European Proceedings Logo

  • Publishing Policies
  • For Organizers/Editors
  • For Authors
  • For Peer Reviewers

Search icon

A Systematic Literature Review of Knowledge and Awareness on Terrorism

email address

The reporting on terrorism issues especially related to Islam and Muslims has been widely researched by scholars, academics, practitioners, and other relevant parties. However, the importance to address the level of understanding and awareness on terrorism issues seems more imperative. This paper reviews how knowledge and awareness of this issue as studied by previous scholars, politicians, the media, academics, and security professionals. It focuses on the specific research techniques or methodologies that have emerged, the possible insights they offer, and the challenges and impacts they raise. With that, there is a need to do methodological-based articles on Systematic Literature Review (SLR). Guided by the PRISMA review method; a systematic review that identifies 20 related studies throughout Scopus, Web of Science, and other databases. Based on this study, five main points of SLR were discussed such as; aims of the study; study design, level of understanding; level of awareness; the findings.

Keywords: PRISMA review method , systematic literature review , terrorism understanding , terrorism awareness , Islam and Muslims

Introduction

Research on terrorism has a rich perspective and the definition of terrorism also can be varying and universal. The Merriam-Webster Dictionary ( 2018 ) defines terrorism as the systematic use of terror especially as a means of coercion. In other regards, the burgeoning research on media and terrorism continues as the number of terrorism attacks increases worldwide especially in the advent of the new millennium ( Fahmy, 2017 ). Also, very large academic literature examines the discourses and public representations of terrorism.

For example, Borum ( 2004 ) defined terrorism as “acts of violence intentionally perpetrated on civilian non-combatants with the goal of furthering some ideological, religious or political objective.” The United Nations High Commissioner for Human Rights office (2008) defined terrorism as acts of violence that target civilians in the pursuit of political or ideological aims and includes “criminal acts intended or calculated to provoke a state of terror in the general public, a group of persons or particular persons for political purposes”. In 2012 Jackson and Hall defined terrorism as an occasional subject of national and international interest before 9/11, it is now ubiquitous, and its influence can be detected in virtually every dimension of contemporary social life. Notwithstanding of wide definition of terrorism which has been stated above, Schuurman ( 2019 ) conclude that research on terrorism has retained a strong focus on al-Qaeda, jihadist terrorism more generally, and the geographic areas most strongly associated with this type of terrorist violence based on the articles published between 2007 and 2016.

In light of the above, the importance of knowledge and awareness towards terrorism issues are imperative amongst society.

Due to this, the work of Rose and Larrimore ( 2002 ) conducted a survey of 291 nurses and medical staff, and students to examine the knowledge and awareness about chemical and biological terrorism among health care providers. Based on their study, it mentioned that the knowledge scores of the respondents were low, and only less than one-fourth of the knowledge questions were answered correctly. Patel et al. ( 2020 ) echo this idea by collecting data and integrating information from various sources with the use of ontology for semantical knowledge representation.

This work is expected to positively impact the government agencies, NGOs, media, and public at large by having a better platform of information in the case of emergency and they will be able to liaise with each other. Thus, the awareness of terrorism is improved among them. Following this, the researchers try to narrow down the topic on terrorism by examining the understanding and awareness of terrorism issues through a systematic review method. This is significant mainly to discover to what extent society understands and is aware of terrorism issues as in media reports.

This article is part of a larger project on the formation of an instrument on the level of knowledge and awareness towards violence and extremist from the perspective of western media. Different methods have been used to study terrorism and media such as through content analysis, survey, and also in-depth interviews. However, a systematic review method can help the readers as well as academics to study the pattern and identify the research gap for future research on media and terrorism.

According to Higgins et al. ( 2011 ), SLR or also known as systematic review (SR) is a systematic literature review which involves three main procedures which are organized, transparent and replicable in all process, especially when to locate and synthesize all the articles. To give an example Mohamed Shaffril et al. ( 2021 ) also stated that SLR has emphasized numerous unique procedures compared to the traditional review method.

