Skip to main content
Log in

An economy of choice? Terrorist decision-making and criminological rational choice theories reconsidered

  • Original Article
  • Published:
Security Journal Aims and scope Submit manuscript

Abstract

This article first identifies the increasing centrality of practical and theoretical crime prevention approaches in tackling terrorism. Central features include the increased use of practical target hardening and rational choice models of trangressive action. Utilising cross-disciplinary research from criminology and terrorism studies, the efficacy of such strategies and their translation into counter-terrorism roles is assessed. It argues that such emphasis on opportunity structures and deterrence models is limited in its account of terrorist decision-making. This is because of many factors including the strong interplay between ideology, motivation and operational choice; the role of extraneous mitigating influences; and the need for theoretical approaches to accommodate evolving threats.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. Indeed, a number of accounts stress how timely and usable intelligence is one of the most potent methods of countering terrorism (see Gill and Phythian, 2006 for an overview).

  2. although constraints are also clearly exerted within these forms of terrorism. Among other examples, this is evinced in the now famous disagreement between Ayman Zawahiri and Abu Musab Zarqawi over the latter's targeting of Iraqi Shia.

  3. Since the 1940s there has been considerable debate within criminology regarding the amount of planning and premeditation involved in criminal offences. Where consensus exists is in the agreement that levels of planning vary over different types of crime. Sexual offences, for instance, are largely associated with relatively autonomous and ‘compressed’ (short) decision-making processes (see Ward and Hudson, 2000). By contrast, research data from interviews with over 2000 convicted bank robbers show that planning is a more central consideration in that activity (see Kube, 1988). However, much of this planning is oriented around escape routes and normally incorporates inaccurate overestimations of the yields of the offence. As such, it is reasonable to conclude that while planning process of criminal offences are important, this is a more consistent, developed and extensive feature of terrorist activity.

  4. Verstehen refers to a qualitative methodological approach that advocates experiencing the social world from the participant's perspective to understand how they mediate and make sense of their own environment and circumstances. This allows participants to use their own concepts and terminology to frame their experience and thus reduce the reactivity and influence of a researchers’ presence on the findings.

  5. Here, it is possible that more detailed lessons from environmental psychology could be utilised, including research on the emotional states that the built environment may generate (see, for example, Kopec, 2006).

References

  • Akers, R. (1990) Rational choice, deterrence, and social learning theory in criminology: The path not taken. Journal of Criminal Law and Criminology 81 (3): 653–676.

    Article  Google Scholar 

  • Baker, J. (2005) Jemaah Islamiyah. In: B. Jackson (ed.) Aptitude for Destruction Volume 2: Case Studies of Organizational Learning in Five Terrorist Groups. Santa Monica, CA: RAND Corporation.

    Google Scholar 

  • BBC. (2007) ‘Bus bomb bid’ CCTV shown to jury, 29 January. http://news.bbc.co.uk/1/hi/uk/6309783.stm, accessed 27 March 2009.

  • Bloom, M. (2005) Dying to Kill: The Allure of Suicide Terror. New York: Columbia University Press.

    Google Scholar 

  • Bowling, B. (1999) The rise and fall of New York murder: Zero tolerance or crack's decline? The British Journal of Criminology 39 (4): 531–555.

    Article  Google Scholar 

  • Burke, J. (2007) Al Qaeda: The True Story of Radical Islam. London: Penguin.

    Google Scholar 

  • Cauley, J. and Im, E. (1988) Intervention policy analysis of skyjackings and other terrorist incidents. American Economic Review 78 (2): 27–31.

    Google Scholar 

  • Cavadino, M. and Dignan, J. (2007) The Penal System: An Introduction. London: Sage.

    Google Scholar 

  • Centre for the Protection of National Infrastructure. (2008) Protecting your assets, http://www.cpni.gov.uk/protectingassets.aspx, accessed 27 March 2008.

  • Clarke, R. (1997) Introduction. In: R. Clarke (ed.) Situational Crime Prevention: Successful Case Studies, 2nd edn. Albany, NY: Harrow and Heston.

