Sie sind auf Seite 1von 12

Political Science 5673: Understanding and Responding to Terrorism

Spring 2014
Dr. Stephen Nemeth Office Hours Time and Location
208 Murray Hall M, W 1:00-3:00 M 7:20-10:00
(405) 744-5573 Or by Appointment MUR 340
Email: stephen.nemeth@okstate.edu
Skype: stephen.nemeth19
Course Description:
This course focuses on a critical political science and emergency management security terrorism. We
will discuss the theories and motivations that underlie international and domestic terrorism. More
specifically, we will seek to understand why a person chooses to commit terrorist acts, why
organizations arise and decline, and the efficacy of counterterrorism efforts. Our readings will provide
a range of explanations and a range of methodologies quantitative analyses, formal modeling, and
case study approaches. We will also talk about how we study this emerging field in a quantitative
manner most weeks we will end class with a discussion of one of the existing data sources on
terrorism. This focus on both theory and data should provide a solid background that allows you to
develop your own research agenda and interests.

This is a graduate seminar and as such, classes are geared around discussion of the readings. As an
emerging field, there is a lack of consensus over what motivates these activities and processes.
Consequently, it is important that you critically engage both the theoretical and empirical aspects of the
readings. In addition, a graduate course implies that you have an interest in the field above that of
undergrads that being said, both the work and the expectations are increased. Your preparedness for
class, participation, and work should reflect more than just a basic consumption of the material.

Readings:
The following are required for the course:
Davis, Paul and Kim Cragin, eds. 2009. Social Science for Counterterrorism: Putting the Pieces Together.
Santa Monica: RAND Corporation

Enders, Walter and Todd Sandler. 2011. The Political Economy of Terrorism. Cambridge: Cambridge
University Press.

Articles presented in the course outline are available on JSTOR, Google Scholar, etc. Readings that are
not available via these sources or are not part of assigned books are posted to our D2L page at
oc.okstate.edu. I also reserve the right to change reading (articles, not books) at my discretion.

Course Requirements:

Participation. Each student is expected to attend class, complete all required readings, and significantly
contribute to discussion each week. Significant contribution includes being prepared for each course
with thoughtful comments and questions based on the readings, as well as thoughtful ideas for
additional research. In addition, each week a few students will sign up to lead discussion. These
individuals will write discussion papers and questions before the class, and will play and significant role
in directing and shaping discussion. If there is no discussion, I will direct it and I will call upon people.
Participation (and not merely attendance) is essential for your success in this class. This comprises 20%
of your grade.

Discussion Papers and Leadership. You will write 4 discussion papers (4-5 pages). We will determine
who is writing for each week in the first class meeting. Students who are assigned a discussion paper
for each day are also charged with leading discussion. This means discussing main ideas and points of
contention. This is not to be a recitation of what you have read but a way to provoke discussion
amongst your fellow classmates. Your ability to distill the readings, raise issues, and engender debate
will form the basis of the grade.

Discussion papers should not be a simple summary of what you have read. Instead, they should be a
critical response to the work. You may focus on one reading or on the collective whole. Approaches can
include: 1) criticisms and suggestions for improvement in the theory, methods, or conclusions of specific
papers; 2) extensions or research questions that come from the readings; or 3) theoretical or
methodological inconsistencies between articles from the same week or from previous weeks.
Documents that may help (including one that I used in grad school) will be handed out during the first
class and posted to D2L. Of course, this is not an exhaustive list of what you can write about. If you have
any questions about what you wish to write, please let me know.

In addition to the paper, students will also provide three questions to be discussed by the class. The
papers and questions should be sent via email to the rest of the class and the instructor by 4:00pm on
the Saturday prior to our class meeting. Students not writing for the week should still read and be ready
to discuss the points and the questions raised by the discussion papers. This comprises 40% of your
grade (10% per paper).

Final. This will be a take home-exam structured in much the same way as a qualifying exam. More
about the exam will be discussed in class later in the semester. This will be 40% of your grade.

Note:

Please feel free to see me if you have any questions or concerns. Concerns about grades are much easier
to rectify early in the semester than late.

Course Outline:

Week 1 (January 13, 2014) Review Syllabus

Week 2 (January 20, 2014) Martin Luther King Jr. Day - University Holiday No Class

Note Despite the university being closed, lets read these.

- Abrahms, Max. 2012. The Political Effectiveness of Terrorism Revisited. Comparative Political
Studies 45(3): 366-393.

- Enders, Walter and Todd Sandler. 2011. Terrorism: An Introduction, in The Political Economy
of Terrorism. Cambridge: Cambridge University Press.

- Mueller, John and Mark Stewart. 2012. The Terrorism Delusion: Americas Overwrought
Response to September 11. International Security 37(1): 81-110.

- Shugart, William. 2006. An Analytical History of Terrorism, 1945-2000. Public Choice 128(1-2):
7-39.

- Stampnitzky, Lisa. 2011. Disciplining an Unruly Field: Terrorism Experts and Theories of
Scientific/Intellectual Production. Qualitative Sociology 34(1): 1-19.

- Stern, Jessica. 2003. The Protean Enemy. Foreign Affairs 82(4): 27-40

Week 3 (January 27, 2014) Defining Terrorism

Required:
- Ganor, Boaz. 2002. Defining Terrorism: Is One Mans Terrorist Another Mans Freedom Fighter?
Police Practice & Research 3(4): 287304.

- Toros, Harmonie. 2008. Terrorists, Scholars, and Ordinary People: Confronting Terrorism Studies
with Field Experiences. Critical Studies on Terrorism 1(2): 279292.

- Schmid, Alex. 2011. The Definition of Terrorism, in The Routledge Handbook of Terrorism
Research. London: Routledge. Chapter 2

- Tilly, Charles. 2004. Terror, Terrorism, Terrorists. Sociological Theory 22(1): 5-13.

- Weinberg, Leonard, Ami Pedahzur, and Sivan HirschHoeffler. 2004. The Challenges of
Conceptualizing Terrorism. Terrorism and Political Violence 16(4): 777794.

Data Feature:
- Global Terrorism Dataset (GTD). Available at: http://www.start.umd.edu/gtd/

Recommended:
- Claridge, David. 1996. State Terrorism? Applying a Definitional Model. Terrorism and Political
Violence 8(3): 4763.

- McCauley, Clark. 1991. Terrorism, Research and Public Policy: An Overview. Terrorism and
Political Violence 3(1): 126-144.

- Schmid, Alex. 2004. Frameworks for Conceptualising Terrorism. Terrorism and Political
Violence, 16(2): 197221

- Dedeoglu, Beril. 2003. Bermuda Triangle: Comparing Official Definitions of Terrorist Activity.
Terrorism and Political Violence 15(3): 81-110.

Week 4 (February 3, 2014) Researching Terrorism

Required:
- Czwarno, Monica. 2006. Misjudging Islamic Terrorism: The Academic Communitys Failure to
Predict 9/11. Studies in Conflict and Terrorism 29(7): 657-678.

- Enders, Walter and Todd Sandler. 2011. Statistical Studies and the Dynamics of Terrorist
Behavior, in The Political Economy of Terrorism. Cambridge: Cambridge University Press.

- Sandler, Todd. Forthcoming. The Analytical Study of Terrorism: Taking Stock. Journal of Peace
Research.

- Young, Joseph and Michael Findley. 2011. Promises and Pitfalls of Terrorism Research.
International Studies Review. 13(3): 411-431

Data Feature:
- Terrorist Organizational Profiles (TOPs). Available at:
http://www.start.umd.edu/start/data_collections/tops/

Recommended:
- Jackson, Brian. 2006. Groups, Networks, or Movements: A Command and Control Driven
Approach to Classifying Terrorist Organizations and Its Application to Al Qaeda. Studies in
Conflict and Terrorism, 29(3): 241262.

- Merari, Ariel. 1991. Academic Research and Government Policy on Terrorism. Terrorism and
Political Violence 3(1): 88102.

- Silke, Andrew. 2001. The Devil You Know: Continuing Problems with Research on Terrorism.
13(4): 114.

- Silke, Alex. 2004. Research on Terrorism: Trends, Achievements and Failures. London: Frank
Cass, 2004

Week 5 (February 10, 2014) Causes of Terrorism I

Required:
- Crenshaw, Martha. 1981. The Causes of Terrorism. Comparative Politics 13(4): 379399.

- Enders, Walter and Todd Sandler. 2011. The Dilemma of Liberal Democracies, in The Political
Economy of Terrorism. Cambridge: Cambridge University Press.

