Skip to main content

Delegitimising the Adversary: Understanding Actor and Audience Analysis as a Tool to Influence and Persuade

  • Chapter
  • First Online:
Netherlands Annual Review of Military Studies 2017

Part of the book series: NL ARMS ((NLARMS))

Abstract

Influence and persuasion are gaining increased attention in warfare, but often social psychology approaches remain underused or neglected while this academic field has provided useful insights into this approach, especially as a non-kinetic capability. To effectively influence and persuade, we need to understand the adversary and the specific frame of reference of the relevant audience, which can be determined through Actor and Audience Analysis (AAA), a relatively new tool that has shown promising results. Based on the results of AAA, the communicator’s characteristics and persuasion techniques must be tailored to the specific audience. This chapter will use delegitimisation of the adversary, specifically in the context of extremism and terrorism, as an example to demonstrate how influence and persuasion can be applied in a military context.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 64.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Cohen 2016.

  2. 2.

    See for example isisnotinmyname.com. Accessed 7 December 2016.

  3. 3.

    See for example Knopf 2010, pp. 1–33; Knopf 2012, pp. 21–45; Wilner 2010a; Wilner 2010b; Wilner 2011; Wilner 2012; Wilner 2013; Long and Wilner 2014; Wilner 2015a, b.

  4. 4.

    Davis 2010, pp. 1–2, 19–25; Gross Stein 2012, pp. 51–52; Kroenig & Pavel 2012, pp. 23–24; Rid 2012, pp. 127–128; Miller 2013, pp. 134–139.

  5. 5.

    NATO AJP-01(D) 2010, nr. 0407; NATO AJP-5 2013, nr. 0211. See also Chap. 9 by Ducheine, Van Haaster and Van Harskamp in this volume.

  6. 6.

    Schaefer 2007, p. 357.

  7. 7.

    Rashotte 2007, p. 4427; Andersen and Taylor 2008, p. 513; Perloff 2010, p. 13; Northouse 2013, p. 9.

  8. 8.

    Schelling 1966, pp. 2–6; Byman and Waxman 2002, p. 1; Bratton 2005, p. 99; Jakobsen 2010, pp. 279–281.

  9. 9.

    Byman and Waxman 2002, pp. 3–9; Bratton 2005, p. 103; Jakobsen 2010, p. 279; Jakobsen 2011, p. 155; George and Smoke 1974, p. 11; Johnson et al. 2002, pp. 13–14; Thies 2003, p. 243; Bowen 2004, p. 58; Sperandai 2006, p. 253; Heuser 2010, p. 465.

  10. 10.

    See for example Perloff 2010, pp. 17–19; Ledgerwood et al. 2014, p. 533.

  11. 11.

    This chapter is based on the Yale Communication Model, which analyses the audience (whom), the role of the communicator (who) and the message (what and means). See Hovland et al. 1953. For modern applications, see for example Bordens and Horowitz 2002, pp. 217–231; Maio and Haddock 2007, pp. 569–570; Perloff 2010, pp. 126–127.

  12. 12.

    See for example Suchman 1995, p. 574; Toros 2008, pp. 407–426; Beetham 2012, p. 123; Lamb 2014, p. 17.

  13. 13.

    Kelman 2001.

  14. 14.

    See for example McBride 2011; Benard 2011; Kalmonick 2012; Benard 2015.

  15. 15.

    Wilner 2011, pp. 26–27; Long and Wilner 2014, pp. 127–128; Wilner 2015a, pp. 66–68; Wilner 2015b, pp. 445, 449.

  16. 16.

    For rational actor theory, see for example Schelling 1960; Schelling 1966. For strategic culture, see Johnston 1995; Sheehan 2010, p. 171; Walton 2012, p. 321; Lantis and Howlett 2013, pp. 80–82.

  17. 17.

    For rational actor theory see Lebow and Gross Stein 1989; Davis 2012, pp. 70–71; Gross Stein 2012, pp. 51–52; Miller 2013, pp. 139–140; Sauer 2015, p. 113. Rational actor theory has also been criticised as a psychological approach, see for example McAllister and Schmid 2011, p. 222; Rogers 2011, pp. 38–40. For strategic culture, see Booth 1981, p. 15; Coskun 2007; Bunn 2007, pp. 1–8; Long 2009; Toje 2009; Williams and Covarrubias 2009, p. 267; Echevarria 2011, pp. 431–445.

  18. 18.

    Byman 1998, pp. 149–169; Davis and Jenkins 2004; Jenkins 2006; Fussey 2011, p. 174; McAllister and Schmid 2011, p. 260; Davis 2014.

  19. 19.

    Wilner 2011, p. 4, 6; Long and Wilner 2014, pp. 152–153; Wilner 2015a, p. 17; Wilner 2015b, pp. 458–460.

  20. 20.

    Sherif 1937; Eagly and Chaiken 1998, p. 304; Abrams and Levine 2012, pp. 62–63; Gavac et al. 2016, pp. 353–354.

  21. 21.

    Van Gorp 2007; Seese 2014; Cwalina et al. 2015, pp. 90–91; Paul et al. 2015; Tatham 2015a.

  22. 22.

    Perloff 2010, p. 13; Benard 2011; Northouse 2013, p. 9; Benard 2015.

  23. 23.

    See for example AJP-3.4.4. nrs. 0217, 0446.

  24. 24.

    See for example Bjorgo 2013, pp. 10, 26; Koehler 2015, p. 135.

  25. 25.

    See for example Bjorgo 2013, pp. 6–9; Braddock 2014, p. 62; El-Said 2015, pp. 10–11; Koehler 2015, p. 135.

  26. 26.

    Schmid 2013; El-Said 2015, pp. 10–11.

  27. 27.

    Jacobson 2010; Fink and El-Said 2011; Sim 2013; Clubb 2014, pp. 842–861; Cronin 2009, pp. 61–62; Della Porta 2009, pp. 66–87; Haniff Bin Hassan 2012, pp. 358–384.

  28. 28.

    See for example AJP-3.10.1(a) 2007 (NATO); FM 3-53 2013 (United States of America); AJP-3.10.1 2014 (United Kingdom). In the United States of America the term PsyOps has been replaced by Military Information Support Operations (MISO).

  29. 29.

    Interview with Meike Wolf, Senior Actor and Audience Analyst at the Dutch Civil and Military Interaction Command (1 CMI-Commando).

  30. 30.

    Tatham 2013, 2015a; Tatham and Giles 2015. For other models, see for example Boslaugh et al. 2005; Paul et al. 2015, pp. 171–172 (on audience segmentation), and Jackson 2009, pp. 216–217; Mac Ginty 2010; Paul et al. 2015, pp. 172–173 (on social network analysis).

