Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

  • Loading metrics

Game-theoretic agent-based modelling of micro-level conflict: Evidence from the ISIS-Kurdish war

  • Olivia Macmillan-Scott ,

    Roles Conceptualization, Data curation, Formal analysis, Methodology, Visualization, Writing – original draft

    olivia.macmillan-scott.16@ucl.ac.uk

    Affiliation Department of Computer Science, University College London, London, United Kingdom

  • Akin Ünver,

    Roles Conceptualization, Methodology, Supervision, Writing – review & editing

    Affiliation Department of International Relations, Ozyegin University, Istanbul, Turkey

  • Mirco Musolesi

    Roles Conceptualization, Methodology, Supervision, Writing – review & editing

    Affiliations Department of Computer Science, University College London, London, United Kingdom, The Alan Turing Institute, London, United Kingdom, Department of Computer Science and Engineering, University of Bologna, Bologna, Italy

Abstract

This article delves into the dynamics of a dyadic political violence case study in Rojava, Northern Syria, focusing on the conflict between Kurdish rebels and ISIS from January 1, 2017, to December 31, 2019. We employ agent-based modelling and a formalisation of the conflict as an Iterated Prisoner’s Dilemma game. The study provides a nuanced understanding of conflict dynamics in a highly volatile region, focusing on microdynamics of an intense dyadic strategic interaction between two near-equally- powered actors. The choice of using a model based on the Iterated Prisoner’s Dilemma, though a classical approach, offers substantial insights due to its ability to model dyadic, equally-matched strategic interactions in conflict scenarios effectively. The investigation primarily reveals that shifts in territorial control are more critical than geographical or temporal factors in determining the conflict’s course. Further, the study observes that the conflict is characterised by periods of predominantly one-sided violence. This pattern underscores that the distribution of attacks, and target choices are a more telling indicator of the conflict nature than specific behavioural patterns of the actors involved. Such a conclusion aligns with the strategic implications of the underlying model, which emphasises the outcome of interactions based on differing aggression levels. This research not only sheds light on the conflict in Rojava but also reaffirms the relevance of this type of game-theoretical approach in contemporary conflict analysis.

Introduction

This article advances conflict studies by applying computational and mathematical modelling, specifically agent-based modelling, to empirically analyse the Kurdish-ISIS conflict in Rojava, Syria. Increasing our understanding of the dynamics of conflict is crucial in evaluating the actions that may lead to their de-escalation and resolution. Unlike previous studies that often focused on identifying causal mechanisms [1, 2] or relied on artificial societies [3], this research anchors its analysis in empirical data to dissect the dynamics of strategic interactions and violence patterns in conflict scenarios. By integrating game theory into the agent-based framework, we scrutinise the evolving nature of violent events in Rojava, examining whether these incidents follow temporally and spatially stable patterns or vary significantly over time and location. This approach not only fills a notable gap in conflict literature but also provides a sophisticated understanding of the strategic behaviours characterising the Kurdish-ISIS conflict, offering insights into broader conflict dynamics and resolution strategies.

It is crucial to contextualise the study within the broader framework of civil conflict research, a field that, as Kalyvas [1] notes, has gained considerable systematic attention in the last decade, particularly in relation to interstate conflict. The collective classification of civil conflicts, rather than disaggregation into different types of conflict (such as identity and nonidentity wars) [4], has resulted in diverging theories that overwhelmingly focus on causes. The economic viewpoint, as suggested by Garfinkel and Skaperdas [5], considers natural resources as a pivotal factor in civil conflict dynamics, a standpoint that Fearon [6] counterargues by suggesting their potential to deter conflict. In international relations, the discourse frequently revolves around ethnic antagonism and pre-existing disputes [7], while comparativists typically emphasise state capacity. Moreover, the dynamics of civil conflict have been extensively explored in terms of civilian violence, with research by Condra and Shapiro [8], Kalyvas [9], and Weinstein [10], among others, examining aspects such as state and insurgent retaliation and the use of violence for recruitment. This multifaceted debate and overlap in civil conflict research provide a critical backdrop for our study’s focus on the Kurdish-ISIS conflict in Rojava, Syria, using advanced computational modelling methods.

The extant research on civil wars consistently acknowledges the complexity and fluidity of alliances within such conflicts. Some argue that the strength of alliances varies between civil wars regardless of their nature [11], while Esteban and Ray [12] claim that ethnically homogeneous groups usually present an advantage in forming stronger alliances over others such as class alliances, due to socio-economic heterogeneity. Within this type of conflict, the formation of coalitions is seldom formal, rather these are tacit alliances [13]. In the Syrian context, especially in Rojava, the dynamics of alliance formation among rebel organisations, as explored by scholars like Gade et al. [14], Kausch [15], and Schmidinger [16], are particularly relevant. These alliances, often informal and driven by ideological similarity, are exemplified in the persistent conflict between ISIS and Kurdish militias. Indeed, some of the most intense clashes during the civil war in Syria occurred between ISIS and YPG-affiliated factions, the most intense being the Battle for Rojava and its aftermath. Although much of the international attention on this area was confined to the 2014–15 Siege of Kobani, Kurdish-ISIS conflict ensued much longer than that. This ongoing struggle, intensified by transnational elements such as proxy warfare [17, 18] and the impact of neighbouring conflicts [19, 20], presents a unique case for investigation. The involvement of international actors like the US and Russia, and regional dynamics influenced by the Kurdish People’s Protection Units (YPG) and their links to the Kurdistan Worker’s Party (PKK), add further complexity. Although our model does not directly incorporate these external influences, their indirect impact on local actors’ strategies constitutes important antecedent conditions for our analysis.

In examining the Syrian conflict, particularly in Rojava, Oktav et al.’s [21] analysis of the new generation of violent non-state actors (VNSAs) is pivotal. They classify ISIS as a global revolutionary nonethnic VNSA and the YPG as an ethnic, nationalist VNSA, underlining the distinct identities and global appeal strategies of these groups. ISIS leverages jihadism and the concept of a caliphate for wider reach, while the YPG employs Marxist ideology. Ünver’s [22] exploration into the northern region emphasises these groups’ capacity to assume state-like functions, as demonstrated by the YPG in Rojava post the expulsion of state forces. Understanding the evolving nature and strategic behaviours of such VNSAs is crucial, and the Rojava case offers a compelling example of these dynamics. This article extends this understanding by applying advanced computational models to dissect the interactions between these VNSAs in the context of the Syrian conflict.

The study of rebel group dynamics in the Syrian conflict has been a focal point for various scholars. Schwab’s [23] research, using data from north-western Syria, introduces a critical dimension of negotiation between rival groups in civil wars, emphasising how the presence or absence of a central authority (like the Syrian regime) influences these interactions. When this conflict is active, rebel groups negotiate as the need for potential allies is higher, whereas in the absence of conflict with the main rival, fighting between rebel groups escalates. These findings are in line with work by Pischedda [24] and Schulhofer-Wohl [25]; the latter looks at on-side fighting in the early years of the Syrian Civil War. Schulhofer-Wohl observes regional variations in on-side violence, with significant instances in regions like Hasaka post-regime withdrawal, contrasting with Damascus where such violence is absent due to ongoing pressure from the regime. This pattern supports Schwab’s thesis, highlighting the role of a common enemy in shaping rebel interactions. It is worth noting that Schulhofer-Wohl [25] finds no instances of on-side fighting between the rebel groups we are discussing here, strengthening the case for modelling the Kurdish-ISIS conflict in Rojava. Van Wilgenburg and Fumerton’s [26] analysis of the PYD-YPG’s consolidation of power in northeast Syria further illustrates the stability of alliances formed against a common rival, leading to the formation of the SDF, dominated by the Kurdish YPG. Their success in power consolidation is attributed to their organisational skills amidst a power vacuum [26, 27]. This article expands on these findings by applying a computational approach to model the Kurdish-ISIS conflict, moving beyond the largely qualitative nature of existing literature.

Computational models dealing with international security have recently emerged within the field of conflict studies (see for example [28]). Statistical models had until now dominated the field [29]; while these are valuable in understanding causal dynamics and the relationship between variables, their application is generally restricted to understanding the causes of conflict [3032] and forecasting violent outbreaks [3337]. Some focus in this area has been on understanding the characteristics of a state that may make it more likely to engage in conflict; de Mesquita [38] discusses the application of non-cooperative game theory in conjunction with political economy theory to address this question, and Owsiak and Vasquez [39] (see also [40]) relate this to territorial disputes and the prediction of peaceful dyads. Others have centred on the notion of reciprocity, looking at instances of conflict and cooperation [4143]. Similar to the work presented in this article, their work seeks to understand strategic response patterns within conflict, particularly relating to reciprocity. However, the focus is on international rather than civil conflict, with actors being aggregated at the country level. Goldstein et al. [41] use conflict event data to show that bilateral reciprocity appears necessary to allow for long-term cooperation, at least in the case of the international dyads they consider in the Middle East. Although these results are derived through a statistical analysis, they exemplify how identifying patterns in conflict event data can lead to a better understanding of conflict dynamics.

In the realm of conflict studies, the last decade has seen a remarkable evolution in the use of computational agent-based models (ABM), which have become instrumental in dissecting the multifaceted dynamics of civil wars. These models, renowned for their capacity to simulate highly detailed interactions among individual actors in conflict environments, have yielded significant insights, contributing to a deeper understanding of emergent conflict behaviours and patterns. The foundational work in this field, although predating the last ten years, is epitomised by Epstein’s [44] seminal agent-based model of civil violence which laid the groundwork for subsequent advancements in ABM. This model underscored the influence of varying perceptions of legitimacy among agents on the escalation or resolution of conflicts. While Epstein’s model is the most relevant in this case, others have introduced adaptive behaviour [45, 46] or built models as a tool for policy-making rather than theory testing [47]. Empirically-driven models have also emerged in the wider field of conflict studies. Bhavnani et al.’s ground-breaking 2014 study [48] ventured into urban violence within ethnically divided cities. By integrating geographical and social network factors, their model offered a nuanced perspective on urban settings’ role in conflict dynamics.

In 2021, Mueller [49] expanded the scope of ABM to ethnic violence. His work incorporated critical variables like ethnic heterogeneity and political exclusion, offering insights into the complex interplay of ethnic tensions and political structures in conflict initiation and sustenance. Studies such as Schutte and Donnay’s [50] marked a significant shift toward forecasting violent hotspots. Their integration of geographic and temporal data into ABM provided a sophisticated understanding of the evolution of conflict dynamics.

Further pivotal contributions came from Cederman, Gleditsch, and Buhaug [51], who used ABM to investigate the links between political and economic inequalities and conflict. Their focus on African ethnic conflicts provided a rich context for examining how resource allocation and ethnic disparities could catalyse and propel conflicts. These models have been applied to various contexts, with a significant emphasis on the Syrian Civil War and African ethnic conflicts, although this specialised field is very much in its first stages and will undoubtedly experience significant advances in the coming years.

A cornerstone in the evolution of ABM is Axelrod and Bennett’s Landscape Theory of Aggregation [52]. Although their work dates back to 1993, it laid the conceptual groundwork for understanding how local interactions could escalate into larger conflict patterns, a principle that has been integral to later developments in ABM. Another significant stride in ABM research is seen in the work of Turchin et. al. [53], who have delved into the socio-political underpinnings of civil unrest. Their models have been particularly adept at simulating the complex social dynamics that lead to civil uprisings, offering insights into the threshold points of collective action and rebellion. Further, the work of Axtell, Epstein, and Young [54] on network dynamics in conflict zones has provided a fresh perspective on the role of social networks in conflict evolution. The incorporation of geographical and socio-economic data in ABMs, as seen in the work of Weidmann and Salehyan [55], has also been critical. Their models have been pivotal in understanding how geographic and economic factors intertwine with political dynamics to shape the landscape of civil conflicts. In addition, the recent shift towards integrating real-time data into ABMs, exemplified by the work of Weidmann and Cederman [56], has brought an unprecedented level of accuracy and relevance to conflict simulations. This approach allows for a more immediate understanding of ongoing conflicts, providing insights that are crucial for timely policy interventions. Collectively, these advancements in computational agent-based modelling have profoundly transformed the landscape of conflict studies. By encapsulating the multifaceted interactions of diverse agents and incorporating a wide range of variables, from geographical to socio-political factors, these models have provided comprehensive insights into the dynamics of civil wars and potential pathways to resolution.

A significant trend in the last five years is the integration of real-time data into ABMs; a methodological advancement that has been crucial for analysing ongoing conflicts with greater accuracy and relevance. For instance, in the study of the Syrian Civil War, researchers have utilised ABMs to dissect the complex interplay between various factions, as seen in the works of Moro [57] and Suleimanova et. al. [58] who applied real-time data to model the shifting alliances and territorial control within the conflict. This approach has been instrumental in providing timely insights for policy interventions. The integration of geographic and socio-economic data into ABMs has also been prominent, particularly in studies focusing on African civil wars. For example, Bruch and Atwell [59] research incorporated spatial and economic variables to understand how geographic factors and resource allocation influence political conflicts. Their study highlighted the intricate relationship between land, resources, and conflict, offering a multi-dimensional view political conflicts. Network dynamics in conflict zones have been another focal area in recent ABM research. The study by Fjelde and Hultman [60] on the role of social networks in the escalation and de-escalation of conflicts provided valuable insights into how information flow and social influences shape conflict dynamics. Their model emphasised the impact of inter- and intra-group communications in conflict zones, offering a nuanced understanding of the social underpinnings of civil wars.

This article represents an advancement in the field of conflict studies, particularly in the application of agent-based models and game theory to the analysis of violent conflict and civil wars. It offers a distinct improvement over previous scholarship by adopting a data-driven approach rather than relying on artificial societies, utilising the micro-level event dataset from the Armed Conflict Location and Event Data Project (ACLED) to model the behaviour of non-state actors, specifically ISIS and Kurdish militias, in Rojava from January 1, 2017, to December 31, 2019. This study diverges from traditional methodologies that predominantly focus on state military dynamics, instead delving into the less-explored territory of dyadic interactions between two non-state actors. It specifically addresses the conflict between an ethno-nationalist armed group (Kurdish militias) and a religious fundamentalist armed group (ISIS), a type of interaction that has not been extensively covered in the existing literature. This nuanced focus allows for a deeper understanding of the strategic behaviours and interactions between groups with different ideologies and agendas in such conflicts. Methodologically, the study employs an Iterated Prisoner’s Dilemma game, also represented as an instance of the Hawk-Dove game, to model the conflict, offering a more robust framework for analysing the strategic decisions of the involved parties. This approach reveals that shifts in territorial control are more influential than geographical or temporal variables in determining patterns of violent action. It also highlights that periods of one-sided violence and the proportion of attacks by each side are more indicative of significant changes in the conflict than previously recognised patterns of strategic behaviour. The choice of the Kurdish-ISIS conflict in Rojava is particularly significant due to its dyadic and multi-ideological nature [16], allowing for a clearer modelling of interactions between the two non-state actors with different non-rational priorities in conflict. We also emphasise this ideological component in our analysis, and the bulk of the agent-based modelling literature has so far treated all conflict actors as having uniform priorities and strategies, which is rarely the case in a conflict environment.

This focus also acknowledges the strategic importance of Rojava; traditional game theoretic studies would struggle to model the importance of this area as it lacks natural resources or a specific strategic importance such as serving as a natural barrier or a passageway between key logistical hubs. Instead, Rojava is important due to its ideological implications, as it is viewed among the Kurdish rebel groups as the home of transnational Kurdish revolutionary ideology [61, 62]. It is important to note that this dyadic interaction forms part of a wider conflict involving additional actors, both on a national level and external actors. While Kurdish and ISIS forces have also interacted with other actors in the wider conflict, the motivation for choosing the Rojava region in particular is that this has predominantly seen conflict involving the Kurdish-ISIS dyad. Nevertheless, the implications of focusing on this interaction in isolation is discussed below.

