2,240
Views
9
CrossRef citations to date
0
Altmetric
Articles

A CTS model of counterterrorism

Pages 523-541 | Received 15 Nov 2016, Accepted 17 May 2017, Published online: 05 Jun 2017

References

  • Baker-Beall, C., C. Heath-Kelly, and L. Jarvis, eds. 2015. Counter-Radicalization: Critical Perspectives. Abingdon, UK: Routledge.
  • Bandarage, A. 2011. “The ‘Norwegian Model’.” Brown Journal of World Affairs xvii (ii): 221–242.
  • Blakeley, R. 2009. State Terrorism and Neoliberalism: The North in the South. Abingdon: Routledge.
  • Blakeley, R., and S. Raphael. 2016. “British Torture in the ’War on Terror.” European Journal of International Relations, no. 1: 1–24. doi:10.1177/1354066116653455.
  • Booth, K. 2007. Theory of World Security. Cambridge: Cambridge University Press.
  • Booth, K. 1995. “Dare Not to Know: International Relations Theory versus the Future.” In International Relations Theory Today, edited by K. Booth and S. Smith, 328–350. Cambridge: Polity Press.
  • Booth, K., and T. Dunne. 2012. Terror in Our Time. Abingdon: Routledge.
  • Brecher, B. 2007. Torture and the Ticking Bomb. Oxford: Blackwell.
  • Calhoun, L. 2016. “Targeted Killing and Drone Warfare.” In Routledge Handbook of Critical Terrorism Studies, edited by R. Jackson, 190–200. Abingdon: Routledge.
  • Carpenter, T. G., and M. Innocent. 2015. Perilous Partners. Washington, DC: CATO Institute.
  • Chenoweth, E., and M. J. Stephan. 2011. Why Civil Resistance Works. the Strategic Logic of Nonviolent Conflict. New York: Columbia University Press.
  • Chomsky, N. 2002. Pirates and Emperors, Old and New. International Terrorism in the Real World. London: South End Press.
  • Chowdhury, A., and S. Fitzsimmons. 2013. “Effective but Inefficient : Understanding the Costs of Counterterrorism.” Critical Studies on Terrorism 6 (3): 447–456. doi:10.1080/17539153.2013.836307.
  • Clifford, G. M. 2017. “Just Counterterrorism.” Critical Studies on Terrorism 10 (1): 67–92. doi:10.1080/17539153.2016.1254369
  • Crelinsten, R. 2009. Counterterrorism. Cambridge: Polity Press.
  • Cronin, A. K. 2009. How Terrorism Ends: Understanding the Decline and Demise of Terrorist Campaigns. Woodstock: Princeton University Press.
  • Defense Science Board. 2004. “Report of the Defense Science Board Task Force on Strategic Communication.” Washington, DC. http://www.acq.osd.mil/dsb/reports/ADA428770.pdf.
  • Deming, B. 1968. On Revolution and Equilibrium. New York City: A.J. Muste Memorial Institute. Essay Series, No. 2.
  • Dewey, J. 1922. Human Nature and Conduct. an Introdcution to Social Psychology. London: George Allen & Unwin.
  • Eland, I. 1998. Does U.S. Intervention Overseas Breed Terrorism? Washington, DC: CATO Institute.
  • Feenberg, A. 1991. Critical Theory of Technology. Oxford: Oxford University Press.
  • Galtung, J. 1969. “Violence, Peace, and Peace Research.” Journal of Peace Research 6 (3): 167–191. doi:10.1177/002234336900600301.
  • Gandhi, M. 1958. All Men are Brothers. Edited by Krishna Kripalani. Paris: UNESCO.
  • Gunning, J., and R. Jackson. 2011. “What’s so ‘Religious’ about ‘Religious Terrorism’?” Critical Studies on Terrorism 4 (3): 369–388. doi:10.1080/17539153.2011.623405.
  • Hanssen-Bauer, J. 2005. The Norwegian ”Model” for Conflict Resolution. Oslo: Norwegian Ministry of Foreign Affairs.
  • Heath-Kelly, C. 2010. “Critical Terrorism Studies, Critical Theory and the ‘Naturalistic Fallacy’.” Security Dialogue 41 (3): 235–254. doi:10.1177/0967010610370227.
  • Heath-Kelly, C. 2013. “Counter-Terrorism and the Counterfactual: Producing the ‘Radicalisation’ Discourse and the UK PREVENT Strategy.” The British Journal of Politics & International Relations 15 (3): 394–415. doi:10.1111/j.1467-856X.2011.00489.x.
  • Heath-Kelly, C. 2016. “Post-Structuralism and Constructivism.” In Routledge Handbook of Critical Terrorism Studies, edited by R. Jackson, 60–69. Abingdon: Routledge.
  • Horkheimer, M. 1972. Critical Theory. Selected Essays. Edited by Matthew J. O’Connell. New York, NY: Continuum
  • Institute for Economics and Peace. 2015. “Global Terrorism Index 2015: Measuring and Understanding the Impact of Terrorism.” http://economicsandpeace.org/wp-content/uploads/2015/11/Global-Terrorism-Index-2015.pdf.
  • Jackson, R. 2005. Writing the War on Terrorism. Manchester: Manchester University Press.
  • Jackson, R. 2010. “In Defence of ‘Terrorism’: Finding A Way Through A Forest of Misconceptions.” Behavioral Sciences of Terrorism and Political Aggression 3 (2): 116–130. doi:10.1080/19434472.2010.512148
  • Jackson, R. 2015. “The Epistemological Crisis of Counterterrorism.” Critical Studies on Terrorism 8 (1): 33–54. doi:10.1080/17539153.2015.1009762.
  • Jackson, R., ed. 2016a. Routledge Handbook of Critical Terrorism Studies. Abingdon: Routledge.
  • Jackson, R., ed. 2016b. ‘To Be or Not to Be Policy Relevant? Power, Emancipation and Resistance in CTS Research.“ Critical Studies on Terrorism 9 (1): 120–125. doi:10.1080/17539153.2016.1147771.
  • Jackson, R., E. Murphy, and S. Poynting, eds. 2010. Contemporary State Terrorism: Theory and Practice. Abingdon: Routledge.
  • Jackson, R., L. Jarvis, J. Gunning, and M. Breen-Smyth. 2011a. Terrorism. A Critical Introduction. New York: Palgrave Macmillan.
  • Jackson, R., L. Jarvis, J. Gunning, and M. B. Smyth. 2011b. Terrorisma Critical Introduction. New York: Palgrave Macmillan.
  • Jackson, R., M. B. Smyth, and J. Gunning. 2009. “Critical Terrorism Studies. Framing a New Research Agenda.” In Critical Terrorism Studies. A New Research Agenda, edited by R. Jackson, M. B. Smyth, and J. Gunning, 216–236. Abingdon: Routledge.
  • Jarvis, L., and M. Lister. 2014. “State Terrorism Research and Critical Terrorism Studies: An Assessment †.” Critical Studies on Terrorism 7 (1): 43–61. doi:10.1080/17539153.2013.877669.
  • Jarvis, L. 2016. “Critical Terrorism Studies after 9/11.” In Routledge Handbook of Critical Terrorism Studies, edited by R. Jackson, 28–38. Abingdon: Routledge.
  • Jones, S., and M. Libicki. 2008. “How Terrorist Groups End: Implications for Countering Al Qa’ida - Rand_Rb9351.Pdf.” http://www.rand.org/content/dam/rand/pubs/research_briefs/2008/RAND_RB9351.pdf.
  • Kelleher, A., and J. L. Taulbee. 2006. “Bridging the Gap: Building Peace Norwegian Style.” Peace & Change 31 (4): 479–505. doi:10.1111/j.1468-0130.2006.00388.x.
  • Lindahl, S. 2011. “The Importance of Language: Critically Assessing Norway’s New Law on Lone Wolf Terrorism.” Aberystwyth University. http://cadair.aber.ac.uk/dspace/handle/2160/12098.
  • Lindahl, S. 2017. The Theory and Practice of Emancipatory Counterterrorism. Dunedin: University of Otago.
  • Lindahl, S. 2016. “Critical Evaluation of Counterterrorism.” In Routledge Handbook of Critical Terrorism Studies, edited by R. Jackson, 214–224. Abingdon: Routledge.
  • Lindekilde, L. 2016. “Radicalization, De-Radicalization, and Counter-Radicalization.” In Routledge Handbook of Critical Terrorism Studies, edited by R. Jackson, 248–260. Abingdon: Routledge.
  • Lynch, O. 2013. “British Muslim Youth: Radicalisation, Terrorism and the Construction of the ‘Other’.” Critical Studies on Terrorism 6 (2): 241–261. doi:10.1080/17539153.2013.788863.
  • Mac Ginty, R. 2010. “Social Network Analysis and Counterinsurgency: A Counterproductive Strategy?” Critical Studies on Terrorism 3 (2): 209–226. doi:10.1080/17539153.2010.491319.
  • May, T. 2015. Nonviolent Resistance. A Philosophical Introduction. Cambridge: Polity Press.
  • McCormack, T. 2008. “Power and Agency in the Human Security Framework.” Cambridge Review of International Affairs 21 (1): 113–128. doi:10.1080/09557570701828618.
  • McDonald, M. 2009. “Emancipation and Critical Terrorism Studies.” In Critical Terrorism Studies. A New Research Agenda, edited by R. Jackson, M. B. Smyth, and J. Gunning, 109–123. Abingdon: Routledge.
  • McKinney, J. C. 1967. “Constructive Typology: Structure and Function.” In An Introduction to Social Sciences, edited by J. T. Doby, 230–243. 2nd ed. New York: Appleton-Century-Crofts.
  • Miller, S. 2009. Terrorism and Counterterrorism: Ethics and Liberal Democracy. Malden, MA: Blackwell.
  • Mirza, W. 2016. “2011 FBI Report Finds ‘Broadening U.S. Military Presence’ Responsible for Rise in Terror Attacks.” MuckRock. https://www.muckrock.com/news/archives/2016/sep/14/CVE-military-presence/.
  • Mueller, J., and M. G. Stewart. 2011. Terror, Security, and Money. Balancing the Risks, Benefits, and Costs of Homeland Security. Oxford: Oxford University Press.
  • Mueller, J., and M. G. Stewart. 2012. “The Terrorism Delusion.” International Security 37 (1): 81–110. http://www.mitpressjournals.org/doi/pdf/10.1162/ISEC_a_00089.
  • Norton-Taylor, R. 2006. “Iraq War ‘Motivated London Bombers.’” The Guardian. https://www.theguardian.com/uk/2006/apr/03/iraq.july7
  • Norwegian Ministry of Foreign Affairs. 2006. “Foreign Policy Strategy for Combating International Terrorism.” Oslo. https://www.regjeringen.no/globalassets/upload/kilde/ud/rap/2006/0124/ddd/pdfv/291587-terrorstrategi_eng.pdf.
  • Pettit, P. 2015. The Robust Demands of the Good: Ethics with Attachment, Virtue, and Respect. Oxford: Oxford University Press.
  • Richardson, L. 2006. What Terrorists Want: Understanding the Terrorist Threat. London: John Murray.
  • Silke, A. 2012. “The Case against Targeted Assassination.” In Contemporary Debates on Terrorism, edited by R. Jackson and S. J. Sinclair, 173–180. Abingdon: Routledge.
  • Spencer, A. 2010. “The ‘New Terrorism’ of Al-Qaeda Is Not so New.” In Debating Terrorism and Counterterrorism. Conflicting Perspectives on Causes, Contexts, and Responses, edited by S. Gottlieb, 16–33. Washington, DC: CQ Press.
  • Stephan, M. J. 2016. “Civil Resistance Vs. ISIS.” Journal of Resistance Studies 1 (2): 127–150.
  • Stohl, M. 2008. “Old Myths, New Fantasies and the Enduring Realities of Terrorism.” Critical Studies on Terrorism 1 (1): 5–16. doi:10.1080/17539150701846443.
  • Toros, H. 2016b. “Dialogue, Praxis and the State: A Response to Richard Jackson.” Critical Studies on Terrorism 9 (1): 126–130. doi:10.1080/17539153.2016.1147775.
  • Toros, H., and J. Gunning. 2009. “Exploring a Critical Theory Approach to Terrorism Studies.” In Critical Terrorism Studies. A New Research Agenda, edited by R. Jackson, M. B. Smyth, and J. Gunning, 87–108. Abingdon: Routledge.
  • Toros, H. 2016a. “Critical Theory and Terrorism Studies: Ethics and Emancipation.” In Routledge Handbook of Critical Terrorism Studies, edited by R. Jackson, 70–80. Abingdon: Routledge.
  • Turner, M. 2015. “Peacebuilding as Counterinsurgency in the Occupied Palestinian Territory.” Review of International Studies 41 (1): 73–98. doi:10.1017/S0260210514000072.
  • van Um, E., and D. Pisoiu. 2015. “Dealing with Uncertainty: The Illusion of Knowledge in the Study of Counterterrorism Effectiveness.” Critical Studies on Terrorism 8 (2): 229–245. doi:10.1080/17539153.2014.981400.
  • Walsh, J. I., and J. A. Piazza. 2010. “Why Respecting Physical Integrity Rights Reduces Terrorism.” Comparative Political Studies 43 (5): 551–577. doi:10.1177/0010414009356176.
  • Weber, M. 1949. The Methodology of the Social Sciences. Edited by E. A. Shils and H. A. Finch. Glencoe, IL: Free Press.
  • Wyn-Jones, R. 2005. “On Emancipation: Necessity, Capacity and Concrete Utopias.” In Critical Security Studies and World Politics, edited by K. Booth, 215–235. Boulder: Lynne Rienner.
  • Zulaika, J. 2009. Terrorism. The Self-Fulfilling Prophecy. Chicago: University of Chicago Press.
  • Zulaika, J., and W. A. Douglass. 1996. Terror and Taboo: The Follies, Fables, and Faces of Terrorism. New York: Routledge.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.