  31. 31.

    Bordens and Horowitz 2002a, b, pp. 231–232; Tatham 2015a, pp. 21–25.

  32. 32.

    See for example Bordens and Horowitz 2002a, b; Maio and Haddock 2007; Hitlin and Pinkston 2013; Petty et al. 2013.

  33. 33.

    See for example Archetti 2013, pp. 118–122; Bjorgo 2013, pp. 9–13; Medina and Hepner 2013; Bosi and Della Porta 2015, pp. 83–84.

  34. 34.

    McAllister and Schmid 2011, pp. 214–260; Schmid 2013, p. 4; Bosi and Della Porta 2015, pp. 83–86; Ferguson 2016, p. 3.

  35. 35.

    Tatham 2015a, pp. 27–29.

  36. 36.

    Ibid. See also Tatham 2015b.

  37. 37.

    Interview with Meike Wolf.

  38. 38.

    See for example Spaaij 2012, p. 47; Lowe 2014, p. 30; Alimi et al. 2015, p. 11. Note that not all radicals become terrorist or violent extremists—it is a cognitive process that can lead to the use of violence.

  39. 39.

    See for example Schmid 2013; Dzhekova et al. 2016; Veldhuis and Staun 2009; Borum 2011; Christmann 2012; Young et al 2013; Kundnani 2015.

  40. 40.

    Rahimullah et al. 2013; Kruglanski et al. 2014; Dzhekova et al. 2016, p. 22.

  41. 41.

    For examples on how measures are tailored to the specific audience, see Veenkamp and Zeiger 2015.

  42. 42.

    Note that authors tend to differentiate between de-radicalisation (changing beliefs) and disengagement (changing behaviour), since some persons may disengage from violence but maintain radical thoughts and beliefs. See for example Metz and Millen 2004; Gompert 2007, p. 44; Horgan 2009; Fink and El-Said 2011; Clubb 2014; Jasparro 2015, p. 95.

  43. 43.

    Bjorgo 2002, pp. 11–13; Bjorgo 2009, pp. 30–48; Noricks 2009, pp. 301–304; Rabasa et al. 2010, pp. 11–12; Dalfgaard-Nielsen 2013; Altier et al. 2014; Bertram 2015.

  44. 44.

    Drezner 1999, p. 188; Byman and Waxman 2002, pp. 231, 227; Jakobsen 2011, p. 156; Motwani 2012, p. 14; Bjorgo 2013, p. 90.

  45. 45.

    Barrelle 2014.

  46. 46.

    Barrelle 2014, p. 83.

  47. 47.

    Boer and Boehnke 2016, p. 131.

  48. 48.

    See for example Jenkins et al. 2015; Mazarr 2015; Voelz 2015; Bunker 2016.

  49. 49.

    More on this from a counter- and de-radicalisation perspective can be read in El-Said 2015, pp. 1–11: ‘soft measures (…) have yielded more benefits than purely kinetic approaches (…) particularly in reducing the rates of terrorist incidences’.

  50. 50.

    Rashotte 2007, p. 4426; Forsyth 2013, p. 305.

  51. 51.

    Perloff 2010, p. 13.

  52. 52.

    Cialdini 2007, 2011.

  53. 53.

    For an extensive overview of theories of influence and persuasion, see Paul et al. 2015, pp. 317–348.

  54. 54.

    Bordens and Horowitz 2002a, b, pp. 219–220; Rucker et al. 2015, pp. 31–32.

  55. 55.

    Borum 2004, pp. 49–50.

  56. 56.

    Petty et al. 1983; Dal Cin et al. 2004, p. 180; Cialdini 2007, pp. 171–204.

  57. 57.

    Howard 2000, p. 372; Stroink 2007, p. 298; Janoff-Bulman and Werther 2008, p. 165; Ledgerwood et al. 2014, p. 549.

  58. 58.

    Mackie and Queller 2000; Bodenhausen and Morales 2013, p. 239; Ledgerwood et al. 2014, p. 549.

  59. 59.

    Rogers 2011, pp. 37–38; Stets and Serpe 2013, p. 31; Goerzig and Al-Hashimi 2015, pp. 19–20, 32, 140–144; Rabasa and Benard 2015, pp. 29, 58; Roberts 2015, pp. 209–212.

  60. 60.

    Cialdini 2007, pp. 129–133; Wells 2015, pp. 161–162.

  61. 61.

    Dovidio et al. 2013.

  62. 62.

    Barrelle 2014, pp. 60, 101–102.

  63. 63.

    O’Brien 2008.

  64. 64.

    Espí 2015.

  65. 65.

    Data was found in the Euskobarómetro, an analysis made every year by the University of Basque Country which measures, amongst others, support for ETA. Whereas 64% of the Basque population totally rejected ETA, whereas the remaining 36% either thought that violence was justified in the past, but not in the present, or presented a total rejection of the violence. The last group still supports the goals, but not the manner in which ETA tried to achieve them. See Universidad del País Vasco 2011. For ETA’s statement, see Europa Press (2011) ETA anuncia el cese definitivo de su actividad armada (Video File). Youtube, 20 October 2011. Accessed 16 December 2016.

  66. 66.

    Clubb 2014, pp. 856–857; Sim 2013.

  67. 67.

    Logan 2016.

  68. 68.

    Cialdini 2007.

  69. 69.

    Cialdini 2007, p. 17; Hogh-Olesen 2013, p. 213; Wells 2015, pp. 159–160.

  70. 70.

    Paul 2009, p. 128; Haslam et al. 2010, p. 50; Adelman and Chapman 2011, p. 16. Kamolnick 2012, p. 14.

  71. 71.

    Ribetti 2009, pp. 166–168; Villanueva O’Driscoll et al. 2013, pp. 117–140; Marsden 2015, pp. 204–205; McColl 2016.

  72. 72.

    Dandurand 2015, pp. 23–37; Goerzig and Al-Hashimi 2015, p. 16; Bjorgo 2006, p. 14.

  73. 73.

    Bell 2013; Boudreau 2015.

  74. 74.

    Cialdini 2007, p. 238; Wells 2015, pp. 162–163.

  75. 75.

    See for example Jakobsen 1998; Cialdini 2007; Wells 2015.

  76. 76.

    Dearden 2016; O’Neill 2016.

  77. 77.

    Bjorgo et al. 2009, pp. 144–146.

  78. 78.

    Jacobson 2010, pp. 15–16; Perloff 2010, pp. 238–239; Gill et al. 2015, p. 252.

  79. 79.

    Shapiro 2013, p. 201.

  80. 80.

    Franzese 2013, p. 286.

  81. 81.

    Al Jazeera 2015.

  82. 82.

    For an overview, see Baumeister et al. 2013, p. 261.

  83. 83.

    Evans and O’Doherty 2014.

  84. 84.

    Varnum et al. 2010; Baumeister et al. 2013, p. 266.

References

  • Abrams D, Levine JM (2012) Norm Formation: Revisiting Sherif’s autokinetic illusion study. In: Smith JR, Haslam A (eds) Social Psychology: Revisiting the Classical Studies. Sage, London, pp 57–75

    Google Scholar 

  • Adelman JR, Chapman A (2011) Social Identification, Influence and Why People Join Al-Qaeda in the Arabian Peninsula (AQAP). In: Chapman A, Adelman J (eds) Influencing Violent Extremist Organizations: Focus on Al Qaeda in the Arabian Peninsula (AQAP). Department of Defense, Washington, pp 13–44

    Google Scholar 

  • Al Jazeera (2015) Former al-Qaeda mufti: I condemn ISIL attacks (21 November 2015) http://www.aljazeera.com/programmes/talktojazeera/2015/11/abu-hafs-al-mauritani-al-qaeda-mufti-reject-islamic-state-isil-baghdadi-caliphate-151121133941210.html

  • Alimi EY, Demetriou C, Bosi L (2015) The Dynamics of Radicalization. A Relational and Comparative Perspective. Oxford University Press, Oxford

    Google Scholar 

  • Altier MB, Thoroughgood CN, Horgan JG (2014) Turning away from terrorism: Lessons from psychology, sociology, and criminology. Journal of Peace Research 51(5):647–661

    Google Scholar 

  • Andersen ML, Taylor HF (2008) Sociology - Understanding a Diverse Society. Thomson Wadsworth, Belmont

    Google Scholar 

  • Archetti C (2013) Understanding Terrorism in the Age of Global Media - A Communication Approach. Palgrave Macmillan, London

    Google Scholar 

  • Barrelle K (2014) Pro-Integration: Disengagement and life after extremism. Monash University, Melbourne

    Google Scholar 

  • Baumeister RF, Masicampo EJ, Twenge JM (2013) The Social Self. In: Suls JM, Tennen HA (eds) Handbook of Psychology. John Wiley & Sons Inc, Hoboken NJ, pp 247–274

    Google Scholar 

  • Beetham D (2012) Political Legitimacy. In: Amenta E, Nash K, Scott A (eds) The Wiley-Blackwell Companion to Political Sociology. Blackwell Publishing, West Sussex, pp 120–129

    Google Scholar 

  • Bell S (2013) ‘It’s between me and God’: How a Calgary high school dropout joined Syria’s civil war. National Post (12 July 2013) http://www.news.nationalpost.com/news/its-between-me-and-god-how-a-calgary-high-school-dropout-joined-syrias-civil-war Accessed 29 November 2016

  • Benard C (2011) The Mechanics of De-Legitimization. In: Canna S, Popp G (eds) Countering Violent Extremism: Scientific Methods & Strategies. NSI, Washington DC, pp 106–111

    Google Scholar 

  • Benard C (2015) The Mechanics of De-Legitimization. In: Canna S, Popp G (eds) Countering Violent Extremism: Scientific Methods & Strategies. NSI, Washington DC, pp 95–103

    Google Scholar 

  • Bertram L (2015) How Could a Terrorist be De-Radicalised? Journal for Deradicalization 5:120–149

    Google Scholar 

  • Bjorgo T (2002) Exit Neo-Nazism: Reducing Recruitment and Promoting Disengagement from Racist Groups. NUPI Working Paper 627. Norsk Utenrikspolitisk Institutt, Oslo

    Google Scholar 

  • Bjorgo T (2006) Reducing Recruitment and Promoting Disengagement for Extremist Groups: The Case of Racist Sub-Cultures. In: Benard C (ed) A Future for the Young: Options for Helping Middle Eastern Youth Escape the Trap of Radicalization. RAND, Santa Monica CA, pp 1–30

    Google Scholar 

  • Bjorgo T (2009) Processes of disengagement from violent groups of the extreme right. In: Bjorgo T, Horgan J (eds) Leaving terrorism behind: Individual and collective disengagement. Routledge, New York, pp 30–48

    Google Scholar 

  • Bjorgo T (2013) Strategies for Preventing Terrorism. Palgrave Macmillan, London

    Google Scholar 

  • Bjorgo T, Van Donselaar J, Grunenberg S (2009) Exit from right-wing extremist groups - Lessons from disengagement programmes in Norway, Sweden and Germany. In: Bjorgo T, Horgan J (eds) Leaving terrorism behind: Individual and collective disengagement. Routledge, New York, pp 135–151

    Google Scholar 

  • Bodenhausen GV, Morales JR (2013) Social Cognition and Perception. In: Suls JM, Tennen HA (eds) Handbook of Psychology. John Wiley & Sons Inc, Hoboken NJ, pp 225–246

    Google Scholar 

  • Boer D, Boehnke K (2016) What are values? Where do they come from? A developmental perspective. In: Brosch T, Sander D (eds) Handbook of Value - Perspectives from economics, neuroscience, philosophy, psychology, and sociology. Oxford University Press, Oxford, pp 129–151

    Google Scholar 

  • Booth K (1981) Strategy and Ethnocentrism. Holmes and Meier, New York

    Google Scholar 

  • Bordens KS, Horowitz IA (2002) Social Psychology. Lawrence Erlbaum Associates, Mahwah NJ

    Google Scholar 

  • Borum R (2004) Psychology of Terrorism. University of South Florida, Tampa

    Google Scholar 

  • Borum R (2011) Radicalization into Violent Extremism II: A Review of Conceptual Models and Empirical Research. Journal of Strategic Security 4(4):37–62

    Google Scholar 

  • Bosi L, Della Porta D (2015) Processes of disengagement from political violence - A multi-level relational approach. In: Tellidis I, Toros H (eds) Researching Terrorism, Peace and Conflict Studies. Routledge, New York, pp 81–99

    Google Scholar 

  • Boslaugh SE, Kreuter MW, Nicholson RA, Naleid K (2005) Comparing demographic, health status and psychosocial strategies of audience segmentation to promote physical activity. Health Educ. Res. 20(4):430–438

    Google Scholar 

  • Boudreau C (2015) My son was born in Nova Scotia. He died an IS extremist in Syria. This can be stopped. The Globe and Mail (17 February 2015) http://www.theglobeandmail.com/opinion/my-son-died-fighting-in-syria-we-need-a-dialogue-to-stop-others-joining-him/article23023630/ Accessed 29 November 2016

  • Bowen W (2004) Deterrence and Asymmetry: Non-State Actors and Mass Casualty Terrorism. Contemporary Security Policy 25(1):54–70

    Google Scholar 

  • Braddock K (2014) The talking cure? Communication and psychological impact in prison de-radicalisation programmes. In: Silke A (ed) Prisons, terrorism and extremism. Routledge, New York, pp 60–74

    Google Scholar 

  • Bratton PC (2005) When is Coercion Successful? And Why Can’t We Agree on It? Naval War College Review 58(3):99–120

    Google Scholar 

  • Bunker RJ (2016) Old and New Insurgency Forms. Strategic Studies Institute, Carlisle PA

    Google Scholar 

  • Bunn ME (2007) Can Deterrence Be Tailored? Strategic Forum 225:1–8

    Google Scholar 

  • Byman D (1998) The logic of ethnic terrorism. Studies in Conflict & Terrorism 21(2):149–169

    Google Scholar 

  • Byman D, Waxman M (2002) The Dynamics of Coercion: American Foreign Policy and the Limits of Military Might. Cambridge University Press, New York

    Google Scholar 

  • Christmann K (2012) Preventing Religious Radicalisation and Violent Extremism - A Systematic Review of the Research Evidence. Youth Justice Board, London

    Google Scholar 

  • Cialdini RB (2007) Influence: The psychology of persuasion. Harper Collins Publishers, New York

    Google Scholar 

  • Cialdini RB (2011) Roots, Shoots, and Fruits of Persuasion in Military Affairs. Analyses of Social Issues and Public Policy, 11(1):27–30

    Google Scholar 

  • Clubb G (2014) “From Terrorists to Peacekeepers”: The IRA’s Disengagement and the Role of Community Networks. Studies in Conflict & Terrorism 37(10):842–861

    Google Scholar 

  • Cohen E (2016) From terrorist to university expert: GW hires former Islamic extremist. CNN (30 August 2016) http://www.edition.cnn.com/2016/08/30/health/gw-hires-former-islamic-extremist/index.html Accessed 28 November 2016

  • Coskun BB (2007) Does “Strategic Culture” Matter? Old Europe, New Europe and the Transatlantic Security. Perceptions 12(2):71–90

    Google Scholar 

  • Cronin AK (2009) How terrorist campaigns end. In: Bjorgo T, Horgan J (eds) Leaving terrorism behind: Individual and collective disengagement. Routledge, New York, pp 49–65

    Google Scholar 

  • Cwalina W, Falkowski A, Newman BI (2015) Persuasion in the Political Context: Opportunities and Threats. In: Stewart DW (ed) The Handbook of Persuasion and Social Marketing, Volume 1: Historical and Social Foundations. Praeger, Santa Barbara CA, pp 61–128

    Google Scholar 

  • Dal Cin S, Zanna MP, Fong GT (2004) Narrative Persuasion and Overcoming Resistance. In: Knowles ES, Linn JA (eds) Resistance and Persuasion. Lawrence Erlbaum, Mahwah NJ, pp 175–192

    Google Scholar 

  • Dalfgaard-Nielsen A (2013) Promoting Exit from Violent Extremism: Themes and Approaches. Studies in Conflict & Terrorism 36(3):99–115

    Google Scholar 

  • Dandurand Y (2015) Social Inclusion Programmes for Youth and the Prevention of Violent Extremism. In: Lombardi M, Ragab E, Chin V et al (eds) Countering Radicalisation and Violent Extremism Among Youth to Prevent Terrorism. IOS Press, Amsterdam, pp 23–37

    Google Scholar 

  • Davis PK (2010) Simple Models to Explore Deterrence and More General Influence in the War with al-Qaeda. RAND, Santa Monica CA

    Google Scholar 

  • Davis PK (2012) Toward an Analytic Basis for Influence Strategy in Counterterrorism. In: Wenger A, Wilner A (eds) Deterring Terrorism: Theory and Practice. Stanford University Press, Stanford, pp 67–94

    Google Scholar 

  • Davis PK (2014) Toward Theory for Dissuasion (or Deterrence) by Denial: Using Simple Cognitive Models of the Adversary to Inform Strategy (RAND Working Paper WR-1027). RAND, Santa Monica CA

    Google Scholar 

  • Davis PK, Jenkins BM (2004) A System Approach to Deterring and Influencing Terrorists. Conflict Management and Peace Science 21(1):3–15

    Google Scholar 

  • Dearden L (2016) Former ISIS militant who grew up in the UK says coalition bombing will drive more jihadists to launch attacks. Mirror (29 April 2016) http://www.mirror.co.uk/news/world-news/isis-fighter-who-escaped-terrorist-7584183 Accessed 29 November 2016

  • Della Porta D (2009) Leaving underground organizations: A sociological analysis of the Italian case. In: Bjorgo T, Horgan J (eds) Leaving terrorism behind: Individual and collective disengagement. Routledge, New York, pp 66–87

    Google Scholar 

  • Dovidio JF, Gaertner SL, Wright Mayville E, Perry S (2013) Social Conflict, Harmony, and Integration. In: Suls JM, Tennen HA (eds) Handbook of Psychology. John Wiley & Sons Inc, Hoboken NJ, pp 429–448

    Google Scholar 

  • Drezner DW (1999) The Trouble with Carrots: Transaction Costs, Conflict Expectations and Economic Inducements. Security Studies 9(1–2):188–218

    Google Scholar 

  • Dzhekova R, Stoynova N, Kojouharov A, Mancheva M, Anagnostou D, Tsenkov E (2016) Understanding Radicalisation. Review of Literature. Center for the Study of Democracy, Sofia

    Google Scholar 

  • Eagly AH, Chaiken S (1998) Attitude Structure and Function. In: Gilbert T, Fiske ST, Lindzey G (eds) Handbook of Social Psychology. Mc-Graw-Hill, Boston MA, pp 269–322

    Google Scholar 

  • Echevarria A (2011) American Strategic Culture: Problems and Prospects. In: Strachan H, Scheipers S (eds) The Changing Character of War. Oxford University Press, Oxford, pp 431–445

    Google Scholar 

  • El-Said H (2015) New Approaches to Countering Terrorism - Designing and Evaluating Counter Radicalization and De-Radicalization Programs. Palgrave Macmillan, London

    Google Scholar 

  • Espí S (2015) Entrevista al Etarra Iñaki Rekarte. Escalofriante ‘Salvados’: “Ser de ETA te convertía en un héroe, celebraban atentados y nos protegían en casas”. Periodista Digital (11 May 2015) http://www.periodistadigital.com/3segundos/periodismo/2015/05/11/jordi-evole-salvados-tremenda-entrevista-inaki-rekarte-etarra-arrepentido-redes-sociales-podridos-por-dentro-irene-villa-twitter.shtml Accessed 29 November 2016

  • Evans R, O’Doherty SP (2014) 8 Terrifying Life Lessons from a Former Terrorist. Cracked (28 July 2014) http://www.cracked.com/personal-experiences-1420-8-terrifying-life-lessons-from-former-terrorist.html Accessed 29 November 2016

  • Ferguson N (2016) Disengaging from Terrorism: A Northern Irish Experience. Journal for Deradicalization 6(1):1–23

    Google Scholar 

  • Fink NC, El-Said H (2011) Transforming Terrorists: Examining International Efforts to Address Violent Extremism. International Peace Institute, New York

    Google Scholar 

  • Forsyth DR (2013) Social Influence and Group Behavior. In: Suls JM, Tennen HA (eds) Handbook of Psychology Volume 5: Personality and Social Psychology. John Wiley & Sons Inc, Hoboken NJ, pp 305–328

    Google Scholar 

  • Franzese AT (2013) Motivation, Motives, and Individual Agency. In: Delamater J, Ward A (eds) Handbook of Social Psychology. Springer, Dordrecht, pp 191–224.

    Google Scholar 

  • Fussey P (2011) Deterring Terrorism? Target-hardening, surveillance and the prevention of terrorism. In: Silke A (ed) The Psychology of Counter-Terrorism. Routledge, New York, pp 164–185

    Google Scholar 

  • Gavac S, Murrar S, Brauer M (2016) Group Perception and Social Norms. In: Summers RW (ed) Social Psychology: How Other People Influence Our Thoughts and Actions. ABC-CLIO, Santa Barbara CA, pp 333–361

    Google Scholar 

  • George AL, Smoke R (1974) Deterrence in American Foreign Policy: Theory and Practice. Columbia University Press, New York

    Google Scholar 

  • Gill P, Bouhana N, Morrisson J (2015) Individual Disengagement from Terrorist Groups. In: Kennedy-Pipe C, Clubb G, Mabon S (eds) Terrorism and Political Violence. SAGE, London, pp 243–257

    Google Scholar 

  • Goerzig C, Al-Hashimi K (2015) Radicalization in Western Europe: Integration, public discourse, and loss of identity among Muslim communities. Routledge, New York

    Google Scholar 

  • Gompert DC (2007) Heads We Win - The Cognitive Side of Counterinsurgency (COIN). RAND, Santa Monica CA

    Google Scholar 

  • Gross Stein J (2012) Deterring Terrorism, Not Terrorists. In: Wenger A, Wilner A (eds) Deterring Terrorism: Theory and Practice. Stanford University Press, Stanford, pp 46–66

    Google Scholar 

  • Haniff Bin Hassan M (2012) Key considerations in counterideological work against terrorist ideology. In: Horgan J, Braddock K (eds) Terrorism Studies: A Reader. Routledge, New York, pp 358–384

    Google Scholar 

  • Haslam SA, Reicher SD, Platow MJ (2010) The New Psychology of Leadership: Identity, Influence and Power. Psychology Press, East Sussex

    Google Scholar 

  • Heuser B (2010) The Evolution of Strategy - Thinking War from Antiquity to the Present. Cambridge University Press, Cambridge

    Google Scholar 

  • Hitlin S, Pinkston K (2013) Values, Attitudes, and Ideologies: Explicit and Implicit Constructs Shaping Perception and Action. In: Delamater J, Ward A (eds) Handbook of Social Psychology. Springer, Dordrecht, pp 319–340

    Google Scholar 

  • Hogh-Olesen H (2013) The will to sacrifice: Sharing and sociality in humans, apes and monkeys. In: Geertz AW (ed) Origins of Religion, Cognition and Culture. Routledge, New York, pp 203–218

    Google Scholar 

  • Horgan J (2009) Walking Away from Terrorism: Accounts of Disengagement from Radical and Extremist Movements. Routledge, New York

    Google Scholar 

  • Hovland CI, Janis IL, Kelley HH (1953) Persuasion and communication. Yale University Press, New Haven CT

    Google Scholar 

  • Howard JA (2000) Social Psychology of Identities. Ann Rev of Soc 26:367–393

    Google Scholar 

  • Jackson BA (2009) Organizational Decisionmaking by Terrorist Groups. In: Davis PK, Cragin K (eds) Social Science for Counterterrorism - Putting the Pieces Together. RAND, Santa Monica CA, pp 209–256

    Google Scholar 

  • Jacobson M (2010) Terrorist Dropouts: Learning from Those Who Have Left (Policy Focus No. 101). The Washington Institute for Near East Policy, Washington DC

    Google Scholar 

  • Jakobsen PV (1998) Western Use of Coercive Diplomacy after the Cold War: A Challenge for Theory and Practice. Macmillan Press Ltd, Basingstoke

    Google Scholar 

  • Jakobsen PV (2010) Coercive Diplomacy. In: Collins A (ed) Contemporary Security Studies. Oxford University Press, Oxford, pp 277–298

    Google Scholar 

  • Jakobsen PV (2011) Pushing the Limits of Military Coercion Theory. International Studies Perspectives 12(2):151–170

    Google Scholar 

  • Janoff-Bulman R, Werther A (2008) The social psychology of respect: Implications for Delegitimization and Reconciliation. In: Nadler A, Malloy T, Fisher JD (eds) Social Psychology of inter-group reconciliation: From violent conflict to peaceful co-existence. Cambridge University Press, Cambridge, pp 145–171

    Google Scholar 

  • Jasparro C (2015) The Case for Cultural Heritage Protection as an Element of COIN. In: Cline LW, Shemella P (eds) The future of counterinsurgency: Contemporary debates in internal security strategy. ABC-CLIO, Santa Barbara CA, pp 91–120

    Google Scholar 

  • Jenkins BM (2006) Unconquerable Nation: Knowing Our Enemies, Strengthening Ourselves. RAND, Santa Monica CA

    Google Scholar 

  • Jenkins DM, Endersby L, Guthrie KL (2015) Leadership Education 2050: Changing the Spaces and Faces of Experience. In: Sowcik M, Andenoro AC, McNutt M, Murphy SE (eds) Leadership 2050: Critical Challenges, Key Contexts, and Emerging Trends. Emerald Group Publishing, Bingley, pp 127–144

    Google Scholar 

  • Johnson DE, Mueller KP, Tafter WH (2002) Across the Spectrum of Operations - The Utility of U.S. Military Forces in the Emerging Security Environment. RAND, Santa Monica CA

    Google Scholar 

  • Johnston AI (1995) Thinking about Strategic Culture. International Security 19(4):36–43

    Google Scholar 

  • Kalmonick P (2012) Delegitimizing Al-Qaeda: A Jihadist-Realist Approach. Strategic Studies Institute, Carlisle PA

    Google Scholar 

  • Kelman HC (2001) Reflection on Social and Psychological Processes of Legitimization and Delegitimization. In: Jost JT, Major B (eds) The Psychology of Legitimacy. Cambridge University Press, Cambridge, pp 54–73

    Google Scholar 

  • Knopf JW (2010) The Fourth Wave in Deterrence Research. Contemporary Security Policy 31(1):1–33

    Google Scholar 

  • Knopf JW (2012) Terrorism and the Fourth Wave in Deterrence Research. In: Wenger A, Wilner A (eds) Deterring Terrorism. Theory and Practice. Stanford University Press, Stanford, pp 21–45

    Google Scholar 

  • Koehler D (2015) De-radicalization and Disengagement Programs as Counter-Terrorism and Prevention Tools - Insights From Field Experiences Regarding German Right-Wing Extremism and Jihadism. In: Lombardi M, Ragab E, Chin V et al (eds) Countering Radicalisation and Violent Extremism Among Youth to Prevent Terrorism. IOS Press, Amsterdam, pp 120–150

    Google Scholar 

  • Kroenig M, Pavel B (2012) How to Deter Terrorism. The Washington Quarterly 35(2):21–36

    Google Scholar 

  • Krugslanski AW, Gelfand MJ et al (2014) The Psychology of Radicalization and Deradicalization: How Significance Quest Impacts Violent Extremism. Advances in Political Psychology 35(1):69–93

    Google Scholar 

  • Kundnani A (2015) A Decade Lost: Rethinking Radicalisation and Extremism. Claystone, London

    Google Scholar 

  • Lamb RD (2014) Rethinking Legitimacy and Illegitimacy - A New Approach in Assessing Support and Opposition across Disciplines (CSIS Report). Rowman & Littlefield, Lanham MD

    Google Scholar 

  • Lantis JS, Howlett D (2013) Strategic Culture. In: Baylis J, Wirtz JJ, Gray CS (eds) Strategy in the Contemporary World - An Introduction to Strategic Studies. Oxford University Press, Oxford, pp 76–95

    Google Scholar 

  • Lebow RN, Gross Stein J (1989) Rational Deterrence Theory: I Think, Therefore I Deter. World Politics 41(2):208–224

    Google Scholar 

  • Ledgerwood A, Callahan SP, Chaiken S (2014) Changing Minds: Persuasion in Negotiation and Conflict Resolution. In: Coleman PT, Deutsch M, Marcus EC (eds) The Handbook of Conflict Resolution: Theory and Practice. Jossey-Bass, San Francisco CA, pp 533–557

    Google Scholar 

  • Logan L (2016) How Unconventional Thinking Transformed a War-Torn Colombia. CBS News (11 December 2016) http://www.cbsnews.com/news/60-minutes-colombia-after-civil-war-lara-logan/ Accessed 30 December 2016

  • Long JM (2009) Strategic Culture, Al-Qaeda, and Weapons of Mass Destruction. In: Johnson JL, Kartchner KM, Larsen JA (eds) Does Al Qaeda have a Strategic Culture? Palgrave Macmillan, London, pp 201–220

    Google Scholar 

  • Long JM, Wilner A (2014) Delegitimizing al-Qaida. Defeating an “Army Whose Men Love Death”. International Security 39(1):126–164

    Google Scholar 

  • Lowe D (2014) Radicalization of Terrorist Causes: The 32CSM/IRA Threat to U.K. Security. In: Lowe D, Turk A, Das DK (eds) Examining Political Violence - Studies of Terrorism, Counterterrorism and Internal War. CRC Press, Boca Raton FL, pp 25–56

    Google Scholar 

  • Mac Ginty R (2010) Social network analysis and counterinsurgency: a counterproductive strategy? Critical Studies on Terrorism 3(2):209–226

    Google Scholar 

  • Mackie DM, Queller S (2000) The impact of group membership on persuasion: Revisiting “Who says what to whom with what effect?” In: Terry DJ, Hogg MA (eds) Attitudes, behavior, and social context: the role of norms and group membership. Erlbaum, Mahwah NJ, pp 135–155

    Google Scholar 

  • Maio GR, Haddock G (2007) Attitude Change. In: Kruglanksi AW, Higgins ET (eds) Social Psychology. The Guildford Press, New York, pp 565–586

    Google Scholar 

  • Marsden S (2015) How Terrorism Ends. In: Kennedy-Pipe C, Clubb G, Mabon S (eds) Terrorism and Political Violence. SAGE, London, pp 199–225

    Google Scholar 

  • Mazarr MJ (2015) Mastering the Gray Zone: Understanding a Changing Era of Conflict. Strategic Studies Institute, Carlisle PA

    Google Scholar 

  • McAllister B, Schmid AP (2011) Theories of Terrorism. In: Schmid AP (ed) The Routledge Handbook of Terrorism Research. Routledge, New York, pp 201–271

    Google Scholar 

  • McBride MK (2011) The Logic of Terrorism: Existential Anxiety, the Search for Meaning and Terrorist Ideologies. Terrorism and Political Violence 23:560–581

    Google Scholar 

  • McColl R (2016) Who Will Hire Colombia’s Ex-Terrorists? The Daily Beast (21 May 2016) http://www.thedailybeast.com/articles/2016/05/21/who-will-employ-colombia-s-future-ex-guerrillas.html Accessed 29 November 2016

  • Medina RM, Hepner GF (2013) The Geography of International Terrorism - An Introduction to Spaces and Places of Violent Non-State Groups. CRC Press, Boca Raton FL

    Google Scholar 

  • Metz S, Millen R (2004) Insurgency and Counterinsurgency in the 21st Century: Reconceptualizing Threat and Response. Strategic Studies Institute, Carlisle PA

    Google Scholar 

  • Miller GD (2013) Terrorist Decision Making and the Deterrence Problem. Studies in Conflict & Terrorism 36(2):132–151

    Google Scholar 

  • Motwani N (2012) The Relevance of Coercive Diplomacy despite its Mixed Results. Burgmann Journal 1:13–20.

    Google Scholar 

  • NATO (2007) AJP-3.10.1(A): Allied Joint Doctrine for Psychological Operations, October 2007

    Google Scholar 

  • NATO (2010) AJP-01(D): Allied Joined Doctrine, December 2010

    Google Scholar 

  • NATO (2011), AJP 3–4.4: Allied Joint Doctrine for Counterinsurgency (COIN), February 2011

    Google Scholar 

  • NATO (2013) AJP-5: Allied Joint Doctrine for Operational-Level Planning, June 2013

    Google Scholar 

  • Noricks DME (2009) The Root Causes of Terrorism. In: Davis PK, Cragin K (eds) Social Science for Counterterrorism. Putting the Pieces Together. RAND, Santa Monica CA, pp 11–70

    Google Scholar 

  • Northouse (2013) Leadership: Theory and Practice. SAGE, London

    Google Scholar 

  • O’Neill K (2016) ISIS fighter who escaped terrorist group reveals he didn’t ‘support ideology’ in first interview. Mirror (18 March 2016) http://www.mirror.co.uk/news/world-news/isis-fighter-who-escaped-terrorist-7584183 Accessed 29 November 2016

  • O’Brien N (2008) Interview with a Former Terrorist: Nasir Abbas’ Deradicalization Work in Indonesia. CTC Sentinel 1:12

    Google Scholar 

  • Paul C (2009) How do Terrorists Generate and Maintain Support? In: Davis PK, Cragin K (eds) Social Science for Counterterrorism: Putting the Pieces Together. RAND, Santa Monica CA, pp 113–150

    Google Scholar 

  • Paul C, Yeats J, Clarke CP, Matthews M, Skrabala L (2015) Assessing and Evaluating Department of Defense Efforts to Inform, Influence and Persuade: Desk Reference. RAND, Santa Monica CA

    Google Scholar 

  • Perloff RM (2010) The dynamics of persuasion. Communication and attitudes in the 21st century. Routledge, New York

    Google Scholar 

  • Petty RE, Cacioppo JT, Schumann D (1983) Central and peripheral routes to advertising effectiveness: The moderating role of involvement. Journal of Consumer Research 10(2):135–146

    Google Scholar 

  • Petty RE, Wheeler SC, Tormala ZL (2013) Persuasion and Attitude Change. In: Tennen HA, Suls JM. (eds) Handbook of Psychology, Volume 5: Personality and Social Psychology. John Wiley & Sons, Hoboken NJ, pp 369–390

    Google Scholar 

  • Rabasa A, Benard C (2015) Eurojihad. Patterns of Islamist Radicalization and Terrorism in Europe. Cambridge University Press, Cambridge

    Google Scholar 

  • Rabasa A, Pettyjohn SL, Ghez JJ, Boucek C (2010) Deradicalizing Islamist Extremists. RAND, Santa Monica CA

    Google Scholar 

  • Rahimullah RH, Larmar S, Abdalla M (2013) Understanding Violent Radicalization amongst Muslims: A Review of the Literature. Journal of Psychology and Behavioral Science 1(1):19–35

    Google Scholar 

  • Rashotte L (2007) Social Influence. In: Ritzer G (ed) The Blackwell Encyclopedia of Sociology. Blackwell Publishing, West Sussex

    Google Scholar 

  • Ribetti M (2009) Disengagement and beyond: A case study of demobilization in Colombia. In: Bjorgo T, Horgan J (eds) Leaving terrorism behind: Individual and collective disengagement. Routledge, New York, pp 152–169

    Google Scholar 

  • Rid T (2012) Deterrence beyond the State: The Israeli Experience. Contemporary Security Policy 33(1):124–147

    Google Scholar 

  • Roberts K (2015) Social Psychology and the Investigation of Terrorism. In: Pearse J (ed) Investigating Terrorism. Current Political, Legal and Psychological Issues. John Wiley & Sons, West Sussex, pp 202–213

    Google Scholar 

  • Rogers B (2011) The psychology of violent radicalisation. In: Silke A (ed) The Psychology of Counter-Terrorism. Routledge, New York, pp 34–47

    Google Scholar 

  • Rucker DD, Petty RE, Briñol P (2015) Social Psychological Foundations of Social Marketing. In: Stewart DW (ed) The Handbook of Persuasion and Social Marketing, Volume 1: Historical and Social Foundations. Praeger, Santa Barbara CA, pp 27–60

    Google Scholar 

  • Sauer F (2015) Atomic Anxiety. Deterrence, Taboo and the Non-Use of U.S. Nuclear Weapons. Palgrave Macmillan, London

    Google Scholar 

  • Schaefer RT (2007) Sociology. McGraw-Hill, New York

    Google Scholar 

  • Schelling T (1960) The Strategy of Conflict. Harvard University Press, Cambridge

    Google Scholar 

  • Schelling T (1966) Arms and Influence. Yale University Press, New Haven

    Google Scholar 

  • Schmid AP (2013) Radicalisation, De-Radicalisation, Counter-Radicalisation: A Conceptual Discussion and Literature Review (ICCT Research Paper). International Centre for Counter-Terrorism, The Hague

    Google Scholar 

  • Seese G (2014) Comprehensive PSYOP Assessment and Evaluation in Counterterrorism Efforts. In: NATO Centre of Excellence Defence Against Terrorism. Strategic Communication in Counter Terrorism: Target Audience Analysis, Measures of Effect and Counter Narrative 04–05 June 2014, pp 19–23

    Google Scholar 

  • Shapiro E (2013) Social Psychology and the Body. In: Delamater J, Ward A (eds) Handbook of Social Psychology. Springer, Dordrecht, pp 191–224

    Google Scholar 

  • Sheehan M (2010) Military Security. In: Collins A (ed) Contemporary Security Studies. Oxford University Press, Oxford, pp 167–184

    Google Scholar 

  • Sherif M (1937) An experimental approach to the study of attitudes. Sociometry 1:90–98

    Google Scholar 

  • Sim S (2013) Countering Violent Extremism: Leveraging Terrorist Dropouts to Counter Violent Extremism in Southeast Asia. Qatar International Academy for Security Studies, Qatar

    Google Scholar 

  • Spaaij R (2012) Understanding Lone Wolf Terrorism. Springer, Dordrecht

    Google Scholar 

  • Sperandai M (2006) Bridging Deterrence and Compellence: An Alternative Approach to the Study of Coercive Diplomacy. International Studies Review 8(2):253–280

    Google Scholar 

  • Stets JE, Serpe RT (2013) Identity Theory. In: Delamater J, Ward A (ed) Handbook of Social Psychology. Springer, Dordrecht, pp 31–60

