Item Details
Skip Navigation Links
   ActiveUsers:1439Hits:19667743Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

In Basket
  Journal Article   Journal Article
 

ID156901
Title ProperAdversary group decision-making regarding choice of attack methods:
Other Title Informationexpecting the unexpected
LanguageENG
AuthorMurphy, Amy ;  Knight, Sarah E ;  Keane, Carys
Summary / Abstract (Note)Anticipating whether an adversary group will continue to use their usual (“conventional”), expected attack methods is important for military and counterterrorism practitioners tasked with protecting the security of others. Conventional attack methods are by their nature easier to plan and prepare for whilst “innovative” methods may take those responsible for security and counterterrorism by surprise and, as such, may have more impact and more serious consequences. The present study aimed to develop understanding of how, when, and why adversary groups might decide to use conventional attack methods or opt to do something innovative instead. A literature review was conducted and findings were applied to develop a thorough understanding of the decision-making process that underlies an adversary group's choice of attack method. Identified are three stages preceding the execution of an attack: a) “strategic direction”; b) “incubation”; and c) “planning and preparation,” plus “overarching” and “contextual” factors that can influence the process at each stage. It is suggested that it is these factors and how they influence decision-making that result in innovative methods being used to execute an attack, or convention prevailing. Findings can aid practitioners and policy-makers in counterterrorism, security, and law enforcement, to support their understanding, evaluation, and countering of current and future threats.
`In' analytical NoteTerrorism and Political Violence Vol. 29, No.4-6; Jul-Dec 2017: p.713-734
Journal SourceTerrorism and Political Violence Vol: 29 No 4-6
Key WordsCounterterrorism ;  Innovation ;  Attack Methods ;  Adversary Group Decision-Making ;  Attack Planning ;  Malevolent Creativity