Publication Cover
Dynamics of Asymmetric Conflict
Pathways toward terrorism and genocide
Volume 6, 2013 - Issue 1-3
507
Views
5
CrossRef citations to date
0
Altmetric
Empirical papers

Apparent intended lethality: Toward a model of intent to harm in terrorist bomb attacks

&
Pages 1-21 | Received 26 Jan 2013, Accepted 26 Jan 2013, Published online: 24 Apr 2013

REFERENCES

  • Animal Liberation Front (2009a). Timeless myths about the Animal Liberation Front. http://www.animalliberationfront.com/TimelessMyths.htm (accessed October 2009).
  • Animal Liberation Front (2009b). The Justice Department factsheet. http://www.animalliberationfront.com/Philosophy/AbuseLinked/justiced.htm (accessed October 2009).
  • Animal Liberation Front (2010a). The ALF credo and guidelines. http://www.animalliberationfront.com/ALFront/alf_credo.htm (accessed August 2010).
  • Animal Liberation Front (2010b). History of the Animal Liberation Front. http://www.animalliberationfront.com/ALFront/Premise_History/ALF_History.htm (accessed February 2010).
  • Crenshaw, M. (2006). Have motivations for terrorism changed? In J.Victoroff (Ed.), Tangled roots: Social and psychological factors in the genesis of terrorism (pp. 51–57). Oxford: IOS Press.
  • Hoffman, B. (1993). Terrorist targeting: Tactics, trends and potentialities. Terrorism and Political Violence, 5(2), 12–29.
  • Jackson, B.A., & Frelinger, D.R. (2008). Rifling through the terrorist' arsenal: Exploring groups' weapon choices and technology strategies. Studies in Conflict and Terrorism, 31, 583–604.
  • Juergensmeyer, M. (2000). Terror in the mind of God: The global rise of religious violence. Ewing, CA: University of California Press.
  • McCauley, C., & Moskalenko, S. (2008). Mechanisms of political radicalization: Pathways toward terrorism. Terrorism and Political Violence, 20, 415–433.
  • Mickolus, E.F. (1987). Comment. Terrorists, governments, and numbers: Counting things versus things that count. Journal of Conflict Resolution, 31, 54–62.
  • Mickolous, E.F., Sandler, T., & Murdock, J.M. (2007). International terrorism: Attributes of terrorist events, 1968–2006 (ITERATE). Vinyard Software. Dunn Loring.
  • National Consortium for the Study of Terrorism and Responses to Terrorism (START). (2011). Global terrorism database. http://www.start.umd.edu/gtd (accessed February 2012).
  • Potock, M. (2009). Introduction. In The second wave: Return of the militias, a special report from the Southern Poverty Law Center 4. Montgomery, AL: S.P.L.C.
  • Smith, B.L., Damphousse, K.R., & Roberts, P. (2006). Pre-incident indicators of terrorist incidents: The identification of behavioral, geographic and temporal patterns of preparatory conduct. Arkansas: Terrorism Research Center in Fulbright College.
  • Smith, G.D. (1998). Single issue terrorism. Canadian Security Intelligence Service: Commentary No. 74.
  • Southern Poverty Law Centre (2002). From push to shove. The next American Führer?, Intelligence Report: 107.
  • Taylor, B. (2003). Threat assessments and radical environmentalism. Terrorism and Political Violence, 15, 173–182.
  • Wilson, M.A. (1995). Structuring qualitative data: Multidimensional scalogram analysis. In G.M.Breakwell, S.Hammond, & C.Fife-Shaw (Eds.), Research methods in psychology. London: Sage.
  • Wilson, M.A. (2000). Towards a model of terrorist behavior in hostage taking incidents. Journal of Conflict Resolution, 44, 403–424.
  • Wilson, M.A. (2010). Cause of death: A model of intended lethality in terrorist IED attacks. Paper presented at the ISA Annual Conference, New Orleans, USA, 17–19 February.
  • Wilson, M.A., Scholes, A., & Brocklehurst, E. (2010). A behavioural analysis of terrorist action: The assassination and bombing campaigns of ETA between 1980 and 2001. British Journal of Criminology, 50, 690–707.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.