610
Views
1
CrossRef citations to date
0
Altmetric
Reflections on Research

Six rather unexplored assumptions about al-Qaeda

Pages 393-403 | Received 21 Apr 2008, Published online: 18 Mar 2009

References

  • Atwan , A. 2006 . The secret history of al Qaeda , Berkeley, CA : University of California Press .
  • Benjamin , D. and Simon , S. 2005 . The next attack: the globalization of jihad , London : Hodder & Stoughton .
  • Bergen , P. 2002 . Holy War, Inc.: inside the secret world of Osama bin Laden , revd. , London : Phoenix .
  • Bergen , P. 2006 . The Osama bin Laden I know: an oral history of al Qaeda's leader , New York, NY : Free Press .
  • Brachman , J. and McCants , W. 2006 . Stealing al Qaeda's playbook . Studies in Conflict and Terrorism , 29 ( 4 ) : 309 – 321 .
  • Bunt , G. 2003 . Islam in the digital age: e-jihad, online fatwas and cyber Islamic environments , Sterling : Pluto .
  • Burke , J. 2004 . Al-Qaeda: the true story of radical Islam , London : Penguin .
  • Bush, G., 2002. National strategy for homeland security. Available from http://www.dhs.gov/xlibrary/assets/nat_strat_hls.pdf (Accessed: 5 May 2008 ).
  • Byman , D. 2006 . Do targeted killings work? . Foreign Affairs , 85 ( 2 ) : 95 – 111 .
  • Cook , D. 2003 . The recovery of radical Islam in the wake of the defeat of the Taliban . Terrorism and Political Violence , 15 ( 1 ) : 31 – 56 .
  • Djerejian, E. et al., 2003. Changing minds, winning peace: a new strategic direction for U.S. public diplomacy in the Arab & Muslim world. Available from http://www.bakerinstitute.org/Pubs/testimony_ peace.pdf (Accessed: 8 April 2008 ).
  • Enders, W. and Sandler, T., 2002. What do we know about the substitution effect in transnational terrorism? Available from http://www.cf.usc.edu/∼tsandler/substitution2ms.pdf (www.cf.usc.edu/~tsandler/substitution2ms.pdf) (Accessed: 8 April 2008 ).
  • Friedman , B. 2004 . Leap before you look: the failure of homeland security . Breakthroughs , 13 ( 1 ) : 29 – 40 .
  • Frum , D. and Perle , R. 2004 . An end to evil: how to win the war on terror , New York, NY : Ballantine .
  • Gerges , F. 2005 . The far enemy: why jihad went global , Cambridge : Cambridge University Press .
  • Hoffman , B. 2006 . Inside terrorism , revd. , New York, NY : Columbia University Press .
  • Hoffman , B. 2008 . The Myth of grass-roots terrorism: why Osama bin Laden still matters . Foreign Affairs , 87 ( 3 ) : 133 – 138 .
  • Husain , E. 2007 . The Islamist: why I joined radical Islam in Britain, what I saw inside and why I left , London : Penguin .
  • Kean , T. 2004 . The 9/11 Commission report: final report of the national commission on terrorist attacks upon the United States , New York, NY : W. W. Norton .
  • Lim , M. 2005 . Islamic radicalism and anti-Americanism in Indonesia: the role of the internet . Policy Studies , 18
  • Lustick , I. 2006 . Trapped in the war on terror , Philadelphia, PA : University of Pennsylvania Press .
  • McDermott , T. 2005 . Perfect soldiers: the hijackers: who they were, why they did it , New York, NY : HarperCollins .
  • McMillan , J. , ed. 2006 . ‘In the same light as slavery’: building a global antiterrorist consensus , Washington, DC : National Defense University Press .
  • Mohamedou , M. 2007 . Understanding al Qaeda: the transformation of war , London : Pluto .
  • Mueller , J. 2005 . Six rather unusual propositions about terrorism . Terrorism and Political Violence , : 487 – 505 .
  • Mueller , J. 2006 . Overblown: how politicians and the terrorism industry inflate national security threats, and why we believe them , New York, , NY : Free Press .
  • Phares , W. 2005 . Future jihad: terrorist strategies against America , New York, , NY : Palgrave Macmillan .
  • Sageman , M. 2004 . Understanding terror networks , Philadelphia, PA : University of Pennsylvania Press .
  • Sageman , M. 2008 . Leaderless jihad: terror networks in the twenty-first century , Philadelphia, PA : University of Pennsylvania Press .
  • Sageman , M. and Hoffman , B. 2008 . Does Osama still call the shots? . Foreign Affairs , 87 ( 4 ) : 163 – 166 .
  • Scheuer , M. 2006 . Through our enemies’ eyes: Osama bin Laden, radical Islam, and the future of America Potomac Washington, DC revd
  • Shannon , V. and Dennis , M. 2007 . Militant Islam and the futile fight for reputation . Security Studies , 16 ( 2 ) : 287 – 317 .
  • Sifaoui , M. 2003 . Inside al Qaeda: how I infiltrated the world's deadliest terrorist organization , Edited by: Miller , G. New York, NY : Thunder's Mouth . trans.
  • Simon , S. 2006 . “ Muslim perceptions of America: the sources of hostility ” . In ‘In the same light as slavery’: building a global antiterrorist consensus , Edited by: McMillan , J. 35 – 69 . Washington, DC : National Defense University Press .
  • Tessler , M. 2006 . “ Public opinion in the Arab and Muslim world: informing U.S. public diplomacy ” . In ‘In the same light as slavery’: building a global antiterrorist consensus , Edited by: McMillan , J. 9 – 33 . Washington, DC : National Defense University Press .
  • Weimann , G. 2006a . “ Virtual training camps: terrorists’ use of the internet ” . In Teaching terror: strategic and tactical learning in the terrorist world , Edited by: Forest , J. 110 – 132 . Lanham, MD : Rowman & Littlefield .
  • Weimann , G. 2006b . Terror on the internet: the new arena, the new challenges , Washington, DC : United States Institute of Peace .
  • Wright , L. 2006 . The looming tower: al-Qaeda and the road to 9/11 , New York, NY : Alfred A. Knopf .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.