Beyond Pain: Coercing Violent Non-State Actors
By Troy S. Thomas*
2010
Today‟s global conflict environment is permeated by the existence of a diverse range of violent non-
state actors (VNSA). These groups utilize subversive means to exploit and disrupt the international
system, frequently committing heinous acts of violence against innocent civilians in the process.
Short of war, how can nation-states effectively counter the actions of VNSA? This paper examines
the proposition that VNSA can be coerced by the threat or limited use of military force. By defining
the problem, adapting strategy to the problem and assessing the historical record the author makes
the case that coercion is a viable option for confronting VNSA.
This paper follows-on to previous work done for INSS on violent non-state actors by Troy S.
Thomas, Steven D. Kiser, and William D. Casebeer including: Lords of the Silk Route, INSS
Occasional Paper #43; Violent Systems, INSS Occasional Paper #52; and Turbulent Arena, INSS
Occasional Paper #58.
Military strategy can no longer be thought of, as it could for some countries in some eras,
as the science of military victory. It is now equally, if not more, the art of coercion, of
intimidation and deterrence. The instruments of war are more punitive than acquisitive.
Military strategy, whether we like it or not, has become the diplomacy of violence.1
INTRODUCTION
Suicide bombers are inspired and coached to their victims by al Qaeda and its franchises in
Afghanistan, Iraq, Algeria, Yemen and beyond. Somali pirates disrupt shipping in the Indian Ocean,
kidnapping civilians and extorting governments. Warlords terrorize the creeks of the Niger Delta as part
of a “blood oil” trade. A quasi-religious drug cartel, La Familia, decapitates its way to control of
Mexican drug trafficking routes. These violent non-state actors (VNSA), or armed groups, and others
pervade the global conflict landscape. These conflicts pit nation-states against armed groups working to
exploit, subvert and overthrow the international system; conflicts fueled by globalization‟s dark dynamics
and punctuated by unconscionable violence against innocents; conflicts induced by true believers and
hardened criminals armed with low- and high-tech weapons of mass destruction and disruption. In such
conflicts, do we have options for using military force short of war? Are such adversaries susceptible to
coercion? If so, how might a coercive strategy work?
This paper aims to answer these questions by examining the proposition that VNSA can be
coerced by the threat or limited use of military force. I conclude that coercion is a viable option for
* Troy S. Thomas, Lt Col (Col Select) USAF, is a student at the National War College at the time of this writing.
The views expressed in this paper are those of the author and do not necessarily reflect the offici ...
Mohan Guruswamy's presentation at a recent seminar on how to respond to another state sponsored terrorist attack from Pakistan. A tit for tat reaction may not dissuade Pakistan from more of it, but the GOI owes it to the Indian public to get satisfaction. Turning the other cheek is not policy.
A Flexible Response: Imposing Costs on Non-state Aggression.avidas
Terrorism aims to cause terror through violence against civilians to achieve political goals. Effective deterrence of terrorism requires identifying the organizations and leaders, credibly threatening assets they value, and the ability to retaliate. However, deterring asymmetric non-state actors is challenging given their lower threshold for success. An effective strategy may include direct military threats combined with pressuring supporting states, institutions, and populations while limiting radicalization through restraint. Excessive retaliation risks increased indirect costs through public fear while providing propaganda benefits to terrorists.
1) The document discusses various strategies and theories related to deterring terrorism and non-state actors, including flexible response, pre-modern doctrines of deterrence, and imposing direct costs on terrorist organizations and states that support them.
2) It provides examples of stand-off weapons like air-to-surface missiles that could impose such costs from a distance while minimizing collateral damage.
3) The document argues that retaliation against non-state actors must be swift, proportionate, and focus on the organization rather than civilians in order to impact domestic morale and force supporting states to restrain terrorists.
Please respond to the following discussion topic. 75-150 words in le.docxDustiBuckner14
Please respond to the following discussion topic. 75-150 words in length. Then,
Pick one of the counterterrorism measures discussed in our readings for this week and provide examples of when they successfully achieved a counterterrorism goal as well as when they failed. At what point do you think the failures outweigh the successes?
The Utility of Hard and Soft Power in Counterterrorism
Hard power consists of coercive techniques that force other parties to change their behaviors regardless of their desire to do so.
Soft power consists of co-opting techniques that encourage other parties to change their behaviors because they view it is in their best interests to do so.
Military Hard Power
Military Retaliation/Reprisal
Military retaliation or reprisal refers to military action taken against an entity as punishment for acts that entity has already committed.
Military forces can target terrorist organizations, state-sponsors of terrorist organizations, or both, depending on the desired effect.
International law is generally understood to define the legal use of military reprisal when:
Peaceful redress has failed.
Retaliatory action results in damages proportional to those caused by the offending act and does not harm innocent people.
Occurs within a limited time period following the offending act, usually interpreted to be within seventy-two hours.
Military Preemption
Preemptive attack refers to military strikes in advance of a hostile act in order to prevent it from occurring, such as when an attack is deemed imminent, or to avoid injury should it occur, such as when an attack would result in catastrophic destruction even if its occurring it not deemed imminent.
While military preemption against terrorist organizations has its time and place, approaches relying on traditional criminal justice techniques or co-opting terrorist organizations into a legitimate political process has historically outperformed military preemption as an effective counterterrorism strategy (indeed, it is the most effective method so far).
Commando Raids
Unlike full military interventions or highly public air strikes against enemy targets, small groups of elite forces – often referred to as “commandos” – can be deployed to neutralize specific parts of a terrorist organization or its capabilities.
Besides their ability to be deployed discreetly, commando raids have historically high accuracy rates and place innocent people at must lower risk than larger scale attacks.
Assassinations
In the context of this course, assassinations refer to the targeted killing of individuals who represent key terrorist capabilities.
When governments employ assassinations, they generally do so only with careful consideration and often deny their use, as in most circumstances the public rarely feels that assassinations represent a counterterrorism method consistent with their values and the balance between security and justice.
Hostage Rescue Missions
For a variety of reasons that we have a.
This document discusses how global jihadist groups have tactically adopted terrorism as an insurgent tactic. It argues that the US needs to redefine these groups as radical Islamic insurgencies using terrorist tactics, rather than solely terrorist groups. The document examines the differences between insurgency and terrorism, and how groups have adopted terrorist tactics for their coercive effects. It recommends that the US improve its understanding of why groups adopt different tactics and view them as strategic choices based on factors like resources and environment, rather than fixed labels, to better counter future insurgent threats.
Victory Amongst People - Mills- Richards - Ewen McLayEwen McLay
The document summarizes and reviews the book "Victory Among People – Lessons from Countering Insurgency and Stabilising Fragile States". It makes the following key points:
1) The book provides a rich starting point for studying insurgencies and is a must-read for counterinsurgents.
2) It examines regional case studies of 16 counterinsurgency campaigns across different continents and decades. Common themes that emerge can inform how to counter insurgencies.
3) The authors have extensive first-hand operational experience, giving credibility to the analysis and recommendations in the book.
Q- War is often said to be rooted in multiple sources located at various levels of analysis. For each level of analysis, discuss specific factors and theories that have contributed to the understanding of causes of war.
The document discusses nonviolent action as a realistic alternative to violence in conflicts. It provides examples of nonviolent struggles throughout history against oppressive regimes, occupations, and dictatorships. The key points are:
- Nonviolent action has been successfully used across many cultures and eras as a powerful means of waging conflicts without violence.
- Examples include resistance to Nazi occupation, the US civil rights movement, anti-apartheid struggles in South Africa, and movements that overthrew dictatorships in the Philippines, Eastern Europe, and Serbia.
- For nonviolent action to be a viable alternative to violence, it needs to be able to effectively address "hard cases" like opposing oppression,
Mohan Guruswamy's presentation at a recent seminar on how to respond to another state sponsored terrorist attack from Pakistan. A tit for tat reaction may not dissuade Pakistan from more of it, but the GOI owes it to the Indian public to get satisfaction. Turning the other cheek is not policy.
A Flexible Response: Imposing Costs on Non-state Aggression.avidas
Terrorism aims to cause terror through violence against civilians to achieve political goals. Effective deterrence of terrorism requires identifying the organizations and leaders, credibly threatening assets they value, and the ability to retaliate. However, deterring asymmetric non-state actors is challenging given their lower threshold for success. An effective strategy may include direct military threats combined with pressuring supporting states, institutions, and populations while limiting radicalization through restraint. Excessive retaliation risks increased indirect costs through public fear while providing propaganda benefits to terrorists.
1) The document discusses various strategies and theories related to deterring terrorism and non-state actors, including flexible response, pre-modern doctrines of deterrence, and imposing direct costs on terrorist organizations and states that support them.
2) It provides examples of stand-off weapons like air-to-surface missiles that could impose such costs from a distance while minimizing collateral damage.
3) The document argues that retaliation against non-state actors must be swift, proportionate, and focus on the organization rather than civilians in order to impact domestic morale and force supporting states to restrain terrorists.
Please respond to the following discussion topic. 75-150 words in le.docxDustiBuckner14
Please respond to the following discussion topic. 75-150 words in length. Then,
Pick one of the counterterrorism measures discussed in our readings for this week and provide examples of when they successfully achieved a counterterrorism goal as well as when they failed. At what point do you think the failures outweigh the successes?
The Utility of Hard and Soft Power in Counterterrorism
Hard power consists of coercive techniques that force other parties to change their behaviors regardless of their desire to do so.
Soft power consists of co-opting techniques that encourage other parties to change their behaviors because they view it is in their best interests to do so.
Military Hard Power
Military Retaliation/Reprisal
Military retaliation or reprisal refers to military action taken against an entity as punishment for acts that entity has already committed.
Military forces can target terrorist organizations, state-sponsors of terrorist organizations, or both, depending on the desired effect.
International law is generally understood to define the legal use of military reprisal when:
Peaceful redress has failed.
Retaliatory action results in damages proportional to those caused by the offending act and does not harm innocent people.
Occurs within a limited time period following the offending act, usually interpreted to be within seventy-two hours.
Military Preemption
Preemptive attack refers to military strikes in advance of a hostile act in order to prevent it from occurring, such as when an attack is deemed imminent, or to avoid injury should it occur, such as when an attack would result in catastrophic destruction even if its occurring it not deemed imminent.
While military preemption against terrorist organizations has its time and place, approaches relying on traditional criminal justice techniques or co-opting terrorist organizations into a legitimate political process has historically outperformed military preemption as an effective counterterrorism strategy (indeed, it is the most effective method so far).
Commando Raids
Unlike full military interventions or highly public air strikes against enemy targets, small groups of elite forces – often referred to as “commandos” – can be deployed to neutralize specific parts of a terrorist organization or its capabilities.
Besides their ability to be deployed discreetly, commando raids have historically high accuracy rates and place innocent people at must lower risk than larger scale attacks.
Assassinations
In the context of this course, assassinations refer to the targeted killing of individuals who represent key terrorist capabilities.
When governments employ assassinations, they generally do so only with careful consideration and often deny their use, as in most circumstances the public rarely feels that assassinations represent a counterterrorism method consistent with their values and the balance between security and justice.
Hostage Rescue Missions
For a variety of reasons that we have a.
This document discusses how global jihadist groups have tactically adopted terrorism as an insurgent tactic. It argues that the US needs to redefine these groups as radical Islamic insurgencies using terrorist tactics, rather than solely terrorist groups. The document examines the differences between insurgency and terrorism, and how groups have adopted terrorist tactics for their coercive effects. It recommends that the US improve its understanding of why groups adopt different tactics and view them as strategic choices based on factors like resources and environment, rather than fixed labels, to better counter future insurgent threats.
Victory Amongst People - Mills- Richards - Ewen McLayEwen McLay
The document summarizes and reviews the book "Victory Among People – Lessons from Countering Insurgency and Stabilising Fragile States". It makes the following key points:
1) The book provides a rich starting point for studying insurgencies and is a must-read for counterinsurgents.
2) It examines regional case studies of 16 counterinsurgency campaigns across different continents and decades. Common themes that emerge can inform how to counter insurgencies.
3) The authors have extensive first-hand operational experience, giving credibility to the analysis and recommendations in the book.
Q- War is often said to be rooted in multiple sources located at various levels of analysis. For each level of analysis, discuss specific factors and theories that have contributed to the understanding of causes of war.
The document discusses nonviolent action as a realistic alternative to violence in conflicts. It provides examples of nonviolent struggles throughout history against oppressive regimes, occupations, and dictatorships. The key points are:
- Nonviolent action has been successfully used across many cultures and eras as a powerful means of waging conflicts without violence.
- Examples include resistance to Nazi occupation, the US civil rights movement, anti-apartheid struggles in South Africa, and movements that overthrew dictatorships in the Philippines, Eastern Europe, and Serbia.
- For nonviolent action to be a viable alternative to violence, it needs to be able to effectively address "hard cases" like opposing oppression,
The document discusses developing a realistic alternative to war and other violence for resolving acute conflicts where fundamental issues are at stake. It argues that nonviolent action provides a substitute for violence that is a powerful means of waging conflict without relying on war. Nonviolent action has been successfully used across many cultures and centuries in a variety of conflicts against oppression, dictatorship, invasion, and other threats. When fundamental issues are involved, nonviolent action can replace violence as the means of last resort for defending principles or existence without submitting to the opponent.
Statement of Erroll G. Southers before the US House of Representatives Commit...Elsevier
Counterterrorism expert and Elsevier Author Erroll Southers testifies at the Congressional Homeland Security Committee's first hearing on the Boston bombings.
Attempts To Define Terrorism Terrorist Or Freedom FighterDustin Pytko
The document evaluates the challenges of defining terrorism. It argues that definitions of terrorism are inherently subjective since they are created with a purpose in mind by the definer. Definitions vary between contexts and change over time as new political enemies emerge. Western states in particular exhibit bias by excluding their own violent actions from the definition of terrorism. The lack of a universal definition reflects these political influences and the subjective nature of labeling certain acts as terrorism.
Terrorism is evolving into smaller, more decentralized cells to carry out asymmetric warfare using unconventional tactics. Future conflicts will likely involve combating small terrorist units using weapons of mass destruction and sophisticated tactics. Additionally, terrorist groups may simultaneously attack critical infrastructure through cyber and physical means. To address this evolving threat, military strategies, training, and equipment must adapt from conventional warfare to asymmetric low-intensity conflicts involving terrorist and insurgent groups.
Terrorism has a significant impact on global politics. Terrorist groups use violence and attacks to create fear in society and force political reactions from governments. Modern terrorism poses many threats as demonstrated by attacks in major cities like Paris in 2015. The rise of groups like ISIS and al-Qaeda has increased terrorism's influence on global affairs, forcing states to rethink policies like immigration, spending, and defense.
This document summarizes a paper on using soft power and diplomacy in counter-terrorism strategies, with a focus on Turkey. It begins with definitions of hard power and soft power, noting that hard power approaches to counter-terrorism have not always been effective. It then discusses reasons for terrorism, including social and political injustice, the belief that violence can create change, lack of education and poverty. The document reviews literature on the role of diplomacy and aims of soft power in counter-terrorism. It identifies specific soft power strategies like conducting information campaigns and creating negative images of terrorists. It concludes that while effective use of force is important, preventing radicalization through soft power is even more critical to counter-terrorism
A Five-Point Strategy to Oppose Russian Narrative Warfare (with the limited t...Paul Cobaugh
Before retiring from the US Army in late 2015, I spent most of my career in a community which had as one of their mantras, albeit an unwritten one; that when presented with a problem, “don’t just complain, present solutions”. This paper is just that, a discussion of pragmatic and recommended solutions for protecting ourselves from Russian narrative/ information warfare.
This paper is intentionally written in narrative form rather than the usual linear strategy format. We are after all, talking about narrative warfare. It is also written as plain-spoken as possible so that everyone from policy-makers and national security strategy professionals through well-informed citizens can follow the discussion.
ute.
BUS M02C – Managerial Accounting SLO Assessment project .docxhartrobert670
BUS M02C – Managerial Accounting
SLO Assessment project
Randy’s Kayaks, Inc. manufactures and sells one-person fiberglass kayaks. Randy’s balance sheet at the end
of 2011 was as follows:
RANDY’S KAYAKS, INC.
Balance Sheet
December 31, 2011
ASSETS LIABILITIES
Cash $ 52,000 Accounts payable $ 131,000
Accounts receivable 1,200,000
Raw materials inventory* 120,000 STOCKHOLDERS’EQUITY
Finished goods inventory** 287,500 Common Stock 1,600,000
Plant assets, net of accumulated Retained Earnings 2,063,500
Depreciation 2,135,000
Total Assets $ 3,794,500 Total Liabilities & SE $ 3,794,500
*40,000 pounds
**1,000 kayaks
The following additional data is available for use in preparing the budget for 2012:
Cash collections (all sales are on account):
Collected in the quarter of sale 40%
Collected in the quarter after sale 60%
(Bad debts are negligible and can be ignored)
Cash disbursements for raw materials (all purchases are on account):
Cash paid in the quarter of purchase 70%
Cash paid in the quarter after purchase 30%
Desired quarterly ending Raw materials inventory 40% of next quarter’s production needs
Desired quarterly ending Finished goods inventory 10% of next quarter’s sales
Budgeted sales:
1
st
quarter 2012 10,000 kayaks
2
nd
quarter 2012 15,000 kayaks
3
rd
quarter 2012 16,000 kayaks
4
th
quarter 2012 14,000 kayaks
1
st
quarter 2013 10,000 kayaks
2
nd
quarter 2013 12,000 kayaks
Anticipated equipment purchases:
1
st
quarter 2012 $30,000
2
nd
quarter 2012 $0
3
rd
quarter 2012 $0
4
th
quarter 2012 $150,000
Quarterly dividends to be paid each quarter in 2012 $4,000
Expected sales price per unit $400
Standard cost data:
Direct materials 10 pounds per kayak @ $3 per pound
Direct labor 10 hours per kayak @ $20 per hour
Variable manufacturing overhead $5 per direct labor hour
Fixed manufacturing overhead (includes $9,000 depreciation) $103,125 per quarter
Variable selling expenses $25 per kayak
Fixed selling and administrative expenses:
Insurance $45,000 per quarter
Sales salaries $30,000 per quarter
Depreciation $6,000 per quarter
Income tax rate 30%
Estimated income tax payments planned in 2012:
1
st
quarter $0
2
nd
quarter $50,000
3
rd
quarter $400,000
4
th
quarter $500,000
Randy’s desires to have a minimum cash balance at the end of each quarter of $50,000. In order to maintain
this minimum balance, Randy’s may borrow from its bank in $10,000 increments with an interest rate of 6%.
Money is borrowed at the beginning of the quarter in which a shortage is expected. Repayments of all or a
portion of the principle (plus accrued interest on the amount being repaid) are made at the end of any quarter
in which the cash balance exceeds the required minimum.
Requirements:
1. Use the above information to prepare the following components of th ...
BUS 409 – Student Notes(Prerequisite BUS 310)COURSE DESCR.docxhartrobert670
BUS 409 – Student Notes
(Prerequisite: BUS 310)
COURSE DESCRIPTION
Introduces and analyzes the basic concepts of compensation administration in organizations. Provides an intensive study of the wage system, methods of job evaluation, wage and salary structures, and the legal constraints on compensation programs.
INSTRUCTIONAL MATERIALS
Required Resources
Martocchio, J. J. (2013). Strategic compensation:A human resource management approach (7th ed.). Upper Saddle River, NJ: Prentice Hall / Pearson.
Supplemental Resources
Andersen, S. (2012). The keys to effective strategic account planning. Velocity, 14(1), 23-26.
Burkhauser, R. V., Schmeiser, M. D., & Weathers II, R. R. (2012). The importance of anti-discrimination and workers’ compensation laws on the provision of workplace accommodations following the onset of a disability. Industrial & Labor Relations Review, 65(1), 161-180.
Employee compensation: 12 trends for 2012. (2012). HR Specialist, 10(2), 1-2.
Survey of the Month: Companies Focus On Updating Compensation in 2012. (2011). Report on Salary Surveys, 18(12), 1-5.
The Society of Human Resources Management (2012). General format. Retrieved fromhttp://www.shrm.org
WorldatWork. (n.d.). General format. Retrieved fromhttp://www.worldatwork.org
COURSE LEARNING OUTCOMES
1. Analyze how compensation practice can be applied to positively impact an organization and its stakeholders.
2. Examine the ways in which laws, labor unions, and market factors impact companies’ compensation practices.
3. Evaluate the effectiveness of traditional bases for pay (seniority and merit) against incentive-based and person-focused compensation approaches.
4. Compare and contrast internally consistent and market-competitive compensation systems.
5. Analyze the fundamental principles of pay structure design.
6. Evaluate the role of benefits in strategic compensation.
7. Suggest viable options to current practices regarding executive compensation.
8. Make recommendations for leveraging flexible and contingent workers for any given organization.
9. Determine the best possible approach for the compensation of expatriates.
10. Analyze differences between compensation, benefits, and legal and regulatory influences in the United States and the rest of the world.
11. Use technology and information resources to research issues in compensation management.
12. Write clearly and concisely about compensation management using proper writing mechanics.
WEEKLY COURSE SCHEDULE
The standard requirement for a 4.5 credit hour course is for students to spend 13.5 hours in weekly work. This includes preparation, activities, and evaluation regardless of delivery mode.
Week
Preparation, Activities, and Evaluation
Points
1
Preparation
· Reading(s)
· Chapter 1: Strategic Compensation
· Chapter 1, Case: Competitive Strategy at Sportsman Shoes
Activities
· Introduction Discussion
· Discussions
Evaluation
· None
20
20
2
Preparation
· Reading(s)
· Chapter 2: Contextual Influe ...
BUS LAW2HRM Management Discussion boardDis.docxhartrobert670
BUS LAW 2
HRM Management Discussion board
Discuss what challenges an HR department may face when their company decides to expand into other countries. Do you think it would be beneficial if the company that is expanding is already affiliated with an international union? How would it affect the challenges that HR is already faced with?
References
Noe, R. A., Hollenbeck, J. R., Gerhart, B., & Wright, P. M. (2011). Fundamentals of human resource management (4thed.). Chicago, IL: McGraw-Hill.
HRM Management Discussion board
Discuss what challenges an HR department may
face when their company decides to
expand into other countries. Do you think it would be beneficial if the company that is
expanding is already affiliated with an international union? How would it affect the
challenges that HR is already faced with
?
R
eferences
Noe, R. A., Hollenbeck, J. R., Gerhart, B., & Wright, P. M. (2011).
Fundamentals of human
resource management
(4
th
ed.). Chicago, IL: McGraw
-
Hill.
HRM Management Discussion board
Discuss what challenges an HR department may face when their company decides to
expand into other countries. Do you think it would be beneficial if the company that is
expanding is already affiliated with an international union? How would it affect the
challenges that HR is already faced with?
References
Noe, R. A., Hollenbeck, J. R., Gerhart, B., & Wright, P. M. (2011). Fundamentals of human
resource management (4
th
ed.). Chicago, IL: McGraw-Hill.
BILTRITE PRACTICE CASE
Module XV of the Biltrite audit practice case contains an audit report exercise.
This exercise may be completed at this time.
Module XV: Audit Report
The Denise Vaughan audit team completed its audit field work on February 15,
2010. A conference was held on that date involving members of the audit
firm and Biltrite management. Participants in the conference were Denise
Vaughan, partner in charge of the Biltrite engagement; Carolyn Volmar,
audit manager; Richard Derick, in-charge auditor; Trevor Lawton, Biltrite’s
CEO; Gerald Groth, Biltrite’s controller; and Marlene McAfee, Biltrite’s trea-
surer. The Biltrite representatives agreed to all of the audit adjustments and
reclassifications proposed by the audit team, and they agreed to reflect them
in the December 31, 2009, financial statements. They also agreed to modify
and/or add footnote disclosures as recommended by the audit team.
At the conclusion of the conference, the audit team obtained a client repre-
sentation letter from Biltrite management and presented management with a
copy of the “significant deficiencies” letter outlining discovered internal control
deficiencies. The original of this letter was sent to Biltrite’s audit committee.
The legal action initiated against Biltrite by Rollfast, a competitor, for
alleged patent infringement, was not yet settled as of February 15. Because the
letter obtained by Derick from Biltrite’s outside legal couns ...
BUS 571 Compensation and BenefitsCompensation Strategy Project.docxhartrobert670
Techtron Corporation is developing a compensation strategy for 140 hourly production technicians, 3 production supervisors, 2 manufacturing engineers, and 1 computer technician at its new manufacturing facility. As the HR compensation strategist, you must propose compensation bandwidths, benefits plans, and an employee evaluation process for determining compensation adjustments for each of the four job classifications. The proposal should be data-driven, grounded in theory/literature, and consider environmental factors like union status and benefits legislation in the state.
BUS 210 Exam Instructions.Please read the exam carefully and a.docxhartrobert670
BUS 210 Exam Instructions.
Please read the exam carefully and answer all of the questions.
When considering the legal issues, structure your answers as follows:
1. State the relevant issue;
2. Make the arguments of the parties involved;
3. State the applicable rule of law;
4. State your conclusion and the reasons therefore.
You may consult the text to answer the exam questions. However, your answers MUST be your own work and you may not consult with anyone in or outside of the class.
BUS 210
Be specific in your answers and state the applicable law used to reach your conclusions.
Question #1
Mike is a homeowner. Jill runs a snowplowing business. Mike asks Jill to provide an estimate for how much she would charge to snowplow Mike’s driveway. After Jill inspects Mike’s driveway, the parties have the following conversation on September 1, 2011:
Jill: “$50 each time I snowplow your driveway.”
Mike: “OK, sounds good. Please do so.”
Jill regularly snowplows Joe’s driveway during the 2011-12 season. In May 2012, Jill sends a bill to Mike for all visits she made in the 2011-12 season, and Mike promptly pays that bill in full without any other communication taking place between Jill and Mike.
• Jill regularly snowplows Mike’s driveway during the 2012-13 season and sends a bill for those visits in March 2013. What are the rights and responsibilities of the parties under contract law?
• Instead, assume that Jill does not come during the first major snowfall in 2012. Does Mike have any contractual rights against JILL? Explain fully.
• Ignore the previous bullets. Instead, assume Mike promptly pays the 2011-12 bill in full without any other communication. On September 1, 2012, Jill raises her prices 20% for all of her customers, and she notifies Mike of this fact. He does not respond. Jill regularly snowplows Mike’s driveway during the 2012-13 season and in March 2013 sends Mike a bill for those visits reflecting her increased prices. What are the right and responsibilities of the parties under contract law.
Question #2:
At the wedding of Tom and Mary, Tom’s father, Frank, told them that he wanted to live with them and to have them care for him for the rest of his life. He said, “If you agree to do this, I will deliver to you, within two years, a deed to my home.” Tom and Mary told Frank they accepted his offer and promised to look after Frank with loving care in Frank’s home. They immediately moved in with him.
Soon after moving into Frank’s home, Tom and Mary used their own money to add a new wing to the house, pay the outstanding property taxes, and pay off an existing mortgage of $25,000.
One year after Tom and Mary moved into the home, Tom reminded Frank of his promise to convey the property to them. Frank became angry, and refused to execute the deed and ordered Tom and Mary to leave the premises.
Answer the following questions by arguing both sides of the issues and applying ...
BUS 137S Special Topics in Marketing (Services Marketing)Miwa Y..docxhartrobert670
BUS 137S Special Topics in Marketing (Services Marketing)
Miwa Y. Merz, Ph.D.
Service Journal Entry Form
Your Name:
Name of Firm: T-Mobile
Type of Service (industry): Phone Company
Date of Encounter: September 27, 2015
Time of Encounter: 4PM
1. How did the encounter take place (e.g., in person, by phone, via a self-service technology)?
In person
2. What specific circumstances led to this encounter?
My girlfriend bought a new phone and she wanted to put a screen protector
3. Exactly what did the firm/employee say or do?
The employee directly showed us the different type of screen protector. He also explained in detailed about the advantage and disadvantage for each of the screen protector.
4. How would you rate your level of satisfaction with this encounter? (Circle the most appropriate number).
Very dissatisfied
1
2
3
4
5
6
7
Very satisfied
5. What exactly made you feel this way?
I was so surprised that the employee still remembered my girlfriend and I. A week ago we went to the T-Mobile to ask about the IPhone 6s.
6. What could the employee/firm have done to increase your level of satisfaction with the encounter?
Nothing because I am completely satisfied with their service
7. What improvements need to be made to this service system?
I don’t think they need to improve anything because the employees always ask the customer if they need help or not as soon as they saw the customers.
8. How likely is it that you will go back to this service firm?
Very Unlikely
1
2
3
4
5
6
7
Very Likely
Please provide the reason(s). I will definitely go back because the employees are so kind, patient and really helpful.
Service Journal Entry Form
Your Name:
Name of Firm: 99 Chickens
Type of Service (industry): Restaurant
Date of Encounter: September 19, 2015
Time of Encounter: 5 PM
1. How did the encounter take place (e.g., in person, by phone, via a self-service technology)?
In person
2. What specific circumstances led to this encounter?
We wanted to eat the chicken
3. Exactly what did the firm/employee say or do?
They didn’t say a single word. They just took our order and then directly leave.
4. How would you rate your level of satisfaction with this encounter? (Circle the most appropriate number).
Very dissatisfied
1
2
3
4
5
6
7
Very satisfied
5. What exactly made you feel this way?
Because the employee did not talk at all
6. What could the employee/firm have done to increase your level of satisfaction with the encounter?
They should treat the customer better. The service is seriously so bad. I feel that they are actually really rude.
7. What improvements need to be made to this service system?
Actually the service system is not bad because it is a self-service restaurant. But I think the company should tell the employees to have more interaction with the customers to make a good and friendly impression.
8. How likely is it that you will go back to this service firm?
Very Unlikely
1
2
3
4
5
6
7
Ver ...
BUS 313 – Student NotesCOURSE DESCRIPTIONThis course intro.docxhartrobert670
BUS 313 – Student Notes
COURSE DESCRIPTION
This course introduces the students to the key components of entrepreneurship. Topics covered include identifying new venture opportunities, getting started in a new venture, creating a business plan, financing and marketing ideas, and organizing and managing a small business.
INSTRUCTIONAL MATERIALS
Required Resources
Kaplan, J. M., & Warren, A. C. (2013). Patterns of entrepreneurship management (4th ed.). Danvers, MA: John Wiley & Sons.
Supplemental Resources
Fast Company. (2013). General format. Retrieved from www.fastcompany.com
Hess, E. D. (2012). Grow to greatness: Smart growth for entrepreneurial businesses. Stanford, CA: Stanford University Press.
Inc. Magazine. (2013).General format. Retrieved from www.inc.com
Schweikart, L. & Pierson, D. L. (2010). American entrepreneur: The fascinating stories of the people who
defined business in the United States. New York, NY: American Management Association.
Stanford Graduate School of Business. (2013). Center for Entrepreneurial Studies. Retrieved from http://www.gsb.stanford.edu/ces/resources/links.html
COURSE LEARNING OUTCOMES
1. Examine entrepreneurship and different types of entrepreneurs.
2. Analyze the stages in the entrepreneurial process.
3. Examine the process of innovating and developing ideas and business opportunities.
4. Analyze different innovative business models to determine the best model for a specific venture.
5. Analyze the market, customers, and competition of entrepreneurs.
6. Examine the process of developing a business plan and setting up the company.
7. Analyze money sources for finding and managing funds.
8. Compare the different forms of intellectual property and how they differ.
9. Analyze the management of a successful innovative company.
10. Determine the most effective communication process to present the business to investors.
11. Analyze methods for exiting the venture.
12. Use technology and information resources to research issues in entrepreneurship.
13. Write clearly and concisely about entrepreneurship using proper writing mechanics.
WEEKLY COURSE SCHEDULE
The standard requirement for a 4.5 credit hour course is for students to spend 13.5 hours in weekly work. This includes preparation, activities, and evaluation regardless of delivery mode.
Week
Preparation, Activities, and Evaluation
Points
1
Preparation
· Reading(s)
· Chapter 1: Getting Started as an Entrepreneur
· Chapter 2: The Art of Innovation
Activities
· Introduction Discussion
· Discussions
Evaluation
· None
20
20
2
Preparation
· Reading(s)
· Chapter 3: Designing Business Models
· e-Activities
· Go to Minority Business Entrepreneur (MBE) Website and explore the organization’s offerings, located at http://www.mbemag.com/. Then, go to the MBE Business Resource Directory, located at http://www.mbemag.com/index.php/resources/mwbe-resource-directory, and consider two to three businesses that would be good partners for one another. Be ...
BUS 1 Mini Exam – Chapters 05 – 10 40 Points S.docxhartrobert670
BUS 1
Mini Exam – Chapters 05 – 10
40 Points
Short Answer – Mind your time
Answer four questions from #1 - #6. Must answer #3 and #6. Answer
the XC question for extra credit. Question point count weighted equally.
It is all about business, so make sure to demonstrate / synthesize the bigger picture of business in each and
every answer.
Like all essays, specifying an exacting target word count is rather problematic. I am thinking each answer
would be about 250 - 300 words each, depending upon writing style. If you tend to be descriptive and whatnot,
that number could be 350 - 450 words.
Sidebar: Gauge your knowledge level in this way. This exam should take about 90 – 120 minutes to complete.
Students taking much longer may want to work with me to assess / discuss ways to help master this material in
a future conference session.
1. Although most new firms start out as sole proprietorships, few large firms are organized this way. Why
is the sole proprietorship such a popular form of ownership for new firms? What features of the sole
proprietorship make it unattractive to growing firms?
2. List and discuss at least three causes of small business failure. Workarounds, fixes, or methods to avoid
failure should be discussed.
3. Describe three different leadership styles and give an example of a situation in which each style could be
most used effectively.
4. Discuss Max Weber's views on organization theory. Is there a few principles that particularly resonate
in business today?
5. How has the emphasis of quality control changed in recent years? Describe some of the modern quality
control techniques that illustrate this change in emphasis.
6. Explain how managers could motivate employees by using the principles outlined in expectancy
theory? Create a story/example of expectancy theory at work, incorporating the three questions that
according to expectancy theory employees will ask.
7. XC – What is selective perception? Can you describe a business-centric scenario where selective
perception may hinder a businessperson’s ability to respond to a customer need?
I
Fireworks, Manifesto, 1974.
The Architectural Paradox
1. Most people concerned with architecture feel some sort
of disillusion and dismay. None of the early utopian ideals
of the twentieth century has materialized! none of its social
aims has succeeded. Blurred by reality! the ideals have turned
into redevelopment nightmares and the aims into bureau
cratic policies. The split between social reality and utopian
dream has been total! the gap between economic constraints
and the illusion of all-solving technique absolute. Pointed
Space
out by critics who knew the limits of architectural remedies,
this historical split has now been bypassed by attempts to
reformulate the concepts of architecture. In the process, a
new split appears. More complex, it is not the symptom of
prof ...
BullyingIntroductionBullying is defined as any for.docxhartrobert670
Bullying
IntroductionBullying is defined as any form of severe physical or psychological consequences.Bullying has been identified as a social issue in schools, homes and communities.Bullying can lead to both short term and long negative side effects.
Bullying is defined as any form of severe physical or pervasive act that includes communication in writing, electronically that is aimed at a student, or a group of student and it could have the following effects on the target. Bullying has been identified as a social issue in schools, homes and communities. Bullying can lead to both short term and long negative side effects. Many people tend to develop psychological problems as a result of engaging in bullying activities. Adopting effective measures to prevent bullying would also help to deal with the problem once and for all.
*
Forms of BullyingMere teasing.Talking trash about other peopleTrading insults.Physical harassment
The following actions have been identified as physical conduct forms that demonstrate forms of bullying. They include; Mere teasing.
Talking trash about other people. This shows an example of bullying that is practiced by people. Trading insults has also been widely recognised as a form of bullying. Physical harassment
*
Effects of BullyingBullying can lead to both long term and short term side effects.Bullying can change personalities, psychological wellbeing and even lead to physical injuries.Negatively affecting the students’ mental or physical health
Bullying has serious negative consequences for the people who do practice it. Bullying can lead to both long term and short term side effects.
Bullying can change personalities, psychological wellbeing and even lead to physical injuries. People who have been bullied tend to development long term problems such as depression. Development of stress tends to happen once people have engaged in actions that lead to bullying. This is because the actions against bullying tend to overpower the minds and also brings in psychological problems,.
*
A graphic showing No to Bullying
All forms of bullying are not acceptable in the society.
*
How to Prevent BullyingTaking immediate action.Dealing with bullies physically.Criminalizing actions against bullying.
In order to deal with bullying effectively, several measures should be enacted to prevent any form of bullying. Measures such as taking immediate action upon any case of bullying would help to deter the action from ever arising again. The other solutions entail taking immediate forms of action would also help to prevent the act from ever occurring. Dealing with bullies physically and also criminalizing actions against bullying helps to prevent it at all costs. Social and emotional learning is a bullying prevention mechanism aimed at ensuring that students do not fall victim to bullying by equipping them with social and emotional skills. This technique is aimed at ensuring that students are equipp ...
BUS1001 - Integrated Business PerspectivesCourse SyllabusSch.docxhartrobert670
This syllabus outlines the course objectives, assignments, schedule, and policies for BUS1001 - Integrated Business Perspectives. The course introduces students to the role of business in society and explores career opportunities through team projects, case studies, quizzes, and discussions. Student evaluation is based on participation, assignments, and a final project to demonstrate understanding of business perspectives and principles.
BUMP implementation in Java.docxThe project is to implemen.docxhartrobert670
BUMP implementation in Java.docx
The project is to implement the BUMP client in java, with window size 1. Here is an overview of the three WUMP protocols (BUMP, HUMP, and CHUMP). Here are the files wumppkt.java, containing the packet format classes, and wclient.java, which contains an outline of the actual program. Only the latter file should be modified; you should not have to make changes to wumppkt.java.
What you are to do is the following, by modifying and extending the wclient.java outline file:
· Implement the basic transfer
· Add all appropriate packet sanity checks: timeouts, host/port, size, opcode, and block number
· Generate output. The transferred file is to be written to System.out. A status message about every packet (listing size and block number) is to be written to System.err. Do not confuse these!
· Terminate after a packet of size less than 512 is received
· Implement an appropriate "dallying" strategy
· send an ERROR packet if it receives a packet from the wrong port. The appropriate ERRCODE in this case is EBADPORT.
An outline of the program main loop is attached
recommended that you implement this in phases, as follows.
1. Latch on to the new port: save the port number from Data[1], and make sure all ACKs get sent to this port. This will mean that the transfer completes. You should also make sure the client stops when a packet with less than 512 bytes of data is received. Unless you properly record the source port for Data[1], you have no place to which to send ACK[1]!
2. For each data packet received, write the data to System.out. All status messages should go to System.err, so the two data streams are separate if stdout is redirected. To write to System.out, use System.out.write:
System.out.write(byte[] buf, int offset, int length);
For your program, offset will be 0, buf will typically be dpacket.data(), where dpacket is of type DATA (wumppkt.DATA). The length will be dpacket.size() - wumppkt.DHEADERSIZE (or, equivalently, dg.getLength() - wumppkt.DHEADERSIZE, where dg is a DatagramPacket object).
3. Add sanity checks, for (in order) host/port, packet size, opcode, and block number.
4. Handle timeouts, by retransmitting the most recently sent packet when the elapsed time exceeds a certain amount (4 seconds?). One way to do this is to keep a DatagramPacket variable LastSent, which can either be reqDG or ackDG, and just resend LastSent. Note that the response to an InterruptedIOException, a "true" timeout, will simply be to continue the loop again.
5. Add support for an dallying and error packets. After the client has received the file, dallying means to wait 2.0 - 3.0 timeout intervals (or more) to see if the final data packet is retransmitted. If it is, it means that the final ACK was lost. The dally period gives the client an opportunity to resend the final ACK. Error packets are to be sent to any sender of an apparent data packet that comes from the wrong port.
vanilla Normal transfer
lose Lose ever ...
BUS 303 Graduate School and Further Education PlanningRead and w.docxhartrobert670
BUS 303 Graduate School and Further Education Planning
Read and watch pieces on Planning for Graduate School. Answer related questions and write an essay.
· Read about earning a Master’s Degree.
· https://www.gradschools.com/masters/business
· Choose and read about two Master’s degree programs from the left hand column of Subject Selection options (image below) found on the webpage https://www.gradschools.com/masters/business
1-Report - List two subject that you selected to read/research:
One: ____________________
Two: _____________________
2-Discover:
Conduct research on two Master’s degree programs related to your undergraduate major that are offered by Virginia, DC, or Maryland Universities. Choose programs at two separate universities. If you are interested in other universities outside of this area, please feel free to research them as alternatives.
Discover information such as: What are the application processes, preferred GPA, required entrance exams, or prerequisites. What are the options for study (full time study, part time study, face-to-face classes or online classes)? What is the typical timeframe for completing the graduate program? What are the typical career opportunities for graduates from the Master’s program?
Section One- First - University and Graduate Program:
List the university and graduate program that you researched. Answer the research questions with words, phrases, or sentences.
· University and graduate program that you researched
(Enter information here)
· What are the application processes, preferred GPA, required entrance exams, or prerequisites?
· What are the options for study (full time study, part time study, face-to-face classes or online classes)?
· What is the typical timeframe for completing the graduate program?
· What are the typical career opportunities for graduates from the Master’s program?
Section Two: Second - University and Graduate Program
List the university and graduate program that you researched. Answer the research questions with words, phrases, or sentences.
· University and graduate program that you researched
· What are the application processes, preferred GPA, required entrance exams, or prerequisites?
· What are the options for study (full time study, part time study, face-to-face classes or online classes)?
· What is the typical timeframe for completing the graduate program?
· What are the typical career opportunities for graduates from the Master’s program?
3-Write:
Questions to answer in an essay with at least 400 words. The expectation is that the essay in made up of flowing sentences that are organized in to paragraphs. WORD formatted document is required.
· What did you learn about Master’s degree programs and earning a Master’s degree? If you have researched graduate programs in the past, what are the most important aspects of information that you learned about graduate education opportunities?
(At least one paragraph)
· List and discu ...
Bulletin Board Submission 10 Points. Due by Monday at 900 a.m..docxhartrobert670
Bulletin Board Submission: 10 Points. Due by Monday at 9:00 a.m.
As you've learned, it is important to be able to determine the elements of a crime and there are several places to turn for assistance in doing so.
First - Look at the statute for the crime. For example, in New York, the statute for Petit Larceny is Penal Law 155.25.
Second - Check to see if any of the terms in the statute are defined in another statute. For example, in New York, Larceny is defined in Penal Law 155.05
Third - If the elements are not clear from the statute, you may want to research case law to see if the courts have established the elements for the crime.
Fourth - Always remember to check the Jury Instructions.
They are an excellent source for identifying the elements, as this is how the court explains the crime to the jury.
Many states are now posting their Jury Instructions on the internet.
