Publication Cover
Dynamics of Asymmetric Conflict
Pathways toward terrorism and genocide
Volume 13, 2020 - Issue 1
3,149
Views
7
CrossRef citations to date
0
Altmetric
Original Articles

Assessing success of the Global War on Terror: terrorist attack frequency and the backlash effect

Pages 67-86 | Received 28 Sep 2018, Accepted 27 Jul 2019, Published online: 09 Sep 2019

References

  • Abrahms, M. (2006). Al-Qaeda’s scorecard: A progress report on Al Qaeda’s objectives. Studies in Conflict & Terrorism, 29, 509–529.
  • Addison, T., & Murshed, S. M. (2005). Transnational terrorism as a spillover of domestic disputes in other countries. Defence and Peace Economics, 16(2), 69–82.
  • Araj, B. (2008). Harsh state repression as a cause of suicide bombing: The case of Palestinian-Israeli conflict. Studies in Conflict and Terrorism, 31(4), 284–303.
  • Arce, D. G., & Sandler, T. (2005). Counterterrorism: A game-theoretic analysis. Journal of Conflict Resolution, 49(2), 183–200.
  • Azam, J. P., & Thelen, V. (2010). Foreign aid versus military intervention in the War on Terror. Journal of Conflict Resolution, 54(2), 237–261.
  • Barber, V. (2015). The evolution of Al Qaeda’s global network and Al Qaeda’s core position within it: A network analysis. Perspectives on Terrorism, 9(6), 1–35.
  • Bergen, P., Hoffman, B., & Tiedemann, K. (2011). Assessing the jihadist terrorist threat to America and American interests. Studies in Conflict and Terrorism, 34(2), 65–101.
  • Berger, J. M., & Stern, J. (2015). ISIS: The state of terror. New York: Harper Collins.
  • Besteman, C., & Savell, S. (2018, January 12). Where in the world is the U.S. military? Everywhere. U.S. News & World Report. Retrieved from https://www.usnews.com/opinion/articles/2018-01-12/us-counterterrorism-forces-are-active-in-many-more-places-than-you-know
  • Bin-Ladin, S., & Bin-Muhammad, U. (1998, February 23). Jihad Against Jews and Crusaders. Al-Quds al-Arabi. Retrieved from https://fas.org/irp/world/para/docs/980223-fatwa.htm
  • Blomberg, B. S., & Hess, G. D. (2008). The lexus and the olive branch: Globalization, democratization and terrorism. In P. Keefer & N. Loayza (Eds.), Terrorism, economic development, and political openness (pp. 116–147). Cambridge, UK: Cambridge University Press.
  • Blomberg, B. S., Hess, G. D., & Weerapana, A. (2004). Economic conditions and terrorism. European Journal of Political Economy, 20(2), 463–478.
  • Bloom, M. (2004). Palestinian suicide bombing: Public support, market share and outbidding. Political Science Quarterly, 119(1), 61–88.
  • Bokhari, L., Hegghammer, T., Lia, B., Nesser, P., & Tønnessen, T. H. (Eds.). (2006, March). Paths to global jihad, Oslo, Norway. Kjeller, Norway: Norwegian Defence Research Establishment.
  • Boyle, M. J. (2010). Do counterterrorism and counterinsurgency go together? International Affairs, 86(2), 333–353.
  • Braithwaite, A., & Li, Q. (2007). Transnational terrorism hot spots: Identification and impact evaluation. Conflict Management and Peace Science, 24(4), 281–296.
  • Brockhoff, S., Krieger, T., & Meierrieks, D. (2012). Looking back on anger: Explaining the social origins of left-wing and nationalist-separatist terrorism in Western Europe, 1970-2007 (Report No. 3789). Munich, Germany: CESifo.
  • Brophy-Baermann, B., & Conybeare, J. A. C. (1994). Retaliating against terrorism: rational expectations and the optimality of rules versus discretion. American Journal of Political Science, 38(1), 196–210.
  • Bush, G. W. (2002). The National Security Strategy of the United States of America. Washington, DC: The White House. Retrieved from https://georgewbush-whitehouse.archives.gov/nsc/nssall.html
  • Byman, D. (2005). Deadly connections: States that sponsor terrorism. Cambridge, UK: Cambridge University Press.
  • Choi, S. W., & Piazza, J. A. (2017). Foreign military interventions and suicide attacks. Journal of Conflict Resolution, 61(2), 271–297.
  • Coggins, B. L. (2015). Does state failure cause terrorism? An empirical analysis, 1999-2008. Journal of Conflict Resolution, 59(3), 455–483.
  • Coppedge, M., Gerring, J., Knutsen, C. H., Lindberg, S. I., Skaaning, S. E., Teorell, J., … Ziblatt, D. (2018). V-Dem codebook v8: Varieties of democracy (V-Dem) project. Retrieved from https://www.v-dem.net/media/filer_public/3f/19/3f19efc9-e25f-4356-b159-b5c0ec894115/v-dem_democracy_report_2018.pdf.
  • Council on Foreign Relations. (2006). (https://www.cfr.org/backgrounder/world-opinion-terrorism).
  • Crenshaw, M. (2001). Why America? The globalization of civil war. Current History, 100(650), 425–432.
  • Crenshaw, M. L. (2013). Data from: Global Al Qaeda. Mapping Militant Organizations. Stanford University. Retrieved from http://www.stanford.edu/group/mappingmilitants/cgi-bin/
  • Cronin, A. K. (2006). How al-Qaeda ends: The decline and demise of terrorist groups. International Security, 31(1), 7–48.
  • Curry, T. (2007, January 5). McCain calls for substantial, sustained surge. NBCNews. Retrieved from http://www.nbcnews.com/id/16484446/ns/politics-tom_curry/t/mccain-calls-substantial-sustained-surge/#.XRJAp5NKjVo
  • Dannenbaum, T. (2011). Bombs, ballots, and coercion: The Madrid bombings, electoral politics, and terrorist strategy. Security Studies, 20(3), 303–349.
  • Dorn, W. A., Mandel, D. R., & Cross, R. W. (2005). How just were America’s wars? A survey of experts using a Just War Index. International Studies Perspectives, 16, 270–285.
  • Drakos, K., & Gofas, A. (2006). In search of the average transnational terrorist attack venue. Defence and Peace Economics, 17(2), 73–93.
  • Dreher, A., & Gassebender, M. (2008). Does political proximity to the US Cause terror?”. Economic Letters, 99(1), 27–29.
  • Duyvesteyn, I. (2008). Great expectations: The use of armed force to combat terrorism. Small Wars and Insurgencies, 19(3), 328–351.
  • Easton, D. (1965). A Framework for Political Analysis. Englewood Cliffs, NJ: Prentice-Hall.
  • Economics of Security. (2009, December). Break it own: An alternative approach to measuring effectiveness in counterterrorism (Working Paper 23). Berlin, Germany: T. V. Dongen.
  • Enders, W., & Sandler, T. (1993). The effectiveness of anti-terrorism policies: A vector-autoregression intervention analysis. American Political Science Review, 87(4), 829–844.
  • Enders, W., & Sandler, T. (2006). The political economy of terrorism. Cambridge, UK: Cambridge University Press.
  • Enemark, C., & Michaelsen, C. (2005). Just War Doctrine and the invasion of Iraq. Australian Journal of Politics and History, 51, 545–563.
  • Freeman, M. (2008). Democracy, Al Qaeda, and the causes of terrorism: A strategic analysis of US policy. Studies in Conflict & Terrorism, 31(1), 40–59.
  • Full text: ‘Al-Qaeda’ Madrid claim. (2004, March). BBC News. Retrieved from http://news.bbc.co.uk/1/hi/world/europe/3509556.stm.
  • Gaibulloev, K., & Sandler, T. (2014). An empirical analysis of alternative ways that terrorist groups end. Public Choice, 160(1–2), 25–44.
  • Ganor, B. (2008). Terrorist organization typologies and the probability of a boomerang effect. Studies in Conflict & Terrorism, 31(4), 269–283.
  • Gass, N. (2015, December 15). Obama: “We’re not going to do an Iraq-style invasion of Iraq or Syria”. Politico. Retrieved from http://www.politico.eu/article/obama-were-not-going-to-do-an-iraq-style-invasion-of-iraq-or-syria/.
  • Gassebner, M., & Luechinger, S. (2011). Lock, stock, and barrel: A comprehensive assessment of the determinants of terror. Public Choice, 149(3–4), 235–261.
  • Gerges, F. (2005). The far enemy: Why jihad went global. Cambridge, UK: Cambridge University Press.
  • Helfstein, S., & Wright, D. (2011). Success, lethality, and cell structure across the dimensions of Al Qaeda. Studies in Conflict & Terrorism, 34(5), 367–382.
  • Heyman, E., & Mickolus, E. (1980). Observations on “why violence spreads”. International Studies Quarterly, 24(2), 299–305.
  • Jones, S. G., & Libicki, M. C. (2008). How terrorist groups end: Lessons for countering al Qa’ida. Santa Monica, CA: RAND Corporation.
  • Josiger, W. J. (2010). Getting it right: Understanding effective counter-terrorism strategies. In R. Reuveny & W. R. Thompson (Eds.), Coping with terrorism: Origins, escalation, counterinsurgencies, and responses (pp. 219–246). Albany: SUNY Press.
  • Kattelman, K. T. (2016). Party structure, information, and coalition durability: The relevance of NATO in the Global War on Terror. Studies in Conflict & Terrorism, 39(9), 803–818.
  • Kober, K. (2003). Western democracies in low-intensity conflict: Some postmodern aspects. In E. Inbar (Ed.), Democracies and small wars (pp. 3–20). London, UK: Frank Cass.
  • Krieger, T., & Meierrieks, D. (2011). What causes terrorism? Public Choice, 147(1–2), 3–27.
  • Lake, D. (2002). Rational extremism: Understanding terrorism in the twenty first century. International Organization, 56, 15–29.
  • Leeds, B. A., Ritter, J. M., Mitchell, S. M., & Long, A. G. (2002). Alliance treaty obligations and provisions, 1815-1944. International Interactions, 28(3), 237–260.
  • Li, Q. (2005). Does democracy promote or reduce transnational terrorism? Journal of Conflict Resolution, 49(2), 278–297.
  • Lum, C. K., Kennedy, L. W., & Sherley, A. J. (2006). The effectiveness of counter-terrorism strategies. Campbell Systematic Reviews, 2, 1–55.
  • Lyall, J., & Wilson, I., III. (2009). Rage against machines: Explaining outcomes in counterinsurgency wars. International Organization, 63(1), 67–106.
  • Madrid Train Attacks. (2004). BBC News. Retrieved from http://news.bbc.co.uk/2/shared/spl/hi/guides 457000/457031/html/.
  • Malinowski, T. (2008). Restoring moral authority: Ending torture, secret detention, and the prison at Guantanamo Bay. Annals of the American Academy of Political and Social Science, 618(1), 148–159.
  • Marshall, M. G., Gurr, T. R., & Keith Jaggers, K. (2016). Polity IV project: Political regime characteristics and transitions, 1800-2014. Retrieved from [Data file]. http://www.systemicpeace.org/inscrdata.html.
  • Merom, G. (2012). The age of asocial war: Democratic intervention and counterinsurgency in the twenty-first century. Australian Journal of International Affairs, 66(3), 365–380.
  • Moghadam, A. (2009). Motives for martyrdom. International Security, 33(3), 46–78.
  • Mueller, J., & Stewart, M. G. (2012). The terrorism delusion: America’s overwrought response to September 11. International Security, 37(1), 81–110.
  • National Consortium for the Study of Terrorism and Responses to Terrorism (START). (2018). Global terrorism database codebook. University of Maryland. Retrieved from Global Terrorism Database.