On top of that, many previous scholars such as Robinson and Lowe ( 2015 ), Greyson et al. ( 2019 ) Lockwood et al. ( 2015 ), and Mallett et al. ( 2012 ) also explained the advantages of SLR. Based on this list of literature, SLR encourages researchers to do extensive searching methods by examining the information such as research design, analytical methods, and causal chains. Most importantly, they suggested that SLR can help to increase the transparency in which all the criteria must be included to ensure the robustness of the research.

Problem Statement

Despite an abundance of research on media and terrorism, efforts to study the level of knowledge and awareness towards this issue are still lacking. Thus, this research attempts to fill the gap in understanding the level of knowledge and awareness towards terrorism as reported by the Western media.

This research will look into the research patterns and trends in terrorism through a systematic review method. With regards to fulfilling the empirical gaps, such items and checklists from articles studied could be derived to contribute new knowledge for future research and scholarly work. Additionally, this systematic review provides a reference for future studies related to the level of knowledge and awareness on terrorism issues. Other than that, this review is also crucial as there is a lack of studies on terrorism within the level of knowledge and awareness context.

This systematic review study allows information providers to understand the knowledge and awareness on terrorism easier as reported by the Western media which are also relevant for administrators, academics, policymakers, and media practitioners.

Research Questions

What is the level of knowledge and awareness towards terrorism issue, what is the pattern of study on media and terrorism, purpose of the study, research methods.

A systematic review attempts to collate all empirical evidence that fits pre-specified eligibility criteria to answer a specific research question.

According to Liberati et al. ( 2009 ), a systematic review contains four aspects which are (a) a clearly stated set of objectives with an explicit, reproducible methodology; (b) a systematic search that attempts to identify all studies that would meet the eligibility criteria; (c) an assessment of the validity of the findings of the included studies, for example through the assessment of the risk of bias; and (d) systematic presentation, and synthesis, of the characteristics and findings of the included studies. Meta-analysis a statistical method that integrates and summarises results from relevant publications selected in the systematic review ( Zurynski et al., 2015 ).

Furthermore, it also can provide more precise estimates of the effects of health care than those derived from the individual studies included within a review. From this, it can be said that systematic review and meta-analysis can minimize bias and providing reliable findings.

The analysis of PRISMA or Preferred Reporting Items for Systematic Reviews and Meta-Analyses has been used to ensure the transparent and complete reporting of systematic reviews and meta-analyses ( Liberati et al., 2009 ). Thus, this research follows the four steps in PRISMA.

The four steps are identification, screening, eligibility, and inclusion ( Gillath & Karantzas, 2019 ). As for identification, authors focus on searching articles through a database and also other additional sources. Then, it continuous with screening to exclude and remove any duplicate articles.

Eligibility is to find out the full-text article which can be assessed and lastly, the inclusion will be focusing on a combination of qualitative and quantitative synthesis. Hence, this four-phase covered and show numbers of identified records, excluded articles, and included studies.

The flow diagram of the study

With limited time and accessibility, the researchers have identified selected articles through electronic databases using PRISMA from 2000 until 2020 (as in Figure 1). The researchers have examined these records through abstract and full-text review only which resulted in a total of 15 articles for qualitative synthesis. The details of 15 articles were evaluated and presented in Table 3 by featuring authors, year, study design, level of understanding of terrorism, level of awareness on terrorism, and the findings.

The findings of this systematic review (limited to research published within 2000 until 2020) yield the total of 15 journal articles in English and Malay related to the level of understanding and awareness towards terrorism issues. In terms of quantity, this number is relatively small especially when we consider the timeline of articles included in this study (20 years) with two languages being included (English and Malay).

However, a broader subject on research related to terrorism may yield a greater number of studies. In this study however, we have focused on studies with such focus by arguing that to combat terrorism, we must first gain empirical data related to the level of “understanding” and “awareness” ( Jerome & Elwick, 2019 ) then only further measures or steps may be implemented to reduce the effects of terrorism at various levels.

