Lethal Connections: The Determinants of Network Connections in the Provisional Irish Republican Army, 1970-1998

被引:26
作者
Gill, Paul [1 ]
Lee, Jeongyoon [2 ]
Rethemeyer, Karl R. [2 ]
Horgan, John [3 ]
Asal, Victor [2 ]
机构
[1] UCL, London WC1H 9EZ, England
[2] SUNY Albany, Albany, NY 12222 USA
[3] Univ Massachusetts Lowell, Lowell, MA USA
关键词
network analysis; conflict; terrorism; P-ASTERISK MODELS; SOCIAL NETWORKS; TERRORIST ORGANIZATIONS; LOGISTIC REGRESSIONS; LOGIT-MODELS;
D O I
10.1080/03050629.2013.863190
中图分类号
D81 [国际关系];
学科分类号
030207 ;
摘要
Using stochastic methods we illustrate that the Provisional Irish Republican Army's (PIRA) network is clustered along three primary dimensions: (a) brigade affiliation, (b) whether the member participated in violent activities, and (c) task/role within PIRA. While most brigades tended to foster connections within the brigade (that is, "closure"), the tendency to do so varied across the organization. Members who engaged with violent activities were far more likely to connect with each other; in later periods there is polarization into those who engage in violent activities and those who do not. Across brigades, those who engage in a particular task and role (improvised explosive device [IED] constructor, IED planter, gunman, robber/kidnapper/drug smuggler/hijacker) are more likely to connect with others who do the same task or play the same role than with other members who fulfill other roles. Standard forms of homophily (that is, the tendency to make connections with people who are similar in terms of demography or status) play a very weak role in explaining which members interact with one another. Finally, our analysis illustrates clear patterns of relational change that correspond to changes in the formal structures that PIRA's leadership promoted.
引用
收藏
页码:52 / 78
页数:27
相关论文
共 55 条
[1]  
[Anonymous], UCINET 6 WINDOWS
[2]  
[Anonymous], THE IRA
[3]  
[Anonymous], SOCIOLOGICAL METHODO
[4]  
Arquilla John, 1999, COUNTERING THE NEW T
[5]  
Asal Victor, JOURNAL OF CONFLICT
[6]  
Bell J. Bowyer, 2000, THE IRA 1968 2000 AN
[7]  
BORGATTI S. P., 2002, NETDRAW SOFTWARE FOR
[8]   Space-Time Modeling of Insurgency and Counterinsurgency in Iraq [J].
Braithwaite, Alex ;
Johnson, Shane D. .
JOURNAL OF QUANTITATIVE CRIMINOLOGY, 2012, 28 (01) :31-48
[9]  
Burt R. S, 2005, BROKERAGE AND CLOSUR
[10]   A THEORY OF GROUP STABILITY [J].
CARLEY, K .
AMERICAN SOCIOLOGICAL REVIEW, 1991, 56 (03) :331-354