Publication Cover
International Interactions
Empirical and Theoretical Research in International Relations
Volume 47, 2021 - Issue 4
565
Views
1
CrossRef citations to date
0
Altmetric
Articles

Constraints and military coordination: How ICTs shape the intensity of rebel violence

ORCID Icon & ORCID Icon

References

  • Arjona, Ana. 2017a. “Civilian Cooperation and Non-Cooperation with Non- State Armed Groups: The Centrality of Obedience and Resistance.” Small Wars & Insurgencies 28 (755–778): 4–5. doi:10.1080/09592318.2017.1322328
  • Arjona, Ana. 2017b. Rebelocracy: Social Order in the Colombian Civil War. Cambridge: Cambridge University Press.
  • Bailard, Catie Snow. 2015. “Ethnic Conflict Goes Mobile: Mobile Technology’s Effect on the Opportunities and Motivations for Violent Collective Action.” Journal of Peace Research 52 (3): 323–37. doi:10.1177/0022343314556334
  • Balcells, Laia. 2017. Rivalry and Revenge. The Politics of Violence in Civil War. New York: Cambridge University Press.
  • Barceló, Joan, and Elena Labzina. 2020. “Do Islamic State’s Deadly Attacks Disengage, Deter, or Mobilize Supporters?” British Journal of Political Science 50 (4): 1539–59. doi:10.1017/S0007123418000340.
  • Berman, Eli, Jacob N. Shapiro, and Joseph H. Felter. 2011. “Can Hearts and Minds Be Bought? The Economics of Counterinsurgency in Iraq.” Journal of Political Economy 119 (4): 766–819. doi:10.1086/661983
  • Berman, Eli, Joseph H. Felter, Jacob N. Shapiro, and Erin Troland. 2013. “Modest, Secure, and Informed: Successful Development in Conflict Zones.” American Economic Review 103 (3): 512–17. doi:10.1257/aer.103.3.512
  • Bertram, Stewart, and Keith Ellison. 2014. “Sub Saharan African Terrorist Groups’ Use of the Internet.” Journal of Terrorism Research 5 (1): 5–26. doi:10.15664/jtr.825
  • Bimber, Bruce, Andrew J. Flanagin, and Cynthia Stohl. 2005. “Reconceptualizing Collective Action in the Contemporary Media Environment.” Communication Theory 15 (4): 365–88. doi:10.1111/j.1468-2885.2005.tb00340.x
  • Bob, Clifford. 2005. The Marketing of Rebellion: Insurgents, Media, and International Activism. Cambridge: Cambridge University Press.
  • Butler, Christopher K., David E. Cunningham, and Scott Gates. 2017. “Explaining Civil War Severity: A Formal Model and Empirical Analysis.” Working Paper, University of New Mexico.
  • Byman, Daniel. 2013. “Outside Support for Insurgent Movements.” Studies in Conflict and Terrorism 36 (12): 981–1004. doi:10.1080/1057610X.2013.842132.
  • Byman, Daniel. 2018. “An Intelligence Reserve Corps to Counter Terrorist Use of the Internet.” Aegis Series Paper No. 1810. Stanford: Hoover Institution.
  • Campana, Aurélie, and Benjamin Ducol. 2015. “Voices of the ‘Caucasus Emirate’: Mapping and Analyzing North Caucasus Insurgency Websites.” Terrorism and Political Violence 27 (4): 679–700. doi:10.1080/09546553.2013.848797.
  • Castells, Manuel. 2009. Communication Power. Oxford: Oxford University Press.
  • Corrales, Javier. 2006. “Information Technology Adoption and Political Regimes.” International Studies Quarterly 50 (4): 911–33. doi:10.1111/j.1468-2478.2006.00431.x
  • Cunningham, David E., Kristian Skrede Gleditsch, and Idean Salehyan. 2009. “It Takes Two: A Dyadic Analysis of Civil War Duration and Outcome.” Journal of Conflict Resolution 53 (4): 570–97. doi:10.1177/0022002709336458
  • Cunningham, Kathleen Gallagher, Kristin M. Bakke, Lee J. M. Seymour. 2012. “Shirts Today, Skins Tomorrow: Dual Contests and the Effects of Fragmentation in Self-Determination Disputes.” Journal of Conflict Resolution 56 (1): 67–93. doi:10.1177/0022002711429697
  • De La Calle, Luis. 2015. Nationalist Violence in Post-War Europe. New York: Cambridge University Press.
  • DeMeritt, Jacqueline H.R. 2012. “International Organizations and Government Killing: Does Naming and Shaming Save Lives?” International Interactions 38 (5): 597–621. doi:10.1080/03050629.2012.726180.