At the same time, from this study, we admit that it is hard to find specific articles which study precisely on the level of understanding and awareness towards terrorism issues. This is a worrying sign, because we believe that, to combat terrorism, we have to identify the root of the issue and these aspects include the level of understanding and the level of awareness among the people.

Another finding from this study shows that there are three main research scopes that have been studied in these researches namely focusing on 1) the level of understanding towards terrorism issues, 2) the level of awareness towards terrorism issues and 3) the level of understanding and awareness towards terrorism issues. Out of these three scopes, 10 researches focus on the level of understanding, 9 on the level of awareness and 5 on both aspects of research.

The less dominant themes found in six different research articles are “terrorism message”, “communication about terrorism by emergency managers”, “the spread of terrorism ideology”, “public’s response against terrorist groups”, “security culture”, and “terrorism studies”. Out of these six themes, the gist of the research is on terrorism issue in which each research looked at finding the way respondents perceive terrorism and one research highlighted on the possibility of having the studies of terrorism as a formal discipline at tertiary level.

From this finding, it suggests that research that examine both aspects about terrorism (the level of understanding and awareness towards terrorism issues) may be increased in the future. A stable number of studies have been conducted on comprehending the level of understanding and the level of awareness on this issue, but the combination of both needs more effort by scholars in the future. This is inline with the suggestion made by Jerome and Elwick (2019) who argued that the level of awareness related to terrorism issues among the people can only be increased when there is an increase of level of knowledge pertaining to this issue. The lack of knowledge is then associated with the issue of a deep distrust to the media that serve as the main source of information related to terrorism ( Jackson & Hall, 2012 ; Keenan, 2018 ).

Kovacic and Logar (2016) through their study entitled Online News Coverage of Terrorism: Between Informing the Public and Spreading Fear. An analysis of 57 news reports about the case of the abduction and execution of Tomislav Salopek in 2015 has driven their study to highlight the dilemma between the public’s right to know or the security of the public. They argued that media has been used among terrorists to disseminate the ideology and activities just because to increase sales and ratings. But on the other hand, it is contradicting with The Universal Declaration of Human Rights (2021) which states that journalists do their reporting on terrorism due to the two rights which are the right to information (Article 19) and the right to security (Article 3). Based on their study, it is concludable that journalists should be aware that being immensely knowledgeable is very important and providing ethical reporting is also crucial to avoid any possible adverse consequences of the reporting such as giving the terrorist the opportunity to disseminate ideas and cause public fears. This is confirmed by Williamson et al. (2020) that media should carry the responsibility to provide accurate reporting about terrorism without instigating fear or panic. Similarly, Haner et al. (2019) conducted a national survey of 1000 Americans to understand the concern about terrorism, the emotional impact of the public’s concern, and their levels of fear of a terrorist attack which one of the findings stated that a large proportion of Americans experience fear as an emotional response to the threat of a terrorist attack. This leads us to an important party when identifying crucial entities to be included in studying terrorism which will be one of the major respondents focused in the field work of this study when it is conducted.

Specifically on studies related to the level of understanding towards terrorism issues, some examples of research include Rose and Larrimore ( 2002 ) who examined the knowledge and awareness of chemical and biological terrorism among health care providers. Another study, which is conducted among university students in Malaysia by Yaakob et al. (2016) focused the aim of the research to ascertain the level of understanding about ISIS among students of higher learning institutions in Peninsular Malaysia and to ascertain the potential for their acceptance and rejection of ISIS’ struggle. The results of these studies generally demonstrate that the level of understanding towards terrorism issues are low among students ( Mohd Hefzan Azmi et al., 2018 ; Yaacob et al., 2016 ). The level is also low among specific type of workers ( Rose & Larrimore, 2002 ) with low understanding level on a specific terrorism issue such as Daesh ( Che Mohd Aziz et al., 2019 ). The low level of understanding is associated with the lack of institutional support that hesitate to fund longitudinal study on the level of understanding among people across geographical and organizational borders, and cultural differences ( Youngman, 2020 ).

Relating to this, based on the SLR analysis conducted, the level of awareness towards terrorism issues can also be concluded as low as studies found that when the level of understanding is low, this will definitely affect the level of awareness which is impossible to score a high level ( Mohd Hefzan Azmi et al., 2018 ). In terms of subject, the main aspect of “awareness” which can be included in public awareness campaigns ( Orehek & Vazeou-Nieuwenhuis, 2014 ) and speeches and advocacies by politicians ( Keenan, 2018 ) includes awareness on threat. Alqahtani (2014) found that awareness of threat is one of the crucial elements that must be included to increase awareness of how dangerous terrorism can be.

Studies that focused on both aspects i.e. the level of understanding and the level of awareness demonstrate that students generally have low understanding and awareness on issues related to terrorism ( Mohd Hefzan Azmi et al., 2018 ). The same study also found that, among these students, they could not even understand the questions posted in the questionnaire. To increase the level of understanding, media play an important role ( Jerome & Elwick, 2019 ) with the assumption that, the increase of awareness among the people can only be achieved by increasing the level of knowledge ( Mohd Hefzan Azmi et al., 2018 ).

In terms of research method deployed in these studies, the analysis show that 4 studies deployed qualitative study (3 – focus group discussion; 1 – in-depth interview), 3 quantitative study with survey as the method and 2 studies deployed mixed method. 6 out of 15 studies examined do not state the method applied. From here, it can be concluded that two most popular research methods deployed in studies related to the level of understanding and awareness on issues related to terrorism are survey and focus group discussion. This seems obvious due to the strengths of these method. Survey provide a wide range of data pertaining to views of the respondents while focus group discussion allows in-depth and rich discoveries to be explored in a study ( Creswell, 2013 ; Mason, 2002 ).

From the SLR analysis conducted, there are several aspects that have been discussed including the topics being studied in previous research pertaining to the level of understanding and awareness on issues related to terrorism, the number of research and the research method deployed in these researches.

In terms of the themes identified, since this study focused to investigations related to the level of understanding and the level of awareness related to terrorism issues, three major themes were discovered mainly 1) the level of understanding about terrorism issues, 2) the level of awareness about terrorism issues and 3) the level of understanding and the level of awareness about terrorism issues have been identified besides six other lesser dominant themes. Among these three major themes, the least number of research were done on the third theme. This should be something that scholars could pay attention too, as the association between the level of understanding and the level of awareness is highly connected. It is indeed difficult to increase the level of awareness when there is no or low level of understanding. Research studying on the combination of both aspects celebrates such association, that definitely could contribute more in-depth and more meaningful data to develop practical and workable instruments and measures to combat terrorism.

In terms of the research methods deployed, the study found that the most popular ones are focus group discussion and survey. For future studies, these methods may be used as both methods yield rich data in their own ways. However, more in-depth interviews may be conducted to provide “single and in-depth data”, to add to what survey and focus group discussion have to offer. Studies should not stop deploying survey and focus group discussion methods, in-depth interview should be added especially when research on the level of understanding and awareness on terrorism issues becomes more mature, hence it will offer more in-depth and specific data that will assist to administrative and empirical decision makings in the future. Qualitative studies will also offer not only in-depth data but also cultural-sensitive discoveries hence facilitate international collaboration to counter terrorism ( Urangoo & Lee, 2019 ).

These future directions should at least spark motivation among researchers to conduct more studies related to terrorism in general and about the level of understanding and awareness more specifically. This thus then will increase the number of research in this specific issue, hence improving the limited number of studies as found in this study. Only a total of 15 studies found and analyzed in this SLR analysis, although the timeline of the study is 20 years. More studies on the combination of the level of understanding and the level of awareness must also be increased to ensure more impactful results may be obtained and shared. It is then studies on terrorism will give impact to policy making and having positive impacts to the people around the world.

Acknowledgments

This work is part of the Fundamental Research Grant Scheme for Research Acculturation of Early Career Researchers (FRGS – RACER) – funded project titled “The Formation of Instrument and Measurement towards Level of Understanding on Terrorism and Extremism from the Perspective of International Media” with grant number USIM/FRGS-RACER/FKP/50619.

Alqahtani, A. (2014). Awareness of the Potential Threat of Cyberterrorism to the National Security. Journal of Information Security, 5, 137-146.

Borum, R. (2004). Psychology of terrorism. University of South Florida.

Che Mohd Aziz, Y., Bakri, M., Fakhrorazi, A., Mohd Azizuddin, M. S., Rusdi, O., & Kamarul Zaman, H.

Y. (2016). Kefahaman Dan Penerimaan Mahasiswa Universiti Awam Terhadap Gerakan ISIS. [Public University Students' Understanding and Acceptance of the ISIS Movement]. Institut Penyelidikan Pembangunan Belia Malaysia, 89-106.

Che Mohd Aziz, Y., Kamarulnizam, A., & Mohd Sofian, O. F. (2019). Pengaruh Kefahaman Dan

Penerimaan Rakyat Malaysia Terhadap Perjuangan Ideologi Daesh. [Malaysian Attitude And Perception On Daesh’s Ideological Struggle.]Kajian Malaysia: Journal of Malaysian Studies, 37(2), 121-145.

Creswell, J. W. (2013). Qualitative Inquiry & Research Design: Choosing among Five Approaches (3rd ed.). Thousand Oaks, CA: SAGE.

Haner, M., Sloan, M. M., Cullen, F. T., Kulig, T. C., & Lero Jonson, C. (2019). Public concern about terrorism: Fear, worry, and support for anti-Muslim policies. Socius, 5, 2378023119856825.

Higgins, J. P. T., Altman, D. G., Gotzsche, P. C., Juni, P., Moher, D., Oxman, A. D., Savovic, J., Schulz, K. F., Weeks, F. L., & Sterne, J. A. C. (2011). The Cochrane collaboration’s tool for assessing risk of bias in randomised trials. BMJ 343(7829), 1-9. DOI:

Fahmy, S. S. (2017). Media, Terrorism, and Society: Perspectives and Trends in the Digital Age. Mass Communication and Society, 20, 735–739. DOI:

Gillath, O., & Karantzas, G. (2019). Attachment security priming: A systematic review. Current opinion in psychology, 25, 86-95. DOI:

Greyson, D., Rafferty, E., Slater, L., MacDonald, N., Bettinger, J. A., Dubé, È., & MacDonald, S. E. (2019). Systematic review searches must be systematic, comprehensive, and transparent: a critique of Perman et al. BMC Public Health, 19(1), 1-6. DOI: 10.1186/s12889-018-6275-y

Jackson, R., & Hall, G. (2012). Knowing Terrorism: A Study on Lay Knowledge of Terrorism and Counter-terrorism. In 5th biennial Oceanic Conference on International Studies (OCIS) (Vol. 18, p. 20).

Jerome, L. E. E., & Elwick, A. (2019). Identifying an educational response to the prevent policy: student perspectives on learning about terrorism, extremism and radicalisation. British Journal of Educational Studies, 67(1), 97-114.

Keenan, K. (2018). Rethinking place in the study of societal responses to terrorism: Insights from Boston, Massachusetts (USA). Urban studies, 55(2), 461-480. DOI:

Kovacic, M. P., & Logar, N. (2016). Online News Coverage of Terrorism: Between Informing the Public and Spreading Fear. Medij. istraž. (god. 22, br. 2), 5-26. DOI:

Liberati, A., Altman, D. G., Tetzlaff, J., Mulrow, C., Gøtzsche, P. C., Ioannidis, J. P., Clarke, M., Devereaux, P. J., Kleijnen, J., & Moher, D. (2009). The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions: explanation and elaboration. Journal of Clinical Epidemiology, 62, 1- 34.

Lockwood, C., Munn, Z., & Porritt, K. (2015). Qualitative research synthesis: methodological guidance for systematic reviewers utilizing meta-aggregation. JBI Evidence Implementation, 13(3), 179-187. DOI:

Mallett, R., Hagen-Zanker, J., Slater, R., & Duvendack, M. (2012). The benefits and challenges of using systematic reviews in international development research. Journal of development effectiveness, 4(3), 445-455.

Mason, J. (2002). Qualitative Researching. Sage.

McGovern, G. P. (2011). Situational Awareness in Terrorism and Crime Prevention. Perspectives on Terrorism, 5(1), 55-61. https://www.jstor.org/stable/26298502

Merriam-Webster Dictionary. (2018). Office of the United Nations High Commissioner for Human Rights.

Mohd Hefzan, A., Azmi, A., & Ishak, A. R. (2018). Ideologi Terorisme Dikalangan Pelajar Universiti: Isu

Dan Cabaran. [Ideology of Terrorism Among University Students: Issues and Challenges] Journal of Global Business and Social Entrepreneurship (GBSE), 4(10), 87-95.

Mohamed Shaffril, H. A., Samsuddin, S. F., & Abu Samah, A. (2021). The ABC of systematic literature review: The basic methodological guidance for beginners. Quality & Quantity, 55(4), 1319-1346. DOI:

Orehek, E., & Vazeou-Nieuwenhuis, A. (2014). Understanding the terrorist threat: Policy implications of a motivational account of terrorism. Policy Insights from the Behavioral and Brain Sciences, 1(1), 248-255. DOI:

Patel, A., Sharma, A., & Jain, S. (2020). An intelligent resource manager over terrorism knowledge base. Recent Advances in Computer Science and Communications (Formerly: Recent Patents on Computer Science), 13(3), 394-405.DOI:

Pries-Shimshi, Y. (2007). Creating a Citizenry Prepared for Terrorism: Education, Media and Public Awareness. NATO Security Through Science Series E Human and Societal Dynamics, 17, 80.

Robinson, P., & Lowe, J. (2015). Literature reviews vs systematic reviews. Australian and New Zealand Journal forPublic Health, 39(2), 103. DOI:

Rose, M. A., & Larrimore, K. L. (2002). Knowledge and Awareness Concerning Chemical and Biological Terrorism: Continuing Education Implications. Journal of Continuing Education in Nursing, 33(6), 253-8. DOI:

Schuurman, B. (2019). Topics in terrorism research: reviewing trends and gaps, 2007-2016. Critical Studies on Terrorism, 12(3), 463-480. https://doi.org/10.1080/17539153.2019.1579777

The Universal Declaration of Human Rights. (2021). http://www.un.org/en/universal-declaration-human rights/

Urangoo, K. E., & Lee, J. L. (2019). Counter-Terrorism Policy of Mongolia: Raising Awareness on Terrorism. Korean Security Journal, (60), 155-173.

Williamson, H., Fay, S., & Johnson, T. M. (2020). Media Reports of Terrorism Can Create Public Fear – GCI Insights. https://Blogs.Griffith.Edu.Au/Gci-Insights/2020/01/20/Media-Reports-Of-Terrorism-Can-Create-Public-Fear/

Youngman, M. (2020). Building “terrorism studies” as an interdisciplinary space: Addressing recurring issues in the study of terrorism. Terrorism and political violence, 32(5), 1091-1105. DOI:

Zurynski, Y., Sureshkumar, P., Phu, A., & Elliott, E. (2015). Female genital mutilation and cutting: a systematic literature review of health professionals’ knowledge, attitudes and clinical practice. BMC international health and human rights, 15(1), 1-18. https://www.apsu.org.au/assets/Resources/Writing-a-Systematic-Literature-Review.pdf

Copyright information

Creative Commons License

About this article

Publication date.

31 January 2022

Article Doi

https://doi.org/10.15405/epsbs.2022.01.02.17

978-1-80296-122-5

European Publisher

Print ISBN (optional)

Edition number.

