Affiliation:
1. University of Kentucky, Lexington, USA
2. University of Illinois at Urbana–Champaign, USA
Abstract
Although not as common as more traditional organizations such as firms, nonprofits, and governments, terrorist organizations also create interorganizational communication (IC) relationships. The purpose of this article is to determine the relationship between IC relationships and terrorist attacks. To do so, we analyzed a stable alliance network of 395 terrorist organizations between 1998 and 2005. Using Borgatti and Everett’s four-prong typology of centrality, we assessed how degree, closeness, betweenness, and distance-weighted fragmentation contributed to the identification of key players in the network. The results found that all four sets of key players were more likely to commit more terrorist acts and kill more people from 1998 to 2005. However, when entered into a full model, key players identified by closeness centrality consistently predicted both indicators of terrorism, whereas the other centrality metrics did not. We discuss the results in light of existing IC and communication network theory, suggesting that the network position afforded by closeness centrality may allow dark organizations the balance to remain hidden enough to avoid detection, yet connected enough to mobilize resources.
Subject
Linguistics and Language,Language and Linguistics,Communication
Reference79 articles.
1. With Friends Like These … Why Terrorist Organizations Ally
2. Dilettantes, Ideologues, and the Weak: Terrorists Who Don't Kill
3. The Nature of the Beast: Organizational Structures and the Lethality of Terrorist Attacks
4. Asal V. H., Rethemeyer R. K., Anderson I. (2011). Big Allied and Dangerous (BAAD) database 1—Lethality data, 1998-2005. Retrieved from https://www.start.umd.edu/data-tools/big-allied-and-dangerous-baad-database-1-lethality-data-1998-2005
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献