Skip to main content
×
×
Home

Do Islamic State’s Deadly Attacks Disengage, Deter, or Mobilize Supporters?

  • Joan Barceló (a1) and Elena Labzina (a2)
Abstract

What are the consequences of committing violent attacks for terrorist organizations? Terrorist attacks might broaden the base of supporters by increasing the perceived group efficacy. However, terrorist attacks might also lead its supporters to believe that the organization is excessively violent or involvement may become too dangerous. This article employs a unique dataset with 300,842 observations of 13,321 Twitter accounts linked to the Islamic State (IS), collected during a 127-day period, to empirically investigate the impact of terrorist attacks on the number of the organization’s supporters. By exploiting the exogenous timing of terrorist attacks as a natural experiment, we find that the number of followers of IS-related Twitter accounts significantly reduces in the aftermath of the attacks. Additionally, we provide some suggestive evidence to disentangle two mechanisms: disengagement – a change in supporters’ beliefs – and deterrence – demobilization due to fear. Because we do not find support for the latter, we conclude that the disengagement effect might explain our main result.

Copyright
Corresponding author
*Corresponding author: Email: joanbarcelosoler@wustl.edu
References
Hide All
Abrahms, M (2008) What terrorists really want: terrorist motives and counterterrorism strategy. International Security 32 (4):78105.
Abrahms, M (2012) The political effectiveness of terrorism revisited. Comparative Political Studies 45 (3):366393.
Acosta, B (2009) Palestinian Precedents: The Origins of Al-Qaeda’s Use of Suicide Terrorism and Istishhad. Santa Barbara, CA: Praeger Security International, pp. 193206.
Acosta, B (2014a) From bombs to ballots: when militant organizations transition to political parties. Journal of Politics 76 (3):666683.
Acosta, B (2014b) Live to win another day: why many militant organizations survive yet few succeed. Studies in Conflict and Terrorism 37 (2):135161.
Acosta, B (2016) Dying for survival: why militant organizations continue to conduct suicide attacks. Journal of Peace Research 53, 180196.
Acosta, B and Childs, SJ (2013) Illuminating the global suicide-attack network. Studies in Conflict and Terrorism 36 (1):4976.
Alonso, R (2011) Why do terrorists stop? Analyzing why ETA members abandon or continue with terrorism. Studies in Conflict and Terrorism 34 (9):696716.
Aspen (2015) FBI director reveals hidden threat of ISIS at Aspen security forum. The Aspen Times, 14 July, accessed 14 July 2015.
Barberá, P (2015) Birds of the same feather tweet together: Bayesian ideal point estimation using Twitter data. Political Analysis 23 (1):7691.
Barberá, P, Jost, JT, Nagler, J, Tucker, JA and Bonneau, R (2015) Tweeting from left to right: is online political communication more than an echo chamber? Psychological Science 26 (10):15311542.
Barceló, J and Labzina, E (2018) Replication Data for ‘Do Islamic State’s Deadly Attacks Disengage, Deter, or Mobilize Supporters?’, https://doi.org/10.7910/DVN/H6RZA7, Harvard Dataverse, V1, UNF:6:6y+r1ROvOWIQgsxevAAjqw== [fileUNF]
Berger, J (2015) The metronome of apocalyptic time: social media as carrier wave for millenarian contagion. Perspectives on Terrorism 9 (4):6171.
Bjørgo, T (2011) Dreams and disillusionment: engagement in and disengagement from militant extremist groups. Crime, Law and Social Change 55 (4):277285.
Blankenship, B (2018) When do states take the bait? State capacity and the provocation logic of terrorism. Journal of Conflict Resolution 62 (2):381409.
Bueno de Mesquita, E (2005) The quality of terror. American Journal of Political Science 49 (3):515530.
Bueno de Mesquita, E and Dickson, ES (2007) The propaganda of the deed: terrorism, counterterrorism, and mobilization. American Journal of Political Science 51 (2):364381.
Byman, D (2016) Understanding the Islamic State: a review essay. International Security 40 (4):127165.
Cheng, Z, Caverlee, J and Lee, K (2010) You are where you tweet: a content-based approach to geo-locating Twitter users. In Proceedings of the 19th ACM International Conference on Information and Knowledge Management. ACM, Toronto, Ontario, Canada, October 26–30, pp. 759768.
Clark, A (2016) Islamic State security concerns feed divisions in liberal ranks. Australian Financial Review, 1 April, accessed 22 October 2016.
Compton, R, Jurgens, D and Allen, D (2014) Geotagging one hundred million Twitter accounts with total variation minimization. In 2014 IEEE International Conference on Big Data (Big Data). IEEE, Washington DC, USA, October 27–30, pp. 393401.
Denardo, J (1985) Power in Numbers: The Political Strategy of Protest and Rebellion. Princeton, NJ: Princeton University Press.
Doosje, B, Moghaddam, FM, Kruglanski, AW, de Wolf, A, Mann, L and Feddes, AR (2016) Terrorism, radicalization and de-radicalization. Current Opinion in Psychology 11, 7984.
Fortna, VP (2015) Do terrorists win? Rebels’ use of terrorism and civil war outcomes. International Organization 69 (3):519556.
France 24 (2016) L’EI a revendiqué l’attentat de Nice via son agence amaq. France 24, 17 July, accessed 22 October 2016.
Gonzalez, R, Cuevas, R, Cuevas, A and Guerrero, C (2011) Where are my followers? Understanding the locality effect in Twitter. CoRR abs/1105. 3682, 17.
Grygiel, J (2013) The primacy of premodern history. Security Studies 22 (1):132.
Hendrix, CS and Young, JK (2014). State capacity and terrorism: a two-dimensional approach. Security Studies 23 (2):329363.
Hoffman, B and McCormick, GH (2004) Terrorism, signaling, and suicide attack. Studies in Conflict and Terrorism 27 (4):243281.
Horgan, J (2005) The social and psychological characteristics of terrorism and terrorists. In Bjorgo T (ed.), Root Causes of Terrorism: Myths, Reality and Ways Forward. New York: Routledge, pp. 4453.
Imbens, G and Kalyanaraman, K (2012) Optimal bandwidth choice for the regression discontinuity estimator. Review of Economic Studies 79 (3):933959.
Jurgens, D (2013) That’s what friends are for: inferring location in online social media platforms based on social relationships. ICWSM 13, 273282.
Jurgens, D, Finethy, T, McCorriston, J, Xu, YT and Ruths, D (2015) Geolocation prediction in twitter using social networks: a critical analysis and review of current practice. In Proceedings of the International Conference on Web and Social Media, Oxford, England, May 26–29, pp. 188197.
King, G, Pan, J and Roberts, ME (2014) Reverse engineering Chinese censorship through randomized experimentation and participant observation. American Political Science Review 107 (2):326343.
Klausen, J (2015) Tweeting the jihad: social media networks of western foreign fighters in Syria and Iraq. Studies in Conflict and Terrorism 38 (1):122.
Kydd, AH and Walter, BF (2006) The strategies of terrorism. International Security 31 (1):4980.
Labzina, E and Yin, G (2018) Fighting terrorism in the electronic marketplace of ideas: assessing the anonymous campaign against Islamic extremists on twitter with machine learning. Working Paper. Available at http://visionsinmethodology.org/wp-content/uploads/2018/05/labzina_yin2018.pdf.
Lee, DS and Lemieuxa, T (2010) Regression discontinuity designs in economics. Journal of Economic Literature 48 (2):281355.
Lyall, J, Blair, G and Imai, K (2013) Explaining support for combatants during wartime: a survey experiment in Afghanistan. American Political Science Review 107 (4):679705.
Mestre, A, Revault d’Allonnes, D and Bissuel, B (2016) Attentat de Nice: les responsables politiques, entre emotion et colère. Le Monde, 15 July, accessed 22 October 2016.
Mitra, S et al. (2008) Poverty and terrorism. Economics of Peace and Security Journal 3 (2):5761.
Mitts, T (2018) From isolation to radicalization: anti-Muslim hostility and support for ISIS in the West. American Political Science Review.
Moghadam, A (2012) Failure and disengagement in the Red Army Faction. Studies in Conflict and Terrorism 35 (2):156181.
