Annotated Bibliography

Bjørgo, Tore. Strategies for Preventing Terrorism. Basingstoke: Palgrave Macmillan, 2013. Internet resource

The group that developed this innovative book explores the theoretical foundation of terrorism and provides practical insights on how to prevent the menace in a comprehensive perspective. The book provides a holistic model that explores beyond by integrating the criminal justice system and numerous crime prevention approaches into a single model. The model provided in the book provides nine key preventive measures that may be used to counter-attack terrorism. According to crime and terror attack scholars, this book has offered some of the excellent tools that are critical in reducing crime and terror-related challenges.

Findley, Michael G., and Joseph K. Young. “Terrorism and Civil War: A Spatial and Temporal Approach to a Conceptual Problem.” Perspectives on Politics 10.2 (2012): 285-305.

The well-researched paper explores the relationship between terrorism and civil war. Findley and his colleagues aim to determine to extend at which the two factors overlap and to unpack the various spatial and temporal patterns.  To prove their results, the duo uses a newly geo-referenced terror event data to provide the global view of when, where and how the terrorists occurred in differed war-prone regions. The exploratory analysis of the research was carried out in six different cases with unique terrorism context. The data results showed a high degree of relationship between ongoing civil war and terrorism. From the data analysis, it is justifiable that terrorism and civil war are correlated in nature.

Fortna, Virginia Page. “Do Terrorists Win? Rebels’ use of Terrorism and Civil War Outcomes.” International Organization 69.3 (2015): 519-56.

Fortna and her co-author compare the outcome of the civil war and use the situation to analyze if the rebels groups who utilized terrorism were much better than the collaborators. The article carries out much analysis and evaluates the pros and cons of terrorist approaches used during the civil war. The study uses the qualitative approach to explore the empirically the two groups.  The renowned researcher analyses and validates the data to provide valid conclusions on the matter.  The study concludes that the terrorist rebel groups are less likely to achieve their political objectives as compared to the non-terror groups.

Grozdanova, Rumyana. “‘Terrorism’ – Too Elusive a Term for an International Legal Definition?” Netherlands International Law Review 61.3 (2014): 305-34.ProQuest. 21 Oct. 2016.

The journal article explores how the regional and international legislative responses to counter-terrorism have changed. The renowned author takes the opportunity to explain how the broad anti-terrorism legislature has become an important tool in managing the terrorism across the globe.  The paper aims to develop a single common and international binding legislation program that will be used to counteract terrorism across the globe. Though the article is limited in its methods of data analysis, it is a classic representation of the possible methods of dealing with the terrorism and crime related incidences. The group has successfully achieved its global legal representation using the above Netherlands International Law Review paper.

Johnson, Michael P. “Langhinrichsen-Rolling’s Confirmation of the Feminist Analysis of Intimate Partner Violence: Comment on “Controversies Involving Gender and Intimate Partner Violence in the United States.” Sex Roles 62.3-4 (2010): 212-9.

This journal majorly focuses on the intimate partner violence in the current American society. In a well articulate voice, the author claims that the there are numerous intimate violence that are caused by different factors. Therefore, the study carries a qualitative research inquiry to prove the above claims. According to Johnson, the qualitative research will provide ample evidence to justify the Jenniffer2010, claims. Empirical analysis indicates the group have succeeded in the study as they have provided the numerous evidences on the intimate partner violence in America and across the globe. The results from the study are important elements in mitigating such incidences in the present society.

Moir, Nathaniel L. “Failed States and the Origins of Violence: A Comparative Analysis of State Failure as a cause of Terrorism and Political Violence. “Military Review 95.6 (2015): 138-9.

The military review article primarily focuses on the cases of terrorism in domestic contexts and political violence of failed states. The paper is majorly a comparative analysis of root causes of political violence and terrorism in the failed states. The paper uses all other secondary sources such as books and articles to justify the claims on the main causes of terrorism and political violence in the failed states. The renowned author argues that people in failed states often resort to political violence as a method of achieving security within the nation. The group in the study has succeeded in providing the numerous major causes of state failure to counter attack terrorism in the contemporary society.

Pain, Rachel. “Everyday Terrorism: Connecting Domestic Violence and Global Terrorism.” Progress in Human Geography 38.4 (2014): 531-50. 

Pain and her co-author take the opportunity to explore on how emotion operates in different forms of terrorist attacks particularly in politics of fear.  The paper further expands on how domestic violence is used as a daily terrorism attack. The well articulated and classic paper provides a broader perspective of the conceptual framework which positions terrorism in the broader political and social context. The renowned political analyst uses the better part of the paper to explain that the terrorism operates at different scales in every nation across the globe. In convulsion, the paper is a perfect representation on how politics and terrorism are interrelated to influences occurrences in the society.

“Science; Investigators at Durham University Report Findings in Geographical Science (Everyday Terrorism: Connecting Domestic Violence and Global Terrorism) (Everyday Terrorism: Connecting Domestic Violence and Global Terrorism).”Science Letter (2014): 688. ProQuest. 20 Oct. 2016 

This science letter article explores the shared foundations, parallels, and direct points of connections between daily and global terrorists. This exploration is achieved in the paper through cross-examination of the four important themes; the inequitable nature of counter-terrorism, public recognition and recovery, fear, and trauma and multiscalar politics and securities. According to the political scientist, this paper succeeds to remap the geographies of domestic violence and global terrorism with the aim of exerting control on the trends. According to news editors, the paper can be regarded as a noble yet a classic work on how to address terrorism today and in the future.  Further, the article is a strong foundation for investigating and analyzing the terror related matter in the current society.

Shakarian, Paulo, Jana Shakarian, and Andrew Ruef. Introduction to Cyber-Warfare: A Multidisciplinary Approach. Amsterdam [Netherlands: Morgan Kaufmann Publishers, an imprint of Elsevier, 2013. Internet resource

The in-depth cyber warfare book written by some of the IT expert analysis explores the increasing trend of the cyber-warfare. The book uses some of the most recent studies that have been conducted by renowned organizations on cyber-espionage and over-exploitation attempts by some of the unscrupulous individuals. The topics in this book are discussed on the multi-disciplinary approach to cover social, political and cultural effects of cyber crime. The author of the articles presents these results in the most impressive and simple manner to be understood by the greater global scholars on the matter related to cyber-crime. Presently, the book can be regarded as a classic representation of successful counter attack to the cyber-crime and related matter. Further, the book can be integrated with other scholarly articles to provide a solid approach in dealing with matters related to cyber-crime in the broader context.

Ryan, Michael W. S. Decoding Al-Qaeda’s Strategy: The Deep Battle against America. New York: Columbia University Press, 2013. Internet resource

Ryan in his well-researched book provides numerous insights on how to counter attack the Al-Qaeda group. In a well articulated and incisive voice the renowned criminal analyst a comprehensive, practical mechanisms on best methods of creating the counter attack. Therefore, he explores the unique Salafist Jihadists roots comprehensively and compiles the book. The group succeeds in finding the root causes of Jihad war and places them on the broader context of the Terrorism and crime related scenes. In fact, Ryan and his co-author are rumored as the great engineers who are determined to terminate the progress of the Al-Qaeda and the entire Jihad group.  He encourages the researchers and strategists to devote much of their attention on Jihad ideas rather than their military operation tactics.

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s


%d bloggers like this: