40 research outputs found

    Philippines

    No full text

    Terrorists, scholars and ordinary people: Confronting terrorism studies with field experiences

    No full text
    Fieldwork in the study of terrorism remains the exception, allowing for scores of publications to be produced each year with little or no contact with the perpetrators of terrorist violence and scarce direct observation of the social realities in which it occurs. While examining some of the serious drawbacks and pitfalls such research can entail, this article makes a case for more fieldwork in terrorism studies, arguing that it can bring greater depth to our understanding of terrorist violence. The discussion focuses on a common assumption – the existence of the ‘terrorist’ as subject – and a common practice of terrorism studies – the concentration on extraordinary events at the expense of ‘ordinary life’ and ‘ordinary people’ – and how they are called into question by the material gathered during field research conducted in the Southern Philippine region of Mindanao. The article concludes with a reflection on some of the challenges facing researchers in danger zones, from their dependence on local knowledge for security to the need for methodological flexibility when faced with the complexity of research in conflict areas

    On Heterogeneous Covert Networks

    No full text
    Covert organizations are constantly faced with a tradeoff between secrecy and operational efficiency. Lindelauf, Borm and Hamers (2008) developed a theoretical framework to deter- mine optimal homogeneous networks taking the above mentioned considerations explicitly into account. In this paper this framework is put to the test by applying it to the 2002 Jemaah Islamiyah Bali bombing. It is found that most aspects of this covert network can be explained by the theoretical framework. Some interactions however provide a higher risk to the network than others. The theoretical framework on covert networks is extended to accommodate for such heterogeneous interactions. Given a network structure the optimal location of one risky interaction is established. It is shown that the pair of individuals in the organization that should conduct the interaction that presents the highest risk to the organization, is the pair that is the least connected to the remainder of the network. Furthermore, optimal networks given a single risky interaction are approximated and compared. When choosing among a path, star and ring graph it is found that for low order graphs the path graph is best. When increasing the order of graphs under consideration a transition occurs such that the star graph becomes best. It is found that the higher the risk a single interaction presents to the covert network the later this transition from path to star graph occurs

    Singapore

    No full text
    corecore