{"title":"“We Have Captured Your Women”: Explaining Jihadist Norm Change","authors":"Aisha Ahmad","doi":"10.1162/isec_a_00350","DOIUrl":null,"url":null,"abstract":"Abstract In recent years, jihadists across the world have transformed their gendered violence, shocking the world by breaking from prior taboos and even celebrating abuses that they had previously prohibited. This behavior is surprising because jihadists represent a class of insurgents that are deeply bound by rules and norms. For jihadists, deviating from established Islamist doctrines is no easy feat. What then explains these sudden transformations in the rules and norms governing jihadist violence? An inductive investigation of contemporary jihadist violence in Pakistan and Nigeria reveals a new theory of jihadist normative evolution. Data from these cases show that dramatic changes in jihadist violence occur when an external trigger creates an expanded political space for jihadist entrepreneurs to do away with normative constraints on socially prohibited types of violence. As these jihadist leaders capitalize on the triggers, they are able to encourage a re-socialization process within their ranks, resulting in the erosion of previously held taboos, the adoption of proscribed behaviors, and the emergence of toxic new norms.","PeriodicalId":48667,"journal":{"name":"International Security","volume":"80 1","pages":"80-116"},"PeriodicalIF":4.8000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Security","FirstCategoryId":"90","ListUrlMain":"https://doi.org/10.1162/isec_a_00350","RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"INTERNATIONAL RELATIONS","Score":null,"Total":0}
引用次数: 5
Abstract
Abstract In recent years, jihadists across the world have transformed their gendered violence, shocking the world by breaking from prior taboos and even celebrating abuses that they had previously prohibited. This behavior is surprising because jihadists represent a class of insurgents that are deeply bound by rules and norms. For jihadists, deviating from established Islamist doctrines is no easy feat. What then explains these sudden transformations in the rules and norms governing jihadist violence? An inductive investigation of contemporary jihadist violence in Pakistan and Nigeria reveals a new theory of jihadist normative evolution. Data from these cases show that dramatic changes in jihadist violence occur when an external trigger creates an expanded political space for jihadist entrepreneurs to do away with normative constraints on socially prohibited types of violence. As these jihadist leaders capitalize on the triggers, they are able to encourage a re-socialization process within their ranks, resulting in the erosion of previously held taboos, the adoption of proscribed behaviors, and the emergence of toxic new norms.
期刊介绍:
International Security publishes lucid, well-documented essays on the full range of contemporary security issues. Its articles address traditional topics of war and peace, as well as more recent dimensions of security, including environmental, demographic, and humanitarian issues, transnational networks, and emerging technologies.
International Security has defined the debate on US national security policy and set the agenda for scholarship on international security affairs for more than forty years. The journal values scholarship that challenges the conventional wisdom, examines policy, engages theory, illuminates history, and discovers new trends.
Readers of IS discover new developments in:
The causes and prevention of war
U.S.-China relations
Great power politics
Ethnic conflict and intra-state war
Terrorism and insurgency
Regional security in Africa, Asia, Europe, and Latin America
U.S. foreign and defense policy
International relations theory
Diplomatic and military history
Cybersecurity and defense technology
Political economy, business, and security
Nuclear proliferation.