Salient Cleavages, Tactical Cooperation and Violence between Armed Groups in Yemen

dc.contributor.authorYounger-Khan, Sukayna
dc.date.accessioned2024-10-29T07:46:44Z
dc.date.available2024-10-29T07:46:44Z
dc.date.issued2022
dc.description.abstractExisting scholarship ignores relational interdependencies when attempting to understand the behaviour of non-state armed groups during civil war. This paper investigates the interconnected web of alliances and rivalries in the Yemen Civil War to answer the following question: why do armed groups fight each other? We employ a network approach to investigate determinants of intergroup violence. This emphasises the role of identity, arguing that operating in salient cleavages necessitates that groups align or distinguish themselves from each other. We further argue that informal cooperation incentivises violence the longer the war continues. These arguments are tested using pooled Exponential Random Graph Models to account for endogenous structures over time. Results indicate that shared identity is a significant driver of hostilities, moderating cooperation and amplifying the effects of group attributes. Robustness checks and simulations demonstrate that network models more accurately capture the underlying mechanisms to predict fighting in this case.
dc.description.versionsubmitted
dc.identifier.doi10.31124/advance.21623526.v1
dc.identifier.urihttps://kops.uni-konstanz.de/handle/123456789/71057
dc.language.isoeng
dc.rightsAttribution 4.0 International
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/
dc.subject.ddc320
dc.titleSalient Cleavages, Tactical Cooperation and Violence between Armed Groups in Yemeneng
dc.typePREPRINT
dspace.entity.typePublication
kops.citation.bibtex
@unpublished{Khan2022Salie-71057,
  year={2022},
  doi={10.31124/advance.21623526.v1},
  title={Salient Cleavages, Tactical Cooperation and Violence between Armed Groups in Yemen},
  author={Khan, Sukayna}
}
kops.citation.iso690KHAN, Sukayna, 2022. Salient Cleavages, Tactical Cooperation and Violence between Armed Groups in Yemendeu
kops.citation.iso690KHAN, Sukayna, 2022. Salient Cleavages, Tactical Cooperation and Violence between Armed Groups in Yemeneng
kops.citation.rdf
<rdf:RDF
    xmlns:dcterms="http://purl.org/dc/terms/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:bibo="http://purl.org/ontology/bibo/"
    xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#"
    xmlns:foaf="http://xmlns.com/foaf/0.1/"
    xmlns:void="http://rdfs.org/ns/void#"
    xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > 
  <rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/71057">
    <dc:rights>Attribution 4.0 International</dc:rights>
    <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/43613"/>
    <dcterms:rights rdf:resource="http://creativecommons.org/licenses/by/4.0/"/>
    <dc:creator>Khan, Sukayna</dc:creator>
    <dcterms:title>Salient Cleavages, Tactical Cooperation and Violence between Armed Groups in Yemen</dcterms:title>
    <dcterms:abstract>Existing scholarship ignores relational interdependencies when attempting to understand the behaviour of non-state armed groups during civil war. This paper investigates the interconnected web of alliances and rivalries in the Yemen Civil War to answer the following question: why do armed groups fight each other? We employ a network approach to investigate determinants of intergroup violence. This emphasises the role of identity, arguing that operating in salient cleavages necessitates that groups align or distinguish themselves from each other. We further argue that informal cooperation incentivises violence the longer the war continues. These arguments are tested using pooled Exponential Random Graph Models to account for endogenous structures over time. Results indicate that shared identity is a significant driver of hostilities, moderating cooperation and amplifying the effects of group attributes. Robustness checks and simulations demonstrate that network models more accurately capture the underlying mechanisms to predict fighting in this case.</dcterms:abstract>
    <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/>
    <dc:contributor>Khan, Sukayna</dc:contributor>
    <foaf:homepage rdf:resource="http://localhost:8080/"/>
    <dc:language>eng</dc:language>
    <dcterms:issued>2022</dcterms:issued>
    <bibo:uri rdf:resource="https://kops.uni-konstanz.de/handle/123456789/71057"/>
    <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2024-10-29T07:46:44Z</dcterms:available>
    <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/43613"/>
    <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2024-10-29T07:46:44Z</dc:date>
  </rdf:Description>
</rdf:RDF>
kops.flag.knbibliographytrue
relation.isAuthorOfPublication66b99bfe-30d0-4752-8c30-285b1200b5d1
relation.isAuthorOfPublication.latestForDiscovery66b99bfe-30d0-4752-8c30-285b1200b5d1

Dateien