    Google Scholar 

  • Clarke, R. and Cornish, D. (1985) Modeling offenders’ decisions: A framework for research and policy. In: M. Tonry and N. Morris (eds.) Crime and Justice: An Annual Review of Research, Vol. 6. Chicago, IL: University of Chicago Press.

    Google Scholar 

  • Clarke, R. and Newman, G. (2006) Outsmarting the Terrorists. London: Praeger.

    Google Scholar 

  • Coaffee, J. (2003) Terrorism, Risk and the City. Aldershot, UK: Ashgate.

    Google Scholar 

  • Della Porta, D. (1995) Italian leftwing terrorism. In: M. Crenshaw (ed.) Terrorism in Context. University Park, PA: Penn State Press.

    Google Scholar 

  • Dickey, C. (2005) Jihad express. Newsweek 21 March: 35.

  • Drake, C. (1998) Terrorists’ Target Selection. London: Macmillan.

    Book  Google Scholar 

  • Enders, W. and Sandler, T. (1993) The effectiveness of anti-terrorism policies: Vector-autoregression-intervention analysis. American Political Science Review 87 (4): 829–844.

    Article  Google Scholar 

  • Faria, J. (2006) Terrorist innovations and anti-terrorist policies. Terrorism and Political Violence 18 (1): 47–56.

    Article  Google Scholar 

  • Farrington, D. and Welsh, B. (2002) Effects of Improved Street Lighting on Crime: A Systematic Review. London: Home Office. Home Office Research Study 251.

  • Felson, M. and Clarke, R. (1998) Opportunity Makes the Thief: Practical Theory for Crime Prevention. London: Home Office. Police Research Series Paper 98.

  • Fussey, P. (2007) Observing potentiality in the global city: Surveillance and counterterrorism in London. International Criminal Justice Review 17 (3): 171–192.

    Article  Google Scholar 

  • Gates, K. (2006) Identifying the 9/11 ‘Faces of Terror': The promise and problem of facial recognition technology. Cultural Studies 20 (4–5): 417–440.

    Article  Google Scholar 

  • Gill, P. and Phythian, M. (2006) Intelligence in an Insecurity World. Cambridge: Polity.

    Google Scholar 

  • Hayward, K. (2007) Situational crime prevention and its discontents: Rational choice theory versus the ‘culture of now’. Social Policy & Administration 41 (3): 232–250.

    Article  Google Scholar 

  • Hesseling, R. (1994) Displacement: A review of the empirical literature. In: R. Clarke (ed.) Crime Prevention Studies, Vol. 3. Monsey, NJ: Criminal Justice Press.

    Google Scholar 

  • Hillyard, P. (1993) Suspect Community: People's Experience of the Prevention of Terrorism Acts in Britain. London: Pluto.

    Google Scholar 

  • Hoffman, B. (1994) Responding to terrorism across the technological spectrum. Terrorism and Political Violence 6 (3): 366–390.

    Article  Google Scholar 

  • Hoffman, B. (2006) Inside Terrorism. New York: Columbia University Press.

    Google Scholar 

  • Horgan, J. (2003) The search for the terrorist personality. In: A. Silke (ed.) Terrorists, Victims and Society: Psychological Perspectives on Terrorism and its Consequences. London: Wiley.

    Google Scholar 

  • Horgan, J. (2005) The Psychology of Terrorism. London: Routledge.

    Book  Google Scholar 

  • Katz, J. (1988) The Seductions of Crime: Moral and Sensual Attractions in Doing Evil. New York: Basic Books.

    Google Scholar 

  • Kopec, D. (2006) Environmental Psychology for Design. New York: Fairchild Books.

    Google Scholar 

  • Kube, E. (1988) Preventing bank robbery: Lessons from interviewing robbers. Journal of Security Administration 11 (2): 78–83.

    Google Scholar 

  • Libicki, M., Chalk, P. and Sisson, M. (2007) Exploring Terrorist Targeting Preferences. Santa Monica, CA: RAND Corporation.

    Google Scholar 

  • Lyon, D. (2003) Surveillance after September 11th. London: Blackwell.

    Google Scholar 

  • Makarenko, T. (2007) International terrorism and the UK: Assessing the threat. In: P. Wilkinson (ed.) Homeland Security in the UK: Future Preparedness for Terrorist Attack since 9/11. London: Routledge.

