Publication Cover
International Interactions
Empirical and Theoretical Research in International Relations
Volume 44, 2018 - Issue 3
765
Views
1
CrossRef citations to date
0
Altmetric
Research Note

Targets and Tactics: Testing for a Duality within Al Qaeda’s Network

&

References

  • Abrahms, Max. (2006) Al Qaeda’s Scorecard: A Progress Report on Al Qaeda’s Objectives. Studies in Conflict & Terrorism 29(5):509–529. doi:10.1080/10576100600698527.
  • Abrahms, Max. (2008) What Terrorists Really Want: Terrorist Motives and Counterterrorism Strategy. International Security 32(4):78–105. doi:10.1162/isec.2008.32.4.78.
  • Arsenault, Elizabeth Grimm, and Tricia Bacon. (2015) Disaggregating and Defeating Terrorist Safe Havens. Studies in Conflict & Terrorism 38(2):85–112. doi:10.1080/1057610X.2014.977605.
  • Bloom, Mia. (2004) Palestinian Suicide Bombing: Public Support, Market Share, and Outbidding. Political Science Quarterly 119(1):61–88. doi:10.2307/20202305.
  • Bloom, Mia. (2005) Dying to Kill: The Allure of Suicide Terror. New York: Columbia Uni- versity Press.
  • Brown, Michael. (2010) Contending with Terrorism: Roots, Strategies, and Re- Sponses. Cambridge: MIT Press.
  • Buesa, Mikel, and Thomas Baumert. (2016) Hit the Core or Weaken the Periphery? Comparing Strategies to Break the Circle of Violence with an Embryonic Terrorist Group: The Case of Galician Resistance. Terrorism and Political Violence 0(0):1–28. doi:10.1080/09546553.2016.1182910.
  • Byman, Daniel. (2014) Buddies or Burdens? Understanding the Al Qaeda Relationship with Its Affiliate Organizations. Security Studies 23(3):431–470. doi:10.1080/09636412.2014.935228.
  • Byman, Daniel. (2015) Beyond Counterterrorism. Foreign Affairs Nov/Dec. Available at https://www.foreignaffairs.com/articles/2015-10-20/beyond-counterterrorism.
  • Byman, Daniel, and Sarah Kreps. (2010) Agents of Destruction? Applying Principal- Agent Analysis to State-Sponsored Terrorism. International Studies Perspectives 11(1):1–18. doi:10.1111/insp.2010.11.issue-1.
  • Byman, Daniel. (2003) Al-Qaeda as an Adversary Do We Understand Our Enemy? World Politics 56(1):139–163. doi:10.1353/wp.2004.0002.
  • Cederman, Lars-Erik, and Kristian Skrede Gleditsch. (2009) Introduction to Special Issue on “Disaggregating Civil War”. Journal of Conflict Resolution 53(4):487–495. doi:10.1177/0022002709336454.
  • Chenoweth, Erica. (2010) Democratic Competition and Terrorist Activity. The Journal of Politics 72(1):16–30. doi:10.1017/S0022381609990442.
  • Chenoweth, Erica. (2013) Terrorism and Democracy. Annual Review of Political Science 16:355–:378.
  • Choi, Seung-Whan, and James Piazza. (2016) Ethnic Groups, Political Exclusion and Domestic Terrorism. Defence and Peace Economics 27(1):37–63. doi:10.1080/10242694.2014.987579.
  • Cronin, Audrey. (2006) How al-Qaida Ends: The Decline and Demise of Terrorist Groups. International Security 31(1):7–48. doi:10.1162/isec.2006.31.1.7.
  • Cronin, Audrey. (2009) How Terrorism Ends: Understanding the Decline and Demise of Terrorist Campaigns. Princeton: Princeton University Press.
  • Dalacoura, Katerina. (2012) Democracy as Counter-Terrorism in the Middle East: A Red Herring? International Relations 8(32):101–114.
  • de Mesquita, Ethan, C. Christine Fair, Jenna Jordan, Rasul Bakhsh Rais, and Jacob Shapiro. (2015) Measuring Political Violence in Pakistan: Insights from the BFRS Dataset. Conflict Management and Peace Science 32(5):536–558. doi:10.1177/0738894214542401.
  • Fearon, James D, Kimuli Kasara, and David D Laitin. (2007) Ethnic Minority Rule and Civil War Onset. American Political Science Review 101(1):187–193. doi:10.1017/S0003055407070219.
