2,559
Views
26
CrossRef citations to date
0
Altmetric
Articles

The future of terrorism research: a review essay

, &

References

  • Akyuz, K., & Armstrong, T. (2011). Understanding the sociostructural correlates of terrorism in Turkey. International Criminal Justice Review, 21(2), 134–155. doi:10.1177/1057567711407332
  • Asal, V., & Rethemeyer, K. (2008). The nature of the beast: Organizational structures and the lethality of terrorist attacks. The Journal of Politics, 70(2), 437–449. doi:10.1017/S0022381608080419
  • Asal, V., & Wilkenfeld, J. (2013). Ethnic conflict: An organizational perspective. Penn State Journal of Law & International Affairs, 2(1), 91–102.
  • Bakker, E. (2006). Jihadi terrorists in Europe, their characteristics and the circumstances in which they joined the Jihad: An exploratory study. The Hague: Clingendael Institute.
  • Belli, R. (2011). Where political extremists and greedy criminals meet: A comparative study of financial crimes and criminal networks in the united states ( PhD Dissertation). Graduate Center, John Jay College, CUNY, New York.
  • Berko, A., & Erez, E. (2005). Ordinary people and “death work”: Palestinian suicide bombers as victimizers and victims. Violence and Victims, 20(6), 603–623.
  • Berko, A., & Erez, E. (2007). Gender, Palestinian women and terrorism: Women’s liberation or oppression? Studies in Conflict & Terrorism, 30, 493–519. doi:10.1080/10576100701329550
  • Berrebi, C. (2009). The economics of terrorism and counter terrorism. In P. K. Davis & K. Cragin (Eds.), Social science for counterterrorism: Putting the pieces together (pp. 151–202). Santa Monica, CA: RAND.
  • Blazak, R. (2001). White boys to terrorist men: Target recruitment of Nazi skinheads. American Behavioral Scientist, 44(6), 982–1000. doi:10.1177/00027640121956629
  • Bloom, M. (2004). Dying to kill: The global phenomenon of suicide terror. New York, NY: Columbia University Press.
  • Boba, R. (2009). Evil done. Crime Prevention Studies Series, 25, 71–92.
  • Braithwaite, A., & Johnson, S. D. (2012). Space–time modeling of insurgency and counterinsurgency in Iraq. Journal of Quantitative Criminology, 28(1), 31–48. doi:10.1007/s10940-011-9152-8
  • Chermak, S. M., Freilich, J. D., Parkin, W. S., & Lynch, J. P. (2012). American terrorism and extremist crime data sources and selectivity bias: An investigation focusing on homicide events committed by far-right extremists. Journal of Quantitative Criminology, 28(1), 191–218. doi:10.1007/s10940-011-9156-4
  • Chermak, S. M., Freilich, J. D., & Shemtob, Z. (2009). Law enforcement training and the domestic far-right. Criminal Justice and Behavior, 36(12), 1305–1322. doi:10.1177/0093854809345630
  • Chermak, S. M., Freilich, J. D., & Suttmoeller, M. (2013). The organizational dynamics of far-right hate groups in the United States: Comparing violent to non-violent organizations. Studies in Conflict and Terrorism, 36(3), 193–218. doi:10.1080/1057610X.2013.755912
  • Clarke, R. V., & Newman, G. R. (2006). Outsmarting the terrorists. New York, NY: Praeger.
  • Della Porta, D. (2006). Social movements, political violence, and the state: A comparative analysis of Italy and Germany. New York, NY: Cambridge University Press.
  • Department of Homeland Security. (2011). Blueprint for a secure cyber future: The cybersecurity strategy for the homeland enterprise. Washington, DC: Department of Homeland Security.
  • Dugan, L., & Chenoweth, E. (2012). Moving beyond deterrence: The effectiveness of raising the expected utility of abstaining from terrorism in Israel. American Sociological Review, 77(4), 597–624. doi:10.1177/0003122412450573
  • Dugan, L., LaFree, G., & Piquero, A. (2005). Testing a rational choice model of airline hijackings. Criminology, 43, 1031–1065. doi:10.1111/j.1745-9125.2005.00032.x
  • Enders, W., & Sandler, T. (2006). The political economy of terrorism. Cambridge: Cambridge University Press.
  • Ezekiel, R. S. (1995). Inside the racist mind: Portraits of American Neo-Nazis and Klansmen. New York, NY: Penguin.
  • Federal Bureau of Investigation. (2013). Quick facts. Retrieved from http://www.fbi.gov/about-us/quick-facts
  • Freilich, J. D., & Chermak, S. M. (2009). Preventing deadly encounters between law enforcement and American far-rightists. Crime Prevention Studies, 25, 141–172.
  • Freilich, J. D., Chermak, S. M., Belli, R., Gruenewald, J., & Parkin, W. S. (2014). Introducing the United States extremis crime database (ECDB). Terrorism & Political Violence, 26(2), 372–384. doi:10.1080/09546553.2012.713229
  • Freilich, J. D., Chermak, S. M., & Caspi, D. (2009). Critical events in the life trajectories of domestic extremist white supremacist groups: A case study analysis of four violent organizations. Criminology and Public Policy, 8(3), 497–530. doi:10.1111/j.1745-9133.2009.00572.x
  • Freilich, J. D., Chermak, S. M., Lynch, J. P., & Parkin, W. S. (2008). Improvised explosive devices (IEDs) thought piece. Task force on the human and social forces in the spread of the IED threat: Innovation, diffusion, and adaptation). College Park, MD: START, DHS COE, University of Maryland.
  • Freilich, J. D., Chermak, S. M., & Simone Jr., J. (2009). Surveying American state police agencies about terrorism threats, terrorism sources, and terrorism definitions. Terrorism and Political Violence, 21, 450–475.
  • Gruenewald, J. A. (2011). A comparative examination of homicides perpetrated by far-right extremists. Homicide Studies, 15, 177–203. doi:10.1177/1088767911408029
  • Gruenewald, J. A., Chermak, S. M., & Freilich, J. D. (2013). Distinguishing “loner” attacks from other domestic extremist violence: A comparison of far-right homicide incident and offender characteristics. Criminology and Public Policy, 12(1), 65–91. doi:10.1111/1745-9133.12008
  • Gruenewald, J. A., & Pridemore, W. A. (2012). A comparison of ideologically-motivated homicides from the new extremist crime database and homicides from the supplementary homicide reports using multiple imputation by chained equations to handle missing values. Journal of Quantitative Criminology, 28, 141–162. doi:10.1007/s10940-011-9155-5
  • Hafez, M. (2006). Rationality, culture, and structure in the making of suicide bombers: A preliminary theoretical synthesis and illustrative case study. Studies in Conflict and Terrorism, 29(2), 165–185. doi:10.1080/10576100500496964
  • Hamm, M. (2007). Terrorism as crime: From Oklahoma City to Al Qaeda and beyond. New York, NY: New York University Press.
  • Hamm, M. S. (1993). American skinheads: The criminology and control of hate crime. Westport: Praeger.
  • Handler, J. S. (1990). Socioeconomic profile of an American terrorist: 1960s and 1970s. Terrorism, 13, 195–213. doi:10.1080/10576109008435831
  • Hassan, N. (2001). An arsenal of believers. The New Yorker, 19, 36–41.
  • Hewitt, C. (2003). Understanding terrorism in America: From the Klan to Al Qaeda. New York, NY: Routledge.
  • Hoffman, B. (1998). Inside terrorism. New York, NY: Columbia University Press.
  • Holt, T. J. (2012). Exploring the intersections of technology, crime and terror. Terrorism and Political Violence, 24, 337–354. doi:10.1080/09546553.2011.648350
  • Horgan, J. (2004). The case for firsthand research. In A. Silke (Ed.), Research on terrorism: Trends, achievements and failures (pp. 30–56). London: Frank Cass.
  • Horgan, J. (2009). Walking away from terrorism: Accounts of disengagement from radical extremist movements. New York, NY: Routledge.
  • Jamieson, A. (1989). The heart attacked. London: Marion Boyars.
  • Jurgensmeyer, M. (2003). Terror in the mind of god. Berkeley, CA: University of California Press.
  • Keene, S. D. (2011). Terrorism and the internet: A double-edged sword. Journal of Money Laundering Control, 14(4), 359–370. doi:10.1108/13685201111173839
  • Kerodal, A., Freilich, J. D., & Chermak, S. M. (in press). National security and domestic terrorism. In J. P. Wright (Ed.), International encyclopedia of social and behavioral sciences (2nd ed.). Oxford: Elsevier Limited.
  • Krueger, A. (2007). What makes a terrorist: Economics and the roots of terrorism. Princeton, NJ: Princeton University Press.
  • LaFree, G., & Dugan, L. (2004). How does studying terrorism compare to studying crime? Terrorism and counter-terrorism: Criminological perspectives: Sociology of crime law and deviance. Amsterdam: Elsevier, JAI.
  • LaFree, G., & Dugan, L. (2007). Introducing the global terrorism database. Terrorism and Political Violence, 19, 181–204. doi:10.1080/09546550701246817
  • LaFree, G., Dugan, L., & Korte, R. (2009). The impact of British counter terrorist strategies on political violence in northern Ireland: Comparing deterrence and backlash models. Criminology, 47(1), 17–45. doi:10.1111/j.1745-9125.2009.00138.x
  • LaFree, G., Dugan, L., Xie, M., & Singh, P. (2012). Spatial and temporal patterns of terrorist attacks by ETA, 1970 to 2007. Journal of Quantitative Criminology, 28, 7–29. doi:10.1007/s10940-011-9133-y
  • Lankford, A. (2013). The myth of martyrdom: What really drives suicide bombers, rampage shooters and other self-destructive killers. New York, NY: Palgrave MacMillan.
  • Leuprecht, C., Hataley, T., Moskalenko, S., & Clark, M. (2010). Narratives and counter-narratives for global jihad: Opinion versus action. In E. J. A. M. Kessels (Ed.), Countering violent extremist narratives (pp. 58–71). Breda: National Coordinator for Counterterrorism (NCTb). Retrieved from http://english.nctb.nl/Images/Countering%20Violent%20Extremist%20Narratives_tcm92-259489.pdf?cp=92&cs=25496
  • Lewis, J. A. (2013). Significant cyber incidents since 2006. Center for Strategic & International Studies. Retrieved from http://csis.org/files/publication/140310_Significant_Cyber_Incidents_Since_2006.pdf
  • Lum, C., Kennedy, L. W., & Sherley, A. J. (2007). Are counter-terrorism strategies effective? The results of the Campbell systematic review on counter-terrorism evaluation research. Journal of Experimental Criminology, 2, 489–516. doi:10.1007/s11292-006-9020-y
  • Maras, M. H. (2013). Counterterrorism. Burlington, MA: Jones & Bartlett Learning.
  • McCauley, C., & Moskalenco, S. (2011). Friction: How radicalization happens to them and us. New York, NY: Oxford University Press.
  • Merari, A. (2005). Suicide terrorism. Hoboken, NJ: John Wiley and Sons.
  • Orsini, A. (2013). A day among the diehard terrorists: The psychological costs of doing ethnographic research. Studies in Conflict and Terrorism, 36, 337–351. doi:10.1080/1057610X.2013.763601
  • Pape, R. (2003). The strategic logic of suicide terrorism. American Political Science Review, 97(3), 343–361. doi:10.1017/S000305540300073X
  • Pape, R. (2005). Dying to win: The strategic logic of suicide terrorism. New York, NY: Random House.
  • Parkin, W. S., & Freilich, J. D. (in press). Routine activities and right-wing extremists: An empirical comparison of the victims test of ideologically motivated and non-ideologically motivated homicides committed by American far-rightists. 27(1).
  • Parkin, W. S., Freilich, J. D., & Chermak, S. M. (2014). Ideological victimization: Homicides perpetrated by far-right extremists. Homicide Studies. Advance online publication. doi:10.1177/1088767914529952
  • Post, J. M., Sprinzak, E., & Denny, L. M. (2003). The terrorists in their own words: Interviews with 35 incarcerated Middle Eastern terrorists. Terrorism and Political Violence, 15(1), 171–184. doi:10.1080/09546550312331293007
  • Pridemore, W. A., & Freilich, J. D. (2007). The impact of state laws protecting abortion clinics and reproductive rights on crimes against abortion providers: Deterrence, backlash, or neither? Law and Human Behavior, 31(6), 611–627. doi:10.1007/s10979-006-9078-0
  • Sageman, M. (2004). Understanding terrorism networks. Philadelphia: University of Pennsylvania Press.
  • Schmid, A., & Jongman, A. (1988). Political terrorism: A new guide to actors, authors, concepts, data bases, theories and literature. Amsterdam: North Holland.
  • Shapiro, J. (2013). The terrorist’s dilemma: Managing violent covert organizations. Princeton, NJ: Princeton University Press.
  • Silke, A. (2001). The devil you know: Continuing problems with research on terrorism. Terrorism and Political Violence, 13(4), 1–14. doi:10.1080/09546550109609697
  • Silke, A. (2008). Research on terrorism: The impact of 9/11 and the global war on terrorism. In H. Chen, E. Reid, J. Sinai, A. Silke, & B. Ganor (Eds.), Terrorism informatics: Knowledge management and data mining for homeland security (pp. 27–50). New York, NY: Springer-Verlag.
  • Smith, B. L. (1994). Terrorism in America: Pipe bombs and pipe dreams. New York, NY: State University of New York Press.
  • Smith, B. L., & Damphousse, K. R. (1996). Punishing political offenders: The effect of political motive on federal sentencing decisions. Criminology, 34(3), 289–322. doi:10.1111/j.1745-9125.1996.tb01209.x
  • Smith, B. L., & Damphousse, K. R. (1998). Terrorism, politics and punishment: A test of structural-contextual theory and the liberation hypothesis. Criminology, 36(1), 67–92. doi:10.1111/j.1745-9125.1998.tb01240.x
  • Smith, B. L., & Damphousse, K. R. (2003). The American terrorism study. Oklahoma City: Memorial Institute for the Prevention of Terrorism.
  • Stern, J. (2003). Terror in the name of god: Why religious militants kill. New York, NY: HarperCollins.
  • Tehan, R. (2013). Cybersecurity: Authoritative reports and resources (Congressional Research Service, R42507). Retrieved from www.crs.gov
  • Victoroff, J. (2005). The mind of the terrorist: A review and critique of psychological approaches. Journal of Conflict Resolution, 49(1), 3–42. doi:10.1177/0022002704272040
  • Weimann, G. (2005). Cyberterrorism: The sum of all fears? Studies in Conflict & Terrorism, 28(2), 129–149. doi:10.1080/10576100590905110
  • Weinberg, L., Pedahzur, A., & Hirsch-Hoefler, S. (2004). The challenges of conceptualizing terrorism. Terrorism and Political Violence, 16(4), 777–794. doi:10.1080/095465590899768
  • Wright, M. (2008). Technology & terrorism: How the internet facilitates radicalization. The Forensic Examiner, Winter, 14–20.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.