Section One –
Keeping the above in mind, please provide the statute under which a Defendant in your state would be charged with Rape (1st Degree if your state breaks it down in that manner) In addition, provide any relevant statutory definitions and an overview of the Jury Instructions. Then, provide cases addressing at least one of the elements of the statute.
Section Two –
Discuss whether or not a woman can be charged with Rape in your state. If not, what could she be charged with?
...
More Related Content
Similar to Beyond Pain Coercing Violent Non-State Actors By Troy .docx
The document discusses developing a realistic alternative to war and other violence for resolving acute conflicts where fundamental issues are at stake. It argues that nonviolent action provides a substitute for violence that is a powerful means of waging conflict without relying on war. Nonviolent action has been successfully used across many cultures and centuries in a variety of conflicts against oppression, dictatorship, invasion, and other threats. When fundamental issues are involved, nonviolent action can replace violence as the means of last resort for defending principles or existence without submitting to the opponent.
Statement of Erroll G. Southers before the US House of Representatives Commit...Elsevier
Counterterrorism expert and Elsevier Author Erroll Southers testifies at the Congressional Homeland Security Committee's first hearing on the Boston bombings.
Attempts To Define Terrorism Terrorist Or Freedom FighterDustin Pytko
The document evaluates the challenges of defining terrorism. It argues that definitions of terrorism are inherently subjective since they are created with a purpose in mind by the definer. Definitions vary between contexts and change over time as new political enemies emerge. Western states in particular exhibit bias by excluding their own violent actions from the definition of terrorism. The lack of a universal definition reflects these political influences and the subjective nature of labeling certain acts as terrorism.
Terrorism is evolving into smaller, more decentralized cells to carry out asymmetric warfare using unconventional tactics. Future conflicts will likely involve combating small terrorist units using weapons of mass destruction and sophisticated tactics. Additionally, terrorist groups may simultaneously attack critical infrastructure through cyber and physical means. To address this evolving threat, military strategies, training, and equipment must adapt from conventional warfare to asymmetric low-intensity conflicts involving terrorist and insurgent groups.
Terrorism has a significant impact on global politics. Terrorist groups use violence and attacks to create fear in society and force political reactions from governments. Modern terrorism poses many threats as demonstrated by attacks in major cities like Paris in 2015. The rise of groups like ISIS and al-Qaeda has increased terrorism's influence on global affairs, forcing states to rethink policies like immigration, spending, and defense.
This document summarizes a paper on using soft power and diplomacy in counter-terrorism strategies, with a focus on Turkey. It begins with definitions of hard power and soft power, noting that hard power approaches to counter-terrorism have not always been effective. It then discusses reasons for terrorism, including social and political injustice, the belief that violence can create change, lack of education and poverty. The document reviews literature on the role of diplomacy and aims of soft power in counter-terrorism. It identifies specific soft power strategies like conducting information campaigns and creating negative images of terrorists. It concludes that while effective use of force is important, preventing radicalization through soft power is even more critical to counter-terrorism
A Five-Point Strategy to Oppose Russian Narrative Warfare (with the limited t...Paul Cobaugh
Before retiring from the US Army in late 2015, I spent most of my career in a community which had as one of their mantras, albeit an unwritten one; that when presented with a problem, “don’t just complain, present solutions”. This paper is just that, a discussion of pragmatic and recommended solutions for protecting ourselves from Russian narrative/ information warfare.
This paper is intentionally written in narrative form rather than the usual linear strategy format. We are after all, talking about narrative warfare. It is also written as plain-spoken as possible so that everyone from policy-makers and national security strategy professionals through well-informed citizens can follow the discussion.
ute.
Similar to Beyond Pain Coercing Violent Non-State Actors By Troy .docx (8)
BUS M02C – Managerial Accounting SLO Assessment project .docxhartrobert670
BUS M02C – Managerial Accounting
SLO Assessment project
Randy’s Kayaks, Inc. manufactures and sells one-person fiberglass kayaks. Randy’s balance sheet at the end
of 2011 was as follows:
RANDY’S KAYAKS, INC.
Balance Sheet
December 31, 2011
ASSETS LIABILITIES
Cash $ 52,000 Accounts payable $ 131,000
Accounts receivable 1,200,000
Raw materials inventory* 120,000 STOCKHOLDERS’EQUITY
Finished goods inventory** 287,500 Common Stock 1,600,000
Plant assets, net of accumulated Retained Earnings 2,063,500
Depreciation 2,135,000
Total Assets $ 3,794,500 Total Liabilities & SE $ 3,794,500
*40,000 pounds
**1,000 kayaks
The following additional data is available for use in preparing the budget for 2012:
Cash collections (all sales are on account):
Collected in the quarter of sale 40%
Collected in the quarter after sale 60%
(Bad debts are negligible and can be ignored)
Cash disbursements for raw materials (all purchases are on account):
Cash paid in the quarter of purchase 70%
Cash paid in the quarter after purchase 30%
Desired quarterly ending Raw materials inventory 40% of next quarter’s production needs
Desired quarterly ending Finished goods inventory 10% of next quarter’s sales
Budgeted sales:
1
st
quarter 2012 10,000 kayaks
2
nd
quarter 2012 15,000 kayaks
3
rd
quarter 2012 16,000 kayaks
4
th
quarter 2012 14,000 kayaks
1
st
quarter 2013 10,000 kayaks
2
nd
quarter 2013 12,000 kayaks
Anticipated equipment purchases:
1
st
quarter 2012 $30,000
2
nd
quarter 2012 $0
3
rd
quarter 2012 $0
4
th
quarter 2012 $150,000
Quarterly dividends to be paid each quarter in 2012 $4,000
Expected sales price per unit $400
Standard cost data:
Direct materials 10 pounds per kayak @ $3 per pound
Direct labor 10 hours per kayak @ $20 per hour
Variable manufacturing overhead $5 per direct labor hour
Fixed manufacturing overhead (includes $9,000 depreciation) $103,125 per quarter
Variable selling expenses $25 per kayak
Fixed selling and administrative expenses:
Insurance $45,000 per quarter
Sales salaries $30,000 per quarter
Depreciation $6,000 per quarter
Income tax rate 30%
Estimated income tax payments planned in 2012:
1
st
quarter $0
2
nd
quarter $50,000
3
rd
quarter $400,000
4
th
quarter $500,000
Randy’s desires to have a minimum cash balance at the end of each quarter of $50,000. In order to maintain
this minimum balance, Randy’s may borrow from its bank in $10,000 increments with an interest rate of 6%.
Money is borrowed at the beginning of the quarter in which a shortage is expected. Repayments of all or a
portion of the principle (plus accrued interest on the amount being repaid) are made at the end of any quarter
in which the cash balance exceeds the required minimum.
Requirements:
1. Use the above information to prepare the following components of th ...
BUS 409 – Student Notes(Prerequisite BUS 310)COURSE DESCR.docxhartrobert670
BUS 409 – Student Notes
(Prerequisite: BUS 310)
COURSE DESCRIPTION
Introduces and analyzes the basic concepts of compensation administration in organizations. Provides an intensive study of the wage system, methods of job evaluation, wage and salary structures, and the legal constraints on compensation programs.
INSTRUCTIONAL MATERIALS
Required Resources
Martocchio, J. J. (2013). Strategic compensation:A human resource management approach (7th ed.). Upper Saddle River, NJ: Prentice Hall / Pearson.
Supplemental Resources
Andersen, S. (2012). The keys to effective strategic account planning. Velocity, 14(1), 23-26.
Burkhauser, R. V., Schmeiser, M. D., & Weathers II, R. R. (2012). The importance of anti-discrimination and workers’ compensation laws on the provision of workplace accommodations following the onset of a disability. Industrial & Labor Relations Review, 65(1), 161-180.
Employee compensation: 12 trends for 2012. (2012). HR Specialist, 10(2), 1-2.
Survey of the Month: Companies Focus On Updating Compensation in 2012. (2011). Report on Salary Surveys, 18(12), 1-5.
The Society of Human Resources Management (2012). General format. Retrieved fromhttp://www.shrm.org
WorldatWork. (n.d.). General format. Retrieved fromhttp://www.worldatwork.org
COURSE LEARNING OUTCOMES
1. Analyze how compensation practice can be applied to positively impact an organization and its stakeholders.
2. Examine the ways in which laws, labor unions, and market factors impact companies’ compensation practices.
3. Evaluate the effectiveness of traditional bases for pay (seniority and merit) against incentive-based and person-focused compensation approaches.
4. Compare and contrast internally consistent and market-competitive compensation systems.
5. Analyze the fundamental principles of pay structure design.
6. Evaluate the role of benefits in strategic compensation.
7. Suggest viable options to current practices regarding executive compensation.
8. Make recommendations for leveraging flexible and contingent workers for any given organization.
9. Determine the best possible approach for the compensation of expatriates.
10. Analyze differences between compensation, benefits, and legal and regulatory influences in the United States and the rest of the world.
11. Use technology and information resources to research issues in compensation management.
12. Write clearly and concisely about compensation management using proper writing mechanics.
WEEKLY COURSE SCHEDULE
The standard requirement for a 4.5 credit hour course is for students to spend 13.5 hours in weekly work. This includes preparation, activities, and evaluation regardless of delivery mode.
Week
Preparation, Activities, and Evaluation
Points
1
Preparation
· Reading(s)
· Chapter 1: Strategic Compensation
· Chapter 1, Case: Competitive Strategy at Sportsman Shoes
Activities
· Introduction Discussion
· Discussions
Evaluation
· None
20
20
2
Preparation
· Reading(s)
· Chapter 2: Contextual Influe ...
BUS LAW2HRM Management Discussion boardDis.docxhartrobert670
BUS LAW 2
HRM Management Discussion board
Discuss what challenges an HR department may face when their company decides to expand into other countries. Do you think it would be beneficial if the company that is expanding is already affiliated with an international union? How would it affect the challenges that HR is already faced with?
References
Noe, R. A., Hollenbeck, J. R., Gerhart, B., & Wright, P. M. (2011). Fundamentals of human resource management (4thed.). Chicago, IL: McGraw-Hill.
HRM Management Discussion board
Discuss what challenges an HR department may
face when their company decides to
expand into other countries. Do you think it would be beneficial if the company that is
expanding is already affiliated with an international union? How would it affect the
challenges that HR is already faced with
?
R
eferences
Noe, R. A., Hollenbeck, J. R., Gerhart, B., & Wright, P. M. (2011).
Fundamentals of human
resource management
(4
th
ed.). Chicago, IL: McGraw
-
Hill.
HRM Management Discussion board
Discuss what challenges an HR department may face when their company decides to
expand into other countries. Do you think it would be beneficial if the company that is
expanding is already affiliated with an international union? How would it affect the
challenges that HR is already faced with?
References
Noe, R. A., Hollenbeck, J. R., Gerhart, B., & Wright, P. M. (2011). Fundamentals of human
resource management (4
th
ed.). Chicago, IL: McGraw-Hill.
BILTRITE PRACTICE CASE
Module XV of the Biltrite audit practice case contains an audit report exercise.
This exercise may be completed at this time.
Module XV: Audit Report
The Denise Vaughan audit team completed its audit field work on February 15,
2010. A conference was held on that date involving members of the audit
firm and Biltrite management. Participants in the conference were Denise
Vaughan, partner in charge of the Biltrite engagement; Carolyn Volmar,
audit manager; Richard Derick, in-charge auditor; Trevor Lawton, Biltrite’s
CEO; Gerald Groth, Biltrite’s controller; and Marlene McAfee, Biltrite’s trea-
surer. The Biltrite representatives agreed to all of the audit adjustments and
reclassifications proposed by the audit team, and they agreed to reflect them
in the December 31, 2009, financial statements. They also agreed to modify
and/or add footnote disclosures as recommended by the audit team.
At the conclusion of the conference, the audit team obtained a client repre-
sentation letter from Biltrite management and presented management with a
copy of the “significant deficiencies” letter outlining discovered internal control
deficiencies. The original of this letter was sent to Biltrite’s audit committee.
The legal action initiated against Biltrite by Rollfast, a competitor, for
alleged patent infringement, was not yet settled as of February 15. Because the
letter obtained by Derick from Biltrite’s outside legal couns ...
BUS 571 Compensation and BenefitsCompensation Strategy Project.docxhartrobert670
Techtron Corporation is developing a compensation strategy for 140 hourly production technicians, 3 production supervisors, 2 manufacturing engineers, and 1 computer technician at its new manufacturing facility. As the HR compensation strategist, you must propose compensation bandwidths, benefits plans, and an employee evaluation process for determining compensation adjustments for each of the four job classifications. The proposal should be data-driven, grounded in theory/literature, and consider environmental factors like union status and benefits legislation in the state.
BUS 210 Exam Instructions.Please read the exam carefully and a.docxhartrobert670
BUS 210 Exam Instructions.
Please read the exam carefully and answer all of the questions.
When considering the legal issues, structure your answers as follows:
1. State the relevant issue;
2. Make the arguments of the parties involved;
3. State the applicable rule of law;
4. State your conclusion and the reasons therefore.
You may consult the text to answer the exam questions. However, your answers MUST be your own work and you may not consult with anyone in or outside of the class.
BUS 210
Be specific in your answers and state the applicable law used to reach your conclusions.
Question #1
Mike is a homeowner. Jill runs a snowplowing business. Mike asks Jill to provide an estimate for how much she would charge to snowplow Mike’s driveway. After Jill inspects Mike’s driveway, the parties have the following conversation on September 1, 2011:
Jill: “$50 each time I snowplow your driveway.”
Mike: “OK, sounds good. Please do so.”
Jill regularly snowplows Joe’s driveway during the 2011-12 season. In May 2012, Jill sends a bill to Mike for all visits she made in the 2011-12 season, and Mike promptly pays that bill in full without any other communication taking place between Jill and Mike.
• Jill regularly snowplows Mike’s driveway during the 2012-13 season and sends a bill for those visits in March 2013. What are the rights and responsibilities of the parties under contract law?
• Instead, assume that Jill does not come during the first major snowfall in 2012. Does Mike have any contractual rights against JILL? Explain fully.
• Ignore the previous bullets. Instead, assume Mike promptly pays the 2011-12 bill in full without any other communication. On September 1, 2012, Jill raises her prices 20% for all of her customers, and she notifies Mike of this fact. He does not respond. Jill regularly snowplows Mike’s driveway during the 2012-13 season and in March 2013 sends Mike a bill for those visits reflecting her increased prices. What are the right and responsibilities of the parties under contract law.
Question #2:
At the wedding of Tom and Mary, Tom’s father, Frank, told them that he wanted to live with them and to have them care for him for the rest of his life. He said, “If you agree to do this, I will deliver to you, within two years, a deed to my home.” Tom and Mary told Frank they accepted his offer and promised to look after Frank with loving care in Frank’s home. They immediately moved in with him.
Soon after moving into Frank’s home, Tom and Mary used their own money to add a new wing to the house, pay the outstanding property taxes, and pay off an existing mortgage of $25,000.
One year after Tom and Mary moved into the home, Tom reminded Frank of his promise to convey the property to them. Frank became angry, and refused to execute the deed and ordered Tom and Mary to leave the premises.
Answer the following questions by arguing both sides of the issues and applying ...
BUS 137S Special Topics in Marketing (Services Marketing)Miwa Y..docxhartrobert670
BUS 137S Special Topics in Marketing (Services Marketing)
Miwa Y. Merz, Ph.D.
Service Journal Entry Form
Your Name:
Name of Firm: T-Mobile
Type of Service (industry): Phone Company
Date of Encounter: September 27, 2015
Time of Encounter: 4PM
1. How did the encounter take place (e.g., in person, by phone, via a self-service technology)?
In person
2. What specific circumstances led to this encounter?
My girlfriend bought a new phone and she wanted to put a screen protector
3. Exactly what did the firm/employee say or do?
The employee directly showed us the different type of screen protector. He also explained in detailed about the advantage and disadvantage for each of the screen protector.
4. How would you rate your level of satisfaction with this encounter? (Circle the most appropriate number).
Very dissatisfied
1
2
3
4
5
6
7
Very satisfied
5. What exactly made you feel this way?
I was so surprised that the employee still remembered my girlfriend and I. A week ago we went to the T-Mobile to ask about the IPhone 6s.
6. What could the employee/firm have done to increase your level of satisfaction with the encounter?
Nothing because I am completely satisfied with their service
7. What improvements need to be made to this service system?
I don’t think they need to improve anything because the employees always ask the customer if they need help or not as soon as they saw the customers.
8. How likely is it that you will go back to this service firm?
Very Unlikely
1
2
3
4
5
6
7
Very Likely
Please provide the reason(s). I will definitely go back because the employees are so kind, patient and really helpful.
Service Journal Entry Form
Your Name:
Name of Firm: 99 Chickens
Type of Service (industry): Restaurant
Date of Encounter: September 19, 2015
Time of Encounter: 5 PM
1. How did the encounter take place (e.g., in person, by phone, via a self-service technology)?
In person
2. What specific circumstances led to this encounter?
We wanted to eat the chicken
3. Exactly what did the firm/employee say or do?
They didn’t say a single word. They just took our order and then directly leave.
4. How would you rate your level of satisfaction with this encounter? (Circle the most appropriate number).
Very dissatisfied
1
2
3
4
5
6
7
Very satisfied
5. What exactly made you feel this way?
Because the employee did not talk at all
6. What could the employee/firm have done to increase your level of satisfaction with the encounter?
They should treat the customer better. The service is seriously so bad. I feel that they are actually really rude.
7. What improvements need to be made to this service system?
Actually the service system is not bad because it is a self-service restaurant. But I think the company should tell the employees to have more interaction with the customers to make a good and friendly impression.
8. How likely is it that you will go back to this service firm?
Very Unlikely
1
2
3
4
5
6
7
Ver ...
BUS 313 – Student NotesCOURSE DESCRIPTIONThis course intro.docxhartrobert670
BUS 313 – Student Notes
COURSE DESCRIPTION
This course introduces the students to the key components of entrepreneurship. Topics covered include identifying new venture opportunities, getting started in a new venture, creating a business plan, financing and marketing ideas, and organizing and managing a small business.
INSTRUCTIONAL MATERIALS
Required Resources
Kaplan, J. M., & Warren, A. C. (2013). Patterns of entrepreneurship management (4th ed.). Danvers, MA: John Wiley & Sons.
Supplemental Resources
Fast Company. (2013). General format. Retrieved from www.fastcompany.com
Hess, E. D. (2012). Grow to greatness: Smart growth for entrepreneurial businesses. Stanford, CA: Stanford University Press.
Inc. Magazine. (2013).General format. Retrieved from www.inc.com
Schweikart, L. & Pierson, D. L. (2010). American entrepreneur: The fascinating stories of the people who
defined business in the United States. New York, NY: American Management Association.
Stanford Graduate School of Business. (2013). Center for Entrepreneurial Studies. Retrieved from http://www.gsb.stanford.edu/ces/resources/links.html
COURSE LEARNING OUTCOMES
1. Examine entrepreneurship and different types of entrepreneurs.
2. Analyze the stages in the entrepreneurial process.
3. Examine the process of innovating and developing ideas and business opportunities.
4. Analyze different innovative business models to determine the best model for a specific venture.
5. Analyze the market, customers, and competition of entrepreneurs.
6. Examine the process of developing a business plan and setting up the company.
7. Analyze money sources for finding and managing funds.
8. Compare the different forms of intellectual property and how they differ.
9. Analyze the management of a successful innovative company.
10. Determine the most effective communication process to present the business to investors.
11. Analyze methods for exiting the venture.
12. Use technology and information resources to research issues in entrepreneurship.
13. Write clearly and concisely about entrepreneurship using proper writing mechanics.
WEEKLY COURSE SCHEDULE
The standard requirement for a 4.5 credit hour course is for students to spend 13.5 hours in weekly work. This includes preparation, activities, and evaluation regardless of delivery mode.
Week
Preparation, Activities, and Evaluation
Points
1
Preparation
· Reading(s)
· Chapter 1: Getting Started as an Entrepreneur
· Chapter 2: The Art of Innovation
Activities
· Introduction Discussion
· Discussions
Evaluation
· None
20
20
2
Preparation
· Reading(s)
· Chapter 3: Designing Business Models
· e-Activities
· Go to Minority Business Entrepreneur (MBE) Website and explore the organization’s offerings, located at http://www.mbemag.com/. Then, go to the MBE Business Resource Directory, located at http://www.mbemag.com/index.php/resources/mwbe-resource-directory, and consider two to three businesses that would be good partners for one another. Be ...
BUS 1 Mini Exam – Chapters 05 – 10 40 Points S.docxhartrobert670
BUS 1
Mini Exam – Chapters 05 – 10
40 Points
Short Answer – Mind your time
Answer four questions from #1 - #6. Must answer #3 and #6. Answer
the XC question for extra credit. Question point count weighted equally.
It is all about business, so make sure to demonstrate / synthesize the bigger picture of business in each and
every answer.
Like all essays, specifying an exacting target word count is rather problematic. I am thinking each answer
would be about 250 - 300 words each, depending upon writing style. If you tend to be descriptive and whatnot,
that number could be 350 - 450 words.
Sidebar: Gauge your knowledge level in this way. This exam should take about 90 – 120 minutes to complete.
Students taking much longer may want to work with me to assess / discuss ways to help master this material in
a future conference session.
1. Although most new firms start out as sole proprietorships, few large firms are organized this way. Why
is the sole proprietorship such a popular form of ownership for new firms? What features of the sole
proprietorship make it unattractive to growing firms?
2. List and discuss at least three causes of small business failure. Workarounds, fixes, or methods to avoid
failure should be discussed.
3. Describe three different leadership styles and give an example of a situation in which each style could be
most used effectively.
4. Discuss Max Weber's views on organization theory. Is there a few principles that particularly resonate
in business today?
5. How has the emphasis of quality control changed in recent years? Describe some of the modern quality
control techniques that illustrate this change in emphasis.
6. Explain how managers could motivate employees by using the principles outlined in expectancy
theory? Create a story/example of expectancy theory at work, incorporating the three questions that
according to expectancy theory employees will ask.
7. XC – What is selective perception? Can you describe a business-centric scenario where selective
perception may hinder a businessperson’s ability to respond to a customer need?
I
Fireworks, Manifesto, 1974.
The Architectural Paradox
1. Most people concerned with architecture feel some sort
of disillusion and dismay. None of the early utopian ideals
of the twentieth century has materialized! none of its social
aims has succeeded. Blurred by reality! the ideals have turned
into redevelopment nightmares and the aims into bureau
cratic policies. The split between social reality and utopian
dream has been total! the gap between economic constraints
and the illusion of all-solving technique absolute. Pointed
Space
out by critics who knew the limits of architectural remedies,
this historical split has now been bypassed by attempts to
reformulate the concepts of architecture. In the process, a
new split appears. More complex, it is not the symptom of
prof ...
BullyingIntroductionBullying is defined as any for.docxhartrobert670
Bullying
IntroductionBullying is defined as any form of severe physical or psychological consequences.Bullying has been identified as a social issue in schools, homes and communities.Bullying can lead to both short term and long negative side effects.
Bullying is defined as any form of severe physical or pervasive act that includes communication in writing, electronically that is aimed at a student, or a group of student and it could have the following effects on the target. Bullying has been identified as a social issue in schools, homes and communities. Bullying can lead to both short term and long negative side effects. Many people tend to develop psychological problems as a result of engaging in bullying activities. Adopting effective measures to prevent bullying would also help to deal with the problem once and for all.
*
Forms of BullyingMere teasing.Talking trash about other peopleTrading insults.Physical harassment
The following actions have been identified as physical conduct forms that demonstrate forms of bullying. They include; Mere teasing.
Talking trash about other people. This shows an example of bullying that is practiced by people. Trading insults has also been widely recognised as a form of bullying. Physical harassment
*
Effects of BullyingBullying can lead to both long term and short term side effects.Bullying can change personalities, psychological wellbeing and even lead to physical injuries.Negatively affecting the students’ mental or physical health
Bullying has serious negative consequences for the people who do practice it. Bullying can lead to both long term and short term side effects.
Bullying can change personalities, psychological wellbeing and even lead to physical injuries. People who have been bullied tend to development long term problems such as depression. Development of stress tends to happen once people have engaged in actions that lead to bullying. This is because the actions against bullying tend to overpower the minds and also brings in psychological problems,.
*
A graphic showing No to Bullying
All forms of bullying are not acceptable in the society.
*
How to Prevent BullyingTaking immediate action.Dealing with bullies physically.Criminalizing actions against bullying.
In order to deal with bullying effectively, several measures should be enacted to prevent any form of bullying. Measures such as taking immediate action upon any case of bullying would help to deter the action from ever arising again. The other solutions entail taking immediate forms of action would also help to prevent the act from ever occurring. Dealing with bullies physically and also criminalizing actions against bullying helps to prevent it at all costs. Social and emotional learning is a bullying prevention mechanism aimed at ensuring that students do not fall victim to bullying by equipping them with social and emotional skills. This technique is aimed at ensuring that students are equipp ...
BUS1001 - Integrated Business PerspectivesCourse SyllabusSch.docxhartrobert670
This syllabus outlines the course objectives, assignments, schedule, and policies for BUS1001 - Integrated Business Perspectives. The course introduces students to the role of business in society and explores career opportunities through team projects, case studies, quizzes, and discussions. Student evaluation is based on participation, assignments, and a final project to demonstrate understanding of business perspectives and principles.
BUMP implementation in Java.docxThe project is to implemen.docxhartrobert670
BUMP implementation in Java.docx
The project is to implement the BUMP client in java, with window size 1. Here is an overview of the three WUMP protocols (BUMP, HUMP, and CHUMP). Here are the files wumppkt.java, containing the packet format classes, and wclient.java, which contains an outline of the actual program. Only the latter file should be modified; you should not have to make changes to wumppkt.java.
What you are to do is the following, by modifying and extending the wclient.java outline file:
· Implement the basic transfer
· Add all appropriate packet sanity checks: timeouts, host/port, size, opcode, and block number
· Generate output. The transferred file is to be written to System.out. A status message about every packet (listing size and block number) is to be written to System.err. Do not confuse these!
· Terminate after a packet of size less than 512 is received
· Implement an appropriate "dallying" strategy
· send an ERROR packet if it receives a packet from the wrong port. The appropriate ERRCODE in this case is EBADPORT.
An outline of the program main loop is attached
recommended that you implement this in phases, as follows.
1. Latch on to the new port: save the port number from Data[1], and make sure all ACKs get sent to this port. This will mean that the transfer completes. You should also make sure the client stops when a packet with less than 512 bytes of data is received. Unless you properly record the source port for Data[1], you have no place to which to send ACK[1]!
2. For each data packet received, write the data to System.out. All status messages should go to System.err, so the two data streams are separate if stdout is redirected. To write to System.out, use System.out.write:
System.out.write(byte[] buf, int offset, int length);
For your program, offset will be 0, buf will typically be dpacket.data(), where dpacket is of type DATA (wumppkt.DATA). The length will be dpacket.size() - wumppkt.DHEADERSIZE (or, equivalently, dg.getLength() - wumppkt.DHEADERSIZE, where dg is a DatagramPacket object).
3. Add sanity checks, for (in order) host/port, packet size, opcode, and block number.
4. Handle timeouts, by retransmitting the most recently sent packet when the elapsed time exceeds a certain amount (4 seconds?). One way to do this is to keep a DatagramPacket variable LastSent, which can either be reqDG or ackDG, and just resend LastSent. Note that the response to an InterruptedIOException, a "true" timeout, will simply be to continue the loop again.
5. Add support for an dallying and error packets. After the client has received the file, dallying means to wait 2.0 - 3.0 timeout intervals (or more) to see if the final data packet is retransmitted. If it is, it means that the final ACK was lost. The dally period gives the client an opportunity to resend the final ACK. Error packets are to be sent to any sender of an apparent data packet that comes from the wrong port.
vanilla Normal transfer
lose Lose ever ...
BUS 303 Graduate School and Further Education PlanningRead and w.docxhartrobert670
BUS 303 Graduate School and Further Education Planning
Read and watch pieces on Planning for Graduate School. Answer related questions and write an essay.
· Read about earning a Master’s Degree.
· https://www.gradschools.com/masters/business
· Choose and read about two Master’s degree programs from the left hand column of Subject Selection options (image below) found on the webpage https://www.gradschools.com/masters/business
1-Report - List two subject that you selected to read/research:
One: ____________________
Two: _____________________
2-Discover:
Conduct research on two Master’s degree programs related to your undergraduate major that are offered by Virginia, DC, or Maryland Universities. Choose programs at two separate universities. If you are interested in other universities outside of this area, please feel free to research them as alternatives.
Discover information such as: What are the application processes, preferred GPA, required entrance exams, or prerequisites. What are the options for study (full time study, part time study, face-to-face classes or online classes)? What is the typical timeframe for completing the graduate program? What are the typical career opportunities for graduates from the Master’s program?
Section One- First - University and Graduate Program:
List the university and graduate program that you researched. Answer the research questions with words, phrases, or sentences.
· University and graduate program that you researched
(Enter information here)
· What are the application processes, preferred GPA, required entrance exams, or prerequisites?
· What are the options for study (full time study, part time study, face-to-face classes or online classes)?
· What is the typical timeframe for completing the graduate program?
· What are the typical career opportunities for graduates from the Master’s program?
Section Two: Second - University and Graduate Program
List the university and graduate program that you researched. Answer the research questions with words, phrases, or sentences.
· University and graduate program that you researched
· What are the application processes, preferred GPA, required entrance exams, or prerequisites?
· What are the options for study (full time study, part time study, face-to-face classes or online classes)?
· What is the typical timeframe for completing the graduate program?
· What are the typical career opportunities for graduates from the Master’s program?
3-Write:
Questions to answer in an essay with at least 400 words. The expectation is that the essay in made up of flowing sentences that are organized in to paragraphs. WORD formatted document is required.
· What did you learn about Master’s degree programs and earning a Master’s degree? If you have researched graduate programs in the past, what are the most important aspects of information that you learned about graduate education opportunities?
(At least one paragraph)
· List and discu ...
Bulletin Board Submission 10 Points. Due by Monday at 900 a.m..docxhartrobert670
Bulletin Board Submission: 10 Points. Due by Monday at 9:00 a.m.
As you've learned, it is important to be able to determine the elements of a crime and there are several places to turn for assistance in doing so.
First - Look at the statute for the crime. For example, in New York, the statute for Petit Larceny is Penal Law 155.25.
Second - Check to see if any of the terms in the statute are defined in another statute. For example, in New York, Larceny is defined in Penal Law 155.05
Third - If the elements are not clear from the statute, you may want to research case law to see if the courts have established the elements for the crime.
Fourth - Always remember to check the Jury Instructions.
They are an excellent source for identifying the elements, as this is how the court explains the crime to the jury.
Many states are now posting their Jury Instructions on the internet.
Section One –
Keeping the above in mind, please provide the statute under which a Defendant in your state would be charged with Rape (1st Degree if your state breaks it down in that manner) In addition, provide any relevant statutory definitions and an overview of the Jury Instructions. Then, provide cases addressing at least one of the elements of the statute.
Section Two –
Discuss whether or not a woman can be charged with Rape in your state. If not, what could she be charged with?
...
BUS 371Fall 2014Final Exam – Essay65 pointsDue Monda.docxhartrobert670
BUS 371
Fall 2014
Final Exam – Essay
65 points
Due: Monday, December 9 at 11:59 p.m. EST (Blackboard submission)
Directions:
Part One (this part) of your final exam is to be just that – yours! I expect you will work independently of your classmates to complete the exam.
As always in BUS 371, your grade will be affected by the quality of your writing – clarity, spelling, grammar, syntax, etc.
1. How has this course changed your view and/or understanding of management and its role in contemporary organizations? In your answer, compare your understanding/perception of management at the beginning of the class with your current understanding/perception. Be specific and honest. (10 points)
2. Would you describe your experience with your class team in BUS 371 as better than most of your experiences with previous class teams, about the same as most of your experiences with previous class teams, or worse than most of your experiences with previous class teams? Be specific and explain what happened with your team for you to form your impression. (10 points)
Depending on your answer to question 2, you will answer EITHER question 3 or question 4.
3. If your experience with your class team was better than most of your experiences with previous class teams, what do you think contributed to the positive experience? From what you’ve learned in BUS 371 this semester, what can you do, as an individual student, in future class (and workplace) teams to contribute to their success? Be specific in your answer. (If your experience with your class team in BUS 371 this semester was about the same or worse than your previous experiences with class teams, skip this question and answer question 4.) Be specific in your answer, referring to course material as appropriate. (10 points)
4. If your experience with your class team was about the same or worse than your experiences with previous class teams, what can you do, as an individual student, in future class (and workplace) teams to increase their success? Be specific in your answer, referring to course material as appropriate. (10 points)
5. What do you consider to be your most important “take aways” from this course? In other words, what concepts and/or ideas have you found most interesting? What elements of the course do think will be most likely to be useful to you when you become a manager?
NOTE: Be sure to include both what you’ve found most interesting and most likely to be useful from the course. (10 points)
6. Define, compare and contrast content, process and reinforcement theories of motivation, giving and explaining an example of each. How could a manager apply each of the theories in the workplace? Your answer should be specific and clearly demonstrate your understanding of these motivation theories and their application. (25 points)
feedback for group work:
Business 371 - Fall 2014
Individual Assignment Five
Peer Assessment – Round Two
Due: Friday, December 5 (submitted i ...
Burn with Us Sacrificing Childhood in The Hunger GamesSus.docxhartrobert670
This document provides a summary and analysis of the novel The Hunger Games by Suzanne Collins. It discusses how the novel depicts the sacrificing of childhood through the Hunger Games, where children are forced to fight to the death for entertainment. It explores themes of childhood, desire, identity formation, and how entering adulthood involves both recognition of culturally defined childhood as well as its loss. A key part of the analysis focuses on how the protagonist Katniss Everdeen develops a sense of self and is able to articulate her identity and desires through her experiences in the Hunger Games arena.
BUS 305 SOLUTIONS TOPRACTICE PROBLEMS EXAM 21) B2) B3.docxhartrobert670
BUS 305: SOLUTIONS TO
PRACTICE PROBLEMS EXAM 2
1) B
2) B
3) No, fan pattern (heteroscedasticity)
4) No, nonlinear relationship between X and Y
5) The black line is the regression line because it get closest to the sample points (minimizes error between the points and the line). The red line has a larger error; that is, larger total distance from points to the line.
6) Because it is reasonable to suppose that costs are dependent on production volume (since units are produced, directly resulting in costs), then regression is more appropriate for this data since regression is appropriate when an cause-and-effect relationship is assumed.
7) C
8) a) r = 0.8;
b) T = 1.31;
c) p = 0.117
d) There is no evidence of a significant correlation between X and Y in the population because we did not reject the null of H0: = 0.
9) Note: the following are not complete answers to Question 11; they are just enough for you to know whether your short answer addressed the correct things.
a) 1 = population slope, b1 = sample slope. On exam, would also want to address what you know (or don’t know) about each of these and how each is found.
b) An outlier can “drag” the regression line toward it. On the exam, also think about how this would affect the quality of your regression model and the predictions.
10) Yes, there appears to be a straight line relationship between the variables. Linear regression appears to be appropriate. The regression output is:
11) a) T = -0.09, p = 0.929, do not reject Ho, conclude there is no evidence of a relationship
b) R2 = 0.002 = 0.2%, No because value is very close to zero
c) Correlation = r = -0.0421. No, there is not a strong relationship between these variables. The correlation is nearly 0.
d) Regression line is Y^ = 1.26 – 0.035X.
Y^ = 1.26 – 0.035(100) = 1.26 – 3.5 = -2.24. No this does not make sense because you cannot have a negative number of near misses. It is not wise to predict with this model. The R-squared value is extremely low (essentially 0%), which means that there is no relationship at all between near misses and flights in this data. Therefore, predicting misses from flights is meaningless.
e) b1 = -0.035. As Number of flights increases by 1, we expect number of near misses to go down by 0.035. Or, put another way, as flights increases by 1000, we expect number of near misses to go down by 35. No, this does not make sense. We would assume that as flights increase, so would near misses.
12) a. Multiple regression is a direct extension of simple regression, except that now we have more than one independent (X) variable.
b. Note: the following is not a complete answer; it is just enough for you to know whether your short answer addressed the correct things: Multicollinearity is when the independent variables are highly correlated with one another. On the exam, also indicate how this affects the model, how one can identify if it is present, and what can be done to correct it.
c. Dummy variables are us ...
Burgerville- Motivation Goals.
Peer-reviewed articles.
Here are some articles I found:
1) Employees Motivation in Organizations: An integrative literature
Review:
http://www.ipedr.com/vol10/106-
S10089.pdf
2) Impact of Employees Motivation on Organizational
Effectiveness:
http://iiste.org/Journals/index.php/EJBM/article/viewFile/265/150
3) Shareholders win when employees are motivated:
http://www.forbes.com/2009/08/23/employee-motivation-stocks-intelligent-investing-returns.html
1. THE THEORY OF PURPOSEFUL- WORK BEHAVIOR: THE ROLE OF PERSONALITY, HIGHER-ORDER GOALS, AND JOB CHARACTERISTICS
http://web.a.ebscohost.com/ehost/pdfviewer/pdfviewer?sid=fa02d089-2c07-4af2-8637-23192c8c3b1f%40sessionmgr4004&vid=14&hid=4209
0. Relative Importance and Utilityof Positive Worker States: A Reviewand Empirical Examination
http://web.a.ebscohost.com/ehost/pdfviewer/pdfviewer?sid=fa02d089-2c07-4af2-8637-23192c8c3b1f%40sessionmgr4004&vid=27&hid=4209
Cam Sommer
1. http://psycnet.apa.org/journals/apl/72/4/658/
Comparative analysis of goal setting theories across cultures
0. http://amj.aom.org/content/29/2/305.short
Effects of Team building and goal setting on productivity: A field Experiment
The first employee’s interview
Mr. Kay Nguyen is working at Burgerville for over 2 years. He said that working at Burgerville is only temporary while attending school. The hour he works is outside of his school time, so it helps pay for tuition. The work is very busy during high traffic hours, especially at the drive-through during dinnertime. His main responsibility is handling cashier, but he often help others where needed. He starts pay at minimum wages.
His supervisor encourages employees from time to time, but the wage is very low for employee to stay. He explains that turnover at Burgerville is below average compare to other place he has worked before.
Goal Setting:
What did you learn from this job? How does it impact your future? I encounter customers every day, I learn a lot about customer service in person. He dealt with all type of customers. He learned about servicing and created a friendly environment for customers
While studying and working, his self-motivation can encourage his learning and success, whatever be the scenario. He won’t stop staying here as a cashier. He will keep pushing himself to reach his goal setting
What are your obstacles? How do you deal with it? The most frustrate situation he endures during his tenure at Burgerville is the irresponsibility of other employees. They sometime either do not show up for work or call in. This creates a lot of pressure at work, as he has to cover for their shift. He usually has to stay extra hours to clean up and cover for other shifts.
Does BurgerVille create rewards or something to motivate its employee? Does it make you feel happy or comfortable when working there? Mr. Nguyen’s supervisor usually awards his employees with movie tickets for their performances. Also, they are a ...
Bullying Bullying in Schools PaperName.docxhartrobert670
Bullying
Bullying in Schools Paper
Name
Class
Date
Professor
Bullying in Schools Paper
Bullying is mean spirited and unwanted intimidation by another student. Bullying can come in many different forms but the result is an imbalance of power where one student suffers physical and verbal attacks as well as social exclusion. The bully repeatedly focuses in on their victims and subjects them to continued harassment and false rumors. Bullying causes the victims extreme emotional damage and lifelong pain but occurs most commonly in the school setting. In order to ensure that bullying is prevented the educational system will need to become more proactive and create programs and services designed to educate, reduce, deter and punish bullying.
Types and Extent of Bullying
The three types of bullying experienced by the youthful victim in the school setting consist of verbal and physical assaults as well as social exclusions. The types of verbal threats the victims of bullying suffer are name calling, false gossip, lewd sexual comments, taunts, and threats to cause harm. Physical assaults include hitting, kicking, pushing, tripping, pinching, and spitting on the victim. Social exclusions includes the bully taking steps to isolate the victim from peers by leaving them out of social events or gatherings and talking rudely about them to other peers. Other students will fear the bully and go along with their mean spirited actions. The victim will be isolated and the bully will take steps to embarrass the student in front of other peers. The bully will spread malicious rumors and make rude comments to the victim.
Adolescents are extremely sensitive to rejection and the opinions of peers, both of which can serve as catalysts for revenge (Booth, 2011). The result is the bullying becomes escalated and the victim takes revenge on the bully or physical altercations occur. Bullying is a major problem in society. While bullying occurs most in the school setting there are other places where bullying occurs. Bullies target victims using social networks and will bully them at social events. Victims of bullies are harassed and attacked on school buses and on school playgrounds as well as in the victim’s neighborhood. While bullying can happen anywhere it is most prevalent in schools making it the responsibility of educational systems to take steps to see it stopped.
In 2001 in a report conducted by the Bureau of Juvenile Justice Statistics it was discovered that 20% of all students will be bullied while in high school while the number creeps up to almost 30% when dealing with school children from second to sixth grade (DeVoe, 2009). This comes to one in seven students from kindergarten to twelfth grade being victims of bullying. Over half of the students surveyed have been witness to bullying in the school setting and over 70% find bullying is a real issue in their school as well as the report found girls where far more ...
Building Design and Construction FIRE 1102 – Principle.docxhartrobert670
The document discusses building design and construction for fire safety. It outlines five objectives of fire-safe design: life safety, property protection, continuity of operations, environmental protection, and historical preservation. It also describes different types of building construction including non-combustible (Type I-II) and combustible (Type III-V) structures. Testing and ratings of construction materials are discussed in relation to flame spread, smoke development, and fire resistance.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Diana Rendina
Librarians are leading the way in creating future-ready citizens – now we need to update our spaces to match. In this session, attendees will get inspiration for transforming their library spaces. You’ll learn how to survey students and patrons, create a focus group, and use design thinking to brainstorm ideas for your space. We’ll discuss budget friendly ways to change your space as well as how to find funding. No matter where you’re at, you’ll find ideas for reimagining your space in this session.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
How to Build a Module in Odoo 17 Using the Scaffold Method
Beyond Pain Coercing Violent Non-State Actors By Troy .docx
1. Beyond Pain: Coercing Violent Non-State Actors
By Troy S. Thomas*
2010
Today‟s global conflict environment is permeated by the
existence of a diverse range of violent non-
state actors (VNSA). These groups utilize subversive means to
exploit and disrupt the international
system, frequently committing heinous acts of violence against
innocent civilians in the process.
Short of war, how can nation-states effectively counter the
actions of VNSA? This paper examines
the proposition that VNSA can be coerced by the threat or
limited use of military force. By defining
the problem, adapting strategy to the problem and assessing the
historical record the author makes
the case that coercion is a viable option for confronting VNSA.
This paper follows-on to previous work done for INSS on
violent non-state actors by Troy S.
Thomas, Steven D. Kiser, and William D. Casebeer including:
Lords of the Silk Route, INSS
Occasional Paper #43; Violent Systems, INSS Occasional Paper
#52; and Turbulent Arena, INSS
Occasional Paper #58.
Military strategy can no longer be thought of, as it could for
some countries in some eras,
2. as the science of military victory. It is now equally, if not
more, the art of coercion, of
intimidation and deterrence. The instruments of war are more
punitive than acquisitive.
Military strategy, whether we like it or not, has become the
diplomacy of violence.1
INTRODUCTION
Suicide bombers are inspired and coached to their victims by al
Qaeda and its franchises in
Afghanistan, Iraq, Algeria, Yemen and beyond. Somali pirates
disrupt shipping in the Indian Ocean,
kidnapping civilians and extorting governments. Warlords
terrorize the creeks of the Niger Delta as part
of a “blood oil” trade. A quasi-religious drug cartel, La
Familia, decapitates its way to control of
Mexican drug trafficking routes. These violent non-state actors
(VNSA), or armed groups, and others
pervade the global conflict landscape. These conflicts pit
nation-states against armed groups working to
exploit, subvert and overthrow the international system;
conflicts fueled by globalization‟s dark dynamics
and punctuated by unconscionable violence against innocents;
conflicts induced by true believers and
hardened criminals armed with low- and high-tech weapons of
mass destruction and disruption. In such
3. conflicts, do we have options for using military force short of
war? Are such adversaries susceptible to
coercion? If so, how might a coercive strategy work?
This paper aims to answer these questions by examining the
proposition that VNSA can be
coerced by the threat or limited use of military force. I
conclude that coercion is a viable option for
* Troy S. Thomas, Lt Col (Col Select) USAF, is a student at the
National War College at the time of this writing.
The views expressed in this paper are those of the author and do
not necessarily reflect the official policy or position
of the United States Department of the Air Force, National
Defense University, Department of Defense, or the U.S.
Government.
2
confronting VNSA. Even when leaders resist pressure,
opportunities exist to induce change in the
behavior of the organization and its support network. This said,
coercion is exceptionally difficult, and
the prospects for success are not promising. Hard does not
equal futile. Coercion offers options when
destroying the enemy is not desired or feasible, when diplomacy
4. needs muscle, or when development
takes too long to alter conditions.
Why do we need a study of coercion‟s utility now? Despite a
persistent threat, contemporary
theory and practice are not oriented on the VNSA problem.
Focus remains on inter-state relations. One
reason is a Cold War legacy of deterrence, associated with
containment and preventing nuclear war. In
the post-Cold War era, compellence emerged as a way to
manage crises in the Balkans, Iraq, Afghanistan,
Haiti and more. Second, deterrence was discarded early in the
Global War on Terror (GWOT). In the
wake of 9/11, the 2002 US National Security Strategy argued
“deterrence will not work against a terrorist
enemy…whose so-called soldiers seek martyrdom in death and
whose most potent protection is
statelessness.”2 By 2006, deterrence appeared headed to
recovery. The US National Strategy for
Combating Terrorism rejected coercion of “hard core”
terrorists, but acknowledged its potential against
terrorist networks.3 It is not mentioned in the accompanying
National Military Strategic Plan for the War
of Terrorism.4 In policy and practice, US strategy discounts
coercion in favor of killing militants today
5. and draining the support swamp tomorrow. As a consequence,
we forfeit potential options in the strategic
space between development and destruction.
The case for coercion is made by defining the problem, adapting
strategy to the problem, and
assessing the historical record. The problem is diagnosed in the
second section. What are VNSA and
why are they hard to coerce? In short, they are non-state
organizations using violence. As such, our
strategy is informed by understanding the behavioral dynamics
common to all VNSA. Groups are the
unit of analysis—e.g. terrorist groups, not individual terrorists
or terrorism, are within the scope of this
paper. Ruled out are spontaneous protests, lone actors, and
non-governmental organizations that reject
violence like multi-national corporations. Individuals are
relevant to the extent they have a role in
making or implementing the decisions of the group. Focus is
not on movements, or ideologies. That
said, ideology is central to an organization‟s resistance to
coercion and its reasons for using violence.
Extreme religious or nationalist groups, for example, are more
able to neutralize coercive attempts.
6. The logic of coercion is adapted to VNSA in the third section.
What are the ends, ways, and
means? Coercion applies armed force to gain compliance by
deterring or compelling adversary behavior.
Given the inherent difficulty of proving whether coercion was
decisive to a given outcome, the case for
coercion must be based in part on the soundness of its logic in
relation to what we know about how
organizations really work. To test the conceptual logic, the
fourth section examines a sub-set of the
recent US record. What were the results, and to the extent our
knowledge of the adversary allows, why?
3
The success rate is underwhelming. Nonetheless, we can
improve the prospects for success by applying
the lessons from a rigorous, but limited case history. Moreover,
the specific case of coercing warlords in
Somalia, 1992-1995, is analyzed to illustrate the effectiveness
of coercion in light of these lessons. Thus
armed, Section V concludes with recommendations for
developing and implementing strategy for
7. coercing VNSA.
As a preliminary introduction, coercion comes in two forms—
deterrence and compellence.5
Deterrence seeks to maintain the status quo by preventing an
action before it occurs. Compellence seeks
to reverse an action that has already occurred, or induce a
different action. Both approaches work on the
target‟s decision calculus by holding something of value at risk;
coercion is directed at the adversary‟s
will as opposed to destroying his capability. The contrast is
best made by Nobel laureate Thomas
Schelling in his classic Arms and Influence:
There is a difference between taking what you want and making
someone give it to you,
between fending off assault and making someone afraid to
assault you, between holding
what people are trying to take and making them afraid to take it,
between losing what
someone can forcibly take and giving it up to avoid risk or
damage. It is the difference
between defense and deterrence, between brute force and
intimidation, between conquest
and blackmail, between action and threats. It is the difference
between the unilateral,
“undiplomatic” recourse to strength and coercive diplomacy
based on the power to hurt.6
The power to hurt leverages potential force, or uses it in limited
and discrete ways. As a result, the enemy
8. retains the capacity for organized violence or illicit activity.
Advancing a viable coercive strategy is not a rejection of other
instruments or approaches to
gaining compliance. Economic, diplomatic and informational
means can be brought to bear to sanction,
contain and discredit. Sanctions and financial seizures, coupled
with diplomatic isolation, can apply
pressure to state and non-state actors. Law enforcement shares
similarities with the military instrument,
and is often the primary means of coercion domestically.
Conversely, the instruments of power, including
the military, can be used to motivate and reward behaviors
through inducement and persuasion. In
reality, military means are never used in isolation, or only to
cause pain.
In terms of approaches, development mitigates the underlying
conditions that give rise to violent
groups. Public diplomacy engenders a less conducive
environment while diplomatic negotiations
facilitate compromise. Finally, coercion does not rule out
warfighting. Make no mistake, coercion is
violence. If it fails, wars may start. Destroying VNSA may be
the preferred or only option. On the other
9. hand, some VNSA cannot be eliminated, and domestic and
international factors may constrain fighting in
the near-term if at all. Rather than destroying the group, our
political objectives may be satisfied if we
can alter the behaviors of a surviving, less threatening group.
In practice, all means and ways should be
mobilized, sequenced, and integrated for success. To this end,
military coercion is studied here to enable
a comprehensive US grand strategy for confronting the VNSA
problem.
4
PROBLEM
Non-state adversaries are not a new national security problem.
The US was a rebel start-up, and
our first decades involved coercive contests with Native
American tribes and Barbary pirates. Modern
armed groups pose challenges similar to their ancestors. Their
decisions and behaviors seem irrational.
When compared to states, they are harder to find, understand,
signal, and pressure with military force.
The VNSA may be elusive, but it is neither impenetrable nor
10. impervious to pressure; they are social
organizations made up of real people. By examining key
organizational dynamics common to all VNSA,
we can diagnose the problem in a way that guides tailored
coercion of the leaders, organization, and
affiliated supporters. Concurrently, we need to account for how
the particular VNSA is using violence to
counter coercion with coercion.
Real Rationality
State and non-state actors make imperfect decisions resulting in
unexpected behaviors. This is
contrary to the underlying premise of classical coercion theory,
which assumes rationality of the target‟s
decision calculus as well as behavior that “reflects purpose or
intention.”7 Rather than dismissing VNSA
choices as irrational and actions as random, we need to
appreciate and anticipate their logic in its context.
When it comes to decisions, the rational actor makes consistent,
value-maximizing choices from
among a set of prioritized alternatives.8 Several factors,
posited by Nobel laureate Herbert Simon, temper
this model: incomplete information; problem complexity;
human computational limits; time constraints;
and conflicting preferences among decision-makers.9 Whereas
11. we only need know the actor‟s goals to
anticipate behavior using the rational model, Simon‟s “bounded
rationality” requires us to “know the
organism‟s goals, information and conceptualization it has of
the situation, and its abilities to draw
inferences from the information it possesses.”10 Bounded
rationality applies to VNSA. Terrorism expert
Bruce Hoffman argues “the terrorist is fundamentally a violent
intellectual, prepared to use and indeed
committed to using force in the attainment of his goals.”11
Going further, Robert Pape argues in Dying to
Win that there is even a “strategic, social, and individual logic
to suicide terrorism.”12 This logic applies
at the individual level, but for our purposes, it is more
important to note that the organization develops
and manages the logic in a way to recruit and prepare
individuals for suicidal attacks. The logic of
suicide terrorism may be compelling, but it is rarely without
skeptics in and out of the organization.
Real rationality also applies to behavior. Even with stringent
internal control, individuals deviate
from their roles and responsibilities. A delta always exists
between what leaders want and the group
does. For example, institutions behaved in ways inconsistent
12. with leader preferences during the height of
the 1962 Cuban Missile Crisis. An intercontinental ballistic
missile (ICBM) was test launched by the Air
Force, and the Navy communicated with Soviet nuclear
submarines using depth charges.13 Both sent
5
mixed signals at a critical juncture. VNSA examples are less
well-documented; however, it is not
uncommon for suicide bombers to back out or guerrillas to
defect. The formal structure never succeeds in
conquering the informal social structure; behaviors emerge as a
result of many individuals making
choices based on multiple, and often incongruent motivations.14
All actors are afflicted with real
rationality.
Hard Targets
States are hard to coerce; non-state actors are harder. First,
VNSA are harder to find. They do
not usually have an address, preferring to operate in ungoverned
spaces and through illicit networks—Al-
Shabaab in Somalia.15 To complicate matters, they also live on
13. the Internet and prosper in modern,
governed spaces—Aum Shinrikyo in Tokyo. Though elusive,
the general location of most VNSA is
known—Taliban in South Waziristan. In some cases, territory
is actually ceded as in the Switzerland-
sized sanctuary gifted to the Revolutionary Armed Forces of
Colombia (FARC) by former President
Andres Pastrana as part of a failed peace process.
Second, VNSA are harder to understand. Not only do they
routinely change names—the Salafist
Group for Call and Combat (GSPC) is now the al Qaeda
Organization in the Islamic Maghreb—but their
illegal status and secretive nature obscures answers to key
questions: who decides; what do they value;
what is their resolve; how do they judge costs and benefits; and
how are decisions made and
implemented? Sometimes we get partial answers from defectors
and intercepted messages. A well-
known example is a 2005 letter from al Qaeda‟s number two,
Ayman al-Zawahiri, to its Iraq leader, Abu
Musab al-Zarqawi, in which al-Zarqawi is cautioned against
compromising long-term goals by sewing
sectarian violence.16
14. Third, VNSA are harder to signal. Well-established means for
communication and negotiation do
not exist. In fact, dialogue with VNSA carries a strategic cost;
it conveys legitimacy not always earned or
desired. Direct dialogue; however, is common and often
necessary. For example, the Good Friday
accords brought peace in Northern Ireland only after years of
controversial talks with senior leaders of the
Irish Republican Army (IRA). When direct communication is
not an option, indirect means exist through
the media, intermediaries, or actions. For example, the US
responded to the 1998 bombing of its Kenya
and Tanzania embassies with cruise missile strikes against an al
Qaeda training camp in Afghanistan and
a suspected chemical facility—the Al Shifa pharmaceuticals
plant and tannery—linked to Osama bin
Laden in Sudan. Controversial and ineffective, the strikes were
meant to signal US resolve and possibly
deter future attacks.17
Fourth, VNSA are harder to pressure. In most cases, they have
“fewer identifiable high value
assets” that can be held at risk.18 Some groups value their
physical infrastructure and resources while
others are willing to sacrifice people and things, but not ideas.
15. Even if we identify value, the military may
6
not be the right tool due to lack of access and precision, or
because the VNSA has a high pain threshold.
VNSA resolve may also be stronger because “they have an
asymmetrically higher stake in the outcome of
the crisis or conflict.”19
Organized Militants
VNSA are hardened, but not impenetrable targets. As a point of
entry, VNSA are non-state
organizations that use collective violence.20 Each element of
this definition has implications for how we
understand and influence decisions and behaviors. It directs
attention to the most relevant organizational
dynamics for coercive strategy. It helps answer key questions
about how armed groups develop, make
decisions, control behaviors, relate to the environment and use
violence for its own coercive purposes.
Not States
VNSA are not official entities or instruments of the nation-
state. Although VNSA may serve as a
16. state proxy, or be highly dependent on the resources provided
by one or more states, they retain sufficient
autonomy to make their own strategic choices. Hezbollah is a
VNSA despite receiving direct support
from Iran, whereas the Basij militia is an instrument of Tehran.
As VNSA like Hezbollah in Lebanon, or
Hamas in Gaza, integrate with and become government, they
start losing non-state status. The line
between state and non-state blurs, and the closer aligned the
group is to a state, or the more governing
responsibilities it assumes, the more susceptible it is to the
logic of coercion.
The transformation from terrorist to president is just one
manifestation of an organization‟s life-
cycle. States have birthdays and evolve over time; however,
VNSA are more transitory and prone to
expand, regress, splinter, or die. Early on, the group struggles
to survive by recruiting members and
acquiring resources.21 Choices are made by elites who are able
to tightly control the use of violence
primarily for symbolic or opportunistic reasons.22 During
growth, where most VNSA linger, formal
structures elaborate, and sometimes splinter off, as leaders try
to overcome “the idiosyncratic behaviors of
17. group members.”23 Decision-making pressures grow as leaders
seek to accommodate a wider array of
stakeholders. Delegation widens the decision and action gap.
At maturity, the VNSA gets closest to
being a rational organization. Investment in people, resources,
and policies creates value that is more
susceptible to risk. With the stakes raised, the group has more
resolve in the face of threats.
Social Organizations
VNSA are goal-directed social groups interacting with the
environment.24 The goals, stated or
implied, reveal the organization‟s orientation to either a
transcendental or transactional agenda. The
former stresses ideology, religion, or some other existential
code. Types include religious extremists such
as al Jihad in Egypt, revolutionary Marxists such as the
National Liberation Army (ELN) in Colombia,
and ethnic nationalists such as the Basque Fatherland and
Liberty (ETA) in Spain. These true believers
7
are in the grip of a subjective reality that is highly resistant to
external influence.25 Because their agenda
18. may be “divinely sanctioned,” concerns over a low probability
of success or loss of life are minimized.
In contrast, transactional VNSA live for money and power.
These groups build and lose value
more quickly. Defection is more likely if “profit or power is
available elsewhere with acceptable risk.”26
The primary types are transitional criminal organizations (TCO)
such as the Chinese Triads around the
world, and warlords with private militias such as Thomas
Lubanga of the Congo (now at the International
Criminal Court). Other classifications exist; however, most are
variations on these five main types. The
most challenging VNSA are hybrids, leveraging pragmatic and
normative agendas to expand their appeal,
resources, and survivability.
Recognizing the limits of rational decision-making, coercion
must nonetheless be informed by
some knowledge of the actual decision process. In most social
organizations, decisions result from a
bargaining process involving a coalition of internal and external
elites with their own constituencies,
preferences, and sources of power.27 Terrorism expert Brian
Jackson argues that each party to the process
19. will make choices based on beliefs about whether the proposed
behavior: 1) positively influences
relevant audiences; 2) advances group goals; 3) produces a
positive internal reaction; 4) is worth the risk
relative to alternatives; 5) will be sufficiently resourced; and 6)
is based on “enough” information.28
Coercion has a role to play in shaping each of these perceptions.
Echoing an earlier insight, one of the
most important implications of real-world decision-making, as
assessed by Graham Allison, is that the
“number of forks in the decision tree increases, independent
actors multiply, and the prospect of the result
achieving any precise original intent declines.”29
Like all organizations, VNSA leaders expect their decisions to
be implemented by group
members who do not deviate from their assignments. Formal
and informal communication pathways
distribute the guidance, but it is by socializing members to the
culture of the organization and maintaining
a system of rewards and sanctions that role behaviors are
enforced.30 In a reflection of its transcendental
agenda, the FARC still works to indoctrinate members to its
Marxist ideology while at the same time
relying on monetary incentives and corporal punishment to
20. motivate performance.31 All coercion
strategies must overcome these two forms of internal
resistance—socialization and sanctions.
At one time or another, all VNSA members operate at the
group‟s boundary, linking it to an array
of external stakeholders including states sponsors, operational
enablers (financiers, smugglers, etc.), and
affiliated groups (i.e. al Qaeda franchises).32 This inter-
organizational network represents a web of
influence; most VNSA are dependent on others for sanctuary,
money, recruits, intelligence, technology,
weapons, and even legitimacy.33 For example, Hamas receives
weapons from Iran overland through
Sudan and Egypt.34 Osama bin Laden enjoyed sanctuary in
Sudan until the US convinced Khartoum to
expel him in 1996 through a combination of carrots and
sticks.35 Not to be forgotten, external players
8
often have a say in decisions. Certainly state sponsors are key,
but so are religious leaders and
communities—preferences of the Irish Diaspora weighed on the
21. IRA.36 Not all stakeholders share the
same level of commitment, nor are they all partners. The IRA
provided weapons training to the FARC,
but does not share its political ideology; and Pakistan is an
enemy of al Qaeda, but has not been willing or
able to go after its leaders in the remote Northwest Frontier
Province. Consequently, external
relationships often present lucrative targets for coercion as well
as communication conduits to VNSA
decision-makers. Of course, more self-sufficient and insular
groups present fewer options.
Collective Violence
VNSA are distinguished by their deliberate use of violence.
Knowing why violence is used is
elemental to deterring further use or compelling a shift in use,
possibly to alternative adversaries or even
internally. Violence serves inter-related purposes. Internally,
beatings and execution may be used to
enforce role behaviors. Externally, it can serve to demonstrate
potency, attract support, cause fear, and
destroy opponents.
When directed externally, collective violence comes in three
main forms: conventional, guerrilla,
and terrorism.37 According to insurgency and terrorism expert
22. Bard O‟Neill the forms are a “variety of
organized violence emphasizing particular armed force,
weapons, tactics and targets.”38 Historically,
VNSA weakness relative to the state lends to emphasis on
guerrilla warfare or terrorism, often in
combination. There are notable exceptions where armed groups
were able to field a conventional force,
including Hezbollah, al Qaeda‟s 55th Arab Brigade, or the
Liberation Tigers of Tamil Eelam (LTTE)
before its defeat in 2009. To gain a conventional capability, the
VNSA must overcome significant
barriers to entry like access to physical space, weapon systems,
and financial resources. Conventional
strength comes with risk; the group actually becomes more
vulnerable to coercion because 1) it now has
forces that can be more easily put at risk, and 2) the state‟s
asymmetric advantage in conventional force
increases the probability that VNSA objectives will be denied.
In contrast, guerrilla warfare and terrorism are indirect
approaches. As postulated by British
strategist B. H. Liddell Hart, both take the path of least
resistance in the physical sphere and least
expectation in the psychological.39 Guerrilla warfare avoids
positional, force-on-force encounters.
23. Rather, it involves “small-scale, limited actions, generally in
conjunction with a larger political-military
strategy, against orthodox military forces.”40 The guerrilla
primarily targets government security forces
and institutions in order to demonstrate their impotence and
gradually erode the will of the state and
populace.41 Whereas the guerrilla generally avoids innocents
to retain popular support, innocents are the
victims of the terrorist. Victim selection is central to
terrorism‟s heinous logic. Terrorism is violent
theater; it creates and exploits fear to drive political change.42
The normative violation associated with
9
killing innocents in an abnormal way is intended to have a
psychological impact on the actual target of the
violence—the public, and ultimately the government.
Terrorism, like guerrilla warfare, is coercion.
Summary
This section addressed the most relevant elements of a highly
complex problem. Our quest for
actionable insight requires us to first get past the rational actor
24. assumption to a more realistic diagnosis.
Decisions are the result of a bargaining process, and behaviors
emerge from interactions by real people
who deviate from their expected roles. Going further, VNSA on
the whole are harder to find, understand,
signal, and influence, particularly with armed force. By
approaching them as social organizations, we can
leverage insight to key organizational dynamics to frame and
guide coercive strategy.
STRATEGY
Coercion is an approach to US grand strategy. It is a way
military means can be applied in
concert with non-military means in order to achieve political
ends. Its logic was most fully developed
into a rich body of theory during the Cold War. 43 Focus was
on how to deter nuclear attack, contain the
spread of communism, and compel changes in behavior by Third
World states without trigging major
power war. When the superpower rivalry waned, the theory was
revised for application to so-called
“rogue” states such as Iran, Libya, Iraq, and North Korea.44
Objectives were to prevent regional
aggression as well as weapons of mass destruction (WMD)
development, proliferation and use. When the
25. VNSA challenge is acknowledged in the literature, attention is
deflected to states positioned to apply
pressure. This section takes the next step—it adapts the
conceptual logic of coercion directly to the
VNSA problem. The case of coercion is strengthened if the
ends, ways, and means of its logic can be
connected to the key organizational dynamics identified in the
last section.
Grand Strategy
The purpose of grand strategy, as articulated by Liddell Hart, is
“to coordinate and direct all the
resources of a nation, or band of nations, towards the attainment
of the policy object of war.…”45 Its
setting is war in the broadest sense as an engagement among
actors involving the threat or use of force. It
applies to the entire conflict spectrum from nuclear to
conventional to irregular war. Its jurisdiction
extends beyond warfighting to war preparation and conflict
prevention as well as war termination and
recovery. As argued by Edward N. Luttwak, grand strategy
“includes the highest level of interaction
between any parties capable of using force against each other,
including terrorist and criminal groups.”46
In contemporary terms, grand strategy equates to US national
26. security strategy.
Grand strategy has an inherent logic: resources (means) are
applied (ways) in order to achieve
desired results (ends). Means include all sources of hard and
soft power, mobilized as diplomatic,
informational, military, and economic instruments. Power and
its instruments serve the national security
10
objectives, or ends, of the state.47 Ways are a strategic
approach that interrelates means to ends through a
concept(s) for how to integrate and sequence the application of
available capabilities. Coercion is such a
concept—it describes how military means can be applied to
improve the prospects for gaining compliance
with our demands short of war.
Ends
Ends let us know if grand strategy succeeds or fails. They are
the political objectives to which
the military goals are subordinate. Compliance is the
minimalist end of coercion. Compliance only
requires that the desired behavior occurs even when such
behavior is not in the interest or a preference of
27. the VNSA—believe what you want, but do what we say.48
Compliance is more reliable when it results
from deliberate decisions carried out faithfully by group
members. While not preferred, our previous
analysis suggests compliance may also be obtained even when
the leadership does not intend it due to
coercion‟s effect on other stakeholders in and out of the
organization. Ideally, the leaders choose to
comply, even if reluctantly, but modest goals may be satisfied
with this lesser form of compliance.
When compliance equals inaction, it is deterrence. Different
action is compellence—stop doing
something, or do something else. The latter is more difficult to
achieve since it seeks to alter the status
quo. As put by Schelling, “‟Do nothing is simple,‟ „do
something‟ ambiguous. „Stop where you are‟ is
simple; „go back‟ leads to „how far?‟”49 As a consequence,
deterrence is easier to communicate and more
promising for goals such as do not adopt violent methods, attack
us, or pursue WMD. In contract,
compellence goals must specify when, where, and how much.50
This imposes a communication burden if,
for example, we want the group to stop something underway
like cocaine trafficking or do something new
28. like relocate. In practice, reversing a complete action versus
deterring a future action is rarely a clear-cut
division.51
As our demands increase, compliance is less likely to be a
sufficient objective. VNSA are
unlikely to foreswear violence, give up territory, or abandon
their agenda if the main stakeholders do not
perceive the outcome as being in their interest. For these
ambitions, we need to go beyond compliance to
cooperation and conversion. Cooperation is in play when the
group concludes that compliance is
consistent with their interests and preferences. A loftier goal,
conversion, occurs when the VNSA
completely restructures its beliefs, attitudes, and perceptions—
believe what we say, then behave
accordingly.52 For these ends, coercion is rarely sufficient;
other ways and means must be brought to
bear.
Even if the desired behavior results, it is difficult to know
whether coercion was the cause,
particularly for deterrence. It is easer to spot failure.
According to Robert Pape in Bombing to Win, the
criteria for failure are simple:
29. 11
Coercion fails when the coercer stops its coercive military
actions prior to concessions by
the target, when the coercer‟s attacks continue but do not
produce compliance by the
target, or when the coercer imposes its demands only after
complete defeat of the target.53
War is often evidence of failed coercion. Conversely, qualified
success can be claimed when behavior
conforms to our demands even if the reasons are unclear. We
are most successful, according to Byman,
when “the adversary gives in while it still has the power to
resist.”54
Ways
Ways describe how we achieve compliance by applying means.
Compellence and deterrence
represent the broad ways of coercion; however, distinctions fade
as we get into the mechanics of
influencing the adversary‟s calculus of costs and benefits
through combinations of punishment and denial.
Just as compliance may be an insufficient end, coercion is
usually not a sufficient way. Inducement and
30. persuasion are essential, mutually supporting approaches.
Decision Calculus
The logic of coercion starts simple—costs outweigh the benefits
of not complying—and gets
complicated quickly.55 VNSA stakeholders calculate the
relationship among costs and benefits within
their bounded decision context. The two main costs of not
complying are punishment and denial of
objectives. But complying also has a price. Internal and
external pressures for action, to mount one more
spectacular terrorist attack, can be significant. Mature,
transcendentalist groups like Jemaah Islamiya in
Southeast Asia are driven by religious duty underpinned by
perceived injustice. Or, in cases like ETA in
Spain, sustained operations are necessary to prove the group‟s
vitality. Costs of complying are usually
greater in deterrence situations, at least in the near-term.56
Doing nothing carries less risk to the group‟s
support base or sense of honor than does altering behavior. The
principal benefit of complying is group
survival, or to a lesser extent, assurances that punishment is not
forthcoming and long-term goals remain
viable. Benefits of not complying also exist, including
enhanced prestige and cohesion for the group, and
31. monetary rewards, promotion or spiritual validation for
individuals.
Of course, the calculus is not clear and perceptions of value
trump “real” costs and benefits every
time.57 A sense of how much the VNSA values the behavior
indicates resolve. The jihadist, seized by
religious duty, values the fight more than the pirate seeking to
score another high seas ransom.58 Value is
also assigned to costs and benefits; disruption of a weapons
proliferation network may be less threatening
than a loss of safe haven. The available options have value
too—attack, do not attack, attack later, attack
a different target, and so on.59 Finally, we must overcome the
human tendency to discount the future even
though an on-going relationship is expected. According to
Robert Art, “imagined future pain hurts less
than present pain.”60 Therefore, the VNSA will value sunk
costs more highly and take more risk to
preserve a current position than enhance it.61
12
Credibility is required to shape perceptions about value and the
32. probability that costs or benefits
will be imposed. Not only must our resolve be believable, but
the target must believe that the threat can
be executed—that the cost will actually result.62 In general,
deterrence is more credible. The negative
objective—do nothing—expects less of the coercer. Returning
to Schelling, deterrence is stage-setting:
“by announcement, rigging the trip-wire, by incurring the
obligation—by waiting.”63 Action is up to the
VNSA; the coercer only acts if the wire is tripped. Deterrence
cedes the initiative. Compellence takes it
by initiating an “action (or an irrevocable commitment to
action) that can cease, or become harmless”
when the VNSA responds.64 It often requires a demonstration
of force to gain credence. For the
demonstration to have its intended effect, it must be
accompanied by a clear communication of purpose
through relevant channels.
Punish and Deny
On the whole, the coercer is less able to manipulate benefits.65
Therefore, we return to cost
imposition through punishment and denial as the primary ways
of deterring or compelling. Punishment
threatens pain and damage to something of value to the VNSA.
33. It works when the VNSA complies, not
because its strategy is thwarted, but because the costs are too
great. 66 Direct punishment, underway in
overseas contingencies formerly known as GWOT, entails a
range of obvious ways to inflict pain:
seizing assets, denying sanctuary, killing and imprisoning
personnel, exposing illicit activities, and more.
Cumulatively, these efforts isolate the VNSA from its external
support network and generate internal
dissention, defection, and role deviation to widen the decision-
action gap. Indirect punishment
strengthens our partners through security cooperation and
military diplomacy while undermining external
support to the VNSA. Punishment‟s utility decreases when it
comes to damaging intangible values such
as group‟s worldview. As a final caution, if the pain reaches
existential proportions, group resolve will
strengthen to the degree survival is threatened—it is possible to
over punish.
Given the difficulty of locating something to credibly punish,
particularly for transcendentalist
groups, denial has better prospects. It threatens the VNSA by
denying capability, opportunity, and
objectives.67 Denial is offensive when it degrades capability to
34. conduct operations and illicit activity. In
this respect, it looks like punishment. Denial is more evident in
defensive measures to generate
uncertainty and reduce vulnerabilities. It denies opportunity by
protecting potential victims and
preventing target access. An active defense in depth across all
domains (air, space, land, sea, cyber)
trades space for time in order to characterize and respond to the
specific threat. Attribution is a
prerequisite for initiating a coercive engagement; general
coercion may still be possible, but coercion of
specific group requires identification. Layered defenses further
complicate “adversary‟s attack planning
and execution and may require adversaries to undertake more
complex and visible operations.”68
13
Measures to secure ports, conduct biometric surveillance, or
harden critical infrastructure may lead the
terrorist to “look elsewhere or to change (delay or defer) their
decisions to act.”69
Denial of objectives is a counter-coercion approach that is
35. oriented against the adversary‟s
strategy, and may hold the greatest promise for confronting
VNSA. It is predicated on understanding and
disrupting the end-ways-means logic of the VNSA‟s strategy. It
also hinges on interrupting the intended
psychological chain reaction associated with the group‟s use of
collective violence. To this end, we
should aim to impact VNSA target and method selection, and
consider how our response relates to their
logic and narrative. In particular, it is important to dampen and
undercut the psychological reaction the
terrorist seeks. Strong defenses, rapid recovery, and decisive,
but not excessive retribution can mitigate
fear and embolden a resilient target audience, primarily US
communities and government. Denial is
likely to be more effective against armed groups with
transactional goals early in their development;
however, it can also contribute to discrediting the ideology or
narrative of mature transcendental groups
who need success to demonstrate potency or divine authority.
Induce and Persuade
There are non-military ways to coerce, and for coercion to have
better odds, it must be integrated
with inducement and persuasion. Even when not vulnerable to
36. military means, VNSA may respond to
diplomatic, economic, and informational coercion. The logic is
the same, but the methods differ. Ways
of political coercion involve conveying legitimacy on a rival,
breaking off negotiations, or gaining
endorsement from an intergovernmental organization like the
United Nations (UN). Aggressive
diplomatic campaigns—such as those against Somalia‟s
warlords and Bosnia‟s ethno-nationalists—are a
necessary component to all coercive attempts. Economic
coercion entails the disruption, seizure, or
manipulation of critical financial resources. This too has its
limits. Based on a study of their use, Richard
Haas contends that “sanctions almost always result in some
economic hardship, but this impact is often
insufficient or unable to force the desired political
change.…”70 Finally, informational coercion threatens
the veracity of VNSA claims now as a means to discredit their
narrative later.71 Proactive public affairs
can be used to contest embellishment and conspiracy with facts
while public diplomacy can shape
perceptions over the long haul.
Inducement flips the logic of coercion, and is critical when we
want cooperation or conversion. It
37. increases the benefits of compliance or reduces the costs of
non-compliance.72 The benefits go beyond
withholding pain to incentives and facilitation. Incentives
involve concessions and compensation, such
as lifting sanctions or providing safe haven, diplomatic
recognition, and money.73 Facilitation reduces the
cost of compliance, usually by providing a missing
capability.74 In this respect, security is often needed
to protect against rejectionists, or logistics for movement to
negotiations and out of conflict zones. For
14
inducement to work it must avoid appeasement and violating
policies regarding official exchanges with a
VNSA, particularly terrorist groups.
The third form of influence is persuasion. Whereas coercion
and inducement manipulate costs
and benefits, persuasion aims to alter “the decision context in
which costs and benefits of various options
are weighed.”75 In terms of the rhetoric of persuasion,
diplomacy has primacy, and every agency and
38. instrument can impact VNSA decision-making by introducing
new values and options, or in a more
fundamental way, reframing the issue.76 Whether undertaken
through direct negotiations or radio
broadcasts, efforts to shape perceptions, attitudes, and beliefs
require a credible authority appealing to the
reason and emotion of the intended audience.77 Within the
context of strategic communications, military
psychological and deception operations can isolate the
adversary and insulate the public from its coercive
strategy.78 Regardless of approach, consistency in word and
deed is the most powerful form of
persuasion.
Means
Coercion needs the military, but wants the integrated and
synchronized use of all instruments of
power. Overwhelming military power is not the answer. First,
coercion involves limited force by
definition. Going big contradicts our declared aim of altering
behavior without destroying the group.
Second, threats of nuclear retaliation, invasion, or massive
conventional attack lack credibility. Third, it
is rarely effective. Coercive contests are more about balancing
intentions than capabilities.79 The key
39. questions are not about inventories, but about 1) threshold—
how much pain or how little success to
tolerate, and 2) expectation—what will happen next. Therefore,
follow-through with right-sized
capabilities has greater resonance.
Intelligence and communications underpin all approaches.
Effective multi-discipline intelligence
is needed to find VNSA, attribute behaviors, and understand
decisions and actions. Military diplomacy,
public affairs, and psychological operations facilitate a
complicated public and private discourse with all
stakeholders. The heavy lifting of direct punishment is done by
precision strike, cyber attack, and special
operations to seize, disrupt, and damage. Intelligence,
surveillance, and reconnaissance (ISR) capabilities
expose groups and attribute behaviors. For indirect punishment,
a host of means strengthen our partners‟
ability to counter VNSA: foreign internal defense, security
sector reform, foreign military sales, military
education and training, and other forms of security
cooperation.80 All capabilities that contribute to a
multi-domain defense are relevant to a denial strategy.
Emphasis should be on early detection and
attribution, critical vulnerability protection, and resilient forces,
40. infrastructure, and communities.81
Summary
VNSA are appropriate targets for a coercive strategy—the logic
applies. Compliance with our
demands is the minimum requirement. The primary ways of
coercion, deterrence, and compellence shape
15
an opponent‟s perception of costs and benefits relative to other
options through integrated punishment and
denial. Rarely sufficient, inducement and persuasion are
mutually supportive ways that draw on military
and non-military capabilities.
RECORD
Coercion is a high risk, low probability approach. It costs
blood and treasure, and fails more than
it succeeds. Failure is obvious when the adversary does not
comply, but the reasons for success are hard
to discern. As a consequence, the number of case studies
focused on coercion short of war is limited.
This is despite a history of coercion dating to the Peloponnesian
Wars, when the Athenian generals
41. infamously asserted, “the strong do what they can and the weak
suffer what they must.”82 If we zoom in
on the US experience, coercion was used in many of the
hundred-plus military interventions since our
founding. Insight to why coercion worked can be drawn from
the entire historic ledger; however, this
section focuses on a sub-set of more recent cases in which the
US was a primary coercer. The lessons
from these cases are then tested against a specific VNSA case—
intervention in Somalia, 1992-1995.
Building on previous sections, we now look to real-world
experience to illustrate the viability of a
coercive strategy and derive lessons for how to improve its
prospects during implementation.
Sober Results
Coercion works about a third of the time. This is the
conclusion of seven cases examined by
Alexander George in Forceful Persuasion and eight different
cases studied in The United States and
Coercive Diplomacy, edited by Robert Art and Patrick
Cronin.83 Six of the fifteen involve VNSA. Three
directly tackle the VNSA problem—Somalia, Bosnia, al Qaeda.
VNSA are party to the Laos, Nicaragua,
and Kosovo cases. The following survey does not do justice to
their complexity. Rather, it is intended to
42. provide a brief context for the lessons that apply to states as
well as non-state actors.
Failure
The US did not achieve its overall aims in seven of fourteen
cases: Japan, Vietnam, North Korea,
Iraq, Kosovo, al Qaeda, and Somalia. VNSA are central actors
in the last three. Starting with WW II, the
Japanese attack on Pearl Harbor followed years of
miscalculation based on inconsistent signals and
entrenched positions on both sides of the Pacific.84 Arguably,
the US oil embargo was heavy-handed
economic coercion that underestimated Japan‟s motivation and
lacked corresponding inducements.
Going further, George suggests that we caused too much pain:
“Pearl Harbor is not a simple case of
deterrence failure. It is, rather, a case in which coercive
diplomacy provoked the adversary into a
decision for war.”85
Advancing to Vietnam 1965, the US attempted to coerce North
Vietnam into suspending its
support to the Viet Cong in South Vietnam. Operation Rolling
Thunder steadily increased strategic
43. 16
bombing of military forces and logistics infrastructure in the
North with high value-targets in Hanoi and
Haiphong off limits. George argues strategic bombing failed to
coerce Hanoi because it lacked strength, a
sense of urgency, and real compromise.86 Robert Pape sees it
differently: “The denial model was
impotent because air power could not thwart Hanoi‟s guerilla
strategy” and it failed to hold the civilian
population at risk.87 In sum, it failed to punish—not enough
pain—and deny sufficiently.
Fast forward to the 1990s. In the midst of crisis on the Korean
peninsula in 1994, an Agreed
Framework emerged to halt North Korea‟s nuclear program. It
resulted from 1) inducements of direct
dialogue with the US (as well as other aid and economic
benefits), 2) threats to seek UN sanctions and
take military action, and 3) a dramatic, unauthorized diplomatic
mission by former President Jimmy
Carter that aborted the downward spiral in relations.88 While
seemingly successful, it was violated as
early as 1997 with a uranium enrichment program that was
disclosed in 2002. An unreliable opponent,
44. lack of US options, and insufficient pressure by external
stakeholders, particularly China, are among the
many culprits.
Six distinct coercion attempts were tried with Iraq between
1990 and 1998. Although scored a
failure due primarily to Saddam Hussein‟s ability to survive and
subvert punishment, the analysis
suggests a “qualified success” within the context of an overall
deterrence strategy.89 As one example,
Hussein deployed two Republican Guard divisions to the Kuwait
border in October 1994, threatening a
potential invasion. In response to an ultimatum from President
Bill Clinton and the deployment of 170
aircraft and over 6,500 personnel, he withdrew the forces. On
the other hand, he was not compelled to
withdraw from Kuwait in 1991, and massive air strikes against
suspected WMD facilities in 1998 did not
compel him to cease a cat and mouse game with the United
Nations Special Commission (UNSCOM)
over suspect WMD programs.
Kosovo in 1999 is considered a coercion failure because an air
war was ultimately carried out by
the North Atlantic Treaty Organization (NATO) to gain
45. concessions from Serbian leader Slobodan
Milosevic. Moreover, NATO had trouble coercing the non-state
Kosovo Liberation Army (KLA), not
because the KLA lacked value to put at risk, but because it was
not party to negotiations at Rambouillet,
and it was a competitor to NATO‟s main partner in Kosovo.90
Milosevic‟s ultimate capitulation is
generally attributed to the escalation in bombing, threat of a
ground offensive, allied interest in a
negotiated settlement, a shift in Russian position against Serbia,
and concessions to withdraw a roadmap
to Kosovo independence.91
Finally, US coercive attempts against terrorism in the 1990s
consisted primarily of criminal
prosecutions and occasional, limited military operations such as
the cruise missile attacks against al
Qaeda-linked targets in Sudan and Afghanistan in 1998. These
coercive measures and others (restricting
travel, financial seizures, etc.) were insufficient to prevent the
1993 and 2001 World Trade Center
17
46. bombings, the 1998 attack on US embassies in Kenya and
Tanzania and several other attacks including
the USS Cole in Yemen and the Pentagon. According to
terrorism expert, Martha Crenshaw, coercive
attempts failed because 1) the enemy was hard to identify and
understand, 2) al Qaeda and its operations
were never at risk, 3) it was difficult to credibly threaten
escalation, and 4) there was no sense of urgency
until after 9/11.92 Like this study, her analysis assumes al
Qaeda is an organization that has tangible and
intangible value that can be held at risk. Consistent with our
understanding of transcendentalist VNSA
during growth, al Qaeda was and remains highly resistant to
coercion.
Not Sure
Mixed results were obtained on three occasions—Nicaragua,
Libya, and Taiwan Strait.
Beginning in 1981, the US aimed to contain and later
destabilize the Soviet-backed, Sandinista regime in
Nicaragua by backing the Contra rebels. The Contras are an
example of a VNSA being used as a proxy to
coerce a state. After eight years of stalemate, and in the
shadow of the Iran-Contra affair, the approach
only served to stimulate strong domestic opposition and a
47. remarkable effort by Central American leaders
to insulate the Daniel Ortega regime.93 The confrontational
approach was abandoned for carrots and
sticks that included $50 million to sustain the Contra deterrent
along with agreement to abandon efforts to
overthrow the Sandinistas by force.94 As a result, the Soviet
Union halted military supplies, and elections
were held, resulting in a “stunning ideological defeat for
communism.”95
The second mixed result comes from efforts to coerce Libya to
end support for terrorism in the
1980s while signaling resolve to all state sponsors, particularly
Iran and Syria. In the wake of an April
1986 West Berlin discothèque bombing, the US executed an air
raid against Libyan installations to
include Muammar al-Gaddafi‟s headquarters.96 Support for
terrorism declined initially, suggesting
success until the tragic bombing of Pan Am 103 in 1988 killed
270 innocent people. Two Libyan
officials were tried and convicted. Shifting tactics, a series of
carrots (lifting sanctions), and sticks
(implied threat stemming from the US war in Iraq) ultimately
led Libya to forswear terrorism in 1999 and
surrender its WMD program in 2003.
48. In the 1996 Taiwan Strait crisis, it is not clear whose coercive
attempt worked. To dissuade
Taiwan‟s apparent move toward independence, Beijing test-
fired several missiles close to the island.97
The US responded by positioning two aircraft carrier battle
groups in the Strait. This escalation was a
deterrent against Chinese military action, and a compellent to
de-escalate Beijing‟s policy toward
Taiwan.98 The crisis was defused, and China refrained from
further military action. On the other hand,
Taiwan did not declare independence. Most likely, Taipei‟s
restraint was a response to both domestic and
external pressures.
18
Success of Sorts
Success can be reasonably claimed in four cases: Laos, Cuba,
Bosnia, and Haiti. Laos and
Bosnia involved VNSA with multiple state sponsors in each
case. In 1961, newly elected President John
49. F. Kennedy used coercion to check Pathet Lao guerrilla
advances while scaling back US commitment to
the Royal Lao government. The effort was complicated because
the Soviet Union, China, and North
Vietnam all differed in the perception of costs, benefits, and
risk.99 To communicate resolve, Kennedy
moved forces to Thailand and “ordered the four hundred US
„civilian advisors‟ to put on their military
uniforms and join Royal Lao army units on the front line.”100
As inducement, he offered disengagement
in exchange for a neutral Lao. Initially rejected, a ceasefire and
weak coalition government eventually
resulted.
Only a few months later, Kennedy was in a stand-off over the
deployment of Soviet medium-
range ballistic missiles to Cuba. Compellence was attempted
through several inter-related approaches 1)
diagnose and publicly expose the threat with ISR, 2) implement
a naval blockade, 3) threaten air strikes
and invasion by posturing forces, 4) opening back-channel
dialogue for a negotiated solution, and 5)
provide a delayed inducement of removing US missiles from
Turkey. Despite the stakes, neither
50. Kennedy nor Soviet leader Nikita Khrushchev “engaged in
reckless competition in risk-taking but acted
cautiously to avoid escalation.”101 By limiting ends and
means, the missiles were withdrawn and global
nuclear war was avoided.
Before Kosovo, and in the wake of the Yugoslavia‟s
dissolution, the US participated in UN and
NATO efforts to coerce peace in Bosnia-Herzegovina from
among three ethno-nationalist VNSA with
strong ties to state sponsors: Bosnian Muslims, Croats, and
Serbs. Without detailing them all, there were
at least five US attempts to compel Bosnian Serb behavior to
include releasing the “strangulation” of
Sarajevo.102 A stalemated conflict facilitated compliance by
the Bosnian Serbs, which was also consistent
with their desire to “keep alive negotiations for a
comprehensive cease-fire” to lock in their gains.103
Milosevic was motivated to exert pressure on the Bosnian Serbs
by limited air strikes and the potential of
sanctions being lifted. The comprehensive coercive strategy led
to a complicated and tenuous peace.
With twenty-five thousand troops ready to invade in September
1994, Haitian dictator Raoul
Cedras conceded to return power to the duly elected former
51. president, Jean-Bertrand Aristide. In the
moments before his deadline, Cedras was ready to call
“Clinton‟s bluff—he‟s chickenshit, there‟s no
congressional support, no public support—and as the big-bad-
wolf rhetoric escalated, American
credibility became inextricably braided in the process.”104 For
three years prior, Cedras and his cronies
prospered despite an economic embargo of an already
impoverished state, and they muted multiple threats
to include turning away the USS Harlan County with its
contingent of UN police advisors in October
19
1993.105 In the end, it took independent negotiators with
unsurpassed credibility—Jimmy Carter, Sam
Nunn, and Colin Powell—to orchestrate the dramatic moment of
capitulation.
Lessons
These cases and others suggest several lessons for increasing
the prospect of achieving our aims.
As a result of George‟s analysis, success is more likely for
states and VNSA when the following
52. conditions are met: 1) clarity and consistency in what is
demanded; 2) stronger motivation than the
adversary; 3) a sense of urgency; 4) adequate domestic and
international support; 5) adversary fear of
unacceptable escalation; and 6) clarity concerning the terms for
settling the crisis.106 Perceptions of value
and risk are paramount. All the factors do not need to be
present for success; however, it is essential that
an asymmetry of motivation operates in favor of the coercing
power, that it is really time-
urgent to respond to the coercing power‟s demands, and that the
opponent must take
seriously the possibility that the coercing power will engage in
escalation that would pose
unacceptable costs.107
Art and Cronin endorse these determinants of success, adding
that the odds of are further
enhanced when 7) positive inducements are offered, 8) less, not
more is demanded of the target, and 9)
military force is threatened or used in a denial, not a risk of
punishment, mode.108 Together, these nine
lessons are consistent with the conceptual logic of coercion.
They should guide US coercion strategy
with an understanding that the specific type of VNSA, our
goals, and the overall context shape which
combination of factors is most relevant in a given contest.
53. Somalia
Somalia is a lucrative case for analyzing coercion of VNSA for
several reasons. First, it was an
early post-Cold War test for the UN. It marked the first time
Chapter VII enforcement provisions of the
UN Charter were invoked for internal conflict. Second, its
complexity was compounded by multiple
players: VNSA; nation-states; inter-governmental organizations
(IGOs); and non-governmental
organizations (NGOs).109 From among these, the defining
contest pitted the UN and US against rival
Somali factions: the Somali National Alliance (SNA) led by
Mohamed Farah Aideed and dominated by
the Habr Gedir sub-clan, and the United Somali Congress (USC)
led by Ali Mahdi Mohamed and
dominated by the Abgal sub-clan.110 Each faction had its own
organizational structure, sub-groups, and
alliances. Notably, the VNSA are not state-sponsored; however,
both rely on illegal arms shipments and
other activities for financial support. Third, its three distinct
phases supports intra-case comparisons: 1)
UN Operations in Somalia I (UNOSOM I), Apr—Dec 1992; 2)
United Task Force (UNITAF), Dec
1992—Apr 1993; and 3) UNOSOM II, May 1993—Mar 1995.
54. The phases, or rounds, provide a
framework for assessing the effectiveness of coercion in light of
the determinants of success.
20
UNOSOM I
Round one opened with the establishment of UNOSOM I by
Security Council Resolution
(UNSCR) 751 on 24 April 1992. Coercion was not central to
generating the shaky ceasefire agreement
on which intervention was predicated. When attempted, it was
not able to protect distribution of relief
supplies to four million people in urgent need.
Armed force proved inadequate to punish or deny, and the threat
of escalation was not taken
seriously. Fifty peacekeepers deployed to Mogadishu
immediately, and an additional 500 followed in
September. The warlords acquiesced because the small number
of blue helmets, operating under
restrictive Article VI rules of engagement, did not threaten their
55. power.111 To make sure, they laid siege
to the outgunned Pakistanis, who refused to leave the airfield
while mercenary Somali “technicals” looted
and extorted NGOs.112 Concurrently, twenty US Air Force C-
130 sorties per day delivered 28,000 tons of
aid during Operation Provide Relief; however, US forces did not
protect distribution.113 Responding to
the anarchy, UN Secretary General Boutros Boutros-Ghali
gained approval to deploy another 3,000
peacekeepers, threatening Chapter VII enforcement if they were
not accepted. Ali Mahdi embraced the
plus-up while Aideed viewed it as lethal. Instead of reducing
violence to forestall their arrival, he
retorted: “If you send in blue helmets, you might as well send
coffins in with them, we‟re going to kill
them for their berets and boots alone.”114
Though constrained in use, the military instrument was coupled
to a proactive diplomatic effort
by UN Special Envoy, Ambassador Mohamed Sahnoun. In his
words, he “pursued a strategy of putting
the clan system to work for Somalia.”115 Direct, routine
meetings with Aideed, Ali Mahdi, and local
elders paved the way for peacekeepers and sustained a fragile
ceasefire. The restraint obtained between
56. the SNA and USC did not translate into reduced criminal
activity, and Sahnoun was undermined by his
NY headquarters. For example, his credibility collapsed when
news of the 3,000 plus-up was received
with surprise in Mogadishu over BBC radio; Aideed‟s suspicion
of UN motives seemed to be confirmed.
Sahuoun later resigned, and his replacement‟s less active
approach was no match for the deteriorating
situation.116
Inducements were introduced out of sequence prior to the
peacekeepers and ineffectively paired
to the coercive attempt. Humanitarian relief was meant to save
lives and encourage political settlement
by arresting the crisis. Instead, the aid strengthened the
warlords who stole on behalf of merchants
desperate for food stocks.117 Predation was further facilitated
when distribution points were set-up in
areas they controlled. Even though problems were recognized
by the UN, innovative options such as a
monetization plan advocated by Sahuoun and Andrew Natsios of
USAID were stillborn. Their strategy
was designed to bypass the warlords and energize the market by
auctioning low-price, high-value food
57. items to merchants while distributing low-value food aid for
free.118
21
Round one went to the warlords. The UN gained compliance to
introduce peacekeepers who
were then unable to protect relief distribution. The aid was in
turn exploited by warlords at the people‟s
expense. An initially active, hands-on diplomatic approach
held promise, but was undermined by
inconsistent policy, insufficient muscle, and counterproductive
inducements.
UNITAF
Round two opened with passage of UNSCR 794 on 3 December
1992, authorizing a US-led
Chapter VII peace enforcement operation. Coercion was central
to securing relief distribution;
overwhelming force was married to consistent, credible
diplomacy and inducements. As put by US
Special Envoy to Somalia, Ambassador Robert Oakley, “our
purpose would be achieved by dialogue and
cooption, using implicit threats of coercion to buttress requests
for cooperation among the factions and
58. with UNITAF.”119
UNITAF rapidly inserted 38,000 forces from 20 countries,
including the 28,000 US personnel of
Operation Restore Hope. Preceded by Oakley‟s warnings, and
backed by an impressive show of force in
Iraq, UNITAF quickly established military primacy. An early,
exemplary use of force helped. As
recounted by the Marine commander, Major General Wilhelm,
in the first days “a Fiat armored car and a
technical vehicle took a couple of random shots at a helicopter,
and we speared both the vehicles in the
streets of Mogadishu.”120 Message received. Overmatched,
the principal antagonist—Aideed—and his
allied warlords exercised restraint. Given UNITAF‟s short
tenure, they could also afford to wait as long
as their power was not fundamentally threatened by
disarmament.
The willingness to use force was synchronized in policy and
practice by aggressive diplomacy in
pursuit of objectives narrowly defined by President George
Bush: “open the supply routes, to keep the
food moving, and to prepare the way for a UN peace-keeping
force.…”121 Partnering with the UNITAF
59. commander, General Robert Johnston, Oakley pursued a
strategy of “plucking the bird.” He paired
“frequent and friendly consultations” with marginalization to
weaken the warlords “one feather at a
time.”122 A national reconciliation process was kick-started;
however, there was no attempt to impose
political settlement.123 Oakley‟s deputy, Jeffrey Herbst,
framed the political process as an incentive,
imploring the warlords to seize “a once in a lifetime
opportunity” to rebuild their country.124
Implementation was strengthened through daily meetings of a
joint security committee at a neutral site.
Further progress was undermined by warlord intransigence,
which was compounded by a major policy
disconnect between the UN in New York and Washington over
disarmament and mission expansion.125
Although the mandate did not include nation-building,
UNITAF‟s Deputy for Operations,
Brigadier General Anthony Zinni, acknowledged: “We did creep
outside our mission a lot.”126 Troops
built or repaired over 1,200 km of roads and bridges, dug wells,
and established schools, orphanages, and
hospitals.127 Monetization was finally initiated, but success
was limited by hoarding and control over the
60. 22
markets by warlords. On the other hand, massive profits were
an incentive for continued compliance.
Security provided the space to initiate civil administration and a
Somali police force within the context of
an energized political process. For the first time, the
informational instrument was activated for
persuasion. US Army psychological operations distributed
leaflets and produced the “Rajo,” meaning
“Hope” in Somali, newspaper and radio broadcast.128
Round two went to the United States. Warlord compliance
reflected a sensible decision calculus
based on being no match for coalition firepower, deriving
massive profits from relief distribution, and
waiting for the mission‟s expiration in April 1993. Arguably,
UNITAF‟s short-lived success invited
overreach in round three.129
UNOSOM II
Round three opened with passage of UNSCR 814 on 26 March
1993, expanding the UNOSOM II
mandate to nation-building and disarming all factions.130
61. Coercion failed to check the escalation in
violence after UNITAF‟s abrupt departure due to insufficient
military means and incoherent diplomacy.
Reacting to attacks on UN forces attributed to Aideed, UNSCR
837 was passed on 6 June 1993 to direct
“all necessary measures” against the SNA.131 Not one to
cower, Aideed became more aggressive. In the
wake of “Blackhawk Down,” UNOSOM II retreated from war,
relying on anemic coercion until the end.
UNOSOM II never commanded more than 16,000 peacekeepers,
which included 3,000 US
logistics personnel. As part of the deal to withdraw US forces,
newly elected President William Clinton
agreed to leave a 1,150 Quick Reaction Force from the 10th
Mountain Division under a separate US
command. With fewer and less capable forces, UNOSOM II
was charged with securing twice the
territory. The warlords quickly exploited the transition and
perceived weakness, moving crew-served
weapons out of impound to confront UN forces. When 24
Pakistanis were killed in June, the hunt for
Aideed was on, and civilians were caught in the crossfire. Near
misses by the newly introduced Task
Force Ranger culminated in the ruinous 3 October raid, leaving
62. 18 US Army Rangers dead and others in
captivity. Aideed‟s legend grew, UNOSOM‟s credibility
suffered, and the US was headed to the exit.
The political gains made in the March Addis Ababa peace
conference were not sustainable in
light of the changed security situation and inconsistent
diplomacy. Political leadership passed from
Oakley to the UN‟s new Envoy, retired Admiral Jonathon
Howe, who struggled to overcome distrust of
the UN. By this time, Aideed concluded that the peace process
and disarmament policy were existential
threats. The conflict turned personal; Howe placed a $25,000
bounty on the “caged scorpion‟s” head.132
Aideed replied with a $1 million bounty on Howe. Seeking to
forestall a descent to war, the Clinton
administration countered the UN position, shifting policy away
from the manhunt toward a diplomatic
solution. Unfortunately, word of the change did not reach Task
Force Ranger before the ill-fated October
raid.
23
63. With security collapsing, plans to rehabilitate the economy and
civil administration withered.
The incentive of relief aid, so often counterproductive, was less
relevant due in part to mitigation of the
famine‟s worst effects. Focus shifted to returning refugees and
providing health care, potable water, and
food security. As with UNOSOM I, much of the heavy lifting
was by NGOs in part because logistics,
engineers, and medical personnel exited with UNITAF. From
Howe‟s perspective, “I felt we had a big
mismatch.… We just begged and borrowed people right and left
to be able to manage, even
inadequately.”133 Momentum on building a 10,000 Somali
National Police Force also collapsed due to a
lack of funding.134 Finally, the plug was pulled on a key
means of persuasion with the termination of
UNITAF psychological operations.
Round three went to Aideed. A seam-filled transition and
weaker UN invited his challenge.
Coercion gave way to a personalized war for which the UN
lacked the means and will to win—the
motivation asymmetry continued to favor Aideed. Instead,
Aideed used coercion to restore the UN/US
64. policy of negotiation; his rivals were weakened and his
bargaining position reached a zenith.
Assessment
The Somalia experience reveals that credible armed force is a
necessary, but insufficient means—
other instruments of power must be brought to bear. Moreover,
coercion is a necessary, but insufficient
way—inducement and persuasion must be integrated. In round
one, skilled diplomacy was unable to
overcome deficient and often counterproductive military and
economic means. In round two, muscular
diplomacy, organized and oriented on narrow goals, was tightly
coupled to inducement and persuasion
using economic and informational means. UNITAF gained
temporary compliance—lives were saved. In
round three, a weaker force and disjointed policy were exploited
by the warlords. Aideed, in particular,
succeeded in coercing the coercer. His overall success reflects
an asymmetry of motivation in his favor.
Not only did the UN and US not consistently present a credible
threat of escalation, but they were not able
to sustain domestic and international support for the operation.
Coercion worked, but only during the
brief period of UNITAF when the nine lessons were applied.
65. Summary
The record indicates coercion against states and VNSA mostly
fails, but success is possible and
more likely when the lessons identified here are applied.
Moreover, the lessons from coercive attempts
against states translate to the VNSA problem. More directly,
the odds of success increase as the demands
narrow. Prospects further improve when credible military
means are coupled with non-military
instruments to persuade and induce. To this end, skilled
diplomacy is needed to ensure clarity and
consistency in what is demanded as well as coherent terms for
resolving the conflict.
24
CONCLUSION
As developed in this study, the rationale for rehabilitating
coercion in national security and
military strategy is three-fold. First, VNSA are not irrational
actors immune to pressure. They are social
organizations that decide and behave in ways that can be
66. understood and influenced. Second, the logic of
coercion applies to VNSA. Compliance with our preferred
behaviors can be achieved by shaping
perceptions of costs and benefits; however, we must appreciate
coercion‟s limits and its unique
application to armed groups. Third, the limited case analysis of
coercive attempts against VNSA suggests
it can work when several conditions are working in our favor.
Even though the prospects for success are
limited, coercion may be the best or only option. When
feasible, there are at least nine main
consequences for adopting it as part of a counter-VNSA
strategy. Although the strategy process is never
linear, the consequences suggest a certain sequence for
developing, integrating, and implementing
coercion.
1) Diagnose the problem. As social organizations, VNSA are
open to investigation and
engagement even though they are harder to find, understand,
signal, and pressure. By focusing on the
organizational dynamics common to all groups, a basic
appreciation for how the VNSA decides and
behaves can be discerned. In general, groups that integrate a
transcendental and transactional agenda are
67. more resistant to pressure, particularly those embracing extreme
ethno-nationalist or religious
convictions. Groups early in their life-cycle have less to hold at
risk than those at maturity, particularly
when the group takes on governing responsibilities. Decisions
emerge from a bargaining process that
reflects bounded rationality within their context. Behaviors
emerge as well that are rarely a true reflection
of the decision. Insight to these dynamics provides a general
sense of coercion‟s feasibility as well as
opportunities for pressuring specific groups.
2) Choose narrow goals. The more we demand, the less
successful we will be. A minimalist
approach that focuses on compliance with specific demands is
best. Demands to do nothing—
deterrence—are generally easier for a VNSA to accommodate
than demands to do something different—
compellence. It is not necessary to change attitudes or beliefs,
but only the perception of costs and
benefits relative to the available options. It is sufficient to gain
the behavior we want even if the group
does not share our preferences. Once we adopt goals that
fundamentally threaten a group‟s source of
68. power or existence, coercion‟s utility is lost.
3) Aim at the organization. Compliance can be obtained
without altering the decision calculus of
the group‟s leadership. Certainly, it is preferable if our
coercive strategy can influence the decisions of
leaders who in turn impose the decision on the organization.
Leaders, or more specifically stakeholders to
the decision process, are a priority target for coercion. But,
coercion should also target sub-groups,
25
classes of individuals, and even individuals within the
organization. In many cases, inducing deviation
from assigned roles may be sufficient to get the behavior, or
lack of behavior we seek. Just as
importantly, our strategy must attend to external stakeholders
on whom the VNSA depends. In many
cases, they do not share the same level of commitment to the
group‟s agenda. A multi-level approach
aimed at the whole system is more likely to generate the net
effect of coercion even when elites prove
resistant.
69. 4) Communicate clearly, consistently. Coercion is
communication. For the threat or limited use
of force to be credible, our demands, the costs of non-
compliance, and the benefits of compliance must be
articulated, transferred, received, and processed in the way we
intend. Of course, we must admit and
anticipate the inherent limitations to effective communication.
To this end, our signaling should leverage
the medium and media most relevant to the VNSA to include
using external stakeholders with access to
the organization. Moreover, it is imperative that our actions
appear consistent with our rhetoric. When
military force is used, it must be what George refers to as
“exemplary.” That is, the use of force is
symbolic; it should be just enough of the right kind to send the
message. It must also be demonstrative of
what is to come if compliance does not closely follow its use.
5) Deny always, punish selectively. Given the inherent
difficulties of coercing VNSA, our ability
to punish is limited. In general, VNSA are highly resistance to
pain even if we can find something of
value to hurt. Of course, we can impose some pain by killing or
capturing group members, taking away
70. sanctuary, or cutting off critical resources. That said, the
record suggests this is hard to do and rarely
gains compliance. Therefore, we must get beyond the pain
caused by punishment to the psychological
pain caused by denial. A strategy that counters the VNSA
strategy by denying opportunity and objectives
is better. In this regard, defense is stronger than offense.
Moreover, it focuses on what we can control—
how we respond. Based on our understanding of why the VNSA
uses collective violence, we can act to
neutralize the psychological chain reaction that is essential to
their strategy. By countering their strategy,
we undermine their appeal, and ultimately, their reason for
being.
6) Induce and persuade. Coercion rarely works on its own.
Success correlates well with
inducements. This means offering a clear pathway to settling
differences, and including incentives to
motivate movement down the path. Persuasion is linked to
communication, but also incorporates the idea
of working to shape the decision context. That is, a credible
authority can appeal to reason and emotion
to introduce new options and encourage different perceptions
regarding costs. Persuasion can run in
71. parallel to coercion; but according to the analysis of Art and
Cronin, positive inducements have their
greatest effect when offered after threats are made.135
Inducement and persuasion also provide
opportunities to integrate non-military means.
26
7) Plan for the future. Coercion is not a discrete event at a
given moment in time. It is a contest
that extends into the future. In fact, it is the expectation that
the relationship will continue that enables
coercion to work. Therefore, a coercive strategy must consider
the implications for subsequent rounds of
interaction. If compliance does not follow from our initial
demand, what next? After an exemplary use
of force that fails to alter behavior, what next? To avert an
unwanted transition to war, our strategy must
have a clear idea for how settle to the conflict and a plan for
how to control escalation.
8) Be motivated. Coercion is a contest of wills. Before
initiating a coercive attempt, we must
judge our motivation to implement threats. The failure to
72. follow through is a death blow to credibility,
which is certain to result in a worse situation than when the
crisis started. Once it is clear that the
adversary‟s motivation exceeds ours, and if we are not willing
to escalate further, we need to transition
away from a coercive strategy quickly and credibly.
Coercion is a viable option for confronting VNSA. The
threatened, or limited use of force short
of war should be part of a comprehensive strategy that
integrates defense, diplomacy and development to
prevent the emergence, influence the behavior, and if necessary,
defeat non-state adversaries. If we
choose coercion, and if it fails, we must be ready for war.
27
BIBLIOGRAPHY
Allard, Kenneth. Somalia Operations: Lessons Learned.
Washington, DC: NDU Press, 1995.
Allison, Graham and Philip Zelikow. Essence of Decision:
Explaining the Cuban Missile Crisis. NY:
73. Longman, 2nd ed., 1999.
Art, Robert and Patrick Cronin, editors. The United States and
Coercive Diplomacy. Washington, DC:
United States Institute of Peace, 2003.
Atkinson, Rick. “Marines Close Curtain on U.N. in Somalia;
Final Departure Ends Quest to Rid Country
of Famine, Anarchy.” Washington Post. March 3, 1995.
Asprey, Robert B. War in the Shadow: The Guerrilla in
History. Garden City, NY: Doubleday &
Company, Volume 1, 1975.
Auerswold, David P. “Deterring NonState WMD Attacks.”
Political Science Quarterly. Winter
2006/2007.
Baker III, James A. The Politics of Diplomacy: Revolution,
War and Peace 1989-1992. NY: G. P.
Putnam‟s Sons, 1995.
Billington‟s, James H. Fire in the Minds of Men: Origins of
Revolutionary Faith. NY: Basic Book
Publishers, 1980.
Boutros-Ghali, Boutros. The United Nations and Somalia,
1992-1996. NY: UN Department of Public
Information, 1996.
74. Byman, Daniel. Trends in Outside Support for Insurgent
Movements. Santa Monica, CA: RAND
Corporation, 2001.
Clarke, Walter and Jeffrey Herbst, editors. Learning from
Somalia: The Lessons of Armed Humanitarian
Intervention. Boulder, CO: Westview Press, 1997.
Clausewitz, Carl von. On War. Edited and translated by
Michael Howard and Peter Paret. Princeton, NJ:
Princeton University Press, 1984.
Coll, Steve. The Secret History of the CIA, Afghanistan, and
bin Laden, from the Soviet Invasion to
September 10, 2001. NY: Penguin Press, 2004.
Cooper, Drury. Economic Sanctions and Presidential Decisions:
Model of Political Rationality.
Gordonsville, VA: Palgrave Macmillan, 2006.
Cragin, Kim and Scott Gerwehr. Dissuading Terror: Strategic
Influence and the Struggle Against
Terrorism. Santa Monica, CA: RAND Corporation, 2005.
Crocker, Chester A. “The Lessons of Somalia: Not Everything
Went Wrong.” Foreign Affairs. 1995.
Daft, Richard L. Organization Theory and Design. Mason, OH:
South-Western, 2004.
75. 28
Davis, Paul K. and Kim Cragin Jackson, editors. Social Science
for Counterterrorism: Putting the
Pieces Together. Santa Monica, CA: RAND Corporation, 2009.
Davis, Paul K. and Brian Jenkins. Deterrence and Influence in
Counterterrorism. Santa Monica, CA:
RAND Corporation, 2002.
Dobbins, James, John G. McGinn, Keith Crane, Seth G. Jones,
Rollie Lal, Andrew Rathmell, Rachel M.
Swanger, and Anga R. Timilsina. America's Role in Nation-
Building: From Germany to Iraq.
Santa Monica, CA: RAND Publications, 2002.
George, Alexander and Richard Smoke. Deterrence in
American Foreign Policy: Theory and Practice.
NY: Columbia University Press, 1977
George, Alexander. Forceful Persuasion: Coercive Diplomacy
as an Alternative to War. Washington,
DC: United States Institute of Peace Press, 1991.
76. George, Alexander, David K. Hall and William E. Simons. The
Limits of Coercive Diplomacy: Laos,
Cuba, Vietnam. Boulder, CO: Westview Press, 1994.
Haass, Richard and Meghan L. O'Sullivan. Honey and Vinegar:
Incentives, Sanctions, and Foreign
Policy. Washington, DC: Brookings Institution Press, 2000.
Hirsch, John L. and Robert B. Oakley. Somalia and Operation
Restore Hope: Reflections on
Peacemaking and Peacekeeping. Washington, DC: US Institute
of Peace Press, 1995.
Hoffman, Bruce. Inside Terrorism. NY: Columbia University
Press, 1998.
Johnson, David E., Karl P. Mueller, and William H. Taft, Jr.
Conventional Coercion Across the Spectrum
of Operations: The Utility of U.S. Military Forces in the
Emerging Security Environment. Santa
Monica, CA: RAND Corporation, 2002.
Katz, Daniel and Robert L. Kahn. The Social Psychology of
Organizations. NY: John Wiley and Sons,
2nd ed., 1978.
Lahneman, William J., editor. Military Intervention: Cases in
Context of the Twenty-First Century. NY:
Rowman & Littlefield Publishers, Inc., 2004.
77. Laqueur, Walter. The New Terrorism: Fanaticism and the
Arms of Mass Destruction. NY: Oxford
University Press, 1999.
Liddell Hart, B.H. Strategy. NY: Praeger Publishers, 1967.
Luttwak, Edward N. Strategy: The Logic of War and Peace.
Cambridge, MA: Belknap Press, 2001.
Menkhaus, Ken and Louis Ortmayer. “Key Decisions in the
Somalia Intervention.” Pew Case Studies in
International Relations. Washington, DC: Institute for the
Study of Diplomacy, Georgetown
University, 1995.
Naim, Moises. Illicit: How Smugglers, Traffickers, and
Copycats are Hijacking the Global Economy.
NY: Doubleday, 2005.
29
Oakley, Robert B. “An Envoy‟s Perspective.” Joint Force
Quarterly. Autumn 1993.
Oberdorfer, Don. The Two Koreas: A Contemporary History.
Reading, MA: Addison-Wesley, 1997.
78. O‟Neill, Bard E. Insurgency and Terrorism: Inside Modern
Revolutionary Warfare. Washington, DC:
Brassey‟s Inc., 1990.
Pape, Robert. Bombing to Win: Air Power and Coercion in
War. Ithaca, NY: Cornell University Press,
1996.
Pape, Robert. Dying to Win: The Strategic Logic of Suicide
Terrorism. NY: Random House, 2005.
Poole, Walter S. The Effort to Save Somalia, August 1992—
March 1994. Washington, DC: Joint
History Office, 2005.
Post, Jerold M. “Psychological Operations and
Counterterrorism.” Joint Force Quarterly. Issue 37, 2nd
Quarter 2005.
Post, Jerold. The Mind of the Terrorist: The Psychology of
Terrorism from the IRA to al-Qaeda. NY:
Palgrave Macmillan, 2007.
Rosegrant, Susan. “A „Seamless‟ Transition: United States
and United Nations Operations in Somalia.”
Kennedy School of Government Case Program. 1996.
79. Sahnoun, Mohamed. Somalia: Missed Opportunities.
Washington, DC: US Institute of Peace Press,
1994.
Schaub, Gary. “Deterrence, Compellence, and Prospect
Theory.” Political Psychology. Vol. 25, No. 3,
2004.
Schelling, Thomas. Arms and Influence. New Haven, CT:
Yale University Press, 1966.
Shacochis, Bob. The Immaculate Invasion. NY: Viking, 1999.
Shafritz, Jay M. and J. Steven Ott, editors. Classics of
Organization Theory. NY: Harcourt College
Publishers, 2001.
Simon, Herbert. “Human Nature in Politics: The Dialogue of
Psychology with Political Science.”
American Political Science Review 79, 1985.
Snyder, Glenn H. “Deterrence and Power.” The Journal of
Conflict Resolution. Vol. 4, No. 2, June 1960.
Strassler, Robert. Editor, The Landmark Thucydides: A
Comprehensive Guide to the Peloponnesian War.
NY: The Free Press, 1996.
Thomas, Troy, Steve Kiser and William Casebeer. Warlords
Rising: Confronting Violent Non-State
80. Actors. Lanham, MD: Lexington Books.
Tilly, Charles. The Politics of Collective Violence.
Cambridge, UK: Cambridge University Press, 2002.
30
US. The National Security Strategy of the United States of
America. Washington, DC: Whitehouse, 2002.
US. The National Strategy for Combating Terrorism.
Washington, DC: Whitehouse, September 2006.
US. National Military Strategic Plan for the War on Terrorism.
Washington, DC: Joint Chiefs of Staff,
2006.
US European Command. Military Contribution to Cooperative
Security Joint Operating Concept.
Washington, DC: The Joint Staff, 19 September 2008.
US Joint Forces Command. Strategic Communications Joint
Integrating Concept. Washington, DC:
The Joint Staff, 19 September 2008.
US Northern Command. Homeland Defense and Civil Support
Joint Operating Concept. Washington,
81. DC: The Joint Staff, 2007.
US Special Operations Command. Irregular Warfare Joint
Operating Concept. Washington, DC: The
Joint Staff, 11 September 2008.
US Strategic Command. Deterrence Operations Joint Operating
Concept. Washington, DC: The Joint
Staff, Version 2.0, 2006.
Viotti, Paul R., Michael Opheim and Nicholas Bowen, editors.
Terrorism and Homeland Security:
Thinking Strategically about Policy. Boca Raton, FL: CRC
Press, 2008.
31
ENDNOTES
1Thomas Schelling, Arms and Influence (New Haven, CT: Yale
University Press, 1966), 34.
2 The National Security Strategy of the United States of
America (Washington, DC: Whitehouse, 2002), 15.
3 The National Strategy for Combating Terrorism (Washington,
DC: Whitehouse, September 2006), 11.
4 National Military Strategic Plan for the War on Terrorism
(Washington, DC: Joint Chiefs of Staff, 2006).
82. 5 Variations on compellence, used throughout this paper,
include coercive diplomacy, forceful persuasion and armed
suasion.
6 Schelling, Arms, 2-3.
7 Graham Allison and Philip Zelikow, Essence of Decision:
Explaining the Cuban Missile Crisis (NY: Longman,
2nd ed., 1999), 16.
8 Ibid., 18.
9 Allison, Essence, 20, and Mary Jo Hatch, Organization Theory
(NY: Oxford University Press, 1999), 274.
10 Herbert Simon, “Human Nature in Politics: The Dialogue of
Psychology with Political Science,” American
Political Science Review 79 (1985): 294. Quoted in Allison,
Essence, 20. An appreciation of values and norms,
which are a function of culture and ideology, is also relevant.
11 Bruce Hoffman, Inside Terrorism (NY: Columbia University
Press, 1998), 43.
12 Robert Pape analyzed data for 315 suicide attacks between
1980 and 2003, concluding that suicide terrorism has
an internal logic that links the suicide attacks with strategic
objectives. Dying to Win: The Strategic Logic of
Suicide Terrorism (NY: Random House, 2005), 1, 7.
13 Allison, Essence, 234-239.
14 The disconnect between the formal, mechanistic and
informal, dynamic organization is address by Philip Selznick,
“Foundations of Organization Theory,” in Classics of
Organization Theory, edited by Jay M. Shafritz and J. Steven
Ott (NY: Harcourt College Publishers, 2001), 125-127. The
foundational theory of multiple motivations and
determinants of behavior is provided in the same collection by
Abraham Maslow, “A Theory of Motivation,” 174-
175, taken from Psychological Review, 50 (1943).
15 For excellent study of global illicit networks, see Moises
Naim, Illicit: How Smugglers, Traffickers, and Copycats
are Hijacking the Global Economy (NY: Doubleday, 2005).
16 Full transcript released by the Director of National
83. Intelligence on 11 October 2005, available at:
www.dni.gov/press_releases/20051011_release.htm.
17 Martha Crenshaw, “The Response to Terrorism,” in The
United States and Coercive Diplomacy, edited by Robert
J. Art and Patrick M Cronin (Washington, DC: US Institute for
Peace Press, 2003), 326-327.
18 US Strategic Command (USTRATCOM), Deterrence
Operations Joint Operating Concept (JOC) (Washington,
DC: The Joint Staff, Version 2.0, 2006), 18.
19 Ibid., 17.
20 Troy Thomas, Steve Kiser, and William Casebeer, Warlords
Rising: Confronting Violent Non-State Actors
(Lanham, MD: Lexington Books, 2005), 9.
21 Richard L. Daft, Organization Theory and Design (Mason,
OH: South-Western, 2004), 325.
22 For a thorough examination of the dynamics of collective
violence, see Charles Tilly, The Politics of Collective
Violence (Cambridge, UK: Cambridge University Press, 2002).
23 Thomas, Warlords, 116.
24 Daft, Organization, 11.
32
25 For an examination of non-religious, “revolutionary”
agendas, see James H. Billington‟s classic, Fire in the Minds
of Men: Origins of Revolutionary Faith (NY: Basic Book
Publishers, 1980).
26 Thomas, Warlords, 122.
27 Hatch identifies this as a coalition model of decision-
making, Organization, 277-278. Graham describes it in
detail as the “governmental politics paradigm” in Essence, 255-
84. 324.
28 Brian A. Jackson, “Organizational Decisionmaking by
Terrorist Groups,” in Social Science for Counterterrorism:
Putting the Pieces Together, edited by Paul K. Davis and Kim
Cragin (Santa Monica, CA: RAND Corporation,
2009), 221-232.
29 Allison, Essence, 288.
30 Daniel Katz and Robert L. Kahn, The Social Psychology of
Organizations (NY: John Wiley and Sons, 2nd ed.,
1978), 52-54.
31 Interview on 17 November 2009 with William Wood, US
Ambassador to Colombia, 2003-2007. Also see, Walter
Laqueur, The New Terrorism: Fanaticism and the Arms of Mass
Destruction (NY: Oxford University Press, 1999),
212-215.
32 A variety of useful classifications exist. Paul Davis and
Brian Jenkins propose the following: internal (top
leaders, lieutenants, foot soldiers, recruiters) and external
(suppliers, states supporters, populations, other sources of
moral and religious support). Deterrence and Influence in
Counterterrorism (Santa Monica, CA: RAND
Corporation, 2002), 15. Deterrence expert Brad Roberts
recommends a similar structure for the problem of WMD
Terrorism: jihadi foot soldiers, leaders, professionals, affiliate
groups, state sponsors, operational enablers, moral
legitimizers, and passive state enablers. “Deterrence and WMD
Terrorism: Calibrating its Potential Contributions
to Risk Reduction,” Institute for Defense Analysis Paper 4231
(June 2007): 11.
33 Hatch, Organization, 65. For an excellent analysis of the
criticality of external support to insurgencies, see Daniel
Byman, Trends in Outside Support for Insurgent Movements
(Santa Monica, CA: RAND Corporation, 2001).
34 Aron Heller, “Israel: Commandos seize huge Iranian arms
shipment,” Associated Press, 4 November 2009.
35 For a full account, see Steve Coll, The Secret History of the
85. CIA, Afghanistan, and bin Laden, from the Soviet
Invasion to September 10, 2001 (NY: Penguin Press, 2004),
325.
36 Jerold Post, The Mind of the Terrorist: The Psychology of
Terrorism from the IRA to al-Qaeda (NY: Palgrave
Macmillan, 2007), 53.
37 Bard E. O‟Neill, Insurgency and Terrorism: Inside Modern
Revolutionary Warfare (Washington, DC: Brassey‟s
Inc., 1990), 33-37.
38 Ibid., 24. The forms are distinct from strategic concepts for
war such as insurgency, revolutionary war, jihad,
limited war, etc. Each of these political-military approaches to
war is likely to involve one of more of the forms of
violence.
39 B. H. Liddell Hart, Strategy (NY: Frederic A. Praeger,
1968), 341.
40 Robert B. Asprey, War in the Shadow: The Guerrilla in
History (Garden City, NY: Doubleday & Company,
Volume 1, 1975), xi.
41 O‟Neill, Insurgency, 36.
42 Leading terrorism expert, Bruce Hoffman, defines terrorism
as “the deliberate creation and exploitation of fear
through violence or the threat of violence in the pursuit of
political change.” Inside Terrorism, 43. Bruce Jenkins
introduced the idea of terrorism as theater in his chapter,
“International Terrorism: A New Mode of Conflict,” in
International Terrorism and World Security, edited by David
Carlton and Carlo Schaerf (London: Croom Helm,
1975), 16.
43 The era‟s most prominent theorists include George Kennan,
Thomas Schelling, Herman Kahn, and Bernard
Brodie.
86. 33
44 Alexander George, Daniel Byman, Robert Pape, Lawrence
Freedman, and others did the intellectual heavy-lifting
in the 1990s.
45 Hart, Strategy, 335.
46 Edward Luttwak, Strategy: The Logic of War and Peace
(Cambridge, MA: Belknap Press, 2001), 201.
47 Strategy conforms to Carl von Clausewitz‟s contention that
war‟s purpose is to attain the political aims of the
sovereign. Clausewitz argues the “political object—the original
motive for the war—will thus determine both the
military objective [ends] to be reached and the amount of effort
it requires [ways].” On War, edited and translated
by Michael Howard and Peter Paret (Princeton, NJ: Princeton
University Press, 1984), 81.
48 Kim Cragin and Scott Gerwehr, Dissuading Terror: Strategic
Influence and the Struggle Against Terrorism
(Santa Monica, CA: RAND Corporation, 2005), 15.
49 Schelling, Arms, 72.
50 Ibid., 72.
51 Daniel Byman and Matthew Waxman, The Dynamics of
Coercion (NY: Cambridge University Press, 2002), 6-7.
52 Cragin, Dissuading, 19.
53 Robert Pape, Bombing to Win: Air Power and Coercion in
War (Ithaca, NY: Cornell University Press, 1996), 15.
54 Byman, Dynamics, 3.
55 Byman and Waxman contend, “Coercion should work when
the anticipated suffering associated with a threat
exceeds the anticipated gains of defiance.” Ibid., 10.
56 Gary Schaub draws on expected utility theory to argue that
in many cases deterrence is actually easier than
compellence. “Deterrence, Compellence, and Prospect Theory,”
Political Psychology, Vol. 25, No. 3 (2004): 389.
87. 57 Ibid., 10.
58 For a discussion of suicide bomber motivation and resolve,
see Pape, Dying to Win, 89-92.
59 The Deterrence Operations JOC introduces the related idea
of “consequences of restraint.” Accordingly,
“Encouraging adversary restraint plays a critical role in
deterrence operations because adversary decision-makers
weigh the benefits and costs of acting in the context of their
expectations of what will happen if they do not act.”
USSTRATCOM, 27.
60 Robert Art, “Coercive Diplomacy: What do we know?,” The
United States, 363.
61 Byman, Dynamics, 12.
62 Schelling, Arms, 35.
63 Ibid., 72.
64 Ibid., 72.
65 Pape, Bombing, 16.
66 Art, “Coercive Diplomacy,” 362.
67 James Smith and Brent Talbot, “Terrorism and Deterrence by
Denial,” in Terrorism and Homeland Security:
Thinking Strategically about Policy, Paul R. Viotti, Michael
Opheim, and Nicholas Bowen, editors (Boca Raton, FL:
CRC Press, 2008), 53. Also see David E. Johnson, Karl P.
Mueller, William H. Taft, Jr., Conventional Coercion
Across the Spectrum of Operations: The Utility of U.S.
Military Forces in the Emerging Security Environment
(Santa Monica, CA: RAND Corporation, 2002), 16-17. For
discussion of denial as it relates to terrorist and
criminal organizations, see David P. Auerswold, “Deterring
NonState WMD Attacks,” Political Science Quarterly,
121, 4 (Winter 2006/2007).
68 US Northern Command (USNORTHCOM), Homeland
Defense and Civil Support JOC (Washington, DC: The
Joint Staff, 2007), 19-20.
88. 34
69 Ibid., 56.
70 Richard Haass and Meghan L. O'Sullivan, Honey and
Vinegar: Incentives, Sanctions, and Foreign Policy
(Washington, DC: Brookings Institution Press, 2000), 2. See
also Drury Cooper, Economic Sanctions and
Presidential Decisions: Model of Political Rationality
(Gordonsville, VA: Palgrave Macmillan, 2006).
71 Stories connect actions to a symbolic framework and a
narrative thread that arcs through history. The narratives
of many terrorists groups, for example, present an interpretation
of past and current events that is not only
dramatically different from the strategic communications of the
United States, but that is effective at discrediting our
message while motivating others to violent action. The more
compelling narrative often wins, particularly when it
embraces the elements of rhetoric and good storytelling. In our
narrative competition with al Qaeda and associated
jihadist organizations, we face master storytellers like Osama
bin Laden and Ayman al-Zawahri. Not only are they
perceived as credible to a broad Muslim public, but their
rhetoric appeals to both the rational and emotional.
72 US Joint Forces Command (USJFCOM), Strategic
Communications Joint Integrating Concept (JIC) (Washington,
DC: The Joint Staff, 19 September 2008), 76.
73 In response to the 1990 Taureg rebellion in Mali, for
example, the government combined limited military action
with political decentralization and economic investment to
resolve the conflict. The result was the Accords of
Tamanrasset, 6 January 1991. This case is examined in full by
Kalifa Keita, Lieutenant Colonel, Malian Army,