The study’s contributions are threefold. It not only employs a classical game theory-based approach to analyse a unique and novel conflict with highly novel forms of actor behaviour and ideologies, but it also makes a theoretical contribution by examining the factors that influence such strategic behaviour. Moreover, the use of micro-level data to investigate the Rojava conflict represents a departure from the conventional approach of modelling artificial societies with meso-level data, providing a more granular and dense analysis of conflict dynamics. In summary, this research significantly enriches the current understanding of conflict dynamics, especially in the context of non-state actors, by combining empirical data analysis with advanced game-theoretic modelling, offering fresh perspectives and methodologies to the field of conflict studies.

Materials and methods

Conflict datasets

The choice of dataset was crucial as modelling actors’ behavior required sufficient information per event recorded as well as a large number of events in order to derive meaningful results. The recent surge of interest in the microanalysis of civil conflict has given rise to a number of event data projects [63], in the hope that disaggregation will allow for a better understanding of causal mechanisms [64, 65]. Some of the more widely used datasets include the UCPD/PRIO Armed Conflict Dataset (see [66, 67]), the Armed Conflict Location and Event Data Project (ACLED) (see [68, 69]), and Integrated Conflict Early Warning System (ICEWS) (see [33]). These datasets all rely largely on news coverage to document politically sensitive events, meaning that an important consideration in selecting the appropriate dataset for this analysis was the mitigation of bias. Considering this and other factors including time-period and the level of detail within the data, ACLED was deemed the best choice for this paper, acknowledging that shortcomings remain. Details on data extraction and pre-processing are included in S1 Appendix.

Given that the data covered relates to conflict, even a wide variety of sources cannot entirely remove the presence of data bias due to the political nature of events [65], the inherent difficulty in recording accurate data in conflict [35, 70, 71], and the fact that news reports often cater to a domestic audience and have a political agenda [72]. Regarding estimates of the number of people killed, Price, Gohdes and Ball [71] point out that existing data constitutes a convenience sample rather than an accurate representation of the number of people killed in the conflict. Although here we model conflict events rather than individual battle deaths, the question of under-reporting remains a central matter. ACLED have attempted to mitigate these issues by using non-governmental sources with no direct political involvement and a combination of local, national and international sources [73], which has been shown to reduce data bias [74], pertinently urban bias in civil war [75].

Although a certain level of urban bias remains in the ACLED dataset and there is some lack of precision in geocoding [76], the level of precision is sufficient for this research. Most other conflict datasets rely on similar news outlets; consequently, the effectiveness of cross-checking is limited. The UCDP/PRIO dataset, widely used in conflict literature, was considered as an alternative. However, their data for Syria lacks disaggregation and presents some inconsistencies [77]; its lower quality is precisely the reason why Syria’s data is excluded from the main UCDP/PRIO dataset. Given the absence of alternative datasets, the presence of bias was mitigated to some extent by cross-checking the results with news coverage, primarily using The Carter Center’s [78] weekly conflict reports. From this comparison, there appeared to be some underreporting in the ACLED dataset, more marked for ISIS attacks. Nevertheless, all battles and offensives were reflected in the dataset, only some smaller-scale attacks were missing. While this highlights limitations in the data, it should not have a major impact on the modelled dynamics.

Weidmann [79] suggests methods to counteract reporting bias, such as capture-recapture methods or sensitivity analysis, however these either apply to statistical analyses or are outside the scope of this paper—he nevertheless concludes that there are currently no effective solutions. Therefore, following the approach taken by a number of studies (see [32, 80]), the assumption is that bias is inevitable, yet it is not strong enough to invalidate conclusions.

Modelling approach

In order to understand how the behaviour of actors in the Kurdish-ISIS conflict in Rojava changed both geographically and temporally, their behaviour was first modelled as an iterated “Prisoner’s Dilemma” game, also represented as an instance of the Hawk-Dove game. Axelrod [81] highlighted the appropriateness of this game as a model for issues in international politics, particularly those lacking a central authority, as it applies to situations where self-interested behaviour leads to a worse outcome for both actors. There are numerous examples of the use of this framework to model interactions within conflict studies literature, both focusing on individual conflicts [82, 83] or from a theoretical perspective [84, 85]; other approaches have used alternative game specifications [86, 87]. In the Prisoner’s Dilemma, two players must simultaneously choose between cooperation or defection. In a one-shot game, the incentive to defect is higher, although mutual defection is suboptimal; in an Iterated Prisoner’s Dilemma, mutual cooperation is beneficial if there is an expectation of reciprocation from the opponent. In this case, we are applying the Iterated Prisoner’s Dilemma, so players’ actions may be dependent on the past actions of their opponent; the two players we model are ISIS and Kurdish militias.

The Hawk-Dove model [88] was originally designed to represent interactions within animal behaviour; however, it has since been integrated into conflict studies and wider international relations and political science literature. Its use within this literature has often become decoupled from the original formulation, resulting in the use of Hawk and Dove as ways to describe behaviour rather than specific actions in the original game (see for example [8993]). The model involves two parameters: the value V of a resource and the cost C of fighting over this resource. In the case where CV, the Hawk-Dove model becomes identical to the Prisoner’s Dilemma. A Dove and Hawk in the former map directly onto Cooperator and Defector strategies in the latter. For the following analysis, we will continue to use the vocabulary from the Prisoner’s Dilemma; however, due to the widespread use of the Hawk-Dove model, it is important to note that the research presented in this article can be understood through the lens of both frameworks.

Employing the Iterated Prisoner’s Dilemma and the Hawk-Dove game to study the conflict behaviour of ISIS and the Kurdish YPG is particularly effective due to the distinct ideologies and objectives of these two organisations. These classical game forms offer a structured and clear framework for analysing the strategic decision-making processes in scenarios where actors face choices between fighting and doing nothing, which is crucial in understanding the dynamics between these ideologically divergent groups. In the context of ISIS and the Kurdish YPG, the Prisoner’s Dilemma provides a profound insight into situations where both parties face the choice between aggressive actions and restraint. The model is apt for illustrating the dilemma faced by ISIS, with its religious fundamentalist objectives, and the Kurdish YPG, driven by ethno-nationalist goals, in determining which areas they should attack, which ones they should defend, and which others they should relinquish (do nothing).

Due to the impossibility of cooperative options in this scenario (such as trade, contextually ally, or conduct joint peacekeeping efforts) given to the nature of the strategic interaction (non-converging ideologies), the inherent distrust and conflicting objectives push them towards non-cooperative strategies. This dynamic is central to understanding the ongoing conflict, where mutual best interests are overshadowed by the drive to protect individual ideological goals. The Hawk-Dove game, with its focus on confrontational versus restraint-oriented strategies, further enriches this analysis. This game is particularly relevant in examining scenarios where one group opts for aggressive tactics while the other chooses a more defensive or non-intervening stance, effectively capturing the asymmetry in the conflict. The divergent ideologies and goals mean that the payoffs for aggression and conciliation differ for ISIS and the Kurdish YPG, influencing their strategic choices in a complex interplay of power and diplomacy.

The simplicity and clarity of the Iterated Prisoner’s Dilemma and Hawk-Dove games, in contrast to more complex and variable-rich models, offer distinct advantages. They provide a focused analysis of critical decision points in the conflict, directly addressing the strategic interactions between the two parties. This direct focus is essential in a situation where each group’s actions significantly influence the other’s strategies. Moreover, these models adeptly model the ideological contrasts between the groups and are effective in incorporating the historical context of the conflict, offering insights into how past actions influence current strategic decisions. Despite their simplicity, these models have a predictive power that is crucial for understanding potential future developments in the conflict. In summary, while newer agent-based models and advanced game-theoretic systems might offer more complexity, the classical forms of the Iterated Prisoner’s Dilemma and the Hawk-Dove game provide a focused, strategic lens through which to view the conflict between ISIS and the Kurdish YPG. Their ability to distil the essence of strategic interaction, especially in the context of differing ideologies and objectives, makes them highly suitable and effective for this particular case study.

