SlideShare a Scribd company logo
1 of 1
Social Ties and Terrorism: Do They Matter?
Stephen Leadholm | Sister Jenson | Brigham Young University-Idaho
Research Question
How does having social ties to a terrorist group, prior to joining,
effect the duration one stays with that group, and why?
Introduction
• Today’s literature concludes that the three major contributing
factors of terrorist involvement are socioeconomic factors, social
networks and social ties, and recruitment.
• If we can’t figure out who would be a terrorist, how do recruiters for
terrorist organizations do so? The answer lies in social networks
and social ties. These have been the biggest predictor of who
would join a terrorist group (Brady, Schlozman, and Verba 1999;
Gates 2002; Hegghammer 2006; Humphreys and Weinstein 2008;
Klandermans and Oegema 1987; McAdam 1986; McAdam and
Paulsen 1993; Medina 2014; Ozeren et al. 2014; Postel 2013;
Siegel 2009; Silke 2008; Snow, Zurcher Jr., and Ekland-Olson
1980; Vertigans 2007; Weinstein 2005).
Theory
• Those who join terrorist groups are usually going through a lack of
identity, normlessness, and rootlessness (Blazak 2001; Mulcahy,
Merrington, and Bell 2013; Postel 2013). These people would be
categorized by Travis Hirschi (1969) as having weak bonds to
important social institutions like family, school, work, norms, and
even activities they could participate in. Due to their weak bonds to
society, they are searching for a group to identify (bond) with in
return for their services. According to Bierstedt (1965), these people
are necessitating the social approval and social acceptance
through interaction with others (reward) and are willing to do what it
takes to obtain and maintain that relationship (cost). This is the
exchange of social rewards.
Discussion
Results
• Linear regression will be used in order to test the strength of the
relationship between recruits through social ties and length of
membership. The final model includes the dependent variable (length
of membership), independent variable (recruitment through social
ties), and all the control variables (gender, type of terrorist group,
race, age, marital status, and education). The focal relationship is no
longer significant in the last model and R2 decreases to 0.68. Gender,
type of terrorism, race, age, and marital status are highly significant at
the .001 level. For gender, males will be members 17.67 months less
than females while domestic terrorists will stay members 23.36
months less than international terrorists. Race’s coefficient stayed
about the same at 42.54 showing that Caucasians will be members
about 42.5 months longer than non-Caucasians. Age shows that for
every one increase on the age scale that person will be a member
9.22 months longer. Finally, married people’s length of membership
will be 31.81 months longer than not married people.
Conclusion
• The findings have revealed that social ties are partially supported to
impact length of membership with a terrorist organization, but that age
and marital status are potentially more important factors impacting
length of membership. Some unexpected findings could have been due
to an inconsistent sample size which also resulted in a lack of
confidence in the end results. With these new insights though, the
findings could be implemented in counter terrorism and strategic
planning for prioritizing target analysis. Social ties are still an important
variable when considering recruitment and length of membership.
Works Cited
Methods
Hypotheses
• Unit of Analysis: Terrorists
• American Terrorism Study, 1980-2002.
• Population: Convicted terrorists in the United States.
• Sample size: 5,364
• Ho: There is not a relationship between recruits through social ties and
length of membership.
• Ha: There is a relationship between recruits through social ties and
length of membership.
• H1: Males recruited through social ties will be members longer.
• H2: Younger recruits through social ties will stay with the group longer.
• H3: Those married will be a member longer than those not married.
Descriptive Tables
• The length of membership for previous social tie recruits were
members on average 35 months longer than those not recruited
through social ties in models 1, 2, 3, and 4, but by model 6 when
marital status is controlled for, those recruited through social ties
