Topics: Crime / Pages: 9 (2023 words) / Published: Apr 15th, 2013
Running Head: Deterrence 1

Shawn Caulder
Excelsior College

Deterrence 2


During the course of study in references for the topic of deterrence I have found a vast amount of information. Most are articles written by different intellectual scholars in the criminal justice field all weighing in on what they believe the theory of “Deterrence” is and how it relates to the ability to deflect and or inhibit crime during war time, peace time and stately situations. In particular I found one article to be an astounding work done by a man named
Stephen Quackenbush with an article titled General Deterrence and International Conflict:
Testing Perfect Deterrence Theory (2006). Although this article deals with deterrence theory of international conflict it still involves the basic roots of deterrence. I would like to show that through Mr. Quackenbush’s work one can come very close to a “Perfect Theory of Deterrence “ by simply following the logic of the article.

Deterrence 3

When searching for the topic it was my goal to find the meaning of deterrence and or the application behind the theory. I wanted something with close ties to the relationship of the text we are using in the classroom. The text we are using Vold’s Theoretical Criminology, 6th ed
(Bernard, Snipes, & Gerould, 2010). I found in the article what I needed to relate different aspects of the text to the fundamentals behind what S. Quackebush (2006) had theorized about the levels behind deterrence. Not only does his research provide information on when and how to

References: Bernard, Snipes, & Gerould, (2010) Vold 's Theoretical Criminology, 6th ed. Oxford University Press INC. New York, NY Quackenbush, S. L. (2006) General Deterrence and International Conflict: Testing Perfect Deterrence Theory: Retrieved from:

You May Also Find These Documents Helpful

  • The Detterence Theory
  • Penology Essay
  • The Death Penalty: Why Should I Support Capital Punishment?
  • final private security
  • People Have Overly Dependent on Technology
  • National Security Outline