10_tinnes

Bibliography: Terrorism Research Literature (Part 2)

Compiled and selected by Judith Tinnes

[Bibliographic Series of Perspectives on Terrorism - BSPT-JT-2016-2]

Abstract

This bibliography contains journal articles, book chapters, books, edited volumes, theses, grey literature, bibliographies and other resources on the field of Terrorism Research, its sub-disciplines (such as Critical Terrorism Studies), and related disciplines (such as Security Studies), central approaches, theories, methods, and research topics. More recent publications have been prioritized during the selection process. The literature has been retrieved by manually browsing more than 200 core and periphery sources in the field of Terrorism Studies. Additionally, full-text and reference retrieval systems have been employed to expand the search.

Keywords: bibliography; resources; literature; terrorism research; terrorism studies; approaches; theories; methods; research topics

NB: All websites were last visited on 13.03.2016. This subject bibliography was preceded by an earlier part (Part I). To avoid duplication, this compilation only includes literature not contained in the previous part. However, meta-resources, such as bibliographies, were included in both parts.–See also Note for the Reader at the end of this literature list.

Bibliographies and other Resources

Andrusyszyn, Greta H. (2009, December): Terrorism: A Selected Bibliography. (U.S. Army War College Library Bibliography). URL: http://www.carlisle.army.mil/library/bibs/terror09.pdf

Benavides, Ben (2012, September): Open Source Intelligence (OSINT) 2oolKit On The Go. URL: http://www.phibetaiota.net/wp-content/uploads/2009/07/OSINT-2ool-Kit-OnThe-Go-Bag-O-Tradecraft.pdf

Benavides, Ben (2014, January): Exploring Social Web Sites: A Guide for the Open Source Analyst. URL: http://www.phibetaiota.net/wp-content/uploads/2014/01/Ben-Benavides-Social-Web-Sites-A-Guide.pdf

Berman, Ilan; Smith, Jeff M. (Eds.) (2013, October-): World Almanac of Islamism. URL: http://almanac.afpc.org

Bleuer, Christian (2012, February): The Afghanistan Analyst Conflict Bibliography. (Special Edition). URL: http://afghanistananalyst.files.wordpress.com/2012/04/conflictbibliography2012.pdf

Center for Strategic & International Studies (CSIS) (2008, September): Counterterrorism Research Bibliography. URL: http://csis.org/images/stories/hrs/counterterrorismbibliography.pdf

de la Paz, A. (Ed.) (n.d.-): The Base Research Project. URL: http://the-base.info

Dolnik, Adam (2015): Resource 2 – Conducting Field Research on Terrorism. In: Caroline Kennedy-Pipe; Gordon Clubb; Simon Mabon (Eds.): Terrorism and Political Violence. Los Angeles: SAGE, 288-296.

Duncan, Gillian (2009, September): New Literature on Terrorism and Political Violence. Perspectives on Terrorism, 3(3), 50-54. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/78

Duncan, Gillian; Schmid, Alex P. (2011): Bibliography of Terrorism. In: Alex P. Schmid (Ed.): The Routledge Handbook of Terrorism Research. (Routledge Handbooks). Abingdon: Routledge, 475-597 [ca. 4,600 titles].

Earth Intelligence Network (EIN) (2009-): Public Intelligence Blog. URL: http://www.phibetaiota.net

FBI Library (2013-): FBI Library Subject Research Guides: Bibliographies of Selected Books, Journal Articles and Websites in Criminal Justice, Law Enforcement and Intelligence. URL: http://fbilibrary.libguides.com

Forest, James J. F. (2002, February-): Teaching About Terrorism: A Resource Portal of the Terrorism Research Initiative. URL: http://www.teachingterror.com

Forest, James J. F. et al. (2004, March 22): Terrorism and Counterterrorism: An Annotated Bibliography. (Vol. 1). (CTC Bibliography). URL: http://www.teachingterror.com/bibliography/CTC_Bibliography_2004.pdf

Forest, James J. F. et al. (2006, September 11): Terrorism and Counterterrorism: An Annotated Bibliography. (Vol. 2). (CTC Bibliography). URL: http://www.teachingterror.com/bibliography/CTC_Bibliography_2006.pdf

Freedman, Benjamin (2010, November): Terrorism Research Centres: 100 Institutes, Programs and Organisations in the Field of Terrorism, Counter-Terrorism, Radicalisation and Asymmetric Warfare Studies. Perspectives on Terrorism, 4(5), 48-56. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/123

Gonzalez, Nathan (2009, December): Middle East Glossary. URL: http://nathangonzalez.com/Middle_East_Glossary.html

Hathaway, Terry (2015): Resource 1 – Study Skills for Dissertations, Essays and Exams. In: Caroline Kennedy-Pipe; Gordon Clubb; Simon Mabon (Eds.): Terrorism and Political Violence. Los Angeles: SAGE, 279-287.

Heidelberg Institute for International Conflict Research (HIIK) (1992-): Conflict Barometer. URL: http://www.hiik.de/de/konfliktbarometer

Hofmann, David C. (2012, December): Review Essay: Twenty Important Journal Articles on Radicalisation to, and De-Radicalisation from, Terrorism. Perspectives on Terrorism, 6(6), 104-113. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/234

Hofmann, David C.; Schmid, Alex P. (2012, December): Selected Literature on (i) Radicalization and Recruitment, (ii) De-Radicalization and Dis-Engagement, and (iii) Counter-Radicalization and Countering Violent Extremism. Perspectives on Terrorism, 6(6), 114-143. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/235

IntelCenter (2002-): Free Analytical Reports, Charts & Maps. URL: http://www.intelcenter.com/reports-charts.html

Jones, Charles et al. (2010, December-): Access to Mideast and Islamic Resources (AMIR). URL: http://amirmideast.blogspot.de

Jongman, Albert J. (Berto) (2011, March): Internet Websites and Links for (Counter-) Terrorism Research. Perspectives on Terrorism, 5(1), 22-37. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/jongman-internet-websites

Master of Homeland Security (2014): 100 Great Twitters for Staying Informed on #HomelandSecurity. URL: http://www.masterofhomelandsecurity.org/informative-twitters.html

Perliger, Arie (2010, October): Counterterrorism Reading List. (CTC Annotated Bibliography). URL: http://www.ctc.usma.edu/posts/counterterrorism-reading-list

Peterson, Jaclyn A. (2012, August): Three Bibliographies: (i) Drones and Targeted Killing, (ii) Prosecuting Terrorism, and (iii) Enhanced Interrogation Techniques v. Torture. Perspectives on Terrorism, 6(3), 91-105. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/peterson-threee-bibliographies

Picard, Robert G.; Sheets, Rhonda S. (1987): Terrorism and the News Media: A Research Bibliography Part I. Political Communication, 4(1), 65-69. DOI: http://dx.doi.org/10.1080/10584609.1987.9962808

Picard, Robert G.; Sheets, Rhonda S. (1987): Terrorism and the News Media: A Research Bibliography Part II. Political Communication, 4(2), 141-152. DOI: http://dx.doi.org/10.1080/10584609.1987.9962816

Picard, Robert G.; Sheets, Rhonda S. (1987): Terrorism and the News Media: A Research Bibliography Part III. Political Communication, 4(3), 217-221. DOI: http://dx.doi.org/10.1080/10584609.1987.9962824

Picard, Robert G.; Sheets, Rhonda S. (1987): Terrorism and the News Media: A Research Bibliography Part IV. Political Communication, 4(4), 325-326. DOI: http://dx.doi.org/10.1080/10584609.1987.9962832

Pode, Adam (n.d.): A Bibliography of Academic Theses on Terrorism and Related Forms of Violence – 1960 to 1998. URL: https://sites.google.com/site/terrorismthesis

Price, Eric (2010, March): New Literature on Terrorism and Political Violence. Perspectives on Terrorism, 4(1), 77-83. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/93

Price, Eric (2010, July): Dissertations and Theses on (Counter-)Terrorism and Political Violence (1980-2010). Perspectives on Terrorism, 4(3), 58-63. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/108

Price, Eric (2010, October): Selected Literature on Human Rights and Terrorism. Perspectives on Terrorism, 4(4), 88-101. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/119

Price, Eric (2010, November): Selected Literature on Terrorism and CBRN Threats. Perspectives on Terrorism, 4(5), 57-68. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/124

Price, Eric (2010, December): Selected Literature on Terrorism and Organized Crime. Perspectives on Terrorism, 4(6), 44-54. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/132

Price, Eric (2011, March): Selected Literature on Terrorism and Religion. Perspectives on Terrorism, 5(1), 64-75. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/price-literature-on-terrorism-and-religion

Price, Eric (2011, May): Selected Literature on Conflict Prevention, Crime Prevention, Terrorism Prevention and Violence Prevention. Perspectives on Terrorism, 5(2), 85-100. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/price-conflict-crime-prevention

Price, Eric (2011, September): Selected Literature on Terrorism and Political Violence/Conflict in Africa since the Second World War. Perspectives on Terrorism, 5(3-4), 118-133. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/164

Price, Eric (2011, December): Literature on Right-Wing and Vigilante Terrorism. Perspectives on Terrorism, 5(5-6), 168-179. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/literature-on-right-wing

Price, Eric (2012, March): Literature on Terrorism, Media, Propaganda & Cyber-Terrorism. Perspectives on Terrorism, 6(1), 92-103. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/price-literature-terrorism-media

Price, Eric (2012, May): Bibliography: Literature on Terrorism in History. Perspectives on Terrorism, 6(2), 160-180. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/price-terrorism-in-history

Price, Eric (2012, August): Bibliography: Literature on the Future of Terrorism (including Trends). Perspectives on Terrorism, 6(3), 78-90. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/price-literature-on-the-future-of-terrorism

Price, Eric (2012, October): Bibliography: Inside Terrorist Organisations. Perspectives on Terrorism, 6(4-5), 160-168. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/222

Price, Eric (2012, December): Literature on Victims of Terrorism. Perspectives on Terrorism, 6(6), 144-166. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/236

Price, Eric (2013, February): Literature on Al-Qaeda since 2001. Perspectives on Terrorism, 7(1), 114-144. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/246

Price, Eric (2013, April): Literature on Kidnapping for Ransom and for Political Concessions. Perspectives on Terrorism, 7(2), 104-118. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/259

Price, Eric (2013, June): Literature on Refugee Situations (including Internally Displaced Persons) and Terrorism (incl. other Forms of Political Violence and Armed Conflict). Perspectives on Terrorism, 7(3), 99-113. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/271

Price, Eric (2013, August): Literature on the Financing of Terrorism. Perspectives on Terrorism, 7(4), 112-130. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/284

Price, Eric (2013, October): Literature on Diasporas and Terrorism. Perspectives on Terrorism, 7(5), 186-197. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/302

Price, Eric (2013, December): Selected Dissertations and Theses on Terrorism, Counterterrorism and Political Violence, 1980-2013 (available in Full-Text). Perspectives on Terrorism, 7(6), 166-202. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/318

Price, Eric (2014, February): Bibliography: Non-English Academic Dissertations on Terrorism and Counter-Terrorism. Perspectives on Terrorism, 8(1), 84-98. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/327

Price, Eric (2014, April): Bibliography: (Countering) Violent Extremism and Terrorism. Perspectives on Terrorism, 8(2), 92-102. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/339

Price, Eric (2014, June): Terrorists, Extremists, Militants: Selected Biographies, Autobiographies and Related Documents and Writings. Perspectives on Terrorism, 8(3), 126-134. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/350

Price, Eric (2014, August): Bibliography on State Sponsored Terrorism and Assassinations Abroad; with Special Emphasis on the Assassination of 28 July 1914 that Triggered World War I. Perspectives on Terrorism, 8(4), 146-152. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/367

Price, Eric (2014, October): Bibliography: Domestic State (or Regime) Terrorism and Repression. Perspectives on Terrorism, 8(5), 117-126. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/383

Price, Eric (2014, December): Bibliography on Single Issue Terrorism. Perspectives on Terrorism, 8(6), 123-129. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/394

Price, Eric (2015, February): Bibliography: Foreign Fighters of Terrorism. Perspectives on Terrorism, 9(1), 157-163. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/409

Price, Eric (2015, June): Bibliography: Lone Wolves/Actors of Terrorism. Perspectives on Terrorism, 9(3), 113-119. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/432

Price, Eric; Schmid, Alex P. (2010, May): Selected Literature on Radicalization and De-Radicalization from Terrorism. Perspectives on Terrorism, 4(2), 58-76. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/102

Rochester Institute of Technology (RIT) et al. (n.d.-): Mathematical and Computational Methods in Counterterrorism. URL: http://www.rit.edu/cos/sms/cmmc

Schmid, Alex P. (2011): Glossary and Abbreviations of Terms and Concepts Relating to Terrorism and Counter-Terrorism. In: Alex P. Schmid (Ed.): The Routledge Handbook of Terrorism Research. (Routledge Handbooks). Abingdon: Routledge, 598-706.

Schmid, Alex P.; Price, Eric (2011, May): Selected Literature on Radicalization and De-Radicalization of Terrorists: Monographs, Edited Volumes, Grey Literature and Prime Articles Published since the 1960s. Crime, Law and Social Change, 55(4), 337-348. DOI: http://dx.doi.org/10.1007/s10611-011-9287-4

Schmid, Alex P.; Spencer-Smith, Charlotte (2012, May): Illicit Radiological and Nuclear Trafficking, Smuggling and Security Incidents in the Black Sea Region since the Fall of the Iron Curtain: An Open Source Inventory. Perspectives on Terrorism, 6(2), 117-157. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/schmid-illicit-radiological

Schmid, Alex P. (Author); Tinnes, Judith (Bibliographer) (2015, December): Foreign (Terrorist) Fighters with IS: A European Perspective. (ICCT Research Paper). DOI: http://dx.doi.org/10.19165/2015.1.08

Sinai, Joshua (2008, August): Review Essay: Top 50 Books on Terrorism and Counterterrorism. Perspectives on Terrorism, 2(11), 15-23. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/57

Sinai, Joshua (2012, May): Terrorism Bookshelf: Top 150 Books on Terrorism and Counter-Terrorism. Perspectives on Terrorism, 6(2), 74-116. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/sinai-terrorism-bookshelf

Sinai, Joshua (2013, June): Counterterrorism Bookshelf. Perspectives on Terrorism, 7(3), 114-124. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/272

Sinai, Joshua (2013, August): Counterterrorism Bookshelf: Capsule Reviews of 13 Books. Perspectives on Terrorism, 7(4), 131-137. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/285

Sinai, Joshua (2013, October): “Counterterrorism Bookshelf”: Literature on Intelligence and Terrorism. Perspectives on Terrorism, 7(5), 127-141. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/295

Sinai, Joshua (2013, December): “Counterterrorism Bookshelf”: 20 Important Books on Terrorism & Counterterrorism Related Subjects. Perspectives on Terrorism, 7(6), 203-209. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/319

Sinai, Joshua (2014, February): “Counterterrorism Bookshelf” – 23 Books on Terrorism & Counter-Terrorism Related Subjects. Perspectives on Terrorism, 8(1), 133-141. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/329

Sinai, Joshua (2014, April): “Counterterrorism Bookshelf” – 27 Books on Terrorism & Counterterrorism Related Subjects. Perspectives on Terrorism, 8(2), 103-112. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/340

Sinai, Joshua (2014, June): “Counterterrorism Bookshelf” – Eight Books on Terrorism & Counter- Terrorism Related Subjects. Perspectives on Terrorism, 8(3), 135-139. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/351

Sinai, Joshua (2014, August): “Counterterrorism Bookshelf”: 47 Books on Terrorism & Counter-Terrorism Related Subjects. Perspectives on Terrorism, 8(4), 158-170. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/371

Sinai, Joshua (2014, October): “Counterterrorism Bookshelf”: 17 Books on Terrorism & Counter-Terrorism Related Subjects. Perspectives on Terrorism, 8(5), 78-83. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/381

Sinai, Joshua (2014, December): Counterterrorism Bookshelf: 22 Books on Terrorism & Counter-Terrorism Related Subjects. Perspectives on Terrorism, 8(6), 114-122. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/393

Sinai, Joshua (2015, February): 16 Books on Terrorism & Counter-Terrorism-Related Subjects. Perspectives on Terrorism, 9(1), 115-121. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/407

Sinai, Joshua (2015, April): Counterterrorism Bookshelf: Nine Books on Terrorism & Counter-Terrorism-Related Subjects. Perspectives on Terrorism, 9(2), 115-119. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/422

Sinai, Joshua (2015, June): 20 Books on Terrorism & Counter-Terrorism-Related Subjects. Perspectives on Terrorism, 9(3), 73-81. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/430

Sinai, Joshua (2015, October): 16 Books on Terrorism & Counter-Terrorism-Related Subjects. Perspectives on Terrorism, 9(5), 111-117. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/465

Sinai, Joshua (2015, December): Counterterrorism Bookshelf: 40 Books on Terrorism & Counter-Terrorism-Related Subjects. Perspectives on Terrorism, 9(6), 154-166. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/477

Tinnes, Judith (2013, February): Terrorism and the Media (including the Internet): An Extensive Bibliography. Perspectives on Terrorism, 7(1, Suppl.), S1-S295. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/247

Tinnes, Judith (2013, April): 100 Core and Periphery Journals for Terrorism Research. Perspectives on Terrorism, 7(2), 95-103. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/258

Tinnes, Judith (2013, June): 230 Websites and Blogs for Terrorism Research. Perspectives on Terrorism, 7(3), 84-98. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/270

Tinnes, Judith (2013, August): The Art of Searching: How to Find Terrorism Literature in the Digital Age. Perspectives on Terrorism, 7(4), 79-111. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/283

Tinnes, Judith (2013, October): Literature on the Arab Spring. Perspectives on Terrorism, 7(5), 155-185. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/301

Tinnes, Judith (2013, December): Literature on the Conflict in Syria (2011 – November 2013). Perspectives on Terrorism, 7(6), 137-165. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/317

Tinnes, Judith (2014, February): Bibliography: Terrorism Research Literature (Part 1). Perspectives on Terrorism, 8(1), 99-132. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/328

Tinnes, Judith (2014, April): Bibliography: Muslim Brotherhood (Part 1). Perspectives on Terrorism, 8(2), 66-91. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/338

Tinnes, Judith (2014, June): Bibliography: Arab Spring (Part 2). Perspectives on Terrorism, 8(3), 92-125. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/349

Tinnes, Judith (2014, August): Bibliography on Islamist Narratives and Western Counter-Narratives (Part 1). Perspectives on Terrorism, 8(4), 111-145. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/366

Tinnes, Judith (2014, October): Bibliography: Israeli-Palestinian Conflict (Part 1). Perspectives on Terrorism, 8(5), 84-116. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/382

Tinnes, Judith (2014, December): Bibliography: Terrorism and the Media (including the Internet) (Part 2). Perspectives on Terrorism, 8(6), 82-113. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/392

Tinnes, Judith (2015, February): Bibliography: Terrorism in, or Originating from the Caucasus, Central Asia, and Russia (Part 1). Perspectives on Terrorism, 9(1), 122-156. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/408

Tinnes, Judith (2015, April): Bibliography: Genocide (since 1980) Part 1. Perspectives on Terrorism, 9(2), 80-114. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/421

Tinnes, Judith (2015, June): Bibliography: Conflict in Syria (Part 2). Perspectives on Terrorism, 9(3), 82-112. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/431

Tinnes, Judith (2015, August): Bibliography: Islamic State (Part 1). Perspectives on Terrorism, 9(4), 165-212. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/452

Tinnes, Judith (2015, October): Bibliography: Muslims and the West. Perspectives on Terrorism, 9(5), 73-108. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/463

Tinnes, Judith (2015, December): Bibliography: Homegrown Terrorism and Radicalisation. Perspectives on Terrorism, 9(6), 119-153. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/476

VOX-Pol Network of Excellence (NoE) (2014-): VOX-Pol Online Library. URL: http://voxpol.eu/library

Zelin, Aaron Y. (2010, June-): Jihadology. URL: http://jihadology.net

Zelin, Aaron Y. (2013, January 2): Jihadi Studies Bibliography. (v. 1.0). Jihadology. URL: http://azelin.files.wordpress.com/2013/01/jihadi-studies-bibliography-v-1-0.pdf

Books and Edited Volumes

Agrell, Wilhelm; Treverton, Gregory F. (2015): National Intelligence and Science: Beyond the Great Divide in Analysis and Policy. Oxford: Oxford University Press.

Appel, Edward J. (2015): Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence. (2nd ed.). Boca Raton: CRC Press.

Aradau, Claudia et al. (Eds.) (2015): Critical Security Methods: New Frameworks for Analysis. (The New International Relations Series). Abingdon: Routledge.

Argamon, Shlomo; Howard, Newton (Eds.) (2009): Computational Methods for Counterterrorism. Dordrecht: Springer. DOI: http://dx.doi.org/10.1007/978-3-642-01141-2

Balzacq, Thierry (Ed.) (2015): Contesting Security: Strategies and Logics. (PRIO New Security Studies). Abingdon: Routledge.

Bradley, Phil (2013): Expert Internet Searching. (4th ed.). London: Facet Publishing.

Brannan, David W.; Darken, Kristin; Strindberg, Anders (2014): A Practitioner’s Way Forward: Terrorism Analysis. Salinas: Agile Press.

Dawson, Laura; Edwards, Charlie; Jeffray, Calum (2014): Learning and Adapting: The Use of Monitoring and Evaluation in Countering Violent Extremism: A Handbook for Practitioners. [e-Book]. London: Royal United Services Institute for Defence and Security Studies (RUSI). URL: https://rusi.org/publication/rusi-books/learning-and-adapting-use-monitoring-and-evaluation-countering-violent

Ditrych, Ondrej (2014): Tracing the Discourses of Terrorism: Identity, Genealogy and State. (Central and Eastern European Perspectives on International Relations). Basingstoke: Palgrave Macmillan.

Dunn Cavelty, Myriam; Mauer, Victor (Eds.) (2010): The Routledge Handbook of Security Studies. (Routledge Handbooks). Abingdon: Routledge.

Forest, James J. F. (Ed.) (2015): Essentials of Counterterrorism. (Praeger Security International Textbooks). Santa Barbara: Praeger Security International.

Forest, James J. F. (2015): The Terrorism Lectures: A Comprehensive Collection for Students of Terrorism, Counterterrorism, and National Security. (2nd & rev. ed.). Santa Ana: Nortia Press.

Freilich, Joshua D.; LaFree, Gary (Eds.) (2015): Criminology Theory and Terrorism: New Applications and Approaches. Abingdon: Routledge.

Heath-Kelly, Charlotte; Baker-Beall, Christopher; Jarvis, Lee (Eds.) (2015): Neoliberalism and Terror: Critical Engagements. Abingdon: Routledge.

Hellmich, Christina; Behnke, Andreas (Eds.) (2012): Knowing al-Qaeda: The Epistemology of Terrorism. (Rethinking Political and International Theory). Farnham: Ashgate.

Hobbs, Christopher; Moran, Matthew; Salisbury, Daniel (Eds.) (2014): Open Source Intelligence in the Twenty-First Century: New Approaches and Opportunities. (New Security Challenges). Basingstoke: Palgrave Macmillan.

Jackson, Richard (in press): Routledge Handbook of Critical Terrorism Studies. (Routledge Handbooks). Abingdon: Routledge.

Jarvis, Lee; Lister, Michael (Eds.) (2015): Critical Perspectives on Counter-Terrorism. (Routledge Critical Terrorism Studies). Abingdon: Routledge.

Kaiser, Louis M.; Pherson, Randolph H. (2014): Analytic Writing Guide. Reston: Pherson Associates.

LaFree, Gary; Dugan, Laura; Miller, Erin (2015): Putting Terrorism in Context: Lessons from the Global Terrorism Database. (Contemporary Terrorism Studies). Abingdon: Routledge.

Lowe, David (2016): Policing Terrorism: Research Studies into Police Counterterrorism Investigations. (Advances in Police Theory and Practice Series). Boca Raton: CRC Press.

Lum, Cynthia; Kennedy, Leslie W. (Eds.) (2012): Evidence-Based Counterterrorism Policy. (Springer Series on Evidence-Based Crime Policy). New York: Springer. DOI: http://dx.doi.org/10.1007/978-1-4614-0953-3

Meier, Patrick (2015): Digital Humanitarians: How BIG DATA Is Changing the Face of Humanitarian Response. Boca Raton: CRC Press.

Muhanna, Elias (Ed.) (2016): The Digital Humanities and Islamic & Middle East Studies. Berlin: De Gruyter.

Mumford, Andrew; Reis, Bruno C. (Eds.) (2014): The Theory and Practice of Irregular Warfare: Warrior-Scholarship in Counter-Insurgency. (Studies in Insurgency, Counterinsurgency and National Security). Abingdon: Routledge.

Peoples, Columba; Vaughan-Williams, Nick (2015): Critical Security Studies: An Introduction. (Rev. & updated 2nd ed.). Abingdon: Routledge.

Pisoiu, Daniela (Ed.) (2014): Arguing Counterterrorism: New Perspectives. (Routledge Critical Terrorism Studies). Abingdon: Routledge.

Rapoport, David (Ed.) (2006): Terrorism: Critical Concepts in Political Science. (4 Volumes). London: Routledge.

Rosenzweig, Paul; McNulty, Timothy J.; Shearer, Ellen (Eds.) (2012): National Security Law in the News: A Guide for Journalists, Scholars, and Policymakers. Chicago: American Bar Association.

Salter, Mark B.; Mutlu, Can E. (Eds.) (2013): Research Methods in Critical Security Studies: An Introduction. Abingdon: Routledge.

Saul, Ben (Ed.) (2014): Research Handbook on International Law and Terrorism. (Research Handbooks in International Law). Cheltenham: Edward Elgar.

Schmid, Alex P. (Ed.) (2011): The Routledge Handbook of Terrorism Research. (Routledge Handbooks). Abingdon: Routledge.

Schmid, Alex P.; Jongman, Albert J. (Berto) (Eds.) (2005): Political Terrorism: A New Guide to Actors, Authors, Concepts, Data Bases, Theories, and Literature. (Rev., expanded, & updated ed.). New Brunswick: Transaction Publishers. (Original work published 1988)

Sriram, Chandra Lekha et al. (Eds.) (2009): Surviving Field Research: Working in Violent and Difficult Situations. Abingdon: Routledge.