    Google Scholar 

  • Marcuse, P. (2004) The ‘War on Terrorism’ and life in cities after September 11, 2001. In: S. Graham (ed.) Cities, War and Terrorism. Oxford: Blackwell.

    Google Scholar 

  • McDonald, H. (2008) MI5 targets dissidents as Irish terror threat grows. The Guardian. 28 July, www.guardian.co.uk/uk/2008/jul/28/northernireland.uksecurity, accessed 1 September 2009.

  • MI5. (2005) Security advice, http://www.mi5.gov.uk/output/Page5.html, accessed on 12 July 2006.

  • MI5. (2006) Dissident republicanism threats. MI5: The Threats, http://www.mi5.gov.uk/output/Page40.html, accessed 17 October 2006.

  • NACRO. (2002) To CCTV or Not to CCTV: A Review of Current Research into the Effectiveness of CCTV Systems in Reducing Crime. London: NACRO Community Safety Practice Briefing.

  • Richards, A. (2007) The domestic threat: The cases of Northern Ireland and animal rights extremism. In: P. Wilkinson (ed.) Homeland Security in the UK: Future Preparedness for Terrorist Attack since 9/11. London: Routledge.

    Google Scholar 

  • Sageman, M. (2004) Understanding Terror Networks. Pennsylvania: University of Pennsylvania Press.

    Book  Google Scholar 

  • Schbley, A. (2004) Religious terrorism, the media, and international Islamization terrorism: justifying the unjustifiable. Studies in Conflict & Terrorism 27 (3): 207–233.

    Article  Google Scholar 

  • Shover, N. and Honaker, D. (1992) The socially bounded decision making of persistent property offenders. The Howard Journal of Criminal Justice 31 (4): 263–353.

    Article  Google Scholar 

  • Silke, A. (2008) Holy warriors: Exploring the psychological processes of jihadi radicalization. European Journal of Criminology 5 (1): 99–123.

    Article  Google Scholar 

  • Simon, H.A. (1957) Models of Man: Social and Rational. New York: John Wiley and Sons.

    Google Scholar 

  • Skinns, D. (1998) Crime reduction, diffusion and displacement: Evaluating the effectiveness of CCTV. In: C. Norris, J. Moran and G. Armstrong (eds.) Surveillance, Closed Circuit Television and Social Control. Aldershot, UK: Ashgate.

    Google Scholar 

  • Swain, S. (2006) Policing and fighting terrorism. Paper presented at the Fighting Terrorism: Critical Lessons and Key Issues for the 21st Century Conference; 15 September 2006, University of East London.

  • Venzke, B. and Ibrahim, A. (2003) The al-Qaeda Threat: An Analytical Guide to al-Qaeda's Tactics and Targets. Alexandria, VA: Tempest.

    Google Scholar 

  • Walker, C. (2006) Clamping down on terrorism in the United Kingdom. Journal of International Criminal Justice 4 (5): 1137–1151.

    Article  Google Scholar 

  • Walker, C. and McGuinness, M. (2002) Risk, political violence and policing the City of London. In: A. Crawford (ed.) Crime, Insecurity, Safety and the New Governance. Cullompton, UK: Willan, pp. 234–259.

    Google Scholar 

  • Ward, T. and Hudson, S. (2000) Sexual offenders’ implicit planning: A conceptual model. Sexual Abuse: A Journal of Research and Treatment 12 (3): 189–202.

    Google Scholar 

  • Wilkinson, P. (2007) The threat from the Al-Qaeda network. In: P. Wilkinson (ed.) Homeland Security in the UK: Future Preparedness for Terrorist Attack since 9/11. London: Routledge.

    Chapter  Google Scholar 

  • Wilkinson, P. (2008) Al Qaeda tactics and strategies: Implications for London 2012. Paper presented at the Terrorism & the Olympics: Critical Lessons and Key Issues Conference; 9 May, University of East London.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Fussey, P. An economy of choice? Terrorist decision-making and criminological rational choice theories reconsidered. Secur J 24, 85–99 (2011). https://doi.org/10.1057/sj.2009.11

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/sj.2009.11

Keywords

Navigation