Corpus ID: 114649826
Arc of Convergence: AQAP, Ansar al-Shari’a and the Struggle for Yemen
Chris Swift
Published 2012
Engineering
T he may 21, 2012, suicide attack on Yemeni soldiers parading in Sana`a’s al-Sabin Square marked a turning point in Yemen’s struggle against al-Qa`ida in the Arabian Peninsula (AQAP) and its… Expand
Ctc.Usma.Edu
Share This Paper




13 Citations
Highly Influential Citations
1
Background Citations
2
13 Citations
The franchising effect on the Al-Qaeda enterprise and related transnational terror groups: Patterns of evolution of Al-Qaeda affiliates in the 21st century
Nicholas Law
Political Science
2016
THE FRANCHISING EFFECT ON THE AL-QAEDA ENTERPRISE AND RELATED TRANSNATIONAL TERROR GROUPS: PATTERNS OF EVOLUTION OF AL-QAEDA AFFILIATES IN THE 21 CENTURY Nicholas Benjamin Law Old Dominion… Expand
Elements of ‘armed non-state actors’ power: The case of al-Qaeda in Yemen
M. Eleftheriadou
Political Science
2014
Over the past few years there is an apparent re-regionalization of al-Qaeda activity, intensified by the ongoing Middle East turmoil. Its main characteristic is a trend towards the abandonment of… Expand
Islamic State in Yemen – A Rival to al-Qaeda?
Maria-Louise Clausen
Political Science
2017
The Yemeni state has all but collapsed as the political transition that followed the popular protests in 2011 has been derailed. This has left Yemen without a functioning central government and thus… Expand
4 Citations
PDF
The Role of Muslim Brothers, Salafis, and Jihadis
M. Almeida, L. Bonnefoy
Political Science
2020
This chapter assesses multiple interactions between the various trends of Sunni Islamism in Yemen and the regional and international sphere, with an emphasis on the period since the Yemen war began… Expand
How terrorism ends : understanding the outcomes of violent political contestation
S. Marsden
Political Science
2013
Existing scholarship suggests terrorism is an ineffective method of political contestation: groups rarely achieve their political objectives and are often disrupted by the security services. These… Expand
1 Citation
What are the roles of the Internet in terrorism? Measuring online behaviours of convicted UK terrorists
P. Gill, E. Corner, A. Thornton, M. Conway
Psychology
2015
Using a unique dataset of 227 convicted UK-based terrorists, this report fills a large gap in the existing literature. Using descriptive statistics, we first outline the degree to which various… Expand
18 Citations
Over Pressure : Grassroots-Driven Transformation of ( Militant ) Organizations
M. Foster
Political Science
2018
Why might it not be beneficial for an organization take advantage of an upswell of potential recruits who can increase group strength and resilience? I argue that when resource constrained… Expand
We need to talk about silence: Re-examining silence in International Relations theory
Sophia Dingli
Sociology
2015
The critique of silence in International Relations theory has been long-standing and sustained. However, despite the lasting popularity of the term, little effort has been made to unpack the… Expand
30 Citations
PDF
A congruence analysis of the inequality–conflict nexus: Evidence from 16 cases
Henrikas Bartusevičius
Political Science
2019
The relationship between inequality and civil conflict has attracted considerable interest in conflict research. Recent large-N studies have shown that inequalities significantly contribute to the… Expand
LA CAMPAÑA DE ATAQUES CON DRONES EN YEMEN
J. Jordán
Geography
2013
Since 2009, the United States is carrying out a campaign of air strikesagainst al Qaeda in the Arabian Peninsula, with an increasing use of unmannedcombat aerial vehicles. This paper analyzes the… Expand
...
1
2
...
References
SHOWING 1-10 OF 12 REFERENCES
A U.S. drone killed at least five militants in North Waziristan Agency of the Federally Administered Tribal Areas
A U.S. drone killed at least four suspected militants in North Waziristan Agency of the Federally Administered Tribal Areas
A U.S. drone killed eight militants in North Waziristan Agency of the Federally Administered Tribal Areas
A U.S. drone targeted a building in North Waziristan Agency of the Federally Administered Tribal Areas, killing four suspected militants
A delivery truck packed with explosives killed at least 13 people in the mainly Shi`a Shula district of Baghdad
A suicide bomber in a vehicle attacked a checkpoint in Kandahar Province, killing at least five policemen
Al-Qa`ida in the Islamic Maghreb seized a key arms depot in Gao, located in northern Mali. The underground weapons and ammunition facility is considered one of the Malian army's "main depots
Al-Shabab militants ambushed the convoy of Somali President Shaykh Sharif Shaykh Ahmad on the road between Afgoye and Mogadishu. The president was able to return to Mogadishu safely
Both men drove up to the building while firing weapons, and then one of the militants detonated a suicide bomb
NATO forces killed al-Qa`ida's second-incommand for Afghanistan, Sakhr al-Taifi, in Kunar Province
...
1
2
...
SORT BY
Related Papers
Internet usage, user satisfaction, task-technology fit, and performance impact among public sector employees in Yemen
Osama Isaac, Zaini Abdullah, T. Ramayah, A. M. Mutahar
Engineering
2017
The internet technology becomes an essential tool for individuals, organizations, and nations for growth and prosperity....
66 Citations
The Mechanical Properties and Fabric Handle of Polyester-fibre ‘Shingosen’ Fabrics
M. Matsudaira
Engineering
1994
Features of the mechanical properties and fabric handle of polyester-fibre ‘Shingosen’ fabrics are studied precisely by ...
19 Citations
Show More
2/10
Abstract
13 Citations
12 References
Related Papers
Stay Connected With Semantic Scholar
What Is Semantic Scholar?
Semantic Scholar is a free, AI-powered research tool for scientific literature, based at the Allen Institute for AI.
Learn More
About
About Us
Publishers
Beta Program
Contact
Research
Team
Datasets
Open Corpus
Supp.ai
Resources
Librarians
Tutorials
FAQ
API
Proudly built by AI2
Terms of ServicePrivacy Policy
By clicking accept or continuing to use the site, you agree to the terms outlined in our Privacy Policy, Terms of Service, and Dataset License
ACCEPT & CONTINUE