Stampnitzky, Lisa (2013): Disciplining Terror: How Experts Invented “Terrorism”. Cambridge: Cambridge University Press.

Stedmon, Alex; Lawson, Glyn (Eds.) (2015): Hostile Intent and Counter-Terrorism: Human Factors Theory and Application. (Human Factors in Defence). Farnham: Ashgate.

Subrahmanian, V.S. (Ed.) (2013): Handbook of Computational Approaches to Counterterrorism. New York: Springer. DOI: http://dx.doi.org/10.1007/978-1-4614-5311-6

Tambe, Milind (2012): Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned. New York: Cambridge University Press.

Tellidis, Ioannis; Toros, Harmonie (Eds.) (2015): Researching Terrorism, Peace and Conflict Studies: Interaction, Synthesis, and Opposition. (Routledge Critical Terrorism Studies). Abingdon: Routledge.

Williams, Paul D. (Ed.) (2013): Security Studies: An Introduction. (2nd ed.). Abingdon: Routledge.

Theses

Coordinators of TRI’s National Networks (2013, April): Preliminary and Partial Inventory of PhD Theses and their Authors. Perspectives on Terrorism, 7(2), 121-140. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/261

Farides-Mitchell, Julia (2014): A New Approach to Terrorism Research: A Multi-Theoretical Approach for a Multi-Dimensional Violent Crime. (Master’s Thesis, University of New Hampshire, Durham, United States). Available from ProQuest Dissertations and Theses database. (UMI No. 1525628)

Jankowski, Thaddeus K., Sr. (2005, March): Planning for Success: Constructing a First Responder Planning Methodology for Homeland Security. (Master’s Thesis, Naval Postgraduate School, Monterey, United States). URL: http://hdl.handle.net/10945/2275

Jännes, Veera (2013, November): Terrorism Research in Finland. (Master’s Thesis, Laurea University of Applied Sciences, Espoo, Finland). URL: http://www.theseus.fi/handle/10024/69823

Moore, Christopher David (2008): Beyond a Contest of Wills: A Theory of State Success and Failure in Insurgent Conflicts. (Doctoral Thesis, Ohio State University, Columbus, Ohio). URL: http://rave.ohiolink.edu/etdc/view?acc_num=osu1211875453

Morais, Ana Isabel Pereira Santos Figueiredo (2012, September): Data Mining no Contra-Terrorismo: Uma Abordagem para a Compreensão dos Factores Determinantes do Terrorismo. (Master’s Thesis, ISCTE-Instituto Universitário de Lisboa, Lisbon, Portugal). URL: http://hdl.handle.net/10071/5989

Morris, William Travis (2011, July): Breaking the Criminogenic Code: A Frame Analysis of Neo-Nazi and Violent Jihadi Propaganda. (Doctoral Thesis, University of Nebraska at Omaha, Omaha, United States). URL: http://pqdtopen.proquest.com/pubnum/3465747.html

O’Rourke, Simon (2010): An Intelligence Model for Terrorist Incident Prevention for Australian Police: A Systemic Investigation. (Doctoral Thesis, Edith Cowan University, Mount Lawley, Australia). URL: http://ro.ecu.edu.au/theses/379

Pennington, Jeremy Lee (2011): Analytical Method for the Identification of Lone Wolf Terrorist. (Master’s Thesis, American Public University System, Charles Town, United States). DOI: http://dx.doi.org/10.2139/ssrn.2041939

Rosoff, Heather Beth (2009, August): Using Decision and Risk Analysis to Assist in Policy Making about Terrorism. (Doctoral Thesis, University of Southern California, Los Angeles, United States). URL: http://digitallibrary.usc.edu/cdm/ref/collection/p15799coll127/id/177451

Royston, Lisbet B. Ejlersen (2011, December): A Qualitative Pattern Analysis of Suicide Terrorism: From Past to Future Trends. (Master’s Thesis, Texas State University-San Marcos, San Marcos, United States). URL: https://digital.library.txstate.edu/handle/10877/4473

Schmid, Alex P. (Network Coordinator) (2015, December): TRI National/Regional TRI Networks (Partial) Inventory of Ph.D. Theses in the Making. Perspectives on Terrorism, 9(6), 170-174. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/480

Schumacher, Justin M. (2015, March): The Less you Know: The Utility of Ambiguity and Uncertainty in Counter-Terrorism. (Master’s Thesis, Naval Postgraduate School, Monterey, United States). URL: http://hdl.handle.net/10945/45253

Simion, Marian Gheorghe (2012, March): Religion in Political Conflict: A Constructivist Theoretical Model for Public Policy Analysis, Design, and Implementation. (Doctoral Thesis, Northeastern University, Boston, United States). URL: http://hdl.handle.net/2047/d20002691

Simpson, Matthew Aaron (2014, August): Reanchoring Terrorism Studies: An Application of Social Movement Theory to the Concept of Domestic Terrorism. (Doctoral Thesis, University of Utah, Salt Lake City, United States). URL: http://content.lib.utah.edu/cdm/singleitem/collection/etd3/id/3209/rec/1683

Sri Bhashyam, Sumitra (2014, January): In the Opponent’s Shoes: Modelling Dynamic Preferences of Malicious Agents. (Doctoral Thesis, London School of Economics and Political Science, London, United Kingdom). URL: http://etheses.lse.ac.uk/id/eprint/773

Zumbado, Thomas Calderon (2011, August): An Investigation of the Philosophical Changes of the Abu Sayyaf Group Using Geospatial Analysis. (Master’s Thesis, University of Utah, Salt Lake City, United States). URL: http://content.lib.utah.edu/cdm/ref/collection/etd3/id/141

Journal Articles and Book Chapters

Albrecht, Hans-Jörg; Getoš, Anna-Maria (2010): Researching Terrorism and Organized Crime in Southeast Europe. In: Wolfgang Benedek et al. (Ed.): Transnational Terrorism, Organised Crime and Peace-Building: Human Security in the Western Balkans. Basingstoke: Palgrave Macmillan, 117-148.

Al-khateeb, Samer; Agarwal, Nitin (2015): Analyzing Deviant Cyber Flash Mobs of ISIL on Twitter. In: Nitin Agarwal; Kevin Xu; Nathaniel Osgood (Eds.): Social Computing, Behavioral-Cultural Modeling, and Prediction: 8th International Conference, SBP 2015, Washington, DC, USA, March 31–April 3, 2015: Proceedings. (Lecture Notes in Computer Science, Vol. 9021). Cham: Springer, 251-257. DOI: http://dx.doi.org/10.1007/978-3-319-16268-3_26

Allhoff, Fritz (2014): Empirical Objections to Torture: A Critical Reply. Terrorism and Political Violence, 26(4), 621-649. DOI: http://dx.doi.org/10.1080/09546553.2012.744306 URL: http://files.allhoff.org/research/Empirical_Objections_Torture.pdf

Alrajeh, Dalal; Gill, Paul (2015): A Logic-Based Approach to Understanding Lone-Actor Terrorism. In: Marina De Vos et al. (Eds.): Technical Communications of ICLP: Proceedings of the Technical Communications of the 31st International Conference on Logic Programming (ICLP 2015), Cork, Ireland, August 31–September 4, 2015. URL: http://ceur-ws.org/Vol-1433/tc_45.pdf

Altheide, David L. (2013): Terrorism and the National Security University: Public Order Redux. In: Norman K. Denzin (Ed.): 40th Anniversary of Studies in Symbolic Interaction. (Studies in Symbolic Interaction, Vol. 40). Bingley: Emerald, 317-333. DOI: http://dx.doi.org/10.1108/S0163-2396(2013)0000040017

Amer, Mona M.; Bagasra, Anisah (2013, April): Psychological Research with Muslim Americans in the Age of Islamophobia: Trends, Challenges, and Recommendations. American Psychologist, 68(3), 134-144. DOI: http://dx.doi.org/10.1037/a0032167

Andersen, Rune S.; Vuori, Juha A.; Guillaume, Xavier (2015, October): Chromatology of Security: Introducing Colours to Visual Security Studies. Security Dialogue, 46(5), 440-457. DOI: http://dx.doi.org/10.1177/0967010615585106

Anderson, Caryn L. (2014, October-November): On the Need for Combat Librarians: A Case Study of Knowledge Management at the End of the Iraq War. Proceedings of the American Society for Information Science and Technology, 51(1), 1-4. DOI: http://dx.doi.org/10.1002/meet.2014.14505101083 URL: https://www.asis.org/asist2014/proceedings/submissions/posters/216poster.pdf

Anderson, Caryn L. (2014): Combat Librarian: Knowledge Management in Iraq. [Poster]: http://cirss.lis.illinois.edu/Documents/Publications_docs/Anderson_2014a.pdf

Argomaniz, Javier; Vidal-Diez, Alberto (2015): Examining Deterrence and Backlash Effects in Counter-Terrorism: The Case of ETA. Terrorism and Political Violence, 27(1), 160-181. DOI: http://dx.doi.org/10.1080/09546553.2014.975648

Bakker, Ryan; Hill, Daniel W., Jr., Moore, Will H. (2014): Modeling Terror Attacks: A Cross-National, Out-of-Sample Study. In: Raul Caruso; Andrea Locatelli (Eds.): Understanding Terrorism: A Socio-Economic Perspective. (Contributions to Conflict Management, Peace Economics and Development, Vol. 22). Bingley: Emerald, 51-68. URL: http://myweb.fsu.edu/dwh06c/pages/documents/BakHilMoo-LocCarChap27Mar13.pdf

Balkesim, Saeid (2014, July): Semantic Processing of Visual Propaganda in the Online Environment. In: Carol K. Winkler; Cori E. Dauber (Eds.): Visual Propaganda and Extremism in the Online Environment. [e-Book]. Carlisle: Strategic Studies Institute (SSI); U.S. Army War College Press, 193-214. URL: http://www.strategicstudiesinstitute.army.mil/Pubs/display.cfm?pubID=1213

Barber, Victoria (2015, December): The Evolution of Al Qaeda’s Global Network and Al Qaeda Core’s Position within it: A Network Analysis. Perspectives on Terrorism, 9(6), 2-35. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/469

Bartolucci, Valentina (2015): Analysing the Terrorist Brain: Neurobiological Advances, Ethical Concerns and Social Implications. In: Alex Stedmon; Glyn Lawson (Eds.): Hostile Intent and Counter-Terrorism: Human Factors Theory and Application. (Human Factors in Defence). Farnham: Ashgate, 41-58.

Benedek, Wolfgang (2010): The Human Security Approach to Terrorism and Organized Crime in Post-Conflict Situations. In: Wolfgang Benedek et al. (Eds.): Transnational Terrorism, Organised Crime and Peace-Building: Human Security in the Western Balkans. Basingstoke: Palgrave Macmillan, 3-16.

Bennett, Andrew (2015): Using Process Tracing to Improve Policy Making: The (Negative) Case of the 2003 Intervention in Iraq. Security Studies, 24(2), 228-238. DOI: http://dx.doi.org/10.1080/09636412.2015.1036619

Bernardo, Luís Manuel A. V. (2011): Reasons of Violence, Violence of Reason: An Interpretation based on Eric Weil’s Core Paradox. In: Diogo Pires Aurélio; João Tiago Proença (Eds.): Terrorism: Politics, Religion, Literature. Newcastle upon Tyne: Cambridge Scholars Publishing, 35-68.

Bernauer, Thomas; Gleditsch, Nils Petter (Eds.) (2012): Event Data in the Study of Conflict. [Special Issue]. International Interactions, 38(4), 375-569. URL: http://www.tandfonline.com/toc/gini20/38/4

Bjørgo, Tore (2016): Counter-Terrorism as Crime Prevention: A Holistic Approach. Behavioral Sciences of Terrorism and Political Aggression, 8(1), 25-44. DOI: http://dx.doi.org/10.1080/19434472.2015.1108352

Blain, Michael (2015, March): Social Science Discourse and the Biopolitics of Terrorism. Sociology Compass, 9(3), 161-179. DOI: http://dx.doi.org/10.1111/soc4.12246

Bliesemann de Guevara, Berit (Ed.) (2014): Knowledge Production in Conflict: The International Crisis Group. [Special Issue]. Third World Quarterly, 35(4), 545-722. URL: http://www.tandfonline.com/toc/ctwq20/35/4

Borum, Randy; Fein, Robert; Vossekuil, Bryan (2012, September-October): A Dimensional Approach to Analyzing Lone Offender Terrorism. Aggression and Violent Behavior, 17(5), 389-396. DOI: http://dx.doi.org/10.1016/j.avb.2012.04.003

Bosi, Lorenzo; della Porta, Donatella (2015): Processes of Disengagement from Political Violence: A Multi-Level Relational Approach. In: Ioannis Tellidis; Harmonie Toros (Eds.): Researching Terrorism, Peace and Conflict Studies: Interaction, Synthesis, and Opposition. (Routledge Critical Terrorism Studies). Abingdon: Routledge, 81-100.