  • Esarey, Justin, and Jacqueline H.R. DeMeritt. 2017. “Political Context and the Consequences of Naming and Shaming for Human Rights Abuse.” International Interactions 43 (4): 589–618. doi:10.1080/03050629.2016.1223656.
  • Fjelde, Hanne, and Lisa Hultman. 2014. “Weakening the Enemy: A Disaggregated Study of Violence against Civilians in Africa.” Journal of Conflict Resolution 58 (7): 1230–57. doi:10.1177/0022002713492648
  • Fortna, Virginia Page. 2015. “Do Terrorists Win? Rebels’ Use of Terrorism and Civil War Outcomes.” International Organization 69 (3): 519–56. doi:10.1017/S0020818315000089
  • Gendron, Angela. 2017. “The Call to Jihad: Charismatic Preachers and the Internet.” Studies in Conflict and Terrorism 40 (1): 44–61. doi:10.1080/1057610X.2016.1157406.
  • Gohdes, Anita R. 2015. “Pulling the Plug: Network Disruptions and Violence in Civil Conflict.” Journal of Peace Research 52 (3): 352–67. doi:10.1177/0022343314551398
  • Gohdes, Anita R. 2018. “Studying the Internet and Violent Conflict.” Conflict Management and Peace Science 35 (1): 89–106. doi:10.1177/0738894217733878
  • Gohdes, Anita R. 2020. “Repression Technology: Internet Accessibility and State Violence.” American Journal of Political Science 64 (3): 488–503. doi:10.1111/ajps.12509.
  • Gutiérrez-Sanín, Francisco, and Elisabeth Jean Wood. 2017. “What Should We Mean by Pattern of Political Violence? Repertoire, Targeting, Frequency, and Technique.” Perspectives on Politics 15 (1): 20–41. doi:10.1017/S1537592716004114
  • Harbom, Lotta, Erik Melander, and Peter Wallensteen. 2008. “Dyadic Dimensions of Armed Conflict, 1946-2007.” Journal of Peace Research 45 (5): 697–710. doi:10.1177/0022343308094331
  • Heinrich, Tobias, Yoshiharu Kobayashi, and Leah Long. 2018. “Voters Get What They Want (When They Pay Attention): Human Rights, Policy Benefits, and Foreign Aid.” International Studies Quarterly 62 (1): 195–207. doi:10.1093/isq/sqx081.
  • Hoover Green, Amelia. 2016. “The Commander’s Dilemma: Creating and Controlling Armed Group Violence.” Journal of Peace Research 53 (5): 619–32. doi:10.1177/0022343316653645.
  • Hultman, Lisa. 2007. “Battle Losses and Rebel Violence: Raising the Costs for Fighting.” Terrorism and Political Violence 19 (2): 205–22. doi:10.1080/09546550701246866.
  • International Crisis Group. 2006. Their Own Words: Reading the Iraqi Insurgency. Middle East Report N°50. Amman/Brussels: International Crisis Group.
  • International Telecommunication Union. 2011. “All about the Technology.” https://www.itu.int/osg/spu/ni/3G/technology/. Accessed 15 October 2019
  • Jacob, Jacob Udo-Udo, and Idorenyin Akpan. 2015. “Silencing Boko Haram: Mobile Phone Blackout and Counterinsurgency in Nigeria’s Northeast Region.” Stability: International Journal of Security & Development 4 (1): 1–17. doi:10.5334/sta.ey
  • Jo, Hyeran. 2015. Compliant Rebels: Rebel Groups and International Law in World Politics. Cambridge: Cambridge University Press.
  • Johnston, Patrick. 2008. “The Geography of Insurgent Organization and Its Consequences for Civil Wars: Evidence from Liberia and Sierra Leone.” Security Studies 17 (1): 107–37. doi:10.1080/09636410801894191.
  • Jones, Benjamin T., and Eleonora Mattiacci. 2019. “A Manifesto, in 140 Characters or Fewer: Social Media as A Tool of Rebel Diplomacy.” British Journal of Political Science 49 (2): 739–61. doi:10.1017/S0007123416000612.
  • Kalyvas, Stathis N. 2006. The Logic of Violence in Civil War. Cambridge: Cambridge University Press.
