10.07.2015 Views

Historical Dictionary of Terrorism Third Edition

Historical Dictionary of Terrorism Third Edition

Historical Dictionary of Terrorism Third Edition

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

738 • BIBLIOGRAPHYDevost, Matthew G., Brian K. Houghton, and Neal Allen Pollard. “Information<strong>Terrorism</strong>: Political Violence in the Information Age.” <strong>Terrorism</strong> and PoliticalViolence 9, no. 1 (Spring 1997): 72–83.Dombroski, M. J., and Kathleen M. Carley. “NETEST: Estimating a TerroristNetwork’s Structure—Graduate Student Best Paper Award, CASOS 2002Conference.” Computational & Mathematical Organization Theory 8, no. 3(October 2002): 235–41.Giacomello, Giampiero. “Bangs for the Buck: A Cost-Benefit Analysis <strong>of</strong>Cyberterrorism.” Studies in Conflict and <strong>Terrorism</strong> 27, no. 5 (September–October 2004): 387–408.Goolsby, Rebecca. “Combating Terrorist Networks: An Evolutionary Approach.”Computational & Mathematical Organization Theory 12, no. 1(April 2006): 7–20.H<strong>of</strong>fman, Bruce. “The Myth <strong>of</strong> Grass-Roots <strong>Terrorism</strong>.” Foreign Affairs 87,no. 3 (May–June 2008): 133–38.Keller-McNulty, Sallie, Kirstie L. Bellman, Kathleen M. Carley, et al. DefenseModeling, Simulation, and Analysis: Meeting the Challenge. Washington,D.C.: National Academies, 2006.Krackhardt, David, and Jeffrey R. Hanson. “Informal Networks.” HarvardBusiness Review 7 (July–August 2003): 104–11.Laqueur, Walter. “<strong>Terrorism</strong> via the Internet: Views <strong>of</strong> W. Laqueur.” The Futurist31 (March–April 1997): 64–65.Madsen, Wayne. “Intelligence Agency Threats to Computer Security.” InternationalJournal <strong>of</strong> Intelligence and Counterintelligence 6, no. 4 (Winter1993): 413–88.Netwar Topic.“Special Issue: Netwar across the Spectrum <strong>of</strong> Conflict.” Studiesin Conflict and <strong>Terrorism</strong> 22, no. 3 (July–September 1999): 189–276.Pedahzur, Ami. Political Parties and Terrorist Groups. London: Routledge,2003.Perliger, Arie, and Ami Pedahzur. Middle Eastern <strong>Terrorism</strong> (Roots <strong>of</strong> <strong>Terrorism</strong>).New York: Chelsea House Publications, 2006.Ronfeldt, David. “Netwar across the Spectrum <strong>of</strong> Conflict: An IntroductoryComment.” Studies in Conflict and <strong>Terrorism</strong> 22, no. 3 (July–September1999): 189–92.Sageman, Marc. Understanding Terror Networks. Fredericksburg: University<strong>of</strong> Pennsylvania Press, 2004.———. Unmasking Terror: A Global Review <strong>of</strong> Terrorist Activities. Washington,D.C.: Jamestown Foundation, 2007.S<strong>of</strong>aer, Abraham D., Seymour E. Goodman, and Ekaterina A. Drozdova, eds.The Transnational Dimension <strong>of</strong> Cyber Crime and <strong>Terrorism</strong>. Stanford,Calif.: Hoover Press, 2001.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!