Chapter 8: Comparing Anti-Terrorist Policies
MANY OPTIONS This book is devoted to suggesting positive options for dealing with terrorism. Such options have been neglected in the theoretical discourse on terrorism, as well as in the practical policies applied against terrorism. In contrast, the negative options of threatening and punishing terrorists have been at the centre of academic discussion, and even more at the centre of anti-terrorist policy. It often seems as if deterrence policy is a hard-wired knee-jerk reaction to terrorism, while other, more novel approaches receive only cursory attention. The positive approach proposed here is based on modern economics; it ﬁrst seeks to understand why and how terrorists act. It looks at terrorists’ preferences and constraints. Based on this incentive, structured anti-terrorist policies are deduced, promising to be both eﬀective and advisable. In view of the extensive scholarly work on terrorism, there is no need to repeat many aspects of the phenomena that appear. Thus, for example, technological aspects of terrorism, ranging from weapons of mass destruction, to cyber and internet terrorism, were only considered in so far as they directly relate to the policies discussed. The same applies to psychological operations on the one hand, and military operations (including executing adversaries) on the other hand. The fact that these aspects are not discussed in this book does not mean that they are unimportant, but rather that they have been ably dealt with elsewhere. A particularly important aspect of terrorism relates to the international coordination of the ﬁght against terrorism. Since the American...
You are not authenticated to view the full text of this chapter or article.
Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.
Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.
Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.