Adversary group decision-making regarding choice of attack methods: expecting the unexpected
Anticipating whether an adversary group will continue to use their usual (“conventional”), expected attack methods is important for military and counterterrorism practitioners tasked with protecting the security of others. Conventional attack methods are by their nature easier to plan and prepare fo...
| VerfasserInnen: | ; ; |
|---|---|
| Medienart: | Elektronisch Aufsatz |
| Sprache: | Englisch |
| Veröffentlicht: |
2017
|
| In: |
Terrorism and political violence
Jahr: 2017, Band: 29, Heft: 4, Seiten: 713-734 |
| Online-Zugang: |
Volltext (Resolving-System) Volltext (Verlag) |
| Verfügbarkeit prüfen: | HBZ Gateway |
| Schlagwörter: |
| Zusammenfassung: | Anticipating whether an adversary group will continue to use their usual (“conventional”), expected attack methods is important for military and counterterrorism practitioners tasked with protecting the security of others. Conventional attack methods are by their nature easier to plan and prepare for whilst “innovative” methods may take those responsible for security and counterterrorism by surprise and, as such, may have more impact and more serious consequences. The present study aimed to develop understanding of how, when, and why adversary groups might decide to use conventional attack methods or opt to do something innovative instead. A literature review was conducted and findings were applied to develop a thorough understanding of the decision-making process that underlies an adversary group's choice of attack method. Identified are three stages preceding the execution of an attack: a) “strategic direction”; b) “incubation”; and c) “planning and preparation,” plus “overarching” and “contextual” factors that can influence the process at each stage. It is suggested that it is these factors and how they influence decision-making that result in innovative methods being used to execute an attack, or convention prevailing. Findings can aid practitioners and policy-makers in counterterrorism, security, and law enforcement, to support their understanding, evaluation, and countering of current and future threats. |
|---|---|
| Beschreibung: | Gesehen am 24.11.2023 Published online: 09 Oct 2015 |
| Physische Details: | Illustrationen |
| ISSN: | 1556-1836 |
| DOI: | 10.1080/09546553.2015.1064398 |