  • Fearon, James, and David Laitin. (2011) Sons of the Soil, Migrants, and Civil War. World Development 39(2):199–211. doi:10.1016/j.worlddev.2009.11.031.
  • Findley, Michael, and Joseph Young. (2012) Terrorism and Civil War: A Spatial and Temporal Approach to A Conceptual Problem. Perspectives on Politics 10(2):285–305. doi:10.1017/S1537592712000679.
  • Gerges, Fawaz. (2009) The Far Enemy: Why Jihad Went Global. Cambridge: Cambridge University Press.
  • Gill, Paul, James Piazza, and John Horgan. (2016) Counterterrorism Killings and Provisional IRA Bombings, 1970–1998. Terrorism and Political Violence 28(3):473–496. doi:10.1080/09546553.2016.1155932.
  • Gray, David H, and Erik Stockham. (2008) Al-Qaeda in the Islamic Maghreb: The Evolution from Algerian Islamism to Transnational Terror. African Journal of Political Science and International Relations 2(4):91–97.
  • Gunaratna, Rohan. (2002) Inside Al Qaeda: Global Network of Terror. New York: Columbia University Press.
  • Gunaratna, Rohan. (2014) Terrorist Threat in 2014. UNISCI Discussion Papers 1(34):97–101.
  • Hoffman, Bruce. (2004) The Changing Face of Al Qaeda and the Global War on Terrorism. Studies in Conflict & Terrorism 27(6):549–560. doi:10.1080/10576100490519813.
  • Horowitz, Michael. (2010) Nonstate Actors and the Diffusion of Innovations: The Case of Suicide Terrorism. International Organization 64(1):33–64. doi:10.1017/S0020818309990233.
  • Horowitz, M C., and Philip Potter. (2014) Allying to Kill Terrorist Intergroup Cooperation and the Consequences for Lethality. Journal of Conflict Resolution 58(2):199–225. doi:10.1177/0022002712468726.
  • Jacobson, Daniel, and Edward Kaplan. (2007) Suicide Bombings and Targeted Killings in (Counter-) Terror Games. Journal of Conflict Resolution 51(5):772–792. doi:10.1177/0022002707304814.
  • Jones, Sidney. (2011) The Ongoing Extremist Threat in Indonesia. Southeast Asian Affairs (2011)(1):91–104.
  • Kydd, Andrew, and Barbara Walter. (2006) The Strategies of Terrorism. International Security 31(1):49–80. doi:10.1162/isec.2006.31.1.49.
  • Li, Quan. (2005) Does Democracy Promote or Reduce Transnational Terrorist Incidents? Journal of Conflict Resolution 49(2):278–297. doi:10.1177/0022002704272830.
  • Mapping Militant Organizations Project. (2016). Stanford University. Available at http://web.stanford.edu/group/mappingmilitants/cgi-bin/.
  • Mendelsohn, Barak. (2016) The al-Qaeda Franchise. Oxford: Oxford University Press.
  • Merolla, Jennifer L, and Elizabeth J Zechmeister. (2009) Democracy at Risk: How Terrorist Threats Affect the Public. Chicago: University of Chicago Press.
  • MIPT Terrorism Knowledge Base (TKB): Profiles archived through START’s Big, Allied and Dangerous (BAAD). (2016). Available at http://www.start.umd.edu/baad/database.
  • Moghadam, Assaf. (2006) Suicide Terrorism, Occupation, and the Globalization of Martyrdom: A Critique of Dying to Win. Studies in Conflict & Terrorism 29(8):707–729. doi:10.1080/10576100600561907.
  • Moghadam, Assaf. (2008) The Globalization of Martyrdom: Al Qaeda, Salafi Jihad, and the Dif- Fusion of Suicide Attacks. Baltimore: Johns Hopkins University Press.
  • National Consortium for the Study of Terrorism and Responses to Terrorism (START). (2016). Global Terrorism Database [Data file] Available at https://www.start.umd.edu/gtd.
  • Pape, Robert. (2003) The Strategic Logic of Suicide Terrorism. American Political Science Review 97(3):343–361. doi:10.1017/S000305540300073X.
  • Pedahzur, Ami, Ed. (2006) Root Causes of Suicide Terrorism: The Globalization of Martyrdom. New York: Routledge.
  • Perliger, Arie, Gabriel Koehler-Derrick, and Ami Pedahzur. (2016) The Gap Between Participation and Violence: Why We Need to Disaggregate Terrorist ‘Profiles’. International Studies Quarterly 60(2):220–229. doi:10.1093/isq/sqv010.
