George, A. L. y Smoke, R. (1989) Deterrence and Foreign Policy.
George, A. L. y Smoke, R. (1989) Deterrence and Foreign Policy.
George, A. L. y Smoke, R. (1989) Deterrence and Foreign Policy.
REFERENCES
Linked references are available on JSTOR for this article:
https://www.jstor.org/stable/2010406?seq=1&cid=pdf-
reference#references_tab_contents
You may need to log in to JSTOR to access the linked references.
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected].
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
Cambridge University Press is collaborating with JSTOR to digitize, preserve and extend access
to World Politics
* For helpful comments on an earlier draft the authors express appreciation to Kenneth A.
Oye, Jack S. Levy, and Robert Jervis who, however, bear no responsibility for the thoughts
expressed in this comment.
I Thus: "in the hands of George and Smoke, the case study approach helps generate theory
in a very direct way" (p. 156); "we emphatically believe that they [case studies] are essential to
the development and testing of social science theory" (p. i67); "indeed, analytic theory cannot
do without case studies" (p. i69; see also p. 159). Achen and Snidal, "Rational J)eterrence
Theory and Comparative Case Studies," World Politics 41 (January i989), 143-69.
2Alexander L. George and Richard Smoke, Deterrence in American Foreign Policy: Theory
and Practice (New York: Columbia University Press, 1974). Sincc publishing this book, wc
have worked steadily to raise standards and explicate procedures for improving the quality of
case studies and their contribution to theory development. We have given serious attention to
most of the concerns about them raised by Achen and Snidal. See A. L. George, "Case Studies
and Theory Development: The Method of Structured, Focused Comparison," in Paul Gor-
don Lauren, ed., Diplomacy: New Approaches in History, Theory and Policy (New York: Free
Press, I979); A. L. George, "Case Studies and Theory Development," paper presented to the
Second Annual Symposium on Information Processing in Organizations, Carnegie-Mellon
University, Pittsburgh, PA, October I5-i6, i982; A. L. George and T. J. McKeown, "Case
Studies and Theories of Organizational Decision Making," in Robert Coulam and Richard
Smith, eds., Advances in Information Processing in Organizations, Vol. 2 (Greenwich, CT: JAI
Prcss, 1985), 21-58. Case-study methodology is discussed also in Richard Smoke, -War: Con-
trolling Escalation (Cambridge: Harvard University Press, I977), chap. 3 and app. B. George
continues efforts to improve case-study methodology and plans additional publications.
A discussion of the uses and limitations of the controlled comparison method of studying
a small number of cases for theory development should not overlook the importance of single-
case studies. Lack of space prevents us from summarizing the arguments on behalf of the
contributions a single case study can make to theory development that have been advanced by
such writers as Harry Eckstein, "Case Study and Theory in Political Science," in F. I. Green-
stein and N. W. Polsby, eds., Handbook of Political Science, Vol. 7 (Reading, MA: Addison-
Wesley, I975), 79-I38, and Lawrence B. Mohr, "The Reliability of the Case Study As a Source
of Information," in Coulam and Smith, op. cit., 65-97.
3 The description of this method in George and Smoke (fn. 2), 95-I03, has since been elab-
orated, and related methodological and theoretical issues more fully discussed, in the two ar-
ticles by George (fn. 2) and in the George-McKeown article (fn. 2).
4 The formulation of contingent generalizations is necessary in order to capture the fact
that deterrence is characterized by the phenomenon of what General Systems Theory refers
to as "equifinality" (and what John Stuart Mill referred to as "plurality of causes" when he
warned that his "method of agreement" and "method of difference" could not be easily em-
ployed for inferring causal relationships). Equifinality refers to the fact that similar outcomes
on a dependent variable (e.g., deterrence failures) occur as a result of different causal pro-
cesses, thus making the search for robust universal causal generalizations infeasible. Abstract
deductive deterrence theory has thus far ignored the phenomenon of equifinality.
5See George (fn. 2, I979), 59-60.
6 This kind of disaggregated theory is an example of what Paul Diesing, drawing upon
Abraham Kaplan, has referred to as "concatenated theory" in his Patterns of Discovery in the
Social Sciences (Chicago: Aldine-Atherton, I971), 22-24.
7 Particular attention must be given not only to the strength of the Initiator's motivation to
challenge the status quo but also to the time he has in which to do so. Moreover, asymmetry
of motivation favoring the Initiator can sometimes compensate for asymmetry of power fa-
voring the Defender. On this point see, for example, A. L. George et al., The Limits of Coercive
Diplomacy (Boston: Little, Brown, I971); Zeev Maoz, "Resolve, Capabilities, and the Out-
comes of Interstate Disputes, I8I6-I976," Journal of Conflict Resolution 27 (June I983), I95-
229; Jack S. Levy, "When Do Deterrent Threats Work?" British Journal of Political Science
i8 (October i988), 433-60.
8 Robert Wilson notes the difficulty that game-theoretic models encounter with contextual
variables, which render most situations indeterminate; "Deterrence in Oligopolistic Compe-
tition," in Paul C. Stern et al., eds., Perspectives on Deterrence (New York: Oxford University
Press, forthcoming).
9 Examples of difficulties encountered in attempts to apply deterrence strategy at substra-
tegic levels of conflict are provided in the analysis of the Eisenhower administration's Middle
East policies in George and Smoke (fn. 2), chap. i I. For a discussion of thirteen ways in which
the characteristics of deterrence at the strategic level differ from those at lower levels of con-
flict, see chap. 2.