- Li, Quan. 2005. Does Democracy Promote or Reduce Transnational Terrorism Incidents? Journal
of Conflict Resolution 49(2): 278297.

- Krueger, Alan and Jitka Maleckova. 2003. Education, Poverty, and Terrorism: Is There a Causal
Connection? Journal of Economic Perspectives 17(4): 119144.

- Piazza, James. 2006. Rooted in Poverty?: Terrorism, Poor Economic Development, and Social
Cleavages. Terrorism and Political Violence 18(1): 159177.

Data Feature:
- Big Allied and Dangerous Dataset (BAAD). Available at:
http://www.albany.edu/pvc/current_projects.shtml

Recommended:
- Abadie, Alberto. 2005. Poverty, Political Freedom, and the Roots of Terrorism. American
Economic Review 95(4): 5056.

- Brooks, Risa. 2009. Researching Democracy and Terrorism: How Political Access Affects Militant
Activity. Security Studies 18(4): 756788.

- Chenoweth, Erica. 2010. Democratic Competition and Terrorist Activity. Journal of Politics 72
(1): 1630.

- Piazza, James. 2010. Terrorism and Party Systems in the States of India. Security Studies 19(1):
99-123.

Week 6 (February 17, 2014) Causes of Terrorism II

Required:
- Senechal de la Roche, Roberta. 2001. Why is Collective Violence Collective? Sociological Theory
19(2): 126144.

- Noricks, Darcy. 2009. The Root Causes of Terrorism, in Davis, Paul and Kim Cragin (eds.) Social
Science for Counterterrorism: Putting the Pieces Together. Santa Monica: RAND Corporation.

- Silke, Andrew. 2008. Holy Warriors: Exploring the Psychological Processes of Jihadi
Radicalization. European Journal of Criminology 5(1): 99-123.

- Turk, Austin. 2004. Sociology of Terrorism. Annual Review of Sociology. 30: 271286.

- White, Robert. 1989. From Peaceful Protest to Guerrilla War: Micromobilization of the
Provisional Irish Republican Army. American Journal of Sociology 94(6): 12771302.

Data Feature:
- International Terrorism: Attributes of Terrorist Events (ITERATE). Available on D2L

Recommended:
- Kruglanski, Arie and Shira Fishman. 2006. The Psychology of Terrorism: Syndrome Versus
Tool Perspectives. Terrorism and Political Violence 18(2): 193215.

- Lester, David, Bijou Yang, and Mark Lindsay. 2004. Suicide Bombers: Are Psychological Profiles
Possible? Studies in Conflict and Terrorism 27(4): 28395.

- Post, Jerrold. 1998. Terrorist PsychoLogic: Terrorist Behavior as a Product of Psychological
Forces. In Origins of Terrorism, ed. Walter Reich. Washington D.C.: Woodrow Wilson Center
Press.

- Victoroff, Jeff. 2005. The Mind of the Terrorist: A Review and Critique of Psychological
Approaches. Journal of Conflict Resolution 49(1): 342.

Week 7 (February 24, 2014) Why Join?

Required:
- Clark, R.P. 1983. Patterns in the Lives of ETA Members. Terrorism: An International Journal 6(3):
423454.

- Fair, Christine. 2004. Militant Recruitment in Pakistan: Implications for al-Qaeda and Other
Organizations. Studies in Conflict and Terrorism 27(6): 489-504.

- Helmus, Todd. 2009. Why and How Some People Become Terrorists, in Davis, Paul and Kim
Cragin (eds.) Social Science for Counterterrorism: Putting the Pieces Together. Santa Monica:
RAND Corporation.

- McAdam, Douglas. 1986. Recruitment to HighRisk Activism: The Case of Freedom Summer.
American Journal of Sociology 92(1): 6490

- Post, Jerrold, Ehud Sprinzak, and Laurita Denny. 2003. The Terrorists in Their Own Words:
Interviews with 35 Incarcerated Middle Eastern Terrorists. Terrorism and Political Violence 15(1):
171184

Data Feature:
- Chicago Project on Security and Terrorism (CPOST). Available at:
http://cpost.uchicago.edu/index.php

Recommended:
- Forest, James. (ed.). 2005. The Making of a Terrorist: Recruitment, Training and Root Causes, [3
vols.] Westport, CT: Praeger Security International.

- Hassan, Nasra. 2001. Letter from Gaza: An Arsenal of Believers. The New Yorker, November 19,
2001

- Munger, Michael. 2006. Preference Modification vs. Incentive Manipulation as Tools of
Terrorist Recruitment: The Role of Culture. Public Choice 128(12): 131146.

- Weinstein, Jeremy. 2005. Resources and the Information Problem in Rebel Recruitment.
Journal of Conflict Resolution 49(4):598624.


Week 8 (March 3, 2014) Organizational Approaches to Terrorism

Required:
- Asal, Victor, and R. Karl Rethemeyer. 2008. The Nature of the Beast: Organizational Structures
and the Lethality of Terrorist Attacks. Journal of Politics 70(2): 437449

- Crenshaw, Martha. 1985. An Organizational Approach to the Analysis of Political Terrorism.
Orbis 29465489.

- Enders, Walter and Todd Sandler. 2011. Terrorist Groups and their Organization, in The
Political Economy of Terrorism. Cambridge: Cambridge University Press.

- Jackson, Brian. 2009. Organizational Decisionmaking by Terrorist Groups, in Davis, Paul and
Kim Cragin (eds.) Social Science for Counterterrorism: Putting the Pieces Together. Santa Monica:
RAND Corporation.

- Shapiro, Jacob and David Siegel. 2007. Underfunding in Terrorist Organizations. International
Studies Quarterly. 51(2): 405429.

Data Feature:
- RAND Database of Worldwide Terrorism Incidents (RDWTI). Available at:
http://www.rand.org/nsrd/projects/terrorismincidents.html

Recommended:
- Benmelech, Efraim and Claude Berrebi. 2007. Human Capital and the Productivity of Suicide
Bombers. Journal of Economic Perspectives 21(3): 223238.

- Oots, Kent Layne. 1989. Organizational Perspectives on the Formation and Disintegration of
Terrorist Groups. Studies in Conflict and Terrorism 12 (3): 13952.

- Shapiro, Jacob and David Siegel. 2007. Underfunding in Terrorist Organizations. International
Studies Quarterly 51(2): 405429.

- Wolf, John. 1978. Organization and Management Practices of Urban Terrorist Groups.
Terrorism: An International Journal 1 (2): 16986.

Week 9 (March 10, 2014) Strategy & Tactics

Required:
- Byman, Daniel, and Sarah Kreps. 2010. Agents of Destruction? Applying Principal-Agent
Analysis to State-Sponsored Terrorism. International Studies Perspectives 11(1): 1-18.

- Drake, CJM. 1993. The Role of Ideology in Terrorists Target Selection. Terrorism and Political
Violence 5(4): 253265.

- Goodwin, Jeff. 2006. A Theory of Categorical Terrorism. Social Forces 84(4): 20272046.

- Jackson, Brian. 2005. The Provisional Irish Republican Army, in Jackson, Brian, John Baker, Kim
Cragin, John Parachini, Horacio Trujillo, and Peter Chalk (eds.) Aptitude for Destruction, Volume
2: Case Studies of Organizational Learning in Five Terrorist Groups. Santa Monica: RAND
Corporation. Available at: http://www.rand.org/pubs/monographs/2005/RAND_MG332.pdf

- Kydd, Andrew and Barbara Walter. 2006. The Strategies of Terrorism. International Security
31(1): 4980.

Data Feature:
- Terrorism in Western Europe: Events Data (TWEED). Available at:
http://folk.uib.no/sspje/tweed.htm

Recommended:
- Hoffman, Bruce. 2006. The Modern Terrorist Mindset: Tactics, Targets, Tradecraft, and
Technologies, in Inside Terrorism. New York: Columbia University Press.

- Merari, Ariel. 1993. Terrorism as a Strategy of Insurgency. Terrorism and Political Violence 5(4):
213251.

- Pape, Robert. 2003. The Strategic Logic of Suicide Terrorism. American Political Science Review
97(3): 343361.

- Price, H. Edward. 1977. The Strategy and Tactics of Revolutionary Terrorism. Comparative
Studies in Society and History 19(1): 5266.

Week 10 (March 17, 2014) Spring Break No Class

Week 11 (March 24, 2014) How Terrorism Ends

Required:
- Gvineria, Gaga. 2009. How Does Terrorism End? in Davis, Paul and Kim Cragin (eds.) Social
Science for Counterterrorism: Putting the Pieces Together. Santa Monica: RAND Corporation.

- Ross, Jeffrey and Ted Robert Gurr. 1989. Why Terrorism Subsides: A Comparative Study of
Canada and the United States. Comparative Politics 21(4): 405426.

Recommended:
- Crenshaw, Martha. 1991. How Terrorism Declines. Terrorism and Political Violence 3(1): 69-87.

- Cronin, Audrey Kurth. 2009. How Terrorism Ends: Understanding the Decline and Demise of
Terrorist Campaigns. Princeton, NJ: Princeton University Press.

- Kalpakian, Jack. 2005. Building the Human Bomb: The Case of the 16 May 2003 Attacks in
Casablanca. Studies in Conflict and Terrorism 28(2): 113127.

- Ross, Jeffrey, and Ted Robert Gurr. 1989. Why Terrorism Subsides: A Comparative Study of
Canada and the United States. Comparative Politics 21 (4): 40526.

Week 12 (March 31, 2014) Counterterrorism: Practical Challenges

Required:
- Braithwaite, Alex. 2013. The Logic of Public Fear in Terrorism and Counter-Terrorism. Journal
of Police and Criminal Psychology 28(2): 95-101.

- BrophyBaermann, Bryan and John Conybeare. 1994. Retaliating Against Terrorism: Rational
Expectations and the Optimality of Rules Versus Discretion. American Journal of Political Science
38(1): 196210.

- Enders, Walter and Todd Sandler. 1993. The Effectiveness of Antiterrorism Policies: A Vector-
Autoregression-Intervention Analysis. American Political Science Review 87(4): 829-844.

- Enders, Walter and Todd Sandler. 2011. International Cooperation: Dilemma and Inhibitors, in
The Political Economy of Terrorism. Cambridge: Cambridge University Press.

- Enders, Walter and Todd Sandler. 2011. Transference, in The Political Economy of Terrorism.
Cambridge: Cambridge University Press.

Recommended:
- Clarke, Susan and Erica Chenoweth. 2006. The Politics of Vulnerability: Constructing Local
Performance Regimes for Homeland Security. Review of Policy Research 23(1): 95-114.

- Hobijn, Bart. 2002. What Will Homeland Security Cost? Unpublished Manuscript. Federal
Reserve Bank of New York.

- Jones, Walter. 2005. Structural and Behavioral Challenges to Effective Coordination Against
Terrorism in Ledlow, Gerald, James Johnson, and Walter Jones (eds.) Community Preparedness
and Response to Terrorism: The Terrorist Threat and Community Response. Westport:
Greenwood Publishing Group

- Scavo, Carmine, Richard Kearney, and Richard Kilroy. 2008. Challenges to Federalism:
Homeland Security and Disaster Response. Publius 38(1): 81-110.

Week 13 (April 7, 2014) Counterterrorism: Institutional Challenges

Required:
- Howitt, Arnold and Robyn Pangi. 2003. Countering Terrorism: Dimensions of Preparedness.
Cambridge: MIT Press. Chapters 1-4

- Waugh, William and Gregory Streib. 2006. Collaboration and Leadership for Effective
Emergency Management. Public Administration Review 66(s1): 131-140

- Weisburd, David, Thomas Feucht, Idit Hakimi, Lois Mock, and Simon Perry (eds.). 2011. To
Protect and To Serve: Policing in an Age of Terrorism. New York: Springer. Chapter 4.

Recommended:
- Flynn, Stephen. 2004. The Neglected Home Front. Foreign Affairs 83(5): 20-33.

- Kettl, Donald. 2003. Contingent Coordination: Practical and Theoretical Puzzles for Homeland
Security. American Review of Public Administration, 33(3): 253277

- King, Leslie and Ray, Judson. 2000. Developing Transnational Law Enforcement Cooperation:
The FBI Training Initiatives. Journal of Contemporary Criminal Justice 16(4): 386408

- Wise, Charles. 2002. Organizing for Homeland Security. Public Administration Review 62(2):
131-144.

Week 14 (April 14, 2014) Counterterrorism: Legal Issues

Required:
- Brown, Ian and Douwe Korff. Terrorism and the Proportionality of Internet Surveillance.
European Journal of Criminology 6(2): 119-134.

- Chesterman, Simon. 2010. Privacy and Surveillance in the Age of Terrorism. Survival: Global
Politics and Strategy. 52(5): 31-46.

- De Rose, Mary. 2003. Privacy in the Age of Terror. The Washington Quarterly. 26(3): 27-41.

- Netanyahu, Benjamin. 2001. Fighting Terrorism. New York: Farrar, Straus, and Giroux. Chapter
2.

Recommended:
- Bufacchi, Vittorio and Jean Maria Arrigo. 2006. Torture, Terrorism and the States: A Refutation
of the Ticking-Bomb Argument. Journal of Applied Philosophy 23(3): 355373.

- Fiss, Owen. 2006. The War against Terrorism and the Rule of Law. Oxford Journal of Legal
Studies 26(2): 235256.

- Galicki, Zdzislaw. 2005. International Law and Terrorism. American Behavioral Scientist 48(6):
743757.

- Smith, A.T.H. 2007. Balancing Liberty and Security? A Legal Analysis of United Kingdom Anti-
terrorist Legislation. European Journal on Criminal Policy and Research 13(12): 7383.

Week 15 (April 21, 2014) Counterterrorism: Protecting Infrastructure

Required:
- Brown, Gerald, Matthew Carlyle, Javier Salmeron, and Kevin Wood. 2006. Defending Critical
Infrastructure. Interfaces 36(6): 530-544.

- Masse, Todd, Siobhan ONeil, and John Rollins. 2007. The Department of Homeland Securitys
Risk Assessment Methodology: Evolution, Issues and Options for Congress. Congressional
Research Service Report for Congress. Washington D.C.: Library of Congress.

- Murray, Alan and Tony Grubesic. 2012. Critical Infrastructure Protection: The Vulnerability
Conundrum. Telematics and Informatics 29(1): 56-65.

- Stewart, Mark. 2010. Acceptable Risk Criteria for Infrastructure Protection. International
Journal of Protective Structures 1(1): 23-40.

- Stewart, Mark and John Mueller. Unpublished Manuscript. Terror, Security, and Money:
Balancing the Risks, Benefits, and Costs of Critical Infrastructure Protection.

Recommended:
- Haimes, Yacov. 2002. Roadmap for Modeling Risks of Terrorism to the Homeland. Journal of
Infrastructure Systems 8(2): 35-41.

- Kemp, Roger. 2004. Homeland Security: Best Practices in America. Public Works Management
Policy 8(4): 271277.

- Little, Richard and Elise Weaver. 2006. Protection from Extreme Events: Using a Socio-
technological Approach to Evaluate Policy Options. International Journal of Emergency
Management 2(4): 263274.

- Rudner, Martin. 2006. Protecting North Americas Energy Infrastructure against Terrorism.
International Journal of Intelligence and Counterintelligence 19(3): 424442.

Week 16 (April 28, 2014) Counterterrorism Case Studies

Required:
- Collins, Stephen. 2004. Dissuading State Support of Terrorism: Strikes or Sanctions? (An
Analysis of Dissuasion Measures Employed Against Libya) Studies in Conflict & Terrorism 27(1):
1-18.

- Cronin, Audrey Kurth. 2009. How Terrorism Ends: Understanding the Decline and Demise of
Terrorist Campaigns. Princeton: Princeton University Press. Chapters 3, 5.

- Noricks, Darcy. 2009. Disengagement and Deradicalization: Processes and Programs, in Davis,
Paul and Kim Cragin (eds.) Social Science for Counterterrorism: Putting the Pieces Together.
Santa Monica: RAND Corporation.

- Price, Bryan. 2012. Targeting Top Terrorists: How Leadership Decapitation Contributes to
Counterterrorism. International Security 36(4): 9-46.

- Sederberg, Peter. 1995. Conciliation as a Counter-Terrorist Strategy. Journal of Peace Research
32(3): 295-312.

Recommended:
- Fishman, Brian. 2008. Using the Mistakes of Al Qaedas Franchises to Undermine Its Strategies.
Annals of the American Academy of Political and Social Science 618(1): 4654.

- Kilcullen, David. 2007. Subversion and Countersubversion in the Campaign against Terrorism in
Europe. Studies in Conflict and Terrorism 30(8): 647666.

- Miller, Reuben. 1993. Negotiating with Terrorists: A Comparative Analysis of Three Cases.
Terrorism and Political Violence 5(3): 78105.

- Morag, Nedav. 2005. Measuring Success in Coping with Terrorism: The Israeli Case. Studies in
Conflict and Terrorism 28(4): 307320

Das könnte Ihnen auch gefallen