Female violence in terror attacks: a phenomenological analysis based on evidence from the "Intifada of the Individuals"

This research focuses on violence by females who were involved in terror attacks in Israel during the Intifada of the Individuals between September 2015 and October 2016. Videos of encounters during this conflict present a sample of females perpetrating terror attacks, responding as armed security p...

Full description

Saved in:  
Bibliographic Details
Authors: Ben-Shalom, Uzi (Author) ; Mash, Roni (Author) ; Dvir, Amit (Author) ; Leṿin, Eyal 1959- (Author)
Format: Electronic Article
Language:English
Published: 2023
In: Crime, law and social change
Year: 2023, Volume: 80, Issue: 2, Pages: 173-194
Online Access: Volltext (lizenzpflichtig)
Journals Online & Print:
Drawer...
Check availability: HBZ Gateway
Keywords:

MARC

LEADER 00000caa a22000002 4500
001 1854342959
003 DE-627
005 20230811134841.0
007 cr uuu---uuuuu
008 230804s2023 xx |||||o 00| ||eng c
024 7 |a 10.1007/s10611-023-10076-z  |2 doi 
035 |a (DE-627)1854342959 
035 |a (DE-599)KXP1854342959 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Ben-Shalom, Uzi  |e VerfasserIn  |0 (DE-588)1211590240  |0 (DE-627)1700126709  |4 aut 
109 |a Ben-Shalom, Uzi  |a Shalom, Uzi Ben- 
245 1 0 |a Female violence in terror attacks: a phenomenological analysis based on evidence from the "Intifada of the Individuals"  |c Uzi Ben‑Shalom, Roni Mash, Amit Z. Dvir, Eyal Lewin 
264 1 |c 2023 
300 |b Illustrationen 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Literaturverzeichnis: Seite 193-194 
520 |a This research focuses on violence by females who were involved in terror attacks in Israel during the Intifada of the Individuals between September 2015 and October 2016. Videos of encounters during this conflict present a sample of females perpetrating terror attacks, responding as armed security personnel, or participating (or not) in mob violence following the attack. Using the Three Agent Model of terror attacks, we sorted female modes of participation into "Aggressor," "Disruptor," and part of "Crowd." We analyzed 20 terror attacks with female aggressors and 8 terror attacks with female disruptors, extrapolating the information from analysis of the videos, open-source materials on the Internet, and in-depth interviews. Attacks by female aggressors usually involved numerous "Threat Moves" and were generally disorganized; nevertheless, these aggressors were likely to be killed. Female disruptors were predominantly in uniform and armed. They conveyed a viewpoint of being equal in operational prowess to their fellow soldiers who were male. Some of them expressed an intention to moderate the level of violence during friction, but the video analysis revealed that, like their male fellows, they were likely to inflict lethal violence or to risk being killed. We were not able to locate any evidence of involvement of females in crowd violence following terror attacks, nor that crowd violence by males directed towards subdued female aggressors. We contend that the level of institutional preparation is the most likely explanation for these patterns of aggression on both sides of the political conflict, for women terrorists and women combatants alike. We discuss the utility and limitations of our theoretical and empirical approaches to understanding female aggression. 
650 4 |a Female violence 
650 4 |a Intifada 
650 4 |a Israel 
650 4 |a Over-Kill 
650 4 |a Surveillance 
650 4 |a Terror 
700 1 |a Mash, Roni  |e VerfasserIn  |4 aut 
700 1 |a Dvir, Amit  |e VerfasserIn  |0 (DE-588)1211513815  |0 (DE-627)169979569X  |4 aut 
700 1 |a Leṿin, Eyal  |d 1959-  |e VerfasserIn  |0 (DE-588)1118628667  |0 (DE-627)872125076  |0 (DE-576)479541124  |4 aut 
773 0 8 |i Enthalten in  |t Crime, law and social change  |d Getzville, NY : HeinOnline, 1991  |g 80(2023), 2, Seite 173-194  |h Online-Ressource  |w (DE-627)320525325  |w (DE-600)2015096-9  |w (DE-576)252295854  |x 1573-0751  |7 nnns 
773 1 8 |g volume:80  |g year:2023  |g number:2  |g pages:173-194 
856 4 0 |u https://doi.org/10.1007/s10611-023-10076-z  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
951 |a AR 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4363151854 
LOK |0 003 DE-627 
LOK |0 004 1854342959 
LOK |0 005 20230811134841 
LOK |0 008 230804||||||||||||||||ger||||||| 
LOK |0 040   |a DE-21-110  |c DE-627  |d DE-21-110 
LOK |0 092   |o n 
LOK |0 852   |a DE-21-110 
LOK |0 852 1  |9 00 
LOK |0 935   |a krzo 
ORI |a SA-MARC-krimdoka001.raw