Io Ibid., 520-22.
note 4) which, as Achen and Snidal acknowledge (p. 156), their rational
deterrence theory has not considered and which they regard as of major
importance for theory as well as policy.ii
The preceding remarks have raised the problem relating to levels of
analysis in constructing deterrence theory and, even more, in utilizing it
in policy-making contexts. Achen and Snidal evidently prefer to hold fast
to a deductive theory, one that "Black Boxes" both the decision-making
and strategic-interaction levels of analysis. It is not easy for the reader to
grasp how they reconcile this preference with their recognition of the
value of findings from empirical research that attempt to study actual
events in these two Black Boxes rather than simply make assumptions
about decision-making and strategic-interaction processes. Left unan-
swered in their essay is whether and how they would integrate these em-
pirical findings into a new deductive deterrence theory or how they
would make the connection between the two types of theory. In other
words, how do they propose to deal with the deterrence phenomenon at
different levels of analysis?
This leads us to raise a number of questions regarding the nature of
the deductive rational deterrence theory espoused by Achen and Snidal
and to pose the critical question of how it might be improved and still
remain a deductive theory. Although the major impetus and thrust of
their article is to defend deductive deterrence theory, Achen and Snidal
clearly admit the absence of a satisfactory rational deterrence theory.
They acknowledge that coherent supporting arguments for such a theory
are lacking, and state that what they are really praising are its foreseeable
conclusions when it is properly developed.I2 Nonetheless, they vigorously
praise the contributions it has already made, while at the same time ar-
guing merely that rational deterrence theory should not be abandoned for
what they dismiss as "the patchwork of empirical findings currently
available" (p. 159). And, toward the end of the essay, they further dilute
their defense of this particular theory by concluding: "More importantly,
our goal here is to defend theory, not rational deterrence theory" (p. 159).
While the forthright admission that rational deterrence theory remains
undeveloped is praiseworthy, the authors should at least tell us what they
think an axiomatic-deductive theory must be like in order to be capable
I3Paul Huth and Bruce Russett, "What Makes Deterrence Work? Cases From i900-i980,"
World Politics 36 (July i984), 496-526.
I George and Smoke (fn. 2), chap. I7.
ment. "i Even if one operates with the additional assumption of a "uni-
tary actor," a more specific version of the type of rationality assumed to
be operating is required, if only to indicate how one believes actors in
general, or the specific actor in question who is contemplating a challenge
to deterrence, will deal with the well-known cognitive limits on ration-
ality. (Not all actors deal with these cognitive limits in the same way.)'6
Herbert Simon's concept of "bounded rationality" is of some use but, as
he recognizes, it is often insufficient for fine-tuning rational choice theo-
ries.'7 If the theorist wishes to continue to "Black Box" the decision-mak-
ing process by means of assumptions (instead of getting into the Black
Box to observe and/or estimate what is actually going on, as policy makers
with the assistance of their intelligence specialists attempt to do), then it is
often desirable to develop what Simon calls "auxiliary assumptions" as to
the type of rationality that actors in general, or the particular actors about
whom predictions are to be made, typically exhibit in situations of this
kind.
Such auxiliary assumptions regarding rationality are often added to
their models, as Simon notes, by investigators who formulate and employ
deductive theory. But where do they come from? Not from contemplat-
ing one's navel but rather from reflecting on relevant empirical observa-
tions of actual behavior and converting such observations into auxiliary
assumptions to be added to the theory and incorporated into its internal
logical structure.
Important questions arise in addressing the task of operationalization,
the answers to which are not self-evident. First, which of the key concepts
of rational deterrence theory should be singled out for this treatment?
Achen and Snidal, like other deterrence theorists, emphasize the impor-
tance of (i) the credibility of a deterrence commitment/threat, and (2) the
need for a threat of punishment that is sufficiently strong to overcome the
Initiator's inclination to challenge deterrence by influencing his cost-ben-
efit calculations. Are these the key concepts of the theory to be operation-
alized? Or will deductive theorists avoid dealing with these particular
concepts and settle for operationalizing the Initiator's utility calculations?
This would require the investigator to determine whether, in contem-
plating a possible challenge to the status quo, the would-be Initiator ex-
i8 See Bruce Bueno de Mesquita, The War Trap (New Haven: Yale University Press, i98i).
policy makers- can, and does, easily lead, as we argued in our book and
continue to argue, to a narrow over-reliance on deterrence strategy in for-
eign policy.
Another, related limitation of deterrence theory is its exclusive preoc-
cupation with threats of punishment as a means of persuading an adver-
sary not to challenge a situation in which there is disagreement. Critics of
deterrence, extending back to the early years of the Cold War, have em-
phasized (sometimes overemphasized) that threats can be counterproduc-
tive. We have argued that early deterrence theorists erred in their evident
assumption that a viable theory of deterrence can be developed indepen-
dently of a broader theory of processes by which nations influence each
other, one that encompasses the utility of positive inducements as well as,
or in lieu of, threats of negative sanctions.23 Thus, for example, the cred-
ibility and potency of a deterrence threat might not be so critical if instead
(or in addition) sufficient positive incentives for remaining at the status
quo are offered.
Finally, deterrence theory ignores the frequent need to regard deter-
rence, even when it is necessary and effective, as a strategy to buy time.
Deterrence can severely frustrate an adversary who is strongly motivated
to change a status quo that he regards as invidious, especially when he
feels it legitimate to do so. The consequences of continued frustration are
not easily predictable and are not always favorable to the deterring
power. Deterrence success in the short run is not always beneficial in the
longer run; the adversary may become more desperate to mount a chal-
lenge and may proceed to acquire greater resources for doing so. Under
such circumstances the most reliable benefit of successful deterrence may
be more time time which is best used not in a possibly futile effort to
maintain deterrence indefinitely but to work out, if possible, an accom-
modation of conflicting interests so as to reduce reliance on deterrence
and avoid overt conflict.24