3,602
Views
44
CrossRef citations to date
0
Altmetric
Articles

The Softest of Targets: A Study on Terrorist Target Selection

, , , , &
Pages 258-278 | Published online: 19 Jun 2009

REFERENCES

  • Arquilla , John and Ronfeldt , David F. 2001 . Networks and Netwars: The Future of Terror, Crime, and Militancy , Santa Monica, CA : RAND Corporation .
  • Asal Victor , H. and Karl Rethemeyer , R. 2008 . The nature of the beast: Terrorist: The organizational and network characteristics of organizational lethality . Journal of Politics , 70 ( 2 ) : 437 – 449 .
  • Borgatti , S. P. , Everett , M. G. and Freeman , L. C. 2002 . “ UCINET 6 for Windows: Software for Social Network Analysis (Version 6.102) ” . Analytic Technologies : Harvard, MA .
  • Borum , Randyl and Gelles , Michael . 2005 . Al-Qaeda's Operational Evolution: Behavioral and Organizational Perspectives . Behavioral Sciences & the Law , 23 ( 4 ) : 467 – 483 .
  • Cameron , A. Colin and Trivedi , Previn K. 1998 . Regression Analysis of Count Data , New York : Cambridge University Press .
  • Correlates of War II . 2004 . National Material Capabilities (v3.01) [cited November 20 2004]. Available from http://cow2.la.psu.edu/ March 26, 2004
  • Crenshaw , Martha . 1981 . The Causes of Terrorism . Comparative Politics , 13 ( 4 ) : 379 – 399 .
  • Crenshaw , Martha . 1998 . “ The Logic of Terrorism: Terrorist Behavior as a Product of Strategic Choice ” . In Terrorism and Counterterrorism: Understanding the New Security Environment , Edited by: Howard , R. D. and Sawyer , R. L. Guilford : McGraw-Hill .
  • Cronin , Audrey Kurth . 2004 . Terrorist Motivations for Chemical and Biological Weapons Use: Placing the Threat in Context . Defense and Security Analysis , 20 ( 4 ) : 313 – 320 .
  • Diani , Mario and McAdam , Doug . 2003 . Social Movements and Networks: Relational Approaches to Collective Action , Oxford, , England : Oxford University Press .
  • Dixon , Marc Vincent J. Roscigno . 2003 . Status, networks, and social movement participation: The case of striking workers . American Journal of Sociology , 108 ( 6 ) : 1292
  • Drake , C. J. M. 1988 . The Role of Ideology in Terrorists’ Target Selection . Terrorism and Political Violence , 10 ( 2 ) : 53 – 85 .
  • Drake , C. J. M. 1998 . Terrorist's Target Selection , New York : St. Martin's Press .
  • Duyvesteyn , Isabelle . 2004 . How New is the New Terrorism? . Studies in Conflict and Terrorism , 27 ( 5 ) : 439 – 454 .
  • Eubank , William and Weinberg , Leonard . 2001 . Terrorism and Democracy: Perpetrators and Victims . Terrorism and Political Violence , 13 ( 1 ) : 155 – 164 .
  • Goodwin , Jeff . 2006 . A Theory of Categorical Terrorism . Social Forces , 84 ( 4 ) : 2027 – 2046 .
  • Gunaratna , Rohan . 2003 . Inside Al-Qaeda , New York : Berkley .
  • Hoffman , Bruce . 1993 . Terrorist Targeting: Tactics, Trends, and Potentialities . Terrorism and Political Violence , 5 ( 2 ) : 12 – 29 .
  • Hoffman , Bruce . 1997 . The Confluence of International and Domestic Trends in Terrorism . Terrorism & Political Violence , 2 ( 9 ) : 1 – 15 .
  • Hoffman , Bruce . 1999 . “ Terrorism Trends and Prospects ” . In Countering the New Terrorism , Edited by: Lesser , I. O. , Hoffman , B. , Arquilla , J. , Ronfeldt , D. and Zanini , M. Santa Monica : RAND .
  • Hoffman , Bruce . 2001 . Change and Continuity in Terrorism . Studies in Conflict & Terrorism , 24 ( 5 ) : 417 – 428 .
  • Hoffman , Bruce . 2003 . Al Qaeda, Trends in Terrorism and Future Potentialities: An Assessment , Santa Monica, CA : RAND .
  • Hoffman , Bruce . 2006a . Inside Terrorism. , 2nd , New York : Columbia University Press .
  • Hoffman , Bruce and McCormick , Gordon . 2004 . Terrorism, Signaling, and Suicide Attack . Studies in Conflict & Terrorism , 27 : 243 – 281 .
  • Johnson , Chalmers . 2000 . Blowback: The Costs and Consequences of American Empire , New York : Henry Holt and Company .
  • Juergensmeyer , Mark . 2003 . Terror in the Mind of God: The Global Rise of Religious Violence , 3rd , Berkeley : University of California Press .
  • Kaplan , David E. 2004 . Tangled Roots of an Atrocity . U.S. News & World Report , 137 ( 9 ) : 28 – 30 .
  • Khagram , Sanjeev , Riker , James V. and Sikkink , Kathryn . 2002 . Restructuring World Politics: Transnational Social Movements, Networks, and Norms , Minneapolis : University of Minnesota Press .
  • Klandermans , Bert and Dirk , Oegema . 1987 . Potentials, networks, motivations, and barriers: Steps towards participation in social movements . American Sociological Review , 52 ( 4 ) : 519 – 31 .
  • Li , Quan . 2005 . Does Democracy Promote or Reduce Transnational Terrorist Incidents? . Journal of Conflict Resolution , 49 ( 2 ) : 278 – 297 .
  • Long , J. Scott . 1997 . Regression Models for Categorical and Limited Dependent Variables , Thousand Oaks, CA : Sage Publications .
  • Long , J. Scott and Freese , Jeremy . 2003 . Regression Models for Categorical Dependent Variables Using Stata edition , Revised , College Station, TX : Stata Press .
  • Marshall , Monty G. and Jaggers , Keith . 2004 . POLITY IV , Center for International Development and Conflict Management 2003 [cited September 1, 2004] . Available from http://www.cidcm.umd.edu/inscr/polity/
  • McCormick , Gordon . 2003 . Terrorist Decision Making . Annual Political Science Review , 6 : 473 – 507 .
  • 2006 . Memorial Institute for the Prevention of Terrorism MIPT Terrorism Knowledge Base, March 10, 2004 (cited January 29, 2006). Available from http://www.start.umd.edu/start.data/tops/
  • Miskel , James . 2004 . Violence as Strategy: The Palestinian Case . Mediterranean Quarterly , 15 ( 2 ) : 47 – 57 .
  • Moghadam , Assaf . 2003 . Palestinian Suicide Terrorism in the Second Intifada: Motivations and Organziational Aspects . Studies in Conflict and Terrorism , 26 ( 2 ) : 65 – 92 .
  • Nacos , Brigitte . 2006 . Terrorism and Counterterrorism: Understanding Threats and Responses in a Post-9 , New York : Pearson Longman .
  • O’Neill , Bard E. 2005 . Insurgency & Terrorism , Dulles : Potomac Books .
  • Pape , Robert A. 2003 . The Strategic Logic of Suicide Bombing . American Political Science Review , 97 ( 3 ) : 343 – 361 .
  • Quillen , Chris . 2002 . A Historical Analysis of Mass Casualty Bombers . Studies in Conflict and Terrorism , 25 ( 2 ) : 279 – 292 .
  • Rogers , William H. 1993 . Regression standard errors in clustered samples . Stata Technical Bulletin , 13 : 1923 – 1928 .
  • Sacco , Vincent F. and Macmillan , Ross . 2001 . “ Victimization and Fear of Crime: Re-Thinking a Classic Controversy from a Criminal Event Perspective ” . In The Process and Structure of Crime , Edited by: Meier , R. F. , Kennedy , L. W. and Sacco , V. F. New Brunswick, NJ : Transaction Publishers .
  • Schmid , Alex P. 1988 . Political Terrorism , Amsterdam : North-Holland Publishing Company .
  • Silberman , C. 1978 . Criminal Violence, Criminal Justice , New York : Vintage Books .
  • Singer , J. David . 1988 . Reconstructing the Correlates of War Dataset on Material Capabilities of States, 1816–1985 . International Interactions , 14 ( 2 ) : 115 – 132 .
  • Spencer , Robert . 2005 . All Religions Are Not Created Equal . Human Events , 18 Available online at: http://www.humanevents.com/article.php?id=769/
  • Tilly , Charles . 2003 . The Politics of Collective Violence , Cambridge : Cambridge University Press .
  • Tucker , David . 2001 . What is New about the New Terrorism and How Dangerous is It? . Terrorism and Political Violence , 13 ( 3 ) : 1 – 14 .
  • Vuong , Q. 1989 . Likelihood Ratio Tests for Model Selection and Non-Nested Hypotheses . Econometrica , 57 ( 2 ) : 307 – 333 .
  • Wiktorowicz , Quintan and Kaltner , John . 2003 . Killing in the Name of Islam: Al-Qaeda's Justification for September 11 . Middle East Policy , 10 ( 2 ) : 76 – 92 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.