References
- Acosta, B. , and K. Ramos . 2017. “Introducing the 1993 Terrorism and Political Violence Dataset.” Studies in Conflict & Terrorism 40 (3): 232–247.
- Behlendorf, B. , J. Belur , and S. Kumar . 2016. “Peering through the Kaleidoscope: Variation and Validity in Data Collection on Terrorist Attacks.” Studies in Conflict & Terrorism 39 (7–8): 641–667.
- Burke, K. 1969. A Grammar of Motives . Berkeley, CA: University of California Press.
- Chang, C. , and Y. Y. Zeng . 2011. “Impact of Terrorism on Hospitality Stocks and the Role of Investor Sentiment.” Cornell Hospitality Quarterly 52: 165–175.
- Chermak, S. M. , J. D. Freilich , W. S. Parkin , and J. P. Lynch . 2012. “American Terrorism and Extremist Crime Data Sources and Selectivity Bias: An Investigation Focusing on Homicide Events Committed by Far-Right Extremists.” Journal of Quantitative Criminology 28 (1): 191–218.
- Choi, S.-W. 2010. “Fighting Terrorism through the Rule of Law?” Journal of Conflict Resolution 54 (6): 940–966.
- Cohen, J. 1960. “A Coefficient of Agreement for Nominal Scales.” Educational and Psychological Measurement 20 (1): 37–46.
- Conlon, S. J. , A. S. Abrahams , and L. L. Simmons . 2015. “Terrorism Information Extraction from Online Reports.” Journal of Computer Information Systems 55 (3): 20–28.
- Cubukcu, S. , and B. Forst . 2018. “Measuring Terrorism.” Homicide Studies 22 (1): 94–116.
- Dalton, A. , and V. Asal . 2011. “Is It Ideology or Desperation: Why Do Organizations Deploy Women in Violent Terrorist Attacks?” Studies in Conflict & Terrorism 34 (10): 802–919.
- Drakos, K. 2010. “Terrorism Activity, Investor Sentiment, and Stock Returns.” Review of Financial Economics 19 (3): 128–135.
- Dugan, L. , J. Y. Huang , G. LaFree , and C. McCauley . 2008. “Sudden Desistance from Terrorism: The Armenian Secret Army for the Liberation of Armenia and the Justice Commandos of the Armenian Genocide.” Dynamics of Asymmetric Conflict 1 (3): 231–249.
- Dugan, L. , G. Lafree , and A. R. Piquero . 2005. “Testing a Rational Choice Model of Airline Hijackings an Interdisciplinary Journal: The Official Publication of the American Society of Criminology.” Criminology 43 (4): 1031–1066.
- Enders, W. , T. Sandler , and K. Gaibulloev . 2011. “Domestic versus Transnational Terrorism: Data, Decomposition, and Dynamics.” Journal of Peace Research 48 (3): 319–337.
- Fahey, S. , G. LaFree , L. Dugan , and A. R. Piquero . 2012. “A Situational Model for Distinguishing Terrorist and Non-Terrorist Aerial Hijackings, 1948–2007.” Justice Quarterly 29 (4): 573–595.
- Gaibulloev, K. , and T. Sandler . 2011. “The Adverse Effect of Transnational and Domestic Terrorism on Growth in Africa.” Journal of Peace Research 48 (3): 355–371.
- Gordon, A. 2004. “The Effect of Database and Website Inconstancy on the Terrorism Field’s Delineation.” Studies in Conflict & Terrorism 27 (2): 79–88.
- Greenbaum, R. T. , L. Dugan , and G. LaFree . 2007. “The Impact of Terrorism on Italian Employment and Business Activity.” Urban Studies 44 (5–6): 1093–1108.
- Huffbauer, G. C. , J. Schott , and B. Oegg . 2016. Using Sanctions to Fight Terrorism . Washington, DC: Peterson Institute for International Economics.
- Kollias, C. , P. Messis , N. Mylonidis , and S.-M. Paleologou . 2009. “Terrorism and the Effectiveness of Security Spending in Greece: Policy Implications of Some Empirical Findings.” Journal of Policy Modeling 31 (5): 788–802.
- LaFree, G. , S.-M. Yang , and M. Crenshaw . 2009. “Trajectories of Terrorism.” Criminology & Public Policy 8 (3): 445–473.
- Memon, N. , U. K. Wiil , R. Alhajj , C. Atzenbeck , and N. Harkiolakis . 2011. “Harvesting Covert Networks: A Case Study of the iMiner Database.” International Journal of Networking and Virtual Organisations 8 (1/2): 52.
- National Consortium for the Study of Terrorism and Responses to Terrorism, 2019. Global Terrorism Database Codebook: Inclusion Criteria and Variables . College Park, MD: START.
- Perelman, C. , and L. Olbrechts-Tyteca . 1969. The New Rhetoric: A Treatise on Argumentation . Notre Dame, IN: University of Notre Dame Press.
- Piazza, J. A. , and J. I. Walsh . 2010. “Physical Integrity Rights and Terrorism.” PS: Political Science & Politics 43: 411–414.
- Schiappa, E. 2003. Defining Reality: Definitions and the Politics of Meaning, Rhetorical Philosophy & Theory . Carbondale, IL: Southern Illinois University Press.
- Sharpe, D. 2015. “Your Chi-Square Test is Statistically Significant: Now What? Practical Assessment.” Research & Evaluation 20: 10.
- Stanton, J. A. 2013. “Terrorism in the Context of Civil War.” The Journal of Politics 75 (4): 1009–1022.
- Tilly, C. 2004. “Terror, Terrorism, Terrorists.” Sociological Theory 22: 5–13.
- US State Department. 2000. Patterns of Global Terrorism, 2000 . Washington, DC: US State Department .
- US State Department. 2003. Patterns of Global Terrorism, 2003 . Washington, DC: US State Department
- US State Department. 2004. Patterns of Global Terrorism, 2004. Washington, DC: US State Department .
- US State Department. 2006. Country Reports on Terrorism, 2006 . Washington, DC: US State Department .
- US State Department 2017. Foreign Terrorist Organizations . Washington, DC: US State Department .
- Walton, D. , and F. Macagno . 2009. “Reasoning from Classifications and Definitions.” Argumentation 23 (1): 81–107.
- Webb, J. J. , and S. L. Cutter . 2009. “The Geography of US Terrorist Incidents, 1970–2004.” Terrorism and Political Violence 21 (3): 428–449.
- Winkler, C. 2006. In the Name of Terrorism: Presidents on Political Violence in the Post-World War, SUNY Series in the Trajectory of Terror . Albany, NY: SUNY Press.
- Young, J. K. , and L. Dugan . 2011. “Veto Players and Terror.” Journal of Peace Research 48 (1): 19–33.
- Zarefsky, D. 1986. President Johnson’s War on Poverty: Rhetoric and History, Studies Rhetoric & Communication . Tuscaloosa, AL: University Alabama Press.