Poland. Leading figures of Piłsudki's government had been involved in the fight for Polish independence already during the years of the Russian Revolution of 1905. They joined the radical fighting squads of the Polish Socialist Party and participated in acts of political and economic terror. Exploring in detail the terrorist past of these later statesmen this article argues that their terrorist backgrounds were reflected in and shaped the nature of Piłsudki's leadership.
Journal: Studies in Conflict & Terrorism
Pages: 5-23
Issue: 1
Volume: 43
Year: 2020
Month: 1
X-DOI: 10.1080/1057610X.2018.1471967
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1471967
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:1:p:5-23



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1471968_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andrea Chiampan
Author-X-Name-First: Andrea
Author-X-Name-Last: Chiampan
Title: Encountering Violence: The Movement and the Legitimation of Violence at the Eve of Italy's anni di piombo
Abstract: 
 In re-evaluating the origins of Italian clandestine political violence groups in the early 1970s, this article sheds new light on overlapping processes of legitimation of violence that took place in that “transitional space” created by the 1968–69 social upheavals. Eschewing mono-causal explanations, this article points attention to how violence was legitimized at different levels: in the interaction between the movement and the “protest policing”; in the competing memories of the Resistenza that generated opposing extremes; and at an international/transnational level, where the Cold War and the mythology of the decolonization movements framed and inspired the choices of Italians terrorists.
Journal: Studies in Conflict & Terrorism
Pages: 24-46
Issue: 1
Volume: 43
Year: 2020
Month: 1
X-DOI: 10.1080/1057610X.2018.1471968
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1471968
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:1:p:24-46



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1471969_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bernhard Blumenau
Author-X-Name-First: Bernhard
Author-X-Name-Last: Blumenau
Title: Unholy Alliance: The Connection between the East German Stasi and the Right-Wing Terrorist Odfried Hepp
Abstract: 
 This article, providing an example of state support for terrorists, looks at the cooperation between the Stasi and the right-wing West German terrorist Odfried Hepp in the 1980s. Based on research in Stasi archives, the article explains that gathering information, rather than using him as a terrorist weapon in the Cold War, was the main motivator for the Stasi to cooperate with a high-profile neo-Nazi. By looking at the details of the Hepp-Stasi alliance, it assesses what forms, results, and dangers this relationship produced. The article challenges the myth of the all-mighty East German State Security and demonstrates that the dynamics of this alliance were not always in the Stasi's favour. In the absence of other instruments of coercion, the Stasi used the personal relationship between Hepp and his officers to control him. The article offers insights into Hepps's terrorist career but also the pragmatic way in which the Stasi built its network of informants outside the GDR. It also adds nuances to the understanding of the relationship between Socialist states and terrorists during the Cold War.
Journal: Studies in Conflict & Terrorism
Pages: 47-68
Issue: 1
Volume: 43
Year: 2020
Month: 1
X-DOI: 10.1080/1057610X.2018.1471969
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1471969
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:1:p:47-68



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1471970_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Adrian Hänni
Author-X-Name-First: Adrian
Author-X-Name-Last: Hänni
Title: Secret Bedfellows? The KGB, Carlos the Jackal and Cold War Psychological Warfare
Abstract: 
 This article contributes to the understanding of the emergence, character, and significance of conspiracy theories on state–terrorism relations by providing a historical case study on the “Carlos–KGB [Komitet gosudarstvennoy bezopasnosti] conspiracy theory”: the fictional narrative that the “super-terrorist” Carlos the Jackal was an agent of the KGB, exploited against the Soviet Union's Cold War enemies. The analysis shows that the stories originated from disinformation operations of Western intelligence services, which were then spread by the news media, politicians, and Carlos himself. The mythical Carlos simulated through Cold War psychological warfare is deconstructed as a symbol of Soviet control of international terrorism.
Journal: Studies in Conflict & Terrorism
Pages: 69-87
Issue: 1
Volume: 43
Year: 2020
Month: 1
X-DOI: 10.1080/1057610X.2018.1471970
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1471970
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:1:p:69-87

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1510610_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Isabelle Côté
Author-X-Name-First: Isabelle
Author-X-Name-Last: Côté
Author-Name: Limingcui Emma Huang
Author-X-Name-First: Limingcui Emma
Author-X-Name-Last: Huang
Title: Where are the Daughters? Examining the Effects of Gendered Migration on the Dynamics of “Sons of the Soil” Conflict
Abstract: 
 Why are female migrants rarely attacked in “Sons of the Soil” (SoS) violence? Based on interviews with key stakeholders in Indonesia and China, we argue that women are shielded from the brunt of migration-related violence due to gendered patterns of migration and economic integration that highlights the positive contributions of female migration to the host region while drawing attention to the threat posed by male migration. By bringing together the literature on migration, gender, inequalities, and conflict, this article makes a foray into the previously unexamined dynamics affecting victimization patterns in armed conflict in general and SoS conflict in particular.
Journal: Studies in Conflict & Terrorism
Pages: 837-853
Issue: 10
Volume: 43
Year: 2020
Month: 10
X-DOI: 10.1080/1057610X.2018.1510610
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1510610
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:10:p:837-853



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1505686_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Matteo Vergani
Author-X-Name-First: Matteo
Author-X-Name-Last: Vergani
Author-Name: Muhammad Iqbal
Author-X-Name-First: Muhammad
Author-X-Name-Last: Iqbal
Author-Name: Ekin Ilbahar
Author-X-Name-First: Ekin
Author-X-Name-Last: Ilbahar
Author-Name: Greg Barton
Author-X-Name-First: Greg
Author-X-Name-Last: Barton
Title: The Three Ps of Radicalization: Push, Pull and Personal. A Systematic Scoping Review of the Scientific Evidence about Radicalization Into Violent Extremism
Abstract: 
 In this article, we present the findings of the first systematic scoping review of scientific literature on radicalization into violent extremism since the Al Qaeda attacks on 11 September 2001. We selected and categorized all scholarly, peer-reviewed, English-language articles published between 2001 and 2015 that empirically investigated the factors of radicalization into violent extremism (N = 148). In the analysis we consider two main dependent variables (behavioral and cognitive radicalization) and three main independent variables (push, pull, and personal factors). “Pull” factors of radicalization emerge as the main factors of radicalization across studies focused on different geographical areas and ideologies. This article points to the need to focus more on the interaction between push, pull, and personal factors, and to diversify the methodologies used in the field.
Journal: Studies in Conflict & Terrorism
Pages: 854-854
Issue: 10
Volume: 43
Year: 2020
Month: 10
X-DOI: 10.1080/1057610X.2018.1505686
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1505686
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:10:p:854-854



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1507312_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Matthijs Bogaards
Author-X-Name-First: Matthijs
Author-X-Name-Last: Bogaards
Title: Kinder, Gentler, Safer? A Re-Examination of the Relationship between Consensus Democracy and Domestic Terrorism
Abstract: 
 Can inclusive institutions tame the threat of domestic terrorism? In a series of recent publications, the political scientists Arend Lijphart and Matt Qvortrup claim that consensus democracies are not only kinder and gentler, but also safer: consensus democracies are less likely to experience deadly domestic terrorism and when they do, they suffer fewer fatalities than majoritarian democracies. This article reexamines the logic and the evidence. It argues that the underlying grievance theory of terrorism contains important gaps and that the statistical results are based on a problematic coding of cases and lack robustness. Lijphart and Qvortrup have opened up an important new line of inquiry, but their results do not withstand scrutiny.
Journal: Studies in Conflict & Terrorism
Pages: 886-903
Issue: 10
Volume: 43
Year: 2020
Month: 10
X-DOI: 10.1080/1057610X.2018.1507312
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1507312
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:10:p:886-903



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1529376_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Matt Qvortrup
Author-X-Name-First: Matt
Author-X-Name-Last: Qvortrup
Title: The Logic of Domestic Terrorism Revisited: A Response to a Critic
Abstract: 
 The article responds to criticisms raised by Matthijs Bogaards. While he makes a number of valid methodological points, it is maintained that the Qvortrup–Lijphart Model of Domestic Terrorism remains paradigmatic. Part of the criticism seems to be based on a misunderstanding of the requirement that causal theories should be as parsimonious as possible. Further, Bogaards does not provide an alternative that both accounts for the occurrences explained by the model as well as the issues that were explained by it (as is required by falsificationist methodological rules). In short, the theory that institutions can contribute to limiting the occurrence of domestic terrorism remains strong, at least in developed capitalist societies. There is no viable alternative; opportunities for democratic engagement are a potent force against political violence.
Journal: Studies in Conflict & Terrorism
Pages: 904-909
Issue: 10
Volume: 43
Year: 2020
Month: 10
X-DOI: 10.1080/1057610X.2018.1529376
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1529376
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:10:p:904-909



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1529375_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Matthijs Bogaards
Author-X-Name-First: Matthijs
Author-X-Name-Last: Bogaards
Title: Coding, Concessions, Conclusions: A Reply to Matt Qvortrup
Journal: Studies in Conflict & Terrorism
Pages: 910-912
Issue: 10
Volume: 43
Year: 2020
Month: 10
X-DOI: 10.1080/1057610X.2018.1529375
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1529375
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:10:p:910-912



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1506560_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Zeynab Malakoutikhah
Author-X-Name-First: Zeynab
Author-X-Name-Last: Malakoutikhah
Title: Iran: Sponsoring or Combating Terrorism?
Abstract: 
 Iran has a longstanding connection with terrorism, in particular after the 1979 Islamic Revolution. It has been recognized as both a victim and state sponsor of terrorism, but has predominantly been accused of supporting terrorism worldwide. Iran has been accused of training, financing, and providing weapons and safe havens for nonstate militant actors, such as Hezbollah and Hamas. While Iran considers such groups as national liberation movements, they are by contrast designated as terrorist groups according to other countries. At the same time, Iran has suffered from terrorist attacks, although Iranian security has proven much superior to its neighbors, such as Iraq, Syria, and Afghanistan. Regardless of claims relating to Iran as a victim or sponsor of terrorism, no official policy or document has been published by the government by way of a counterterrorism policy because any stated policy would be subject to accountability, human rights, and the rule of law. In practice, its focus is placed on the “War by Terror” as an external instrument as opposed to internal “Counterterrorism.” By analysis of official documents, statements, and laws, both Persian and English sources, this article aims to clarify Iran’s counterterrorism policy and framework and the actual practices of Iran in the Middle East.
Journal: Studies in Conflict & Terrorism
Pages: 913-939
Issue: 10
Volume: 43
Year: 2020
Month: 10
X-DOI: 10.1080/1057610X.2018.1506560
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1506560
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:10:p:913-939

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1507790_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Erin M. Kearns
Author-X-Name-First: Erin M.
Author-X-Name-Last: Kearns
Author-Name: Victor Asal
Author-X-Name-First: Victor
Author-X-Name-Last: Asal
Author-Name: James Igoe Walsh
Author-X-Name-First: James Igoe
Author-X-Name-Last: Walsh
Author-Name: Christopher Federico
Author-X-Name-First: Christopher
Author-X-Name-Last: Federico
Author-Name: Anthony F. Lemieux
Author-X-Name-First: Anthony F.
Author-X-Name-Last: Lemieux
Title: Political Action as a Function of Grievances, Risk, and Social Identity: An Experimental Approach
Abstract: 
 Why would individuals engage in or support contentious politics? This question is challenging to answer with observational data where causal factors are correlated and difficult to measure. Using a survey-embedded experiment, we focus on three situational factors: grievances, risk, and identity. We also explore how individual differences in sociopolitical orientations—social dominance orientation (SDO) and right-wing authoritarianism (RWA)—impact action. Grievances influence engagement in and support for protests. Risk influences engagement in protest, but not support for it. Regardless of condition, SDO and RWA help explain why some people engage in protest while others do not, particularly within the same context.
Journal: Studies in Conflict & Terrorism
Pages: 941-958
Issue: 11
Volume: 43
Year: 2020
Month: 11
X-DOI: 10.1080/1057610X.2018.1507790
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1507790
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:11:p:941-958



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1514079_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: William Moravits
Author-X-Name-First: William
Author-X-Name-Last: Moravits
Title: Attack at Fort Hood: Experiences and Suggestions for Security
Abstract: 
 In the past nine years, three lone wolf terrorists have targeted military bases or recruiting centers in the United States and research suggests attacks on the U.S. military are increasing globally. The problem was that research had not addressed the lived experiences of survivors of lone wolf attacks, nor how they could inform procedures regarding a sense of security for military men and women. The purpose of this research was to establish a need to address threats to the security of the military from these attacks, to provide a rich description of survivors’ experiences of the attack at Fort Hood, and to identify suggestions for improving military personnel’s sense of security while on base. Using the community-based approach to public health. the central research question asked how the lived experiences of survivors of the attack at Fort Hood could lead to an increased sense of security on base. The study revealed high levels of stress, hyperawareness, and negative changes in the lives of these soldiers. The findings suggest an increased show of force by police throughout the base, a designated office for anonymously reporting suspicious activity, and more training to help soldiers cope with the experiences of combat-related trauma.
Journal: Studies in Conflict & Terrorism
Pages: 959-988
Issue: 11
Volume: 43
Year: 2020
Month: 8
X-DOI: 10.1080/1057610X.2018.1514079
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1514079
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:11:p:959-988



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1512237_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jesse C. Reiff
Author-X-Name-First: Jesse C.
Author-X-Name-Last: Reiff
Title: When Ali Comes Marching Home: Shi’a Foreign Fighters after Syria
Abstract: 
 Since the Syrian Civil War broke out in 2011, there has been an unprecedented mobilization of Iran-backed Shi’a foreign fighters to Syria to protect Shi’a communities and shrines, combat the Islamic State, and buttress Syrian President Bashar al-Assad. As the conflict nears a resolution, the fate of these Shi’a fighters remains uncertain. This article argues large numbers of Shi’a foreign fighters will engage in domestic and transnational insurgency and civil war due to hardening sectarian identities, a nascent pan-Shi’a ideology, Iranian direction, and the presence on ongoing conflicts in the Middle East and South Asia; however, the threat is lessened by so-called off-ramps, ranging from death to disillusionment with conflict. The article concludes with implications and policy recommendations for U.S. leaders.
Journal: Studies in Conflict & Terrorism
Pages: 989-1010
Issue: 11
Volume: 43
Year: 2020
Month: 11
X-DOI: 10.1080/1057610X.2018.1512237
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1512237
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:11:p:989-1010



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1514054_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Melissa J. Salyk-Virk
Author-X-Name-First: Melissa J.
Author-X-Name-Last: Salyk-Virk
Title: Building Community Resilience? Community Perspectives of the Countering Violent Extremism Pilot Program in Minneapolis/St. Paul
Abstract: 
 In August 2011, international recruitment to terrorist groups became a growing concern for the United States. The Obama administration started a public–private partnership pilot program focused on countering violent extremism (CVE) in the United States. This program was the first of its kind. It directly addressed the administration’s concern about domestic violent extremism and radicalization in the United States. The Twin Cities’ program, Building Community Resilience, focused primarily on prevention of radicalization through a community and government partnership. This article analyzes tensions between government-sanctioned CVE approaches and the communities where programs are implemented. Until now, research and analysis have not been performed on this specific program from a community perspective.
Journal: Studies in Conflict & Terrorism
Pages: 1011-1042
Issue: 11
Volume: 43
Year: 2020
Month: 11
X-DOI: 10.1080/1057610X.2018.1514054
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1514054
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:11:p:1011-1042

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1514093_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Charles W. Mahoney
Author-X-Name-First: Charles W.
Author-X-Name-Last: Mahoney
Title: Empty Threats: How Extremist Organizations Bluff in Terrorist Campaigns
Abstract: 
 Why do extremist organizations issue terrorist bluffs? According to previous research, empty threats against civilians are likely to negatively influence assessments of groups’ strength and credibility, thus making it more difficult for extremists to achieve their goals. Despite these potential audience costs, bluffing is a common terrorist tactic. This inquiry assesses data on the bluffing patterns of three organizations—Boko Haram, Jamaat-ul-Ahrar, and the Real Irish Republican Army—and finds that groups suffer few costs for making empty terrorist threats. Furthermore, extremists bluff to advance a variety of strategic goals including outbidding rival factions, spoiling peace settlements, and intimidating civilians.
Journal: Studies in Conflict & Terrorism
Pages: 1043-1063
Issue: 12
Volume: 43
Year: 2020
Month: 12
X-DOI: 10.1080/1057610X.2018.1514093
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1514093
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:12:p:1043-1063



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1520797_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nathan González Mendelejis
Author-X-Name-First: Nathan
Author-X-Name-Last: González Mendelejis
Title: Toward a New Typology of Sunni Jihad
Abstract: 
 One recurring theme of the immediate post-9/11 environment was that of regional political organizations and violent lone-wolf actors pledging allegiance to Osama bin Laden’s Al Qaeda group (AQ). Following the Islamic State of Iraq and Syria (ISIS)’s 2014 capture of Mosul, Iraq, many of these loose affiliations began shifting to ISIS. This resulted in a blurring of distinctions between different types of Sunni jihadi organizations, with media commentators and analysts at times referring to groups as “Al Qaeda–like” or “ISIS-affiliated,” despite those groups’ goals and operational scopes being largely disconnected from both AQ and ISIS. This article proposes a new typology of Sunni jihadi groups according to theater of operation, strategy, and geopolitical alignment. This typology offers three categories: global jihad, local jihad, and sectarian jihad. In addition, it identifies four types of operation types that Sunni jihadi groups adopt: (1) core theater attacks, (2) power-projection attacks, (3) local recruitment, and (4) foreign recruitment. The main contribution of this article is its frameworks for improving the quality of the analysis of Sunni jihadi groups.
Journal: Studies in Conflict & Terrorism
Pages: 1064-1085
Issue: 12
Volume: 43
Year: 2020
Month: 12
X-DOI: 10.1080/1057610X.2018.1520797
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1520797
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:12:p:1064-1085



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1529367_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Niamatullah Ibrahimi
Author-X-Name-First: Niamatullah
Author-X-Name-Last: Ibrahimi
Author-Name: Shahram Akbarzadeh
Author-X-Name-First: Shahram
Author-X-Name-Last: Akbarzadeh
Title: Intra-Jihadist Conflict and Cooperation: Islamic State–Khorasan Province and the Taliban in Afghanistan
Abstract: 
 The proliferation of jihadist groups raises intriguing questions about their internal relationship. Drawing on Resource Mobilization Theory we explore this question by examining the relationship between the Taliban and the local incarnations of the Islamic State of Iraq and Syrian (ISIS) in Afghanistan. We conceive the Taliban and ISIS as parts of a broader “jihadist movement industry” that is simultaneously united and divided by the logic of their embeddedness in the movement. While most existing research emphasizes intra-jihadist conflict or rivalry, we found that the relationship between the two groups goes through cyclical shifts, vacillating between conflict and cooperation.
Journal: Studies in Conflict & Terrorism
Pages: 1086-1107
Issue: 12
Volume: 43
Year: 2020
Month: 12
X-DOI: 10.1080/1057610X.2018.1529367
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1529367
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:12:p:1086-1107



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1523358_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tom Smith
Author-X-Name-First: Tom
Author-X-Name-Last: Smith
Author-Name: Peter Lee
Author-X-Name-First: Peter
Author-X-Name-Last: Lee
Author-Name: Vladimir Rauta
Author-X-Name-First: Vladimir
Author-X-Name-Last: Rauta
Author-Name: Sameera Khalfey
Author-X-Name-First: Sameera
Author-X-Name-Last: Khalfey
Title: Understanding the Syria Babel: Moral Perspectives on the Syrian Conflict from Just War to Jihad
Abstract: 
 The war in Syria, and its ongoing analysis, is burdened by a variety of seemingly irreconcilable political motivations, actions, ideologies, religious affiliations, and power dynamics of multiple state and nonstate actors. In this context, various moral perspectives appear to come into direct conflict, underpinning the actions of the actors involved and to varying degrees influencing their competing political interests. Is there a coherent dialogue of moralities between the rivals involved or is Babel reborn with moral claims being launched but with no real exchange of meaning involved? On Syria, the answer is a complicated mixture of both but within which are important and as yet underappreciated patterns of convergence and divergence. This article looks at the leading states involved as well as the role of individuals to elucidate this pattern of overlap and difference in the morality discourses surrounding Syria. Ultimately, it is argued that a moral Babel is not reborn in Syria: there is sufficiently common moral language being used by all sides for a degree of shared meaning to emerge. The challenge is for the protagonists to listen and really hear what is being said and work with those commonalties as tools toward peace.
Journal: Studies in Conflict & Terrorism
Pages: 1108-1128
Issue: 12
Volume: 43
Year: 2020
Month: 12
X-DOI: 10.1080/1057610X.2018.1523358
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1523358
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:12:p:1108-1128

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1442141_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jacob Zenn
Author-X-Name-First: Jacob
Author-X-Name-Last: Zenn
Title: Boko Haram's Conquest for the Caliphate: How Al Qaeda Helped Islamic State Acquire Territory
Abstract: 
 This article explains how Al Qaeda in the Islamic Maghreb (AQIM)–trained Nigerian militants split from Boko Haram and formed a new group called Ansaru in 2011 after consulting with AQIM. Ansaru leaders, however, reintegrated with Boko Haram and transferred their specialized skills in kidnappings, suicide bombings, and media to Boko Haram and contributed to the group's conquest of territory in 2013. Al Qaeda did not benefit from these conquests because Ansaru leaders switched loyalties and helped arrange Boko Haram's pledge to Islamic State in 2015. This article exploits primary source documents from AQIM, Islamic State, and Boko Haram and contributes to the literature on splits and mergers and knowledge transfer between terrorist groups and Al Qaeda–Islamic State competition.
Journal: Studies in Conflict & Terrorism
Pages: 89-122
Issue: 2
Volume: 43
Year: 2020
Month: 2
X-DOI: 10.1080/1057610X.2018.1442141
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1442141
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:2:p:89-122



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1445500_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Shelli Israelsen
Author-X-Name-First: Shelli
Author-X-Name-Last: Israelsen
Title: Why Now? Timing Rebel Recruitment of Female Combatants
Abstract: 
 Using case study evidence, this article demonstrates how the relationship between conflict intensity, gender inclusive ideologies and gender inclusive policies on one hand, and the decision to recruit female combatants on the other hand, is conditioned by the groups' conflict phase. Conflict phases divide conflict events into two distinct parts, the guerrilla activity phase and the civil war phase, contingent on the insurgents' number of armed fighters, military capabilities, level of institutionalization and degree of territorial control. These conflict phases affect the recruitment behavior of insurgent groups making them more likely to recruit female combatants in the civil war phase and less likely to do so in the guerrilla activity phase.
Journal: Studies in Conflict & Terrorism
Pages: 123-144
Issue: 2
Volume: 43
Year: 2020
Month: 2
X-DOI: 10.1080/1057610X.2018.1445500
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1445500
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:2:p:123-144



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1445501_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Paul Gill
Author-X-Name-First: Paul
Author-X-Name-Last: Gill
Author-Name: Zoe Marchment
Author-X-Name-First: Zoe
Author-X-Name-Last: Marchment
Author-Name: Emily Corner
Author-X-Name-First: Emily
Author-X-Name-Last: Corner
Author-Name: Noémie Bouhana
Author-X-Name-First: Noémie
Author-X-Name-Last: Bouhana
Title: Terrorist Decision Making in the Context of Risk, Attack Planning, and Attack Commission
Abstract: 
 Terrorists from a wide array of ideological influences and organizational structures consider security and risk on a continuous and rational basis. The rationality of terrorism has been long noted of course but studies tended to focus on organizational reasoning behind the strategic turn toward violence. A more recent shift within the literature has examined rational behaviors that underpin the actual tactical commission of a terrorist offense. This article is interested in answering the following questions: What does the cost–benefit decision look like on a single operation? What does the planning process look like? How do terrorists choose between discrete targets? What emotions are felt during the planning and operational phases? What environmental cues are utilized in the decision-making process? Fortunately, much insight is available from the wider criminological literature where studies often provide offender-oriented accounts of the crime commission process. We hypothesize similar factors take place in terrorist decision making and search for evidence within a body of terrorist autobiographies.
Journal: Studies in Conflict & Terrorism
Pages: 145-160
Issue: 2
Volume: 43
Year: 2020
Month: 2
X-DOI: 10.1080/1057610X.2018.1445501
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1445501
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:2:p:145-160



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1446295_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Paul B. Rich
Author-X-Name-First: Paul B.
Author-X-Name-Last: Rich
Title: Hollywood and Cinematic Representations of Far-Right Domestic Terrorism in the U.S
Abstract: 
 This article argues that a major influence on the imagery of far-right terrorism in the United States derives from cinema. Most of the feature films released by Hollywood on this theme have been rather superficial and have rarely strayed beyond portraying right-wing terrorist movements in popular genres such as westerns, crime thrillers, and romantic melodramas—although not, interestingly, action adventure movies, so often the terrain for narratives involving external terrorist movements. The article contends that U.S. far-right terrorism before the 1990s was anchored in the films depicting the Ku Klux Klan; more recently, a few films have begun to engage with “new” forms of far-right terrorism involving skinheads, neo-Nazis, and “patriot” militias. Overall, remarkably few films released by Hollywood have engaged with the structure of far-right terrorist movements or the motivations of their followers. This has ensured that the movements remained shadowy organizations run, for the most part, by two-dimensional and stereotypical characters.
Journal: Studies in Conflict & Terrorism
Pages: 161-182
Issue: 2
Volume: 43
Year: 2020
Month: 2
X-DOI: 10.1080/1057610X.2018.1446295
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1446295
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:2:p:161-182

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1444955_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Simon Cottee
Author-X-Name-First: Simon
Author-X-Name-Last: Cottee
Author-Name: Jack Cunliffe
Author-X-Name-First: Jack
Author-X-Name-Last: Cunliffe
Title: Watching ISIS: How Young Adults Engage with Official English-Language ISIS Videos
Abstract: 
 Research on jihadist online propaganda (JOP) tends to focus on the production, content, and dissemination of jihadist online messages. Correspondingly, the target of JOP—that is, the audience—has thus far attracted little scholarly attention. This article seeks to redress this neglect by focusing on how audiences respond to jihadist online messaging. It presents the findings of an online pilot survey testing audience responses to clips from English-language Islamic State of Iraq and Syria videos. The survey was beset at every stage by ethical, legal, and practical restrictions, and we discuss how these compromised our results and what this means for those attempting to do research in this highly sensitive area.
Journal: Studies in Conflict & Terrorism
Pages: 183-207
Issue: 3
Volume: 43
Year: 2020
Month: 3
X-DOI: 10.1080/1057610X.2018.1444955
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1444955
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:3:p:183-207



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1450613_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Suraj Lakhani
Author-X-Name-First: Suraj
Author-X-Name-Last: Lakhani
Title: Extreme Criminals: Reconstructing Ideas of Criminality through Extremist Narratives
Abstract: 
 There is a growing body of evidence to suggest that there has been a determined effort by Al Qaeda, and more recently Islamic State, to recruit petty and street criminals into their networks. Despite this, and increasing global concern, there exists very little scholarly literature exploring this phenomenon, particularly empirically grounded. This article directly addresses this gap in research, and is one of the, if not the, first to present an analysis underpinned by qualitative empirical interview data, collected from former extremists and active grassroots workers in the United Kingdom. The article determines that through religious and social justifications offered to reduce moral concerns, extremists encourage criminals to continue, intensify, and diversify their criminality, with intentions to fund violent extremist activity, or to create social unrest within society. Rather than attempting to change behavior, this is about reconstructing criminals’ motivations; a consideration that has wider implications for counterterrorism policy and operations.
Journal: Studies in Conflict & Terrorism
Pages: 208-223
Issue: 3
Volume: 43
Year: 2020
Month: 3
X-DOI: 10.1080/1057610X.2018.1450613
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1450613
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:3:p:208-223



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1455372_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Erik Cruz
Author-X-Name-First: Erik
Author-X-Name-Last: Cruz
Author-Name: Stewart J. D'Alessio
Author-X-Name-First: Stewart J.
Author-X-Name-Last: D'Alessio
Author-Name: Lisa Stolzenberg
Author-X-Name-First: Lisa
Author-X-Name-Last: Stolzenberg
Title: The Labor Market and Terrorism
Abstract: 
 Using six years of data (2011–16) drawn from the Global Terrorism Database and from other sources for 127 countries, a pooled cross-sectional time-series research design is employed to investigate whether the health of a country's labor market influences the number of terrorist incidents a country experiences. Results show a strong negative relationship between labor force participation and the frequency of terrorist incidents. Neither the youth unemployment rate nor the unemployment rate has a notable influence on predicting acts of terrorism. Findings also reveal that the percent of a country's population living in urban areas does not condition the relationship between labor force participation and terrorism. The observed effect of labor force participation has methodological consequences for how a country's labor market ought to be conceptualized in future research studies on terrorism. Such a finding also has relevant policy implications because it suggests that greater attention should be directed at devising ways for countries to enhance employment opportunities not only to improve economic conditions, but also to assist in the reduction of terrorism.
Journal: Studies in Conflict & Terrorism
Pages: 224-238
Issue: 3
Volume: 43
Year: 2020
Month: 3
X-DOI: 10.1080/1057610X.2018.1455372
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1455372
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:3:p:224-238



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1457204_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Samantha Weirman
Author-X-Name-First: Samantha
Author-X-Name-Last: Weirman
Author-Name: Audrey Alexander
Author-X-Name-First: Audrey
Author-X-Name-Last: Alexander
Title: Hyperlinked Sympathizers: URLs and the Islamic State
Abstract: 
 The self-proclaimed Islamic State of Iraq and Syria (ISIS) and its supporters take measured steps to ensure the group's survival in the virtual sphere, despite continued efforts to undercut the organization. This study examines a time-bound sample of 240,158 Uniform Resource Locators shared among English-language ISIS sympathizers on Twitter to better understand how networks in the jihadisphere inoculate radical materials and communities online. A thematic but descriptive analysis of results illustrates the dynamic apparatus of digital communications leveraged by ISIS. Findings suggest a more comprehensive strategy to undercut ISIS's web of online information requires a similarly networked response by counterextremism practitioners.
Journal: Studies in Conflict & Terrorism
Pages: 239-257
Issue: 3
Volume: 43
Year: 2020
Month: 3
X-DOI: 10.1080/1057610X.2018.1457204
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1457204
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:3:p:239-257

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1455373_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kira Harris
Author-X-Name-First: Kira
Author-X-Name-Last: Harris
Title: Russia's Fifth Column: The Influence of the Night Wolves Motorcycle Club
Abstract: 
 While the Night Wolves Motorcycle Club's (NWMC) roots are similar to Western counterparts such as the Hells Angels MC and Bandidos MC, they have evolved into a proxy of the Russian state who unite combat-ready diasporas. The NWMC nongovernmental organization provides soft propaganda while they operate alongside the Russian military and imbed military tactics into foreign Russian populations through their corporate entity Wolf Holding of Security Structures. This case study explores the evolution from outlaw motorcycle club to political force and their integration into Russia's information operations and conflict. The NWMC activities in Eastern Europe, particularly Ukraine, highlight how this motorcycle club has been able to cultivate a fifth column to agitate domestic politics and increase ties to the Kremlin.
Journal: Studies in Conflict & Terrorism
Pages: 259-273
Issue: 4
Volume: 43
Year: 2020
Month: 4
X-DOI: 10.1080/1057610X.2018.1455373
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1455373
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:4:p:259-273



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1457420_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jonathan Pieslak
Author-X-Name-First: Jonathan
Author-X-Name-Last: Pieslak
Author-Name: Nelly Lahoud
Author-X-Name-First: Nelly
Author-X-Name-Last: Lahoud
Title: The Anashid of the Islamic State: Influence, History, Text, and Sound
Abstract: 
 This article examines the rise of the Islamic State (IS) through its anashid (a cappella), analyzing their lyrics and their musical attributes such as sonic elements, pitch, and harmony, among others. It focuses on key themes that define the group's lyrics and traces the evolution of anashid production and use—an evolution that began with the IS borrowing existing jihad-themed anashid to articulate its message and accompany its video messaging, and led to a far more developed and sophisticated sonic identity in the form of internally produced, group-specific anashid. The IS's claims to legitimacy as the caliphate are sounded out in the group's anashid. The recurring appearance of propaganda in the form of anashid and videos builds a strong case for the genre's significance among the highly complex factors catalyzing an individual's involvement in carrying out violence, especially among recent attacks within Western countries in the name of IS.
Journal: Studies in Conflict & Terrorism
Pages: 274-299
Issue: 4
Volume: 43
Year: 2020
Month: 4
X-DOI: 10.1080/1057610X.2018.1457420
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1457420
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:4:p:274-299



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1454042_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Edward Newman
Author-X-Name-First: Edward
Author-X-Name-Last: Newman
Title: Hungry, or Hungry for Change? Food Riots and Political Conflict, 2005–2015
Abstract: 
 This article presents new, original data on food riots and protests between 2005 and 2015 and explores the societal conditions in which these events occurred. These conditions include a range of economic, social, demographic, political, and household consumption factors, with reference to a number of conflict theories. The article explores whether instability related to food prices should be seen as an expression of hunger within the most vulnerable and deprived societies, or a demonstration of grievances rooted in broader political contestation. The article also contributes to debates about the methodological challenges of focusing on food prices as a factor relevant to instability and conflict, and the question of whether food riots have significance to broader debates about conflict.
Journal: Studies in Conflict & Terrorism
Pages: 300-324
Issue: 4
Volume: 43
Year: 2020
Month: 4
X-DOI: 10.1080/1057610X.2018.1454042
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1454042
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:4:p:300-324



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1462135_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nazih Richani
Author-X-Name-First: Nazih
Author-X-Name-Last: Richani
Title: Fragmented Hegemony and the Dismantling of the War System in Colombia
Abstract: 
 Establishing peace in Colombia has been an enigma escaping the best intentions of some presidents. The causes of this riddle are multiple. Some attributed it to the nature of the state-making process led by a fractured elite compounded with the state limited resources in a country with one of the most complex topographies in the world. This article tackles part of this puzzle, particularly the inability of any fraction of the elite to establish its hegemonic vision over the others and hence to pacify the polity. It explores why previous presidents who attempted to find a peaceful settlement of its long armed conflict failed and why and how did President Juan Manuel Santos succeed. Against the backdrop of a fragmented hegemony, I analyze two core areas that have received scant attention in the literature, which are essential to understand the previous failures. The role of the United States in the Colombian conflict and the excessive autonomy of Colombia military institution vis-à-vis the executive in conducting the war.
Journal: Studies in Conflict & Terrorism
Pages: 325-350
Issue: 4
Volume: 43
Year: 2020
Month: 4
X-DOI: 10.1080/1057610X.2018.1462135
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1462135
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:4:p:325-350

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1471972_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Zachary Kallenborn
Author-X-Name-First: Zachary
Author-X-Name-Last: Kallenborn
Author-Name: Philipp C. Bleek
Author-X-Name-First: Philipp C.
Author-X-Name-Last: Bleek
Title: Avatars of the Earth: Radical Environmentalism and Chemical, Biological, Radiological, and Nuclear (CBRN) Weapons
Abstract: 
 Terrorists combining motivations and capabilities to conduct significant chemical, biological, radiological, or nuclear (CBRN) attacks are, logically and empirically, outliers. Certain characteristics of radical environmentalism heighten the risk of such outliers. The majority of even radical environmentalists embrace nonviolence. Those who turn violent mostly do so in limited ways due to a combination of motivations and capabilities. Fringe elements are motivated to commit large-scale—including CBRN—violence, but are mostly constrained by capability. Yet eco-radicalism also draws more capable adherents. If serious CBRN terrorism attacks occur—a risk about which analysts differ markedly—radical environmentalist fringe actors are plausible perpetrators.
Journal: Studies in Conflict & Terrorism
Pages: 351-381
Issue: 5
Volume: 43
Year: 2020
Month: 5
X-DOI: 10.1080/1057610X.2018.1471972
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1471972
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:5:p:351-381



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1463615_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Amir Rostami
Author-X-Name-First: Amir
Author-X-Name-Last: Rostami
Author-Name: Joakim Sturup
Author-X-Name-First: Joakim
Author-X-Name-Last: Sturup
Author-Name: Hernan Mondani
Author-X-Name-First: Hernan
Author-X-Name-Last: Mondani
Author-Name: Pia Thevselius
Author-X-Name-First: Pia
Author-X-Name-Last: Thevselius
Author-Name: Jerzy Sarnecki
Author-X-Name-First: Jerzy
Author-X-Name-Last: Sarnecki
Author-Name: Christofer Edling
Author-X-Name-First: Christofer
Author-X-Name-Last: Edling
Title: The Swedish Mujahideen: An Exploratory Study of 41 Swedish Foreign Fighters Deceased in Iraq and Syria
Abstract: 
 This study analyzes the demographics, criminality, and network relations of forty-one deceased Swedish foreign fighters. Our results show that most of the deceased Swedish foreign fighters were on average just under 26 years old when they died. Concerning network relations, nineteen out of the forty-one foreign fighters had at least one relationship (next-of-kin or friend) with another deceased foreign fighter. Two thirds were previously suspected of at least one crime. Based on our results, we argue that more attention needs to be given to tertiary and secondary prevention directed toward foreign fighter hubs.
Journal: Studies in Conflict & Terrorism
Pages: 382-395
Issue: 5
Volume: 43
Year: 2020
Month: 5
X-DOI: 10.1080/1057610X.2018.1463615
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1463615
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:5:p:382-395



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1469587_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nam Kyu Kim
Author-X-Name-First: Nam Kyu
Author-X-Name-Last: Kim
Author-Name: Gary Uzonyi
Author-X-Name-First: Gary
Author-X-Name-Last: Uzonyi
Title: Government Mass Killing and Post-Conflict Domestic Trials
Abstract: 
 Why do some countries implement trials to punish perpetrators of state-sponsored mass killing during civil war? A common explanation is that domestic and international demand for justice pressures the government to implement trials. However, this demand is unlikely to produce prosecutions because state-sponsored violence during fighting provides elites incentive to conceal information after war. The revelation of information concerning the government's atrocities could result in renewed domestic instability or international sanction. Therefore, a government that has committed atrocities during the civil war, and emerges victorious from the conflict, should be unlikely to pursue trials in the aftermath of the war.
Journal: Studies in Conflict & Terrorism
Pages: 396-413
Issue: 5
Volume: 43
Year: 2020
Month: 5
X-DOI: 10.1080/1057610X.2018.1469587
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1469587
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:5:p:396-413



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1471971_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dmitry Dima Adamsky
Author-X-Name-First: Dmitry Dima
Author-X-Name-Last: Adamsky
Title: The Impact of the Russian Operation in Syria on Hezbollah's Operational Art: A Hypothesis
Abstract: 
 This article hypothesizes about the impact that the Russian combat practice in Syria might have had on the operational art of Hezbollah. Three years of joint fighting with the Russian military has been a major formative experience for the organization. Presumably, this profound and diverse practice is likely to shape Hezbollah's subsequent military transformation, and to project on its force buildup tendencies, organizational structures and concept of operations. The article argues that Hezbollah's most profound takeaway from the Russian approach might relate to the notion of the reconnaissance-strike complex and its main segments—intelligence capabilities, command and control, and the element related to the actual use of force (Strike). Although this article aims to facilitate critical discussion about potential adaptations in Hezbollah's art of strategy and operations, its insights extend beyond the case itself, as they might be indicative of other hybrid nonstate actors in the Middle East and elsewhere.
Journal: Studies in Conflict & Terrorism
Pages: 414-430
Issue: 5
Volume: 43
Year: 2020
Month: 5
X-DOI: 10.1080/1057610X.2018.1471971
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1471971
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:5:p:414-430

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1452701_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Josefin Graef
Author-X-Name-First: Josefin
Author-X-Name-Last: Graef
Author-Name: Raquel da Silva
Author-X-Name-First: Raquel
Author-X-Name-Last: da Silva
Author-Name: Nicolas Lemay-Hebert
Author-X-Name-First: Nicolas
Author-X-Name-Last: Lemay-Hebert
Title: Narrative, Political Violence, and Social Change
Abstract: 
 This special issue is concerned with the development of the study of narratives of political violence and terrorism. While the concept of narrative has become increasingly popular among scholars in the field over the past two decades, this has not been accompanied by an active and critical engagement with its full ontological, epistemological, and methodological implications. This issue proposes to view the extant work through a basic framework of three modes of narrative—as lens, as data, and as tool—in order to take stock of the progress that has been made to date and to facilitate the identification of remaining research gaps. Building on this framework, the six contributions in this issue demonstrate how the study of narratives of political violence and terrorism may be advanced. This is done, in particular, through a focus on narrative's value for understanding social and political change, as well as an emphasis on developing interdisciplinary and methodologically innovative approaches.
Journal: Studies in Conflict & Terrorism
Pages: 431-443
Issue: 6
Volume: 43
Year: 2020
Month: 6
X-DOI: 10.1080/1057610X.2018.1452701
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1452701
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:6:p:431-443



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1452709_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Raquel da Silva
Author-X-Name-First: Raquel
Author-X-Name-Last: da Silva
Author-Name: Pablo Fernández-Navarro
Author-X-Name-First: Pablo
Author-X-Name-Last: Fernández-Navarro
Author-Name: Miguel M. Gonçalves
Author-X-Name-First: Miguel M.
Author-X-Name-Last: Gonçalves
Author-Name: Catarina Rosa
Author-X-Name-First: Catarina
Author-X-Name-Last: Rosa
Author-Name: Joana Silva
Author-X-Name-First: Joana
Author-X-Name-Last: Silva
Title: Disengagement from Political Violence and Deradicalization: A Narrative-Dialogical Perspective
Abstract: 
 This article applies a dialogical analysis to the change processes involved in moving from engagement with to disengagement from an armed militant group, as well as from radicalization to deradicalization. The findings underline the interplay between different push and pull factors at individual, organizational, and societal levels that played a role in the already mentioned processes in three periods of time—engagement with, life within, and disengagement from an armed organization. The dialogical framework conceptualizes the development trajectory as relationships between a variety of positions of the self (I-positions), which generate different personal meanings involved in processes of disengagement and deradicalization.
Journal: Studies in Conflict & Terrorism
Pages: 444-467
Issue: 6
Volume: 43
Year: 2020
Month: 6
X-DOI: 10.1080/1057610X.2018.1452709
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1452709
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:6:p:444-467



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1452728_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kurt Braddock
Author-X-Name-First: Kurt
Author-X-Name-Last: Braddock
Author-Name: John F. Morrison
Author-X-Name-First: John F.
Author-X-Name-Last: Morrison
Title: Cultivating Trust and Perceptions of Source Credibility in Online Counternarratives Intended to Reduce Support for Terrorism
Abstract: 
 Terrorism researchers have long sought to identify methods for challenging terrorist ideologies. The construction and dissemination of counternarratives has begun to receive substantial attention as a means of doing so. However, the effectiveness of this approach is contingent on message targets' trust in the counternarrative's content and source. This article draws from literatures on trust and online source credibility to offer preliminary guidelines for cultivating trust in counternarratives and their sources. By encouraging trust in this manner, practitioners can reduce the likelihood that their counternarratives will be dismissed by their intended audiences—a perpetual challenge to strategic messaging geared toward countering violent extremism.
Journal: Studies in Conflict & Terrorism
Pages: 468-492
Issue: 6
Volume: 43
Year: 2020
Month: 6
X-DOI: 10.1080/1057610X.2018.1452728
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1452728
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:6:p:468-492



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1452754_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sarah Colvin
Author-X-Name-First: Sarah
Author-X-Name-Last: Colvin
Author-Name: Daniela Pisoiu
Author-X-Name-First: Daniela
Author-X-Name-Last: Pisoiu
Title: When Being Bad is Good? Bringing Neutralization Theory to Subcultural Narratives of Right-Wing Violence
Abstract: 
 Bringing together terrorism studies, subcultural theory, and narrative criminology, we here test the thesis that neutralization theory might be (further) developed to provide a framework for understanding stories of ideologically informed subcultural violence. Beginning with Gresham Sykes's and David Matza's original five neutralizations, we illustrate how actors engage them in three modes: the encultured, the subcultural, and (tentatively) the postnarrative mode. We test the first two modes in particular against narratives and narrative fragments from interviews with men convicted of right-wing violence in Germany. Our findings provide a preliminary illustration of what neutralization theory might bring to research into political violence.
Journal: Studies in Conflict & Terrorism
Pages: 493-508
Issue: 6
Volume: 43
Year: 2020
Month: 6
X-DOI: 10.1080/1057610X.2018.1452754
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1452754
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:6:p:493-508



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1452767_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Josefin Graef
Author-X-Name-First: Josefin
Author-X-Name-Last: Graef
Title: Telling the Story of the National Socialist Underground (NSU): A Narrative Media Analysis
Abstract: 
 The German media have played a much more important role in the context of the National Socialist Underground (NSU) than has been acknowledged. Drawing on criminological approaches to media images of crime and narrative hermeneutics, this article is based on an analysis of more than 1,000 print news articles published on the NSU crimes before and after the discovery of the perpetrators in November 2011. It argues that the story of the NSU as a right-wing terrorist group whose violent campaign was not recognized for more than a decade cannot be conceived of without the news media's narrative work across the period 2000–2012.
Journal: Studies in Conflict & Terrorism
Pages: 509-528
Issue: 6
Volume: 43
Year: 2020
Month: 6
X-DOI: 10.1080/1057610X.2018.1452767
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1452767
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:6:p:509-528



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1452794_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ioannis Tellidis
Author-X-Name-First: Ioannis
Author-X-Name-Last: Tellidis
Title: Peacebuilding Beyond Terrorism? Revisiting the Narratives of the Basque Conflict
Abstract: 
 Taking stock of critical peace research and agonistic politics, this article revisits the Basque conflict to examine the role of the state's counterterrorist narrative and that of the Basque civil society in the elimination of violence. It argues that violence could have ended sooner if Spanish governments had sought to engage with the non- and antiviolent independentist discourse of broad sectors of the Basque society, rather than criminalizing it as they rightly did with the radical/extremist nationalists. Had they done so, they could have capitalized on Basque civil society's strong antiviolent and anti–Euskadi Ta Askatasuna discourse to marginalize the terrorist organization and its networks of support. The article presents a framework that makes possible the marginalization of militancy and extremism in cases where the state accepts to negotiate the legitimacy of the demands of non- and/or antiviolent nationalists.
Journal: Studies in Conflict & Terrorism
Pages: 529-547
Issue: 6
Volume: 43
Year: 2020
Month: 6
X-DOI: 10.1080/1057610X.2018.1452794
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1452794
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:6:p:529-547



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1452808_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Irene G. Madina
Author-X-Name-First: Irene G.
Author-X-Name-Last: Madina
Author-Name: Galo Bilbao
Author-X-Name-First: Galo
Author-X-Name-Last: Bilbao
Author-Name: Angela Bermudez
Author-X-Name-First: Angela
Author-X-Name-Last: Bermudez
Title: Recognizing Victims of Political Violence: Basque Literary Narratives as an Ethical Tool
Abstract: 
 Adopting an ethical approach to education that focuses on the perspective of victims, this article analyzes some of the difficulties of acknowledging the victims of political violence in the Basque Country. It conceptualizes these difficulties as pathologies of recognition and argues that works of literary fiction have humanizing and educational value insofar as they reflect the victim's perspective and foster the reader's ethical education through narrative imagination. As a critical example, the article provides an analysis of four Basque literary works of fiction that respond to the pathologies of recognition as they narrate various acts of victimization. The transformative potential of working with literature that tells stories of victimization for politically violent conflicts in the Basque Country and elsewhere is highlighted.
Journal: Studies in Conflict & Terrorism
Pages: 548-564
Issue: 6
Volume: 43
Year: 2020
Month: 6
X-DOI: 10.1080/1057610X.2018.1452808
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1452808
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:6:p:548-564

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1751459_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bruce Hoffman
Author-X-Name-First: Bruce
Author-X-Name-Last: Hoffman
Author-Name: Jacob Ware
Author-X-Name-First: Jacob
Author-X-Name-Last: Ware
Author-Name: Ezra Shapiro
Author-X-Name-First: Ezra
Author-X-Name-Last: Shapiro
Title: Assessing the Threat of Incel Violence
Abstract: 
 In recent years, increasingly serious incidents of violence have been committed by young men predominantly in the United States and Canada who self-identify as incels (involuntary celibates). Although these attacks often specifically target women, the principal source of their animus, men as well as children have been among the casualties in the series of shootings and vehicular homicides that have occurred at universities, high schools, and on city streets. Although, the incel worldview is not obviously political, its core ethos entails the subjugation and repression of a group and its violence is designed to have far-reaching societal effects. Accordingly, incel violence arguably conforms to an emergent trend in terrorism with a more salient hate crime dimension that necessitates greater scrutiny and analysis—especially as it spreads to Europe and shows similarities to and has nascent connections with other terrorist movements.
Journal: Studies in Conflict & Terrorism
Pages: 565-587
Issue: 7
Volume: 43
Year: 2020
Month: 7
X-DOI: 10.1080/1057610X.2020.1751459
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1751459
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:7:p:565-587



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1492819_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jytte Klausen
Author-X-Name-First: Jytte
Author-X-Name-Last: Klausen
Author-Name: Rosanne Libretti
Author-X-Name-First: Rosanne
Author-X-Name-Last: Libretti
Author-Name: Benjamin W. K. Hung
Author-X-Name-First: Benjamin W. K.
Author-X-Name-Last: Hung
Author-Name: Anura P. Jayasumana
Author-X-Name-First: Anura P.
Author-X-Name-Last: Jayasumana
Title: Radicalization Trajectories: An Evidence-Based Computational Approach to Dynamic Risk Assessment of “Homegrown” Jihadists
Abstract: 
 The research aimed to develop and test a new dynamic approach to preventive risk assessment of violent extremists. The well-known New York Police Department four-phase model was used as a starting point for the conceptualization of the radicalization process, and time-stamped biographical data collected from court documents and other public sources on American homegrown Salafi-jihadist terrorism offenders were used to test the model. Behavioral sequence patterns that reliably anticipate terrorist-related criminality were identified and the typical timelines for the pathways to criminal actions estimated for different demographic subgroups in the study sample. Finally, a probabilistic simulation model was used to assess the feasibility of the model to identify common high-frequency and high-risk sequential behavioral segment pairs in the offenders’ pathways to terrorist criminality.
Journal: Studies in Conflict & Terrorism
Pages: 588-615
Issue: 7
Volume: 43
Year: 2020
Month: 7
X-DOI: 10.1080/1057610X.2018.1492819
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1492819
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:7:p:588-615



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1494409_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mehmet F. Bastug
Author-X-Name-First: Mehmet F.
Author-X-Name-Last: Bastug
Author-Name: Aziz Douai
Author-X-Name-First: Aziz
Author-X-Name-Last: Douai
Author-Name: Davut Akca
Author-X-Name-First: Davut
Author-X-Name-Last: Akca
Title: Exploring the “Demand Side” of Online Radicalization: Evidence from the Canadian Context
Abstract: 
 We examined whether and how social media play a role in the process of radicalization, and whether and for what purposes extremists use social media after they become radicalized within a sample of fifty-one Canadian extremists. Differences between converts and non-converts in terms of their radicalization process, involvement in terrorism, and social media usage were also investigated. Data were collected from a combination of media reports via an in-depth LexisNexis search and court records obtained from The Canadian Legal Information Institute database. The results confirm that social media played a role either during or after the radicalization process of the majority of the sample and converts are more vulnerable to online radicalization than non-converts.
Journal: Studies in Conflict & Terrorism
Pages: 616-637
Issue: 7
Volume: 43
Year: 2020
Month: 7
X-DOI: 10.1080/1057610X.2018.1494409
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1494409
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:7:p:616-637



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1494411_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David Bright
Author-X-Name-First: David
Author-X-Name-Last: Bright
Author-Name: Chad Whelan
Author-X-Name-First: Chad
Author-X-Name-Last: Whelan
Author-Name: Shandon Harris-Hogan
Author-X-Name-First: Shandon
Author-X-Name-Last: Harris-Hogan
Title: On the Durability of Terrorist Networks: Revealing the Hidden Connections between Jihadist Cells
Abstract: 
 This article conducts a social network analysis (SNA) on discrete groups of Australian-based jihadists across three time periods and then compares these groups to an aggregated network. The aim of this analysis is to potentially reveal hidden connections between seemingly separate groups that could facilitate the flow of information and resources. Results reveal the presence of a number of key actors who appear to connect groups across different geographic locations and time periods. By utilizing SNA to identify the presence of these critical individuals, this case study aims to contribute to our overall understanding regarding how terrorist networks manage to endure, evolve, and adapt over time.
Journal: Studies in Conflict & Terrorism
Pages: 638-656
Issue: 7
Volume: 43
Year: 2020
Month: 7
X-DOI: 10.1080/1057610X.2018.1494411
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1494411
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:7:p:638-656



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1493833_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David C. Hofmann
Author-X-Name-First: David C.
Author-X-Name-Last: Hofmann
Title: How “Alone” are Lone-Actors? Exploring the Ideological, Signaling, and Support Networks of Lone-Actor Terrorists
Abstract: 
 Conventional knowledge and early academic work on lone-actor terrorists has popularized the concept that they radicalize, operate, plan, and execute plots in relative anonymity, with little connection to formal or more organized terrorist groups and networks. However, recent scholarship has increasingly challenged the notion of the “loneliness” of lone-actors. In order to further empirically test this notion, this article uses social network analysis to examine the ideological, signaling, and support networks of two case studies of lone-actors during the twenty-four months prior to the commission of their first act of terrorist violence.
Journal: Studies in Conflict & Terrorism
Pages: 657-678
Issue: 7
Volume: 43
Year: 2020
Month: 7
X-DOI: 10.1080/1057610X.2018.1493833
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1493833
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:7:p:657-678

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1495291_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joseph El Khoury
Author-X-Name-First: Joseph
Author-X-Name-Last: El Khoury
Title: The Use of Stimulants in the Ranks of Islamic State: Myth or Reality of the Syrian Conflict
Abstract: 
 The emergence of the Islamic State organization on the Syrian war scene has raised the role of amphetamines, and in particular the drug Captagon, in explaining the military performance and the savagery of its militants. This phenomenon has received extensive coverage in the international media. We review the evidence for it relying on available public sources in the context of a historical understanding of the use of stimulants in warfare and the Islamic position on psychoactive substances.
Journal: Studies in Conflict & Terrorism
Pages: 679-687
Issue: 8
Volume: 43
Year: 2020
Month: 8
X-DOI: 10.1080/1057610X.2018.1495291
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1495291
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:8:p:679-687



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1494413_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andrew C. Sparks
Author-X-Name-First: Andrew C.
Author-X-Name-Last: Sparks
Title: Dar al-Islam: A Quantitative Analysis of ISIS’s French-Language Magazine
Abstract: 
 This study is a content analysis of Islamic State of Iraq and Syria (ISIS)’s French-language magazine Dar al-Islam. The first seven issues of the magazine are quantitatively examined and broken down into the number of articles, images, and terms used as a means of determining how ISIS targets French-speaking individuals. This study find that ISIS focuses on religious terminology and justifications to rationalize its existence and its fight. Also, despite being a French-language magazine, a majority of the focus is on Middle Eastern groups, not Western groups. Overall, the magazine is similar, but not a carbon copy to ISIS’s English-language magazine, Dabiq.
Journal: Studies in Conflict & Terrorism
Pages: 688-705
Issue: 8
Volume: 43
Year: 2020
Month: 8
X-DOI: 10.1080/1057610X.2018.1494413
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1494413
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:8:p:688-705



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1495292_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Fenja Søndergaard Møller
Author-X-Name-First: Fenja Søndergaard
Author-X-Name-Last: Møller
Title: Performance Legitimacy and Conflict in African Provinces
Abstract: 
 Several conflict studies explore material factors connected to state performance (e.g., growth and Gross Domestic Product per capita). Recently, georeferenced conflict research has linked local economic factors such as subnational wealth and intrastate inequality to conflict. However, few studies concern the people’s perceptions. More specifically, existing studies neglect the effect of performance legitimacy, understood as the people’s evaluations of presidential performance. This study argues that systematic focus on subnational variation of presidential performance legitimacy contributes to a deeper understanding of conflict occurrence. This is because objective indicators of performance such as economic wealth differ from actual perceptions of performance. The hypothesis is investigated with survey data from the Afrobarometer rounds 2–5 covering thirty-four countries and 376 first-order administrative units. These data are merged with georeferenced data from the Armed Conflict Location & Event Data (ACLED) and the Peace Research Institute Oslo-Grid dataset (PRIO-GRID). The results show that high levels of performance legitimacy in a province decrease the expected number of conflict events the following year. Future conflict studies should therefore include perceptions on a substate level.
Journal: Studies in Conflict & Terrorism
Pages: 706-727
Issue: 8
Volume: 43
Year: 2020
Month: 8
X-DOI: 10.1080/1057610X.2018.1495292
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1495292
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:8:p:706-727



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1494874_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Eitan Azani
Author-X-Name-First: Eitan
Author-X-Name-Last: Azani
Author-Name: Nadine Liv
Author-X-Name-First: Nadine
Author-X-Name-Last: Liv
Title: A Comprehensive Doctrine for an Evolving Threat: Countering Terrorist Use of Social Networks
Abstract: 
 Terrorists are using social media for the mass dissemination of terrorism-supporting messages. Activating the “long arm of the law” mechanism over media corporations, similar to that in the financial sector, will help to eradicate this phenomenon. The article describes the structure of a holistic framework that expands legal liability for the publication of terrorism-supporting content so that it applies to the entire chain of participants facilitating its distribution: the corporation, the platform, the Web-user publishing the content, and the Web-user viewing the content. The article proposes an adaptation of criminal legal tools at the state and international levels, as well as tools from the field of civil law; finally, the article argues that civil society also has the power to generate social change and to shape a mindset that imposes corporate liability on user content.
Journal: Studies in Conflict & Terrorism
Pages: 728-752
Issue: 8
Volume: 43
Year: 2020
Month: 8
X-DOI: 10.1080/1057610X.2018.1494874
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1494874
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:8:p:728-752

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1507311_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David McIlhatton
Author-X-Name-First: David
Author-X-Name-Last: McIlhatton
Author-Name: James Berry
Author-X-Name-First: James
Author-X-Name-Last: Berry
Author-Name: David Chapman
Author-X-Name-First: David
Author-X-Name-Last: Chapman
Author-Name: Pernille H. Christensen
Author-X-Name-First: Pernille H.
Author-X-Name-Last: Christensen
Author-Name: John Cuddihy
Author-X-Name-First: John
Author-X-Name-Last: Cuddihy
Author-Name: Rachel Monaghan
Author-X-Name-First: Rachel
Author-X-Name-Last: Monaghan
Author-Name: Dan Range
Author-X-Name-First: Dan
Author-X-Name-Last: Range
Title: Protecting Crowded Places from Terrorism: An Analysis of the Current Considerations and Barriers Inhibiting the Adoption of Counterterrorism Protective Security Measures
Abstract: 
 While much of the literature concerning counterterrorism focuses on policies and strategies aimed at removing either the terrorist environment and/or the groups or individuals willing to utilize political violence to achieve their goal(s), there is a much smaller body of work concerned with antiterrorism, namely those defensive measures that are designed to prevent or deter terrorist attacks. Increasingly, crowded places have become popular targets for terrorists and the research presented in this article connects the planning, design, and development of real estate with respect to the adoption of protective counterterrorism measures. It seeks to develop new understandings of the considerations that real estate developments have toward terrorism, as well as the barriers that may inhibit counterterrorism protective security measures in future development projects. The analysis is based on qualitative research, namely semi-structured interviews conducted in the United Kingdom, United States, and Australia with professionals involved in all core strands of the real estate development process. The findings suggest that considerations toward terrorism vary considerably as a consequence of a range of factors and that while expected factors such as cost and aesthetics are important determinants for decision making, a range of other barriers exist.
Journal: Studies in Conflict & Terrorism
Pages: 753-774
Issue: 9
Volume: 43
Year: 2020
Month: 9
X-DOI: 10.1080/1057610X.2018.1507311
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1507311
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:9:p:753-774



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1499694_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nilay Saiya
Author-X-Name-First: Nilay
Author-X-Name-Last: Saiya
Title: Confronting Apocalyptic Terrorism: Lessons from France and Japan
Abstract: 
 Terrorists who believe they have a role to play in bringing about the apocalypse pose a serious threat to countries around the world. In their quest to eradicate this especially pernicious form of terrorism, states, including liberal democratic ones, confront the understandable temptation to eliminate such groups through brute force: repression of apocalyptic groups and their constituencies at home and overwhelming military force abroad. Using a comparative case study of France and Japan, this article argues that such policies actually serve to perpetuate the very conditions that generate further terrorism rooted in apocalyptic beliefs. France’s policies of repression of Islam at home and militarism abroad have had the unintended consequence of encouraging attacks by those affiliated with the apocalyptic group the Islamic State of Iraq and Syria. Conversely, the case of Japan shows that successfully combating apocalyptic terrorism requires far more understated measures, including respecting religious rights at home and caution in using force abroad.
Journal: Studies in Conflict & Terrorism
Pages: 775-795
Issue: 9
Volume: 43
Year: 2020
Month: 9
X-DOI: 10.1080/1057610X.2018.1499694
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1499694
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:9:p:775-795



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1505685_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Burcu Pinar Alakoc
Author-X-Name-First: Burcu Pinar
Author-X-Name-Last: Alakoc
Title: Femme Fatale: The Lethality of Female Suicide Bombers
Abstract: 
 Are female suicide bombers deadlier than male suicide bombers? Utilizing newly coded data on the tactical attributes of suicide terrorism worldwide from 1998 to 2015, this study shows that the use of female suicide bombers is not only positively correlated with the lethality of the suicide attacks, but also accentuates the existing tactical advantages of suicide terrorism. Especially in the cases of soft targets like civilians, and easily accessible locations, the deadliest outcomes result from those attacks carried out by female suicide bombers.
Journal: Studies in Conflict & Terrorism
Pages: 796-814
Issue: 9
Volume: 43
Year: 2020
Month: 9
X-DOI: 10.1080/1057610X.2018.1505685
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1505685
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:9:p:796-814



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1499696_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nil S. Satana
Author-X-Name-First: Nil S.
Author-X-Name-Last: Satana
Author-Name: Tijen Demirel-Pegg
Author-X-Name-First: Tijen
Author-X-Name-Last: Demirel-Pegg
Title: Military Counterterrorism Measures, Civil–Military Relations, and Democracy: The Cases of Turkey and the United States
Abstract: 
 This study examines how military counterterrorism (CT) measures affect the quality of democracy by altering civil–military relations (CMR) and focuses on CMR as the main causal mechanism. We argue that the use of military measures in CT jeopardizes democracy at the societal level by increasing the belief that only the military is equipped to deal with the threat at hand. Therefore, erosions of civil liberties are tolerated in exchange for security. Second, we argue that military CT measures change the balance between the military and civilian executive powers in procedural and liberal democracies. While the military’s executive power increases in procedural democracies, civilian executive power increases and goes unchecked in liberal ones. Case studies of the United States and Turkey show that military CT measures affect CMR in these countries, which generate a similar tradeoff between security and the quality of democracy, albeit via different causal mechanisms. While that tradeoff is less severe in the United States, Turkey is more vulnerable to erosion of democracy.
Journal: Studies in Conflict & Terrorism
Pages: 815-836
Issue: 9
Volume: 43
Year: 2020
Month: 9
X-DOI: 10.1080/1057610X.2018.1499696
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1499696
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:43:y:2020:i:9:p:815-836

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1799508_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Antonio Giustozzi
Author-X-Name-First: Antonio
Author-X-Name-Last: Giustozzi
Title: A Struggle for Power: Al Nusra and Al Qaida in Syria
Abstract: 
 Relying on interviews with members of the organization, the article argues (contrary to the prevailing view) that Al Nusra never split from Al Qaida and even more so from the global jihadist movement. Instead the leadership of Al Nusra was locked in a power struggle with Al Qaida over the control of jihad in Syria and possibly even over the future of Al Qaida itself. Efforts to unify the Syrian opposition, even those limited to jihadist groups, failed also because of the leadership of Al Nusra kept trying to co-opt other opposition groups, rather than forming alliances with them.
Journal: Studies in Conflict & Terrorism
Pages: 1-25
Issue: 1
Volume: 44
Year: 2020
Month: 8
X-DOI: 10.1080/1057610X.2020.1799508
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1799508
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2020:i:1:p:1-25



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1793456_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: José Antonio Gutiérrez D.
Author-X-Name-First: José Antonio
Author-X-Name-Last: Gutiérrez D.
Author-Name: Frances Thomson
Author-X-Name-First: Frances
Author-X-Name-Last: Thomson
Title: Rebels-Turned-Narcos? The FARC-EP’s Political Involvement in Colombia’s Cocaine Economy
Abstract: 
 According to the ‘rebels-turned-narcos’ premise, increasing involvement in the illicit drug industry causes insurgent groups to lose sight of their political aims, as they shift their focus to profit-making. The (former) Colombian rebel group, the FARC-EP, became a paragon for this idea. Drawing on primary research, we argue that the FARC-EP’s involvement in the illicit drug economy was itself political. Their involvement included governance activities, which are by their very nature political. Furthermore, these activities formed part of the FARC-EP’s political project, aimed at ensuring the reproduction of the peasant smallholder economy. Our argument challenges the rebels-turned-narcos premise more broadly by showing why involvement in the illicit drug economy, on its own, is insufficient evidence to posit the depoliticization of an insurgent group.
Journal: Studies in Conflict & Terrorism
Pages: 26-51
Issue: 1
Volume: 44
Year: 2020
Month: 7
X-DOI: 10.1080/1057610X.2020.1793456
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1793456
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2020:i:1:p:26-51



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1793458_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ayse Deniz Lokmanoglu
Author-X-Name-First: Ayse Deniz
Author-X-Name-Last: Lokmanoglu
Title: Coin as Imagined Sovereignty: A Rhetorical Analysis of Coins as a Transhistorical Artifact and an Ideograph in Islamic State’s Communication
Abstract: 
 This research argues that an imagined artifact, the IS coins, serves as a transhistorical artifact, condensing the larger ideology of the violent extremist organization of legitimacy and sovereignty. This paper conducts a qualitative content analysis on all references to IS Coin within Dabiq, al-Naba, Rumiyah and all the official videos publicized in the above magazines from April 2014 to September 2018. The power of one artifact, in this case, coin, embodies the whole ideology of ISIS and transports the ideology from the past to the present to the future and the artifact belongs to daily life, amplifies its power.
Journal: Studies in Conflict & Terrorism
Pages: 52-73
Issue: 1
Volume: 44
Year: 2020
Month: 7
X-DOI: 10.1080/1057610X.2020.1793458
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1793458
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2020:i:1:p:52-73



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1799516_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mehmet Ümit Necef
Author-X-Name-First: Mehmet Ümit
Author-X-Name-Last: Necef
Title: Research Note: Former Extremist Interviews Current Extremist: Self-Disclosure and Emotional Engagement in Terrorism Studies
Abstract: 
 In this article I describe how recognizing elements from my own extremist past made me emotional while interviewing a jailed terrorist about his motivations for joining Islamic State. I relate how this mood led me to an uncontrolled self-disclosure and recount how he agreed to elaborate on his motivations for joining IS, despite initial reluctance to talk about them. Then, I present some considerations on whether research in which emotional attachment is involved can produce critical scientific knowledge. The basic aim of the article is to develop methods, concepts and means to contribute to research on the motivations of terrorists.
Journal: Studies in Conflict & Terrorism
Pages: 74-92
Issue: 1
Volume: 44
Year: 2020
Month: 7
X-DOI: 10.1080/1057610X.2020.1799516
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1799516
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2020:i:1:p:74-92

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1586356_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nathan P. Jones
Author-X-Name-First: Nathan P.
Author-X-Name-Last: Jones
Title: Bacterial Conjugation as a Framework for the Homogenization of Tactics in Mexican Organized Crime
Abstract: 
 This article posits a competitive bacterial ecology as a framework for Mexican drug trafficking with a novel focus on bacterial conjugation (one type of horizontal gene transmission) to explain tactical homogenization. Individual drug traffickers consciously switch between Mexican organized crime groups sometimes three and four times, much like individual bacteria exchange their DNA in a horizontal genetic transfer that allows rapid evolution and resilience. Bacterial conjugation is a useful amplifying variable for understanding the homogenization of violence and this article probes its plausibility by providing examples of traffickers switching groups and taking tactics with them. Drawing on examples of traffickers and cells from the Arellano Felix Organization, the Sinaloa Cartel, Cartel de Jalisco Nueva Generacion, the Viagras, Zetas, and the Gulf Cartels, this article traces the genealogy of violent tactics, techniques, and procedures such as dissolving bodies in acid, asphyxiation, and infantry tactics, through individual traffickers into new groups drawn generally in the direction of more powerful, proximate, and similar trafficking groups.
Journal: Studies in Conflict & Terrorism
Pages: 855-884
Issue: 10
Volume: 44
Year: 2021
Month: 10
X-DOI: 10.1080/1057610X.2019.1586356
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1586356
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:10:p:855-884



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1592356_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sergei Boeke
Author-X-Name-First: Sergei
Author-X-Name-Last: Boeke
Author-Name: Giliam de Valk
Author-X-Name-First: Giliam
Author-X-Name-Last: de Valk
Title: The Unforeseen 2012 Crisis in Mali: The Diverging Outcomes of Risk and Threat Analyses
Abstract: 
 The 2012 crisis in Mali, where the state collapsed and terrorist groups took over the north, came as a surprise to many. Mali had been considered a poster-child for democracy and was judged as considerably more stable than its neighbors by leading quantitative indices of state fragility. This article explores how quantitative risk and qualitative threat approaches led to incomplete analyses, and how bureaucratic processes stifled a holistic diagnosis of the situation in Mali. French and Dutch government views are analyzed, adding new empirical information on how ministries and embassies were unwilling to call out disconcerting developments in Mali.
Journal: Studies in Conflict & Terrorism
Pages: 835-854
Issue: 10
Volume: 44
Year: 2021
Month: 10
X-DOI: 10.1080/1057610X.2019.1592356
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1592356
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:10:p:835-854



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1591742_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Barbara Elias
Author-X-Name-First: Barbara
Author-X-Name-Last: Elias
Title: Local Minorities in Counterinsurgency: U.S. Approaches to Baghdad and Saigon Regarding Marginalized Populations
Abstract: 
 In counterinsurgencies, minority groups such as the Sunnis in Iraq are important elements of the “population,” the social–political terrain where population-centric counterinsurgency is battled. Yet there has been little systematic analysis of minority groups in unconventional warfare and no investigation of the ways intervening forces, like the United States, have approached in-country allies in an effort to get host nations to address the strategic importance of minorities. Examining new data on alliance politics between the United States and local partners in Vietnam and Iraq, I find that while existing scholarship would suggest that in-country allies will resist U.S. pressure to engage with minority groups, local allies are surprisingly likely to comply, at least in part, in order to avoid U.S. unilateral engagement with local minorities and to influence the policies adopted. This process slowly undermines U.S. counterinsurgency efforts, speaking to the complexities of population-centric approaches and working through local proxies.
Journal: Studies in Conflict & Terrorism
Pages: 818-834
Issue: 10
Volume: 44
Year: 2021
Month: 10
X-DOI: 10.1080/1057610X.2019.1591742
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1591742
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:10:p:818-834



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1585636_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Chi Zhang
Author-X-Name-First: Chi
Author-X-Name-Last: Zhang
Title: Community Engagement under the Mass Line for Counterterrorism in China
Abstract: 
 The mass line principle offers an alternative approach to mobilize citizens to participate in governance. The key tenets of the mass line principle resemble that of the regime of community engagement, aiming at encouraging democratic participation, improving the trust between the rule and the ruled, and improving the ability of the government to gather intelligence. In the context of China’s counterterrorism strategy, the mass line involves the encouraging citizens’ participation in the People’s War on Terror, incentivizing individuals to provide tip-offs, and engaging patriotic believers, opinion leaders, grass-roots propagandists, and cultural workers to persuade and educate the masses to adopt “correct” views. In addition, the government seeks to publicize the voice of Uyghurs from within the community. However, such efforts only served as evidence for intolerance for diversity and an invitation for further suspicion and criticism. This article demonstrates the trust dilemma the state faces—in order to improve democratic participation, the efforts to engage a community and gather intelligence often result in eroding the trust. This article also highlights the importance of differentiating harmony and political conformity. Diversity per se is not the source of conflict, but it is often targeted by the state as it is desperately seeking to demonstrate efficacy in the face of terrorism.
Journal: Studies in Conflict & Terrorism
Pages: 799-817
Issue: 10
Volume: 44
Year: 2021
Month: 10
X-DOI: 10.1080/1057610X.2019.1585636
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1585636
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:10:p:799-817

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1599192_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Stephane J. Baele
Author-X-Name-First: Stephane J.
Author-X-Name-Last: Baele
Author-Name: Gregorio Bettiza
Author-X-Name-First: Gregorio
Author-X-Name-Last: Bettiza
Author-Name: Katharine A. Boyd
Author-X-Name-First: Katharine A.
Author-X-Name-Last: Boyd
Author-Name: Travis G. Coan
Author-X-Name-First: Travis G.
Author-X-Name-Last: Coan
Title: ISIS’s Clash of Civilizations: Constructing the “West” in Terrorist Propaganda
Abstract: 
 Depictions of the West abound in the propaganda produced by the self-proclaimed “Islamic State,” presenting to potentially sympathetic audiences an overwhelmingly negative image of a supposedly homogeneous political entity. Combining quantitative and qualitative language and visual analysis, we systematically expose the various facets of this image and analyze the overall picture. Drawing on the “clash of civilizations” literature as well as on research on extremist language, we conceptualize this presentation of the West as a powerful radicalizing voice shaping today’s global civilizational politics.
Journal: Studies in Conflict & Terrorism
Pages: 887-919
Issue: 11
Volume: 44
Year: 2021
Month: 11
X-DOI: 10.1080/1057610X.2019.1599192
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1599192
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:11:p:887-919



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1594660_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ginger L. Denton
Author-X-Name-First: Ginger L.
Author-X-Name-Last: Denton
Author-Name: Jonathan R. Harris
Author-X-Name-First: Jonathan R.
Author-X-Name-Last: Harris
Title: The Impact of Illegal Fishing on Maritime Piracy: Evidence from West Africa
Abstract: 
 The recent increase in maritime piracy is often associated with economic issues such as a decline in the fishing industry, but there is still no consensus on whether a decrease in local fishing causes a rise in piracy rates. We introduce the use of unreported fish catch and fishing industry type in addition to reported fish catch in Gulf of Guinea waters when analyzing factors influencing West African piracy. Using a newly released data set, which includes Illegal, Unregulated, and Unreported (IUU) fish catch by sector, we show that an increase in reported and unreported fishing yields an increase in piracy. Further, we find that increases in industrial fish catch are related to increases in maritime piracy while the opposite is true of artisanal and subsistence fish catch. We expect this new approach will highlight the impact of IUU and large-scale industrial fishing on piracy throughout the entire world.
Journal: Studies in Conflict & Terrorism
Pages: 938-957
Issue: 11
Volume: 44
Year: 2021
Month: 11
X-DOI: 10.1080/1057610X.2019.1594660
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1594660
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:11:p:938-957



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1615256_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: María Idaly Barreto-Galeano
Author-X-Name-First: María Idaly
Author-X-Name-Last: Barreto-Galeano
Author-Name: Iván Felipe Medina-Arboleda
Author-X-Name-First: Iván Felipe
Author-X-Name-Last: Medina-Arboleda
Author-Name: Sonia Zambrano-Hernández
Author-X-Name-First: Sonia
Author-X-Name-Last: Zambrano-Hernández
Author-Name: José-Manuel Sabucedo-Cameselle
Author-X-Name-First: José-Manuel
Author-X-Name-Last: Sabucedo-Cameselle
Author-Name: Amalio Blanco-Abarca
Author-X-Name-First: Amalio
Author-X-Name-Last: Blanco-Abarca
Author-Name: Éric Maurice Lair
Author-X-Name-First: Éric
Author-X-Name-Last: Maurice Lair
Title: Rhetoric, Political Ideology and the Peace Process in Colombia: A Twitter® Analysis
Abstract: 
 An ethos of violence based on political ideologies aiming to delegitimize an adversary is a psychosocial barrier to solving lasting conflicts, such as in Colombia. Beyond the signing of a peace agreement, the cessation of political violence implies modifying the complex symbolic dynamics constructed by various opposing actors to legitimize acts of direct violence. This research evaluates whether a new rhetoric that encourages the development of a peace culture has replaced the ideological rhetoric of various social actors involved in dialog and negotiations to end the armed conflict between the Colombian government and the Revolutionary Armed Forces of Colombia – People’s Army (FARC-EP). To this end, a textual analysis of the ideological rhetoric disseminated through Twitter® by several actors in Colombian society was conducted to identify the expressions used (semantic analysis) to legitimize or delegitimize those involved in the conflict in the last negotiation year (2016). The outcome indicates that the agenda of topics revolves around peace, and although the ideological differences between the negotiation table (i.e., the government and FARC-EP) and the opposition party are evident in the published messages, all the actors are striving to develop a rhetoric of tolerance and coexistence.
Journal: Studies in Conflict & Terrorism
Pages: 920-937
Issue: 11
Volume: 44
Year: 2021
Month: 11
X-DOI: 10.1080/1057610X.2019.1615256
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1615256
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:11:p:920-937



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1606992_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Curtis M. Craig
Author-X-Name-First: Curtis M.
Author-X-Name-Last: Craig
Author-Name: Randy W. Overbeek
Author-X-Name-First: Randy W.
Author-X-Name-Last: Overbeek
Author-Name: Elizabeth M. Niedbala
Author-X-Name-First: Elizabeth M.
Author-X-Name-Last: Niedbala
Title: A Global Analysis of Temperature, Terrorist Attacks, and Fatalities
Abstract: 
 Higher temperatures have been associated with aggression in humans, but the heat–aggression relationship has not been clearly established for terrorist attacks. We found significant and positive relationships when regressing the number of terrorist attacks and associated deaths on temperature in 159 countries from 1970 to 2015. When temperature increases, the number of terrorist attacks and deaths due to terrorist attacks tend to increase. Our results are consistent with a large body of research on the effect of climate on conflict and are of practical concern given increasing average global temperatures.
Journal: Studies in Conflict & Terrorism
Pages: 958-970
Issue: 11
Volume: 44
Year: 2021
Month: 11
X-DOI: 10.1080/1057610X.2019.1606992
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1606992
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:11:p:958-970

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1616928_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alexandra Phelan
Author-X-Name-First: Alexandra
Author-X-Name-Last: Phelan
Title: FARC’s Pursuit of “Taking Power”: Insurgent Social Contracts, the Drug Trade and Appeals to Eudaemonic Legitimation
Abstract: 
 This paper argues that eudaemonic legitimation is a useful tool in understanding how insurgencies seek to justify their “effectiveness” and “performance” vis-à-vis the state in order to enhance authority and mobilise support for their strategic objectives. By examining primary FARC documents, conference and plenary findings, and select interviews with former and active FARC, ELN and M-19 members, it demonstrates how FARC constructed social contracts and integrated illicit financing into its operations as a strategy to appeal to its eudaemonic legitimation in its areas of proto-state influence, in turn aiming to mobilise support and consolidate a full-spectrum normative system. “Effectiveness” in FARC’s strategic approach through rule-setting allowed the organisation to expand to control significant portions of Colombian territory, which to a degree impacted positively on social mobilisation and challenged the government’s legitimacy by consolidating power structures in areas where there was a lack of government authority. FARC further appealed to social and economic “performance” by using revenue from its fundraising activities through engagement in the coca trade and kidnap for ransom to not only strengthen its military capacity, but also implement social initiatives and provide material goods. In turn, FARC was able to develop zones of security through the creation of social contracts in which stable economic practices were able to solidify, contributing in its effectiveness in providing proto-state authority and allowing for insurgent expansion.
Journal: Studies in Conflict & Terrorism
Pages: 971-993
Issue: 12
Volume: 44
Year: 2021
Month: 12
X-DOI: 10.1080/1057610X.2019.1616928
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1616928
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:12:p:971-993



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1628622_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ido Levy
Author-X-Name-First: Ido
Author-X-Name-Last: Levy
Author-Name: Abdi Yusuf
Author-X-Name-First: Abdi
Author-X-Name-Last: Yusuf
Title: How Do Terrorist Organizations Make Money? Terrorist Funding and Innovation in the Case of al-Shabaab
Abstract: 
 This paper examines the funding sources of the terrorist group Harakat al-Shabaab al-Mujahideen. Using existing research and original interviews, this study outlines al-Shabaab’s history and funding sources. It theorizes that an organization’s capacity to operate in different fields of economic activity drives innovation in funding. Applying a framework for terrorist innovation to al-Shabaab’s funding sources, this study finds support for the theory. Development of intelligence and taxation capabilities is especially prevalent in the al-Shabaab context. Holding territory considerably increases organizational ability to raise funds. Increasing reliance on criminality may compromise an organization’s ideological character and leave it more vulnerable to inter-group competition.
Journal: Studies in Conflict & Terrorism
Pages: 1167-1189
Issue: 12
Volume: 44
Year: 2021
Month: 12
X-DOI: 10.1080/1057610X.2019.1628622
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1628622
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:12:p:1167-1189



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1626093_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael H. Becker
Author-X-Name-First: Michael H.
Author-X-Name-Last: Becker
Title: When Extremists Become Violent: Examining the Association Between Social Control, Social Learning, and Engagement in Violent Extremism
Abstract: 
 This research examines the relationship between social control and social learning variables on involvement in violent vs. non-violent extremism. Using data from the Profiles of Individual Radicalization in the United States (PIRUS) database (n = 1,757), this study presents a series of logistic regressions. Among radicalized individuals, weaker social control and stronger social learning of violence were associated violent over non-violent behavior. These results hold across all models. Taken together, these findings support the role of control and learning theories in identifying correlates of violent and non-violent extremism and suggest the possibility of reciprocal and interaction effects for future work.
Journal: Studies in Conflict & Terrorism
Pages: 1104-1124
Issue: 12
Volume: 44
Year: 2021
Month: 12
X-DOI: 10.1080/1057610X.2019.1626093
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1626093
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:12:p:1104-1124



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1620470_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: George Kassimeris
Author-X-Name-First: George
Author-X-Name-Last: Kassimeris
Title: Greece’s Ulrike Meinhof: Pola Roupa and the Revolutionary Struggle
Abstract: 
 Pola Roupa’s arrest in 2016 was the final nail in the coffin of Revolutionary Struggle, the first guerrilla group to emerge on Greece’s terrorist landscape after the 2002 collapse of 17 November, the country’s premier terrorist organisation for almost three decades and one of Europe’s longest-running terror gangs. Drawing on the judicial investigation findings, courtroom testimonies, RS communiqués and interviews with counter-terrorism officials, this article tells the story of Pola Roupa, the first female leader of a Greek terrorist group in an attempt to understand the political reasons and motivational factors that led to her involvement in terrorism. At the same time, the article hopefully contributes to the study and understanding of women and terrorism by providing an insight into the role and experience of a female militant inside Greece’s gender-conservative and overwhelmingly male-dominated armed struggle movement.
Journal: Studies in Conflict & Terrorism
Pages: 1090-1103
Issue: 12
Volume: 44
Year: 2021
Month: 12
X-DOI: 10.1080/1057610X.2019.1620470
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1620470
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:12:p:1090-1103



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1620432_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Goran Peic
Author-X-Name-First: Goran
Author-X-Name-Last: Peic
Title: Divide and Co-Opt: Private Agendas, Tribal Groups, and Militia Formation in Counterinsurgency Wars
Abstract: 
 Recent research suggests that civilian defense forces (CDFs) – a distinct type of pro-government militia – can help states suppress insurgent movements. Considering the potential benefits, it is understandable why governments would want to use them. However, viewed from the perspective of civilian recruits, militia duty is a perilous side job that pays very little. So, why do civilians sign up to serve in them? This paper argues that civilian private agendas play a major role in facilitating the recruitment of CDFs. Because private agendas are difficult to observe directly, I examine their impact indirectly by identifying tribal groups as a population segment with particularly strong private incentives stemming from intertribal feuds and the concomitant desire to gain an upper hand relative to local rivals. The argument is tested on a novel province-level data set of CDF deployments in Turkey and the Philippines. Statistical analyses of these data show that states recruit over 50 percent more CDFs in regions with even modest tribal presence than in comparable areas without any tribal populations. These findings suggest that private agendas play a significant role in motivating militia recruitment. Private agendas thus help governments to combat macro-level insurgent movements by exploiting micro-level social tensions. The research also sheds light on the makeup of recruits and points to intensification of civilian disputes as likely ramification of CDF deployment in counterinsurgency campaigns.
Journal: Studies in Conflict & Terrorism
Pages: 1022-1049
Issue: 12
Volume: 44
Year: 2021
Month: 12
X-DOI: 10.1080/1057610X.2019.1620432
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1620432
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:12:p:1022-1049



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1634343_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Larissa Daria Meier
Author-X-Name-First: Larissa Daria
Author-X-Name-Last: Meier
Title: The Strategic Use of Emotions in Recruitment Strategies of Armed Groups: The Case of the Liberation Tigers of Tamil Eelam
Abstract: 
 What role do emotions play in recruitment strategies employed by armed groups? I argue that armed groups use “emotion work” – the effort to evoke or shape emotions – to recruit new fighters, trying to appeal not only to peoplès self-interest or reason but to their values and normative judgements. I use data from 30 interviews with former members of the LTTE to show that emotions were a central element of their recruitment strategy. To analyze the role of emotions in recruitment, I build on social movement theory and the sociology of emotions and propose an analytical framework linking different types of collective action frames with different emotions they provoke and the mechanisms through which they facilitate recruitment.
Journal: Studies in Conflict & Terrorism
Pages: 1148-1166
Issue: 12
Volume: 44
Year: 2021
Month: 12
X-DOI: 10.1080/1057610X.2019.1634343
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1634343
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:12:p:1148-1166



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1628623_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Craig Whiteside
Author-X-Name-First: Craig
Author-X-Name-Last: Whiteside
Author-Name: Ian Rice
Author-X-Name-First: Ian
Author-X-Name-Last: Rice
Author-Name: Daniele Raineri
Author-X-Name-First: Daniele
Author-X-Name-Last: Raineri
Title: Black Ops: Islamic State and Innovation in Irregular Warfare
Abstract: 
 This paper studies non-state militant group emulation and development of a special operation capability that stands in stark contrast to the normal repertoire of guerilla and terror tactics. Building on evidence of one well-documented Islamic State attack in 2012 that fit many of the criteria of a special operation, we analyzed the mission using concepts from strategic studies to understand the decision-making behind it. We then expanded our search of Islamic State operational claims looking for other examples, in order to understand the scope and frequency of Islamic State special operations since 2006. We found solid evidence of at least three Islamic State special operations over a decade: Ramadi, Iraq (2007), Haditha, Iraq (2012), and Abu Ghraib/Taji, Iraq (2013). Using these insights, we present two key levers – leadership and propaganda - used by the Islamic State in the decision-making and centralized distribution of resources to invest in a special operations capability that produced outsized strategic effects. These findings contest the conventional wisdom of the future of insurgency as decentralized structures made up of loose, leaderless networks.
Journal: Studies in Conflict & Terrorism
Pages: 1190-1217
Issue: 12
Volume: 44
Year: 2021
Month: 12
X-DOI: 10.1080/1057610X.2019.1628623
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1628623
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:12:p:1190-1217



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1616927_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tobias Bruce-Jones
Author-X-Name-First: Tobias
Author-X-Name-Last: Bruce-Jones
Author-Name: M.L.R. Smith
Author-X-Name-First: M.L.R.
Author-X-Name-Last: Smith
Title: Coca, Clausewitz, and Colombia: The Inadequacy of Micro-level Studies in Explaining FARC Violence Against Civilians During the Colombian Civil War
Abstract: 
 Studies of micro-level violence make various claims to universality: namely, that there are patterns of violence in civil wars that are observable across time and space. The analysis of rebel violence against civilians constitutes one of the enduring themes of these studies. By evaluating the actions of the Revolutionary Armed Forces of Colombia (FARC) during the latter half of the Colombian civil war, this paper demonstrates that the claims of micro-level studies are unable to account for FARC’s violence against civilians. In response, this study provides an alternative framework for understanding FARC’s violence. Informed by the theories of Carl von Clausewitz it is possible to comprehend the logic of FARC’s violence against civilians within a strategic framework that aimed to advance the movement’s political goals. However, it also illustrates that FARC was influenced heavily by its involvement in the drugs trade. The main findings are a) that whilst FARC’s acts of violence may have contained similarities to that of other drugs cartels FARC did not become a narco-guerrilla organization, b) the case of FARC demonstrates that ultimately there are no reproducible patterns in war, micro-level or otherwise.
Journal: Studies in Conflict & Terrorism
Pages: 994-1021
Issue: 12
Volume: 44
Year: 2021
Month: 12
X-DOI: 10.1080/1057610X.2019.1616927
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1616927
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:12:p:994-1021



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1616929_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: B. Heidi Ellis
Author-X-Name-First: B. Heidi
Author-X-Name-Last: Ellis
Author-Name: Georgios Sideridis
Author-X-Name-First: Georgios
Author-X-Name-Last: Sideridis
Author-Name: Alisa B. Miller
Author-X-Name-First: Alisa B.
Author-X-Name-Last: Miller
Author-Name: Saida M. Abdi
Author-X-Name-First: Saida M.
Author-X-Name-Last: Abdi
Author-Name: Jeffrey P. Winer
Author-X-Name-First: Jeffrey P.
Author-X-Name-Last: Winer
Title: Trauma, Trust in Government, and Social Connection: How Social Context Shapes Attitudes Related to the Use of Ideologically or Politically Motivated Violence
Abstract: 
 In this study we examine how grievances and social connection among Somali immigrants are associated with attitudes towards radicalization to violence. Data was drawn from structured interviews with 213 Somali young adult men living in North America. Structural Equation Modeling was used to test the association of grievances with attitudes in support of political violence, and the mediating role of social connection (ethnic community belonging, attachment to nation of residence, and social comfort seeking online). Both grievances and social connection/disconnection relate to support for political violence, but in complex ways. Findings are discussed in relation to prevention of violent extremism.
Journal: Studies in Conflict & Terrorism
Pages: 1050-1067
Issue: 12
Volume: 44
Year: 2021
Month: 12
X-DOI: 10.1080/1057610X.2019.1616929
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1616929
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:12:p:1050-1067



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1616930_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joshua Tschantret
Author-X-Name-First: Joshua
Author-X-Name-Last: Tschantret
Title: Nuclear Legitimacy: Why Insurgents Seek and Destroy Nuclear Technology
Abstract: 
 Scholars observe that we know little about what motivates non-state actors’ strategic interest in nuclear technology. This article argues that insurgents with ideological ambitions to form new states adopt acquisitive or destructive interests because nuclear power is a symbol of state legitimacy. State-seeking insurgents—separatists and revolutionaries—require domestic constituencies to recognize them as legitimate sovereigns. However, they differ in their need for international legitimation. Separatists’ demand for international acceptance deters them from pursuing nuclear weapons, which poses an international security threat. They will nonetheless attack the state’s nuclear facilities in areas they consider their national homeland to assert the legitimacy of their claims over these regions. Since revolutionaries do not expect international acceptance, they can pursue nuclear technology to enhance their legitimacy among key domestic audiences. Statistical analysis and qualitative examination support these hypotheses.
Journal: Studies in Conflict & Terrorism
Pages: 1068-1089
Issue: 12
Volume: 44
Year: 2021
Month: 12
X-DOI: 10.1080/1057610X.2019.1616930
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1616930
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:12:p:1068-1089



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1628613_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ahmet S. Yayla
Author-X-Name-First: Ahmet S.
Author-X-Name-Last: Yayla
Title: Turkish ISIS and AQ Foreign Fighters: Reconciling the Numbers and Perception of the Terrorism Threat
Abstract: 
 This article attempts to establish a database of the numbers of the Turkish ISIS and AQ foreign terrorist fighters (FTFs) and their profiles through open sources, available news articles and personal interviews by the author with some former senior government officers; provides insights about the government and public perceptions on Salafi Jihadist terrorist organizations; and studies policy responses concerning returning FTFs and terrorist organizations.
Journal: Studies in Conflict & Terrorism
Pages: 1125-1147
Issue: 12
Volume: 44
Year: 2021
Month: 12
X-DOI: 10.1080/1057610X.2019.1628613
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1628613
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:12:p:1125-1147

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1822589_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Simon Cottee
Author-X-Name-First: Simon
Author-X-Name-Last: Cottee
Title: Incel (E)motives: Resentment, Shame and Revenge
Abstract: 
 This article provides a framework for thinking about incels and incel-inspired terrorism. Incels are part of a fringe online subculture that trades in misogyny, victimhood and fatalism. The aim of the article is to describe these aforementioned orientations and the emotions associated with them. Only a tiny minority of incels commit acts of incel-inspired terrorism. Research on shame and revenge provides a useful starting-point for understanding these acts.
Journal: Studies in Conflict & Terrorism
Pages: 93-114
Issue: 2
Volume: 44
Year: 2020
Month: 9
X-DOI: 10.1080/1057610X.2020.1822589
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1822589
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2020:i:2:p:93-114



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1799519_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anna Kruglova
Author-X-Name-First: Anna
Author-X-Name-Last: Kruglova
Title: “I Will Tell You a Story about Jihad”: ISIS’s Propaganda and Narrative Advertising
Abstract: 
 This article further broadens the understanding of ISIS propaganda and its effectiveness by looking at the group’s social media through the prism of marketing. The group was found to rely on a narrative type of advertising while creating its propaganda. Specifically, ISIS was using stories to appeal to its recruits’ emotions and desires. The use of stories helped ISIS to establish a strong connection with its target audience, and increased the group’s success in promoting its ideas.
Journal: Studies in Conflict & Terrorism
Pages: 115-137
Issue: 2
Volume: 44
Year: 2020
Month: 7
X-DOI: 10.1080/1057610X.2020.1799519
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1799519
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2020:i:2:p:115-137



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1799520_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alexa Katon
Author-X-Name-First: Alexa
Author-X-Name-Last: Katon
Author-Name: Christine Shahan Brugh
Author-X-Name-First: Christine Shahan
Author-X-Name-Last: Brugh
Author-Name: Sarah L. Desmarais
Author-X-Name-First: Sarah L.
Author-X-Name-Last: Desmarais
Author-Name: Joseph Simons-Rudolph
Author-X-Name-First: Joseph
Author-X-Name-Last: Simons-Rudolph
Author-Name: Samantha A. Zottola
Author-X-Name-First: Samantha A.
Author-X-Name-Last: Zottola
Title: A Qualitative Analysis of Drivers among Military-Affiliated and Civilian Lone Actor Terrorists Inspired by Jihadism
Abstract: 
 This qualitative study explored and compared factors that drive individuals with and without military experience to commit violent acts of terrorism within a sample of 10 jihadism-inspired lone actors. Findings reveal four major themes driving violent terrorist action among lone actors: Action, Grievance, Growing in Jihad, Religious Fervor. Results also provide some of the first evidence that drivers of lone actor terrorism differ between those with and without military experience. Factors related to action, certain grievances, and growth in Jihad were seen more commonly among the military-affiliated lone actors than their civilian peers. Implications for policy and prevention are discussed.
Journal: Studies in Conflict & Terrorism
Pages: 138-155
Issue: 2
Volume: 44
Year: 2020
Month: 8
X-DOI: 10.1080/1057610X.2020.1799520
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1799520
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2020:i:2:p:138-155



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1759487_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ioan Pop
Author-X-Name-First: Ioan
Author-X-Name-Last: Pop
Author-Name: Mitchell D. Silber
Author-X-Name-First: Mitchell D.
Author-X-Name-Last: Silber
Title: Iran and Hezbollah’s Pre-Operational Modus Operandi in the West
Abstract: 
 Tensions between the United States and Iran/Hezbollah have been on the rise since 2018 when the U.S. administration withdrew from the 2015 nuclear deal. These tensions spiked in January 2020 when U.S. strikes killed Qassem Soleimani the leader of Iran’s IRGC-Quds Force. Furthermore, there is mounting evidence that in recent years, Iran and Hezbollah have sought to create a sleeper network in the U.S. and Western Europe, which could be activated to launch attacks as part of a retaliatory attack. This paper assesses Iran and Hezbollah pre-operational modus operandi in the West derived from court documents and open source reporting of recent arrest of Hezbollah and Iranian agents in the US and abroad. It sheds lights on the recruitment, training, and placement of these agents and the intricacies of their past operations. While it is impossible to predict when, where or how Iran/Hezbollah might retaliate as retribution for Soleimani’s killing, this article argues that there is growing number of indicators and warning signs for a possible attack in the U.S. or against U.S. interests abroad.
Journal: Studies in Conflict & Terrorism
Pages: 156-179
Issue: 2
Volume: 44
Year: 2021
Month: 2
X-DOI: 10.1080/1057610X.2020.1759487
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1759487
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:2:p:156-179

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1538092_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marco Nilsson
Author-X-Name-First: Marco
Author-X-Name-Last: Nilsson
Title: Jihadiship: From Radical Behavior to Radical Beliefs
Abstract: 
 Jihadism is a complex social phenomenon that changes people, but not always uniformly. This article argues that cognitive and behavioral radicalization can be seen as a discursive journey or jihadiship involving (e)merging ideas, problems, and solutions that change with encounters with new circumstances—both material and immaterial. The differences observed between various generations of jihadists are one manifestation of this complexity. Especially in a jihadi group, the processes of radicalization are bound to continue and take new forms, compared with those experienced in the West. Another example of the complexity of jihadiship is that not only can radical ideas lead to radical behavior, but also radical behavior can increasingly give rise to radical ideas in jihadi groups.
Journal: Studies in Conflict & Terrorism
Pages: 181-197
Issue: 3
Volume: 44
Year: 2021
Month: 3
X-DOI: 10.1080/1057610X.2018.1538092
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1538092
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:3:p:181-197



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1538124_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael J. Schumacher
Author-X-Name-First: Michael J.
Author-X-Name-Last: Schumacher
Author-Name: Peter J. Schraeder
Author-X-Name-First: Peter J.
Author-X-Name-Last: Schraeder
Title: Does Domestic Political Instability Foster Terrorism? Global Evidence from the Arab Spring Era (2011–14)
Abstract: 
 This article explores the intellectual puzzle of whether the domestic political instability associated with the Arab Spring is responsible for a surge in global terrorism that peaked in 2014. A series of negative binomial regressions demonstrate strong support for an “escalation effect”: more severe forms of domestic political instability, most notably government purges and riots, breed greater levels of terrorism, although the most severe form of domestic political instability—revolution—does not. We also find that specific types of domestic political instability affect terrorism levels differently depending on geographical region and regime type (i.e., democracy versus dictatorship).
Journal: Studies in Conflict & Terrorism
Pages: 198-222
Issue: 3
Volume: 44
Year: 2021
Month: 3
X-DOI: 10.1080/1057610X.2018.1538124
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1538124
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:3:p:198-222



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1538661_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nadia Al-Dayel
Author-X-Name-First: Nadia
Author-X-Name-Last: Al-Dayel
Title: Sexual Suppression and Political Agency: Evoking a Woman’s Support for the Islamic State
Abstract: 
 This article explores the gender dynamics of recruitment materials published by the so-called Islamic State. Through an investigation of the Islamic State’s only female-authored column in Dabiq, it reveals how a unique “voice” evokes support by urging readers to consider their agency in both the citizen–state relationship and the husband–wife patriarchal structure. It utilizes an original method of contextualizing narratives through reflexivity and responsivity. Overall, it reveals that an analysis of contemporary extremist recruitment materials must consider the mediatized environment in which it forms as well as the realistic political situations to which it responds.
Journal: Studies in Conflict & Terrorism
Pages: 223-247
Issue: 3
Volume: 44
Year: 2021
Month: 3
X-DOI: 10.1080/1057610X.2018.1538661
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1538661
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:3:p:223-247



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1538143_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nicole K. Drumhiller
Author-X-Name-First: Nicole K.
Author-X-Name-Last: Drumhiller
Author-Name: Jason Roesler
Author-X-Name-First: Jason
Author-X-Name-Last: Roesler
Title: Perceptions of Fear Among Targets of Radical Animal Rights Extremism
Abstract: 
 This study explores criminal acts carried out in the name of animals and the environment and assesses the perception of fear they instill within their targets. Acts classified as terrorism are often categorized using a set definition of terrorism and by judging the potential fear caused within humans. This study utilizes survey and field research to assess the perceptions of those targeted by extremism in this area, the degree to which these criminal acts cause fear. We find that animal liberations, arson, and systematic harassment coupled with vandalism can be considered acts that cause fear in intended targets.
Journal: Studies in Conflict & Terrorism
Pages: 248-265
Issue: 3
Volume: 44
Year: 2021
Month: 3
X-DOI: 10.1080/1057610X.2018.1538143
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1538143
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:3:p:248-265



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1531542_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marek Bodziany
Author-X-Name-First: Marek
Author-X-Name-Last: Bodziany
Author-Name: Marzena Netczuk-Gwoździewicz
Author-X-Name-First: Marzena
Author-X-Name-Last: Netczuk-Gwoździewicz
Title: Feminization of Terror: Psychological Analysis of the Role of Women in Terrorist Structures
Abstract: 
 Feminization of terror is a significant issue in the light of its etiology, scale, and effects. Moreover, it is a social problem that arose in psychology, sociology, cultural anthropology, and politics. This article aims to analyze only a part of this complicated matter. The article has put an emphasis on the motives that drive women to take up such a risky and dangerous practice, as well as on the specifics of their activities in four organizations: the Liberation Tigers of Tamil Eelam, Fuerzas Armadas Revolucionarias de Colombia, Chechen Kavkazskiy Emirat, and groups associated with Islam.
Journal: Studies in Conflict & Terrorism
Pages: 266-283
Issue: 3
Volume: 44
Year: 2021
Month: 3
X-DOI: 10.1080/1057610X.2018.1531542
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1531542
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:3:p:266-283

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1543145_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Erin M. Kearns
Author-X-Name-First: Erin M.
Author-X-Name-Last: Kearns
Author-Name: Allison E. Betus
Author-X-Name-First: Allison E.
Author-X-Name-Last: Betus
Author-Name: Anthony F. Lemieux
Author-X-Name-First: Anthony F.
Author-X-Name-Last: Lemieux
Title: When Data Do Not Matter: Exploring Public Perceptions of Terrorism
Abstract: 
 Public perceptions of terrorism are out of line with reality. How can perceptions be changed? Using a 4 × 2 experimental design with a national sample of U.S. adults, we examine how source of information and details provided impact views of terrorism. Sources, details, and individual-level factors—Islamophobia, trust in media, and trust in science—impact perceived accuracy of terrorism data. Many people updated their views on terrorism after reading factual information, yet only trust in science was related with this change. In short, people can be persuaded by factual information on terrorism, but it is less clear why they change beliefs.
Journal: Studies in Conflict & Terrorism
Pages: 285-309
Issue: 4
Volume: 44
Year: 2021
Month: 4
X-DOI: 10.1080/1057610X.2018.1543145
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1543145
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:4:p:285-309



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1545828_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jonathan Pieslak
Author-X-Name-First: Jonathan
Author-X-Name-Last: Pieslak
Author-Name: Brian Pieslak
Author-X-Name-First: Brian
Author-X-Name-Last: Pieslak
Author-Name: Anthony F. Lemieux
Author-X-Name-First: Anthony F.
Author-X-Name-Last: Lemieux
Title: Trends of Anashid Usage in Da‘esh Video Messaging and Implications for Identifying Terrorist Audio and Video
Abstract: 
 This article examines how Da‘esh utilizes anashid (“Islamic songs” or “recitation”) as soundtrack elements within its video messaging, focusing primarily on a sample set of 755 videos released in 2015. The authors also present the development of an automatic content recognition (ACR) tool that enabled them to engage this large data set. The article then explores the possibilities of ACR for the identification of terrorist audio and video, utilizing the conclusions drawn from the trends of audio usage in Da‘esh video messaging to support the validity and promise of such an approach.
Journal: Studies in Conflict & Terrorism
Pages: 310-325
Issue: 4
Volume: 44
Year: 2021
Month: 4
X-DOI: 10.1080/1057610X.2018.1545828
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1545828
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:4:p:310-325



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1538153_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sally Sharif
Author-X-Name-First: Sally
Author-X-Name-Last: Sharif
Title: Predicting the End of the Syrian Conflict: From Theory to the Reality of a Civil War
Abstract: 
 The Syrian civil war has confounded all predictions on its end date and is still ongoing. Valuable explicative work has been done on civil war duration; however, scholars have failed to reliably predict the end of ongoing conflicts. This article argues that faulty predictions on termination date of the Syrian conflict did not necessarily result from statistical errors in modeling civil wars data and better models might not necessarily mitigate the prediction problem. Rather, three factors contributed to the misperceptions: the conflict’s cartography problem, the splintering of the opposition, and the multi-partner foreign intervention in the conflict. The last two factors can also be held accountable for prolonging the conflict. Incorrect predictions or descriptions in scholarly works on ongoing conflicts can have disastrous implications for the present and future of states and populations beset by protracted conflict. Had it been made clear that neither the insurgents nor the government had the capacity to win the war within the predicted timeframe, the international community may have taken a more decisive role in bringing belligerents to the negotiation table, improving prospects for a peaceful diplomatic settlement.
Journal: Studies in Conflict & Terrorism
Pages: 326-345
Issue: 4
Volume: 44
Year: 2021
Month: 4
X-DOI: 10.1080/1057610X.2018.1538153
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1538153
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:4:p:326-345



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1543144_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: William Stephens
Author-X-Name-First: William
Author-X-Name-Last: Stephens
Author-Name: Stijn Sieckelinck
Author-X-Name-First: Stijn
Author-X-Name-Last: Sieckelinck
Author-Name: Hans Boutellier
Author-X-Name-First: Hans
Author-X-Name-Last: Boutellier
Title: Preventing Violent Extremism: A Review of the Literature
Abstract: 
 The rapid growth in research directed toward preventing violent extremism has resulted in a rich but fragmented body of literature spanning multiple disciplines. This review finds a number of themes that cut across a range of disciplinary approaches and suggests that the concept of resilience could provide the basis for a common framework for prevention. However, thus far the notion of resilience to extremism has often focused on the individual, and insufficient attention has been given to the role of contextual structures and institutions. We suggest that a social–ecological perspective on resilience could re-orientate the discourse on resilience to extremism.
Journal: Studies in Conflict & Terrorism
Pages: 346-361
Issue: 4
Volume: 44
Year: 2021
Month: 4
X-DOI: 10.1080/1057610X.2018.1543144
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1543144
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:4:p:346-361

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1559508_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Stuart Macdonald
Author-X-Name-First: Stuart
Author-X-Name-Last: Macdonald
Author-Name: Nuria Lorenzo-Dus
Author-X-Name-First: Nuria
Author-X-Name-Last: Lorenzo-Dus
Title: Visual Jihad: Constructing the “Good Muslim” in Online Jihadist Magazines
Abstract: 
 Images are known to have important effects on human perception and persuasion. Jihadist groups are also known to make strategic use of emotive imagery and symbolism for persuasive ends. Yet until recently studies of the online magazines published by violent jihadist groups largely focused on their textual, not their image, content and, while the image content of these magazines is now the subject of a burgeoning number of studies, few of these compare the images used by different groups. This article accordingly offers a cross-group comparison, examining the image content of a total of thirty-nine issues of five online magazines published by four different jihadist groups. Starting with a content analysis, it shows that the images’ most common focus is non-leader jihadis. Using a news values analysis, it then shows how these images of non-leader jihadis are used to visually construct the identity of a “good Muslim.” This construct is characterized by three traits, each corresponding to a different news value: fulfilled (personalization); active (consonance); and respected (prominence). Moreover, these traits are intertwined: fulfillment comes from responding actively to the call to violent jihad, which in turn promises respect. The article concludes by highlighting some subtle differences between how the news values of personalization, consonance, and prominence are realized in the different magazines, and by discussing the implications of the “good Muslim” construct for efforts to develop countermessages.
Journal: Studies in Conflict & Terrorism
Pages: 363-386
Issue: 5
Volume: 44
Year: 2021
Month: 5
X-DOI: 10.1080/1057610X.2018.1559508
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1559508
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:5:p:363-386



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1551294_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joel A. Capellan
Author-X-Name-First: Joel A.
Author-X-Name-Last: Capellan
Author-Name: Jason R. Silva
Author-X-Name-First: Jason R.
Author-X-Name-Last: Silva
Title: An Investigation of Mass Public Shooting Attacks Against Government Targets in the United States
Abstract: 
 The current study examines mass public shooters who target government agents and institutions in the United States. This research uses a rational choice perspective to examine the incidence, motivations, and target selection. Additionally, this work provides an in-depth investigation of ideological attacks, as well as a comparison against general mass public shooting perpetrator, planning, and incident characteristics. Results indicate non-ideological attacks against government targets occur more than ideologically motivated shootings. Importantly, the majority of ideologically motivated mass public shooters do not attack government targets. These findings provide implications for security, policy, and prevention strategies that have historically focused on ideologically motivated mass public shootings against government targets.
Journal: Studies in Conflict & Terrorism
Pages: 387-409
Issue: 5
Volume: 44
Year: 2021
Month: 5
X-DOI: 10.1080/1057610X.2018.1551294
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1551294
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:5:p:387-409



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1543131_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Emeka Thaddues Njoku
Author-X-Name-First: Emeka Thaddues
Author-X-Name-Last: Njoku
Title: Strategic Exclusion: The State and the Framing of a Service Delivery Role for Civil Society Organizations in the Context of Counterterrorism in Nigeria
Abstract: 
 This article examines the sociopolitical factors that influenced the framing of counterterrorism measures (CTMs) in Nigeria. It argues that the government strategically excluded civil society organizations CSOs from participating in the process of formulating CTMs. Thus, this situation renders CSOs without agency in the making of CTMs and their legal capacity to advocate for the marginalized and vulnerable groups in the context of counterterrorism in Nigeria. Additionally, the employed strategic exclusion of CSOs aided in the construction of a service delivery role that restrained political advocacy. Furthermore, the study argues that, despite the government counterterrorism approach, CSOs did not seek public support on the need to contest CTMs in Nigeria and have complied with these laws and policies. The empirical analysis is based on mixed-method research of CSOs and government agents. This research seeks to contribute to the debate regarding the effects of CTMs on CSOs by tracing the establishment of service delivery roles for CSOs to these organisations strategic exclusion in the formulation of CTMs. 
Journal: Studies in Conflict & Terrorism
Pages: 410-430
Issue: 5
Volume: 44
Year: 2021
Month: 5
X-DOI: 10.1080/1057610X.2018.1543131
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1543131
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:5:p:410-430



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1559512_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Moncrieff
Author-X-Name-First: Michael
Author-X-Name-Last: Moncrieff
Author-Name: Pierre Lienard
Author-X-Name-First: Pierre
Author-X-Name-Last: Lienard
Title: The Impact of Coalitional Commitment on the Recall of Moral Memories
Abstract: 
 We explore the relationship between coalitional alignment and memories of the Croatian Homeland War. Fifty-seven Croatian citizens with war experiences participated in a semi-structured interview. Participants less affected by the war and high in ethnic commitment recalled more morally charged memories than participants low in commitment. Participants highly affected by the war similarly recalled morally charged memories; however, the qualitative nature of the memories differed between high and low commitment. Offspring of mixed marriages and Orthodox participants reported more virtuous behaviors than other participants. The findings contribute to the literature on the intractability of conflict.
Journal: Studies in Conflict & Terrorism
Pages: 431-454
Issue: 5
Volume: 44
Year: 2021
Month: 5
X-DOI: 10.1080/1057610X.2018.1559512
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1559512
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:5:p:431-454

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1559516_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tom Keatinge
Author-X-Name-First: Tom
Author-X-Name-Last: Keatinge
Author-Name: Kerstin Danner
Author-X-Name-First: Kerstin
Author-X-Name-Last: Danner
Title: Assessing Innovation in Terrorist Financing
Abstract: 
 The innovation terrorist groups apply to their strategy and tactical operations is subject to increasing study. Yet an assessment of the innovation applied by terrorist groups to their financing is lacking, with consideration typically limited to “where does the money come from and what is it used for?” The forces that determine how terrorist groups fund themselves are questioned less closely. Given the widely held belief by national governments and international organizations that financing is a key requisite of terrorist activity, this omission represents a striking gap in our ability to anticipate, disrupt, and deny terrorists of financing.
Journal: Studies in Conflict & Terrorism
Pages: 455-472
Issue: 6
Volume: 44
Year: 2021
Month: 3
X-DOI: 10.1080/1057610X.2018.1559516
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1559516
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:6:p:455-472



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1568004_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Quint Hoekstra
Author-X-Name-First: Quint
Author-X-Name-Last: Hoekstra
Title: Helping the Contras: The Effectiveness of U.S. Support for Foreign Rebels During the Nicaraguan Contra War (1979–1990)
Abstract: 
 During the 1980s, the United States spent substantial political and economic capital supporting the Nicaraguan Contras. How effective was this in helping the rebels take on the Sandinista government? This article explores this topic by extending the application of principal-agent theory. It finds that, as expected, the effect of U.S. assistance was undermined by adverse selection and agency losses. However, the most important factor that undermined support effectiveness was the great inconsistency of the level of U.S. aid awarded to the insurgents. Reductions of official U.S. government support led to insurgency campaign collapse and meant that, in the end, the U.S. support program was only partially effective in helping the Contra struggle.
Journal: Studies in Conflict & Terrorism
Pages: 521-541
Issue: 6
Volume: 44
Year: 2021
Month: 3
X-DOI: 10.1080/1057610X.2019.1568004
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1568004
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:6:p:521-541



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1560666_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Cameron Sumpter
Author-X-Name-First: Cameron
Author-X-Name-Last: Sumpter
Author-Name: Yuslikha K. Wardhani
Author-X-Name-First: Yuslikha K.
Author-X-Name-Last: Wardhani
Author-Name: Sapto Priyanto
Author-X-Name-First: Sapto
Author-X-Name-Last: Priyanto
Title: Testing Transitions: Extremist Prisoners Re-Entering Indonesian Society
Abstract: 
 Readjusting to society after a prolonged period of detention is fraught with emotional and practical challenges. When recently released prisoners convicted of terrorism offenses focus on rebuilding their lives, supporting their families, and engaging with community members they may be less likely to resume the subversive behavior that put them behind bars. With this in mind, the Indonesian government attempts to facilitate the reintegration of former extremist inmates, primarily through entrepreneurial development initiatives. The government’s general approach holds promise but suffers from insufficient planning and human resource constraints. Greater involvement from local authorities and civil society would provide opportunities for more consistent engagement and a stronger chance of successful reintegration outcomes.
Journal: Studies in Conflict & Terrorism
Pages: 473-494
Issue: 6
Volume: 44
Year: 2021
Month: 3
X-DOI: 10.1080/1057610X.2018.1560666
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1560666
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:6:p:473-494



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1567997_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lior Herman
Author-X-Name-First: Lior
Author-X-Name-Last: Herman
Author-Name: Itay Fischhendler
Author-X-Name-First: Itay
Author-X-Name-Last: Fischhendler
Title: Energy as a Rewarding and Punitive Foreign Policy Instrument: The Case of Israeli–Palestinian Relations
Abstract: 
 This article examines how and when energy is used as a punitive or rewarding measure to advance foreign policy ends under conditions of perpetual conflict. Drawing on hundreds of primary governmental and commercial documents, and extensive elite interviews, we examine Israeli–Palestinian relations over 50 years. We find extensive instrumentalization of energy for foreign policy objectives in the conflict. We highlight electricity, a neglected area in international relations and conflict literatures, as a significant foreign policy tool. Our findings emphasize four major variables that shape the timing and form of energy measures—politics, regime type, dependence level, and energy production chain.
Journal: Studies in Conflict & Terrorism
Pages: 495-520
Issue: 6
Volume: 44
Year: 2021
Month: 3
X-DOI: 10.1080/1057610X.2019.1567997
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1567997
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:6:p:495-520

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1571696_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Clara Egger
Author-X-Name-First: Clara
Author-X-Name-Last: Egger
Author-Name: Raùl Magni-Berton
Author-X-Name-First: Raùl
Author-X-Name-Last: Magni-Berton
Title: The Role of Islamist Ideology in Shaping Muslims Believers’ Attitudes toward Terrorism: Evidence from Europe
Abstract: 
 This article investigates the role religious beliefs play in leading European Muslims to justify terrorism, using survey data collected in twenty-one countries. Results show that the factors leading Muslims to justify terrorism contextually vary. Where Muslims are predominant, this probability decreases with the importance respondents assign to religion, while it increases where Muslims are a minority. We find no evidence in support of the thesis that Islamist propaganda causes ordinary believers’ radicalization. Yet, in Western countries affected by homegrown terrorism, we observe that justifying terrorism is strongly associated with an increase in religious practice, providing support to the thesis that Islamist groups are attracting Islam radical individuals.
Journal: Studies in Conflict & Terrorism
Pages: 581-604
Issue: 7
Volume: 44
Year: 2021
Month: 7
X-DOI: 10.1080/1057610X.2019.1571696
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1571696
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:7:p:581-604



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1568008_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Miron Lakomy
Author-X-Name-First: Miron
Author-X-Name-Last: Lakomy
Title: Recruitment and Incitement to Violence in the Islamic State’s Online Propaganda: Comparative Analysis of Dabiq and Rumiyah
Abstract: 
 This article attempts to fill a gap in research on the propaganda methods exploited in the Islamic State’s flagship online magazines, Dabiq and Rumiyah. Its major objective is to discover methods exploited by their editors either to convince readers to join the ranks of the Islamic State, or to partake in jihad in the form of violent actions against infidels. The article also attempts to understand the magazines’ modus operandi in terms of legitimizing the “Caliphate’s” violence against its enemies. In order to reach these goals, content analysis and comparative analysis were utilized. This article argues that while the legitimization of violence and call to violence was strongly emphasized in both magazines, there are significant differences in terms of recruitment messages. On the one hand, Dabiq prioritized this issue (e.g., through the promotion of hijrah). On the other hand, Rumiyah was much less interested in inciting followers to join its ranks in the Middle East. Instead, it focused on calling Ummah to participate in jihad against the infidels, especially in the form of lone-wolf terrorist attacks.
Journal: Studies in Conflict & Terrorism
Pages: 565-580
Issue: 7
Volume: 44
Year: 2021
Month: 7
X-DOI: 10.1080/1057610X.2019.1568008
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1568008
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:7:p:565-580



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1568815_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Boaz Ganor
Author-X-Name-First: Boaz
Author-X-Name-Last: Ganor
Title: Artificial or Human: A New Era of Counterterrorism Intelligence?
Abstract: 
 A new revolution has begun in counterterrorism—the Artificial Intelligence (AI) revolution. The AI revolution has had a significant impact on many areas of security and intelligence. The use of AI and big data in general, and in the field of intelligence and counterterrorism in particular, has led to intense debates between supporters of the continuation and expansion of the use of this technology and those who oppose it. The traditional delicate balance between effectiveness in the fight against terrorism and the liberal democratic values ​​of society becomes even more crucial when counterterrorism engages in AI and big data technology.
Journal: Studies in Conflict & Terrorism
Pages: 605-624
Issue: 7
Volume: 44
Year: 2021
Month: 7
X-DOI: 10.1080/1057610X.2019.1568815
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1568815
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:7:p:605-624



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1568005_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: R. Kim Cragin
Author-X-Name-First: R. Kim
Author-X-Name-Last: Cragin
Title: Preventing the Next Wave of Foreign Terrorist Fighters: Lessons Learned from the Experiences of Algeria and Tunisia
Abstract: 
 Foreign terrorist fighters (FTFs) signify a unique threat. Islamic State leaders recruited many of them specifically to conduct terrorist attacks against the West. Many of these external operations have proven to be sophisticated and deadly, such as the November 2015 attacks in Paris. Yet the threat posed by FTFs goes beyond orchestrating attacks. In the past, they returned home to build networks that, in turn, facilitated a new generation of FTFs. Even more challenging, today’s FTFs can interact with recruits on social media to inspire attacks. This article addresses the threat of a new wave of FTFs and potential countermeasures. It presents findings from a comparative analysis of Tunisia and Algeria, concluding that to reverse the compounding nature of FTFs, countries must identify the potential threat from the outset, put appropriate legal measures in place, adequately fund judicial systems, and institute re-integration programs.
Journal: Studies in Conflict & Terrorism
Pages: 543-564
Issue: 7
Volume: 44
Year: 2021
Month: 7
X-DOI: 10.1080/1057610X.2019.1568005
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1568005
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:7:p:543-564

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1575036_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michal Mochtak
Author-X-Name-First: Michal
Author-X-Name-Last: Mochtak
Title: Understanding Electoral Violence through Complex Textual Data: OSCE Monitoring Missions in Different Contexts
Abstract: 
 The article analyzes more than twenty years of evidence on electoral violence as reported by Organization for Security and Cooperation in Europe (OSCE) monitoring mission reports. It identifies prevailing trends of electoral violence in the OSCE participating states in order to better understand how the phenomenon is understood and framed by the leading international monitoring organizations in the region. The analysis utilizes a unique approach based on automated content analysis employing counting algorithms and latent semantic indexing. The results of the analysis show how electoral violence differs throughout the region while highlighting the qualitative variations in regional patterns of the reported incidents of election-related violence.
Journal: Studies in Conflict & Terrorism
Pages: 646-667
Issue: 8
Volume: 44
Year: 2021
Month: 8
X-DOI: 10.1080/1057610X.2019.1575036
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1575036
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:8:p:646-667



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1575031_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Battersby
Author-X-Name-First: John
Author-X-Name-Last: Battersby
Title: Can Old Lessons Inform Current Directions: Australia, New Zealand, and Ananda Marga’s Trans-Tasman “Terrorism” 1975–1978
Abstract: 
 Ananda Marga (AM) was established in India in 1951, and was over time involved in political violence there. Its leader was arrested in 1971 and AM banned in 1975. By then it had spread globally, with AM groups set up in Australia and New Zealand in the early 1970s all peacefully disposed. The 1975 banning of the sect in India led to a change in AM behaviour globally, with the first act of AM terrorism outside of India attempted in New Zealand that year. AM acts of terrorism occurred subsequently in Australia. There were significant links between AM in both countries, but Australia and New Zealand chose individual national approaches over a coordinated response to AM terrorism. These approaches were not always effective and at times actually counter-productive. This case study considers the limitations of CT tactics used at the time, some of which are still used today.
Journal: Studies in Conflict & Terrorism
Pages: 686-700
Issue: 8
Volume: 44
Year: 2021
Month: 8
X-DOI: 10.1080/1057610X.2019.1575031
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1575031
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:8:p:686-700



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1577016_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Adrian Cherney
Author-X-Name-First: Adrian
Author-X-Name-Last: Cherney
Author-Name: Emma Belton
Author-X-Name-First: Emma
Author-X-Name-Last: Belton
Title: Evaluating Case-Managed Approaches to Counter Radicalization and Violent Extremism: An Example of the Proactive Integrated Support Model (PRISM) Intervention
Abstract: 
 In recent years there has been the proliferation of counterradicalization programs that incorporate a case management approach involving individually tailored intervention plans. The evaluation of case-managed countering violent extremism (CVE) interventions is challenging. This article provides results from research that evaluated a custody-based case-managed intervention delivered to convicted terrorists and individuals identified as at risk of radicalization in the Australian state of New South Wales, called the Proactive Integrated Support Model. A quantitative assessment of disengagement based on the coding of client case note data is provided. Results provide data on the background of clients, their intervention goals, and illustrate client change over time. Lessons for CVE evaluation and the role of formal interventions in facilitating disengagement are highlighted.
Journal: Studies in Conflict & Terrorism
Pages: 625-645
Issue: 8
Volume: 44
Year: 2021
Month: 8
X-DOI: 10.1080/1057610X.2019.1577016
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1577016
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:8:p:625-645



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1575027_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Revital Sela-Shayovitz
Author-X-Name-First: Revital
Author-X-Name-Last: Sela-Shayovitz
Author-Name: Hava Dayan
Author-X-Name-First: Hava
Author-X-Name-Last: Dayan
Title: Female Palestinian Terrorists: The Role of the Intifada Period and the Terrorism Context
Abstract: 
 Palestinian women have played an increasingly active role in terrorist activities in the past two decades as part of the Israeli–Palestinian conflict. The present study aims to examine differences in the characteristics of female Palestinian terrorists and in the patterns of their terrorist activity between the Second Intifada and the Third Intifada. Furthermore, a comparative analysis of male Palestinian terrorist activity between the two Intifada periods was conducted in order to explore whether trends in female terrorist activity were unique to women or reflected global trends. Data are based on 171 female and male Palestinians that carried out terrorist activities. The findings show that age, terrorist method and organizational affiliation correlate significantly with the Intifada period. Significant differences were not found in the main motive for female terrorist activity. The analysis shows that overall trends of Palestinian female terrorist characteristics and their involvement in terrorism were similar to those of male terrorists. Moreover, during the Third Intifada female terrorists mainly acted alone, reflecting the current growing global trend of lone-actor terrorists.
Journal: Studies in Conflict & Terrorism
Pages: 668-685
Issue: 8
Volume: 44
Year: 2021
Month: 8
X-DOI: 10.1080/1057610X.2019.1575027
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1575027
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:8:p:668-685

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1586354_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sadi Shanaah
Author-X-Name-First: Sadi
Author-X-Name-Last: Shanaah
Title: What Motivates Muslims to Engage in Counterextremism? The Role of Identity, Efficacy, Emotions, and Morality
Abstract: 
 Western governments increasingly encourage Muslims to challenge Islamist extremism. However, the dominant academic and public discourse regards Muslims as deeply alienated and thus reluctant to do so. The article investigates motivations for Muslim counterextremism engagement and based on that formulates policy recommendations that are useful to government agencies that seek to mobilize Muslim communities to fight Islamist extremism. The analysis finds that Muslims are more likely to mobilize if governments highlight how Islamist extremism violates Islamic and universal values, how it negatively affects particular sections of Muslim communities, and how it can be successfully tackled by Muslim-based action.
Journal: Studies in Conflict & Terrorism
Pages: 755-775
Issue: 9
Volume: 44
Year: 2021
Month: 7
X-DOI: 10.1080/1057610X.2019.1586354
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1586354
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:9:p:755-775



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1585628_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Colleen E. Mills
Author-X-Name-First: Colleen E.
Author-X-Name-Last: Mills
Author-Name: Joshua D. Freilich
Author-X-Name-First: Joshua D.
Author-X-Name-Last: Freilich
Author-Name: Steven M. Chermak
Author-X-Name-First: Steven M.
Author-X-Name-Last: Chermak
Author-Name: Thomas J. Holt
Author-X-Name-First: Thomas J.
Author-X-Name-Last: Holt
Author-Name: Gary LaFree
Author-X-Name-First: Gary
Author-X-Name-Last: LaFree
Title: Social Learning and Social Control in the Off- and Online Pathways to Hate Crime and Terrorist Violence
Abstract: 
 Although recent years have seen a great increase in the study of hate crime and terrorism, there is limited research to date that explores connections between hate crime and terrorism. This study uses a qualitative case-study method to explore the competing criminological theories of social learning and social control to investigate their utility in explaining radicalization among hate and terrorist violent extremists. Our analysis demonstrates important similarities and differences across ideology and offender types in their career pathways. We find support for the use of an integrated social control–social learning model to explain radicalization and the commission of extremist violence.
Journal: Studies in Conflict & Terrorism
Pages: 701-729
Issue: 9
Volume: 44
Year: 2021
Month: 7
X-DOI: 10.1080/1057610X.2019.1585628
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1585628
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:9:p:701-729



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1580419_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Barak Mendelsohn
Author-X-Name-First: Barak
Author-X-Name-Last: Mendelsohn
Title: The Battle for Algeria: Explaining Fratricide among Armed Nonstate Actors
Abstract: 
 Unity among a rebel movement is associated with positive returns, yet rebel groups often fail to come together and even fall into fratricide infighting. Focusing on a rebel field in which one group enjoys primacy, I present three pathways that are likely to produce rebel fratricide: first, power shifts within the rebel movement; second, spillover from internal conflict within the dominant group; and third, disagreements over targeting noncombatants. I explore the role these mechanisms played in fratricidal violence among the Islamist opposition in Algeria during the 1990s civil war.
Journal: Studies in Conflict & Terrorism
Pages: 776-798
Issue: 9
Volume: 44
Year: 2021
Month: 7
X-DOI: 10.1080/1057610X.2019.1580419
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1580419
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:9:p:776-798



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1577541_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Markus K. Binder
Author-X-Name-First: Markus K.
Author-X-Name-Last: Binder
Author-Name: Gary A. Ackerman
Author-X-Name-First: Gary A.
Author-X-Name-Last: Ackerman
Title: Pick Your POICN: Introducing the Profiles of Incidents involving CBRN and Non-State Actors (POICN) Database
Abstract: 
 The majority of scholarship on chemical, biological, radiological, and nuclear (CBRN) terrorism relies on non-empirical theorizing or the in-depth examination of a handful of prominent cases. A key reason for the dearth of systematic analyses is the lack of a comprehensive database on CBRN terrorism events amenable to quantitative analysis. This article introduces the Profiles of Incidents involving CBRN and Non-State Actors (POICN) database, consisting of 517 CBRN terrorism–related events from 1990 to 2017. After laying out the general scope of the database and its unique approach to incident validation, the article illustrates POICN’s potential through preliminary observations of the data.
Journal: Studies in Conflict & Terrorism
Pages: 730-754
Issue: 9
Volume: 44
Year: 2021
Month: 7
X-DOI: 10.1080/1057610X.2019.1577541
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1577541
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:44:y:2021:i:9:p:730-754

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1647678_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Niamatullah Ibrahimi
Author-X-Name-First: Niamatullah
Author-X-Name-Last: Ibrahimi
Title: Rumor and Collective Action Frames: An Assessment of How Competing Conceptions of Gender, Culture, and Rule of Law Shaped Responses to Rumor and Violence in Afghanistan
Abstract: 
 How do rumors emerge and spread? One explanation emphasizes some form of crisis and uncertainty as the facilitating condition and another strand of research focuses on micro-level dynamics to explain how some groups are more vulnerable to rumors than others. This article applies framing theory to examine a rumor that led to violence that killed Farkhunda Malikzada in Afghanistan in March 2015 and three separate protests against the incident. Focusing on how different groups understand and reinterpret rumors, the article makes a distinction between rumor as an informational shortcut and an instrument of deliberate manipulation of information.
Journal: Studies in Conflict & Terrorism
Pages: 20-42
Issue: 1
Volume: 45
Year: 2022
Month: 1
X-DOI: 10.1080/1057610X.2019.1647678
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1647678
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:1:p:20-42



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1697024_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael J. Soules
Author-X-Name-First: Michael J.
Author-X-Name-Last: Soules
Title: Martyr or Mystery? Female Suicide Bombers and Information Availability
Abstract: 
 An extensive body of literature examines how the media depicts female suicide bombers. However, there has been little systematic testing of these theories. I test common arguments about how female bombers are portrayed, relative to male bombers. I find mixed support for the notion that information on female bombers relies on gender stereotypes. I find robust evidence that the marital status of female bombers is more likely to be reported on than for their male counterparts, while other characteristics, such as education and occupation, are not. I discuss the incentives media outlets and armed groups have for reinforcing these stereotypes.
Journal: Studies in Conflict & Terrorism
Pages: 62-91
Issue: 1
Volume: 45
Year: 2022
Month: 1
X-DOI: 10.1080/1057610X.2019.1697024
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1697024
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:1:p:62-91



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1647673_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Matthew J. Dolliver
Author-X-Name-First: Matthew J.
Author-X-Name-Last: Dolliver
Author-Name: Erin M. Kearns
Author-X-Name-First: Erin M.
Author-X-Name-Last: Kearns
Title: Is It Terrorism?: Public Perceptions, Media, and Labeling the Las Vegas Shooting
Abstract: 
 When a mass casualty event occurs, why do some people label it terrorism while others do not? People are more likely to consider an attack to be terrorism when the perpetrator is Muslim, yet it is unclear what other factors influence perceptions of mass violence. Using data collected from a national sample of U.S. adults shortly after the 2017 Las Vegas shooting, we examine how media consumption and social identity influence views of the attack. Media consumption and individual-level factors—Islamophobia, political ideology, and other participant demographics—influence how people view the attack and how confident people are in their assessments.
Journal: Studies in Conflict & Terrorism
Pages: 1-19
Issue: 1
Volume: 45
Year: 2022
Month: 1
X-DOI: 10.1080/1057610X.2019.1647673
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1647673
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:1:p:1-19



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1626091_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marco Nilsson
Author-X-Name-First: Marco
Author-X-Name-Last: Nilsson
Title: Motivations for Jihad and Cognitive Dissonance – A Qualitative Analysis of Former Swedish Jihadists
Abstract: 
 This study is based on interviews with three former Swedish jihadists, and it uses cognitive dissonance theory to analyze how their motivations for jihad changed—from the early stages of radicalization to fighting as part of a jihadist group and finally leaving jihad. It argues that cognitive dissonance is a causal mechanism, alternative to empathy and collective relative deprivation, that can explain how individuals with collective identities can be motivated to opt for jihad. For none of the interviewees did fundamentalist Islam provide a gateway into jihadism, nor did they seem to use Islam as a mere justification for violent behavior. Cognitive dissonance can also shed light on why some jihadists have not been susceptible to further radicalization by accepting even more radical ideas.
Journal: Studies in Conflict & Terrorism
Pages: 92-110
Issue: 1
Volume: 45
Year: 2022
Month: 1
X-DOI: 10.1080/1057610X.2019.1626091
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1626091
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:1:p:92-110



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1647682_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Colin Atkinson
Author-X-Name-First: Colin
Author-X-Name-Last: Atkinson
Author-Name: Donna Yates
Author-X-Name-First: Donna
Author-X-Name-Last: Yates
Author-Name: Nick Brooke
Author-X-Name-First: Nick
Author-X-Name-Last: Brooke
Title: Researching a Risky Business? The Use of Freedom of Information to Explore Counterterrorism Security at Museums in the United Kingdom
Abstract: 
 This article reflects on the value and limitations of the use of Freedom of Information (FOI) in the collection of data on counterterrorism policies and practices at museums in the United Kingdom (UK). In doing so, this article re-interprets the museum within the “single narrative” of global jihadist terrorism before using FOI to uncover counterterrorism security measures at museums in the UK. We particularly signpost the importance of the role of the museum security manager as the interface between the museum and the wider UK counterterrorism network. Throughout, but particularly in the discussion section, the article reflects on the value and limitations of FOI as a social research tool. The conclusion highlights the requirement for further qualitative enquiry into the museum as an emerging site of counterterrorism security discourse and practice, particularly in relation to how museum security managers understand and navigate this unique cultural space.
Journal: Studies in Conflict & Terrorism
Pages: 43-61
Issue: 1
Volume: 45
Year: 2022
Month: 1
X-DOI: 10.1080/1057610X.2019.1647682
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1647682
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:1:p:43-61

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1711601_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Miron Lakomy
Author-X-Name-First: Miron
Author-X-Name-Last: Lakomy
Title: Between the “Camp of Falsehood” and the “Camp of Truth”: Exploitation of Propaganda Devices in the “Dabiq” Online Magazine
Abstract: 
 This paper attempts to fill the gap in research and contribute to the academic debate on the online magazines of Daesh. Its primary objective is to identify and understand propaganda devices, which were exploited by the editors of “Dabiq” to influence its readers. In order to do this, the study utilized a classic framework of propaganda devices elaborated by the American Institute for Propaganda Analysis, which consists of seven methods: name-calling, glittering generalities, transfer, testimonial, card-stacking, plain folks, and bandwagon.
Journal: Studies in Conflict & Terrorism
Pages: 881-906
Issue: 10
Volume: 45
Year: 2022
Month: 10
X-DOI: 10.1080/1057610X.2020.1711601
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1711601
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:10:p:881-906



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1711605_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Shlomo O. Goldman
Author-X-Name-First: Shlomo O.
Author-X-Name-Last: Goldman
Author-Name: Smadar Noy
Author-X-Name-First: Smadar
Author-X-Name-Last: Noy
Title: The Size of Terror Organizations: Poverty and Economic Inequality as Mobilizing Forces
Abstract: 
 This study examines the relationships between poverty, economic inequality and joining to terror organizations. Based on the rational-economic model, differently, from previous studies, we focused on the organizational level. We hypothesized that in a poorer base country of operation and in a base country of operation in which the economic inequality is wider the likelihood of terror organizations to become larger (higher number of core activists) is higher. Using GDP per-capita and GINI index as proxies and several statistical methods we tested these hypotheses analyzing hundreds of terror organizations. The findings are that there are no robust relationships between poverty and economic inequality and the number of people who joined them. However, the likelihood of a larger terror organization – lifetime, defeat as the life-ending cause of the organization and political goal – regime change, found to be significantly related to the size of terror organizations.
Journal: Studies in Conflict & Terrorism
Pages: 843-861
Issue: 10
Volume: 45
Year: 2022
Month: 10
X-DOI: 10.1080/1057610X.2020.1711605
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1711605
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:10:p:843-861



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1711604_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jugdep S. Chima
Author-X-Name-First: Jugdep S.
Author-X-Name-Last: Chima
Title: Are Participants in Ethnonationalist Movements Rational-Choosers, Socially-Embedded Actors, or Psychologically-Instinctive Beings?: Motivations and Worldviews of Sikh Separatists from India
Abstract: 
 This article contributes to answering the fundamental research question, “Why do individuals participate in contentious ethnonationalist movements?” More specifically, it tries to ascertain which competing theory of human behavior—rational-chooser, socially-embedded actor, or instinctive psychological being—best explains this phenomenon. Based on over a dozen in-depth interviews with Sikh ethnonationalists from Punjab-India, this paper finds that social constructivism, and to a much lesser extent, the sociopsychological paradigm best explain why individuals join collective ethnonationalist movements. In contrast, the rational-choice theory finds only very limited support. Even when sociopsychological and rational-choice motivations are found for individual participation in risky ethnonationalist movements, they exist either intertwined or in close conjunction with social constructivist ones, thus giving even increased support for this dominant theory.
Journal: Studies in Conflict & Terrorism
Pages: 907-928
Issue: 10
Volume: 45
Year: 2022
Month: 10
X-DOI: 10.1080/1057610X.2020.1711604
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1711604
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:10:p:907-928



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1711588_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Zoe Marchment
Author-X-Name-First: Zoe
Author-X-Name-Last: Marchment
Author-Name: Paul Gill
Author-X-Name-First: Paul
Author-X-Name-Last: Gill
Title: Spatial Decision Making of Terrorist Target Selection: Introducing the TRACK Framework
Abstract: 
 Guided by previous research and recent empirical analyses, this paper gives insight into elements that characterize the spatial decision making of terrorist target selection. Five key factors explain why targets are chosen by terrorists. The authors propose that, generally, targets will be selected when they are Tolerable, Relevant, Accessible, Close and/or Known. This is followed by a discussion of attacks witnessed between January 2013 and December 2018 in the United Kingdom, and implications.
Journal: Studies in Conflict & Terrorism
Pages: 862-880
Issue: 10
Volume: 45
Year: 2022
Month: 10
X-DOI: 10.1080/1057610X.2020.1711588
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1711588
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:10:p:862-880

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1961706_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Victoria Williamson
Author-X-Name-First: Victoria
Author-X-Name-Last: Williamson
Author-Name: Dominic Murphy
Author-X-Name-First: Dominic
Author-X-Name-Last: Murphy
Author-Name: Sharon A.M. Stevelink
Author-X-Name-First: Sharon A.M.
Author-X-Name-Last: Stevelink
Author-Name: Edgar Jones
Author-X-Name-First: Edgar
Author-X-Name-Last: Jones
Author-Name: Shannon Allen
Author-X-Name-First: Shannon
Author-X-Name-Last: Allen
Author-Name: Neil Greenberg
Author-X-Name-First: Neil
Author-X-Name-Last: Greenberg
Title: The Relationship between of Moral Injury and Radicalisation: A Systematic Review
Abstract: 
 This review aimed to explore individual-level factors involved in radicalization and the impact of moral injury on an individual’s beliefs and behaviors that are relevant to radicalization. The results indicate that both individuals who develop radical beliefs and those with moral injury are exposed to events which provoke similar adverse outcomes, including a loss of personal significance, suggesting that moral injury could be a useful way to understand the process of radicalization. Understanding the processes involved in moral injury may inform preventative programs, as well programs to promote disengagement from radical action in those who have already been radicalized.
Journal: Studies in Conflict & Terrorism
Pages: 977-1003
Issue: 11
Volume: 45
Year: 2022
Month: 11
X-DOI: 10.1080/1057610X.2021.1961706
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1961706
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:11:p:977-1003



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1727098_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Clive Walker
Author-X-Name-First: Clive
Author-X-Name-Last: Walker
Author-Name: Oona Cawley
Author-X-Name-First: Oona
Author-X-Name-Last: Cawley
Title: The Juridification of the UK’s Counter Terrorism Prevent Policy
Abstract: 
 The U.K. policy of “Prevent” aims to stop people becoming involved in, or supporting, terrorism. In common with many CVE policies worldwide, Prevent has remained controversial in its conception, delivery, and impact. A formal review is now underway, so it is opportune to ask, “Whither Prevent?” This paper will examine briefly the justifications for Prevent, but the main thesis is that the juridification of Prevent is a beneficial trend in the U.K. Juridification is depicted as: the legislative production of ever more extensive and elaborate instruments; the expansion of judicial oversight; and the administrative (bureaucratic) application of soft law standards. Juridification is here invoked in order to enhance the legitimacy of the policy of Prevent through explicit improvements in its modes of operation and through offering modes of challenge where the principles of constitutionalism are contravened. If Prevent can be improved in these ways, then its application can be refined to address more effectively and efficiently the threat of terrorist attacks, especially given that the originators or observers of these threats are invited under the Prevent policy to cooperate by consent in the enterprise of counter terrorism.
Journal: Studies in Conflict & Terrorism
Pages: 1004-1029
Issue: 11
Volume: 45
Year: 2022
Month: 11
X-DOI: 10.1080/1057610X.2020.1727098
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1727098
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:11:p:1004-1029



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1711586_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Rachel Schmidt
Author-X-Name-First: Rachel
Author-X-Name-Last: Schmidt
Title: Duped: Examining Gender Stereotypes in Disengagement and Deradicalization Practices
Abstract: 
 In narratives around insurgencies, terrorism, and other forms of political violence, the media—and policymakers—frequently portray women as victims or unintelligent pawns of men. But these violent women get more media attention than their male counterparts because they are a shocking departure from gendered expectations of nurturing, peaceful women. However, even such narratives of deviance can reinforce societal stereotypes about women by emphasizing that they are emotional but not political, easily manipulated, often deranged, or simply unintelligent. Using in-depth interviews in Ireland and the United Kingdom with practitioners in counter terrorism (CT) and countering violent extremism (CVE), this paper argues that a failure to ask meaningful questions about women’s roles in extremist violence has reinforced gender stereotypes, leading to disengagement and deradicalization practices that ignore or downplay women’s importance in fostering violence.
Journal: Studies in Conflict & Terrorism
Pages: 953-976
Issue: 11
Volume: 45
Year: 2022
Month: 11
X-DOI: 10.1080/1057610X.2020.1711586
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1711586
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:11:p:953-976



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1711590_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nadia Al-Dayel
Author-X-Name-First: Nadia
Author-X-Name-Last: Al-Dayel
Author-Name: Andrew Mumford
Author-X-Name-First: Andrew
Author-X-Name-Last: Mumford
Author-Name: Kevin Bales
Author-X-Name-First: Kevin
Author-X-Name-Last: Bales
Title: Not Yet Dead: The Establishment and Regulation of Slavery by the Islamic State
Abstract: 
 The Islamic State is an organization at the nexus of modern slavery and terrorism. This article provides the first in-depth analysis of how it regulated slavery. With a consideration of gendered approaches, it applies multiple data sources to reveal a three-part assessment of the forms, establishment, and regulation of slavery from 2014 to 2017. Beginning with the August 2014 Sinjar massacre, it reveals the logistics of slavery through an innovative process entitled the Division and Regulation of Enslavement Framework. It concludes with a discussion on the domestic and international aspects of this crime, detailing recommendations for research and policy.
Journal: Studies in Conflict & Terrorism
Pages: 929-952
Issue: 11
Volume: 45
Year: 2022
Month: 11
X-DOI: 10.1080/1057610X.2020.1711590
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1711590
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:11:p:929-952

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1723283_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ian Oxnevad
Author-X-Name-First: Ian
Author-X-Name-Last: Oxnevad
Title: Beyond a Desert Revolt: TE Lawrence’s Theory of Proxy War and State Creation
Abstract: 
 The work of TE Lawrence is traditionally included among theories of insurgency and irregular warfare. However, such a reading of Lawrence’s work disregards the political theory of state creation underpinning his strategic understanding of insurgency. This article comprises a historically driven analysis of Lawrence’s writing and action in order to discern his military theory and return the Arab Revolt to its context of proxy warfare. This article argues that Lawrence’s work is strategic and political as opposed to tactical. Rather than a simple theory of insurgency, Lawrence’s military theory is one of proxy war that envisions state creation as a strategic goal.
Journal: Studies in Conflict & Terrorism
Pages: 1050-1068
Issue: 12
Volume: 45
Year: 2022
Month: 12
X-DOI: 10.1080/1057610X.2020.1723283
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1723283
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:12:p:1050-1068



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1738683_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Meghan Conroy
Author-X-Name-First: Meghan
Author-X-Name-Last: Conroy
Author-Name: Nadia Al-Dayel
Author-X-Name-First: Nadia
Author-X-Name-Last: Al-Dayel
Title: Identity Construction Through Discourse: A Case Study of ISIS’s No Respite Video
Abstract: 
 This article investigates the motivations driving the production of ISIS’s distinctive 2015 video, No Respite, released in response to the UN Security Council’s condemnation of the terrorist organization’s spate of violence. The article embraces a unique methodological framework that examines both the relationship between identity, discourse, and critical geopolitics and ISIS’s specific organized persuasive communication strategies. The framework is used to explain ISIS’s use of statistics as well as competitive and masculine discourse to bolster its legitimacy as a self-proclaimed state. The analysis is conducted through the lens of ISIS’s goal to be seen as a legitimate statehood project in lieu of a violent non-state actor.
Journal: Studies in Conflict & Terrorism
Pages: 1069-1094
Issue: 12
Volume: 45
Year: 2022
Month: 12
X-DOI: 10.1080/1057610X.2020.1738683
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1738683
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:12:p:1069-1094



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1723282_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Henrik Gråtrud
Author-X-Name-First: Henrik
Author-X-Name-Last: Gråtrud
Title: When Insularity Becomes a Problem: The Literature on Jihadism in Jordan
Abstract: 
 This article offers a review of the literature on Jordanian jihadism. While excellent work has been done, particularly on the phenomenon’s history and ideologues such as Abu Muhammad al-Maqdisi, several topics remain unexplored. The main explanation for the literature’s shortcomings is that it has been too inward-looking. I argue that this insularity has led to three problems: first, the literature sometimes recycles observations already made; second, it fails to show how Jordan presents specificities in terms of jihadism; and third and most importantly, it misses insights from the literature on political violence about radicalization and terrorist attack activity. As a result, it fails to address key questions about Jordanian jihadism, such as why, when, and how terrorist attacks happen.
Journal: Studies in Conflict & Terrorism
Pages: 1095-1118
Issue: 12
Volume: 45
Year: 2022
Month: 12
X-DOI: 10.1080/1057610X.2020.1723282
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1723282
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:12:p:1095-1118



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1738682_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel Byman
Author-X-Name-First: Daniel
Author-X-Name-Last: Byman
Title: Understanding, and Misunderstanding, State Sponsorship of Terrorism
Abstract: 
 The U.S. government list of state sponsors of terrorism is dated, politicized, analytically muddy, and in general not useful for distinguishing which states truly sponsor terrorism and how aggressively they do so. A better list and process would identify different criteria that go into sponsoring terrorism and, in so doing, create multiple de facto lists. Lists would distinguish important factors such as the use of terrorism in war and the problematic criterion of states using their own clandestine agents for terrorism-like violence. Different forms of passive support would also be assessed, particularly because state passivity is often vital for jihadists and white supremacists, two of the greatest terrorism dangers today. The political and analytically flawed nature of the state sponsor list and process, however, is as much by design as it is by accident, and change is especially difficult as a result.
Journal: Studies in Conflict & Terrorism
Pages: 1031-1049
Issue: 12
Volume: 45
Year: 2022
Month: 12
X-DOI: 10.1080/1057610X.2020.1738682
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1738682
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:12:p:1031-1049

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1654726_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bagong Suyanto
Author-X-Name-First: Bagong
Author-X-Name-Last: Suyanto
Author-Name: Mun’im Sirry
Author-X-Name-First: Mun’im
Author-X-Name-Last: Sirry
Author-Name: Rahma Sugihartati
Author-X-Name-First: Rahma
Author-X-Name-Last: Sugihartati
Title: Pseudo-Radicalism and the De-Radicalization of Educated Youth in Indonesia
Abstract: 
 This article discusses a recent phenomenon of radicalization among university students in Indonesia, with special attention to what may be called “pseudo-radicalists” (i.e., a group of students who have been exposed to radical ideologies); however, they are not strongly grounded in an exclusive and extreme religious viewpoint that justifies militant attitudes and violent actions. We carefully and critically examine the extent to which educated youth have been infiltrated by radical influences and how they de-radicalized themselves. Our research includes seven government tertiary institutions identified by the National Agency for Combating Terrorism or Badan Nasional Penanggulangan Terorisme as having been inflicted by radicalism, namely, Universitas Indonesia, Institut Teknologi Bandung, Institut Pertanian Bogor, Universitas Diponegoro, Institut Teknologi Sepuluh Nopember, Universitas Airlangga, and Universitas Brawijaya. By situating our case study within the existing literature on radicalization and de-radicalization, we hope that this article will enrich our perspectives and shed some light on crucial issues facing educated youth, especially within tertiary campuses.
Journal: Studies in Conflict & Terrorism
Pages: 153-172
Issue: 2
Volume: 45
Year: 2022
Month: 2
X-DOI: 10.1080/1057610X.2019.1654726
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1654726
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:2:p:153-172



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1657304_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Eitan Azani
Author-X-Name-First: Eitan
Author-X-Name-Last: Azani
Author-Name: Liram Koblentz-Stenzler
Author-X-Name-First: Liram
Author-X-Name-Last: Koblentz-Stenzler
Title: Muslim Converts Who Turn to Global Jihad: Radicalization Characteristics and Countermeasures
Abstract: 
 Over the past three decades, along with the expansion of the phenomenon of global jihad, we have witnessed a growing trend of converts to Islam integrating into global jihad organizations. Some of these converts constitute an important element in the terrorist infrastructure, globally, and particularly in the West. Some are recruited as foreign fighters into the ranks of the Islamic State or other Islamic extremist organizations. Global jihad organizations have identified the potential of new converts (knowledge of the local culture, the difficulty in tracking them faced by intelligence organizations), and they are investing efforts in every possible arena (physical and digital) to recruit them for terrorist activity. The converts, for their part, are more vulnerable to recruitment for terrorist purposes. The aim of the article is to illuminate the existing phenomenon of radicalization among new converts to Islam and expand the current knowledge base with regard to the variables that affect the growth of this phenomenon and the background and preconditions for such growth. Moreover, this article will attempt to use the above in order to design and develop effective tools for early warning and curbing this phenomenon.
Journal: Studies in Conflict & Terrorism
Pages: 173-199
Issue: 2
Volume: 45
Year: 2022
Month: 2
X-DOI: 10.1080/1057610X.2019.1657304
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1657304
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:2:p:173-199



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1657657_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Jupp
Author-X-Name-First: John
Author-X-Name-Last: Jupp
Title: Strengthening Protection and Support for Victims of Terrorism in Criminal Proceedings in Afghanistan
Abstract: 
 Afghanistan faces significant challenges as it seeks to emerge from thirty years of civil war and insurgent violence and promote lasting peace and security. Terrorist incidents, which have increased dramatically since 2004, continue to pose a major threat to security, destabilizing governance and fracturing state initiatives to guarantee rule of law to citizens. An urgent priority for the government, as part of its development of counterterrorism policy, is to ensure that the formal criminal justice system responds effectively to the threat of terrorism by creating mechanisms and procedures that support the rights and needs of victims in accordance with international human rights standards. To date, examining victimhood in Afghanistan and accurately understanding the assistance and support that victims of terrorism receive and to which they are entitled during criminal justice processes have avoided academic scrutiny. Informed by empirical evidence and qualitative interviews with justice officials in Afghanistan, this article aims to fill this important gap in scholarship. It does so by drawing on an international framework for good practices outlined in the Global Counterterrorism Forum’s Madrid Memorandum to shed new light on gaps in existing national law. In doing so, it makes important recommendations for both institutional and legislative reform designed to strengthen protections and assistance for victims of terrorism and inform contemporary reviews of criminal procedural law being undertaken by justice ministries in Afghanistan.
Journal: Studies in Conflict & Terrorism
Pages: 133-152
Issue: 2
Volume: 45
Year: 2022
Month: 2
X-DOI: 10.1080/1057610X.2019.1657657
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1657657
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:2:p:133-152



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1647685_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Chuck Thiessen
Author-X-Name-First: Chuck
Author-X-Name-Last: Thiessen
Title: The Strategic Ambiguity of the United Nations Approach to Preventing Violent Extremism
Abstract: 
 The use of international peacebuilding as a delivery vehicle for preventing violent extremism (PVE) initiatives is a recent and pivotal development in United Nations (UN) counterterrorism strategy. However, existing research has not considered the contradictions that emerge when international organizations transition to new peacebuilding approaches such as PVE. Further, it remains unclear whether and how intervening organizations overcome these contradictions. Based on forty-seven interviews with UN, government, and nongovernmental organization officials in Kyrgyzstan and New York this article critically analyzes the shift to PVE as an underlying strategic approach to UN peacebuilding and the mismatch between external expectations and local priorities. Interview narratives feature ambiguity in conceptions of foundational PVE concepts and in how interveners reference a menu of drivers for violent extremism according to project requirements. This article argues that ambiguity is strategically tolerated and employed, whereby not clarifying the terms of engagement with (sub-)national counterparts supports external agendas and achieves a basic unity of purpose by permitting counterparts increased managerial latitude to satisfy self-interests.
Journal: Studies in Conflict & Terrorism
Pages: 111-132
Issue: 2
Volume: 45
Year: 2022
Month: 2
X-DOI: 10.1080/1057610X.2019.1647685
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1647685
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:2:p:111-132

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1657297_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Adis Duderija
Author-X-Name-First: Adis
Author-X-Name-Last: Duderija
Title: Mainstream Sunnism, Salafi-Jihadism and progressive Islam: Rejoinder to Alan Gabon's
Journal: Studies in Conflict & Terrorism
Pages: 211-222
Issue: 3
Volume: 45
Year: 2022
Month: 3
X-DOI: 10.1080/1057610X.2019.1657297
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1657297
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:3:p:211-222



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1657296_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alain Gabon
Author-X-Name-First: Alain
Author-X-Name-Last: Gabon
Title: Can Mainstream Sunni Islam Counter the Islamic State? a Critique of Adis Duderija’s “The Salafi Worldview and the Hermeneutical Limits of Mainstream Sunni Critique of Salafi-Jihadism”
Journal: Studies in Conflict & Terrorism
Pages: 202-210
Issue: 3
Volume: 45
Year: 2022
Month: 3
X-DOI: 10.1080/1057610X.2019.1657296
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1657296
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:3:p:202-210



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1657293_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bruce Hoffman
Author-X-Name-First: Bruce
Author-X-Name-Last: Hoffman
Title: Editor’s Note: A Tripartite Discussion of “The Salafi Worldview and the Hermeneutical Limits of Mainstream Sunni Critique of Salafi-Jihadism”
Journal: Studies in Conflict & Terrorism
Pages: 201-201
Issue: 3
Volume: 45
Year: 2022
Month: 3
X-DOI: 10.1080/1057610X.2019.1657293
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1657293
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:3:p:201-201



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1657299_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nadia Oweidat
Author-X-Name-First: Nadia
Author-X-Name-Last: Oweidat
Title: Providing Context: Commentary on the Debate Over the Critique of Salafi-Jihadism from a Mainstream Sunni Perspective
Journal: Studies in Conflict & Terrorism
Pages: 223-230
Issue: 3
Volume: 45
Year: 2022
Month: 3
X-DOI: 10.1080/1057610X.2019.1657299
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1657299
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:3:p:223-230

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1662625_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ethan B. Kapstein
Author-X-Name-First: Ethan B.
Author-X-Name-Last: Kapstein
Author-Name: David Ribar
Author-X-Name-First: David
Author-X-Name-Last: Ribar
Title: The Industrial Organization of the Syrian Civil War
Abstract: 
 The Syrian Civil War represents an extreme outlier in terms of the number of insurgent groups which have been engaged in the fighting. These groups have also been remarkably persistent over time, partly due to the fact that rebel in-fighting has been relatively contained. They have also targeted civilians far less than the Syrian Army. These stylized facts run counter to much of the existing literature on multi-party civil wars, which has emphasized the influence of the balance of power on group dynamics. In this article we instead draw upon balance of threat theory, along with insights from the economics of industrial organization, to understand insurgent behavior in the Syrian Civil War, based on a newly compiled dataset of rebel violence. Our research suggests that conflict scholars need to account for factors beyond the balance of power if they are to adequately explain inter-rebel dynamics.
Journal: Studies in Conflict & Terrorism
Pages: 231-257
Issue: 4
Volume: 45
Year: 2022
Month: 4
X-DOI: 10.1080/1057610X.2019.1662625
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1662625
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:4:p:231-257



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1661083_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Rob Geist Pinfold
Author-X-Name-First: Rob Geist
Author-X-Name-Last: Pinfold
Author-Name: M. L. R. Smith
Author-X-Name-First: M. L. R.
Author-X-Name-Last: Smith
Title: Theorizing Territorial Withdrawal: The Need to Think Strategically
Abstract: 
 This article examines what factors cause states to withdraw from foreign territorial interventions. Scholarly analyses of withdrawal are rare, whilst within the broader research area of territorial conflict, studies are often dichotomized into neorealist or constructivist-inspired works, emphasizing a select few variables and one level of analysis alone. We argue these excessive simplifications of international politics lack utility for understanding territorial withdrawal. Instead, we employ the principles of strategic theory informed by a Clausewitzian paradigm, and construct a framework of three “arenas of bargaining,” spanning multiple variable-types and levels of analysis, to explain territorial withdrawal. In so doing, the analysis delineates a comprehensible and novel theoretical framework for understanding an under-researched policy problem.
Journal: Studies in Conflict & Terrorism
Pages: 285-310
Issue: 4
Volume: 45
Year: 2022
Month: 4
X-DOI: 10.1080/1057610X.2019.1661083
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1661083
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:4:p:285-310



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1702256_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Niels Terpstra
Author-X-Name-First: Niels
Author-X-Name-Last: Terpstra
Title: Opportunity Structures, Rebel Governance, and Disputed Leadership: The Taliban’s Upsurge in Kunduz Province, Afghanistan, 2011–2015
Abstract: 
 Even though Kunduz province in Afghanistan was under relatively firm government control in 2011, the Taliban insurgency was able to consolidate its power throughout the province in the years that followed and to temporarily take-over the provincial capital of Kunduz city for the first time since the U.S.-led intervention in 2001. Based on field research in 2013 and 2016, I argue that the Taliban’s upsurge took place because of a favorable opportunity structure for the insurgency that coincided with sufficient organizational capacities and a sense of urgency among the Taliban’s senior leadership.
Journal: Studies in Conflict & Terrorism
Pages: 258-284
Issue: 4
Volume: 45
Year: 2022
Month: 4
X-DOI: 10.1080/1057610X.2019.1702256
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1702256
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:4:p:258-284



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1657310_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Steven M. Radil
Author-X-Name-First: Steven M.
Author-X-Name-Last: Radil
Author-Name: Jaume Castan Pinos
Author-X-Name-First: Jaume
Author-X-Name-Last: Castan Pinos
Title: Reexamining the Four Waves of Modern Terrorism: A Territorial Interpretation
Abstract: 
 Territory is a persistent concern in international politics but is unevenly explored in the terrorism literature. We argue that territory has salience for terrorist actors and apply our argument to Rapoport's influential “four waves” thesis of the modern history of terrorism. By examining the key ideologies and groups associated with each historical era, we find that territory was a crucial element to each wave even when it took on different forms. We conclude by calling for additional concern for territory in terrorism studies, which promises to yield new insights into pressing questions.
Journal: Studies in Conflict & Terrorism
Pages: 311-330
Issue: 4
Volume: 45
Year: 2022
Month: 4
X-DOI: 10.1080/1057610X.2019.1657310
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1657310
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:4:p:311-330

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1678877_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Guillermo Kreiman
Author-X-Name-First: Guillermo
Author-X-Name-Last: Kreiman
Author-Name: Mar C. Espadafor
Author-X-Name-First: Mar C.
Author-X-Name-Last: Espadafor
Title: Unexpected Allies: The Impact of Terrorism on Organised Crime in Sub-Saharan Africa and South-East Asia
Abstract: 
 Is there a link between levels of terrorism and the presence of organized crime groups? Which factors does terrorism affect that could impact the presence and expansion of organized crime groups? This study aims to empirically analyze this link. Dealing with potential endogeneity bias using matching methods, we provide quantitative evidence showing that terrorist attacks increase the future levels of organized crime group activities. Using Structural Equation Modeling techniques (SEM), we also show that the main mechanisms through which this relation seems to occur are through the effects of terrorism on state capacity and state legitimacy. Thus, organized crime groups seem to take advantage of the turbulent situation created by terrorist attacks in order to expand their activities. The findings provided in this paper aim to increase our knowledge on the so-called crime-terror nexus.
Journal: Studies in Conflict & Terrorism
Pages: 348-367
Issue: 5-6
Volume: 45
Year: 2022
Month: 6
X-DOI: 10.1080/1057610X.2019.1678877
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1678877
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:5-6:p:348-367



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1678882_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Irene Couzigou
Author-X-Name-First: Irene
Author-X-Name-Last: Couzigou
Title: The Criminalization of Online Terrorism Preparatory Acts Under International Law
Abstract: 
 Terrorist organizations increasingly resort to the Internet to promote terrorism, recruit new terrorists, plan and finance their operations. The paper first proposes a definition of terrorism, cyberterrorism, and online terrorism preparatory acts. It then analyses whether current binding international instruments on terrorism, organized crime or cybercrime could prohibit cyber activities precursor of terrorism. The paper concludes that there is no gap in international law that leaves online terrorism related acts completely unregulated. It nevertheless recommends the drafting of an international treaty that would respond more comprehensively, precisely and thus efficiently to the use of the Internet for terrorist purposes.
Journal: Studies in Conflict & Terrorism
Pages: 535-554
Issue: 5-6
Volume: 45
Year: 2022
Month: 6
X-DOI: 10.1080/1057610X.2019.1678882
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1678882
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:5-6:p:535-554



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1678878_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Jupp
Author-X-Name-First: John
Author-X-Name-Last: Jupp
Author-Name: Matthew Garrod
Author-X-Name-First: Matthew
Author-X-Name-Last: Garrod
Title: Legacies of the Troubles: The Links between Organized Crime and Terrorism in Northern Ireland
Abstract: 
 One of the most important legacies of the “Troubles” in Northern Ireland and the ensuing 20 years post-peace-process era, heralded by the 1998 Good Friday Agreement, is the rise of complex and diverse Republican and Loyalist paramilitary groups engaging in acts of terrorism and a wide range of organized criminal and cross-border activities. Yet, little scholarship has been dedicated for examining the nexus between terrorism and organized crime in Northern Ireland or for accurately understanding the role that paramilitaries play in organized crime and their dynamic interactions with organized criminal groups. Informed by empirical evidence and qualitative interviews with government agencies in Northern Ireland, it is this important gap in scholarship that this article aims to fill. It does so by developing a new terrorism-organized crime model which reveals a range of different types of crime-terror interactions in Northern Ireland. The article concludes that national terrorism-organized crime models, and the Northern Ireland model in particular, albeit with variations to its constituent components to accommodate local situations, are most appropriate for capturing intricate and dynamic interactions between these two phenomena across diverse environments rather than existing models designed for universal application.
Journal: Studies in Conflict & Terrorism
Pages: 389-428
Issue: 5-6
Volume: 45
Year: 2022
Month: 6
X-DOI: 10.1080/1057610X.2019.1678878
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1678878
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:5-6:p:389-428



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1678881_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: James J. F. Forest
Author-X-Name-First: James J. F.
Author-X-Name-Last: Forest
Title: Crime-Terror Interactions in Sub-Saharan Africa
Abstract: 
 Interactions between criminal and terrorist networks in sub-Saharan Africa (and elsewhere) are frequently based on a complex mix of intentions, capabilities, opportunities and precipitant conditions found in their operating environment. Understanding these interactions, and responding accordingly, thus requires a complex, multi-dimensional analysis that draws from several academic disciplines. This article begins by reviewing several contemporary examples of organized criminal and terrorist activity in sub-Saharan Africa, as well as examples of crime-terror interactions in this region. Then the discussion turns to examine several contextual influences (trends and conditions) that contribute to these contemporary examples and provide ample reasons why we should anticipate future crime-terror interactions in Africa for many years ahead. Research and policy implications that flow from these observations are also provided in the conclusion.
Journal: Studies in Conflict & Terrorism
Pages: 368-388
Issue: 5-6
Volume: 45
Year: 2022
Month: 6
X-DOI: 10.1080/1057610X.2019.1678881
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1678881
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:5-6:p:368-388



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1678880_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Amira Jadoon
Author-X-Name-First: Amira
Author-X-Name-Last: Jadoon
Author-Name: Daniel Milton
Author-X-Name-First: Daniel
Author-X-Name-Last: Milton
Title: Strength from the Shadows? How Shadow Economies Affect Terrorist Activities
Abstract: 
 Despite scholarly interest in the existence and consequences of the crime-terror nexus, little research has been done to examine how the presence of an illegal economic area, known as a shadow economy, impacts terrorist activity in a country. We propose a theory which argues that terrorists are able to rely on the partnerships and resources available in the shadow economy to increase their organizational capacity. Using data on terrorist activity and the size of the shadow economy, our empirical results show that the larger the shadow economy, the greater the number of overall terrorist attacks, fatalities, and certain types of mass-casualty events that a country experiences.
Journal: Studies in Conflict & Terrorism
Pages: 517-534
Issue: 5-6
Volume: 45
Year: 2022
Month: 6
X-DOI: 10.1080/1057610X.2019.1678880
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1678880
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:5-6:p:517-534



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1678871_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Riikka Puttonen
Author-X-Name-First: Riikka
Author-X-Name-Last: Puttonen
Author-Name: Flavia Romiti
Author-X-Name-First: Flavia
Author-X-Name-Last: Romiti
Title: The Linkages between Organized Crime and Terrorism
Journal: Studies in Conflict & Terrorism
Pages: 331-334
Issue: 5-6
Volume: 45
Year: 2022
Month: 6
X-DOI: 10.1080/1057610X.2019.1678871
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1678871
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:5-6:p:331-334



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1678873_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Katharine Petrich
Author-X-Name-First: Katharine
Author-X-Name-Last: Petrich
Title: Cows, Charcoal, and Cocaine: Al-Shabaab’s Criminal Activities in the Horn of Africa
Abstract: 
 Contrary to historical terrorism scholarship, terrorist groups can strategically diversify into a variety of criminal activities without losing their core ideology or support among the civilian population. This pattern is demonstrated by the evolutionary arc of al-Shabaab, which grew from a small subset of Somalia’s Islamic Courts Union to the most violent political actor in the Horn of Africa, able to conduct terrorist attacks as far afield as Kenya, Djibouti, and Ethiopia. Al-Shabaab has been highly successful in creating a narrative of truth and justice provision while simultaneously exploiting the Somali population and engaging in criminal activity. For the group, criminal activity and crime networks serve two primary purposes: as a funding mechanism and as an avenue for recruitment. Using ethnographic fieldwork and process tracing, I find that the group’s criminal activities throughout the Horn of Africa have made the group significantly more resilient to counterterrorism and counterinsurgency campaigns, extending both its lifespan and operational capability.
Journal: Studies in Conflict & Terrorism
Pages: 479-500
Issue: 5-6
Volume: 45
Year: 2022
Month: 6
X-DOI: 10.1080/1057610X.2019.1678873
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1678873
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:5-6:p:479-500



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1678860_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Yuliya Zabyelina
Author-X-Name-First: Yuliya
Author-X-Name-Last: Zabyelina
Title: The “Capone Discovery”: Extortion as a Method of Terrorism Financing
Abstract: 
 This article analyzes extortion by terrorist groups. A three-factor theoretical framework borrowed from the literature on organized crime informs the qualitative analysis of several terrorist organizations—active and quiescent—which have committed casual and systematic extortion of businesses and local communities in exchange for protection. It is argued that similarly to organized crime, extortion is a common means of terrorism financing. Terrorist groups, especially those aspiring for statehood, rely on extortion of local communities and businesses under the disguise of “taxation.” Partly by coercion and partly by manipulation, governance-capable terrorist organizations, like the Islamic State in Iraq and the Levant (ISIL)/Da’esh, have demonstrated unprecedented ability to reshape the victim-offender relationship in the way that transforms victims of extortion into involuntary terrorist supporters. Viewing terrorist activity through the governance perspective sheds new light on the evolution of extortion and its place in terrorism studies.
Journal: Studies in Conflict & Terrorism
Pages: 501-516
Issue: 5-6
Volume: 45
Year: 2022
Month: 6
X-DOI: 10.1080/1057610X.2019.1678860
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1678860
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:5-6:p:501-516



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1678884_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Luigi Achilli
Author-X-Name-First: Luigi
Author-X-Name-Last: Achilli
Author-Name: Alessandro Tinti
Author-X-Name-First: Alessandro
Author-X-Name-Last: Tinti
Title: Debunking the Smuggler-Terrorist Nexus: Human Smuggling and the Islamic State in the Middle East
Abstract: 
 Amid increasing terrorist violence in and beyond European countries, concerns have been raised about connections between illegal migration and terrorism. Regional armed conflicts in the Middle East have led to the massive migration of people in search of safe heavens and better livelihoods, pressing upon frontline countries in the Mediterranean and throughout the EU. Multiple government and intelligence agencies report that human smuggling networks have been identified as providing a readily available conduit through which terrorist groups such as the Islamic State and Al-Qaida can enter Europe and the U.S. These criminal travel networks are said to rely on highly effective transnational alliances involving service providers within source, transit and destination countries. There is also widespread consensus in the intelligence circles that terrorist groups rely on the practice of smuggling for financing of terrorist activity. Nonetheless, despite the region’s geopolitical significance and its demonstrated potential for spillover effects, scant systematic field research has been conducted by independent researchers to understand the purported nexus between terrorism and human smugglers within the Middle East into the Mediterranean. This constitutes a severe gap in knowledge which our study will address. In this paper, we debunk the nexus human smuggling-terrorism by comparing the Islamic State’s logistics with human smuggling networks’ modus operandi and organizational structures. Based on a mixed research approach that combines the analysis of a unique date-set (U.S. Special Forces) and an empirical research carried out among smugglers and migrants in the Middle East and across the Eastern Mediterranean route over the past two years, this paper will tackle the alleged connection between human smuggling and terrorist groups. What will be argued is that smuggling networks and terrorist networks have fundamental operational and structural differences. These operational and structural differences need to be taken into account in order to deconstruct harmful stereotypes on irregular migration and, consequently, develop adequate responses to analytically distinct phenomena.
Journal: Studies in Conflict & Terrorism
Pages: 463-478
Issue: 5-6
Volume: 45
Year: 2022
Month: 6
X-DOI: 10.1080/1057610X.2019.1678884
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1678884
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:5-6:p:463-478



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1678874_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Arie Perliger
Author-X-Name-First: Arie
Author-X-Name-Last: Perliger
Author-Name: Michael Palmieri
Author-X-Name-First: Michael
Author-X-Name-Last: Palmieri
Title: Mapping Connections and Cooperation between Terrorist and Criminal Entities
Abstract: 
 In recent years, terrorist groups intensified their cooperation with criminal entities or their independent engagement in criminal activities. But why and how, exactly, is cooperation with criminal actors beneficial for terrorist groups? And under which political and economic conditions are criminal and terrorist entities more inclined to cooperate or coordinate their operations? Despite the growing interest of academics and practitioners in the nexus of crime and terrorism, we are still unable to answer such questions authoritatively, and, in general, we are lacking in our understanding of the operational characteristics of these connections. The current study utilizes a global dataset of cases of cooperation between terrorist and criminal groups in order to try and answer some of these questions. Our findings indicate that both organizational and environmental factors can predict the likelihood of collaboration. More specifically, group structure, lifespan, ethnic/religious compatibility, geographical proximity, and the existence of criminal infrastructure are all associated with the tendency of criminal and terrorist groups to cooperate. Lastly, corporate and established terrorist groups are more inclined to engage in multiple low-end cooperation rather than high end.
Journal: Studies in Conflict & Terrorism
Pages: 335-347
Issue: 5-6
Volume: 45
Year: 2022
Month: 6
X-DOI: 10.1080/1057610X.2019.1678874
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1678874
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:5-6:p:335-347



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1678875_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mohammed Sinan Siyech
Author-X-Name-First: Mohammed Sinan
Author-X-Name-Last: Siyech
Title: Arms Smuggling in India: Exploring Links between Crime and Terrorism
Abstract: 
 This article looks at the linkage between arms smuggling and terrorist groups operating in and outside India, focusing on inflow and outflow of weapons through the country. By examining various news reports and using information from security officials, it concludes that the nexus between arms smugglers and terrorists encompasses multiple fronts. These include weapons that enter India mainly from Pakistan, Myanmar, and Bangladesh. Using theories of insurgencies as a reference point, it analyzes how various terrorist/insurgent groups in India have sustained themselves logistically using these linkages to wage war against the Indian state. The article thus tries to tackle the under-researched nexus between arms proliferation and terrorism in India and abroad by providing national, socioeconomic, and political recommendations, a useful reference point for members from the government, security, and research community.
Journal: Studies in Conflict & Terrorism
Pages: 445-462
Issue: 5-6
Volume: 45
Year: 2022
Month: 6
X-DOI: 10.1080/1057610X.2019.1678875
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1678875
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:5-6:p:445-462



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1678869_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Line Haidar
Author-X-Name-First: Line
Author-X-Name-Last: Haidar
Title: The Emergence of the Mafia in Post-War Syria: The Terror-Crime Continuum
Abstract: 
 This paper aims at building from existing sociological, economic, political and strategic knowledge an analysis that anticipates the emergence of the Mafia. By employing Mill’s method of agreement, the research finds that it is very probable that the aftermath of the Syrian War yields fertile terrain for the emergence of the Mafia. The reasons of this are fourfold: (1) as the black market expands in Syria and the rights of private property become blurred once ‘peace’ is restored, (2) the postwar Syrian State will be either unwilling and unable to protect the property rights of its population, (3) this situation would result in a widespread institutional distrust that will provoke the population to seek alternative forms of private protection; (4) an abundant supply of insurgents and terrorists trained in violence will meet the emergent demand. This conclusion sheds light on the importance for policymakers to take prompt action to change the probable course of history of Syria.
Journal: Studies in Conflict & Terrorism
Pages: 429-444
Issue: 5-6
Volume: 45
Year: 2022
Month: 6
X-DOI: 10.1080/1057610X.2019.1678869
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1678869
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:5-6:p:429-444

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1686854_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gahl Silverman
Author-X-Name-First: Gahl
Author-X-Name-Last: Silverman
Author-Name: Udi Sommer
Author-X-Name-First: Udi
Author-X-Name-Last: Sommer
Title: Prevalent Sentiments of the Concept of Jihad in the Public Commentsphere
Abstract: 
 Certain studies of social conflicts and geopolitical processes through online social networks entail qualitative analysis. One such issue is the tension between Western and Muslim societies. We introduce computer-assisted qualitative sentiment analysis for the inquiry and extraction of varied sentiments. The analysis explores the prevalent meanings of the term jihad through discussions of Muslims and non-Muslims in the online public sphere. After examining 4,630 Facebook comments and replies, our examination leads to a holistic mapping that details “peaceful,” “moderate,” and “radical” opinions regarding jihad, which is an integral institution of the Muslim world. Through this method, we suggest a “Muslim–non-Muslim tension indicator,” which can be used in a range of political analyses.
Journal: Studies in Conflict & Terrorism
Pages: 579-607
Issue: 7
Volume: 45
Year: 2022
Month: 7
X-DOI: 10.1080/1057610X.2019.1686854
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1686854
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:7:p:579-607



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1531545_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daveed Gartenstein-Ross
Author-X-Name-First: Daveed
Author-X-Name-Last: Gartenstein-Ross
Author-Name: Madeleine Blackman
Author-X-Name-First: Madeleine
Author-X-Name-Last: Blackman
Title: Fluidity of the Fringes: Prior Extremist Involvement as a Radicalization Pathway
Abstract: 
 This article argues for recognition of fringe fluidity as a distinct radicalization pathway. Most studies on individual-level radicalization examine how relatively normal people come to accept violent extremist beliefs. But some people who come to accept and act on an extremist ideology transition from the embrace of one form of violent extremism to another—and understanding their prior extremism is essential to appreciating their ultimate beliefs and actions. The article demonstrates the existence of fringe fluidity by detailing the pathway between neo-Nazism and militant Islamism. Factors allowing fringe fluidity between these ideologies include recent cases of individuals who transitioned from one to the other or simultaneously embraced both; some ideological overlap, particularly in shared out-groups; and historical precedent that allows some adherents to reconcile inconsistent aspects of the two ideologies. Despite this article’s focus on neo-Nazism and militant Islamism, fringe fluidity is likely more widely applicable beyond the context of these two ideologies.
Journal: Studies in Conflict & Terrorism
Pages: 555-578
Issue: 7
Volume: 45
Year: 2022
Month: 7
X-DOI: 10.1080/1057610X.2018.1531545
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1531545
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:7:p:555-578



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1680186_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Peter Chalk
Author-X-Name-First: Peter
Author-X-Name-Last: Chalk
Title: Domestic Counter-Terrorist Intelligence Structures in the United Kingdom, France, Canada and Australia
Abstract: 
 This research note considers the origin, development, and functions of intelligence organizations in four selected democratic states, assessing their role in terrorism threat mitigation, their relationship with police forces, and the means and modalities by which they are controlled and monitored. The article is intended to help inform debate over the various strengths and weaknesses of establishing and maintaining dedicated security agencies that have no executive powers of arrest and which exist outside formal structures of law enforcement.
Journal: Studies in Conflict & Terrorism
Pages: 626-658
Issue: 7
Volume: 45
Year: 2022
Month: 7
X-DOI: 10.1080/1057610X.2019.1680186
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1680186
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:7:p:626-658



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1680185_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anna Geifman
Author-X-Name-First: Anna
Author-X-Name-Last: Geifman
Title: “Terrorism as Veiled Suicide: A Comparative Analysis”
Abstract: 
 In the early twentieth century Russian revolutionaries carried out suicidal assaults and validated them by anarchist and radical socialist rhetoric as fervently as jihadists today employ the idiom of Islamism. When death-seeking became a fashionable sociocultural trend in Russia, political subversives embraced terrorism as camouflaged suicide. For their part, Islamists uphold self-inflicted death by constructing environments in which martyrdom carries greater value than life. Headhunters recruit perpetrators of self-destructive attacks among those who covet death and link it to faith – socialist or jihadist. Rather than taking their own lives, the believers opt for publicly commended acts of suicide terrorism.
Journal: Studies in Conflict & Terrorism
Pages: 608-625
Issue: 7
Volume: 45
Year: 2022
Month: 7
X-DOI: 10.1080/1057610X.2019.1680185
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1680185
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:7:p:608-625



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1716523_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bruce Hoffman
Author-X-Name-First: Bruce
Author-X-Name-Last: Hoffman
Title: In Memoriam: Martin Rudner
Journal: Studies in Conflict & Terrorism
Pages: 659-660
Issue: 7
Volume: 45
Year: 2022
Month: 7
X-DOI: 10.1080/1057610X.2020.1716523
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1716523
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:7:p:659-660

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1680192_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sarah Knight
Author-X-Name-First: Sarah
Author-X-Name-Last: Knight
Author-Name: David Keatley
Author-X-Name-First: David
Author-X-Name-Last: Keatley
Author-Name: Katie Woodward
Author-X-Name-First: Katie
Author-X-Name-Last: Woodward
Title: Comparing the Different Behavioral Outcomes of Extremism: A Comparison of Violent and Non-Violent Extremists, Acting Alone or as Part of a Group
Abstract: 
 Presented here is an exploratory study that compared four kinds of extremists (violent lone, nonviolent lone, violent group member, and nonviolent group member). Thematic analysis of 40 case studies identified five key themes and a number of subthemes that comprised a range of underlying variables. Comparisons of the four groups showed that in many ways violent and nonviolent extremists acting alone or as part of a group do not differ. However there were some variables that distinguished between groups. Findings are discussed in terms of implications for countering and preventing violent extremism.
Journal: Studies in Conflict & Terrorism
Pages: 682-703
Issue: 8
Volume: 45
Year: 2022
Month: 8
X-DOI: 10.1080/1057610X.2019.1680192
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1680192
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:8:p:682-703



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1686856_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Scrivens
Author-X-Name-First: Ryan
Author-X-Name-Last: Scrivens
Author-Name: Vivek Venkatesh
Author-X-Name-First: Vivek
Author-X-Name-Last: Venkatesh
Author-Name: Maxime Bérubé
Author-X-Name-First: Maxime
Author-X-Name-Last: Bérubé
Author-Name: Tiana Gaudette
Author-X-Name-First: Tiana
Author-X-Name-Last: Gaudette
Title: Combating Violent Extremism: Voices of Former Right-Wing Extremists
Abstract: 
 While it has become increasingly common for researchers, practitioners and policymakers to draw from the insights of former extremists to combat violent extremism, overlooked in this evolving space has been an in-depth look at how formers perceive such efforts. To address this gap, interviews were conducted with 10 Canadian former right-wing extremists based on a series of questions provided by 30 Canadian law enforcement officials and 10 community activists. Overall, formers suggest that combating violent extremism requires a multidimensional response, largely consisting of support from parents and families, teachers and educators, law enforcement officials, and other credible formers.
Journal: Studies in Conflict & Terrorism
Pages: 661-681
Issue: 8
Volume: 45
Year: 2022
Month: 8
X-DOI: 10.1080/1057610X.2019.1686856
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1686856
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:8:p:661-681



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1696444_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Stuart Macdonald
Author-X-Name-First: Stuart
Author-X-Name-Last: Macdonald
Author-Name: Lee Jarvis
Author-X-Name-First: Lee
Author-X-Name-Last: Jarvis
Author-Name: Simon M. Lavis
Author-X-Name-First: Simon M.
Author-X-Name-Last: Lavis
Title: Cyberterrorism Today? Findings From a Follow-on Survey of Researchers
Abstract: 
 This article reports on a survey of researchers designed to capture current perspectives on core questions around cyberterrorism. The survey—conducted in 2017 as a follow-on to an initial, 2012, exercise—focused on questions of definition, threat and response. By documenting our findings in each of these areas—and highlighting developments in the years between our surveys—we identify three particularly important trends. First, an increasing convergence around the core characteristics of cyberterrorism, albeit with continuing conceptual disagreements at the concept’s penumbra. Second, increasing researcher concern with the threat posed by cyberterrorism, underpinned by a widespread view that this threat has increased, and a growing feeling that cyberterrorist attacks have now taken place. Third, support for a diversity of counter-measures to this threat, although perhaps counter-intuitively little suggestion that resort to exceptional or draconian measures is needed. In order to inform future research, the article concludes by detailing some of the major limitations, gaps and weaknesses within academic research to date as identified by our respondents.
Journal: Studies in Conflict & Terrorism
Pages: 727-752
Issue: 8
Volume: 45
Year: 2022
Month: 8
X-DOI: 10.1080/1057610X.2019.1696444
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1696444
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:8:p:727-752



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1680193_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Carolin Goerzig
Author-X-Name-First: Carolin
Author-X-Name-Last: Goerzig
Title: Deradicalization through Double-Loop Learning? How the Egyptian Gamaa Islamiya Renounced Violence
Abstract: 
 The transformation of the Gamaa Islamiya can be understood by analyzing it against Argyris and Schön’s double-loop learning model. This paper bases the analysis on five books published by the Gamaa Islamiya, which include comprehensive elaborations on internal reflections and criticism of Al-Qaeda. While the Gamaa Islamiya’s learning can be framed with the model of double-loop learning, Al-Qaeda’s reactions can be depicted as a less evolved single-loop learning system. This case is relevant for the discovery of key mechanisms of de-radicalization that could be used as a blueprint for other groups.
Journal: Studies in Conflict & Terrorism
Pages: 704-726
Issue: 8
Volume: 45
Year: 2022
Month: 8
X-DOI: 10.1080/1057610X.2019.1680193
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1680193
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:8:p:704-726

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1700039_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael J. Boyle
Author-X-Name-First: Michael J.
Author-X-Name-Last: Boyle
Title: Weapon of Choice: Terrorist Bombings in Armed Conflict
Abstract: 
 Under what circumstances do armed groups in conflict choose to use terrorist bombings? This article challenges the conventional wisdom that terrorist bombings are done by either ideologically-driven or weak armed groups who have no reasonable prospect of success on the battlefield. Drawing from Mao’s theory of protracted struggle, it argues that terrorist bombings are a weapon of choice for armed groups that have transitioned into capable fighting armies but lack the degree of popular support they need to be a serious political contender. Using data on attributed terrorist bombings from 1998–2005, it finds that Islamist groups and older armed groups with sizeable membership are more likely to use terrorist bombings than smaller or newer groups.
Journal: Studies in Conflict & Terrorism
Pages: 778-798
Issue: 9
Volume: 45
Year: 2022
Month: 8
X-DOI: 10.1080/1057610X.2019.1700039
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1700039
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:9:p:778-798



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1700029_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joshua Eastin
Author-X-Name-First: Joshua
Author-X-Name-Last: Eastin
Author-Name: Steven T. Zech
Author-X-Name-First: Steven T.
Author-X-Name-Last: Zech
Title: Joining the Counterinsurgency: Explaining Pro-Government Militia Participation in the Philippines
Abstract: 
 What motivates civilians to fight in a progovernment militia? This article draws on survey and interview data from active members of Citizen Armed Forces Geographical Units (CAFGU), a progovernment militia in the Philippines, to evaluate why individuals enlist. We find poverty and unemployment to be key drivers of group membership, and the biggest attraction a steady paycheck. This situation presents a moral hazard for the Philippine government and other states that rely on impoverished citizens to wage counterinsurgency: while doing so can be cost-effective, the need to keep costs low might also impede efforts at socioeconomic or political reform.
Journal: Studies in Conflict & Terrorism
Pages: 817-841
Issue: 9
Volume: 45
Year: 2022
Month: 8
X-DOI: 10.1080/1057610X.2019.1700029
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1700029
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:9:p:817-841



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1700038_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mary Beth Altier
Author-X-Name-First: Mary Beth
Author-X-Name-Last: Altier
Author-Name: Emma Leonard Boyle
Author-X-Name-First: Emma Leonard
Author-X-Name-Last: Boyle
Author-Name: John G. Horgan
Author-X-Name-First: John G.
Author-X-Name-Last: Horgan
Title: Terrorist Transformations: The Link between Terrorist Roles and Terrorist Disengagement
Abstract: 
 Research pays little attention to the diverse roles individuals hold within terrorism. This limits our understanding of the varied experiences of the terrorist and their implications. This study examines how a terrorist’s role(s) influence the likelihood of and reasons for disengagement. Using data from autobiographies and in-person interviews with former terrorists, we find that role conflict and role strain increase the probability of disengagement. We show those in certain roles, especially leadership and violent roles, incur greater sunk costs and possess fewer alternatives making exit less likely. Finally, certain roles are associated with the experience of different push/pull factors for disengagement.
Journal: Studies in Conflict & Terrorism
Pages: 753-777
Issue: 9
Volume: 45
Year: 2022
Month: 8
X-DOI: 10.1080/1057610X.2019.1700038
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1700038
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:9:p:753-777



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1700027_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andrea Beccaro
Author-X-Name-First: Andrea
Author-X-Name-Last: Beccaro
Author-Name: Stefano Bonino
Author-X-Name-First: Stefano
Author-X-Name-Last: Bonino
Title: Terrorism and Counterterrorism: Italian Exceptionalism and Its Limits
Abstract: 
 The aim of this article is to understand why there has not been a successful jihadist terrorist attack in Italy. While it is impossible to offer a clear and unambiguous explanation, there are some unique aspects of the Italian case that should be emphasized and that can offer a convincing, albeit incomplete, answer to this narrative. The article will first highlight the fact that in Italy there have in fact been some attempted terrorist attacks and that the country has experienced jihadist terrorist activities. Subsequently, the article turns to an exploration of Italian counterterrorism in order to emphasize the most convincing and effective aspects, in particular the role of the legislation and the Antiterrorism Strategic Analysis Committee (CASA). Then, the article takes a more sociological perspective and analyzes the ways in which the social composition of the Muslim communities in Italy and their presence in its territories have affected the phenomenon of terrorism. In its conclusions, the article will reiterate why the country has remained exceptionally free of a successful terrorist attack, despite not being immune to jihadist propaganda.
Journal: Studies in Conflict & Terrorism
Pages: 799-816
Issue: 9
Volume: 45
Year: 2022
Month: 8
X-DOI: 10.1080/1057610X.2019.1700027
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1700027
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:45:y:2022:i:9:p:799-816

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1738681_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sissel H. Jore
Author-X-Name-First: Sissel H.
Author-X-Name-Last: Jore
Title: Is Resilience a Good Concept in Terrorism Research? A Conceptual Adequacy Analysis of Terrorism Resilience
Abstract: 
 Resilience has been suggested as a unifying concept in terrorism research. This article investigates the conceptual adequacy of resilience applied to terrorism. The framework for criteria for conceptual adequacy was applied on the academic literature that deals with the meaning of terrorism resilience. The conclusion of this study is that at its current state resilience serves more the role of cultural metaphor than that of a well-developed scientific concept. The almost endless definitions of resilience and lack of coherence in the descriptions of attributes is a warning signs to terrorism researchers that, if not careful with its usage, the resilience concept can end up more as a utopian goal than an actual means for countering terrorism.
Journal: Studies in Conflict & Terrorism
Pages: 1-20
Issue: 1
Volume: 46
Year: 2023
Month: 1
X-DOI: 10.1080/1057610X.2020.1738681
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1738681
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:1:p:1-20



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1752008_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Diana Rico Revelo
Author-X-Name-First: Diana Rico
Author-X-Name-Last: Revelo
Author-Name: Cecilia Emma Sottilotta
Author-X-Name-First: Cecilia Emma
Author-X-Name-Last: Sottilotta
Title: Barriers to Peace? Colombian Citizens’ Beliefs and Attitudes Vis-à-Vis the Government-FARC-EP Agreement
Abstract: 
 The 2016 peace deal between the Colombian government and the Revolutionary Armed Forces of Colombia - People’s Army (FARC-EP) faces several challenges concerning its implementation. This study explores the beliefs and attitudes of citizens from the Colombian Caribbean coast vis-à-vis the 2016 peace agreement as well as the first steps in its implementation in 2017 identifying barriers that are likely to undermine support for long-term peace. We detect a tendency to maintain beliefs and attitudes that hinder the de-escalation of the conflict and fuel mistrust, mostly linked to the weaponization of the peace process in a polarized political context.
Journal: Studies in Conflict & Terrorism
Pages: 46-67
Issue: 1
Volume: 46
Year: 2023
Month: 1
X-DOI: 10.1080/1057610X.2020.1752008
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1752008
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:1:p:46-67



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1751464_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Wali Aslam
Author-X-Name-First: Wali
Author-X-Name-Last: Aslam
Title: Whose Interest? Whose Peace? An Evaluation of Pakistan’s Peace Agreements with the Taliban in the Tribal Areas (2004–2015)
Abstract: 
 The Pakistani state signed a number of peace agreements with the Taliban between 2004 and 2015. Despite their significance, hardly any academic evaluations of these agreements exist. This paper assesses these peace deals from three perspectives: political settlements, culture and conflict resolution and cosmopolitan protection. We argue that they failed due to the following reasons: the Pakistani state was more concerned with the interests of the central government in Islamabad than those in the tribal borderlands; the agreements clashed with the unique tribal cultural code of Pashtunwali; and they represented a solution imposed on the tribal societies from the outside.
Journal: Studies in Conflict & Terrorism
Pages: 21-45
Issue: 1
Volume: 46
Year: 2023
Month: 1
X-DOI: 10.1080/1057610X.2020.1751464
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1751464
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:1:p:21-45



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1777710_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Janice Gross Stein
Author-X-Name-First: Janice Gross
Author-X-Name-Last: Stein
Author-Name: Ron Levi
Author-X-Name-First: Ron
Author-X-Name-Last: Levi
Title: Testing Deterrence by Denial: Experimental Results from Criminology
Abstract: 
 Deterrence by denial is gaining attention as a counter-terrorism strategy. Yet there are formidable obstacles to testing its empirical validity. We argue that experimental and quasi-experimental evidence from criminology offers support for deterrence by denial strategies. Studies of individual offending, gangs, and mafias suggest that deterrence by denial would not displace terrorist activity elsewhere. We also find evidence that physical target hardening and enhanced human guardianship can deter terrorism, with public surveillance being less effective. Criminological evidence thus supports that deterrence by denial works by increasing the risk of failure. We argue for further rapprochement between terrorism and related research fields.
Journal: Studies in Conflict & Terrorism
Pages: 101-121
Issue: 1
Volume: 46
Year: 2023
Month: 1
X-DOI: 10.1080/1057610X.2020.1777710
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1777710
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:1:p:101-121



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1738669_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alessandro Orsini
Author-X-Name-First: Alessandro
Author-X-Name-Last: Orsini
Title: What Everybody Should Know about Radicalization and the DRIA Model
Abstract: 
 Thousands of monographs, reports, and articles about radicalization have been published since 2001. With the passage of time, the “scientific community” has come to identify some of them as “milestones.” Which are they? Unlike Anja Dalgaard-Nielsen, who wrote an article in 2010 on what we know and what we don’t know about violent radicalization in Europe, the author here aims to present and discuss what everybody should know about the process of becoming radicalized. This article has four aims. The first is to present and discuss the most influential theories of radicalization leading to terrorism. This author attributes the milestones in radicalization research to the following scholars: Fathali M. Moghaddam, Silber & Bhatt, Marc Sageman, John Horgan, Quintan Wiktorowicz, Lawrence Kuznar, Clark McCauley, Sophia Moskalenko, Donatella della Porta, Arie W. Kruglanski, Jocelyn J. Bélanger, and Rohan Gunaratna. The second aim is to highlight the contribution of sociology, as an academic discipline, to the study of radicalization. To that end, the process of radicalization has been conceptualized here as a process of socialization or, more precisely, resocialization. The third aim is to present the DRIA Model of radicalization that is based on the lives of thirty-nine jihadi terrorists who succeeded in carrying out terror attacks in the West between 2004 and 2018. The fourth aim is to contribute to the debate over the “stagnation” – real or presumed – in radicalization research.
Journal: Studies in Conflict & Terrorism
Pages: 68-100
Issue: 1
Volume: 46
Year: 2023
Month: 1
X-DOI: 10.1080/1057610X.2020.1738669
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1738669
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:1:p:68-100

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1903669_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: M. L. R. Smith
Author-X-Name-First: M. L. R.
Author-X-Name-Last: Smith
Title: Setting the Strategic Cat among the Policy Pigeons: The Problems and Paradoxes of Western Intervention Strategy
Abstract: 
 In theory, the idea of strategy is easy to comprehend but in practice it is a hard taskmaster because it often involves calculations of political values that are rarely amenable to the kind of rationalistic application of “expert” opinion to which Western nations invariably default when considering overseas interventions. Based on remarks to the Oxford Changing Character of War Centre, this research note argues that foreign policy experts frequently find themselves out of touch with the sentiments of their own populations, which in part is responsible for the poor strategic outcomes that Western foreign policies have incurred in recent years. A number of remedies are suggested, based principally on returning Western policy making to a tradition of prudential realism.
Journal: Studies in Conflict & Terrorism
Pages: 2093-2097
Issue: 10
Volume: 46
Year: 2023
Month: 10
X-DOI: 10.1080/1057610X.2021.1903669
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1903669
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:10:p:2093-2097



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1892635_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jonathan Kenyon
Author-X-Name-First: Jonathan
Author-X-Name-Last: Kenyon
Author-Name: Christopher Baker-Beall
Author-X-Name-First: Christopher
Author-X-Name-Last: Baker-Beall
Author-Name: Jens Binder
Author-X-Name-First: Jens
Author-X-Name-Last: Binder
Title: Lone-Actor Terrorism – A Systematic Literature Review
Abstract: 
 A systematic review of the empirical literature on lone-actor terrorism, the first of its kind, is presented. Across 109 sources, ten main themes that characterize this domain are identified and described: definitions of lone-actor terrorism and typologies; heterogeneity of lone-actor terrorists; presence of mental health issues and/or personality disorders; similarities with other lone-offender criminal types; motivation to act driven by personal and ideological influences; increasing prominence of internet use; ties with other extremists, groups or wider movements; processes of attack planning and preparation; role of opportunity/triggers; and a tendency toward leakage/attack signaling.
Journal: Studies in Conflict & Terrorism
Pages: 2038-2065
Issue: 10
Volume: 46
Year: 2023
Month: 10
X-DOI: 10.1080/1057610X.2021.1892635
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1892635
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:10:p:2038-2065



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1872156_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joel Busher
Author-X-Name-First: Joel
Author-X-Name-Last: Busher
Author-Name: Donald Holbrook
Author-X-Name-First: Donald
Author-X-Name-Last: Holbrook
Author-Name: Graham Macklin
Author-X-Name-First: Graham
Author-X-Name-Last: Macklin
Title: How the “Internal Brakes” on Violent Escalation Work and Fail: Toward a Conceptual Framework for Understanding Intra-Group Processes of Restraint in Militant Groups
Abstract: 
 This article advances the emergent literature on restraint within militant groups in three ways. First, it offers a framework for situating the “internal brakes on violent escalation”—understood as the practices through which group members shape the outer limits of their action repertoires—in relation to the interplay between conflict dynamics, intra-group processes and individual-level decision making. Second, it develops a basic analytical strategy for examining how such brakes operate at different levels of proximity to potential or actual instances of escalation. Third, it sets out four types of mechanisms through which internal brakes appear to generate or enable restraint.
Journal: Studies in Conflict & Terrorism
Pages: 1960-1983
Issue: 10
Volume: 46
Year: 2023
Month: 10
X-DOI: 10.1080/1057610X.2021.1872156
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1872156
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:10:p:1960-1983



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1886432_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: José Antonio Gutiérrez D
Author-X-Name-First: José Antonio
Author-X-Name-Last: Gutiérrez D
Title: Eating, Shitting and Shooting: A Scatological and Culinary Approximation to the Daily Lives of Rebels
Abstract: 
 Everything that comes in, eventually goes out. One way or another. This paper will look into eating and defecating practices among rebels in Colombia, in particular, the FARC-EP. I will argue that these practices, despite being daily occurrences, have been overlooked in conflict studies. I will argue that eating practices in particular reinforced emotional bonds within the organization and fostered micro-solidarity. At the same time, eating and defecating practices reflected and reinforced, at once, organizational practices and ideological commitments of the rebels – particularly gender equality and collectivism. This paper, by focusing on cherished everyday activities which are deeply human, both biological and social, is a call to re-humanise this field of study.
Journal: Studies in Conflict & Terrorism
Pages: 1817-1839
Issue: 10
Volume: 46
Year: 2023
Month: 10
X-DOI: 10.1080/1057610X.2021.1886432
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1886432
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:10:p:1817-1839



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1937818_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ore Koren
Author-X-Name-First: Ore
Author-X-Name-Last: Koren
Author-Name: Sumit Ganguly
Author-X-Name-First: Sumit
Author-X-Name-Last: Ganguly
Author-Name: Aashna Khanna
Author-X-Name-First: Aashna
Author-X-Name-Last: Khanna
Title: Fragile States, Technological Capacity, and Increased Terrorist Activity
Abstract: 
 Research on terrorism disagrees on whether terrorist activity is at its highest in collapsed states, which are more hospitable to such activities, or whether terrorism increases in more capable states. We revisit this discussion by theorizing an interactive relationship: terrorists prefer to operate in politically-hospitable states, but their attack frequency within these states increases with greater technological capacity, which allows them to expand their military, recruitment, and financing operations. We analyze 27,018 terrorist incidents using regression and causal inference models, conduct a case study, and find robust support for this interactive logic. Our conclusions outline implications for policy and academic work.
Journal: Studies in Conflict & Terrorism
Pages: 2066-2092
Issue: 10
Volume: 46
Year: 2023
Month: 10
X-DOI: 10.1080/1057610X.2021.1937818
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1937818
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:10:p:2066-2092



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1894737_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ahmet Kule
Author-X-Name-First: Ahmet
Author-X-Name-Last: Kule
Author-Name: Mustafa Demir
Author-X-Name-First: Mustafa
Author-X-Name-Last: Demir
Author-Name: Niyazi Ekici
Author-X-Name-First: Niyazi
Author-X-Name-Last: Ekici
Author-Name: Huseyin Akdogan
Author-X-Name-First: Huseyin
Author-X-Name-Last: Akdogan
Title: Perceptions of Generation Z regarding Terrorism: A Cross-Regional Study
Abstract: 
 Although the threat of terrorism remains a high priority among Americans, no study has explored the regional differences in perceptions of terrorism in the United States. In order to address the current gap in the literature, the present research specifically examines the fear and risk perceptions of college students regarding the threat of terrorism. The research sample consisted of 1,384 undergraduate students from three major regional universities in the United States. Bivariate and multivariate analyses of the collected data yielded significant regional differences, and uncovered several associations and predictors, such as political identity, that previous studies have not revealed.
Journal: Studies in Conflict & Terrorism
Pages: 2011-2037
Issue: 10
Volume: 46
Year: 2023
Month: 10
X-DOI: 10.1080/1057610X.2021.1894737
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1894737
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:10:p:2011-2037



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1872159_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tricia Bacon
Author-X-Name-First: Tricia
Author-X-Name-Last: Bacon
Author-Name: Daniel Byman
Author-X-Name-First: Daniel
Author-X-Name-Last: Byman
Title: De-Talibanization and the Onset of Insurgency in Afghanistan
Abstract: 
 This article examines the reasons for the rise of the Taliban and the onset of the insurgency in Afghanistan after the 2001 U.S. invasion, using counterfactual and path dependence analysis to bolster its arguments. We argue that the U.S. decision to de-Talibanize was a critical juncture, after which the rise of insurgency was far harder to prevent. The total rejection of the Taliban translated into the under-representation of Pashtuns in the Afghan government, delivering power to ethnic minorities at their expense. De-Talibanization led the United States to support strongmen to hunt the Taliban, but they were predatory, creating grievances that the Taliban exploited to recruit. Finally, de-Talibanization led many Taliban to flee to Pakistan, pushing them into the country most opposed to Afghanistan new political order. The lessons of the U.S. experience in Afghanistan suggest the necessity of a strategy for managing defeated enemies after an initial military victory.
Journal: Studies in Conflict & Terrorism
Pages: 1840-1867
Issue: 10
Volume: 46
Year: 2023
Month: 10
X-DOI: 10.1080/1057610X.2021.1872159
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1872159
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:10:p:1840-1867



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1902604_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: John Gearson
Author-X-Name-First: John
Author-X-Name-Last: Gearson
Author-Name: Philip A. Berry
Author-X-Name-First: Philip
Author-X-Name-Last: A. Berry
Title: British Troops on British Streets: Defence’s Counter-Terrorism Journey from 9/11 to Operation Temperer
Abstract: 
 In May 2017, Operation Temperer – the deployment of British military personnel in support of the police following a terrorist attack or the threat of such an attack – was activated for the first time. The deployment of uniformed armed personnel as a core element of the U.K.’s CT capability represents a significant and, in the authors view, welcome shift in how successive administrations have utilized aspects of state power in response to a terrorist threat or incident. Little academic work has been devoted to explaining how and why this change occurred, with the military moving from reluctant participants in domestic CT missions, to playing a central (and public) role in providing capacity for domestic security, as witnessed under Operation Temperer. This article charts the evolution of greater military involvement in domestic counter-terrorism missions after 9/11, revealing that a decade of policy paralysis was finally broken by the combination of terrorist events in Paris in January 2015, and the intervention of a forward leaning prime minister overcoming institutional reluctance on the part of the Ministry of Defence and other government departments to put British troops on British streets.
Journal: Studies in Conflict & Terrorism
Pages: 1984-2010
Issue: 10
Volume: 46
Year: 2023
Month: 10
X-DOI: 10.1080/1057610X.2021.1902604
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1902604
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:10:p:1984-2010



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1905141_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Natalie Anastasio
Author-X-Name-First: Natalie
Author-X-Name-Last: Anastasio
Author-Name: Arie Perliger
Author-X-Name-First: Arie
Author-X-Name-Last: Perliger
Author-Name: Neil Shortland
Author-X-Name-First: Neil
Author-X-Name-Last: Shortland
Title: How Emotional Traits and Practices Lead to Support in Acts of Political Violence
Abstract: 
 The current study aims to assess the emotional processes that foster support for political violence. A survey of 1202 respondents was used to identify the association between emotional traits, support for extremist groups, and willingness to engage in political violence. Additionally, we tested how attitudinal traits’ interaction with emotional factors may impact radicalization. Our findings indicate that aspects of anger and anxiety, as well as emotional triggers related to social interactions, are associated with increased support for political violence and extremism. Moreover, we identified important pathways in which attitudinal and emotional traits interact to facilitate radicalization further.
Journal: Studies in Conflict & Terrorism
Pages: 1912-1932
Issue: 10
Volume: 46
Year: 2023
Month: 10
X-DOI: 10.1080/1057610X.2021.1905141
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1905141
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:10:p:1912-1932



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1915930_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gaetano Joe Ilardi
Author-X-Name-First: Gaetano Joe
Author-X-Name-Last: Ilardi
Title: Violent Islamism and Shame-Inducing Narratives
Abstract: 
 Shame avoidance or repair can serve as a powerful source of motivation, a view shared by violent Islamist (VI) organizations such as the Islamic State of Iraq and the Levant (ISIL) and al-Qaeda, whose respective propaganda activities seek to shame sympathizers into action by dislodging them from positions of inactivity or indecisiveness. Utilizing concepts contained in Benford and Snow’s notion of experiential commensurability, this article will examine how VI organizations seek to induce shame among their targets of mobilization by facilitating comparison and instilling a sense of accountability.
Journal: Studies in Conflict & Terrorism
Pages: 1868-1893
Issue: 10
Volume: 46
Year: 2023
Month: 10
X-DOI: 10.1080/1057610X.2021.1915930
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1915930
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:10:p:1868-1893



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1889091_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Samantha Kruber
Author-X-Name-First: Samantha
Author-X-Name-Last: Kruber
Author-Name: Stephanie Carver
Author-X-Name-First: Stephanie
Author-X-Name-Last: Carver
Title: Insurgent Group Cohesion and the Malleability of ‘Foreignness’: Al-Shabaab’s Relationship with Foreign Fighters
Abstract: 
 Foreign fighters can be both an asset and a liability for the groups to which they are recruited. While they can bring with them much sought after skills and resources, they can also create tensions between foreign fighter contingents and local membership. This paper considers Al-Shabaab’s relationship with foreign fighters from the group’s foundational years in the 1990s through to the infamous purge of 2011–2013. By examining Al-Shabaab’s history and narratives around foreign-ness and foreign fighters, this paper finds that foreign fighters have persistently influenced Al-Shabaab’s organizational cohesion and structural integrity.
Journal: Studies in Conflict & Terrorism
Pages: 1894-1911
Issue: 10
Volume: 46
Year: 2023
Month: 10
X-DOI: 10.1080/1057610X.2021.1889091
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1889091
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:10:p:1894-1911



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1930863_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Victor Asal
Author-X-Name-First: Victor
Author-X-Name-Last: Asal
Author-Name: Joseph K. Young
Author-X-Name-First: Joseph K.
Author-X-Name-Last: Young
Author-Name: Nakissa Jahanbani
Author-X-Name-First: Nakissa
Author-X-Name-Last: Jahanbani
Author-Name: Suzanne Weedon Levy
Author-X-Name-First: Suzanne Weedon
Author-X-Name-Last: Levy
Title: Tugging on Superman’s Cape: Why Some Insurgencies Are Targets of Foreign Militaries
Abstract: 
 Why do foreign militaries attack some insurgencies and not others? Although foreign involvement in civil conflicts is on the rise, many insurgencies are not targeted militarily by external powers. Current research suggests organizations that are lethal or that attack democracies should be targeted more often. We argue that organizations that have vital markers of capabilities, such as alliances with other violent non-state actors (VNSAs) and territorial control, and the ability to attack members of a powerful country, in this case, U.S. citizens at home or abroad, are more likely to be targeted. Our empirical analysis supports this contention: we use a logistic regression model and, in post-estimation, predicted probabilities and a Classification and Regression Tree (CART) model to understand the effect of potential factors on international military interventions.
Journal: Studies in Conflict & Terrorism
Pages: 1933-1959
Issue: 10
Volume: 46
Year: 2023
Month: 10
X-DOI: 10.1080/1057610X.2021.1930863
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1930863
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:10:p:1933-1959

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1906483_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Brandon del Pozo
Author-X-Name-First: Brandon
Author-X-Name-Last: del Pozo
Title: Complexity, Lethality, and the Perverse Imagination: Modelling Nonstate Actors’ Means of Attack
Abstract: 
 In the pursuit of security, state actors presume a linear relationship between the lethality and complexity of various means of attack. They deploy resources and research programs to overcome the inherent or “analytic” complexity of increasingly lethal means of their own (think of programs to develop nuclear weapons and other highly lethal munitions), and they impose security, legal and regulatory regimes to increase the imposed or “synthetic” complexity opponents must overcome to appropriate or adopt the means they develop. Nonstate actors such as terrorists overcome the challenges of complexity by imaginatively seeking new ways to operate in an alternative high lethality/low complexity space. The perversity of their imagination allows them to conceive of means of attack beyond the pale for state actors, leaving states initially unprepared to defend against them. Car bombs, vehicle ramming and small arms attacks on dense crowds, and iconic attacks such as 9/11 are examples of nonstate actors successfully operating in the high lethality/low complexity space. Successful attackers will continue to do so in ways that state actors fail to imagine and protect against, especially when the prevention of low-complexity attacks traditionally falls on local governments with fewer resources, and they employ means that do not have especially suspicious signatures. The deployment of weaponized drones against crowds and other soft targets may indicate one of the evolutions of this operational space. State security requires fully understanding the imagination of the nonstate actor, but good governance requires balancing the necessary thinking and preventive measures with the freedoms of a state not burdened by such a perverse outlook.
Journal: Studies in Conflict & Terrorism
Pages: 2351-2362
Issue: 11
Volume: 46
Year: 2023
Month: 11
X-DOI: 10.1080/1057610X.2021.1906483
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1906483
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:11:p:2351-2362



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1923188_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Garth Davies
Author-X-Name-First: Garth
Author-X-Name-Last: Davies
Author-Name: Edith Wu
Author-X-Name-First: Edith
Author-X-Name-Last: Wu
Author-Name: Richard Frank
Author-X-Name-First: Richard
Author-X-Name-Last: Frank
Title: A Witch’s Brew of Grievances: The Potential Effects of COVID-19 on Radicalization to Violent Extremism
Abstract: 
 Historically, pandemics had inevitably produced demonization and scapegoating, and the COVID-19 pandemic has been no exception. Some individuals and groups have attempted to weaponize and exploit the pandemic, to use it as a means of spreading their extremist ideologies and to radicalize others to their causes. Segmented regression analyses of seven online extremist forums revealed that posting behavior on violent right-wing extremist and incel forums increased significantly following the declaration of the pandemic. The same was not true of left-wing or jihadist forums. These unequal effects likely reflect the particular grievance-based and online nature of right-wing and incel extremism.
Journal: Studies in Conflict & Terrorism
Pages: 2327-2350
Issue: 11
Volume: 46
Year: 2023
Month: 11
X-DOI: 10.1080/1057610X.2021.1923188
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1923188
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:11:p:2327-2350



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1913819_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nicole Satherley
Author-X-Name-First: Nicole
Author-X-Name-Last: Satherley
Author-Name: Kumar Yogeeswaran
Author-X-Name-First: Kumar
Author-X-Name-Last: Yogeeswaran
Author-Name: Danny Osborne
Author-X-Name-First: Danny
Author-X-Name-Last: Osborne
Author-Name: Sadi Shanaah
Author-X-Name-First: Sadi
Author-X-Name-Last: Shanaah
Author-Name: Chris G. Sibley
Author-X-Name-First: Chris G.
Author-X-Name-Last: Sibley
Title: Investigating the Effects of Right-Wing Terrorism on Government Satisfaction: A Time Course Analysis of the 2019 Christchurch Terror Attack
Abstract: 
 We examine political attitude change using data from a large national probability sample collected over the months leading up to, and following, the 2019 March 15 terror attacks against a Muslim minority community in Christchurch, New Zealand. Satisfaction with the government declined in the months prior to the attack, rose sharply immediately following the attack, and returned to pre-attack levels roughly 3 months after the attack. Support for the ruling centre-left Labour party followed a similar trend, whereas centre-right National party support was unchanged. These results provide valuable comparison to studies focusing on the effects of Islamist attacks, and insight into the time-course of attitude change by examining the effects of far right terrorism toward a minority community.
Journal: Studies in Conflict & Terrorism
Pages: 2174-2187
Issue: 11
Volume: 46
Year: 2023
Month: 11
X-DOI: 10.1080/1057610X.2021.1913819
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1913819
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:11:p:2174-2187



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1917628_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Raphael D. Marcus
Author-X-Name-First: Raphael D.
Author-X-Name-Last: Marcus
Title: ISIS and the Crime-Terror Nexus in America
Abstract: 
 This study explores the nexus between crime and Islamic State (ISIS) terrorism in America. It highlights trends in the criminal history of all federal ISIS defendants and deceased perpetrators in America, and evaluates whether crime was integral to a plot’s funding or logistics. While less pronounced than in Europe, a prevalence of prior violent crimes is evident, although plot-relevant crime was generally perpetrated by those without criminal history. It explores how gangs and prison impact defendant radicalization and mobilization, finding that gang members often left gang life upon radicalization, and while rare, prison inmates were radicalized by non-isolated terrorist inmates.
Journal: Studies in Conflict & Terrorism
Pages: 2188-2213
Issue: 11
Volume: 46
Year: 2023
Month: 11
X-DOI: 10.1080/1057610X.2021.1917628
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1917628
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:11:p:2188-2213



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1913820_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kutluer Karademir
Author-X-Name-First: Kutluer
Author-X-Name-Last: Karademir
Author-Name: Mahmut Cengiz
Author-X-Name-First: Mahmut
Author-X-Name-Last: Cengiz
Title: Names Are Never Only Names: A Nominal Analysis of Terrorist Organizations
Abstract: 
 This study argues that terrorism is a political communication process that starts with the connotations made by the keywords terrorist organizations purposefully use in their names to appeal to their first-order audience and show themselves as the vanguards of the values represented by those words. Data analyses conducted based on the names of 2,939 terrorist organizations revealed that terrorist groups name their organizations following similar patterns. Moreover, the study found local and temporal patterns in line with the political trends of the respective era.
Journal: Studies in Conflict & Terrorism
Pages: 2303-2326
Issue: 11
Volume: 46
Year: 2023
Month: 11
X-DOI: 10.1080/1057610X.2021.1913820
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1913820
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:11:p:2303-2326



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1907897_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jacob Aasland Ravndal
Author-X-Name-First: Jacob Aasland
Author-X-Name-Last: Ravndal
Title: From Bombs to Books, and Back Again? Mapping Strategies of Right-Wing Revolutionary Resistance
Abstract: 
 This article begins by outlining four post-WWII strategies of right-wing revolutionary resistance: vanguardism; the cell system; leaderless resistance; and metapolitics. Next, the article argues that metapolitics became a preferred strategy for many right-wing revolutionaries during the 2000s and early 2010s, and proposes three conditions that may help explain this metapolitical turn: limited opportunities for armed resistance; a subcultural style shift; and new opportunities for promoting alternative worldviews online. Finally, the article theorizes about the types of threats that may emerge in the wake of this metapolitical turn, and speculates about the likelihood of a new and more violent turn in the near future.
Journal: Studies in Conflict & Terrorism
Pages: 2120-2148
Issue: 11
Volume: 46
Year: 2023
Month: 11
X-DOI: 10.1080/1057610X.2021.1907897
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1907897
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:11:p:2120-2148



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1914361_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Miron Lakomy
Author-X-Name-First: Miron
Author-X-Name-Last: Lakomy
Title: Listening to the “Voice of Islam”: The Turkestan Islamic Party’s Online Propaganda Strategy
Abstract: 
 This article aims to map the online propaganda presence and activities of the Turkestan Islamic Party’s media arm—Islam Awazi (“Voice of Islam”). It also discusses its capabilities in terms of producing new releases and attracting online audiences. In order to reach these objectives, this study exploited a methodology which is a combination of open source intelligence techniques (OSINT) with limited content analysis. It argues that the Uyghur-oriented Islam Awazi’s (IA) propaganda strategy was primarily based on one standalone website, which constituted a central repository of its new productions. It was supported by several Telegram channels. However, open source intelligence investigation allowed other domains proliferating the IA’s productions, which were still accessible but abandoned at the time when this study was carried out, to be discovered. It also proved that the organization was capable of producing more than 160 propaganda releases between January and September 2020. Their viewership on the surface web was, however, quite limited. Finally, this study also outlines a peculiar connection between Islam Awazi’s websites and two networks of domains exploited by the cyber-criminal underground to distribute pornography and malware. This may be considered as a sign of an existing—and widely discussed by the academia—terror-crime nexus.
Journal: Studies in Conflict & Terrorism
Pages: 2241-2266
Issue: 11
Volume: 46
Year: 2023
Month: 11
X-DOI: 10.1080/1057610X.2021.1914361
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1914361
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:11:p:2241-2266



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1917651_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: D. A. Keatley
Author-X-Name-First: D. A.
Author-X-Name-Last: Keatley
Author-Name: S. Knight
Author-X-Name-First: S.
Author-X-Name-Last: Knight
Author-Name: A. Marono
Author-X-Name-First: A.
Author-X-Name-Last: Marono
Title: A Crime Script Analysis of Violent and Nonviolent Extremists
Abstract: 
 Extremists and the behaviors performed by extremists are a growing concern. There is a growing body of research showing the differences between violent and nonviolent extremists in terms of developmental pathways and actions. The current research used a temporal approach, crime script analysis, to map the pathways of violent and nonviolent extremists. Results showed differences between the groups in terms of Internet use, social networks and methods of enacting their beliefs. This research provides a new approach to understanding extremism and highlights the role of temporal methods in showing key differences that require different intervention strategies.
Journal: Studies in Conflict & Terrorism
Pages: 2285-2302
Issue: 11
Volume: 46
Year: 2023
Month: 11
X-DOI: 10.1080/1057610X.2021.1917651
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1917651
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:11:p:2285-2302



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1917639_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel Koehler
Author-X-Name-First: Daniel
Author-X-Name-Last: Koehler
Title: Disengaging from Left-Wing Terrorism and Extremism: Field Experiences from Germany and Research Gaps
Abstract: 
 Left-wing terrorism and extremism have received limited scholarly attention beyond a focus on large terrorist groups and violent campaigns between the 1970s and 1990s (e.g. German Red Army Faction, Italian Red Brigades, or Weather Underground in the United States). This article discusses the contribution of German research regarding disengagement from left-wing terrorism and extremism, as well as field experiences from Germany in the field of preventing and countering violent left-wing extremism. Significant research and prevention practice gaps severely limit knowledge in this regard. Available evidence mostly stems from highly structured and strategically operating groups from past decades.
Journal: Studies in Conflict & Terrorism
Pages: 2099-2119
Issue: 11
Volume: 46
Year: 2023
Month: 11
X-DOI: 10.1080/1057610X.2021.1917639
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1917639
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:11:p:2099-2119



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1923625_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ekaterina Stepanova
Author-X-Name-First: Ekaterina
Author-X-Name-Last: Stepanova
Title: Foreign Terrorist Fighters from Russia in and after Syria and Iraq: (Trans) National Trends and Threats
Abstract: 
 Despite the large number of foreign terrorist fighters from Russia in Syria and Iraq, the specifics of this phenomenon are often reduced to the Northern Caucasian connection. The article suggests a differentiated assessment of types and scale of threat posed by ISIS-linked FTFs in the Russian, Eurasian and broader international contexts, relying on data-based analysis of the main trends in the dynamic process of their circulation. They include changing composition of the FTF outflow, by type of domestic radicalization, low return rate, and high potential for relocation to third countries. The article challenges conventional views on correlation of threats posed by returnees and relocated FTFs, the main domestic challenge linked to Russian FTFs, the intra-Eurasian circulation of the FTFs, the risk of their concentration in northern Afghanistan, and potential for their cross-regional circulation between Eurasia, Middle East and Europe.
Journal: Studies in Conflict & Terrorism
Pages: 2214-2240
Issue: 11
Volume: 46
Year: 2023
Month: 11
X-DOI: 10.1080/1057610X.2021.1923625
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1923625
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:11:p:2214-2240



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1913818_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Scrivens
Author-X-Name-First: Ryan
Author-X-Name-Last: Scrivens
Author-Name: Amanda Isabel Osuna
Author-X-Name-First: Amanda Isabel
Author-X-Name-Last: Osuna
Author-Name: Steven M. Chermak
Author-X-Name-First: Steven M.
Author-X-Name-Last: Chermak
Author-Name: Michael A. Whitney
Author-X-Name-First: Michael A.
Author-X-Name-Last: Whitney
Author-Name: Richard Frank
Author-X-Name-First: Richard
Author-X-Name-Last: Frank
Title: Examining Online Indicators of Extremism in Violent Right-Wing Extremist Forums
Abstract: 
 Although many law enforcement and intelligence agencies are concerned about online communities known to facilitate violent right-wing extremism, little is empirically known about the presence of extremist ideologies, expressed grievances, or violent mobilization efforts that make up these spaces. In this study, we conducted a content analysis of a sample of postings from two of the most conspicuous right-wing extremist forums known for facilitating violent extremism, Iron March and Fascist Forge. We identified a number of noteworthy posting patterns within and across forums that may assist law enforcement and intelligence agencies in identifying credible threats online.
Journal: Studies in Conflict & Terrorism
Pages: 2149-2173
Issue: 11
Volume: 46
Year: 2023
Month: 11
X-DOI: 10.1080/1057610X.2021.1913818
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1913818
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:11:p:2149-2173



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1913815_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Manuel R. Torres-Soriano
Author-X-Name-First: Manuel R.
Author-X-Name-Last: Torres-Soriano
Title: Barriers to Entry to Jihadist Activism on the Internet
Abstract: 
 The present article contends that terrorist activism on the Internet is determined by the technical configuration and ease of use of the tool. Engagement in Internet activities considered criminal offenses is not only explained by a progression in the level of radicalization of the individual. Rather, the type of barriers to entry which they must overcome plays a decisive role in the decision. The article classifies the various Internet spaces featuring terrorist content under the categories of “hard platforms” and “friendly platforms”. This differentiation will enable us to identify how the barriers to entry to such activism have evolved over the last two decades and how this evolution has been responsible for different levels of terrorist mobilization in cyberspace. The investigation focuses on jihadist terrorism and uses the antiterrorist operations carried out in Spain during the period 2001-2020 as a case study.
Journal: Studies in Conflict & Terrorism
Pages: 2267-2284
Issue: 11
Volume: 46
Year: 2023
Month: 11
X-DOI: 10.1080/1057610X.2021.1913815
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1913815
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:11:p:2267-2284

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1935716_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Saleh Hasanzadeh
Author-X-Name-First: Saleh
Author-X-Name-Last: Hasanzadeh
Author-Name: Ali Abedi Renani
Author-X-Name-First: Ali Abedi
Author-X-Name-Last: Renani
Title: A Peaceful Interpretation of Jihad in the Qur’an
Abstract: 
 This paper studies the subject of jihad in the Qur’an and the Prophet’s conduct, and seeks to answer the following questions. What is the primary principle in the Islamic state’s international relations with non-Muslim states? Is war or peace the primary principle in the relationship of the Islamic state with non-Muslim states? What is the nature of Islamic jihad? The primacy of war means that the cause of war and jihad with infidels and pagan states lies in their people’s disbelief. The primacy of peace means that war is an exceptional situation, and whenever it occurs, it is not because of disbelief, but because of the aggression or hostility that has been shown by those states. This paper defends a pacific interpretation of jihad using an intra-textual interpretive method according to which the general verses of jihad should be understood based on the conditional verses, as opposed to claiming that the verses of peace have been abrogated by the verses of jihad.
Journal: Studies in Conflict & Terrorism
Pages: 2501-2520
Issue: 12
Volume: 46
Year: 2023
Month: 12
X-DOI: 10.1080/1057610X.2021.1935716
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1935716
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:12:p:2501-2520



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1928887_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dennis Broeders
Author-X-Name-First: Dennis
Author-X-Name-Last: Broeders
Author-Name: Fabio Cristiano
Author-X-Name-First: Fabio
Author-X-Name-Last: Cristiano
Author-Name: Daan Weggemans
Author-X-Name-First: Daan
Author-X-Name-Last: Weggemans
Title: Too Close for Comfort: Cyber Terrorism and Information Security across National Policies and International Diplomacy
Abstract: 
 This article analyses the evolution and interplay of national policies and international diplomacy on cyber terrorism within and across the UNSC’s permanent five members and the UN process on cyber norms (GGE and OEWG). First, it reveals how – through the extension of preemptive measures to low-impact cyber activities and online content – national policies progressively articulate cyber terrorism as an issue of information security. Second, it problematizes how – through the adoption of comprehensive and imprecise definitions – the diplomatic language on cyber terrorism might lend international support to those authoritarian regimes keen on leveraging counter-terrorism to persecute domestic oppositions and vulnerable groups. Third, it concludes that – with UN diplomatic efforts increasingly discussing countering (dis)information operations – combining normative debates on cyber terrorism with those on information security requires precision of language to safeguard human rights globally.
Journal: Studies in Conflict & Terrorism
Pages: 2426-2453
Issue: 12
Volume: 46
Year: 2023
Month: 12
X-DOI: 10.1080/1057610X.2021.1928887
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1928887
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:12:p:2426-2453



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1923623_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Helena Knupfer
Author-X-Name-First: Helena
Author-X-Name-Last: Knupfer
Author-Name: Jörg Matthes
Author-X-Name-First: Jörg
Author-X-Name-Last: Matthes
Title: An Attack against Us All? Perceived Similarity and Compassion for the Victims Mediate the Effects of News Coverage about Right-Wing Terrorism
Abstract: 
 Right-wing terrorism (RWT) poses an increasing threat to Western societies, with perpetrators targeting diverse members of society. We investigated the affective and attitudinal outcomes of exposure to news about RWT, depending on the victims’ religious affiliation (Christian vs. Muslim). Results of a quota-based experiment in [Austria; predominantly non-Muslim] (N = 315) revealed no direct effects of the victims’ religious affiliation on affective and attitudinal outcomes. However, mediation analyses suggest that, compared to Muslim victims, Christian victims elicit higher perceived similarity, which in turn, impacts compassion. Similarity and compassion then significantly predict affective and attitudinal outcomes. Theoretical and practical implications are discussed.
Journal: Studies in Conflict & Terrorism
Pages: 2400-2425
Issue: 12
Volume: 46
Year: 2023
Month: 12
X-DOI: 10.1080/1057610X.2021.1923623
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1923623
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:12:p:2400-2425



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1929056_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeppe Fuglsang Larsen
Author-X-Name-First: Jeppe Fuglsang
Author-X-Name-Last: Larsen
Author-Name: Sune Qvotrup Jensen
Author-X-Name-First: Sune Qvotrup
Author-X-Name-Last: Jensen
Title: Everyday Religion and Radical Islamism – A Contribution to Theorizing the Role of Religion in Radicalization Studies
Abstract: 
 Empirical data have indicated that radical Islamists often interpret their everyday life as embedded in religion. Nonetheless, the research field has at times tended to downplay the religious dimensions of radicalization processes. This paper aims to reinstate religion in analyses of radicalization by introducing the theoretical approach of everyday religion. By utilizing this approach, the paper argues that when religion, in the minds of radical Islamists themselves, has an effect on everyday lives and practices, then religion plays a substantial role in their radicalization process. The potential of the approach is illustrated through an analysis of interviews with former converts to radical Islamism.
Journal: Studies in Conflict & Terrorism
Pages: 2521-2537
Issue: 12
Volume: 46
Year: 2023
Month: 12
X-DOI: 10.1080/1057610X.2021.1929056
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1929056
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:12:p:2521-2537



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1935706_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Burcu Pinar Alakoc
Author-X-Name-First: Burcu Pinar
Author-X-Name-Last: Alakoc
Author-Name: Stephanie Werner
Author-X-Name-First: Stephanie
Author-X-Name-Last: Werner
Author-Name: Michael Widmeier
Author-X-Name-First: Michael
Author-X-Name-Last: Widmeier
Title: Violent and Nonviolent Strategies of Terrorist Organizations: How Do Mixed Strategies Influence Terrorist Recruitment and Lethality?
Abstract: 
 Terrorist organizations do not solely rely on violence, but also utilize a range of nonviolent activities from political engagement to social services provision. We argue that terrorist organizations that use a combination of violent and nonviolent strategies are more effective in achieving two important organizational goals than those that rely solely on violent strategies. Using the Reputation of Terror Groups Dataset (2016), we demonstrate that organizations that deploy a mix of violent and nonviolent strategies are better able to attract new recruits and carry out more lethal attacks than those that rely exclusively on violence.
Journal: Studies in Conflict & Terrorism
Pages: 2598-2621
Issue: 12
Volume: 46
Year: 2023
Month: 12
X-DOI: 10.1080/1057610X.2021.1935706
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1935706
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:12:p:2598-2621



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1927203_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Maxime Bérubé
Author-X-Name-First: Maxime
Author-X-Name-Last: Bérubé
Author-Name: Laurie-Anne Beaulieu
Author-X-Name-First: Laurie-Anne
Author-X-Name-Last: Beaulieu
Author-Name: Pierre Mongeau
Author-X-Name-First: Pierre
Author-X-Name-Last: Mongeau
Author-Name: Johanne Saint-Charles
Author-X-Name-First: Johanne
Author-X-Name-Last: Saint-Charles
Title: Identifying Key Players in Violent Extremist Networks: Using Socio-Semantic Network Analysis as Part of a Program of Content Moderation
Abstract: 
 Some moderation strategies of online content have targeted the individuals believed to be the most influential in the diffusion of such material, while others have focused on censorship of the content itself. Few approaches consider these two aspects simultaneously. The present study addresses this gap by showing how a socio-semantic network analysis can help identify individuals and subgroups who are strategically positioned in radical networks and whose comments encourage the use of violence. It also made it possible to identify the individuals and subgroups who act as intermediaries and whose statements are often the most violent.
Journal: Studies in Conflict & Terrorism
Pages: 2381-2399
Issue: 12
Volume: 46
Year: 2023
Month: 12
X-DOI: 10.1080/1057610X.2021.1927203
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1927203
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:12:p:2381-2399



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1935700_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nicholas Lees
Author-X-Name-First: Nicholas
Author-X-Name-Last: Lees
Author-Name: Ulrich Petersohn
Author-X-Name-First: Ulrich
Author-X-Name-Last: Petersohn
Title: To Escalate, or Not to Escalate? Private Military and Security Companies and Conflict Severity
Abstract: 
 The existing literature is unclear about whether private military and security companies (PMSCs) are a cause of increased conflict severity, or rather are simply hired within more severe conflicts. We argue that PMSCs do increase conflict severity, yet this is the result of an escalation strategy by states to regain territory from rebels. If contracted, PMSCs either substitute for host nation forces, or free up such conventional forces to engage in offensive operations. In both cases the conflict severity increases substantially. This argument is tested with OLS regression using data from 30 weak states from 1990 to 2007.
Journal: Studies in Conflict & Terrorism
Pages: 2622-2645
Issue: 12
Volume: 46
Year: 2023
Month: 12
X-DOI: 10.1080/1057610X.2021.1935700
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1935700
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:12:p:2622-2645



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1929066_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kumar Ramakrishna
Author-X-Name-First: Kumar
Author-X-Name-Last: Ramakrishna
Author-Name: Yusuf Roque Santos Morales
Author-X-Name-First: Yusuf Roque Santos
Author-X-Name-Last: Morales
Author-Name: Sheryl Renomeron-Morales
Author-X-Name-First: Sheryl
Author-X-Name-Last: Renomeron-Morales
Title: Countering Violent Islamist Extremism in Muslim Mindanao the 4M Way: The Role of Alternative Narratives
Abstract: 
 This article argues that countering violent Islamist extremism in the southern Philippines requires greater employment of proactive Alternative Narratives (AN) rather than more reactive Counter-Narratives (CN). It offers the “4 M Way” of employing Alternative Narratives so as to achieve Information Dominance over countervailing violent extremist ideology. Properly executed, the 4 M Way could gradually steer vulnerable Muslims away from violent Islamist ideological rigidities toward the flexible beliefs that have long been part of the lived realities of Bangsamoro region—and essential for peace and stability in Muslim Mindanao.
Journal: Studies in Conflict & Terrorism
Pages: 2538-2563
Issue: 12
Volume: 46
Year: 2023
Month: 12
X-DOI: 10.1080/1057610X.2021.1929066
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1929066
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:12:p:2538-2563



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1930862_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David Martin Jones
Author-X-Name-First: David Martin
Author-X-Name-Last: Jones
Author-Name: M. L. R. Smith
Author-X-Name-First: M. L. R.
Author-X-Name-Last: Smith
Title: Blowin’ in the Wind? The Musical Response to the War on Terror
Abstract: 
 Popular music was the most immediate way in which the cultural response to 9/11 manifested itself. Initially music offered a way of mourning and coping with grief. As the United States moved toward the invasion of Iraq, pop music also began to reflect the divisions in society between patriot-artists who supported the invasion, most notably in country music, and protest-artists who articulated critical attitudes to war. These anti-war songs did not attain the stature of those that characterized the era of protest during the Vietnam War, nor did they offer a musical accompaniment to a social movement with any enduring political significance. One little observed dissonance that a longitudinal survey of the musical response to political violence reveals, however, is that over time the attitudes of protest songwriters and the patriots transvalued. Ironically, interventionist “rednecks” became disillusioned with the endless wars of intervention, whilst the “protest” writers lost their voices after President Obama came to power. Ironically, icons of popular music instead turned their ire on those who voted for an anti-establishment President Trump who vowed not to involve the U.S. in further military adventures.
Journal: Studies in Conflict & Terrorism
Pages: 2454-2477
Issue: 12
Volume: 46
Year: 2023
Month: 12
X-DOI: 10.1080/1057610X.2021.1930862
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1930862
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:12:p:2454-2477



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1926070_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Juline Beaujouan
Author-X-Name-First: Juline
Author-X-Name-Last: Beaujouan
Title: Investigating the Influence of Islamic State’s Discourse in Jordan
Abstract: 
 Guided by the general investigation of the “discursive assault” launched by Islamic State (IS) in the Middle East and beyond, this paper examines the resonance of IS’ use of language in grassroots populations living in Jordan. Representing IS’ communication campaign as a sender-message-receiver continuum, this research aims to give primary importance to the message and its audience. Frame theory is used as the general framework to understand the formation and reception of IS’ discourse on the conflicts in Iraq and Syria. The analysis reveals that, while IS’ rhetoric on the perceived “crisis of the Ummah” and its solution seems to resonate inside Jordan, the social practices this solution entails failed to convince. In that sense, if IS succeeded to echo the grievances and resentment of its audiences in Jordan, the group was unable to attract generalized support for its caliphate. Nonetheless, this apparent rejection of IS’ project must be nuanced at the regional and state levels. After years of war in Iraq and Syria, the conditions that initially gave rise to IS remain. So, do the dynamics that nurtured the popular grievances against perceived illegitimate rulers.
Journal: Studies in Conflict & Terrorism
Pages: 2478-2500
Issue: 12
Volume: 46
Year: 2023
Month: 12
X-DOI: 10.1080/1057610X.2021.1926070
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1926070
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:12:p:2478-2500



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1928894_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Beth Windisch
Author-X-Name-First: Beth
Author-X-Name-Last: Windisch
Title: A Downward Spiral: The Role of Hegemonic Masculinity in Lone Actor Terrorism
Abstract: 
 This article examines the intersection of grievances, identity threats, and gender-based violence in the radicalization and attacks of post-9/11 lone actor terrorists in the United States. Before their attacks, many perpetrators committed acts of gender-based violence, and most experienced stressors related to the performance of hegemonic masculinity, a culturally constructed set of norms that places value on dominance and accomplishment. This study hypothesizes that these stressors might have been perceived as identity threats, catalyzing the attackers’ downward spiral toward violence. A thematic diagram relating stressors, male identity, and lone actor terrorism is offered as an alternative framework for understanding radicalization.
Journal: Studies in Conflict & Terrorism
Pages: 2363-2380
Issue: 12
Volume: 46
Year: 2023
Month: 12
X-DOI: 10.1080/1057610X.2021.1928894
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1928894
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:12:p:2363-2380



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1929051_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Victor Asal
Author-X-Name-First: Victor
Author-X-Name-Last: Asal
Author-Name: Christopher Linebarger
Author-X-Name-First: Christopher
Author-X-Name-Last: Linebarger
Author-Name: J. Michael Greig
Author-X-Name-First: J. Michael
Author-X-Name-Last: Greig
Title: Counter-Insurgency Strategies and Transnational Attacks by Rebel Groups
Abstract: 
 International attacks by rebel groups are an historically important phenomenon. Yet, few scholars have sought to understand why some rebel organizations “go abroad” and commence international attacks and some do not. We theorize that a rebel group’s decision to attack internationally is partly the result of its home-state’s counter-insurgency strategy. Home-states that employ broad-based repression discourage rebels from engaging in international attacks. By contrast, home-states that employ narrowly targeted repression accelerate rebel decisions to attack internationally. Finally, concessions by the home-state are a sufficient condition for the rebel groups in our data to never attack internationally.
Journal: Studies in Conflict & Terrorism
Pages: 2564-2597
Issue: 12
Volume: 46
Year: 2023
Month: 12
X-DOI: 10.1080/1057610X.2021.1929051
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1929051
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:12:p:2564-2597

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1751998_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Aaron Anfinson
Author-X-Name-First: Aaron
Author-X-Name-Last: Anfinson
Author-Name: Nadia Al-Dayel
Author-X-Name-First: Nadia
Author-X-Name-Last: Al-Dayel
Title: Landmines and Improvised Explosive Devices: The Lingering Terror of the Islamic State
Abstract: 
 The extensive use of explosives by the Islamic State (ISIS/ISIL) resulted in the highest level of contamination ever documented across Iraq and Syria. This article identifies the breadth and depth of improvised explosive devices (IEDs) and landmines as tools of terror permeating everyday civilian life. Utilizing multiple data sources, it explains factors contributing to the unprecedented scale, potency, and semi-industrialized production of explosives contaminating the territory formerly occupied by the Islamic State. It concludes with a discussion on the barriers to decontamination efforts, predicting an increase in IED campaigns by armed non-state actors. It offers contributions to counterterrorism, foreign policy, and humanitarian concerns.
Journal: Studies in Conflict & Terrorism
Pages: 162-182
Issue: 2
Volume: 46
Year: 2023
Month: 2
X-DOI: 10.1080/1057610X.2020.1751998
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1751998
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:2:p:162-182



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1758372_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Christine Shahan Brugh
Author-X-Name-First: Christine Shahan
Author-X-Name-Last: Brugh
Author-Name: Sarah L. Desmarais
Author-X-Name-First: Sarah L.
Author-X-Name-Last: Desmarais
Author-Name: Joseph Simons-Rudolph
Author-X-Name-First: Joseph
Author-X-Name-Last: Simons-Rudolph
Title: Application of the TRAP-18 Framework to U.S. and Western European Lone Actor Terrorists
Abstract: 
 The purpose of this study is to examine the feasibility and relevance of the Terrorist Radicalization Assessment Protocol-18 (TRAP-18), an investigative framework to identify those at risk of lone actor terrorism. Using public information, we rated TRAP-18 items for 35 U.S. and 38 European jihadism-inspired lone actors (total N = 77). Results reveal challenges completing the TRAP-18 using public information: only four of 18 items (Pathway, Identification, Personal Grievance, Framed by Ideology) were rated present more often than absent or unknown. Findings suggest greater relevance of TRAP-18 items to U.S. lone actors, who had a higher average number of items rated present.
Journal: Studies in Conflict & Terrorism
Pages: 183-208
Issue: 2
Volume: 46
Year: 2023
Month: 2
X-DOI: 10.1080/1057610X.2020.1758372
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1758372
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:2:p:183-208



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1776964_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Benedetta Berti
Author-X-Name-First: Benedetta
Author-X-Name-Last: Berti
Title: From Cooperation to Competition: Localization, Militarization and Rebel Co-Governance Arrangements in Syria
Abstract: 
 The article explores the complex interaction between war-dynamics and non-state armed groups’ approaches to governance and politics at the local, sub-national level. It focuses on understanding how broader conflict trends influence rebel groups’ choices with respect to establishing local governance partnerships, both with civilian agents and other armed factions. The study examines this question through the lens of the Syrian landscape and through an overview of local governance arrangements by Jabhat al-Nusra1 in the Idlib and Aleppo provinces between 2012 and 2017. In tracing the evolution of rebel co-governance arrangements at the local level,2 the article highlights two dynamics: first, how the breakdown of centralized governance and the gradual processed of militarization of local authority3 altered the balance between civilian and armed actors, shifting power in the hands of the latter. Second, how the combination of prolonged strategic stalemate, resource scarcity and ideological competition between armed factions resulted in a shift from cooperative to competitive rebel governance. The article seeks to further nuance the study of rebel governance and rebel-to-political transitions by focusing on how multi-level relationships affect armed groups’ governance choices.4
Journal: Studies in Conflict & Terrorism
Pages: 209-227
Issue: 2
Volume: 46
Year: 2023
Month: 2
X-DOI: 10.1080/1057610X.2020.1776964
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1776964
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:2:p:209-227



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1751461_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Moran Yarchi
Author-X-Name-First: Moran
Author-X-Name-Last: Yarchi
Author-Name: Ami Ayalon
Author-X-Name-First: Ami
Author-X-Name-Last: Ayalon
Title: Fighting over the Image: The Israeli − Palestinian Conflict in the Gaza Strip 2018 − 19
Abstract: 
 The current paper analyzes the recent wave of violence in the Israeli–Palestinian conflict, and especially the occurrences on the Gazan border since March 2018, from a less covered point of view – the battle over the image and narrative. The Palestinians’ main tools of resistance during this wave of violence have been civilian protests near the fence and the launching of explosive kites and balloons across the border – causing massive damage to Israeli agriculture. We argue that the Palestinians had waged a sophisticated Image War on the border of Gaza, and while they are performing, the world is watching.
Journal: Studies in Conflict & Terrorism
Pages: 123-136
Issue: 2
Volume: 46
Year: 2023
Month: 2
X-DOI: 10.1080/1057610X.2020.1751461
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1751461
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:2:p:123-136



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1751460_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Matthew Dixon
Author-X-Name-First: Matthew
Author-X-Name-Last: Dixon
Title: Militants in Retreat: How Terrorists Behave When They Are Losing
Abstract: 
 It is often stated that militant groups rely on terrorism following setbacks, but this article is the first test this idea empirically. A statistical study of 56 losing terrorist groups shows that, as they are defeated, a greater proportion of operational activity is directed against softer targets. I argue the shift is caused by a change in strategy to focus on mobilizing support, which creates a greater perceived utility for operations against civilians. Case studies of militant groups in Chechnya and Argentina show how the change in strategy interacts with other constraints to induce a greater focus on softer targets.
Journal: Studies in Conflict & Terrorism
Pages: 137-161
Issue: 2
Volume: 46
Year: 2023
Month: 2
X-DOI: 10.1080/1057610X.2020.1751460
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1751460
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:2:p:137-161

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1777711_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gilbert Ramsay
Author-X-Name-First: Gilbert
Author-X-Name-Last: Ramsay
Title: Online Jihadi Storytelling: The Case of Najm al-Din Azad
Abstract: 
 Despite great interest in the importance of “narrative” to the global jihadi movement, research on actual examples of jihadi storytelling has been very limited to date. In this paper, I discuss the phenomenon of jihadi storytelling, specifically in digital contexts, focusing on the case study of one storyteller in particular: “Najm al-Din Azad”, a Saudi jihadist who tweeted and blogged a collection of “Tales of the Heroism of the Mujahidin” while participating in the Syrian civil war.
Journal: Studies in Conflict & Terrorism
Pages: 229-248
Issue: 3
Volume: 46
Year: 2023
Month: 3
X-DOI: 10.1080/1057610X.2020.1777711
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1777711
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:3:p:229-248



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1759186_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Djallil Lounnas
Author-X-Name-First: Djallil
Author-X-Name-Last: Lounnas
Title: The Failed Ideological Hybridization of the Islamic State
Abstract: 
 The Islamic State (IS) was founded on the premise of a “new ideological” offer based on extreme takfir as an alternative to Al-Qaeda ideology i.e. Salafism-Jihadism. More specifically and ideologically speaking, IS ideology rested on the alliance between three schools of thought: the Neo-Takfiri, the Bin Ali, and the Hazimiyah. However, instead of coalescing into a single coherent thought, those three schools confronted each other in a violent internal strife that caused the death of hundreds of its members including key leaders, endangering the very existence of this organization. This paper shows that instead of opting for a clear ideological line, the IS leadership of neo-takfiri orientation, alternated its support for each of these, between the Bin Ali and the Hazimiyah, resorting each time to severe internal purges. Using interviews with former foreign fighters jihadists in addition to other relevant material1, this paper analyses the origins and ideological foundations of these three schools and seeks to explain the patterns of conflict as well as the perspectives for a possible reconciliation between them in the wake of the death of Al Baghdadi.
Journal: Studies in Conflict & Terrorism
Pages: 278-306
Issue: 3
Volume: 46
Year: 2023
Month: 3
X-DOI: 10.1080/1057610X.2020.1759186
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1759186
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:3:p:278-306



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1776952_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Francesco Marone
Author-X-Name-First: Francesco
Author-X-Name-Last: Marone
Author-Name: Marco Olimpio
Author-X-Name-First: Marco
Author-X-Name-Last: Olimpio
Title: “We Will Conquer Your Rome”: Italy and the Vatican in the Islamic State’s Propaganda
Abstract: 
 Over the last few years, Italy has occupied a relatively marginal position with respect to the jihadist threat. Nonetheless, the propaganda of the Islamic State mentions Italy and the bordering Vatican with a seemingly disproportionate frequency. This article presents an in-depth analysis of all textual references in Dabiq and Rumiyah, the flagship magazines of this sophisticated jihadist organization. Overall, several mentions concern “Rome,” intended as a symbol for the West and Christianity and with a number of other meanings. However, there is no lack of potentially worrying references to Italy, Italians, the Vatican, and the Pope.
Journal: Studies in Conflict & Terrorism
Pages: 307-329
Issue: 3
Volume: 46
Year: 2023
Month: 3
X-DOI: 10.1080/1057610X.2020.1776952
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1776952
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:3:p:307-329



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1759182_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Jensen
Author-X-Name-First: Michael
Author-X-Name-Last: Jensen
Author-Name: Patrick James
Author-X-Name-First: Patrick
Author-X-Name-Last: James
Author-Name: Elizabeth Yates
Author-X-Name-First: Elizabeth
Author-X-Name-Last: Yates
Title: Contextualizing Disengagement: How Exit Barriers Shape the Pathways Out of Far-Right Extremism in the United States
Abstract: 
 This paper explores how obstacles to disengagement and push and pull factors combine to produce pathways out of extremism. Using Qualitative Comparative Analysis and a sample of 50 far-right extremists in the United States, including 25 who disengaged and 25 who did not, we show how certain exit barriers, like the presence of extremist family members, poor social mobility, and past criminal convictions, determine which push and pull factors are capable of assisting individuals in leaving extremism. We conclude with how these findings can be used to support intervention and reintegration programs.
Journal: Studies in Conflict & Terrorism
Pages: 249-277
Issue: 3
Volume: 46
Year: 2023
Month: 3
X-DOI: 10.1080/1057610X.2020.1759182
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1759182
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:3:p:249-277



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1777714_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Keith W. Ludwick
Author-X-Name-First: Keith W.
Author-X-Name-Last: Ludwick
Title: “Sorry, We’re Closed”: Applying Business Models to Failed Terrorist Organizations
Abstract: 
 The application of specific, business organizational models to understand terrorism remains absent in the literature. This article argues business models can apply to understanding terrorist organizational behavior. Two traditional organizational models are integrated with two terrorist organizations to examine their leadership and management. These two business models successfully demonstrate which elements of terrorist group organization potentially lead to their failure, specifically a lack of concern for administrative functions. This paper more broadly suggests specific models within business organizational theory offer an insight into future growth or decline of a terrorist organization.
Journal: Studies in Conflict & Terrorism
Pages: 330-352
Issue: 3
Volume: 46
Year: 2023
Month: 3
X-DOI: 10.1080/1057610X.2020.1777714
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1777714
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:3:p:330-352

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1759252_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alexandra Phelan
Author-X-Name-First: Alexandra
Author-X-Name-Last: Phelan
Title: Special Issue Introduction for Terrorism, Gender and Women: Toward an Integrated Research Agenda
Abstract: 
 This special issue encourages a greater integration of gender-sensitive approaches to studies of violent extremism and terrorism. It seeks to create and inspire a dialogue by suggesting the necessity of incorporating gender analysis to fill gaps within, and further enhance, our understanding of political violence. In this introductory essay, I argue that there have traditionally been four approaches to understanding the interplay between gender and terrorism– positivist or “gender-as-a-variable”, instrumentalist, gendered motivations, and gender-based analysis and/or feminist methodology. Terrorism, Gender and Women: Toward an Integrated Research Agenda intends to advance a discussion of new ways in understanding how women and men can be affected by terrorism and violent extremism differently, and how involvement can often be influenced by highly gendered experiences and considerations.
Journal: Studies in Conflict & Terrorism
Pages: 353-361
Issue: 4
Volume: 46
Year: 2023
Month: 4
X-DOI: 10.1080/1057610X.2020.1759252
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1759252
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:4:p:353-361



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1759270_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Elizabeth Pearson
Author-X-Name-First: Elizabeth
Author-X-Name-Last: Pearson
Title: Gendered Reflections? Extremism in the UK’s Radical Right and al-Muhajiroun Networks
Abstract: 
 The rise of populism and the radical right alongside ongoing global recruitment by jihadist groups has seen academics and popular discourse alike note parallels between the two. In particular, authors have emphasized gendered similarities between the movements. Based on ‘close-up’ ethnographic research, this article empirically shows how gender produces group members’ activism in two extreme movements: a network linked to the U.K.’s banned Islamist group al-Muhajiroun; and activists for the English Defence League, Britain First and other anti-Islam(ist) groups. Through a gendered analysis, the article problematizes assertions that the two movements mirror one another. In particular, it emphasizes the ways in which gender produces fragmentation across the anti-Islam(ist) movement, contrasted with a more consistent gendered logic in those networked to al-Muhajiroun. Its key contribution is to use ethnographic research to evidence the ways in which group members’ gendered activism ultimately undercuts group ideals.
Journal: Studies in Conflict & Terrorism
Pages: 489-512
Issue: 4
Volume: 46
Year: 2023
Month: 4
X-DOI: 10.1080/1057610X.2020.1759270
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1759270
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:4:p:489-512



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1759267_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Melissa Frances Johnston
Author-X-Name-First: Melissa Frances
Author-X-Name-Last: Johnston
Author-Name: Muhammad Iqbal
Author-X-Name-First: Muhammad
Author-X-Name-Last: Iqbal
Author-Name: Jacqui True
Author-X-Name-First: Jacqui
Author-X-Name-Last: True
Title: The Lure of (Violent) Extremism: Gender Constructs in Online Recruitment and Messaging in Indonesia
Abstract: 
 The gender dimension of violent extremism is under-studied; and “women terrorists” are stereotyped as either men’s dupes or (internet) warriors. Applying a gender lens, this study uses content analysis to examine Islamist extremist websites in Indonesia. Analysis reveals distinct recruitment language targeted at women and men, and rigid gender segregation of content and spaces. Extremists co-opt the language of women’s rights while also promoting gender-discriminatory harmful practices with the intent of establishing what they consider to be a more devout Islamic state. Gender analysis of online extremism has implications for strategies to counter and prevent radicalization to violence.
Journal: Studies in Conflict & Terrorism
Pages: 470-488
Issue: 4
Volume: 46
Year: 2023
Month: 4
X-DOI: 10.1080/1057610X.2020.1759267
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1759267
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:4:p:470-488



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1759256_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Victor Asal
Author-X-Name-First: Victor
Author-X-Name-Last: Asal
Author-Name: Nazli Avdan
Author-X-Name-First: Nazli
Author-X-Name-Last: Avdan
Author-Name: Nourah Shuaibi
Author-X-Name-First: Nourah
Author-X-Name-Last: Shuaibi
Title: Women Too: Explaining Gender Ideologies of Ethnopolitical Organizations
Abstract: 
 What explains the gender ideologies of ethnopolitical organizations? Recently, scholarship has cast attention to the determinants of violent organizations’ female recruitment patterns. Others have examined the effects of gender ideology on organizational tactics. There is a paucity of work on the determinants of gender ideologies. The article redresses this lacuna by exploring how organizational characteristics influence the gender platforms of ethnopolitical organizations in the Middle East and North Africa (MENA). Focusing on 102 ethnic and ethnoreligious MENA for 25 years from 1980 to 2004, the study finds that broader gender ideologies shape gender platforms. In addition, organizations that provide social services are significantly more likely to advocate gender inclusivity. The context in which organizations operate also has significant effects in that state repression steers organizations to adopt gender inclusivity. The study thus contributes to an emerging literature on gender, shifting focus from the state to the organizational context.
Journal: Studies in Conflict & Terrorism
Pages: 362-379
Issue: 4
Volume: 46
Year: 2023
Month: 4
X-DOI: 10.1080/1057610X.2020.1759256
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1759256
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:4:p:362-379



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1759262_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Hilary Matfess
Author-X-Name-First: Hilary
Author-X-Name-Last: Matfess
Title: Part and Parcel? Examining Al Shabaab and Boko Haram’s Violence Targeting Civilians and Violence Targeting Women
Abstract: 
 In an effort to produce a more holistic and nuanced understanding of the violence women face in conflict, this article describes al Shabaab and Boko Haram’s respective patterns of political violence targeting women and compares them to one another. This article also describes and compares their respective political violence targeting civilians. This analysis, using data from the the Armed Conflict Location & Event Data Project (ACLED), provides three insights. Firstly, though al Shabaab and Boko Haram share a number of theoretically important characteristics, the nature of their violence targeting women differs considerably. Secondly, this comparison suggests that violence targeting women should be considered a distinct form of violence targeting civilians. Thirdly, this review sheds light on the degree to which different instrumentalist and ideological explanations, not theories of violence targeting civilians explain al Shabaab and Boko Haram’s patterns of violence. Ultimately, this article finds that a counter-insurgency plan, counter-terrorism strategy, or academic analysis that takes the same approach to al Shabaab and Boko Haram on the basis of their shared identities as Salafi-jihadist rebel groups will fail to capture important differences in their targeting patterns.
Journal: Studies in Conflict & Terrorism
Pages: 380-398
Issue: 4
Volume: 46
Year: 2023
Month: 4
X-DOI: 10.1080/1057610X.2020.1759262
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1759262
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:4:p:380-398



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1759264_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mehr Latif
Author-X-Name-First: Mehr
Author-X-Name-Last: Latif
Author-Name: Kathleen Blee
Author-X-Name-First: Kathleen
Author-X-Name-Last: Blee
Author-Name: Matthew DeMichele
Author-X-Name-First: Matthew
Author-X-Name-Last: DeMichele
Author-Name: Pete Simi
Author-X-Name-First: Pete
Author-X-Name-Last: Simi
Title: Do White Supremacist Women Adopt Movement Archetypes of Mother, Whore, and Fighter?
Abstract: 
 The rhetoric of the far-right typically depicts women in tripartite archetypes: as beloved mothers or sex symbols for far-rightist men or, less commonly, as fighters for the cause. But the propaganda and speeches that produced these archetypes of women are largely produced by far-rightist men. Do they reflect the lived experiences of women in the far-right? And how do far-rightist women – and men – react to such rhetorical messages about the female role? This paper broadens our understanding of modern white supremacist groups by examining the experiences of its female members. We employ lenses of emotionality and embodiment to understand how women accept and resist group-level gender expectations in white supremacism. This is responsive to the broader goal in research on women in terrorism and political violence to specify how women act within and beyond ascribed gender-typical roles. Our extensive interview data allow us to provide a rich depiction of the integrated natures of the public and private lives of white supremacist activist women, adding new information about a population of women engaged in political extremism and violent organization about which little is known.
Journal: Studies in Conflict & Terrorism
Pages: 415-432
Issue: 4
Volume: 46
Year: 2023
Month: 4
X-DOI: 10.1080/1057610X.2020.1759264
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1759264
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:4:p:415-432



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1759265_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ora Szekely
Author-X-Name-First: Ora
Author-X-Name-Last: Szekely
Title: Exceptional Inclusion: Understanding the PKK’s Gender Policy
Abstract: 
 The PKK’s gender policy, which includes maintaining a fighting force that is 40% female and the promotion of women’s liberation as a key component of its political platform, makes the PKK an outlier among both Kurdish nationalist groups and leftist armed movements in the Middle East. Based on interviews with members of the PKK’s allied civilian political movement and former PKK combatants, this paper argues that rather than being a function of the PKK’s ethnic or ideological identities, this policy emerged as a result of a confluence of four other factors: the PKK’s leftist ideology, the preferences of its leadership, and the need to recruit selectively all served as permissive factors. Ultimately, however, it was the greater participation of Kurdish women as a result of Turkish state violence in the Kurdish southeast in the 1980s that ultimately changed the PKK from within.
Journal: Studies in Conflict & Terrorism
Pages: 433-450
Issue: 4
Volume: 46
Year: 2023
Month: 4
X-DOI: 10.1080/1057610X.2020.1759265
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1759265
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:4:p:433-450



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1759263_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mia Bloom
Author-X-Name-First: Mia
Author-X-Name-Last: Bloom
Author-Name: Ayse Lokmanoglu
Author-X-Name-First: Ayse
Author-X-Name-Last: Lokmanoglu
Title: From Pawn to Knights: The Changing Role of Women’s Agency in Terrorism?
Abstract: 
 As terrorist groups became more technologically advanced with their media campaigns, the global audience began to see pictures of women in black burkas pledging allegiance to the so-called Islamic State of Iraq and Syria (ISIS) and posing with guns. Although there is a backlash against such change that we see reflected in the ideologies of violent extremism; the shifts in gender relations within these groups are significant to examine. Further, we face questions about the repatriation of ISIS women and children to their countries of origin – notably questions of agency and culpability within the mainstream media. This paper asks: to what extent have women’s roles changed within and across terrorist groups? Is there a move toward women’s empowerment, or is it a facade? Analyzing the three cases of Al-Qaeda (AQ), Islamic State of Iraq and Syria (ISIS), and Kurdistan Workers’ Party (PKK) does their advent represent a significant shift? The emergence of ISIS and Boko Haram’s explicitly gendered strategies of violence and recruitment within the highly patriarchal and misogynistic Salafi-jihadist culture, and PKK’s postconflict gender-equal political advances demonstrates that addressing women’s agency through a gendered analysis outside of the masculine domain is imperative. Scholars should challenge the idea that women have limited roles.
Journal: Studies in Conflict & Terrorism
Pages: 399-414
Issue: 4
Volume: 46
Year: 2023
Month: 4
X-DOI: 10.1080/1057610X.2020.1759263
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1759263
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:4:p:399-414



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1759266_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alexis Henshaw
Author-X-Name-First: Alexis
Author-X-Name-Last: Henshaw
Title: Outbidding and Gender: Dynamics in the Colombian Civil War
Abstract: 
 The civil conflict in Colombia has gained attention in part for the inclusion of women in rebel forces and peace negotiations between the government and the Revolutionary Armed Forces of Colombia (FARC). Scholarship has often explained the FARC’s decision to mobilize women as both an ideological and tactical move, designed to increase the ranks of the organization and signal commitment to leftist principles. In this paper, I argue that the incorporation of women into Colombia’s civil war is better understood by viewing the country’s various leftist armed movements (including the ELN, EPL, and M-19) through a comparative framework. By applying the theoretical concept of outbidding, I argue that the mobilization and expansion of women’s roles in Colombian armed groups was in fact an intersubjective process, driven by competition among leftist movements existing in a crowded marketplace. In contrast to alternative explanations that focus on mobilization as an elite-driven process, I argue that the outbidding dynamic exposes agency among women recruited to these groups and demonstrates the potential for women to create strategic openings in times of conflict.
Journal: Studies in Conflict & Terrorism
Pages: 451-469
Issue: 4
Volume: 46
Year: 2023
Month: 4
X-DOI: 10.1080/1057610X.2020.1759266
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1759266
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:4:p:451-469

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1780014_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel Koehler
Author-X-Name-First: Daniel
Author-X-Name-Last: Koehler
Title: Fake It till You Make It? Representation of Special Operations Forces Capabilities in Jihadist Propaganda Videos
Abstract: 
 Jihadist propaganda videos depicting training camps and combat scenes have steadily increased in variety and quality over the years. A small number of these videos attempt to mimic Special Operation Forces (SOF)’s tactics and skills. This subset of jihadist propaganda might go beyond a mere attempt to show prowess and reveal actual operational capabilities. This article analyzes three exemplary jihadist propaganda videos depicting claimed SOF capabilities through expert reviews with active service SOF personnel to assess the actual tactical quality of the content shown. It also discusses the potential reasons for those groups to mimic SOF and implications for counterterrorism.
Journal: Studies in Conflict & Terrorism
Pages: 541-558
Issue: 5
Volume: 46
Year: 2023
Month: 5
X-DOI: 10.1080/1057610X.2020.1780014
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1780014
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:5:p:541-558



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1780027_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gabriel Weimann
Author-X-Name-First: Gabriel
Author-X-Name-Last: Weimann
Author-Name: Natalie Masri
Author-X-Name-First: Natalie
Author-X-Name-Last: Masri
Title: Research Note: Spreading Hate on TikTok
Abstract: 
 TikTok is the fastest-growing application today, attracting a huge audience of 1.5 billion active users, mostly children and teenagers. Recently, the growing presence of extremist’s groups on social media platforms became more prominent and massive. Yet, while most of the scholarly attention focused on leading platforms like Twitter, Facebook or Instagram, the extremist immigration to other platforms like TikTok went unnoticed. This study is a first attempt to find the Far-right’s use of TikTok: it is a descriptive analysis based on a systematic content analysis of TikTok videos, posted in early 2020. Our findings reveal the disturbing presence of Far-right extremism in videos, commentary, symbols and pictures included in TikTok’s postings. While similar concerns were with regard to other social platforms, TikTok has unique features to make it more troublesome. First, unlike all other social media TikTok’ s users are almost all young children, who are more naïve and gullible when it comes to malicious contents. Second, TikTok is the youngest platform thus severely lagging behind its rivals, who have had more time to grapple with how to protect their users from disturbing and harmful contents. Yet, TikTok should have learned from these other platforms’ experiences and apply TikTok’s own Terms of Service that does not allow postings that are deliberately designed to provoke or antagonize people, or are intended to harass, harm, hurt, scare, distress, embarrass or upset people or include threats of physical violence.
Journal: Studies in Conflict & Terrorism
Pages: 752-765
Issue: 5
Volume: 46
Year: 2023
Month: 5
X-DOI: 10.1080/1057610X.2020.1780027
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1780027
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:5:p:752-765



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1780011_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bryce Loidolt
Author-X-Name-First: Bryce
Author-X-Name-Last: Loidolt
Title: Al-Qaeda’s Iran Dilemma: Evidence from the Abbottabad Records
Abstract: 
 Through a comprehensive review of documents recovered from Usama bin Ladin’s Abbottabad compound, this study provides a new periodization of al-Qaeda’s relationship with Iran. The analysis reveals that al-Qaeda often had to reconcile conflicting operational and ideational pressures in its interactions with the Islamic Republic over time. Beyond offering insight into the trajectory of this important relationship and direction for future scholarship, the analysis suggests some ways through which the United States might expand the strategic wedge that exists between these unlikely allies and highlights the need for a more flexible understanding of state sponsored terrorism.
Journal: Studies in Conflict & Terrorism
Pages: 513-540
Issue: 5
Volume: 46
Year: 2023
Month: 5
X-DOI: 10.1080/1057610X.2020.1780011
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1780011
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:5:p:513-540



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1780009_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jason Roach
Author-X-Name-First: Jason
Author-X-Name-Last: Roach
Author-Name: Ashley Cartwright
Author-X-Name-First: Ashley
Author-X-Name-Last: Cartwright
Author-Name: Ken Pease
Author-X-Name-First: Ken
Author-X-Name-Last: Pease
Title: More Angry than Scared? A Study of Public Reactions to the Manchester Arena and London Bridge Terror Attacks of 2017
Abstract: 
 Although public reaction to disaster has been the subject of much research, reactions to acts of terrorism have been studied less, sustaining a common assumption that fear is the generic response. The present paper tests this assumption through a survey of reactions to the Manchester Arena bombing and London Bridge attack of 2017, and the findings suggest that an important likely additional modal citizen reaction to such events is one of anger at the perpetrators, holding important implications for public policy and security practice in the wake of such acts.
Journal: Studies in Conflict & Terrorism
Pages: 579-593
Issue: 5
Volume: 46
Year: 2023
Month: 5
X-DOI: 10.1080/1057610X.2020.1780009
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1780009
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:5:p:579-593



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1780005_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Enrique Wedgwood Young
Author-X-Name-First: Enrique Wedgwood
Author-X-Name-Last: Young
Title: Theorizing the Influence of Wartime Legacies on Political Stability after Rebel Victories
Abstract: 
 This paper develops a theory which explains how wartime processes and relationships result in positive or negative ‘wartime legacies’ which can influence the degree of political stability experienced by countries after civil wars that end in rebel victory. Specifically, it predicts that variations in a) the character, scope, and extent of rebel-civilian wartime interaction, and; b) the decisiveness, costs, and payoffs of victory, combine to influence the legitimacy, capacity to govern, and capacity to control that rebels have when they capture power. These legacies in turn shape incentives and opportunities for violent challenge to the new regime in the postwar environment, thereby lowering or raising the prospects for political stability. To illustrate the utility of the theory, it is applied to three cases which experienced differing levels of political stability following rebel victory; Cuba, Uganda, and the Democratic Republic of Congo.
Journal: Studies in Conflict & Terrorism
Pages: 703-727
Issue: 5
Volume: 46
Year: 2023
Month: 5
X-DOI: 10.1080/1057610X.2020.1780005
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1780005
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:5:p:703-727



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1780007_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Oscar Palma
Author-X-Name-First: Oscar
Author-X-Name-Last: Palma
Title: A Model for Counterinsurgency Success? The Good, the Bad and the Ugly in the Struggle against the Revolutionary Armed Forces of Colombia (2003–2012)
Abstract: 
 The Colombian counterinsurgency campaign against FARC, during the years 2003–2012, was successful in significantly reducing the insurgency to its weakest condition in history. The strategy was a result of the transformation of the leadership mind-set, which motivated an understanding of counterinsurgency as a political enterprise, demanding the participation of all state institutions and officials. This all-of-government approach allowed to place military action as part of a broader strategy, in which military commanders transformed the way the struggle was understood, placing legitimacy as a center of gravity in operations. However, the latter part of the strategy, the consolidation of state institutions in remote regions of the territory, wasn’t achieved, while extrajudicial killings clouded the entire success of the strategy.1
Journal: Studies in Conflict & Terrorism
Pages: 728-751
Issue: 5
Volume: 46
Year: 2023
Month: 5
X-DOI: 10.1080/1057610X.2020.1780007
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1780007
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:5:p:728-751



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1780021_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mohammed Ibrahim Shire
Author-X-Name-First: Mohammed
Author-X-Name-Last: Ibrahim Shire
Title: How Do Leadership Decapitation and Targeting Error Affect Suicide Bombings? The Case of Al-Shabaab
Abstract: 
 Targeted killing is a cornerstone of counter-terrorism strategy, and tactical mistakes made by militant groups are endemic in terrorism. Yet, how do they affect a militant group’s suicide bomber deployment? Since joining Al-Qaeda, Al-Shabaab has carried out various types of suicide attacks on different targets. Using a uniquely constructed dataset, I introduce two typologies of suicide bomber detonation profiles – single and multiple – and explore the strategic purposes these have served for the group during multiphasic stages following targeted killings against the group’s leadership and targeting errors committed by Al-Shabaab. The findings reveal that targeted killing has the opposite effect of disrupting suicide attacks, instead, leading to a rapid proliferation of unsophisticated single suicide attacks against civilian and military targets to maintain the perception of the group’s potency. Thus, I argue that targeting errors made by Al-Shabaab have a more serious detrimental effect on its deployment of suicide attacks than any counter-terrorism measure.
Journal: Studies in Conflict & Terrorism
Pages: 682-702
Issue: 5
Volume: 46
Year: 2023
Month: 5
X-DOI: 10.1080/1057610X.2020.1780021
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1780021
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:5:p:682-702



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1776958_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joana Cook
Author-X-Name-First: Joana
Author-X-Name-Last: Cook
Author-Name: Haid Haid
Author-X-Name-First: Haid
Author-X-Name-Last: Haid
Author-Name: Inga Trauthig
Author-X-Name-First: Inga
Author-X-Name-Last: Trauthig
Title: “Jurisprudence Beyond the State: An Analysis of Jihadist “Justice” in Yemen, Syria and Libya
Abstract: 
 The provision of law, order and justice are some of the most sacred responsibilities of the contemporary nation-state. However, non-state actors have frequently introduced their own jurisprudence, implementing courts and various forms of related law and order in broader attempts to implement governance. Yet, little research has examined the diverse contours of such jurisprudence, and how these aspects offer insights into how these groups vie for legitimacy, and how such jurisprudence helps them achieve their strategic aims. Examining AQAP in Yemen, HTS in Syria, and ISIS in Libya this article describes the implementation, scope and contours of jihadist jurisprudence.
Journal: Studies in Conflict & Terrorism
Pages: 559-578
Issue: 5
Volume: 46
Year: 2023
Month: 5
X-DOI: 10.1080/1057610X.2020.1776958
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1776958
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:5:p:559-578



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1780028_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Adib Bencherif
Author-X-Name-First: Adib
Author-X-Name-Last: Bencherif
Author-Name: Aurélie Campana
Author-X-Name-First: Aurélie
Author-X-Name-Last: Campana
Author-Name: Daniel Stockemer
Author-X-Name-First: Daniel
Author-X-Name-Last: Stockemer
Title: Lethal Violence in Civil War: Trends and Micro-Dynamics of Violence in the Northern Mali Conflict (2012-2015)
Abstract: 
 This article discusses the trends and micro-dynamics of violence in northern Mali. Using a mixed research design, we focus on the violence used by jihadist groups during the first phases of the Malian civil war (2012–2015). Integrating research on civil war and terrorism, we distinguish between direct and remote violence. Quantitative analyses show that the involvement of jihadist groups in this conflict had a strong impact on the level and intensity of violence of all warring parties. Qualitative analysis of data collected during field research done in Mali between 2016 and 2017 complements the quantitative work. It enlightens that relational dynamics strongly influence the decision to resort to violence within non-state armed groups, including jihadist ones, while local contexts often explain temporal and geographic variations in violence.
Journal: Studies in Conflict & Terrorism
Pages: 659-681
Issue: 5
Volume: 46
Year: 2023
Month: 5
X-DOI: 10.1080/1057610X.2020.1780028
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1780028
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:5:p:659-681



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1780030_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nadia Kaneva
Author-X-Name-First: Nadia
Author-X-Name-Last: Kaneva
Author-Name: Andrea Stanton
Author-X-Name-First: Andrea
Author-X-Name-Last: Stanton
Title: An Alternative Vision of Statehood: Islamic State’s Ideological Challenge to the Nation-State
Abstract: 
 This study contributes to efforts to theorize contemporary challenges to the nation-state as a normative governance unit through an analysis of Islamic State’s state ideology. It is argued that, by reinterpreting concepts from Islamic history, IS puts forth a religiously motivated, post-national state ideology. Based on an interdisciplinary reading of Dabiq magazine, the de facto official IS publication between 2014 and 2016, three concepts emerge as foundational in the group’s state ideology: imamah (leadership), hijrah (migration), and bay‘a (allegiance). The study sheds light on the enduring ideology of Islamic State, despite its territorial defeat.
Journal: Studies in Conflict & Terrorism
Pages: 640-658
Issue: 5
Volume: 46
Year: 2023
Month: 5
X-DOI: 10.1080/1057610X.2020.1780030
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1780030
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:5:p:640-658



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1780025_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Rogelio Alonso
Author-X-Name-First: Rogelio
Author-X-Name-Last: Alonso
Author-Name: Paul Delgado
Author-X-Name-First: Paul
Author-X-Name-Last: Delgado
Title: The Radicalization of Young Jihadi Convicted of Membership of Terrorist Organization in Spain: Analyzing the Pieces of the Puzzle
Abstract: 
 This article analyses the radicalization of all of the five young offenders -aged between fourteen and eighteen years- who have been convicted in Spain between 2004 and 2019 of membership of a jihadist terrorist organization. It is based on: a) unprecedented access to the assessments of these youths produced by the Agency for the Reeducation and Reintegration of Young Offenders in the regional Government of Madrid; b) personal semi-structured interviews with the staff at this Agency responsible for their psycho-socio and educational intervention during their custodial measures; and c) judicial reports related to their cases. The article assesses the main features of the radicalization processes of these minors following a three-dimensional analysis at the micro, meso and macro level. It provides empirical evidence to test the validity of the main hypotheses on the causality of radicalization.
Journal: Studies in Conflict & Terrorism
Pages: 594-617
Issue: 5
Volume: 46
Year: 2023
Month: 5
X-DOI: 10.1080/1057610X.2020.1780025
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1780025
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:5:p:594-617



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1792723_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Danielle Gilbert
Author-X-Name-First: Danielle
Author-X-Name-Last: Gilbert
Title: The Oxygen of Publicity: Explaining U.S. Media Coverage of International Kidnapping
Abstract: 
 What explains U.S. media coverage of Americans kidnapped abroad? While some hostages receive national media attention, others hardly make the local news. Using an original, event count dataset of newspaper stories about Americans kidnapped abroad since 2001, this article tests the oft-cited, under-measured assumption that “terrorism” receives more media attention than other violence. Controlling for variation across kidnapping, I show that those framed as “terrorism” receive more coverage. Challenging existing literature, I also demonstrate that incidents with more victims receive less coverage than those incidents with fewer victims, and that there is no “missing white woman syndrome” in international kidnapping.
Journal: Studies in Conflict & Terrorism
Pages: 618-639
Issue: 5
Volume: 46
Year: 2023
Month: 5
X-DOI: 10.1080/1057610X.2020.1792723
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1792723
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:5:p:618-639

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1792724_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Edward Stoddard
Author-X-Name-First: Edward
Author-X-Name-Last: Stoddard
Title: Maoist Hybridity? A Comparative Analysis of the Links between Insurgent Strategic Practice and Tactical Hybridity in Contemporary Non-State Armed Groups
Abstract: 
 While the recent literature on hybrid warfare has focused overwhelmingly on Russia, military tactical hybridity among non-state actors has received less attention, and minimal comparative examination. This is surprising as the range of non-state actors successfully using hybridized irregular-conventional tactics (increasingly symmetrically) against states has grown. Examining this phenomenon comparatively in three divergent cases (Islamic State, Boko Haram, the Houthi Movement), this article tests an often-overlooked argument stating that military hybridity among non-state actors is a result of these groups’ common adoption of a specific form of Maoist-style warfare strategy – emulative insurgency.
Journal: Studies in Conflict & Terrorism
Pages: 913-937
Issue: 6
Volume: 46
Year: 2023
Month: 6
X-DOI: 10.1080/1057610X.2020.1792724
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1792724
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:6:p:913-937



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1811539_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Phillip Conrad De Bruyn
Author-X-Name-First: Phillip Conrad
Author-X-Name-Last: De Bruyn
Title: Developing an Extremist Construct Schema and Measuring Ideological Engagement
Abstract: 
 The study of online communication in extremist communities can benefit from novel methods to cast new empirical light on how individuals engage with the content of these phenomena. This work categorized such content through the systematic extraction of constructs used by members of Islamic-based extremist forums. To identify constructs that could attract engagement from extremists over time, a schema was developed from four proposed dimensions of extremism: conflict, emotion, religion, and role. Analysis of engagement relied on a mixed methods approach applied to numerous discussions on 11 independent forums, where constructs were coded according to schema dimensions. A novel change point detection methodology was used to examine the lifespan of constructs and empirically measure engagement, which was estimated across forums through meta-analyses. A small proportion of constructs experienced significant engagement over time, primarily concentrated in the religion and role dimensions. Both dimensions attracted high engagement in all the forums analyzed, where role had smaller effects than religion across forums. The forum context and extremist discourse make high engagement with religion an expected outcome, but similar results produced by the role dimension were surprising and should recalibrate thinking when compared to the traditionally studied emotion and conflict dimensions in online radicalization.
Journal: Studies in Conflict & Terrorism
Pages: 938-963
Issue: 6
Volume: 46
Year: 2023
Month: 6
X-DOI: 10.1080/1057610X.2020.1811539
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1811539
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:6:p:938-963



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1792739_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Javier Jordán
Author-X-Name-First: Javier
Author-X-Name-Last: Jordán
Title: The Last Stand of Al Andalus Lessons on the Changing Nature of War from an Early Modern Islamic Insurgency
Abstract: 
 The present article pursues a two-fold purpose. The first is to identify elements of continuity throughout history in internal armed conflicts where state structures are still in the process of being formed or, if already consolidated, where they have suffered serious deterioration. The second is to present and analyze a case study that has received scant attention in scientific literature on insurgencies, namely, the War of the Alpujarras, which was fought at the beginning of the early modern period and was the last Islamic rebellion in Spain.
Journal: Studies in Conflict & Terrorism
Pages: 824-846
Issue: 6
Volume: 46
Year: 2023
Month: 6
X-DOI: 10.1080/1057610X.2020.1792739
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1792739
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:6:p:824-846



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1816680_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gina Vale
Author-X-Name-First: Gina
Author-X-Name-Last: Vale
Title: Defying Rules. Defying Gender?: Women’s Resistance to Islamic State
Abstract: 
 Through disproportionate restrictions placed on women’s movement and visualization within its “caliphate”, the Islamic State (IS) group enforced its policies of female domesticity and submission. Studies on IS governance of local Iraqi, Syrian and Kurdish women have focused overwhelmingly on their victimization, abuse, and restricted agency. By contrast, this paper uncovers the opportunities, activities, and impacts of individual and collective nonviolent resistance led by local Sunni and Yazidi women. Through endeavors such as personal resilience, individual confrontations, and even group protest, local female civilian women acted against the group’s policies, members, ideology, and expectations of female passivity.
Journal: Studies in Conflict & Terrorism
Pages: 985-1008
Issue: 6
Volume: 46
Year: 2023
Month: 6
X-DOI: 10.1080/1057610X.2020.1816680
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1816680
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:6:p:985-1008



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1792740_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Carola García-Calvo
Author-X-Name-First: Carola
Author-X-Name-Last: García-Calvo
Author-Name: Fernando Reinares
Author-X-Name-First: Fernando
Author-X-Name-Last: Reinares
Author-Name: Álvaro Vicente
Author-X-Name-First: Álvaro
Author-X-Name-Last: Vicente
Title: National Extraction, Geographical Origin and Migratory Ancestry among Jihadists in Spain
Abstract: 
 Eight out of every 10 jihadists arrested or deceased in Spain between 2013 and 2018 are of Moroccan origin. This figure includes Moroccan nationals, Spanish nationals born in Morocco, and Spanish nationals descending from Moroccan immigrants. The historically restive Rif region of northwest Africa is the main geographical provenance of those who were born in Morocco and, similarly, because of violent Salafist who are natives of Ceuta and Melilla, of those who were born in Spain. All this reveals the extent to which the enduring reality of global jihadism in Morocco is projected externally onto Spain. This is unsurprising, since a large majority of Muslims in Spain come from Morocco or have Moroccan ancestors. Yet, the blooming of homegrown jihadism in Spain over the mentioned six-year period, largely resulting from the radicalization of Moroccan descendants or second generations, points toward the internal dynamics behind the phenomenon. In Spain, however, these second generations may or may not be in a diaspora situation, an important feature which is unique in the context of Western Europe.
Journal: Studies in Conflict & Terrorism
Pages: 798-823
Issue: 6
Volume: 46
Year: 2023
Month: 6
X-DOI: 10.1080/1057610X.2020.1792740
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1792740
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:6:p:798-823



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1793457_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Huseyn Aliyev
Author-X-Name-First: Huseyn
Author-X-Name-Last: Aliyev
Title: “Unlikely Recruits”: Why Politically Irrelevant Ethnic Minorities Participate in Civil Wars?
Abstract: 
 There is little research on why smaller ethnic groups with no political stakes in the conflict take part in civil wars. There is even less understanding as to why members of small ethnicities join ideologically distant conflict participants to fight against an enemy that does not directly threaten their ethnic security. This study describes these ethnic minority combatants as “unlikely recruits.” It argues that members of politically irrelevant minorities join stronger conflict participants—either governments or rebels—seeking to protect their ethnic interests from both their prospective hosts and their foes. Although the “unlikely recruits” have minimal grievances against enemies of their hosts and they receive limited participation rewards, forging an alliance with an actor which is likely to offer the highest benefits is sufficient to overcome the collective action problem. Recruiting members of smaller ethnic minorities in the context of ethnic civil wars allows armed actors to strengthen their image of ethnic diversity and all-inclusiveness, as well as to benefit from material resources provided by the “unlikely recruits.” These arguments are empirically tested using new evidence from Ukraine that offers a rare glimpse into the dynamics of politically irrelevant minorities’ participation in civil wars.
Journal: Studies in Conflict & Terrorism
Pages: 847-869
Issue: 6
Volume: 46
Year: 2023
Month: 6
X-DOI: 10.1080/1057610X.2020.1793457
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1793457
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:6:p:847-869



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1792737_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Maria-Louise Clausen
Author-X-Name-First: Maria-Louise
Author-X-Name-Last: Clausen
Title: Unity, Segregation, and Obedience: Islamic State’s Use of Quranic Verses and How It Relates to State-Building
Abstract: 
 Too little attention has been given to Islamic States efforts to present itself as a more legitimate alternative to the nation-state. This is particularly surprising as IS’ claim to statehood has been a prominent element in IS’ self-branding. This article argues that IS understands itself as a form of political order superior to the state because it is a revival of the caliphate. This argument is made through an investigation of three key dimensions of how Islamic state uses Quranic quotes in Dabiq to undergird this notion of Islamic state as a more legitimate state, namely the need to avoid division (unity), the obligation to avoid disbelievers and fight them (segregation), and the necessity to obey God and by extension, the caliph (obedience).
Journal: Studies in Conflict & Terrorism
Pages: 870-887
Issue: 6
Volume: 46
Year: 2023
Month: 6
X-DOI: 10.1080/1057610X.2020.1792737
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1792737
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:6:p:870-887



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1816676_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Wesley S. McCann
Author-X-Name-First: Wesley S.
Author-X-Name-Last: McCann
Title: Who Said We Were Terrorists? Issues with Terrorism Data and Inclusion Criteria
Abstract: 
 This article examines the reliability of “terrorism” classifications within the Global Terrorism Database (GTD) by looking at its inclusion criteria as well as filtering mechanisms for ensuring quality case inclusion. Using several descriptive analyses, this article examines how various measures within the GTD affect researcher’s ability to adequately analyze various patterns or trends of offending. The underlying limitations of the data, namely data inclusion, the defining of terrorism, and inconsistency in labeling events are examined. It is concluded from the analyses that what is being defined as terrorism matters downstream when examining the data, given that it is used to make inferences about groups, movements, or the efficacy of governmental policy. Since scholars often lack a proper “error” framework for assessing the quality of big data derived from open sources on terrorism, it makes it difficult for scholars to assess the quality of the data itself. As a result, researchers are encouraged to include an error framework within the GTD for academics to assess the quality of the data they are plugging into their models. Results, limitations, and recommendations are further expanded upon within.
Journal: Studies in Conflict & Terrorism
Pages: 964-984
Issue: 6
Volume: 46
Year: 2023
Month: 6
X-DOI: 10.1080/1057610X.2020.1816676
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1816676
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:6:p:964-984



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1793452_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Sara Doering
Author-X-Name-First: Sara
Author-X-Name-Last: Doering
Author-Name: Garth Davies
Author-X-Name-First: Garth
Author-X-Name-Last: Davies
Author-Name: Raymond Corrado
Author-X-Name-First: Raymond
Author-X-Name-Last: Corrado
Title: Reconceptualizing Ideology and Extremism: Toward an Empirically-Based Typology
Abstract: 
 The majority of contemporary research on terrorism and extremism has focused on jihadi extremism, while other ideologies have received far less attention. In response to this gap, the current study aims to compare the similarities and differences between jihadi, right-wing and left-wing extremists at the individual level. Using the Profiles of Individual Radicalization in the United States (PIRUS) dataset, a multinomial logistic regression model was used to compare individual-level characteristics across ideologies. Additionally, a two-step cluster analysis was conducted to determine whether these similarities and differences can provide additional insights into differentiating types of extremists generally based on their personal characteristics, regardless of their ideological adherence. The results of the multinomial logistic regression illustrate that there are notable differences across extremist ideologies, but also many similarities. Further exploring ways to better highlight individual-level differences, a cluster analysis revealed five distinct groups of extremists based on their personal characteristics, and demonstrate the utility of a typology of individual characteristics that is empirically derived and validated, and is not dependent on the a priori identification or specification of ideological motivation.
Journal: Studies in Conflict & Terrorism
Pages: 1009-1033
Issue: 6
Volume: 46
Year: 2023
Month: 6
X-DOI: 10.1080/1057610X.2020.1793452
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1793452
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:6:p:1009-1033



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1792733_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: James A. Piazza
Author-X-Name-First: James A.
Author-X-Name-Last: Piazza
Title: White Demographic Anxiety and Support for Torture of Terrorism Suspects
Abstract: 
 In this study I use a survey experiment to test whether the prospect of White demographic decline affects attitudes toward treatment of terrorism suspects. I find that when White subjects are informed that Whites are projected to become a demographic minority in the United States by 2060 they are more likely to approve of the use of torture on terrorism suspects. In contrast, White subjects who are informed that Whites are expected to remain a demographic majority through 2030 are not. I also find that the effect of White decline salience on support for torture of terror suspects is mediated through a heighted perception of threat due to terrorism.
Journal: Studies in Conflict & Terrorism
Pages: 769-797
Issue: 6
Volume: 46
Year: 2023
Month: 6
X-DOI: 10.1080/1057610X.2020.1792733
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1792733
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:6:p:769-797



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1800919_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bruce Hoffman
Author-X-Name-First: Bruce
Author-X-Name-Last: Hoffman
Title: In Memoriam: Christopher Dickey, August 31, 1951–July 16, 2020
Journal: Studies in Conflict & Terrorism
Pages: 767-768
Issue: 6
Volume: 46
Year: 2023
Month: 6
X-DOI: 10.1080/1057610X.2020.1800919
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1800919
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:6:p:767-768



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1792726_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Zoey Reeve
Author-X-Name-First: Zoey
Author-X-Name-Last: Reeve
Title: Repeated and Extensive Exposure to Online Terrorist Content: Counter-Terrorism Internet Referral Unit Perceived Stresses and Strategies
Abstract: 
 U.K. Metropolitan Police Counter-Terrorism Internet Referral Unit (CTIRU) Case Officers (COs) are tasked with identifying, and facilitating the removal of material that breaches the Terrorism Act 2006. COs are extensively and repeatedly exposed to material deemed illegal and harmful (including but not restricted to graphic terrorist and non-terrorist material). However, there is little research on the impact of this work, or how COs manage and mitigate the risks of their roles. Semi-structured interviews reveal the adaptive coping mechanisms that promote good perceived health and wellbeing in CTIRU, as well as areas of concern and improvement.
Journal: Studies in Conflict & Terrorism
Pages: 888-912
Issue: 6
Volume: 46
Year: 2023
Month: 6
X-DOI: 10.1080/1057610X.2020.1792726
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1792726
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:6:p:888-912

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1531565_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Christopher Whyte
Author-X-Name-First: Christopher
Author-X-Name-Last: Whyte
Title: Cryptoterrorism: Assessing the Utility of Blockchain Technologies for Terrorist Enterprise
Abstract: 
 Much recent policy discourse has pivoted on the relationship between terrorist campaigns and an emergent feature of the global financial landscape in the form of cryptocurrencies. Cryptocurrencies are a subset of digital currencies that are distributed by the developers thereof. The various unique features of cryptocurrencies have led to discussion in punditry about how terrorists could benefit from this new mode of financial transaction but few policy-oriented works and scholarly assessments exist to outline and assess this claim. This article describes cryptocurrencies, and assesses them in line with the operational realities of terrorist campaigns. I argue that, while there is limited evidence that terrorists are likely to disproportionately benefit from use of cryptocurrencies at present, there do exist unique opportunities for money laundering and revenue generation.
Journal: Studies in Conflict & Terrorism
Pages: 1126-1149
Issue: 7
Volume: 46
Year: 2023
Month: 7
X-DOI: 10.1080/1057610X.2018.1531565
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1531565
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:7:p:1126-1149



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1531532_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Malin E. Wimelius
Author-X-Name-First: Malin E.
Author-X-Name-Last: Wimelius
Author-Name: Malin Eriksson
Author-X-Name-First: Malin
Author-X-Name-Last: Eriksson
Author-Name: John Kinsman
Author-X-Name-First: John
Author-X-Name-Last: Kinsman
Author-Name: Veronica Strandh
Author-X-Name-First: Veronica
Author-X-Name-Last: Strandh
Author-Name: Mehdi Ghazinour
Author-X-Name-First: Mehdi
Author-X-Name-Last: Ghazinour
Title: What is Local Resilience Against Radicalization and How can it be Promoted? A Multidisciplinary Literature Review
Abstract: 
 In this research note, we present results from a review of research on local resilience in relation to radicalization in public health, social work, crisis management, and community policing using terrorism studies as a point of departure. In order to identify agreements between literatures, we focus on how local resilience is understood, how it is said to be promoted, and how this knowledge could be synthesized. We show that resilience by and large is understood as both a process and a capacity underpinned by cooperation, social networks, and community resources and that an initial mapping of existing strengths and resources is pivotal for local resilience-building.
Journal: Studies in Conflict & Terrorism
Pages: 1108-1125
Issue: 7
Volume: 46
Year: 2023
Month: 7
X-DOI: 10.1080/1057610X.2018.1531532
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1531532
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:7:p:1108-1125



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1040293_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mahdieh Aghazadeh Khoei
Author-X-Name-First: Mahdieh
Author-X-Name-Last: Aghazadeh Khoei
Title: Iran's Security and the Islamic State through the Lenses of the Copenhagen School
Abstract: 
 After the Cold War, a new generation of security studies emerged that moved debates beyond traditional, narrow, state-centric definitions of security toward considering other aspects like economic, political, social, and environmental contexts. This article evaluates one such contemporary important security concern—the threat of the Islamic State (IS), mainly against Iran, in the framework of the Copenhagen School security approach. The analysis concludes that IS threatens Iran's security by increasing the possibility of Kurdish sectarianism, widening the Shi’ite–Sunni gap, creating economic threats, decreasing Iran's influence in Syria, and challenging its power in the region. Analyzing Iran's stance against IS and the ensuing security debate is important to predict the future of the Middle East.
Journal: Studies in Conflict & Terrorism
Pages: 1035-1041
Issue: 7
Volume: 46
Year: 2023
Month: 7
X-DOI: 10.1080/1057610X.2015.1040293
File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1040293
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:7:p:1035-1041



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1818435_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jessica White
Author-X-Name-First: Jessica
Author-X-Name-Last: White
Title: Gender in Countering Violent Extremism Program Design, Implementation and Evaluation: Beyond Instrumentalism
Abstract: 
 Using a countering violent extremism program as a case study, this article highlights the conceptual and practical challenges for meaningful inclusion of gender in security programing. Gender mainstreaming is commonly cited as a goal for stakeholders. Unfortunately, the security framework under which many counterterrorism programs are implemented and the general lack of understanding around the complexity of gender has often led to failures for meaningful inclusion in program design and evaluation. This article argues that a gender-sensitive approach is needed for effective countering violent extremism programing and counterterrorism policy, therefore is needed to create a more secure world for all individuals.
Journal: Studies in Conflict & Terrorism
Pages: 1192-1215
Issue: 7
Volume: 46
Year: 2023
Month: 7
X-DOI: 10.1080/1057610X.2020.1818435
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1818435
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:7:p:1192-1215



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1529359_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Adis Duderija
Author-X-Name-First: Adis
Author-X-Name-Last: Duderija
Title: The Salafi Worldview and the Hermeneutical Limits of Mainstream Sunni Critique of Salafi-Jihadism
Abstract: 
 The aim of this article is to point to the hermeneutical limits of the critique of mainstream Sunnism vis-a-vis the Salafi-jihadist interpretations with particular reference to the literature produced by the proponents of the IS. The main argument the article makes is that by subscribing to what will be termed a “Salafi worldview,” mainstream Sunnism shares many interpretationally crucial epistemological and methodological mechanisms with those adopted by the proponents of the ideology behind the IS. As such mainstream Sunnism has strong hermeneutical limits that do not allow it to be in a position to mount an interpretationally effective rebuttal of many beliefs and practices Salafi-jihadists resort to including those pertaining to apostasy, enslavement, and gender-related issues.
Journal: Studies in Conflict & Terrorism
Pages: 1072-1087
Issue: 7
Volume: 46
Year: 2023
Month: 7
X-DOI: 10.1080/1057610X.2018.1529359
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1529359
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:7:p:1072-1087



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1538187_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tom Christensen
Author-X-Name-First: Tom
Author-X-Name-Last: Christensen
Author-Name: Per Lægreid
Author-X-Name-First: Per
Author-X-Name-Last: Lægreid
Author-Name: Lise H. Rykkja
Author-X-Name-First: Lise H.
Author-X-Name-Last: Rykkja
Title: How to Balance Individual Rights and Societal Security? The View of Civil Servants
Abstract: 
 How do Norwegian government officials perceive the dilemma between liberty and security after the 2011 terrorist attacks? A survey from 2016 shows that the central government officials’ attitudes are rather similar to the general population. Both are willing to trade individual rights for more societal security. Structural, cultural, and demographic features explain variations in the civil servants’ views. Position and perceptions of crisis management capacity make a difference. Officials responsible for crisis management are more willing to prioritize security. Low conflict, high trust, and a strong identification with central government creates support for security measures. Furthermore, age and gender matter.
Journal: Studies in Conflict & Terrorism
Pages: 1150-1166
Issue: 7
Volume: 46
Year: 2023
Month: 7
X-DOI: 10.1080/1057610X.2018.1538187
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1538187
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:7:p:1150-1166



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1680184_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daveed Gartenstein-Ross
Author-X-Name-First: Daveed
Author-X-Name-Last: Gartenstein-Ross
Author-Name: Samuel Hodgson
Author-X-Name-First: Samuel
Author-X-Name-Last: Hodgson
Author-Name: Daniele Bellutta
Author-X-Name-First: Daniele
Author-X-Name-Last: Bellutta
Author-Name: Chiara Pulice
Author-X-Name-First: Chiara
Author-X-Name-Last: Pulice
Author-Name: V.S. Subrahmanian
Author-X-Name-First: V.S.
Author-X-Name-Last: Subrahmanian
Title: When Jihadist Factions Split: A Data-Driven Network Analysis
Abstract: 
 This article investigates group fragmentation in the al-Qaeda and Islamic State ecosystems, employing network analysis to examine the impact of specific network conditions on the probability of a faction splitting. Using new datasets of faction–faction (FF) and terrorist–terrorist (TT) relationships, the article tests 18 hypotheses exploring connections between factional splits and the number, polarity, and strength of FF and TT relationships, among other factors. The article offers three major findings. First, a greater number of relationships between factions is positively correlated with the probability of fragmentation. Second, having a small or moderate number of a faction’s members belonging to another faction increases the probability of a split, but more significant cross-factional membership decreases the probability. Third, both high-degree centrality of a faction’s leader and significant variations in the degree centrality within a faction’s leadership structure is correlated with increased probability of a split.
Journal: Studies in Conflict & Terrorism
Pages: 1167-1191
Issue: 7
Volume: 46
Year: 2023
Month: 7
X-DOI: 10.1080/1057610X.2019.1680184
File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1680184
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:7:p:1167-1191



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1816682_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nils Hägerdal
Author-X-Name-First: Nils
Author-X-Name-Last: Hägerdal
Title: Starvation as Siege Tactics: Urban Warfare in Syria
Abstract: 
 Famine is on the rise across conflict zones worldwide. Yet in Syria – unlike other contemporary wars – the phenomenon is concentrated in urban areas, and intensified significantly after 2015. To explain these outcomes I delve into the nature of urban warfare. Urban combat operations favor the defender, and many military organizations resort to siege warfare to conquer urban territory; starvation remains a powerful siege tactic. Qualitative evidence on all sieges conducted inside Syria, where a majority of the prewar population lived in urban areas, shows how its regime forces constitute a prime example of this process.
Journal: Studies in Conflict & Terrorism
Pages: 1241-1262
Issue: 7
Volume: 46
Year: 2023
Month: 7
X-DOI: 10.1080/1057610X.2020.1816682
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1816682
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:7:p:1241-1262



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1816683_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Juan Del Rio
Author-X-Name-First: Juan
Author-X-Name-Last: Del Rio
Title: Do Vigilante Groups Reduce Cartel-Related Violence? An Empirical Assessment of Crime Trends in Michoacán, Mexico
Abstract: 
 When the Knights Templar cartel targeted the people of Michoacán, vigilantes formed for protection. This study uses a paired sample t-test to investigate the effect that the emergence and subsequent removal of the vigilantes and their confrontational approach against the Knights Templar had on cartel-related crimes. Initially, homicides increased in vigilante areas, while kidnappings and extortions decreased. After vigilantes were removed, homicides and kidnappings increased, while extortions decreased. Government removal of vigilantes allowed for a power vacuum to ensue, allowing violence to increase. Therefore, violence initially increases with vigilante presence, then decreases, while increasing again once the group is removed.
Journal: Studies in Conflict & Terrorism
Pages: 1216-1240
Issue: 7
Volume: 46
Year: 2023
Month: 7
X-DOI: 10.1080/1057610X.2020.1816683
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1816683
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:7:p:1216-1240



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1531517_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Blake Campbell
Author-X-Name-First: Blake
Author-X-Name-Last: Campbell
Author-Name: Amanda Murdie
Author-X-Name-First: Amanda
Author-X-Name-Last: Murdie
Title: Keep the Informants Talking: The Pursuit and Use of CBRN Weapons by Terrorist Organizations
Abstract: 
 What factors affect the likelihood that violent nonstate actors pursue and use chemical, biological, radiological, or nuclear (CBRN) weapons? What factors make a country at-risk for a CBRN terrorist attack? We argue that widespread repressive practices, also termed human rights abuses, are especially problematic in the fight to stop the pursuit or use of CBRN weapons. Repression by government forces severs ties between civilians and their government, leading those with knowledge of attacks to refrain from turning over necessary information. We test our argument quantitatively using data from the Big Allied and Dangerous Project and the Global Terrorism Database. Our results highlight how efforts taken to limit the use of repression may be an effective strategy to reduce risks of CBRN terrorism.
Journal: Studies in Conflict & Terrorism
Pages: 1088-1107
Issue: 7
Volume: 46
Year: 2023
Month: 7
X-DOI: 10.1080/1057610X.2018.1531517
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1531517
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:7:p:1088-1107



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1926069_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Isaac Kfir
Author-X-Name-First: Isaac
Author-X-Name-Last: Kfir
Title: Innovating to Survive, a Look at How Extremists Adapt to Counterterrorism
Abstract: 
 This paper examines the under-studied area of innovation and terrorism. Beyond exploring the debate on the difference between creativity and innovation and how it impacts terrorist groups, the paper also reviews the typology of terrorist innovation and of the law of unintended consequences. The presence of terrorist groups in the online gaming world is an example of creativity and innovation as the groups recognize that counterterrorist policies have limited their ability to communicate with potential recruits. Consequently, extremists have had to find new avenues to communicate with supporters and attract potential recruits as they are determined to survive. Security agencies must also ensure that they are also thinking ‘outside the box’ as only through creativity can they stay one-step ahead of their adversaries.
Journal: Studies in Conflict & Terrorism
Pages: 1263-1281
Issue: 7
Volume: 46
Year: 2023
Month: 7
X-DOI: 10.1080/1057610X.2021.1926069
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1926069
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:7:p:1263-1281



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1529353_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jennifer Philippa Eggert
Author-X-Name-First: Jennifer Philippa
Author-X-Name-Last: Eggert
Title: Female Fighters and Militants During the Lebanese Civil War: Individual Profiles, Pathways, and Motivations
Abstract: 
 This article offers an analysis of women’s profiles, pathways, and motivations to join the Lebanese civil war (1975 to 1990), with a particular focus on female fighters militants involved with Harakat Amal, Kataeb, the Progressive Socialist Party, Lebanese Communist Party, Fatah and the Popular Front for the Liberation of Palestine. The article contributes to existing debates on women’s motivations to join nonstate armed groups by examining both militias that included female fighters and those that did not. It is the first study so far that analyses the profiles and motivations of female fighters and militants within all major militias during the Lebanese civil war.
Journal: Studies in Conflict & Terrorism
Pages: 1042-1071
Issue: 7
Volume: 46
Year: 2023
Month: 7
X-DOI: 10.1080/1057610X.2018.1529353
File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1529353
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:7:p:1042-1071

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1816681_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Marta Furlan
Author-X-Name-First: Marta
Author-X-Name-Last: Furlan
Title: Rebel Governance at the Time of Covid-19: Emergencies as Opportunities for Rebel Rulers
Abstract: 
 As Covid-19 has spread worldwide, not only governments but also rebel rulers have had to face the crisis. Therefore, it is important to understand whether exogenous shocks pose to rebel rulers the same challenges they pose to governments. To answer this question, I will refer to the academic literature and I will study two insurgent groups that have been confronted by coronavirus – Hayat Tahrir al-Sham and the Taliban. Following the case studies, I will argue that while emergencies pose great challenges to governments, they provide rebel rulers with an opportunity to project themselves as more credible and legitimate rulers.
Journal: Studies in Conflict & Terrorism
Pages: 1440-1463
Issue: 8
Volume: 46
Year: 2023
Month: 8
X-DOI: 10.1080/1057610X.2020.1816681
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1816681
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:8:p:1440-1463



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1836847_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Rogelio Alonso
Author-X-Name-First: Rogelio
Author-X-Name-Last: Alonso
Author-Name: Jesús Castán
Author-X-Name-First: Jesús
Author-X-Name-Last: Castán
Title: The Barcelona and Cambrils Attacks: A Case Study of the Impact of Political Decentralization and Separatism on Counter Terrorism Policing
Abstract: 
 This article analyses how counter terrorism policing before and after the August 2017 jihadi attacks in Catalonia was negatively affected by two factors: the Spanish policing model based on a decentralized security system and the independentist challenge posed by the Catalan Government. Firstly, the article assesses the political and legal framework vis-à-vis security in a quasi-federal democracy like Spain. Secondly, it analyzes how the police response to the jihadist threat was impacted by this multilayer system structured around a central government, seventeen autonomous regions, two autonomous cities, and over eight thousand local councils. Thirdly, the article examines how the challenge posed by independentists in the Autonomous region of Catalonia, who in 2017 attempted to break away from Spain in defiance of the Spanish Constitution, exacerbated the structural problems of the security system. It concludes that the combination of several factors in a particularly conflictive political environment led to the failure of counter terrorism policing on three levels: proactive, preventive, and reactive.
Journal: Studies in Conflict & Terrorism
Pages: 1393-1416
Issue: 8
Volume: 46
Year: 2023
Month: 8
X-DOI: 10.1080/1057610X.2020.1836847
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1836847
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:8:p:1393-1416



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1846252_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Philippe Le Billon
Author-X-Name-First: Philippe
Author-X-Name-Last: Le Billon
Title: Oil and the Islamic State: Revisiting “Resource Wars” Arguments in Light of ISIS Operations and State-Making Attempts
Abstract: 
 Debates over the relationship between natural resources and armed conflicts have flourished in the past two decades, but few studies have considered the case of oil and the Islamic State in Iraq and Syria. This paper reviews key scholarly arguments concerning the relationship between natural resources and armed groups, and examines the interrelationship between oil, armed conflict and ISIS. Building on this analysis, the paper offers insights into dilemmas of oil dependence for non-state armed groups controlling proto-states: specifically, while oil enabled ISIS to consolidate its attempts at establishing a de facto state, it also created vulnerabilities. Among these, U.S.-led forces deliberately targeted oil to deny ISIS’ attempts to achieve statehood, and to politically confine its status to that of a terrorist organization ruling over an oil rich and dangerous proto-state targeted for military and political eradication. These findings point to the value of nuanced analyses of relations between resource wars arguments and terrorism studies, as well as the need to more broadly consider the various political dimensions of natural resources in the study of armed conflicts and campaigns against terrorist organizations.
Journal: Studies in Conflict & Terrorism
Pages: 1417-1439
Issue: 8
Volume: 46
Year: 2023
Month: 8
X-DOI: 10.1080/1057610X.2020.1846252
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1846252
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:8:p:1417-1439



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1822591_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Giampiero Giacomello
Author-X-Name-First: Giampiero
Author-X-Name-Last: Giacomello
Title: Research Note: More Bucks, Still No Bangs? Why a Cost-Benefit Analysis of Cyberterrorism Still Holds True
Abstract: 
 Taking as reference a cost-benefit analysis of cyberterrorism published in 2004 by Studies in Conflict and Terrorism, this article briefly reviews what happened in the last 15 years in cyberterrorism research, what was correctly forecast, what was wrong and what may happen in the future. Some of the analyses published in during this period have been accurate, indicating that terrorists would use the Web and then social media for supporting operations in financing, recruiting and, especially “propaganda” (information operations), instead of wasting resources in ineffectual cyberattacks against critical infrastructures. The same analyses, however, did not appreciate enough how successful information operations by terrorist groups would have been. Overall, the approach, research methods, findings and forecasting have been quite valid and fruitful and thus they can represent a solid foundation on which scholars of (cyber)terrorism may base their future research.
Journal: Studies in Conflict & Terrorism
Pages: 1508-1517
Issue: 8
Volume: 46
Year: 2023
Month: 8
X-DOI: 10.1080/1057610X.2020.1822591
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1822591
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:8:p:1508-1517



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1835002_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Niklas Karlén
Author-X-Name-First: Niklas
Author-X-Name-Last: Karlén
Title: Escalate to De-Escalate? External State Support and Governments’ Willingness to Negotiate
Abstract: 
 Policymakers sometimes argue that material assistance to rebels involved in a civil war can create a ‘ripe moment’ that is favorable for negotiations. Ripeness theory provides support for this idea. However, this notion has never been systematically assessed. This article evaluates this claim by using global data on negotiations in all intrastate armed conflicts from 1975 to 2009. Contrary to popular belief, the article demonstrates that external state support to rebel groups does not increase the prospect of negotiations. Instead, the results suggest that external support is likely to reduce the likelihood of negotiations between the warring parties, especially if the state sponsor is a great power. The study contributes to our understanding of civil war processes by demonstrating that military assistance hinders rather than promotes the onset of negotiations and by questioning the utility of ripeness theory as the most suitable framework for understanding this phenomenon.
Journal: Studies in Conflict & Terrorism
Pages: 1323-1344
Issue: 8
Volume: 46
Year: 2023
Month: 8
X-DOI: 10.1080/1057610X.2020.1835002
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1835002
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:8:p:1323-1344



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1841242_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nicolò Scremin
Author-X-Name-First: Nicolò
Author-X-Name-Last: Scremin
Title: Family Matters: A Preliminary Framework for Understanding Family Influence on Islamist Radicalization
Abstract: 
 This explorative study presents some theoretical reflections on the influence that family may exert in the context of Islamist radicalization. In doing so, a new preliminary framework consisting of four levels of analysis is introduced and its relevance illustrated using examples from the Palestinian, Indonesian, Chechen and, more broadly, Western context. If sufficiently adaptive, the proposed framework may not only raise the analyst’s awareness of the “bigger picture” in which family’s influence on radicalization should be investigated. It can also serve as a useful analytical model to uncover certain trends and characteristics of family’s attitudes toward terrorism in specific contexts, rendering the framework valuable from both a theoretical and practical analysis.
Journal: Studies in Conflict & Terrorism
Pages: 1491-1507
Issue: 8
Volume: 46
Year: 2023
Month: 8
X-DOI: 10.1080/1057610X.2020.1841242
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1841242
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:8:p:1491-1507



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1841197_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: George Kassimeris
Author-X-Name-First: George
Author-X-Name-Last: Kassimeris
Title: What I Have Learned about Countering Terrorism in the UK: A Conversation with Robert Spencer
Abstract: 
 Bob Spencer served as senior investigating officer and a specialist senior investigating officer for terrorism for the West Midlands Police in the U.K. Almost immediately after the 7/7 attacks in London, he was made Head of Intelligence for the West Midlands CTU. West Midlands being assessed at the time to have had the highest terrorism threat in the U.K. outside the capital, Spencer was invited to head the delivery of the governments Prevent agenda within the Regional Counter Terrorism Unit, with responsibility for embedding the strategy across four regional forces. Spencer retired from the force in 2012 but continued to advise various organizations around their compliance with terrorism regulations and particularly their organizational security and preparedness. In June 2016, he was appointed the Prevent Coordinator for Walsall Council in the West Midlands, retiring from the role in 2019.
Journal: Studies in Conflict & Terrorism
Pages: 1518-1527
Issue: 8
Volume: 46
Year: 2023
Month: 8
X-DOI: 10.1080/1057610X.2020.1841197
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1841197
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:8:p:1518-1527



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1862737_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kira Jumet
Author-X-Name-First: Kira
Author-X-Name-Last: Jumet
Author-Name: Zana Gulmohamad
Author-X-Name-First: Zana
Author-X-Name-Last: Gulmohamad
Title: Reframing the Campaign: From Egypt’s Ansar Bayt al-Maqdis to Wilayat Sinai, Islamic State’s Sinai Province
Abstract: 
 The article employs collective action framing theory to explore Egyptian violent Islamist group Ansar Bayt al-Maqdis’s (ABM’s) frames, which altered when it became Islamic State’s Sinai Province (IS-SP), Wilayat Sinai (WS). Using data from 40 videos and audio recordings released by the group in all three of its forms (al-Tawhid Wal-Jihad/TWJ, ABM, and WS), along with additional material disseminated by Islamic State Central, the article identifies transformations in the group’s frames in response to changes in the political environment and need for external support. When ABM became WS, it mimicked IS’s aggressive and transnational approach to framing and tactics.
Journal: Studies in Conflict & Terrorism
Pages: 1464-1490
Issue: 8
Volume: 46
Year: 2023
Month: 8
X-DOI: 10.1080/1057610X.2020.1862737
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1862737
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:8:p:1464-1490



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1822593_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Vidar B. Skretting
Author-X-Name-First: Vidar B.
Author-X-Name-Last: Skretting
Title: Al-Qaida in the Islamic Maghrib’s Expansion in the Sahara: New Insights from Primary Sources
Abstract: 
 Although originating in Algeria, AQIM and its allies had by 2012 become so entrenched in the Sahel that they were in de-facto control of vast swathes of territory in northern Mali. This article explains how and why GSPC/AQIM established itself in the Sahel, and why the group eventually decided to take the fight to the Sahelian countries, where they had previously found sanctuary. Relying on hitherto unused primary sources, this article is the first to show that the leadership of AQIM and al-Qaida Central did not want to engage in direct conflicts with the Sahelian states. The eventual shift of strategy in the region was brought about by the increasing numbers of Sahelians in AQIM's southern brigades.
Journal: Studies in Conflict & Terrorism
Pages: 1368-1392
Issue: 8
Volume: 46
Year: 2023
Month: 8
X-DOI: 10.1080/1057610X.2020.1822593
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1822593
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:8:p:1368-1392



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1862774_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gabriel Toole
Author-X-Name-First: Gabriel
Author-X-Name-Last: Toole
Title: Research Note: Deception, Drugs, & Death: Interviews with Survivors of al-Shabaab’s Youth Recruitment Traps in Kenya
Abstract: 
 The following paper consists of interviews with former members of Harakat al-Shabaab al-Mujahideen (al-Shabaab), recruited in Kenya between 2008 and 2017. Their stories shed light on al-Shabaab’s compartmentalized network of recruiters in Kenya. These individuals are tasked with recruiting disadvantaged youth from Kenya, in order to supply al-Shabaab’s camps in Somalia with a steady stream of expendable soldiers. The similarities between interviews emphasizes al-Shabaab’s role as human traffickers, highlights the under researched connection between al-Shabaab and the illicit drug trade, and reiterates the fact that government corruption is a significant hinderance to future counter-terrorism efforts.
Journal: Studies in Conflict & Terrorism
Pages: 1345-1367
Issue: 8
Volume: 46
Year: 2023
Month: 8
X-DOI: 10.1080/1057610X.2020.1862774
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1862774
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:8:p:1345-1367



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1830573_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Adam Ghazi-Tehrani
Author-X-Name-First: Adam
Author-X-Name-Last: Ghazi-Tehrani
Author-Name: Erin M. Kearns
Author-X-Name-First: Erin M.
Author-X-Name-Last: Kearns
Title: Biased Coverage of Bias Crime: Examining Differences in Media Coverage of Hate Crimes and Terrorism
Abstract: 
 News media differentially cover violence based on social identity. How does media bias apply to terrorist attacks—typically “upward crimes” where perpetrators hold less power than targets—that are also hate crimes—typically “downward crimes”? We compare coverage of incidents that are both terrorist attacks and hate crimes to coverage of incidents that are just terrorism in the U.S. from 2006 to 2015. Attacks that are also hate crimes receive less media attention. Articles are more likely to reference hate crimes when the perpetrator is unknown and more likely to reference terrorism when the perpetrator is non-white in some models.
Journal: Studies in Conflict & Terrorism
Pages: 1283-1303
Issue: 8
Volume: 46
Year: 2023
Month: 8
X-DOI: 10.1080/1057610X.2020.1830573
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1830573
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:8:p:1283-1303



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1862818_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jessica M. Grosholz
Author-X-Name-First: Jessica M.
Author-X-Name-Last: Grosholz
Author-Name: Zacharias P. Pieri
Author-X-Name-First: Zacharias P.
Author-X-Name-Last: Pieri
Title: “A Skinhead at Heart with a Hate-Filled Mind”: Understanding the Themes Present in the White Power Music Scene
Abstract: 
 White extremism in the U.S. has not received much attention in the literature, despite scholars arguing that it represents the most sustained form of terrorism in the U.S. While much of the research on extremist movements has focused on the groups’ violent acts, there has been significantly less attention on the nonviolent activities, such as music. Following a social movement theoretical framework, we set out to understand the role that music plays in constructing the worldview and narrative of white extremists. Using lyrics from 337 white power songs from seven white power bands, we analyzed the linear and interconnected narrative that emerges in the music. What we found is a narrative interwoven throughout the music that presents a clear picture of white societies under threat from immigration, the Jewish-controlled media, and liberalism, with clear directives for extreme violence and vigilante justice. Based on this picture, we discuss the potential counterextremism implications and provide several avenues for future research.
Journal: Studies in Conflict & Terrorism
Pages: 1304-1322
Issue: 8
Volume: 46
Year: 2023
Month: 8
X-DOI: 10.1080/1057610X.2020.1862818
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1862818
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:8:p:1304-1322

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1892604_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Reyhan Topal
Author-X-Name-First: Reyhan
Author-X-Name-Last: Topal
Title: An Empirical Assessment of China’s Counterterrorism Efforts and Securitization of Turkic Muslims
Abstract: 
 Why does China view its Turkic Muslims as a security threat? Although scholars have written a good deal on China’s repression of minorities, the number of empirical studies about China’s ever-expanding incarceration and surveillance of Turkic Muslims is rather limited. To identify the reasons for China’s repressive policies, this article draws evidence from Xinjiang Victims Database that presents video testimonies of 8973 people whose family members and friends are in China’s prisons and detention camps. The evidence shows that China’s policies stem from a constructivist securitization approach where religion, culture and identity play central roles although the country frames its policies through a realist discourse on terrorism and security.
Journal: Studies in Conflict & Terrorism
Pages: 1745-1765
Issue: 9
Volume: 46
Year: 2023
Month: 9
X-DOI: 10.1080/1057610X.2021.1892604
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1892604
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:9:p:1745-1765



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1872163_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dina Sharipova
Author-X-Name-First: Dina
Author-X-Name-Last: Sharipova
Author-Name: Serik Beissembayev
Author-X-Name-First: Serik
Author-X-Name-Last: Beissembayev
Title: Causes of Violent Extremism in Central Asia: The Case of Kazakhstan
Abstract: 
 The article focuses on causes of violent extremism in Kazakhstan by looking at the violent attacks on law-enforcement bodies in 2011 and 2016 in Aqtobe, Almaty, and Atyrau. Drawing on interviews with the convicted extremists, we argue that criminal youth subculture, grievances, the Salafi-jihadist ideology, and propaganda in the Internet have promoted extremist violence in Kazakhstan. We also make a brief comparative analysis of European jihadists and violent extremists in Kazakhstan, highlighting some important similarities and differences across the regions.
Journal: Studies in Conflict & Terrorism
Pages: 1702-1724
Issue: 9
Volume: 46
Year: 2023
Month: 9
X-DOI: 10.1080/1057610X.2021.1872163
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1872163
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:9:p:1702-1724



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1862752_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kira Harris
Author-X-Name-First: Kira
Author-X-Name-Last: Harris
Title: A Hybrid Threat: The Night Wolves Motorcycle Club
Abstract: 
 Hybrid threat actors are dynamic and often intentionally disguise their intentions. While the Russian motorcycle club Night Wolves dress comparably to outlaw motorcycle gangs, open source materials describe the club as posing a distinctly different national security threat. The Night Wolves’ ambiguity and covert activities make the club hard to analyze; however, this case study uses open source materials to provide insight into their activities and characteristics across an array of security domains. International incidents indicate members and associates have the capability and resources to engage in crime, corruption and politically-motivated violence both for personal interests, as well as the furtherance of Russian goals.
Journal: Studies in Conflict & Terrorism
Pages: 1784-1816
Issue: 9
Volume: 46
Year: 2023
Month: 9
X-DOI: 10.1080/1057610X.2020.1862752
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1862752
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:9:p:1784-1816



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1886427_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Rotem Dvir
Author-X-Name-First: Rotem
Author-X-Name-Last: Dvir
Author-Name: Nehemia Geva
Author-X-Name-First: Nehemia
Author-X-Name-Last: Geva
Author-Name: Arnold Vedlitz
Author-X-Name-First: Arnold
Author-X-Name-Last: Vedlitz
Title: Unpacking Public Perceptions of Terrorism: Does Type of Attack Matter?
Abstract: 
 The study explores terrorism threat perceptions, focusing on the American public’s views of conventional and cyber-terrorism methods. Based on a national survey data, we find that when asked about the likelihood and the extent of threat associated with each type of terror method, citizens make clear and significant distinctions. Furthermore, these distinctions translate to variations in counter-terrorism policy preferences. Our analyses reveal that, considering the low level of knowledge of complex security issues, measuring citizens’ `true attitudes’ requires using survey instruments with lower level of abstraction, which force respondents to ‘stop and think’, and better reflect their associated opinions.
Journal: Studies in Conflict & Terrorism
Pages: 1575-1598
Issue: 9
Volume: 46
Year: 2023
Month: 9
X-DOI: 10.1080/1057610X.2021.1886427
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1886427
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:9:p:1575-1598



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1888404_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Erin Saltman
Author-X-Name-First: Erin
Author-X-Name-Last: Saltman
Author-Name: Farshad Kooti
Author-X-Name-First: Farshad
Author-X-Name-Last: Kooti
Author-Name: Karly Vockery
Author-X-Name-First: Karly
Author-X-Name-Last: Vockery
Title: New Models for Deploying Counterspeech: Measuring Behavioral Change and Sentiment Analysis
Abstract: 
 The counterterrorism and CVE community has long questioned the effectiveness of counterspeech in countering extremism online. While most evaluation of counterspeech rely on limited reach and engagement metrics, this paper explores two models to better measure behavioral change and sentiment analysis. Conducted via partnerships between Facebook and counter-extremism NGOs, the first model uses A/B testing to analyze the effects of counterspeech exposure on low-prevalence-high-risk audiences engaging with Islamist extremist terrorist content. The second model builds upon online safety intervention approaches and the Redirect Method through a search based “get-help” module, redirecting white-supremacy and Neo-Nazi related search-terms to disengagement NGOs.
Journal: Studies in Conflict & Terrorism
Pages: 1547-1574
Issue: 9
Volume: 46
Year: 2023
Month: 9
X-DOI: 10.1080/1057610X.2021.1888404
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1888404
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:9:p:1547-1574



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1862850_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Emily Blout
Author-X-Name-First: Emily
Author-X-Name-Last: Blout
Author-Name: Patrick Burkart
Author-X-Name-First: Patrick
Author-X-Name-Last: Burkart
Title: White Supremacist Terrorism in Charlottesville: Reconstructing ‘Unite the Right’
Abstract: 
 The “Unite the Right” rally that subsumed Charlottesville, Virginia in 2017 will be remembered for its haunting torch-lit rally, massive display of neo-Nazi and white nationalist paraphernalia, bloody riots, and murderous car attack. Despite extensive media coverage, a comprehensive, scholarly, synthetic study of the planning and execution of the Unite the Right (UtR) has yet to emerge. Drawing from a repository of 5,000 primary texts and digital artifacts and using the lens of symbolic interactionism and levels of analysis theory, this study details the event as manifested in three theatres: symbolically mediated, systems-technical, and physical. Three findings are discussed: first, the “event” was centrally organized as a simulacrum of a military campaign; second, the agitational propaganda and information warfare was extensive and designed to publicize, recruit, and terrorize; and third, the city of Charlottesville suffered two cyber-attacks timed for meaningful symbolic interaction with movement actors and public officials. Based on these three findings, the authors offer the term “immersive terrorism” to describe the extended, trans-mediated, multi-theatre nature of the UtR terror campaign.
Journal: Studies in Conflict & Terrorism
Pages: 1624-1652
Issue: 9
Volume: 46
Year: 2023
Month: 9
X-DOI: 10.1080/1057610X.2020.1862850
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1862850
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:9:p:1624-1652



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1868097_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Asya Metodieva
Author-X-Name-First: Asya
Author-X-Name-Last: Metodieva
Title: The Radical Milieu and Radical Influencers of Bosnian Foreign Fighters
Abstract: 
 This research note looks at the radical influencers of Bosnian foreign fighters. This group is important, as the Balkan region has been seen as a spot of jihadist activism and recruitment for the IS and Al-Nusra Front. Previous research on foreign fighters emphasized that a small number of individuals (religious leaders, former combatants, and others) at the local level play a significant role in this recruitment. The influence of such figures results in hotspots of radical activism, which are called “power centers” here. This research note argues that such dynamics are likely to be even more evident in postwar societies due to state weaknesses, which create more power for social actors and inhibit counterterrorism. The paper also analyses the role of leader-led radical “institutions” that have appeared after the Bosnian War. By doing so, it stresses the significance of local radical influencers in the recruitment of Bosnian foreign fighters. The research note shows that radical influencers in postwar radical milieus manage to “institutionalize” their authority by filling the void left by domestic war(s) with life guidance and religious values. The paper provides insights into the social relations, authority and decision-making connected with foreign fighter departures to Syria and Iraq (2012-2016).
Journal: Studies in Conflict & Terrorism
Pages: 1725-1744
Issue: 9
Volume: 46
Year: 2023
Month: 9
X-DOI: 10.1080/1057610X.2020.1868097
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1868097
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:9:p:1725-1744



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1862895_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Stephane J. Baele
Author-X-Name-First: Stephane J.
Author-X-Name-Last: Baele
Author-Name: Lewys Brace
Author-X-Name-First: Lewys
Author-X-Name-Last: Brace
Author-Name: Travis G. Coan
Author-X-Name-First: Travis G.
Author-X-Name-Last: Coan
Title: Uncovering the Far-Right Online Ecosystem: An Analytical Framework and Research Agenda
Abstract: 
 Recent years have seen a substantial increase in far-right inspired attacks. In this context, the present article offers an analytical framework for the study of right-wing extremists’ multifaceted and fast-growing activity on the Internet. Specifically, we conceptualize the far-right online presence as a dynamic ecosystem, teasing out four major components that correspond to the different levels of analysis available to future research. We illustrate the benefits of this framework with key illustrative examples from the English-, French-, and German- speaking far-right, revealing the worrying size and breadth – but also heterogeneity – of today’s far-right online ecosystem.
Journal: Studies in Conflict & Terrorism
Pages: 1599-1623
Issue: 9
Volume: 46
Year: 2023
Month: 9
X-DOI: 10.1080/1057610X.2020.1862895
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1862895
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:9:p:1599-1623



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1868095_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Boaz Ganor
Author-X-Name-First: Boaz
Author-X-Name-Last: Ganor
Title: A Typology of Terrorist Attacks: The “32 Profiles” Model
Abstract: 
 Typologies of terrorist attacks enable researchers to analyze the complex phenomenon of terrorism in an organized manner, while facilitating the formulation of effective counter-terrorism policies. This paper contributes to the literature on typologies of terrorism by proposing a new conceptual model which classifies the various terrorist attacks that take place around the world according to two axes of reference: (1) the extent to which a terrorist organization is involved in the attack, and (2) The nature of interaction of the attacker/s with others. By placing the properties of various attacks on both axes, this article presents a new methodology that creates a typology of 32 different profiles of terrorist attacks, which can be grouped into 15 prototypes. The proposed model facilitates the examination of different types of terrorist attacks, while opening up new avenues of research.
Journal: Studies in Conflict & Terrorism
Pages: 1529-1546
Issue: 9
Volume: 46
Year: 2023
Month: 9
X-DOI: 10.1080/1057610X.2020.1868095
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1868095
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:9:p:1529-1546



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1868099_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: A. S. M. Ali Ashraf
Author-X-Name-First: A. S. M. Ali
Author-X-Name-Last: Ashraf
Author-Name: Mohammed Saiful Islam
Author-X-Name-First: Mohammed Saiful
Author-X-Name-Last: Islam
Title: Islamist Militant Groups and Crime-Terror Nexus in Bangladesh
Abstract: 
 This paper employs a mixed-method approach to explore the criminal nexus of Islamist militant groups operating in Bangladesh. Data for 98 (14%) of 710 militants profiled in this study suggest various types of criminal involvement. By blending a qualitative social network analysis of top leaders from four militant groups, we find a much better picture of how terrorists pursue the strategies of appropriation, cooperation or transformation in developing criminal nexus. Findings also reveal the organizational level at which terrorists interact with criminals, and the processes through which they use marketplace interactions, prison-based radicalization, and virtual crime-linkage to expand their operations.
Journal: Studies in Conflict & Terrorism
Pages: 1678-1701
Issue: 9
Volume: 46
Year: 2023
Month: 9
X-DOI: 10.1080/1057610X.2020.1868099
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1868099
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:9:p:1678-1701



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1868094_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Barak Mendelsohn
Author-X-Name-First: Barak
Author-X-Name-Last: Mendelsohn
Title: The Limits of Ideologically-Unlikely Partnerships: Syria’s Support for Jihadi Terrorist Groups
Abstract: 
 Why did Syria collaborate with al-Qaeda’s Iraqi branch after 2003 and with ISIS during the Syrian civil war? States’ support for terrorist groups is risky, but cooperation with jihadi actors who see the Syrian regime as an enemy and wish to impose a radical Islamic rule in its stead is particularly dangerous. This paper argues that such ideologically-unlikely partnerships reveal the workings of the instrumental logic behind state-sponsored terrorism. Collaborating with terrorist groups is a rational strategy. States such as Syria will partner with ideologically-incompatible terrorist groups when they judge there to be a greater and more urgent threat from a third actor; when they believe the partnership would give them unique capabilities or produce special, otherwise unattainable effects; and when they believe they can shield themselves from the relationship’s potential adverse effects. The Syrian case also shows that such a pairing is likely to have limited utility. In order to have meaningful impact, the terrorist group must have a significant role, but the greater this role is, the higher the direct danger the group poses to its ally and the greater the likelihood of international action against the sponsoring state.
Journal: Studies in Conflict & Terrorism
Pages: 1653-1677
Issue: 9
Volume: 46
Year: 2023
Month: 9
X-DOI: 10.1080/1057610X.2020.1868094
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1868094
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:9:p:1653-1677



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1862952_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Victor Asal
Author-X-Name-First: Victor
Author-X-Name-Last: Asal
Author-Name: Daren Fisher
Author-X-Name-First: Daren
Author-X-Name-Last: Fisher
Author-Name: Joe Young
Author-X-Name-First: Joe
Author-X-Name-Last: Young
Title: Target Them with What? Why States Choose Different COIN Strategies for Different Insurgent Organizations
Abstract: 
 Why do some governments negotiate with insurgent organizations while others use force? This study examines the factors that influence these strategic government approaches to insurgencies using an original data set of state actions toward 140 insurgent groups between 1998 and 2012. We develop a simple model to explain government policy choice and test on these original data. After accounting for ideological differences and insurgent organization alliances, our findings suggest that the size of the insurgent group, the extent of previous lethal violence, and previous government decisions all influence government selection of conciliatory, repressive, mixed, and non-response strategies. We conclude by discussing the implications for how governments make counterterrorism/counterinsurgency strategy.
Journal: Studies in Conflict & Terrorism
Pages: 1766-1783
Issue: 9
Volume: 46
Year: 2023
Month: 9
X-DOI: 10.1080/1057610X.2020.1862952
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1862952
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:46:y:2023:i:9:p:1766-1783

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1723276_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Scott Fitzsimmons
Author-X-Name-First: Scott
Author-X-Name-Last: Fitzsimmons
Title: Contracting Blowback?: The Use of Violence by Private Security Companies and Insurgents during the Iraq War
Abstract: 
 This article assesses the influence of Private Security Companies’ (PSCs’) violence against insurgents and noncombatants on the frequency of insurgent attacks against PSCs during the 2004 to 2009 period of the Iraq War. It finds that PSC violence may have exerted fairly weak influence on short-term variations in the frequency with which insurgents attacked the firms. It also finds that variations in the frequency of insurgent attacks against PSCs may have been at least partly a side-effect of variations in the overall frequency of insurgent violence in Iraq that were, in turn, driven by events that were beyond the firms’ control.
Journal: Studies in Conflict & Terrorism
Pages: 78-97
Issue: 1
Volume: 47
Year: 2024
Month: 1
X-DOI: 10.1080/1057610X.2020.1723276
File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1723276
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:1:p:78-97



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1937821_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: János Besenyő
Author-X-Name-First: János
Author-X-Name-Last: Besenyő
Author-Name: Krisztina Márton
Author-X-Name-First: Krisztina
Author-X-Name-Last: Márton
Author-Name: Ryan Shaffer
Author-X-Name-First: Ryan
Author-X-Name-Last: Shaffer
Title: Hospital Attacks Since 9/11: An Analysis of Terrorism Targeting Healthcare Facilities and Workers
Abstract: 
 This article explores terrorism against healthcare facilities and workers throughout the world since September 11, 2001 to assess trends in these attacks. Using five datasets, it examines the increased risk of terrorist attacks against healthcare facilities and workers, and analyzes when, where and how these largely soft targets have been attacked by terrorists. The article provides a quantitative and qualitative analysis about the types of attacks and concludes with recommendations for healthcare facilities to mitigate the risk of terrorist attacks as well as provides suggestions for further studies.
Journal: Studies in Conflict & Terrorism
Pages: 36-59
Issue: 1
Volume: 47
Year: 2024
Month: 1
X-DOI: 10.1080/1057610X.2021.1937821
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1937821
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:1:p:36-59



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1940472_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tadeusz Zieliński
Author-X-Name-First: Tadeusz
Author-X-Name-Last: Zieliński
Title: On Theory and Practice of No-Fly Zones in Humanitarian Intervention
Abstract: 
 Drastic violations of human rights, humanitarian crises or genocide constituted a basis for the intervention of military forces under the flag of the UN or as part of a coalition of states after the end of Cold War. These activities have always been associated with a risk to the intervenors, mainly land units, hence the politicians’ reluctance to make decisions about sending soldiers to a crisis area. Therefore, often the only tool in the hands of politicians remains air power, which enforces a ban on flying over a defined area established by the international community. In the article the phenomenon of humanitarian intervention in the context of international law is the basis for identifying no-fly zones as a political and military tool necessary to resolve crises as part of humanitarian interventions. In addition, it defines what no-fly zones are, the objectives, forms and principles of their creation, as also presents arguments for using air power (air forces) to carry out this type of mission, but also doubts related to their functioning. Theoretical considerations were supported by examples from the use of aviation to enforce no-fly zones in Iraq (1991–2003), Bosnia and Herzegovina (1992–1995) and Libya (2011).
Journal: Studies in Conflict & Terrorism
Pages: 60-77
Issue: 1
Volume: 47
Year: 2024
Month: 1
X-DOI: 10.1080/1057610X.2021.1940472
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1940472
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:1:p:60-77



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2247620_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Matthew L. N. Wilkinson
Author-X-Name-First: Matthew L. N.
Author-X-Name-Last: Wilkinson
Author-Name: Muzammil Quraishi
Author-X-Name-First: Muzammil
Author-X-Name-Last: Quraishi
Title: Defining and Illustrating “Extremism” Using the Largest Investigation into Islam in Prison
Abstract: 
 In the context of a damaging absence of clarity, we define “Islamist Extremism” as: the absolutely divided and antagonistic Worldview of the “Us”-true-Muslim “in-group” who must strive to live in an “Islamic” State versus “Them”-non-Muslim’ and “wrong”-Muslim “out-groups” who are stripped of their human status due to their opposition to “true Islam.” We illustrate this definition of “Extremism” - including showing how Islamist Extremism is different from Mainstream Islam - using fresh empirical data from the largest ever study of Islam and Muslims in prison. We proceed to show how this definition of “Extremism” can be used as the basis for understanding processes of radicalization and de-radicalization in and outside prison. We then extrapolate from the case of Islamist Extremism in prison to suggest a working definition of “Extremism” more generally as: any absolutely divided “Us” versus “Them” Worldview by which a “chosen” in-group strips “condemned” out-groups of their basic human qualities, properties and rights and thereby sets them up for harm.
Journal: Studies in Conflict & Terrorism
Pages: 1-35
Issue: 1
Volume: 47
Year: 2024
Month: 1
X-DOI: 10.1080/1057610X.2023.2247620
File-URL: http://hdl.handle.net/10.1080/1057610X.2023.2247620
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:1:p:1-35



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2229088_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Beatrice de Graaf
Author-X-Name-First: Beatrice
Author-X-Name-Last: de Graaf
Author-Name: Nikki Sterkenburg
Author-X-Name-First: Nikki
Author-X-Name-Last: Sterkenburg
Author-Name: Jorin Dijkstra
Author-X-Name-First: Jorin
Author-X-Name-Last: Dijkstra
Author-Name: Tessa Glas
Author-X-Name-First: Tessa
Author-X-Name-Last: Glas
Title: Discussing Terrorism in the Classroom – Adopting an Empathizing and Historical Perspective: A Research Note
Abstract: 
 In this article, we examine the pre-existing state of knowledge, attitudes and sentiments that pupils have and display in relation to terrorism and violent extremism. Based on our experiences with our historical-pedagogical TerInfo project, we propose a new approach for dealing with these topics in the classroom: the adoption of an historicizing approach in teaching about terrorism in class. This approach relies on the creation of a historical framework that serves as a tool to both deal with emotions of shock and panic, and to help teachers and pupils find an objectified ground to discuss terrorism on a knowledge-informed base.
Journal: Studies in Conflict & Terrorism
Pages: 98-114
Issue: 1
Volume: 47
Year: 2024
Month: 1
X-DOI: 10.1080/1057610X.2023.2229088
File-URL: http://hdl.handle.net/10.1080/1057610X.2023.2229088
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:1:p:98-114

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2024943_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Shandon Harris-Hogan
Author-X-Name-First: Shandon
Author-X-Name-Last: Harris-Hogan
Author-Name: Amarnath Amarasingam
Author-X-Name-First: Amarnath
Author-X-Name-Last: Amarasingam
Author-Name: Lorne L. Dawson
Author-X-Name-First: Lorne
Author-X-Name-Last: L. Dawson
Title: A Comparative Analysis of Australian and Canadian Foreign Fighters Traveling to Syria and Iraq
Abstract: 
 This article provides a comparative analysis of Jihadist foreign fighters who traveled from Australia and Canada to engage in the conflict in Syria and Iraq. Data are provided on the demographics of those who traveled, group affiliations, when and how they traveled, and their social connections. Despite the strong similarities between these societies, significant differences are detected across levels of educational attainment, immediate familial status, and the degree of connection to existing Jihadist networks. The Australian and Canadian foreign fighters also differ, in key respects, from their European counterparts, and even those from the United States. Consideration is given to the possible significance of these differences, as well as the possible return of those currently detained in the region.
Journal: Studies in Conflict & Terrorism
Pages: 1230-1260
Issue: 10
Volume: 47
Year: 2024
Month: 10
X-DOI: 10.1080/1057610X.2021.2024943
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2024943
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:10:p:1230-1260



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2015820_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Stephen J. Ceccoli
Author-X-Name-First: Stephen J.
Author-X-Name-Last: Ceccoli
Title: Foreign Policy Orientations and U.S. Counterterrorism Support
Abstract: 
 Since terrorism has an undeniable psychological component; how citizens think about counterterrorism offers important implications for determining successful state responses. This research note examines empirical linkages between foreign policy preferences and support for eight counterterrorism measures, especially military-focused approaches associated with the “war model” of counterterrorism. Findings derived from the Chicago Council Survey of American Public Opinion and U.S. Foreign Policy indicate that traditional foreign policy orientations, especially internationalist and militarist postures, condition respondent counterterrorism preferences in important ways beyond ideology and partisan identification. Moreover, threat perceptions consistently predict respondent support for both violent and restrictive counterterrorism measures.
Journal: Studies in Conflict & Terrorism
Pages: 1366-1381
Issue: 10
Volume: 47
Year: 2024
Month: 10
X-DOI: 10.1080/1057610X.2021.2015820
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2015820
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:10:p:1366-1381



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2017395_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lotta Rahlf
Author-X-Name-First: Lotta
Author-X-Name-Last: Rahlf
Title: Beyond Healthy Skepticism: Exploring German News Media Framing of Terrorism-Affiliated Women Returnees
Abstract: 
 Various feminist contributions to Terrorism Studies provide insight into how the media rationalizes terrorism-affiliated women through framing, but the question of how newspapers frame women returnees remains scarcely explored. Through a semantic content analysis of 63 German news articles, supplemented by interviews with journalists, this article reveals how German news media framing fosters a skeptical attitude toward women returnees. This effect is further reinforced when accompanied by a portrayal of individual returnees as irresponsible mothers. In contrast to the treatment of terrorism-affiliated women in general, the framing of women returnees does not seek to rationalize their violence, but instead provides moral guidance regarding security responses.
Journal: Studies in Conflict & Terrorism
Pages: 1200-1229
Issue: 10
Volume: 47
Year: 2024
Month: 10
X-DOI: 10.1080/1057610X.2021.2017395
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2017395
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:10:p:1200-1229



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2037185_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Rune Ellefsen
Author-X-Name-First: Rune
Author-X-Name-Last: Ellefsen
Author-Name: Sveinung Sandberg
Author-X-Name-First: Sveinung
Author-X-Name-Last: Sandberg
Title: Everyday Prevention of Radicalization: The Impacts of Family, Peer, and Police Intervention
Abstract: 
 This study examines early intervention against individual radicalization. The data originate from interviews with young Muslims in Norway who had experienced interventions related to their own radicalization, or engaged in or witnessed interventions directed at a radicalized peer or relative. We find that informal interventions by family and friends were most prevalent in the data and played the most decisive role in interrupting radicalization, while police interventions were less common and had mixed results. Interventions by family or peers often came early in the radicalization process, were employed by trusted “insiders”, and took place as part of everyday life, thus having less detrimental consequences for radicalized individuals. We finally discuss the challenges of combining interventions by family members and friends with involvements from the police and security service.
Journal: Studies in Conflict & Terrorism
Pages: 1342-1365
Issue: 10
Volume: 47
Year: 2024
Month: 10
X-DOI: 10.1080/1057610X.2022.2037185
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2037185
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:10:p:1342-1365



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2034852_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Wesley S. McCann
Author-X-Name-First: Wesley S.
Author-X-Name-Last: McCann
Title: Outbreak: A Comprehensive Analysis of Biological Terrorism♦
Abstract: 
 Only a few studies on biological terrorism have ever been conducted empirically. Many of these focus on CBRN terrorism as a whole, rather than biological terrorism, specifically. Other accounts utilize a case- or historical analysis instead. This study serves as the most comprehensive empirical assessment of bioterrorism to date by drawing on the Profiles of Incidents involving CBRN and Non-State Actors (POICN) Database at START as well as additional databases. The databases were merged to create a database whereby both CBRN and non-CBRN cases were included for both individuals and groups. Several binary logistic regression models (1990-2016) were then executed on biological weapons pursuit. The type of actor and ideology seem to be the most important factors for predicting biological weapons pursuit, although ethnic fractionalization was also negatively correlated with biological weapons pursuit. Governance measures had variable, but negative relationships with pursuit as well. Implications and recommendations are discussed.
Journal: Studies in Conflict & Terrorism
Pages: 1299-1328
Issue: 10
Volume: 47
Year: 2024
Month: 10
X-DOI: 10.1080/1057610X.2022.2034852
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2034852
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:10:p:1299-1328



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2018903_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Barak Mendelsohn
Author-X-Name-First: Barak
Author-X-Name-Last: Mendelsohn
Title: Casting Shadow: Founders and the Unique Challenges of a Terrorist Group’s First Leadership Change
Abstract: 
 The first transfer of power presents unique challenges to terrorist groups. Four challenges of succession are more manifest the first time a terrorist group undergoes transition: first, a lack of precedent creates greater uncertainty about the group’s ability to survive leadership change; second, where the new leader replaces a mythical founder, there is an inevitable negative comparison to the predecessor; third, the successor must prevent infighting and splintering that results when the glue that held the group together is lost; and fourth, a first successor often has to shift the source of organizational authority from charismatic leadership to a rational-bureaucratic model. This article argues that the shadow of the departing leader and his actions in preparation for power transition affect the magnitude of the challenges his successor faces. Three case studies—al-Qaeda, the Peruvian Sendero Luminoso (Shining Path), and the Abu Nidal organization—demonstrate both first succession challenges and the role of founders in shaping these challenges’ magnitude.
Journal: Studies in Conflict & Terrorism
Pages: 1147-1171
Issue: 10
Volume: 47
Year: 2024
Month: 10
X-DOI: 10.1080/1057610X.2021.2018903
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2018903
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:10:p:1147-1171



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2025020_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Patrick Bury
Author-X-Name-First: Patrick
Author-X-Name-Last: Bury
Title: Post-Fordism and the Transformation of Transatlantic Counter-Terrorism
Abstract: 
 There is growing evidence that, led by the U.S., a transformation of trans-Atlantic counter-terrorism (CT) has occurred since 9/11. However, a theoretically informed framework for understanding how this has happened remains elusive. Using post-Fordist industrial theory and new evidence collected from senior practitioners across the trans-Atlantic space, this article provides a novel conceptual framework for understanding how states have transformed CT organization since 9/11, primarily in response to global jihadism. It shows how many of these solutions are remarkably similar and based on post-Fordist business and/or military best practices, including centralization and decentralization; integration of core and periphery workforces; a network approach to knowledge sharing; and outsourcing. The conclusion discusses the effectiveness of these solutions and their use in meeting new policy challenges.
Journal: Studies in Conflict & Terrorism
Pages: 1261-1285
Issue: 10
Volume: 47
Year: 2024
Month: 10
X-DOI: 10.1080/1057610X.2021.2025020
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2025020
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:10:p:1261-1285



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2028684_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Patrick J. Burke
Author-X-Name-First: Patrick J.
Author-X-Name-Last: Burke
Title: Civil-Military Relations and Civilian Victimization in Civil War
Abstract: 
 Why do some states victimize noncombatants during civil war? Scholars have identified regime type, international norms, and battlefield conditions as important factors explaining variation in outcomes. Here I argue that understanding variation in civilian victimization requires the identification of the institutional interests of those in control of the state. Civilian victimization is likely when the military controls pre-war planning and execution because of the institutional goal of winning wars quickly and efficiently by attacking every major source of enemy power. This often includes noncombatants. Most civilian leaders’ institutional goals, however, are centered around governance. Thus, these leaders prefer restraint from victimization because they often believe such barbarity will result in future difficulties for governance. I test my argument alongside others through a binary regression analysis of 103 conflict dyads between 1989 and 2010 and find that the variable for militarily dominated governments maintains significance across model specifications and features the largest effect size of any variable.
Journal: Studies in Conflict & Terrorism
Pages: 1286-1298
Issue: 10
Volume: 47
Year: 2024
Month: 10
X-DOI: 10.1080/1057610X.2022.2028684
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2028684
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:10:p:1286-1298



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2037630_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: A. Wood
Author-X-Name-First: A.
Author-X-Name-Last: Wood
Author-Name: P. Tanteckchi
Author-X-Name-First: P.
Author-X-Name-Last: Tanteckchi
Author-Name: D. A. Keatley
Author-X-Name-First: D. A.
Author-X-Name-Last: Keatley
Title: A Crime Script Analysis of Involuntary Celibate (INCEL) Mass Murderers
Abstract: 
 Involuntary Celibates (INCELs) are an increasing concern in academia and policing. Owing to the rise of internet sub-groups, understanding the developmental processes of INCELs is necessary to assist with investigations. The current research used a temporal method, Crime Script Analysis, to map the life histories of INCELs. Results indicated overlaps between INCELs and other forms of extremism and terrorism, while indicating developmental differences in terms of rejection and life histories. This research provides a new approach to understanding INCELs and forms the basis for future research using other temporal methods to better understand the life history of INCELs.
Journal: Studies in Conflict & Terrorism
Pages: 1329-1341
Issue: 10
Volume: 47
Year: 2024
Month: 10
X-DOI: 10.1080/1057610X.2022.2037630
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2037630
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:10:p:1329-1341



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2024944_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ariel Koch
Author-X-Name-First: Ariel
Author-X-Name-Last: Koch
Title: The ONA Network and the Transnationalization of Neo-Nazi-Satanism
Abstract: 
 This article focuses on the Order of the Nine Angles (ONA), which from a fringe group of the British far-right in the 1970s has evolved a violent philosophy and a loose and leaderless network of individuals and groups that merge National Socialism and Satanism; endorses tyrants, cult leaders, non-NS terrorists, and child-abusers; promotes violence, celebrates death, and advocates for real-life actions. The article will analyze the connection between ONA’s philosophy and the development of what can be called Fused Extremism. This phenomenon manifests itself in groups that merge different types of violent extremism and have crystallized through the Internet into a trans-national, leaderless, decentralized, and subversive network that promotes terrorism and violence.
Journal: Studies in Conflict & Terrorism
Pages: 1172-1199
Issue: 10
Volume: 47
Year: 2024
Month: 10
X-DOI: 10.1080/1057610X.2021.2024944
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2024944
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:10:p:1172-1199

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2034223_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Willem de Lint
Author-X-Name-First: Willem
Author-X-Name-Last: de Lint
Author-Name: Rodrigo Praino
Author-X-Name-First: Rodrigo
Author-X-Name-Last: Praino
Title: Does Martialization Contribute to Australia’s Right-Wing Extremism? Implications of an Analysis of the General Social Survey
Abstract: 
 Concept review on right-wing extremism (RWE) holds that authoritarianism, nationalism and anti-democracy are the values that most strongly correlate. Evidence suggests these views are prevalent among military veterans. In this paper we test the hypothesis that individuals that are subjected to martialization are more likely to hold RWE values than other individuals. Using the General Social Survey, which permits the operationalization of authoritarianism, nationalism and anti-democracy into 12 dependent variables, we find that individuals with high levels of exposure to martialization show higher probability of preferring a more extreme stance for every single dependent variable modeled for every year included in the analysis. The result suggests that counter-extremism policy must not ignore the overwhelming impact of military experience where “hearts and minds” are shaped.
Journal: Studies in Conflict & Terrorism
Pages: 1471-1494
Issue: 11
Volume: 47
Year: 2024
Month: 11
X-DOI: 10.1080/1057610X.2022.2034223
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2034223
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:11:p:1471-1494



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2034224_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Wahyudi Akmaliah
Author-X-Name-First: Wahyudi
Author-X-Name-Last: Akmaliah
Author-Name: Priyambudi Sulistiyanto
Author-X-Name-First: Priyambudi
Author-X-Name-Last: Sulistiyanto
Author-Name:  Sukendar
Author-X-Name-First: 
Author-X-Name-Last: Sukendar
Title: Making Moderate Islam in Indonesia
Abstract: 
 This article examines the roles of the late Abdurrahman Wahid and Syafi’i Maarif in the promotion of moderate Islam in post-Suharto Indonesia. Both as formerly prominent leaders within Indonesia’s largest Muslim organizations, Nahdatul Ulama and Muhammadiyah, their earlier influences through family, education and travels abroad are examined, and how these shaped their views and ideas on moderate Islam within Indonesia. The establishment of their namesake institutions, the Wahid Foundation and the Maarif Institute, is discussed, as is the ongoing legacy of these two men and their principles and ideas about moderate Islam. The inspirational influence of both Wahid and Maarif on the younger generations across Indonesia warrants critical attention, in particular as Indonesia is facing an upsurge of disunity and religious discrimination.
Journal: Studies in Conflict & Terrorism
Pages: 1495-1509
Issue: 11
Volume: 47
Year: 2024
Month: 11
X-DOI: 10.1080/1057610X.2022.2034224
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2034224
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:11:p:1495-1509



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2034217_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Susilo Wibisono
Author-X-Name-First: Susilo
Author-X-Name-Last: Wibisono
Author-Name: Winnifred R. Louis
Author-X-Name-First: Winnifred R.
Author-X-Name-Last: Louis
Author-Name: Jolanda Jetten
Author-X-Name-First: Jolanda
Author-X-Name-Last: Jetten
Title: Willingness to Engage in Religious Collective Action: The Role of Group Identification and Identity Fusion
Abstract: 
 In Study 1, 239 Indonesian Muslims reported their religious identification, identity fusion and their willingness to engage in peaceful and violent collective action. Both religious identification and identity fusion were positively associated with peaceful collective action. In addition, when the role of identity fusion was controlled, identification was found to be negatively associated with support for violence. A second study (N = 176 Indonesian Muslims) found that religious identification was positively associated with peaceful collective action. However, even though identity fusion was again positively associated with support for violence, identification was not a significant predictor when controlling for identity fusion.
Journal: Studies in Conflict & Terrorism
Pages: 1519-1532
Issue: 11
Volume: 47
Year: 2024
Month: 11
X-DOI: 10.1080/1057610X.2022.2034217
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2034217
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:11:p:1519-1532



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2034216_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Halim Rane
Author-X-Name-First: Halim
Author-X-Name-Last: Rane
Author-Name: Shane Satterley
Author-X-Name-First: Shane
Author-X-Name-Last: Satterley
Author-Name: Riyad H. Rahimullah
Author-X-Name-First: Riyad H.
Author-X-Name-Last: Rahimullah
Title: Education and Islamist Jihadism: A Survey of Muslim Australians
Abstract: 
 This article presents findings from a national survey of 1034 Muslim Australians, examining the relationship between educational qualifications and Islamist-jihadist interpretations of Islam. A minority of respondents identified with indicators of Islamism, while a smaller sub-group identified with those associated with jihadism. Respondents educated in STEM (science, technology, engineering and mathematics) fields were more likely than their HSS (humanities and social science) counterparts to accept ideas associated with Islamism and to a much lesser extent jihadism. Ideas associated with jihadism were more likely among respondents without a tertiary qualification than among those educated in either HSS or STEM fields.
Journal: Studies in Conflict & Terrorism
Pages: 1403-1426
Issue: 11
Volume: 47
Year: 2024
Month: 11
X-DOI: 10.1080/1057610X.2022.2034216
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2034216
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:11:p:1403-1426



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2034232_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Claire Smith
Author-X-Name-First: Claire
Author-X-Name-Last: Smith
Author-Name: Lucy Resnyansky
Author-X-Name-First: Lucy
Author-X-Name-Last: Resnyansky
Author-Name: Craig Taylor
Author-X-Name-First: Craig
Author-X-Name-Last: Taylor
Title: Radicalization in the Asia-Pacific Region: Themes and Concepts
Journal: Studies in Conflict & Terrorism
Pages: 1383-1387
Issue: 11
Volume: 47
Year: 2024
Month: 11
X-DOI: 10.1080/1057610X.2022.2034232
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2034232
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:11:p:1383-1387



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2034220_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David Duriesmith
Author-X-Name-First: David
Author-X-Name-Last: Duriesmith
Author-Name: Noor Huda Ismail
Author-X-Name-First: Noor Huda
Author-X-Name-Last: Ismail
Title: Masculinities and Disengagement from Jihadi Networks: The Case of Indonesian Militant Islamists
Abstract: 
 Men who join militant Islamist networks often frame their participation in masculine terms, as protectors, warriors or brothers. While the role of masculinities in recruitment to jihadi groups has received increasing attention, their role in disengaging men from armed groups (and particularly men in the global south) have not. This paper explores the role of masculinities in shaping men’s paths out of jihadi networks. Based on life history research with Indonesian former militant Islamist we suggest that men’s pathways out of armed groups are defined by negotiating alternate masculinities, which reposition their gendered role in society from those associated with militancy.
Journal: Studies in Conflict & Terrorism
Pages: 1450-1470
Issue: 11
Volume: 47
Year: 2024
Month: 11
X-DOI: 10.1080/1057610X.2022.2034220
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2034220
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:11:p:1450-1470



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2034229_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Lucy Resnyansky
Author-X-Name-First: Lucy
Author-X-Name-Last: Resnyansky
Author-Name: Claire Smith
Author-X-Name-First: Claire
Author-X-Name-Last: Smith
Author-Name: Craig Taylor
Author-X-Name-First: Craig
Author-X-Name-Last: Taylor
Author-Name: Priyambudi Sulistiyanto
Author-X-Name-First: Priyambudi
Author-X-Name-Last: Sulistiyanto
Author-Name: George Merryman
Author-X-Name-First: George
Author-X-Name-Last: Merryman
Author-Name:  Mujahiduddin
Author-X-Name-First: 
Author-X-Name-Last: Mujahiduddin
Title: Reasons behind Reasons: A Communitarian Reading of Women’s Radicalization and Family Bombings in Southeast Asia
Abstract: 
 This paper analyses conceptual frameworks that have been suggested in the literature for understanding women’s radicalization, including the emergent phenomenon of family bombings, focusing on Indonesia and Malaysia. We argue that understanding these trends requires grappling with socio-culturally specific gender-related concepts and that the liberal political theory framework that has informed a significant body of research in this area, with its emphasis on individuality, has limited utility for making sense of the new models of women’s engagement in extremism in Southeast Asia’. We suggest that a communitarian philosophical framework has the potential to provide new context-specific insights on radicalization, extremism and terrorism in Southeast Asia. We apply this approach to a reading of the family suicide bombings in Surabaya and Sidoarjo, East Java, Indonesia, in May 2018.
Journal: Studies in Conflict & Terrorism
Pages: 1533-1558
Issue: 11
Volume: 47
Year: 2024
Month: 11
X-DOI: 10.1080/1057610X.2022.2034229
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2034229
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:11:p:1533-1558



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2034221_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Muhammad Iqbal
Author-X-Name-First: Muhammad
Author-X-Name-Last: Iqbal
Author-Name: Kerry S. O’Brien
Author-X-Name-First: Kerry S.
Author-X-Name-Last: O’Brien
Author-Name: Ana-Maria Bliuc
Author-X-Name-First: Ana-Maria
Author-X-Name-Last: Bliuc
Title: The Relationship between Existential Anxiety, Political Efficacy, Extrinsic Religiosity and Support for Violent Extremism in Indonesia
Abstract: 
 Young people’s involvement in violent extremism remains a concern in many countries, including Indonesia. This study examined direct and indirect relationships between indicators of existential anxiety, political efficacy, extrinsic religiosity, and support for violent extremism. Two hundred and ten young Indonesians were recruited to the study and all completed an anonymous online survey containing the measures of interest. The findings suggest that indicators of existential anxiety are related to greater support for violent extremism, but this relationship may be dependent on perceptions of political efficacy and religious orientation. Future research could explore whether support for violent extremism can be reduced by enhancing young people’s sense of control and political efficacy.
Journal: Studies in Conflict & Terrorism
Pages: 1510-1518
Issue: 11
Volume: 47
Year: 2024
Month: 11
X-DOI: 10.1080/1057610X.2022.2034221
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2034221
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:11:p:1510-1518



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2034222_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Emma F. Thomas
Author-X-Name-First: Emma F.
Author-X-Name-Last: Thomas
Author-Name: Nathan Leggett
Author-X-Name-First: Nathan
Author-X-Name-Last: Leggett
Author-Name: David Kernot
Author-X-Name-First: David
Author-X-Name-Last: Kernot
Author-Name: Lewis Mitchell
Author-X-Name-First: Lewis
Author-X-Name-Last: Mitchell
Author-Name: Saranzaya Magsarjav
Author-X-Name-First: Saranzaya
Author-X-Name-Last: Magsarjav
Author-Name: Nathan Weber
Author-X-Name-First: Nathan
Author-X-Name-Last: Weber
Title: Reclaim the Beach: How Offline Events Shape Online Interactions and Networks Amongst Those Who Support and Oppose Right-Wing Protest
Abstract: 
 In this paper we examine how offline protests attended by members of the Australian far-right shape online interactions. Tweets about the 2019 St Kilda beach rally were collected. Users were manually classified as supporters (n = 104) or opponents of the rally (n = 872). Network analysis demonstrated that interactions between the two groups increased at the time of the rally. Natural language processing showed that both groups became angrier and used more “othering” language during the rally. However, there were stark differences in the moral worldviews, highlighting the very different moral positions that underpin engagement with, and opposition to, the far-right agenda.
Journal: Studies in Conflict & Terrorism
Pages: 1427-1449
Issue: 11
Volume: 47
Year: 2024
Month: 11
X-DOI: 10.1080/1057610X.2022.2034222
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2034222
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:11:p:1427-1449



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2034231_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mirra Noor Milla
Author-X-Name-First: Mirra Noor
Author-X-Name-Last: Milla
Author-Name: Whinda Yustisia
Author-X-Name-First: Whinda
Author-X-Name-Last: Yustisia
Author-Name: Muhammad Abdan Shadiqi
Author-X-Name-First: Muhammad Abdan
Author-X-Name-Last: Shadiqi
Author-Name: Haykal Hafizul Arifin
Author-X-Name-First: Haykal Hafizul
Author-X-Name-Last: Arifin
Title: Mechanisms of 3N Model on Radicalization: Testing the Mediation by Group Identity and Ideology of the Relationship between Need for Significance and Violent Extremism
Abstract: 
 This paper seeks to examine the mechanisms of the 3 N model (need, narrative, and network) by testing a serial mediation model of group identity and ideology. We propose two rival hypotheses: need for significance predicts violent extremism, and its relationship is serially mediated by (1) group identity and ideology (Model 1); (2) ideology and group identity (Model 2). To test the hypotheses, we conducted a survey of 137 terrorism detainees from prisons across Indonesia. The results revealed that Model 1 had a better fit than Model 2, suggesting the important role of group processes in developing violent extremism’s ideology.
Journal: Studies in Conflict & Terrorism
Pages: 1388-1402
Issue: 11
Volume: 47
Year: 2024
Month: 11
X-DOI: 10.1080/1057610X.2022.2034231
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2034231
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:11:p:1388-1402

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2068944_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel Byman
Author-X-Name-First: Daniel
Author-X-Name-Last: Byman
Author-Name: Asfandyar Mir
Author-X-Name-First: Asfandyar
Author-X-Name-Last: Mir
Title: Assessing al-Qaeda: A Debate
Abstract: 
 Twenty years after the 9/11 attacks, the current status and future of al-Qaeda is a central policy question, especially as the U.S. government looks to pivot away from counterterrorism toward managing great power competition. This article presents a debate on this issue between Daniel Byman and Asfandyar Mir. Mir argues that al-Qaeda remains a significant threat, committed to fighting the United States despite pressures to alter direction. The control of al-Qaeda central over its major regional affiliates remains strong, with steady growth in capability. It also retains important allies and has major opportunities due to the return of the Taliban in Afghanistan, the domestic political environment, changing priorities in the United States, and great power competition. Byman, in contrast, contends that al-Qaeda suffers debilitating organizational problems, with affiliates having localized and the movement lacking a haven remotely comparable to pre-9/11 Afghanistan. In addition, improved counterterrorism keeps al-Qaeda off balance. If al-Qaeda remains a major threat, counterterrorism must remain among the United States’ major national security priorities, even if it is not the top one, and robust counterterrorism measures need to be sustained. If al-Qaeda is weak, the importance of counterterrorism in the hierarchy of U.S. foreign policy priorities can fall substantially.
Journal: Studies in Conflict & Terrorism
Pages: 1559-1598
Issue: 12
Volume: 47
Year: 2024
Month: 12
X-DOI: 10.1080/1057610X.2022.2068944
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2068944
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:12:p:1559-1598



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2074394_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Amiad Haran Diman
Author-X-Name-First: Amiad
Author-X-Name-Last: Haran Diman
Author-Name: Dan Miodownik
Author-X-Name-First: Dan
Author-X-Name-Last: Miodownik
Title: Social Cohesion and Collective Violence: Latent Variable Approach to Explaining Riots in East Jerusalem
Abstract: 
 Does social cohesion explain variation in violence within divided cities? In line with insights drawn from the ethnic politics, criminology and urban geography literature we suggest that explaining variation in intergroup violence is not possible by relying on motivational elements alone, and attention to social cohesion is required as well. While cohesion can facilitate collective action that aids violent mobilization, it can also strengthen social order that contributes to the group’s capability to control and prevent unrest. We test these relationships using an application of a latent variable model to an integration of survey results, crime data and expert-coded data in order to measure cohesion in East Jerusalem neighborhoods. We then analyze its impact on riots using three original geolocated datasets recording violence in the neighborhoods between the years 2013 and 2015. Our results reveal that even with controls for economic and political determinants of violence, as well as for spatial clustering and temporal explanations, neighborhood-level social cohesion is a robust explanatory variable that negatively correlates with riots.
Journal: Studies in Conflict & Terrorism
Pages: 1772-1799
Issue: 12
Volume: 47
Year: 2024
Month: 12
X-DOI: 10.1080/1057610X.2022.2074394
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2074394
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:12:p:1772-1799



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2045967_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ido Levy
Author-X-Name-First: Ido
Author-X-Name-Last: Levy
Author-Name: Abdi Yusuf
Author-X-Name-First: Abdi
Author-X-Name-Last: Yusuf
Title: The “Lightning” Brigade: Security Force Assistance and the Fight Against al-Shabaab
Abstract: 
 In the fight against the terrorist group al-Shabaab, the Somali National Army has suffered acute personnel, training, funding, and other difficulties that have rendered it ineffective. The U.S.-trained Danab Brigade has proven capable in breaking the ineffectiveness pattern. Drawing on over 20 interviews with Somali officials and service members, this paper analyzes U.S. security force assistance in the case of Somalia. Danab’s sound performance stems from its U.S. training and support, multi-clan ethos, and aggressive tactical style. Danab exemplifies American success in building small, aggressive, mobile partner military forces. The recent U.S. withdrawal from Somalia raises questions about Danab’s continued viability.
Journal: Studies in Conflict & Terrorism
Pages: 1800-1825
Issue: 12
Volume: 47
Year: 2024
Month: 12
X-DOI: 10.1080/1057610X.2022.2045967
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2045967
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:12:p:1800-1825



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2043226_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ellen Tveteraas
Author-X-Name-First: Ellen
Author-X-Name-Last: Tveteraas
Title: Under the Hood – Learning and Innovation in the Islamic State’s Suicide Vehicle Industry
Abstract: 
 This article explores how the Islamic State learned from its suicide bombings, a tactic that in theory undermines the in-group stability associated with organizational learning. Using interviews from Mosul and Baghdad together with internal documents from the Division of Soldiers it provides a case study of the learning and production process underlying innovations in suicide vehicle designs between 2014 and 2017. It examines how the group acquired, distributed, interpreted, implemented, and stored information from suicide vehicle operations in its military-industrial complex, and details how the group learned by maximizing continuity among personnel in support, coordinating, and production roles.
Journal: Studies in Conflict & Terrorism
Pages: 1648-1671
Issue: 12
Volume: 47
Year: 2024
Month: 12
X-DOI: 10.1080/1057610X.2022.2043226
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2043226
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:12:p:1648-1671



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2038409_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tanya Bandula-Irwin
Author-X-Name-First: Tanya
Author-X-Name-Last: Bandula-Irwin
Author-Name: Max Gallien
Author-X-Name-First: Max
Author-X-Name-Last: Gallien
Author-Name: Ashley Jackson
Author-X-Name-First: Ashley
Author-X-Name-Last: Jackson
Author-Name: Vanessa van den Boogaard
Author-X-Name-First: Vanessa
Author-X-Name-Last: van den Boogaard
Author-Name: Florian Weigand
Author-X-Name-First: Florian
Author-X-Name-Last: Weigand
Title: Beyond Greed: Why Armed Groups Tax
Abstract: 
 Based on a review of the diverse practices of how armed groups tax, we highlight that a full account of why armed groups tax needs to go beyond revenue motivations, to also engage with explanations related to ideology, legitimacy, institution building, legibility and control of populations, and the performance of public authority. This article builds on two distinct literatures, on armed groups and on taxation, to provide the first systematic exploration of the motivations of armed group taxation. We problematize common approaches toward armed group taxation and state-building, and outline key questions of a new research agenda.
Journal: Studies in Conflict & Terrorism
Pages: 1599-1622
Issue: 12
Volume: 47
Year: 2024
Month: 12
X-DOI: 10.1080/1057610X.2022.2038409
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2038409
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:12:p:1599-1622



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2043225_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mohammed Samir Elshimi
Author-X-Name-First: Mohammed Samir
Author-X-Name-Last: Elshimi
Title: The Constraints Hypothesis: Rethinking Causality in Deradicalisation, Disengagement and Reintegration Pathways. A Complex Systems Perspective
Abstract: 
 This paper re-frames the concept of causality in deradicalisation, disengagement and reintegration pathways. Analysis of the theories and frameworks in counter-terrorism research indicate that prevalent causal models offer reductive explanations of human behavior, revealing the absence of a scientifically credible account of how agents undergo transformation in pathways out of terrorism. To address the problem of causality, I borrow from the thought bank of complexity theory and reconceptualise causality as the operation of “constraints.” The paper then goes on to operationalize the concept of constraints for counter-terrorism researchers and practitioners, laying down a new and preliminary conceptual framework for thinking about how people leave terrorism behind.
Journal: Studies in Conflict & Terrorism
Pages: 1623-1647
Issue: 12
Volume: 47
Year: 2024
Month: 12
X-DOI: 10.1080/1057610X.2022.2043225
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2043225
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:12:p:1623-1647



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2050484_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Vasabjit Banerjee
Author-X-Name-First: Vasabjit
Author-X-Name-Last: Banerjee
Title: Maintaining Dominance: Explaining the Rise of Late-Entering Insurgent Groups in El Salvador and Guatemala
Abstract: 
 Although there exists substantial political science research on insurgent group fragmentation, this process remains ignored in the decades long civil wars of El Salvador and Guatemala. A comparative analysis of insurgencies in El Salvador (1979–1983) and Guatemala (1962–1969 and 1979–1983) investigates whether late insurgent groups arise from opportunities created by early groups’ ability to: (a) present attractive ideologies; (b) establish cohesive organizations with popular, effective leaders; (c) and acquire resources. My findings suggest, late insurgent groups arise because early groups cannot create cohesive organizations with effective leadership. The effects of ideology and resources—important in research on insurgencies—are inconclusive.
Journal: Studies in Conflict & Terrorism
Pages: 1672-1698
Issue: 12
Volume: 47
Year: 2024
Month: 12
X-DOI: 10.1080/1057610X.2022.2050484
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2050484
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:12:p:1672-1698



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2065902_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jonathan Kenyon
Author-X-Name-First: Jonathan
Author-X-Name-Last: Kenyon
Author-Name: Jens Binder
Author-X-Name-First: Jens
Author-X-Name-Last: Binder
Author-Name: Christopher Baker-Beall
Author-X-Name-First: Christopher
Author-X-Name-Last: Baker-Beall
Title: Understanding the Role of the Internet in the Process of Radicalisation: An Analysis of Convicted Extremists in England and Wales
Abstract: 
 This study explores the Internet’s role in radicalization pathways and offending of 235 convicted extremists in England and Wales. A comprehensive database was developed by coding content of specialist assessment reports by professionals with direct contact with individuals concerned. A series of quantitative analyses were then conducted. Findings suggest the Internet is playing an increasingly prominent role in radicalization, with variations in online activities depending on pathway taken. Internet use has also changed over time, with increasing social media use. This study informs the debate on the Internet’s role within radicalization pathways, guiding counter-terrorism approaches and policy in this area.
Journal: Studies in Conflict & Terrorism
Pages: 1747-1771
Issue: 12
Volume: 47
Year: 2024
Month: 12
X-DOI: 10.1080/1057610X.2022.2065902
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2065902
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:12:p:1747-1771



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2055008_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Karl Kaltenthaler
Author-X-Name-First: Karl
Author-X-Name-Last: Kaltenthaler
Author-Name: Arie W. Kruglanski
Author-X-Name-First: Arie W.
Author-X-Name-Last: Kruglanski
Author-Name: Austin J. Knuppe
Author-X-Name-First: Austin J.
Author-X-Name-Last: Knuppe
Title: The Paradox of the Heavy-Handed Insurgent: Public Support for the Taliban among Afghan Pashtuns
Abstract: 
 Afghanistan is a profoundly insecure country, with a very high rate of insurgent violence affecting large swathes of the population. Despite contributing to physical and economic insecurity across the country, Taliban insurgents have succeeded in creating what we call the “paradox of the heavy-handed insurgent.” Insurgents use attacks on government-controlled areas to generate public support by fostering a reputation for effective security provision for the civilian population under its control. For civilians who have a strong unmet need for physical security – especially those in rural and contested communities – heavy-handed insurgents are preferable to government forces who are perceived as either incompetent or unwilling to provide governance. We test this argument using data from the 2018 Asia Society Survey of the Afghan People. We find that the most important factor driving sympathy for the Taliban among Afghan Pashtuns is their sense of insecurity where they live. This indicates that an insurgent group that wears down government forces and weakens their ability to provide public goods and services can actually benefit by appearing as the more viable alternative for governance despite their heavy-handed tactics.
Journal: Studies in Conflict & Terrorism
Pages: 1699-1723
Issue: 12
Volume: 47
Year: 2024
Month: 12
X-DOI: 10.1080/1057610X.2022.2055008
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2055008
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:12:p:1699-1723



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2058863_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Oscar L. Larsson
Author-X-Name-First: Oscar L.
Author-X-Name-Last: Larsson
Author-Name: J. J. Widen
Author-X-Name-First: J. J.
Author-X-Name-Last: Widen
Title: The European Union as a Maritime Security Provider – The Naval Diplomacy Perspective
Abstract: 
 The aim of this article is to assess how the European Union advances its role as a global security actor and how it deploys the military forces provided by the member states. Tracing the current debate of the identity and means of the European Union, we analyze the two maritime operations, EU NAVFOR Somalia (Operation Atalanta) and EUNAVFOR MED (Operation Sophia) from a naval diplomacy perspective. Naval diplomacy acknowledge a more versatile role for naval forces, not just military advancement and force projection. For this purpose, we need to go beyond mission descriptions and operational mandates in order to analyze and assess the two operations from within, relying on internal reports and interviews with senior officers who have participated in the operations. Results show that naval forces seeks cooperation with International organizations, NGOs, and third countries in order to facilitate security and good order of the global common of international water. Still, complex security problems are not resolved in this manner and EU maritime operations are highly political, thus facing an uncertain future as a tool of CSDP.
Journal: Studies in Conflict & Terrorism
Pages: 1724-1746
Issue: 12
Volume: 47
Year: 2024
Month: 12
X-DOI: 10.1080/1057610X.2022.2058863
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2058863
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:12:p:1724-1746

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1944023_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Gregory D. Koblentz
Author-X-Name-First: Gregory D.
Author-X-Name-Last: Koblentz
Author-Name: Stevie Kiesel
Author-X-Name-First: Stevie
Author-X-Name-Last: Kiesel
Title: The COVID-19 Pandemic: Catalyst or Complication for Bioterrorism?
Abstract: 
 The COVID-19 pandemic demonstrates how an infectious disease can cause massive casualties, destabilize governments, and garner intense media attention as countries struggle to respond effectively. Will the pandemic inspire terrorist groups to consider biological weapons, hoping to replicate these effects? This question is the latest iteration of the debate over the risk posed by bioterrorism, which is characterized by three camps: optimists, pessimists, and pragmatists. This article revisits these schools of thought in light of COVID-19 and analyzes recent developments among extremists to assess the new risk of bioterrorism. The article concludes with recommendations for policymakers to mitigate this risk.
Journal: Studies in Conflict & Terrorism
Pages: 154-180
Issue: 2
Volume: 47
Year: 2024
Month: 2
X-DOI: 10.1080/1057610X.2021.1944023
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1944023
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:2:p:154-180



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1945187_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jannis Saalfeld
Author-X-Name-First: Jannis
Author-X-Name-Last: Saalfeld
Title: Inter-Secular Party Competition and the (Non-)Formation of Salafi-Jihadist Milieus: Evidence from Tanzania and Kenya
Abstract: 
 This article investigates whether inter-secular party competition can constrain the formation of Salafi-jihadist milieus. Focusing on the recent rise of militant Islamism in sub-Saharan Africa, I argue that the electoral process prevents the opening of political space for jihadist radicalization when Salafi contention has historically become aligned with salient non-Islamist grievances. Specifically, I hypothesize that based on this alignment, the competitive electoralization of non-Islamist grievances incentivizes Salafi movements to endorse the electoral process and support secular parties. The article explores the validity of these propositions with the help of a “most-similar” case study of Zanzibar (Tanzania) and coastal Kenya.
Journal: Studies in Conflict & Terrorism
Pages: 181-198
Issue: 2
Volume: 47
Year: 2024
Month: 2
X-DOI: 10.1080/1057610X.2021.1945187
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1945187
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:2:p:181-198



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1943813_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: David Martin Jones
Author-X-Name-First: David Martin
Author-X-Name-Last: Jones
Author-Name: M. L. R. Smith
Author-X-Name-First: M. L. R.
Author-X-Name-Last: Smith
Title: The Age of Ambiguity: Art and the War on Terror Twenty Years after 9/11
Abstract: 
 9/11 and its aftermath was to have a dramatic impact on the visual arts and the artistic response to the War on Terror. This study surveys the evolution of these responses from the dramatic events of 11 September 2001 to the longer term reactions generated by the two-decade long encounter with the so-called War on Terrorism, primarily via the Imperial War Museum’s Age of Terror/Art Since 9/11 exhibition of 2017–2018. The analysis suggests that the visual artistic response moved from the initial amazement at the destruction of the Twin Towers, through satirical caricature of the terrorist persona, to a trite predictability that mirrored official equivocation about the threat posed by violent jihadist activism. Artistic endeavor on these terms became notable only for its moral ambiguity and complicity in self-censorship rather than contributing to the creation of artwork of enduring value.
Journal: Studies in Conflict & Terrorism
Pages: 115-134
Issue: 2
Volume: 47
Year: 2024
Month: 2
X-DOI: 10.1080/1057610X.2021.1943813
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1943813
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:2:p:115-134



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1956063_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Yasmine Ahmed
Author-X-Name-First: Yasmine
Author-X-Name-Last: Ahmed
Author-Name: Orla Lynch
Author-X-Name-First: Orla
Author-X-Name-Last: Lynch
Title: Terrorism Studies and the Far Right – The State of Play
Abstract: 
 Terrorism Studies as a specific area of research came to prominence in the aftermath of the September 11th 2001 terrorist attacks in the USA, but had existed across a range of disciplines long before albeit as a less consolidated and certainly less visible subject area. However, despite the existence of a body of work on terrorism, the impact of 9/11 on western perceptions of terrorism ensured that the direction of study was firmly focused on Islamic extremism for many years after the attacks. It is only very recently that significant attention has been focused on other ideologically motivated extremisms, namely the Far-Right. This article examines the nature of research into the Far-Right in the field of terrorism studies and examines what we mean when we refer to the Far-Right, and to what degree the field of terrorism studies has attended to this form of ideological extremism over the past two decades. In order to achieve these aims, this article presents an analysis of the academic publications concerned with the Far-Right produced in three Terrorism Studies journals: Terrorism and Political Violence, Studies in Conflict and Terrorism and Critical Studies in Terrorism. The results demonstrate that between 2001 and 2018 only 41 articles exclusively focus on the Far Right, and of these only 6 use primary data in their analysis. The results of a content analysis carried out on these 41 articles provides an insight into the research trajectory on the Far Right. Ultimately the results of the rapid appraisal and the content analysis speak to the extent to which and nature of how Far-Right terrorism is attended to in the field of Terrorism Studies.
Journal: Studies in Conflict & Terrorism
Pages: 199-219
Issue: 2
Volume: 47
Year: 2024
Month: 2
X-DOI: 10.1080/1057610X.2021.1956063
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1956063
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:2:p:199-219



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1961715_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Victor Asal
Author-X-Name-First: Victor
Author-X-Name-Last: Asal
Author-Name: David Malet
Author-X-Name-First: David
Author-X-Name-Last: Malet
Title: Nobody More Terrible than the Desperate: Conflict Conditions and Rebel Demand for Foreign Fighters
Abstract: 
 This article argues that the structural conflict conditions surrounding insurgencies produce rebel demand for external participation. Drawing on a data set of 140 militant organizations between 1998 and 2012, we find robust evidence that violence between insurgent groups is most likely to cause one or more of them to recruit externally. The effect is especially pronounced when regimes also employ punitive “stick” measures against opponents. Rather than a particular ideology being the best predictor of foreign fighters, it is desperate conflict conditions that lead insurgents to invest in the costs and uncertainties of outside assistance.
Journal: Studies in Conflict & Terrorism
Pages: 135-153
Issue: 2
Volume: 47
Year: 2024
Month: 2
X-DOI: 10.1080/1057610X.2021.1961715
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1961715
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:2:p:135-153

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1954798_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Cooper Vardy
Author-X-Name-First: Cooper
Author-X-Name-Last: Vardy
Title: Silesia to Sinjar: The Export and Adaption of Einsatzgruppen Mobilized Killing Tactics from Eastern Europe to the Middle East
Abstract: 
 While the Nazi war machine is best known for its use of concentration camps to exterminate vast swathes of Europe’s Jewish population, more than 1.5 million other “undesirables” were executed by mobile killing squads across Eastern Europe. More recently, the Islamic State in Iraq and Syria (ISIS) utilized similar tactics to ethnically cleanse the Levant of various racial and religious minorities, relying on an analogous form of execution. The present research note contends, building from these similarities in action, that the methods of genocide employed by ISIS are an adaptation of the tactics developed by German Einsatzgruppen in the 1940s. To argue this point, this note utilizes a comparative framework examining the mobilization, localization, preparation, execution, and burial of both groups, and posits that the similarities are the result of ideological and tactical cross-pollination between Nazis and Islamists during and after World War 2.
Journal: Studies in Conflict & Terrorism
Pages: 321-343
Issue: 3
Volume: 47
Year: 2024
Month: 3
X-DOI: 10.1080/1057610X.2021.1954798
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1954798
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:3:p:321-343



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1956062_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jason Warner
Author-X-Name-First: Jason
Author-X-Name-Last: Warner
Author-Name: Ellen Chapin
Author-X-Name-First: Ellen
Author-X-Name-Last: Chapin
Author-Name: Quinn Sorenson
Author-X-Name-First: Quinn
Author-X-Name-Last: Sorenson
Title: Bombing It: The Meaning and Sources of Suicide Bombing Failure
Abstract: 
 Over the years, political scientists and policymakers have striven to understand the circumstances under which terrorists fail, operationally and strategically. However, the question of failure has less frequently been approached through the lens of any one specific tactic. This article asks: how should one define and understand the sources of suicide bombing failure? After introducing a new definition of suicide bombing failure, the article next uses probit model analysis to test planner (or “architect”) versus militant (or “attacker”) sources of failure by using a unique dataset detailing the suicide bombing efforts of three of the most active African jihadist terror groups which leveraged suicide terrorism from 2007 to 2020 — al-Shabaab, “Boko Haram,” and Al-Qaeda in the Islamic Maghreb (“AQIM”). It finds evidence that choices made by these groups’ “architects,” are most commonly correlated with suicide bombing failures, rather than operational failures by “attackers” themselves.
Journal: Studies in Conflict & Terrorism
Pages: 249-277
Issue: 3
Volume: 47
Year: 2024
Month: 3
X-DOI: 10.1080/1057610X.2021.1956062
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1956062
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:3:p:249-277



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1956100_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel Byman
Author-X-Name-First: Daniel
Author-X-Name-Last: Byman
Title: Counterterrorism and Modern White Supremacy
Abstract: 
 Too often the terrorist threat is judged by lives lost, but less quantifiable metrics like political impact and strategic plausibility are also vital for understanding the danger. The history of the modern white supremacist movement in the United States illustrates different dimensions of how terrorism and political violence affect a country. Changing politics led to a devastating U.S. government crackdown on various Klan and like-minded groups in the mid and late 1960s. In the years that followed, violent white supremacist groups decentralized and followed new strategies, and the internet also transformed the movement. As a result, the threat white supremacists pose changed: they no longer enforce a structurally racist political and social system in the South, but they target a wider range of enemies, conduct bloodier attacks, and embrace sedition.
Journal: Studies in Conflict & Terrorism
Pages: 221-248
Issue: 3
Volume: 47
Year: 2024
Month: 3
X-DOI: 10.1080/1057610X.2021.1956100
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1956100
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:3:p:221-248



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1961673_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bárbara Motta
Author-X-Name-First: Bárbara
Author-X-Name-Last: Motta
Author-Name: David P. Succi Junior
Author-X-Name-First: David P.
Author-X-Name-Last: Succi Junior
Title: Legitimation through Collectivization: Al Qaeda and US Discourses on the Use of Force
Abstract: 
 Discursive struggles for legitimation are a constitutive feature of the politically guided deployment of force. This dynamic of political communication frequently entails engaging with multiple audiences, such as international, local, and intra-group. As it compels actors to diversify their narrative strategies, it often results in conflicting statements. We argue that a particular discursive strategy, which we call the collectivization of the self, provides actors with an instrument to address different audiences with a singular narrative. We present this strategy through a content and qualitative analysis of Bin Laden’s statements on terrorist actions and Bush’s speeches on the intervention in Afghanistan.
Journal: Studies in Conflict & Terrorism
Pages: 301-320
Issue: 3
Volume: 47
Year: 2024
Month: 3
X-DOI: 10.1080/1057610X.2021.1961673
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1961673
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:3:p:301-320



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1954353_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Thomas Juneau
Author-X-Name-First: Thomas
Author-X-Name-Last: Juneau
Title: How War in Yemen Transformed the Iran-Houthi Partnership
Abstract: 
 The war in Yemen has transformed the Iran-Houthi partnership. Iran has built significant influence in Yemen since 2015, but the Houthis are not a simple arm of its foreign policy: Iran has bandwagoned on Houthi successes as much as it has caused them. For Iran, supporting the Houthis is an appealing proposition: at a low cost, it has contributed to getting Saudi Arabia bogged down in a costly war. This article analyses the causes and consequences of the quantitative and qualitative shifts in Iran’s support for the Houthis. After laying out the strategic rationale for the expansion of the partnership, it explains how this has represented an important victory for Iran and how these developments mirror other trends in the evolution of the constellation of revisionist actors Iran supports.
Journal: Studies in Conflict & Terrorism
Pages: 278-300
Issue: 3
Volume: 47
Year: 2024
Month: 3
X-DOI: 10.1080/1057610X.2021.1954353
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1954353
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:3:p:278-300

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1965728_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Suleyman Ozeren
Author-X-Name-First: Suleyman
Author-X-Name-Last: Ozeren
Author-Name: Suat Cubukcu
Author-X-Name-First: Suat
Author-X-Name-Last: Cubukcu
Author-Name: Gabriel Cash
Author-X-Name-First: Gabriel
Author-X-Name-Last: Cash
Title: Exposure to Extremist Content and Public Sympathy for ISIS
Abstract: 
 This study examines how individuals’ exposure to ISIS-related propaganda affects public sympathy for ISIS. We examine the extent that each type of communication channel (e.g. online media, traditional offline media, and in-person interactions) affects an individual’s perceptions of ISIS. We use a nationally representative sample (N = 1,609) from Turkey, which has played an important role during the rise and fall of ISIS with its unique geographical, social, and political position. The findings suggest a significant relationship between exposure to in-person propaganda and having sympathy for ISIS. However, this relationship does not exist for online and traditional media propaganda.
Journal: Studies in Conflict & Terrorism
Pages: 345-365
Issue: 4
Volume: 47
Year: 2024
Month: 4
X-DOI: 10.1080/1057610X.2021.1965728
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1965728
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:4:p:345-365



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1968983_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Victor Asal
Author-X-Name-First: Victor
Author-X-Name-Last: Asal
Author-Name: Michael Shkolnik
Author-X-Name-First: Michael
Author-X-Name-Last: Shkolnik
Title: Crossing Battle Death Lines: Why Do Some Insurgent Organizations Escalate Violence to Higher-Intensity Armed Conflicts?
Abstract: 
 Why do some insurgent groups escalate violence to higher-intensity insurgencies or civil war? We explore this question among 140 insurgent groups worldwide across various thresholds of armed conflict. We argue that the main drivers of escalation are insurgent networks and domestic resource mobilization. Findings show that territorial control and engagement in criminal activities to finance operations are key factors associated with insurgent-inflicted battle deaths. The number of insurgent alliances, however, is the strongest determinant of higher-intensity armed conflicts. State counterinsurgency strategies also play an important role. Many of these insights support an exploratory look at rising insurgent violence in West Africa’s Sahel region.
Journal: Studies in Conflict & Terrorism
Pages: 416-431
Issue: 4
Volume: 47
Year: 2024
Month: 4
X-DOI: 10.1080/1057610X.2021.1968983
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1968983
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:4:p:416-431



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1962500_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Henriette Frees Esholdt
Author-X-Name-First: Henriette
Author-X-Name-Last: Frees Esholdt
Author-Name: Kathrine Elmose Jørgensen
Author-X-Name-First: Kathrine
Author-X-Name-Last: Elmose Jørgensen
Title: Emotional Trials in Terrorism Research: Running Risks When Accessing Salafi-Jihadist Foreign Fighter Returnees and Their Social Milieu
Abstract: 
 Islamist radicalization and terrorism studies, besides lacking in methodological transparency, have long suffered from immense access problems. Based on ethnographic fieldwork in Sweden and Denmark—two countries with significant populations of Salafi-jihadist Western foreign fighter returnees—this article focuses on challenges to gaining initial access to a field described as emotionally demanding, hard-to-reach and high-risk. Addressing emotional trials that emerge when experiencing risks of physical dangers, emotional stressors and ethical issues, we demonstrate how emotions shape and influence decisions made in the field, such as whether to continue or to give up attempting to gain initial access. Thus, we provide the transparency that is so crucial to unraveling and understanding the methodological obstacles to accessing Salafi-jihadist environments.
Journal: Studies in Conflict & Terrorism
Pages: 432-456
Issue: 4
Volume: 47
Year: 2024
Month: 4
X-DOI: 10.1080/1057610X.2021.1962500
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1962500
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:4:p:432-456



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1963092_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Catherine Bouko
Author-X-Name-First: Catherine
Author-X-Name-Last: Bouko
Author-Name: Pieter Van Ostaeyen
Author-X-Name-First: Pieter
Author-X-Name-Last: Van Ostaeyen
Author-Name: Pierre Voué
Author-X-Name-First: Pierre
Author-X-Name-Last: Voué
Title: How Jihadi Salafists Sometimes Breach, But Mostly Circumvent, Facebook’s Community Standards in Crisis, Identity and Solution Frames
Abstract: 
 We analyzed posts written by Facebook profiles who advocate violent jihad without supporting any terrorist group. They share extremist content in the middle of regular posts, thanks to which they are likely to reach a large audience. We identified to what extent their ingroup-outgroup opposition is constructed in crisis, identity, and solution frames and how they use these frames in posts which sometimes breach Facebook’s community standards, but which mostly circumvent them through various strategies of doublespeak. Among them, myth, in the sense of Barthes, and eudaimonic content appeared as particularly powerful to naturalize and spread jihadi ideology on social media.
Journal: Studies in Conflict & Terrorism
Pages: 366-391
Issue: 4
Volume: 47
Year: 2024
Month: 4
X-DOI: 10.1080/1057610X.2021.1963092
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1963092
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:4:p:366-391



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1966721_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Robert S. Snyder
Author-X-Name-First: Robert S.
Author-X-Name-Last: Snyder
Title: Ideology and Global Conflicts: Revolutionary Actors and Their Opposition to Liberalism
Abstract: 
 The concept of the revisionist state has been central to IR, and the literature demonstrates that they initiate international conflicts. As a subset of the revisionist state, revolutionary states in particular have been shown to foment international conflicts. Moreover, ideology has come to explain international conflicts, especially the Second World War, Cold War, and “War on Terror.” Nevertheless, the literature on revolutionary states discounts the role of ideology and that on ideology often discounts the role of revisionist or revolutionary states. This paper develops the concept of a distinct type of revisionist state—the revolutionary actor—that explains the outbreak of the Second World War, the Cold War, and War on Terror, three of the greatest global conflicts of the last century. It first develops a model of the revolutionary actor, linking the ideologies of Marxism-Leninism, Nazism, and jihadism that led to the Second World War, the Cold War, and War on Terror. It then offers a theory based on ideology as to why the revolutionary actors initiated these three global conflicts. Lastly, it offers a research design to test the theory and highlights the three cases with recent literature on them.
Journal: Studies in Conflict & Terrorism
Pages: 392-415
Issue: 4
Volume: 47
Year: 2024
Month: 4
X-DOI: 10.1080/1057610X.2021.1966721
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1966721
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:4:p:392-415

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1981203_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Rueben Ananthan Santhana Dass
Author-X-Name-First: Rueben Ananthan
Author-X-Name-Last: Santhana Dass
Title: Jihadists’ Use and Pursuit of Weapons of Mass Destruction: A Comparative Study of Al-Qaeda and Islamic State’s Chemical, Biological, Radiological and Nuclear (CBRN) Weapons Programs
Abstract: 
 This article compares and contrasts the Chemical, Biological, Radiological and Nuclear (CBRN) weapons programs of Al-Qaeda and Islamic State through the framework of organizational structure, typology, ideology and CBRN incidents (selected case studies). A three-step CBRN model explaining the use of CBRN weapons by both groups is proposed. This model suggests that the use of CBRN weapons is predicated on three factors: leadership at the strategic level; acquisition of material at the operational level and technical capabilities at the tactical level. It is found that the failure of both groups in developing and carrying out large-scale CBRN attacks boils down primarily to the lack of technical capabilities and the difficulties associated with acquisition of materials. It is argued that the future CBRN threat landscape will likely be dominated by the threat of small-scale, localized attacks using crude chemical or biological agents by lone actors or autonomous cells as opposed to larger-scale centrally directed attacks.
Journal: Studies in Conflict & Terrorism
Pages: 548-582
Issue: 5
Volume: 47
Year: 2024
Month: 5
X-DOI: 10.1080/1057610X.2021.1981203
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1981203
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:5:p:548-582



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1980981_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniela Peterka-Benton
Author-X-Name-First: Daniela
Author-X-Name-Last: Peterka-Benton
Author-Name: Francesca Laguardia
Author-X-Name-First: Francesca
Author-X-Name-Last: Laguardia
Title: The Trouble with Numbers: Difficult Decision Making in Identifying Right-Wing Terrorism Cases. An Investigative Look at Open Source Social Scientific and Legal Data
Abstract: 
 Terrorism research has gained much traction since the 9/11 attacks, but some sub genres of terrorism, such as right-wing terrorism, have remained under-studied areas. Unsurprisingly data sources to study these phenomena are scarce and frequently face unique data collection obstacles. This paper explores five major, social-scientific terrorism databases in regards to data on right-wing terrorist events. The paper also provides an in-depth examination of the utilization of criminal legal proceedings to research right-wing terrorist acts. Lastly, legal case databases are introduced and discussed to show the lack of available court information and case proceedings in regards to right-wing terrorism.
Journal: Studies in Conflict & Terrorism
Pages: 502-525
Issue: 5
Volume: 47
Year: 2024
Month: 5
X-DOI: 10.1080/1057610X.2021.1980981
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1980981
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:5:p:502-525



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1980982_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Keshab Giri
Author-X-Name-First: Keshab
Author-X-Name-Last: Giri
Author-Name: Roos Haer
Author-X-Name-First: Roos
Author-X-Name-Last: Haer
Title: Female Combatants and Durability of Civil War
Abstract: 
 How is conflict duration affected by female combatants in rebel group? In this study, we advance three possible pathways through which female combatants enhance the resilience of the rebel group, thereby lengthening the conflict. We explore this association using quantitative cross-sectional data on female combatant and conflict duration. The positive relationship between female combatants and civil war duration from quantitative analysis is substantiated by the qualitative evidence collected via in-depth interviews with former male and female combatants in the Maoist insurgency in Nepal. This work has important implications for the study of armed conflict duration, rebel organizations, and post-conflict peacebuilding.
Journal: Studies in Conflict & Terrorism
Pages: 526-547
Issue: 5
Volume: 47
Year: 2024
Month: 5
X-DOI: 10.1080/1057610X.2021.1980982
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1980982
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:5:p:526-547



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1970891_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joseph M. Brown
Author-X-Name-First: Joseph M.
Author-X-Name-Last: Brown
Title: Terrorist Peer Review: Which Autonomous Attacks Does ISIL Accept for Publication?
Abstract: 
 The Islamic State of Iraq and the Levant (ISIL) claims some attacks by autonomous jihadists in the West, but not all of them. This article argues that ISIL selectively takes credit for attacks that fit tactical norms laid out in the group’s propaganda. These norms include lethality toward the victims and martyrdom for the assailant. Probit regression analyses of a new database of autonomous attacks in the West confirm that lethality and martyrdom increase the probability of ISIL’s official propaganda claiming a given incident. The Islamic State’s “peer review” and selective credit-claiming incentivize autonomous jihadists to adopt more lethal and suicidal tactics so that their actions will gain acceptance and they will be recognized as soldiers of the caliphate.
Journal: Studies in Conflict & Terrorism
Pages: 457-475
Issue: 5
Volume: 47
Year: 2024
Month: 5
X-DOI: 10.1080/1057610X.2021.1970891
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1970891
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:5:p:457-475



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1980978_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Christopher Day
Author-X-Name-First: Christopher
Author-X-Name-Last: Day
Author-Name: Michael Woldemariam
Author-X-Name-First: Michael
Author-X-Name-Last: Woldemariam
Title: From Rebelling to Ruling: Insurgent Victory and State Capture in Africa
Abstract: 
 Political order following rebel victory in civil wars has seen remarkable variation. While some rebellions transform their victories into durable regimes, others do not. This article develops a typological framework to assess the ability, and inability, of victorious rebellions to capture the state after overthrowing incumbents, with a focus on Africa. We argue that these outcomes – state capture, failed state capture, or mixed – depend on two key dimensions of political and military centralization before victory: (1) the distribution of power between rebel organizations participating in the civil war and (2) the communal structure within them.
Journal: Studies in Conflict & Terrorism
Pages: 476-501
Issue: 5
Volume: 47
Year: 2024
Month: 5
X-DOI: 10.1080/1057610X.2021.1980978
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1980978
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:5:p:476-501