In our analysis, we map patterns of cooperation (Dove) and defection (Hawk) from playing strategies against each other to observed actions recorded in the ACLED dataset. Although in the Prisoner’s Dilemma model the two actions are denoted as cooperation and defection, it is important to note that we are not interpreting the lack of violent action observed in the ACLED data as instances of ‘cooperation’ in the conflict itself. In using conflict data, only defection in the Prisoners’ Dilemma game is visible; we are thus using the Prisoner’s Dilemma as a framework to model defection and inaction, where the latter is taken to mean a lack of reported violent action; in the context of our model based on the Prisoner’s Dilemma game, inaction can be considered as a form of non-defection. Therefore, strategies that frequently resulted in sustained mutual cooperation in an Iterated Prisoner’s Dilemma were discarded, as these would represent a lack of action from either actor in the conflict and as such would not be observed in the data. In particular, the patterns of actions were mapped to the strategies submitted to Axelrod’s first and second tournaments [81] along with other types that have emerged in later literature, including zero-sum strategies [94] (S2 Appendix, S1 and S2 Tables). Probabilistic strategies [95] were excluded as they did not produce repeating patterns, therefore a characteristic sequence of actions could not be extracted. Strategies covered in this analysis include, for example, Tit-for-Tat (TFT), where a player begins by cooperating, then copies the opponent’s last move and Alternator (ALT), where a player alternates between cooperating and defecting each round.

Having selected these strategies, each one was played against all others and itself using the Axelrod Library on Python [96] (see S2 Appendix), and the resulting patterns of defection were recorded. For instance, if both players are following TFT, no defection would be observed as both players would cooperate in each round. Alternatively, if one player is employing TFT and the other ALT, we would observe alternating defections from each player. From this, a pattern of defection by two players can be matched to one or more strategy combinations. To apply this to the ACLED data, violent actions by one side of the conflict or the other were first converted into an ordered sequence in a string format. Taking all the possible patterns of defection, we then extracted the number of occurrences of each of these patterns within the resulting strings. From this, we could identify the most frequent interaction between the two actors for that subset of data. Using the strategy categorisation below, we can map which combination would lead to such an interaction (e.g. if we observe a pattern of alternating defections, this could occur from TFT and ALT strategies being played). We can thus identify the strategic interaction this corresponds to, and by deriving the behaviour of each actor we can analyse behavioural shifts throughout the conflict.

This method gave rise to a potential source of uncertainty: the most frequently occurring patterns returned by the model may in fact occur as a subpattern of another made up of a higher number of characters. For example, from a pattern of two defections by Player A followed by a defection by Player B, we would conclude that possible strategic interactions are DEF vs. FBF or other such combinations that result in this pattern. However, the observed pattern may occur as a subset of two defections by Player A followed by two defections by Player B, for which the correct interactions include BU vs. TFT or DES vs. DDC (for detailed strategy categorisation, see S3 Table). This was therefore taken into account in the analysis: where shorter patterns occurred, we verified what longer patterns these could be part of, as well as whether those longer patterns were observed in the data. Both possible combinations of strategies were then considered. In our model, Player A represents Kurdish militias and Player B represents ISIS.

Data selection

In the selection of the geographical and temporal subset of event data to model, it was paramount to have a representative range of variation in time, location and territorial control. Without this, any changes in strategy cannot decisively be attributed to any single one of these factors. The locations with the highest number of recorded events in the ACLED dataset were chosen, as bias or recording errors should be minimised in those with a large amount of data [64]. Table 1 details the 13 locations with 50 or more events for these actors in the Rojava region that are the starting point for the analysis. Raqqa (or Ar-Raqqa), for example, is the city with the highest number of recorded events, at 1,314 out of a total 6,061. This is unsurprising considering the battle of Raqqa, 6 June–17 October 2017, has been one of the most violent events of the conflict [97].

thumbnail
Table 1. Modelled locations.

Summary of the locations modelled in this analysis; these are all the locations with 50 or more events recorded for ISIS and Kurdish forces in the Rojava within the period 1 January 2017–31 December 2019.

https://doi.org/10.1371/journal.pone.0297483.t001

The dataset was broken down into three-month segments for each location to ensure temporal accuracy in the analysis. The unit of analysis for this research was thus the conflict between ISIS and Kurdish militias over the period 1 January 2017–31 December 2019, modelling individual locations over three-month segments. The locations are modelled individually in order to identify local interactions, however when analysing the results we also take these interactions in the context of the wider conflict, and not as isolated battles or events. Due to the Covid-19 pandemic, events after 31 December 2019 were not considered as we expect a disruption in the recording of events.

As mentioned above, the ACLED dataset does contain a certain amount of urban bias [76]—this is relevant in our case, as ten out of the thirteen locations modelled were urban areas (Table 1). However, events with a higher number of observers tend to have lower reporting inaccuracies [65], indicating that data from urban centres may be of higher quality. Moreover, locations with fewer recorded events are more likely to be underreported on, thus omitting relevant events. This would lead to the incorrect coding of certain periods as peaceful, leading to a measurement error [79]. Having said this, the comparison with news coverage mentioned above did not reveal any significant underreporting in rural areas.

Most of the modelled locations are on the banks of the Euphrates. This is not surprising, as much of Rojava’s strategic importance lies in its wealth in water [98], leading to the banks of the river having become a locus of the fighting. Nevertheless, these locations do present geographical diversity and thus allow for variation in the analysis.

As the event data records all political conflict, numerous actors that are not being considered in this research were recorded, including some categorised as Unidentified Military Forces. Since we focused on the Kurdish-ISIS conflict, these were discarded when it came to modelling the data.

Results

Strategy categorisation

In order to identify the strategic interactions between actors in the Kurdish-ISIS conflict in Rojava, each strategy was played against all others and itself (S1 and S2 Tables, S2 Appendix). The shortest repeated pattern of minimum length 3 for the resulting interactions were first categorised (S3 Table). For instance, playing TFT against ALT would result in a pattern of alternating defection, whereas the outcome of ALT against DEF would be a defection by Player A for every two by Player B. These interactions are visualised in Fig 1, to show the strategy combinations that result from more offensive or defensive actors: taking Player A, a blue square represents a defensive strategy as all defections/attacks are carried out by Player B. For instance, DEF and HTFT are generally offensive strategies no matter what they are playing against; conversely, COP, TF2T and WL are generally defensive strategies.

thumbnail
Fig 1. Visualised strategy categorisation.

Illustrates the proportion of attacks carried out by Player A. A red square represents an offensive strategy as all defections/attacks are carried out by Player A, whereas a blue square represents a defensive strategy as all defections/attacks are carried out by Player B. A white square denoted sustained cooperation from both players.

https://doi.org/10.1371/journal.pone.0297483.g001

The resulting patterns of defection were then mapped onto the event data for Rojava through a method of string-matching to identify recurring strategic interactions. That is to say, we categorised the resulting patterns of defection from playing these strategies against each other, then identified which of these patterns were present in the events dataset. Player A and B were substituted for actors in the conflict, allowing us to track strategic interactions recorded in the ACLED event data. Several strategy combinations may result in the same pattern of defection; it is therefore not possible to identify distinct strategies using ACLED data. Instead, we identify the combinations of strategies that could result in a given observed emerging pattern. We take Player A to be Kurdish forces, and Player B as ISIS; we may observe for instance a pattern where every three attacks by Kurdish forces in a certain location are followed by an ISIS attack, represented below as 3:1 (Kurdish). Note that this does not refer only to the proportion of attacks carried out by each side, specifically that every three Kurdish attacks are followed by an ISIS attack. This pattern in particular was observed in Raqqa, particularly over the period January–September 2017 and again towards the end of 2019. As mentioned, the observed pattern may be the result of a number of strategy combinations. A pattern of three defections by Player A followed by one by Player B could be the outcome of combinations such as DEF vs. CCD or HTFT vs. HL.

Modelling results

Locations with 50 or more events recorded for ISIS and Kurdish forces in the Rojava region were modelled—these locations are presented in Table 1, showing the wide variation in the number of events recorded. This variation restricted the choice and thus the geographical variation in the model. For those with fewer events, it was not possible to model the strategies for each segment of time, placing further constraints on the conclusions that can assertively be drawn from the data. While it is clear that some locations have experienced a higher number of events compared to others, the numbers below likely do not accurately reflect the total number of violent events in each location.

