References
- Ajzen, I. (1985). From intentions to actions: A theory of planned behavior. In J. Kuhl, & J. Beckman (Eds.), Action-control: From cognition to behavior., (pp. 11–39). Springer.
- Atran, S. (2010). Pathways to and from violent extremism: The case for science-based field research [statement before the Senate Armed Services Subcommittee on Emerging Threats & Capabilities].
- Atran, S., & Axelrod, R. (2008). Reframing sacred values. Negotiation Journal, 24(3), 221–246. https://doi.org/https://doi.org/10.1111/j.1571-9979.2008.00182.x
- Bakker, E. (2006). Jihadi terrorists in Europe: Their characteristics and the circumstances in which they joined the jihad – An exploratory study. Netherlands Institute of International Relations, The Hague. www.clingendael.nl/publications/2006/20061200_cscp_csp_bakker.pdf
- Barbieri, D. (2013). Bayesian intelligence analysis [Paper presentation]. Proceedings of the 19th Conference on Intelligence in the Knowledge Society, Bucharest (Romania), October 18.
- Baum, W. M. (1974). On two types of deviation from the matching law: Bias and undermatching. Journal of the Experimental Analysis of Behavior, 22(1), 231–242. https://doi.org/https://doi.org/10.1901/jeab.1974.22-231
- Bayes, T., & Price . (1763). An essay towards solving a problem in the doctrine of chances. Philosophical Transactions of the Royal Society, 53, 370–418.
- Bayes’ theorem explained with examples and implications for life. https://www.youtube.com/watch?v=R13BD8qKeTg
- Bisson, C., & Gurpinar, F. (2017). A Bayesian approach to developing a strategic early warning system for the French milk market. Journal of Intelligence Studies in Business, 7(3), 25–34. https://doi.org/https://doi.org/10.37380/jisib.v7i3.277
- Boer, D. P., Hart, S. D., Kropp, P. R., & Webster, C. D. (1997). Manual for the Sexual Violence Risk-20: Professional guidelines for assessing risk of sexual violence. Mental Health Law & Policy Institute, Simon Fraser University.
- Conway, M. (2006). Terrorism and the internet: New media-new threat? Parliamentary Affairs, 59 (2), 283–298. (First published online February 10, 2006, UK Politics and the Internet – The First Decade, Oxford University Press, 2006.) https://doi.org/https://doi.org/10.1093/pa/gsl009
- Crenshaw, M. (1981). The causes of terrorism. Comparative Politics, 13(4), 379–399. https://doi.org/https://doi.org/10.2307/421717
- Crenshaw, M. (2000). The psychology of terrorism: An agenda for the 21st century. Political Psychology, 21(2), 405–420. https://doi.org/https://doi.org/10.1111/0162-895X.00195
- De Finetti, B. (1931). Probabilismo - Saggio critico sulla teoria delle probabilità e sul valore della scienza. In N. Perrella (Ed.), Biblioteca di Filosofia (pp. 1–57). Libreria Editrice Vaticana.
- Demant, F., Slootman, M., Buijs, F., & Tillie, J. (2008). Decline and disengagement: An analysis of the processes of de-radicalization. IMES, University of Amsterdam.
- Deprospero, A., & Cohen, S. (1979). Inconsistent visual analyses of intrasubject data. Journal of Applied Behavior Analysis, 12(4), 573–579. https://doi.org/https://doi.org/10.1901/jaba.1979.12-573
- Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention, and behavior: An introduction to theory and research. Addison-Wesley.
- Franco, A., Malhotra, N., & Simonovits, G. (2014). Social science. Publication bias in the social sciences: Unlocking the file drawer. Science, 345(6203), 1502–1505. https://doi.org/https://doi.org/10.1126/science.1255484
- Fraser, A. (2011). Youth in crisis? Gangs, territoriality and violence. Edited by B. Goldson (London: Routledge, 2011, 248pp). British Journal of Criminology. 52(1), 227–230. https://doi.org/https://doi.org/10.1093/bjc/azr081
- Gigerenzer, G., & Hoffrage, U. (1995). How to improve Bayesian reasoning without instruction: Frequency formats. Psychological Review, 102(4), 684–704. https://doi.org/https://doi.org/10.1037/0033-295X.102.4.684
- Halloran, J. (1967). Attitude formation and change. Leicester University Press.
- Hart, S. D. (1998). The role of psychopathology in assessing the risk for violence: Conceptual and methodological issues. Legal and Criminological Psychology, 3(1), 121–140. https://doi.org/https://doi.org/10.1111/j.2044-8333.1998.tb00354.x
- Herrnstein, R. J. (1961). Relative and absolute strength of response as a function of frequency of reinforcement. Journal of the Experimental Analysis of Behavior, 4(3), 267–272. https://doi.org/https://doi.org/10.1901/jeab.1961.4-267
- Horgan, J. (2003). Leaving terrorism behind: An individual’s perspective. In A. Silke (Ed.), Terrorists, victims and society (pp. 109–130). John Wiley and Sons.
- Horgan, J. (2005). The psychology of terrorism. Routledge.
- Horgan, J. (2008). From profiles to pathways and roots to routes: Perspectives from psychology on radicalization into terrorism. The Annals of the American Academy of Political and Social Science, 618(1), 80–94. https://doi.org/https://doi.org/10.1177/0002716208317539
- Horgan, J. (2011). Interviewing the terrorists: Reflections on fieldwork and implications for psychological research. Behavioral Sciences of Terrorism and Political Aggression, 4(3), 195–211.
- Kreuger, A. B., & Maleckova, J. (2002). Education, poverty, political violence and terrorism: Is there a causal connection? NBER Working Paper No. 9074. Cambridge, MA: National Bureau of Economics Research (NBER).
- Kropp, P. R., & Hart, S. D. (2000). The Spousal Assault Risk Assessment (SARA) Guide: Reliability and validity in adult male offenders. Law and Human Behavior, 24(1), 101–118. https://doi.org/https://doi.org/10.1023/a:1005430904495
- Kruschke, J. K. (2014). Doing Bayesian data analysis. Elsevier.
- LaFree, G., & Dugan, L. (2004). How does studying terrorism compare to studying crime? In M. DeFlem (Ed.), Terrorism and counter-terrorism: Criminological perspectives (pp. 53–57). Elsevier.
- Marzuk, P. M. (1996). Violence, crime, and mental illness. How strong a link?]. Archives of General Psychiatry, 53(6), 481–486. https://doi.org/https://doi.org/10.1001/archpsyc.1996.01830060021003
- Matyas, T. A., & Greenwood, K. M. (1990). Visual analysis of single-case time series: Effects of variability, serial dependence, and magnitude of intervention effects. Journal of Applied Behavior Analysis, 23(3), 341–351. https://doi.org/https://doi.org/10.1901/jaba.1990.23-341
- McCauley, C., & Moskalenko, S. (2011). Friction: How radicalization happens to them and us. Oxford University Press.
- Merari, A. (2010). Driven to death: Psychological and social aspects of suicide terrorism. Oxford University Press.
- Monahan, J. (2012). Violence risk assessment. Forensic Psychology IV. SPECIAL ASSESSMENT ISSUES, 11. https://doi.org/https://doi.org/10.1002/9781118133880.hop211022
- Moskalenko, S., & Mccauley, C. (2011). The psychology of lone-wolf terrorism. Counselling Psychology Quarterly, 24(2), 115–126. https://doi.org/https://doi.org/10.1080/09515070.2011.581835
- Mullins, S. (2011). Australian Jihad: Radicalization and counter-terrorism – Analysis. Eurasia Review. www.eurasiareview.com/19102011-australian-jihad-radialisation-and-countreterrorism-analysis/
- Pape, R. (2005). Dying to win: The strategic logic of suicide terrorism. Random House.
- Pillar, P. (2001). Terrorism and U.S. Foreign Policy. Brookings Institution Press. Retrieved December 9, 2020, from http://www.jstor.org/stable/https://doi.org/10.7864/j.ctt1gpccnx
- Popper, K. (2002a). Conjectures and refutations. Routledge.
- Popper, K. (2002b). The logic of scientific discovery (2nd ed.). Routledge.
- Post, J. M. (2005). Psychology: Report of the psychology working group. In P. R. Neumann (Ed.), Addressing the Causes of Terrorism: The Club de Madrid Series on Democracy and Terrorism, Volume 1, The International Summit on Democracy, Terrorism and Security, Club de Madrid, Madrid, March 8–11.
- Post, J. M. (2007). The mind of the terrorist: The psychology of terrorism from the IRA to Al Qaeda. Palgrave Macmillan.
- Precht, T. (2007). Home grown terrorism and Islamist radicalization in Europe: From conversion to terrorism. Danish Ministry of Justice.
- Pressman, D. E. (2008). Exploring the sources of radicalization and violent radicalization: Transatlantic perspectives. Journal of Security Issues, 2, 1–20.
