Back to Search Start Over

Connectivity among Terrorist Groups: A Two Models Business Maturity Approach

Authors :
Tobin Hensgen
Kevin C. Desouza
Source :
Studies in Conflict & Terrorism. 30:593-613
Publication Year :
2007
Publisher :
Informa UK Limited, 2007.

Abstract

The reality of terrorism has become ubiquitous. Terrorist groups continue to garner front-page exposure, which contributes to their agenda, while stories of hostage dilemmas, suicide bombings, assassinations, and a variety of nefarious criminal activities lead the unsuspecting to wonder, “What's next?” In order to begin to understand terrorism researchers should first understand how these terrorist groups operate and, far more importantly, what motivates others to co-operate with terrorists. No terrorist group operates in isolation. It is assured a priori that terrorist groups have to collaborate with other entities in order to further their agenda. In the conventional sense, terrorists have limited resources, limited capabilities, and limited reach. Without co-operation and support in support of criminal enterprises, they would function in isolation; their impact would be isolated. This article outlines two models that demonstrate how cooperation between terrorists and recognized, albeit criminal, instit...

Details

ISSN :
15210731 and 1057610X
Volume :
30
Database :
OpenAIRE
Journal :
Studies in Conflict & Terrorism
Accession number :
edsair.doi...........2400773bb5697bd7b78675a0aae63890