ACLED categorises entries into Battles, Explosions/Remote violence, Protests, Riots, Strategic Developments and Violence Against Civilians. Only those pertaining to conflict were relevant to this paper, in particular Battles and Explosions/Remote violence. They are defined respectively as “violent interactions between two organised armed groups” and “one-sided violence events in which the tool for engaging in conflict creates asymmetry by taking away the ability of the target to respond” [99]. These two event types were first mapped to identify any geographical clustering; both display a relatively homogeneous spread of events. Events classed under Violence Against Civilians were excluded as we cannot assertively situate these events within the present conflict; however, in so doing some relevant events may have been excluded, both because they may have been misclassified and in reality did involve the actors we are studying, or because this was a strategic action by one of the actors as part of the Rojava conflict.

The count of events did show some variation between event types. While in both cases more events originated from Kurdish forces, the difference is much more marked for battles. 12.4% of battle events have ISIS as the causal actor, compared to 28.3% for remote violence. However, the significantly higher number of events related to Kurdish forces may to some extent be a symptom of underreporting being more marked for ISIS events, as indicated following comparison to news coverage.

Aside from data bias, one of the major limitations of our analysis is the lack of allowance for transnational actors and influence. Although external actors have been heavily involved in the Rojava conflict, this involvement has often been indirect and, therefore, is not reflected in the data. While this does not mean that strategic variations are incorrect, it could lead to external influences not being identified if they are not well documented. Due to these events’ political nature, it is to be expected that a large part of these developments, including arms sales or indirect support, will not be publicly covered. Therefore, while attempts have been made to account for the transnational dynamics of the conflict, some of these impacts will unavoidably be present in the results.

Discussion

In analysing the results of the model, three main factors were considered: temporal variation, geographical variation, and changes in territorial control. Below, the impact of each of these on the behaviour of actors in the Kurdish-ISIS conflict in Rojava in the period 1 January 2017–31 December 2019 is considered, modelled per location and three-month segment.

Geographical variation

The results show some geographical consistency—strategic patterns remain relatively constant within each location. An example is Al-Bukamal, where at least 83% of all interactions per time period consist of the same observed pattern of one-sided violence where all attacks are carried out by Kurdish forces (this can be derived from a number of strategy combinations but require Player B (ISIS) to display no retaliation). The most frequently occurring pattern in all but two locations (Raqqa and Basira) is again one-sided attacks by Kurdish forces, although we do observe some attacks being carried out by ISIS—in this case every four Kurdish attacks are followed by an ISIS one, denoted as 4:1 (Kurdish) (Fig 2—note that proportions add up to more than 1 as one pattern may occur as a subpattern of another). From the strategy categorisation above, the only strategy combination that would result in this pattern is DEF played against CCCD. The reverse can be seen in Basira, where we observe four recorded ISIS conflict events for every one from the Kurdish side; this pattern would result from CCCD played against DEF. Notably, neither of these strategies take into account the other player’s actions in determining their own behaviour—the frequency of their defection is constant regardless of their opponent’s behaviour. This may point to attacks being carried out less as a reactionary move and more as part of an overarching strategy.

thumbnail
Fig 2. Recurring patterns per location.

Data source: [100]. 4:1 (Kurdish) denotes that the recurring pattern observed consists of four conflict events carried out by Kurdish forces for every one carried out by ISIS. One-sided violence corresponds to the repeated pattern of shortest length three of attacks carried out by the same side. For detailed strategy categorisation, see S1 Table.

https://doi.org/10.1371/journal.pone.0297483.g002

Punctuated violent outbursts occur in a number of locations, including Sosa and Al-Mayadin, where other periods lack sufficient data for the behaviour to be modelled. However, those phases that we can model present homogeneity in terms of observed patterns, indicating geographical consistency in strategies.

Contextualising each location within the conflict is essential; individual battles are often part of a larger offensive and thus cannot be taken in isolation. Kurdish forces pushing the ISIS frontline gradually further south [101] accounts for the geographical clustering of modelled locations along the banks of the Euphrates—the movement of troops would plausibly lead to similar strategic interactions in these locations sequentially. The data reflects precisely this phenomenon: the observed patterns are very similar across these locations, primarily made up of short stints of one-sided violence, but they occur at different times. As Kurdish militias advance southwards towards Bahguz, a surge in violence can be observed in Hajin from early 2018. This is accompanied by smaller outbursts first in Shafa and then Sosa and Bahguz towards the end of 2018 and beginning of 2019 (Fig 3). We then cannot identify geography as the causal factor in this case, as the movement of troops is crucial to these developments. Changing territorial control and moving frontlines are both dictated by geography and more accurately account for the outbursts of violence.

thumbnail
Fig 3. Recorded events: Approach on Bahguz.

Data source: [100]. Number of recorded events per location in the time preceding the approach on Bahguz in early 2019. In most of these locations, we observe a change in territorial control from ISIS to Kurdish forces.

https://doi.org/10.1371/journal.pone.0297483.g003

Temporal variation

Temporal variation presents similar limitations to geography; in this case constraints are more marked as there are insufficient events to compare each segment across all locations. The time variable appears less consistent—the strategic interactions do not change over time in the same way across different locations. Raqqa presents a complete reversal of strategies between the two sides within the period studied (Fig 4), although the number of recorded events significantly reduces from late 2017 until the end of the period. Both the reversal of strategies and the reduction in events coincide with the end of the Battle of Raqqa [97]. Shafa presents a similar case, although with considerably less data available. Conversely, the strategic interactions in Al-Bukamal appear to be unaffected by temporal variation (Fig 5). As with geographic variation, this indicates that another variable is at the root of the changes we observe, namely territorial control. Looking at control shifts in Syria over this time period, we can see that passing time directly reflects the loss of territory by ISIS compared to gains on the Kurdish side [102].

thumbnail
Fig 4. Top 3 patterns per quarter: Raqqa.

Data source: [100]. Depicts how many times we observe the three most frequently occurring pattern for each quarter in Raqqa. 4:2 (ISIS) denotes that the recurring pattern observed consists of four conflict events carried out by ISIS for every two carried out by Kurdish forces. One-sided violence corresponds to the repeated pattern of shortest length three of attacks carried out by the same side. For detailed strategy categorisation, see S1 Table.

https://doi.org/10.1371/journal.pone.0297483.g004

thumbnail
Fig 5. Top 3 patterns per quarter: Al-Bukamal.

Data source: [100]. Depicts how many times we observe the three most frequently occurring pattern for each quarter in Al-Bukamal. 4:1 (Kurdish) denotes that the recurring pattern observed consists of four conflict events carried out by Kurdish forces for every one carried out by ISIS. One-sided violence corresponds to the repeated pattern of shortest length three of attacks carried out by the same side. For detailed strategy categorisation, see S1 Table.

https://doi.org/10.1371/journal.pone.0297483.g005

It is not surprising that we see no direct relationship between temporal variation and changes in strategy or observed patterns of interaction, considering no particular stages or clear dynamics have been identified within civil conflict literature. In the Rojava conflict, particularly in the period 2017–2019, the shift of territorial control was primarily in one direction and relatively constant. Therefore, as in this case time is closely related to territorial power shifts, we cannot draw general conclusions from the present model as there is insufficient variation within the data analysed.

Territorial control

Single locations cannot be taken in isolation if we are to understand how this type of modelling can be used to comprehend and potentially forecast changing dynamics. By considering the shifts in territorial control in surrounding areas, we obtain a much clearer idea of how strategic interactions may change in the future. Comparing violent outbursts observed in the modelled data to maps of the changing power structure show that the movement of troops usually goes hand in hand with sequential outbursts of one-sided violence, primarily carried out by said troops. For example, as mentioned, the advance of Kurdish troops mirrors the sequential surges of violence in Shafa, Sosa and Bahguz (shown by the prevalence of the pattern of Kurdish attacks met with no retaliation, and occasionally the contrary)/

The type of actor did not appear to dictate the observed behaviour. As we have seen, a pattern of one-sided Kurdish attacks met with no retaliation can emerge from a number of strategy combinations, although Player B (ISIS) must be following one of the following strategies: TF2T, COP, HL, WL, UC, BU (vice versa for periods of one-sided ISIS attacks). Aside from COP, where Player B always cooperates regardless of the other’s actions, the rest are reactive strategies that respond to the opponent’s prior actions. An actor following the strategy HL will defect only to mutual cooperation, conversely WL employs defection only following mutual defection. Greater data availability could allow for the identification of the individual strategies being followed. In particular, having data for events relating to cooperation would allow for the modelling of both actions in an Iterated Prisoner’s Dilemma, and so a more accurate identification of the strategy combinations. In turn, this could be used to understand what actions might contribute to de-escalation and conflict resolution.

It must be noted that by considering the data in hindsight we run the risk of confirmation bias. Territorial control allows us to estimate an area where an ensuing violent outburst may occur, not necessarily the precise location. A number of other factors need to be taken into account in order to make a more accurate prediction, including the strategic value of surrounding locations, and the positioning of troops. As the period 2017–2019 shows a relatively constant gain in territory by Kurdish forces, it does not allow for the consideration of how strategies would vary was the power balance reversed.

Confirmation bias must also be considered in terms of data reliability. The ACLED dataset is built on news coverage, meaning that events with significant results will have wider coverage, indicating that power shifts may in reality derive more retaliation than suggested by this model as instances where this retaliation fails will garner less news coverage. Whereas individual locations do not display retaliation by ISIS, taking the data as a whole reveals that the proportion of attacks carried out by ISIS increased as they lost control of territory, particularly in 2019 (Fig 6). Therefore, by taking the conflict as a whole it is clear that a shifting power structure alters the strategic interactions between the two sides. The fact that we do not observe this for individual locations may be due to the number of retaliatory events per location being too small to be significant when modelling the data, or to the fact that retaliation may not always take place in the location where attacks or territorial takeover happened. It must be noted that reporting bias may account for some of this increased recording of events. Price, Gohdes and Ball [71] discuss how control over territory impacts the level of documentation of deaths in particular as human rights documentation groups are freer to work in areas under the control of one side of the conflict. Regarding the Syrian case, they “suspect that the relatively lower number of killings reported in regions under Daesh control reflect changes in documentation dynamics, not in conflict dynamics” [71]. The fact that we observe a greater number of ISIS attacks and retaliation as Kurdish forces gain control of more territory may then in part be a result of greater reporting in those areas.

thumbnail
Fig 6. Proportion of total events per actor.

Data source: [100]. Proportion of events recorded by ACLED in the ISIS-Kurdish conflict carried out by each actor in the conflict. As Kurdish forces gain control of territory, particularly towards 2019, we observe a larger proportion of events carried out by ISIS.

https://doi.org/10.1371/journal.pone.0297483.g006

Conclusion

Our model reveals that the proportion of attacks carried out by each side is a more indicative measure of significant changes in the conflict than previously recognised patterns of strategic interaction. This finding challenges conventional approaches in conflict analysis, which often emphasise direct, bilateral engagements and immediate retaliations. Surprisingly, the model uncovers that a large majority of the behaviour consists of periods of one-sided violence, where retaliation, if present, is not immediate. Whilst we may expect one-sided violence due to offensives during the conflict, the low levels of observed retaliation are somewhat surprising.

The lack of immediate retaliation and the prevalence of one-sided violence underscore the complexity of strategy combinations in conflict. These combinations range from non-reactive strategies, where actions are independent of the opponent’s moves, to reactive strategies that are contingent on the opponent’s behaviour. However, the reliance on datasets like ACLED, which primarily record instances of conflict, limits the ability to fully dissect these strategy combinations within the Rojava context. The need for more comprehensive data, particularly encompassing aspects of cooperation and negotiation, is evident to enhance understanding of de-escalation and conflict resolution strategies. Significantly, territorial control emerges as the most critical factor influencing changes in conflict behaviour. This finding suggests that shifts in control of specific locations often precede surges of one-sided violence, challenging the traditional emphasis on temporal and geographical factors in conflict analysis. However, the variance in the intensity of violence required to effect territorial change highlights that locations cannot be viewed in isolation; the broader context is key to understanding these events.

The study also brings into focus the unique nature of the conflict between two non-state actors, diverging from the common focus on state versus non-state interactions in the literature. The interaction between an ethno-nationalist group and a religious fundamentalist group presents distinct strategic behaviours that may not be generalisable across different actor types. This raises intriguing questions about the consistency of strategic behaviour in conflicts involving similar groups and the influence of perceived legitimacy on the likelihood of conflict outbreak and resolution, as suggested by Esteban and Ray [12], and Epstein [44]. The limitations presented by data availability and potential biases are acknowledged, tempering the generalisability of the findings. Despite cross-checking with other sources, data and reporting biases inherent in conflict situations [35, 65, 70] pose challenges to the accuracy and comprehensiveness of the analysis. Consequently, while the model offers valuable insights, its application in forecasting scenarios or generalisation to other conflicts is constrained.

The research presented here not only contributes to the current understanding of civil wars involving non-state actors but also opens several avenues for future research. One potential area is the exploration of similar dyadic interactions in different geopolitical contexts, which could reveal whether the strategic behaviours observed in the Kurdish-ISIS conflict are unique or if they exhibit universal patterns across non-state conflicts. Additionally, extending the model to include multi-party conflicts could offer insights into the complexities of larger scale civil wars, where alliances shift and multiple objectives intersect. Another promising direction is the integration of more granular, real-time data, especially encompassing aspects of negotiation and cooperation, to provide a more comprehensive picture of conflict dynamics. This could lead to the development of more sophisticated predictive models for conflict resolution and peacekeeping efforts. Furthermore, comparative studies of conflicts involving state versus non-state actors, or different types of non-state actors, could deepen our understanding of how ideological and organisational structures influence strategic decisions in conflicts. Finally, exploring the application of this modelling approach to post-conflict scenarios could yield valuable insights into the long-term effects of conflict on societal structures and the potential pathways to sustainable peace.

Supporting information

S1 Table. Game theory strategies from the literature [96].

https://doi.org/10.1371/journal.pone.0297483.s001

(PDF)

S2 Table. Additional game theory strategies.

https://doi.org/10.1371/journal.pone.0297483.s002

(PDF)

S3 Table. Strategy categorisation.

Resulting patterns of defection after playing strategies against all others and itself in an Iterated Prisoner’s Dilemma game using the Axelrod library.

https://doi.org/10.1371/journal.pone.0297483.s003

(PDF)

Acknowledgments

The authors would like to thank Clare Lewis and Nils Metternich for their valuable suggestions and comments on this work.

