HOW COULD WE EXPLORE THE TERRORIST ISSUE?

The problem of terrorism can be analyzed by means of a wide array of research theories and models. There is however a question which of these may be regarded as especially useful to analyze different aspects of terrorism such as its reasons, characteristics or effects. Among concepts or theories which more or less fulfill the above-mentioned requirements, one can mention for instance: chaos theory, decision theory, spatial competition theory, involves salience theory, exchange theory, black box theory, theory of disaster, expected utility theory, models or methods from topology, system model, model of billiard balls, core model, asymmetrical model, network model or concept of hybridity. JAK MO ̄NA ANALIZOWAÆ ZJAWISKO TERRORYZMU?

Another example involves salience theory, which can be used to analyze the activity of political parties or political systems.The same theory can, however, also be employed to assess the effectiveness of a terrorist organization's tactics, or strategy, or the efficiency of various counterterrorist services.
Another concept is exchange theory, which interprets social relations mainly in terms of an exchange mechanism that benefits both parties.Terrorism can also be perceived in these terms.Here, we examine the various benefits and costs borne by the entities that support, apply, or counter terrorism.
Black box theory can also be useful.It serves the purpose of demonstrating the relations that occur between the factors affecting a given system and the results of the system's operations.This theory can also be adapted to the study of terrorism, when analyzing the relations between the reasons for, and consequences of terrorist activity (The Fontana, 1998).
The theory of disaster also comes in highly useful.This assumes that every system (including terrorism) can be disturbed by an apparently insignificant factor, such as a failed, small terrorist attack which produced serious consequences that last for years, or generate profound social or political changes.
Another valuable concept in research into terrorism is expected utility theory, which addresses the question of how to make decisions in dangerous circumstances.It can therefore be applied by various institutions countering terrorism.
It can be exemplified also by the application of models or methods from topology (from Greek: tópos -place, site; logos -word, science).Topology is a section of mathematics dealing with the analysis of behavior of specified objects (e.g.geometric figures) which do not change even after being deformed.These features can partially be transferred to the field of social sciences.As concerns terrorism, on the one hand they can be applied to analyze the influence of various factors on terrorism.On the other one, it is possible to apply various models, such as star, circle, and network topology, to analyze the properties, models and forms of terrorism.
In a general, simplified sense, topology can also be synonymous to the absence of changes despite certain activities being undertaken.Therefore, it is the opposite of destruction, which assumes considerable, or even total, changes of a given phenomenon (e.g.terrorism) or its components.There is an intermediate form between topology and destruction, namely deconstruction (Derrida, 2004) which concerns a partial transformation of a phenomenon, for example its elements or relations.These principles can be applied to a number of varied phenomena, such as globalization, integration, nationalization and so on.They can be graphically depicted in the following manner (on the example of terrorism).

• ® «
No changes partial changes profound or total changes

Topology of terrorism Deconstruction of terrorism Destruction of terrorism
Source: Author's concept.
How Could We Explore the Terrorist Issue?
The existing models of terrorism include the system model which depicts terrorism as a system comprising a series of various elements, such as terrorists, terrorist organizations, the entities that support or combat terrorism, the relations between them, and so on.This system is influenced by various factors (geopolitical, economic, ethnic, religious, ideological and other factors) and other social phenomena (e.g.fundamentalism, globalization and separatism) -incomes.The operation of this system additionally produces various outcomes, including human and material loss, political transformation and others.
The number of elements in the system under analysis can vary, as can the relations between them.Therefore, a comprehensive presentation of the above model calls for a separate and considerably more extensive study.
Another scenario involves the model of billiard balls, where a single manifestation of terrorism (e.g. a bomb attack) can initiate or escalate subsequent acts.This is exemplified by a certain political situation which provokes a given group to execute a terrorist attack (1).In response, a state undertakes various initiatives aiming to capture and punish the perpetrators (2).This, however, can trigger further acts of terror (3).Thus we are dealing with a so-called domino (or snowball) effect.The essence of this model is its multi-stage, cause-and-effect mechanism.Another scenario involves the core model.This is dominated by a clearly defined element (the core) which can, to a greater or lesser extent initiate, escalate, withhold or liquidate the processes occurring within the model.The example is provided by al-Qaeda, which plays the main role in the Salafi movement of global jihad.
Analyzing terrorism on the basis of the core model, one of its key elements can be constituted by the influence a terrorist attack exerts on various entities, such as the victims, their families, public opinion, the state and so on.Another option is the asymmetrical model.It highlights the different influences of the elements of terrorism, such as its reasons (for example the increasing role of religions and the declining importance of communist ideology) or disparities (for instance in the financial or technological potential) that occur between some entities that counter terrorism and terrorist organizations (e.g. the US vs. al-Qaeda, the UK vs. IRA, etc.).
One of the properties of the asymmetrical model is that the above-mentioned qualitative or quantitative advantage one entity has over another (for example in terms of finance or technology) does not have to mean this entity's domination or victory over the potentially weaker opponent.
There is an increasing interest in depicting terrorism by means of the network model (Gunaratna, 2003;Wejkszner, 2012).
The essence of this solution is presented for example by M. Sageman, who observes that "[a] group of people [e.g. a terrorist organization -S.W.] can be viewed as a network, a collection of nodes connected through links.Some nodes are more popular and are attached to more links, connecting them to other, more isolated nodes.These more connected nodes, called hubs, are important components of a terrorist network" (Sageman, 2004).
The literature on the subject frequently refers to three basic types of networks, namely linear, centrifugal and multichannel ones.In the case of linear (chain) networks, individual elements (participants) can be unaware of who is managing the whole structure or what the network is going to do next.In centrifugal (circular) networks the orders are issued by a subject located at the network's center.All information also passes through this center; therefore this is the only subject with a comprehensive picture of the situation.In multi-channel (matrix) networks, in turn, information flows in various directions and no participant has power or control over the others.One of the newest theories useful while researching different aspects of terrorism is the author's concept of hybridity of terrorism.Hybridity is understood as a combination of selected, very different (sometimeseven contradictory) elements of a given phenomenon (e.g. its causes, features, kinds, effects, and others) and the analysis of various relations that occur between them, in order to show the nature, specificity or evolution of a phenomenon analyzed.
This serves the purpose of developing a new research approach allowing the presentation of both the phenomenon studied (e.g.globalization, foreign policy, security, migration or terrorism) and its relations to other phenomena and the factors that shape it.
The concept of hybridity of terrorism is based on the following assumptions: I) The hybrid model treats terrorism as a system of communicating vessels that encompasses various components (e.g.reasons, forms, features, outcomes) and the relations between them.Various elements of terrorism may enter into the following relations: -be independent of one another, as in the case of selected forms of terrorism for example, -complement one another, as for example traditional features (the endeavor to intimidate) and new features (network structure) do, -contradict one another, for example local versus global terrorism.II) A significant role is played by the duality concerning the substitutability (interchangeability) of certain elements of terrorism, for instance its reasons and outcomes.This may result in a situation where the factor that is a reason for terrorism in a given region (e.g. an ethnic conflict or fundamentalism) is the outcome of terrorism elsewhere and vice versa.III) This study discusses six selected manifestations of the hybridity of terrorism, namely: 1) Hybridity of Subject.The analysis concerns the nature and specificity of terrorism as a subject of research.This is a very broad and varied issue as evidenced, among other things, by the ambiguity of the notion of terrorism, its similarity to other notions (such as terror), the multitude and diversity of definitions of terrorism and the lack of a single, commonly applied definition.

2) Hybridity of Actors. Its essence is to show the key participants (actors)
involved in the process of initiation, escalation or support for terrorism (e.g. a terrorist, a terrorist organization) and to present the relations between them.3) Hybridity of Forms.This concerns the variety of kinds and typologies of terrorism and the presentation of their similarities, differences and mutual relations.4) Hybridity of Causes.This encompasses a range of causes of terrorism and their interrelations, such as territorial and ethnic, socio-economic and psychological sources.5) Spatial Hybridity of Terrorism concerns its range (area), taking into consideration its local and global dimensions.What is significant is the influence of globalization on terrorism (the globalization of terrorism) as exemplified by global fear, or the stereotypes that accompany terrorism, the global strategy and tactics of terrorists, the global outcomes of terrorism and global counter-terrorism activity.