1st Edition

Communication, Media, Disruptive Era, Digital Era, Media Technology  

Cite this article as:

Hassan, F., Othman, S. S., Hayati Yusoff, S., Ali, K., Omar, S. Z., & Musaddad, M. A. (2022). A Systematic Literature Review of Knowledge and Awareness on Terrorism. In J. A. Wahab, H. Mustafa, & N. Ismail (Eds.), Rethinking Communication and Media Studies in the Disruptive Era, vol 123. European Proceedings of Social and Behavioural Sciences (pp. 203-218). European Publisher. https://doi.org/10.15405/epsbs.2022.01.02.17

We care about your privacy

We use cookies or similar technologies to access personal data, including page visits and your IP address. We use this information about you, your devices and your online interactions with us to provide, analyse and improve our services. This may include personalising content or advertising for you. You can find out more in our privacy policy and cookie policy and manage the choices available to you at any time by going to ‘Privacy settings’ at the bottom of any page.

Manage My Preferences

You have control over your personal data. For more detailed information about your personal data, please see our Privacy Policy and Cookie Policy .

These cookies are essential in order to enable you to move around the site and use its features, such as accessing secure areas of the site. Without these cookies, services you have asked for cannot be provided.

Third-party advertising and social media cookies are used to (1) deliver advertisements more relevant to you and your interests; (2) limit the number of times you see an advertisement; (3) help measure the effectiveness of the advertising campaign; and (4) understand people’s behavior after they view an advertisement. They remember that you have visited a site and quite often they will be linked to site functionality provided by the other organization. This may impact the content and messages you see on other websites you visit.