References

  1. 1. Kalyvas S. Civil Wars. In: Boix C, Stokes S, editors. The Oxford Handbook of Comparative Politics. Oxford: Oxford University Press; 2007. p. 416–434.
  2. 2. Valentino B, Huth P, Balch-Lindsay D. “Draining the Sea”: Mass Killing and Guerrilla Warfare. International Organization. 2004;58(2):375–407.
  3. 3. Masad D. Agents in Conflict: Comparative Agent-Based Modeling of International Crises and Conflicts [Ph.D. thesis]. George Mason University. Fairfax, VA; 2016.
  4. 4. Sambanis N. Do Ethnic and Nonethnic Civil Wars Have the Same Causes?: A Theoretical and Empirical Inquiry (Part 1). Journal of Conflict Resolution. 2001;45(3):259–282.
  5. 5. Garfinkel M, Skaperdas S. Economics of Conflict: An Overview. In: Sandler T, Hartley K, editors. Handbook of Defense Economics: Volume 2: Defense in a Globalized World. Oxford: Elsevier; 2007. p. 649–709.
  6. 6. Fearon JD. Economic development, insurgency, and civil war. Institutions and Economic Performance. 2008; p. 292–328.
  7. 7. Caselli F, Coleman WJ. On the Theory of Ethnic Conflict. Journal of the European Economic Association. 2013;11(1):161–192.
  8. 8. Condra L, Shapiro J. Who Takes the Blame? The Strategic Effects of Collateral Damage. American Journal of Political Science. 2012;56(1):167–187.
  9. 9. Kalyvas S. The Logic of Violence in Civil War. Cambridge: Cambridge University Press; 2006.
  10. 10. Weinstein J. Inside Rebellion: The Politics of Insurgent Violence. Cambridge: Cambridge University Press; 2007.
  11. 11. Christia F. Alliance Formation in Civil Wars. Cambridge: Cambridge University Press; 2012.
  12. 12. Esteban J, Ray D. On the Salience of Ethnic Conflict. American Economic Review. 2008;98(5):2185–2202.
  13. 13. Steinwand MC, Metternich NW. Who Joins and Who Fights? Explaining Tacit Coalition Behavior among Civil War Actors. International Studies Quarterly. 2022;66(4).
  14. 14. Gade EK, Gabbay M, Hafez MM, Kelly Z. Networks of Cooperation: Rebel Alliances in Fragmented Civil Wars. Journal of Conflict Resolution. 2019;63(9):2071–2097.
  15. 15. Kausch K. State and Non-State Alliances in the Middle East. The International Spectator. 2017;52(3):36–47.
  16. 16. Schmidinger T. Rojava: Revolution, War and the Future of Syria’s Kurds. London: Pluto Press; 2018.
  17. 17. Berman E, Lake D. Proxy Wars: Suppressing Violence through Local Agents. Ithaca: Cornell University Press; 2019. Available from: http://www.jstor.org/stable/10.7591/j.ctvvndp0.
  18. 18. Groh T. Proxy War: The Least Bad Option. Palo Alto: Stanford University Press.; 2019.
  19. 19. Gleditsch K. Transnational Dimensions of Civil War. Journal of Peace Research. 2007;44(3):293–309.
  20. 20. Checkel J. Transnational Dynamics of Civil War. In: Checkel J, editor. Transnational Dynamics of Civil War. Cambridge: Cambridge University Press; 2013. p. 3–28.
  21. 21. Oktav O, Parlar Dal E, Kurşun A. Reframing and Reassessing the VNSAs in Syrian Conflict: An Introduction. In: Oktav O, Parlar Dal E, Kurşun A, editors. Violent non-state actors and the Syrian Civil War: The ISIS and YPG cases. Springer; 2018. p. 1–34.
  22. 22. Ünver HA. Contested Geographies: How ISIS and YPG Rule “No-Go” Areas in Northern Syria. In: Oktav O, Parlar Dal E, Kurşun A, editors. Violent non-state actors and the Syrian Civil War: The ISIS and YPG cases. Springer; 2018. p. 1–34.
  23. 23. Schwab R. Escalate or Negotiate? Constraint and Rebel Strategic Choices Towards Rivals in the Syrian Civil War. Terrorism and Political Violence. 2023;35(4):1007–1026.
  24. 24. Pischedda C. Wars within Wars: Why Windows of Opportunity and Vulnerability Cause Inter-rebel Fighting in Internal Conflicts. International Security. 2018;43:138–176.
  25. 25. Schulhofer-Wohl J. On-Side fighting in civil war: The logic of mortal alignment in Syria. Rationality and Society. 2020;32(4):402–460.
  26. 26. van Wilgenburg W, Fumerton M. From the PYD-YPG to the SDF: the Consolidation of Power in Kurdish-Controlled Northeast Syria. Studies in Conflict & Terrorism. 2022;0(0):1–20.
  27. 27. Yeşiltaş M, Karakuş M. The Logic of Non-State Armed Groups Survival in Syria: A Contemporary Framework of Analysis. Studies in Conflict & Terrorism. 2022;0(0):1–26.
  28. 28. Deutschmann E, Lorenz J, Nardin L, Natalini D, Wilhelm A. Computational Conflict Research. Cham: Springer; 2020.
  29. 29. Bennett A. Causal Mechanisms and Typological Theories in the Study of Civil Conflict. In: Checkel J, editor. Transnational Dynamics of Civil War. Cambridge: Cambridge University Press; 2013. p. 205–230.
  30. 30. Buhaug H, Cederman LE, Gleditsch KS. Square Pegs in Round Holes: Inequalities, Grievances, and Civil War. International Studies Quarterly. 2014;58(2):418–431.
  31. 31. Bartusevičius H, Gleditsch KS. A Two-Stage Approach to Civil Conflict: Contested Incompatibilities and Armed Violence. International Organization. 2019;73(1):225–248.
  32. 32. Raleigh C, Hegre H. Population size, concentration, and civil war. A geographically disaggregated analysis. Political Geography. 2009;28(4):224–238.
  33. 33. Chiba D, Gleditsch KS. The shape of things to come? Expanding the inequality and grievance model for civil war forecasts with event data. Journal of Peace Research. 2017;54(2):275–297.
  34. 34. Ward M, Metternich N, Dorff C, Gallop M, Hollenbach F, Schultz A, et al. Learning from the Past and Stepping into the Future: Toward a New Generation of Conflict Prediction. International Studies Review. 2013;15(4):473–490.
  35. 35. Zammit-Mangion A, Dewar M, Kadirkamanathan V, Sanguinetti G. Point process modelling of the Afghan War Diary. Proceedings of the National Academy of Sciences. 2012;109(31):12414–12419. pmid:22802667
  36. 36. Schutte S. Regions at Risk: Predicting Conflict Zones in African Insurgencies. Political Science Research and Methods. 2017;5(3):447–465.
  37. 37. Schrodt PA. Pattern Recognition of International Crises Using Hidden Markov Models. In: Richards D, editor. Political Complexity: Nonlinear Models of Politics. Michigan: University of Michigan Press; 2000. p. 296–328.
  38. 38. de Mesquita BB. Game Theory, Political Economy, and the Evolving Study of War and Peace. American Political Science Review. 2006;100(4):637–642.
  39. 39. Owsiak AP, Vasquez JA. Peaceful dyads: A territorial perspective. International Interactions. 2021;47(6):1040–1068.
  40. 40. Vasquez JA. Mapping the Probability of War and Analyzing the Possibility of Peace: the Role of Territorial Disputes. Conflict Management and Peace Science. 2001;18(2):145–173.
  41. 41. Goldstein JS, Pevehouse JC, Gerner DJ, Telhami S. Reciprocity, Triangularity, and Cooperation in the Middle East, 1979-97. The Journal of Conflict Resolution. 2001;45(5):594–620.
  42. 42. Goldstein JS, Pevehouse JC. Reciprocity, Bullying, and International Cooperation: Time-series Analysis of the Bosnia Conflict. American Political Science Review. 1997;91(3):515–529.
  43. 43. Goldstein JS, Freeman JR. U.S.-Soviet-Chinese Relations: Routine, Reciprocity, or Rational Expectations? The American Political Science Review. 1991;85(1):17–35.
  44. 44. Epstein J. Modeling civil violence: An agent-based computational approach. Proceedings of the National Academy of Sciences. 2002;99(Supplement 3):7243–7250. pmid:11997450
  45. 45. Hoffmann M. Self-Organized Criticality and Norm Avalanches. Proceedings of the Symposium on Normative Multi-Agent Systems. 2005; p. 117–125.
  46. 46. Rouleau M. A Computational Theory of Endogenous Norm Change: The NormSim Agent-Based Model in MASON [Ph.D. thesis]. George Mason University. Fairfax, VA; 2011.
  47. 47. Taylor G, Bechtel R, Knudsen K, Waltz E. PSTK: A Toolkit for Modeling Dynamic Power Structures. Soar Technology, Inc. 2008;.
  48. 48. Bhavnani R, Donnay K, Miodownik D, Mor M, Helbing D. Group Segregation and Urban Violence. American Journal of Political Science. 2014;58(1):226–245.