are members 7 months less than those not recruited through social
ties. The reason for this drastic change could be coming from the
sample size decreasing by over 300 which changes results and the
pull each variable has on each other.
• It is hard to tell though if model 7 is accurate for education and
social ties because of the loss of about 900 individuals in the
sample size and education not being significant (which could also
be due to the decrease in sample size).
• For H1 males on average stayed members 17.5 months less than
females by model 7 when all variables were controlled for. This
finding was extremely unpredicted but could be due to the sample
size being about 95% male and 5% female. Regardless, males
make up the majority of terrorists and so this sample size is
accurate for that time period of those involved.
• In H2 it was found that for every one increase in the age range, a
person would stay roughly 9 months longer. The older the person
is, the longer they would be a member which was a surprise. This
could be because even though most terrorists were between the
ages of younger than 25 to 45, those 46 and above were mostly
members for 98 months or more while those 45 and below were
spread out in membership ranging from 2 months to 98 months or
more. This finding dispels and also supports the common notion
that terrorists ‘age’ out. The finding supports that few members are
older (saying that the younger ages ‘age’ out) but also that the older
you are the longer you will stay with the group.
• Mulcahy, Elizabeth, Shannon Merrington and Peter Bell. 2013. “The Radicalisation of Prison Inmantes: Exploring
Recruitment, Religion and Prisoner Vulnerabilty.” Journal of Human Security 9(1):4-14.
• Ozeren, Suleyman, Murat Sever, Kamil Yilmaz and Alper Sozer. 2014. “Whom Do They Recruit?: Profiling Recruitment
in the PKK/KCK.” Studies in Conflict & Terrorism 37(4):322-347.
• Postel, Therese. 2013. “The Young and the Normless: Al Qaeda’s Ideological Recruitment of Western Extremists.” The
Quarterly Journal 12(4):99-117.
• Siegel, David A. 2009. “Social Networks and Collective Action.” American Journal of Political Science 53(1):122-138.
• Silke, Andrew. 2008. “Holy Warriors: Exploring the Psychological Processes of Jihadi Radicalization.” European Journal
of Criminology 5(1):99-123.
• Snow, David A., Louis A. Zurcher, Jr. and Sheldon Ekland-Olson. 1980. “Social Networks and Social Movements: A
Microstructural Approach to Differential Recruitment.” American Sociological Review 45(5):787-801.
• Vertigans, Stephen. 2007. “Routes into ‘Islamic’ Terrorism: Dead Ends and Spaghetti Junctions.” Policing 1(4):447-459.
• Weinstein, Jeremy M. 2005. “Resources and the Information Problem in Rebel Recruitment.” The Journal of Conflict
Resolution 49(4):598-624.
• Bierstedt, Robert. 1965. “Reviewed Work: Exchange and Power in Social Life by Peter M Blau.” American Sociological Review 30(5):789-790.
• Blazak, Randy. 2001. “White Boys to Terrorist Men.” The American Behavioral Scientist 44(6):982-1000.
• Brady, Henry E., Kay L. Schlozman, and Sidney Verba. 1999. “Prospecting for Participants: Rational Expectations and the Recruitment of Political
Activists.” The American Political Science Review 93(1):153-166.
• Gates, Scott. 2002. “Recruitment and Allegiance.” The Journal of Conflict Resolution 46(1):111-130.
• Hegghammer, Thomas. 2006. “Terrorist Recruitment and Radicalization in Saudi Arabia.” Middle East Policy 13(4):39-60.
• Hirschi, T. 1969. “A Control Theory of Delinquency.” Criminology Theory: Selected Classic Readings:289-305.
• Humphreys, Macartan and Jeremy M. Weinstein. 2008. “Who Fights? The Determinants of Participation in Civil War.” American Journal of Political
Science 52(2):436-455.
• Klandermans, Bert and Dirk Oegema. 1987. “Potentials, Networks, Motivations, and Barriers: Steps Towards Participation in Social Movements.”
American Sociological Review 52(4):519-531.
• McAdam, Doug. 1986. “Recruitment to High-Risk Activism: The Case of Freedom Summer.” American Journal of Sociology 92(1):64-90.
• McAdam, Doug and Ronnelle Paulsen. 1993. “Specifying the Relationship between Social Ties and Activism.” American Journal of Sociology
99(3):640-667.
• Medina, Richard M. 2014. “Social Network Analysis: A case study of the Islamist terrorist network.” Security Journal 27(1):97-121.

More Related Content

What's hot

Senior Thesis with Current Investigation
Senior Thesis with Current InvestigationSenior Thesis with Current Investigation
Senior Thesis with Current InvestigationSkyler Saunders
 
2017.04.06 Dynamics of Public and Private Violence
2017.04.06 Dynamics of Public and Private Violence2017.04.06 Dynamics of Public and Private Violence
2017.04.06 Dynamics of Public and Private ViolenceNUI Galway
 
Erin Faith Page Homophobia - Final
Erin Faith Page Homophobia - FinalErin Faith Page Homophobia - Final
Erin Faith Page Homophobia - FinalErin Faith Page
 
Suicide Clustering and Contagion: Early Identification and Responding
Suicide Clustering and Contagion: Early Identification and RespondingSuicide Clustering and Contagion: Early Identification and Responding
Suicide Clustering and Contagion: Early Identification and RespondingNational Suicide Research Foundation
 
Applyingbesttreatmentsbyusingagregressionequationtotargetviolenceproneyouthar...
Applyingbesttreatmentsbyusingagregressionequationtotargetviolenceproneyouthar...Applyingbesttreatmentsbyusingagregressionequationtotargetviolenceproneyouthar...
Applyingbesttreatmentsbyusingagregressionequationtotargetviolenceproneyouthar...Robert Zagar
 
Erwin_Strain_APA_Poster_15
Erwin_Strain_APA_Poster_15Erwin_Strain_APA_Poster_15
Erwin_Strain_APA_Poster_15Kyle Erwin
 
Law and Justice Presentation
Law and Justice PresentationLaw and Justice Presentation
Law and Justice Presentationjhead_1017
 
Bushnell, S Research Paper
Bushnell, S Research PaperBushnell, S Research Paper
Bushnell, S Research PaperSarah Bushnell
 
Asymmetric warfare group report psychological and sociological concepts of r...
Asymmetric warfare group report  psychological and sociological concepts of r...Asymmetric warfare group report  psychological and sociological concepts of r...
Asymmetric warfare group report psychological and sociological concepts of r...PublicLeaker
 
Research Illustration, L. Hinkle
Research Illustration, L. HinkleResearch Illustration, L. Hinkle
Research Illustration, L. Hinklelilliehinkle
 
Bullying In Academic Environments And The After Effects
Bullying In Academic Environments And The After EffectsBullying In Academic Environments And The After Effects
Bullying In Academic Environments And The After EffectsBrad Weisberg, BA Sociology
 

What's hot (18)

Senior Thesis with Current Investigation
Senior Thesis with Current InvestigationSenior Thesis with Current Investigation
Senior Thesis with Current Investigation
 
2017.04.06 Dynamics of Public and Private Violence
2017.04.06 Dynamics of Public and Private Violence2017.04.06 Dynamics of Public and Private Violence
2017.04.06 Dynamics of Public and Private Violence
 
Erin Faith Page Homophobia - Final
Erin Faith Page Homophobia - FinalErin Faith Page Homophobia - Final
Erin Faith Page Homophobia - Final
 
Suicide Clustering and Contagion: Early Identification and Responding
Suicide Clustering and Contagion: Early Identification and RespondingSuicide Clustering and Contagion: Early Identification and Responding
Suicide Clustering and Contagion: Early Identification and Responding
 
Applyingbesttreatmentsbyusingagregressionequationtotargetviolenceproneyouthar...
Applyingbesttreatmentsbyusingagregressionequationtotargetviolenceproneyouthar...Applyingbesttreatmentsbyusingagregressionequationtotargetviolenceproneyouthar...
Applyingbesttreatmentsbyusingagregressionequationtotargetviolenceproneyouthar...
 
Erwin_Strain_APA_Poster_15
Erwin_Strain_APA_Poster_15Erwin_Strain_APA_Poster_15
Erwin_Strain_APA_Poster_15
 
0361684313484900
03616843134849000361684313484900
0361684313484900
 
Nothing Works; Disproportionate Minority Confinement
Nothing Works; Disproportionate Minority ConfinementNothing Works; Disproportionate Minority Confinement
Nothing Works; Disproportionate Minority Confinement
 
A Balancing Act
A Balancing ActA Balancing Act
A Balancing Act
 
Law and Justice Presentation
Law and Justice PresentationLaw and Justice Presentation
Law and Justice Presentation
 
VIOLENCE
VIOLENCEVIOLENCE
VIOLENCE
 
Amanda Tom Final ID Paper
Amanda Tom Final ID PaperAmanda Tom Final ID Paper
Amanda Tom Final ID Paper
 
Aging Out Or Evolving
Aging Out Or EvolvingAging Out Or Evolving
Aging Out Or Evolving
 
Bushnell, S Research Paper
Bushnell, S Research PaperBushnell, S Research Paper
Bushnell, S Research Paper
 
Asymmetric warfare group report psychological and sociological concepts of r...
Asymmetric warfare group report  psychological and sociological concepts of r...Asymmetric warfare group report  psychological and sociological concepts of r...
Asymmetric warfare group report psychological and sociological concepts of r...
 
IVS Final Paper
IVS Final PaperIVS Final Paper
IVS Final Paper
 
Research Illustration, L. Hinkle
Research Illustration, L. HinkleResearch Illustration, L. Hinkle
Research Illustration, L. Hinkle
 
Bullying In Academic Environments And The After Effects
Bullying In Academic Environments And The After EffectsBullying In Academic Environments And The After Effects
Bullying In Academic Environments And The After Effects
 

Viewers also liked

Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahadaliuet
 
Social media and terrorism
Social media and terrorismSocial media and terrorism
Social media and terrorismRobbie Fordyce
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismGanesh DNP
 

Viewers also liked (8)

Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
C01.8 terrorism
C01.8 terrorismC01.8 terrorism
C01.8 terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
Social media and terrorism
Social media and terrorismSocial media and terrorism
Social media and terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
 

Similar to "Social Ties and Terrorism: Do They Matter?"

EDRD 6000: Ethics when working with LGBTQ+ Youth
EDRD 6000: Ethics when working with LGBTQ+ YouthEDRD 6000: Ethics when working with LGBTQ+ Youth
EDRD 6000: Ethics when working with LGBTQ+ YouthStephanie Gariscsak
 
Social control theory
Social control theorySocial control theory
Social control theoryrplatos
 
Final Defense Presentation 2/12/2014
Final Defense Presentation 2/12/2014Final Defense Presentation 2/12/2014
Final Defense Presentation 2/12/2014Stacy Branham
 
current trends in criminal justice system
current trends in criminal justice systemcurrent trends in criminal justice system
current trends in criminal justice systemPATRICK MAELO
 
Study Participants Answers to Interview QuestionsParticipant #1.docx
Study Participants Answers to Interview QuestionsParticipant #1.docxStudy Participants Answers to Interview QuestionsParticipant #1.docx
Study Participants Answers to Interview QuestionsParticipant #1.docxlillie234567
 
A psychological autopsy of an intellectually gifted student with attention de...
A psychological autopsy of an intellectually gifted student with attention de...A psychological autopsy of an intellectually gifted student with attention de...
A psychological autopsy of an intellectually gifted student with attention de...KarinaBorges32
 
SLIDE PENGANTAR METODE PENELITIAN KUANTITATIF
SLIDE PENGANTAR METODE PENELITIAN KUANTITATIFSLIDE PENGANTAR METODE PENELITIAN KUANTITATIF
SLIDE PENGANTAR METODE PENELITIAN KUANTITATIFStembiAlaziziyah
 
Transphobia in Today's Society: Implicit Attitudes and Personal Beliefs
Transphobia in Today's Society: Implicit Attitudes and Personal BeliefsTransphobia in Today's Society: Implicit Attitudes and Personal Beliefs
Transphobia in Today's Society: Implicit Attitudes and Personal BeliefsStephanie Azzarello
 
Religion on Psychological Well-Being and Self-Efficacy among Secondary School...
Religion on Psychological Well-Being and Self-Efficacy among Secondary School...Religion on Psychological Well-Being and Self-Efficacy among Secondary School...
Religion on Psychological Well-Being and Self-Efficacy among Secondary School...IJSRP Journal
 
Social Media, Self Esteem- WOC -5.pptx
Social Media, Self Esteem- WOC -5.pptxSocial Media, Self Esteem- WOC -5.pptx
Social Media, Self Esteem- WOC -5.pptxAnngillian Cruz
 
The Impact Of Social Identity On Education
The Impact Of Social Identity On EducationThe Impact Of Social Identity On Education
The Impact Of Social Identity On EducationLindsey Campbell
 
Adolescent suicide risk four psychosocial factors
Adolescent suicide risk four psychosocial factorsAdolescent suicide risk four psychosocial factors
Adolescent suicide risk four psychosocial factorsferrellnl
 
Adolescent suicide risk four psychosocial factors
Adolescent suicide risk four psychosocial factorsAdolescent suicide risk four psychosocial factors
Adolescent suicide risk four psychosocial factorsferrellnl
 
Graduate Research Poster_Extraverion_EWhite_ACavazos
Graduate Research Poster_Extraverion_EWhite_ACavazosGraduate Research Poster_Extraverion_EWhite_ACavazos
Graduate Research Poster_Extraverion_EWhite_ACavazosEarledreka White, LPA
 
Ic2s2 Tutorial on Modeling Human Values via Social Media Data
Ic2s2 Tutorial on Modeling Human Values via Social Media DataIc2s2 Tutorial on Modeling Human Values via Social Media Data
Ic2s2 Tutorial on Modeling Human Values via Social Media DataISI Foundation
 
Pre-search questions and applicationsChericia AvantC.docx
Pre-search questions and applicationsChericia AvantC.docxPre-search questions and applicationsChericia AvantC.docx
Pre-search questions and applicationsChericia AvantC.docxChantellPantoja184
 
Gang Membership, Violence, and Psychiatric Morbidity
Gang Membership, Violence, and Psychiatric MorbidityGang Membership, Violence, and Psychiatric Morbidity
Gang Membership, Violence, and Psychiatric Morbidityjeremy coid
 

Similar to "Social Ties and Terrorism: Do They Matter?" (20)

EDRD 6000: Ethics when working with LGBTQ+ Youth
EDRD 6000: Ethics when working with LGBTQ+ YouthEDRD 6000: Ethics when working with LGBTQ+ Youth
EDRD 6000: Ethics when working with LGBTQ+ Youth
 
SociologyExchange.co.uk Shared Resource
SociologyExchange.co.uk Shared ResourceSociologyExchange.co.uk Shared Resource
SociologyExchange.co.uk Shared Resource
 
Social control theory
Social control theorySocial control theory
Social control theory
 
THE INFLUENCE OF ETHICAL IDEOLOGIES ON ATTITUDES TOWARD SUICIDE
THE INFLUENCE OF ETHICAL IDEOLOGIES ON ATTITUDES TOWARD SUICIDETHE INFLUENCE OF ETHICAL IDEOLOGIES ON ATTITUDES TOWARD SUICIDE
THE INFLUENCE OF ETHICAL IDEOLOGIES ON ATTITUDES TOWARD SUICIDE
 
Final Defense Presentation 2/12/2014
Final Defense Presentation 2/12/2014Final Defense Presentation 2/12/2014
Final Defense Presentation 2/12/2014
 
current trends in criminal justice system
current trends in criminal justice systemcurrent trends in criminal justice system
current trends in criminal justice system
 
Study Participants Answers to Interview QuestionsParticipant #1.docx
Study Participants Answers to Interview QuestionsParticipant #1.docxStudy Participants Answers to Interview QuestionsParticipant #1.docx
Study Participants Answers to Interview QuestionsParticipant #1.docx
 
A psychological autopsy of an intellectually gifted student with attention de...
A psychological autopsy of an intellectually gifted student with attention de...A psychological autopsy of an intellectually gifted student with attention de...
A psychological autopsy of an intellectually gifted student with attention de...
 
SLIDE PENGANTAR METODE PENELITIAN KUANTITATIF
SLIDE PENGANTAR METODE PENELITIAN KUANTITATIFSLIDE PENGANTAR METODE PENELITIAN KUANTITATIF
SLIDE PENGANTAR METODE PENELITIAN KUANTITATIF
 
Transphobia in Today's Society: Implicit Attitudes and Personal Beliefs
Transphobia in Today's Society: Implicit Attitudes and Personal BeliefsTransphobia in Today's Society: Implicit Attitudes and Personal Beliefs
Transphobia in Today's Society: Implicit Attitudes and Personal Beliefs
 
Religion on Psychological Well-Being and Self-Efficacy among Secondary School...
Religion on Psychological Well-Being and Self-Efficacy among Secondary School...Religion on Psychological Well-Being and Self-Efficacy among Secondary School...
Religion on Psychological Well-Being and Self-Efficacy among Secondary School...
 
Social Media, Self Esteem- WOC -5.pptx
Social Media, Self Esteem- WOC -5.pptxSocial Media, Self Esteem- WOC -5.pptx
Social Media, Self Esteem- WOC -5.pptx
 
The Impact Of Social Identity On Education
The Impact Of Social Identity On EducationThe Impact Of Social Identity On Education
The Impact Of Social Identity On Education
 
Adolescent suicide risk four psychosocial factors
Adolescent suicide risk four psychosocial factorsAdolescent suicide risk four psychosocial factors
Adolescent suicide risk four psychosocial factors
 
Adolescent suicide risk four psychosocial factors
Adolescent suicide risk four psychosocial factorsAdolescent suicide risk four psychosocial factors
Adolescent suicide risk four psychosocial factors
 
Graduate Research Poster_Extraverion_EWhite_ACavazos
Graduate Research Poster_Extraverion_EWhite_ACavazosGraduate Research Poster_Extraverion_EWhite_ACavazos
Graduate Research Poster_Extraverion_EWhite_ACavazos
 
Ic2s2 Tutorial on Modeling Human Values via Social Media Data
Ic2s2 Tutorial on Modeling Human Values via Social Media DataIc2s2 Tutorial on Modeling Human Values via Social Media Data
Ic2s2 Tutorial on Modeling Human Values via Social Media Data
 
Pre-search questions and applicationsChericia AvantC.docx
Pre-search questions and applicationsChericia AvantC.docxPre-search questions and applicationsChericia AvantC.docx
Pre-search questions and applicationsChericia AvantC.docx
 
Poster
PosterPoster
Poster
 
Gang Membership, Violence, and Psychiatric Morbidity
Gang Membership, Violence, and Psychiatric MorbidityGang Membership, Violence, and Psychiatric Morbidity
Gang Membership, Violence, and Psychiatric Morbidity
 

Recently uploaded

2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSINGmarianagonzalez07
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degreeyuu sss
 
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanIdentifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanMYRABACSAFRA2
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.natarajan8993
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...Amil Baba Dawood bangali
 
Multiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfMultiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfchwongval
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsVICTOR MAESTRE RAMIREZ
 
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...GQ Research
 
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...ssuserf63bd7
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfgstagge
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Colleen Farrelly
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPTBoston Institute of Analytics
 
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDRafezzaman
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfBoston Institute of Analytics
 
Call Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceCall Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceSapana Sha
 
Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Seán Kennedy
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024thyngster
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectBoston Institute of Analytics
 

Recently uploaded (20)

2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
 
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanIdentifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population Mean
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
 
Multiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfMultiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdf
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business Professionals
 
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
 
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdf
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
 
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
 
Call Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceCall Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts Service
 
Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis Project
 

"Social Ties and Terrorism: Do They Matter?"

  • 1. Social Ties and Terrorism: Do They Matter? Stephen Leadholm | Sister Jenson | Brigham Young University-Idaho Research Question How does having social ties to a terrorist group, prior to joining, effect the duration one stays with that group, and why? Introduction • Today’s literature concludes that the three major contributing factors of terrorist involvement are socioeconomic factors, social networks and social ties, and recruitment. • If we can’t figure out who would be a terrorist, how do recruiters for terrorist organizations do so? The answer lies in social networks and social ties. These have been the biggest predictor of who would join a terrorist group (Brady, Schlozman, and Verba 1999; Gates 2002; Hegghammer 2006; Humphreys and Weinstein 2008; Klandermans and Oegema 1987; McAdam 1986; McAdam and Paulsen 1993; Medina 2014; Ozeren et al. 2014; Postel 2013; Siegel 2009; Silke 2008; Snow, Zurcher Jr., and Ekland-Olson 1980; Vertigans 2007; Weinstein 2005). Theory • Those who join terrorist groups are usually going through a lack of identity, normlessness, and rootlessness (Blazak 2001; Mulcahy, Merrington, and Bell 2013; Postel 2013). These people would be categorized by Travis Hirschi (1969) as having weak bonds to important social institutions like family, school, work, norms, and even activities they could participate in. Due to their weak bonds to society, they are searching for a group to identify (bond) with in return for their services. According to Bierstedt (1965), these people are necessitating the social approval and social acceptance through interaction with others (reward) and are willing to do what it takes to obtain and maintain that relationship (cost). This is the exchange of social rewards. Discussion Results • Linear regression will be used in order to test the strength of the relationship between recruits through social ties and length of membership. The final model includes the dependent variable (length of membership), independent variable (recruitment through social ties), and all the control variables (gender, type of terrorist group, race, age, marital status, and education). The focal relationship is no longer significant in the last model and R2 decreases to 0.68. Gender, type of terrorism, race, age, and marital status are highly significant at the .001 level. For gender, males will be members 17.67 months less than females while domestic terrorists will stay members 23.36 months less than international terrorists. Race’s coefficient stayed about the same at 42.54 showing that Caucasians will be members about 42.5 months longer than non-Caucasians. Age shows that for every one increase on the age scale that person will be a member 9.22 months longer. Finally, married people’s length of membership will be 31.81 months longer than not married people. Conclusion • The findings have revealed that social ties are partially supported to impact length of membership with a terrorist organization, but that age and marital status are potentially more important factors impacting length of membership. Some unexpected findings could have been due to an inconsistent sample size which also resulted in a lack of confidence in the end results. With these new insights though, the findings could be implemented in counter terrorism and strategic planning for prioritizing target analysis. Social ties are still an important variable when considering recruitment and length of membership. Works Cited Methods Hypotheses • Unit of Analysis: Terrorists • American Terrorism Study, 1980-2002. • Population: Convicted terrorists in the United States. • Sample size: 5,364 • Ho: There is not a relationship between recruits through social ties and length of membership. • Ha: There is a relationship between recruits through social ties and length of membership. • H1: Males recruited through social ties will be members longer. • H2: Younger recruits through social ties will stay with the group longer. • H3: Those married will be a member longer than those not married. Descriptive Tables • The length of membership for previous social tie recruits were members on average 35 months longer than those not recruited through social ties in models 1, 2, 3, and 4, but by model 6 when marital status is controlled for, those recruited through social ties are members 7 