  • King, Gary, Jennifer Pan, and Margaret E. Roberts. 2013. “How Censorship in China Allows Government Criticism but Silences Collective Expression.” American Political Science Review 107 (2): 1–18. doi:10.1017/S0003055413000014
  • Kydd, Andrew, and Barbara Walter. 2006. “The Strategies of Terrorism.” International Security 31 (1): 49–80. doi:10.1162/isec.2006.31.1.49
  • Lacina, Bethany. 2006. “Explaining the Severity of Civil Wars.” Journal of Conflict Resolution 50 (2): 276–89. doi:10.1177/0022002705284828
  • Little, Andrew T. 2016. “Communication Technology and Protest.” Journal of Politics 78 (1): 152–66. doi:10.1086/683187
  • Loyle, Cyanne E., and Samuel E. Bestvater. 2019. “#rebel: Rebel Communication Strategies in the Age of Social Media.” Conflict Management and Peace Science 36 (6): 570–90. doi:10.1177/0738894219881430
  • Lujala, Päivi. 2009. “Deadly Combat over Natural Resources: Gems, Petroleum, Drugs, and the Severity of Armed Civil Conflict.” Journal of Conflict Resolution 53 (1): 50–71. doi:10.1177/0022002708327644.
  • Lujala, Päivi. 2010. “The Spoils of Nature: Armed Civil Conflict and Rebel Access to Natural Resources.” Journal of Peace Research 47 (1): 15–28. doi:10.1177/0022343309350015.
  • Lujala, Päivi, Jan Ketil Röd, and Nadja Thieme. 2007. “Fighting over Oil: Introducing a New Dataset.” Conflict Management and Peace Science 24 (3): 239–56. doi:10.1080/07388940701468526
  • Lyall, Jason. 2009. “Does Indiscriminate Violence Incite Insurgent Attacks? Evidence from Chechnya.” Journal of Conflict Resolution 53 (3): 331–62. doi:10.1177/0022002708330881
  • Marshall, Monty G., Ted Robert Gurr, and Keith Jaggers. 2016. “Polity IV Project: Political Regime Characteristics and Transitions, 1800-2016.” The Polity Project. www.systemicpeace.org.
  • Melander, Erik, Therése Pettersson, and Themnér Lotta. 2016. “Organized Violence, 1989 – 2015.” Journal of Peace Research 53 (5): 727–42. doi:10.1177/0022343316663032
  • Metelits, Claire M. 2009. “The Consequences of Rivalry: Explaining Insurgent Violence Using Fuzzy Sets.” Political Research Quarterly 62 (4): 673–84. doi:10.1177/1065912908322413
  • Milton, Daniel. 2020. “Fatal Attraction: Explaining Variation in the Attractiveness of Islamic State Propaganda.” Conflict Management and Peace Science 37 (4): 430–50. doi:10.1177/0738894218759008.
  • Moreau, Ron. 2012. “Afghanistan: The Taliban’s High-Tech Urban Strategy.” Newsweek. https://www.newsweek.com/afghanistan-talibans-high-tech-urban-strategy-64923.Accessed 15 March 2018.Accessed 15 October 2019
  • Phillips, Brian J. 2019. “Foreign Terrorist Organization Designation, International Cooperation, and Terrorism.” International Interactions 45 (2): 316–43. doi:10.1080/03050629.2019.1556158.
  • Piazza, James A., and Ahmet Guler. 2019. “The Online Caliphate: Internet Usage and ISIS Support in the Arab World.” Terrorism and Political Violence. Advance online publication:1–20.doi:10.1080/09546553.2019.1606801
  • Pierskalla, Jan, and Florian Hollenbach. 2013. “Technology and Collective Action: The Effect of Cell Phone Coverage on Political Violence in Africa.” American Political Science Review 107 (2): 207–24. doi:10.1017/S0003055413000075
  • Porta, Donatella della. 1995. Social Movements, Political Violence, and the State: A Comparative Analysis of Italy and Germany. Cambridge: Cambridge University Press.
  • Rød, Espen Geelmuyden, and Nils B. Weidmann. 2015. “Empowering Activists or Autocrats? The Internet in Authoritarian Regimes.” Journal of Peace Research 52 (3): 338–51. doi:10.1177/0022343314555782
  • Rothenberger, Liane. 2012. “Terrorist Groups: Using Internet and Social Media for Disseminating Ideas. New Tools for Promoting Political Change.” Romanian Journal of Communication & Public Relations 14 (3): 7–23.
  • Rudner, Martin. 2017. “‘Electronic Jihad’: The Internet as Al Qaeda’s Catalyst for Global Terror.” Studies in Conflict and Terrorism 40 (1): 10–23. doi:10.1080/1057610X.2016.1157403.
  • Salehyan, Idean, David Siroky, and Reed M. Wood. 2014. “External Rebel Sponsorship and Civilian Abuse: A Principal-Agent Analysis of Wartime Atrocities.” International Organization 68 (3): 633–61. doi:10.1017/S002081831400006X.
  • Salehyan, Idean, Kristian Skrede Gleditsch, and David E. Cunningham. 2011. “Explaining External Support for Insurgent Groups.” International Organization 65 (4): 709–44. doi:10.1017/S0020818311000233.
  • Shapiro, Jacob N., and David A. Siegel. 2015. “Coordination and Security: How Mobile Communications Affect Insurgency.” Journal of Peace Research 52 (3): 312–22. doi:10.1177/0022343314559624
  • Shapiro, Jacob N., and Nils B. Weidmann. 2015. “Is the Phone Mightier than the Sword? Cellphones and Insurgent Violence in Iraq.” International Organization 69 (2): 247–74. doi:10.1017/S0020818314000423
  • Shaver, Andrew. 2018. “Information and Communication Technologies, Wartime Informing, and Insurgent Violence.” Working Paper, University of California Merced.
  • Stanton, Jessica A. 2013. “Terrorism in the Context of Civil War.” Journal of Politics 75 (4): 1009–22. doi:10.1017/S0022381613000984.
  • Stanton, Jessica A. 2016. Violence and Restraint in Civil War. Civilian Targeting in the Shadow of International Law. Cambridge: Cambridge University Press.
  • Sundberg, Ralph, and Erik Melander. 2013. “Introducing the UCDP Georeferenced Event Dataset.” Journal of Peace Research 50 (4): 523–32. doi:10.1177/0022343313484347
  • Sundberg, Ralph, Kristine Eck, and Joakim Kreutz.“Introducing the UCDP Non-State Conflict Dataset.” Journal of Peace Research 49, no. 2 (March 2012): 351–62. https://doi.org/10.1177/0022343311431598.
  • Thomas, Jakana. 2014. “Rewarding Bad Behavior: How Governments Respond to Terrorism in Civil War.” American Journal of Political Science 58 (4): 804–18. doi:10.1111/ajps.12113
  • UN Stats. 2020. “SDG Indicators.” https://unstats.un.org/sdgs/indicators/database/. Accessed 15 October 2019.
  • Vogt, Manuel, Nils Christian Bormann, Seraina Rüegger, Lars Erik Cederman, Philipp Hunziker, and Luc Girardin. 2015. “Integrating Data on Ethnicity, Geography, and Conflict: The Ethnic Power Relations Data Set Family.” Journal of Conflict Resolution 59 (7): 1327–42. doi:10.1177/0022002715591215
  • von Behr, Ines, AnaïsReding, CharlieEdwards, and Luke Gribbon. 2013. Radicalisation in the Digital Era: The Use of the Internet in 15 Cases of Terrorism and Extremism. Santa Monica: RAND.
  • Ward, Antonia. 2018. “ISIS’s Use of Social Media Still Poses a Threat to Stability in the Middle East and Africa.” Georgetown Security Studies Review. https://georgetownsecuritystudiesreview.org/2018/12/10/isiss-use-of-social-media-still-poses-a-threat-to-stability-in-the-middle-east-and-africa/. December 10.
  • Warren, T. Camber. 2015. “Explosive Connections? Mass Media, Social Media, and the Geography of Collective Violence in African States.” Journal of Peace Research 52 (3): 297–311. doi:10.1177/0022343314558102
  • Washington Times. 2005. “Cell-Phone Technology an Explosive Tool for Insurgents.” Washington Times, March 7. https://www.washingtontimes.com/news/2005/mar/7/20050307-121323-4533r/. Accessed 01 March 2018
  • Weidmann, Nils B. 2015. “Communication, Technology, and Political Conflict.” Journal of Peace Research 52 (3): 263–68. doi:10.1177/0022343314559081
  • Weinstein, Jeremy M. 2006. Inside Rebellion: The Politics of Insurgent Violence. Inside Rebellion: The Politics of Insurgent Violence. Cambridge: Cambridge University Press.
  • Wood, Reed M. 2010. “Rebel Capability and Strategic Violence against Civilians.” Journal of Peace Research 47 (5): 601–14. doi:10.1177/0022343310376473
  • Wood, Reed M. 2014. “Opportunities to Kill or Incentives for Restraint? Rebel Capabilities, the Origins of Support, and Civilian Victimization in Civil War.” Conflict Management and Peace Science 31 (5): 461–80. doi:10.1177/0738894213510122
  • Wood, Reed M., and Jacob D. Kathman. 2015. “Competing for the Crown: Inter-Rebel Competition and Civilian Targeting in Civil War.” Political Research Quarterly 68 (1): 167–79. doi:10.1177/1065912914563546
  • World Bank. 2013. World Development Indicators. Washington, DC:World Bank.
  • Zeitzoff, Thomas. 2017. “How Social Media Is Changing Conflict.” Journal of Conflict Resolution 61 (9): 1970–91. doi:10.1177/0022002717721392

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.