{"title":"Polity or Policy? Explaining Ordinary Muslims’ Support for Suicide Bombing","authors":"C. C. Fair, Parina Patel","doi":"10.2139/ssrn.3015438","DOIUrl":"https://doi.org/10.2139/ssrn.3015438","url":null,"abstract":"Public opinion research shows there is considerable, albeit varied, support for Islamist terrorism among the world’s Muslim populations. To identify respondent-level determinants of support for suicide bombings (and other forms of political violence) perpetrated by Islamist militants, scholars have used country-specific and multi-national surveys samples as well as novel survey techniques. One explanatory variable which is frequently used in such empirical models is support for Shari’ah (Islamic law). Fair, Littman and Nugent (2018), based upon their analysis of survey data from Pakistan, argued for conceptualizing and instrumentalizing Shari’ah in multivalent ways, including: support for textual literalism such as Hudood punishments; support for good governance; and restrictions on women. They find only the first explains support for terrorism. Here, we explore whether their proposed formalization offers explanatory power for support for Islamist violence beyond the niche case of Pakistan. To do so, we employ data collected by the Pew Foundation in 2011 which allows us to replicate and augment the methods employed by Fair, Littman and Nugent for twenty countries. We find strong evidence that this framework is robust well beyond Pakistan.","PeriodicalId":214617,"journal":{"name":"PSN: Other Terrorism (Topic)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125135284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ISIS Political Economy: Financing a Terror State","authors":"Dimitrios P. Stergiou","doi":"10.1108/JMLC-06-2015-0021","DOIUrl":"https://doi.org/10.1108/JMLC-06-2015-0021","url":null,"abstract":"In this paper I attempt to highlight the financial aspects of the Islamic State (ISIS) phenomenon. A ‘sui generis’ State Scale Entity, from an Al-Qaeda branch, evolved according to David Cohen the US Treasury Undersecretary to ‘the best funded terrorist organization we’ve confronted’. Primarily self-funded, beginning June 2015 occupied half of the territory of Syrak (Syria-Iraq) attempting to revive the ‘Caliphate’ that historically ended with the dissolution of the Ottoman Empire in the 1920’s. Its sources of finance include first and foremost the exploitation of the land and the population it controls. Oil, illegal ‘taxation’, extorting and smuggling from passports to slaves, are already known as terrorism financing methods, but it’s the first time in modern history that are being used in terrorist state-building, with state-like apparatus to provide for its ‘citizens’ from sewer service to widow recompensation. In addition the extensive use of cyberspace via a network of media centers, twitter accounts, an online magazine and even a mobile phone application, is a force-multiplier of the groups efforts. Controversial plans have also been announced for the minding of a currency ‘dedicated to God’ to offer ‘true Muslims freedom from the satanic financial system’. The ‘defeat and degrade’ strategy of the rest of the world includes besides ideological, military and security counter-measures, cutting off ISIS access to financing by cutting its access to revenues, restricting access to the international financial system and targeted sanctions against ISIS leadership and facilitators. The contribution of this paper will be the comprehensive presentation of the above mentioned economic facets of this first modern endeavor for a Terror-State.","PeriodicalId":214617,"journal":{"name":"PSN: Other Terrorism (Topic)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129031953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hard Targets: Theory and Evidence on Suicide Attacks","authors":"Eli Berman, David Laitin","doi":"10.3386/W11740","DOIUrl":"https://doi.org/10.3386/W11740","url":null,"abstract":"Who chooses suicide attacks? Though rebels typically target poor countries, suicide attacks are just as likely to target rich democracies. Though many groups have grievances, suicide attacks are favored by the radical religious. Though rebels often kill coreligionists, they seldom use suicide attacks to do so. We model the choice of tactics by rebels, bearing in mind that a successful suicide attack imposes the ultimate cost on the attacker and the organization. We first ask what a suicide attacker would have to believe to be deemed rational. We then embed the attacker and other operatives in a club good model which emphasizes the function of voluntary religious organizations as providers of benign local public goods. The sacrifices which these groups demand solve a free-rider problem in the cooperative production of public goods. These sacrifices make clubs well suited for organizing suicide attacks, a tactic in which defection by operatives (including the attacker) endangers the entire organization. The model also analyzes the choice of suicide attacks as a tactic, predicting that suicide will be used when targets are well protected and when damage is great. Those predictions are consistent with the patterns described above. The model has testable implications for tactic choice of terrorists and for damage achieved by different types of terrorists, which we find to be consistent with the data.","PeriodicalId":214617,"journal":{"name":"PSN: Other Terrorism (Topic)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125815071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Know Your Enemy: The Changing Sophistication and Success of Maritime Piracy","authors":"G. Shambaugh, Alyssa Huberts, Aaron Zlotnick","doi":"10.2139/ssrn.2547555","DOIUrl":"https://doi.org/10.2139/ssrn.2547555","url":null,"abstract":"In this article we have introduced a new comprehensive Maritime Piracy Sophistication Index. The MPSI allows us to better understand the relationship between risks and rewards in maritime piracy, manifested through highly sophisticated attacks and their lower success rates. More highly sophisticated and difficult attacks present a greater risk of failure; simultaneously, they provide the financial incentive of greater monetary reward than their easier, less risky low sophistication counterparts. It also helps to identify time-based and regional trends in piracy sophistication, namely the evolution in recent years of more sophisticated pirate operations and the stratified development of piracy in East Africa. The MPSI shows that piracy is nuanced and regional: different geographic regions experience vastly different forms of piracy, in their sophistication as well as magnitude. Any further efforts to understand or combat piracy must keep these developments in mind, and must, critically, be geospatially rooted.","PeriodicalId":214617,"journal":{"name":"PSN: Other Terrorism (Topic)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133268182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}