Defining and exploring the terrorism field: Toward an intertheoretic, agent-based approach

[1]  Mark E. Nissen,et al.  Computational Modeling and Analysis of Networked Organizational Planning in a Coalition Maritime Strike Environment , 2006 .

[2]  Ethan Bueno de Mesquita The Quality of Terror , 2005 .

[3]  J. Gómez Terrorist Motivations for the Use of Extreme Violence; Strategic Insights, v. 6, issue 5 (May 2005) , 2005 .

[4]  Brian A. Jackson,et al.  Aptitude for Destruction, Volume 1: Organizational Learning in Terrorist Groups and Its Implications for Combating Terrorism , 2005 .

[5]  J. Victoroff The Mind of the Terrorist , 2005 .

[6]  William Rosenau Al Qaida Recruitment Trends in Kenya and Tanzania , 2005 .

[7]  Marc Sageman,et al.  Understanding terror networks. , 2004, International journal of emergency mental health.

[8]  Mark E. Nissen,et al.  Hypothesis Testing of Edge Organizations: Specifying Computational C2 Models for Experimentation , 2005 .

[9]  Raymond E. Levitt,et al.  Validation of the Virtual Design Team (VDT) Computational Modeling Environment , 2005 .

[10]  Raymond E. Levitt,et al.  Agent-based modeling of knowledge dynamics , 2004 .

[11]  B. Hoffman The Changing Face of Al Qaeda and the Global War on Terrorism , 2004 .

[12]  Jason E. Bartolomei,et al.  Modeling Violent Non-State Actors: A Summary of Concepts and Methods , 2004 .

[13]  I. Duyvesteyn,et al.  How New Is the New Terrorism? , 2004 .

[14]  B. McAllister Al Qaeda and the Innovative Firm: Demythologizing the Network , 2004 .

[15]  Bruce Hoffman,et al.  Terrorism, Signaling, and Suicide Attack , 2004 .

[16]  Raymond E. Levitt,et al.  Computational Modeling of Organizations Comes of Age , 2004, Comput. Math. Organ. Theory.

[17]  S. Kalyvas The Paradox of Terrorism in Civil War , 2004 .

[18]  Gordon H. McCormick Terrorist Decision Making , 2003 .

[19]  R. Pape,et al.  The Strategic Logic of Suicide Terrorism , 2003, American Political Science Review.

[20]  A. Moghadam Palestinian Suicide Terrorism in the Second Intifada: Motivations and Organizational Aspects , 2003 .

[21]  Børge Obel,et al.  Erratum: Return on Assets Loss from Situational and Contingency Misfits , 2002, Manag. Sci..

[22]  Jerrold M. Post,et al.  The Radical Group in Context: 2. Identification of Critical Elements in the Analysis of Risk for Terrorism by Radical Group Type , 2002 .

[23]  Jerrold M. Post,et al.  The Radical Group in Context: 1. An Integrated Framework for the Analysis of Group Risk for Terrorism , 2002 .

[24]  Paul K. Davis,et al.  Deterrence and Influence in Counterterrorism: A Component in the War on Al Qaeda , 2002 .

[25]  Bruce Hoffman,et al.  Change and Continuity in Terrorism , 2001 .

[26]  David Tucker,et al.  What is New about the New Terrorism and How Dangerous is It? , 2001 .

[27]  Brian A. Jackson Technology Acquisition by Terrorist Groups: Threat Assessment Informed by Lessons from Private Sector Technology Adoption , 2001 .

[28]  Kathleen M. Carley STRUCTURAL CHANGE AND LEARNING WITHIN ORGANIZATIONS , 2001 .

[29]  T. Sandler,et al.  Is Transnational Terrorism Becoming More Threatening? , 2000 .

[30]  Martha Crenshaw,et al.  The Psychology of Terrorism: An Agenda for the 21st Century , 2000 .

[31]  Theodore Schick Readings in the Philosophy of Science: From Positivism to Postmodernism , 1999 .

[32]  J. Zanders Assessing the Risk of Chemical and Biological Weapons Proliferation to Terrorists , 1999 .

[33]  G. Cameron Multi-track Microproliferation: Lessons from Aum Shinrikyo and Al Qaida , 1999 .

[34]  Yan Jin,et al.  Simulating Project Work Processes and Organizations: Toward a Micro-Contingency Theory of Organizational Design , 1999 .

[35]  W. Laqueur The New Terrorism: Fanaticism and the Arms of Mass Destruction , 1999 .

[36]  C. J. Drake,et al.  The role of ideology in terrorists’ target selection , 1998 .

[37]  John Arquilla,et al.  COUNTERING NEW TERRORISM , 1998 .

[38]  Kathleen M. Carley,et al.  A Theoretical Study of Organizational Performance Under Information Distortion , 1997 .

[39]  YAN JIN,et al.  The virtual design team: A computational model of project organizations , 1996, Comput. Math. Organ. Theory.

[40]  Jeffrey Ian Ross A Model of the Psychological Causes of Oppositional Political Terrorism , 1996 .

[41]  W. Scott,et al.  Institutions and Organizations. , 1995 .

[42]  M. Crenshaw Terrorism in context , 1995 .

[43]  Børge Obel,et al.  The validity of computational models in organization science: From model realism to purpose of the model , 1995, Comput. Math. Organ. Theory.

[44]  Michael J. Prietula,et al.  Computational organization theory , 1994 .

[45]  Michael J. Prietula,et al.  ACTS theory: extending the model of bounded rationality , 1994 .

[46]  Ariel Merari,et al.  Terrorism as a strategy of insurgency , 1993 .

[47]  D. Porta Introduction: On Individual Motivations in Underground Political Organizations , 1992 .

[48]  D. Porta Social movements and violence : participation in underground organizations , 1992 .

[49]  Martha Crenshaw,et al.  How terrorism declines , 1991 .

[50]  Raymond E. Levitt,et al.  The Virtual Design Team: An Object-Oriented Model of Information Sharing in Project Design Teams , 1991 .

[51]  Brian Michael Jenkins,et al.  Future Trends in International Terrorism , 1988 .

[52]  B. Hoffman,et al.  Trends in International Terrorism, 1982 and 1983 , 1984 .

[53]  Averill M. Law,et al.  Simulation Modeling and Analysis , 1982 .

[54]  Donald L. Mills,et al.  Organizations: Rational, Natural and Open Systems , 1983 .

[55]  L. Alexander Terrorism: Theory And Practice , 1979 .

[56]  Henry Mintzberg,et al.  The Structuring of Organizations , 1979 .

[57]  Jay R. Galbraith Organization Design , 1977 .

[58]  James D. Thompson Organizations in Action , 1967 .

[59]  R. Cyert,et al.  Theory of the Firm: Resource Allocation in a Market Economy , 1966 .

[60]  W. Powell,et al.  The iron cage revisited institutional isomorphism and collective rationality in organizational fields , 1983 .