  • Piazza, James. (2007) Draining the Swamp: Democracy Promotion, State Failure, and Terrorism in 19 Middle Eastern Countries. Studies in Conflict & Terrorism 30(6):521–539. doi:10.1080/10576100701329576.
  • Piazza, James. (2008) Incubators of Terror: Do Failed and Failing States Promote Transnational Terrorism? International Studies Quarterly 52(3):469–488. doi:10.1111/isqu.2008.52.issue-3.
  • Piazza, James. (2009) Is Islamist Terrorism More Dangerous? An Empirical Study of Group Ideology, Organization, and Goal Structure. Terrorism and Political Violence 21(1):62–88. doi:10.1080/09546550802544698.
  • Price, Bryan C. (2012) Targeting Top Terrorists: How Leadership Decapitation Contributes to Counterterrorism. International Security 36(4):9–46. doi:10.1162/ISEC_a_00075.
  • Riedel, Bruce. (2010) The Search for Al Qaeda: Its Leadership, Ideology, and Future. Washington, DC: Brookings Institution Press.
  • Rollins, John. (2010) Al Qaeda and Affiliates Historical Perspective, Global Presence, and Implications for U.S. Policy: CRS report for Congress. Washington, DC: DIANE Publishing/Congressional Research Service.
  • Sambanis, Nicholas. (2004) What Is Civil War? Conceptual and Empirical Complexities of an Operational Definition. Journal of Conflict Resolution 48(6):814–858. doi:10.1177/0022002704269355.
  • Sambanis, Nicholas. (2008) Terrorism and Civil War. In Terrorism, Economic Development, and Political Openness, edited by Philip Keefer and Norman Loayza. Cambridge: Cambridge University Press.
  • Sánchez-Cuenca, Ignacio, and Luis De la Calle. (2009) Domestic Terrorism: The Hidden Side of Political Violence. Annual Review of Political Science 12:31–49. doi:10.1146/annurev.polisci.12.031607.094133.
  • Savun, Burcu, and Brian Phillips. (2009) Democracy, Foreign Policy, and Terrorism. Journal of Conflict Resolution 53(6):878–904. doi:10.1177/0022002709342978.
  • Seifert, Katherine, and Clark McCauley. (2014) Suicide Bombers in Iraq, 2003–2010: Disaggregating Targets Can Reveal Insurgent Motives and Priorities. Terrorism and Political Violence 26(5):803–820. doi:10.1080/09546553.2013.778198.
  • Sidel, John. (2008) The Islamist Threat In South East Asia: Much Ado About Nothing? Asian Affairs 39(3):339–351. doi:10.1080/03068370802341032.
  • Siqueira, Kevin, and Todd Sandler. (2010) Terrorist Networks, Support, and Delegation. Public Choice 142(1–2):237–253. doi:10.1007/s11127-009-9487-y.
  • Stanton, Jessica. (2013) Terrorism in the Context of Civil War. The Journal of Politics 75(4):1009–1022. doi:10.1017/S0022381613000984.
  • Stern, Jessica. (2003b) Terror in the Name of God: Why Religious Militants Kill. New York: HarperCollins Publishers.
  • Stern, Jessica. (2003a) The Protean Enemy. Foreign Affairs 82(4):27–40. doi:10.2307/20033647.
  • Tilly, Charles. (2004) Terror, Terrorism, Terrorists. Sociological Theory 22(1):5–13. doi:10.1111/j.1467-9558.2004.00200.x.
  • Velicer, Wayne F, Cheryl A Eaton, and Joseph L Fava. (2000) Construct Explication through Factor or Component Analysis: A Review and Evaluation of Alternative Procedures for Determining the Number of Factors or Components. In Problems and Solutions in Human Assessment, edited by Richard D Goffin and Edward Helmes. US: Springer US.
  • Wade, Sara Jackson, and Dan Reiter. (2007) Does Democracy Matter? Regime Type and Suicide Terrorism. Journal of Conflict Resolution 51(2):329–348. doi:10.1177/0022002706298137.
  • Walsh, James, and James Piazza. (2010) Why Respecting Physical Integrity Rights Reduces Terrorism. Comparative Political Studies 43(5):551–577. doi:10.1177/0010414009356176.
  • Wilkinson, Paul. (2011) Terrorism Versus Democracy: The Liberal State Response. 3rd edition. New York: Routledge.
  • Young, Joseph, and Michael Findley. (2011) Promise and Pitfalls of Terrorism Research. International Studies Review 13(3):411–431. doi:10.1111/misr.2011.13.issue-3.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.