Mitigating Issues Related to the Modeling of Insurgent Recruitment | SpringerLink
Skip to main content

Mitigating Issues Related to the Modeling of Insurgent Recruitment

  • Conference paper
Advances in Social Computing (SBP 2010)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6007))

Abstract

Modeling the specific motivations and influences related to an individual’s decision to become involved in insurgent warfare presents its own collection of unique challenges. The difficulty of the problem often necessitates simplifications that, while making the task more manageable, may inadvertently ’smooth away’ critical aspects of the problem. Augmenting the challenge is that research into the motivations of terrorism has found there is not a definitive set of variables that serve as reliable indicators of an individual’s involvement. This paper addresses techniques aimed toward mitigating issues that manifest in the modeling of insurgent recruitment so that these complications do not lessen the viability of models that are used in the prediction and evaluation of terrorist activity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Alexander, K.: Terrorism and Global Insecurity: A Multidisciplinary Perspective. Linton Atlantic Press, Louisville (2009)

    Google Scholar 

  2. Atran, S.: Genesis of Suicide Terrorism. Science, 534–539 (2003)

    Google Scholar 

  3. Bale, J.: Jihadist Cells and “I.E.D.” Capabilities in Europe: Assessing the Present and Future Threat to the West. Unpublished report (2009)

    Google Scholar 

  4. Davis, P., Arquilla, J.: Thinking About Opponent Behavior in Crisis and Conflict: A Generic Model for Group Analysis and Discussion. RAND, Santa Monica (1991)

    Google Scholar 

  5. Gompert, D.: Heads We Win-The cognitive side of counterinsurgency (COIN). RAND, Santa Monica (2007)

    Google Scholar 

  6. Hoffman, B.: The ‘Cult of the Insurgent’: Its Tactical and Strategic Implications. Australian Journal of International Affairs 61, 312–329 (2007)

    Article  Google Scholar 

  7. Hofstede, G.: Culture’s consequences: Comparing values, behaviors, institutions, and organizations across nations, 2nd edn. Sage Publications, UK (2001)

    Google Scholar 

  8. Horgan, J.: The psychology of terrorism. Routledege Taylor & Francis Group, London (2007)

    Google Scholar 

  9. Jackson, B., Baker, J., Chalk, P., Cragin, K., Parachini, J., Trujillo, H.: Aptitude for Destruction: Organizational Learning in Terrorist Groups and Its Implications for Combating Terrorism v. 1. RAND, Santa Monica (2005)

    Google Scholar 

  10. Kilcullen, D.: Countering Global Insurgency. Journal of Strategic Studies 28(4), 597–617 (2005)

    Article  Google Scholar 

  11. McCormick, G.: Terrorist Decision Making. Annual Review of Political Science 6(6), 473–507 (2003)

    Article  Google Scholar 

  12. Ross, J.: A Model of the Psychological Causes of Oppositional Political Terrorism Peace and Conflict. Journal of Peace Psychology 2(2), 129–141 (1996)

    Article  Google Scholar 

  13. Sageman, M.: Leaderless Jihad: Terror Networks in the Twenty-First Century. Pennsylvania Press, Philadelphia (2007)

    Google Scholar 

  14. Sciolino, E., Schmitt, E.: A Not Very Private Feud Over Terrorism. New York Times, June 8 (2008)

    Google Scholar 

  15. Snodgrass, T.: Is counterinsurgency a viable strategy for America? American Thinker, October 4 (2009)

    Google Scholar 

  16. Zacharias, G., Macmillan, J., Van Hemel, S.: National Academies Press, Washington (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Briscoe, E., Trewhitt, E., Weiss, L., Whitaker, E. (2010). Mitigating Issues Related to the Modeling of Insurgent Recruitment. In: Chai, SK., Salerno, J.J., Mabry, P.L. (eds) Advances in Social Computing. SBP 2010. Lecture Notes in Computer Science, vol 6007. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12079-4_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12079-4_47

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12078-7

  • Online ISBN: 978-3-642-12079-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics