首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
Conflicts are complex, dynamic processes wherein the frequency and intensity of violence changes throughout the contest. In this article, we explore the temporal dynamics of two long-term civil wars—DR-Congo and Sudan—to identify systematic and random conditions that lead to changes in civilian targeting. Violence committed by rival political actors, territorial exchange, and the number and addition of violent agents strongly shape the likelihood that civilian targeting events and casualties increase or decrease over time. General and country differences emerge from vector autoregression analysis to suggest that (1) three types of violent agents—rebels, militias, and the government—are locked in spirals of violence where violence against civilians by one actor leads to subsequent violence by another actor; (2) rebels and government forces respond to the other side’s acquisition of contested territory by increasing counterattacks on civilians, specifically in DR-Congo; and (3) increasing numbers of active nonstate agents lead to higher violence rates in the following months. Among these, civilian targeting by rival actors triggers the most follow-on violent events against civilians.  相似文献   

2.
Although military cooperation among rebel groups in multi-party civil wars could help rebels defeat or extract concessions from an incumbent government, violent conflict among rebel groups is empirically prevalent. Why do rebel groups in multi-party civil wars choose to fight one another? This article models the strategic dilemma facing rebel groups in multi-party civil wars as an alternating-offer bargaining game of incomplete information with an outside option. The game-theoretic model explores the relationship between the status quo distribution of power among rebel groups, the costs of fighting, and the likelihood that one rebel group will opt to unilaterally end bargaining over a set of goods, such as access to supply routes, natural resources, and control over civilian populations. We show that the likelihood of violent conflict between rebel groups is lowest when the status quo distribution of benefits reflects the existing distribution of power.  相似文献   

3.
In many armed conflicts, rebel groups deliberately target civilians. This article examines whether such violence is related to the performance of the rebels on the battlefield. It is proposed that rebel groups who are losing battles target civilians in order to impose extra costs on the government. When rebels attack civilians, the government may incur both political and military costs. Violence against civilians is thus used as an alternative conflict strategy aimed at pressuring the government into concessions. The argument is evaluated by using monthly data for rebel groups involved in armed conflict from January 2002 to December 2004.  相似文献   

4.
This study develops a day-to-day theory of political violence that predicts that rebels respond strategically to the onset of interstate conflict that is directly related to a civil war. Government-initiated interstate conflict is theorized to incentivize rebels to signal their resolve, willingness to bear costs, and vulnerability of government forces. In addition, this form of interstate conflict is predicted to decrease violence against civilian populations, as it makes it more likely that rebels will need to rely on civilians for resources in the future. This is contrary to interstate conflict initiated by an external state, as this signal of third-party support makes civilian support more dispensable from the perspective of a rebel movement. Using a country-day data set constructed from event data, evidence is presented that is consistent with this theoretical logic. Interstate conflict, therefore, is shown to play a significant role in explaining the variation of violent events that occur on a day-to-day basis during a civil conflict.  相似文献   

5.
Abstract

Although government use of militias during civil conflict can ultimately undermine state authority, governments still use militias for battlefield assistance. This paper examines the selectivity of government decisions to use militias by disaggregating civil conflict to the level of battle phases. Civil-conflict battles typically consist of four phases: preparation, clear, hold, and build. I argue that governments decide to use militias based on the strength of government security forces, operational advantages of militias, and the type of battle phase. Governments will limit the use of militias during key battle phases that are likely to receive increased media attention unless a victory secured by government security forces is unlikely or militias hold an operational advantage. A comparative analysis of the offensive operations in Tikrit and Ramadi during Iraq’s war against the Islamic State of Iraq and Syria (ISIS) lends initial support to this theory.  相似文献   

6.
Foreign governments frequently intervene in armed conflicts by sponsoring rebels against their adversaries. A sponsorship is less costly than a direct military intervention, but rebels often defy orders, desert fighting, or turn guns against their sponsors. Under what conditions do rebels defect against their sponsors? Drawing on organizational theory, I argue that as rebel organizations become less centralized and formalized, the rebels are likely to defect against their sponsors. This occurs because non-centralized organizations have weak central leadership and allow for dispersed decision-making, both of which narrow the manipulative capacity of sponsors. Due to these disadvantages, non-centralized rebel movements are less accountable to their sponsors, cannot credibly commit to rapidly change their policies in response to changes in the sponsor’s demands, and suffer from frequent and destructive quarrels between the top and lower echelons. Using multilevel logistic models for panel data, I test my argument on a novel dataset. My quantitative analysis shows that rebel structure is a robust predictor of defection.  相似文献   

7.
In this research note, I argue that scholars of the international diffusion of civil conflict would benefit from directly measuring rebel mobilization prior to the onset of civil war. To better understand the way in which international processes facilitate dissidents overcoming the collective action problem inherent in rebellion, I focus on militant organizations and model the timing of their emergence. I use several data sets on militant groups and violent nonstate actors and rely on Buhaug and Gleditsch’s (2008) causal framework to examine how international conditions predict militant group emergence. While Buhaug and Gleditsch conclude that civil war diffusion is primarily a function of internal conflict in neighboring states, once militant group emergence is substituted in the dependent variable, I observe that global conditions affect rebel collective action. A final selection model links militant groups with civil conflict onset and demonstrates the variable performance of diffusion effects. The results indicate that many rebels mobilize in response to more global events and then escalate their behavior in response to local conditions.  相似文献   

8.
Geographic variation in rebels’ use of terrorism is not well understood. This article explains the use of terrorism in civil conflict through examining geographic variation in terrorist attacks across first–level administrative regions. Two explanations are tested using data on 47 groups in 21 countries: that terrorism is intended to punish supporters of counterinsurgency efforts or to destabilize regions of the country that are both outside of rebels’ military reach and have substantial grievances against the regime. Results show that terrorism is most prevalent in national capitals and regions that are more deprived. The findings suggest that rebel groups face multiple incentives for violence beyond zones of direct military confrontation with the government, using both highly visible attacks against the center of power and attacks intended to geographically expand the rebellion. The findings imply maximizing public service provision and minimizing economic inequality may reduce the breadth of rebels’ potential expansion.  相似文献   

9.
How can insurgent groups that are militarily far weaker than the state survive and grow? Influential accounts drawing on Kalyvas' “control-collaboration” model argue that limited state reach can make this possible by allowing rebel groups to carve out pockets of control where they can elicit collaboration. I suggest that this account is inadequate. Even states with limited reach are likely to transfer sufficient forces to rebel-affected areas to establish at least partial control. Weak rebels therefore often face the challenge of building capacity without local control to begin with. I identify two broad factors that can make this feasible: first, strong pre-existing rebel networks, which facilitate collaboration through solidarity, norms of reciprocity, and social incentives; and second, counterinsurgency policies and practices that fail to exploit the opportunities that control offers for incentivizing collaboration and shaping political preferences. These arguments are grounded in a fieldwork-based case study of insurgency processes in a hamlet of Rolpa, Nepal.  相似文献   

10.
Recent scholarship has established several key dynamics in civil wars: since the nineteenth century, rebel victories have increased in likelihood; external support is one of the most significant predictors of rebel victory; and rebel groups have become increasingly likely to receive foreign backing. What is missing is an explanation of why patterns of third-party aid to rebels changed over time. Data on foreign assistance to rebels over the last two centuries reveals the odds of groups receiving aid increased from about one in five to about four in five. The nature of the patron also altered significantly, from great powers, to lesser states, and then nonstate actors. We explain these patterns using three variables: (1) great-power competition; (2) norms of national self-determination; and (3) globalization. This paper explores this theory with a case study of aid to rebel groups in Algeria since the 1830s.  相似文献   

11.
《国际相互影响》2012,38(4):462-481
Disaggregated approaches to conflict research have led to new insights into the patterns and processes of political violence in developing countries. This article uses the most comprehensive subnational political violence data (ACLED) to observe where and when violence against civilians occurs within civil wars. Several new conclusions are evident from an event-based analysis of civilian violence: retribution or collateral damage are poor explanations for attacks on the unarmed. Instead, civilians are targeted because they are accessible; rebel groups kill more civilians, often in an attempt to create new frontlines for conflict. However, governments are also responsible for high rates of civilian death, yet they often “contract” this violence out to militias. This analysis confirms that there are multiple violent groups within civil war spaces, and small opposition groups commit higher levels of violence against civilians in local spaces. The strength of a violent group compared to its competition shapes how much civilian violence it commits. The results suggest that theories that emphasize civilian support and retribution as a basis for violence against civilians have overlooked the importance of how multiple violent opposition groups compete within civil wars, and how civilians suffer as a result.  相似文献   

12.
This article introduces individual-level microdata on victims of violence in Nepal’s civil war (1996–2006). The data being presented in this study are unique in that they are a census—not a sample—of the known population of victims for which information could be collected. The unit of analysis is the individual victim, and the data provide information on: whether the victim was killed, injured, or disappeared; the districts and villages where they were targeted; their permanent home addresses; the circumstances of the attack (combat, extrajudicial, etc.); socioeconomic information; whether they had any affiliation to rebel groups or other political parties; identification of the perpetrator; and whether the victim was considered to be a government or Maoist informant. After describing the data, an application of the data is performed and some preliminary findings are discussed on the differences in targeting behavior between the government and the Maoist rebels.  相似文献   

13.
As part of a recent effort to bridge the studies of terrorism and civil war, new research has begun to emerge on the use of terrorism by rebel groups as a strategy of war. Building on these findings, we examine the role of affiliated political wings in shaping the use of terrorism by rebel groups during civil wars. We contend that the presence of an affiliated political wing during the civil war should increase the use of terrorism by rebel groups only in countries where there are relatively few restrictions on the freedom of the press. As political wings are often designed to engage with the civilian population through the dissemination of information, these apparatuses are in a key position to frame the use of terrorism as part of the rebel’s broader war effort. To test this proposition, we examine the use of terrorism by all rebel groups from 1970 to 2011. The results from the analysis provide strong support for our argument that political wings increase the use of terrorism by rebel groups only when the press is allowed to independently cover terrorist attacks.  相似文献   

14.
《Orbis》2022,66(3):373-390
This article examines the United Arab Emirates’ (UAE’s) involvement in proxy warfare in the Middle East and the Horn of Africa. The UAE’s security posture in these volatile regions has evolved remarkably over the last two decades and set the Emirates apart from many of its rivals, peers, and neighbors, such as Qatar, Saudi Arabia, and Turkey. Most countries have intervened in conflicts in order to affect politics in the center, either by backing pro-government militias or center-seeking rebel groups. The UAE, in contrast, has constructed a portfolio of proxy relationships mostly with separatist groups. Such groups operate in far flung peripheral territories of countries like Yemen, Iraq, Syria, and Somalia. They do not seek to seize the state, but to break away from it. This approach to proxy warfare has granted the UAE unique negative control at relatively little cost. Through its proxy networks, the UAE can impede adversaries from consolidating control across the Indian Ocean littoral and maintain influence in the key maritime passages to Europe and Asia.  相似文献   

15.
Kristine Eck 《安全研究》2014,23(2):364-398
Previous research on rebel recruitment has focused on the economic and social incentives groups used as enticements but has overlooked the question of why many armed groups recruit using coercion. The puzzle is why coercion occurs despite its alienating civilian populations and being costly in terms of organizational and military effectiveness. I suggest that recruitment is a dynamic process and that groups are likely to shift recruitment strategies depending on the exigencies of the conflict. In particular, the exposure of the group to military and economic shocks accompanied by shortened time horizons should lead to increasingly coercive recruitment. Whether forced recruitment is a durable solution for a group in the long run is likely to be contingent upon the group's ability to induce a high level of compliance from the individual at a low cost. Further, in order to circumvent costs vis-à-vis the civilian population, the group must be able to restrict defection to the government and the out-migration of the civilian population. Three narratives from Nepal, Ethiopia, and Sierra Leone are provided both to illustrate the arguments and to probe the scope conditions. The article concludes that understanding why and when rebel groups use forced recruitment has vital security implications for the countries in which armed conflict takes place.  相似文献   

16.
In some ethno-separatist wars, rebel groups direct a large share of violence against members of their own ethnic community. But why do rebels target the co-ethnics they claim to represent in the war against the government? Our aim in this paper is to provide the components for a conceptual framework that we assess using unique disaggregated casualty data on violence committed by the Liberation Tigers of Tamil Eelam against co-ethnic Tamils in territories claimed for the Tamil Eelam state in the early phase of the Sri Lankan conflict, 1985–88. We propose that there are two distinct processes of intraethnic violence: violence against co-ethnic civilians and violence against co-ethnic rivals. While the former aims at controlling the population to win the war against the government, the latter aims at establishing leadership dominance over the ethnic minority. We examine the role of ethnic homogeneity in shaping the use of violence directed against the two types of co-ethnic targets in the buildup phase of ethno-separatist war. We conclude that ethnic demographic structures matter for how the rebels treat co-ethnics in the early phase of war before they have established territorial control.  相似文献   

17.
ABSTRACT

Drawing on Rapoport’s four waves thesis, this study asks whether the emergence of terrorist semi-states (TSS) in the 21st-century MENA region and Pakistan mean that we are seeing the beginning of a new (fifth) wave. We define a TSS as a rebel group that a) has control over portions of a weak state’s territory, maintaining governance there; b) but still launches terrorist attacks against third-party states. To be considered a fifth wave, the new terrorism phenomenon at hand must both fit Rapoport’s criteria of a wave (be global, have the same driving force) and also be significantly different from the prior wave. Clearly, the TSSs are different from the religious terror groups of the fourth wave in key respects: they prioritize territorial control, they engage in a much wider array of governance activities (not just social services), most of their victims have been members of the same religion—namely, Muslims (which suggests that they are driven more by the pursuit of power than by Jihad); and finally, their behavior (though not their statements) shows they have a local rather than a universal agenda. The main counter-argument is that TSSs are all Islamic and have so far not been exported globally.  相似文献   

18.
《国际相互影响》2012,38(2):164-181
Previous research has indicated that democracy decreases the risk of armed conflict, while increasing the likelihood of terrorist attacks, but we know little about the effect of democracy on violence against civilians in ongoing civil conflicts. This study seeks to fill this empirical gap in the research on democracy and political violence, by examining all rebel groups involved in an armed conflict 1989–2004. Using different measures of democracy, the results demonstrate that rebels target more civilians when facing a democratic (or semi-democratic) government. Democracies are perceived as particularly vulnerable to attacks on the population, since civilians can hold the government accountable for failures to provide security, and this provides incentives for rebels to target civilians. At the same time, the openness of democratic societies provides opportunities for carrying out violent attacks. Thus, the strength of democracy—its accountability and openness—can become an Achilles heel during an internal armed conflict.  相似文献   

19.
Armed nonstate conflict without the direct involvement of the state government is a common phenomenon. Violence between armed gangs, rebel groups, or communal militias is an important source of instability and has gained increasing scholarly attention. In this article, we introduce a data collection on conflict issues and key actor characteristics in armed nonstate conflicts that provides new opportunities for investigating the causes, dynamics, and consequences of this form of organized violence. The data builds on and extends the Uppsala Conflict Data Program Non-State Conflict data set by introducing additional information on what the actors in the conflict are fighting over, alongside actor characteristics. It covers Africa during the time period 1989–2011. The data set distinguishes between two main categories of issues, territory and authority, in addition to a residual category of other issues. Furthermore, we specify sub-issues within these categories, such as agricultural land/water as sub-issue for territory and religious issues for other issues. As actor characteristics, the data set notes whether warring parties received military support by external actors and whether religion and the mode of livelihood were salient in the mobilization of the armed group. The article presents coding processes, key features of the data set, and point to avenues for new research based on these data.  相似文献   

20.
ABSTRACT

After winning the 2006 Palestinian Legislative Council (PLC) elections and subsequently taking control of the Gaza Strip in the summer of 2007, the Palestinian Hamas – a hybrid political, social and military actor – undertook a complex process to ascertain authority and control over Gaza. The article focuses on understanding Hamas’s performance as a political party and a “rebel government” as well as the impact of this newly acquired role on the group’s strategy. Relying on primary sources, field-work and interviews with members of the Hamas government and its security sector, the study looks at Hamas’s role as a security provider and analyses the complex relationship between the institutionalized security sector and the group’s insurgent armed wing. Examining Hamas’s logic as a security provider and exploring the inherent tensions between political and insurgent logics allows for a better understanding of both the rebel group’s role as a political actor and the broader challenges behind the successful rebel-to-political transformations of non-state armed organizations. In doing so it contributes to the emerging literature on non-state actors’ shifts between ballots and bullets and on their potential role as alternative governance providers.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号