6) Hybridity of Features.
In order to understand current terrorism it is important to recognize its key features and the mechanisms that shape them.They are highly diverse and they can be complementary or oppose one another.They are exemplified, for instance, by the asymmetry of terrorism, its perception as a state or process, understanding terrorism as a positive or negative phenomenon, its narrow or broad scope, and many other aspects.IV) It can be graphically represented by means of a 'cube model' where each wall symbolizes one of the six manifestations of hybridity of terrorism, namely: 1) Hybridity of Subject, 2) Hybridity of Actors, 3) Hybridity of Forms, 4) Hybridity of Causes, 5) Spatial Hybridity, 6) Hybridity of Features.One can construct other, alternative models, encompassing fewer or more than six manifestations of hybridity, for example the hybridity of the consequences of terrorism or the forecast of terrorism.
V) Every manifestation of hybridity encompasses certain components.They may vary in number, which depends on the assumptions made by a given researcher.
For example, the model under discussion assumes that hybridity of causes (manifestation 4) comprises six elements, namely: a) territorial and ethnic sources, VI) A variety of relations occur between the individual manifestations of hybridity and their elements, for instance: 1) Simple relations.These occur in case of the mutual influence of various elements included in the same form of hybridity.For example, within the framework of hybridity of causes (manifestation 4) there can occur relations between territorial and ethnic sources (element a) and the religious and cultural sources (element b) of terrorism.These relations can involve: -a unilateral influence, meaning that territorial and ethnic sources (element a) influence religious and cultural ones (element b), symbolized graphically as 4a ® 4b, but element 4b does not influence element 4a, -a bilateral influence, meaning that territorial and ethnic sources (element a) influence religious and cultural ones (element b) and the other way round (4a « 4b).2) Complex relations.These concern the mutual impact of several elements belonging to different forms of hybridity, for example relations between the psychological sources of terrorism (element e) -hybridity of causes (manifestation 4), and local terrorism (element a) -spatial hybridity of terrorism (manifestation 5).These relations can involve: -a unilateral influence when psychological sources of terrorism (element e -manifestation 4) influence local terrorism (element a -manifestation 5), that is 4e ® 5a, but 5a does not influence 4e, -a bilateral influence when psychological sources of terrorism (element emanifestation 4) and local terrorism (element a -manifestation 5) mutually influence one another (4e « 5a). 3) Absence of relations.It is also feasible that there are no relations whatsoever between the elements included in the same form of hybridity or between the elements included in various forms of hybridity.VII) The concept of hybridity is universal.It can be applied (taking into account different numbers of the manifestations of hybridity, which do not have to use the cubic model) to research highly varied phenomena (such as European integration, globalization, foreign policy, conflicts, and so on) and the relations that occur between them.In conclusion, it should be emphasized that no existing model of terrorism presents a comprehensive picture of the above phenomenon.This mainly ensues from the complexity and evolutionary nature of terrorism as the research issue.This does not mean, however, that the development of new concepts should be abandoned, as exemplified by the concept of hybridity of terrorism.* * * This text analyzes only selected concepts or theories.An exhaustive list of concepts that could be employed by studies on terrorism would be obviously longer.It would encompass, for example, frequency theory (with respect to probability calculus), dependency theory, domino theory, theory of structural influences, game theory, homology theory (topology), theory of social interest, the James-Lange theory, Kirkpatrick's theory, conflict theory, theory of cultural contact, model theory, regeneration theory, optimization theory, theory of organization, theory of decision-making, theory of forecasting, regime theory (theory of interdependence), theory of roles, balance theory, theory of global society, structural-functional theory (structural functionalism), utility theory, public choice theory and a range of other concepts from the areas of psychology, sociology, security, management, and so on.
The degree to which various theories are applicable in studies into terrorism is significantly different, as are the range and form in which they could be used.For example, some may be used to analyze the reasons for terrorism, while others will be helpful when considering its manifestations, results and the ways of overcoming terrorism.

Figure 2 .
Figure 1.Terrorism and it's selected components -the system model Source: Author's concept.
Figure 3.The core model

Figure 5 .
Figure5.The asymmetrical model of terrorism P X -potential of entity X (a state e.g.USA or an international organization e.g.NATO); P Y -potential of entity Y (a terrorist organization e.g.al-Qaeda); C X -chances of entity X (a state e.g.USA or an international organization e.g.NATO) winning; C Y -chances of entity Y (a terrorist organization e.g.al-Qaeda) winningSource: Author's concept.