2011
DOI: 10.1080/01402390.2011.541760
|View full text |Cite
|
Sign up to set email alerts
|

Deterring the Undeterrable: Coercion, Denial, and Delegitimization in Counterterrorism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
12
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 43 publications
(12 citation statements)
references
References 55 publications
0
12
0
Order By: Relevance
“…9 For criticisms of classical deterrence theory, see George and Smoke 1974;Jervis 1970;Jervis 1976;Jervis 1979;Jervis, Lebow, and Stein 1985;Lebow 1981;Lebow 1984;Lebow 2005;Lebow and Stein 1987;Lebow and Stein 1989;Lebow and Stein 1990;Snyder and Diesing 1977;Stein 1987. 10 For deterrence by delegitimization, see Long & Wilner 2014;Wilner 2011;for tailored deterrence, see Bowen 2004;Knopf 2008;Morgan 2009;Payne 2001; for cumulative deterrence, see Almog 2004;Feldman 1982: 67;Lieberman 1994;Morgan 2003; for deterrence by denial, see Freedman 2004:36-40;Snyder 1961;Wilner 2011. 11 For a discussion on preemption and deterrence, see Freedman 2004, 84-108;Sandler and Siqueira 2006. Preemption and deterrence will be expounded in Section III.…”
Section: Why Do We Observe Indirect Policing In Some Instances But DImentioning
confidence: 99%
“…9 For criticisms of classical deterrence theory, see George and Smoke 1974;Jervis 1970;Jervis 1976;Jervis 1979;Jervis, Lebow, and Stein 1985;Lebow 1981;Lebow 1984;Lebow 2005;Lebow and Stein 1987;Lebow and Stein 1989;Lebow and Stein 1990;Snyder and Diesing 1977;Stein 1987. 10 For deterrence by delegitimization, see Long & Wilner 2014;Wilner 2011;for tailored deterrence, see Bowen 2004;Knopf 2008;Morgan 2009;Payne 2001; for cumulative deterrence, see Almog 2004;Feldman 1982: 67;Lieberman 1994;Morgan 2003; for deterrence by denial, see Freedman 2004:36-40;Snyder 1961;Wilner 2011. 11 For a discussion on preemption and deterrence, see Freedman 2004, 84-108;Sandler and Siqueira 2006. Preemption and deterrence will be expounded in Section III.…”
Section: Why Do We Observe Indirect Policing In Some Instances But DImentioning
confidence: 99%
“…40 Cyberspace might also be the medium of other deterrence efforts, such as counter-terrorism 'deterrence by delegitimization', in which terrorists' beliefs are targeted through information and propaganda campaigns as an alternative to denial and punishment measures. 41 What is clear is that cyber deterrence theory has yet to be translated into concrete US cyber deterrence strategy. We might here note the distinction made by Patrick Morgan between deterrence theory and strategy.…”
Section: The Genealogy Of American Cyber Deterrencementioning
confidence: 99%
“…Namely, we will pin down the obstacles to direct policing and illustrate how indirect policing can overcome the obstacles. In contrast, the literature merely posits that indirect deterrence (connoting indirect policing in our language) can work because it exploits a third party's influence-without formally investigating the sources of its influence (Bar 2008;George 2002;Knopf 2012;Smelser and Mitchell 2002;Trager & Zagorcheva 2005/06;Wilner 2011). 6 What we mean by indirect policing is closely related to indirect deterrence but with a sharp distinction.…”
Section: Introductionmentioning
confidence: 99%