Deterrence & influence in counterterrorism : : a component in the war on al Qaeda / / Paul K. Davis, Brian Michael Jenkins.
Historical experience has shown that successful strategies to combat terrorism that is spawned by serious, deep-rooted problems have involved first crushing the current threat and then bringing about changes to make terrorism?s reemergence less likely. While deterrence of terrorism may at first gla...
Saved in:
: | |
---|---|
Year of Publication: | 2002 |
Edition: | 1st ed. |
Language: | English |
Physical Description: | 1 online resource (107 p.) |
Notes: | Description based upon print version of record. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993628433904498 |
---|---|
ctrlnum |
(CKB)111087028057498 (EBL)202776 (OCoLC)52732839 (SSID)ssj0000137622 (PQKBManifestationID)11162952 (PQKBTitleCode)TC0000137622 (PQKBWorkID)10097058 (PQKB)11337802 (Au-PeEL)EBL202776 (CaPaEBR)ebr10056221 (MiAaPQ)EBC202776 (EXLCZ)99111087028057498 |
collection |
bib_alma |
record_format |
marc |
spelling |
Davis, Paul K., 1943- Deterrence & influence in counterterrorism : a component in the war on al Qaeda / Paul K. Davis, Brian Michael Jenkins. Deterrence and influence in counterterrorism 1st ed. Santa Monica, CA : Rand, c2002. 1 online resource (107 p.) text txt computer c online resource cr Description based upon print version of record. PREFACE; CONTENTS; FIGURES AND TABLES; SUMMARY; ACKNOWLEDGMENTS; Chapter One INTRODUCTION; OBJECTIVES; APPROACH; Chapter Two BACKGROUND: WHY DETERRING TERRORISTS IS SO DIFFICULT; OVERVIEW; OBSTACLES TO DETERRENCE; Chapter Three PRINCIPLES FOR INFLUENCING TERRORISTS; GOING BEYOND DETERRENCE; VIEWING TERRORIST ORGANIZATIONS AS COMPLEX ADAPTIVE SYSTEMS; FINDING SITUATIONS WHERE INFLUENCING EFFORTS MAY WORK; CONDUCTING A BROAD-FRONT STRATEGY; DEVELOPING A PERSUASIVE, HIGH-MINDED STRATEGY; Chapter Four BROAD ISSUES OF STRATEGY; ORCHESTRATING A BROAD-FRONT STRATEGY THE STRATEGIC SIGNIFICANCE OF EFFICIENCY, EVEN IN WARA PARADIGM FOR DEFENSE; Chapter Five SOME CONTROVERSIAL ISSUES; DETERRING ACQUISITION AND USE OF WEAPONS OF MASS DESTRUCTION; POLITICAL WARFARE: THE NEGLECTED COMPONENT OF ANTITERRORISM STRATEGY; PUTTING AT RISK WHAT THE TERRORISTS HOLD DEAR; CHALLENGES IN U.S.-SAUDI RELATIONS; THE PAKISTAN PROBLEM; BALANCING INTERESTS: REALPOLITIK VERSUS IDEALISM; UPHOLDING AMERICAN VALUES IN THE WAR AGAINST AL QAEDA; Chapter Six CONCLUSIONS AND RECOMMENDATIONS; THE STORY IN BRIEF; NEXT STEPS FOR RESEARCH; Appendix A COLD WAR CONCEPTS OF DETERRENCE Appendix B SELECTED DEFINITIONSAppendix C METHODS FOR ANALYZING COUNTERTERRORISM IN A COMPLEX ADAPTIVE SYSTEM; Appendix D ADAPTING THE CONSTRUCTS OF EFFECTS-BASED PLANNING; BIBLIOGRAPHY; ABOUT THE AUTHORS Historical experience has shown that successful strategies to combat terrorism that is spawned by serious, deep-rooted problems have involved first crushing the current threat and then bringing about changes to make terrorism?s reemergence less likely. While deterrence of terrorism may at first glance seem to be an unrealistic goal?concepts such as co-optation and inducement cannot be expected to be effective for dealing with terrorists who have the unshakable commitment of an Osama bin Laden?it may be possible to influence some members of terrorist groups. Such groups are not simply single English Includes bibliographical references. Terrorism Prevention. September 11 Terrorist Attacks, 2001. Qaida (Organization) 0-8330-3286-0 |
language |
English |
format |
eBook |
author |
Davis, Paul K., 1943- |
spellingShingle |
Davis, Paul K., 1943- Deterrence & influence in counterterrorism : a component in the war on al Qaeda / PREFACE; CONTENTS; FIGURES AND TABLES; SUMMARY; ACKNOWLEDGMENTS; Chapter One INTRODUCTION; OBJECTIVES; APPROACH; Chapter Two BACKGROUND: WHY DETERRING TERRORISTS IS SO DIFFICULT; OVERVIEW; OBSTACLES TO DETERRENCE; Chapter Three PRINCIPLES FOR INFLUENCING TERRORISTS; GOING BEYOND DETERRENCE; VIEWING TERRORIST ORGANIZATIONS AS COMPLEX ADAPTIVE SYSTEMS; FINDING SITUATIONS WHERE INFLUENCING EFFORTS MAY WORK; CONDUCTING A BROAD-FRONT STRATEGY; DEVELOPING A PERSUASIVE, HIGH-MINDED STRATEGY; Chapter Four BROAD ISSUES OF STRATEGY; ORCHESTRATING A BROAD-FRONT STRATEGY THE STRATEGIC SIGNIFICANCE OF EFFICIENCY, EVEN IN WARA PARADIGM FOR DEFENSE; Chapter Five SOME CONTROVERSIAL ISSUES; DETERRING ACQUISITION AND USE OF WEAPONS OF MASS DESTRUCTION; POLITICAL WARFARE: THE NEGLECTED COMPONENT OF ANTITERRORISM STRATEGY; PUTTING AT RISK WHAT THE TERRORISTS HOLD DEAR; CHALLENGES IN U.S.-SAUDI RELATIONS; THE PAKISTAN PROBLEM; BALANCING INTERESTS: REALPOLITIK VERSUS IDEALISM; UPHOLDING AMERICAN VALUES IN THE WAR AGAINST AL QAEDA; Chapter Six CONCLUSIONS AND RECOMMENDATIONS; THE STORY IN BRIEF; NEXT STEPS FOR RESEARCH; Appendix A COLD WAR CONCEPTS OF DETERRENCE Appendix B SELECTED DEFINITIONSAppendix C METHODS FOR ANALYZING COUNTERTERRORISM IN A COMPLEX ADAPTIVE SYSTEM; Appendix D ADAPTING THE CONSTRUCTS OF EFFECTS-BASED PLANNING; BIBLIOGRAPHY; ABOUT THE AUTHORS |
author_facet |
Davis, Paul K., 1943- |
author_variant |
p k d pk pkd |
author_sort |
Davis, Paul K., 1943- |
title |
Deterrence & influence in counterterrorism : a component in the war on al Qaeda / |
title_sub |
a component in the war on al Qaeda / |
title_full |
Deterrence & influence in counterterrorism : a component in the war on al Qaeda / Paul K. Davis, Brian Michael Jenkins. |
title_fullStr |
Deterrence & influence in counterterrorism : a component in the war on al Qaeda / Paul K. Davis, Brian Michael Jenkins. |
title_full_unstemmed |
Deterrence & influence in counterterrorism : a component in the war on al Qaeda / Paul K. Davis, Brian Michael Jenkins. |
title_auth |
Deterrence & influence in counterterrorism : a component in the war on al Qaeda / |
title_alt |
Deterrence and influence in counterterrorism |
title_new |
Deterrence & influence in counterterrorism : |
title_sort |
deterrence & influence in counterterrorism : a component in the war on al qaeda / |
publisher |
Rand, |
publishDate |
2002 |
physical |
1 online resource (107 p.) |
edition |
1st ed. |
contents |
PREFACE; CONTENTS; FIGURES AND TABLES; SUMMARY; ACKNOWLEDGMENTS; Chapter One INTRODUCTION; OBJECTIVES; APPROACH; Chapter Two BACKGROUND: WHY DETERRING TERRORISTS IS SO DIFFICULT; OVERVIEW; OBSTACLES TO DETERRENCE; Chapter Three PRINCIPLES FOR INFLUENCING TERRORISTS; GOING BEYOND DETERRENCE; VIEWING TERRORIST ORGANIZATIONS AS COMPLEX ADAPTIVE SYSTEMS; FINDING SITUATIONS WHERE INFLUENCING EFFORTS MAY WORK; CONDUCTING A BROAD-FRONT STRATEGY; DEVELOPING A PERSUASIVE, HIGH-MINDED STRATEGY; Chapter Four BROAD ISSUES OF STRATEGY; ORCHESTRATING A BROAD-FRONT STRATEGY THE STRATEGIC SIGNIFICANCE OF EFFICIENCY, EVEN IN WARA PARADIGM FOR DEFENSE; Chapter Five SOME CONTROVERSIAL ISSUES; DETERRING ACQUISITION AND USE OF WEAPONS OF MASS DESTRUCTION; POLITICAL WARFARE: THE NEGLECTED COMPONENT OF ANTITERRORISM STRATEGY; PUTTING AT RISK WHAT THE TERRORISTS HOLD DEAR; CHALLENGES IN U.S.-SAUDI RELATIONS; THE PAKISTAN PROBLEM; BALANCING INTERESTS: REALPOLITIK VERSUS IDEALISM; UPHOLDING AMERICAN VALUES IN THE WAR AGAINST AL QAEDA; Chapter Six CONCLUSIONS AND RECOMMENDATIONS; THE STORY IN BRIEF; NEXT STEPS FOR RESEARCH; Appendix A COLD WAR CONCEPTS OF DETERRENCE Appendix B SELECTED DEFINITIONSAppendix C METHODS FOR ANALYZING COUNTERTERRORISM IN A COMPLEX ADAPTIVE SYSTEM; Appendix D ADAPTING THE CONSTRUCTS OF EFFECTS-BASED PLANNING; BIBLIOGRAPHY; ABOUT THE AUTHORS |
isbn |
0-8330-3406-5 0-8330-3286-0 |
callnumber-first |
H - Social Science |
callnumber-subject |
HV - Social Pathology, Criminology |
callnumber-label |
HV6431 |
callnumber-sort |
HV 46431 D3 42002 |
illustrated |
Illustrated |
dewey-hundreds |
300 - Social sciences |
dewey-tens |
360 - Social problems & social services |
dewey-ones |
363 - Other social problems & services |
dewey-full |
363.3/2 |
dewey-sort |
3363.3 12 |
dewey-raw |
363.3/2 |
dewey-search |
363.3/2 |
oclc_num |
52732839 |
work_keys_str_mv |
AT davispaulk deterrenceinfluenceincounterterrorismacomponentinthewaronalqaeda AT davispaulk deterrenceandinfluenceincounterterrorism |
status_str |
n |
ids_txt_mv |
(CKB)111087028057498 (EBL)202776 (OCoLC)52732839 (SSID)ssj0000137622 (PQKBManifestationID)11162952 (PQKBTitleCode)TC0000137622 (PQKBWorkID)10097058 (PQKB)11337802 (Au-PeEL)EBL202776 (CaPaEBR)ebr10056221 (MiAaPQ)EBC202776 (EXLCZ)99111087028057498 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Deterrence & influence in counterterrorism : a component in the war on al Qaeda / |
_version_ |
1806312284186738688 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01194nam a22003134a 4500</leader><controlfield tag="001">993628433904498</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr -n---------</controlfield><controlfield tag="008">020917s2002 caua obb 000 0 eng </controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-8330-3406-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)111087028057498</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EBL)202776</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)52732839</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SSID)ssj0000137622</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBManifestationID)11162952</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBTitleCode)TC0000137622</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBWorkID)10097058</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKB)11337802</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL202776</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10056221</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC202776</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)99111087028057498</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6431</subfield><subfield code="b">.D3 2002</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.3/2</subfield><subfield code="2">21</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Davis, Paul K.,</subfield><subfield code="d">1943-</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Deterrence & influence in counterterrorism :</subfield><subfield code="b">a component in the war on al Qaeda /</subfield><subfield code="c">Paul K. Davis, Brian Michael Jenkins.</subfield></datafield><datafield tag="246" ind1="3" ind2=" "><subfield code="a">Deterrence and influence in counterterrorism</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Santa Monica, CA :</subfield><subfield code="b">Rand,</subfield><subfield code="c">c2002.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (107 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">PREFACE; CONTENTS; FIGURES AND TABLES; SUMMARY; ACKNOWLEDGMENTS; Chapter One INTRODUCTION; OBJECTIVES; APPROACH; Chapter Two BACKGROUND: WHY DETERRING TERRORISTS IS SO DIFFICULT; OVERVIEW; OBSTACLES TO DETERRENCE; Chapter Three PRINCIPLES FOR INFLUENCING TERRORISTS; GOING BEYOND DETERRENCE; VIEWING TERRORIST ORGANIZATIONS AS COMPLEX ADAPTIVE SYSTEMS; FINDING SITUATIONS WHERE INFLUENCING EFFORTS MAY WORK; CONDUCTING A BROAD-FRONT STRATEGY; DEVELOPING A PERSUASIVE, HIGH-MINDED STRATEGY; Chapter Four BROAD ISSUES OF STRATEGY; ORCHESTRATING A BROAD-FRONT STRATEGY</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">THE STRATEGIC SIGNIFICANCE OF EFFICIENCY, EVEN IN WARA PARADIGM FOR DEFENSE; Chapter Five SOME CONTROVERSIAL ISSUES; DETERRING ACQUISITION AND USE OF WEAPONS OF MASS DESTRUCTION; POLITICAL WARFARE: THE NEGLECTED COMPONENT OF ANTITERRORISM STRATEGY; PUTTING AT RISK WHAT THE TERRORISTS HOLD DEAR; CHALLENGES IN U.S.-SAUDI RELATIONS; THE PAKISTAN PROBLEM; BALANCING INTERESTS: REALPOLITIK VERSUS IDEALISM; UPHOLDING AMERICAN VALUES IN THE WAR AGAINST AL QAEDA; Chapter Six CONCLUSIONS AND RECOMMENDATIONS; THE STORY IN BRIEF; NEXT STEPS FOR RESEARCH; Appendix A COLD WAR CONCEPTS OF DETERRENCE</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Appendix B SELECTED DEFINITIONSAppendix C METHODS FOR ANALYZING COUNTERTERRORISM IN A COMPLEX ADAPTIVE SYSTEM; Appendix D ADAPTING THE CONSTRUCTS OF EFFECTS-BASED PLANNING; BIBLIOGRAPHY; ABOUT THE AUTHORS</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Historical experience has shown that successful strategies to combat terrorism that is spawned by serious, deep-rooted problems have involved first crushing the current threat and then bringing about changes to make terrorism?s reemergence less likely. While deterrence of terrorism may at first glance seem to be an unrealistic goal?concepts such as co-optation and inducement cannot be expected to be effective for dealing with terrorists who have the unshakable commitment of an Osama bin Laden?it may be possible to influence some members of terrorist groups. Such groups are not simply single </subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">September 11 Terrorist Attacks, 2001.</subfield></datafield><datafield tag="610" ind1="2" ind2="0"><subfield code="a">Qaida (Organization)</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">0-8330-3286-0</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2024-08-02 22:01:34 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2012-02-26 01:58:25 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5350469760004498&Force_direct=true</subfield><subfield code="Z">5350469760004498</subfield><subfield code="b">Available</subfield><subfield code="8">5350469760004498</subfield></datafield></record></collection> |