2010
DOI: 10.1080/17539153.2010.491319
|View full text |Cite
|
Sign up to set email alerts
|

Social network analysis and counterinsurgency: a counterproductive strategy?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 27 publications
0
7
0
Order By: Relevance
“…Several scholars have used a network approach to reconstruct decision-making processes and stakeholder intervention in policy domains (Knoke et al , 1996; Svensson and Öberg, 2006; Fischer and Sciarini, 2013). Researching a policy network, via SNA, implies analyzing a policy process via a mathematical abstraction, where relations can be contingently examined with the actors that are involved (Henning, 2009; Ginty, 2010). In that respect the method is conducive to the integration of structure and agency (Christopoulos, 2008), although the theoretical implications of this integration have not been exhaustively explored (Emirbayer, 1997).…”
Section: A Network Approach In Decoupling Brokeragementioning
confidence: 99%
“…Several scholars have used a network approach to reconstruct decision-making processes and stakeholder intervention in policy domains (Knoke et al , 1996; Svensson and Öberg, 2006; Fischer and Sciarini, 2013). Researching a policy network, via SNA, implies analyzing a policy process via a mathematical abstraction, where relations can be contingently examined with the actors that are involved (Henning, 2009; Ginty, 2010). In that respect the method is conducive to the integration of structure and agency (Christopoulos, 2008), although the theoretical implications of this integration have not been exhaustively explored (Emirbayer, 1997).…”
Section: A Network Approach In Decoupling Brokeragementioning
confidence: 99%
“…The combination of bio-politics with technology is particularly revealing about the location of power and the framing of conflicts and the inhabitants of conflict areas (Gregory and Pred, 2007). Securitized biopolitics has been in evidence in Israel/Palestine, Iraq, Afghanistan, Sri Lanka and elsewhere as those capable of technowarfare have collected and used biometric and other data in pursuit of their security agendas (Mac Ginty, 2010b). What is significant from the point of view of this article is that social network analysis and human terrain systems are based on the objectification and subjectification of inhabitants in conflict zones, and on a particular discursive framing of the conflict itself.…”
Section: Proximate Factorsmentioning
confidence: 95%
“…As such, it has been incorporated into both security and policing practices. Thus, for example, social network or ‘link’ analysis has been reported to have been the basis for the identification of targets for drone strikes (Devereaux, 2015; McNeal, 2013), counter-insurgency doctrine in Iraq and Afghanistan (Knoke, 2013; McChrystal, 2011), the capture of Saddam Hussein in 2003 (Hougham, 2005; Reed and Segal, 2006) and the Sri Lankan government assault on Tamil Tiger forces in 2008/09 (Mac Ginty, 2010). Beyond the military domain, SNA has similarly been used for understanding gang activity (Home Office, 2016a).…”
Section: The Network In Practicementioning
confidence: 99%