Skip to main content
Top

2024 | OriginalPaper | Chapter

Conclusions

Authors : Richard J. Chasdi, Yair Sharan

Published in: Issues of Terrorism in the Post-Coronavirus Era

Publisher: Springer Nature Switzerland

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This edited compilation provides a wide-ranging discussion about the links between terrorism and contemporary international and national security challenges. Those contemporary security challenges can be conceptualized in two different ways. For Waltz, with his “three level analysis,” international security challenges fall in the domain of “3rd image” or “international systems level” explanatory factors for conflict (e.g., terrorism), where three or more nation-states are affected. In contrast, ‘2nd image’ factors, such as population composition and ethnic conflict potential, are found at the nation-state level. In comparison, Williams describes terrorism and many of the terrorism related security activities described in this book as “wicked challenges” or “wicked problems.”

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Waltz KN (1959) Man, the state, and war—a theoretical analysis. Columbia University Press Waltz KN (1959) Man, the state, and war—a theoretical analysis. Columbia University Press
2.
go back to reference Nye JS (1993) Understanding international conflicts: an introduction to theory and history. Harper Collins College Publishers Nye JS (1993) Understanding international conflicts: an introduction to theory and history. Harper Collins College Publishers
3.
go back to reference Nye JS (1997) Understanding international conflicts: an introduction to theory and history, 2nd edn. Longman Nye JS (1997) Understanding international conflicts: an introduction to theory and history, 2nd edn. Longman
4.
go back to reference Davis CE (1993) The politics of hazardous waste. Prentice-Hall, Inc., 1–5, 7–10 Davis CE (1993) The politics of hazardous waste. Prentice-Hall, Inc., 1–5, 7–10
5.
go back to reference Ibid. For Waltz, “1st image” explanatory factors such as individual leader personality traits fall at what Nye calls the “individual level” of analysis Ibid. For Waltz, “1st image” explanatory factors such as individual leader personality traits fall at what Nye calls the “individual level” of analysis
6.
go back to reference Rowe DM (2005) The tragedy of liberalism: how globalization caused World War 1. Secur Stud 14(3):407–447CrossRef Rowe DM (2005) The tragedy of liberalism: how globalization caused World War 1. Secur Stud 14(3):407–447CrossRef
7.
go back to reference Chasdi RJ (2024) Corporate security surveillance: An assessment of host country vulnerability to terrorism. Springer Nature. Such research would have to narrow down the type of terrorism under consideration (i.e., international, transnational, domestic) to analyze twenty-first century terrorism and compare it with twentieth century terrorism, for example Chasdi RJ (2024) Corporate security surveillance: An assessment of host country vulnerability to terrorism. Springer Nature. Such research would have to narrow down the type of terrorism under consideration (i.e., international, transnational, domestic) to analyze twenty-first century terrorism and compare it with twentieth century terrorism, for example
8.
go back to reference Williams P (2013) Lawlessness and disorder: An emerging paradigm for the 21st century. In: Michael M, Jacqueline B (eds) Convergence: illicit networks and national security in an age of globalization. National Defense University Press Williams P (2013) Lawlessness and disorder: An emerging paradigm for the 21st century. In: Michael M, Jacqueline B (eds) Convergence: illicit networks and national security in an age of globalization. National Defense University Press
9.
go back to reference Gunaratna R, Hissin S (2019). 1—Introduction. In: Rohan KG, Sabariah H (eds) Deradicalization and terrorist rehabilitation—a framework for policy-making and implementation, 1–11 Gunaratna R, Hissin S (2019). 1—Introduction. In: Rohan KG, Sabariah H (eds) Deradicalization and terrorist rehabilitation—a framework for policy-making and implementation, 1–11
10.
go back to reference Pearson FS, Rochester MJ (1998) International relations—the global condition in the twenty-first century—Fourth edition. The McGraw Hill Companies, Inc. Pearson FS, Rochester MJ (1998) International relations—the global condition in the twenty-first century—Fourth edition. The McGraw Hill Companies, Inc.
11.
go back to reference Kegley CW (2007) World politics: trends and transformations. Eleventh edition. Thomson Wadsworth Kegley CW (2007) World politics: trends and transformations. Eleventh edition. Thomson Wadsworth
12.
go back to reference Brown S (1994) The faces of power. 2nd edition. Columbia University Press Brown S (1994) The faces of power. 2nd edition. Columbia University Press
13.
go back to reference Chasdi RJ (2018) Corporate security crossroads: Responding to terrorism, cyberthreats and other hazards in the global business environment. Praeger Publishers- ABC-CLIO Chasdi RJ (2018) Corporate security crossroads: Responding to terrorism, cyberthreats and other hazards in the global business environment. Praeger Publishers- ABC-CLIO
14.
go back to reference Schweller RL (1998) Deadly imbalances: tripolarity and Hitler’s strategy of world conquest. Columbia University Press Schweller RL (1998) Deadly imbalances: tripolarity and Hitler’s strategy of world conquest. Columbia University Press
15.
go back to reference Korany B (2016) The Middle East since the cold war: the multi-layered (in) security dilemma. In: Fawcett L (ed) International relations of the Middle East. Oxford University Press, Fourth edition, pp 80–101 Korany B (2016) The Middle East since the cold war: the multi-layered (in) security dilemma. In: Fawcett L (ed) International relations of the Middle East. Oxford University Press, Fourth edition, pp 80–101
16.
go back to reference Chasdi RJ (2022) 10 enhanced terrorism and the prospect of its use in the United States: an update. In: Roan KG, Mohd Mizan A (eds) COVID-19 pandemic: the threat and response. Routledge, pp 158–197 Chasdi RJ (2022) 10 enhanced terrorism and the prospect of its use in the United States: an update. In: Roan KG, Mohd Mizan A (eds) COVID-19 pandemic: the threat and response. Routledge, pp 158–197
17.
go back to reference Chasdi RJ (2020) Research note—the new frontier of enhanced terrorism with the U.S. in mind. Int J Intell Secur Public Affair 22(2):119–131 Chasdi RJ (2020) Research note—the new frontier of enhanced terrorism with the U.S. in mind. Int J Intell Secur Public Affair 22(2):119–131
18.
go back to reference Ronis SR (2007) Timelines into the future; strategic visioning methods for government, business and other organizations. Hamilton Books Ronis SR (2007) Timelines into the future; strategic visioning methods for government, business and other organizations. Hamilton Books
19.
go back to reference Fuerth L, Faber EMH (2012) Anticipatory governance practical upgrades: Equipping the executive branch to cope with increasing speed and complexity of major challenges. National Defense University, Center for Technology & National Security Policy Fuerth L, Faber EMH (2012) Anticipatory governance practical upgrades: Equipping the executive branch to cope with increasing speed and complexity of major challenges. National Defense University, Center for Technology & National Security Policy
20.
go back to reference Copeland DC (2000) The origins of major war. Cornell University Press. 56–117. Plainly, information use and misuse and the concept of popular mobilization is not new. For example, Copeland reports that on the cusp of the First World War, Chancellor Theobald von Bethmann Hollweg put a premium on popular mobilization for the “preemptive” war to come against Russia Copeland DC (2000) The origins of major war. Cornell University Press. 56–117. Plainly, information use and misuse and the concept of popular mobilization is not new. For example, Copeland reports that on the cusp of the First World War, Chancellor Theobald von Bethmann Hollweg put a premium on popular mobilization for the “preemptive” war to come against Russia
21.
go back to reference Kaldor M (2013) In defense of new wars. Int J Secur Develop 2(1):1–34 Kaldor M (2013) In defense of new wars. Int J Secur Develop 2(1):1–34
23.
go back to reference Zinnes DA (1976) The problem of cumulation. In: James Rosenau (ed) In search of global patterns. Free Press Zinnes DA (1976) The problem of cumulation. In: James Rosenau (ed) In search of global patterns. Free Press
24.
go back to reference Zinnes DA (1976) Contemporary research in international relations: a perspective and a critical appraisal. Free Press Zinnes DA (1976) Contemporary research in international relations: a perspective and a critical appraisal. Free Press
25.
go back to reference Chasdi RJ (2018) Corporate security crossroads: Responding to terrorism, cyberthreats and other hazards in the global business environment. Praeger Publishers—ABC-CLIO, pp 124–125 Chasdi RJ (2018) Corporate security crossroads: Responding to terrorism, cyberthreats and other hazards in the global business environment. Praeger Publishers—ABC-CLIO, pp 124–125
26.
go back to reference Kayyem JN, Chang PE (2003) Beyond business continuity: the role of the private sector in preparedness planning. In: Kayyem JN, Pagni RL (eds) First to arrive: state and local responses to terrorism. MIT Press, pp 95–120 Kayyem JN, Chang PE (2003) Beyond business continuity: the role of the private sector in preparedness planning. In: Kayyem JN, Pagni RL (eds) First to arrive: state and local responses to terrorism. MIT Press, pp 95–120
28.
go back to reference Chasdi RJ (2024) Corporate security surveillance: an assessment of host country vulnerability to terrorism. Springer Nature Chasdi RJ (2024) Corporate security surveillance: an assessment of host country vulnerability to terrorism. Springer Nature
30.
go back to reference Enders W et al (1992) A time series analysis of transnational terrorism: trends and cycles. Defense Econ 305–320 Enders W et al (1992) A time series analysis of transnational terrorism: trends and cycles. Defense Econ 305–320
Metadata
Title
Conclusions
Authors
Richard J. Chasdi
Yair Sharan
Copyright Year
2024
DOI
https://doi.org/10.1007/978-3-031-68542-2_13

Premium Partner