Skip to main content

Mitigating Issues Related to the Modeling of Insurgent Recruitment

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6007))

Abstract

Modeling the specific motivations and influences related to an individual’s decision to become involved in insurgent warfare presents its own collection of unique challenges. The difficulty of the problem often necessitates simplifications that, while making the task more manageable, may inadvertently ’smooth away’ critical aspects of the problem. Augmenting the challenge is that research into the motivations of terrorism has found there is not a definitive set of variables that serve as reliable indicators of an individual’s involvement. This paper addresses techniques aimed toward mitigating issues that manifest in the modeling of insurgent recruitment so that these complications do not lessen the viability of models that are used in the prediction and evaluation of terrorist activity.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alexander, K.: Terrorism and Global Insecurity: A Multidisciplinary Perspective. Linton Atlantic Press, Louisville (2009)

    Google Scholar 

  2. Atran, S.: Genesis of Suicide Terrorism. Science, 534–539 (2003)

    Google Scholar 

  3. Bale, J.: Jihadist Cells and “I.E.D.” Capabilities in Europe: Assessing the Present and Future Threat to the West. Unpublished report (2009)

    Google Scholar 

  4. Davis, P., Arquilla, J.: Thinking About Opponent Behavior in Crisis and Conflict: A Generic Model for Group Analysis and Discussion. RAND, Santa Monica (1991)

    Google Scholar 

  5. Gompert, D.: Heads We Win-The cognitive side of counterinsurgency (COIN). RAND, Santa Monica (2007)

    Google Scholar 

  6. Hoffman, B.: The ‘Cult of the Insurgent’: Its Tactical and Strategic Implications. Australian Journal of International Affairs 61, 312–329 (2007)

    Article  Google Scholar 

  7. Hofstede, G.: Culture’s consequences: Comparing values, behaviors, institutions, and organizations across nations, 2nd edn. Sage Publications, UK (2001)

    Google Scholar 

  8. Horgan, J.: The psychology of terrorism. Routledege Taylor & Francis Group, London (2007)

    Google Scholar 

  9. Jackson, B., Baker, J., Chalk, P., Cragin, K., Parachini, J., Trujillo, H.: Aptitude for Destruction: Organizational Learning in Terrorist Groups and Its Implications for Combating Terrorism v. 1. RAND, Santa Monica (2005)

    Google Scholar 

  10. Kilcullen, D.: Countering Global Insurgency. Journal of Strategic Studies 28(4), 597–617 (2005)

    Article  Google Scholar 

  11. McCormick, G.: Terrorist Decision Making. Annual Review of Political Science 6(6), 473–507 (2003)

    Article  Google Scholar 

  12. Ross, J.: A Model of the Psychological Causes of Oppositional Political Terrorism Peace and Conflict. Journal of Peace Psychology 2(2), 129–141 (1996)

    Article  Google Scholar 

  13. Sageman, M.: Leaderless Jihad: Terror Networks in the Twenty-First Century. Pennsylvania Press, Philadelphia (2007)

    Google Scholar 

  14. Sciolino, E., Schmitt, E.: A Not Very Private Feud Over Terrorism. New York Times, June 8 (2008)

    Google Scholar 

  15. Snodgrass, T.: Is counterinsurgency a viable strategy for America? American Thinker, October 4 (2009)

    Google Scholar 

  16. Zacharias, G., Macmillan, J., Van Hemel, S.: National Academies Press, Washington (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Briscoe, E., Trewhitt, E., Weiss, L., Whitaker, E. (2010). Mitigating Issues Related to the Modeling of Insurgent Recruitment. In: Chai, SK., Salerno, J.J., Mabry, P.L. (eds) Advances in Social Computing. SBP 2010. Lecture Notes in Computer Science, vol 6007. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12079-4_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12079-4_47

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12078-7

  • Online ISBN: 978-3-642-12079-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics