Exploring terrorist targeting preferences / Martin C. Libicki, Peter Chalk, Melanie Sisson.

Al Qaeda, the jihadist network personified by Osama bin laden, seeks a restored caliphate free of Western influence. It uses terror as its means. But how does terrorism serve the ends of al Qaeda? Understanding its strategic logic might suggest what U.S. targets it may seek to strike and why. This m...

Full description

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Year of Publication:2007
Language:English
Physical Description:1 online resource (131 p.)
Notes:"MG-483."
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993628544504498
ctrlnum (CKB)1000000000481435
(EBL)322534
(OCoLC)476119919
(SSID)ssj0000152360
(PQKBManifestationID)11163171
(PQKBTitleCode)TC0000152360
(PQKBWorkID)10321387
(PQKB)11490313
(Au-PeEL)EBL322534
(CaPaEBR)ebr10225484
(OCoLC)85779281
(Au-PeEL)EBL4970006
(CaONFJC)MIL118091
(MiAaPQ)EBC322534
(MiAaPQ)EBC4970006
(EXLCZ)991000000000481435
collection bib_alma
record_format marc
spelling Libicki, Martin C.
Exploring terrorist targeting preferences [electronic resource] / Martin C. Libicki, Peter Chalk, Melanie Sisson.
Santa Monica, CA : RAND, c2007.
1 online resource (131 p.)
text txt
computer c
online resource cr
Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Glossary; Chapter One - Introduction; Chapter Two - What Drives al Qaeda's Choice of Targets?; The al Qaeda Targeting Process: Four Hypotheses; Some Observations on Rationality; Alternatives to Rational Action; Organization; Chapter Three - Hypothesis Testing: Quantitative and Qualitative Measures; Measuring Intent; Modeling Intent; Testing Hypotheses Against Past Attacks; Chapter Four - Hypothesis Testing: Al Qaeda Statements and Expert Observations; Al Qaeda's Reading of History Suggests the Leverage ofTerrorism
The Coercion HypothesisThe Damage Hypothesis; The Rally Hypothesis; The Franchise Hypothesis; Conclusions; Chapter Five - Ramifications for al Qaeda Attack Planning in the United States; Coercion; Damage; Rally; Franchise; Is the United States Off the Target List for the TimeBeing?; Conclusions; Bibliography
Al Qaeda, the jihadist network personified by Osama bin laden, seeks a restored caliphate free of Western influence. It uses terror as its means. But how does terrorism serve the ends of al Qaeda? Understanding its strategic logic might suggest what U.S. targets it may seek to strike and why. This monograph posits four hypotheses to link means and ends. The coercion hypothesis suggests that terrorists are interested in causing pain, notably casualties, to frighten the United States into pursuing favorable policies (e.g., withdrawing from the Islamic world). The damage hypothesis posits that te
English
"MG-483."
Includes bibliographical references.
Description based on publisher supplied metadata and other sources.
Terrorism United States Prevention.
Chalk, Peter.
Sisson, Melanie.
0-8330-3913-X
language English
format Electronic
eBook
author Libicki, Martin C.
spellingShingle Libicki, Martin C.
Exploring terrorist targeting preferences
Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Glossary; Chapter One - Introduction; Chapter Two - What Drives al Qaeda's Choice of Targets?; The al Qaeda Targeting Process: Four Hypotheses; Some Observations on Rationality; Alternatives to Rational Action; Organization; Chapter Three - Hypothesis Testing: Quantitative and Qualitative Measures; Measuring Intent; Modeling Intent; Testing Hypotheses Against Past Attacks; Chapter Four - Hypothesis Testing: Al Qaeda Statements and Expert Observations; Al Qaeda's Reading of History Suggests the Leverage ofTerrorism
The Coercion HypothesisThe Damage Hypothesis; The Rally Hypothesis; The Franchise Hypothesis; Conclusions; Chapter Five - Ramifications for al Qaeda Attack Planning in the United States; Coercion; Damage; Rally; Franchise; Is the United States Off the Target List for the TimeBeing?; Conclusions; Bibliography
author_facet Libicki, Martin C.
Chalk, Peter.
Sisson, Melanie.
author_variant m c l mc mcl
author2 Chalk, Peter.
Sisson, Melanie.
author2_variant p c pc
m s ms
author2_role TeilnehmendeR
TeilnehmendeR
author_sort Libicki, Martin C.
title Exploring terrorist targeting preferences
title_full Exploring terrorist targeting preferences [electronic resource] / Martin C. Libicki, Peter Chalk, Melanie Sisson.
title_fullStr Exploring terrorist targeting preferences [electronic resource] / Martin C. Libicki, Peter Chalk, Melanie Sisson.
title_full_unstemmed Exploring terrorist targeting preferences [electronic resource] / Martin C. Libicki, Peter Chalk, Melanie Sisson.
title_auth Exploring terrorist targeting preferences
title_new Exploring terrorist targeting preferences
title_sort exploring terrorist targeting preferences
publisher RAND,
publishDate 2007
physical 1 online resource (131 p.)
contents Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Glossary; Chapter One - Introduction; Chapter Two - What Drives al Qaeda's Choice of Targets?; The al Qaeda Targeting Process: Four Hypotheses; Some Observations on Rationality; Alternatives to Rational Action; Organization; Chapter Three - Hypothesis Testing: Quantitative and Qualitative Measures; Measuring Intent; Modeling Intent; Testing Hypotheses Against Past Attacks; Chapter Four - Hypothesis Testing: Al Qaeda Statements and Expert Observations; Al Qaeda's Reading of History Suggests the Leverage ofTerrorism
The Coercion HypothesisThe Damage Hypothesis; The Rally Hypothesis; The Franchise Hypothesis; Conclusions; Chapter Five - Ramifications for al Qaeda Attack Planning in the United States; Coercion; Damage; Rally; Franchise; Is the United States Off the Target List for the TimeBeing?; Conclusions; Bibliography
isbn 1-281-18091-2
9786611180911
0-8330-4248-3
0-8330-3913-X
callnumber-first H - Social Science
callnumber-subject HV - Social Pathology, Criminology
callnumber-label HV6432
callnumber-sort HV 46432 L53 42007
geographic_facet United States
illustrated Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 360 - Social problems & social services
dewey-ones 363 - Other social problems & services
dewey-full 363.325
dewey-sort 3363.325
dewey-raw 363.325
dewey-search 363.325
oclc_num 476119919
85779281
work_keys_str_mv AT libickimartinc exploringterroristtargetingpreferences
AT chalkpeter exploringterroristtargetingpreferences
AT sissonmelanie exploringterroristtargetingpreferences
status_str n
ids_txt_mv (CKB)1000000000481435
(EBL)322534
(OCoLC)476119919
(SSID)ssj0000152360
(PQKBManifestationID)11163171
(PQKBTitleCode)TC0000152360
(PQKBWorkID)10321387
(PQKB)11490313
(Au-PeEL)EBL322534
(CaPaEBR)ebr10225484
(OCoLC)85779281
(Au-PeEL)EBL4970006
(CaONFJC)MIL118091
(MiAaPQ)EBC322534
(MiAaPQ)EBC4970006
(EXLCZ)991000000000481435
carrierType_str_mv cr
is_hierarchy_title Exploring terrorist targeting preferences
author2_original_writing_str_mv noLinkedField
noLinkedField
_version_ 1796653679003041792
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03251nam a22006014a 4500</leader><controlfield tag="001">993628544504498</controlfield><controlfield tag="005">20230120034158.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr -n---------</controlfield><controlfield tag="008">060407s2007 caua ob 000 0 eng </controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2006011784</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-281-18091-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611180911</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-8330-4248-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)1000000000481435</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EBL)322534</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)476119919</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SSID)ssj0000152360</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBManifestationID)11163171</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBTitleCode)TC0000152360</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBWorkID)10321387</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKB)11490313</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL322534</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10225484</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)85779281</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL4970006</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL118091</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC322534</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC4970006</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)991000000000481435</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">n-us---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6432</subfield><subfield code="b">.L53 2007</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">363.325</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Libicki, Martin C.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Exploring terrorist targeting preferences</subfield><subfield code="h">[electronic resource] /</subfield><subfield code="c">Martin C. Libicki, Peter Chalk, Melanie Sisson.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Santa Monica, CA :</subfield><subfield code="b">RAND,</subfield><subfield code="c">c2007.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (131 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Glossary; Chapter One - Introduction; Chapter Two - What Drives al Qaeda's Choice of Targets?; The al Qaeda Targeting Process: Four Hypotheses; Some Observations on Rationality; Alternatives to Rational Action; Organization; Chapter Three - Hypothesis Testing: Quantitative and Qualitative Measures; Measuring Intent; Modeling Intent; Testing Hypotheses Against Past Attacks; Chapter Four - Hypothesis Testing: Al Qaeda Statements and Expert Observations; Al Qaeda's Reading of History Suggests the Leverage ofTerrorism</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The Coercion HypothesisThe Damage Hypothesis; The Rally Hypothesis; The Franchise Hypothesis; Conclusions; Chapter Five - Ramifications for al Qaeda Attack Planning in the United States; Coercion; Damage; Rally; Franchise; Is the United States Off the Target List for the TimeBeing?; Conclusions; Bibliography</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Al Qaeda, the jihadist network personified by Osama bin laden, seeks a restored caliphate free of Western influence. It uses terror as its means. But how does terrorism serve the ends of al Qaeda? Understanding its strategic logic might suggest what U.S. targets it may seek to strike and why. This monograph posits four hypotheses to link means and ends. The coercion hypothesis suggests that terrorists are interested in causing pain, notably casualties, to frighten the United States into pursuing favorable policies (e.g., withdrawing from the Islamic world). The damage hypothesis posits that te</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"MG-483."</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chalk, Peter.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sisson, Melanie.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">0-8330-3913-X</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-10-30 03:54:23 Europe/Vienna</subfield><subfield code="f">System</subfield><subfield code="c">marc21</subfield><subfield code="a">2012-02-26 00:45:56 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5350502200004498&amp;Force_direct=true</subfield><subfield code="Z">5350502200004498</subfield><subfield code="b">Available</subfield><subfield code="8">5350502200004498</subfield></datafield></record></collection>