Literature on Terrorism Research

Literature on Terrorism Research

Compiled and selected by Judith Tinnes

[Bibliographic Series of Perspectives on Terrorism - BSPT - JT - 2014 - 1]

Abstract

This bibliography contains journal articles, book chapters, books, edited volumes, theses, grey literature, bibliographies and other resources on the field of Terrorism Research, its sub-disciplines (such as Critical Terrorism Studies), central approaches and methods. Though focusing on recent literature, the bibliography is not restricted to a particular time period and covers publications up to mid of January 2014. The literature has been retrieved by manually browsing more than 200 core and periphery sources in the field of Terrorism Studies. Additionally, full-text and reference retrieval systems have been employed to expand the search.

Keywords :terrorism research, terrorism studies, methods, approaches, resources

NB: Websites were last visited on 19.01.2014. - See also Note for the Reader at the end of this literature list.

Bibliographies and other Resources

Andrusyszyn, Greta H. (2009, December): Terrorism: A Selected Bibliography. URL: http://www.carlisle.army.mil/library/bibs/terror09.pdf

Benavides, Ben (2012, September): Open Source Intelligence (OSINT) 2oolKit On The Go. URL: http://www.phibetaiota.net/wp-content/uploads/2009/07/OSINT-2ool-Kit-OnThe-Go-Bag-O-Tradecraft.pdf

Benavides, Ben (2014, January): Exploring Social Web Sites: A Guide for the Open Source Analyst. URL: http://www.phibetaiota.net/wp-content/uploads/2014/01/Ben-Benavides-Social-Web-Sites-A-Guide.pdf

Bleuer, Christian (2012, February): The Afghanistan Analyst Conflict Bibliography. (Special Edition). URL: http://afghanistananalyst.files.wordpress.com/2012/04/conflictbibliography2012.pdf

Coordinators of TRI’s National Networks (2013, April): Preliminary and Partial Inventory of PhD Theses and their Authors. Perspectives on Terrorism, 7(2), 121-140. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/261

Duncan, Gillian (2009, September): New Literature on Terrorism and Political Violence. Perspectives on Terrorism,  3(3), 50 - 54. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/78

Duncan, Gillian; Schmid, Alex P. (2011): Bibliography of Terrorism. In: Alex P. Schmid (Ed.): The Routledge Handbook of Terrorism Research. Abingdon: Routledge, 475-597 [ca. 4,600 titles].

Earth Intelligence Network (EIN) (2009-): Public Intelligence Blog. URL: http://www.phibetaiota.net

FBI Library (n.d.-): Bibliographies. URL: http://fbilibrary.fbiacademy.edu/bibliographies.html

Forest, James J. F. (2002, February-): Teaching About Terrorism: A Resource Portal of the Terrorism Research Initiative. URL: http://www.teachingterror.com

Forest, James J. F. et al. (2004, March 22): Terrorism and Counterterrorism: An Annotated Bibliography. (Vol. 1). (CTC Bibliography). URL:  http://www.teachingterror.com/bibliography/CTC_Bibliography_2004.pdf

Forest, James J. F. et al. (2006, September 11): Terrorism and Counterterrorism: An Annotated Bibliography. (Vol. 2). (CTC Bibliography). URL:  http://www.teachingterror.com/bibliography/CTC_Bibliography_2006.pdf

Freedman, Benjamin (2010, November): Terrorism Research Centres: 100 Institutes, Programs and Organisations in the Field of Terrorism, Counter-Terrorism, Radicalisation and Asymmetric Warfare Studies. Perspectives on Terrorism, 4 (5), 48-56. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/123

Gonzalez, Nathan (2009, January): Middle East Glossary. URL: http://nathangonzalez.com/Middle_East_Glossary.html

Hofmann, David C. (2012, December): Review Essay: Twenty Important Journal Articles on Radicalisation to, and De-Radicalisation from, Terrorism. Perspectives on Terrorism, 6 (6), 104-113. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/234

Hofmann, David C.; Schmid, Alex P. (2012, December): Selected Literature on (i) Radicalization and Recruitment, (ii) De-Radicalization and Dis-Engagement, and (iii) Counter-Radicalization and Countering Violent Extremism. Perspectives on Terrorism, 6(6), 114-143. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/235

IntelCenter (2002-): Free Analytical Reports, Charts & Maps. URL: http://www.intelcenter.com/reports-charts.html

Jones, Charles et al. (2010-): Access to Mideast and Islamic Resources (AMIR). URL: http://amirmideast.blogspot.de

Jongman, Albert J. (Berto) (2011, March): Internet Websites and Links for (Counter-)Terrorism Research. Perspectives on Terrorism, 5 (1), 22-37. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/jongman-internet-websites

Perliger, Arie (2010, October): Counterterrorism Reading List. (CTC Bibliography). URL: http://www.ctc.usma.edu/posts/counterterrorism-reading-list

Peterson, Jaclyn A. (2012, August): Three Bibliographies: (i) Drones and Targeted Killing, (ii) Prosecuting Terrorism, and (iii) Enhanced Interrogation Techniques v. Torture. Perspectives on Terrorism, 6 (3), 91-105. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/peterson-threee-bibliographies

Picard, Robert G.; Sheets, Rhonda S. (1987): Terrorism and the News Media: A Research Bibliography Part I. Political Communication, 4(1), 65-69. DOI: http://dx.doi.org/10.1080/10584609.1987.9962808

Picard, Robert G.; Sheets, Rhonda S. (1987): Terrorism and the News Media: A Research Bibliography Part II. Political Communication, 4 (2), 141-152. DOI: http://dx.doi.org/10.1080/10584609.1987.9962816

Picard, Robert G.; Sheets, Rhonda S. (1987): Terrorism and the News Media: A Research Bibliography Part III. Political Communication, 4 (3), 217-221. DOI: http://dx.doi.org/10.1080/10584609.1987.9962824

Picard, Robert G.; Sheets, Rhonda S. (1987): Terrorism and the News Media: A Research Bibliography Part IV. Political Communication, 4 (4), 325-326. DOI: http://dx.doi.org/10.1080/10584609.1987.9962832

Price, Eric (2010, March): New Literature on Terrorism and Political Violence. Perspectives on Terrorism, 4 (1), 77-83. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/93

Price, Eric (2010, July): Dissertations and Theses on (Counter-)Terrorism and Political Violence (1980-2010). Perspectives on Terrorism, 4 (3), 58-63. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/108

Price, Eric (2010, October): Selected Literature on Human Rights and Terrorism. Perspectives on Terrorism, 4 (4), 88-101. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/119

Price, Eric (2010, November): Selected Literature on Terrorism and CBRN Threats. Perspectives on Terrorism, 4 (5), 57-68. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/124

Price, Eric (2010, December): Selected Literature on Terrorism and Organized Crime. Perspectives on Terrorism, 4 (6), 44-54. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/132

Price, Eric (2011, March): Selected Literature on Terrorism and Religion. Perspectives on Terrorism, 5 (1), 64-75. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/price-literature-on-terrorism-and-religion

Price, Eric (2011, May): Selected Literature on Conflict Prevention, Crime Prevention, Terrorism Prevention and Violence Prevention. Perspectives on Terrorism, 5 (2), 85-100. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/price-conflict-crime-prevention

Price, Eric (2011, September): Selected Literature on Terrorism and Political Violence/Conflict in Africa since the Second World War. Perspectives on Terrorism, 5 (3-4), 118-133. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/164

Price, Eric (2011, December): Literature on Right-Wing and Vigilante Terrorism. Perspectives on Terrorism, 5 (5-6), 168-179. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/literature-on-right-wing

Price, Eric (2012, March): Literature on Terrorism, Media, Propaganda & Cyber-Terrorism. Perspectives on Terrorism, 6 (1), 92-103. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/price-literature-terrorism-media

Price, Eric (2012, May): Bibliography: Literature on Terrorism in History. Perspectives on Terrorism, 6 (2), 160-180. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/price-terrorism-in-history

Price, Eric (2012, August): Bibliography: Literature on the Future of Terrorism (including Trends). Perspectives on Terrorism, 6 (3), 78-90. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/price-literature-on-the-future-of-terrorism

Price, Eric (2012, October): Bibliography: Inside Terrorist Organisations. Perspectives on Terrorism, 6 (4-5), 160-168. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/222

Price, Eric (2012, December): Literature on Victims of Terrorism. Perspectives on Terrorism, 6 (6), 144-166. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/236

Price, Eric (2013, February): Literature on Al-Qaeda since 2001. Perspectives on Terrorism, 7 (1), 114-144. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/246

Price, Eric (2013, April): Literature on Kidnapping for Ransom and for Political Concessions. Perspectives on Terrorism, 7 (2), 104-118. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/259

Price, Eric (2013, June): Literature on Refugee Situations (including Internally Displaced Persons) and Terrorism (incl. other Forms of Political Violence and Armed Conflict). Perspectives on Terrorism, 7 (3), 99-113. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/271

Price, Eric (2013, August): Literature on the Financing of Terrorism. Perspectives on Terrorism, 7 (4), 112-130. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/284

Price, Eric (2013, October): Literature on Diasporas and Terrorism. Perspectives on Terrorism, 7 (5), 186-197. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/302

Price, Eric (2013, December): Selected Dissertations and Theses on Terrorism, Counterterrorism and Political Violence, 1980-2013 (available in Full-Text). Perspectives on Terrorism, 7 (6), 166-202. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/318

Price, Eric; Schmid, Alex P. (2010, May): Selected Literature on Radicalization and De-Radicalization from Terrorism. Perspectives on Terrorism, 4 (2), 58-76. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/102

Schmid, Alex P. (2011): Glossary and Abbreviations of Terms and Concepts Relating to Terrorism and Counter-Terrorism. In: Alex P. Schmid (Ed.): The Routledge Handbook of Terrorism Research. Abingdon: Routledge, 598-706.

Schmid, Alex P. (2012, December): Terrorism Research & Analysis Consortium (TRAC). (Review). Perspectives on Terrorism, 6 (6), 171-173. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/238

Schmid, Alex P.; Brand, Jan; van der Poel, Angela (2008): A Bibliography of Political Terrorism. In: Alex P. Schmid; Albert J. (Berto) Jongman: Political Terrorism: A New Guide to Actors, Authors, Concepts, Data Bases, Theories, and Literature. (Expanded and Updated 3rd Ed.), 237-484. New Brunswick: Transaction Publishers.

Schmid, Alex P.; Price, Eric (2011, May): Selected Literature on Radicalization and De-Radicalization of Terrorists: Monographs, Edited Volumes, Grey Literature and Prime Articles Published since the 1960s. Crime, Law and Social Change, 55 (4), 337-348. DOI: http://dx.doi.org/10.1007/s10611-011-9287-4

Schmid, Alex P.; Spencer-Smith, Charlotte (2012, May): lllicit Radiological and Nuclear Trafficking, Smuggling and Security Incidents in the Black Sea Region since the Fall of the Iron Curtain: An Open Source Inventory. Perspectives on Terrorism, 6 (2), 117-157. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/schmid-illicit-radiological

Schmid, Alex P. et al. (2011, December): Expanding the TRI Network for Doctoral Researchers in the Fields of Terrorism, Political Violence and Armed Conflict to the United States of America and Russia. Perspectives on Terrorism, 5 (5-6), 186-187. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/expanding-the-TRI-Network

Sinai, Joshua (2008, August): Review Essay: Top 50 Books on Terrorism and Counterterrorism. Perspectives on Terrorism, 2 (11), 15-23. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/57

Sinai, Joshua (2012, May): Terrorism Bookshelf: Top 150 Books on Terrorism and Counter-Terrorism. Perspectives on Terrorism, 6 (2), 74-116. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/sinai-terrorism-bookshelf

Sinai, Joshua (2013, June): Counterterrorism Bookshelf. Perspectives on Terrorism, 7 (3), 114-124. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/272

Sinai, Joshua (2013, August): Counterterrorism Bookshelf: Capsule Reviews of 13 Books. Perspectives on Terrorism, 7 (4), 131-137. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/285

Sinai, Joshua (2013, October): “Counterterrorism Bookshelf”: Literature on Intelligence and Terrorism. Perspectives on Terrorism, 7 (5), 127-141. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/295

Sinai, Joshua (2013, December): “Counterterrorism Bookshelf”: 20 Important Books on Terrorism & Counterterrorism Related Subjects. Perspectives on Terrorism, 7 (6), 203-209. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/319

Tinnes, Judith (2013, February): Terrorism and the Media (including the Internet): An Extensive Bibliography. Perspectives on Terrorism, 7(1, Suppl.), S1-S295. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/247

Tinnes, Judith (2013, April): 100 Core and Periphery Journals for Terrorism Research. Perspectives on Terrorism, 7 (2), 95-103. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/258

Tinnes, Judith (2013, June): 230 Websites and Blogs for Terrorism Research. Perspectives on Terrorism, 7 (3), 84-98. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/270

Tinnes, Judith (2013, October): Literature on the Arab Spring. Perspectives on Terrorism, 7 (5), 155-185. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/301

Tinnes, Judith (2013, December): Literature on the Conflict in Syria (2011–November 2013). Perspectives on Terrorism, 7 (6), 137-165. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/317

Zelin, Aaron Y. (2010-): Articles of the Week. URL: http://jihadology.net/site-features/articles-of-the-week/

Zelin, Aaron Y. (2010-): End of the Year Series. URL: http://jihadology.net/site-features/

Zelin, Aaron Y. (2013, January 2): Jihadi Studies Bibliography. (v. 1.0). URL: http://azelin.files.wordpress.com/2013/01/jihadi-studies-bibliography-v-1-0.pdf

 

Books and Edited Volumes

Akhgar, Babak; Yates, Simeon (Eds.) (2011): Intelligence Management: Knowledge Driven Frameworks for Combating Terrorism and Organized Crime. (Advanced Information and Knowledge Processing). London: Springer.

Chen, Hsinchun (2012): Dark Web: Exploring and Data Mining the Dark Side of the Web. (Integrated Series in Information Systems, Vol. 30). New York: Springer.

Chen, Hsinchun; Yang, Christopher C. (Eds.) (2008): Intelligence and Security Informatics: Techniques and Applications. (Studies in Computational Intelligence, Vol. 135). Berlin: Springer.

Chen, Hsinchun et al. (Eds.) (2008): Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security. (Integrated Series in Information Systems, Vol. 18). New York: Springer.

Ciment, James (Ed.) (2011): World Terrorism: An Encyclopedia of Political Violence from Ancient Times to the Post-9/11 Era. Armonk: M. E. Sharpe.

Dolnik, Adam (Ed.) (2013): Conducting Terrorism Field Research: A Guide. (Contemporary Terrorism Studies). Abingdon: Routledge.

Everton, Sean F. (2012): Disrupting Dark Networks. (Structural Analysis in the Social Sciences, Vol. 34). New York: Cambridge University Press.