  • Newnham, R. (2008). “Coalition of the bribed and bullied?” U.S. economic linkage and the Iraq War coalition. International Studies Perspectives, 9(2), 183–200.
  • Nixon, R. (2017, February 25). People from 7 travel-ban nations pose no increased terror risk, report says. The New York Times. Retrieved from https://www.nytimes.com/2017/02/25/us/politics/travel-ban-nations-terror-risk.html
  • Pape, R. A. (2003). The strategic logic of suicide terrorism. American Political Science Review, 97(3), 343–361.
  • Pape, R. A. (2005). Dying to win: The strategic logic of suicide terrorism. New York, NY: Random House.
  • Piazza, J. A., & Choi, S. W. (2018). International military interventions and transnational terrorist backlash,”. International Studies Quarterly, 62(3), 686–695.
  • Plümper, T., & Neumayer, E. (2010). The friend of my enemy is my enemy: International alliance and international terrorism. European Journal of Political Research, 49(1), 75–96.
  • Posen, B. (2001–2002, Winter). The struggle against terrorism: Grand strategy, strategy, and tactics. International Security, 26(3), 39–55.
  • Price, B. C. (2017). Terrorism as cancer: how to combat an incurable disease. Terrorism and Political Violence, Advance online publication. doi:10.1080/09546553.2017.1330200
  • Putnam, R. D. (1988). Diplomacy and domestic politics: The logic of two-level games. International Organization, 42(3), 427–460.
  • Rosendorff, P. B., & Sandler, T. (2004). Too much of a good thing?: The proactive response dilemma. Journal of Conflict Resolution, 48(5), 271–657.
  • Sageman, M. (2008). Leaderless jihad: Terror networks in the twenty-first century. Philadelphia, PA: University of Pennsylvania Press.
  • Sánchez-Cuenca, I., & de la Calle, L. (2009). Domestic terrorism: The hidden side of political violence. Annual Review of Political Science, 12, 31–49.
  • Sandler, T., Arce, D. G., & Enders, W. (2009). Transnational terrorism. In B. Lomborg (Ed.), Global crises, global solutions: Costs and benefits (2nd ed., pp. 516–562). Cambridge, UK: Cambridge University Press.
  • Savun, B., & Phillips, B. J. (2009). Democracy, foreign policy, and terrorism,”. Journal of Conflict Resolution, 5(6), 878–904.
  • Sheehan, I. S. (2009). Has the Global War on Terror changed the terrorist threat? A time-series intervention analysis. Studies in Conflict and Terrorism, 32(8), 743–761.
  • Simons, A. (2006). Making enemies: Anthropology of Islamist terror, part II. The American Interest, 2, 35–45.
  • Sunstein, C. R. (2003). Terrorism and probability neglect. Journal of Risk and Uncertainty, 26(2–3), 121–136.
  • US Department of State. (2002). Patterns of global terrorism. Washington, DC: Author.
  • US Department of State. (2007). Country reports on terrorism. Washington, DC: Author.
  • van Um, E., & Pisoiu, D. (2015). Dealing with uncertainty: The illusion of knowledge in the study of counterterrorism effectiveness. Critical Studies on Terrorism, 8(2), 229–245.
  • Wiktorowicz, Q. (2006). An anatomy of the Salafi movement. Studies in Conflict & Terrorism, 29(3), 207–293.
  • World Bank, Public Sector Indicators. (2016). Military expenditure (% of GDP) [Data file]. Retrieved from https://data.worldbank.org/indicator/ms.mil.xpnd.gd.zs
  • Zenko, M., & Wolf, A. J. (2015, January 27). Challenging the terrorist safe haven myth. Power, Politics and Preventive Action. Retrieved from http://blogs.cfr.org/zenko/2015/01/27/challenging-the-terrorist-safe-haven-myth/.
  • 7 July Bombings. (2004). BBC News. Retrieved from The White House Archives: http://news.bbc.co.uk/2/shared/spl/hi/uk/05/london_blasts/investigation/html/introduction.stm.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.