304th MI BN OSINT Team. 2008. “Al Qaida-Like Mobile Discussions & Potential Creative Uses.” Intelligence Resource Program, Federation of American Scientists. Accessed February 12, 2014.
http://fas.org/irp/eprint/mobile.pdf.
The Advertiser. 2008. “‘Facebook’ Terrorism Investigation.” The Advertiser (Adelaide, Australia), April 5.
Ahlqvist, Toni, Asta Bäck, Minna Halonen, and Sirkka Heinonen. 2008.
Social Media Road Maps: Exploring the Futures Triggered by Social Media. VTT Tiedotteita—Valtion Teknillinen Tutkimuskeskus. VTT Research Notes 2454.
http://www.vtt.fi/inf/pdf/tiedotteet/2008/T2454.pdf.
AIVD (General Intelligence and Security Service). 2012. Jihadism on the Web: A Breeding Ground for Jihad in the Modern Age. Amsterdam: Ministry of the Interior and Kingdom Relations of the Netherlands.
Al Raffie, Dina. 2012. “Whose Hearts and Minds? Narratives and Counter-Narratives of Salafi Jihadism.” Journal of Terrorism Research 3 (2): 13–31.
Amble, John Curtis. 2012. “Combating Terrorism in the New Media Environment.” Studies in Conflict & Terrorism 35 (5): 339–53.
Anderson, Chris. 2006. The Long Tail: Why the Future of Business Is Selling Less of More. New York: Hyperion.
Anderson, Craig A., and Brad J. Bushman. 2001. “Effects of Violent Video Games on Aggressive Behavior, Aggressive Cognition, Aggressive Affect, Physiological Arousal and Prosocial Behaviour: A Meta-Analytic Review of the Scientific Literature.” Psychological Science 12 (5): 353–59.
Anderson, Ross. 2008. Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd ed. New York: Wiley.
Archetti, Cristina. 2010. “Terrorism, Communication and the War of Ideas: Al-Qaida’s Strategic Narrative as a Brand.” Paper presented at the International Communication Association Annual Convention, Singapore, June 22–26.
———. 2012. Understanding Terrorism in the Age of Global Media: A Communication Approach. London: Palgrave Macmillan.
Arquilla, John, and David Ronfeldt. 2001. “The Advent of Netwar (revisited).” In Networks and Netwars: The Future of Terror, Crime, and Militancy, edited by John Arquilla and David Ronfeldt, 1–25. Santa Monica, CA: RAND Corporation.
———. 2003. “Networks, Netwars, and the Fight for the Future.” First Monday 25: 1–25.
Arquilla, John, David Ronfeldt, and Michele Zanini. 2001. “Networks, Netwar and Information-Age Terrorism.” In Countering the New Terrorism, edited by Ian O. Lesser, Bruce Hoffman, John Arquilla, David F. Ronfeldt, Michele Zanini, and Brian Michael Jenkins, 75–111. Santa Monica, CA: RAND Corporation.
Bar, Shmuel. 2006a. Warrant for Terror: The Fatwas of Radical Islam and the Duty to Jihad. Lanham, MD: Rowman and Littlefield Publishing.
———. 2006b. Jihad Ideology in Light of Contemporary Fatwas. Washington, DC: Hudson Institute.
Betz, David. 2008. “The Virtual Dimension of Contemporary Insurgency and Counterinsurgency.”
Small Wars & Insurgencies 19 (4): 510–40.
Blumenthal, Les. 2007. “U.S. Seeks to Counter Terrorists’ Use of the Internet.” Kansas City Star, September 23: A23.
Bolz, Frank, Kenneth Dudonis, and David Schulz. 2002. The Counterterrorism Handbook: Tactics, Procedures, and Techniques. Boca Raton, FL: CRC Press.
Brahimi, Alia. 2010. The Taliban’s Evolving Ideology. London School of Economics: Global Governance Working Paper.
Bunt, Gary. 2000. Virtually Islamic: Computer-Mediated Communication and Cyber Islamic Environment. Cardiff: University of Wales Press.
———. 2003. Islam in the Digital Age: E-Jihad, Online Fatwas and Cyber Islamic Environments. London: Pluto.
———. 2009. iMuslims: Rewiring the House of Islam. Chapel Hill: University of North Carolina Press.
Busch, Nathan E., and Austen D. Givens. 2012. “Public-Private Partnerships in Homeland Security: Opportunities and Challenges.”
Homeland Security Affairs 8, Article 18 (October).
http://www.hsaj.org/?article=8.1.18.
Chaffey, Dave, Richard Mayer, Kevin Johnston, and Fiona Ellis-Chadwick. 2000. Internet Marketing: Strategy, Implementation and Practice. Harlow, UK: Person Education Ltd.
Conway, Maura, and Lisa McInerney. 2008. “Jihadi Video & Auto-Radicalisation: Evidence from an Exploratory YouTube Study.” In
Proceedings of the 1st European Conference on Intelligence and Security Informatics, Esbjerg, Denmark, December 3–5.
http://doras.dcu.ie/2253/2/youtube_2008.pdf.
Coviello, Nicole E., Roderick J. Brodie, Richard W. Brookes, and Roger A. Palmer. 2003. “Assessing the Role of e-Marketing in Contemporary Marketing Practice.” Journal of Marketing Management 19 (7–8): 857–81.
Dal Cin, Sonya, Mark P. Zanna, and Geoffrey T. Fong. 2004. “Narrative Persuasion and Overcoming Resistance.” In Resistance and Persuasion, edited by Eric S. Knowles and Jay A. Linn, 175–92. Mawah, NJ: Erlbaum.
Davis, Anthony. 2002. “The Afghan Files: Al-Qaeda Documents from Kabul.” Jane’s Intelligence Review 14 (2): 14–19.
Denning, Dorothy. 1998. Information Warfare and Security, New York: Addison-Wesley.
———. 2001. “Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy.” In Networks and Netwars: The Future of Terror, Crime, and Militancy, edited by John Arquilla and David Ronfeldt, 239–88. Santa Monica, CA: RAND Corporation.
———. 2010. “Terror’s Web: How the Internet Is Transforming Terrorism.” In Handbook of Internet Crime, edited by Yvonne Jewkes and Majid Yar, 194–213. Cullompton, UK: Willan Publishing.
Dobson, Christopher, and Ronald Paine. 1977. The Carlos Complex: A Pattern of Violence. London: Hodder and Stoughton.
Dunn-Cavelty, Myriam, and Manuel Suter. 2009. “Public–Private Partnerships Are No Silver Bullet: An Expanded Governance Model for Critical Infrastructure Protection.” International Journal of Critical Infrastructure Protection 2 (4): 179–87.
Etzioni, Amitai. 1999. The Limits of Privacy. New York: Basic Books.
———. 2002. “Seeking Middle Ground on Privacy vs. Security.” Commentary, October 15.
Fouda, Yosri, and Nick Fielding. 2003. Masterminds of Terror: The Truth Behind the Most Devastating Terrorist Attack the World Has Ever Seen. New York: Arcade.
Freamon, Bernard K. 2003. “Martyrdom, Suicide, and the Islamic Law of War: A Short Legal History.” Fordham International Law Journal 27: 299–369.
Freedman, Lawrence. 2006. The Transformation of Strategic Affairs. London: International Institute for Strategic Studies.
Fuller, Graham. 2004. The Future of Political Islam. New York: Palgrave Macmillan.
Gartenstein-Ross, David, and Laura Grossman. 2009. Homegrown Terrorists in the U.S. and U.K. Washington, DC: FDD Press.
Gerrig, Richard. 1993. Experiencing Narrative Worlds. New Haven, CT: Yale University Press.
Gerwehr, Scott, and Sara Daly. 2006. “Al-Qaida: Terrorist Selection and Recruitment.” In
The McGraw-Hill Homeland Security Handbook, edited by David Kamien, 73–89. New York, McGraw-Hill.
Goncalves, Jorge, Vassilis Kostakos, and Jayant Venkatanathan. 2013. “Narrowcasting in Social Media: Effects and Perceptions.” In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 502–9. New York: IEEE/ACM.
Gorge, Mathieu. 2007. “Cyberterrorism: Hype or Reality?” Computer Fraud & Security 2007 (2): 9–12.
Green, Melanie C., and Timothy C. Brock. 2000. “The Role of Transportation in the Pervasiveness of Public Narratives.” Journal of Personality and Social Psychology 79 (5): 701–21.
Green, Melanie C., Jeffrey J. Strange, and Timothy C. Brock, ed. 2002. Narrative Impact: Social and Cognitive Foundations. Mahwah, NJ: Erlbaum.
Guttman, Nathan. 2012. “Should Terror Groups Be Able To Tweet and Use YouTube?” Forward, August 17: 1–8.
Halverson, Jeffrey, Steven Corman, and H. L. Goodall. 2011.
Master Narratives of Islamist Extremism. New York: Palgrave Macmillan.
Hegghamer, Thomas. 2006. “Global Jihadism After the Iraq War.” Middle East Journal 60 (1): 11–32.
Helfont, Samuel. 2009. The Sunni Divide: Understanding Politics and Terrorism in the Arab Middle East. Philadelphia: Center for Terrorism and Counterrorism at the Foreign Policy Research Institute.
Hoffman, Bruce. 2006a. Inside Terrorism, revised version. New York: Columbia University Press.
———. 2010b. “Terrorist Financing and the Internet.” Studies in Conflict & Terrorism 33 (4): 353–63.
Jenkins, Brian. 1975. International Terrorism. Los Angeles: Crescent Publication.
Joint Chiefs of Staff. 2010. Psychological Operations (Joint Pub. 3-13.2). January 7. Washington, DC: US Government Printing Office.
Kaplow, Louis, and Steven Shavell. 2002. Fairness versus Welfare. Cambridge, MA: Harvard University Press.
Kassimeris, George, and John Buckley. 2010. The Ashgate Research Companion to Modern Warfare. Farnham, UK: Ashgate.
Kennedy, Jonathan and Gabriel Weimann. 2011. “The Strength of Weak Terrorist Ties.” Terrorism and Political Violence 23 (2): 201–12.
Langford, Duncan. 1998. “Ethics @ the Internet: Bilateral Procedures in Electronic Communication.” In Cyberspace Divide: Equality, Agency and Policy in the Information Society, edited by Brian D. Loader, 98–112. London: Routledge.
Lentini, Peter. 2013. Neojihadism: Towards a New Understanding of Terrorism and Extremism? Cheltenham, UK: Edward Elgar Publishing.
———. 2010. “Containing the Narrative: Strategy and Tactics in Countering the Storyline of Global Jihad.” Journal of Policing, Intelligence and Counter Terrorism 5 (1): 42–57.
Lewis, Bernard. 1988. The Political Language of Islam. Chicago: University of Chicago Press.
Lewis, Peter. 2001. “The Tools of Freedom and Security.” Fortune, October 29: 200–4.
Lyon, David. 2001. Surveillance Society: Monitoring Everyday Life. London: Open University Press.
Malik, Kenan. 2009. From Fatwa to Jihad: The Rushdie Affair and Its Legacy. London: Atlantic.
MEMRI Jihad & Terrorism Studies Project. 2001. “Debating the Religious, Political and Moral Legitimacy of Suicide Bombings Part 1: The Debate over Religious Legitimacy.” MEMRI Inquiry & Analysis Series Report 53, May 3.
http://www.memri.org/report/en/0/0/0/0/0/0/451.htm.
MEMRI Jihad & Terrorism Threat Monitor. 2010. “Fatwas Posted on the Website of Abu Muhammad Al-Maqdisi Permit Targeting Infidel Companies Such As Coca-Cola and McDonald’s—and Kidnapping and Killing Tourists in Muslim Countries.” Special Dispatch Series 3390, November 19.
http://www.memrijttm.org/content/en/report.htm?report=4779.
Middle East Times. 2008. “Cyber Terrorism: Perils of the Internet’s Social Networks.” Middle East Times, September 8.
Minei, Elizabeth, and Jonathan Matusitz. 2011. “Cyberterrorist Messages and Their Effects on Targets: A Qualitative Analysis.” Journal of Human Behavior in the Social Environment 21 (8): 995–1019.
———. 2012. “Cyberspace as a New Arena for Terroristic Propaganda: An Updated Examination.” Poiesis & Praxis 9 (1–2): 163–76.
Miniwatts Marketing Group. 2013. “Internet World Stats: Usage and Population Statistics.” Internet World Stats. Accessed May 14, 2014.
http://www.internetworldstats.com/.
Mozes, Tomer, and Gabriel Weimann. 2010. “The E-Marketing Strategy of Hamas.” Studies in Conflict & Terrorism 33 (3): 211–25.
Mueller, John, and Mark Stewart. 2011. “Terror, Security, and Money: Balancing the Risks, Benefits, and Costs of Homeland Security.” Paper presented at the “Terror and the Economy: Which Institutions Help Mitigate the Damage?” panel at the Annual Convention of the Midwest Political Science Association, Chicago, IL, April 1.
http://politicalscience.osu.edu/faculty/jmueller//MID11TSM.PDF
Nacos, Brigitte. 2002. Mass-Mediated Terrorism. Oxford: Rowman and Littlefield.
———. 2003. “The Terrorist Calculus behind 9-11: A Model for Future Terrorism?” Studies in Conflict & Terrorism 26(1): 1–16.
National Commission on Terrorist Attacks upon the United States. 2004. The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks upon the United States. New York: W. W. Norton.
National Counterterrorism Center. 2012. 2011 Report on Terrorism. Washington, DC: Office of the Director of National Intelligence, National Counterterrorism Center.
National Research Council. 1991. Computers at Risk. Washington, DC: National Academy Press.
Nye, Joseph. 2003. “The Power of Persuasion: Dual Components of US Leadership (Perspectives on the United States).” Sean Creehan and Sabeel Rahman. Harvard International Review 24 (4): 46–49.
———. 2004a. Power in the Global Information Age: From Realism to Globalization. London: Routledge.
———. 2004b. “Soft Power and American Foreign Policy.” Political Science Quarterly 119 (2): 255–70.
Oatley, Keith. 2002. “Emotions and the Story Worlds of Fiction.” In Narrative Impact: Social and Cognitive Foundations, edited by Melanie C. Green, Jeffrey J. Strange and Timothy C. Brock, 39–69. Mahwah, NJ: Erlbaum.
———. 2005. “Global Jihad and WMD: Between Martyrdom and Mass Destruction.” Current Trends in Islamist Ideology 2: 74–86.
———. 2010. “Global Jihad.” In Guide to Islamist Movements, Vol. 2, edited by Barry M. Rubin, xxxiii–liii. Armonk, NY: M. E. Sharpe.
Perl, Raphael. 2004. The Department of State’s Patterns of Global Terrorism Report: Trends, State Sponsors, and Related Issues. Congressional Research Service Report for Congress RL32417, June 5. Washington, DC: Congressional Research Service.
Pollack, Suzanne. 2013. “Internet provides venue for training future jihadists.” Washington Jewish Week, May 16: 3.
Porter, Michael E. 2001. “Strategy and the Internet.” Harvard Business Review, March: 62–78.
President’s Commission on Critical Infrastructure Protection. 1997.
Critical Foundations: Protecting America’s Infrastructures. October. Project on Government Secrecy, Federation of American Scientists. Accessed April 3, 2014.
https://www.fas.org/sgp/library/pccip.pdf.
Qaradawi, Sheikh Yusuf al-. 2003. “Fatwa: Whether Suicide Bombings Are a Form of Martyrdom” [in Arabic]. November 8.
http://qaradawi.net.
Qin, Jialun, Yilu Zhou, Edna Reid, Guanpi Lai, and Hsinchun Chen. 2007. “Analyzing Terror Campaigns on the Internet: Technical Sophistication, Content Richness, and Web Interactivity.” International Journal of Human-Computer Studies 65 (1): 71–84.
Ranstorp, Magnus. 1998. “Interpreting the Broader Context and Meaning of Bin-Laden’s ‘Fatwa.’” Studies in Conflict & Terrorism 21 (4): 321–30.
