970
Views
3
CrossRef citations to date
0
Altmetric
Articles

The influence of leadership on the strategies and tactics of Islamic State and its predecessors

&
Pages 38-59 | Received 09 Dec 2016, Accepted 05 Dec 2017, Published online: 02 Mar 2018

References

  • Agresti, A., & Kateri, M. (2011). Categorical data analysis. In M. Lovric (Ed.), International encyclopedia of statistical science (pp. 206–208). Berlin: Springer.
  • Alexander, D. C. (2015). A snapshot of the Islamic state and its implications. Security: Solutions for Enterprise Security Leaders, 52(9), 96–97.
  • Alexander, Y., & Alexander, D. (2015). The Islamic state: Combating The Caliphate without borders. Lanham: Lexington Books.
  • Asal, V., & Rethemeyer, R. (2008). The nature of the beast: Organizational structures and the lethality of terrorist attacks. The Journal of Politics, 70(2), 437–449.
  • Barrett, R. (2014). The Islamic state. New York: The Soufan Group.
  • Besaw, C. (2014). Deadly premonition: Does terrorist-leader psychology influence violence lethality? (Electronic Theses and Dissertations). Retrieved from http://stars.library.ucf.edu/etd/4494
  • Boyns, D., & Ballard, J. D. (2004). Developing a sociological theory for the empirical understanding of terrorism. The American Sociologist, 35(2), 5–25.
  • Brisard, J.-C. (2005). Al-Zarqawi: The new face of Al-Quaeda. Cambridge: Blackwell.
  • Bunzel, C. (2015). From paper state to Caliphate: The ideology of the Islamic state (Analysis Paper No. 19). The Brookings Project on U.S. Relations with the Islamic World.
  • Butler, B. M. (2015). Precipitating the decline of Al-Shabaab: A case study in leadership decapitation (Doctoral dissertation). Monterey, California: Naval Postgraduate School.
  • Byman, D. (2006). Do targeted killings work? Foreign Affairs, 85, 95–111.
  • Crenshaw, M. (1985). An organizational approach to the analysis of political terrorism. Orbis, 29, 465–489.
  • Crenshaw, M., & LaFree, G. (2016). Countering terrorism: No simple solutions. Washington, DC: Brookings Institution Pr.
  • Cronin, A. K. (2015). ISIS is not a terrorist group: Why counterterrorism won’t stop the latest Jihadist threat. Foreign Affairs, 94(2), 87–98.
  • Drake, C. J. M. (1998). The role of ideology in terrorists’ target selection. Terrorism and Political Violence, 10(2), 53–85. doi: 10.1080/09546559808427457
  • Enders, W., & Sandler, T. (2000). Is transnational terrorism becoming more threatening? A time-series investigation. Journal of Conflict Resolution, 44(3), 307–332.
  • Fishman, B. (2016). The master plan: ISIS, Al Qaeda, and the Jihadi strategy for final victory. New Haven: Yale University Press.
  • Freeman, M. E. (2010). The headless horseman: A theoretical and strategic assessment of leadership targeting. Paper presented at the annual meeting of the Theory vs. Policy? Connecting Scholars and Practitioners, New Orleans Hilton Riverside Hotel, The Loews New Orleans Hotel, New Orleans, LA Online. Retrieved from http://citation.allacademic.com/meta/p416013_index.html
  • Freeman, M. E. (2014). A theory of terrorist leadership (and its consequences for leadership targeting). Terrorism and Political Violence, 26(4), 666–687.
  • Ganor, B. (2005). The counter-terrorism puzzle: A guide for decision makers. New Brunswick, NJ: Transaction.
  • Gerges, F. A. (2016). ISIS: A history. Princeton: Princeton University Press.
  • Glenn, C. (2015). Al Qaeda v ISIS: Leaders & structure. Retrieved from https://www.wilsoncenter.org/article/al-qaeda-v-isis-leaders-structure
  • Gulmohamad, Z. K. (2014). The rise and fall of the Islamic State of Iraq and Al-Sham (levant) ISIS. Global Security Studies, 5, 2, 1.
  • Gunaratna, R., & Oreg, A. (2015). The global Jihad movement. Lanham: Rowman & Littlefield.
  • Haentjens, F. (2016). ISIS organized: Islamic state charts reviewed. Retrieved from https://www.linkedin.com/pulse/isis-organized-islamic-state-charts-reviewed-fred-haentjens-
  • Harris-Hogan, S. (2015). Understanding the logic: An analysis of Jihadist targeting and tactics in western countries from 2000 to mid-2012. Security Challenges, 11(1), 73–88.
