1,021
Views
35
CrossRef citations to date
0
Altmetric
Original Articles

A Historical Analysis of Mass Casualty Bombers

Pages 279-292 | Published online: 07 Jan 2011

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (12)

Tamir Bar-On & Miguel Paradela-López. (2023) Limitations and inconsistencies of using the four waves of modern terrorism to understand Latin America. Critical Studies on Terrorism 16:4, pages 744-766.
Read now
Yaohui Wang, Yupeng Shen & Zhaoying Han. (2022) Economic sanctions and state-sponsored terrorism: the case of Iran. Israel Affairs 28:5, pages 645-660.
Read now
Andrew F. Johnson, Wendi Pollock & Beth Rauhaus. (2020) Mass casualty event scenarios and political shifts: 2020 election outcomes and the U.S. COVID-19 pandemic. Administrative Theory & Praxis 42:2, pages 249-264.
Read now
Victor H. Asal, Hyun Hee Park, R. Karl Rethemeyer & Gary Ackerman. (2016) With Friends Like These … Why Terrorist Organizations Ally. International Public Management Journal 19:1, pages 1-30.
Read now
Daniel C. Tirone & James Gilley. (2015) Printing power: 3-D printing and threats to state security. Journal of Policing, Intelligence and Counter Terrorism 10:2, pages 102-119.
Read now
Teun van Dongen. (2014) The lengths terrorists go to: perpetrator characteristics and the complexity of jihadist terrorist attacks in Europe, 2004–2011. Behavioral Sciences of Terrorism and Political Aggression 6:1, pages 58-80.
Read now
Alexander Spencer. (2011) Sic[k] of the ‘new terrorism’ debate? A response to our critics. Critical Studies on Terrorism 4:3, pages 459-467.
Read now
Hemda Ben-Yehuda & Luba Levin-Banchik. (2010) The Dangers of Terror in World Politics: International Terror Crises, 1918–2006. Studies in Conflict & Terrorism 34:1, pages 31-46.
Read now
VictorH. Asal, R. Karl Rethemeyer, Ian Anderson, Allyson Stein, Jeffrey Rizzo & Matthew Rozea. (2009) The Softest of Targets: A Study on Terrorist Target Selection. Journal of Applied Security Research 4:3, pages 258-278.
Read now
Victor Asal & R. Karl Rethemeyer. (2008) Dilettantes, Ideologues, and the Weak: Terrorists Who Don't Kill. Conflict Management and Peace Science 25:3, pages 244-263.
Read now
RobertC. Rowland & Kirsten Theye. (2008) The Symbolic DNA of Terrorism. Communication Monographs 75:1, pages 52-85.
Read now

Articles from other publishers (23)

Kuldeep Yadav, Anoop Kumar Pandouria, Palak Bhagoria, Muddu Rahul Bharadwaj & Vikrant Tiwari. (2023) Structural response of monolithic and multi-stacked AA2014-T6 sheet specimens subjected to shock loading. Thin-Walled Structures 193, pages 111293.
Crossref
Justin Key Canfil. (2022) The illogic of plausible deniability: why proxy conflict in cyberspace may no longer pay. Journal of Cybersecurity 8:1.
Crossref
Ellen Chapin. (2021) Targeting Transients: The Strategic Logic for Terrorist Targeting of Internally Displaced Persons. Journal of Global Security Studies 6:4.
Crossref
Marieke Liem, Jelle van Buuren, Jeanine de Roy van Zuijdewijn, Hanneke Schönberger & Edwin Bakker. (2017) European Lone Actor Terrorists Versus “Common” Homicide Offenders: An Empirical Analysis. Homicide Studies 22:1, pages 45-69.
Crossref
Henda Y. Hsu & David McDowall. (2017) Does Target-hardening Result in Deadlier Terrorist Attacks against Protected Targets? An Examination of Unintended Harmful Consequences. Journal of Research in Crime and Delinquency 54:6, pages 930-957.
Crossref
Stefano Gurciullo & Slava J. Mikhaylov. (2017) Detecting policy preferences and dynamics in the UN general debate with neural word embeddings. Detecting policy preferences and dynamics in the UN general debate with neural word embeddings.
E. DuBois, K. Bowers & C. Rando. (2017) An examination of the spatial distribution of the tissue fragments created during a single explosive attack. Forensic Science International 279, pages 122-129.
Crossref
Nilay Saiya, Tasneem Zaihra & Joshua Fidler. (2017) Testing the Hillary Doctrine. Political Research Quarterly 70:2, pages 421-432.
Crossref
최관. (2012) Pakistan's Role in the Global War on Terror: Some Criminological Perspectives. Journal of South Asian Studies 18:2, pages 177-210.
Crossref
Ramon SpaaijRamón Spaaij. 2012. Understanding Lone Wolf Terrorism. Understanding Lone Wolf Terrorism 15 22 .
Antony Field. (2009) The ‘New Terrorism’: Revolution or Evolution?. Political Studies Review 7:2, pages 195-207.
Crossref
Victor Asal & R Karl Rethemeyer. 2009. Jihadists and Weapons of Mass Destruction. Jihadists and Weapons of Mass Destruction 335 358 .
Victor Asal & R. Karl Rethemeyer. (2008) The Nature of the Beast: Organizational Structures and the Lethality of Terrorist Attacks. The Journal of Politics 70:2, pages 437-449.
Crossref
Matthew J. MorganMatthew J. Morgan. 2008. The American Military After 9/11. The American Military After 9/11 9 29 .
Andrew Silke. 2008. Terrorism Informatics. Terrorism Informatics 27 50 .
WALTER ENDERS & TODD SANDLER. (2006) Distribution of Transnational Terrorism Among Countries by Income Class and Geography After 9/11. International Studies Quarterly 50:2, pages 367-393.
Crossref
G Bobby Kapur, H Range Hutson, Mark A. Davis & Phillip L. Rice. (2005) The United States Twenty-Year Experience With Bombing Incidents: Implications for Terrorism Preparedness and Medical Response. The Journal of Trauma: Injury, Infection, and Critical Care 59:6, pages 1436-1444.
Crossref
Daniel Byman. 2012. Deadly Connections. Deadly Connections.
Walter Enders & Todd Sandler. (2016) After 9/11. Journal of Conflict Resolution 49:2, pages 259-277.
Crossref
Todd SandlerDaniel G. Arce M.. (2016) Terrorism & Game Theory. Simulation & Gaming 34:3, pages 319-337.
Crossref
Todd Sandler. (2003) Collective Action and Transnational Terrorism. The World Economy 26:6, pages 779-802.
Crossref
Todd M. Sandler. (2003) Collective Action and Transnational Terrorism. SSRN Electronic Journal.
Crossref
Mirna El Masri & Brian J. Phillips. (2021) Threat Perception, Policy Diffusion, and the Logic of Terrorist Group Designation. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.