- Pressman, D. E. (2009). Risk assessment decisions for violent political extremism. www.publicsafety.gc.ca/res/cor/rep/_fl/2009-02-rdv-eng.pdf
- Record, J. (2003). Bounding the global war on terrorism. US Army War College.
- Rouder, J. N., & Morey, R. D. (2012). Default Bayes factors for model selection in regression. Behavioral Research, 47(6), 877–903. https://doi.org/https://doi.org/10.1080/00273171.2012.734737
- Rouder, J. N., Morey, R. D., Speckman, P. L., & Province, J. M. (2012). Default Bayes factors for ANOVA designs. Journal of Mathematical Psychology, 56(5), 356–374. https://doi.org/https://doi.org/10.1016/j.jmp.2012.08.001
- Sageman, M. (2004). Understanding terrorist networks. University of Pennsylvania Press.
- Sageman, M. (2008). Leaderless Jihad: Terror Networks in the Twenty-First Century. University of Pennsylvania Press. Retrieved December 9, 2020, from http://www.jstor.org/stable/j.ctt3fhbht
- Saucier, G., Akers, L. G., Shen-Miller, S., Kneževié, G., & Stankov, L. (2009). Patterns of thinking in militant extremism. Perspectives on Psychological Science, 4(3), 256–271. https://doi.org/https://doi.org/10.1111/j.1745-6924.2009.01123.x
- Schield, M., & Burnham, T. V. V. (2008). Von Mises’ frequentist approach to probability. In Proceedings of the Section on Statistical Education of the American Statistical Association (pp. 2187–2194).
- Silber, M. D., & Bhatt, A. (2007). Radicalization in the West: The homegrown threat. New York City Police Department. www.nypdshield.org/public/SiteFiles/documents/NYPD_Report-Radicalization_in_the_West.pdf
- Silke, A. (2003). Deindividuation, anonymity, and violence: Findings from Northern Ireland. The Journal of Social Psychology, 143(4), 493–499. https://doi.org/https://doi.org/10.1080/00224540309598458
- Taher, A. (2011, October 18). The middle-class terrorists: More than 60pc of suspects are well educated and from comfortable backgrounds, says secret MI5 file. The Daily Mail. www.dailymail.co.uk/news/article-2049646/The-middle-class-terrorists-More-60pc-suspects-educated-comfortablebackgrounds-says-secret-MI5-file.html
- Taylor, M., & Horgan, J. (2006). A conceptual framework for addressing psychological process in the development of the terrorist. Terrorism and Political Violence, 18(4), 585–601. https://doi.org/https://doi.org/10.1080/09546550600897413
- Tenenbaum, J. B., Griffiths, T. L., & Kemp, C. (2006). Theory-based Bayesian models of inductive learning and reasoning. Trends in Cognitive Sciences, 10(7), 309–318. https://doi.org/https://doi.org/10.1016/j.tics.2006.05.009
- Trafimow, D. (2009). The theory of reasoned action. https://www.scribd.com/document/391481255/Theory-Psych-2009
- Vallerand, R. J., Deshaies, P., Cuerrier, J.-P., Pelletier, L. G., & Mongeau, C. (1992). Ajzen and Fishbein’s theory of reasoned action as applied to moral behavior: A confirmatory analysis. Journal of Personality and Social Psychology. 62(1), 98–109. https://doi.org/https://doi.org/10.1037/0022-3514.62.1.98
- Waytz, A., & Epley, N. (2011). Social connection enables dehumanization. Journal of Experimental Social Psychology, 48(1): 70–76. https://doi.org/https://doi.org/10.1016/j.jesp.2011.07
- Weimann, G. (2004). How modern terrorism uses the internet. United States Institute of Peace, Special Report 116. http://www.usip.org/pubs/specialreports/sr116.pdf
- Wiemann, G. (2004). www.terror.net: How modern terrorism uses the internet. U.S. Institute of Peace. http://www.usip.org/publications/wwwterrornet-how-modern-terrorism-uses-internet
- Weine, S. M., & Siddiqui, S. (2009). Family determinants of minority mental health and wellness. In S. Loue & M. Sajatovic (Eds.), Determinants of minority mental health and wellness. Springer-Verlag.
- Young, M. E. (2019). Bayesian data analysis as a tool for behavior analysts. Journal of the Experimental Analysis of Behavior, 111(2), 225–238. https://doi.org/https://doi.org/10.1002/jeab.512