Forest, James J. F. (Ed.) (2013): Intersections of Crime and Terror. London: Routledge.

Forest, James J. F.; Howard, Russell D.; Moore, Joanne (Eds.) (2013): Homeland Security and Terrorism. (2nd ed.) New York: McGraw-Hill.

Forest, James J. F. (2012): The Terrorism Lectures. Santa Ana: Nortia Press.

Forest, James J. F.; Howard, Russell D. (Eds.) (2012): Weapons of Mass Destruction and Terrorism. (2nd ed.) New York: McGraw-Hill.

Franks, Jason (2006): Rethinking the Roots of Terrorism. (Rethinking Peace and Conflict Studies). Basingstoke: Palgrave Macmillan.

Hock, Randolph (2013): The Extreme Searcher’s Internet Handbook: A Guide for the Serious Searcher. (4th ed.). Medford: CyberAge Books.

Horgan, John; Braddock, Kurt (Eds.) (2012): Terrorism Studies: A Reader. Abingdon: Routledge.

Howard, Russell D.; Hoffman, Bruce (Eds.) (2011): Terrorism and Counterterrorism: Understanding the New Security Environment: Readings and Interpretations. (4th ed.). (McGraw-Hill Contemporary Learning Series). Boston: McGraw-Hill.

Jackson, Richard; Breen Smyth, Marie; Gunning, Jeroen (Eds.) (2009): Critical Terrorism Studies: A New Research Agenda. (Critical Terrorism Studies). Abingdon: Routledge.

Karlsson, Michael (2012): 9/11 and the Design of Counterterrorism Institutions. Farnham: Ashgate.

Khalsa, Sundri K. (2004): Forecasting Terrorism: Indicators and Proven Analytic Techniques. Lanham: Scarecrow Press.

Makhutov, Nikolay Andreevich; Baecher, Gregory B. (Eds.) (2012): Comparative Analysis of Technological and Intelligent Terrorism Impacts on Complex Technical Systems. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 102). Amsterdam: IOS Press.

Mann, Thomas (2005): The Oxford Guide to Library Research: How to Find Reliable Information Online and Offline. (3rd ed.). Oxford: University Press.

Martin, C. Gus (Ed.) (2011): The SAGE Encyclopedia of Terrorism. (2nd ed.). Thousand Oaks: SAGE.

McCauley, Clark R. (Ed.) (1991): Terrorism Research and Public Policy. Abingdon: Frank Cass.

Mickolus, Edward F.; Simmons, Susan L. (2011): The Terrorist List. (Vol. 1-5). Santa Barbara: Praeger Security International.

Miller, David et al. (Eds.) (2013): Critical Terrorism Studies since 11 September 2001: What has been Learned? Abingdon: Routledge.

Ortiz-Arroyo, Daniel et al. (2008) (Eds.): Intelligence and Security Informatics: First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008: Proceedings. (Lecture Notes in Computer Science, Vol. 5376). Berlin: Springer.

Ranstorp, Magnus (Ed.) (2007): Mapping Terrorism Research: State of the Art, Gaps and Future Direction. (Political Violence). Abingdon: Routledge.

Ronczkowski, Michael R. (2012): Terrorism and Organized Hate Crime: Intelligence Gathering, Analysis, and Investigations. (3rd ed.). Boca Raton: CRC Press.

Rosenfeld, Jean E. (Ed.) (2011): Terrorism, Identity and Legitimacy: The Four Waves Theory and Political Violence. (Political Violence). Abingdon: Routledge.

Schmid, Alex P. (Ed.) (2011): The Routledge Handbook of Terrorism Research. Abingdon: Routledge.

Schmid, Alex P.; Jongman, Albert J. (Berto) (2005): Political Terrorism: A New Guide to Actors, Authors, Concepts, Data Bases, Theories, and Literature. (Reprint of 1988 edition). New Brunswick: Transaction Publishers.

Silke, Andrew (Ed.) (2004): Research on Terrorism: Trends, Achievements & Failures. London: Frank Cass.

Spencer, Stephan (2011): Google Power Search: The Essential Guide to Finding Anything Online with Google. Sebastopol: O'Reilly.

Stump, Jacob L.; Dixit, Priya (2013): Critical Terrorism Studies: An Introduction to Research Methods. Abingdon: Routledge.

Subrahmanian, V. S. (2013): Handbook of Computational Approaches to Counterterrorism. New York: Springer.

Subrahmanian, V. S. et al. (2013): Computational Analysis of Terrorist Groups: Lashkar-e-Taiba. New York: Springer.

Wiil, Uffe Kock (Ed.) (2011): Counterterrorism and Open Source Intelligence. (Lecture Notes in Social Networks, Vol. 2). Wien: Springer.

Wiktorowicz, Quintan (Ed.) (2004): Islamic Activism: A Social Movement Theory Approach. (Indiana Series in Middle East Studies). Bloomington: Indiana University Press.

Wilson, Alyson G.; Wilson, Gregory D.; Olwell, David H. (Eds.) (2006): Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication. New York: Springer.

Yang, Christopher C. et al. (Eds.) (2007): Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007: Proceedings. (Lecture Notes in Computer Science, Vol. 4430). Berlin: Springer.

Theses

Aliozi, Zoi (2013, March): Ti Esti State-Terrorism: Critical Terrorism Studies and Human Rights: Philosophy and Law. (Doctoral Dissertation, Libera Università Internazionale degli Studi Sociali Guido Carli di Roma, Rome, Italy). URL: http://eprints.luiss.it/1234/1/20130603-aliozi.pdf

Bowie, Neil Gordon (2012): The Application of Database Technologies to the Study of Terrorism and Counter-Terrorism: A Post 9/11 Analysis. (Doctoral Dissertation, University of St Andrews, St Andrews, United Kingdom). URL: http://research-repository.st-andrews.ac.uk/handle/10023/3641

Buragohain, Monmi (2005, December): Studying Media and Terrorism: An Analysis of Mass Communication Literature from 1970 through 2005. (Master's Thesis, California State University, Fresno, United States). Available from ProQuest Dissertations and Theses database. (UMI No. 1435139)

Lawrence, Dennis (2010): Contemporary Issues in Terrorism Studies: Root Causes of Suicide Bombing, Rehabilitation of Islamic Fundamentalists, and Gender Specific Motivators of Female Suicide Bombers. (Master's Thesis, Johns Hopkins University, Baltimore, United States).

O'Farrell, Patrick D. (2008): Can Military Research Keep Pace with Terrorism: The Role of Innovation in U.S. Military Research. (Doctoral Dissertation, Capella University, Minnesota, United States). Available from ProQuest Dissertations and Theses database. (UMI No. 3324732)

Raphael, Sam (2010): Terrorism Studies, the United States and Terrorist Violence in the Global South. (Doctoral Dissertation, King's College, London, United Kingdom).

Reid, Edna F. (1983). An Analysis of Terrorism Literature: A Bibliometric and Content Analysis Study. (Doctoral Dissertation, School of Library and Information Management, University of Southern California, Los Angeles, United States). Available from ProQuest Dissertations and Theses database. (UMI No. 0552219)

Sowerby, Catherine Ann (2008): Responses to Terrorism in a European Context: An Application of Q Methodology. (Doctoral Dissertation, Keele University, Keele, United Kingdom). Available from ProQuest Dissertations and Theses database. (UMI No. U494360)

Stampnitzky, Lisa Rachel (2008): Disciplining an Unruly Field: Terrorism Studies and the State, 1972-2001. (Doctoral Dissertation, University of California, Berkeley, United States). Available from ProQuest Dissertations and Theses database. (UMI No. 3353231)

Sun, Qiankun (2008, October): Statistical Modelling and Inference for Multiple Temporal or Spatial Cluster Detection. (Doctoral Dissertation, Rutgers University, New Brunswick, United States). URL: http://rucore.libraries.rutgers.edu/rutgers-lib/24970/

Zekulin, Michael G. (2012): A Growing Disconnect: Can the Contemporary Terrorism Literature Explain Domestic Homegrown Terrorism? (Doctoral Dissertation, University of Calgary, Calgary, Canada). Available from ProQuest Dissertations and Theses database. (UMI No. NR91075)

Journal Articles and Book Chapters

Abelson, Donald E. (2014, January): Old World, New World: The Evolution and Influence of Foreign Affairs Think-Tanks. International Affairs, 90(1), 125-142. DOI: http://dx.doi.org/10.1111/1468-2346.12099

Abuza, Zachary (2013): Researching Militant Groups in Southeast Asia. In: Adam Dolnik (Ed.): Conducting Terrorism Field Research: A Guide. (Contemporary Terrorism Studies). Abingdon: Routledge, 158-168.

Ackerman, Gary (2009): Defining Knowledge Gaps within CBRN Terrorism Research. In: Magnus Ranstorp; Magnus Normark (Eds.): Unconventional Weapons and International Terrorism: Challenges and New Approaches. (Political Violence). Abingdon: Routledge, 13-26.

Ackerman, Gary (2012): WMD Terrorism Research: Whereto from here? In: John Horgan; Kurt Braddock (Eds.): Terrorism Studies: A Reader. Abingdon: Routledge, 389-391.

Ahmed, Syed Toufeeq; Bhindwale, Ruchi; Davulcu, Hasan (2009): Tracking Terrorism News Threads by Extracting Event Signatures. In: Institute of Electrical and Electronics Engineers (IEEE) (Ed.): IEEE International Conference on Intelligence and Security Informatics, ISI 2009, Dallas, Texas, USA, June 8-11, 2009: Proceedings. Atlanta: IEEE, 182-184. DOI: http://dx.doi.org/10.1109/ISI.2009.5137296

Alexander, Dean C. (2011): Student Projects Involving the Analysis of Web Sites of Extremist and Extremist-Affiliated Groups in the United States. Journal of Applied Security Research, 6(2), 184-195. DOI: http://dx.doi.org/10.1080/19361610.2011.552004

Al Raffie, Dina (2013): Social Identity Theory for Investigating Islamic Extremism in the Diaspora. Journal of Strategic Security, 6(4), 67-91. URL: http://scholarcommons.usf.edu/jss/vol6/iss4/4/

Altier, Mary Beth; Horgan, John; Thoroughgood, Christian (2012): In their own Words? Methodological Considerations in the Analysis of Terrorist Autobiographies. Journal of Strategic Security, 5(4), 85-98. URL: http://scholarcommons.usf.edu/jss/vol5/iss4/11/

Arce, Daniel G.; Croson, Rachel T. A.; Eckel, Catherine C. (2011, May): Terrorism Experiments. Journal of Peace Research, 48(3), 373-382. DOI: http://dx.doi.org/10.1177/0022343310391502 

Ariely, Gil (2008): Knowledge Management, Terrorism, and Cyber Terrorism. In: Lech J. Janczewski; Andrew M. Colarik (Eds.): Cyber Warfare and Cyber Terrorism. Hershey: IGI Global, 7-16. DOI: http://dx.doi.org/10.4018/978-1-59140-991-5.ch002

Asal, Victor; Rethemeyer, R. Karl (2006): Researching Terrorist Networks. Journal of Security Education, 1(4), 65-74. DOI: http://dx.doi.org/10.1300/J460v01n04_06

Bahgat, Karim; Medina, Richard M. (2013, February): An Overview of Geographical Perspectives and Approaches in Terrorism Research. Perspectives on Terrorism, 7 (1), 38-72. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/242

Banks, David L. (2006): Biometric Authentication. In: Alyson G. Wilson; Gregory D. Wilson; David H. Olwell (Eds.): Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication. New York: Springer, 43-46.

Banks, David L.; Anderson, Steven (2006): Combining Game Theory and Risk Analysis in Counterterrorism: A Smallpox Example. In: Alyson G. Wilson; Gregory D. Wilson; David H. Olwell (Eds.): Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication. New York: Springer, 9-22.

Barker, Gary C. (2013): Analysis of Research Publications that Relate to Bioterrorism and Risk Assessment. Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science, 11(S1), S124-S133. DOI: http://dx.doi.org/10.1089/bsp.2013.0019

Bergesen, Albert J.; Han, Yi (2005, April): New Directions for Terrorism Research. International Journal of Comparative Sociology, 46 (1-2), 133-151. DOI: http://dx.doi.org/10.1177/0020715205054474

Berman, Eli (2009): Response to Adrian Guelke. Critical Studies on Terrorism, 2 (2), 325-326. DOI:  http://dx.doi.org/10.1080/17539150903024831

Bermingham, Adam et al. (2009): Combining Social Network Analysis and Sentiment Analysis to Explore the Potential for Online Radicalisation. In: Institute of Electrical and Electronics Engineers (IEEE) (Ed.): ASONAM 2009: Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 20-22 July, 2009, Athens, Greece. Los Alamitos: IEEE Computer Society Conference Publishing Services (CPS), 231-236. DOI: http://dx.doi.org/10.1109/ASONAM.2009.31 URL: http://doras.dcu.ie/4554/3/DCU_asonam09.pdf

Bier, Vicki (2006): Game-Theoretic and Reliability Methods in Counterterrorism and Security. In: Alyson G. Wilson; Gregory D. Wilson; David H. Olwell (Eds.): Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication. New York: Springer, 23-42.

Black, Nathan (2013, November): When have Violent Civil Conflicts Spread? Introducing a Dataset of Substate Conflict Contagion. Journal of Peace Research, 50(6), 751-759. DOI: http://dx.doi.org/10.1177/0022343313493634

Blackbourn, Jessie et al. (2013): Editor’s Introduction: A Decade on from 11 September 2001: What has Critical Terrorism Studies Learned? In: David Miller et al. (Eds.): Critical Terrorism Studies since 11 September 2001: What has been Learned? Abingdon: Routledge, 1-10.

Blakeley, Ruth (2007, September): Bringing the State Back into Terrorism Studies. European Political Science, 6(3), 228-235. DOI: http://dx.doi.org/10.1057/palgrave.eps.2210139

Blakeley, Ruth (2008): The Elephant in the Room: A Response to John Horgan and Michael J. Boyle. Critical Studies on Terrorism, 1 (2), 151-165. DOI: http://dx.doi.org/10.1080/17539150802184561 URL: http://kar.kent.ac.uk/11950/1/The%20Elephant%20in%20the%20Room%20final%20%5BBlakeley%5D%20Author%27s%20Post-Print%20Version%20for%20KAR.pdf

Blakeley, Ruth (2010): State Terrorism in the Social Sciences: Theories, Methods and Concepts. In: Richard Jackson; Eamon Murphy; Scott Poynting (Eds.): Contemporary State Terrorism: Theory and Practice. (Critical Terrorism Studies). Abingdon: Routledge, 12-27.

Boell, Sebastian K.; Cecez-Kecmanovic, Dubravka (2010, June): Literature Reviews and the Hermeneutic Circle. Australian Academic & Research Libraries, 41 (2), 129-144. DOI: http://dx.doi.org/10.1080/00048623.2010.10721450

Boell, Sebastian K.; Cecez-Kecmanovic, Dubravka (2014): A Hermeneutic Approach for Conducting Literature Reviews and Literature Searches. Communications of the Association for Information Systems, 34, Article 12. Available at: http://aisel.aisnet.org/cais/vol34/iss1/12

Bokhari, Laila (2013): Face to Face with my Case Study. In: Adam Dolnik (Ed.): Conducting Terrorism Field Research: A Guide. (Contemporary Terrorism Studies). Abingdon: Routledge, 91-102.

Booth, Ken (2008): The Human Faces of Terror: Reflections in a Cracked Looking-Glass. Critical Studies on Terrorism, 1(1), 65-79. DOI: http://dx.doi.org/10.1080/17539150701879816

Bowie, Neil G.; Schmid, Alex P. (2011): Databases on Terrorism. In: Alex P. Schmid (Ed.): The Routledge Handbook of Terrorism Research. Abingdon: Routledge, 294-340.

Boyle, Michael J. (2012): Progress and Pitfalls in the Study of Political Violence. Terrorism and Political Violence, 24 (4), 527-543. DOI: http://dx.doi.org/10.1080/09546553.2012.700608

Brandon, Susan E. (2011, September): Impacts of Psychological Science on National Security Agencies Post-9/11. American Psychologist, 66 (6), 495-506. DOI: http://dx.doi.org/10.1037/a0024818

Breen, Gerald-Mark (2008): Examining Existing Counter-Terrorism Tactics and Applying Social Network Theory to Fight Cyberterrorism: An Interpersonal Communication Perspective. Journal of Applied Security Research, 3 (2), 191-204. DOI: http://dx.doi.org/10.1080/19361610802135888

Breen Smyth, Marie (2007, September): A Critical Research Agenda for the Study of Political Terror. European Political Science,  6 (3), 260-267. DOI: http://dx.doi.org/10.1057/palgrave.eps.2210138

Breen Smyth, Marie (2009): Subjectivities, “Suspect Communities”, Governments, and the Ethics of Research on “Terrorism”. In: Richard Jackson; Marie Breen Smyth; Jeroen Gunning (Eds.): Critical Terrorism Studies: A New Research Agenda. (Critical Terrorism Studies). Abingdon: Routledge, 194-215.

Breen Smyth, Marie et al. (2008): Critical Terrorism Studies: An Introduction. Critical Studies on Terrorism, 1(1), 1-4. DOI: http://dx.doi.org/10.1080/17539150701868538

Breen Smyth, Marie et al. (2008): Editors’ Introduction: Negotiating Stormy Waters. Critical Studies on Terrorism, 1 (2), 145-149. DOI: http://dx.doi.org/10.1080/17539150802184538

Brooks, Risa (2009): Researching Democracy and Terrorism: How Political Access Affects Militant Activity. Security Studies, 18 (4), 756-788. DOI: http://dx.doi.org/10.1080/09636410903369027 URL: http://cpost.uchicago.edu/pdf/Brooks.pdf

Bullis, Daryl R.; Irving, Richard D. (2013, March): Journals Supporting Terrorism Research: Identification and Investigation into their Impact on the Social Sciences. College & Research Libraries, 74(2), 119-129. URL: http://crl.acrl.org/content/74/2/119.abstract

Burke, Anthony (2008): The End of Terrorism Studies. Critical Studies on Terrorism, 1 (1), 37-49. DOI: http://dx.doi.org/10.1080/17539150701848241

Burr, Tom et al. (2006): Statistical Evaluation of the Impact of Background Suppression on the Sensitivity of Passive Radiation Detectors. In: Alyson G. Wilson; Gregory D. Wilson; David H. Olwell (Eds.): Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication. New York: Springer, 263-280.

Cameron, Gavin (2004): Weapons of Mass Destruction Terrorism Research: Past and Future. In: Andrew Silke (Ed.): Research on Terrorism: Trends, Achievements & Failures. (Cass Series on Political Violence). London: Frank Cass, 72-90.

Carey, Sabine C.; Mitchell, Neil J.; Lowe, Will (2013, March): States, the Security Sector, and the Monopoly of Violence: A New Database on Pro-Government Militias. Journal of Peace Research, 50 (2), 249-258. DOI: http://dx.doi.org/10.1177/0022343312464881 URL: http://www.sowi.uni-mannheim.de/militias/wp-content/uploads/2011/05/Carey-Mitchell-Lowe-20121.pdf

Carter, David B. (2012, October): Terrorist Group and Government Interaction: Progress in Empirical Research. Perspectives on Terrorism, 6 (4-5), 108-124. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/219

Chasdi, Richard J. (2012, August): Trends and Developments in Terrorism: A Research Note. Perspectives on Terrorism, 6 (3), 67-76. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/chasdi-trends-and-developments/

Chasdi, Richard J. (2012, December): Research Note: Terrorism in Northwestern Africa: Mali, Mauretania, and Algeria: What START’s Quantitative Data (1970-2011) Can and Cannot Tell Us. Perspectives on Terrorism, 6(6), 89-103. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/233

Chasdi, Richard J. (2013, December): Risks of Terrorism, Homicide and Illness: A Methodological Consideration. Perspectives on Terrorism, 7 (6), 126-136. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/316

Chen, Hsinchun et al. (Eds.) (2011, March): Special Issue on Terrorism Informatics. [Special Issue]. Information Systems Frontiers, 13 (1).

Clutterbuck, Lindsay; Warnes, Richard (2013): Interviewing Government and Official Sources: An Introductory Guide. In: Adam Dolnik (Ed.): Conducting Terrorism Field Research: A Guide. (Contemporary Terrorism Studies). Abingdon: Routledge, 15-25.

Crelinsten, Ronald D. (2007): Counterterrorism as Global Governance: A Research Inventory. In: Magnus Ranstorp (Ed.): Mapping Terrorism Research: State of the Art, Gaps and Future Direction. (Political Violence). Abingdon: Routledge, 210-235.

Crenshaw, Martha (1992): Current Research on Terrorism: The Academic Perspective. Studies in Conflict & Terrorism, 15 (1), 1-11. DOI: http://dx.doi.org/10.1080/10576109208435887

Cronin, Audrey Kurth (2009): Conception, Criticism, Contribution: Advancing the Research Agenda. Critical Studies on Terrorism, 2 (2), 359-360. DOI: http://dx.doi.org/10.1080/17539150903025077

Cunningham, David E.; Skrede Gleditsch, Kristian; Salehyan, Idean (2013, November): Non-State Actors in Civil Wars: A New Dataset. Conflict Management and Peace Science, 30 (5), 516-531. DOI: http://dx.doi.org/10.1177/0738894213499673

Czwarno, Monica (2006) Misjudging Islamic Terrorism: The Academic Community’s Failure to Predict 9/11. Studies in Conflict & Terrorism, 29(7), 657-678. DOI: http://dx.doi.org/10.1080/10576100600702014

Dalacoura, Katerina (2009): Middle East Area Studies and Terrorism Studies: Establishing Links via a Critical Approach. In: Richard Jackson; Marie Breen Smyth; Jeroen Gunning (Eds.): Critical Terrorism Studies: A New Research Agenda. (Critical Terrorism Studies). Abingdon: Routledge, 124-137.

Damphousse, Kelly R.; Smith, Brent L. (2004): Terrorism and Empirical Testing: Using Indictment Data to Assess Changes in Terrorist Conduct. In: Mathieu Deflem (Ed.): Terrorism and Counter-Terrorism: Criminological Perspectives. (Sociology of Crime, Law and Deviance, Vol. 5). Bingley: Emerald, 75-90.

Dang, Yan et al. (2009, July): Arizona Literature Mapper: An Integrated Approach to Monitor and Analyze Global Bioterrorism Research Literature. Journal of the American Society for Information Science and Technology, 60 (7), 1466-1485. DOI: http://dx.doi.org/10.1002/asi.21077 URL: http://ai.arizona.edu/intranet/papers/AZLM_JASIST_2009.pdf

Davis, Paul K. (2012): Toward an Analytic Basis for Influence Strategy in Counterterrorism. In: Andreas Wenger; Alex Wilner (Eds.): Deterring Terrorism: Theory and Practice. (Stanford Security Studies). Stanford: Stanford University Press, 67-94.

Deflem, Mathieu (2004): Introduction: Towards a Criminological Sociology of Terrorism and Counter-Terrorism. In: Mathieu Deflem (Ed.): Terrorism and Counter-Terrorism: Criminological Perspectives. (Sociology of Crime, Law and Deviance, Vol. 5). Bingley: Emerald, 1-8.

della Porta, Donatella (2008, September): Research on Social Movements and Political Violence. Qualitative Sociology, 31(3), 221-230. DOI: http://dx.doi.org/10.1007/s11133-008-9109-x

de Nelson, Sonia Ambrosio (2008, October): Understanding the Press Imaging of "Terrorist": A Pragmatic Visit to the Frankfurt School. International Communication Gazette, 70(5), 325-337. DOI: http://dx.doi.org/10.1177/1748048508094288

Der Derian, James (2004, June): 9/11 and its Consequences for the Discipline. Zeitschrift für Internationale Beziehungen, 11(1), 89-100. URL: http://www.zib.nomos.de/fileadmin/zib/doc/ZIB_1_2004.pdf

Dixit, Priya; Stump, Jacob L. (2011): A Response to Jones and Smith: It's not as Bad as it Seems; Or, Five Ways to Move Critical Terrorism Studies Forward. Studies in Conflict & Terrorism, 34 (6), 501-511. DOI: http://dx.doi.org/10.1080/1057610X.2011.571195

Dolnik, Adam (2011, May): Conducting Field Research on Terrorism: A Brief Primer. Perspectives on Terrorism, 5 (2), 3-35. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/dolnik-conducting-field-research

Dolnik, Adam (2013): Introduction: The Need for Field Research on Terrorism. In: Adam Dolnik (Ed.): Conducting Terrorism Field Research: A Guide. (Contemporary Terrorism Studies). Abingdon: Routledge, 1-12.

Dolnik, Adam (2013): Up Close and Personal: Conducting Field Research on Terrorism in Conflict Zones. In: Adam Dolnik (Ed.): Conducting Terrorism Field Research: A Guide. (Contemporary Terrorism Studies). Abingdon: Routledge, 224-250.

Drakos, Konstantinos; Gofas, Andreas (2006, October): The Devil You Know but are Afraid to Face: Underreporting Bias and its Distorting Effects on the Study of Terrorism. Journal of Conflict Resolution, 50 (5), 714-735. DOI: http://dx.doi.org/10.1177/0022002706291051

Dubinin, E. F.; Kuksova, V. I.; Petrov, V. P. (2012): Principles for Creating of Monitoring, Diagnostics and Protection Systems in the View of Potential Terrorist Attacks. In: Nikolay A. Makhutov; Gregory B. Baecher (Eds.): Comparative Analysis of Technological and Intelligent Terrorism Impacts on Complex Technical Systems. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 102). Amsterdam: IOS Press, 93-104. DOI: http://dx.doi.org/10.3233/978-1-61499-131-1-93

Duyvesteyn, Isabelle (2007): The Role of History and Continuity in Terrorism Research. In: Magnus Ranstorp (Ed.): Mapping Terrorism Research: State of the Art, Gaps and Future Direction. (Political Violence). Abingdon: Routledge, 51-75.

Egerton, Frazer (2009, March): A Case for a Critical Approach to Terrorism, 8 (1), 57-67. DOI: http://dx.doi.org/10.1057/eps.2008.47

Enders, Walter; Sandler, Todd (2004): What do we Know about the Substitution Effect in Transnational Terrorism? In: Andrew Silke (Ed.): Research on Terrorism: Trends, Achievements & Failures. (Cass Series on Political Violence). London: Frank Cass, 119-137.

English, Richard (2009): The Future of Terrorism Studies. Critical Studies on Terrorism, 2 (2), 377-382. DOI: http://dx.doi.org/10.1080/17539150903025119

Erlenbusch, Verena (2013): How (not) to Study Terrorism. Critical Review of International Social and Political Philosophy. Advance Online Publication. DOI: http://dx.doi.org/10.1080/13698230.2013.767040

Everton, Sean F.; Cunningham, Dan (2013): Detecting Significant Changes in Dark Networks. Behavioral Sciences of Terrorism and Political Aggression, 5(2), 94-114. DOI: http://dx.doi.org/10.1080/19434472.2012.725225

Fishman, Brian and James J.F. Forest. (2009): WMD and the Four Dimensions of Al-Qa’ida. In: , Magnus Ranstorp and Magnus Normark (Eds) Unconventional Weapons and International Terrorism: Challenges and New Approaches. London: Routledge, p. 29-49.

Flint, Colin (2003): Terrorism and Counterterrorism: Geographic Research Questions and Agendas.  The Professional Geographer, 55 (2), 161-169. DOI: http://dx.doi.org/10.1111/0033-0124.5502004

Forest, James J.F. (2009): Terrorism as a Product of Choices and Perceptions. In: Russell D. Howard and Bruce Hoffman (Eds.) Terrorism and Counterterrorism (4th Edition). New York: McGraw-Hill, p. 110-139.

Forest, James J. F. (2007): An Introduction to the Comparative Study of Counterterrorism. In: James J. F. Forest (Ed.): Countering Terrorism and Insurgency in the 21st Century: International Perspectives. (Vol. 3: Lessons from the Fight against Terrorism). Westport: Praeger Security International, 1-10.

Forsberg, Laura et al. (2006): A Spatiotemporal Analysis of Syndromic Data for Biosurveillance. In: Alyson G. Wilson; Gregory D. Wilson; David H. Olwell (Eds.): Statistical Methods in Counterterrorism: Game Theory, Modelling, Syndromic Surveillance, and Biometric Authentication. New York: Springer, 173-194.

Franks, Jason (2009): Rethinking the Roots of Terrorism: Beyond Orthodox Terrorism Theory: A Critical Research Agenda. Global Society, 23 (2), 153-176. DOI: http://dx.doi.org/10.1080/13600820902766219

Fricker, Ronald D., Jr. (2006): Game Theory in an Age of Terrorism: How Can Statisticians Contribute? In: Alyson G. Wilson; Gregory D. Wilson; David H. Olwell (Eds.): Statistical Methods in Counterterrorism: Game Theory, Modelling, Syndromic Surveillance, and Biometric Authentication. New York: Springer, 3-8. URL: http://faculty.nps.edu/rdfricke/docs/Fricker%2014.pdf

Fridlund, Mats; Nelhans, Gustaf (2011, September 10): Science and the “The 9/11 Effect”: The Mutual Shaping of Terrorism, National Security, and Scientific Research during the Last Ten Years. Science Progress. URL: http://scienceprogress.org/2011/09/science-and-the-the-911-effect/

Gentry, Caron (2004): The Relationship between New Social Movement Theory and Terrorism Studies: The Role of Leadership, Membership, Ideology and Gender. Terrorism and Political Violence, 16 (2), 274-293. DOI: http://dx.doi.org/10.1080/09546550490483422

Gill, Paul (2012, August): Assessing Contemporary Trends and Future Prospects in the Study of the Suicide Bomber. Negotiation and Conflict Management Research, 5(3), 239-252. DOI: http://dx.doi.org/10.1111/j.1750-4716.2012.00101.x

Giroux, Jennifer; Burgherr, Peter; Melkunaite, Laura (2013, December): Research Note on the Energy Infrastructure Attack Database (EIAD). Perspectives on Terrorism, 7 (6), 113-125. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/315

Göl, Ayla (2011): Developing a Critical Pedagogy of “Research-Based” Teaching in Islamic Studies.  Critical Studies on Terrorism, 4 (3), 431-440. DOI: http://dx.doi.org/10.1080/17539153.2011.623421

Gordon, Avishag (1995): Terrorism and Computerized Databases: An Examination of Multidisciplinary Coverage. Terrorism and Political Violence, 7 (4), 171-177. DOI: http://dx.doi.org/10.1080/09546559508427323

Gordon, Avishag (1996): Research Note: Terrorism and Science, Technology and Medicine Databases: New Concepts and Terminology. Terrorism and Political Violence, 8 (1), 167-173. DOI: http://dx.doi.org/10.1080/09546559608427338

Gordon, Avishag (1998): The Spread of Terrorism Publications: A Database Analysis. Terrorism and Political Violence, 10 (4), 190-193. DOI: http://dx.doi.org/10.1080/09546559808427488

Gordon, Avishag (1999): Terrorism Dissertations and the Evolution of a Specialty: An Analysis of Meta‐Information. Terrorism and Political Violence, 11 (2), 141-150. DOI: http://dx.doi.org/10.1080/09546559908427510

Gordon, Avishag (2001): Terrorism and the Scholarly Communication System. Terrorism and Political Violence, 13 (4), 116-124. DOI: http://dx.doi.org/10.1080/09546550109609702

Gordon, Avishag (2004): Terrorism and Knowledge Growth: A Databases and Internet Analysis. In: Andrew Silke (Ed.): Research on Terrorism: Trends, Achievements & Failures. (Cass Series on Political Violence). London: Frank Cass, 104-118.

Gordon, Avishag (2004): The Effect of Database and Website Inconstancy on the Terrorism Field's Delineation. Studies in Conflict & Terrorism, 27 (2), 79-88. DOI: http://dx.doi.org/10.1080/10576100490275076

Gordon, Avishag (2005): Terrorism as an Academic Subject after 9/11: Searching the Internet Reveals a Stockholm Syndrome Trend. Studies in Conflict & Terrorism, 28 (1), 45-59. DOI: http://dx.doi.org/10.1080/10576100590524339

Gordon, Avishag (2005, March): The Peripheral Terrorism Literature: Bringing it Closer to the Core. Scientometrics, 62 (3), 403-414. DOI: http://dx.doi.org/10.1007/s11192-005-0030-8

Gordon, Avishag (2005, October): Homeland Security Literature in Relation to Terrorism Publications: The Source and the Response. Scientometrics, 65 (1), 55-65. DOI: http://dx.doi.org/10.1007/s11192-005-0259-2 URL: http://api.ning.com/files/zZKTTHwYtUDglHJnG0kOQigkKAQWyzPCX-ZA5VjXeTEejYO0VR8PHyo5xsIm8GDoQxNxCFwYPU3rDD*bhGvEl9Pugt1ANR2z/HSScientometrics.pdf

Gordon, Avishag (2007, August): Transient and Continuant Authors in a Research Field: The Case of Terrorism. Scientometrics, 72 (2), 213-224. DOI: http://dx.doi.org/10.1007/s11192-007-1714-z

Gordon, Avishag (2010): Can Terrorism Become a Scientific Discipline? A Diagnostic Study. Critical Studies on Terrorism, 3 (3), 437-458. DOI: http://dx.doi.org/10.1080/17539153.2010.521644

Guelke, Adrian (2008): Great Whites, Paedophiles and Terrorists: The Need for Critical Thinking in a New Age of Fear. Critical Studies on Terrorism, 1 (1), 17-25. DOI: http://dx.doi.org/10.1080/17539150701846476

Gunning, Jeroen (2007, Summer): A Case for Critical Terrorism Studies? Government and Opposition, 42 (3), 363-393. DOI: http://dx.doi.org/10.1111/j.1477-7053.2007.00228.x

Gunning, Jeroen (2007, September): Babies and Bathwaters: Reflecting on the Pitfalls of Critical Terrorism Studies. European Political Science, 6 (3), 236-243. doi: http://dx.doi.org/10.1057/palgrave.eps.2210144

Gunning, Jeroen (2009): Social Movement Theory and the Study of Terrorism. In: Richard Jackson; Marie Breen Smyth; Jeroen Gunning (Eds.): Critical Terrorism Studies: A New Research Agenda. (Critical Terrorism Studies). Abingdon: Routledge, 156-177.

Gupta, Dipak K. (2006): Tyranny of Data: Going beyond Theories. In: Jeff Victoroff (Ed.): Tangled Roots: Social and Psychological Factors in the Genesis of Terrorism. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 11). Amsterdam: IOS Press, 37-50.

Guzzini, Stefano (2004, June): In den IB nichts Neues? Der 11. September und die Rollenverständnisse der Disziplin. Zeitschrift für Internationale Beziehungen, 11(1), 135-146. URL: http://www.zib.nomos.de/fileadmin/zib/doc/ZIB_1_2004.pdf

Hansen, James V. et al. (2007, August): Genetic Programming for Prevention of Cyberterrorism through Dynamic and Evolving Intrusion Detection. Decision Support Systems, 43 (4), 1362- 1374. DOI: http://dx.doi.org/10.1016/j.dss.2006.04.004

Hassan, Muhammad Haniff; Mohamed, Zulkifli (2012, December): Research Note: Inside an Indonesian Online Library for Radical Materials. Perspectives on Terrorism, 6 (6), 74-89. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/232

Hayden, Nancy K. (2007): The Complexity of Terrorism: Social and Behavioral Understanding – Trends for the Future. In: Magnus Ranstorp (Ed.): Mapping Terrorism Research: State of the Art, Gaps and Future Direction. (Political Violence). Abingdon: Routledge, 292-315.

Heath-Kelly, Charlotte (2010, June): Critical Terrorism Studies, Critical Theory and the “Naturalistic Fallacy”. Security Dialogue, 41 (3), 235-254. DOI: http://dx.doi.org/10.1177/0967010610370227

Heller, Regina; Kahl, Martin (2013): Tracing and Understanding “Bad” Norm Dynamics in Counterterrorism: The Current Debates in IR Research. Critical Studies on Terrorism, 6 (3), 414-428. DOI: http://dx.doi.org/10.1080/17539153.2013.836305

Heller, Regina; Kahl, Martin; Pisoiu, Daniela (2013): Editors’ Introduction: The “Dark” Side of Normative Argumentation in Counterterrorism: An Emerging Research Field. Critical Studies on Terrorism, 6 (3), 410-413. DOI: http://dx.doi.org/10.1080/17539153.2013.836304

Herring, Eric (2008): Critical Terrorism Studies: An Activist Scholar Perspective. Critical Studies on Terrorism, 1 (2), 197-211. DOI: http://dx.doi.org/10.1080/17539150802187507 URL: http://www.bristol.ac.uk/spais/research/workingpapers/wpspaisfiles/herring0308.pdf

Hoffman, Bruce (1992): Current Research on Terrorism and Low‐Intensity Conflict. Studies in Conflict & Terrorism, 15(1), 25-37. DOI: http://dx.doi.org/10.1080/10576109208435889

Hogenboom, Karen (2008, January): Lessons Learned about Access to Government Information after World War II can be Applied after September 11. Government Information Quarterly, 25 (1), 90-103. DOI: http://dx.doi.org/10.1016/j.giq.2007.08.002

Horgan, John (2004): The Case for Firsthand Research. In: Andrew Silke (Ed.): Research on Terrorism: Trends, Achievements & Failures. (Cass Series on Political Violence). London: Frank Cass, 30-56.

Horgan, John (2006): Understanding Terrorism: Old Assumptions, New Assertions, and Challenges for Research. In: Jeff Victoroff (Ed.): Tangled Roots: Social and Psychological Factors in the Genesis of Terrorism. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 11). Amsterdam: IOS Press, 74-84.

Horgan, John (2012): Interviewing the Terrorists: Reflections on Fieldwork and Implications for Psychological Research. Behavioral Sciences of Terrorism and Political Aggression, 4 (3), 195-211. DOI: http://dx.doi.org/10.1080/19434472.2011.594620

Horgan, John (2013): Interviewing the Terrorists: Reflections on Fieldwork and Implications for Psychological Research. In: Adam Dolnik (Ed.): Conducting Terrorism Field Research: A Guide. (Contemporary Terrorism Studies). Abingdon: Routledge, 187-205.

Horgan, John; Boyle, Michael J. (2008): A Case against “Critical Terrorism Studies”. Critical Studies on Terrorism, 1 (1), 51-64. DOI: http://dx.doi.org/10.1080/17539150701848225

Horgan, John; Taylor, Max (2011): Disengagement, De-Radicalization and the Arc of Terrorism: Future Directions for Research. In: Rik Coolsaet (Ed.): Jihadi Terrorism and the Radicalisation Challenge: European and American Experiences. (2nd ed.). Farnham: Asghate, 173-186.

Horne, Cale; Horgan, John (2012): Methodological Triangulation in the Analysis of Terrorist Networks. Studies in Conflict & Terrorism, 35 (2), 182-192. DOI: http://dx.doi.org/10.1080/1057610X.2012.639064

Hu, Daning; Kaza, Siddharth; Chen, Hsinchun (2009, April): Identifying Significant Facilitators of Dark Network Evolution. Journal of the American Society for Information Science and Technology, 60 (4), 655-665. DOI: http://dx.doi.org/10.1002/asi.21008 URL: http://ai.arizona.edu/intranet/papers/Hu2009.pdf

Hülsse, Rainer; Spencer, Alexander (2008, December): The Metaphor of Terror: Terrorism Studies and the Constructivist Turn. Security Dialogue, 39 (6), 571-592. DOI: http://dx.doi.org/10.1177/0967010608098210 URL: http://www.tcnj.edu/~library/e-reserve/sullivan/SULLIVANPOL2309.pdf

Ilardi, Gaetano Joe (2004): Redefining the Issues: The Future of Terrorism Research and the Search for Empathy. In: Andrew Silke (Ed.): Research on Terrorism: Trends, Achievements & Failures. (Cass Series on Political Violence). London: Frank Cass, 214-228.

Jackson, Brian A.; Bikson, Tora K.; Gunn, Patrick P. (2013, April): Human Subjects Protection and Research on Terrorism and Conflict. Science, 340 (6131), 434-435. DOI: http://dx.doi.org/10.1126/science.1231747 

Jackson, Richard (2007, Summer): Constructing Enemies: “Islamic Terrorism” in Political and Academic Discourse. Government and Opposition, 42 (3), 394-426. DOI: http://dx.doi.org/10.1111/j.1477-7053.2007.00229.x

Jackson, Richard (2007, September): Introduction: The Case for Critical Terrorism Studies. European Political Science, 6 (3), 225-227. DOI: http://dx.doi.org/10.1057/palgrave.eps.2210140 URL: http://cadair.aber.ac.uk/dspace/bitstream/handle/2160/1950/EPS-Intro.pdf

Jackson, Richard (2007, September): The Core Commitments of Critical Terrorism Studies. European Political Science, 6 (3), 244-251. DOI: http://dx.doi.org/10.1057/palgrave.eps.2210141

Jackson, Richard (2008): The Ghosts of State Terror: Knowledge, Politics and Terrorism Studies. Critical Studies on Terrorism, 1 (3), 377-392. DOI: http://dx.doi.org/10.1080/17539150802515046

Jackson, Richard (2009): Conclusion: Back to the Future of Terrorism Research. Critical Studies on Terrorism, 2 (2), 361-363. DOI: http://dx.doi.org/10.1080/17539150903025085

Jackson, Richard (2009): Knowledge, Power and Politics in the Study of Political Terrorism. In: Richard Jackson; Marie Breen Smyth; Jeroen Gunning (Eds.): Critical Terrorism Studies: A New Research Agenda. (Critical Terrorism Studies). Abingdon: Routledge, 66-84.

Jackson, Richard (2009, May): The Study of Terrorism after 11 September 2001: Problems, Challenges and Future Developments. Political Studies Review, 7 (2), 171-184. DOI: http://dx.doi.org/10.1111/j.1478-9299.2009.00177.x

Jackson, Richard (2010): Conclusion: Contemporary State Terrorism: Towards a New Research Agenda. In: Richard Jackson; Eamon Murphy; Scott Poynting (Eds.): Contemporary State Terrorism: Theory and Practice. (Critical Terrorism Studies). Abingdon: Routledge, 228-239.

Jackson, Richard (2010, Summer): The Study of Terrorism: A New Approach. Arches Quarterly, 4 (6), 92-95. URL: http://counterideology2.files.wordpress.com/2010/10/study-of-terrorism-a-new-approach-jackson.pdf

Jackson, Richard (2011): In Defence of “Terrorism”: Finding a Way through a Forest of Misconceptions. Behavioral Sciences of Terrorism and Political Aggression, 3 (2), 116-130. DOI: http://dx.doi.org/10.1080/19434472.2010.512148

Jackson, Richard (2012, Winter): The Study of Terrorism 10 Years after 9/11: Successes, Issues, Challenges. Uluslararası İlişkiler, 8 (32), 1-16.

Jackson, Richard (2013): Don't Shoot the Mediator: Reply to Stump. Behavioral Sciences of Terrorism and Political Aggression, 5 (3), 225-228. DOI: http://dx.doi.org/10.1080/19434472.2011.629581

Jackson, Richard (2013): Terrorism Studies and Academia. In: Jon Bailes; Cihan Aksan (Eds.): Weapon of the Strong: Conversations on US State Terrorism. London: Pluto Press, 118-131.

Jackson, Richard (2013): Unknown Knowns: The Subjugated Knowledge of Terrorism Studies. In: David Miller et al. (Eds.): Critical Terrorism Studies since 11 September 2001: What has been Learned? Abingdon: Routledge, 11-30.

Jackson, Richard; Breen Smyth, Marie; Gunning, Jeroen (2009): Critical Terrorism Studies: Framing a New Research Agenda. In: Richard Jackson; Marie Breen Smyth; Jeroen Gunning (Eds.): Critical Terrorism Studies: A New Research Agenda. (Critical Terrorism Studies). Abingdon: Routledge, 216-236.

Jackson, Richard; Breen Smyth, Marie; Gunning, Jeroen (2009): Introduction: The Case for Critical Terrorism Studies. In: Richard Jackson; Marie Breen Smyth; Jeroen Gunning (Eds.): Critical Terrorism Studies: A New Research Agenda. (Critical Terrorism Studies). Abingdon: Routledge, 1-10.

Jackson, Richard; Murphy, Eamon; Poynting, Scott (2010): Introduction: Terrorism, the State and the Study of Political Terror. In: Richard Jackson; Eamon Murphy; Scott Poynting (Eds.): Contemporary State Terrorism: Theory and Practice. (Critical Terrorism Studies). Abingdon: Routledge, 1-11.

Jackson, Richard et al. (2011): Part I: The Study of Terrorism. In: Terrorism: A Critical Introduction. Basingstoke: Palgrave Macmillan, 9-98.

Jarvis, Lee (2009, February): The Spaces and Faces of Critical Terrorism Studies. Security Dialogue, 40(1), 5-27. DOI: http://dx.doi.org/10.1177/0967010608100845 URL: http://www.leejarvis.com/wp-content/uploads/2011/11/Jarvis-2009-Spaces-and-Faces-of-Critical-Terrorism-Studies.pdf

Jones, David Martin (2010): What's Wrong with Terrorism Studies? Australian Journal of International Affairs, 64 (4), 478-483. DOI: http://dx.doi.org/10.1080/10357718.2010.490974

Jones, David Martin; Smith, M. L. R. (2009): We're All Terrorists Now: Critical—or Hypocritical—Studies “on” Terrorism? Studies in Conflict & Terrorism, 32 (4), 292-302. DOI: http://dx.doi.org/10.1080/10576100902744128

Jones, David Martin; Smith, M. L. R. (2011): Terrorology and Methodology: A Reply to Dixit and Stump. Studies in Conflict & Terrorism, 34 (6), 512-522. DOI: http://dx.doi.org/10.1080/1057610X.2011.571196

Jongman, Albert J. (Berto) (2007): Research Desiderata in the Field of Terrorism. In: Magnus Ranstorp (Ed.): Mapping Terrorism Research: State of the Art, Gaps and Future Direction. (Political Violence). Abingdon: Routledge, 255-291.

Jongman, Albert J. (Berto) (2011): Introduction to the World Directory of Extremist, Terrorist and other Organisations Associated with Guerrilla Warfare, Political Violence, Protest, Organised Crime and Cyber Crime. In: Alex P. Schmid (Ed.): The Routledge Handbook of Terrorism Research. Abingdon: Routledge, 341-349.

Joseph, Jonathan (2009, March): Critical of What? Terrorism and its Study. International Relations, 23 (1), 93-98. DOI: http://dx.doi.org/10.1177/0047117808100614

Joseph, Jonathan (2011): Terrorism as a Social Relation within Capitalism: Theoretical and Emancipatory Implications. Critical Studies on Terrorism, 4 (1), 23-37. DOI: http://dx.doi.org/10.1080/17539153.2011.553385

Kaplan, Jeffrey (2011): David Rapoport and the Study of Religiously Motivated Terrorism. In: Jean E. Rosenfeld (Ed.): Terrorism, Identity and Legitimacy: The Four Waves Theory and Political Violence. Abingdon: Routledge, 66-84.

Karr, Alan F. et al. (2006): Secure Statistical Analysis of Distributed Databases. In: Alyson G. Wilson; Gregory D. Wilson; David H. Olwell (Eds.): Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication. New York: Springer, 237-262.

Kendall, Arthur (2009): Low Hanging Fruit: Reflections about Studying Terrorism. Behavioral Sciences of Terrorism and Political Aggression, 1 (1), 5-11. DOI: http://dx.doi.org/10.1080/19434470802482092

Kenney, Michael (2013): Learning from the “Dark Side”: Identifying, Accessing and Interviewing Illicit Non-State Actors. In: Adam Dolnik (Ed.): Conducting Terrorism Field Research: A Guide. (Contemporary Terrorism Studies). Abingdon: Routledge, 26-45.

Kharlamova, Ganna (2012): Terrorism: Science Convergence. In: Dan-Radu Voica (Ed.): Trends and Developments in Contemporary Terrorism. (NATO Science for Peace and Security Series - E: Human and Societal Dynamics, Vol. 103). Amsterdam: IOS Press, 77-87. DOI: http://dx.doi.org/10.3233/978-1-61499-150-2-77

Knights, Michael (2013): Conducting Field Research on Terrorism in Iraq. In: Adam Dolnik (Ed.): Conducting Terrorism Field Research: A Guide. (Contemporary Terrorism Studies). Abingdon: Routledge, 103-123.

Knopf, Jeffrey W. (2012): Terrorism and the Fourth Wave in Deterrence Research. In: Andreas Wenger; Alex Wilner (Eds.): Deterring Terrorism: Theory and Practice. (Stanford Security Studies). Stanford: Stanford University Press, 21-45.

Korchenko, Oleksandr; Vasiliu, Yevhen; Gnatyuk, Sergiy (2010): Modern Quantum Technologies of Information Security against Cyber‐Terrorist Attacks. Aviation, 14 (2), 58-69. DOI: http://dx.doi.org/10.3846/aviation.2010.10

Kraft, Michael B.; Marks, Edward (2012): Counterterrorism Research and Development Programs. In: U.S. Government Counterterrorism: A Guide to Who Does What. Boca Raton: CRC Press, 105-114.

Kruglanski, Arie W. (2006): The Psychology of Terrorism: “Syndrome ” versus “Tool” Perspectives. In: Jeff Victoroff (Ed.): Tangled Roots: Social and Psychological Factors in the Genesis of Terrorism. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 11). Amsterdam: IOS Press, 61-73.

Kruglanski, Arie W. et al. (2009, June): Yes, No, and Maybe in the World of Terrorism Research: Reflections on the Commentaries. Political Psychology, 30 (3), 401–417. DOI: http://dx.doi.org/10.1111/j.1467-9221.2009.00705.x URL: http://www.researchgate.net/publication/224092101_Yes_no_and_maybe_in_the_world_of_terrorism_research_Reflections_on_the_commentaries/file/8d1c84f8ebb54499eb.pdf

Kupchan, Charles A. (2004, June): New Research Agenda? Yes. New Paradigm? No. Zeitschrift für Internationale Beziehungen, 11 (1), 101-110. URL: http://www.zib.nomos.de/fileadmin/zib/doc/ZIB_1_2004.pdf

Kurzman, Charles (2004): Conclusion: Social Movement Theory and Islamic Studies. In: Quintan Wiktorowicz (Ed.): Islamic Activism: A Social Movement Theory Approach. (Indiana Series in Middle East Studies). Bloomington: Indiana University Press, 289-304.

LaFree, Gary (2010, March): The Global Terrorism Database (GTD): Accomplishments and Challenges. Perspectives on Terrorism, 4 (1), 24-46. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/89/

LaFree, Gary; Dugan, Laura (2004): How Does Studying Terrorism Compare to Studying Crime?  In: Mathieu Deflem (Ed.): Terrorism and Counter-Terrorism: Criminological Perspectives. (Sociology of Crime, Law and Deviance, Vol. 5). Bingley: Emerald, 53-74.

LaFree, Gary; Dugan, Laura (2007): Introducing the Global Terrorism Database. Terrorism and Political Violence, 19 (2), 181-204. DOI: http://dx.doi.org/10.1080/09546550701246817 URL: http://www.ccjs.umd.edu/sites/ccjs.umd.edu/files/pubs/FTPV_A_224594.pdf

Leipnik, Mark R. (2008): Use of Geographic Information Systems in Cyber Warfare and Cyber Counterterrorism. In: Lech J. Janczewski; Andrew M. Colarik (Eds.): Cyber Warfare and Cyber Terrorism. Hershey: IGI Global, 291-297. DOI: http://dx.doi.org/10.4018/978-1-59140-991-5.ch034

Lemieux, Anthony F. (2006): Social Psychological Approaches to Understanding and Preventing Terrorism: Toward an Interdisciplinary Perspective. Journal of Security Education, 1 (4), 75-83. DOI: http://dx.doi.org/10.1300/J460v01n04_07

Lum, Cynthia; Kennedy, Leslie W.; Sherley, Alison (2008): Is Counter-Terrorism Policy Evidence-Based? What Works, what Harms, and what is Unknown. Psicothema, 20 (1), 35-42. URL: http://www.redalyc.org/pdf/727/72720106.pdf

Lutz, Brenda; Lutz, James M. (2013): Terrorism. In: Alan Collins (Ed.): Contemporary Security Studies. (3rd ed.). Oxford: Oxford University Press, 273-288.

Lutz, James M. (2010, December): A Critical View of Critical Terrorism Studies. Perspectives on Terrorism, 4 (6), 31-40. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/130

Madacki, Saša; Kaljanac, Maja (2009): Research on Terrorism and Bibliometrics: Challenges and Paradoxes in Use of Bibliometric Results. HUMSEC Journal, 3. URL: http://www.humsec.eu/cms/fileadmin/user_upload/humsec/Journal/madacki_final_version.pdf

Makhutov, Nikolay A.; Gadenin, Mikhail M. (2012): Comparative Methods for the Assessment of Threats of Terrorist and Unauthorized Actions. In: Nikolay A. Makhutov; Gregory B. Baecher (Eds.): Comparative Analysis of Technological and Intelligent Terrorism Impacts on Complex Technical Systems. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 102). Amsterdam: IOS Press, 1-11. DOI: http://dx.doi.org/10.3233/978-1-61499-131-1-1

Mampilly, Zachariah Cherian (2011): Rules and Resistance: New Agendas for Studying Insurgency and Governance. In: Rebel Rulers: Insurgent Governance and Civilian Life during War. Ithaca: Cornell University Press, 231-256.

Martinez, Wendy L. (2006): Modelling and Simulation for Defense and National Security. In: Alyson G. Wilson; Gregory D. Wilson; David H. Olwell (Eds.): Statistical Methods in Counterterrorism: Game Theory, Modelling, Syndromic Surveillance, and Biometric Authentication. New York: Springer, 195-198.

Martorella, Georgina (2006): Libraries in the Aftermath of 9/11. The Reference Librarian, 45(94), 109-137. DOI: http://dx.doi.org/10.1300/J120v45n94_08

Matusitz, Jonathan (2009): A Postmodern Theory of Cyberterrorism: Game Theory. Information Security Journal, 18(6), 273-281. DOI: http://dx.doi.org/10.1080/19393550903200474 URL: http://123seminarsonly.com/Seminar-Reports/017/54968058-Cyber-Terrorism-as-GameTheory.pdf

Matusitz, Jonathan; Breen, Gerald-Mark (2011): A Solution-Based Examination of Local, State, and National Government Groups Combating Terrorism and Cyberterrorism. Journal of Human Behavior in the Social Environment, 21(2), 109-129. DOI: http://dx.doi.org/10.1080/10911359.2011.542986

McAllister, Bradley; Schmid, Alex P. (2011): Theories of Terrorism. In: Alex P. Schmid (Ed.): The Routledge Handbook of Terrorism Research. Abingdon: Routledge, 201-271.

McDonald, Matt (2007, September): Emancipation and Critical Terrorism Studies. European Political Science, 6(3), 252-259. DOI: http://dx.doi.org/10.1057/palgrave.eps.2210142

McDonald, Matt (2009): Emancipation and Critical Terrorism Studies. In: Richard Jackson; Marie Breen Smyth; Jeroen Gunning (Eds.): Critical Terrorism Studies: A New Research Agenda. (Critical Terrorism Studies). Abingdon: Routledge, 109-123.

Merari, Ariel (1991): Academic Research and Government Policy on Terrorism. Terrorism and Political Violence, 3 (1), 88-102. DOI: http://dx.doi.org/10.1080/09546559108427094

Michalak, Sarah; Wilson, Gregory (2006): Modelling and Parameterization for a Smallpox Simulation Study. In: Alyson G. Wilson; Gregory D. Wilson; David H. Olwell (Eds.): Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication. New York: Springer, 199-214.

Miller, David; Mills, Tom (2009): The Terror Experts and the Mainstream Media: The Expert Nexus and its Dominance in the News Media. Critical Studies on Terrorism, 2 (3), 414-437. DOI: http://dx.doi.org/10.1080/17539150903306113

Miller, David; Mills, Tom (2011): Introduction: Teaching and Researching Terrorism: Pressures and Practice. Critical Studies on Terrorism, 4 (3), 389-392. DOI: http://dx.doi.org/10.1080/17539153.2011.623410 URL: http://dmiller.info/images/docs/miller%20mills%20teaching%20and%20researching%20terrorism%20-%20pressures%20and%20practice%202011.pdf

Mintz, Alex; Brule, David (2009, June): Methodological Issues in Studying Suicide Terrorism. Political Psychology, 30 (3), 365-371. DOI: http://dx.doi.org/10.1111/j.1467-9221.2009.00700.x URL: http://www.ict.org.il/Portals/0/Articles/Methodological_Issues_for_Political_Psychology.pdf

Mitra, Sinjini (2006): Towards Statistically Rigorous Biometric Authentication Using Facial Images. In: Alyson G. Wilson; Gregory D. Wilson; David H. Olwell (Eds.): Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication. New York: Springer, 47-80.

Moore, Cerwyn (2013): A Practical Guide to Research on Terrorism in the North Caucasus. In: Adam Dolnik (Ed.): Conducting Terrorism Field Research: A Guide. (Contemporary Terrorism Studies). Abingdon: Routledge, 124-139.

Moore, Will H.; Shellman, Stephen M. (2008, October): Conceptualizing a New School of Political Conflict and Terrorism Studies: From Attributes to Behavior and why Policy Makers will Care. Perspectives on Terrorism, 2(12), 3-10. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/58/

Morris, James F.; Deckro, Richard F. (2013): SNA Data Difficulties with Dark Networks. Behavioral Sciences of Terrorism and Political Aggression, 5 (2), 70-93. DOI: http://dx.doi.org/10.1080/19434472.2012.731696

Morris, Nancy A.; Slocum, Lee Ann (2012, March): Estimating Country-Level Terrorism Trends Using Group-Based Trajectory Analyses: Latent Class Growth Analysis and General Mixture Modeling. Journal of Quantitative Criminology, 28 (1), 103-139. DOI: http://dx.doi.org/10.1007/s10940-011-9158-2

Müller, Harald (2004, June): Think Big! Der 11. September und seine Konsequenzen für die Internationalen Beziehungen. Zeitschrift für Internationale Beziehungen, 11 (1), 123-134. URL: http://www.zib.nomos.de/fileadmin/zib/doc/ZIB_1_2004.pdf

Mullins, Sam (2013): Social Network Analysis and Counter-Terrorism: Measures of Centrality as an Investigative Tool. Behavioral Sciences of Terrorism and Political Aggression, 5 (2), 115-136. DOI: http://dx.doi.org/10.1080/19434472.2012.718792

Mullins, Sam (2013): Social Network Analysis and Terrorism: An Introduction to the Special Issue. Behavioral Sciences of Terrorism and Political Aggression, 5 (2), 67-69. DOI: http://dx.doi.org/10.1080/19434472.2012.731697

Naseem, Azra (2012): The Literal Truth about Terrorism: An Analysis of Post-9/11 Popular US Non-Fiction Books on Terrorism. Critical Studies on Terrorism, 5 (3), 455-467. DOI: http://dx.doi.org/10.1080/17539153.2012.723523

Neumann, Peter; Kleinmann, Scott (2013): How Rigorous Is Radicalization Research? Democracy and Security, 9 (4), 360-382. DOI: http://dx.doi.org/10.1080/17419166.2013.802984

Okamoto, Karen; Bladek, Marta (2011): Terrorism: A Guide to Resources. Collection Building, 30 (1), 39-46. DOI: http://dx.doi.org/10.1108/01604951111105005

Omelicheva, Mariya Y. (2007): Counterterrorism: The State of Scholarship, Directions for Future Data Collection and Analysis. Perspectives on Terrorism, 1 (2). URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/7/

Oppermann, Kai; Spencer, Alexander (2013, January): Thinking Alike? Salience and Metaphor Analysis as Cognitive Approaches to Foreign Policy Analysis. Foreign Policy Analysis, 9 (1), 39-56. DOI: http://dx.doi.org/10.1111/j.1743-8594.2011.00167.x

Ould Mohamedou, Mohammad-Mahmoud (2013): Al Qaeda and the Reinvention of Terrorism: Social Sciences and the Challenge of Post-Globalization Transnational Political Violence. In: Jussi M. Hanhimäki; Bernhard Blumenau (Eds.): An International History of Terrorism: Western and Non-Western Experiences. (Political Violence). Abingdon: Routledge, 230-244.

Paletz, David L.; Boiney, John (1992): Researchers' Perspectives. In: David L. Paletz; Alex P. Schmid (Eds.): Terrorism and the Media. Newbury Park: SAGE, 6-28.

Pape, Robert A. (2009): Introduction: What is New about Research on Terrorism. Security Studies, 18 (4), 643-650. DOI: http://dx.doi.org/10.1080/09636410903369100 URL: http://cpost.uchicago.edu/pdf/Pape.pdf

Pennebaker, James W. (2011): Using Computer Analyses to Identify Language Style and Aggressive Intent: The Secret Life of Function Words. Dynamics of Asymmetric Conflict: Pathways toward Terrorism and Genocide, 4 (2), 92-102. DOI: http://dx.doi.org/10.1080/17467586.2011.627932

Pfeiffer, Christoph P. (2012): Terrorism and its Oxygen: A Game-Theoretic Perspective on Terrorism and the Media. Behavioral Sciences of Terrorism and Political Aggression, 4(3), 212-228. DOI: http://dx.doi.org/10.1080/19434472.2011.594629 URL: http://u.jimdo.com/www54/o/s2bde1cef9aff97ba/download/m778fdddc0309ffca/1358272180/Terrorism+and+its+oxygen.pdf?px-hash=2ab883b4962f016fd9ffebcbae287f820fcb4fb5&px-time=1377258944

Pluchinsky, Dennis A. (1992): Academic Research on European Terrorist Developments: Pleas from a Government Terrorism Analyst. Studies in Conflict & Terrorism, 15 (1), 13-23. DOI: http://dx.doi.org/10.1080/10576109208435888

Price, Eric (2011): Library and Internet Resources for Research on Terrorism. In: Alex P. Schmid (Ed.): The Routledge Handbook of Terrorism Research. Abingdon: Routledge, 443-456.

Prichard, Janet J.; MacDonald, Laurie E. (2004): Cyber Terrorism: A Study of the Extent of Coverage in Computer Security Textbooks. Journal of Information Technology Education, 3, 279- 289. URL: http://www.jite.org/documents/Vol3/v3p279-289-150.pdf

Quiggin, Tom (2013, February): Sources and Information in Academic Research: Avoiding Mistakes in Assessing Sources for Research and during Peer Review. Perspectives on Terrorism, 7 (1), 103-111. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/244

Quiggin, Tom (2013, April): Words Matter: Peer Review as a Failing Safeguard. Perspectives on Terrorism, 7 (2), 72-81. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/256

Qureshi, Asim (2009): Researching Rendition and Torture in the War on Terror: Lessons from a Human Rights Organisation. Critical Studies on Terrorism, 2 (2), 365-376. DOI: http://dx.doi.org/10.1080/17539150903025101

Ranstorp, Magnus (2007): Introduction: Mapping Terrorism Research: Challenges and Priorities. In: Magnus Ranstorp (Ed.): Mapping Terrorism Research: State of the Art, Gaps and Future Direction. (Political Violence). Abingdon: Routledge, 1-28. URL: http://www.fhs.se/Documents/Externwebben/forskning/centrumbildningar/CATS/publikationer/Mapping%20Terrorism%20Research%20-%20State%20of%20the%20Art,%20Gaps,%20and%20Future%20Direction.pdf

Ranstorp, Magnus (2009): Mapping Terrorism Studies after 9/11: An Academic Field of Old Problems and New Prospects. In: Richard Jackson; Marie Breen Smyth; Jeroen Gunning (Eds.): Critical Terrorism Studies: A New Research Agenda. (Critical Terrorism Studies). Abingdon: Routledge, 13-33.

Ranstorp, Magnus (2013): Research Challenges Involved in Field Study on Terrorism in the Middle East. In: Adam Dolnik (Ed.): Conducting Terrorism Field Research: A Guide. (Contemporary Terrorism Studies). Abingdon: Routledge, 46-62.

Ranstorp, Magnus; Normark, Magnus (2009): Introduction: Detecting CBRN Terrorism Signatures: Challenges and New Approaches. In: Magnus Ranstorp; Magnus Normark (Eds.): Unconventional Weapons and International Terrorism: Challenges and New Approaches. (Political Violence). Abingdon: Routledge, 1-10.

Raphael, Sam (2009): In the Service of Power: Terrorism Studies and US Intervention in the Global South. In: Richard Jackson; Marie Breen Smyth; Jeroen Gunning (Eds.): Critical Terrorism Studies: A New Research Agenda. (Critical Terrorism Studies). Abingdon: Routledge, 49-65.

Rapoport, David C. (2013): The Four Waves of Modern Terror: International Dimensions and Consequences. In: Jussi M. Hanhimäki; Bernhard Blumenau (Eds.): An International History of Terrorism: Western and Non-Western Experiences. (Political Violence). Abingdon: Routledge, 282-310.

Rasmussen, Maria (2013): Field Research: Argentina in Comparative Perspective. In: Adam Dolnik (Ed.): Conducting Terrorism Field Research: A Guide. (Contemporary Terrorism Studies). Abingdon: Routledge, 65-77.

Reid, Edna F. (1993, Spring): Terrorism Research and the Diffusion of Ideas. Knowledge and Policy, 6 (1), 17-37. DOI: http://dx.doi.org/10.1007/BF02692799

Reid, Edna F. (1997, January): Evolution of a Body of Knowledge: An Analysis of Terrorism Research. Information Processing & Management, 33 (1), 91-106. DOI: http://dx.doi.org/10.1016/S0306-4573(96)00052-0

Reid, Edna F.; Chen, Hsinchun (2007, January): Mapping the Contemporary Terrorism Research Domain. International Journal of Human-Computer Studies, 65 (1), 42-56. DOI: http://dx.doi.org/10.1016/j.ijhcs.2006.08.006 URL: http://ai.arizona.edu/intranet/papers/paper-Reid-terrorism-researcher.pdf

Rekawek, Kacper (2013): Conducting Field Research on Terrorism in Northern Ireland. In: Adam Dolnik (Ed.): Conducting Terrorism Field Research: A Guide. (Contemporary Terrorism Studies). Abingdon: Routledge, 169-184.

Reynolds, Ted (2012): Ethical and Legal Issues Surrounding Academic Research into Online Radicalisation: A UK Experience. Critical Studies on Terrorism, 5 (3), 499-513. DOI: http://dx.doi.org/10.1080/17539153.2012.723447

Reznikov, Dmitry O. (2012): Technological and Intelligent Terrorism: Specific Features and Assessment Approaches. In: Nikolay A. Makhutov; Gregory B. Baecher (Eds.): Comparative Analysis of Technological and Intelligent Terrorism Impacts on Complex Technical Systems. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 102). Amsterdam: IOS Press, 45-60. DOI: http://dx.doi.org/10.3233/978-1-61499-131-1-45

Rice, Stephen K. (2009, May-June): Emotions and Terrorism Research: A Case for a Social-Psychological Agenda. Journal of Criminal Justice, 37 (3), 248-255. DOI: http://dx.doi.org/10.1016/j.jcrimjus.2009.04.012

Risse, Thomas (2004, June): Der 9.11. und der 11.9.: Folgen für das Fach Internationale Beziehungen. Zeitschrift für Internationale Beziehungen, 11(1), 111-122. URL: http://www.zib.nomos.de/fileadmin/zib/doc/ZIB_1_2004.pdf

Rolka, Henry (2006): Data Analysis Research Issues and Emerging Public Health Biosurveillance Directions. In: Alyson G. Wilson; Gregory D. Wilson; David H. Olwell (Eds.): Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication. New York: Springer, 101-108. URL: http://www.springer.com/cda/content/document/cda_downloaddocument/9780387329048-c1.pdf?SGWID=0-0-45-419201-p150966235

Ross, Jeffrey Ian (2004, Summer): Taking Stock of Research Methods and Analysis on Oppositional Political Terrorism. The American Sociologist, 35 (2), 26-37. DOI: http://dx.doi.org/10.1007/BF02692395 URL:  http://www.researchgate.net/publication/226560656_Taking_stock_of_research_methods_and_analysis_on_oppositional_political_terrorism/file/32bfe50d7e93ceccf9.pdf

Roth, Steffen; Aderhold, Jens (2008, April): World Society on the Couch: Anti‐Terror Consultancy as an Object and Test-Bed of Professional Sociology. HUMSEC Journal, 2, 67-82. URL: http://www.humsec.eu/cms/fileadmin/user_upload/humsec/Journal/Roth_and_Aderhold.pdf

Rudner, Martin (2007): Intelligence Analysis and Counterterrorism: How Lies the Landscape? In: Magnus Ranstorp (Ed.): Mapping Terrorism Research: State of the Art, Gaps and Future Direction. (Political Violence). Abingdon: Routledge, 189-209.

Rukhin, Andrew L. (2006): Recognition Problem of Biometrics: Nonparametric Dependence Measures and Aggregated Algorithms. In: Alyson G. Wilson; Gregory D. Wilson; David H. Olwell (Eds.): Statistical Methods in Counterterrorism: Game Theory, Modelling, Syndromic Surveillance, and Biometric Authentication. New York: Springer, 81-100.

Sageman, Marc (2008): How to Study Terrorism in the Twenty-First Century. In: Leaderless Jihad: Terror Networks in the Twenty-First Century. Philadelphia: University of Pennsylvania Press, 13-28.

Salem, Arab; Reid, Edna; Chen, Hsinchun (2008): Multimedia Content Coding and Analysis: Unraveling the Content of Jihadi Extremist Groups’ Videos. Studies in Conflict & Terrorism, 31(7), 605-626. DOI: http://dx.doi.org/10.1080/10576100802144072 URL: http://floodhelp.uno.edu/uploads/Content%20Analysis/Salem.pdf

Sandler, Todd (2006): Economic Methods and the Study of Terrorism: An Evaluation. In: Jeff Victoroff (Ed.): Tangled Roots: Social and Psychological Factors in the Genesis of Terrorism. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 11). Amsterdam: IOS Press, 115-130.

Sandler, Todd (2009, Autumn): The Past and Future of Terrorism Research. Revista de Economía Aplicada, 17(50), 5-25. URL: http://www.revecap.com/revista/ingles/numeros/50/sandler.html

Sandler, Todd (2011, May): New Frontiers of Terrorism Research: An Introduction. Journal of Peace Research, 48 (3), 279-286. DOI: http://dx.doi.org/10.1177/0022343311399131

Sandler, Todd (2013, August): The Analytical Study of Terrorism: Taking Stock. Journal of Peace Research. Advance Online Publication. DOI: http://dx.doi.org/10.1177/0022343313491277

Sandler, Todd; Arce M., Daniel G. (2003, September): Terrorism & Game Theory. Simulation & Gaming, 34(3), 319-337. DOI: http://dx.doi.org/10.1177/1046878103255492  URL: http://www.utdallas.edu/~tms063000/website/Terror_Games.pdf

Schmid, Alex P. (1992): Editors' Perspectives. In: David L. Paletz; Alex P. Schmid (Eds.): Terrorism and the Media. Newbury Park: SAGE, 111-136.

Schmid, Alex P. (2011): The Literature on Terrorism. In: Alex P. Schmid (Ed.): The Routledge Handbook of Terrorism Research. Abingdon: Routledge, 457-474.

Schulze, Frederick (2004): Breaking the Cycle: Empirical Research and Postgraduate Studies on Terrorism. In: Andrew Silke (Ed.): Research on Terrorism: Trends, Achievements & Failures. (Cass Series on Political Violence). London: Frank Cass, 161-185.

Schumaker, Robert P.; Chen, Hsinchun (2007, August): Leveraging Question Answer Technology to Address Terrorism Inquiry. Decision Support Systems, 43 (4), 1419-1430. DOI: http://dx.doi.org/10.1016/j.dss.2006.04.007 URL: http://ai.arizona.edu/intranet/papers/leveraging%20questions...etc.pdf

Schweitzer, Yoram (2013): Conversing with the Adversary: Interviewing Palestinian Suicide Bombers and their Dispatchers in Israeli Prisons. In: Adam Dolnik (Ed.): Conducting Terrorism Field Research: A Guide. (Contemporary Terrorism Studies). Abingdon: Routledge, 78-90.

Shahar, Yael (2008): The Internet as a Tool for Intelligence and Counter-Terrorism. In: Centre of Excellence Defence Against Terrorism (COE–DAT) (Ed.): Responses to Cyber Terrorism. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 34). Amsterdam: IOS Press, 104-117.

Shanty, Frank (2012): Research Agenda and Future Counterterrorism Challenges. In: Counterterrorism: From the Cold War to the War on Terror. (Vol. 1: Combating Modern Terrorism [1968-2011]). Santa Barbara: Praeger Security International, 509-630.

Shapiro, Jacob N.; Siegel, David A. (2010): Is this Paper Dangerous? Balancing Secrecy and Openness in Counterterrorism. Security Studies, 19(1), 66-98. DOI: http://dx.doi.org/10.1080/09636410903546483 URL: http://www.princeton.edu/~jns/publications/Is%20This%20Paper%20Dangerous.pdf

Sheehan, Ivan Sascha (2012, May): Mapping Contemporary Terrorism Courses at Top-Ranked National Universities and Liberal Arts Colleges in the United States. Perspectives on Terrorism, 6 (2), 19-50. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/sheehan-mapping-contemporary

Shmueli, Galit; Fienberg, Stephen E. (2006): Current and Potential Statistical Methods for Monitoring Multiple Data Streams for Biosurveillance. In: Alyson G. Wilson; Gregory D. Wilson; David H. Olwell (Eds.): Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication. New York: Springer, 109-140.

Sieber, William K. et al. (2006): Approaches to Modeling the Concentration Field for Adaptive Sampling of Contaminants during Site Decontamination. In: Alyson G. Wilson; Gregory D. Wilson; David H. Olwell (Eds.): Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication. New York: Springer, 215-236.

Silke, Andrew (1998): Cheshire-Cat Logic: The Recurring Theme of Terrorist Abnormality in Psychological Research. Psychology, Crime & Law, 4 (1), 51-69. DOI: http://dx.doi.org/10.1080/10683169808401747

Silke, Andrew (2001): The Devil You Know: Continuing Problems with Research on Terrorism. Terrorism and Political Violence, 13 (4), 1-14. DOI: http://dx.doi.org/10.1080/09546550109609697

Silke, Andrew (2004): An Introduction to Terrorism Research. In: Andrew Silke (Ed.): Research on Terrorism: Trends, Achievements & Failures. (Cass Series on Political Violence). London: Frank Cass, 1-29.

Silke, Andrew (2004): The Devil You Know: Continuing Problems with Research on Terrorism. In: Andrew Silke (Ed.): Research on Terrorism: Trends, Achievements & Failures. (Cass Series on Political Violence). London: Frank Cass, 57-71.

Silke, Andrew (2004): The Road Less Travelled: Recent Trends in Terrorism Research. In: Andrew Silke (Ed.): Research on Terrorism: Trends, Achievements & Failures. (Cass Series on Political Violence). London: Frank Cass, 186-213.

Silke, Andrew (2007): The Impact of 9/11 on Research on Terrorism. In: Magnus Ranstorp (Ed.): Mapping Terrorism Research: State of the Art, Gaps and Future Direction. (Political Violence). Abingdon: Routledge, 76-93.

Silke, Andrew (2009): Contemporary Terrorism Studies: Issues in Research. In: Richard Jackson; Marie Breen Smyth; Jeroen Gunning (Eds.): Critical Terrorism Studies: A New Research Agenda. (Critical Terrorism Studies). Abingdon: Routledge, 34-48.

Silver, Derigan (2011): Media Censorship and Access to Terrorism Trials: A Social Architecture Analysis. Notre Dame Journal of Law, Ethics & Public Policy, 25(1), 143-186. URL: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2031165

Simanjuntak, David Allister et al. (2010, December): Text Classification Techniques Used to Faciliate Cyber Terrorism Investigation. In: Institute of Electrical and Electronics Engineers (IEEE) (Ed.): ACT 2010: 2010 Second International Conference on Advances in Computing, Control and Telecommunication Technologies, Jakarta, Indonesia, 2-3 December 2010: Proceedings. Los Alamitos: IEEE Computer Society Conference Publishing Services (CPS), 198-200. DOI: http://dx.doi.org/10.1109/ACT.2010.40

Sinai, Joshua (2007): New Trends in Terrorism Studies: Strengths and Weaknesses. In: Magnus Ranstorp (Ed.): Mapping Terrorism Research: State of the Art, Gaps and Future Direction. (Political Violence). Abingdon: Routledge, 31-50.

Sinai, Joshua (2009): Using the Internet to Uncover Terrorism's Root Causes. In: James J. F. Forest (Ed.): Influence Warfare: How Terrorists and Governments Fight to Shape Perceptions in a War of Ideas. Westport: Praeger Security International, 241-252.

Singh, Rashmi (2013): Conducting Terrorism Fieldwork on a Shoestring Budget: Researching Suicide Terrorism in the Israeli-Palestinian Conflict. In: Adam Dolnik (Ed.): Conducting Terrorism Field Research: A Guide. (Contemporary Terrorism Studies). Abingdon: Routledge, 140-157.

Sjoberg, Laura (2009, March): Feminist Interrogations of Terrorism/Terrorism Studies. International Relations, 23(1), 69-74. DOI: http://dx.doi.org/10.1177/0047117808100611

Skillicorn, D. B.; Vats, N. (2007, August): Novel Information Discovery for Intelligence and Counterterrorism. Decision Support Systems, 43 (4), 1375-1382. DOI: http://dx.doi.org/10.1016/j.dss.2006.04.005

Sloan, Stephen (2007): Educating the Next Generation of Counterterrorism Professionals. In: James J. F. Forest (Ed.): Countering Terrorism and Insurgency in the 21st Century: International Perspectives. (Vol. 3: Lessons from the Fight against Terrorism). Westport: Praeger Security International, 11-34.

Sluka, Jeffrey A. (2008): Terrorism and Taboo: An Anthropological Perspective on Political Violence against Civilians. Critical Studies on Terrorism, 1(2), 167-183. DOI: http://dx.doi.org/10.1080/17539150802184579

Sluka, Jeffrey A. (2009): The Contribution of Anthropology to Critical Terrorism Studies. In: Richard Jackson; Marie Breen Smyth; Jeroen Gunning (Eds.): Critical Terrorism Studies: A New Research Agenda. (Critical Terrorism Studies). Abingdon: Routledge, 138-155.

Smith, Steve (2004, September): Singing our World into Existence: International Relations Theory and September 11: Presidential Address to the International Studies Association, February 27, 2003, Portland, OR. International Studies Quarterly, 48(3), 499-515. DOI: http://dx.doi.org/10.1111/j.0020-8833.2004.t01-1-00312.x URL: http://www.colorado.edu/geography/class_homepages/geog_2002_s06/laptop_s06/current%20projects/Cox_Low%20Robinson%20Book%20chapter/Cox_Low%20Book%20chapter/what%27s%20wrong%20with%20IR%20_Smith%20address.pdf

Spencer, Alexander; Kocks, Alexander; Harbrich, Kai (Eds.) (2011): Terrorismusforschung in Deutschland. [Special Issue]. Zeitschrift für Außen- und Sicherheitspolitik, Sonderheft 1/2011. Wiesbaden: VS Verlag für Sozialwissenschaften.

Stampnitzky, Lisa Rachel (2011, March): Disciplining an Unruly Field: Terrorism Experts and Theories of Scientific/Intellectual Production. Qualitative Sociology, 34 (1), 1-19. DOI: http://dx.doi.org/10.1007/s11133-010-9187-4 URL: http://iis-db.stanford.edu/pubs/23109/Stampnitzky.pdf

Stohl, Michael (2006): Knowledge Claims and the Study of Terrorism. In: Jeff Victoroff (Ed.): Tangled Roots: Social and Psychological Factors in the Genesis of Terrorism. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 11). Amsterdam: IOS Press, 23-36.

Stohl, Michael (2008): Old Myths, New Fantasies and the Enduring Realities of Terrorism. Critical Studies on Terrorism, 1(1), 5-16. DOI: http://dx.doi.org/10.1080/17539150701846443

Stohl, Michael (2012): Don't Confuse Me with the Facts: Knowledge Claims and Terrorism. Critical Studies on Terrorism, 5(1), 31-49. DOI: http://dx.doi.org/10.1080/17539153.2012.659908 URL: http://www.researchgate.net/publication/232099058_Critical_Studies_on_Terrorism_Don't_confuse_me_with_the_facts_knowledge_claims_and_terrorism/file/9fcfd5076f3a39822b.pdf

Stohl, Michael (2013): Don’t Confuse me with the Facts: Knowledge Claims and Terrorism. In: David Miller et al. (Eds.): Critical Terrorism Studies since 11 September 2001: What has been Learned? Abingdon: Routledge, 31-50.

Stokes, Doug (2009, March): Ideas and Avocados: Ontologising Critical Terrorism Studies. International Relations, 23 (1), 85-92. DOI: http://dx.doi.org/10.1177/0047117808100613 

Stoto, Michael A. et al. (2006): Evaluating Statistical Methods for Syndromic Surveillance. In: Alyson G. Wilson; Gregory D. Wilson; David H. Olwell (Eds.): Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication. New York: Springer, 141-172. URL: http://faculty.nps.edu/rdfricke/docs/Fricker%2015.pdf

Stump, Jacob L. (2013): On the Future of Critical Terrorism Studies: A Response to Richard Jackson's Minimal Foundationalist Redefinition of Terrorism. Behavioral Sciences of Terrorism and Political Aggression, 5 (3), 217-224. DOI: http://dx.doi.org/10.1080/19434472.2011.629579

Stump, Jacob L.; Dixit, Priya (2012, June): Toward a Completely Constructivist Critical Terrorism Studies. International Relations, 26 (2), 199-217. DOI: http://dx.doi.org/10.1177/0047117811404720

Sylvester, Christine; Parashar, Swati (2009): The Contemporary “Mahabharata” and the Many “Draupadis”: Bringing Gender to Critical Terrorism Studies. In: Richard Jackson; Marie Breen Smyth; Jeroen Gunning (Eds.): Critical Terrorism Studies: A New Research Agenda. (Critical Terrorism Studies). Abingdon: Routledge, 178-193.

Taarnby, Michael (2013): Professionalizing High-Risk Field Research in Academia. In: Adam Dolnik (Ed.): Conducting Terrorism Field Research: A Guide. (Contemporary Terrorism Studies). Abingdon: Routledge, 206-223.

Tarabrina, Nadejda V.; Bykhovets, Yulia V. (2006): The Empirical Study of the Terrorist Threat. In: Jeff Victoroff (Ed.): Tangled Roots: Social and Psychological Factors in the Genesis of Terrorism. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 11). Amsterdam: IOS Press, 242-258.

Thomas, Michael J. (2004): Counteracting Terror: Group Design and Response Modalities. In: Mathieu Deflem (Ed.): Terrorism and Counter-Terrorism: Criminological Perspectives. (Sociology of Crime, Law and Deviance, Vol. 5). Bingley: Emerald, 91-110.

Tinnes, Judith (2013, August): The Art of Searching: How to Find Terrorism Literature in the Digital Age. Perspectives on Terrorism, 7 (4), 79-111. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/283

Toros, Harmonie (2008): Terrorists, Scholars and Ordinary People: Confronting Terrorism Studies with Field Experiences. Critical Studies on Terrorism, 1 (2), 279-292. DOI: http://dx.doi.org/10.1080/17539150802184652

Toros, Harmonie; Gunning, Jeroen (2009): Exploring a Critical Theory Approach to Terrorism Studies. In: Richard Jackson; Marie Breen Smyth; Jeroen Gunning (Eds.): Critical Terrorism Studies: A New Research Agenda. (Critical Terrorism Studies). Abingdon: Routledge, 87-108.

Toros, Harmonie; Tellidis, Ioannis (2013): Editor's Introduction: Terrorism and Peace and Conflict Studies: Investigating the Crossroad. Critical Studies on Terrorism, 6 (1), 1-12. DOI: http://dx.doi.org/10.1080/17539153.2013.765697

Tracy, Paul E. (2012, September): Terrorism Research in Criminology: Current Topics and Future Prospects. Crime & Delinquency, 58 (5), 647-662. DOI: http://dx.doi.org/10.1177/0011128712458080 

Tuman, Joseph S. (2010): Methods for Studying Public Oratory about Terrorism. In: Communicating Terror: The Rhetorical Dimensions of Terrorism. (2nd ed.). Thousand Oaks: SAGE, 109-128. URL: http://www.sagepub.com/upm-data/30949_6.pdf

Van de Voorde, Teun (2011): “Terrorism Studies”: A Critical Appraisal. In: Rik Coolsaet (Ed.): Jihadi Terrorism and the Radicalisation Challenge: European and American Experiences. (2nd ed.). Farnham: Asghate, 45-56.

van Dongen, Teun (2010): Mapping Counterterrorism: A Categorisation of Policies and the Promise of Empirically Based, Systematic Comparisons. Critical Studies on Terrorism, 3 (2), 227-241. DOI: http://dx.doi.org/10.1080/17539150903306170

Victoroff, Jeff (2005, February): The Mind of the Terrorist: A Review and Critique of Psychological Approaches. Journal of Conflict Resolution, 49(1), 3-42. DOI: http://dx.doi.org/10.1177/0022002704272040 URL: http://webservlb.surrey.ac.uk/politics/research/researchareasofstaff/isppsummeracademy/instructors%20/The%20Terrost%20mind.pdf

Vishnyakov, J. D.; Kiseleva, S. P. (2012): Innovative Aspects of Organizational Behaviour in Interests of Counterterrorism on Complex Technical Systems. In: Nikolay A. Makhutov; Gregory B. Baecher (Eds.): Comparative Analysis of Technological and Intelligent Terrorism Impacts on Complex Technical Systems. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 102). Amsterdam: IOS Press, 148-151. DOI: http://dx.doi.org/10.3233/978-1-61499-131-1-148

Weinberg, Leonard; Eubank, William Lee (2004): Everything that Descends Must Converge: Terrorism, Globalism and Democracy. In: Andrew Silke (Ed.): Research on Terrorism: Trends, Achievements & Failures. (Cass Series on Political Violence). London: Frank Cass, 91-103.

Weinberg, Leonard; Eubank, William Lee (2008): Problems with the Critical Studies Approach to the Study of Terrorism. Critical Studies on Terrorism, 1 (2), 185-195. DOI: http://dx.doi.org/10.1080/17539150802184595

Weinberg, Leonard; Eubank, William Lee (2011): Backlash: Reactions against Terrorism Studies. In: Jean E. Rosenfeld (Ed.): Terrorism, Identity and Legitimacy: The Four Waves Theory and Political Violence. (Political Violence). Abingdon: Routledge, 123-134.

Weinberg, Leonard; Richardson, Louise (2004): Conflict Theory and the Trajectory of Terrorist Campaigns in Western Europe. In: Andrew Silke (Ed.): Research on Terrorism: Trends, Achievements & Failures. (Cass Series on Political Violence). London: Frank Cass, 138-160.

Weisburd, A. Aaron (2012, November): Artisanal Intelligence and Information Triage. Combating Terrorism Exchange, 2(4). URL: https://globalecco.org/artisanal-intelligence-and-information-triage

Wieviorka, Michel (1995): Terrorism in the Context of Academic Research. In: Martha Crenshaw (Ed.): Terrorism in Context. University Park: Pennsylvania State University Press, 597-606.

