Query Result Set
Skip Navigation Links
   ActiveUsers:842Hits:19986079Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
STUDIES IN CONFLICT AND TERRORISM VOL: 40 NO 1-3 (15) answer(s).
 
SrlItem
1
ID:   156148


Brothers, believers, brave mujahideen: focusing attention on the audience of violent jihadist preachers / Aly, Anne   Journal Article
Aly, Anne Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The exponential growth in the use of the Internet and social media by terrorist actors and violent extremists has generated research interest into terrorism and the Internet. Much of this research is focused on the kinds of messages being spread via the various media platforms that host violent extremist content. This research has yielded significant insights into how organizations such as Al Qaeda and Islamic State craft their messages, the mediums they use to disseminate their messages, and the ways in which they reach their audiences. Yet we are still no closer to understanding why certain messaging appeals to certain people in certain ways and not to others. Within the literature on terrorism and the Internet, the audience—those individuals who receive messages, make meaning from them and then decide whether to act on them—is conspicuously missing. As a result, research into terrorism and the Internet can only hypothesize about the nature and extent of influence that terrorist messages wield. It is often based on an assumption that the violent extremist narrative works like a magic bullet to radicalize audiences already vulnerable and predisposed to becoming violent. Utilizing media theory approaches to studying the audience as an active agent in meaning-making, this article proposes a research framework for developing the current focus on terrorism and the Internet.
        Export Export
2
ID:   156147


Call to Jihad: charismatic preachers and the internet / Gendron, Angela   Journal Article
Gendron, Angela Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract A range of psychological, social, and environmental factors render some individuals more susceptible to militant Islam than others. Research also suggests that there are certain “triggers,” which help to explain why it is that only some individuals exposed to the same societal structural influences turn to violence. This article seeks to contribute to future empirical research in this area by studying the significance of certain “charismatic” preachers in this process and examining the role the Internet plays in strengthening the charismatic bond. Difficulties in defining and measuring “charisma” may help in part to explain the paucity of research on this aspect of radicalization but since charismatic authority derives from the bond between preacher and follower, an examination of the activities, strategies, and techniques used to build relationships and win adherents to Salafi-jihadism may provide valuable insights for countering radicalization.
Key Words Internet  Call to Jihad  Charismatic Preachers 
        Export Export
3
ID:   156149


Determining the role of the internet in violent extremism and terrorism: six suggestions for progressing research / Conway, Maura   Journal Article
Conway, Maura Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Some scholars and others are skeptical of a significant role for the Internet in processes of violent radicalization. There is increasing concern on the part of other scholars, and increasingly also policymakers and publics, that easy availability of violent extremist content online may have violent radicalizing effects. This article identifies a number of core questions regarding the interaction of violent extremism and terrorism and the Internet, particularly social media, that have yet to be adequately addressed and supplies a series of six follow-up suggestions, flowing from these questions, for progressing research in this area. These suggestions relate to (1) widening the range of types of violent online extremism being studied beyond violent jihadis; (2) engaging in more comparative research, not just across ideologies, but also groups, countries, languages, and social media platforms; (3) deepening our analyses to include interviewing and virtual ethnographic approaches; (4) up-scaling or improving our capacity to undertake “big data” collection and analysis; (5) outreaching beyond terrorism studies to become acquainted with, for example, the Internet Studies literature and engaging in interdisciplinary research with, for example, computer scientists; and (6) paying more attention to gender as a factor in violent online extremism.
        Export Export
4
ID:   156145


Electronic jihad: the internet as Al Qaeda's catalyst for global terror / Rudner, Martin   Journal Article
Rudner, Martin Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The Internet has emerged as a key technology for Al Qaeda and other jihadist movements waging their so-called electronic jihad across the Middle East and globally, with digital multiplier effects. This study will examine the evolving doctrine of “electronic jihad” and its impact on the radicalization of Muslims in Western diaspora communities The study describes Internet-based websites that served as online libraries and repositories for jihadist literature, as platforms for extremist preachers and as forums for radical discourse. Furthermore, the study will then detail how Internet connectivity has come to play a more direct operational role for jihadi terrorist-related purposes, most notably for inciting prospective cadres to action; for recruiting jihadist operatives and fighters; for providing virtual training in tactical methods and manufacture of explosives; for terrorism financing; and for actual planning and preparations for specific terror attacks. Whereas contemporary jihadist militants may be shifting from the World Wide Web to social media, such as Facebook, YouTube, and Twitter for messaging and communications, nevertheless the Internet-based electronic jihad remains a significant catalyst for promoting jihadist activism and for facilitating terrorist operations.
        Export Export
5
ID:   156151


Framing through paradox: Egypt and the “obama supports terrorism” campaign / Pinfari, Marco   Journal Article
Pinfari, Marco Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article presents and analyzes the “Obama supports terrorism” campaign, which was launched in Egypt in late June 2013 and was instrumental to the framing of some Islamist groups as terrorist both before and after the 3 July 2013 coup. The analysis of the visual material of the campaign highlights its reliance on various Western discourses from the War on Terror, including some whose religious and racial content is an odd fit for a non-Western, Muslim country like Egypt. Yet, despite the lack of a clear and unified causal narrative to justify such framing, the success of the campaign was crucially aided by the symbolic and rhetorical power its slogan, which provided a credible “schema of interpretation” for its supporters.
Key Words Egypt  Paradox  Obama Supports Terrorism 
        Export Export
6
ID:   156157


Introducing the 1993 terrorism and political violence dataset / Ramos, Kristen; Acosta , Benjamin   Journal Article
Ramos, Kristen Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The introduction of the Global Terrorism Database (GTD) nearly a decade ago sparked a revolution in terrorism studies. However, one major flaw in the database continues to plague GTD users. Data lost prior to digitalization, along with unsuccessful data recollection efforts, have left GTD without data on events that took place during the year 1993. The missing data prevents researchers from using the entirety of GTD's annual range (1970–2014) to conduct reliable time-series analyses. Additionally, it has likely contributed to the formation of theories and claims on faulty empirical ground. To remedy the problem, we have collected data on 4,206 unique terror-attack incidents, with the aim of documenting the universe of 1993 terrorism events. This article showcases our 1993 dataset and illustrates the importance of terrorism events in 1993 for the development of conflicts in Israel, Afghanistan, Colombia, and India.
        Export Export
7
ID:   156156


Making the sky relevant to battle strategy: counterinsurgency and the prospects of air power in Nigeria / Oyewole, Samuel   Journal Article
Oyewole, Samuel Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract One of the most important roles in counterinsurgency (COIN) is to maintain adequate security presence to protect lives and properties of the affected population and restore law and order in the society. Accordingly, the state of affairs in Nigeria's COIN theater has been affected by the quantity and quality of security presence, most especially the ability of the operatives to gather timely and relevant information and mobilize for prompt response. Although the roles of the ground operatives have dominated public attention, the local air force and the complementary air powers have affected the security situations with the level of their presence or absence in the sky for intelligence, surveillance, and reconnaissance; firepower; and transportation in the theater. This study examines the relevance of security presence to achieve the objective of COIN and the prospects of air power in this arrangement in Nigeria and the Lake Chad region.
Key Words Counterinsurgency  Nigeria  COIN  Battle Strategy  Air Power  Sky Relevant 
        Export Export
8
ID:   156158


Psychology of foreign fighters / Fein, Robert; Borum, Randy   Journal Article
Borum, Randy Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The recent influx of foreign fighters into Syria, particularly those aligning with the Islamic State, has brought renewed attention to the security threat posed by people who cross borders to participate in armed conflict. Although foreign fighters have rarely, if ever, constituted the majority of combatants in a war or insurgency, understanding their role is critical for conflict analysis and prevention. This review focuses on behavioral aspects of the foreign fighter phenomenon. Although other books and articles have focused wholly, or in part, on historical dimensions, the behavioral and social science literature on foreign fighters is much more limited. This review first explores the definitions of “foreign fighter” terminology, then analyzes what is known about their motivations and their pathways toward engaging in armed conflict on foreign soil. It examines recruitment strategies and the role of “radicalization” in feeding the transnational insurgent supply, and finally describes more specifically, the nature of foreign fighter involvement in more recent armed conflicts (e.g., Syria, Chechnya, Iraq, and Afghanistan), and speculates about the prospects for their future involvement.
        Export Export
9
ID:   156152


Specifying kidnapping for ransom epidemics at the global level: a matched-case control design / Shariati, Auzeen; Pires, Stephen F ; Guerette, Rob T   Journal Article
Pires, Stephen F Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Criminal groups around the world frequently rely on kidnapping for ransom (K&R) to fund and further their cause. Some case studies suggest war torn, fragile, and corrupt countries experience K&R epidemics more often. While such factors may be present in some countries experiencing K&R epidemics, it remains to be seen if these failed state factors are generalizable to all nations. To date, no research has systematically examined the conditions that might facilitate K&R epidemics. This study used a case-control design comparing countries with high rates of K&R (experimental) to countries without a K&R problem (control). Findings suggest that problem K&R countries were less secure, less peaceful, and unevenly developed in relation to social and economic indicators. Better understanding of the conditions involving K&R problems offers to improve foresight and the development of effective policy responses.
        Export Export
10
ID:   156155


Talking to foreign fighters: insights into the motivations for hijrah to Syria and Iraq / Amarasingam, Amarnath; Dawson, Lorne L   Journal Article
Dawson, Lorne L Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Little of the discussion of foreign fighters in Syria and Iraq is informed by primary data derived from talking with the foreign fighters. This article reports some initial findings from interviews with twenty foreign fighters in Syria. The findings are compared with three other recent studies of European foreign fighters, and aspiring fighters, based on some primary data. While those studies emphasize the role of low social and economic prospects in motivating the choice to go, this study found little evidence of such factors, and alternatively argues more attention should be given to existential concerns and the role of religiosity. Consideration is also given to the methodological challenges posed by using of terrorists' accounts of their motivations.
Key Words Foreign fighters  Syria and Iraq  Hijrah 
        Export Export
11
ID:   156153


Terrorist assassinations and target selection / Bell, Laura N   Journal Article
Laura N. Bell Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This research note examines political institutional changes in the aftermath of terrorist assassinations. Contemporary assassinations are more often a component of wider campaigns of political violence rather than a singular attack on a head of state. The Global Terrorism Database counts 16,831 terrorist assassinations from 1970–2014, indicating significant frequency of these events and includes a wide range of targets from law enforcement officials to foreign diplomats. Utilizing survival analysis, the span of time from a terrorist assassination event to a change in political institutions within states is measured between target types. Outcome differences between target types are identified.
        Export Export
12
ID:   156144


Terrorist online propaganda and radicalization / Chen, Thomas M; Aly, Anne   Journal Article
Aly, Anne Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The Internet is a transformative technology that terrorists are exploiting for the spread of propaganda and radicalizing new recruits. While Al Qaeda has a longer history, Islamic State is conducting a modern and sophisticated media campaign centered around online social networking. This article introduces and contextualizes the contributions to this Special Issue by examining some of the ways in which terrorists make use of the Internet as part of their broader media strategies.
        Export Export
13
ID:   156150


Unwilling Cocoons: boko haram's war against women / Oriola, Temitope B   Journal Article
Oriola, Temitope B Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The kidnapping of 276 girls at Government Secondary School Chibok, Borno State, Nigeria, on 14 April 2014 has brought into international prominence the organization Jama'atu Ahlis Suna Lidda'awati Wal Jihad or Boko Haram. This incident heralded a new trajectory in Boko Haram's tactics and strategies. This article focuses on Boko Haram's strategic deployment of sexual and gender-based violence (SGBV) against women. The gendered performativity of Boko Haram, its methodology for sourcing for women and young girls, and its concomitant utilitarian/instrumental approach vis-à-vis SGBV against women are analyzed against the backdrop of the political economy and patriarchal ideational infrastructure of the Nigerian society. The article argues that Boko Haram's deployment of SGBV against women is an extension of the “repertoire of violence” ingrained in the sociopolitical and cultural milieu of Boko Haram's primary area of operation. Boko Haram's instrumental approach to SGBV is fourfold and hinges on the sociobiological utility of women. Boko Haram construes women as the bearers of its future despite its brutality toward them. The consequence is a strategic plan for procreation of a new generation of children raised through the cyclical constellation of mass rape of women, consequent impregnation and kidnapping the offspring of such rapes. Overall, this article contributes to the burgeoning scholarly literature on Boko Haram's terrorist activities.
        Export Export
14
ID:   156146


Westgate: a case study: how Al-shabaab used twitter during an ongoing attack / Mair, David   Journal Article
Mair, David Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract During the Westgate terrorist attack of 2013, al-Shabaab used Twitter to claim responsibility for and live tweet throughout the attack. This article analyzes 556 of these tweets to understand the motivations for using Twitter during ongoing terrorist operations and builds up a picture of how al-Shabaab interacted with Twitter throughout the Westgate attack. Conclusions arising from the analysis include that al-Shabaab were primarily concerned with controlling the narrative of the attack and retaining an audience. In addition, the tweets were aimed at a specific geographical audience, indicating that the Westgate attack was primarily motivated by territorial concerns.
Key Words Al-Shabaab  Twitter  Westgate  Ongoing Attack 
        Export Export
15
ID:   156154


What does dabiq do? ISIS hermeneutics and organizational fractures within dabiq magazine / Colas, Brandon   Journal Article
Colas, Brandon Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The Islamic State of Iraq and Syria (ISIS)'s flagship English-language magazine, Dabiq, is a puzzle. The magazine is not, despite appearances, primarily designed for direct recruiting efforts or inciting violence against the West. In fact, the primary audiences of Dabiq are English-speaking second generation Muslims or converts, Western policymakers, and a third group of current or would-be members of ISIS who are not integrating with the organization itself. The third audience—those members who are failing to function within the organization—is strange to include in an English-language magazine. Why publish organizational weaknesses, in English? One possibility for this puzzle is that the fundamentalist hermeneutics of ISIS is reflected in their own media efforts. One of the assumptions that ISIS holds about their sacred texts is that each text carries a single meaning that reflects the author's original intent. There might be multiple applications of that intent, but each text can only have one intent, and therefore one meaning. Following this logic, a message meant for one person is unlikely to be of utility for another, and so this may be why ISIS exposes their weaknesses as part of the process of correcting their own members.
        Export Export