10.07.2015 Views

Historical Dictionary of Terrorism Third Edition

Historical Dictionary of Terrorism Third Edition

Historical Dictionary of Terrorism Third Edition

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

BIBLIOGRAPHY • 737Tucker, Jonathan B., ed. Toxic Terror: Assessing Terrorist Use <strong>of</strong> Chemicaland Biological Weapons. Cambridge, Mass.: MIT Press, 2002.Wood, M. Sandra, ed. Bioterrorism and Political Violence: Web Resources.Binghamton, N.Y.: Haworth, 2002.Zilinskas, Raymond A. “Aum Shinrikyo’s Chemical/Biological <strong>Terrorism</strong> as aParadigm?” Politics and the Life Sciences 15 (September 1996): 237–39.CYBERTERRORISM AND NETWORKSAlexander, Yonah, and Michael S. Swetnam, eds. Cyber <strong>Terrorism</strong> and InformationWarfare: Threats and Responses. Ardsley, N.Y.: Transnational, 2001.Arquilla, John, and David Ronfeldt. The Advent <strong>of</strong> Netwar. MR-789-OSD.Santa Monica, Calif.: RAND, 1996.———. “The Advent <strong>of</strong> Netwar: Analytical Background.” Studies in Conflictand <strong>Terrorism</strong> 22, no. 3 (July–September 1999): 193–206.———. In Athena’s Camp: Preparing for Conflict in the Information Age. MR-880-OSD/RC. Santa Monica, Calif.: RAND, 1997.———. “Netwar Revisited: The Fight for the Future Continues.” In Networks,<strong>Terrorism</strong> and Global Insurgency, edited by Robert J. Bunker, 8–19. London:Routledge, 2005.Borgatti, Stephen P. “Identifying Sets <strong>of</strong> Key Players in a Network.” Computational,Mathematical and Organizational Theory 12, no. 1 (2006):21–34.Bunker, Robert J. “Information Operations and the Conduct <strong>of</strong> Land Warfare.”Military Review 78, no. 5 (September–November 1998): 4–17.Bunker, Robert J., and Matt Begert. “Operational Combat Analysis <strong>of</strong> the AlQaeda Network.” In Networks, <strong>Terrorism</strong> and Global Insurgency, edited byRobert J. Bunker, 146–69. London: Routledge, 2005.Carley, Kathleen, Ju-Sung Lee, and David Krackhardt. “Destabilizing Networks.”Connections 24, no. 3 (2001): 31–34.Carley, Kathleen, Jeffrey Reminga, and Natasha Kamneva. “Destabilization <strong>of</strong>Covert Networks.” Computational & Mathematical Organization Theory 12,no. 1 (April 2006): 51–66.———. “Destablizing Terrorist Networks.” www.casos.cs.cmu.edu/publications/papers/carley_2003_destabilizingterrorist. pdf (accessed on 15 August2008).Cillufo, Frank J., and Curt H. Gergely. “Information Warfare and Strategic <strong>Terrorism</strong>.”<strong>Terrorism</strong> and Political Violence 9, no. 1 (Spring 1997): 84–94.Corman, Steven. “Using Activity Focus Networks to Pressure Terrorist Organizations.”Computational & Mathematical Organization Theory 12, no. 1(April 2006): 35–49.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!