Leaderless Jihad : : Terror Networks in the Twenty-First Century / / Marc Sageman.
In the post-September 11 world, Al Qaeda is no longer the central organizing force that aids or authorizes terrorist attacks or recruits terrorists. It is now more a source of inspiration for terrorist acts carried out by independent local groups that have branded themselves with the Al Qaeda name....
Saved in:
Superior document: | Title is part of eBook package: De Gruyter Penn Press eBook Package Complete Collection |
---|---|
VerfasserIn: | |
Place / Publishing House: | Philadelphia : : University of Pennsylvania Press, , [2011] ©2008 |
Year of Publication: | 2011 |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (208 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9780812206784 |
---|---|
ctrlnum |
(DE-B1597)449466 (OCoLC)794702342 |
collection |
bib_alma |
record_format |
marc |
spelling |
Sageman, Marc, author. aut http://id.loc.gov/vocabulary/relators/aut Leaderless Jihad : Terror Networks in the Twenty-First Century / Marc Sageman. Philadelphia : University of Pennsylvania Press, [2011] ©2008 1 online resource (208 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Frontmatter -- CONTENTS -- PREFACE -- INTRODUCTION. Understanding the Path to Radicalism -- ONE. How to Study Terrorism in the Twenty-First Century -- TWO. The Globalization of Jihadi Terror -- THREE. The Jihadist's Profile -- FOUR. Radicalization in the Diaspora -- FIVE. The Atlantic Divide -- SIX. Terrorism in the Age of the Internet -- SEVEN. The Rise of Leaderless Jihad -- EIGHT. Combating Global Islamist Terrorism -- NOTES -- BIBLIOGRAPHY -- INDEX -- ACKNOWLEDGMENTS restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star In the post-September 11 world, Al Qaeda is no longer the central organizing force that aids or authorizes terrorist attacks or recruits terrorists. It is now more a source of inspiration for terrorist acts carried out by independent local groups that have branded themselves with the Al Qaeda name. Building on his previous groundbreaking work on the Al Qaeda network, forensic psychiatrist Marc Sageman has greatly expanded his research to explain how Islamic terrorism emerges and operates in the twenty-first century.In Leaderless Jihad, Sageman rejects the views that place responsibility for terrorism on society or a flawed, predisposed individual. Instead, he argues, the individual, outside influence, and group dynamics come together in a four-step process through which Muslim youth become radicalized. First, traumatic events either experienced personally or learned about indirectly spark moral outrage. Individuals interpret this outrage through a specific ideology, more felt and understood than based on doctrine. Usually in a chat room or other Internet-based venues, adherents share this moral outrage, which resonates with the personal experiences of others. The outrage is acted on by a group, either online or offline.Leaderless Jihad offers a ray of hope. Drawing on historical analogies, Sageman argues that the zeal of jihadism is self-terminating; eventually its followers will turn away from violence as a means of expressing their discontent. The book concludes with Sageman's recommendations for the application of his research to counterterrorism law enforcement efforts. Issued also in print. Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 24. Apr 2022) Jihad. Terrorism. Terrorists -- Social networks. Middle Eastern. POLITICAL SCIENCE / Security (National & International). bisacsh African Studies. Asian Studies. Middle Eastern Studies. Political Science. Public Policy. Title is part of eBook package: De Gruyter Penn Press eBook Package Complete Collection 9783110413458 Title is part of eBook package: De Gruyter Penn Press eBook Package Law & Political Science 9783110413526 Title is part of eBook package: De Gruyter University of Pennsylvania Backlist eBook-Package 2000-2013 9783110459548 print 9780812240658 https://doi.org/10.9783/9780812206784 https://www.degruyter.com/isbn/9780812206784 Cover https://www.degruyter.com/document/cover/isbn/9780812206784/original |
language |
English |
format |
eBook |
author |
Sageman, Marc, Sageman, Marc, |
spellingShingle |
Sageman, Marc, Sageman, Marc, Leaderless Jihad : Terror Networks in the Twenty-First Century / Frontmatter -- CONTENTS -- PREFACE -- INTRODUCTION. Understanding the Path to Radicalism -- ONE. How to Study Terrorism in the Twenty-First Century -- TWO. The Globalization of Jihadi Terror -- THREE. The Jihadist's Profile -- FOUR. Radicalization in the Diaspora -- FIVE. The Atlantic Divide -- SIX. Terrorism in the Age of the Internet -- SEVEN. The Rise of Leaderless Jihad -- EIGHT. Combating Global Islamist Terrorism -- NOTES -- BIBLIOGRAPHY -- INDEX -- ACKNOWLEDGMENTS |
author_facet |
Sageman, Marc, Sageman, Marc, |
author_variant |
m s ms m s ms |
author_role |
VerfasserIn VerfasserIn |
author_sort |
Sageman, Marc, |
title |
Leaderless Jihad : Terror Networks in the Twenty-First Century / |
title_sub |
Terror Networks in the Twenty-First Century / |
title_full |
Leaderless Jihad : Terror Networks in the Twenty-First Century / Marc Sageman. |
title_fullStr |
Leaderless Jihad : Terror Networks in the Twenty-First Century / Marc Sageman. |
title_full_unstemmed |
Leaderless Jihad : Terror Networks in the Twenty-First Century / Marc Sageman. |
title_auth |
Leaderless Jihad : Terror Networks in the Twenty-First Century / |
title_alt |
Frontmatter -- CONTENTS -- PREFACE -- INTRODUCTION. Understanding the Path to Radicalism -- ONE. How to Study Terrorism in the Twenty-First Century -- TWO. The Globalization of Jihadi Terror -- THREE. The Jihadist's Profile -- FOUR. Radicalization in the Diaspora -- FIVE. The Atlantic Divide -- SIX. Terrorism in the Age of the Internet -- SEVEN. The Rise of Leaderless Jihad -- EIGHT. Combating Global Islamist Terrorism -- NOTES -- BIBLIOGRAPHY -- INDEX -- ACKNOWLEDGMENTS |
title_new |
Leaderless Jihad : |
title_sort |
leaderless jihad : terror networks in the twenty-first century / |
publisher |
University of Pennsylvania Press, |
publishDate |
2011 |
physical |
1 online resource (208 p.) Issued also in print. |
contents |
Frontmatter -- CONTENTS -- PREFACE -- INTRODUCTION. Understanding the Path to Radicalism -- ONE. How to Study Terrorism in the Twenty-First Century -- TWO. The Globalization of Jihadi Terror -- THREE. The Jihadist's Profile -- FOUR. Radicalization in the Diaspora -- FIVE. The Atlantic Divide -- SIX. Terrorism in the Age of the Internet -- SEVEN. The Rise of Leaderless Jihad -- EIGHT. Combating Global Islamist Terrorism -- NOTES -- BIBLIOGRAPHY -- INDEX -- ACKNOWLEDGMENTS |
isbn |
9780812206784 9783110413458 9783110413526 9783110459548 9780812240658 |
callnumber-first |
H - Social Science |
callnumber-subject |
HV - Social Pathology, Criminology |
callnumber-label |
HV6431 ǂB |
callnumber-sort |
HV 46431 _B S227 42008EB |
url |
https://doi.org/10.9783/9780812206784 https://www.degruyter.com/isbn/9780812206784 https://www.degruyter.com/document/cover/isbn/9780812206784/original |
illustrated |
Not Illustrated |
dewey-hundreds |
300 - Social sciences |
dewey-tens |
360 - Social problems & social services |
dewey-ones |
363 - Other social problems & services |
dewey-full |
363.325 |
dewey-sort |
3363.325 |
dewey-raw |
363.325 |
dewey-search |
363.325 |
doi_str_mv |
10.9783/9780812206784 |
oclc_num |
794702342 |
work_keys_str_mv |
AT sagemanmarc leaderlessjihadterrornetworksinthetwentyfirstcentury |
status_str |
n |
ids_txt_mv |
(DE-B1597)449466 (OCoLC)794702342 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Title is part of eBook package: De Gruyter Penn Press eBook Package Complete Collection Title is part of eBook package: De Gruyter Penn Press eBook Package Law & Political Science Title is part of eBook package: De Gruyter University of Pennsylvania Backlist eBook-Package 2000-2013 |
is_hierarchy_title |
Leaderless Jihad : Terror Networks in the Twenty-First Century / |
container_title |
Title is part of eBook package: De Gruyter Penn Press eBook Package Complete Collection |
_version_ |
1806143363083141120 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05287nam a22008535i 4500</leader><controlfield tag="001">9780812206784</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20220424125308.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">220424t20112008pau fo d z eng d</controlfield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)979756585</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780812206784</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.9783/9780812206784</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)449466</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)794702342</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">pau</subfield><subfield code="c">US-PA</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6431 ǂb .S227 2008eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL012000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">363.325</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sageman, Marc, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Leaderless Jihad :</subfield><subfield code="b">Terror Networks in the Twenty-First Century /</subfield><subfield code="c">Marc Sageman.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Philadelphia : </subfield><subfield code="b">University of Pennsylvania Press, </subfield><subfield code="c">[2011]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (208 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">CONTENTS -- </subfield><subfield code="t">PREFACE -- </subfield><subfield code="t">INTRODUCTION. Understanding the Path to Radicalism -- </subfield><subfield code="t">ONE. How to Study Terrorism in the Twenty-First Century -- </subfield><subfield code="t">TWO. The Globalization of Jihadi Terror -- </subfield><subfield code="t">THREE. The Jihadist's Profile -- </subfield><subfield code="t">FOUR. Radicalization in the Diaspora -- </subfield><subfield code="t">FIVE. The Atlantic Divide -- </subfield><subfield code="t">SIX. Terrorism in the Age of the Internet -- </subfield><subfield code="t">SEVEN. The Rise of Leaderless Jihad -- </subfield><subfield code="t">EIGHT. Combating Global Islamist Terrorism -- </subfield><subfield code="t">NOTES -- </subfield><subfield code="t">BIBLIOGRAPHY -- </subfield><subfield code="t">INDEX -- </subfield><subfield code="t">ACKNOWLEDGMENTS</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In the post-September 11 world, Al Qaeda is no longer the central organizing force that aids or authorizes terrorist attacks or recruits terrorists. It is now more a source of inspiration for terrorist acts carried out by independent local groups that have branded themselves with the Al Qaeda name. Building on his previous groundbreaking work on the Al Qaeda network, forensic psychiatrist Marc Sageman has greatly expanded his research to explain how Islamic terrorism emerges and operates in the twenty-first century.In Leaderless Jihad, Sageman rejects the views that place responsibility for terrorism on society or a flawed, predisposed individual. Instead, he argues, the individual, outside influence, and group dynamics come together in a four-step process through which Muslim youth become radicalized. First, traumatic events either experienced personally or learned about indirectly spark moral outrage. Individuals interpret this outrage through a specific ideology, more felt and understood than based on doctrine. Usually in a chat room or other Internet-based venues, adherents share this moral outrage, which resonates with the personal experiences of others. The outrage is acted on by a group, either online or offline.Leaderless Jihad offers a ray of hope. Drawing on historical analogies, Sageman argues that the zeal of jihadism is self-terminating; eventually its followers will turn away from violence as a means of expressing their discontent. The book concludes with Sageman's recommendations for the application of his research to counterterrorism law enforcement efforts.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 24. Apr 2022)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Jihad.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorists -- Social networks.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Middle Eastern.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Security (National & International).</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">African Studies.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Asian Studies.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Middle Eastern Studies.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Political Science.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Public Policy.</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Penn Press eBook Package Complete Collection</subfield><subfield code="z">9783110413458</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Penn Press eBook Package Law & Political Science</subfield><subfield code="z">9783110413526</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">University of Pennsylvania Backlist eBook-Package 2000-2013</subfield><subfield code="z">9783110459548</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9780812240658</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.9783/9780812206784</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9780812206784</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9780812206784/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-041345-8 Penn Press eBook Package Complete Collection</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-041352-6 Penn Press eBook Package Law & Political Science</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-045954-8 University of Pennsylvania Backlist eBook-Package 2000-2013</subfield><subfield code="c">2000</subfield><subfield code="d">2013</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield></record></collection> |