SlideShare a Scribd company logo
Contents
Introduction ...............................................................................................................................1
Literature Review.......................................................................................................................1
Structure and Resilience ........................................................................................................5
Internal Connections and Knowledge Transfer....................................................................10
Innovation ............................................................................................................................20
Summary ..............................................................................................................................25
Methodology............................................................................................................................32
Findings & Discussion...............................................................................................................45
Structure & Resilience..........................................................................................................45
Small-scale........................................................................................................................45
Large Scale........................................................................................................................47
Structural Resilience.........................................................................................................50
Summary...........................................................................................................................51
Knowledge Transfer & Communication...............................................................................53
Jihad’s Summer Camps.....................................................................................................53
Correspondence Course Ideology ....................................................................................55
Ways and Means: How to Communicate.........................................................................57
Summary...........................................................................................................................60
Innovation & Strategy ..........................................................................................................62
Development of new strategies .......................................................................................62
Insurgents or Statesmen?.................................................................................................64
Straight from the Headlines .............................................................................................66
Summary...........................................................................................................................68
Summary ..............................................................................................................................70
Conclusion................................................................................................................................73
Material Cited ..........................................................................................................................77
1 | P a g e
Introduction
This dissertation explores how network structures are employed by terrorist groups,
specifically considering whether the operating environment and illegitimate nature of the
groups affects how network theory is put into practice. This is considered via a case study
analysis of the Al Qaeda terrorist organisation, particularly through their training manuals
and internal communications, to examine the theory and practice underlying their
organisational structure. This will allow consideration of the question: How are network
structures employed by Al Qaeda and what impact does this have on their organisation?
From this, the intention is to examine how the network structure is employed in terrorist
organisations, and whether this can provide insights to benefit legitimate organisations
using network structures.
Literature Review
Networks, as considered in this dissertation, are structures that consist of autonomous or
semi-autonomous nodes, collaborating for common purpose (Podolny & Page, 1998). The
structure of the network is a product of the connections between individual nodes. Network
structures can take a range of forms; Figure 1 demonstrates two key examples: the ‘All-
channel’ network is a dense network, with each node connected to many others; the
second, the ‘Hub-spoke’spill-over model, is a loose network with few connections between
individual nodes. If the needs of the network change, rather than adjusting the nodes
themselves, the connections and relationships between different nodes can be adjusted to
2 | P a g e
better suit the strategic goal.
Because of the relative autonomy of individual nodes, networks tend towards a flat
structure, with collective responsibility replacing a source of hierarchical authority (Comas,
et al., 2014).
It has been observed that modern terrorist organisations have adopted network structures;.
The modern network structure tends towards decentralised, flat systems with semi-
autonomous nodes collaborating for common purpose (Zanini & Edwards, 2001). This differs
from the traditional model (pre-9/11) of terrorist organisations, a hierarchical and
bureaucratic structure, typified by organisations such as the Taliban (Comras, 2007). The
term for network structures, employed covertly for illegitimate purposes is ‘dark network’
(Raab & Milward, 2003); this term shall be used in this dissertation to discuss the pertinent
differences between dark networks and legitimate networks. It particularly emphasises that
dark networks operate effectively because they are covert.
This review shall consider three key ways in which network structures have impacted
terrorist organisations and the debate in current literature regarding these areas.
Figure 1: Network Structures – Adapted from (Kilberg, 2012)
3 | P a g e
The first attribute that will be considered is resilience. Resilience can refer to an
organisation’s ability to withstand exogenous shocks, or to adapt to changing circumstances
successfully. This also consists of a terrorist organisation’s ability to withstand the deliberate
efforts of security services to disrupt and destroy elements of terrorist networks. This
analysis will consider both the structure and nature of networks and the impact that this has
on organisational resilience, both against exogenous forces and deliberate attacks.
The second attribute to be considered is knowledge transfer. The literature review will
specifically consider how network structures facilitate the acquisition, processing and
distribution of knowledge within an organisation. The literature considered includes
analyses of both legitimate and illegitimate networks and the impact that different
characteristics of networks can have on knowledge transfer within organisations.
Knowledge transfer contributes to the operational function of network organisations as the
transfer of knowledge includes both organisational knowledge and collaborative effort.
The final attribute to be considered is innovation. Innovation, as it shall be considered here,
is the generation of novel means to overcome existing threats or problems and capitalise on
available opportunities. Again, the studies to be considered include both legitimate and
illegitimate organisations and theories and examples of how network structures have
impacted innovation within organisations.
By considering these three attributes, a broad view is developed of the role of network
structures in an organisation’s operations. This broad view in turn will allow for the
consideration of the unique context of network structures as applied to terrorist
organisations.

More Related Content

Viewers also liked

Writing the introduction chapter of your disseration
Writing the introduction chapter of your disserationWriting the introduction chapter of your disseration
Writing the introduction chapter of your disseration
The Free School
 
Introduction to Report Writing.pdf
Introduction to Report Writing.pdfIntroduction to Report Writing.pdf
Introduction to Report Writing.pdfRonald Speener
 
Writing a dissertation
Writing a dissertationWriting a dissertation
Writing a dissertation
Marketing Utopia
 
How To Write Your Research Dissertation
How To Write Your Research DissertationHow To Write Your Research Dissertation
How To Write Your Research Dissertation
Chris Jobling
 
Thesis Writing
Thesis WritingThesis Writing
Thesis Writing
Prof. Erwin Globio
 
Parts of a Research Paper
Parts of a Research PaperParts of a Research Paper
Parts of a Research PaperDraizelle Sexon
 
Dissertation writing help guidlines
Dissertation writing help guidlinesDissertation writing help guidlines
Dissertation writing help guidlines
Dissertation Writing UK
 
The thesis and its parts
The thesis and its partsThe thesis and its parts
The thesis and its partsDraizelle Sexon
 
Writing thesis chapters 1-3 guidelines
Writing thesis chapters 1-3 guidelinesWriting thesis chapters 1-3 guidelines
Writing thesis chapters 1-3 guidelines
poleyseugenio
 
5 parts of research paper
5 parts of research paper5 parts of research paper
5 parts of research paperQueene Balaoro
 

Viewers also liked (12)

Writing the introduction chapter of your disseration
Writing the introduction chapter of your disserationWriting the introduction chapter of your disseration
Writing the introduction chapter of your disseration
 
Introduction to Report Writing.pdf
Introduction to Report Writing.pdfIntroduction to Report Writing.pdf
Introduction to Report Writing.pdf
 
Writing a dissertation
Writing a dissertationWriting a dissertation
Writing a dissertation
 
Writing Dissertations
Writing DissertationsWriting Dissertations
Writing Dissertations
 
How To Write Your Research Dissertation
How To Write Your Research DissertationHow To Write Your Research Dissertation
How To Write Your Research Dissertation
 
Chapters 1 5
Chapters 1 5Chapters 1 5
Chapters 1 5
 
Thesis Writing
Thesis WritingThesis Writing
Thesis Writing
 
Parts of a Research Paper
Parts of a Research PaperParts of a Research Paper
Parts of a Research Paper
 
Dissertation writing help guidlines
Dissertation writing help guidlinesDissertation writing help guidlines
Dissertation writing help guidlines
 
The thesis and its parts
The thesis and its partsThe thesis and its parts
The thesis and its parts
 
Writing thesis chapters 1-3 guidelines
Writing thesis chapters 1-3 guidelinesWriting thesis chapters 1-3 guidelines
Writing thesis chapters 1-3 guidelines
 
5 parts of research paper
5 parts of research paper5 parts of research paper
5 parts of research paper
 

Similar to Dissertation Introduction Sample

Network Organizations
Network OrganizationsNetwork Organizations
Network Organizations
augustodefranco .
 
Using Networks to Measure Influence and Impact
Using Networks to Measure Influence and ImpactUsing Networks to Measure Influence and Impact
Using Networks to Measure Influence and ImpactYunhao Zhang
 
Current trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networksCurrent trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networks
eSAT Publishing House
 
The state of network organization
The state of network organizationThe state of network organization
The state of network organizationMadhu Shridhar
 
Mapping the Intellectual Structure of Contemporary Technology Management Rese...
Mapping the Intellectual Structure of Contemporary Technology Management Rese...Mapping the Intellectual Structure of Contemporary Technology Management Rese...
Mapping the Intellectual Structure of Contemporary Technology Management Rese...
Che-Wei Lee
 
Networking among High-potential Female Entrepreneurs - An Empirical Study in ...
Networking among High-potential Female Entrepreneurs - An Empirical Study in ...Networking among High-potential Female Entrepreneurs - An Empirical Study in ...
Networking among High-potential Female Entrepreneurs - An Empirical Study in ...
ProductNation/iSPIRT
 
Lectura 2.2 the roleofontologiesinemergnetmiddleware
Lectura 2.2   the roleofontologiesinemergnetmiddlewareLectura 2.2   the roleofontologiesinemergnetmiddleware
Lectura 2.2 the roleofontologiesinemergnetmiddlewareMatias Menendez
 
Hierarchical p2 p
Hierarchical p2 pHierarchical p2 p
Hierarchical p2 p
Kalonji Kalala
 
Networking Portfolio Term Paper
Networking Portfolio Term PaperNetworking Portfolio Term Paper
Networking Portfolio Term Paper
Writers Per Hour
 
Periphery authors, network embeddedness, and research impact: The case of Chi...
Periphery authors, network embeddedness, and research impact: The case of Chi...Periphery authors, network embeddedness, and research impact: The case of Chi...
Periphery authors, network embeddedness, and research impact: The case of Chi...
The International Journal of Business Management and Technology
 
2014 USA
2014 USA2014 USA
2014 USALI HE
 
Organization Structure And Inter-Organizational...
Organization Structure And Inter-Organizational...Organization Structure And Inter-Organizational...
Organization Structure And Inter-Organizational...
Stephanie Clark
 
Running head COMPLEXITY THEORY1COMPLEXITY THEORY4.docx
Running head COMPLEXITY THEORY1COMPLEXITY THEORY4.docxRunning head COMPLEXITY THEORY1COMPLEXITY THEORY4.docx
Running head COMPLEXITY THEORY1COMPLEXITY THEORY4.docx
joellemurphey
 
Sna based reasoning for multiagent
Sna based reasoning for multiagentSna based reasoning for multiagent
Sna based reasoning for multiagent
ijaia
 
Wanted: a larger, different kind of box
Wanted: a larger, different kind of boxWanted: a larger, different kind of box
Wanted: a larger, different kind of box
Lina Martinsson Achi
 
Wanted: a larger, different kind of box
Wanted: a larger, different kind of boxWanted: a larger, different kind of box
Wanted: a larger, different kind of box
Lina Martinsson Achi
 

Similar to Dissertation Introduction Sample (20)

美赛论文
美赛论文美赛论文
美赛论文
 
Thesis
ThesisThesis
Thesis
 
Network Organizations
Network OrganizationsNetwork Organizations
Network Organizations
 
Using Networks to Measure Influence and Impact
Using Networks to Measure Influence and ImpactUsing Networks to Measure Influence and Impact
Using Networks to Measure Influence and Impact
 
Current trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networksCurrent trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networks
 
The state of network organization
The state of network organizationThe state of network organization
The state of network organization
 
Cybersecurity - Cooperation or Proliferation
Cybersecurity -  Cooperation or ProliferationCybersecurity -  Cooperation or Proliferation
Cybersecurity - Cooperation or Proliferation
 
Mapping the Intellectual Structure of Contemporary Technology Management Rese...
Mapping the Intellectual Structure of Contemporary Technology Management Rese...Mapping the Intellectual Structure of Contemporary Technology Management Rese...
Mapping the Intellectual Structure of Contemporary Technology Management Rese...
 
Business Networks
Business NetworksBusiness Networks
Business Networks
 
Networking among High-potential Female Entrepreneurs - An Empirical Study in ...
Networking among High-potential Female Entrepreneurs - An Empirical Study in ...Networking among High-potential Female Entrepreneurs - An Empirical Study in ...
Networking among High-potential Female Entrepreneurs - An Empirical Study in ...
 
Lectura 2.2 the roleofontologiesinemergnetmiddleware
Lectura 2.2   the roleofontologiesinemergnetmiddlewareLectura 2.2   the roleofontologiesinemergnetmiddleware
Lectura 2.2 the roleofontologiesinemergnetmiddleware
 
Hierarchical p2 p
Hierarchical p2 pHierarchical p2 p
Hierarchical p2 p
 
Networking Portfolio Term Paper
Networking Portfolio Term PaperNetworking Portfolio Term Paper
Networking Portfolio Term Paper
 
Periphery authors, network embeddedness, and research impact: The case of Chi...
Periphery authors, network embeddedness, and research impact: The case of Chi...Periphery authors, network embeddedness, and research impact: The case of Chi...
Periphery authors, network embeddedness, and research impact: The case of Chi...
 
2014 USA
2014 USA2014 USA
2014 USA
 
Organization Structure And Inter-Organizational...
Organization Structure And Inter-Organizational...Organization Structure And Inter-Organizational...
Organization Structure And Inter-Organizational...
 
Running head COMPLEXITY THEORY1COMPLEXITY THEORY4.docx
Running head COMPLEXITY THEORY1COMPLEXITY THEORY4.docxRunning head COMPLEXITY THEORY1COMPLEXITY THEORY4.docx
Running head COMPLEXITY THEORY1COMPLEXITY THEORY4.docx
 
Sna based reasoning for multiagent
Sna based reasoning for multiagentSna based reasoning for multiagent
Sna based reasoning for multiagent
 
Wanted: a larger, different kind of box
Wanted: a larger, different kind of boxWanted: a larger, different kind of box
Wanted: a larger, different kind of box
 
Wanted: a larger, different kind of box
Wanted: a larger, different kind of boxWanted: a larger, different kind of box
Wanted: a larger, different kind of box
 

Dissertation Introduction Sample

  • 1. Contents Introduction ...............................................................................................................................1 Literature Review.......................................................................................................................1 Structure and Resilience ........................................................................................................5 Internal Connections and Knowledge Transfer....................................................................10 Innovation ............................................................................................................................20 Summary ..............................................................................................................................25 Methodology............................................................................................................................32 Findings & Discussion...............................................................................................................45 Structure & Resilience..........................................................................................................45 Small-scale........................................................................................................................45 Large Scale........................................................................................................................47 Structural Resilience.........................................................................................................50 Summary...........................................................................................................................51 Knowledge Transfer & Communication...............................................................................53 Jihad’s Summer Camps.....................................................................................................53 Correspondence Course Ideology ....................................................................................55 Ways and Means: How to Communicate.........................................................................57 Summary...........................................................................................................................60 Innovation & Strategy ..........................................................................................................62 Development of new strategies .......................................................................................62 Insurgents or Statesmen?.................................................................................................64 Straight from the Headlines .............................................................................................66 Summary...........................................................................................................................68 Summary ..............................................................................................................................70 Conclusion................................................................................................................................73 Material Cited ..........................................................................................................................77
  • 2. 1 | P a g e Introduction This dissertation explores how network structures are employed by terrorist groups, specifically considering whether the operating environment and illegitimate nature of the groups affects how network theory is put into practice. This is considered via a case study analysis of the Al Qaeda terrorist organisation, particularly through their training manuals and internal communications, to examine the theory and practice underlying their organisational structure. This will allow consideration of the question: How are network structures employed by Al Qaeda and what impact does this have on their organisation? From this, the intention is to examine how the network structure is employed in terrorist organisations, and whether this can provide insights to benefit legitimate organisations using network structures. Literature Review Networks, as considered in this dissertation, are structures that consist of autonomous or semi-autonomous nodes, collaborating for common purpose (Podolny & Page, 1998). The structure of the network is a product of the connections between individual nodes. Network structures can take a range of forms; Figure 1 demonstrates two key examples: the ‘All- channel’ network is a dense network, with each node connected to many others; the second, the ‘Hub-spoke’spill-over model, is a loose network with few connections between individual nodes. If the needs of the network change, rather than adjusting the nodes themselves, the connections and relationships between different nodes can be adjusted to
  • 3. 2 | P a g e better suit the strategic goal. Because of the relative autonomy of individual nodes, networks tend towards a flat structure, with collective responsibility replacing a source of hierarchical authority (Comas, et al., 2014). It has been observed that modern terrorist organisations have adopted network structures;. The modern network structure tends towards decentralised, flat systems with semi- autonomous nodes collaborating for common purpose (Zanini & Edwards, 2001). This differs from the traditional model (pre-9/11) of terrorist organisations, a hierarchical and bureaucratic structure, typified by organisations such as the Taliban (Comras, 2007). The term for network structures, employed covertly for illegitimate purposes is ‘dark network’ (Raab & Milward, 2003); this term shall be used in this dissertation to discuss the pertinent differences between dark networks and legitimate networks. It particularly emphasises that dark networks operate effectively because they are covert. This review shall consider three key ways in which network structures have impacted terrorist organisations and the debate in current literature regarding these areas. Figure 1: Network Structures – Adapted from (Kilberg, 2012)
  • 4. 3 | P a g e The first attribute that will be considered is resilience. Resilience can refer to an organisation’s ability to withstand exogenous shocks, or to adapt to changing circumstances successfully. This also consists of a terrorist organisation’s ability to withstand the deliberate efforts of security services to disrupt and destroy elements of terrorist networks. This analysis will consider both the structure and nature of networks and the impact that this has on organisational resilience, both against exogenous forces and deliberate attacks. The second attribute to be considered is knowledge transfer. The literature review will specifically consider how network structures facilitate the acquisition, processing and distribution of knowledge within an organisation. The literature considered includes analyses of both legitimate and illegitimate networks and the impact that different characteristics of networks can have on knowledge transfer within organisations. Knowledge transfer contributes to the operational function of network organisations as the transfer of knowledge includes both organisational knowledge and collaborative effort. The final attribute to be considered is innovation. Innovation, as it shall be considered here, is the generation of novel means to overcome existing threats or problems and capitalise on available opportunities. Again, the studies to be considered include both legitimate and illegitimate organisations and theories and examples of how network structures have impacted innovation within organisations. By considering these three attributes, a broad view is developed of the role of network structures in an organisation’s operations. This broad view in turn will allow for the consideration of the unique context of network structures as applied to terrorist organisations.