Jump to ContentJump to Main Navigation
Cross-Domain DeterrenceStrategy in an Era of Complexity$
Users without a subscription are not able to see the full content.

Eric Gartzke and Jon R. Lindsay

Print publication date: 2019

Print ISBN-13: 9780190908645

Published to Oxford Scholarship Online: July 2019

DOI: 10.1093/oso/9780190908645.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (www.oxfordscholarship.com). (c) Copyright Oxford University Press, 2020. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in OSO for personal use. date: 25 February 2020

Asymmetric Advantage

Asymmetric Advantage

Weaponizing People as Nonmilitary Instruments of Cross-Domain Coercion

Chapter:
(p.259) 12 Asymmetric Advantage
Source:
Cross-Domain Deterrence
Author(s):

Kelly M. Greenhill

Publisher:
Oxford University Press
DOI:10.1093/oso/9780190908645.003.0012

A widely held belief in deterrence theory, first articulated by Thomas Schelling, is that compellence is harder than deterrence. This chapter finds, however, that weak actors have often been able to successfully use coercive engineered migration to compel stronger states to alter their policies. The aims of coercive engineered migration vary tremendously and usually include political, military, and economic goals. Liberal democracies are especially vulnerable to this particular means of coercion, even as they have important advantages in other arenas. This novel example of compellence that relies on a nonmilitary form of cross-domain coercion shows very convincingly that a difference in means in the right context can have a major differential effect on the success or failure of coercion.

Keywords:   migration policy, compellence, coercive engineered migration, cross-domain deterrence, asymmetric strategy, nonmilitary coercion

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .