Adversary group decision-making regarding choice of attack methods: expecting the unexpected

Anticipating whether an adversary group will continue to use their usual (“conventional”), expected attack methods is important for military and counterterrorism practitioners tasked with protecting the security of others. Conventional attack methods are by their nature easier to plan and prepare fo...

Ausführliche Beschreibung

Gespeichert in:  
Bibliographische Detailangaben
VerfasserInnen: Knight, Sarah E. (Verfasst von) ; Keane, Carys (Verfasst von) ; Murphy, Amy (Verfasst von)
Medienart: Elektronisch Aufsatz
Sprache:Englisch
Veröffentlicht: 2017
In: Terrorism and political violence
Jahr: 2017, Band: 29, Heft: 4, Seiten: 713-734
Online-Zugang: Volltext (Resolving-System)
Volltext (Verlag)
Verfügbarkeit prüfen: HBZ Gateway
Schlagwörter:
Beschreibung
Zusammenfassung:Anticipating whether an adversary group will continue to use their usual (“conventional”), expected attack methods is important for military and counterterrorism practitioners tasked with protecting the security of others. Conventional attack methods are by their nature easier to plan and prepare for whilst “innovative” methods may take those responsible for security and counterterrorism by surprise and, as such, may have more impact and more serious consequences. The present study aimed to develop understanding of how, when, and why adversary groups might decide to use conventional attack methods or opt to do something innovative instead. A literature review was conducted and findings were applied to develop a thorough understanding of the decision-making process that underlies an adversary group's choice of attack method. Identified are three stages preceding the execution of an attack: a) “strategic direction”; b) “incubation”; and c) “planning and preparation,” plus “overarching” and “contextual” factors that can influence the process at each stage. It is suggested that it is these factors and how they influence decision-making that result in innovative methods being used to execute an attack, or convention prevailing. Findings can aid practitioners and policy-makers in counterterrorism, security, and law enforcement, to support their understanding, evaluation, and countering of current and future threats.
Beschreibung:Gesehen am 24.11.2023
Published online: 09 Oct 2015
Physische Details:Illustrationen
ISSN:1556-1836
DOI:10.1080/09546553.2015.1064398