Why insurgents engage in kidnappings: A coercive strategy in quasi-state governance and control?

被引:0
作者
Liu, Lu [1 ]
Eisner, Manuel [2 ,3 ]
机构
[1] Fudan Univ, Law Sch, Jiangwan Campus,2005 Songhu Rd, Shanghai, Peoples R China
[2] Univ Cambridge, Inst Criminol, Cambridge, England
[3] Univ Zurich, Jacobs Ctr Prod Youth Dev, Zurich, Switzerland
基金
中国博士后科学基金;
关键词
kidnapping; political violence; insurgency; rebel governance; crime; HOSTAGE-TAKING; TERRORIST SUCCESS; CRIME; INCIDENTS; DEMOCRACY; CONFLICT; MODEL; FATE;
D O I
10.1177/00223433241254983
中图分类号
D81 [国际关系];
学科分类号
030207 ;
摘要
Despite the common perception viewing kidnappings as means to generate ransom income and to obtain political concessions, it remains unclear why kidnappings are disproportionately employed by some violent insurgent groups but not by the others. Combining data from the Global Terrorism Database and the Big Allied and Dangerous Insurgency Dataset, we empirically examined this question with a theoretical focus on the possible role of insurgents' performance of state-like functions, which may necessitate the use of kidnappings as an illicit form of 'policing' and punishment for social control. Our analyses mainly focused on three aspects of quasi-state activities: extraction; provision of public services; and warring activities. A series of negative binomial regressions were conducted to examine the effects of insurgents' quasi-state activities on their kidnapping activities over a base model with only group capacity and resource factors. We found that the initial effects of territory-control and membership size disappeared when variables measuring quasi-state activities were included into the model. This suggests that the influence of group capacity and resources on kidnappings may be an indirect one via insurgents' strategic need for coercive control when contending for quasi-state status.
引用
收藏
页码:897 / 911
页数:15
相关论文
共 84 条
[1]   Speaking Truth to Sources: Introducing a Method for the Quantitative Evaluation of Open Sources in Event Data [J].
Ackerman, Gary A. ;
Pinson, Lauren E. .
STUDIES IN CONFLICT & TERRORISM, 2016, 39 (7-8) :617-640
[2]  
[Anonymous], 2018, BIG ALLIED DANGEROUS, DOI [10.7910/DVN/JT6GFR/FZ5U5Q, DOI 10.7910/DVN/JT6GFR/FZ5U5Q]
[3]  
Arjona Ana., 2015, REBEL GOVERNANCE CIV, P180, DOI 10.1017/CBO9781316182468
[4]   Why Some Rebel Organizations Attack Americans [J].
Asal, Victor ;
Linebarger, Christopher ;
Jadoon, Amira ;
Greig, J. Michael .
DEFENCE AND PEACE ECONOMICS, 2021, 32 (06) :708-725
[5]   Doing Good while Killing: Why Some Insurgent Groups Provide Community Services [J].
Asal, Victor ;
Flanigan, Shawn ;
Szekely, Ora .
TERRORISM AND POLITICAL VIOLENCE, 2022, 34 (04) :835-855
[6]   Crime, Conflict, and the Legitimacy Trade-Off: Explaining Variation in Insurgents' Participation in Crime [J].
Asal, Victor H. ;
Rethemeyer, R. Karl ;
Schoon, Eric W. .
JOURNAL OF POLITICS, 2019, 81 (02) :399-410
[7]   Modeling Terrorist Attacks: Assessing Statistical Models to Evaluate Domestic and Ideologically International Attacks [J].
Boyd, Katharine A. .
STUDIES IN CONFLICT & TERRORISM, 2016, 39 (7-8) :712-748
[8]   Weapon of Choice: Terrorist Bombings in Armed Conflict [J].
Boyle, Michael J. .
STUDIES IN CONFLICT & TERRORISM, 2022, 45 (09) :778-798
[9]   Hostage taking: Understanding terrorism event dynamics [J].
Brandt, Patrick T. ;
Sandler, Todd .
JOURNAL OF POLICY MODELING, 2009, 31 (05) :758-778
[10]  
BRIGGS R., 2001, The Kidnapping Business