Motivations and Tactics of Militant Islamist Movements
DOI:
https://doi.org/10.61841/hw76an19Keywords:
Politicalviolence¸, Islamist Movements, TerrorismAbstract
Radical Islamist terrorism is defined as any terrorist act, set of acts, or campaign committed by groups or individuals who profess Islamist motivations or goals. Islamism is a concept whose meaning has been debated in both public and academic contexts. The term can refer to movements that call for the full implementation of sharia. It is commonly used interchangeably with the terms political Islam or Islamic fundamentalism. In Western media, usage of the term tends to refer to groups who aim to establish a sharia-basedIslamicstate, often with the implication of violent tactics and human rights violations, and has acquired connotations of political extremism.
This term used to describe an Islamic political or social activist. Coined in preference to the more common term “Islamic fundamentalist.” Most belong to Islamic organizations or social movements.
Islamismtakes different forms and spans a wide range of strategies and tactics towards the powers in place—"destruction, opposition, collaboration, indifference" that have varied as circumstances have changed, and thus is not a united movement.
Downloads
References
Global Terrorism Index Report 2015". Institute for Economics& Peace. November 2015. p. 10. RetrievedOctober 5, 2016.
[2] Jackson, Richard (2007). "ConstructingEnemies: 'IslamicTerrorism' in Political, academicDiscourse
[3] Roy, Olivier (1994). The Failure of Political Islam.
[4] Roy, Olivier (1994). The Failure of Political Islam. p. 109.
[5] Daniel Benjamin; Steven Simon (2002). The Age of Sacred Terror. Random House. p. 40.
[6] Daniel Benjamin; Steven Simon (2002). The Age of Sacred Terror. Random House. p. 40 [cross ref].
[7] Holbrook, Donald (2010). "Using the Qur'an to Justify Terrorist Violence." Perspectives on Terrorism. Terrorism Research Initiative and Centre for the Study of Terrorism and Political Violence.
[8] Burke, Jason (October 23, 2010). "Talking to the Enemy by Scott Atran – [book] review." The Observer. Retrieved October 19, 2014.
[9] David C. Rapoport, ―Comparing Militant Fundamentalist Groups,‖ in Marty & Appleby, eds.,
Fundamentalisms and the State (Chicago: University of Chicago Press, 1993), pp. 430-431
[10] Rees, John (January 7, 2015). "What you need to know about terrorism and its causes: a graphicaccount.
[11] Atran, Scott. "The Moral Logic and Growth of Suicide Terrorism (figure 1, pg. 128).
[12] Thomas (June 24, 2001). "Anatomy of a Hijack." Time. Paris: AOL Time Warner.
[13] Shay, Shaul (December 2013). Global Jihad and the Tacticof Terror Abduction.
[14] Elaine Sciolino. "Out of Sight… Giving Terror the Silent Treatment." The New York Times. February 23, 1997.
[15] Le Monde, December 22, 2004. This episode is discussed more thoroughly in Oliver Guitta. "The Chirac Doctrine." Middle East Quarterly. Autumn 2005.
[16] Thomas, Andrea (September 24, 2014). "Germany Confirms Kidnapping of Two Citizens by Islamist Group in the Philippines." Wall Street Journal. Retrieved October 7, 2014.
[17] Willsher, Kim (September 23, 2014). "Algerian Islamists threaten to execute hostage unless France halts Isis attacks." The Guardian. Retrieved August 4, 2016.
[18] Callimachi, Rukmini Maria (July 29, 2014). "Paying Ransoms, Europe Bankrolls Qaeda Terror." New York Times. Retrieved September 4, 2014.
[19] Caulderwood, Kathleen (May 16, 2014). "Fake Charities, Drug Cartels, Ransom and Extortion: Where Islamist Group Boko Haram Gets Its Cash." International Business Times.
[20] Malas, Nour (August 22, 2014). "Hostage-Taking Central to Islamic State Strategy in Syria." Wall Street Journal.
[21] Abdelaziz, Salma (October 13, 2014). "ISIS states its justification for the enslavement of women." CNN.
[22] Jenkins, Brian. "Is Al Qaeda's Internet Strategy Working?". RetrievedApril 5, 2012.
[23] Mark Thompson. "Peter Kassig Bravely Said Nothing Before His Execution." TIME.com.
[24] Joe Lieberman, Would-Be Censor". The New York Times. May 25, 2008. Retrieved April 5, 2012.
Additional Files
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.