The Terrorist's Dilemma PDF ePub eBook

Books Info:

The Terrorist's Dilemma free pdf How do terrorist groups control their members? Do the tools groups use to monitor their operatives and enforce discipline create security vulnerabilities that governments can exploit? The Terrorist's Dilemma is the first book to systematically examine the great variation in how terrorist groups are structured. Employing a broad range of agency theory, historical case studies, and terrorists' own internal documents, Jacob Shapiro provocatively discusses the core managerial challenges that terrorists face and illustrates how their political goals interact with the operational environment to push them to organize in particular ways. Shapiro provides a historically informed explanation for why some groups have little hierarchy, while others resemble miniature firms, complete with line charts and written disciplinary codes. Looking at groups in Africa, Asia, Europe, and North America, he highlights how consistent and widespread the terrorist's dilemma - balancing the desire to maintain control with the need for secrecy - has been since the 1880s. Through an analysis of more than a hundred terrorist autobiographies he shows how prevalent bureaucracy has been, and he utilizes a cache of internal documents from al-Qa'ida in Iraq to outline why this deadly group used so much paperwork to handle its people. Tracing the strategic interaction between terrorist leaders and their operatives, Shapiro closes with a series of comparative case studies, indicating that the differences in how groups in the same conflict approach their dilemmas are consistent with an agency theory perspective. The Terrorist's Dilemma demonstrates the management constraints inherent to terrorist groups and sheds light on specific organizational details that can be exploited to more efficiently combat terrorist activity.

About Jacob N. Shapiro

Jacob N. Shapiro is assistant professor of politics and international affairs at Princeton University and codirects the Empirical Studies of Conflict Project.

Details Book

Author : Jacob N. Shapiro
Publisher : Princeton University Press
Data Published : 04 August 2013
ISBN : 0691157219
EAN : 9780691157214
Format Book : PDF, Epub, DOCx, TXT
Number of Pages : 350 pages
Age + : 15 years
Language : English
Rating :

Reviews The Terrorist's Dilemma

17 Comments Add a comment

Related eBooks Download

  • Aptitude for Destruction free pdfAptitude for Destruction

    Understanding how terrorist groups learn may aid in developing strategies to combat terrorist activities Better ways are needed to understand how terrorist groups become more effective and dangerous..

  • Handbook of Computational Approaches to Counterterrorism free pdfHandbook of Computational Approaches to Counterterrorism

    Terrorist groups throughout the world have been studied primarily through the use of social science methods. However. major advances in IT during the past decade have led to significant new ways of studying terrorist groups..

  • The War on Terror and the Laws of War free pdfThe War on Terror and the Laws of War

    Many years after the United States initiated a military response to the terrorist attacks of September 11th. 2001. the nation continues to prosecute what it considers an armed conflict against transnational terrorist groups..

  • The Last Crusade free pdfThe Last Crusade

    The terrorist group. OBL-911. attacks New York City killing and wounding several hundred people. but they suffer major losses from the Joint Terrorist Task Force forcing them to go into hiding..

  • Violence in Between free pdfViolence in Between

    A recent series of terrorist attacks. the uncovering of a large terrorist network. and a string of continuing regional conflicts have raised an awareness that Southeast Asia is amongst the world's most troubled areas..

  • The Terrorist's Dilemma free pdfThe Terrorist's Dilemma

    Down Load Books. How do terrorist groups control their members? Do the tools groups use to monitor their operatives and enforce discipline create security vulnerabilities that governments can exploit?