Saturday, July 30, 2011

Source Critique 7


Detailed Literature Review


Source 7, FDA Trend Analysis Report on the Occurrence of Foodborne Illness Risk Factors in Selected Institutional Foodservice, Restaurant, and Retail Food Store Facility Types (1998 – 2008)

 

http://www.fda.gov/downloads/Food/FoodSafety/RetailFoodProtection/FoodborneIllnessandRiskFactorReduction/RetailFoodRiskFactorStudies/UCM224152.pdf (Source)

 

Trend Analysis

 
Purpose of the Source
This source was very informative and had an interesting perspective on trend analysis. The article was about the FDA performing trend analysis over a period of ten years on the control of foodborne illness risk factors. These factors were measured from nine different facility types. These types were broken down into three different segments; Institutional Food Services (such as hospitals and elementary schools), Restaurants (both fast and full service), and Retail Food Stores (such as deli marts and produce markets). Furthermore this source provided richly detailed data tables and graphs depicting the data that was collected for trend analysis over a ten year period of time.

Strengths of the Technique
The purpose of the following list is to identify the strong suits of the method of trend analysis and why it is effective in predicting future events. (There were none discussed within this article)
Weaknesses of the Technique
The purpose of the following list is to identify the weaknesses of the method of trend analysis. (There were none discussed within this article, although it did mention that some things could be time sensitive which might be considered a weakness of trend analysis). Furthermore the fact that this was a ten year study could perhaps be construed as a weakness in that it utilized data that had been collected over a decade.

Steps
-       Collecting data (from 2 five year periods: 1998-2003 & 2003-1998)
-       Compiling and graphing the data
-        Analyzing the data
-        Making connections amongst the data gathered (finding the trends)
-       Forming a prediction on the trend at hand based on evidence
Purpose of the Technique
The purpose of trend analysis is to collect data and make a prediction about the future. The data that is being collected for trend analysis usually will span a decent time period in order to see the fluctuation of change in patterns or trends. “Any study designed to measure trends requires analysis of the subject matter over a period of time. No single point in time can be used to derive conclusions. Rather, it is a review and evaluation of the data collected at several intervals that provide the basis for drawing conclusions”(FDA 6).
Comparison
This source is different from my other sources in that the study at hand is very indepth in terms or data tables and graphical representation. One is really able to see the change in trends of occurrences of food borne illness risk factors in the various settings chosen to study.
Most Informative
I really enjoyed the examples that the author includes in this paper. It really brought the concepts visually to life. This study was neat in that you were able to visually see the various changes at hand through the studies use of data sets and graphs.
About the Source Author
This study was put together by the FDA National Retail Food Team.
Source Reliability
Your source reliability rating according to the Trust Evaluation Worksheet for online sources: http://daxrnorman.googlepages.com/WebSitesYouCanTrust-Oct08.pdf
Source Reliability: 48.14 (Very High Credibility)

Source Critiqued By
Bryan T. Eisenberg, Beisenbe5@gmail.com, Mercyhurst College, Erie PA, Advanced Analytic Techniques Course,” July 30rd  2011 .

Sources Cited by This Source

Managing Food Safety: A Regulator’s Manual for Applying HACCP Principles to Risk- Based Retail and Food Service Inspections and Evaluating Voluntary Food Safety Management Systems http://www.fda.gov/Food/FoodSafety/RetailFoodProtection/ManagingFoodSafetyHACCPPrincipl es/Operators/default.htm
Reinventing Food Regulations (1996), National Performance Report http://govinfo.library.unt.edu/npr/library/rsreport/foodreg.html
Report of the FDA Retail Food Program Database of Foodborne Illness Risk Factors (2000) http://www.fda.gov/Food/FoodSafety/RetailFoodProtection/FoodborneIllnessandRiskFactorRedu ction/RetailFoodRiskFactorStudies/ucm123544.htm
Surveillance for Foodborne Disease Outbreaks --- United States, 1988—1992, Center for Disease Control and Prevention www.cdc.gov/mmwr/preview/mmwrhtml/0004424/.htm

Saturday, July 23, 2011

Source Critique 6

Detailed Literature Review


Source 6, Trend Analysis as Pattern Recognition

http://futuringassociates.com/text/Trend_Analysis_FINAL_REV_20_Sept_08.pdf(Source)

Trend Analysis

 
Purpose of the Source
This source was very informative and had an interesting perspective on trend analysis. The author states, “trend analysis is the study of patterns in human behavior, often set in a context of a time period in the past”(Millett 2). This is very useful for me as my topic, (what are the common trends associated with people engaging in espionage?) has a lot to do with particular behaviors that spies in the past have portrayed. These patterns and trends are useful in predicting who may be a spy. Most government agencies perform polygraph lifestyle tests that look for certain attributes tied to previously found behaviors in captured spies. The paper goes on to discuss three types of pattern recognition (trend analysis). Type I (background) has to do with when we know the background and continuities and potential changes are being sought. Type II (signals) is when we are looking for specific known things such as trends or signatures, not much is known about the background. Type II is the most useful form for my particular assignment. Type III (scatters) is when random signals are detected without context.
Strengths of the Technique
The purpose of the following list is to identify the strong suits of the method of trend analysis and why it is effective in predicting future events. (There were none discussed within this article)
Weaknesses of the Technique
The purpose of the following list is to identify the weaknesses of the method of trend analysis. (There were none discussed within this article, although it did mention that some things could be time sensitive which might be considered a weakness of trend analysis).

Steps
-       Collecting data
-       Compiling and graphing the data
-        Analyzing the data
-        Making connections amongst the data gathered (finding the trends)
-       Forming a prediction on the trend at hand based on evidence
Purpose of the Technique
The purpose of trend analysis is to collect data and make a prediction about the future. One of the examples mentioned in this paper that I found interesting was the historical data of Pearl Harbor and that of the 9/11 attacks. There had been a trend of attacks on America, planes being hijacked, the trade towers being targeted – but there had never been an incident where a plane was used to target a building- the 9/11 attacks caused previous trends to change and gave agencies the ability to predict future attacks or how they could occur. For instance I think everyone notices how the airports have changed since 9/11.
Comparison
This source is different from my other sources in that the author applies trend analysis and different forms of it to the intelligence community more so than the economic one as a lot of my other sources had done. He puts an interesting perspective on his different types of pattern recognition (trend analysis) and provides thought provoking examples to go along with them.
Most Informative
I really enjoyed the examples that the author includes in this paper. It really brought the concepts visually to life. He also utilizes graphs of trend analysis which were very informative.
About the Source Author
This was a paper written by Stephen M. Millett, Ph.D. From 1979-2006 he managed about 100 furturing and forecasting projects for government agencies in the U.S., Canada, Mexico, UK, Germany, France, Belgium, the Netherlands, Spain, Norway, Japan, and India.
Source Reliability
Your source reliability rating according to the Trust Evaluation Worksheet for online sources: http://daxrnorman.googlepages.com/WebSitesYouCanTrust-Oct08.pdf
Source Reliability: 48.16 (Very High Credibility)

Source Critiqued By
Bryan T. Eisenberg, Beisenbe5@gmail.com, Mercyhurst College, Erie PA, Advanced Analytic Techniques Course,” July 23rd  2011 .

Sources Cited by This Source
Stephen M. Millett and Edward J. Honton, A Manager’s Guide to Technology Forecasting and Strategy Analysis Methods. Columbus, OH: Battelle Press, 1991,pp.1-42.

Saturday, July 16, 2011

Source Critique 5

Detailed Literature Review


Source 5, Concepts of Terrorism: Analysis of the rise, decline, trends and risks.

http://www.transnationalterrorism.eu/tekst/publications/WP3%20Del%205.pdf (Source)

Trend Analysis

 
Purpose of the Source
Although this source deals with trends in terrorism, it incorporates the techniques of trend analysis. It also depicts several ways in which trend analysis can be conveyed via data sets and graphical images. Furthermore it discusses how the research of trend analysis was carried out by looking through two terrorism databases (ITERATE & TWEED). It is from there that the researchers attempt to connect qualitative and data compilation regarding terrorism. This particular study involved looking at the root and triggers of terrorism; which is similar to my analytic question in that I am looking for the causes (trends) of people engaging in espionage.
Strengths of the Technique
The purpose of the following list is to identify the strong suits of the method of trend analysis and why it is effective in predicting future events. (There were none discussed within this article)
Weaknesses of the Technique
The purpose of the following list is to identify the weaknesses of the method of trend analysis. (There were none discussed within this article, although it did mention that some things could be time sensitive which might be considered a weakness of trend analysis).

Steps
-       Collecting data
-       Compiling and graphing the data
-        Analyzing the data
-        Making connections amongst the data gathered (finding the trends)
-       Forming a prediction on the trend at hand based on evidence
Purpose of the Technique
“A trend analysis is a comparative study of the parts of a product or system and the tendency of a product or system to develop in a particular direction over time (ITEA - International Technology Education Association)” Trend Analysis is a good method to use when trying to predict something. This is done by compiling historical data on what is being followed and looking for trends and consistencies within that data. It is also a easy way to convey information gathered visually, as depicted in this article through the various graphs it included.
Comparison
This source is different from my other critiques in that it is an independent study utilizing the method of trend analysis. The authors described what trend analysis is and some aspects of it. It is furthermore different in the fact that it doesn’t have to do with the business world or fashion world. The fact that it is on something in the intelligence community was a refreshing find. It is neat to see how the data was compiled over the years and trends of terrorism change in order to be able to predict future attacks. It was also interesting that it notes that a lot of the research done for the study was qualitative in nature and from articles and books, essentially heavily reliant on open source works.
Most Informative
Although this source is talking about using trend analysis in monitoring trends in terrorism, it’s methods are applicable to any other sort of trend analysis and are along the lines of what I hope to achieve with my project: looking at historical data, identifying trends and being able to make predictions from those trends.
About the Source Author
This was an assessment by the Transnational Terrorism Security. It was collected and authored by various groups such as COT Institute for Safety, Security, and Crisis Management as well as Netherlands Organisation for Applied Scientific Research TNO.

Source Reliability
Your source reliability rating according to the Trust Evaluation Worksheet for online sources: http://daxrnorman.googlepages.com/WebSitesYouCanTrust-Oct08.pdf
Source Reliability: 48.98 (Very High Credibility)

Source Critiqued By
Bryan T. Eisenberg, Beisenbe5@gmail.com, Mercyhurst College, Erie PA, Advanced Analytic Techniques Course,” July 1st  2011 .

Sources Cited by This Source
Alexander, Y. (2002) Combating Terrorism: Strategies of Ten Countries, Ann Arbor: University of Michigan Press
Alonso, R. (2004) “Pathways Out of Terrorism in Northern Ireland and the Basque Country: The Misrepresentation of the Irish Model” In Terrorism and Political Violence, Vol. 16, No. 4, pp. 695-713
Alterman, J.B. (1999) How Terrorism Ends, Special Report, No. 48, Washington, D.C.: United States Institute of Peace
Andersen, L.E. (2002) “Asymmetrisk krig, ny terrorisme og den postmoderne verdens (u)orden – historien om et bebudet terrorangreb” (Asymmetrical war, new terrorism and the post-modern World (dis)Order – the story of an announced terror attack), Militært Tidsskrift, Vol. 131, No 1, pp. 48-66
Art, R.J. and L. Richardson (2006) Democracy and Counterterrorism: Lessons from the Past, Washington, D.C.: United States Institute of Peace
Benjamin, D. and S. Simon (2003) The Age of Sacred Terror: Radical Islam’s War Against America, New York Random House
Bjørgo, T. ed. (2005) Root Causes of Terrorism: Myths, Reality and Way Forward, London: Routledge
Borum, R. (2003) Psychology of Terrorism, University of South Florida, available online <http://www.ncjrs.gov/pdffiles1/nij/grants/208551.pdf>
Catignani, S. (2005) “The Security Imperative in Counterterror Operations: The Israeli Fight Against Suicidal Terror” In Terrorism and Political Violence, Vol. 17, No. 1/2, pp. 245-264
Club de Madrid International Summit on Democracy, Terrorism and Security (2005), Addressing the Causes of Terrorism, Volume I. Spain
Crenshaw, M. (1981) “The Causes of Terrorism.” Comparative Politics, Vol. 13, no. 4, pp. 379-399
164Crenshaw, M. (1991) “How Terrorism Declines” In Terrorism and Political Violence, Vol. 3, No. 1, pp. 69-87
Crenshaw, M. (2006) “Have Motivations for Terrorism Changed? “ In J. Victoroff (ed.) Tangled Roots: Social and Psychological Factors in the Genesis of Terrorism, IOS
Crenshaw, M. (2007) “The Debate over ‘New’ vs. ‘Old’ Terrorism”, Paper prepared for presentation at the Annual Meeting of the American Political Science Association, Chicago, Illinois, August 30-September 2, 2007
Cronin, A. K. (2002) “Behind the Curve: Globalization and International Terrorism” In International Security, Vol. 27, No. 3, pp. 30–58
Cronin, A. K. (2006) “How al-Qaida Ends. The Decline and Demise of Terrorist Groups” In International Security, Vol. 31, No. 1, pp. 7-48
Cronin, A. K. and J. M. Ludes, eds. (2004) Attacking Terrorism: Elements of a Grand Strategy, Washington, D.C.: Georgetown University Press
Council Framework Decision on Combating Terrorism (2002), Official Journal of the European Communities (2002/475/JHA), June 13 2002, available online <http://europa.eu.int/eur- lex/pri/en/oj/dat/2002/l_164/l_16420020622en00030007.pdf>
Duyvestein, I. (2004) “How New is the New Terrorism” In Studies in Conflict & Terrorism, Vol. 27, no. 5, pp. 439-454
Frisch, H. (2006) “Motivation or Capabilities? Israeli Counterterrorism against Palestinian Suicide Bombings and Violence,” The Journal of Strategic Studies, Vol. 29, No. 5, pp. 843-869
Gupta, D.K. (2004) “Exploring Roots of Terrorism,” in T. Bjorgo (ed.) Root Causes of Terrorism, London, Routledge, pp.16-32
Gupta, R. (1998) “A Comparative Perspective on the Causes of Terrorism”. International Studies, Vol. 35, no. 1, January-March 1998, pp. 23-53
Gurr, T.R. (1968) “Psychological Factors in Civil Violence” World Politics, Vol. 20, no. 2, pp. 245-278
Gurr, T.R. (1970) Why Men Rebel, New Jersey: Princeton University Press Hoffman, B. (1998) Inside Terrorism, New York: Columbia University Press Hoffman, B. (1999) “The Mind of the Terrorist: Perspectives from Social Psychology.”
Psychiatric Annals, Vol. 29, no. 6, pp. 337-340 Horchem, H.J. (1991) “The Decline of the Red Army Fraction,” Terrorism and Political
Violence, Vol. 3, No. 2, pp. 61-74
165
Hudson, R. (1999) The Sociology and Psychology of Terrorism: Who Becomes a Terrorist and Why?, Report prepared by the Federal Research Division of the Library of Congress, September 1999
Jenkins, B.M. (1974) International Terrorism: A New Kind of Warfare, Santa Monica, CA: RAND
Kegley, C. (2003) New Global Terrorism, The Characteristics, Causes, Controls, New Jersey: Prentice Hall
Kepel, G. (2002) Jihad. The Trail of Political Islam, The Belknap Press of Harvard University Press
Krueger, A. and J. Maleckova (2003), “Education, Poverty and Terrorism: Is There a Causal Connection?” Journal of Economic Perspective, Vol. 17, no. 4, fall 2003, pp. 119-144
Krueger, A. B. and J. Maleckova. (2002). “The Economics and The Education of Suicide Bombers: Does Poverty Cause Terrorism?” The New Republic. Available online at <http://www.alanalexandroff.com/nr-krueger.pdf>
Kushner, H.W. ed. (2002) Essential Readings on Political Terrorism: Analyses of Problems and Prospects for the 21st Century. Nebraska: University of Nebraska Press
Laqueur, W. (1987) The Age of Terrorism. England: Weidenfeld & Nicolson Laqueur, W. (1999) The New Terrorism: Fanaticism and the Arms of Mass Destruction,
Oxford University Press Laqueur, W. (2001) A History of Terrorism. New Jersey: Transaction Publishers Le Vine, V.T. and B.A. Salert (1996) “Does a Coercive Official Response Deter
Terrorism? The Case of the PLO,” Terrorism and Political Violence, Vol. 8, No. 1,
pp. 22-49 Lesser, I.O., et al. (1999) Countering the New Terrorism, The Rand Corporation Lopez-Alves, F. (1989) “Political Crisis, Strategic Choices, and Terrorism: The Rise and
Fall of the Uruguayan Tupamaros” Terrorism and Political Violence, Vol. 1, No. 2,
pp. 202-241 Miller, R.R. ( 1993) “Negotiating with Terrorists: A Comparative Analysis of Three
Cases,” Terrorism and Political Violence, Vol. 5, No. 3, pp. 78-105 Morag, N. (2005) “Measuring Success in Coping with Terrorism: The Israeli Case,”
Studies in Conflict & Terrorism, Vol. 28, No. 4, pp. 307-320 Muller, E.R. (2003) Trends in terrorisme, Alphen aan den Rijn: Kluwer
166
O’Brien, S.P. (1996) “Foreign Policy Crises and the Resort to Terrorism: A Time-Series Analysis of Conflict Linkages.” Journal of Conflict Resolution, Vol. 41, no. 2, pp. 320-335.
Pape, R.A. (2003) “The Strategic Logic of Suicide Terrorism” American Political Science Review, Vol. 97, no.3, pp. 343-361
Pedahzur, A., W. Eubank and L. Weinberg (2002) “The War on Terrorism and the Decline of Terrorist Group Formation: A Research Note” Terrorism and Political Violence, Vol. 14, No. 3, pp. 141-147
Post, J. (1985) “Notes on a Psychodynamic Theory of Terrorist Behaviour,” Terrorism, Vol. 7, no. 2, pp. 41-57
Post, J. (1990) “Terrorist Psycho-logic: Terrorist Behaviour as a Product of Psychological Forces” in W. Reich (ed.) Origins of Terrorism: Psychologies, Ideologies, States of Mind, England, Cambridge University Press, pp. 25-40
Post, J. (2002) “The Radical Group in Context: 1. An Integrated Framework for the Analysis of Group Risk Terrorism,” Studies in Conflict and Terrorism, Vol. 22, no. 2, March-April 2002, pp. 73-100
Proceedings of the Oslo meeting (2003), Fighting Terrorism for Humanity: Conference on                  the                  Roots                  of                  Evil,                  June                  2003,                  available                  online <http://www.ipacademy.org/pdfs/FIGHTING_TERRORISM.pdf>
Rapoport, D.C. (2001) “The Fourth Wave: September 11 in the History of Terrorism,” Current History, December 2001, pp. 419–424
Rapoport, D.C. (2003) Generations and Waves: The Keys to Understanding Rebel Terror Movements, Paper presented November 7, 2003, at a meeting of the Ronald W. Burke Center for International Studies “Seminar on Global Affairs”
Rapoport, D.C. and Y. Alexander (1982) The Rationalization of Terrorism, Maryland: University Publications of America
Rasmussen, M.V. (2002), “‘A Parallel Globalisation of Terror’: 9-11, Security and Globalisation,” Cooperation and Conflict: Journal of the Nordic International Studies Association, Vol. 37, No 3, pp. 323-349
Rasser, M. (2005) “The Dutch Response to Moluccan Terrorism, 1970-1978,” Studies in Conflict & Terrorism, Vol. 28, No. 6, pp. 481-492
Raufer, X. (1993) “The Red Brigades: Farewell to Arms,” Studies in Conflict & Terrorism, Vol. 16, No. 4, pp. 315-325
167
Reich, W. (1990) Origins of Terrorism: Psychologies, Ideologies, States of Mind. England: Cambridge University Press
Ross, Ross,
Ross,
Ross,
J.I. (1993) “Structural Causes of Oppositional Political Terrorism: Towards a Causal Model,” Journal of Peace Research, Vol. 30, no. 3, pp. 317-329 J.I. (1995) “The Rise and Fall of Québecois Separatist Terrorism: A Qualitative Application of Factors from Two Models” Studies in Conflict & Terrorism, Vol. 18, No. 4, pp. 285-297
J.I. (1996) “A Model of the Psychological Causes of Oppositional Political Terrorism,” Peace and Conflict: Journal of Peace Psychology, Vol. 2, no. 2, pp. 129-141 J.I. and T.R. Gurr (1989) “Why Terrorism Subsides: A Comparative Study of Canada and the United States,” Comparative Politics, Vol. 21, No. 4, pp. 407-408
Sageman, M. (2004) Understanding Terror Networks, Philadelphia: University of Pennsylvania Press
Scharlau, B.A. and D. Philips (1992) “Not the End of German Left-Wing Terrorism” Terrorism and Political Violence, Vol. 4, No. 3, pp. 107-116
Silke, A. (2003) Terrorists, Victims and Society: Psychological Perspectives on Terrorism and its Consequences, England: John Wiley & Sons Ltd.
Smyth, M. (2004) “The Process of Demilitarization and the Reversibility of the Peace Process in Northern Ireland,” Terrorism and Political Violence, Vol. 16, No. 3, pp. 544-566
Traeger, R.F. and D.P. Zagorcheva (2005) “Deterring Terrorism. It Can Be Done,” International Security, Vol. 30, No. 3, pp. 87-123
Tucker, D. (2001) “What is New about the New Terrorism and How Dangerous is It?” Terrorism and Political Violence, Vol. 13, No. 3, pp. 1-14
United Nations Secretary General (2003), “Ability to Reason Vital in Fighting Terrorism, Secretary-General Tells Conference,” United Nations Press Release SG/SM/8885, 22                  September                  2003,                  available                  online <http://www.un.org/News/Press/docs/2003/sgsm8885.doc.htm>
Victoroff, J. (2006) Tangled Roots: Social and Psychological Factors in the Genesis of Terrorism, IOS
Von Hippel, K. (2003) “The Roots of Religious Extremist Terrorism,” January 2003, <http://web.archive.org/web/20040604030327/www.kcl.ac.uk/ip/andrewsteele/ sept11/papers/root.html>
168
Whittaker, D. (2004) Terrorists and Terrorism In the Contemporary World, London and New York: Routledge Taylor & Francis Group
Wilkinson, P. (1986) Terrorism and the Liberal State, 2nd ed. New York: New York University Press
Wilkinson, P. (2000) Terrorism versus Democracy: The Liberal State Response, London: Frank Cass
1.2 Bibliography part B
AIVD                  (2007),                  AIVD                  Annual                  Report                  2006                  (English).                  See: https://www.aivd.nl/contents/pages/88402/ 20070872jv2006_en.pdf. Accessed July 2008
Arsu, S., and Tavernise, S. (2007), “Turkey Resolves to Give Go-Ahead for Raids in Iraq,” New York Times, October 18, 2007
Atran S (2006) The Moral Logic and Growth of Suicide Terrorism in The Washington Quarterly 29(2) 127–147.
Azam, J. P. (2005), “Suicide-Bombing as Inter-Generational Investment,” Public Choice, 122(1-2), 177-198
Barros, C., Passos, J., and Gil-Alana L. (2006), “The timing of ETA terrorist attacks,” Journal of Policy Modeling 28(3), 335-346
BBC (2002), “Political impact of Bloody Sunday,” January 30, 2002 Ben-Dor, G. and Pedahzur A. (2003), “The Uniqueness of Islamic fundamentalism and the fourth wave of international terrorism,Totalitarian Movements and Political
Religions, 4(3), 71–90 Benjamin, D. (2006), “Religion and Civilization,” In: Hamilton, D.S. (Ed.), Terrorism
and International Relations, Washington, DC: Center for Transatlantic Relations,
p. 63-70 Bergesen, A. and Han, Y. (2005), “New Directions for Terrorism Research,”
International Journal of Comparative Sociology, Vol. 46, 133-151 Bergesen, A. and Lizardo, O. (2004), “International Terrorism and World-System
Theory,” Sociological Theory Vol. 22, 38-52 Bergesen, A. and Lizardo, O. (2005), “Terrorism and Hegemonic Decline,” in Chase-
Dunn, C. and Friedman, J. (eds), Hegemonic Decline: Past and Present, Boulder, CO: Paradigm Publishers
169
Bird, G., Brock Blomberg, S. and Hess, G. (2008), “International Terrorism: Causes, Consequences and Cures,World Economy, 31(2), 255 – 274
Borger, J., (2002), “Al-Qaida videos show poison gas tests,” The Guardian, August 20, 2002
Braithwaite, A., Li, Q. (2007), “Transnational Terrorism Hot Spots: Identification and Impact Evaluation,” Conflict Management and Peace Science, 24(4), 281 – 296.
Brock Blomberg, S., Hess, G., Orphanidesc, A. (2004), “The macroeconomic consequences of terrorism,” Journal of Monetary Economics, 51(5), 1007-1032
Brulliard, K. (2007), “Chlorine Blasts Kill 8; 6 Troops Also Die in Iraq,” Washington Post, March 18, 2007
Buesa, M., Valiño, A., Heijs, J., Baumert, T., and González Gómez, J. (2006), “The Economic Cost Of March 11: Measuring The Direct Economic Cost Of The Terrorist Attack On March 11, 2004 In Madrid,” IAIF Working Paper No. 54, (February 2006). See: http://www.ucm.es/BUCM/cee/iaif/54/54.pdf
Bundesamt für Verfassungsschutz (2005), Verfassungsschutzbericht 2005, http://www.verfassungsschutz.de/en/en_publications/ annual_reports/vsbericht2005_engl
Burke, J. (2004), “Al Qaeda,” Foreign Policy, Issue 142, May/June 2004, 18-26 Burke, J. (2007), “Target Europe,” Guardian, September 9, 2007. See online: http://www.guardian.co.uk/world/2007/sep/09/germany.alqaida.                  Accessed
October 2008 Byman, D., Deadly Connections, States that Sponsor Terrorism, Cambridge: Cambridge
University Press, 2005 Carus, W.S. (2001), “The Rajneeshees (1984),” In: Tucker, J.B. (Ed), Toxic Terror,
Assessing Terrorist Use of Chemical and Biological Weapons, Cambridge, MA:
MIT Press, 115-139 CBS (Central Bureau of Statistics, the Netherlands), http://statline.cbs.nl/. Accessed
May 2008 Chari, R.S. (2004), “The 2004 Spanish Election: Terrorism as a Catalyst for Change?”
West European Politics, Volume 27, Issue 5, Nov. 2004, 954-963 Cockburn, P. (2008), “The Turkish invasion could destroy a unified Iraq,” The
Independent, February 27, 2008 Cohen, M., and Eid, J. (2007), “The effect of constant threat of terror on Israeli Jewish
and Arab adolescents,” Anxiety, Stress & Coping, Vol. 20, Issue 1, March 2007, 47-60
170
Cole, L. (2003), The Anthrax Letters: A Medical Detective Story, Washington, D.C.: National Academies Press
Colombia Reports (2008), “Spain to investigate possible ETA - FARC links,” June 2, 2008.
Cragin, K., and Daly, S.A. (2004), Terrorist Threat, An Assessment of Group Motivations and Capabilities in a Changing World, Santa Monica, CA: RAND. Can be                  read                  online: http://www.rand.org/pubs/monograph_reports/2005/MR1782.pdf.                  Accessed October 1, 2008
Cronin, A.K. (2002), Behind the curve, Globalization and international terrorism,” International Security, 27(3), 30–58
Cronin, A.K. (2003), “Transnational Terrorism and Security,” In: Michael E. Brown (Ed.), Grave New World, Security Challenges in the 21st Century, Washington, DC: Georgetown University Press, 279-304
Cronin, A.K. (2006), “Cyber-Mobilization: The New Levee en Masse,” Parameters, Summer 2006, 77-87
Cronin, A.K. and Ludes, J.M., (Eds) (2004), Attacking Terrorism: Elements of a Grand Strategy, Washington, D.C.: Georgetown University Press
Das, S. (2008), “Some mechanisms of terror cycles,” Journal of Economic Behavior & Organization, Vol. 67, 644–656
De la Calle (2006), The Production of Terrorist Violence: Analyzing Target Selection in the                  IRA                  and                  ETA.                  Working                  Paper (http://www.yale.edu/macmillan/ocvprogram/OCV_Calle.pdf). Accessed October 2008
De la Calle (2007), Killing for Something? A new Approach to the Analysis of Target Selection                  in                  Terrorist                  Organizations.                  Working                  Paper (http://www.march.es/ceacs/proyectos/dtv/pdf/DTV%20codification%20rules%2 007.pdf). Accessed October 2008
Devezas, T. and Santos, H. (2006), “The Emergence of Modern Terrorism,” in Devezas, D., Kondratieff Waves, Warfare and World Security, 186-194
De Wijk, R., Relk, C. (2006), Doelwit Europa, Complotten en Aanslagen van Moslimterroristen, Amsterdam: Mets & Schilt
Economist (2004), “Bhopal’s deadly legacy,” Volume 373, Issue 8403, November 27, 2004, p. 46
171
Enders, W., Sandler, T. (1999), “Transnational Terrorism in the Post–Cold War Era,International Studies Quarterly, Vol. 43, 145 – 167
Enders, W., Sandler, T. (2000), “Is Transnational Terrorism Becoming More Threatening?,Journal of Conflict Resolution, Vol. 44, 307-332
Enders, W., Sandler, T. (2002), “Patterns of Transnational Terrorism, 1970-1999: Alternative Time-Series Estimates,” International Studies Quarterly, 46(2), 145- 165
Enders, W., Sandler, T. (2004), “An economic perspective on transnational terrorism,” Journal of Political Economy, 20(2), 301-16
Enders, W., Sandler, T. (2005a), “Transnational Terrorism 1968-2000: Thresholds, Persistence, and Forecasts,” Southern Economic Journal, Vol. 71
Enders, W., Sandler, T. (2005b), “After 9/11: Is it all Different Now?,” Journal of Conflict Resolution, Vol. 49, 259-277
Engene, J.O. (1998), Patterns of terrorism in Europe, 1950-1995, Bergen Engene, J.O. (2004), Terrorism in Western Europe: explaining the trends since 1950,
Cheltenham: Edward Elgar Engene, J.O. (2006), TWEED Code Book, see online:
http://www.uib.no/people/sspje/tweed.htm. Accessed September 29, 2008 Engene, J.O. (2007), “Five Decades of Terrorism in Europe: The TWEED Dataset,”
Journal of Peace Research, 44(1), 109–121 Engene, J.O. Terrorism in Western Europe: Events Data (TWEED), Online:
http://folk.uib.no/sspje/tweed.htm. Accessed November 2008 ENISA                  (European                  Network                  and                  Information                  Security                  Agency),
http://www.enisa.europa.eu/. Accessed October 2008 European Commission (2001), Preventive alert against emergencies, COM(2001)707.
See: http://europa.eu/scadplus/ leg/en/lvb/l28001.htm. Accessed June 2008 European Commission (2002), Report on preparedness for possible emergencies, COM(2002)                  302.                  See:                  http://europa.eu/scadplus/leg/en/lvb/l28124.htm.
Accessed June 2008 European Commission (2004a), Critical Infrastructure Protection in the fight against
terrorism,                  COM(2004)702.                  See:
http://europa.eu/scadplus/leg/en/lvb/l33260.htm. Accessed June 2008 European Commission (2004b), Exchange of information between the law enforcement authorities                  of                  the                  Member                  States,                  COM(2004)429.                  See:
http://europa.eu/scadplus/leg/en/lvb/l14151.htm. Accessed June 2008
172
European Commission (2004c), Fight against terrorism: prevention, preparedness and response,                  COM(2004)698.                  See: http://europa.eu/scadplus/leg/en/lvb/l33219.htm. Accessed June 2008
European Commission (2004d), The fight against terrorism: preparedness and management                  of                  the                  consequences,                  COM(2004)701.                  See: http://europa.eu/scadplus/leg/en/lvb/l33220.htm. Accessed June 2008
European Commission (2005a), Addressing the factors contributing to violent radicalisation,                  COM(2005)313.                  See: http://europa.eu/scadplus/leg/en/lvb/l14501.htm. Accessed June 2008
European Commission (2005b), Fight against Terrorist Financing: exchanging information, transparency and traceability of financial transactions, COM(2004) 700,                  (OJ                  C                  14,                  January                  20,                  2005).                  See: http://europa.eu/scadplus/leg/en/lvb/l33254.htm. Accessed June 2008
European Commission (2005c), Improved effectiveness, enhanced interoperability and synergies between European databases, COM(2005)597. See: http://europa.eu/scadplus/leg/en/lvb/l33502.htm. Accessed June 2008
European Commission (2005d), Security of explosives, COM(2005)329. See: http://europa.eu/scadplus/leg/en/lvb/ l33221.htm. Accessed June 2008
European Commission (2006), European Programme for Critical Infrastructure Protection,                  COM                  (2006)786.                  See: http://europa.eu/scadplus/leg/en/lvb/l33260.htm. Accessed June 2008
European Commission (2008), Trade Issues, Dual Use Export Controls (online overview).                  See: http://ec.europa.eu/trade/issues/sectoral/industry/dualuse/index_en.htm. Accessed October 2008
European Council (2001a), Combating the financing of terrorism, Council Regulation No.                  2580/2001,                  (OJ                  L                  370,                  December                  28,                  2001),                  See: http://europa.eu/scadplus/leg/en/lvb/l24402.htm. Accessed June 2008
European Council (2001b), Freezing funds: list of terrorists and terrorist groups, Common Position 2001/931/CFSP, (OJ L 344, December 28, 2001). See: http://europa.eu/scadplus/leg/en/lvb/l33208.htm. Accessed June 2008
European Council (2005), Information exchange and cooperation regarding terrorist offences, Council Decision 2005/671/JHA, (OJ L 253, September 29, 2005). See: http://europa.eu/scadplus/leg/en/lvb/l33252.htm. Accessed June 2008
173
European Council (2007a), Civil Protection Mechanism, 2007/779/EC, (OJ L 314, December 1, 2007). See: http://europa.eu/scadplus/leg/en/lvb/l28003.htm. Accessed June 2008
European Council (2007b), Financing of civil protection measures (2007-2013), 2007/162/EC,                  (OJ                  L                  71,                  March                  10,                  2007).                  See: http://europa.eu/scadplus/leg/en/lvb/l28156.htm. Accessed June 2008
Falkenrath, R.A. (1998), “Confronting Nuclear, Biological and Chemical Terrorism,” Survival, Volume 40, No. 3, Autumn 1998, 43-65
Falkenrath, R.A., Newman, R.D., and Thayer, B.A. (2001), America’s Achilles’ Heel, Nuclear Biological, and Chemical Terrorism and Covert Attack, Cambridge, MA: MIT Press, 2001
Ferguson, C.D. and Potter, W.C. (2005), The Four Faces of Nuclear Terrorism, New York: Routledge
France 24, “Spain to investigate possible ETA - FARC links,” June 2, 2008. See online:
http://www.france24.com/en/20080602-spain-will-study-possible-eta-farc-links-
spain-farc. Accessed November 2008 Freedberg, S.J., “Surviving a Nuclear Attack on Washington, DC,” National Journal,
June 24, 2005 Gabriel R., et.al. (2007), “Psychopathological consequences after a terrorist attack: An
epidemiological study among victims, the general population, and police
officers,” European Psychiatry, Vol. 22, Issue 6, 339-346 Guardian (2003), “Full text of Colin Powell’s speech, US secretary’s address to the
United                  Nations                  security                  council,”                  February                  5,                  2003,
http://www.guardian.co.uk/world/2003/feb/05/iraq.usa. Accessed June 2008. Gunaratna, R. (2004), “The Post-Madrid Face of Al Qaeda,” The Washington Quarterly,
Vol. 27, No. 3, Summer 2004, 91-100 Guo, D., Liao, K., Morgan, M. (2007), “Visualizing patterns in a global terrorism incident
database,” Environment and Planning B: Planning and Design, 34(5) 767–784 Gupta, D., Mndra, K. (2005), “Suicide Bombing as a Strategic Weapon: An Empirical Investigation of Hamas and Islamic Jihad,” Terrorism and Political Violence,
17(4), 573-598 Gupta, D. (2008), “Accounting For the Waves of International Terrorism,” Perspectives
on Terrorism, Vol. 11, 3-7 Gustafson, T. (2007), Radiological and Nuclear Detection Devices, NTI Issue brief, April
19, 2007. See: http://www.nti.org/e_research/e3_88.html. Accessed June 2008 174
Hamilton, D.S. (Ed.) (2006), Terrorism and International Relations, Washington, DC: Center for Transatlantic Relations
Harrow, M. (2008), “Inside a Wave of Terrorism: The Dynamic Relation Between Terrorism and the Factors Leading to Terrorism,” Journal of Global Change and Governance, Vol. 3, 1-18
Hassan, R. (2008), “Global Rise of Suicide Terrorism: An Overview,” Asian Journal of Social Science, 36(2), 271-291
Henry, T. (2004), “Russia’s Loose Nukes,” Atlantic Monthly, Vol. 294, Issue 5, Dec. 2004, 74-75
Hoffman, B. (1997), “The confluence of international and domestic trends in Terrorism,” Terrorism and Political Violence, Vol. 9, 1-15
Hoffman, B. (1999), Terrorism and Weapons of Mass Destruction: An Analysis of Trends and Motivation, Rand study
Hoffman, B. (1999), “Terrorism Trends and Prospects,” in: Lesser I. O., et al., Countering the New Terrorism, Santa Monica, CA: RAND
Hoffman B, (2003) Al Qaeda, Trends In Terrorism and Future Potentialities: An Assessment, Published by RAND.
Hoffman, B. (2003), “The Logic of Suicide Terrorism,” The Atlantic Monthly, June 2003. Hoffman, B. (2006), Inside Terrorism (Revised and Expanded Edition), New York:
Columbia University Press Huband, M. (2004), “Dutch suspect real tension is political: Mosques and schools burn,
but the issues may not be religious,” Financial Times, November 15, 2004 Hughes, C. (2005), “War On Britain : Volcanoes Of Wrath; Bin Laden's No2 Threatens
More Terrorist Attacks On Britain In Video,” The Mirror, August 5, 2005 Jenkins, B. (1995), “The Limits of Terror,” Harvard International Review, Vol. 17, Issue
3, Summer 1995, 44-47 Jensen, R. (2001), “The United States, International Policingand the War against
Anarchist Terrorism,1900–1914,” Terrorism and Political Violence, 13(1), 15-46 Jongman, A. (1992), “Trends in international and domestic terrorism in Western
Europe, 1968-1988,” Terrorism and Political Violence, Vol. 4, 26-76 Jongman, A., Schmid, A. (2005), Political Terrorism: A New Guide To Actors, Authors, Concepts, Data Bases, Theories, And Literature, Edison, NJ: Transaction
Publishers
175
Juergensmeyer, M. (2006), “Debunking the Myths of Religious Terrorism,” In: Hamilton, D.S. (Ed.), Terrorism and International Relations, Washington, DC: Center for Transatlantic Relations, 53-62
Kaplan, D.E. (2001), “Aum Shinrikyo (1995),” In: Tucker, J.B., (Ed.), Toxic Terror, Assessing Terrorist Use of Chemical and Biological Weapons, Cambridge, MA: MIT Press, 2001, 207-226
Kaplan, J. (2008), “Terrorism’s Fifth Wave: A Theory, A Conundrum and a Dilemma,” Perspectives on Terrorism, 2(2), 12-24
Karam, P.A. (2005), “Radiological Terrorism,” Human & Ecological Risk Assessment, Vol. 11, Issue 3, June 2005, 501-524
Keesing’s Record of World Events (Keesing’s Contemporary Archives), http://www.keesings.com. Accessed October 2008
Kristof, N.D. (1995), “Tokyo Court Orders Disbanding of Sect in Subway Nerve Gas Case,” New York Times, October 31, 1995
Landes, W. M. (1978), “An economic study of US aircraft hijackings, 1961-1976,” Journal of Law and Economics, Vol. 21, 1-31
Lanteaume, S. (2007), “Toxic tactics fuel chaos,” Herald Sun, March 19, 2007 Laqueur, W. (1987), The Fate of the Revolution: Interpretations of Soviet History from
1917 to the Present, New York: Schribner’s Laqueur, W. (1999), The New Terrorism: Fanaticism and the Arms of Mass Destruction,
Oxford: Oxford University Press Li, Q., Schaub, D. (2004), “Economic Globalization and Transnational Terrorism: A
Pooled Time-Series Analysis,” Journal of Conflict Resolution, Vol. 48, 230-258 Lindstrom, G. (2004), Protecting the European homeland, The CBR Dimension, Chaillot
Paper No. 69, Paris: EU Institute for Security Studies, July 2004 Lizardo, O., Bergesen, A. (2003), “Types of terrorism by world-system location,”
Humboldt Journal of Social Relations Vol. 27, 162-192 Macintyre, D. (2007a), “Pressure on Olmert grows after general quits,” The
Independent, January 18, 2007 Macintyre, D. (2007b), “Struggle for a nation engulfed by aftershocks of bungled war,”
The Independent, May 3, 2007 Mander, B., and Moloney, A. (2008), “Ecuador breaks off ties with Colombia over Farc
incursion,” Financial Times, March 4, 2008 McGirk, J., “Colombian army fears links between Farc, Eta and IRA,” Independent,
August 20, 2001. See online: http://www.independent.co.uk/news/uk/this- 176
britain/colombian-army-fears-links-between-farc-eta-and-ira-666319.html.
Accessed November 2008 Mickolus, E., Sandler, T., Murdock, J. and Flemming, P. (2004), International
Terrorism: Attributes of terrorist events, 1968-2003 (ITERATE 5). Dunn Loring,
VA: Vinyard Software Miguel-Tobal, J.J, et.al. (2005), “Psychopathological Repercussions of the March 11
Terrorist Attacks in Madrid,” Psychology in Spain, Vol. 9, No. 1, 75-80 Morgan, M.G. (1993), “Risk Analysis and Management,” Scientific American, July 1993,
32-41 Muller, E. R., et al. (2003), Trends in Terrorisme, Alphen aan den Rijn: Kluwer Neumayer, E., Plumper, T. (2009), “Terrorism and the Clash of Civilizations: Was
Huntington right after all?,” British Journal of Political Science, (forthcoming - for now:                  working                  paper ,                  see: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=952208.                  Accessed November 2008)
New York City Comptroller (2002), Press Release, September 4, 2002 New York City Comptroller website, http://www.comptroller.nyc.gov/. Accessed May
2008 New York Times (2004), “Arson Suspected at Dutch Mosque,” November 14, 2004 Nye, J. (2005), “How to counter terrorism's online generation,” Financial Times,
October 13, 2005 O’Callaghan, S. (1999), “To guard against the ultimate terrorists,” The Times, March
11, 1999 Pape, R. (2003), “The Strategic Logic of Suicide Terrorism,” American Political Science
Review, 97(3), 1-19 Paton Walsh, N. (2002), “Six arrested, one sought in radioactive 'dirty bomb' plot,” The
Guardian, June 1, 2002 Piazza J A (2008) Is Islamist Terrorism More Lethal?: An Empirical Study of Group
Ideology, Organization and Goal Structure, in Terrorism and Political Violence
(Accepted and Forthcoming) Powell, C. (2004), “Did Terrorism Sway Spain’s Election?,” Current History, Vol.                  103,
Issue 676, November 2004, 376-382 Rapoport, D. C. (1984), “Fear and trembling: Terrorism in three religious Traditions,”
American Political Science Review, Vol. 78, 658-77
177
Rapoport, D. C. (1999), “Terrorism,” in Kurtz, L., Turpin, J. (eds), Encyclopedia of Violence, Peace and Conflict, Academic Press
Rapoport, D. C. (2001), “The Fourth Wave: September 11 in the History of Terrorism,” Current History, Vol. 100, 419-424
Rapoport, D. C. (2002), “The Four Waves of Rebel Terror and September 11,” Anthropoetics - The Journal of Generative Anthropology, 8
Rapoport, D. C. (2004), “The Four Waves of Modern Terrorism,” in: Cronin, A. K., Ludes, J. (eds), Attacking Terrorism: Elements of a Grand Strategy, Washington, DC: Georgetown University Press, 46-73
Richardson, L. (2007), Wat Terroristen Willen, Dutch translation of Richardson L. (2006), What Terrorists Want: Understanding the Enemy, Containing the Threat, New York: Random House
Risk Management Guide, http://www.ruleworks.co.uk/riskguide/. Accessed October 1, 2008
Robison, K., Crenshaw, E., and Jenkins, J. (2006), “Ideologies of Violence: The Social Origins of Islamist and Leftist Transnational Terrorism,” Social Forces, 84(4) Romero, S. (2008a), “Venezuela threatens war with Colombia; Cross-border raid in
Ecuador territory,” International Herald Tribune, March 4, 2008 Romero, S. (2008b), “Colombia Is Flashpoint in Chávez’s Feud With U.S.,” New York
Times, March 5, 2008 Rosendorff, P., Sandler, T. (2005), “The Political Economy of Transnational Terrorism,”
Journal of Conflict Resolution, 49(2), 171-182 Ross, J. (2004), “Taking stock of research methods and analysis on oppositional
political terrorism,” The American Sociologist, 35(2), 26-37 Rubin, G.J. (2005), “Psychological and behavioural reactions to the bombings in London
on 7 July 2005: cross sectional survey of a representative sample of Londoners,”
British Medical Journal, Volume 331, 606-611 Sagan, S. (2004), “The Problem of Redundancy Problem: Why More Nuclear Security
Forces May Mean Less Nuclear Security,” Risk Analysis, Vol. 24, No. 4, 935-946 Sageman, M. (2004), Understanding Terror Networks, Philadelphia: University of
Pennsylvania Press Sandler, T., Tschirhart, J., and Cauley, J. (1983), “A theoretical analysis of
transnational terrorism,” American Political Science Review, Vol. 77, 36-54 Sandler, T., Arce, D. (2003), “Terrorism & Game Theory,” Simulation Gaming Vol. 34,
319-337
178
Savitch, H. (2005), “An Anatomy of Urban Terror: Lessons from Jerusalem and Elsewhere,Urban Studies, Vol. 42, No.3, 361-395
Schmid, A.P. (2000), “Terrorism and the Use of Weapons of Mass Destruction: From Where the Risk?” In: Taylor M., and Horgan J., (Eds), The Future of Terrorism, London: Frank Cass, 106-132
Scott, J. (2003), Terrorism Databases: An Empirical Comparison, University of Maryland, Department of Criminology and Criminal Justice
Sedgwick, M. (2007), “Inspiration an the Origins of Global Waves of Terrorism,” Studies in Conflict & Terrorism, Vol. 30, 97-112
Shughart, W. (2006), “An analytical history of terrorism, 1945–2000,” Public Choice, 128(1), 7-39
Silke, A. (2001), “The Devil You Know: Continuing Problems with Research on Terrorism,” Terrorism and Political Violence, 13(4), Winter 2001, 1-14
Silke, A. (2004), Research into Terrorism: Trends, Achievements and Failures, New York: Frank Cass
Sissel, K. (2004), “20 years after Bhopal,” Chemical Week, Vol. 166, Issue 41, Dec. 2004, 19-21
Spiegel Online (2008), “A new Crusade, Bin Laden Threatens Europe over Muhammad Cartoons,”                  March                  20,                  2008.                  See                  online: http://www.spiegel.de/international/world/0,1518,542638,00.html.                  Accessed July 2008
Stein, B.D., et al. (2004), “A National Longitudinal Study of the Psychological Consequences of the September 11, 2001 Terrorist Attacks: Reactions, Impairment, and Help-Seeking,” Psychiatry: Interpersonal & Biological Processes, Vol. 67, Issue 2, Summer 2004, 105-117
Suskind, R. (2006), The One Percent Doctrine, New York: Simon & Schuster, NEFA Foundation (2007), “The New York City Subway Poison Gas Plot,” Target: America,                  Report                  #12,                  December                  2007.                  See: http://www.nefafoundation.org/miscellaneous/NYCPoisonPlot.pdf.                  Accessed
November 2008 Taylor M., and Horgan J. (Eds) (2000), The Future of Terrorism, London: Frank Cass Thompson, W. (2006), “Emergent Violence, Global Wars, and Terrorism,” in Devezas,
T., Kondratieff Waves, Warfare and World Security, 186-194 Traynor, I. (2004), “Holland mourns loss of tolerance as religious violence spirals,” Irish
Times, November 13, 2004
179
Tucker, J. B. (1999), “Historical Trends Related to Bioterrorism: An Empirical Analysis,” Emerging Infectious Diseases, 5(4), 498-504
Tucker, J.B., (Ed) (2001), Toxic Terror, Assessing Terrorist Use of Chemical and Biological Weapons, Cambridge, MA: MIT Press
White House (2001), Presidential Address to the Nation, October 7, 2001. Can be accessed                  on                  the                  White                  House                  Press                  Office                  Website: http://www.whitehouse.gov/news/releases/2001/10/20011006.html.                  Accessed May 1, 2008
Wilkinson, P. (2006), Terrorism Versus Democracy, 2nd Edition, New York: Routledge Woodward, B. (2004), Plan of Attack, London: Simon & Schuster
1.3 Bibliography Part C IRA
Augusteijn, Joost, From public defiance to guerilla warfare. The radicalisation of the Irish Republican Army – a comparative analysis, 1916-1921 (Amsterdam 1994)
Moloney, Ed, A secret history of the IRA (New York, 2002). Coogan, Tim Pat, The IRA (London 1995) English, Richard, Armed struggle. The history of the IRA (Oxford 2003) Darby, John, ‘Northern Ireland: The background to the Peace Process’ (2003)retrieved
from http://cain.ulst.ac.uk/events/peace/darby03.htm. Consulted 2-9-2008. Holland, Jack, Hope against history. The Ulster conflict (London 1999). Coogan, Tim Pat, The IRA, (London 1995) p. 351. BBC 2008A, http://www.nio.gov.uk/agreement.pdf. Consulted 26-8-2008.
BBC 2008B, http://www.nio.gov.uk/index/key-issues/decommissioning.htm. Consulted 26-8-2008.
BBC, 2008C, http://www.nio.gov.uk/first_report_on_decommissioning_-_oct_2001.pdf. Consulted 26-8-2008
BBC, 2008D, http://www.nio.gov.uk/iicd_report_26_sept_2005.pdf. Consulted 26-8- 2008.
CAIN database, 2008A, Memberships and Arsenal of Paramilitary Groups. http://cain.ulst.ac.uk/issues/violence/paramilitary2.htm. Accessed September 24, 2008
180
CAIN database, 2008B, Sutton Index of Deaths: http://www.cain.ulst.ac.uk/sutton/book/index.html#append.                  Accessed September 22, 2008
http://www.cain.ulst.ac.uk/sutton/book/index.html#append. Consulted 30-10-2008. http://www.nio.gov.uk/agreement.pdf. Consulted 26-8-2008 http://www.nio.gov.uk/index/key-issues/decommissioning.htm. Consulted 26-8-2008. http://www.nio.gov.uk/first_report_on_decommissioning_-_oct_2001.pdf.                  Consulted
26-8-2008. http://www.nio.gov.uk/iicd_report_26_sept_2005.pdf. Consulted 26-8-2008. Mickolus, Edward F., et al., International Terrorism: Attributes of Terrorist Events,
1968-2002,Dunn Loring, VA: Vinyard Software, 2003 Jan Oskar Engene: “Five Decades of Terrorism in Europe: The TWEED Dataset”, Journal
of PeaceResearch, vol. 44, no. 1, 2007, pp. 109–121. For dataset and codebook see online: http://www.uib.no/people/sspje/TWEED.htm. Consulted October 1, 2008
ETA
Alonso, R. and Reinares, F., ‘Terrorism, human rights and law enforcement in Spain’ in Ranstorp, M. and Wilkison, P. ed., Terrorism and human rights, (New York 2008). BBC                  2008:                  ‘Who                  are                  ETA?’,                  January                  5,                  2007.                  Available                  at
http://news.bbc.co.uk/2/hi/europe/3500728.stm. Consulted 28-8-2008. Clark, Robert P., The Basque insurgents. ETA, 1952-1980 (Wisconsin 1984). Europol,                  TE-SAT                  2007,                  available                  at
http://www.europol.europa.eu/publications/EU_Terrorism_Situation_and_Trend_
Report_TE-SAT/TESAT2007.pdf. Consulted 15-9-2008. Gutierrez, Miren, ‘Terror in the Pyrenees’ in The Nation (March 25, 2002). Reinares, F.
and Oscar Jaime-Jimenez, ‘Countering Terrorism in a New Democracy: the Case of Spain’ in: Reinares, F., ed., European democracies against terrorism. Governmental policies and intergovernmental cooperation (Burlington, 2000).
http://www.mir.es/DGRIS/Terrorismo_de_ETA/ultimas_victimas/p12b-esp.htm. Consulted 30-10-2008.
Sullivan, John, ETA and Basque nationalism. The fight for Euskadi 1890-1986 (London 1988).
Sullivan, John, ‘Forty years of ETA’ in History Today (April 1999).
181
Visser, C.J., Spanje en de Baskische ETA. Terrorisme van dictatuur tot democratie. (The Hague 1982).
US State Department, Country Reports on Terrorism 2007, April 2008. See: http://www.state.gov/documents/organization/105904.pdf. Accessed September 24, 2008.
RAF
Aust, S., Der Baader Meinhof Komplex (Hamburg 1986). Becker, J., Hitler’s Children (London 1977). Burleigh, M., Blood and Rage. A Cultural History of Terrorism (London 2008). Crijnen, A.J., De Baader-Meinhofgroep (Utrecht and Antwerp 1975). Hoffman, B., Inside Terrorism (New York and Chichester 2006). Horchem, H.J., ‘The Decline of the Red Army Faction’, Terrorism and Political
violence, Vol. 3, No. 2 (Summer 1991) pp. 61-74. Johnson, L.C., ‘The Future of Terrorism’, American Behavioral Scientist, Vol. 44,
No. 6
(2001) pp. 894-913. Müller, M. and A. Kanonenberg, Die RAF-Stasi-Connection (Berlin 1992). Pflieger, K., Die Rote Armee Fraktion – RAF – 14.5 1970 bis 20.4 1998 (Baden-Baden
2004). Pluchinsky, D.A., ‘Germany’s Red Army Faction: An Obituary’, Studies in Conflict                  and
Terrorism, Vol. 16, No. 2 (1993) pp. 135-157. Rote Armee Fraktion. Texte und Materialien zur Geschichte der RAF (Berlin                  1997). Strassner, A., Die dritte Generation der ‘Roten Armee Fraktion’. Entstehung, Struktur,
Funktionslogik und Zerfall einer terroristischen Organisation                  (Wiesbaden
2003). Wilkinson, P., Terrorism versus Democracy. The Liberal State Response (London                  and
New York 2006).
Red Brigades
Burleigh, M., Blood and Rage. A Cultural History of Terrorism (London 2008). Crenshaw, M., ‘How Terrorism Declines’, Terrorism and Political Violence, Vol. 3, No. 1
(Spring 1991) pp. 69-87. Hoffman, B., ‘Change and Continuity in Terrorism’, Studies in Conflict and Terrorism,
Vol. 24, No. 5 (1 September 2001) pp. 417-428.
182
Horchem, H.J., ‘The Decline of the Red Army Faction’, Terrorism and Political violence, Vol. 3, No. 2 (Summer 1991) pp. 61-74.
http://www.brigaterosse.org/brigaterosse/index.htm, accessed October 27, 2008 (Italian).
Ross, J.I. and T.R. Gurr, ‘Why Terrorism Subsides: A Comparative Study of Canada and the United States’, Comparative Politics, Vol. 21, No. 4 (1989) pp. 407-428.
Right Wing
Burleigh, M. (2008) Blood and Rage. A Cultural History of Terrorism. Crenshaw, M. (1986) ‘The psychology of political terrorism’, in Hermann, M.G. (ed.),
Political Psychology, pp. 379-413. Crenshaw, M., ‘How Terrorism Declines’, Terrorism and Political Violence, Vol. 3,
No. 1 (Spring 1991) pp. 69-87. Europol (2007) TE-SAT – EU Terrorism Situation and Trend Report, available at
http://www.europol.europa.eu/publications/EU_Terrorism_Situation_and_Trend_
Report_TE-SAT/TESAT2007.pdf
Europol (2008) TE-SAT - EU Terrorism Situation and Trend Report, available at http://www.europol.europa.eu/publications/EU_Terrorism_Situation_and_Trend_ Report_TE-SAT/TESAT2008.pdf
Hagan, J., S. Rippl and K. Boenke, ‘The Interest in Evil: Hierarchic Self-Interest and Right-Wing Extremism among East and West German Youth’, Social Science Research, vol. 28, no. 2 (June 1999) pp. 162-183.
Hoffman, B. (1984) Right-wing terrorism in Europe since 1980, Santa Monica: Rand cooperation.
http://www.bloodandhonourworldwide.co.uk/mags1.html. Accessed October 27, 2008.
http://www.start.umd.emu/data/tops/terrorist_organization_profile.asp?id=3668. Accessed October 27, 2008
http://www.tkb.org. Accessed October 27, 2008. http://ldh-toulon.net/spip.php?article609#nh1. Accessed October 27, 2008. Mudde, C. (1995) ‘Right-Wing Extremism Analyzed. A Comparative Analysis of the
Ideologies of Three Alleged Right-Wing Extremist Parties (NPD, NDP, CP'86)’, European Journal of Political Research, vol. 27, no.2, pp. 203-224.
183
Pedahzur, A. (2001) ‘Struggling with the Challenges of Right-Wing Extremism and Terrorism within Democratic Boundaries: A Comparative Analysis’, Studies in Conflict & Terrorism, vol. 24, pp. 339–359.
Post, J. and Ruby, K. and Shaw, E. (2002) ‘The Radical Group in Context: 1. An Integrated Framework for the Analysis of Group Risk for Terrorism’, Studies in Conflict & Terrorism, vol. 25, pp. 73–100.
Smith, M.A. (2005) ‘Russian Nationalist Movements and Geopolitical Thinking’, CSRC, Russian Series Paper, vol. 5 no. 40.
Hizb ut Tahrir
AIVD (2004), Van Dawa tot jihad, Algemene Inlichtingen- en Veiligheidsdienst. AIVD (2005) Antwoorden op Kamervragen over over de radicaal-islamitische organisatie                  Hizb-ut-Tahrir,                  8 September 2005.                  Available                  at
https://www.aivd.nl/actueel-publicaties/parlementaire/antwoorden-op_c0.
Accessed October 22, 2008. Baran, Z. (2004). “The Challenge of Hizb ut-Tahrir: Deciphering and Combating Radical
BBC
Islamist Ideology.” Conference Report, September 2004. Available at
http://www.nixoncenter.org/Program%20Briefs/PB%202004/confrephiztahrir.pdf
. Accessed April 10, 2007. (2008),                  UK                  fertiliser                  bomb                  plot,
http://news.bbc.co.uk/2/shared/spl/hi/guides/457000/457032/html/nn1page10.
stm. Accessed October 31, 2008. BBC News. (2003) ‘Hizb ut-Tahrir’, August 27 2003. Available at
http://news.bbc.co.uk/2/hi/programmes/newsnight/3182271.stm.                  Accessed
October 31, 2008 BBC News Europe. (2005) ‘Denmark targets extremist media’, August 18 2005.
Available                  at
http://newsvote.bbc.co.uk/mpapps/pagetools/print/news.bbc.co.uk/2/hi/europe/
4159220.stm. Accessed October 31, 2008 Burke, J. (2004), “Al Qaeda,” Foreign Policy, Issue 142, May/June 2004, p. 18-26 CACI analyst, Hizb ut-Tahrir adherents prosecuted in South Kazakhstan, Central Asia-
Caucasus                  Institute                  October                  19,                  2003.                  Available                  at http://www.cacianalyst.org/?q=node/1595. Accessed October 22, 2008.
184
GlobalSecurity.Org, Hizb ut-Tahrir al-Islami (Islamic Party of Liberation). Available at http://www.globalsecurity.org/military/world/para/hizb-ut-tahrir.htm. Accessed April 10, 2007.
Gunaratna, R. (2004), “The Post-Madrid Face of Al Qaeda,” The Washington Quarterly, Volume 27, No. 3, Summer 2004, p. 91-100
Het Parool (2003), Duitsland: moslimextremisme in de ban, 20 January 2003. McDermott, Roger, Kazakstan cracking down on Hizb ut-Tahrir, Eurasia daily monitor, 4 November                  2007.                  Available                  at http://www.jamestown.org/edm/article.php?article_id=2372390.                  Accessed
October 22, 2008. Ministerie van Binnenlandse Zaken en Koninkrijksrelaties (BZK) (2005), Antwoorden op
Kamervragen over de organisatie Hizb ut-Tahrir (Sterk, CDA), September 8, 2005.                  Available                  at http://www.minbzk.nl/actueel/kamerstukken?ActItmIdt=54908. Accessed April 15, 2007.
National Union of Students (NUS), ‘NUS representative addresses government committee                  on                  campus                  incitement’.                  Available                  at http://www.nusonline.co.uk/news/270231.aspx. Accessed April 15, 2007
New Statesman, 13 September 2004, Malik, S., For Allah and the caliphate, Available at http://www.newstatesman.com/print/200409130018. Accessed 15 April 2007.
Radio Free Europe/Radio Liberty (RFE/RL) (2004), Germany: Court Appeal By Hizb ut- Tahrir Highlights Balancing Between Actions, Intentions, 26 October 2004. See: http://www.rferl.org/featuresarticle/2004/10/a9e085a9-a771-4e5c-b41d- 16b3d7d1258f.html. Accessed, April 10, 2007.
Saidazimova, Gulnoza (2007), “Central Asia: Banned Islamic group Hizb ut-Tahrir continues to gain members,” Eurasia Insight 14-8-2007. Available at http://www.eurasianet.org/departments/insight/articles/pp081407.shtml. Accessed October 22, 2008.
Siddiqui, M., (2004), “The doctrine of Hizb ut Tahrir,” in: Baran, Z., ed., The challenge of Hizb ut Tahrir. Deciphering and combating radical Islamist ideology, Washington D.C.: The Nixon Center, pp. 1-32.
The Guardian online (2005), “Lords threaten rough ride for anti-terror bill,” November 21,                  2005.                  Available                  at http://www.guardian.co.uk/terrorism/story/0,12780,1647283,00.html. Accessed October 22, 2008.
185
The Times (2006) “The al-Qaeda Supergrass Who Wanted to Wage in Britain,” Timesonline,                  March                  24,                  2006,                  Available                  at http://business.timesonline.co.uk/tol/business/law/public/article695074.ece. Accessed 10 April 2007.
Whine, M., (2006), Is Hizb ut-Tahrir Changing Strategy or Tactics?, Center for Eurasian Policy Occasional Research Paper Series, No. 1. The Hudson Institute. Available at http://www.eurasianpolicy.org/index.cfm?fuseaction=publication_details&id=414 9. Accessed April 10, 2007.
Hofstadgroep
AIVD. (2004), Jihadrekruten in Nederland, letter to TWEEDe Kamer der Staten Generaal. Available at https://www.aivd.nl/actueel_publicaties/andere_publicaties/notitie_remkes_over. Accessed October 21, 2008.
AIVD. (2005), Annual Report 2004. (Dutch version). Available at: http://www.aivd.nl/contents/pages/42686/jaarverslag_aivd_2004.pdf. Accessed October 21, 2008.
AIVD. (2006) Violent Jihad in the Netherlands: Current Trends in the Islamist Terrorist Threat.                  Available                  at:                  https://www.aivd.nl/actueel-publicaties/aivd- publicaties/publications/violent-jihad-in-the. Accessed October 21, 2008.
AIVD.                  (2007)                  Annual                  Report                  2006.                  (Dutch                  version).                  Available                  at: http://www.aivd.nl/contents/pages/87073/jaarverslagaivd2006.pdf.                  Accessed October 21, 2008.
Benschop, A. (2004). Chronicle of a Political Murder Foretold, ‘Jihad in the Netherlands’, Available at: http://www.sociosite.org/jihad_nl_en.php. Accessed 21-10-2008.
Binnenlandse Veiligheidsdienst (BVD), (2001), Terrorisme aan het begin van de 21e eeuw.                  Dreigingsbeeld                  en                  positionering                  BVD.                  Available                  at https://www.aivd.nl/actueel-publicaties/aivd-publicaties/terrorisme-aan-het. Accessed October 21, 2008.
Bouyeri,                  M.                  (2004),                  Open                  Brief                  aan                  Hirshi                  Ali.                  Available                  at: http://www.nqpaofu.com/2004/vgoghletters.html#victim. Accessed October 21, 2008.
186
Elsevier (2008), OM naar Hoge Raad na uitspraak Gerechtshof, February 5, 2008. Available                  at: http://www.elsevier.nl/web/nederland/omnaarhogeraadoveruitspraakhofstadgroe p.htm. Accessed October 22, 2008.
Verdict of the High Court in The Hague on 23-1-2008 available at:
http://zoeken.rechtspraak.nl/resultpage.aspx?snelzoeken=true&searchtype=ljn&
ljn=BC2576&u_ljn=BC2576. Accessed October 21, 2008. Volkskrant (2005), Light-versie Hofstadgroep, 26 November 2005. Available at:
http://www.volkskrant.nl/binnenland/article149582.ece/Light- versie_Hofstadgroep. Accessed October 21, 2008.
187