Back to Search
Start Over
Connectivity among Terrorist Groups: A Two Models Business Maturity Approach
- Source :
- Studies in Conflict & Terrorism. 30:593-613
- Publication Year :
- 2007
- Publisher :
- Informa UK Limited, 2007.
-
Abstract
- The reality of terrorism has become ubiquitous. Terrorist groups continue to garner front-page exposure, which contributes to their agenda, while stories of hostage dilemmas, suicide bombings, assassinations, and a variety of nefarious criminal activities lead the unsuspecting to wonder, “What's next?” In order to begin to understand terrorism researchers should first understand how these terrorist groups operate and, far more importantly, what motivates others to co-operate with terrorists. No terrorist group operates in isolation. It is assured a priori that terrorist groups have to collaborate with other entities in order to further their agenda. In the conventional sense, terrorists have limited resources, limited capabilities, and limited reach. Without co-operation and support in support of criminal enterprises, they would function in isolation; their impact would be isolated. This article outlines two models that demonstrate how cooperation between terrorists and recognized, albeit criminal, instit...
- Subjects :
- Sociology and Political Science
media_common.quotation_subject
Criminology
Computer security
computer.software_genre
Maturity (finance)
Variety (cybernetics)
Wonder
Order (exchange)
Political Science and International Relations
Terrorism
Isolation (psychology)
Safety, Risk, Reliability and Quality
Psychology
Function (engineering)
Safety Research
computer
Limited resources
media_common
Subjects
Details
- ISSN :
- 15210731 and 1057610X
- Volume :
- 30
- Database :
- OpenAIRE
- Journal :
- Studies in Conflict & Terrorism
- Accession number :
- edsair.doi...........2400773bb5697bd7b78675a0aae63890