Study: Conciliatory Tactics More Effective Than Punishment in Reducing Terrorism

Policies that reward abstinence from terrorism are more successful in reducing such acts of violence than tactics that aim to punish terrorists, suggests a new study in the August issue of the American Sociological Review.

Titled, “Moving Beyond Deterrence: The Effectiveness of Raising the Expected Utility of Abstaining from Terrorism in Israel,” the study looked specifically at the Israeli-Palestinian conflict and found that between 1987 and 2004, Israeli policies and actions that encouraged and rewarded refrain from terrorist acts were more successful in reducing terrorism than policies focused on punishment.

“Our argument begins to challenge the very common view that to combat terrorism, you have to meet violence with violence,” said Erica Chenoweth, study co-author and Assistant Professor at the Josef Korbel School of International studies at the University of Denver.

The study is the first to empirically evaluate the potential of conciliatory tactics in reducing terrorism. It relies on data from the Center for the Study of Terrorism and Response to Terrorism’s (START) Global Terrorism Database (GTD) and from the Government Actions in a Terrorist Environment-Israel (GATE-Israel) dataset. The GTD records global terrorist attacks, including Palestinian terrorist acts, while the GATE-Israel dataset, which the study authors developed, identifies counterterrorism strategies that Israel used against Palestinian targets and places them on a seven point scale from violent acts resulting in death to conciliatory acts involving peaceful gestures.

Examples of Israel’s conciliatory tactics that rewarded refrain from terrorist acts included: providing social services to potential terrorist constituencies, encouraging peace talks, withdrawing troops, releasing prisoners, and promoting cultural freedoms.

Israel’s repressive and punishment centered attempts to reduce terrorism included: passage of anti-terrorism laws, extension of prison sentences, assassination, deportation, and military retaliation.

The study found these repressive and punishment based methods to be less effective in reducing terrorism. Yet, in an average month between 1987 and 2004, Israel took approximately 18 repressive or punishment based actions against Palestinian targets and less than eight conciliatory actions.

Chenoweth and her co-author Laura Dugan, an Associate Professor in the Department of Criminology and Criminal Justice at the University of Maryland, said they hope their findings encourage policymakers to give more consideration to conciliatory actions.

“The general consensus across the political spectrum is that when there is terrorism you have to fight back,” Dugan said. “This study suggests that there is value in looking at the grievances, the people most affected by these grievances, and the constituencies of these terrorist organizations.”

According to the study’s authors, when policymakers focused on improving the living conditions for Palestinian constituents, those same constituents were encouraged not to participate in terrorist organizations and, consequently, terrorism rates fell.

“If the constituency of a terrorist organization no longer supports that organization, then the organization can’t thrive,” Dugan said.

In addition, Dugan and Chenoweth argue that terrorists do not commit terrorist acts for the same reasons that common criminals commit crimes. Therefore, they believe counterterrorism tactics should not mirror typical crime fighting approaches.

“Strategies that successfully deter common criminals may be ineffective for terrorists,” Chenoweth said. “This is because terrorists are generally less concerned about being punished and more concerned about their role in ensuring the well-being of their movement and its constituency.”

While Dugan and Chenoweth found conciliatory policies to be more successful than repressive and punishment centered actions in reducing incidents of terrorism, the study authors are not completely opposed to the use of repressive and punishment based strategies.

“We do not recommend that governments adopt purely conciliatory policies,” Dugan said. “Our hope is that this research provides alternatives to solely focusing policy efforts on reducing the expected utility of bad behavior by also considering the value of raising the expected utility of good behavior.”

Featured

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”