Skip to main content
Top

2020 | OriginalPaper | Chapter

Resilience and Deterrence: Exploring Correspondence Between the Concepts

Author : Edith Wilkinson

Published in: Deterrence

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Classic theories of deterrence do not envisage the concepts of resilience and deterrence as even remotely connected. However, these two notions may not be poles apart and may, in fact, offer complementary perspectives in envisioning options for dealing with the security challenges of the twenty-first century. This chapter explores the correspondence between the two concepts. Firstly, it discusses definitions and key tenets of these concepts in relation to security. Then, it goes on to review what differentiates and what links these concepts in terms of the risk approach each presents; this includes an examination of rationality in deterrence and resilience frameworks as well as looking at the growing acknowledgement that their evolution is influenced by systems thinking. The chapter then considers in what way deterrence theory and the emerging resilience theory display areas of complementary and mismatch. This is achieved by examining how, on the one hand, both approaches may be able to support one another and, on the other hand, how the significance of change and transformation in both frameworks can provide pointers to where future thinking might lead.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
‘UK Resilience’ was the initial designation by the Civil Contingencies Secretariat of its activities relating emergency planning in the UK within the framework of the 2004 Civil Contingencies Act. (Cabinet Office 2011b)
 
2
Under McNamara, pentagon analysts worked out that the “assured destruction” of 20–25 percent of Soviet population and 50 percent of Soviet industrial base would provide an adequate U.S. retaliatory threat which ensured the deterrence of the Soviet Union attacks. The analysts calculated that the standard metric for measuring how much was enough for such effect was 400 equivalent megatons (EMT). (Payne 2010)
 
3
Stein uses the example of “When President George W. Bush was considering whether or not to go to war in Iraq, he was told that Saddam Hussein had sought to buy yellow cake uranium from Niger. That was new information to the president – he had not heard it before – and it was diagnostic; it signalled that Saddam was likely seeking to develop unconventional weapons. What the information was not was reliable or valid, and therefore it should have been excluded from any kind of consideration. The reliability and validity of information is a threshold barrier that any piece of evidence should cross on its way into the decision-making process.” (Stein 2009; p. 62)
 
4
Slovic and Peters use the example of Nuclear radiation showing “how information about benefit [e.g. benefits to nuclear power is high] or information about risk [risk relating to nuclear power is low] could increase the positive affective evaluation of nuclear power and lead to inferences about risk and benefit that coincide affectively with the information given. Similarly, information could make the overall affective evaluation of nuclear power more negative, resulting in inferences about risk and benefit that are consistent with this more negative feeling.” (2006, p. 323)
 
5
“The initial wave of deterrence theorizing came after World War II and was driven by the need to respond to a real-world problem – the invention of the atom bomb. The second wave emerged in the 1950s and 1960s. It applied tools like game theory to develop much of what became conventional wisdom about nuclear strategy (at least in the West). Starting in the 1960s but really taking off in the 1970s, the third wave used statistical and case-study methods to empirically test deterrence theory, mainly against cases of conventional deterrence. The case-study literature also challenged the rational actor assumption employed in second-wave theory.” (Knopf 2010; p. 1)
 
6
Knopf defines this concept as a strategy aiming to “dissuade a potential attacker by convincing them that the effort will not succeed, and they will be denied the benefits they hope to obtain.” (2010; p. 10)
 
7
“Extending deterrence in a credible way proved a more complicated proposition than deterring direct attack. It was entirely credible to threaten the Soviet Union with the use of nuclear weapons in response to a Soviet attack on the United States. But how could the United States make credible the threat to use nuclear weapons against the Soviet homeland in response to a Soviet attack on U.S. allies in Europe?” (Pifer et al. 2010; p. 1)
 
8
Borrowing from the military-like jargon, Gearson explains that “Target hardening of the sort seen initially in London and in recent years across other world cities, and defensive measures taken in response to specific intelligence as a means to deter terrorists from carrying out specific attacks have had quite a good record in the UK and elsewhere.” (Gearson 2012; p. 186)
 
9
“Given the offensive advantage, the number of attackers using cheap, readily available tools will continuously rise, empowering non-established powers such as Iran, North Korea or even Daesh/IS. Reversing this trend requires getting serious about agreeing on international norms and improving both defences, especially employees’ and citizens’ “cyber-hygiene”, and about enforcement.” (Bendiek and Metzger 2015; p. 557)
 
10
Makarenko has devoted much of her research to the investigation of the convergence between organized crime and terrorism. She claims “Criminal and terrorist networks which have emerged from a state of perpetual conflict and instability blatantly reveal the ultimate danger of the crime-terror connection to international security.” (2008; p. 60)
 
11
“Although the importance of blocking criminal opportunities is important in both the context of anti-crime and counter-terrorism, the ability to identify crimes which are of interest to both criminal and terrorist networks provides an invaluable intelligence tool. Thus prior to implementing a policy of denial, it is essential to use knowledge of crime-terror interaction to collect more insight regarding organizational design of both groups, including the fundamentals of the acquisition and movement of criminal financing. Such knowledge not only contributes to the building of solid cases for prosecution services, but it also helps develop adaptive forecasting models which allows law enforcement and the security services to focus their resources.” (Makarenko 2008; p. 71)
 
12
Folke et al. (2007) refer to the contagion from one system domain to another (such as fire, insect outbreak, and disease) where the intersection of slowly and fast variables create alternative states.
 
13
Berkes et al. (2003) claim that the latent processes that are valuable in coping with this type of surprise are normally undiscovered in “normal” times.
 
Literature
go back to reference Achen CH, Snidal D (1989) Rational deterrence theory and comparative case studies. World Polit 41(2):143–169CrossRef Achen CH, Snidal D (1989) Rational deterrence theory and comparative case studies. World Polit 41(2):143–169CrossRef
go back to reference Adams J (1999) Cars, cholera, and cows. Policy Anal 335:1–49 Adams J (1999) Cars, cholera, and cows. Policy Anal 335:1–49
go back to reference Berkes F, Colding J, Folke C (eds) (2003) Navigating social-ecological systems: building resilience for complexity and change. Cambridge University Press, Cambridge Berkes F, Colding J, Folke C (eds) (2003) Navigating social-ecological systems: building resilience for complexity and change. Cambridge University Press, Cambridge
go back to reference Bernstein PL (1996) Against the gods: the remarkable story of risk. Wiley, New York Bernstein PL (1996) Against the gods: the remarkable story of risk. Wiley, New York
go back to reference Bologna S, Fasani A, Martellini M (2013) From fortress to resilience. In: Martellini M (ed) Cyber security. Springer briefs in computer science. Springer, Cham Bologna S, Fasani A, Martellini M (2013) From fortress to resilience. In: Martellini M (ed) Cyber security. Springer briefs in computer science. Springer, Cham
go back to reference Brimmer E (ed) (2008) Five dimensions of homeland & international security. Center for Transatlantic Relations, Johns Hopkins University, Washington, DC Brimmer E (ed) (2008) Five dimensions of homeland & international security. Center for Transatlantic Relations, Johns Hopkins University, Washington, DC
go back to reference Davidson-Hunt IJ, Berkes F (2003) Nature and society through the lens of resilience: toward a human-in-ecosystem perspective. In: Berkes F, Colding J, Folke C (eds) Navigating social-ecological systems: building resilience for complexity and change. Cambridge University Press, Cambridge, pp 53–82 Davidson-Hunt IJ, Berkes F (2003) Nature and society through the lens of resilience: toward a human-in-ecosystem perspective. In: Berkes F, Colding J, Folke C (eds) Navigating social-ecological systems: building resilience for complexity and change. Cambridge University Press, Cambridge, pp 53–82
go back to reference Douglas M, Wildavsky A (1982) Risk and culture: an essay on the selection of technical and environmental dangers. University of California Press, Berkeley Douglas M, Wildavsky A (1982) Risk and culture: an essay on the selection of technical and environmental dangers. University of California Press, Berkeley
go back to reference Fearon JD (1995) Rationalist explanations for war. Int Organ 49(3):379–414CrossRef Fearon JD (1995) Rationalist explanations for war. Int Organ 49(3):379–414CrossRef
go back to reference Folke C (2006) Resilience: the emergence of a perspective for social–ecological systems analyses. Glob Environ Chang 16(3):253–267CrossRef Folke C (2006) Resilience: the emergence of a perspective for social–ecological systems analyses. Glob Environ Chang 16(3):253–267CrossRef
go back to reference Furedi F (2002) Culture of fear. Risk-taking and the morality of low expectation. Continuum, London Furedi F (2002) Culture of fear. Risk-taking and the morality of low expectation. Continuum, London
go back to reference Gearson J (2012) Deterring conventional terrorism: from punishment to denial and resilience. Contemp Secur Policy 33(1):171–198CrossRef Gearson J (2012) Deterring conventional terrorism: from punishment to denial and resilience. Contemp Secur Policy 33(1):171–198CrossRef
go back to reference Jaeger C (2010) Risk, rationality, and resilience. Int J Disaster Risk Sci 1(1):10–16 Jaeger C (2010) Risk, rationality, and resilience. Int J Disaster Risk Sci 1(1):10–16
go back to reference Joseph J (2013) Resilience in UK and French security strategy: an Anglo-Saxon bias? Politics 33(4):253–264CrossRef Joseph J (2013) Resilience in UK and French security strategy: an Anglo-Saxon bias? Politics 33(4):253–264CrossRef
go back to reference Lebow RN (2007). Coercion, cooperation, and ethics in international relations. Taylor & Francis Lebow RN (2007). Coercion, cooperation, and ethics in international relations. Taylor & Francis
go back to reference Makarenko T (2008) Criminal and terrorist networks: gauging interaction and the resultant impact on counter-terrorism. In: Brimmer E (ed) Five dimensions of homeland & international security. Center for Transatlantic Relations, Johns Hopkins University, pp 15–27 Makarenko T (2008) Criminal and terrorist networks: gauging interaction and the resultant impact on counter-terrorism. In: Brimmer E (ed) Five dimensions of homeland & international security. Center for Transatlantic Relations, Johns Hopkins University, pp 15–27
go back to reference Mitchell T, Harris K (2012) Resilience: a risk management approach. ODI Background Note. Overseas Development Institute, London Mitchell T, Harris K (2012) Resilience: a risk management approach. ODI Background Note. Overseas Development Institute, London
go back to reference O’Brien G, Read P (2005) Future UK emergency management: new wine, old skin? Disaster Prev Manag 14(3):353–361CrossRef O’Brien G, Read P (2005) Future UK emergency management: new wine, old skin? Disaster Prev Manag 14(3):353–361CrossRef
go back to reference Omand D (2008) The international aspects of societal resilience: framing the issues. In: Brimmer E (ed) Five dimensions of homeland & international security. Center for Transatlantic Relations, Johns Hopkins University, pp 15–27 Omand D (2008) The international aspects of societal resilience: framing the issues. In: Brimmer E (ed) Five dimensions of homeland & international security. Center for Transatlantic Relations, Johns Hopkins University, pp 15–27
go back to reference Pifer S, Bush RC, Felbab-Brown V, Indyk MS, O’Hanlon M, Pollack KM (2010) US nuclear and extended deterrence: considerations and challenges. Brook Inst Arms Control Ser 3:1–63 Pifer S, Bush RC, Felbab-Brown V, Indyk MS, O’Hanlon M, Pollack KM (2010) US nuclear and extended deterrence: considerations and challenges. Brook Inst Arms Control Ser 3:1–63
go back to reference Slovic P (1987) Perception of risk. Science. New Series 236(4799):280–285CrossRef Slovic P (1987) Perception of risk. Science. New Series 236(4799):280–285CrossRef
go back to reference Slovic P, Peters E (2006) Risk perception and affect. Curr Dir Psychol Sci 15(6):322–325CrossRef Slovic P, Peters E (2006) Risk perception and affect. Curr Dir Psychol Sci 15(6):322–325CrossRef
go back to reference Stein JG (2009) Rational deterrence against ‘irrational’ adversaries? In: Paul TV, Morgan PM, Wirtz JJ (eds) Complex deterrence: strategy in the global age. University of Chicago Press, Chicago, pp 58–82 Stein JG (2009) Rational deterrence against ‘irrational’ adversaries? In: Paul TV, Morgan PM, Wirtz JJ (eds) Complex deterrence: strategy in the global age. University of Chicago Press, Chicago, pp 58–82
go back to reference Tversky A, Kahneman D (1974) Judgment under uncertainty: heuristics and biases. Science 185(4157):1124–1131CrossRef Tversky A, Kahneman D (1974) Judgment under uncertainty: heuristics and biases. Science 185(4157):1124–1131CrossRef
go back to reference Walker B, Salt D (2012) Resilience thinking: sustaining ecosystems and people in a changing world. Island Press, Washington, DC Walker B, Salt D (2012) Resilience thinking: sustaining ecosystems and people in a changing world. Island Press, Washington, DC
Metadata
Title
Resilience and Deterrence: Exploring Correspondence Between the Concepts
Author
Edith Wilkinson
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-29367-3_2