Bouchard, Martin; Nash, Rebecca (2015): Researching Terrorism and Counter-Terrorism through a Network Lens. In: Martin Bouchard (Ed.): Social Networks, Terrorism and Counter-Terrorism: Radical and Connected. (Contemporary Terrorism Studies). Abingdon: Routledge: 48-60.

Bouchard, Martin; Thomas, Evan (2015): Radical and Connected: Concluding Thoughts and Future Research. In: Martin Bouchard (Ed.): Social Networks, Terrorism and Counter-Terrorism: Radical and Connected. (Contemporary Terrorism Studies). Abingdon: Routledge: 218-230.

Boukalas, Christos (2014): No Exceptions: Authoritarian Statism: Agamben, Poulantzas and Homeland Security. Critical Studies on Terrorism, 7(1), 112-130. DOI: http://dx.doi.org/10.1080/17539153.2013.877667

Braithwaite, Alex; Johnson, Shane D. (2015): The Battle for Baghdad: Testing Hypotheses about Insurgency from Risk Heterogeneity, Repeat Victimization, and Denial Policing Approaches. Terrorism and Political Violence, 27(1), 112-132. DOI: http://dx.doi.org/10.1080/09546553.2014.972160

Breen-Smyth, Marie; Cooke, Samantha (2015): Essay 1 – A Critical Approach: Violence, “Victims”, and “Innocents”. In: Caroline Kennedy-Pipe; Gordon Clubb; Simon Mabon (Eds.): Terrorism and Political Violence. Los Angeles: SAGE, 69-84.

Brown, Katherine E. (2016): Marginality as a Feminist Research Method in Terrorism and Counter-Terrorism Studies. In: Priya Dixit; Jacob L. Stump (Eds.): Critical Methods in Terrorism Studies. Abingdon: Routledge, 137-149.

Bruce, James B.; George, Roger (2015, Fall): Professionalizing Intelligence Analysis. Journal of Strategic Security, 8(3), 1-23. DOI: http://dx.doi.org/10.5038/1944-0472.8.3.1454

Brück, Tilman; de Groot, Olaf J.; Ferguson, Neil T. N. (2014): Measuring Security. In: Raul Caruso; Andrea Locatelli (Eds.): Understanding Terrorism: A Socio-Economic Perspective. (Contributions to Conflict Management, Peace Economics and Development, Vol. 22). Bingley: Emerald, 69-96.

Burnap, Pete; Williams, Matthew L. (2015, June): Cyber Hate Speech on Twitter: An Application of Machine Classification and Statistical Modeling for Policy and Decision Making. Policy & Internet, 7(2), 223-242. DOI: http://dx.doi.org/10.1002/poi3.85

Busher, Joel; Macklin, Graham (2015): Interpreting “Cumulative Extremism”: Six Proposals for Enhancing Conceptual Clarity. Terrorism and Political Violence, 27(5), 884-905. DOI: http://dx.doi.org/10.1080/09546553.2013.870556

Cardazzone, Alessandro (2015): Understanding Islamic State through Complex Systems Analysis. Sicurezza, Terrorismo e Società, 1/2015. URL: http://www.sicurezzaterrorismosocieta.it/wp-content/uploads/2015/05/SICTERSOC-1-2015-Cardazzone-Understanding.pdf

Chermak, Steven; Gruenewald, Jeffrey A. (2015): Laying a Foundation for the Criminological Examination of Right-Wing, Left-Wing, and Al Qaeda-Inspired Extremism in the United States. Terrorism and Political Violence, 27(1), 133-159. DOI: http://dx.doi.org/10.1080/09546553.2014.975646

Chojnacki, Sven et al. (2012): Event Data on Armed Conflict and Security: New Perspectives, Old Challenges, and some Solutions. International Interactions: Empirical and Theoretical Research in International Relations, 38(4), 382-401. DOI: http://dx.doi.org/10.1080/03050629.2012.696981 URL: http://www.conflict-data.org/publications/EDACS/EDACS__Naked/Chojnacki_etal_IntIA_2012_forthcoming.pdf

Clubb, Gordon (2015): De-Radicalization, Disengagement and the Attitudes–Behavior Debate. In: Caroline Kennedy-Pipe; Gordon Clubb; Simon Mabon (Eds.): Terrorism and Political Violence. Los Angeles: SAGE, 258-266.

Collier, Michael W. (2013, Fall): Critical Thinking Instruction in Academia: What Can the U.S. Intelligence Community Expect? Journal of Strategic Security, 6(3, Suppl.), 61-64. DOI: http://dx.doi.org/10.5038/1944-0472.6.3S.6

Cozine, Keith (2015): Thinking Interestingly: The Use of Game Play to Enhance Learning and Facilitate Critical Thinking within a Homeland Security Curriculum. British Journal of Educational Studies, 63(3), 367-385. DOI: http://dx.doi.org/10.1080/00071005.2015.1069256

Crelinsten, Ronald (2014, February): Perspectives on Counterterrorism: From Stovepipes to a Comprehensive Approach. Perspectives on Terrorism, 8(1), 2-15. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/321

Crenshaw, Martha (2014): Terrorism Research: The Record. International Interactions: Empirical and Theoretical Research in International Relations, 40(4), 556-567. DOI: http://dx.doi.org/10.1080/03050629.2014.902817

Day, Joel (2015, December): Terrorist Practices: Sketching a New Research Agenda. Perspectives on Terrorism, 9(6), 85-94. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/473

Debrix, François (2016): Falling Bodies: Confronting the Iconography of Terror. In: Priya Dixit; Jacob L. Stump (Eds.): Critical Methods in Terrorism Studies. Abingdon: Routledge, 177-188.

Dechesne, Mark (2015, Summer): Radicalization and Mass Violence from a Beckerian Perspective: Conceptual and Empirical Considerations. Journal for Deradicalization, 3, 149-177. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/20

Decker, Scott H.; Pyrooz, David C. (2015, February): “I’m Down for a Jihad”: How 100 Years of Gang Research Can Inform the Study of Terrorism, Radicalization and Extremism. Perspectives on Terrorism, 9(1), 104-112. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/405

Deflem, Mathieu (2015): Introduction: The Study of Terrorism and Counterterrorism Today. In: Mathieu Deflem (Ed.): Terrorism and Counterterrorism Today. (Sociology of Crime, Law and Deviance, Vol. 20). Bingley: Emerald, ix-xiii.

Del Vicario, Michela et al. (2016, January): The Spreading of Misinformation Online. Proceedings of the National Academy of Sciences of the United States of America, 113(3), 554-559. DOI: http://dx.doi.org/10.1073/pnas.1517441113

Dixit, Priya; Stump, Jacob L. (2016): Conclusion: Beyond Terrorism? In: Priya Dixit; Jacob L. Stump (Eds.): Critical Methods in Terrorism Studies. Abingdon: Routledge, 191-198.

Dorsch, Christian (2015): A New Barometer for the Evolution of Multilateral Counterterrorism: Introduction to the Materials, Methods, and Results of the UN Security Council and Terrorism Dataset (UNSC-TDS). Terrorism and Political Violence, 27(4), 701-721. DOI: http://dx.doi.org/10.1080/09546553.2013.855635

Drozdova, Katya; Gaubatz, Kurt Taylor (2014, September): Reducing Uncertainty: Information Analysis for Comparative Case Studies. International Studies Quarterly, 58(3), 633-645. DOI: http://dx.doi.org/10.1111/isqu.12101

Ducol, Benjamin (2015): A Radical Sociability: In Defense of an Online/Offline Multidimensional Approach to Radicalization. In: Martin Bouchard (Ed.): Social Networks, Terrorism and Counter-Terrorism: Radical and Connected. (Contemporary Terrorism Studies). Abingdon: Routledge: 82-104.

Duyvesteyn, Isabelle; Michaels, Jeffrey H. (2016): Revitalizing Strategic Studies in an Age of Perpetual Conflict. Orbis, 60(1), 22-35. DOI: http://dx.doi.org/10.1016/j.orbis.2015.12.006

Edelmann, Florian (2014): Political Communication and Political Violence: A Luhmannian Perspective. Critical Studies on Terrorism, 7(1), 131-149. DOI: http://dx.doi.org/10.1080/17539153.2013.877668

Elejabarrieta Diaz, Gorka (2015): From Freedom Fighters to Terrorists and Back again: The Basque Case. In: Ioannis Tellidis; Harmonie Toros (Eds.): Researching Terrorism, Peace and Conflict Studies: Interaction, Synthesis, and Opposition. (Routledge Critical Terrorism Studies). Abingdon: Routledge, 146-164.

Enders, Walter; Sandler, Todd (2011, December): Who Adopts MIND/FIND in INTERPOL’s Fight against International Crime and Terrorism? Public Choice, 149(3), 263-280. DOI: http://dx.doi.org/10.1007/s11127-011-9839-2 URL: http://www.utdallas.edu/~tms063000/website/MIND_FIND_Final_Comp.pdf

Erlenbusch, Verena (2016): Terrorism: Knowledge, Power, Subjectivity. In: Priya Dixit; Jacob L. Stump (Eds.): Critical Methods in Terrorism Studies. Abingdon: Routledge, 108-120.

Fahey, Susan; LaFree, Gary (2015): Does Country-Level Social Disorganization Increase Terrorist Attacks? Terrorism and Political Violence, 27(1), 81-111. DOI: http://dx.doi.org/10.1080/09546553.2014.972156

Farrall, Leah (2015, Fall): Navigating Lived Experience: Reflections from the Field. Journal for Deradicalization, 4, 120-144. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/28

Feddes, Allard R.; Gallucci, Marcello (2015-2016, Winter): A Literature Review on Methodology Used in Evaluating Effects of Preventive and De-Radicalisation Interventions. Journal for Deradicalization, 5, 1-27. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/33

Fitzgerald, James (2015): Why me? An Autoethnographic Account of the Bizarre Logic of Counterterrorism. Critical Studies on Terrorism, 8(1), 163-180. DOI: http://dx.doi.org/10.1080/17539153.2015.1005934

Fontan, Victoria (2015): Out beyond Occupy Fallujah and the Islamic State in Iraq and Sham, there is a Field… In: Ioannis Tellidis; Harmonie Toros (Eds.): Researching Terrorism, Peace and Conflict Studies: Interaction, Synthesis, and Opposition. (Routledge Critical Terrorism Studies). Abingdon: Routledge, 165-186.

Forest, James J. F. (2015): An Introduction to the Study of Counterterrorism. In: James J. F. Forest (Ed.): Essentials of Counterterrorism. (Praeger Security International Textbooks). Santa Barbara: Praeger Security International, 1-32.

Freeman, Michael (2014): A Theory of Terrorist Leadership (and its Consequences for Leadership Targeting). Terrorism and Political Violence, 26(4), 666-687. DOI: http://dx.doi.org/10.1080/09546553.2012.751912

Freese, Rebecca (2014, February): Evidence-Based Counterterrorism or Flying Blind? How to Understand and Achieve what Works. Perspectives on Terrorism, 8(1), 37-56. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/324

Freilich, Joshua D.; Chermak, Steven M.; Gruenewald, Jeff (2015): The Future of Terrorism Research: A Review Essay. International Journal of Comparative and Applied Criminal Justice, 39(4), 353-369. DOI: http://dx.doi.org/10.1080/01924036.2014.922321 URL: https://media.8ch.net/pdfs/src/1433179192803-0.pdf

Freilich, Joshua D.; LaFree, Gary (Eds.) (2015): Criminological Theory and Terrorism. [Special Issue]. Terrorism and Political Violence, 27(1), 1-203. URL: http://www.tandfonline.com/toc/ftpv20/27/1

Freilich, Joshua D. et al. (2014): Introducing the United States Extremist Crime Database (ECDB). Terrorism and Political Violence, 26(2), 372-384. DOI: http://dx.doi.org/10.1080/09546553.2012.713229

Fu, Julei et al. (2015, November): The “Six-Element” Analysis Method for the Research on the Characteristics of Terrorist Activities. Annals of Operations Research, 234(1), 17-35. DOI: http://dx.doi.org/10.1007/s10479-013-1444-y

Fussey, Pete (2013, October): Eternal Return? Social Science Perspectives of “Upstream” Terrorist Activities. Journal of Police and Criminal Psychology, 28(2), 102-114. DOI: http://dx.doi.org/10.1007/s11896-013-9124-z

Fussey, Pete (2015): Understanding Terrorism through Criminology? Merging Crime Control and Counter-Terrorism in the UK. In: Alex Stedmon; Glyn Lawson (Eds.): Hostile Intent and Counter-Terrorism: Human Factors Theory and Application. (Human Factors in Defence). Farnham: Ashgate, 27-40.

Gentry, Caron E. (2015): Epistemological Failures: Everyday Terrorism in the West. Critical Studies on Terrorism, 8(3), 362-382. DOI: http://dx.doi.org/10.1080/17539153.2015.1081754

Gill, Paul; Corner, Emily (2013, February): Disaggregating Terrorist Offenders: Implications for Research and Practice. Criminology & Public Policy, 12(1), 93-101. DOI: http://dx.doi.org/10.1111/1745-9133.12015

Gleditsch, Kristian Skrede; Metternich, Nils W.; Ruggeri, Andrea (2014, March): Data and Progress in Peace and Conflict Research. Journal of Peace Research, 51(2), 301-314. DOI: http://dx.doi.org/10.1177/0022343313496803

Gleeson, Kathleen (2014): Analysing the “War on Terror” Discourse. In: Australia’s “War on Terror” Discourse. Farnham: Ashgate, 5-24.

