Skip to main content

2024 | OriginalPaper | Buchkapitel

Conclusions

verfasst von : Richard J. Chasdi, Yair Sharan

Erschienen in: Issues of Terrorism in the Post-Coronavirus Era

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This edited compilation provides a wide-ranging discussion about the links between terrorism and contemporary international and national security challenges. Those contemporary security challenges can be conceptualized in two different ways. For Waltz, with his “three level analysis,” international security challenges fall in the domain of “3rd image” or “international systems level” explanatory factors for conflict (e.g., terrorism), where three or more nation-states are affected. In contrast, ‘2nd image’ factors, such as population composition and ethnic conflict potential, are found at the nation-state level. In comparison, Williams describes terrorism and many of the terrorism related security activities described in this book as “wicked challenges” or “wicked problems.”

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Waltz KN (1959) Man, the state, and war—a theoretical analysis. Columbia University Press Waltz KN (1959) Man, the state, and war—a theoretical analysis. Columbia University Press
2.
Zurück zum Zitat Nye JS (1993) Understanding international conflicts: an introduction to theory and history. Harper Collins College Publishers Nye JS (1993) Understanding international conflicts: an introduction to theory and history. Harper Collins College Publishers
3.
Zurück zum Zitat Nye JS (1997) Understanding international conflicts: an introduction to theory and history, 2nd edn. Longman Nye JS (1997) Understanding international conflicts: an introduction to theory and history, 2nd edn. Longman
4.
Zurück zum Zitat Davis CE (1993) The politics of hazardous waste. Prentice-Hall, Inc., 1–5, 7–10 Davis CE (1993) The politics of hazardous waste. Prentice-Hall, Inc., 1–5, 7–10
5.
Zurück zum Zitat Ibid. For Waltz, “1st image” explanatory factors such as individual leader personality traits fall at what Nye calls the “individual level” of analysis Ibid. For Waltz, “1st image” explanatory factors such as individual leader personality traits fall at what Nye calls the “individual level” of analysis
6.
Zurück zum Zitat Rowe DM (2005) The tragedy of liberalism: how globalization caused World War 1. Secur Stud 14(3):407–447CrossRef Rowe DM (2005) The tragedy of liberalism: how globalization caused World War 1. Secur Stud 14(3):407–447CrossRef
7.
Zurück zum Zitat Chasdi RJ (2024) Corporate security surveillance: An assessment of host country vulnerability to terrorism. Springer Nature. Such research would have to narrow down the type of terrorism under consideration (i.e., international, transnational, domestic) to analyze twenty-first century terrorism and compare it with twentieth century terrorism, for example Chasdi RJ (2024) Corporate security surveillance: An assessment of host country vulnerability to terrorism. Springer Nature. Such research would have to narrow down the type of terrorism under consideration (i.e., international, transnational, domestic) to analyze twenty-first century terrorism and compare it with twentieth century terrorism, for example
8.
Zurück zum Zitat Williams P (2013) Lawlessness and disorder: An emerging paradigm for the 21st century. In: Michael M, Jacqueline B (eds) Convergence: illicit networks and national security in an age of globalization. National Defense University Press Williams P (2013) Lawlessness and disorder: An emerging paradigm for the 21st century. In: Michael M, Jacqueline B (eds) Convergence: illicit networks and national security in an age of globalization. National Defense University Press
9.
Zurück zum Zitat Gunaratna R, Hissin S (2019). 1—Introduction. In: Rohan KG, Sabariah H (eds) Deradicalization and terrorist rehabilitation—a framework for policy-making and implementation, 1–11 Gunaratna R, Hissin S (2019). 1—Introduction. In: Rohan KG, Sabariah H (eds) Deradicalization and terrorist rehabilitation—a framework for policy-making and implementation, 1–11
10.
Zurück zum Zitat Pearson FS, Rochester MJ (1998) International relations—the global condition in the twenty-first century—Fourth edition. The McGraw Hill Companies, Inc. Pearson FS, Rochester MJ (1998) International relations—the global condition in the twenty-first century—Fourth edition. The McGraw Hill Companies, Inc.
11.
Zurück zum Zitat Kegley CW (2007) World politics: trends and transformations. Eleventh edition. Thomson Wadsworth Kegley CW (2007) World politics: trends and transformations. Eleventh edition. Thomson Wadsworth
12.
Zurück zum Zitat Brown S (1994) The faces of power. 2nd edition. Columbia University Press Brown S (1994) The faces of power. 2nd edition. Columbia University Press
13.
Zurück zum Zitat Chasdi RJ (2018) Corporate security crossroads: Responding to terrorism, cyberthreats and other hazards in the global business environment. Praeger Publishers- ABC-CLIO Chasdi RJ (2018) Corporate security crossroads: Responding to terrorism, cyberthreats and other hazards in the global business environment. Praeger Publishers- ABC-CLIO