Moghaddam, FM (2005). The staircase to terrorism: a psychological exploration. American Psychologist 60 (2):161.
Monroe, BL, Pan, J, Roberts, ME, Sen, M and Sinclair, B (2015) No! Formal theory, causal inference, and big data are not contradictory trends in political science. PS: Political Science and Politics 48 (1):7174.
Pape, R (2003) The strategic logic of suicide terrorism. American Political Science Review 97 (3):343361.
Pape, R (2005) Dying to Win: The Strategic Logic of Suicide Terrorism. New York: Random House.
Pargament, KI, Magyar-Russell, GM and Murray-Swank, NA (2005) The sacred and the search for significance: religion as a unique process. Journal of Social Issues 61 (4):665687.
Peffley, M, Hutchison, ML and Shamir, M (2015) The impact of persistent terrorism on political tolerance: Israel, 1980 to 2011. American Political Science Review 109 (4):817832.
Percoco, M (2014) Regression Discontinuity Design: When Series Interrupt. Cham: Springer International Publishing, pp. 920.
Piazza, JA (2011) Poverty, minority economic discrimination, and domestic terrorism. Journal of Peace Research 48 (3):339353.
Reinares, F (2011) Exit from terrorism: a qualitative empirical study on disengagement and deradicalization among members of ETA. Terrorism and Political Violence 23 (5):780803.
Rout, D, Bontcheva, K, Preoţiuc-Pietro, D and Cohn, T (2013) Where’s Wally? A classification approach to geolocating users based on their social ties. In Proceedings of the 24th ACM Conference on Hypertext and Social Media. ACM, 1–3 May, Paris, France, pp. 1120.
Rudner, M (2017) ‘Electronic jihad’: the internet as Al Qaeda’s catalyst for global terror. Studies in Conflict and Terrorism 40 (1):1023.
Salganik, MJ (2018) Bit by Bit: Social Research in the Digital Age. Princeton, NJ: Princeton University Press.
Schmid, AP (2013) Radicalisation, de-radicalisation, counter-radicalisation: a conceptual discussion and literature review. ICCT Research Paper 97, 22.
Siegel, DA and Young, JK (2009) Simulating terrorism: credible commitment, costly signaling, and strategic behavior. PS: Political Science and Politics 42 (4):765771.
Singer, JD, Bremer, S and Stuckey, J (1972) Capability distribution, uncertainty, and major power war, 1820–1965. Peace, War, and Numbers 19, 48.
Sullivan, P (2012) Who Wins? Predicting Strategic Success and Failure in Armed Conflict. New York: Oxford University Press.
Thomas, J (2014) Rewarding bad behavior: how governments respond to terrorism in civil war. American Journal of Political Science 58 (4):804818.
Turk, AT (2004) Sociology of terrorism. Annual Review of Sociology 36, 271286.
Victoroff, JE and Kruglanski, AW (2009) Psychology of Terrorism: Classic and Contemporary Insights. New York: Psychology Press.
Wenger, A and Wilner, A (2012). Deterring Terrorism: Theory and Practice. Redwood City, CA: Stanford University Press.
Williams, RA (2016) Nice terror attack: ISIS claims responsibility for lorry massacre in French coastal city. Independent, 17 July, accessed 12 October 2016.
Recommend this journal

Email your librarian or administrator to recommend adding this journal to your organisation's collection.

British Journal of Political Science
  • ISSN: 0007-1234
  • EISSN: 1469-2112
  • URL: /core/journals/british-journal-of-political-science
Please enter your name
Please enter a valid email address
Who would you like to send this to? *
×

Keywords

Type Description Title
UNKNOWN
Supplementary materials

Barceló and Labzina supplementary material
Dataset

 Unknown
PDF
Supplementary materials

Barceló and Labzina supplementary material
Online Appendix

 PDF (4.8 MB)
4.8 MB

Metrics

Altmetric attention score

Full text views

Total number of HTML views: 0
Total number of PDF views: 0 *
Loading metrics...

Abstract views

Total abstract views: 0 *
Loading metrics...

* Views captured on Cambridge Core between <date>. This data will be updated every 24 hours.

Usage data cannot currently be displayed