Goerzig, Carolin; Al-Hashimi, Khaled (2015): Researching Radicalization. In: Radicalization in Western Europe. (Contemporary Terrorism Studies). Abingdon: Routledge, 34-43.

Gunaratna, Rohan (2013): The Evolving Role of Think Tanks in Countering Extremism and Terrorism. SEARCCT’s Selection of Articles, 1/2013, 53-65. URL: http://www.searcct.gov.my/images/PDF_My/publication/SEARCCT_Selection_of_Articles_Vol._1-2013.pdf

Hafez, Farid (2014, Fall): Disciplining the “Muslim Subject”: The Role of Security Agencies in Establishing Islamic Theology within the State’s Academia. Islamophobia Studies Journal, 2(2), 43-57. URL: http://crg.berkeley.edu/sites/default/files/ISJ_2014-15_Fall_Issue_-Final_Volume.pdf

Hafez, Mohammed; Mullins, Creighton (2015): The Radicalization Puzzle: A Theoretical Synthesis of Empirical Approaches to Homegrown Extremism. Studies in Conflict & Terrorism, 38(11), 958-975. DOI: http://dx.doi.org/10.1080/1057610X.2015.1051375

Hanafi, Sari; Arvanitis, Rigas (2014, September): The Marginalization of the Arab Language in Social Science: Structural Constraints and Dependency by Choice. Current Sociology, 62(5), 723-742. DOI: http://dx.doi.org/10.1177/0011392114531504

Harris-Hogan, Shandon; Barrelle, Kate (2016): Assisting Practitioners to Understand Countering Violent Extremism. Behavioral Sciences of Terrorism and Political Aggression, 8(1), 1-5. DOI: http://dx.doi.org/10.1080/19434472.2015.1104711

Harris-Hogan, Shandon; Barrelle, Kate; Zammit, Andrew (2016): What is Countering Violent Extremism? Exploring CVE Policy and Practice in Australia. Behavioral Sciences of Terrorism and Political Aggression, 8(1), 6-24. DOI: http://dx.doi.org/10.1080/19434472.2015.1104710

Harte, Liam (2011): New Terrorism and Mythic Terrorism: The Place of Philosophy in Studies of Terrorism. In: Diogo Pires Aurélio; João Tiago Proença (Eds.): Terrorism: Politics, Religion, Literature. Newcastle upon Tyne: Cambridge Scholars Publishing, 5-20.

Haspeslagh, Sophie; Dudouet, Veronique (2015): Conflict Resolution Practice in Conflicts Marked by Terrorist Violence: A Scholar-Practitioner Perspective. In: Ioannis Tellidis; Harmonie Toros (Eds.): Researching Terrorism, Peace and Conflict Studies: Interaction, Synthesis, and Opposition. (Routledge Critical Terrorism Studies). Abingdon: Routledge, 103-123.

Hattotuwa, Sanjana (2013): Big Data and Peacebuilding. [Commentary]. Stability, 2(3), Article 59. URL: http://doi.org/10.5334/sta.ct

Heath-Kelly, Charlotte (2016): Talking about Revolution: Ex-Militant Testimony and Conditions of “Tell-Ability”. In: Priya Dixit; Jacob L. Stump (Eds.): Critical Methods in Terrorism Studies. Abingdon: Routledge, 150-162.

Heath-Kelly, Charlotte; Jarvis, Lee; Baker-Beall, Christopher (Eds.) (2014): Critical Terrorism Studies: Practice, Limits and Experience. [Special Issue]. Critical Studies on Terrorism, 7(1), 1-186. URL: http://www.tandfonline.com/toc/rter20/7/1

Heath-Kelly, Charlotte; Jarvis, Lee; Baker-Beall, Christopher (2014): Editors’ Introduction: Critical Terrorism Studies: Practice, Limits and Experience. Critical Studies on Terrorism, 7(1), 1-10. DOI: http://dx.doi.org/10.1080/17539153.2014.881198

Helbing, Dirk et al. (2015, February): Saving Human Lives: What Complexity Science and Information Systems can Contribute. Journal of Statistical Physics, 158(3), 735-781. DOI: http://dx.doi.org/10.1007/s10955-014-1024-9

Hofmann, David C. (2015): Quantifying and Qualifying Charisma: A Theoretical Framework for Measuring the Presence of Charismatic Authority in Terrorist Groups. Studies in Conflict & Terrorism, 38(9), 710-733. DOI: http://dx.doi.org/10.1080/1057610X.2015.1048100

Holbrook, Donald (2015, October): Designing and Applying an “Extremist Media Index”. Perspectives on Terrorism, 9(5), 57-68. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/461

Hopkins, James (2014): Psychologically Disturbed and on the Side of the Terrorists: The Delegitimisation of Critical Intellectuals in Terrorism and Political Violence. Critical Studies on Terrorism, 7(2), 297-312. DOI: http://dx.doi.org/10.1080/17539153.2014.906983

Hsu, Henda Y.; Apel, Robert (2015): A Situational Model of Displacement and Diffusion Following the Introduction of Airport Metal Detectors. Terrorism and Political Violence, 27(1), 29-52. DOI: http://dx.doi.org/10.1080/09546553.2014.962989

Huey, Laura; Varanese, Joseph; Broll, Ryan (2015): The Gray Cygnet Problem in Terrorism Research. In: Martin Bouchard (Ed.): Social Networks, Terrorism and Counter-Terrorism: Radical and Connected. (Contemporary Terrorism Studies). Abingdon: Routledge: 34-47.

Hyslop, Daniel; Morgan, Thomas (2014): Measuring Terrorism with the Global Terrorism Index. In: Raul Caruso; Andrea Locatelli (Eds.): Understanding Terrorism: A Socio-Economic Perspective. (Contributions to Conflict Management, Peace Economics, and Development, Vol. 22). Bingley: Emerald, 97-114.

Idler, Annette; Paladini Adell, Borja (2015): When Peace Implies Engaging the “Terrorist”: Peacebuilding in Colombia through Transforming Political Violence and Terrorism. In: Ioannis Tellidis; Harmonie Toros (Eds.): Researching Terrorism, Peace and Conflict Studies: Interaction, Synthesis, and Opposition. (Routledge Critical Terrorism Studies). Abingdon: Routledge, 124-145.

Jackson, Richard (2015): The Epistemological Crisis of Counterterrorism. Critical Studies on Terrorism, 8(1), 33-54. DOI: http://dx.doi.org/10.1080/17539153.2015.1009762

Jackson, Richard (2015): The Literary Turn in Terrorism Studies. In: Randall D. Law (Ed.): The Routledge History of Terrorism. (The Routledge Histories). Abingdon: Routledge, 487-500.

Jackson, Richard (2015): Towards Critical Peace Research: Lessons from Critical Terrorism Studies. In: Ioannis Tellidis; Harmonie Toros (Eds.): Researching Terrorism, Peace and Conflict Studies: Interaction, Synthesis, and Opposition. (Routledge Critical Terrorism Studies). Abingdon: Routledge, 19-37.

Jackson, Richard (2016): Critical Discourse Analysis. In: Priya Dixit; Jacob L. Stump (Eds.): Critical Methods in Terrorism Studies. Abingdon: Routledge, 77-90.

Jarvis, Lee; Lister, Michael (2014): State Terrorism Research and Critical Terrorism Studies: An Assessment. Critical Studies on Terrorism, 7(1), 43-61. DOI:http://dx.doi.org/10.1080/17539153.2013.877669

Jarvis, Lee; Nouri, Lella; Whiting, Andrew (2015): Terrorism, Violence and Conflict in the Digital Age. In: Ioannis Tellidis; Harmonie Toros (Eds.): Researching Terrorism, Peace and Conflict Studies: Interaction, Synthesis, and Opposition. (Routledge Critical Terrorism Studies). Abingdon: Routledge, 203-218.

Johnson, N. F.; Johnson, D. E.; Restrepo, E. M. (2015): Modelling Insurgent Attack Dynamics across Geographic Scales and in Cyberspace. European Journal of Applied Mathematics. Advance Online Publication. DOI: http://dx.doi.org/10.1017/S0956792515000388

Johnston, Joan H.; Spiker, V. Alan (2015): Evaluating Counter-Terrorism Training Using Behavioural Measures Theory. In: Alex Stedmon; Glyn Lawson (Eds.): Hostile Intent and Counter-Terrorism: Human Factors Theory and Application. (Human Factors in Defence). Farnham: Ashgate, 317-336.

Jones, Daniel (2015, Summer): The Searchlight Archive Collection at the University of Northampton: A Research Note. Journal for Deradicalizaton, 3, 210-215. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/22

Jones, David Martin (2015): The Trouble with Empathising with Terrorists: Critical Theory and Terrorism. In: Ioannis Tellidis; Harmonie Toros (Eds.): Researching Terrorism, Peace and Conflict Studies: Interaction, Synthesis, and Opposition. (Routledge Critical Terrorism Studies). Abingdon: Routledge, 38-63.

Joseph, Jonathan (2016): Reading Documents in their Wider Context: Foucauldian and Realist Approaches to Terrorism Discourse. In: Priya Dixit; Jacob L. Stump (Eds.): Critical Methods in Terrorism Studies. Abingdon: Routledge, 19-32.

Jurek, Anna; Mulvenna, Maurice D.; Bi, Yaxin (2015, December): Improved Lexicon-Based Sentiment Analysis for Social Media Analytics. Security Informatics, 4, Article 9. DOI: http://dx.doi.org/10.1186/s13388-015-0024-x

Kennedy, Ryan (2015, September): Making Useful Conflict Predictions: Methods for Addressing Skewed Classes and Implementing Cost-Sensitive Learning in the Study of State Failure. Journal of Peace Research, 52(5), 649-664. DOI: http://dx.doi.org/10.1177/0022343315585611

Khadka, Alla G.; Byers, Mike (2015, March): The Influence of Collaboration on Research Quality: Social Network Analysis of Scientific Collaboration in Terrorism Studies Research Groups. In: Nitin Agarwal; Kevin Xu; Nathaniel Osgood (Eds.): Social Computing, Behavioral-Cultural Modeling, and Prediction: 8th International Conference, SBP 2015, Washington, DC, USA, March 31–April 3, 2015: Proceedings. (Lecture Notes in Computer Science, Vol. 9021). Cham: Springer, 111-120. DOI: http://dx.doi.org/10.1007/978-3-319-16268-3_12

Khalil, James (2014): Radical Beliefs and Violent Actions Are not Synonymous: How to Place the Key Disjuncture between Attitudes and Behaviors at the Heart of our Research into Political Violence. Studies in Conflict & Terrorism, 37(2), 198-211. DOI: http://dx.doi.org/10.1080/1057610X.2014.862902 URL: https://www.integrityglobal.com/wp-content/uploads/Khalil-Attitudes-and-Behaviours.pdf

Kirchhübel, Christin; Howard, David M.; Stedmon, Alex (2015): Deception and Speech: A Theoretical Overview to Inform Future Research. In: Alex Stedmon; Glyn Lawson (Eds.): Hostile Intent and Counter-Terrorism: Human Factors Theory and Application. (Human Factors in Defence). Farnham: Ashgate, 295-316.

Kitchen, Veronica M.; Molnar, Adam (2015): The Promise and Perils of Integrated Models of Public Safety in Canada. In: Martin Bouchard (Ed.): Social Networks, Terrorism and Counter-Terrorism: Radical and Connected. (Contemporary Terrorism Studies). Abingdon: Routledge: 175-195.

Klausen, Jytte et al. (2016): Toward a Behavioral Model of “Homegrown” Radicalization Trajectories. Studies in Conflict & Terrorism, 39(1), 67-83. DOI: http://dx.doi.org/10.1080/1057610X.2015.1099995

Koehler, Daniel (2014, October): German Right-Wing Terrorism in Historical Perspective: A First Quantitative Overview of the “Database on Terrorism in Germany (Right-Wing Extremism) – DTGrwx” Project”. Perspectives on Terrorism, 8(5), 48-58. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/377

Koehler, Daniel (2015): Contrast Societies: Radical Social Movements and their Relationships with their Target Societies: A Theoretical Model. Behavioral Sciences of Terrorism and Political Aggression, 7(1), 18-34. DOI: http://dx.doi.org/10.1080/19434472.2014.977325

Koellner, Patrick (2013): Think Tanks: The Quest to Define and to Rank Them. GIGA Focus Nahost, 10/2013. URL: https://giga.hamburg/de/publication/think-tanks-the-quest-to-define-and-to-rank-them

Kolliarakis, Georgios (2010): Networks and the Study of Criminal and Terrorist Organizations. In: Wolfgang Benedek et al. (Eds.): Transnational Terrorism, Organized Crime and Peace-Building: Human Security in the Western Balkans. Basingstoke: Palgrave Macmillan, 81-97.

Kumarovna, Tankenova Laura (2015, February): Terrorism and Extremism: Approaches to the Study. Asian Social Science, 11(6), 150-156. URL: http://dx.doi.org/10.5539/ass.v11n6p150

Kraft, Michael B. (2015): The U.S. Government’s Counterterrorism Research and Development Programs. In: James J. F. Forest (Ed.): Essentials of Counterterrorism. (Praeger Security International Textbooks). Santa Barbara: Praeger Security International, 195-220.

Kreutz, Joakim (2015, January): The War that Wasn’t there: Managing Unclear Cases in Conflict Data. Journal of Peace Research, 52(1), 120-124. DOI: http://dx.doi.org/10.1177/0022343314541845

LaFree, Gary; Dugan, Laura (2015): How has Criminology Contributed to the Study of Terrorism since 9/11? In: Mathieu Deflem (Ed.): Terrorism and Counterterrorism Today. (Sociology of Crime, Law and Deviance, Vol. 20). Bingley: Emerald, 3-24.

Lahoud, Nelly; Person, Robert (2015, July): In Search of New Approaches. CTC Sentinel, 8(7), 6-8. URL: https://www.ctc.usma.edu/posts/in-search-of-new-approaches

Lambert, Robert (2014): Researching Counterterrorism: A Personal Perspective from a Former Undercover Police Officer. Critical Studies on Terrorism, 7(1), 165-181. DOI: http://dx.doi.org/10.1080/17539153.2013.847262

Langlois, Ganaele (2015, April-June): What Are the Stakes in Doing Critical Research on Social Media Platforms? Social Media + Society, 1(1), Article 2056305115591178. DOI: http://dx.doi.org/10.1177/2056305115591178

Lascher, Edward L., Jr.; Melzer, Daniel (2013, October): Should “I” Be Avoided or Embraced? Exploring Divergence between Political Scientist and Student Writing Norms. PS: Political Science & Politics, 46(4), 802-807. DOI: http://dx.doi.org/10.1017/S1049096513001078

Lia, Ben-xian; Zhuc, Jun-fang; Wang, Shun-guo (2015, February): Networks Model of the East Turkistan Terrorism. Physica A: Statistical Mechanics and its Applications, 419(1), 479-486. DOI: http://dx.doi.org/10.1016/j.physa.2014.10.022

Loadenthal, Michael (2014): Introduction: Towards a Critical Understanding and Investigation of Political Violence – One Adjunct’s Humble Contributions to the Study of Terrorism. Critical Studies on Terrorism, 7(3), 357-362. DOI: http://dx.doi.org/10.1080/17539153.2014.955299

Loadenthal, Michael (2015): Introduction: Like Finding a Needle in a Pile of Needles: Political Violence and the Perils of a Brave New Digital World. Critical Studies on Terrorism, 8(3), 456-465. DOI: http://dx.doi.org/10.1080/17539153.2015.1094266

Loyle, Cyanne E.; Sullivan, Christopher; Davenport, Christian (2014, February): The Northern Ireland Research Initiative: Data on the Troubles from 1968 to 1998. Conflict Management and Peace Science, 31(1), 94-106. DOI: http://dx.doi.org/10.1177/0738894213501974

Lum, Cynthia; Kennedy, Leslie W.; Sherley, Alison J. (2006, January, updated: 2009, October): The Effectiveness of Counter-Terrorism Strategies. Campbell Systematic Reviews, 2(2). DOI: http://dx.doi.org/10.4073/csr.2006.2 URL: http://www.campbellcollaboration.org/lib/download/53/1010_R2.pdf

Lutz, James (2015): Essay 2 – A Critical View of Critical Terrorism Studies. In: Caroline Kennedy-Pipe; Gordon Clubb; Simon Mabon (Eds.): Terrorism and Political Violence. Los Angeles: SAGE, 85-94.

Lyness, Claire (2014): Governing the Suicide Bomber: Reading Terrorism Studies as Governmentality. Critical Studies on Terrorism, 7(1), 79-96. DOI: http://dx.doi.org/10.1080/17539153.2014.881199

Mabon, Simon (2015): Locating Terrorism Studies. In: Caroline Kennedy-Pipe; Gordon Clubb; Simon Mabon (Eds.): Terrorism and Political Violence. Los Angeles: SAGE, 5-17.

Maher, David; Thomson, Andrew (2016): Applying Marxism to Critical Terrorism Studies: Analysis through a Historical Materialist Lens. In: Priya Dixit; Jacob L. Stump (Eds.): Critical Methods in Terrorism Studies. Abingdon: Routledge, 33-46.

Marrin, Stephen (2012): Intelligence Studies Centers: Making Scholarship on Intelligence Analysis Useful. Intelligence and National Security, 27(3), 398-422. DOI: http://dx.doi.org/10.1080/02684527.2012.668082

Marton, Péter (2014): In Favour of a Strategic as Opposed to a Scientific Approach to Terrorism. In: Marko Milosevic; Kacper Rekawek (Eds.): Perseverance of Terrorism: Focus on Leaders. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 117). Amsterdam: IOS Press, 27-34. DOI: http://dx.doi.org/10.3233/978-1-61499-387-2-27

Maskaliunaite, Asta (2014): Methodological Challenges in the Study of Terrorist Leaders. In: Marko Milosevic; Kacper Rekawek (Eds.): Perseverance of Terrorism: Focus on Leaders. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 117). Amsterdam: IOS Press, 1-13. DOI: http://dx.doi.org/10.3233/978-1-61499-387-2-1

Maynard, Jonathan Leader (2013): A Map of the Field of Ideological Analysis. Journal of Political Ideologies, 18(3), 299-327. DOI: http://dx.doi.org/10.1080/13569317.2013.831589

McCauley, Clark; Moskalenko, Sophia (2014): Some Things we Think we’ve Learned since 9/11: A Commentary on Marc Sageman’s “The Stagnation in Terrorism Research”. Terrorism and Political Violence, 26(4), 601-606. DOI: http://dx.doi.org/10.1080/09546553.2014.895653

Medina, Richard M.; Hepner, George F. (2013): Sociocultural Understanding, Geospatial Data/Technologies, and Opportunities for Countering Terrorism. In: The Geography of International Terrorism: An Introduction to Spaces and Places of Violent Non-State Groups. Boca Raton: CRC Press, 137-184.

Middleton, Gordon R. (2015, Fall): Human Functions, Machine Tools, and the Role of the Analyst. Journal of Strategic Security, 8(3), 69-79. DOI: http://dx.doi.org/10.5038/1944-0472.8.3.1451

Mielczarek, Natalia; Perlmutter, David D. (2014, July): Big Pictures and Visual Propaganda: The Lessons of Research on the “Effects” of Photojournalistic Icons. In: Carol K. Winkler; Cori E. Dauber (Eds.): Visual Propaganda and Extremism in the Online Environment. [e-Book]. Carlisle: Strategic Studies Institute (SSI); U.S. Army War College Press, 215-232. URL: http://www.strategicstudiesinstitute.army.mil/Pubs/display.cfm?pubID=1213

Mills, John Thomas; Miller, DeMond Shondell (2015): Educating the Next Generation of Emergency Management and Homeland Security Professionals: Promoting Racial and Ethnic Understanding via Cultural Competence and Critical Race Theory. Journal of Applied Security Research, 10(4), 466-480. DOI: http://dx.doi.org/10.1080/19361610.2015.1069542

Morrison, John F. (2015): Peace Comes Dropping Slow: The Case of Northern Ireland. In: Ioannis Tellidis; Harmonie Toros (Eds.): Researching Terrorism, Peace and Conflict Studies: Interaction, Synthesis, and Opposition. (Routledge Critical Terrorism Studies). Abingdon: Routledge, 187-202.

Murphy, Eamon (2013): Conclusion: Critical Terrorism Studies, Islam and the Making of Terrorism in Pakistan. In: The Making of Terrorism in Pakistan: Historical and Social Roots of Extremism. (Routledge Critical Terrorism Studies). Abingdon: Routledge, 160-167.

Myres, Graham (2012): Investing in the Market of Violence: Toward a Micro-Theory of Terrorist Financing. Studies in Conflict & Terrorism, 35(10), 693-711. DOI: http://dx.doi.org/10.1080/1057610X.2012.712031

Omand, David; Bartlett, Jamie; Miller, Carl (2012): Introducing Social Media Intelligence (SOCMINT). Intelligence and National Security, 27(6), 801-823. DOI: http://dx.doi.org/10.1080/02684527.2012.716965 URL: https://preventviolentextremism.info/sites/default/files/Introducing%20Social%20Media%20Intelligence.pdf

Orr, Allan (2015): A Formula of Terrorism? Journal of Applied Security Research, 10(1), 97-120. DOI: http://dx.doi.org/10.1080/19361610.2015.972285

Pampinella, Stephen (2015): At War with Social Theory: Instrumental and Communicative Action in US Military Doctrine during the War on Terror. Small Wars & Insurgencies, 26(5), 721-743. DOI: http://dx.doi.org/10.1080/09592318.2015.1072321 URL: https://stephenpampinella.files.wordpress.com/2015/09/pampinella-at-war-with-social-theory-resubmission-to-small-wars-and-insurgencies.pdf

Park, Andrew J.; Tsang, Herbert H. (2015): A Systematic Approach to Developing a Computational Framework for Counter-Terrorism and Public Safety. In: Martin Bouchard (Ed.): Social Networks, Terrorism and Counter-Terrorism: Radical and Connected. (Contemporary Terrorism Studies). Abingdon: Routledge: 196-217.

Parkin, William S.; Freilich, Joshua D. (2015): Routine Activities and Right-Wing Extremists: An Empirical Comparison of the Victims of Ideologically- and Non-Ideologically-Motivated Homicides Committed by American Far-Rightists. Terrorism and Political Violence, 27(1), 182-203. DOI: http://dx.doi.org/10.1080/09546553.2014.975649

Perry, Chris (2013): Machine Learning and Conflict Prediction: A Use Case. Stability, 2(3), Article 56. DOI: http://dx.doi.org/10.5334/sta.cr

Perry, Simon; Hasisi, Badi (2015): Rational Choice Rewards and the Jihadist Suicide Bomber. Terrorism and Political Violence, 27(1), 53-80. DOI: http://dx.doi.org/10.1080/09546553.2014.962991 URL: http://islamspring2012.voices.wooster.edu/files/2012/02/perry-and-hasisi_rational-choice-rewards.pdf

Perry, Simon; Jonathan-Zamir, Tal (2016): Lessons from Empirical Research on Policing in Israel: Policing Terrorism and Police-Community Relationships. In: Tal Jonathan-Zamir; David Weisburd; Badi Hasisi (Eds.): Policing in Israel: Studying Crime Control, Community Policing, and Counter-Terrorism. (Advances in Police Theory and Practice Series). Boca Raton: CRC Press, 237-252.

Phillips, Brian J. (2015): What Is a Terrorist Group? Conceptual Issues and Empirical Implications. Terrorism and Political Violence, 27(2), 225-242. DOI: http://dx.doi.org/10.1080/09546553.2013.800048

Pisoiu, Daniela (2015): Subcultural Theory Applied to Jihadi and Right-Wing Radicalization in Germany. Terrorism and Political Violence, 27(1), 9-28. DOI: http://dx.doi.org/10.1080/09546553.2014.959406

Plümper, Thomas; Neumayer, Eric (2014): Terrorism and Counterterrorism: An Integrated Approach and Future Research Agenda. International Interactions: Empirical and Theoretical Research in International Relations, 40(4), 579-589. DOI: http://dx.doi.org/10.1080/03050629.2014.901316

Ramakhrisna, Kumar (2013): A Theoretical Framework for Understanding Radicalisation into Violent Extremism. SEARCCT’s Selection of Articles, 1/2013, 1-16. URL: http://www.searcct.gov.my/images/PDF_My/publication/SEARCCT_Selection_of_Articles_Vol._1-2013.pdf

Ratelle, Jean-François (2015): A Critical Assessment of the Scholarship on Violent Conflicts in the North Caucasus during the Post-Soviet Period. Caucasus Survey, 3(1), 1-24. DOI: http://dx.doi.org/10.1080/23761199.2015.1023600

Regan, Patrick M.; Meachum, M. Scott (2014, January): Data on Interventions during Periods of Political Instability. Journal of Peace Research, 51(1), 127-135. DOI: http://dx.doi.org/10.1177/0022343313505303

Renner, Judith; Spencer, Alexander (2015): Bringing Transitional Justice to Terrorism Research: Possibilities, Pitfalls and Critical Voices. In: Ioannis Tellidis; Harmonie Toros (Eds.): Researching Terrorism, Peace and Conflict Studies: Interaction, Synthesis, and Opposition. (Routledge Critical Terrorism Studies). Abingdon: Routledge, 64-80.

Resnick, Paul; Adar, Eytan; Lampe, Cliff (2015, May): What Social Media Data we are Missing and how to Get it. The ANNALS of the American Academy of Political and Social Science, 659(1), 192-206. DOI: http://dx.doi.org/10.1177/0002716215570006

Richards, Anthony (2015): The Meaning of Terrorism: Academic Perspectives. In: Conceptualizing Terrorism. Oxford: Oxford University Press, 51-65.

Richey, Melonie K.; Binz, Mathias (2015): Open Source Collection Methods for Identifying Radical Extremists Using Social Media. International Journal of Intelligence and CounterIntelligence, 28(2), 347-364. DOI: http://dx.doi.org/10.1080/08850607.2014.962374

Roberts, Adam (2015): Terrorism Research: Past, Present, and Future. Studies in Conflict & Terrorism, 38(1), 62-74. DOI: http://dx.doi.org/10.1080/1057610X.2014.976011

Rosenau, William et al. (2014): Why they Join, why they Fight, and why they Leave: Learning from Colombia’s Database of Demobilized Militants. Terrorism and Political Violence, 26(2), 277-285. DOI: http://dx.doi.org/10.1080/09546553.2012.700658

Ryan, Caitlin (2016): “We Are not the Terrorists!” Using a Reflexive Postcolonial Methodology in the West Bank of the Palestinian Territories. In: Priya Dixit; Jacob L. Stump (Eds.): Critical Methods in Terrorism Studies. Abingdon: Routledge, 123-134.

Sageman, Marc (2014): Low Return on Investment. Terrorism and Political Violence, 26(4), 614-620. DOI: http://dx.doi.org/10.1080/09546553.2014.895655

Sageman, Marc (2014): The Stagnation in Terrorism Research. Terrorism and Political Violence, 26(4), 565-580. DOI: http://dx.doi.org/10.1080/09546553.2014.895649 URL: http://www.michael-findley.com/uploads/2/0/4/5/20455799/sageman.pdf

Salehyan, Idean (2015, January): Best Practices in the Collection of Conflict Data. Journal of Peace Research, 52(1), 105-109. DOI: http://dx.doi.org/10.1177/0022343314551563

Salgado de Matos, Luís (2011): To Defeat Terrorism, Study Statistics and Send for the Priest. In: Diogo Pires Aurélio; João Tiago Proença (Eds.): Terrorism: Politics, Religion, Literature. Newcastle upon Tyne: Cambridge Scholars Publishing, 69-78.

Salvatore, Christopher; Rubin, Gabriel (2015, December): A Socio-Demographic Analysis of Responses to Terrorism. Journal of Homeland Security and Emergency Management, 12(4), 941-966. DOI: http://dx.doi.org/10.1515/jhsem-2013-0082

Sánchez-Cuenca, Ignacio (2014): Why do we Know so Little about Terrorism? International Interactions: Empirical and Theoretical Research in International Relations, 40(4), 590-601. DOI: http://dx.doi.org/10.1080/03050629.2014.899224

Sandham, Alexandra L. et al. (2015): On the Trail of the Terrorist: A Research Environment to Simulate Criminal Investigations. In: Alex Stedmon; Glyn Lawson (Eds.): Hostile Intent and Counter-Terrorism: Human Factors Theory and Application. (Human Factors in Defence). Farnham: Ashgate, 129-148.

Sandler, Todd (2009, Autumn): The Past and Future of Terrorism Research. Revista de Economía Aplicada, 17(50), 5-25. URL: http://www.revecap.com/revista/ingles/numeros/50/sandler.html

Sandler, Todd (2014, March): The Analytical Study of Terrorism: Taking Stock. Journal of Peace Research, 51(2), 257-271. DOI: http://dx.doi.org/10.1177/0022343313491277

Sangarasivam, Yamuna (2016): Ecologizing “Terrorism”: Attending to Emergent Pathways of Ethnographic Fieldwork, Writing, and Analysis. In: Priya Dixit; Jacob L. Stump (Eds.): Critical Methods in Terrorism Studies. Abingdon: Routledge, 59-74.

Schanzer, David H. (2014): No Easy Day: Government Roadblocks and the Unsolvable Problem of Political Violence: A Response to Marc Sageman’s “The Stagnation in Terrorism Research”. Terrorism and Political Violence, 26(4), 596-600. DOI: http://dx.doi.org/10.1080/09546553.2014.895652

Schmid, Alex P. (2014): Comments on Marc Sageman’s Polemic “The Stagnation in Terrorism Research”. Terrorism and Political Violence, 26(4), 587-595. DOI: http://dx.doi.org/10.1080/09546553.2014.895651

Schoenenberger, Lukas; Schenker-Wicki, Andrea; Beck, Mathias (2014, February): Analysing Terrorism from a Systems Thinking Perspective. Perspectives on Terrorism, 8(1), 16-36. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/323

Schrodt, Philip A. (2014, March): Seven Deadly Sins of Contemporary Quantitative Political Analysis. Journal of Peace Research, 51(2), 287-300. DOI: http://dx.doi.org/10.1177/0022343313499597

Schuurman, Bart (2014, August): Using Primary Sources for Terrorism Research: Introducing Four Case Studies. Perspectives on Terrorism, 8(4), 62-64. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/361

Schuurman, Bart; Bakker, Edwin (2016): Reintegrating Jihadist Extremists: Evaluating a Dutch Initiative, 2013-2014. Behavioral Sciences of Terrorism and Political Aggression, 8(1), 66-85. DOI: http://dx.doi.org/10.1080/19434472.2015.1100648

Schuurman, Bart; Eijkman, Quirine (2015): Indicators of Terrorist Intent and Capability: Tools for Threat Assessment. Dynamics of Asymmetric Conflict: Pathways toward terrorism and genocide, 8(3), 215-231. DOI: http://dx.doi.org/10.1080/17467586.2015.1040426

Schwedler, Jillian (2015, March): Why Academics Can’t Get beyond Moderates and Radicals In: Project on Middle East Political Science (POMEPS) (Ed.): Islamism in the IS Age. (POMEPS Studies, 12). Washington, DC: Editor, 9-13. URL: http://pomeps.org/2015/03/17/islamism-in-the-is-age

Sedgwick, Mark (2015, April): Jihadism, Narrow and Wide: The Dangers of Loose Use of an Important Term. Perspectives on Terrorism, 9(2), 34-41. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/417

Silke, Andrew (1998): Cheshire-Cat Logic: The Recurring Theme of Terrorist Abnormality in Psychological Research. Psychology, Crime & Law, 4(1), 51-69. DOI: http://dx.doi.org/10.1080/10683169808401747

Silke, Andrew; Schmidt-Petersen, Jennifer (2015, August): The Golden Age? What the 100 Most Cited Articles in Terrorism Studies Tell us. Terrorism and Political Violence. Advance Online Publication. DOI: http://dx.doi.org/10.1080/09546553.2015.1064397

Sinai, Joshua (2014): Developing a Model of Prison Radicalisation. In Andrew Silke (Ed.): Prisons, Terrorism and Extremism: Critical Issues in Management, Radicalisation and Reform. (Political Violence). Abingdon: Routledge, 35-46.

Skillicorn, D. B.; Leuprecht, C. (2015): Clustering Heterogeneous Semi-Structured Social Science Datasets. Procedia Computer Science, 51, 2908-2912. DOI: http://dx.doi.org/10.1016/j.procs.2015.05.474

Spaaij, Ramón; Hamm, Mark S. (2015): Key Issues and Research Agendas in Lone Wolf Terrorism. Studies in Conflict & Terrorism, 38(3), 167-178. DOI: http://dx.doi.org/10.1080/1057610X.2014.986979

Spalek, Basia (2012): Introducing Counter-Terrorism Studies. In Basia Spalek (Ed.): Counter-Terrorism: Community-Based Approaches to Preventing Terror Crime. New York: Palgrave Macmillan, 1-26.

Spalek, Basia; O’Rawe, Mary (2014): Researching Counterterrorism: A Critical Perspective from the Field in the Light of Allegations and Findings of Covert Activities by Undercover Police Officers. Critical Studies on Terrorism, 7(1), 150-164. DOI: http://dx.doi.org/10.1080/17539153.2013.847264

Spencer, Alexander (2016): Metaphor Analysis as a Method in Terrorism Studies. In: Priya Dixit; Jacob L. Stump (Eds.): Critical Methods in Terrorism Studies. Abingdon: Routledge, 91-107.

Sri Bhashyam, Sumitra; Montibeller, Gilberto (2015, June): In the Opponent’s Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models. Risk Analysis. Advance Online Publication. DOI: http://dx.doi.org/10.1111/risa.12422 URL: http://media.cygnus.com/files/base/MASS/document/2015/06/Bhashyam_et_al-2015-Risk_Analysis.pdf

Stedmon, Alex; Lawson, Glyn (2015): Hostile Intent and Counter-Terrorism: Strategic Issues and the Research Landscape. In: Alex Stedmon; Glyn Lawson (Eds.): Hostile Intent and Counter-Terrorism: Human Factors Theory and Application. (Human Factors in Defence). Farnham: Ashgate, 1-16.

Stedmon, Alex; Lawson, Glyn (2015): Hostile Intent and Counter-Terrorism: Future Research Themes and Questions. In: Alex Stedmon; Glyn Lawson (Eds.): Hostile Intent and Counter-Terrorism: Human Factors Theory and Application. (Human Factors in Defence). Farnham: Ashgate, 337-348.

Stein, Ewan (2014): Studying Islamism after the Arab Spring. Mediterranean Politics, 19(1), 149-152. DOI: http://dx.doi.org/10.1080/13629395.2013.856183

Stenersen, Anne (2014, July): Gathering Data through Court Cases: Implications for Understanding Visual Messaging. In: Carol K. Winkler; Cori E. Dauber (Eds.): Visual Propaganda and Extremism in the Online Environment. [e-Book]. Carlisle: Strategic Studies Institute (SSI); U.S. Army War College Press, 33-54. URL: http://www.strategicstudiesinstitute.army.mil/Pubs/display.cfm?pubID=1213

Stern, Jessica (2014): Response to Marc Sageman’s “The Stagnation in Terrorism Research”. Terrorism and Political Violence, 26(4), 607-613. DOI: http://dx.doi.org/10.1080/09546553.2014.895654

Stump, Jacob L.; Dixit, Priya (2016): Studying Terrorism and Practicing Criticism. [Introduction]. In: Priya Dixit; Jacob L. Stump (Eds.): Critical Methods in Terrorism Studies. Abingdon: Routledge, 3-16.

Sylvester, Christine (2014): Terror Wars: Boston, Iraq. Critical Studies on Terrorism, 7(1), 11-23. DOI: http://dx.doi.org/10.1080/17539153.2014.881202

Taylor, Max (2014): If I Were you, I wouldn’t Start from here: Response to Marc Sageman’s “The Stagnation in Terrorism Research”. Terrorism and Political Violence, 26(4), 581-586. DOI: http://dx.doi.org/10.1080/09546553.2014.895650

Tellidis, Ioannis (2015): Researching Terrorism, Peace and Conflict: An Introduction. In: Ioannis Tellidis; Harmonie Toros (Eds.): Researching Terrorism, Peace and Conflict Studies: Interaction, Synthesis, and Opposition. (Routledge Critical Terrorism Studies). Abingdon: Routledge, 1-16.

Thaler, Kai M. (2015): Mixed Methods Research in the Study of Political and Social Violence and Conflict. Journal of Mixed Methods Research. Advance Online Publication. DOI: http://dx.doi.org/10.1177/1558689815585196

Toros, Harmonie (2015): Terrorism Studies, Critical Terrorism Studies, and Peace Studies: A Vibrant Intersection or a Cul-de-Sac? [Introduction]. In: Ioannis Tellidis; Harmonie Toros (Eds.): Researching Terrorism, Peace and Conflict Studies: Interaction, Synthesis, and Opposition. (Routledge Critical Terrorism Studies). Abingdon: Routledge, 221-226.

Toros, Harmonie (2016): Terrorists as Co-Participants? Outline of a Research Model. In: Priya Dixit; Jacob L. Stump (Eds.): Critical Methods in Terrorism Studies. Abingdon: Routledge, 49-58.

Trottier, Daniel (2015, December): Coming to Terms with Social Media Monitoring: Uptake and early Assessment. Crime, Media, Culture, 11(3), 317-333. DOI: http://dx.doi.org/10.1177/1741659015593390

Vance, Colin; Ritter, Nolan (2014, July): Is Peace a Missing Value or a Zero? On Selection Models in Political Science. Journal of Peace Research, 51(4), 528-540. DOI: http://dx.doi.org/10.1177/0022343314528200

Van Dongen, Teun (2014): Towards a Full Understanding of Terrorist Leadership Elimination: A Research Agenda. In: Marko Milosevic; Kacper Rekawek (Eds.): Perseverance of Terrorism: Focus on Leaders. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 117). Amsterdam: IOS Press, 38-49. DOI: http://dx.doi.org/10.3233/978-1-61499-387-2-38

van Um, Eric; Pisoiu, Daniela (2015): Dealing with Uncertainty: The Illusion of Knowledge in the Study of Counterterrorism Effectiveness. Critical Studies on Terrorism, 8(2), 229-245. DOI: http://dx.doi.org/10.1080/17539153.2014.981400

Vogt, Manuel et al. (2015, October): Integrating Data on Ethnicity, Geography, and Conflict: The Ethnic Power Relations Data Set Family. Journal of Conflict Resolution, 59(7), 1327-1342. DOI: http://dx.doi.org/10.1177/0022002715591215 URL: http://www.icr.ethz.ch/icr/publications/vogt2015integrating.pdf

Volders, Brecht (2016): Assessing the Terrorist Threat: Impact of the Group’s Organizational Design? Studies in Conflict & Terrorism, 39(2), 106-127. DOI: http://dx.doi.org/10.1080/1057610X.2015.1092842

Walsh, James Igoe (2014, February): Big Data, Insider Threats, and International Intelligence Sharing. CTX, 4(1). URL: https://globalecco.org/big-data-insider-threats-and-international-intelligence-sharing

Wang, Chen; Bier, Vicki M. (2015, May): Quantifying Adversary Capabilities to Inform Defensive Resource Allocation. Risk Analysis. Advance Online Publication. DOI: http://dx.doi.org/10.1111/risa.12399 URL: http://create.usc.edu/sites/default/files/publications//quantifyingadversarycapabilitiestoinformdefensiveresourceallocation.pdf

Weber, Cynthia; Dixit, Priya (2016): Visualizing Others: A Conversation with Cynthia Weber on Films and Visuality in the “War on Terror”. In: Priya Dixit; Jacob L. Stump (Eds.): Critical Methods in Terrorism Studies. Abingdon: Routledge, 165-176.

Weidmann, Nils B. (2015, September): On the Accuracy of Media-Based Conflict Event Data. Journal of Conflict Resolution, 59(6), 1129-1149. DOI: http://dx.doi.org/10.1177/0022002714530431

Weidmann, Nils B.; Rød, Espen Geelmuyden (2015, January): Making Uncertainty Explicit: Separating Reports and Events in the Coding of Violence and Contention. Journal of Peace Research, 52(1), 125-128. DOI: http://dx.doi.org/10.1177/0022343314523807

Wesley, Robert (2014): Back to Fundamentals: Approaching the Study of the Ideology of Islamist Organizations. In: Rüdiger Lohlker; Tamara Abu-Hamdeh (Eds.): Jihadi Thought and Ideology. (Jihadism and Terrorism, Vol. 1). Berlin: Logos, 38-54.

Wilder, Ursula M. (2014, December): Inside the Inferno: Counterterrorism Professionals Reflect on their Work. Studies in Intelligence, 58(4, Unclassified Extracts). URL: http://www.brookings.edu/research/articles/2014/12/counterterrorism-professionals-reflect-on-their-work-wilder

Williams, Michael J.; Horgan, John G.; Evans, William P. (2016): The Critical Role of Friends in Networks for Countering Violent Extremism: Toward a Theory of Vicarious Help-Seeking. Behavioral Sciences of Terrorism and Political Aggression, 8(1), 45-65. DOI: http://dx.doi.org/10.1080/19434472.2015.1101147

Williams, Michael J.; Kleinman, Steven M. (2014): A Utilization-Focused Guide for Conducting Terrorism Risk Reduction Program Evaluations. Behavioral Sciences of Terrorism and Political Aggression, 6(2), 102-146. DOI: http://dx.doi.org/10.1080/19434472.2013.860183

Winter, Charlie; Hasan, Usama (2015, October): The Balanced Nation: Islam and the Challenges of Extremism, Fundamentalism, Islamism and Jihadism. Philosophia. Advance Online Publication. DOI: http://dx.doi.org/10.1007/s11406-015-9634-2

Yunos, Zahri; Ahmad, Rabiah; Abd Aziz, Noor Azwa Azreen (2013): Definition and Framework of Cyber Terrorism. SEARCCT’s Selection of Articles, 1/2013, 67-79. URL: http://www.searcct.gov.my/images/PDF_My/publication/SEARCCT_Selection_of_Articles_Vol._1-2013.pdf

Yunos, Zahri; Ahmad, Rabiah; Sabri, Nor Amalina Mohd (2015): A Qualitative Analysis for Evaluating a Cyber Terrorism Framework in Malaysia. Information Security Journal, 24(1-3), 15-23. DOI: http://dx.doi.org/10.1080/19393555.2014.998844

Zekulin, Michael (2016): Endgames: Improving our Understanding of Homegrown Terrorism. Studies in Conflict & Terrorism, 39(1), 46-66. DOI: http://dx.doi.org/10.1080/1057610X.2015.1084161

Grey Literature

Bartlett, Jamie; Reynolds, Louis (2015, September): The State of the Art 2015: A Literature Review of Social Media Intelligence Capabilities for Counter-Terrorism. (Demos Paper). URL: http://www.demos.co.uk/project/state-of-the-art-2015

Bencherif, Adib (2013, October): Les théories des mouvements sociaux et la dialectique des niveaux: Un cadre d’analyse pour l’étude des évolutions d’Al-Qaïda au Maghreb islamique. (TSAS Working Paper Series, No. 13-04). URL: http://library.tsas.ca/entries/les-theories-des-mouvements-sociaux-et-la-dialectique-des-niveaux-un-cadre-danalyse-pour-letude-des-evolutions-dal-qaida-au-maghreb-islamique

Bier, Vicki M. (2014, January): Calibration of Expert Judgments in Counterterrorism Risk Assessment. (CREATE Current Research Project Synopses, Paper 67). URL: http://research.create.usc.edu/cgi/viewcontent.cgi?article=1065&context=current_synopses

Canna, Sarah; Popp, George (2014): A New Information Paradigm? From Genes to “Big Data” and Instagram to Persistent Surveillance...Implications for National Security: 8th Annual Strategic Multi-Layer Assessment (SMA) Conference, 28-29 October 2014. (NSI Report). URL: http://www.phibetaiota.net/wp-content/uploads/2014/12/U_8th-Annual-SMA-Conference-2014-Final-1.pdf

Christmann, Kris (2012, November): Preventing Religious Radicalisation and Violent Extremism: A Systematic Review of the Research Evidence. (YJB Systematical Review). URL: https://www.gov.uk/government/publications/preventing-religious-radicalisation-and-violent-extremism

Cordesman, Anthony H. (2016, February): Key Trends in the Uncertain: Metrics of Terrorism. (CSIS Graphic Survey). URL: http://csis.org/publication/key-trends-metrics-terrorism

Davies, Garth; Dawson, Stephanie (2014, August): A Framework for Estimating the Number of Extremists in Canada. (TSAS Working Paper Series, No. 14-08). URL: http://library.tsas.ca/entries/tsas-wp14-08-a-framework-for-estimating-the-number-of-extremists-in-canada

DuBois, Raymond F. et al. (2015, November): Science, Technology, and U.S. National Security Strategy: The Role of the War Colleges. (CSIS Report). URL: http://csis.org/publication/science-technology-and-us-national-security-strategy

Edwards, Charlie; Jeffray, Calum (2015, April): The Future of Research and Development in the UK’s Security and Intelligence Sector. (RUSI Occasional Papers). URL: https://rusi.org/publication/occasional-papers/future-research-and-development-uk%E2%80%99s-security-and-intelligence-sector

Frenett, Ross; Dow, Moli (2015, September): One to One Online Interventions: A Pilot CVE Methodology. (Curtin University / ISD Report). URL: http://www.strategicdialogue.org/wp-content/uploads/2016/02/One2One_Web_v2.pdf

Gärtner, Heinz (2015, January): Besuch bei iranischen Think Tanks. (oiip Policy Paper, 1/2015). URL: http://www.oiip.ac.at/fileadmin/Unterlagen/Dateien/Publikationen/Policy_Paper/Iran_Think_Tanks_Policy_Paper.pdf

Gibbs, Samuel (2016, January 15): How to Use Search like a Pro: 10 Tips and Tricks for Google and beyond. The Guardian. URL: http://www.theguardian.com/technology/2016/jan/15/how-to-use-search-like-a-pro-10-tips-and-tricks-for-google-and-beyond

Gruenewald, Jeff et al. (2015, February): Validation of the Nationwide Suspicious Activity Reporting (SAR) Initiative: Identifying Suspicious Activities from the Extremist Crime Database (ECDB) and the American Terrorism Study (ATS). (Report to the U.S. Department of Homeland Security). URL: http://www.start.umd.edu/publication/validation-nationwide-suspicious-activity-reporting-sar-initiative-identifying

Hofmann, David C. (2015, May): Quantifying and Qualifying Charisma: A Theoretical Framework for Measuring the Presence of Charismatic Authority in Terrorist Groups. (TSAS Working Paper Series, No. 15-03). URL: http://library.tsas.ca/entries/tsas-wp-15-03-quantifying-and-qualifying-charisma-a-theoretical-framework-for-measuring-the-presence-of-charismatic-authority-in-terrorist-groups

Institute for Economics and Peace (2015, November): 2015 Global Terrorism Index. URL: http://economicsandpeace.org/wp-content/uploads/2015/11/2015-Global-Terrorism-Index-Report.pdf

Kitchen, Veronica (2014, June): The Effectiveness & Effects of Canada’s Integrated National Security Enforcement Teams. (TSAS Working Paper Series, No. 14-05). URL: http://library.tsas.ca/entries/the-effectiveness-effects-of-canadas-integrated-national-security-enforcement-teams-2

Knott, Kim et al. (2006, October): The Roots, Practices and Consequences of Terrorism : A Literature Review of Research in the Arts & Humanities. (University of Leeds Report). URL: http://www.leeds.ac.uk/arts/download/826/the_roots_practices_and_consequences_of_terrorism

Koos, Carlo (2015, June): What do we Know about Sexual Violence in Armed Conflicts? Recent Empirical Progress and Remaining Gaps in Peace and Conflict Research. (GIGA Working Papers, No. 275). URL: https://giga.hamburg/de/publication/what-do-we-know-about-sexual-violence-in-armed-conflicts

Koschade, Stuart (2006): An Assessment of Terrorism Studies in Australia: Recommendations and Future Directions. In: Proceedings Research Network for a Secure Australia – Closed Counter-Terrorism Workshop. Melbourne: Melbourne University. URL: http://eprints.qut.edu.au/6075/1/6075_1.pdf

McGann, James G. (2014, October): The Debate over Foreign Funding of U.S. Think Tanks or Are you now, or Have you ever Been, a Staff Member of a Think Tank? (FPRI E-Notes). URL: http://www.fpri.org/article/2014/10/the-debate-over-foreign-funding-of-u-s-think-tanks

Muslim Public Affairs Council (2012, June): Data on Post-9/11 Terrorism in the United States. (Policy Report). URL: http://www.mpac.org/publications/policy-papers/post-911-terrorism-database.php

Park, Andrew J.; Tsang, Herbert H. (2014, August): A Systematic Approach to Develop a Computational Framework for Counter-Terrorism and Public Safety. (TSAS Working Paper Series, No. 14-09). URL: http://library.tsas.ca/entries/tsas-wp14-09-a-systematic-approach-to-develop-a-computational-framework-for-counter-terrorism-and-public-safety

Pate, Amy (2015, January): Surveying the Literature on Counter-Terrorism, Counter-Insurgency, and Countering Violent Extremism: A Summary Report with a Focus on Africa. (Report to the Strategic Multilayer Assessment Office, Department of Defense, and the Office of University Programs, Department of Homeland Security). URL: http://www.start.umd.edu/publication/surveying-literature-counter-terrorism-counter-insurgency-and-countering-violent

Reding, Anaïs et al. (2014): Handling Ethical Problems in Counterterrorism: An Inventory of Methods to Support Ethical Decisionmaking. (RAND Research Reports, RR-251-WODC). URL: http://www.rand.org/pubs/research_reports/RR251.html

Sánchez, Juan A.; Pizarro Miranda, Juan (2015, January): How Local Ideas Spread in English: A Network Analysis of Think Tanks on Twitter. (Elcano Working Paper Series, WP 1/2015). URL: http://www.realinstitutoelcano.org/wps/portal/web/rielcano_en/contenido?WCM_GLOBAL_CONTEXT=/elcano/elcano_in/zonas_in/wp1-2015-sanchez-pizarro-how-local-ideas-spread-in-english-network-analysis-think-tanks-on-twitter

Schmid, Alex P. (2014, April): Terrorism Research and Government. (ICCT Perspectives). URL: http://icct.nl/publication/terrorism-research-and-government

Schroden, Jonathan; Rosenau, William; Warner, Emily (2016, February): Asking the Right Questions: A Framework for Assessing Counterterrorism Actions. (CNA Paper). URL: https://www.cna.org/CNA_files/PDF/DRM-2015-U-012261-Final.pdf

Note

Whenever retrievable, URLs for freely available versions of subscription-based publications have been provided. Thanks to the Open Access movement, self-archiving of publications in institutional repositories or on author homepages for free public use (so-called Green Open Access) has become more common. Please note, that the content of Green Open Access documents is not necessarily identical to the officially published versions (e.g., in case of pre-prints); it might therefore not have passed through all editorial stages publishers employ to ensure quality control (peer review, copy and layout editing etc.). In some cases, articles may only be cited after getting consent by the author(s).

About the compiler: Judith Tinnes, Ph.D., is a Professional Information Specialist. Since 2011, she works for the Leibniz Institute for Psychology Information (ZPID). Additionally, she serves as Information Resources Editor to Perspectives on Terrorism. In her editorial role, she regularly compiles bibliographies and other resources for Terrorism Research. She wrote her doctoral thesis on Internet usage by Islamist terrorists and insurgents (focus: media-oriented hostage takings). E-mail: [email protected]



Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

ENHANCING SECURITY THROUGH COLLABORATIVE RESEARCH

Perspectives on Terrorism is  a journal of the Terrorism Research Initiative and the Center for Terrorism and Security Studies

ISSN  2334-3745 (Online)

Disclaimer, Terms and Conditions