1,021
Views
10
CrossRef citations to date
0
Altmetric
Original Articles

Terrorists' planning of attacks: a simulated ‘red-team’ investigation into decision-making

&
Pages 480-496 | Received 06 Mar 2012, Accepted 03 Apr 2013, Published online: 16 May 2013

References

  • Apostolakis, G. E., & Lemon, D. M. (2005). A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism. Risk Analysis, 25(2), 361–376. Retrieved from http://www.ncbi.nlm.nih.gov/pubmed/15876210
  • Bakker, E. (2006). Jihadi terrorists in Europe: Their characteristics and the circumstances in which they joined the jihad: An exploratory study. Clingendael: Netherlands Institute of International Relations.
  • Beauregard, E., Proulx, J., Rossmo, K., Leclerc, B., & Allaire, J.-F. (2007). Script analysis of the hunting process of serial sex offenders. Criminal Justice and Behavior, 34(8), 1069–1084. doi:10.1177/0093854807300851
  • Brandt, P. T., & Sandler, T. (2010). What do transnational terrorists target? Has it changed? Are we safer?. Journal of Conflict Resolution, 54, 214–236. Retrieved from http://jcr.sagepub.com/content/54/2/214.short
  • Chiu, Y.-N., Leclerc, B., & Townsley, M. (2011). Crime script analysis of drug manufacturing in clandestine laboratories. British Journal of Criminology, 51(2), 355–374. doi:10.1093/bjc/azr005
  • Clarke, M. J. (2008). Report of the enquiry into the case of Dr. Mohamed Haneef. Canberra: Commonwealth of Australia.
  • Clarke, R. V., & Newman, G. R. (2006). Outsmarting the Terrorists. Westport: Greenwood Publishing Group.
  • Cornish, D. (1994). The procedural analysis of offending and its relevance for situational crime prevention. Crime Prevention Studies, 3, 151–196. Retrieved from http://www.popcenter.org/library/CrimePrevention/Volume_03/06_cornish.pdf
  • Cox, L. A., Jr (2008). Some limitations of “Risk = Threat×Vulnerability×Consequence” for risk analysis of terrorist attacks. Risk Analysis, 28(6), 1749–1761. doi:10.1111/j.1539-6924.2008.01142.x
  • Culpepper, A. M. (2004). Effectiveness of using red teams to identify maritime security vulnerabilities to terrorist attack. Monterey, CA: Masters, Naval Postgraduate School.
  • Deisler, P. F. (2002). A perspective: Risk analysis as a tool for reducing the risks of terrorism. Risk Analysis, 22(3), 405–413. doi:10.1111/0272-4332.00050
  • Department of Homeland Security (2009). National infrastructure protection plan. Washington: Department of Homeland Security.
  • Ekici, N., Ozkan, M., Celik, A., & Maxfield, M. G. (2008). Outsmarting terrorists in Turkey. Crime Prevention and Community Safety, 10(2), 126–139. doi:10.1057/cpcs.2008.3
  • Enders, W., & Sandler, T. (1993). The effectiveness of anti-terrorism policies: A vector-autoregression-intervention analysis. American Political Science Review, 87, 829–44. Retrieved from http://www.jstor.org/stable/10.2307/2938817
  • Florentine, C., Isenstein, M., Libet, J., Neece, S., Zeng, J., Haimes, Y., & Horowitz, B. (2003, April 24–25). A risk-based methodology for combating terrorism. Paper presented at the Systems and Information Engineering Design Symposium, 2003 IEEE.
  • Haimes, Y. Y. (2006). On the definition of vulnerabilities in measuring risks to infrastructures. Risk Analysis, 26(2), 293–296. doi:10.1111/j.1539-6924.2006.00755.x
  • Intelligence and Security Committee (2009). Could 7/7 have been prevented? Review of the intelligence on the London terrorist attacks on 7 July 2005. London: Office of Public Sector Information.
  • Leclerc, B., Wortley, R., & Smallbone, S. (2011). Getting into the script of adult child sex offenders and mapping out situational prevention measures. Journal of Research in Crime and Delinquency, 48(2), 209–237. doi:10.1177/0022427810391540
  • Mokros, A., & Alison, L. J. (2002). Is offender profiling possible? Testing the predicted homology of crime scene actions and background characteristics in a sample of rapists. Legal and Criminological Psychology, 7(1), 25–43. doi:10.1348/135532502168360
  • Mullins, S. (2011). Islamist terrorism and Australia: An empirical examination of the “Home grown” threat. Terrorism and Political Violence, 23(2), 254–285. doi:10.1080/09546553.2010.535717
  • Newman, G. R., & Clarke, R. V. (2008). Policing terrorism: An executive's guide. Washington, DC: U.S. Department of Justice.
  • Porter, L. E., & Kebbell, M. R. (2011). Radicalization in Australia: Examining Australia's convicted terrorists. Psychiatry, Psychology and Law, 18(2), 212–231. doi:10.1080/13218719.2010.482953
  • Prime Minister and Cabinet (2010). Counter-terrorism white paper. Canberra: Department of Prime Minister and Cabinet.
  • Schank, R. C., & Abelson, R. P. (1977). Scripts, plans, goals, and understanding: An inquiry into human knowledge structures. Hillsdale, NJ: Lawrence Erlbaum Associates.
  • Silber, M. D., & Bhatt, A. (2007). Radicalization in the West: The home grown threat. New York: NYPD.
  • Silke, A. (2008). Research on terrorism. In H. Chen, E. Reid, J. Sinai, A. Silke, & B. Ganor (Eds.), Terrorism informatics (Vol. 18, pp. 27–50). New York: Springer US.
  • Sternberg, R. J. (2009). Cognitive psychology (5th ed.). Belmont: Wadsworth.
  • Xu, Y., Low, M. Y. H., & Choo, C. S. (2009). Enhancing automated red teaming with evolvable simulation. Paper presented at the Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation, Shanghai, China.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.