Wigle, John (2010, March): Introducing the Worldwide Incidents Tracking System (WITS). Perspectives on Terrorism, 4 (1), 3-23. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/88

Wiil, Uffe Kock; Memon, Nasrullah; Gniadek, Jolanta (2011): CrimeFighter: A Toolbox for Counterterrorism. In: Ana Fred et al. (Eds.): Knowledge Discovery, Knowledge Engineering and Knowledge Management: First International Joint Conference, IC3K 2009, Funchal, Madeira, Portugal, October 6-8, 2009, Revised Selected Papers. (Communications in Computer and Information Science, Vol. 128). Berlin: Springer, 337-350. DOI: http://dx.doi.org/10.1007/978-3-642-19032-2_25

Wiil, Uffe Kock et al. (2013): Knowledge Management Tools for Terrorist Network Analysis. In: Ana Fred et al. (Eds.): Knowledge Discovery, Knowledge Engineering and Knowledge Management: Second International Joint Conference, IC3K 2010, Valencia, Spain, October 25-28, 2010, Revised Selected Papers. (Communications in Computer and Information Science, Vol. 272). Berlin: Springer, 322-337. DOI: http://dx.doi.org/10.1007/978-3-642-29764-9_22

Wiktorowicz, Quintan (2004): Introduction: Islamic Activism and Social Movement Theory. In: Quintan Wiktorowicz (Ed.): Islamic Activism: A Social Movement Theory Approach. (Indiana Series in Middle East Studies). Bloomington: Indiana University Press, 1-36.

Wilkinson, Paul (2007): Research into Terrorism Studies: Achievements and Failures. In: Magnus Ranstorp (Ed.): Mapping Terrorism Research: State of the Art, Gaps and Future Direction. (Political Violence). Abingdon: Routledge, 316-328.

Wilson, Margaret A. (2006): Terrorist Behavior in Hostage Taking: Policy Issues and Research Directions. In: Jeff Victoroff (Ed.): Tangled Roots: Social and Psychological Factors in the Genesis of Terrorism. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 11). Amsterdam: IOS Press, 235-241.

Young, Joseph K.; Findley, Michael G. (2011, September): Promise and Pitfalls of Terrorism Research. International Studies Review, 13(3), 411-431. DOI: http://dx.doi.org/10.1111/j.1468-2486.2011.01015.x URL: http://nw18.american.edu/~jyoung/documents/young_findley_isr_2011.pdf

Young, Ralph A. (2011): Contextual Issues in the Study of Domestic Violence: A Malawi Case Study. In: Jean E. Rosenfeld (Ed.): Terrorism, Identity and Legitimacy: The Four Waves Theory and Political Violence. Abingdon: Routledge, 232-249.

Zahn, Margaret A.; Strom, Kevin J. (2004): Terrorism and the Federal Social Science Research Agenda. In: Mathieu Deflem (Ed.): Terrorism and Counter-Terrorism: Criminological Perspectives. (Sociology of Crime, Law and Deviance, Vol. 5). Bingley: Emerald, 111-130.

Zulaika, Joseba; Douglass, William A. (2008): The Terrorist Subject: Terrorism Studies and the Absent Subjectivity. Critical Studies on Terrorism, 1(1), 27-36. http://dx.doi.org/10.1080/17539150701844794

Grey Literature

Bringuel, Andrew J. et al. (Eds.) (2011): Terrorism Research and Analysis Project (TRAP): A Collection of Research Ideas, Thoughts, and Perspectives. (Vol. 1). Washington, DC: Department of Justice, Federal Bureau of Investigation. (GPO Stock Number: 027-001-00097-1)

Bunyavejchewin, Poowin (2010, December): The Orthodox and the Critical Approach toward Terrorism: An Overview. (RCAPS Working Paper No. 10-3). URL: http://www.apu.ac.jp/rcaps/uploads/fckeditor/publications/workingPapers/RCAPS_WP10-3.pdf

Connable, Ben (2012): Embracing the Fog of War: Assessment and Metrics in Counterinsurgency. (RAND Monographs, MG-1086). URL: http://www.rand.org/pubs/monographs/MG1086.html

Davis, Paul K. (2009): Representing Social-Science Knowledge Analytically. In: Paul K. Davis; Kim Cragin (Eds.): Social Science for Counterterrorism: Putting the Pieces Together. (RAND Monographs, MG-849). Santa Monica: RAND, 401-452. URL: http://www.rand.org/pubs/monographs/MG849.html

Davis, Paul K.; O'Mahony, Angela (2013): A Computational Model of Public Support for Insurgency and Terrorism: A Prototype for More-General Social-Science Modeling. (RAND Technical Reports, TR-1220). URL: http://www.rand.org/pubs/technical_reports/TR1220.html

Davis, Paul K. et al. (2012): Understanding and Influencing Public Support for Insurgency and Terrorism. (RAND Monographs, MG-1122). URL: http://www.rand.org/pubs/monographs/MG1122.html

Davis, Paul K. et al. (2013): Using Behavioral Indicators to Detect Potential Violent Acts. (RAND Research Briefs, RB-9724). URL: http://www.rand.org/pubs/research_briefs/RB9724.html

Davis, Paul K. et al. (2013): Using Behavioral Indicators to Help Detect Potential Violent Acts: A Review of the Science Base. (RAND Research Reports, RR-215). URL: http://www.rand.org/pubs/research_reports/RR215.html

della Porta, Donatella (2009, September): Social Movement Studies and Political Violence. (CIR Study). URL: http://cir.au.dk/fileadmin/site_files/filer_statskundskab/subsites/cir/pdf-filer/H%C3%A6fte_4_Donatella.pdf

Edelmann, Florian (2011, November): The Dialectic of Construction-Deconstruction I: A Critical Assessment of the Research Agenda of Critical Terrorism Studies (CTS) Approaches. (FRP Working Paper 11/2011). URL: http://www.regensburger-politikwissenschaftler.de/frp_working_paper_11_2011.pdf

Edelmann, Florian (2011, December): The Dialectic of Construction-Deconstruction II: A Critical Assessment of the Research Agenda of Critical Terrorism Studies (CTS) Approaches. (FRP Working Paper 12/2011). URL: http://www.regensburger-politikwissenschaftler.de/frp_working_paper_12_2011.pdf

Egner, Michael (2009): Social-Science Foundations for Strategic Communications in the Global War on Terrorism. In: Paul K. Davis; Kim Cragin (Eds.): Social Science for Counterterrorism: Putting the Pieces Together. (RAND Monographs, MG-849). Santa Monica: RAND, 323-366. URL: http://www.rand.org/pubs/monographs/MG849.html

Ellis, Anthony et al. (2011, September): Monitoring and Evaluation Tools for Counterterrorism Program Effectiveness. (CGCC Policy Brief). URL: http://www.globalct.org/publications/monitoring-and-evaluation-tools-for-counterterrorism-program-effectiveness/

Farley, Jonathan David (2007, December): Toward a Mathematical Theory of Counterterrorism. (The Proteus Monograph Series, 1[2]). URL: http://www.rit.edu/~w-cmmc/literature/Proteus.pdf

Fishman, Brian (2012): The Counterterrorism Research Agenda Ten Years after 9/11. In: Lorry M. Fenner; Mark E. Stout; Jessica L. Goldings (Eds.): 9.11. Ten Years Later: Insights on al-Qaeda's Past & Future through Captured Records: Conference Proceedings. Washington, D.C.: Johns Hopkins University Center for Advanced Governmental Studies, 128-135. URL: http://issuu.com/johnshopkinsaap/docs/gov1220_ndu-final-issuu

Forest, James J. F. (2012): Countering the Terrorism Threat of Boko Haram. Tampa, FL: JSOU Press. URL: http://cco.dodlive.mil/files/2012/09/Boko_Haram_JSOU-Report-2012.pdf

Henne, Peter S. et al. (2013, September): Leveraging Advances in Qualitative Methodology to Analyze Radicalization. In: Hriar Cabayan; Valerie Sitterle; Matt Yandura (Eds.): Looking Back, Looking Forward: Perspectives on Terrorism and Responses to it. (SMA Occasional White Paper), 104-113. URL: http://www.nsiteam.com/pubs/U_SMA%20CT%20White%20Paper%20Approved%20for%20Public%20Release%2019Sep13.pdf

Jackson, Richard (2009): Critical Terrorism Studies: An Explanation, a Defence and a Way Forward. Paper prepared for the BISA Annual Conference, University of Leicester, Leicester, UK, 14-16 December, 2009. URL: http://www.bisa.ac.uk/index.php?option=com_bisa&task=download_paper&no_html=1&passed_paper_id=54

Jonas, Jeff; Harper, Jim (2006, December): Effective Counterterrorism and the Limited Role of Predictive Data Mining. (CATO Institute Policy Analysis No. 584). URL: http://www.cato.org/publications/policy-analysis/effective-counterterrorism-limited-role-predictive-data-mining

Minas, Harris (2010, January): Can the Open Source Intelligence Emerge as an Indispensable Discipline for the Intelligence Community in the 21st Century? (RIEAS Research Paper, No. 139). URL: http://www.rieas.gr/publications/1119-harris-minas-can-the-open-source-intelligence-emerge-as-an-indispensable-discipline-for-the-intelligence-community-in-the-21st-century-rieas-research-paper-no-139-january-2010-.html

Moore, Will H.; Bakker, Ryan; Hill, Daniel W., Jr. (2011, December): How Much Terror? Dissidents, Governments, Institutions and the Cross-National Study of Terror Attacks. (Working Paper). URL: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1977262

National Security Agency (NSA), Center for Digital Content (2007, February): Untangling the Web: A Guide to Internet Research. (DOCID: 4046925). URL: http://www.nsa.gov/public_info/_files/Untangling_the_Web.pdf

Schuurman, Bart; Eijkman, Quirine (2013, June): Moving Terrorism Research Forward: The Crucial Role of Primary Sources. (ICCT Background Note). URL: http://icct.nl/publications/icct-papers/moving-terrorism-research-forward-the-crucial-role-of-primary-sources

Shetret, Liat (2011, February): Use of the Internet for Counter-Terrorist Purposes. (CGCC Policy Brief). URL: http://kms1.isn.ethz.ch/serviceengine/Files/ISN/126762/ipublicationdocument_singledocument/a40e96ab-78f7-45db-aa0b-3eb35f22a239/en/LS_policybrief_119.pdf

Spaulding, Suzanne (2012): A Call for Further Research and Analysis. In: Lorry M. Fenner; Mark E. Stout; Jessica L. Goldings (Eds.): 9.11. Ten Years Later: Insights on al-Qaeda's Past & Future through Captured Records: Conference Proceedings. Washington, D.C.: Johns Hopkins University Center for Advanced Governmental Studies, 186-191. URL: http://issuu.com/johnshopkinsaap/docs/gov1220_ndu-final-issuu

Staun, Jørgen (2009): A Linguistic Turn of Terrorism Studies. (DIIS Working Paper 2009:02). URL: http://subweb.diis.dk/graphics/Publications/WP2009/WP2009-02_Linguistic_Terrorism.pdf

Storer, Cynthia (2012): Working with al-Qaeda Documents: An Analyst's View before 9/11. In: Lorry M. Fenner; Mark E. Stout; Jessica L. Goldings (Eds.): 9.11. Ten Years Later: Insights on al-Qaeda's Past & Future through Captured Records: Conference Proceedings. Washington, D.C.: Johns Hopkins University Center for Advanced Governmental Studies, 41-52. URL: http://issuu.com/johnshopkinsaap/docs/gov1220_ndu-final-issuu

Stout, Mark E. (2012): The Evolution of Intelligence Assessments of al-Qaeda to 2011. In: Lorry M. Fenner; Mark E. Stout; Jessica L. Goldings (Eds.): 9.11. Ten Years Later: Insights on al-Qaeda's Past & Future through Captured Records: Conference Proceedings. Washington, D.C.: Johns Hopkins University Center for Advanced Governmental Studies, 28-40. URL: http://issuu.com/johnshopkinsaap/docs/gov1220_ndu-final-issuu

Suedfeld, Peter; Cross, Ryan W.; Logan, Carson (2013, September): Can Thematic Content Analysis Separate the Pyramid of Ideas from the Pyramid of Action? A Comparison among Different Degrees of Commitment to Violence. In: Hriar Cabayan; Valerie Sitterle; Matt Yandura (Eds.): Looking Back, Looking Forward: Perspectives on Terrorism and Responses to it. (SMA Occasional White Paper), 61- 68. URL: http://www.nsiteam.com/pubs/U_SMA%20CT%20White%20Paper%20Approved%20for%20Public%20Release%2019Sep13.pdf

Thaler, Kai (2012, May): The Utility of Mixed Methods in the Study of Violence. (MICROCON Research Working Paper 61). URL: http://www.microconflict.eu/publications/RWP61_KT_FINAL.pdf

Veldhuis, Tinka M.; Kessels, Eelco J. A. M. (2013, February): Thinking before Leaping: The Need for More and Structural Data Analysis in Detention and Rehabilitation of Extremist Offenders. (ICCT Research Paper). URL: http://www.icct.nl/publications/icct-papers/the-need-for-more-structural-data-analysis-in-detention-and-rehabilitation-of-extremist-offenders

Zammit, Andrew (2013, July 26): Resources: Datasets on Jihadism Updated. The Murphy Raid. URL: http://andrewzammit.org/2013/07/26/resources-datasets-on-jihadism-updated/

Zhuang, Jun (2012, September): Innovations in Game Theoretic Modelling for Terrorism and Natural Disasters. (CREATE Current Research Project Synopses, Paper 44). URL: http://research.create.usc.edu/current_synopses/44/

 

About the compiler: Judith Tinnes, Ph.D., studied Information Science and New German Literature and Linguistics at the Saarland University (Germany). Her doctoral thesis dealt with Internet usage of Islamist terrorists and insurgents. Currently she works in the research & development department of the Leibniz Institute for Psychology Information (ZPID). She also serves as Editorial Assistant for ‘Perspectives on Terrorism’.

Note

Whenever retrievable, URLs for freely available versions of subscription-based publications have been provided. Thanks to the Open Access movement, self-archiving of publications in institutional repositories or on author homepages for free public use (so-called Green Open Access) has become more common. It should be noted that the content of Green Open Access documents is not necessarily identical to the officially published versions (e.g., in case of pre-prints) it might therefore not have passed through all editorial stages publishers employ to ensure quality control (peer review, copy and layout editing etc.). In some cases, articles may only be cited after getting consent by the author(s).



Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

ENHANCING SECURITY THROUGH COLLABORATIVE RESEARCH

Perspectives on Terrorism is  a journal of the Terrorism Research Initiative and the Center for Terrorism and Security Studies

ISSN  2334-3745 (Online)

Disclaimer, Terms and Conditions