Sudan continues to be one of the top three most violent countries in Africa, as well as one of the deadliest, in large part due to the violence in the Darfur region (the most violent subnational region in Africa in 2014).…
Details
The most significant trend witnessed throughout 2014 in Egypt was the dramatic decline of riot and protest events nationwide (see Figure 1). Sweeping detentions of Muslim Brotherhood supporters, unconstitutional civilian and military trials, and the introduction of legislation that curtails representation has seen Egypt slip into a counter-revolution reminiscent of past regimes under Mubarak in the late 1980s, and Nasser’s government in the 1950’s (Origins, July 2014).…
Details
Version 5 of ACLED carries a new event type termed ‘Remote violence’. Remote violence is an event where a conflict actor engages another group while remaining spatially removed from the area of attack.…
Details
South Africa was the seventh most active country in the ACLED dataset in 2014, in spite of lacking any form of armed insurgency or rebellion. This means that the form of conflict in South Africa differs drastically from countries with similar activity levels such as Libya and Sudan.…
Details
Libya was the fourth most active and the sixth most violent country in the ACLED dataset with 2383 reported fatalities from battles and remote violence in 2014. The deterioration of security in Libya throughout 2014 has been characterized by a myriad of factional armed groups with complex competing claims and two divided governments mobilizing competing narratives in the pursuit of ‘political legitimacy’.…
Details
Boko Haram continues to be one of the most high-profile and lethal conflict actor within the West Africa. The group has developed into a transnational actor and is active in Nigeria, Cameroon, Chad, Mali and Niger.…
Details
A cursory glance at Egypt’s conflict landscape from the beginning of the revolutionary uprising would infer that overall, riots and protests have followed an upward trajectory with increased participation, mobilisation and dissent against the regime (see Figure 1).…
Details
Contrary to the recent tensions in neighbouring Mali and Burkina Faso, Ivory Coast has experienced a period of relative stability in 2014. With the exception of an outbreak of violence in May 2014, when pro-Gbagbo militia fighters stormed the South-western village of Fetai killing three soldiers and ten civilians (Aboa, 2014), overall conflict levels and intensity have remained relatively low throughout much of the year.…
Details
The existence of multiple, contrasting and even contradictory definitions and conceptualisations of terrorism in policy, legal frameworks and academic research is well-documented. The plethora of competing legal definitions has been likened to the Bermuda Triangle (Dedeoglu, 2003), and attempts to develop consensus around a single one, to ‘the quest for the Holy Grail’ (Levitt, 1986).…
Details
With aid to developing countries at an all time high (OECD, 2014), aid effectiveness – as well as the possible detrimental effects of aid – have been gaining increased attention from both the academic and policy worlds.…
Details
We use cookies to optimize our website and our service.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
We use cookies to optimize our website and our service.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.