Belgin San-Akca, Ph.D.
bakca@ku.edu.tr
Koc University
Phone: 2123381377
Address: Koc Universitesi Iktisadi ve Idari Bilimler Fakultesi Rumeli Feneri Yolu Garipce Sariyer
City: Istanbul - 34450
Country: Turkey
Belgin San-Akca is an Associate Professor of Political Science at the Department of International Relations in Koc University. She received her Ph.D. from University of California, Davis in 2009 and was a visiting scholar at the Center for Middle East Studies at Harvard University in 2011. Her research focuses on international security, transnational dimensions of domestic conflict, terrorism and non-state armed groups, and the Middle East conflict. Before coming to Koç University, she worked as a research assistant and consultant for various projects and taught classes at University of California, Davis and Berkeley. She is the recipient of a Marie Curie Reintegration Grant (2011-2015), the Turkish Academy of Sciences Award for Outstanding Young Scientists (2016-2018), and Science Academy Outstanding Young Scientist Award (2017-2018). She served as an at-large representative at the International Studies Association’s Governing Council (2017-2018) and a member of the Correlates of War (COW) Project Advisory Board (2017-2019). Currently, she is an associate editor of Conflict Management and Peace Science, serves at the editorial board of International Interactions and the treasurer of the Scientific Study of International Processes Section (SSIP) of International Studies Association. Her publications appeared at International Studies Quarterly, Journal of Strategic Studies, Journal of Conflict Resolution, and Journal of Peace Research. Her book, States in Disguise: Causes of State Support for Rebel Groups, was published by Oxford University Press in 2016.
Research Interests
Conflict Processes & War
Terrorism
Military Intervention
Political Violence
Middle East & North African Politics
My Research:
Belgin San-Akca studies civil wars and the interactions between states and armed groups. She investigates the causes behind onset of conflict and third-party support of armed groups. She has a dataset on foreign state support of armed groups since 1946. Among her specific research interests, she works on Middle East Conflict, the governance structures armed groups develop and relations between civilians and armed rebel groups. Her research has implications for the causes, duration and outcome of ethnic conflict, civil war and terrorism.
The research on the influence of democracy on terrorism renders support for two causal mechanisms. One is that democracy reduces terrorism because it creates an environment in which dissenters can pursue their interests through peaceful means. The other argument states that democracy encourages terrorism due to the intrinsic liberties and freedoms that provide an opportunity for terrorists to easily organize, recruit, and mount operations. This article contributes to this second line of thought by framing support for rebel groups as one of the contexts in which democracy’s influence on terrorism is examined. I identify a theoretical mechanism about how democratic states unknowingly facilitate terrorism by letting terrorists freely stay within their borders, raise funds, smuggle arms, and operate offices. The empirical findings provide support for the hypothesis that democracies are vulnerable and can easily be exploited by terrorists since they have an environment conducive to terrorist activities.
This study examines the conditions under which states engaged in strategic rivalries choose to support Non-state Armed Groups (NAGs) that target their rivals. NAGs include ethnic or religious insurgents, guerilla organizations, and terrorists. We develop a rational choice model of state support for NAGs. We focus on state support of NAGs as cooperation between states and NAGs emerging out of a mutual and purposive decision-making process. The model suggests that decisions of states to support NAGs targeting a rival are affected by dissatisfaction with the status quo and the expected risk of retaliation. Rivalries create opportunities for NAGs that operate against one of the rivals, allowing them to acquire resources to sustain their operations. The presence of rivalry increases the likelihood of state-NAG cooperation. In turn, state-NAG cooperation increases the likelihood of rivalry escalation. We test the propositions of the model using an original data set that includes observations for 175 NAGs and 83 state supporters in the post-WWII period. We find consistent support for our propositions. We discuss the implications of these results for the theory and practice of international relations.
States have suffered equally, if not more, from violence generated by Non-state Armed Groups (NAGs), such as ethnic and religious insurgencies and terrorists, than violence directly generated by their counterparts. This does not undermine the fact that states occasionally provide support to these groups in the form of safe havens, weapons, and funding. This paper argues that state support is a function of the states’ vulnerability in extracting and mobilizing resources to secure their borders. In contrast to the conception that weak or failed states provide the largest pool of resources to NAGs, the relatively strong states still prevail as their most fervent supporters. The preliminary evidence also suggests that NAGs serve as substitutes for allies.
There is a long history of state governments providing support to nonstate armed groups fighting battles in other countries. Examples include Syria's aid to Hamas, Ecuador's support for FARC, and Libya's donation of arms to the IRA. What motivates states to do this? And why would rebel groups align themselves with these states? In States in Disguise, Belgin San-Akca builds a rigorous theoretical framework within which to study the complex and fluid network of relationships between states and rebel groups, including ethnic and religious insurgents, revolutionary groups, and terrorists. She proves that patterns of alliances between armed rebels and modern states are hardly coincidental, but the result of systematic and strategic choices made by both states and rebel groups. San-Akca demonstrates that these alliances are the result of shared conflictual, material and ideational interests, and her theory shows how to understand these ties via the domestic and international environment. Drawing from an original data set of 455 groups, their target states, and supporters over a span of more than sixty years, she explains that states are most likely to support rebel groups when they are confronted with internal and external threats simultaneously, while rebels select strong states and democracies when seeking outside support. She also shows that states and rebels look to align with one another when they share ethnic, religious and ideological ties. Through its broad chronological sweep, States in Disguise reveals how and why the phenomenon of state and rebel group alliances has evolved over time.
The international arena has been plagued with violence committed by a variety of Nonstate Armed Groups (NAGs), including ethnic and religious insurgents, terrorists, and revolutionaries, which threaten not only the states they target but also the entire world’s stability and security. An intriguing observation related to armed groups is their ability to attract outside state supporters. Indeed, almost half of all groups that emerged in the post-World War II period received some form of backing from states including but not limited to funds, arms, and safe havens. In this respect, it is possible to draw parallels between interstate alliances and state–group alliances. The major International Relations theories—realism, liberalism, and constructivism—have significant insights to offer in explaining the origin and evolution of state–rebel group alliances. These insights are empirically tested using new data on outside state support of rebel groups that emerged in the post–1945 period. Two forms of alliances exist between states and groups: strategic or instrumental and principled or ideational. A strategic alliance occurs if a state supports a group fighting against its enemy or rival, so security-related concerns and common threat motivate a given alliance. An ideational or principled alliance occurs if a state supports an ideationally contiguous armed group with which it has ethnic, religious, and/or ideological ties. Whether there is a strategic or principled alliance between armed groups and their state supporters has implications for the onset, course and termination of non-state violence in world politics. The empirical findings using large-N statistical analysis show that (1) states form alliances with rebel groups in both the absence and presence of interstate hostilities; (2) states form alliances with ideationally contiguous rebel groups, that is, groups that have common ethnic, religious, and ideological ties to states’ population and/or a group of people in its society; (3) democratic states do not ally with rebels, which fight against other democratic states; and (4) states, in general, are less likely to support rebels, which fight against ideationally contiguous states. Socialism emerges as a unifying ideology contributing to a high degree of solidarity both among states and between states and armed groups. The empirical findings imply that the perceived motivation of state supporters by armed groups; whether states support rebels due to strategic or ideational concerns, should have some influence on armed groups’ level of lethality, duration, and attitude toward civilians and governments they fight against. Only a fully developed research agenda offering empirically informed theoretical insights can address these questions by facilitating future venues of research on the origin and evolution of state–NAG alliances.
Introduction In 1970, Syria and Jordan had a defense pact as part of their Arab League membership. They had a common enemy in Israel. Since 1967, these two countries were engaged in a low-level, but quite intense conflict with Israel. Both also supported several Palestinian organizations fighting Israel. However, in September of that year, a civil war broke out in Jordan between the Palestinian organizations and the Hashemite regime. Syria’s President, Salah Jadid sent in an armored column into Jordan to help the Palestinians. This invasion was quickly defeated, but not before Israel — the common enemy of both — advanced its troops to the Jordanian border, threatening to intervene against the Syrians.
Turkish-European Relations and Counterterrorism
Syrian Conflict and Counterterrorism
Cookie Policy
About this Cookie Policy
This Cookie Policy is provided as an addition to this site's Privacy Notice and exists to explain what cookies are and how they are used on this site. Cookies are tiny text files that are stored within your web broswer or hard drive when you visit a website or web applicaiton. These cookies allow servers to deliver content tailored to individual users or understand user behavior.
Types of Cookies we use
This site employs two first-party cookies (served from us and by us that are essential for the site to operate) and two third-party cookies that deliver external services.
First-Party Cookies
We use a server-generated session cookie to remember you when you are logged in to the site. This is essential to making sure that your profile details are those that are updated when you log in to make changes. This also lets us know who is logging into the site and when.
This site also uses a cookie that is created by your browser to remember when you agree to the cookie notice popup. This cookie stores nothing but the word "true" if you have agreed to the terms and is deleted when you close your browser. This cookie's only function is to prevent the cookie notice from popping up every time you refresh the site's homepage.
Third-Party Cookies
This site uses Google Analytics to understand usage trends and server performance. We do not store variables which are personally-identifiable in Google Analytics like browser ids or IP addresses. Google's privacy policy can be found here. If you would prefer have your browser stop supplying information to Google Analytics, Google provides a browser extension to allow you to do so.
This site also uses cookies supplied by Twitter when the Twitter sidebar script is loaded on the homepage. Their cookie policy is available here. Third-party cookies from Twitter are only loaded on this site's homepage and only when you agree to the terms or click the Twitter logo in the navigation bar.
How to Disable Cookies Altogether
Information on how to disable cookies in your browser can be found here. Please keep in mind that disabling cookies will prevent the essential functions of most interactive websites and web applications, this site included.
Privacy Notice
This privacy notice discloses the privacy practices for (womenalsoknowstuff.com). This privacy notice applies solely to information collected by this website. It will notify you of the following:
Information Collection, Use, and Sharing
We are the sole owners of the information collected on this site. We only have access to/collect information that you voluntarily give us via completing your profile or from direct contact from you. We will not sell or rent this information to anyone. However, as you are voluntarily providing your information to a publicly searchable database, anyone using the site will be able to access your information in the directory. We will use your information to respond to you, regarding the reason you contacted us. We will not share your information with any third party outside of our organization. However, anything you enter into your directory profile is publicly searchable and available to anyone using the site. Unless you ask us not to, we may contact you via email in the future to tell you about changes to this privacy policy. Your Access to and Control Over Information You may opt out of any future contacts from us at any time. You can do the following at any time by logging into your account/profile or by contacting us via email.
Security
We take precautions to protect your information. When you submit information via the website, your information is protected both online and offline. Wherever we collect information (provided by you), such as professional information or account passwords, that information is encrypted and transmitted to us in a secure way. You can verify this by looking for a lock icon in the address bar and looking for "https" at the beginning of the address of the Web page. While we use encryption to protect sensitive information transmitted online, we also protect your information offline. We do not have access to your account password, as this information is encrypted and not available to any other site users or administrators. If you forget your password, you may request a password reset. If you feel that we are not abiding by this privacy policy, you should contact us immediately.
Contact Us
If you have any questions about this Privacy Notice, or need to contact us, we can be reached at .
Terms and Conditions
Last updated: August 04, 2019
Please read these Terms and Conditions ("Terms", "Terms and Conditions") carefully before using the http://womenalsoknowstuff.com website (the "Service") operated by Women Also Know Stuff ("us", "we", or "our"). Your access to and use of the Service is conditioned upon your acceptance of and compliance with these Terms. These Terms apply to all visitors, users and others who wish to access or use the Service. By accessing or using the Service you agree to be bound by these Terms. If you disagree with any part of the terms then you do not have permission to access the Service.
Content
Our Service allows you to post, link, store, share and otherwise make available certain information, text, graphics, videos, or other material ("Content"). You are responsible for the Content that you post on or through the Service, including its legality, reliability, and appropriateness. By posting Content on or through the Service, You represent and warrant that: (i) the Content is yours (you own it) and/or you have the right to use it and the right to grant us the rights and license as provided in these Terms, and (ii) that the posting of your Content on or through the Service does not violate the privacy rights, publicity rights, copyrights, contract rights or any other rights of any person or entity. We reserve the right to terminate the account of anyone found to be infringing on a copyright. You retain any and all of your rights to any Content you submit, post or display on or through the Service and you are responsible for protecting those rights. We take no responsibility and assume no liability for Content you or any third party posts on or through the Service. However, by posting Content using the Service you grant us the right and license to use, modify, publicly perform, publicly display, reproduce, and distribute such Content on and through the Service. You agree that this license includes the right for us to make your Content available to other users of the Service, who may also use your Content subject to these Terms. Women Also Know Stuff has the right but not the obligation to monitor and edit all Content provided by users. In addition, Content found on or through this Service are the property of Women Also Know Stuff or used with permission. You may not distribute, modify, transmit, reuse, download, repost, copy, or use said Content, whether in whole or in part, for commercial purposes or for personal gain, without express advance written permission from us.
Accounts
When you create an account with us, you guarantee that you are above the age of 18, are a woman in the academic field of Political Science, and that the information you provide us is accurate, complete, and current at all times. Inaccurate, incomplete, or obsolete information may result in the immediate termination of your account on the Service. You are responsible for maintaining the confidentiality of your account and password, including but not limited to the restriction of access to your computer and/or account. You agree to accept responsibility for any and all activities or actions that occur under your account and/or password, whether your password is with our Service or a third-party service. You must notify us immediately upon becoming aware of any breach of security or unauthorized use of your account.
Intellectual Property
The Service and its original content (excluding Content provided by users), features and functionality are and will remain the exclusive property of Women Also Know Stuff and its licensors. The Service is protected by copyright, trademark, and other laws of both the United States and foreign countries. Our trademarks and trade dress may not be used in connection with any product or service without the prior written consent of Women Also Know Stuff. Links To Other Web Sites Our Service may contain links to third party web sites or services that are not owned or controlled by Women Also Know Stuff Women Also Know Stuff has no control over, and assumes no responsibility for the content, privacy policies, or practices of any third party web sites or services. We do not warrant the offerings of any of these entities/individuals or their websites. You acknowledge and agree that Women Also Know Stuff shall not be responsible or liable, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods or services available on or through any such third party web sites or services. We strongly advise you to read the terms and conditions and privacy policies of any third party web sites or services that you visit.
Termination
We may terminate or suspend your account and bar access to the Service immediately, without prior notice or liability, under our sole discretion, for any reason whatsoever and without limitation, including but not limited to a breach of the Terms. If you wish to terminate your account, you may simply discontinue using the Service, or notify us that you wish to delete your account. All provisions of the Terms which by their nature should survive termination shall survive termination, including, without limitation, ownership provisions, warranty disclaimers, indemnity and limitations of liability.
Indemnification
You agree to defend, indemnify and hold harmless Women Also Know Stuff and its licensee and licensors, and their employees, contractors, agents, officers and directors, from and against any and all claims, damages, obligations, losses, liabilities, costs or debt, and expenses (including but not limited to attorney's fees), resulting from or arising out of a) your use and access of the Service, by you or any person using your account and password; b) a breach of these Terms, or c) Content posted on the Service.
Limitation Of Liability
In no event shall Women Also Know Stuff, nor its directors, employees, partners, agents, suppliers, or affiliates, be liable for any indirect, incidental, special, consequential or punitive damages, including without limitation, loss of profits, data, use, goodwill, or other intangible losses, resulting from (i) your access to or use of or inability to access or use the Service; (ii) any conduct or content of any third party on the Service; (iii) any content obtained from the Service; and (iv) unauthorized access, use or alteration of your transmissions or content, whether based on warranty, contract, tort (including negligence) or any other legal theory, whether or not we have been informed of the possibility of such damage, and even if a remedy set forth herein is found to have failed of its essential purpose.
Disclaimer
Your use of the Service is at your sole risk. The Service is provided on an "AS IS" and "AS AVAILABLE" basis. The Service is provided without warranties of any kind, whether express or implied, including, but not limited to, implied warranties of merchantability, fitness for a particular purpose, non-infringement or course of performance. Women Also Know Stuff, its subsidiaries, affiliates, and its licensors do not warrant that a) the Service will function uninterrupted, secure or available at any particular time or location; b) any errors or defects will be corrected; c) the Service is free of viruses or other harmful components; or d) the results of using the Service will meet your requirements.
Exclusions
Some jurisdictions do not allow the exclusion of certain warranties or the exclusion or limitation of liability for consequential or incidental damages, so the limitations above may not apply to you.
Governing Law
These Terms shall be governed and construed in accordance with the laws of the state of Arizona and the United States, without regard to its conflict of law provisions. Our failure to enforce any right or provision of these Terms will not be considered a waiver of those rights. If any provision of these Terms is held to be invalid or unenforceable by a court, the remaining provisions of these Terms will remain in effect. These Terms constitute the entire agreement between us regarding our Service, and supersede and replace any prior agreements we might have had between us regarding the Service.
Changes
We reserve the right, at our sole discretion, to modify or replace these Terms at any time. If a revision is material we will provide at least 30 days notice prior to any new terms taking effect. What constitutes a material change will be determined at our sole discretion. By continuing to access or use our Service after any revisions become effective, you agree to be bound by the revised terms. If you do not agree to the new terms, you are no longer authorized to use the Service.
Contact Us
If you have any questions about these Terms, please contact us at .