Methodology
Procedure
The method of performing an ICMA can be described in a five-step process: # Exhaustively identify all versions of a hadith across hadith collections. # Construct a diagram to visualize the transmission process based on the reported isnads. Identify Common Links and Partial Common Links. # Inspect whether the Common Link is authentic. This is done by performing an extensive synoptic comparison between the texts of each version of a report and how their vary. # Having completed this comparison and identified the variants, attempt to identify a correlation across the variants in the texts and the chains of transmission. # If (4) is successful in establishing a correlation, the original wording of the report may be possible to reconstruct. Detailed criteria have been proposed by some authors with respect to this reconstruction effort. Once this is done, the original version can be compared to the versions of the report that emerged across different subsequent transmitters to see who introduced which variants into the report.Falsifiability
An important consideration among several historians has been how to validate or inspect the falsifiability of approaches based on ICMA. This would entail comparing the outcome of an ICMA analysis with an independent analysis of the history of the same tradition where high confidence can be placed in the timing of its origins and/or development.Limitations
The method has several limitations, aside from the time-consuming process of conducting the ICMA itself. First, to produce the most reliable results, a tradition needs to have a large number of versions transmitted across many authorities. This requirement excludes the majority of hadith from being amenable to ICMA. Second, while the presence of variation in wording is important to conducting an ICMA, the "original" wording often cannot be entirely reconstructed in light of the variation. Third, hadith subject to ICMA analysis are still dated no earlier than sixty (or more) years after the events that they describe, usually from the Marwanid period onwards. The first Islamic century typically only reflects single strands of transmission, and common links occur more commonly among transmitters belonging to the third or fourth generation of Muslims. For this reason, ICMA only narrows the time gap between the events in question and when a narration entered into circulation. ICMA, by itself, cannot date traditions found in multiple sources earlier than their common link; it also remains controversial as to whether the common link should be seen as the origins of a tradition, and if not, how the version of the tradition in the common link should be related to prior versions of the tradition. Fourth, though the transmission up to a certain point can be verified using ICMA, the historicity of the narration in question cannot.Application
ICMA has been applied across a large number of hadith reports and traditions, including on traditions concerning the annexation of Damascus, the Raid of Hudhayl, the torture of ʿAmmār b. Yāsir, the letters ofHistory of scholarship
Background and common-link theory
Common-link theory is an approach in hadith studies which seeks to identify the origins or earlier versions of hadith by comparing reports that have the same content (matn) but have different chains of transmission (isnads). If the chains of transmission converge on a single figure, then that figure may be taken as the original collector of fabricator of the tradition, depending on one's approach or conclusion. Common-link theory originated in the works ofInvention
ICMA was invented twice independently in two publications that came out in 1996, one by Harald Motzki (in an article where the name of the method was given) and the other by Schoeler. The primary advocate of ICMA in the initial stages of the development and application of the method was Motkzi; Motzki believed that the oral transmission of hadith would result in a progressive divergence of multiple versions of the same original report along different lines of transmitters. By comparing them to pinpoint shared wording, motifs and plots, the original version of a hadith that existed prior to the accrual of variants among different transmitters may be reconstructed. In addition, Motzki believed that a comparative study of the differences between reports could enable the identification of particular manipulations and other alterations.Terminology
The following list of terminology was largely developed by G.H.A. Juynboll and is taken from Little 2022. strand = a segment of isnād, of any length ''isnād'' bundle = a network of multiple, intersecting isnāds (which emerges or becomes visible when all of the isnāds for a given hadith are overlaid against each other) single strand (SS) = a segment of an isnād that comprises a succession of individuals, or in other words: an isnād in which one tradent transmitted to only one other, etc. key figure = any converged-upon tradent in an isnād bundle (i.e., a PCL, SPCL, CL, (S)CL, SCL, or spider) partial common link (PCL) = a tradent who is converged upon by at least three non-SSs (i.e., direct collectors and/or other PCLs) (seeming) partial common link ((S)PCL) = a tradent who is converged upon by only two non-SSs (i.e., direct collectors and/or other PCLs) seeming partial common link (SPCL) = a tradent who is converged upon by a single non-SS (i.e., a direct collector or another PCL) and otherwise only SSs common link (CL) = the earliest of those who are converged upon by PCLs when said PCLs are three or more in number (seeming) common link ((S)CL) = the earliest of the tradents who are directly converged upon by PCLs, when said PCLs are only two in number seeming common link (SCL) = the earliest of the tradents who are directly converged upon by PCLs, when said PCLs are only one in number and corroborated (in their transmission from the SCL) only by SSs inverted common link (ICL) = a CL who cites a collective isnād or multiple strands as their source(s), such that they appear as a bottleneck in the overall isnād bundle. dive = a (secondary, false) SS that specifically circumvents (i.e., “dives around”) a PCL or CL. spider = a network that converges upon a false CL Since Juynboll, additional terms have been added by some historians to the repertoire: key figure = a broader term referring to a CL, PCL, SCL, or SPCLSee also
*References
Citations
Sources
* * * * * * * * * * * * * * * * * * * * {{Cite book , last=Van Ess , first=Josef , title=Zwischen Ḥadīṯ und Theologie , date=1975 , publisher=De Gruyter Hadith Hadith studies