months less than those not recruited through social ties. The reason for this drastic change could be coming from the sample size decreasing by over 300 which changes results and the pull each variable has on each other. • It is hard to tell though if model 7 is accurate for education and social ties because of the loss of about 900 individuals in the sample size and education not being significant (which could also be due to the decrease in sample size). • For H1 males on average stayed members 17.5 months less than females by model 7 when all variables were controlled for. This finding was extremely unpredicted but could be due to the sample size being about 95% male and 5% female. Regardless, males make up the majority of terrorists and so this sample size is accurate for that time period of those involved. • In H2 it was found that for every one increase in the age range, a person would stay roughly 9 months longer. The older the person is, the longer they would be a member which was a surprise. This could be because even though most terrorists were between the ages of younger than 25 to 45, those 46 and above were mostly members for 98 months or more while those 45 and below were spread out in membership ranging from 2 months to 98 months or more. This finding dispels and also supports the common notion that terrorists ‘age’ out. The finding supports that few members are older (saying that the younger ages ‘age’ out) but also that the older you are the longer you will stay with the group. • Mulcahy, Elizabeth, Shannon Merrington and Peter Bell. 2013. “The Radicalisation of Prison Inmantes: Exploring Recruitment, Religion and Prisoner Vulnerabilty.” Journal of Human Security 9(1):4-14. • Ozeren, Suleyman, Murat Sever, Kamil Yilmaz and Alper Sozer. 2014. “Whom Do They Recruit?: Profiling Recruitment in the PKK/KCK.” Studies in Conflict & Terrorism 37(4):322-347. • Postel, Therese. 2013. “The Young and the Normless: Al Qaeda’s Ideological Recruitment of Western Extremists.” The Quarterly Journal 12(4):99-117. • Siegel, David A. 2009. “Social Networks and Collective Action.” American Journal of Political Science 53(1):122-138. • Silke, Andrew. 2008. “Holy Warriors: Exploring the Psychological Processes of Jihadi Radicalization.” European Journal of Criminology 5(1):99-123. • Snow, David A., Louis A. Zurcher, Jr. and Sheldon Ekland-Olson. 1980. “Social Networks and Social Movements: A Microstructural Approach to Differential Recruitment.” American Sociological Review 45(5):787-801. • Vertigans, Stephen. 2007. “Routes into ‘Islamic’ Terrorism: Dead Ends and Spaghetti Junctions.” Policing 1(4):447-459. • Weinstein, Jeremy M. 2005. “Resources and the Information Problem in Rebel Recruitment.” The Journal of Conflict Resolution 49(4):598-624. • Bierstedt, Robert. 1965. “Reviewed Work: Exchange and Power in Social Life by Peter M Blau.” American Sociological Review 30(5):789-790. • Blazak, Randy. 2001. “White Boys to Terrorist Men.” The American Behavioral Scientist 44(6):982-1000. • Brady, Henry E., Kay L. Schlozman, and Sidney Verba. 1999. “Prospecting for Participants: Rational Expectations and the Recruitment of Political Activists.” The American Political Science Review 93(1):153-166. • Gates, Scott. 2002. “Recruitment and Allegiance.” The Journal of Conflict Resolution 46(1):111-130. • Hegghammer, Thomas. 2006. “Terrorist Recruitment and Radicalization in Saudi Arabia.” Middle East Policy 13(4):39-60. • Hirschi, T. 1969. “A Control Theory of Delinquency.” Criminology Theory: Selected Classic Readings:289-305. • Humphreys, Macartan and Jeremy M. Weinstein. 2008. “Who Fights? The Determinants of Participation in Civil War.” American Journal of Political Science 52(2):436-455. • Klandermans, Bert and Dirk Oegema. 1987. “Potentials, Networks, Motivations, and Barriers: Steps Towards Participation in Social Movements.” American Sociological Review 52(4):519-531. • McAdam, Doug. 1986. “Recruitment to High-Risk Activism: The Case of Freedom Summer.” American Journal of Sociology 92(1):64-90. • McAdam, Doug and Ronnelle Paulsen. 1993. “Specifying the Relationship between Social Ties and Activism.” American Journal of Sociology 99(3):640-667. • Medina, Richard M. 2014. “Social Network Analysis: A case study of the Islamist terrorist network.” Security Journal 27(1):97-121.