  49. 49. Mueller H, Rohner D, Schönholzer D. Ethnic Violence Across Space. The Economic Journal. 2021;132(642):709–740.
  50. 50. Schutte S, Donnay K. Matched wake analysis: Finding causal relationships in spatiotemporal event data. Political Geography. 2014;41:1–10.
  51. 51. Cederman LE, Gleditsch KS, Buhaug H. Inequality, Grievances, and Civil War. Cambridge Studies in Contentious Politics. Cambridge University Press; 2013.
  52. 52. Axelrod R, Bennett DS. A Landscape Theory of Aggregation. British Journal of Political Science. 1993;23(2):211–233.
  53. 53. Turchin P, Gavrilets S, Goldstone JA. Linking “Micro” to “Macro” Models of State Breakdown to Improve Methods for Political Forecasting. Cliodynamics. 2017;8:159–181.
  54. 54. Axtell RL, Epstein JM, Young HP. The Emergence of Classes in a Multi-Agent Bargaining Model. In: Social Dynamics. The MIT Press; 2001.
  55. 55. Weidmann NB, Salehyan I. Violence and Ethnic Segregation: A Computational Model Applied to Baghdad1. International Studies Quarterly. 2013;57(1):52–64.
  56. 56. Weidmann NB, Cederman LE. GeoContest: Modeling Strategic Competition in Geopolitical Systems. Social Science Computer Review. 2008;26(4):510–518.
  57. 57. Moro A. Understanding the Dynamics of Violent Political Revolutions in an Agent-Based Framework. PLOS ONE. 2016;4:1–17.
  58. 58. Suleimenova D, Bell D, Groen D. Towards an automated framework for agent-based simulation of refugee movements. In: 2017 Winter Simulation Conference (WSC); 2017. p. 1240–1251.
  59. 59. Bruch E, Atwell J. Agent-Based Models in Empirical Social Research. Sociological Methods & Research. 2015;44(2):186–221. pmid:25983351
  60. 60. Fjelde H, Hultman L. Weakening the Enemy: A Disaggregated Study of Violence against Civilians in Africa. The Journal of Conflict Resolution. 2014;58(7):1230–1257.
  61. 61. Sleiman-Haidar R. The Importance of Rojava–North Syria For The PKK; 2016. https://blogs.lse.ac.uk/mec/2016/08/31/the-importance-of-rojava-north-syria-for-the-pkk/.
  62. 62. Ünver HA. Schrödinger’s Kurds: Transnational Kurdish geopolitics in the age of shifting borders. Journal of international affairs. 2016;69:65–98.
  63. 63. Salehyan I. Best practices in the collection of conflict data. Journal of Peace Research. 2015;52(1):105–109.
  64. 64. Donnay K, Filimonov V. Views to a war: systematic differences in media and military reporting of the war in Iraq. EPJ Data Science. 2014;3(25):1–29.
  65. 65. Weidmann N. On the Accuracy of Media-based Conflict Event Data. Journal of Conflict Resolution. 2015;59(6):1129–1149.
  66. 66. Gibler D, Miller S. External territorial threat, state capacity, and civil war. Journal of Peace Research. 2014;51(5):634–646.
  67. 67. Backer D, Huth P. The Peace and Conflict Instability Ledger: Ranking States on Future Risks. In: Backer D B R, Huth P, editors. Peace and Conflict 2016. London: Routledge; 2016. p. 25–41.
  68. 68. Raleigh C. Pragmatic and Promiscuous. Journal of Conflict Resolution. 2014;60(2):283–310.
  69. 69. Kishi R, Raleigh C, Linke A. Patterns and Trends of the Geography of Conflict. In: Backer D, Bhavnani R, Huth P, editors. Peace and Conflict 2016. London: Routledge; 2016. p. 25–41.
  70. 70. Wigmore-Shepherd D. Reporting Sources: ACLED Working Paper no. 5. Armed Conflict Location and Event Data Project. 2015;.
  71. 71. Price M, Gohdes A, Ball P. Documents of war: Understanding the Syrian conflict. Significance. 2015;12(2):14–19.
  72. 72. Davenport C. Media Bias, Perspective, And State Repression: The Black Panther Party. Cambridge: Cambridge University Press; 2012.
  73. 73. Armed Conflict Location & Event Data Project (ACLED). Syria Partner Network; 2021. https://acleddata.com/syria-partner-network/.
  74. 74. Woolley J. Using Media-Based Data in Studies of Politicsa. American Journal of Political Science. 2000;44(1):156.
  75. 75. Kalyvas S. The Urban Bias in Research on Civil Wars. Security Studies. 2004;13(3):160–190.
  76. 76. Eck K. In data we trust? A comparison of UCDP GED and ACLED conflict events datasets. Cooperation and Conflict. 2012;47(1):124–141.
  77. 77. Croicu M, Sundberg R. UCDP Georeferenced Event Dataset Codebook Version 18.1. Journal of Peace Research. 2018;50(4):523–532.
  78. 78. The Carter Center. Weekly Conflict Summary. Atlanta: The Carter Center; 2016.
  79. 79. Weidmann N. A Closer Look at Reporting Bias in Conflict Event Data. American Journal of Political Science. 2016;60(1):206–218.
  80. 80. Pierskalla J, Hollenbach F. Technology and Collective Action: The Effect of Cell Phone Coverage on Political Violence in Africa. American Political Science Review. 2013;107(2):207–224.
  81. 81. Axelrod RM. The Evolution of Cooperation. New York: Basic Books; 1984. Available from: https://books.google.co.uk/books?id=NJZBCGbNs98C.
  82. 82. Smith R, Sola M, Spagnolo F. The Prisoner’s Dilemma and Regime-Switching in the Greek-Turkish Arms Race. Journal of Peace Research. 2000;37(6):737–750.
  83. 83. Lumsden M. The Cyprus Conflict as a Prisoner’s Dilemma Game. The Journal of Conflict Resolution. 1973;17(1):7–32.
  84. 84. Mosher JS. Speed of retaliation and international cooperation. Journal of Peace Research. 2015;52(4):522–535.
  85. 85. Walter BF. The Critical Barrier to Civil War Settlement. International Organization. 1997;51(3):335–364.
  86. 86. Fearon JD. Why Do Some Civil Wars Last So Much Longer than Others? Journal of Peace Research. 2004;41(3):275–301.
  87. 87. Amegashie JA, Runkel M. The Paradox of Revenge in Conflicts. Journal of Conflict Resolution. 2012;56(2):313–330.
  88. 88. Maynard Smith J. Evolution and the Theory of Games. Cambridge University Press; 1982.
  89. 89. Clare J. Hawks, Doves, and International Cooperation. Journal of Conflict Resolution. 2014;58(7):1311–1337.
  90. 90. Cohen S. Doves Among Hawks: Struggles of the Israeli Peace Movements. Oxford University Press; 2019. Available from: https://doi.org/10.1093/oso/9780190947903.001.0001.
  91. 91. Musa SME. Hawks and Doves in Sudan’s Armed Conflict: Al-Hakkamat Baggara Women of Darfur. Boydell & Brewer; 2018. Available from: http://www.jstor.org/stable/10.7722/j.ctt1wx92h2.
  92. 92. Simon MV. Hawks, doves, and civil conflict dynamics: A “strategic” action‐reaction model. International Interactions. 1994;19(3):213–239.
  93. 93. Mattes M, Weeks JLP. Hawks, Doves, and Peace: An Experimental Approach. American Journal of Political Science. 2019;63(1):53–66.
  94. 94. Stewart A, Plotkin J. Extortion and cooperation in the Prisoner’s Dilemma. Proceedings of the National Academy of Sciences. 2012;109(26):10134–10135. pmid:22711812
  95. 95. Press W, Dyson F. Iterated Prisoner’s Dilemma contains strategies that dominate any evolutionary opponent. Proceedings of the National Academy of Sciences. 2012;109(26):10409–10413. pmid:22615375
  96. 96. Knight V, Campbell O, Harper M, Langner K, Campbell J, Campbell T, et al. An Open Framework for the Reproducible Study of the Iterated Prisoner’s Dilemma. Journal of Open Research Software. 2016;4:1–11.
  97. 97. Human Rights Watch. What Next For Raqqa?; 2017. https://www.hrw.org/news/2017/10/18/what-next-raqqa.
  98. 98. Knapp M, Flach A, Ayboga E. Revolution in Rojava. London: Pluto Press; 2016.
  99. 99. Armed Conflict Location & Event Data Project (ACLED). Armed Conflict Location & Event Data Project (ACLED): User Quick Guide. Armed Conflict Location & Event Data Project (ACLED); 2019.
  100. 100. Armed Conflict Location & Event Data Project (ACLED). Data Export Tool; 2020. https://acleddata.com/data-export-tool/.
  101. 101. Yacoubian M. Syria Timeline: Since the Uprising Against Assad; 2019. https://www.usip.org/publications/2019/07/syria-timeline-uprising-against-assad.
  102. 102. Bhatia G, Ovaska M, Scarr S. How Islamic State Lost Syria.; 2019. https://graphics.reuters.com/MIDEAST-CRISIS-ISLAMIC%20STATE/0100913M1H0/index.html.