  • Hashim, A. S. (2014). The Islamic state: From al-Qaeda affiliate to caliphate. Middle East Policy, 21(4), 69–83. doi: 10.1111/mepo.12096
  • Hoffman, B. (2006). Inside terrorism (Revised & enlarged ed.). New York, NY: Columbia University Press.
  • Hofmann, D.C. (2017). The study of terrorist leadership: Where do we go from here? Journal of Criminological Research, Policy and Practice, 3(3), 208–221.
  • Janis, I. L. (1972). Victims of groupthink: A psychological study of foreign-policy decisions and fiascoes. Oxford: Houghton Mifflin.
  • Jordan, J. (2009). When heads roll: Assessing the effectiveness of leadership decapitation. Security Studies, 18(4), 719–755. doi: 10.1080/09636410903369068
  • Jordan, J. (2014). Attacking the leader, missing the mark: Why terrorist groups survive decapitation strikes. International Security, 38(4), 7–38.
  • Jung, J., & Lee, J. (2015). Organizational behavior of terrorist groups. Journal of Public Administration and Governance, 5(2), 62–77.
  • Knickmeyer, E., & Finer, J. (2006). Insurgent leader al-Zarqawi Killed in Iraq. The Washington Post. Retrieved from http://www.washingtonpost.com/wp-dyn/content/article/2006/06/08/AR2006060800114.html
  • Lehrke, J. P., & Schomaker, R. (2015). ). War-fighting or enhanced policing? The effectiveness of kill-capture tools and tactics in the post-9/11 era. Topics in Middle Eastern and North African Economies, 17, 49–81.
  • Libicki, M. C., Chalk, P., & Sisson, M. (2006). Exploring terrorist targeting preferences. Santa Monica, CA: RAND Corporation.
  • Lister, C. (2014). Profiling the Islamic state (Analysis Paper No. 13). Brookings Doha Center.
  • McCants, W. (2016). The ISIS apocalypse: The history, strategy, and doomsday vision of the Islamic state (Reprint ed.). New York: Picador.
  • McCormick, G. H. (2003). Terrorist decision making. Annual Review of Political Science, 6(1), 473–507.
  • Nance, M. W. (2016). Defeating ISIS: Who they are, how they fight, what they believe. New York, NY: Skyhorse.
  • National Consortium for the Study of Terrorism and Responses to Terrorism (START). (2017). Global Terrorism Database [Data file]. Retrieved from https://www.start.umd.edu/gtd
  • Price, B. C. (2012). Targeting top terrorists: How leadership decapitation contributes to counterterrorism. International Security, 36(4), 9–46.
  • Sharpe, D. (2015). Your chi-square test is statistically significant: Now what? Practical Assessment, Research & Evaluation, 20(8), 1–10.
  • Siegel, L. J. (2016). Criminology: Theories, patterns and typologies. Boston: Cengage Learning.
  • Silke, A. (2012). Understanding terrorist target selection. In A. Richards, P. Fussey, & A. Silke (Eds.), Terrorism and the Olympics: Major event security and lessons for the future (Vol. 1, pp. 49–71). Retrieved from http://www.tandfonline.com/doi/abs/10.4324/9780203835227_chapter_4
  • Stratfor. (2005). The terrorist attack cycle: Selecting the target. Retrieved from https://worldview.stratfor.com/analysis/terrorist-attack-cycle-selecting-target
  • Thompson, N., & Shubert, A. (2015). The anatomy of ISIS: How the ‘Islamic State’ is run. Retrieved from http://www.cnn.com/2014/09/18/world/meast/isis-syria-iraq-hierarchy/index.html
  • Toft, P., Duero, A., & Bieliauskas, A. (2010). Terrorist targeting and energy security. Energy Policy, 38(8), 4411–4421.
  • TRAC. (2016). ISIS visuals: Leadership structure of the Islamic State (ISIL/ISIS) | TRAC. Retrieved from http://www.trackingterrorism.org/content/isis-visuals-leadership-structure-islamic-state-isilisis
  • U.S. Department of State. (2017). The global coalition to defeat ISIS. Retrieved from https://www.state.gov/s/seci/
  • Weiss, M., & Hassan, H. (2016). ISIS: Inside the army of terror (Updated ed.). New York: Regan Arts.
  • White, J. R. (2017). Terrorism and homeland security. Belmont: Wadsworth.
  • York, R. (2015). Know thy enemy: Islamic state of Iraq and the levant. Lulu.com

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.