8,951
Views
10
CrossRef citations to date
0
Altmetric
Original Articles

Framing the UK’s counter-terrorism policy within the context of a wicked problem

References

  • Ahmed, N. M. (2015), ISIS wants to destroy the ‘grey zone’. Here’s how we defend it (www.opendemocracy.net).
  • Anon. (2014), My NHS counter-terrorism training session (www.cageuk.org).
  • Anon. (2015), The extinction of the grey zone. Dabiq, Issue 7 (1436 Rabi’ Al-Akhir), pp. 54–66.
  • Asal, V. H. et al. (2009), The softest of targets: a study on terrorist target selection. Journal of Applied Security Research, 4, 3, pp. 258–278.
  • Bangstad, S. (2013), Inclusion and exclusion in the mediated public sphere: the case of Norway and its Muslims. Social Anthropology, 21, 3, pp. 356–370.
  • Bergen, P. and Reynolds, A. (2005), Blowback revisited. Today’s insurgents are tomorrow’s terrorists. Foreign Affairs, 84, 6, pp. 2–6.
  • Blackbourn, D. (2006), Gay rights in the police service. Criminal Justice Matters, 63, 1, pp. 30–31.
  • Boin, A. and Smith, D. (2006), Terrorism and critical infrastructures: implications for public– private crisis management. Public Money & Management, 26, 5, pp. 295–304.
  • Borum, R. (2014), Psychological vulnerabilities and propensities for involvement in violent extremism. Behavioral Sciences and the Law, 32, 3, pp. 286–305.
  • Bowling, B. (2000), Racist offenders: punishment, justice and community safety. Criminal Justice Matters, 42, 1, pp. 30–31.
  • Brown, K. E. and Saeed, T. (2015), Radicalization and counter-radicalization at British universities: Muslim encounters and alternatives. Ethnic and Racial Studies, 38, 11, pp. 1952–1968.
  • Browne, D. and Silke, A. (2011), The impact of media on terrorism and counter-terrorism. In Silke, A. (Ed), The Psychology of Counter-Terrorism (Routledge).
  • Byman, D. (2014), The intelligence war on terrorism. Intelligence and National Security, 29, 6, pp. 837–863.
  • Byman, D. (2015), The homecomings: what happens when Arab foreign fighters in Iraq and Syria return? Studies in Conflict and Terrorism, 38, 8, pp. 581–602.
  • Camillus, J. C. (2008), Strategy as a wicked problem. Harvard Business Review, 86, 5, pp. 98–101.
  • Cavelty, M. D. (2008), Cyber-terror—looming threat or phantom menace? Journal of Information Technology and Politics, 4, 1, pp. 19–36.
  • Cherns, A. (1976), The principles of sociotechnical design. Human Relations, 29, 8, pp. 783–792.
  • Cherns, A. (1987), Principles of socio technical design revisited. Human Relations, 40, 3, pp. 153–161.
  • Churchman, C. W. (1967), Wicked problems. Management Science, 14, 4, pp. B141–B142.
  • Clarke, M. and Soria, V. (2009), Terrorism in the UK. RUSI Journal, 154, 3, pp. 44–53.
  • Clarke, M. and Soria, V. (2010), Terrorism. The new wave. RUSI Journal, 155, 4, pp. 24–31.
  • Conway, M. (2006), Terrorism and the internet. Parliamentary Affairs, 59, 2, pp. 283–298.
  • Coppock, V. and McGovern, M. (2014), ‘Dangerous minds’? Children and Society, 28, 3, pp. 242–256.
  • Dalgaard-Nielsen, A. (2010), Violent radicalization in Europe. Studies in Conflict and Terrorism, 33, 9, pp. 797–814.
  • Davies, L. (2016), Security, extremism and education. British Journal of Educational Studies, 64, 1, pp. 1–19.
  • Denning, D. E. (2010), Terror’s web. In Jewkes, Y. and Yar, M. (Eds), Handbook on Internet Crime (Routledge), pp. 194–213.
  • Drake, C. J. M. (1998), The role of ideology in terrorists’ target selection. Terrorism and Political Violence, 10, 2, pp. 53–85.
  • Durodie, B. (2016), Securitising education to prevent terrorism or losing direction? British Journal of Educational Studies, 64, 1, pp. 21–35.
  • Duyvesteyn, I. (2004), How new is the new terrorism? Studies in Conflict and Terrorism, 27, 5, pp. 439–454.
  • Dwyer, A. (2014), Pleasures, perversities, and partnerships. In Peterson, D. and Panfil, R. V. (Eds), Handbook of LGBT Communities, Crime, and Justice (Springer), pp. 149–164.
  • English, R. (2009), Terrorism: How to Respond (Oxford University Press).
  • English, R. (2013), Terrorist innovation and international politics: lessons from an IRA case study? International Politics, 50, 4, pp. 496–511.
  • Faria, J. R. (2006), Terrorist innovations and anti-terrorist policies. Terrorism and Political Violence, 18, 1, pp. 47–56.
  • Fischbacher-Smith, D. and Fischbacher-Smith, M. (2013), The vulnerability of public spaces: challenges for UK hospitals under the ‘new’ terrorist threat. Public Management Review, 15, 3, pp. 330–343.
  • Fischbacher-Smith, D., Fischbacher-Smith, M. and BaMaung, D. (2010), Where do we go from here? The evacuation of city centres and the communication of public health risks from extreme events. In Bennett, P. et al. (Eds), Risk Communication and Public Health (Oxford University Press), pp. 97–114.
  • Ford, P. (2001), Europe cringes at Bush ‘crusade’ against terrorists. Christian Science Monitor (19 September).
  • Ganor, B. (2002), Defining terrorism. Police Practice and Research, 3, 4, pp. 287–304.
  • Geers, K. (2009), The cyber threat to national critical infrastructures. Information Security Journal: A Global Perspective, 18, 1, pp. 1–7.
  • Gill, P. et al. (2013), Malevolent creativity in terrorist organizations. Journal of Creative Behavior, 47, 2, pp. 125–151.
  • Greaves, I. (2000), Terrorism—new threats, new challenges? RUSI Journal, 145, 5, pp. 15–20.
  • Hastings, J. V. and Chan, R. J. (2013), Target hardening and terrorist signaling: the case of aviation security. Terrorism and Political Violence, 25, 5, pp. 777–797.
  • Head, B.W. and Alford, J. (2015), Wicked problems: implications for public policy and management. Administration and Society, 47, 6, pp. 711–739.
  • Hemmingby, C. and Bjørgo, T. (2016), Breivik in a comparative perspective. The Dynamics of a Terrorist Targeting Process: Anders B. Breivik and the 22 July Attacks in Norway (Palgrave Macmillan), pp. 87–107.
  • HM Government (2009), Pursue Prevent Protect Prepare. The United Kingdom’s Strategy for Countering International Terrorism, Cm 7547 (TSO).
  • HM Government (2011a), CONTEST. The United Kingdom’s Strategy for Countering Terrorism, Cm 8123 (TSO).
  • HM Government (2011b), Prevent Strategy, Cm 8092 (TSO).
  • HM Government (2012), Channel: Vulnerability Assessment Framework (Home Office).
  • HM Government (2015), Channel Duty Guidance: Protecting Vulnerable People from Being Drawn into Terrorism (TSO).
  • Hoffman, B. (2002), Rethinking terrorism and counterterrorism since 9/11. Studies in Conflict and Terrorism, 25, 5, pp. 303–316.
  • Home Affairs Committee (2009), Project CONTEST: The Government’s Counter-Terrorism Strategy. Ninth Report of Session 2008-09, HC 212.
  • Hülsse, R. and Spencer, A. (2008), The metaphor of terror: terrorism studies and the constructivist turn. Security Dialogue, 39, 6, pp. 571–592.
  • Kapucu, N. and Garayev, V. (2011), Collaborative decision-making in emergency and disaster management. International Journal of Public Administration, 34, 6, pp. 366–375.
  • Kellner, D. (2002), September 11, terrorism and blowback. CSCM, 2, 1, pp. 27–39.
  • Kellner, D. (2004), 9/11, spectacles of terror and media manipulation. Critical Discourse Studies, 1, 1, pp. 41–64.
  • Kennedy-Pipe, C. and Vickers, R. (2007),‘Blowback’ for Britain: Blair, Bush and the war in Iraq. Review of International Studies, 33, 2, pp. 205–221.
  • Klausen, J. (2015), Tweeting the jihad: social media networks of Western foreign fighters in Syria and Iraq. Studies in Conflict and Terrorism, 38, 1, pp. 1–22.
  • Kollars, N. A. and Brister, P. D. (2014), Terrorists that couldn’t: seeing terrorist innovation as a risky venture. Homeland Security Review, 8, pp. 199–218.
  • Kundnani, A. (2012), Radicalisation: the journey of a concept. Race and Class, 54, 2, pp. 3–25.
  • Kundnani, A. (2014), The Muslims are Coming! (Verso).
  • Kurtulus, E. N. (2011), The ‘new terrorism’ and its critics. Studies in Conflict and Terrorism, 34, 6, pp. 476–500.
  • Lecy, J. D., Mergel, I. A. and Schmitz, H. P. (2014), Networks in public administration. Public Management Review, 16, 5, pp. 643–665.
  • May, T. (2011), Prevent strategy. Hansard (7 June), Vol. 529.
  • Mazid, B.-e. M. (2007), Presuppositions and strategic functions in Bush’s 20/9/2001 speech. Journal of Language and Politics, 6, 3, pp. 351–375.
  • Miller, P. (2001), Governing by numbers. Social Research, 68, 2, pp. 379–396.
  • Newburn, T. and Matassa, M. (2002), Policing hate crime. Criminal Justice Matters, 48, 1, pp. 42–43.
  • O’Donnell, M. (2004), ‘Bring it on’: the apocalypse of George W. Bush. Media International Australia incorporating Culture and Policy, 113, 1, pp. 10–22.
  • O’Donnell, A. (2016), Securitisation, counterterrorism and the silencing of dissent. British Journal of Educational Studies, 64, 1, pp. 53–76.
  • Oh, O., Agrawal, M. and Rao, H. R. (2011), Information control and terrorism. Information Systems Frontiers, 13, 1, pp. 33–43.
  • Parker, A. (2013), The enduring terrorist threat and accelerating technological change. Address to RUSI (www.mi5.gov.uk).
  • Parker, A. (2015), Director general speaks on terrorism, technology and oversight. Address to RUSI (www.mi5.gov.uk).
  • Reason, J. T. (1987), An interactionist’s view of system pathology. In Wise, J. A. and Debons, A. (Eds), Information Systems: Failure Analysis (Springer), pp. 211–220.
  • Reason, J. T. (1993), Managing the management risk. In Wilpert, B. and Qvale, T. (Eds), Reliability and Safety in Hazardous Work Systems (Lawrence Erlbaum), pp. 7–22.
  • Reason, J. T. (1997), Managing the Risks of Organizational Accidents (Ashgate).
  • Reicher, S. D. and Haslam, S. A. (2016), Fueling extremes. Scientific American Mind, 27, 3, pp. 34–39.
  • Rittel, H. W. J. and Webber, M. M. (1973), Dilemmas in a general theory of planning. Policy Sciences, 4, 2, pp. 155–169.
  • Robinson, S. E. et al. (2013), The core and periphery of emergency management networks. Public Management Review, 15, 3, pp. 344–362.
  • Rudner, M. (2013), Cyber-threats to critical national infrastructure. International Journal of Intelligence and Counter Intelligence, 26, 3, pp. 453–481.
  • Saeed, T. and Johnson, D. (2016), Intelligence, global terrorism and higher education. British Journal of Educational Studies, 64, 1, pp. 37–51.
  • Sandler, T. (2011), New frontiers of terrorism research. Journal of Peace Research, 48, 3, pp. 279–286.
  • Sedgwick, M. (2010), The concept of radicalization as a source of confusion. Terrorism and Political Violence, 22, 4, pp. 479–494.
  • Spaaij, R. (2012), Understanding Lone Wolf Terrorism (Springer).
  • Sukarieh, M. and Tannock, S. (2016), The deradicalization of education. Race and Class, 57, 4, pp. 22–38.
  • Tsfati, Y. and Weimann, G. (2002), http://www.terrorism.com:terrorontheinternet. Studies in Conflict and Terrorism, 25, 5, pp. 317–332.
  • Tucker, D. (2001), What is new about the new terrorism and how dangerous is it? Terrorism and Political Violence, 13, 3, pp. 1–14.
  • Waldman, P. and Pope, H. (2001), ‘Crusade’ reference reinforces fears war on terrorism is against Muslims. Wall Street Journal (21 September).
  • Weber, E. P. and Khademian, A. M. (2008), Wicked problems, knowledge challenges, and collaborative capacity builders in network settings. Public Administration Review, 68, 2, pp. 334–349.