Hostname: page-component-76fb5796d-45l2p Total loading time: 0 Render date: 2024-04-25T20:44:03.997Z Has data issue: false hasContentIssue false

Social Network Analysis in the Study of Terrorism and Political Violence

Published online by Cambridge University Press:  14 January 2011

Arie Perliger
Affiliation:
U.S. Military Academy at West Point
Ami Pedahzur
Affiliation:
University of Texas at Austin

Extract

The academic community studying terrorism has changed dramatically in the past decade. From a research area that was investigated by a small number of political scientists and sociologists and employed mainly descriptive and qualitative studies that resulted in limited theoretical progress (Schmid and Jongman 1988; Crenshaw 2000), it has in a short time become one of the more vibrant and rapidly developing academic realms in the scholarly world today. Scholars from different branches of the social sciences have engaged in an effort to unravel this phenomenon, introducing new theoretical outlooks, conceptualizations, and methods.

Type
Symposium
Copyright
Copyright © American Political Science Association 2011

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Bloom, M. Mia. 2004. “Palestinian Suicide Bombing: Public Support, Market Share and Outbidding.” Political Science Quarterly 119 (1): 6188.CrossRefGoogle Scholar
Bourdieu, Pierre. 1986. “The Forms of Capital.” In The Handbook of Theory and Research for the Sociology of Education, ed. Richardson, J. G., 241–58. New York: Greenwood.Google Scholar
Brams, J. Steven, Hande, Mutlu, and Ramirez, S. Ling. 2006. “Influence in Terrorist Networks: From Undirected to Directed Graphs.” Studies in Conflict & Terrorism 29: 703–18.CrossRefGoogle Scholar
Carley, M. Kathleen, Ju-Sung, Lee, and Krackhardt, David. 2002. “Destabilizing Network.” Connections 24 (3): 7992.Google Scholar
Crenshaw, Martha. 1981. “The Causes of Terrorism.” Comparative Politics 13 (4): 379–99.CrossRefGoogle Scholar
Crenshaw, Martha. 1992. “Current Research on Terrorism: The Academic Perspective.” Studies in Conflict and Terrorism 15 (1): 111.CrossRefGoogle Scholar
Crenshaw, Martha. 2000. “The Psychology of Terrorism: An Agenda for the 21st Century.” Political Psychology 21 (2): 411–15.CrossRefGoogle Scholar
Granovetter, Mark. 1973. “The Strength of Weak Ties.” American Journal of Sociology 78 (6): 1360–80.CrossRefGoogle Scholar
Hoffman, Bruce. 1999. “Terrorism Trends and Prospects.” In Countering the New Terrorism, ed. Lesser, Ian, 738. Santa Monica, CA: RAND.Google Scholar
Juergensmeyer, Mark. 2003. Terror in the Mind of God: The Global Rise of Religious Violence. 3rd ed. Berkeley: University of California Press.Google Scholar
Klandermans, Bert, and Oegema, Dirk. 1987. “Potentials, Networks, Motivations and Barriers: Steps towards Participation in Social Movements.” American Sociological Review 52 (4): 519–31.CrossRefGoogle Scholar
Koschade, Stuart. 2006. “A Social Network Analysis of Jemaah Islamiyah: The Applications to Counterterrorism and Intelligence.” Studies in Conflict & Terrorism 29 (6): 559–75.CrossRefGoogle Scholar
Krebs, E. Valdis. 2002. “Mapping Networks of Terrorist Cells.” Connections 24 (3): 4352.Google Scholar
McAdam, Doug, and Paoulsen, Ronnell. 1993. “Specifying the Relationships between Social Ties and Activism.” American Journal of Sociology 99 (3): 640–67.CrossRefGoogle Scholar
McAllister, Brad. 2004. “Al Qaeda and the Innovative Firm: Demythologizing the Network.” Studies in Conflict and Terrorism 27 (4): 297319.CrossRefGoogle Scholar
Moghadam, Assaf. 2003. “Palestinian Suicide Terrorism in the Second Intifada: Motivations and Organizational Aspects.” Studies in Conflict and Terrorism 26 (2): 6592.CrossRefGoogle Scholar
Pape, Robert A. 2003. “The Strategic Logic of Suicide Terrorism.” American Political Science Review 97 (3): 344–61.CrossRefGoogle Scholar
Pedahzur, Ami, and Perliger, Arie. 2006. “The Changing Nature of Suicide Attacks—A Social Network Perspective.” Social Forces 84 (4): 19832004.CrossRefGoogle Scholar
Pedahzur, Ami, and Perliger, Arie. 2009. Jewish Terrorism in Israel. New York: Columbia University Press.Google Scholar
Perrow, Charles. 1986. Complex Organizations: A Critical Essay. New York: Random House.Google Scholar
Raufer, Xavier, 2003. “Al Qaeda: A Different Diagnosis.” Studies in Conflict & Terrorism 26 (6): 391–98.CrossRefGoogle Scholar
Rodriquez, A. John. 2005. “The March 11th Terrorist Network: In Its Weakness Lies Its Strength.” XXV International Sunbelt Conference, Los Angeles, February 16–20.Google Scholar
Sageman, Marc. 2004. Understanding Terror Networks. Philadelphia: University of Pennsylvania Press.CrossRefGoogle Scholar
Sageman, Marc. 2008. Leaderless Jihad: Terror Networks in the Twenty-First Century. Philadelphia: University of Pennsylvania Press.CrossRefGoogle Scholar
Sandler, Todd, and Enders, Walter. 2005. “After 9/11: Is It All Different Now?Journal of Conflict Resolution 49 (2): 259–77.Google Scholar
Schmid, P. Alex, and Jongman, J. Albert. 1988. Political Terrorism. New Brunswick: Transaction.Google Scholar
Scott, John. 2000. Social Network Analysis. London: Sage.Google Scholar
Siegel, A. David. 2009. “Social Network and Collective Action.” American Journal of Political Science 53 (1): 122–38.CrossRefGoogle Scholar
Snow, David A., Zurcher, Louis A., and Ekland-Olson, Sheldon. 1980. “Social Networks and Social Movements: A Micro-Structural Approach to Differential Recruitment.” American Sociological Review 45: 787801.CrossRefGoogle Scholar
Stern, Jessica. 2004. Terrorism in the Name of God. New York: Harper Collins.Google Scholar
Van Meter, Karl M. 2001. “Terrorists/Liberators: Researching and Dealing with Adversary Social Networks.” Connections 24 (3): 6678.Google Scholar
Victoroff, John. 2005. “The Mind of the Terrorist.” Journal of Conflict Resolution 49 (1): 342.CrossRefGoogle Scholar
Wasserman, Stanley, and Faust, Katherine. 1994. Social Network Analysis: Methods and Applications. Cambridge: Cambridge University Press.CrossRefGoogle Scholar