10.07.2015 Views

Historical Dictionary of Terrorism Third Edition

Historical Dictionary of Terrorism Third Edition

Historical Dictionary of Terrorism Third Edition

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

BIBLIOGRAPHY • 733CONVENTIONAL AND NONCONVENTIONAL OPERATIONSAtran, Scott. “Mishandling Suicide <strong>Terrorism</strong>.” Washington Quarterly 27, no.3 (Summer 2004): 67–90.Ballard, James D., Joseph G. Hornik, and Douglas McKenzie. “TechnologicalFacilitation <strong>of</strong> <strong>Terrorism</strong>: Definitional, Legal, and Policy Issues.” AmericanBehavioral Scientist 45, no. 6 (2002): 989–1016.Biegel, Stuart. Beyond Our Control: Confronting the Limits <strong>of</strong> Our Legal Systemin the Age <strong>of</strong> Cyberspace. Cambridge, Mass.: MIT Press, 2003.Cameron, Gavin. “Multi-track Microproliferation: Lessons from Aum Shinrikyoand al Qaida.” Studies in Conflict and <strong>Terrorism</strong> 22, no. 4 (October–December 1999): 277–310.Chesterman, Simon. “Occupation as Liberation: International Humanitarian Lawand Regime Change.” Ethics and International Affairs 18, no. 3 (2005): 51–64.Cimbala, Stephen J. “Information Warfare and Nuclear Conflict Termination.”European Security 7, no. 4 (1998): 69–90.Demarest, Ge<strong>of</strong>frey. “Geopolitics and Urban Armed Conflict: The PotentialChallenge to US Army Operations.” Small Wars and Insurgencies 6, no. 1(Spring 1995): 44–67.Dershowitz, Alan M. Why <strong>Terrorism</strong> Works: Understanding the Threat, Respondingto the Challenge. New Haven, Conn.: Yale University Press, 2002.Diehl, Paul F. “Avoiding Another Beirut Disaster for the Employment <strong>of</strong> U.S.Troops in Peacekeeping Roles.” Conflict 8, no. 4 (1988): 261–70.Drake, C. J. M. Terrorists’ Target Selection. Basingstoke, Hampshire, UK:Palgrave Macmillan, 1998.Embar-Seddon, Ayn. “Cyberterrorism: Are We under Seige?” American BehavioralScientist 45, no. 6 (2002):1033–43.Fishel, Kimbra L. “Challenging the Hegemon: Al Qaeda’s Elevation <strong>of</strong> AsymmetricWarfare onto the Global Area.” In Networks, <strong>Terrorism</strong> and GlobalInsurgency, edited by Robert J. Bunker, 115–28. London: Routledge, 2005.Frum, David, and Richard Perle. An End to Evil: How to Win the War on Terror.New York: Random House, 2003.Gause, F. Gregory, III. “Can Democracy Stop <strong>Terrorism</strong>?” Foreign Affairs 84,no. 5 (September–October 2005): 62–76.Gotowicki, Stephen H. “Confronting <strong>Terrorism</strong>: New War Form or MissionImpossible?” Military Review 77, no. 3 (May–June 1997): 61–66.Hammes, Col. Thomas X. The Sling and the Stone: On War in the 21st Century.St. Paul, Minn.: Zenith Press, 2004.Henzel, Christopher. “The Origins <strong>of</strong> al Qaeda’s Ideology: Implications forU.S. Strategy.” Parameters XXXV, no. 1 (Spring 2005): 69–80.Hillyard, Michael. “Organizing for Homeland Security.” Parameters XXXII,no. 1 (Spring 2002): 75–85.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!