We're sorry, but eCampus.com doesn't work properly without JavaScript.
Either your device does not support JavaScript or you do not have JavaScript enabled.
How to enable JavaScript in your browser.
Need help? Call 1-855-252-4222
Chapter 1. Terrorism Defined
1.1 Bruce Hoffman, from "Defining Terrorism," Inside Terrorism (Columbia University Press, 1998)
1.2 Paul R. Pillar, from "The Dimensions of Terrorism and Counterterrorism," Terrorism and U.S. Foreign Policy (Brookings Institution Press, 2001)
1.3 Eqbal Ahmad and David Barsamian, from Eqbal Ahmad Terrorism: Theirs & Ours (Seven Stories Press, 2001)
2.1 Martha Crenshaw, from "The Logic of Terrorism: Terrorist Behavior as a Product of Strategic Choice," in Walter Reich, ed., Origins of Terrorism: Psychologies, Ideologies, Theologies, States of Mind (Woodrow Wilson Center Press, 1998)
2.2 Louise Richardson, from "Global Rebels: Terrorist Organizations as Trans-National Actors," Harvard International Review, (Fall 1998)
3.1 Colonel Russell D. Howard, from “Understanding Al Quaeda’s Application of the New Terrorism—The Key to Victory in the Current Campaign,” An Original Essay Written for This Volume (2003)
3.2 John Arquilla, David Ronfeldt, and Michele Zanini, from "Networks, Netwar, and Information-Age Terrorism," in Ian O. Lesser, John Arquilla, Bruce Hoffman, David Ronfeldt, Michele Zanini and Brian Jenkins, Countering the New Terrorism (RAND Corporation, 1999)
3.3Brent Ellis, adapted from “Countering Complexity: An Analytical Framework to Guide Counter-Terrorism Policy Making,” Journal of Military and Strategic Studies (Spring/Summer 2003)
4.1 Magnus Ranstorp, from "Terrorism in the Name of Religion," Journal of International Affairs (Summer 1996)
4.2 Mark Juergensmeyer, from "The Logic of Religious Violence," in David C. Rapoport, ed., Inside Terrorism Organizations (Columbia University Press, 1988)
4.3 Adam Dolnik, From “All God’s Poisons: Re-Evaluating the Threat of Religious Terrorism with respect to Non-Conventional Weapons,” Monterey Institute International Studies Report Prepared for the Defense Threat Reduction Agency (2003)
5.1 Jessica Stern, from "Getting and Using the Weapons," The Ultimate Terrorists (Harvard University Press, 1999)
5.2 Christopher F. Chyba, from "Toward Biological Security," Foreign Affairs (May/June 2002)
5.3 Richard F. Pilch, from “The Bioterrorist Threat in the United States,” Monterey Institute International Studies Report Prepared for the Cneter for Nonproliferation Studies (2003)
6.1 Barry R. McCaffrey and John A. Basso, updated from "Narcotics, Terrorism and International Crime: The Convergence Phenomenon," An Original Essay Written for This Volume (2003)
6.2 Bruce Hoffman, from “The Logic of Suicide Terrorism,” The Atlantic Monthly (June 2003)
6.3 Maura Conway, adapted from “Terrorism and IT: Cyberterrorism and Terrorist Organisations Online,” Paper Presented at the 44th Annual International Studies Association Convention, Portland, Oregon (February 27,2003)
6.4 Madeline Gruen, from “White Ethnonationalist and Political Islamist Methods of Fundraising and Propaganda on the Internet,” Paper Presented at the 11th Annual Terrorism Trends & Forecasts Symposium, Morristown, New Jersey (May 20, 2003)
6.5 John Ellis, from “Terrorism in the Genomic Age,” An Original Essay Written for This Volume (2003)
Chapter 7. The Challenges of Terrorism
7.1 Laura K. Donohue, adapted from "Fear Itself: Counterterrorism, Individual Rights, and US Foreign Relations Post 9-11," A Paper Presented at the International Studies Association Convention, New Orleans (March, 2002)
7.2 Bruce Hoffman, from "A Nasty Business," The Atlantic Monthly (January 2002)
7.3 Anthony Clark Arend, from "Terrorism and Just War Doctrine," in Elliott Abrams, ed., Close Calls: Intervention, Terrorism, Missile Defense, and 'Just War' Today (Ethics and Public Policy Center, 1998)
7.4 Brad Roberts, from "NBC-Armed Rogues: Is There a Moral Case for Preemption?" in Elliott Abrams, ed., Close Calls: Intervention, Terrorism, Missile Defense and 'Just War' Today (Ethics and Public Policy Center, 1998)
8.1 Richard K. Betts, from "The Soft Underbelly of American Primacy: Tactical Advantages of Terror," Political Science Quarterly (2002)
8.2 James S. Robbins, from "Bin Laden's War," An Original Essay Written for This Volume (2002)
8.3 Richard H. Shultz and Andreas Vogt, from "The Real Intelligence Failure on 9/11 and the Case for A Doctrine of StrikingFirst," An Original Essay Written for This Volume (2002)
8.4 Barry R. Posen, from "The Struggle Against Terrorism: Grand Strategy, Strategy, and Tactics," International Security (Winter 2001/02)
8.5 Wyn Q. Bowen, from “ Deterring Mass-Casuality Terrorism,” Joing Force Quarterly (Summer 2002)
9.1 Martha Crenshaw, from "Counterterrorism Policy and the Political Process," Studies in Conflict & Terrorism (2001)
9.2 Richard K. Betts,from "Fixing Intelligence," Foreign Affairs (January/February 2002)
9.3 Jeffrey H. Norwitz, from “Combating Terrorism with a Helmet or a Badge?” Journal of Homeland Security (August 2002)
9.4 Rob de Wijk, from "The Limits of Military Power," The Washington Quarterly (Winter 2002)
9.5 David J. Rothkopf, from "Business Versus Terror," Foreign Policy (May/June 2002)
Appendices
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.