———. 2007. “The Virtual Sanctuary of Al-Qaeda and Terrorism in an Age of Globalization.” In International Relations and Security in the Digital Age, edited by Johan Eriksson and Giampiero Giacomello, 31–56. London: Routledge.
Rollins, John, and Clay Wilson. 2007. Terrorist Capabilities for Cyberattack: Overview and Policy Issues. Congressional Research Service Report for Congress RL 33123, January 22. Washington, DC: Congressional Research Service.
Rothwell, Dan. 2004. In the Company of Others: An Introduction to Communication. New York: McGraw Hill.
———. 2008b. “Radicalisation and De-Radicalisation.” In Perspectives on Radicalisation and Political Violence, edited by the International Centre for the Study of Radicalisation (ICSR), 8–14. London: ICSR.
Sageman, Marc. 2008. Leaderless Jihad: Terror Networks in the Twenty-First Century. Philadelphia: University of Pennsylvania Press.
“SCADA Systems and the Terrorist Threat: Protecting the Nation’s Critical Control Systems.” 2005. Joint hearing before the US House of Representatives Subcommittee on Economic Security, Infrastructure Protection and Cybersecurity, October 18. Intelligence Resource Program, Federation of American Scientists. Accessed April 10, 2014.
http://www.fas.org/irp/congress/2005_hr/scada.pdf.
Schmid, Alex. 2004. “Frameworks for Conceptualising Terrorism.” Terrorism and Political Violence 16 (2): 197–221.
Schmid, Alex, and Janny de Graaf. 1982. Violence as Communication: Insurgent Terrorism and the Western News Media. Beverly Hills, CA: Sage.
Schmid, Alex, and Albert Jongman. 1988. Political Terrorism. Amsterdam: Transaction Books.
———. 2005. Political Terrorism. Piscataway, NJ: Transaction Publishers.
Schmidt, Eric, and Jared Cohen. 2013. The New Digital Age: Reshaping the Future of People, Nations and Business. New York: Knopf Doubleday Publishing Group.
Schmitt, Eric, and Thom Shanker. 2011. Counterstrike: The Untold Story of America’s Secret Campaign Against Al Qaeda. New York: Times Books.
Sherif, Muzafer, and Carl Iver Hovland. 1961. Social Judgment: Assimilation and Contrast Effects in Communication and Attitude Change. New Haven, CT: Yale University Press.
———. 2011. “Terrorism on the Internet and Effective Countermeasures.” The Intelligencer: Journal of U.S. Intelligence Studies 18: 21–24.
Slater, Michael. 2002. “Entertainment Education and the Persuasive Impact of Narratives.” In Narrative Impact: Social and Cognitive Foundations, edited by Melanie C. Green, Jeffrey J. Strange, and Timothy C. Brock, 157–81. Mahwah, NJ: Erlbaum.
Smith, Paul Russell, and Dave Chaffey. 2001. eMarketing Excellence: At the Heart of eBusiness. Oxford: Butterworth Heinemann.
Spaaij, Ramon. 2010. “The Enigma of Lone Wolf Terrorism: An Assessment.” Studies in Conflict & Terrorism 33 (9): 854–70.
———. 2012b. “Tracking Hizbullah’s Al-Manar TV Online: Removed from Servers in Netherlands and U.S. as a Result of MEMRI Reports—and Now Hosted on Servers in U.K.” MEMRI Inquiry & Analysis Series Report 905, December 4.
http://www.memri.org/report/en/0/0/0/0/0/857/6848.htm
———. 2012c. “WHOIS—U.S.-Based Domain Registration Protection Companies Hide Identities Of Individuals Behind The Most Important Al-Qaeda-Affiliated Websites.” MEMRI Inquiry & Analysis Series Report 856, July.
http://www.memri.org/report/en/0/0/0/0/0/0/6515.htm.
Stalinsky, Steven, and R. Sosnow. 2013a. “Afghan Cyber Army (ACA): Active on Facebook and YouTube—Recruiting and Training Volunteers, Claiming to Have Hacked U.S. Gov’t Websites, U.S. and Israeli Bank Websites, Pakistan Gov’t and Taliban Websites; Promising Major Attacks in Future.” MEMRI Inquiry & Analysis Series Report 1036, November 15.
http://www.memri.org/report/en/0/0/0/0/0/0/7575.htm.
