Search citation statements
Paper Sections
Citation Types
Year Published
Publication Types
Relationship
Authors
Journals
The causes of religious violence have attracted numerous explanations in the years since the 9/11 attacks on the Pentagon and the World Trade Towers. However, most forms of religious extremism do not result in violence (e.g., the Amish, Hasidim, Jains) and religious groups have not cornered the market on egregious violence. Nevertheless, religious violence does occur, and this paper examines the interplay of social networks and religious violence. It builds on Cass Sunstein's “law of group polarization,” which predicts that when like-minded people deliberate as an organized group, the general opinion shifts toward extreme versions of their common belief. It argues that internally dense religious groups that maintain few ties to the wider society are more likely to embrace extreme views and behavior than are those that are not as dense and/or remain tied to the wider society. The argument is then tested using social network analysis methodologies to examine the evolution of the Hamburg Cell, which played a critical role in the 9/11 terrorist attacks. It concludes with a series of policy recommendations that can limit but not eliminate religious extremism and violent behavior in the future.
The causes of religious violence have attracted numerous explanations in the years since the 9/11 attacks on the Pentagon and the World Trade Towers. However, most forms of religious extremism do not result in violence (e.g., the Amish, Hasidim, Jains) and religious groups have not cornered the market on egregious violence. Nevertheless, religious violence does occur, and this paper examines the interplay of social networks and religious violence. It builds on Cass Sunstein's “law of group polarization,” which predicts that when like-minded people deliberate as an organized group, the general opinion shifts toward extreme versions of their common belief. It argues that internally dense religious groups that maintain few ties to the wider society are more likely to embrace extreme views and behavior than are those that are not as dense and/or remain tied to the wider society. The argument is then tested using social network analysis methodologies to examine the evolution of the Hamburg Cell, which played a critical role in the 9/11 terrorist attacks. It concludes with a series of policy recommendations that can limit but not eliminate religious extremism and violent behavior in the future.
Disrupting Dark Networks focuses on how social network analysis can be used to craft strategies to track, destabilize and disrupt covert and illegal networks. The book begins with an overview of the key terms and assumptions of social network analysis and various counterinsurgency strategies. The next several chapters introduce readers to algorithms and metrics commonly used by social network analysts. They provide worked examples from four different social network analysis software packages (UCINET, NetDraw, Pajek and ORA) using standard network data sets as well as data from an actual terrorist network that serves as a running example throughout the book. The book concludes by considering the ethics of and various ways that social network analysis can inform counterinsurgency strategizing. By contextualizing these methods in a larger counterinsurgency framework, this book offers scholars and analysts an array of approaches for disrupting dark networks.
The communication space of modern society is rapidly expanding its boundaries. First of all, this can be traced in the modernization of old and the emergence of new types of interaction between individuals in the economic, political, social, spiritual spheres of society. The topic of social networks, as one of the areas of research in theoretical sociology, can be characterized as promising and actively developing, that is especially due to the fact that the network theory is the most natural for the analysis of social structure. In a broad sense, a social network is understood as many points (participants of a social system) related to each other to a greater or lesser extent. The first part of the article presents a theoretical analysis of the evolution of social network theory in the works of foreign researchers, describes a graphic model of its incremental development. The second part offers the analysis of the functioning of social networks in the regional communities (Cherepovets, Vologda) on the basis of the survey "Barriers to civil participation and mechanisms for overcoming them at the regional level", which was conducted by the Vologda Scientific Center of the Russian Academy of Sciences in 2019. In conclusion, we formulate the main conclusions about the functioning of social networks in given regional communities, and develop recommendations for further empirical study of this phenomenon.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.