14.
Zurück zum Zitat Schweller RL (1998) Deadly imbalances: tripolarity and Hitler’s strategy of world conquest. Columbia University Press Schweller RL (1998) Deadly imbalances: tripolarity and Hitler’s strategy of world conquest. Columbia University Press
15.
Zurück zum Zitat Korany B (2016) The Middle East since the cold war: the multi-layered (in) security dilemma. In: Fawcett L (ed) International relations of the Middle East. Oxford University Press, Fourth edition, pp 80–101 Korany B (2016) The Middle East since the cold war: the multi-layered (in) security dilemma. In: Fawcett L (ed) International relations of the Middle East. Oxford University Press, Fourth edition, pp 80–101
16.
Zurück zum Zitat Chasdi RJ (2022) 10 enhanced terrorism and the prospect of its use in the United States: an update. In: Roan KG, Mohd Mizan A (eds) COVID-19 pandemic: the threat and response. Routledge, pp 158–197 Chasdi RJ (2022) 10 enhanced terrorism and the prospect of its use in the United States: an update. In: Roan KG, Mohd Mizan A (eds) COVID-19 pandemic: the threat and response. Routledge, pp 158–197
17.
Zurück zum Zitat Chasdi RJ (2020) Research note—the new frontier of enhanced terrorism with the U.S. in mind. Int J Intell Secur Public Affair 22(2):119–131 Chasdi RJ (2020) Research note—the new frontier of enhanced terrorism with the U.S. in mind. Int J Intell Secur Public Affair 22(2):119–131
18.
Zurück zum Zitat Ronis SR (2007) Timelines into the future; strategic visioning methods for government, business and other organizations. Hamilton Books Ronis SR (2007) Timelines into the future; strategic visioning methods for government, business and other organizations. Hamilton Books
19.
Zurück zum Zitat Fuerth L, Faber EMH (2012) Anticipatory governance practical upgrades: Equipping the executive branch to cope with increasing speed and complexity of major challenges. National Defense University, Center for Technology & National Security Policy Fuerth L, Faber EMH (2012) Anticipatory governance practical upgrades: Equipping the executive branch to cope with increasing speed and complexity of major challenges. National Defense University, Center for Technology & National Security Policy
20.
Zurück zum Zitat Copeland DC (2000) The origins of major war. Cornell University Press. 56–117. Plainly, information use and misuse and the concept of popular mobilization is not new. For example, Copeland reports that on the cusp of the First World War, Chancellor Theobald von Bethmann Hollweg put a premium on popular mobilization for the “preemptive” war to come against Russia Copeland DC (2000) The origins of major war. Cornell University Press. 56–117. Plainly, information use and misuse and the concept of popular mobilization is not new. For example, Copeland reports that on the cusp of the First World War, Chancellor Theobald von Bethmann Hollweg put a premium on popular mobilization for the “preemptive” war to come against Russia
21.
Zurück zum Zitat Kaldor M (2013) In defense of new wars. Int J Secur Develop 2(1):1–34 Kaldor M (2013) In defense of new wars. Int J Secur Develop 2(1):1–34
23.
Zurück zum Zitat Zinnes DA (1976) The problem of cumulation. In: James Rosenau (ed) In search of global patterns. Free Press Zinnes DA (1976) The problem of cumulation. In: James Rosenau (ed) In search of global patterns. Free Press
24.
Zurück zum Zitat Zinnes DA (1976) Contemporary research in international relations: a perspective and a critical appraisal. Free Press Zinnes DA (1976) Contemporary research in international relations: a perspective and a critical appraisal. Free Press
25.
Zurück zum Zitat Chasdi RJ (2018) Corporate security crossroads: Responding to terrorism, cyberthreats and other hazards in the global business environment. Praeger Publishers—ABC-CLIO, pp 124–125 Chasdi RJ (2018) Corporate security crossroads: Responding to terrorism, cyberthreats and other hazards in the global business environment. Praeger Publishers—ABC-CLIO, pp 124–125
26.
Zurück zum Zitat Kayyem JN, Chang PE (2003) Beyond business continuity: the role of the private sector in preparedness planning. In: Kayyem JN, Pagni RL (eds) First to arrive: state and local responses to terrorism. MIT Press, pp 95–120 Kayyem JN, Chang PE (2003) Beyond business continuity: the role of the private sector in preparedness planning. In: Kayyem JN, Pagni RL (eds) First to arrive: state and local responses to terrorism. MIT Press, pp 95–120
27.
28.
Zurück zum Zitat Chasdi RJ (2024) Corporate security surveillance: an assessment of host country vulnerability to terrorism. Springer Nature Chasdi RJ (2024) Corporate security surveillance: an assessment of host country vulnerability to terrorism. Springer Nature
30.
Zurück zum Zitat Enders W et al (1992) A time series analysis of transnational terrorism: trends and cycles. Defense Econ 305–320 Enders W et al (1992) A time series analysis of transnational terrorism: trends and cycles. Defense Econ 305–320
Metadaten
Titel
Conclusions
verfasst von
Richard J. Chasdi
Yair Sharan
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-68542-2_13

Premium Partner