———. 2013b. “Syrian Electronic Army Uses Social Media—Twitter, YouTube, Facebook, Instagram, Google+, Pinterest, Smartphone Apps—To Communicate, Spread News of Its Hacks and Its Mission, and Recruit Volunteers.” MEMRI Inquiry & Analysis Series Report 1009, August 19.
http://www.memri.org/report/en/0/0/0/0/0/0/7357.htm.
Stevenson, Robert. 2003. “Freedom of the Press Around the World.” In Global Journalism: Topical Issues and Media Systems, 4th edition, edited by Arnold S. de Beer and John C. Merrill, 1–33. Boston: Allyn and Bacon.
Tahawy, Abdallah, el-. 2008. “The Internet Is the New Mosque: Fatwa at the Click of a Mouse.” Arab Insight 2 (1):11–20.
Tell, William. 2006. Bridges Burning: America’s Challenge of the 21st Century. Lincoln, NE: iUniverse.
Tsfati, Yariv, and Gabriel Weimann. 2002. “
www.terrorism.com: Terror on the Internet.”
Studies in Conflict & Terrorism 25 (5): 317–32.
United Nations Counter-Terrorism Implementation Task Force. 2011. Countering the Use of the Internet for Terrorist Purposes: Legal and Technical Aspects. New York: United Nations.
United Nations Office on Drugs and Crime (UNODC). 2012. The Use of the Internet for Terrorist Purposes. New York: United Nations.
Ventre, Daniel. 2009. Information Warfare. New York: Wiley.
———, ed. 2011. Cyberwar and Information Warfare. New York: Wiley.
Verton, Dan. 2003. Black Ice: The Invisible Threat of Cyber-Terrorism. New York: McGraw-Hill Osborne Media.
Viscusi, W. Kip, and Richard J. Zeckhauser. 2003. “Sacrificing Civil Liberties to Reduce Terrorism Risks.” Journal of Risk and Uncertainty 26 (2–3): 99–120.
Von Knop, Katharina, and Gabriel Weimann. 2008. “Applying the Notion of Noise to Countering Online Terrorism.” Studies in Conflict & Terrorism 31 (10): 883–902.
Voors, Matthew Parker. 2003. “Encryption Regulation in the Wake of September 11, 2001: Must We Protect National Security at the Expense of the Economy?” Federal Communications Law Journal 55 (2): 331–52.
Wade, Lindsey. 2003. “Terrorism and the Internet: Resistance in the Information Age.” Knowledge, Technology & Policy 16 (1): 104–27.
Weaver, Warren, and Claude Shannon. 1963. The Mathematical Theory of Communication. Urbana: University of Illinois Press.
Weimann, Gabriel. 2005a. “Cyberterrorism: The Sum of All Fears?” Studies in Conflict & Terrorism 28 (2): 129–49.
———. 2005b. “How Terrorists Use the Internet.” Journal of International Security Affairs 8: 91–105.
———. 2005c. “Terrorist Dot Com: Using the Internet for Terrorist Recruitment and Mobilization.” In The Making of a Terrorist: Recruitment, Training, and Root Causes, edited by James J. F. Forest, 53–65. Westport, CT: Praeger.
———. 2006a. “Cyberterrorism.” In Security, Terrorism and Privacy in Information Society, edited by Katharina Von Knop and Boaz Ganor, 41–52. Bielefeld, Germany: W. Bertelsmann Verlag.
———. 2006b. Terror on the Internet: The New Arena. The New Challenges. Washington, DC: United States Institute for Peace (USIP) Press.
———. 2006c. “Virtual Disputes: The Use of the Internet for Terrorist Debates.” Studies in Conflict & Terrorism 29 (7): 623–39.
———. 2006d. “Virtual Training Camps: Terrorist Use of the Internet.” In
Teaching Terror: Strategic and Tactical Learning in the Terrorist World, edited by James Forest, 110–32. Boulder, CO: Rowman & Littlefield.
———. 2007a. “Using the Internet for Terrorist Recruitment and Mobilization.” In Hypermedia Seduction for Terrorist Recruiting, edited by Boaz Ganor, Katharina Von Knop, and Carlos Duarte, 47–58. NATO Science for Peace and Security Series. Amsterdam: IOS Press.
———. 2007b. “Virtual Terrorism: How Modern Terrorists Use the Internet.” In The Internet and Governance in Asia: A Critical Reader, edited by Indrajit Banerjee, 189–216. Singapore: Asian Media Information and Communication Centre and Wee Kim Wee School of Communication and Information, Nanyang Technological University.
———. 2008b. “Cyber-Terrorism: Are We Barking at the Wrong Tree?” Harvard Asia Pacific Review 9 (2) (Spring 2008): 41–46.
———. 2008e. “The Psychology of Mass-Mediated Terrorism.” American Behavioral Scientist 52 (1): 69–86.
———. 2008f. “WWW.Al-Qaeda: The Reliance of al-Qaeda on the Internet.” In Responses to Cyber Terrorism, edited by Centre of Excellence—Defence Against Terrorism, Ankara, Turkey, 61–69. NATO Science for Peace and Security Series. Amsterdam: IOS Press.
———. 2009d. “When Fatwas Clash Online: Terrorist Debates on the Internet.” In Influence Warfare: How Terrorists and Governments Fight to Shape Perceptions in a War of Ideas, edited by James Forest, 49–74. Westport, CT: Praeger Security International.
———. 2010c. “Terrorist Facebook: Terrorists and Online Social Networking.” In Web Intelligence and Security, edited by Mark Last and Abraham Kandel, 19–30. NATO Science for Peace and Security Series. Amsterdam: IOS Press.
———. 2011a. “Al Qaeda Has Sent You a Friend Request: Terrorists Using Online Social Networking.” Paper presented at annual conference of the Israeli Communication Association, Haifa, Israel, April 14.
———. 2011b. “Cyber-
Fatwas and Terrorism.”
Studies in Conflict & Terrorism 34 (10): 765–81.
———. 2012a. “Lone Wolves in Cyberspace.” Journal of Terrorism Research 3 (2): 75–90.
———. 2012b. “The Role of the Media in Propagating Terrorism.” In Countering Terrorism: Psychosocial Strategies, edited by Updesh Kumar and Manas K. Mandal, 182–200. London: Sage Publications.
Weimann, Gabriel, and Conrad Winn. 1994. The Theater of Terror: Mass Media and International Terrorism. New York: Longman.
Westby, Jody. 2006. “Countering Terrorism with Cyber Security.” Paper presented at the 36th Session of World Federation of Scientists, International Seminars on Planetary Emergencies, August 18–26, 2006, Erice, Italy.
Wilkinson, Paul. 2001. Terrorism versus Democracy. London: Frank Cass.
Wilson, Clay. 2005. Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. Congressional Research Service Report for Congress RL32114, April 1. Washington, DC: Congressional Research Service.
———. 2007. Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues. Congressional Research Service Report for Congress RL31787, June 5. Washington, DC: Congressional Research Service.
———. 2008. Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. Congressional Research Service Report for Congress RL32114, January 29. Washington, DC: Congressional Research Service.
Wolfsfeld, Gadi, Eli Avraham, and Issam Aburaiya. 2001. “When Prophesy Always Fails: Israeli Press Coverage of the Arab Minority’s Land Day Protests.” Political Communication 17 (2): 115–31.
Wright, Lawrence. 2007. The Looming Tower: Al-Qaeda and the Road to 9/11. New York: Alfred A. Knopf.
Zanini, Michele, and Sean J. A. Edwards. 2001. “The Networking of Terror in the Information Age.” In Networks and Netwars: The Future of Terror, Crime and Militancy, edited by John Arquilla and David Ronfeldt, 29–60. Santa Monica, CA: RAND Corporation.
Zanna, Mark P. 1993. “Message Receptivity: A New Look at the Old Problem of Open - vs. Closedmindedness.” In Advertising Exposure, Memory and Choice, edited by Andrew A. Mitchell, 141–62. Hillsdale, NJ: Erlbaum.