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1983211_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Erin M. Kearns
Author-X-Name-First: Erin M.
Author-X-Name-Last: Kearns
Author-Name: Casey Delehanty
Author-X-Name-First: Casey
Author-X-Name-Last: Delehanty
Title: The Fast & The Furious…Torturous?: Examining the Impact of Torture Scenes in Popular Films on Public Perceptions of Torture Policy
Abstract: 
 Entertainment media regularly depict torture as effective. Indeed, most popular films contain torture—often outside of counterterrorism-specific plotlines. In the counterterrorism-specific context, watching a scene where torture works increases support for the practice. Yet counterterrorism-specific media is a niche genre, and we do not know if this holds for torture scenes more generally. We address this gap with a 4 (movie rating) x 3 (scene type) experiment with U.S. adults. While participants recognized that torture scenes are in fact torture, viewing these scenes did not impact support for the practice. Findings suggest that media’s influence on views about torture is more nuanced.
Journal: Studies in Conflict & Terrorism
Pages: 583-598
Issue: 6
Volume: 47
Year: 2024
Month: 6
X-DOI: 10.1080/1057610X.2021.1983211
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1983211
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:6:p:583-598



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1990826_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anna Kruglova
Author-X-Name-First: Anna
Author-X-Name-Last: Kruglova
Title: “For God, for Tsar and for the Nation: Authenticity in the Russian Imperial Movement’s Propaganda”
Abstract: 
 This paper will examine how extremist organizations manage to present themselves as credible actors in the eyes of potential supporters on social media. This paper will address this question by exploring the role of authenticity in strategic narratives, which is believed to help these groups achieve this purpose. Apart from introducing this new theoretical concept, the paper will also apply it to a new case study of the Russian Imperial Movement (RIM) – the first far-right organization to be designated as terrorist by the U.S. and Canada. By conducting discourse analysis of the group’s social media propaganda on the Russian network VKontakte, the paper will show how the RIM makes its strategic narratives authentic and, as a consequence, creates an image of a credible and trustworthy actor and thus manages to reach out to its target audience.
Journal: Studies in Conflict & Terrorism
Pages: 645-667
Issue: 6
Volume: 47
Year: 2024
Month: 6
X-DOI: 10.1080/1057610X.2021.1990826
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1990826
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:6:p:645-667



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1987656_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Christopher Wall
Author-X-Name-First: Christopher
Author-X-Name-Last: Wall
Title: The (Non) Deus-Ex Machina: A Realistic Assessment of Machine Learning for Countering Domestic Terrorism
Abstract: 
 In light of the January 6 insurrection, the Department of Homeland Security (DHS) and other national security agencies are looking toward using more artificial intelligence (AI) and machine learning (ML) tools to detect and combat extremism in America. AI and ML hold much promise for the domestic CT mission, but the discourse has placed on them unrealistic expectations that do not conform to what is technically possible. This essay seeks to create a baseline conversation about what is ML, how it actually works, and what is a more realistic use case for ML in domestic CT. The core argument is that current ML tools are not optimal for the CT enterprise because terrorism experts are often sidelined in the development and the implementation of these algorithms.
Journal: Studies in Conflict & Terrorism
Pages: 599-621
Issue: 6
Volume: 47
Year: 2024
Month: 6
X-DOI: 10.1080/1057610X.2021.1987656
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1987656
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:6:p:599-621



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1987659_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Rachel Yon
Author-X-Name-First: Rachel
Author-X-Name-Last: Yon
Author-Name: Daniel Milton
Author-X-Name-First: Daniel
Author-X-Name-Last: Milton
Title: Examining the Outcome of Investigations and Prosecutions of Extremism in the United States
Abstract: 
 While the criminology literature indicates that investigative and judicial outcomes can be influenced by several factors, a smaller number of scholars have examined how similar factors operate in terrorism investigations and prosecutions. We use the Profiles of Individual Radicalization in the United States (PIRUS) and American Terror Study (ATS) datasets to examine the factors that influence outcomes in such cases from 1947 to 2017. We find that the ideological affiliation, leadership activity, and the commission of an act of violence increase the severity of the legal outcome, while other factors such as gender, age, race, and biographic availability have less consistent impact.
Journal: Studies in Conflict & Terrorism
Pages: 622-644
Issue: 6
Volume: 47
Year: 2024
Month: 6
X-DOI: 10.1080/1057610X.2021.1987659
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1987659
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:6:p:622-644



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1995940_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Graig R. Klein
Author-X-Name-First: Graig R.
Author-X-Name-Last: Klein
Title: Refugees, Perceived Threat & Domestic Terrorism
Abstract: 
 Refugees’ effect on domestic terrorism is conditioned by host-country social perception (attitude about living next-door to foreigners) and economic competition. These hypotheses are tested cross-nationally from 1995-2014 leveraging data from the World Values Survey. The results show social perception matters. When refugee flow to a country increases from the mean to 75th percentile, it does not statistically alter domestic terrorism risk. But when a host-country’s preference to not live next-door to foreigners is accounted for and changes from the mean (20.9%) to 75th percentile (30.3%), the change in refugee flow increases the risk of domestic terrorism by 40%.
Journal: Studies in Conflict & Terrorism
Pages: 668-699
Issue: 6
Volume: 47
Year: 2024
Month: 6
X-DOI: 10.1080/1057610X.2021.1995940
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1995940
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:6:p:668-699

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2007244_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jeffrey Treistman
Author-X-Name-First: Jeffrey
Author-X-Name-Last: Treistman
Title: Social Exclusion and Political Violence: Multilevel Analysis of the Justification of Terrorism
Abstract: 
 Research on the causes of terrorism tends to focus on broad national-level trends without examining how such factors influence individuals and their propensity for political violence. Meanwhile, theories of radicalization have yielded important insight on how individuals embrace terrorism, but the transformation does not occur within a vacuum divorced from contextual factors. This article is therefore an attempt to bridge macro-micro linkages to better understand the causes of terrorism, and focuses on levels of socio-political exclusion within a country. Using multilevel analysis, the article finds a consistently positive relationship between levels of social exclusion and individual support for terrorism. The results help capture the multidimensional nature of the causes of terrorism and better informs counterterrorism policymaking.
Journal: Studies in Conflict & Terrorism
Pages: 701-724
Issue: 7
Volume: 47
Year: 2024
Month: 7
X-DOI: 10.1080/1057610X.2021.2007244
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2007244
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:7:p:701-724



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2042897_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kerem Övet
Author-X-Name-First: Kerem
Author-X-Name-Last: Övet
Author-Name: James Hewitt
Author-X-Name-First: James
Author-X-Name-Last: Hewitt
Author-Name: Tahir Abbas
Author-X-Name-First: Tahir
Author-X-Name-Last: Abbas
Title: Understanding PKK, Kurdish Hezbollah and ISIS Recruitment in Southeastern Turkey
Abstract: 
 This paper provides an explanation for how the PKK, Kurdish Hezbollah, and ISIS, representing distinct ethno-nationalist, Islamist and ideologically motivated political movements, radicalize and recruit supporters in the regions of Eastern and Southeastern Turkey. In doing so, this paper contributes to ongoing theoretical debates about radicalization and recruitment. This study reveals how various regionally specific structural factors encourage radicalization and recruitment into violent politico-ideological movements. In particular, state oppression of ethnic minorities, economic inequalities, geography, and local demographics. While existing literature on radicalization focuses on push factors (structural) combined with pull factors (ideology), this research demonstrates that structural factors in Eastern and Southeastern Turkey are both push and pull factors in processes of radicalization.
Journal: Studies in Conflict & Terrorism
Pages: 750-770
Issue: 7
Volume: 47
Year: 2024
Month: 7
X-DOI: 10.1080/1057610X.2022.2042897
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2042897
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:7:p:750-770



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2007562_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Vidar B. Skretting
Author-X-Name-First: Vidar B.
Author-X-Name-Last: Skretting
Title: Pragmatism and Purism in Jihadist Governance: The Islamic Emirate of Azawad Revisited
Abstract: 
 The Islamic Emirate established in northern Mali in 2012 was brought down less than a year later by a French military intervention, provoked by the Emirate’s belligerent posture. This article explains why the leaders of the Emirate appeared to govern in a way that jeopardized the state’s survival, despite AQIM’s leadership calling for a cautious approach. Based on novel primary sources, this article provides a detailed view of governance practices in the Emirate, showing that they were in fact considerably more pragmatic than hitherto assumed. Furthermore, it argues that both AQIM and the leaders of the Emirate in the end were more concerned with the long-term prospects of jihadist expansion in the region than with the survival of the Emirate itself.
Journal: Studies in Conflict & Terrorism
Pages: 725-749
Issue: 7
Volume: 47
Year: 2024
Month: 7
X-DOI: 10.1080/1057610X.2021.2007562
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2007562
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:7:p:725-749



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_1997134_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Eldad Ben Aharon
Author-X-Name-First: Eldad
Author-X-Name-Last: Ben Aharon
Title: The “War on Terror” and Public Diplomacy during the Cold War: Israeli–Turkish Relations and the 1980 Military Coup
Abstract: 
 What influence does the digital diplomacy of the post 9/11 world have on our understanding of counter-terrorism (CT) diplomacy during the Cold War? This article explores this question and the intersection between intelligence, counterterrorism diplomacy and the digital transformation long overlooked by scholars of Israeli–Turkish relations, Cold War history and terrorism studies. Diplomacy in crisis situations usually operates in an uncertain reality triggered by conflict. Turkey’s domestic crises, specifically its energy crisis between 1978 and 1980, served to shift the country’s foreign policy toward the more anti-Israeli stance of the Arab nations and their demands that Turkey boycott Israel in return for supplying Turkey’s energy needs. This came in the context of a regional wave of contentious politics in the Middle East after the 1979 Iranian revolution, when Israel had just lost three decades of massive investment in Iran under the Shah. I argue that knowing the Turkish military junta’s primary goals centered on the fight against the far left and right political violence at home and on Armenian terror attacks against Turkish diplomats abroad, Israeli diplomats employed a very selective CT policy focusing on the cooperation between Armenian Secret Army for the Liberation of Armenia and the Palestine Liberation Organization. Public diplomacy was key to conveying this message, and attempts to plant information about the Armenian-Palestinian cooperation in Turkish news outlets and national television were made. Israel’s goal was to influence Turkey’s public emotions and convey to Turkey’s military junta that Jerusalem was a true ally, working to confront the mutual regional threat of Armenian-Palestinian terrorists arising from Lebanese training camps. This case study highlights the paradox that Ministries of Foreign Affairs and diplomats enjoyed an unparalleled monopoly of power during the Cold War over the use of means of public diplomacy, while at the time having very limited capacity, and a frequent need for third party mediators to engage with foreign public audiences. It is thus unlikely that the conveyed messages would have been as visible and disseminated as easily as they could be in the post 9/11 via means of digital diplomacy.
Journal: Studies in Conflict & Terrorism
Pages: 792-815
Issue: 7
Volume: 47
Year: 2024
Month: 7
X-DOI: 10.1080/1057610X.2021.1997134
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1997134
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:7:p:792-815



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2002687_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Joelle Rizk
Author-X-Name-First: Joelle
Author-X-Name-Last: Rizk
Title: Exploring the Nexus between Armed Groups and the Trafficking and Smuggling of Human Beings in the Central Sahel and Libya
Abstract: 
 In the past decade a series of events including the outbreak of the Syrian war, drought and tireless insurgencies in sub-Saharan Africa triggered the largest wave of displacement ever seen through and around the Mediterranean. The majority of those bound to Europe through the Mediterranean are smuggled by criminal networks. The proliferation of Trafficking and Smuggling of Human Beings (TSHB) between the Sahel and the Libyan shores feeds into the evolving threats of terrorism, crime and insecurity in the Sahel, West Africa and Europe. This paper explores the involvement of armed groups in TSHB in the Central Sahel and Libya. The author argues that the involvement of armed actors in the TSHB in the Central Sahel and Libya is not uniform and not systematically used for terrorism financing. Criminal networks and armed groups leverage opportunities created by conflict to generate profit and project power. They operate in convergent spaces benefitting from state fragility, and shared social networks. The link between terrorism and migrant smuggling and trafficking, if found, remains localized benefitting individuals rather than organizations.
Journal: Studies in Conflict & Terrorism
Pages: 771-791
Issue: 7
Volume: 47
Year: 2024
Month: 7
X-DOI: 10.1080/1057610X.2021.2002687
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2002687
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:7:p:771-791

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2083932_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Emma Ylitalo-James
Author-X-Name-First: Emma
Author-X-Name-Last: Ylitalo-James
Author-Name: Andrew Silke
Author-X-Name-First: Andrew
Author-X-Name-Last: Silke
Title: How Proximity and Space Matter: Exploring Geographical & Social Contexts of Radicalization in Northern Ireland
Abstract: 
 The “specificity problem” is one of the longest running unanswered questions in research on terrorism. This problem focuses on the fundamental question as to why do only a few people radicalize when many appear to have been exposed to at least some of the same causes of radicalization? The current study seeks to help answer that question through comparative research with two sample populations in Northern Ireland. In-depth interviews were carried out with 17 former paramilitary members and 12 paramilitary sympathizers. The interviews explored factors which distinguished those who became actively involved with paramilitary groups versus those who did not. The results discussed here found that geographic proximity to intercommunity violence flashpoints/interfaces was strongly associated with increased paramilitary involvement. Thematic analysis found this effect was mediated by two additional factors: (1) levels of exposure to violence and (2) levels of community isolation. The findings are discussed in relation to the wider literature on radicalization.
Journal: Studies in Conflict & Terrorism
Pages: 940-962
Issue: 8
Volume: 47
Year: 2024
Month: 8
X-DOI: 10.1080/1057610X.2022.2083932
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2083932
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:8:p:940-962



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2011711_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mirna El Masri
Author-X-Name-First: Mirna
Author-X-Name-Last: El Masri
Author-Name: Brian J. Phillips
Author-X-Name-First: Brian J.
Author-X-Name-Last: Phillips
Title: Threat Perception, Policy Diffusion, and the Logic of Terrorist Group Designation
Abstract: 
 Many governments maintain lists of terrorist groups, imposing sanctions on designated organizations. However, the logic behind designation remains unclear. Furthermore, most studies focus on Western countries. This paper develops arguments for why attack attributes, group attributes, and policy diffusion might explain proscription. Empirically, we examine hundreds of militant organizations to see which are listed by the European Union, India, Pakistan, Russia, the United Kingdom, or the United States. Generally, designation does not seem to be driven by target or attack severity. It often results from diffusion: most countries follow the United States. Islamist group motivation is also an important factor.
Journal: Studies in Conflict & Terrorism
Pages: 838-861
Issue: 8
Volume: 47
Year: 2024
Month: 8
X-DOI: 10.1080/1057610X.2021.2011711
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2011711
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:8:p:838-861



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2009633_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel Odin Shaw
Author-X-Name-First: Daniel Odin
Author-X-Name-Last: Shaw
Author-Name: Huseyn Aliyev
Author-X-Name-First: Huseyn
Author-X-Name-Last: Aliyev
Title: The Frontlines Have Shifted: Explaining the Persistence of Pro-State Militias after Civil War
Abstract: 
 Many ceasefire and peace agreements stipulate the disarmament and demobilization of pro-state armed groups involved in the conflict, yet few of these groups ever completely demobilize. This study seeks to explain the process of incomplete demobilization by advancing a theoretical argument that pro-state armed groups are least likely to disarm and demobilize when the monopoly on violence is fragmented, and when there is relative balance of capabilities and interests between the government and pro-state armed groups. Under these circumstances, both governments and pro-state armed groups may favor incomplete demobilization enabling them to pursue their strategic objectives. We draw on unique interview data with pro-state paramilitaries from Ukraine to empirically illustrate our theoretical expectations.
Journal: Studies in Conflict & Terrorism
Pages: 817-837
Issue: 8
Volume: 47
Year: 2024
Month: 8
X-DOI: 10.1080/1057610X.2021.2009633
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2009633
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:8:p:817-837



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2016514_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Emeka Thaddues Njoku
Author-X-Name-First: Emeka Thaddues
Author-X-Name-Last: Njoku
Title: Queering Terrorism
Abstract: 
 There are few theoretical and empirical researches on sexual fluidity and sexual victimization against men inside terrorist groups. Drawing from the case of Islamic terrorists group (Boko Haram), queer theory, and discursive accounts of male survivors, NGOs and security agents, I argue that Boko Haram’s rape of men and boys, whether collectively or individually, exposes their sexual fluidity. The reconstruction of acceptable sexual norms, syncretism due to the existence of same-sex subculture in Lake Chad, and hypocrisy explain their sexual variability. This study adds to the growing body of knowledge on the dynamics of sexuality and terrorism.
Journal: Studies in Conflict & Terrorism
Pages: 888-910
Issue: 8
Volume: 47
Year: 2024
Month: 8
X-DOI: 10.1080/1057610X.2021.2016514
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2016514
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:8:p:888-910



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2016558_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Tiffiany Howard
Author-X-Name-First: Tiffiany
Author-X-Name-Last: Howard
Author-Name: Brach Poston
Author-X-Name-First: Brach
Author-X-Name-Last: Poston
Author-Name: April Lopez
Author-X-Name-First: April
Author-X-Name-Last: Lopez
Title: Extremist Radicalization in the Virtual Era: Analyzing the Neurocognitive Process of Online Radicalization
Abstract: 
 Emerging research on the etiology of violent radical political behavior has begun to explore the role of empathy in shaping an individual’s beliefs, attitudes, and intentions that culminate in radicalization. The existing studies focus on persuasive influence upon an individual, but they overlook the centrality of empathy and that in the absence of empathy, persuasion is not salient. If an individual empathizes with a message then when it is processed by the receiver, the message is more likely to be considered realistic, relatable, believable, and therefore, persuasive. However, very little is known as to how messages should be designed to stimulate empathy in order to optimize their persuasive impact, which is particularly relevant to terrorist and extremist messaging given the lethal outcome of successful persuasion. This study examines the neurocognitive process of radicalization, specifically as it occurs within virtual online space, and how message content and production features have the potential to arouse empathy and generate radical-persuasive outcomes among the target audience. The findings of this research demonstrate how emotions, specifically that of empathy, can be stimulated in order to facilitate the process of radicalization, thus increasing the potential for violent radical political behavior.
Journal: Studies in Conflict & Terrorism
Pages: 862-887
Issue: 8
Volume: 47
Year: 2024
Month: 8
X-DOI: 10.1080/1057610X.2021.2016558
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2016558
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:8:p:862-887



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2016541_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mathew L. Bukit
Author-X-Name-First: Mathew
Author-X-Name-Last: L. Bukit
Title: Bangsamoro Separatism and Classical Counterinsurgency: Reconsidering Revolutionary War in the Southern Philippines
Abstract: 
 The dominant history of Muslim armed separatism in the Philippines obscures the insurgency’s character. Insurgents espouse revolutionary war, even though this mischaracterizes the interests constituted in the insurgent cause. Patricio Abinales’ critiques of the orthodoxy are applied to disambiguate the Bangsamoro cause, highlighting the insurgency’s concurrent supralocal and local logics. Supralocal-local dissonance is reconciled by recasting the Bangsamoro cause as a supralocal-local bargain through Stathis Kalyvas’ concept of alliance, retaining classical counterinsurgency theory’s macropolitical locus but imbued with cognizance of the insurgency’s micropolitics. This approach challenges the perceived finality of the insurgency after the Bangsamoro Autonomous Region in Muslim Mindanao.
Journal: Studies in Conflict & Terrorism
Pages: 911-939
Issue: 8
Volume: 47
Year: 2024
Month: 8
X-DOI: 10.1080/1057610X.2021.2016541
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2016541
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:8:p:911-939

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2013760_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Alexandra Chinchilla
Author-X-Name-First: Alexandra
Author-X-Name-Last: Chinchilla
Author-Name: Jesse Driscoll
Author-X-Name-First: Jesse
Author-X-Name-Last: Driscoll
Title: Side-Switching as State-Building: the Case of Russian-Speaking Militias in Eastern Ukraine
Abstract: 
 Why do some militias bandwagon with the state during a civil war while others resist state authority? A formal model highlighting the role of material incentives treats militia commanders as rent-seekers competing for security sector jobs run by civilians. Western donors can send aid to inflate the size of the pie that civilians distribute to militia commanders. Our key result is a partial incorporation equilibrium by which jointly-sustainable strategies selected by a minimum winning coalition of battalion commanders maximize their share of rents. Battalion commanders outside this coalition do best by remaining outside the state. We evaluate the model using an analytic narrative of contemporary Ukraine – a hard case for our theory since ideology and ethnicity play an important role in most standard accounts of the conflict. Analysis of a volunteer battalion incorporation dataset, results from a survey of 64 Ukrainian volunteer battalion members, and a short discussion of the Azov Battalion suggest the salience of intra-Ukrainian distributional politics to militia commanders’ incorporation strategies.
Journal: Studies in Conflict & Terrorism
Pages: 1127-1146
Issue: 9
Volume: 47
Year: 2024
Month: 9
X-DOI: 10.1080/1057610X.2021.2013760
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2013760
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:9:p:1127-1146



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2013751_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mohammed M. Hafez
Author-X-Name-First: Mohammed M.
Author-X-Name-Last: Hafez
Author-Name: Michael Gabbay
Author-X-Name-First: Michael
Author-X-Name-Last: Gabbay
Author-Name: Emily Kalah Gade
Author-X-Name-First: Emily Kalah
Author-X-Name-Last: Gade
Title: Consolidation of Nonstate Armed Actors in Fragmented Conflicts: Introducing an Emerging Research Program
Abstract: 
 How do armed groups consolidate power in conflict landscapes packed with rival factions, paramilitary militias, and local warlords? Extant scholarship has studied the causes and consequences of rebel fragmentation, but the reverse process in which power that is dispersed among many armed actors becomes concentrated among a handful of factions is underexplored. In this special issue, we bring together eight case studies to illustrate at least three pathways to militant consolidation. Cooperative consolidation involves organizations growing consensually through alliance formation and mergers. Competitive consolidation entails a gradual process of increasing political and military power by outcompeting rival groups for fighters, popular support, and international sponsors. Coercive consolidation occurs when militant organizations violently eliminate rivals. This framing article considers several factors that may explain the choice of consolidation mode, including the role of territorial control, permeability of group boundaries, and state sponsorship. By investigating this under-examined aspect of civil conflict, we forge fundamentally new theoretical ground in the study of internal wars and weakly-governed societies.
Journal: Studies in Conflict & Terrorism
Pages: 963-983
Issue: 9
Volume: 47
Year: 2024
Month: 9
X-DOI: 10.1080/1057610X.2021.2013751
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2013751
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:9:p:963-983



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2013757_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Wolfram Lacher
Author-X-Name-First: Wolfram
Author-X-Name-Last: Lacher
Title: Social Cleavages and Armed Group Consolidation: The Case of Khalifa Haftar’s Libyan Arab Armed Forces
Abstract: 
 In Libya’s fragmented military landscape, Khalifa Haftar’s Libyan Arab Armed Forces stands out as the only armed group that concentrated power over entire regions. The interplay of relative power and social cleavages conditioned Haftar’s choices of consolidation strategies. As Haftar grew stronger, he progressively moved from cooperative and competitive approaches toward coercion. Social cleavages wrought by conflict – as opposed to seemingly objective group boundaries – contributed to shaping Haftar’s choices between coercive and cooperative strategies. The significance of these cleavages depended on how violence had shaped local social cohesion and armed groups’ links with communities.
Journal: Studies in Conflict & Terrorism
Pages: 1065-1089
Issue: 9
Volume: 47
Year: 2024
Month: 9
X-DOI: 10.1080/1057610X.2021.2013757
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2013757
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:9:p:1065-1089



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2013759_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Michael Knights
Author-X-Name-First: Michael
Author-X-Name-Last: Knights
Title: Real or Imagined Consolidation? The Case of Iraq’s Popular Mobilization Forces
Abstract: 
 Iraq’s Popular Mobilization Forces (PMF or Hashd al-Shaabi in Arabic) presents an intriguing case study of rebel consolidation, in which pro-regime militias opportunistically seized the reins of a new and rapidly expanding government security institution. The organizational wrapper of the PMF Commission gave an illusory sense of instant consolidation, whereas the formation of the PMF was just the beginning of one of many cycles of armed actor consolidation that came close to overtaking the Iraqi state in 2018–2019. The partial consolidation achieved by the militias within the PMF was largely an organizational, competitive and coercive phenomenon, masquerading as an ideational, cooperative merger. The effort to further consolidate PMF’s control over the Iraqi state became harder as it came close to achieving a near-hegemonic outcome, resulting in a factional field presently characterized as a multipolar distribution of power across militia factions.
Journal: Studies in Conflict & Terrorism
Pages: 1110-1126
Issue: 9
Volume: 47
Year: 2024
Month: 9
X-DOI: 10.1080/1057610X.2021.2013759
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2013759
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:9:p:1110-1126



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2013755_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Nadeem Elias Khan
Author-X-Name-First: Nadeem Elias
Author-X-Name-Last: Khan
Author-Name: Craig Whiteside
Author-X-Name-First: Craig
Author-X-Name-Last: Whiteside
Title: State Accompli: The Political Consolidation of the Islamic State Prior to the Caliphate
Abstract: 
 This study examines the successful consolidation of the Islamic State movement within the Sunni insurgency in Iraq from 2003 to 2014. We rely on insurgent media releases, captured documents, and a declassified U.S. military study of the Sunni insurgency in Anbar to evaluate the Islamic State movement’s complex relationship with its Sunni Arab rivals. We found the group moved through sequential stages of cooperative, competitive, and coercive consolidation to achieve hegemony in the insurgent field. Each phase of transition entailed organizational changes, including mergers, re-branding, and new structures. The movement’s well-developed ideology and state-building project distinguished it from peers whose political agendas were too diffuse to establish lasting coalitions. The tribal Awakening that worked with the Americans to temporarily defeat the Islamic State of Iraq also badly splintered its rivals and failed to prevent the revitalization of the Islamic State movement, setting the foundation for its short-lived caliphate project.
Journal: Studies in Conflict & Terrorism
Pages: 1045-1064
Issue: 9
Volume: 47
Year: 2024
Month: 9
X-DOI: 10.1080/1057610X.2021.2013755
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2013755
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:9:p:1045-1064



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2013752_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Megan Erickson
Author-X-Name-First: Megan
Author-X-Name-Last: Erickson
Author-Name: Michael Gabbay
Author-X-Name-First: Michael
Author-X-Name-Last: Gabbay
Title: Strategies of Armed Group Consolidation in the Afghan Civil War (1989–2001)
Abstract: 
 What explains the variation in the strategies of consolidation among armed groups? We examine three conditions that can explain the modes of militant consolidation – territorial control, organizational structure, and external support. We test these theoretical conjectures using unique time series data on armed group consolidation in Afghanistan from 1989 to 2001. Using a linear probability model, we find that territorial control, organizational structure, and fungible forms of external support have the most significant impact on explaining consolidation. This article contributes to the study of armed group dynamics by drawing on existing theory and leveraging original data to explain variation in strategies of militant consolidation.
Journal: Studies in Conflict & Terrorism
Pages: 984-1005
Issue: 9
Volume: 47
Year: 2024
Month: 9
X-DOI: 10.1080/1057610X.2021.2013752
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2013752
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:9:p:984-1005



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2013754_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ilmari Käihkö
Author-X-Name-First: Ilmari
Author-X-Name-Last: Käihkö
Title: Operation Jungle Fire: The Consolidation of the Liberians United for Reconciliation and Democracy
Abstract: 
 Drawing on 15 months of ethnographic fieldwork, this article investigates the cooperative consolidation of the Liberians United for Reconciliation and Democracy (LURD), a rebel movement that in 1999-2003 sought to rid Liberia of President Charles Taylor. The LURD faced many obstacles to consolidation, including a history of ethnic fragmentation and infighting, leadership conflicts, lack of territory inside Liberia, and a paucity of resources. Yet, despite these hurdles, the LURD succeeded in forging a coalition that lasted just long enough to oust Taylor. It did this by adopting three maxims that emphasized institutional learning, interethnic power sharing, and Guinean sponsorship.
Journal: Studies in Conflict & Terrorism
Pages: 1026-1044
Issue: 9
Volume: 47
Year: 2024
Month: 9
X-DOI: 10.1080/1057610X.2021.2013754
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2013754
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:9:p:1026-1044



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2013753_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kate Cronin-Furman
Author-X-Name-First: Kate
Author-X-Name-Last: Cronin-Furman
Author-Name: Mario Arulthas
Author-X-Name-First: Mario
Author-X-Name-Last: Arulthas
Title: How the Tigers Got Their Stripes: A Case Study of the LTTE’s Rise to Power
Abstract: 
 Over the course of six months in 1986, the Liberation Tigers of Tamil Eelam (LTTE) eliminated their rival militant organizations, despite being significantly outgunned and outmanned by some of these groups. Relying primarily on contemporaneous accounts in Tamil and English, this article traces the process by which the LTTE became the primary avatar of Tamil nationalism, and explores the question of why consolidation unfolded so violently in this case. We argue that the answer lies in the LTTE’s successful portrayal of this violence as order-upholding rather than destructive, and attribute their ability to do this to the fact that much of the population perceived the LTTE as the most legitimate user of violence among the militants.
Journal: Studies in Conflict & Terrorism
Pages: 1006-1025
Issue: 9
Volume: 47
Year: 2024
Month: 9
X-DOI: 10.1080/1057610X.2021.2013753
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2013753
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:9:p:1006-1025



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2013758_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Wladimir van Wilgenburg
Author-X-Name-First: Wladimir
Author-X-Name-Last: van Wilgenburg
Author-Name: Mario Fumerton
Author-X-Name-First: Mario
Author-X-Name-Last: Fumerton
Title: From the PYD-YPG to the SDF: the Consolidation of Power in Kurdish-Controlled Northeast Syria
Abstract: 
 Within a multiparty civil war involving domestic rivalries and regional antagonisms, the Kurdish-led PYD-YPG rebel movement managed to consolidate its political-military power in northeastern Syria. Using the analytical framework of Political Opportunity Structures (POS), we describe how, through its ability to maintain organizational cohesion and establish its own governance structures, and by forging alliances with domestic and foreign actors, it became the hegemonic power in the territory. Whereas it initially relied on coercive consolidation against its main Kurdish rivals, to secure local and international support against the significant threat posed by the Islamic State it had to shift to cooperative and cooptation strategies of power consolidation.
Journal: Studies in Conflict & Terrorism
Pages: 1090-1109
Issue: 9
Volume: 47
Year: 2024
Month: 9
X-DOI: 10.1080/1057610X.2021.2013758
File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2013758
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:47:y:2024:i:9:p:1090-1109

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2111990_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Kamil C. Klosek
Author-X-Name-First: Kamil C.
Author-X-Name-Last: Klosek
Author-Name: Emil A. Souleimanov
Author-X-Name-First: Emil A.
Author-X-Name-Last: Souleimanov
Title: One or Many? Disentangling the Puzzle of Pro-Government Militia Deployment
Abstract: 
 Why do some countries harbor pro-government militias (PGMs), while others do not? We assert that the deployment of PGMs depends on topographic, social, and political structures within which governments and rebels operate. Drawing on the concept of opportunity structures, we postulate that structural conditions within which governments are embedded in constitute a contributing factor to the existence and multiplicity of PGMs. Data from the Pro-Government Militia Dataset along with a two-stage hurdle model reveal that personalist regime type and civil wars increase the likelihood of PGM emergence. In contrast, ethnic fractionalization, onshore oil fields, drug production, number of rebel groups, and military prowess influence the number of PGMs.
Journal: Studies in Conflict & Terrorism
Pages: 67-91
Issue: 1
Volume: 48
Year: 2025
Month: 1
X-DOI: 10.1080/1057610X.2022.2111990
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2111990
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:48:y:2025:i:1:p:67-91



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2083933_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Brittnee Carter
Author-X-Name-First: Brittnee
Author-X-Name-Last: Carter
Author-Name: Cora Caton
Author-X-Name-First: Cora
Author-X-Name-Last: Caton
Title: Primed for Violence: Intrareligious Conflict and the State in Sectarian Societies
Abstract: 
 Intrareligious competition may be founded on grievances stemming from social and political context. The environment that the state creates may fuel intrareligious competition and conflict. Using case studies on Pakistan and Iraq, we examine the role of the state in facilitating intrareligious conflict. We argue the state creates competition for material resources due to institutional characteristics concerning political participation, the education system, and the clergy’s role in government. The state also creates competition for dogmatic resources by legitimizing one sect over another, discriminatory practice, and tacit approval or active involvement in repression of one sect and not the other.
Journal: Studies in Conflict & Terrorism
Pages: 1-20
Issue: 1
Volume: 48
Year: 2025
Month: 1
X-DOI: 10.1080/1057610X.2022.2083933
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2083933
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:48:y:2025:i:1:p:1-20



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2082858_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Luis Fernando Medina
Author-X-Name-First: Luis Fernando
Author-X-Name-Last: Medina
Author-Name: Radha Sarkar
Author-X-Name-First: Radha
Author-X-Name-Last: Sarkar
Title: Blueprints for Red Insurgencies: Revolutionary Ideology and Strategy in India and Colombia
Abstract: 
 Increasingly, scholars agree that role of ideology in civil wars goes beyond mere window-dressing. With respect to leftist insurgencies, we argue that ideology provides insurgent groups an understanding of pivotal constituents (urban or rural) and the timing of revolution (imminent or distant). These factors shape insurgent groups’ politico-military strategies, which may be insurrectionary, militarist Maoist, or protracted people’s war. We develop case studies of the FARC and the EPL in Colombia, and the CPI(ML) and Andhra Maoists in India, using primary sources including conference proceedings, newsletters, pamphlets, and letters of insurgent groups and leaders.
Journal: Studies in Conflict & Terrorism
Pages: 21-45
Issue: 1
Volume: 48
Year: 2025
Month: 1
X-DOI: 10.1080/1057610X.2022.2082858
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2082858
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:48:y:2025:i:1:p:21-45



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2082833_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ahmet Keser
Author-X-Name-First: Ahmet
Author-X-Name-Last: Keser
Author-Name: Fareed Fakhoury
Author-X-Name-First: Fareed
Author-X-Name-Last: Fakhoury
Title: Hay’at Tahrir Al-Sham (HTS) from an Insurgent Group to a Local Authority: Emergence, Development and Social Support Base
Abstract: 
 In 2011, the Middle East entered an era of turmoil. Syria has been the scene for evolution of many NSAGs. This study aims to analyze the factors helped one of the prominent violent organizations, HTS, to become one of the main NSAGs outside the Regime control areas, by applying qualitative methodology using two data sources: primarily, semi-structured field interviews, secondarily, related sources of newspapers/research centers’ publications. Findings show that the decisive military factor and ability to build an interest-based relationship with local elites, impose order and security, and provide public services were critical in imposing hegemony and establishing governance.
Journal: Studies in Conflict & Terrorism
Pages: 46-66
Issue: 1
Volume: 48
Year: 2025
Month: 1
X-DOI: 10.1080/1057610X.2022.2082833
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2082833
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:48:y:2025:i:1:p:46-66



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2099240_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Muhammad Haniff Hassan
Author-X-Name-First: Muhammad Haniff
Author-X-Name-Last: Hassan
Author-Name: Walid Jumblatt Abdullah
Author-X-Name-First: Walid Jumblatt
Author-X-Name-Last: Abdullah
Title: The Model Muslim Minority: Wasatiyah (Justly-Balanced) as a Counter-Ideology Tool in Singapore
Abstract: 
 In the post 9–11 world, Muslims have had to grapple with various challenges, which often involved justifying their faith to others within secular contexts. The matter is more acute, if not existential, for Muslim minority populations. This paper analyzes attempts by the Singaporean Muslim community to deal with a post 9–11 world, through a development of the concept of wasatiyah (justly balanced). It investigates key initiatives by two important players – the Islamic Religious Council of Singapore (MUIS), and the Singapore Islamic Scholars and Religious Teachers Association (Pergas) – that had significant influence in shaping the wasatiyah vision in Singapore. We make two arguments: (1) The wasatiyah discourse represents a longstanding effort by Muslims to contextualize and appropriate traditional Islamic concepts to make them relevant to the contemporary world; and (2) The two approaches adopted by the organizations in question highlight the strengths and weaknesses of initiatives being propagated by state-affiliated and non-state bodies respectively. The study is situated within the literature on religion and politics, counter-ideology and state-Muslim relations.
Journal: Studies in Conflict & Terrorism
Pages: 92-114
Issue: 1
Volume: 48
Year: 2025
Month: 1
X-DOI: 10.1080/1057610X.2022.2099240
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2099240
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:48:y:2025:i:1:p:92-114

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2091038_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Edoardo Corradi
Author-X-Name-First: Edoardo
Author-X-Name-Last: Corradi
Title: The Kurdish Protection Units in Northern Syria: A Deviant Case of Peaceful Cohabitation between Foreign Fighters and Local Civilians?
Abstract: 
 Interactions between foreign combatants and local populations during civil wars are often conflictual. Existing research underscores how trans-national insurgents typically behave more violently than domestic fighters toward civilians. Nevertheless, most research has focused on relations between local rebels and civilians, showing how the type of endowments that rebels exhibit determines the pattern of behavior toward civilian populations. Only recently has the impact of foreign fighters caught the attention of scholars. The consensus in the existing literature is that trans-national insurgents are typically more violent toward civilians than local rebels: they have neither ethnic nor linguistic kinships, there is no mechanism of accountability on foreign fighters, and, usually, they have more extreme religious or ideological beliefs compared to locals. Contrary to the general view, the Kurdish YPG/YPJ appears as a deviant case since it has exhibited low levels of civilian victimization. The presence of foreign fighters in its ranks seems not to affect this trend. Relying on primary and secondary sources, the article argues that the YPG/YPJ’s inclusive ideology, daily practices, and the organizational measures that the Kurdish leadership has adopted in dealing with foreign combatants in the ranks have resulted in lower levels of violence toward civilians.
Journal: Studies in Conflict & Terrorism
Pages: 139-160
Issue: 2
Volume: 48
Year: 2025
Month: 2
X-DOI: 10.1080/1057610X.2022.2091038
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2091038
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:48:y:2025:i:2:p:139-160



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2090048_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Anastassiya Reshetnyak
Author-X-Name-First: Anastassiya
Author-X-Name-Last: Reshetnyak
Author-Name: Mariya Omelicheva
Author-X-Name-First: Mariya
Author-X-Name-Last: Omelicheva
Title: A Framework for Explaining National P/CVE Programs: A Case Study of Kazakhstan
Abstract: 
 This study extends the P/CVE scholarship from the “what” and “how” questions of assessment (What and how do countries do in P/CVE area?) to the underlying “why” issues (Why do countries choose to define and approach P/CVE in certain ways?). Toward the goal of explaining states’ P/CVE programs, we put forth a “3-Is” framework emphasizing the impact interests, ideas, and institutions on their measures for countering violent extremism. Jointly, these concepts direct our attention to the pragmatic and ideational aspects of policymaking as well as the countries’ institutional legacies. We apply this framework to the case of Kazakhstan to illuminate and explain certain highly visible aspects of its P/CVE program.
Journal: Studies in Conflict & Terrorism
Pages: 161-178
Issue: 2
Volume: 48
Year: 2025
Month: 2
X-DOI: 10.1080/1057610X.2022.2090048
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2090048
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:48:y:2025:i:2:p:161-178



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2066525_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Moran Yarchi
Author-X-Name-First: Moran
Author-X-Name-Last: Yarchi
Title: The Image War as a Significant Fighting Arena – Evidence from the Ukrainian Battle over Perceptions during the 2022 Russian Invasion
Abstract: 
 Ukrainian activity in the realm of image and perceptions during the 2022 Russian invasion provides a unique opportunity to examine deep understanding and creative usage of this important fighting arena in the current political reality. The current paper analyzes the actions of the Ukrainian leadership, which invested a lot of time and effort into garnering support from the international community and mobilizing various leaders to assist the Ukrainians in their fight, while using different strategies and tools. Based on the unprecedent amount of support they received, it appears the Ukrainians were successful in applying Imagefare as their strategy.
Journal: Studies in Conflict & Terrorism
Pages: 205-217
Issue: 2
Volume: 48
Year: 2025
Month: 2
X-DOI: 10.1080/1057610X.2022.2066525
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2066525
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:48:y:2025:i:2:p:205-217



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2095700_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Murat YeÅŸiltaÅŸ
Author-X-Name-First: Murat
Author-X-Name-Last: YeÅŸiltaÅŸ
Author-Name: Muhammed KarakuÅŸ
Author-X-Name-First: Muhammed
Author-X-Name-Last: KarakuÅŸ
Title: The Logic of Non-State Armed Groups Survival in Syria: A Contemporary Framework of Analysis
Abstract: 
 A growing body of research stresses finding out why some non-state armed groups in Syria survive longer than others. Despite this encouraging uptick in scholarship, studies have focused on the individual methods these groups have adopted. The extant literature suffers from a lack of comprehensive and rigorous analytical explanation based on a model that reveals the logic behind these groups’ actions within the savagery, ferocity, and cruelty of other rival actors. By focusing on three significant cases in Syria, this study develops a new analytical perspective to unpack the strategic logic behind NSAGs’ survival in a competitive, anarchical conflict environment.
Journal: Studies in Conflict & Terrorism
Pages: 179-204
Issue: 2
Volume: 48
Year: 2025
Month: 2
X-DOI: 10.1080/1057610X.2022.2095700
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2095700
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:48:y:2025:i:2:p:179-204



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2090047_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Daniel Koehler
Author-X-Name-First: Daniel
Author-X-Name-Last: Koehler
Title: From Superiority to Supremacy: Exploring the Vulnerability of Military and Police Special Forces to Extreme Right Radicalization
Abstract: 
 This article explores potential vulnerability factors for extreme right radicalization of Special Operation Forces (SOF) and Special Weapons and Tactics (S.W.A.T.) personnel in Western countries. Drawing on inquiry commissions reports regarding extreme right behavior or ethical misconduct by six elite units from four countries (Germany, Canada, Australia, the U.S.), this article argues that a lack of diversity in gender and ethnicity, elite warrior subcultures, echo chamber effects and cognitive rigidity can become vulnerability factors for extreme right radicalization. Further, the need for targeted resilience among SOF and S.W.A.T. units designed to counter such processes is highlighted.
Journal: Studies in Conflict & Terrorism
Pages: 115-138
Issue: 2
Volume: 48
Year: 2025
Month: 2
X-DOI: 10.1080/1057610X.2022.2090047
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2090047
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:48:y:2025:i:2:p:115-138

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2058348_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Maria-Louise Clausen
Author-X-Name-First: Maria-Louise
Author-X-Name-Last: Clausen
Title: Exploring the Agency of the Affiliates of Transnational Jihadist Organizations: The Case of al-Qaeda in the Arabian Peninsula
Abstract: 
 The ability of trans-national jihadist organizations to exploit war, state collapse and geopolitical upheaval in the Middle East to expand and consolidate their global networks, is of major concern. This has led to a growing literature that investigates the factors that may or may not lead to the expansion of organizations such as al-Qaeda and Islamic State, but this literature has focused less on the continued agency of the affiliate once integrated into the trans-national jihadist organization. This article contributes to ongoing debates on inter-organizational dynamics within trans-national jihadist organizations by using the proxy war literature to explore the factors that may foster or inhibit the agency of local affiliates of trans-national jihadist organizations. It uses the case of al-Qaeda in the Arabian Peninsula to explore how a local affiliate navigates between the local and international. Specifically, the article suggests that al-Qaeda in the Arabian Peninsula displays substantial agency in how it navigates between local integration and its relationship to al-Qaeda central. In doing this, the article underscores the need to look beyond rhetoric aimed at an international audience to get a fuller understanding of the affiliates of trans-national jihadist organizations.
Journal: Studies in Conflict & Terrorism
Pages: 250-264
Issue: 3
Volume: 48
Year: 2025
Month: 3
X-DOI: 10.1080/1057610X.2022.2058348
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2058348
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:48:y:2025:i:3:p:250-264



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2058350_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Isak Svensson
Author-X-Name-First: Isak
Author-X-Name-Last: Svensson
Author-Name: Desirée Nilsson
Author-X-Name-First: Desirée
Author-X-Name-Last: Nilsson
Title: Capitalizing on Cleavages: Transnational Jihadist Conflicts, Local Fault Lines and Cumulative Extremism
Abstract: 
 Trans-national jihadist groups have established themselves across many contexts. However, we have limited knowledge about the larger picture of how such groups tap into various inter-religious, sectarian, or ethnic divisions. To address this research gap, we explore: How do trans-national jihadist groups mobilize on the basis of different forms of identity cleavages? Our empirical analysis focuses on all trans-national jihadist groups who have challenged governments in civil wars. We find that mobilization along ethnic divisions is the most common cleavage, and is increasing most over time. We also find that sectarian mobilization is rare, but associated with significant escalation of violence.
Journal: Studies in Conflict & Terrorism
Pages: 265-283
Issue: 3
Volume: 48
Year: 2025
Month: 3
X-DOI: 10.1080/1057610X.2022.2058350
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2058350
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:48:y:2025:i:3:p:265-283



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2058374_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Amira Jadoon
Author-X-Name-First: Amira
Author-X-Name-Last: Jadoon
Title: Operational Convergence or Divergence? Exploring the Influence of Islamic State on Militant Groups in Pakistan
Abstract: 
 Transnational terrorist organizations such as Al-Qaeda and the Islamic State often rely on local militant groups to set up new affiliates or branches around the world. While past research has generally explored the motivations of groups to align, as well as the effects of alliances on lethality and survival of groups at the core of an alliance hub, there is limited analysis of how links with a transnational jihadist group triggers changes in the operational behavior of groups embedded in local conflict dynamics. To investigate this phenomenon, this study provides an assessment of the changes in Pakistan-based groups’ tactics, targets, and geographical locations after they formed operational links with Islamic State’s affiliate in the Afghanistan-Pakistan region. More specifically, I examine Lashkar-e-Jhangvi’s and Jamaat-ul-Ahrar’s operational behavior shortly before and after they established links with Islamic State Khorasan (ISK), at the organizational or individual level, which emerged in 2015 and developed an extensive network in the region. The findings indicate that both groups expanded into new regions across Pakistan after the emergence of ISK, and also shifted their targeting priorities in ways that aligned with ISK’s top targets in the country. The findings further our understanding of the threat associated with the proliferation of transnational affiliates, and the security implications of interlinkages between international and local militant groups.
Journal: Studies in Conflict & Terrorism
Pages: 316-340
Issue: 3
Volume: 48
Year: 2025
Month: 3
X-DOI: 10.1080/1057610X.2022.2058374
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2058374
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:48:y:2025:i:3:p:316-340



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2058347_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Dino Krause
Author-X-Name-First: Dino
Author-X-Name-Last: Krause
Title: Failed Transnationalization? The Challenges Faced by al-Qaeda and IS in South Asia
Abstract: 
 What factors hinder al-Qaeda’s and IS’s ability to enter new conflict settings? Analyzing existing databases across three types of organized violence, I show that in South Asia, outside of Afghanistan and Pakistan, levels of violence associated with these organizations have remained lower than in other world regions. In the case of IS, the group’s anti-Deobandi stance has reduced its pool of affiliation partners. Moreover, the availability of other support channels has limited local groups’ demand for support from al-Qaeda and IS. Lastly, higher levels of democracy have allowed for the formation of political parties, which have targeted similar population segments as al-Qaeda and IS.
Journal: Studies in Conflict & Terrorism
Pages: 231-249
Issue: 3
Volume: 48
Year: 2025
Month: 3
X-DOI: 10.1080/1057610X.2022.2058347
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2058347
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:48:y:2025:i:3:p:231-249



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2058346_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Mona Kanwal Sheikh
Author-X-Name-First: Mona Kanwal
Author-X-Name-Last: Sheikh
Title: Transnational Jihad as a Bundled Conflict-Constellation
Journal: Studies in Conflict & Terrorism
Pages: 219-230
Issue: 3
Volume: 48
Year: 2025
Month: 3
X-DOI: 10.1080/1057610X.2022.2058346
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2058346
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:48:y:2025:i:3:p:219-230



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2058360_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Signe Marie Cold-Ravnkilde
Author-X-Name-First: Signe Marie
Author-X-Name-Last: Cold-Ravnkilde
Author-Name: Boubacar Ba
Author-X-Name-First: Boubacar
Author-X-Name-Last: Ba
Title: Jihadist Ideological Conflict and Local Governance in Mali
Abstract: 
 In West Africa’s Sahel region, franchises of global jihadist groups like Islamic State and al-Qaeda proliferate. So far, the dynamics of jihadist groups in the Sahel have predominantly been studied through analyses of the material and strategic dimensions of the struggle. Curiously, little attention has paid to how religiously-informed worldviews inform their expansion. Drawing on the concept of “epistemic worldviews”, this article explores how local leaders of al-Qaeda and Islamic State franchises frame their fight. It argues that transnational jihadist ideology matters; both for how different jihadist groups compete to mobilize new followers as well as for how they implement new models of jihadist governance. Contributing to ongoing debates about the transnationalization of jihad, the article shows that in the intra-jihadist contestation between the groups in Mali, global jihadist concepts are negotiated, contested, and constituted by the groups as they go along. Thereby global jihadist ideology comes to provide both a cause and an effect of contestations and conflicts between the expanding jihadist groups in the Sahel.
Journal: Studies in Conflict & Terrorism
Pages: 300-315
Issue: 3
Volume: 48
Year: 2025
Month: 3
X-DOI: 10.1080/1057610X.2022.2058360
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2058360
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:48:y:2025:i:3:p:300-315



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2058351_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Jerome Drevon
Author-X-Name-First: Jerome
Author-X-Name-Last: Drevon
Author-Name: Patrick Haenni
Author-X-Name-First: Patrick
Author-X-Name-Last: Haenni
Title: Redefining Global Jihad and Its Termination: The Subjugation of al-Qaeda by Its Former Franchise in Syria
Abstract: 
 The globalization of jihad has proceeded in several stages from the mobilization against the Soviet Union in Afghanistan in the 1980s to Islamic State’s current campaign. The end of global jihad is nonetheless less understood, including the conditions in which jihadi groups could reject al-Qaeda (AQ) or Islamic State (IS). This article examines this question through the trajectory of a former AQ franchise, jabhat al-nusra (JaN), that became hay’at tahrir al-sham (HTS) in 2017. This article argues that global jihad is not absolute. Global jihad exists on a spectrum of four inter-connected dimensions that can be disaggregated. In Syria, JaN was only partially globalist when it emerged. JaN’s rejection of IS and AQ resulted from its opposition to their strategic objectives against the backdrop of the evolution of the Syrian conflict, which eroded JaN’s globalism and made it particularly costly. This article is based on extensive field research and interviews with HTS’s leadership in Idlib and other insurgents that have interacted with the group over the years.
Journal: Studies in Conflict & Terrorism
Pages: 284-299
Issue: 3
Volume: 48
Year: 2025
Month: 3
X-DOI: 10.1080/1057610X.2022.2058351
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2058351
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:48:y:2025:i:3:p:284-299

Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2097585_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Carola García-Calvo
Author-X-Name-First: Carola
Author-X-Name-Last: García-Calvo
Author-Name: Fernando Reinares
Author-X-Name-First: Fernando
Author-X-Name-Last: Reinares
Title: How Members of the Islamic State-Linked Ripoll Cell Grouped, Radicalized and Plotted Mass Casualty Terrorist Attacks in Barcelona
Abstract: 
 Members of the so-called Ripoll cell plotted mass casualty attacks to be executed in Barcelona on August 20, 2017. Instead, some of them improvised vehicle-ramming and stabbing attacks earlier in Barcelona and Cambrils, also in Spain’s Catalonia. Who were those jihadists and how did they form an attack cell? What explains their radicalization into Salafi-jihadism? How did they prepare mass casualty attacks? The article’s three sections address these questions, mostly drawing from primary sources. As analyzed in the first section, the cell, formed by 10 men, nine of them young adults and adolescents born or raised in Spain, descendants of Moroccan immigrants, was built by an imam with past jihadist leanings who acted as entrepreneur. As explained in the second section, the radicalization leading to terrorism underwent by these individuals was highly contingent upon both in person exposure to a radicalizing agent as well as preexisting kinship and friendship ties. Finally, as substantiated in the third section, members of the Ripoll cell performed the plot’s six tasks, from financing and securing attack preparation to selecting the terrorist modality and targets, in a remarkably articulated and coordinated way consistent with its IS-linked nature.
Journal: Studies in Conflict & Terrorism
Pages: 341-368
Issue: 4
Volume: 48
Year: 2025
Month: 4
X-DOI: 10.1080/1057610X.2022.2097585
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2097585
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:48:y:2025:i:4:p:341-368



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2097586_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Bernhard Blumenau
Author-X-Name-First: Bernhard
Author-X-Name-Last: Blumenau
Title: From Punishment to Pre-emption: The Changing Nature of Regional Organizations’ Legal Responses to Terrorism, 1990–2010
Abstract: 
 This article examines regional organizations’ antiterrorism efforts across the globe from 1990 until 2010. Empirically, it provides a comprehensive overview of the legal responses developed. Analytically, it determines long-term patterns and regional differences in these treaties, examines bones of contention, and how these were overcome. This study shows that after the Cold War, all regions developed legal antiterrorism frameworks, but states continued to preserve their sovereignty by various means; and extraditing or trying suspects remained the compromise of choice. Importantly, these antiterrorism efforts marked a watershed. Measures shifted from an approach exclusively focused on punishing and deterring terrorists toward an emphasis on preemption.
Journal: Studies in Conflict & Terrorism
Pages: 392-418
Issue: 4
Volume: 48
Year: 2025
Month: 4
X-DOI: 10.1080/1057610X.2022.2097586
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2097586
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:48:y:2025:i:4:p:392-418



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2097584_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Elizabeth M. Jenaway
Author-X-Name-First: Elizabeth M.
Author-X-Name-Last: Jenaway
Author-Name: Steven Windisch
Author-X-Name-First: Steven
Author-X-Name-Last: Windisch
Title: And the Last Straw Falls: The Cumulative Influence of Disillusionment among Former Viet Cong Insurgents
Abstract: 
 Relying on interviews with 87 former members of the Viet Cong, we investigate the cumulative role of unmet behavioral and emotional expectations in producing disillusionment. We found that the combination of unmet expectations generated negative emotions, creating distance between participants and their organization. Unlike desistance from conventional crime, which results from a reduction in anger, we found that the emergence of anger provoked disengagement from the insurgency. Moreover, our findings highlight how disillusionment does not begin with a single event but is influenced by the cascading effect of multiple factors that merge over time.
Journal: Studies in Conflict & Terrorism
Pages: 439-461
Issue: 4
Volume: 48
Year: 2025
Month: 4
X-DOI: 10.1080/1057610X.2022.2097584
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2097584
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:48:y:2025:i:4:p:439-461



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2098553_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Andrew Glazzard
Author-X-Name-First: Andrew
Author-X-Name-Last: Glazzard
Title: Violent Extremist Disengagement and Reintegration: A Framework for Planning, Design and Evaluation of Programmatic Interventions
Abstract: 
 Disengagement from violent extremism and reintegration into mainstream society have been the focus of significant research over the last 15 years. However, programs to facilitate or bring about violent extremist disengagement and reintegration are under-researched, largely as a result of the opacity of these programs and difficulties in access. Understanding how and why programs work or do not work is also impeded by conceptual confusion, and by four specific problems which have been discussed in the relevant literature: insufficient attention to the context and environment surrounding programmatic interventions, lack of clarity over their intended outcomes, lack of specificity in responses, and simplistic models of causation. The paper endorses previous studies recommending the use of realist evaluation to understand disengagement and reintegration interventions, and proposes a conceptual framework derived from an extensive review of the relevant literature to support planning, design and evaluation of interventions.
Journal: Studies in Conflict & Terrorism
Pages: 419-438
Issue: 4
Volume: 48
Year: 2025
Month: 4
X-DOI: 10.1080/1057610X.2022.2098553
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2098553
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:48:y:2025:i:4:p:419-438



Template-Type: ReDIF-Article 1.0
# input file: UTER_A_2099269_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462
Author-Name: Ryan Scrivens
Author-X-Name-First: Ryan
Author-X-Name-Last: Scrivens
Author-Name: Garth Davies
Author-X-Name-First: Garth
Author-X-Name-Last: Davies
Author-Name: Tiana Gaudette
Author-X-Name-First: Tiana
Author-X-Name-Last: Gaudette
Author-Name: Richard Frank
Author-X-Name-First: Richard
Author-X-Name-Last: Frank
Title: Comparing Online Posting Typologies among Violent and Nonviolent Right-Wing Extremists
Abstract: 
 Although many researchers, practitioners, and policymakers are concerned about identifying and characterizing online posting patterns of violent extremists prior to their engagement in violence offline, little is empirically known about their online patterns generally or differences in their patterns compared to their nonviolent counterpart particularly. In this study, we drew from a unique sample of violent and nonviolent right-wing extremists to develop and compare their online posting typologies (i.e. super-posters, committed, engaged, dabblers, and non-posters) in the largest white supremacy web-forum. We identified several noteworthy posting patterns that may assist law enforcement and intelligence agencies in identifying credible threats online.
Journal: Studies in Conflict & Terrorism
Pages: 369-391
Issue: 4
Volume: 48
Year: 2025
Month: 4
X-DOI: 10.1080/1057610X.2022.2099269
File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2099269
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:uterxx:v:48:y:2025:i:4:p:369-391