    Google Scholar 

  • Stroink ML (2007) Processes and Preconditions Underlying Terrorism in Second-Generation Immigrants. Peace and Conflict: Journal of Peace Psychology 13(3):293–312

    Google Scholar 

  • Suchman MC (1995) Managing Legitimacy: Strategic and Institutional Approaches. The Academy of Management Review 20(3):571–610

    Google Scholar 

  • Tatham S (2013) U.S. Governmental Information Operations and Strategic Communications: A Discredited Tool or User Failure? Implications for Future Conflict. Strategic Studies Institute, Carlisle PA

    Google Scholar 

  • Tatham S (2015a) Using Target Audience Analysis to Aid Strategic Level Decisionmaking. Strategic Studies Institute, Carlisle PA

    Google Scholar 

  • Tatham S (2015b) Target Audience Analysis. Three Swords Magazine 28:50–53

    Google Scholar 

  • Tatham S, Giles K (2015) Training Humans for the Human Domain. Strategic Studies Institute, Carlisle PA

    Google Scholar 

  • Thies WJ (2003) Compellence Failure of Coercive Success? The Case of NATO and Yugoslavia. Comparative Strategy 22(3):243–267

    Google Scholar 

  • Toje A (2009) Strategic Culture as an Analytical Tool. History, Capabilities, Geopolitics and Values: The EU Example. Western Balkans Security Observer 14(4):3–23

    Google Scholar 

  • Toros H (2008) ‘We Don’t Negotiate with Terrorists!’: Legitimacy and Complexity in Terrorist Conflicts. Security Dialogue 39(4):407–426

    Google Scholar 

  • United Kingdom Ministry of Defence (2014) AJP-3.10.1: Allied Joint Doctrine for Psychological Operations (Edition B version 1 with UK National Elements), September 2014 http://www.gov.uk/government/uploads/system/uploads/attachment_data/file/450521/20150223-AJP_3_10_1_PSYOPS_with_UK_Green_pages.pdf Accessed 4 March 2017

  • United States Department of the Army (2013) Field Manual 3-53 (FM 3-53): Military Information Support Operations, January 2013

    Google Scholar 

  • Universidad del País Vasco (2011) Euskobarómetro Mayo 2011. University of Basque Country, Bilbao. http://www.ehu.eus/documents/1457190/1525260/EB1105.pdf Accessed 29 November 2016

  • Van Gorp B (2007) The Constructionist Approach to Framing: Bringing Culture Back In. Journal of Communication 57(1):60–78

    Google Scholar 

  • Varnum MEW, Grossmann I, Kitayama S, Nisbett RE (2010) The Origin of Cultural Differences in Cognition: Evidence for the Social Orientation Hypothesis. Curr Dir Psychol Sci 19(1):9–13

    Google Scholar 

  • Veenkamp I, Zeiger S (2015) Countering Violent Extremism: Program and policy approaches relating to youth through education, families and communities. In: Lombardi M, Ragab E, Chin V et al (eds) Countering Radicalisation and Violent Extremism Among Youth to Prevent Terrorism. IOS Press, Amsterdam, pp 151–163

    Google Scholar 

  • Veldhuis T, Staun J (2009) Islamist Radicalisation: A Root Cause Model. Netherlands Institute of International Relations Clingendael, The Hague

    Google Scholar 

  • Voelz GJ (2015) The Rise of iWar: Identity, Information, and the Individualization of Modern Warfare. Strategic Studies Institute, Carlisle PA

    Google Scholar 

  • Villanueva O’Driscoll J, Loots G, Derluyn I (2013) Children Disengaged from Armed Groups in Colombia: Integration Processes in Context. Versita, London

    Google Scholar 

  • Walton CD (2012) Weapons of Mass Destruction. In: Jordan D, Kiras JD, Lonsdale DJ et al (eds) Understanding Modern Warfare. Cambridge University Press, Cambridge, pp 292–340

    Google Scholar 

  • Wells S (2015) Hostage Negotiation and Communication Skills. In: Pearse J (ed) Investigating Terrorism - Current Political, Legal and Psychological Issues. John Wiley & Sons, West Sussex, pp 144–166

    Google Scholar 

  • Williams MA, Covarrubias J (2009) Rebalancing America’s War on Terror: President Obama. In: Lansford T, Watson RP, Covarrubias J (eds) America’s War on Terror. Ashgate Publishing Ltd, Surrey, pp 261–282

    Google Scholar 

  • Wilner A (2010a) Delegitimising Terrorism: A better way to counter radicalization and recruitment in the West. Atlantic Institute for Market Studies, Nova Scotia

    Google Scholar 

  • Wilner A (2010b) Targeted Killings in Afghanistan: Measuring Coercion and Deterrence in Counterterrorism and Counterinsurgency. Studies in Conflict & Terrorism 33(4):307–329

    Google Scholar 

  • Wilner A (2011) Deterring the Undeterrable: Coercion, Denial, and Delegitimization in Counterterrorism. Journal of Strategic Studies 34(1):3–37

    Google Scholar 

  • Wilner A (2012) Apocalypse Soon? Deterring Iran and its Terrorist Proxies. Comparative Strategy 31(1):18–40

    Google Scholar 

  • Wilner A (2013) Fencing in Warfare: Threats, Punishment, and Intra-War Deterrence in Counterterrorism. Security Studies 22(4):740–772

    Google Scholar 

  • Wilner A (2015a) Deterring Rational Fanatics. Pennsylvania University Press, Philadelphia

    Google Scholar 

  • Wilner A (2015b) Contemporary Deterrence Theory and Counterterrorism: A Bridge Too Far? NYU Journal of International Law and Politics 47(2):439–462

    Google Scholar 

  • Young HF, Zwenk F, Rooze M (2013) A review of the literature on radicalisation; and what it means for TERRA. Terra, Diemen

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Christina van Kuijck .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 T.M.C. Asser Press and the authors

About this chapter

Cite this chapter

van Kuijck, C. (2017). Delegitimising the Adversary: Understanding Actor and Audience Analysis as a Tool to Influence and Persuade. In: Ducheine, P., Osinga, F. (eds) Netherlands Annual Review of Military Studies 2017. NL ARMS. T.M.C. Asser Press, The Hague. https://doi.org/10.1007/978-94-6265-189-0_11

Download citation

  • DOI: https://doi.org/10.1007/978-94-6265-189-0_11

  • Published:

  • Publisher Name: T.M.C. Asser Press, The Hague

  • Print ISBN: 978-94-6265-188-3

  • Online ISBN: 978-94-6265-189-0

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics