Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
2014 | 2 | nr 2 Security Management | 39--47
Tytuł artykułu

Selected Problems Related to Managing Terrorist Organisation

Treść / Zawartość
Warianty tytułu
Języki publikacji
The unique aims of the terrorist organisations fail to work as a protection against problems that are typical for other types of activity and those connected with managing the ongoing activity. As in financial organisations, leaders of the terrorist groups face the challenges of recruiting properly qualified members and motivating them, they seek efficient ways to control the actions of their subordinates or try to reduce internal bureaucracy. The article aims at pointing out some of the most typical of the aforesaid problems relating to organisation management. (original abstract)
Opis fizyczny
  • Academy of Business in Dąbrowa Górnicza, Poland
  • 1. Abu-Amr, Z. (1994), Islamic fundamentalism in the West Bank and Gaza: Muslim brotherhood and Islamic Jihad. Indiana University Press, Bloomington.
  • 2. Adamczuk, M. (2012), Rola dzieci w strategii działania islamskich organizacji terrorystycznych, Bezpieczeństwo Narodowe 2012, No. 1, pp. 103-121.
  • 3. Baccara, M., Bar-Isaac, H. (2006), How to organize crime. Working paper. New York University, New York.
  • 4. Bowyer Bell, J. (1990), Revolutionary dynamics: The inherent inefficiency of the underground. Terrorism and Political Violence, Vol. 2, pp. 193-211.
  • 5. Chen, H., Chung, W., Qin, J., Reid, E., Sageman, M., Weimann, G. (2008), Uncovering the dark web: A case study of Jihad on the web. Journal of the American Society for Information Science and Technology, Vol. 59 No. 8, pp. 1347-1359.
  • 6. Della Porta, D. (1995), Social movements, political violence, and the State: A comparative analysis of Italy and Germany. Cambridge University Press, New York.
  • 7. Felter, J.H., Fishman, B. (2007), Al-Qa'ida's foreign fighters in Iraq: A first look at the Sinjar records. Combating Terrorism Center, West Point.
  • 8. Fishman, B. (Ed.) (2008), Sinjar two: al-Qa'ida in Iraq's foreign recruiting, finances, and future. Combating Terrorism Center, West Point.
  • 9. ICG (2003), Jemaah Islamiyah in South East Asia: Damaged but still dangerous. International Crisis Group Asia Report No. 63.
  • 10. Kristiansen, W. (1999), Challenge and counterchallenge: Hamas's response to Oslo. Journal of Palestine Studies, Vol. 3, pp. 19-36.
  • 11. Mishal, S. (2002), How Hamas Thinks, in: Ginat, J., Perkins, E.J., Corr, E.G (Eds.), The Middle East peace process: Vision versus reality. University of Oklahoma Press, Norman, O.K., pp. 91-103.
  • 12. Qin, J., Xu, J.J., Hu, D., Sageman, M., Chen, H. (2005), Analyzing terrorist networks: A case study of the global Salafi Jihad network. Intelligence and Security Informatics: Lecture Notes in Computer Science, Vol. 3495, pp. 287-304.
  • 13. Sageman, M. (2005), Leaderless Jihad: Terror networks in the twenty-first century. Intelligence and Security Informatics, Vol. 3495, pp. 287-304.
  • 14. Sageman, M. (2004), Understanding terror network. University of Pennsylvania Press.
  • 15. Shapiro, J.N. (2013a), Models of terrorist organisation, available at: (accessed 14 May 2014).
  • 16. Shapiro, J.N. (2013b), The business habits of highly effective terrorists. Why terror masterminds rely on micro-management, Foreign Affairs, 14 August, available at: (accessed 14 May 2014).
  • 17. Shapiro, J.N. (2008), Bureaucracy and control in terrorist organisations, available at: (accessed 14 May 2014).
  • 18. Shapiro, J.N. (2007a), Terrorist organisations' vulnerabilities and inefficiencies: A rational choice perspective. Stanford University Press, Stanford.
  • 19. Shapiro, J.N. (2007b), The greedy terrorist: A rational choice perspective on terrorist organisations' inefficiencies and vulnerabilities, in: Trinkunas, H., Giraldo, J.K. (Eds.), Terrorist financing in comparative perspective, Stanford University Press, Stanford, C.A.
  • 20. Shapiro, J.N. (2007c), The terrorist's challenge: Security, efficiency, control. Stanford University Press, Stanford, C.A.
  • 21. Shapiro, J.N. (2005), Organizing terror: Hierarchy and networks in covert organisations, available at: organizing Terror.pdf (accessed 14 May 2014).
  • 22. Siqueira, K., Sandler, T., (2006), Terrorists versus the Government: Strategic interaction, support, and sponsorship. Journal of Conflict Resolution, Vol. 50 No. 6, pp. 878-898.
  • 23. Twomey, S. (1977), Staff report. Technical report, Irish Republican Army.
Typ dokumentu
Identyfikator YADDA

Zgłoszenie zostało wysłane

Zgłoszenie zostało wysłane

Musisz być zalogowany aby pisać komentarze.
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.