  • Search Menu
  • Browse content in A - General Economics and Teaching
  • Browse content in A1 - General Economics
  • A10 - General
  • A12 - Relation of Economics to Other Disciplines
  • A13 - Relation of Economics to Social Values
  • A14 - Sociology of Economics
  • Browse content in A2 - Economic Education and Teaching of Economics
  • A29 - Other
  • Browse content in B - History of Economic Thought, Methodology, and Heterodox Approaches
  • B0 - General
  • Browse content in B1 - History of Economic Thought through 1925
  • B11 - Preclassical (Ancient, Medieval, Mercantilist, Physiocratic)
  • B12 - Classical (includes Adam Smith)
  • Browse content in B2 - History of Economic Thought since 1925
  • B20 - General
  • B21 - Microeconomics
  • B22 - Macroeconomics
  • B25 - Historical; Institutional; Evolutionary; Austrian
  • B26 - Financial Economics
  • Browse content in B3 - History of Economic Thought: Individuals
  • B31 - Individuals
  • Browse content in B4 - Economic Methodology
  • B41 - Economic Methodology
  • Browse content in B5 - Current Heterodox Approaches
  • B55 - Social Economics
  • Browse content in C - Mathematical and Quantitative Methods
  • Browse content in C0 - General
  • C00 - General
  • C02 - Mathematical Methods
  • Browse content in C1 - Econometric and Statistical Methods and Methodology: General
  • C10 - General
  • C11 - Bayesian Analysis: General
  • C12 - Hypothesis Testing: General
  • C13 - Estimation: General
  • C14 - Semiparametric and Nonparametric Methods: General
  • C15 - Statistical Simulation Methods: General
  • C19 - Other
  • Browse content in C2 - Single Equation Models; Single Variables
  • C21 - Cross-Sectional Models; Spatial Models; Treatment Effect Models; Quantile Regressions
  • C22 - Time-Series Models; Dynamic Quantile Regressions; Dynamic Treatment Effect Models; Diffusion Processes
  • C23 - Panel Data Models; Spatio-temporal Models
  • C24 - Truncated and Censored Models; Switching Regression Models; Threshold Regression Models
  • C25 - Discrete Regression and Qualitative Choice Models; Discrete Regressors; Proportions; Probabilities
  • C26 - Instrumental Variables (IV) Estimation
  • Browse content in C3 - Multiple or Simultaneous Equation Models; Multiple Variables
  • C31 - Cross-Sectional Models; Spatial Models; Treatment Effect Models; Quantile Regressions; Social Interaction Models
  • C32 - Time-Series Models; Dynamic Quantile Regressions; Dynamic Treatment Effect Models; Diffusion Processes; State Space Models
  • C33 - Panel Data Models; Spatio-temporal Models
  • C34 - Truncated and Censored Models; Switching Regression Models
  • C35 - Discrete Regression and Qualitative Choice Models; Discrete Regressors; Proportions
  • C36 - Instrumental Variables (IV) Estimation
  • Browse content in C4 - Econometric and Statistical Methods: Special Topics
  • C41 - Duration Analysis; Optimal Timing Strategies
  • C43 - Index Numbers and Aggregation
  • Browse content in C5 - Econometric Modeling
  • C51 - Model Construction and Estimation
  • C52 - Model Evaluation, Validation, and Selection
  • C53 - Forecasting and Prediction Methods; Simulation Methods
  • C54 - Quantitative Policy Modeling
  • Browse content in C6 - Mathematical Methods; Programming Models; Mathematical and Simulation Modeling
  • C60 - General
  • C61 - Optimization Techniques; Programming Models; Dynamic Analysis
  • C62 - Existence and Stability Conditions of Equilibrium
  • C63 - Computational Techniques; Simulation Modeling
  • Browse content in C7 - Game Theory and Bargaining Theory
  • C71 - Cooperative Games
  • C72 - Noncooperative Games
  • C73 - Stochastic and Dynamic Games; Evolutionary Games; Repeated Games
  • C78 - Bargaining Theory; Matching Theory
  • Browse content in C8 - Data Collection and Data Estimation Methodology; Computer Programs
  • C81 - Methodology for Collecting, Estimating, and Organizing Microeconomic Data; Data Access
  • C82 - Methodology for Collecting, Estimating, and Organizing Macroeconomic Data; Data Access
  • C83 - Survey Methods; Sampling Methods
  • Browse content in C9 - Design of Experiments
  • C90 - General
  • C91 - Laboratory, Individual Behavior
  • C92 - Laboratory, Group Behavior
  • C93 - Field Experiments
  • Browse content in D - Microeconomics
  • Browse content in D0 - General
  • D00 - General
  • D01 - Microeconomic Behavior: Underlying Principles
  • D02 - Institutions: Design, Formation, Operations, and Impact
  • D03 - Behavioral Microeconomics: Underlying Principles
  • D04 - Microeconomic Policy: Formulation; Implementation, and Evaluation
  • Browse content in D1 - Household Behavior and Family Economics
  • D10 - General
  • D11 - Consumer Economics: Theory
  • D12 - Consumer Economics: Empirical Analysis
  • D13 - Household Production and Intrahousehold Allocation
  • D14 - Household Saving; Personal Finance
  • D15 - Intertemporal Household Choice: Life Cycle Models and Saving
  • D16 - Collaborative Consumption
  • D18 - Consumer Protection
  • D19 - Other
  • Browse content in D2 - Production and Organizations
  • D21 - Firm Behavior: Theory
  • D22 - Firm Behavior: Empirical Analysis
  • D23 - Organizational Behavior; Transaction Costs; Property Rights
  • D24 - Production; Cost; Capital; Capital, Total Factor, and Multifactor Productivity; Capacity
  • D29 - Other
  • Browse content in D3 - Distribution
  • D30 - General
  • D31 - Personal Income, Wealth, and Their Distributions
  • D33 - Factor Income Distribution
  • Browse content in D4 - Market Structure, Pricing, and Design
  • D40 - General
  • D41 - Perfect Competition
  • D43 - Oligopoly and Other Forms of Market Imperfection
  • D44 - Auctions
  • Browse content in D5 - General Equilibrium and Disequilibrium
  • D50 - General
  • D53 - Financial Markets
  • D58 - Computable and Other Applied General Equilibrium Models
  • Browse content in D6 - Welfare Economics
  • D60 - General
  • D61 - Allocative Efficiency; Cost-Benefit Analysis
  • D62 - Externalities
  • D63 - Equity, Justice, Inequality, and Other Normative Criteria and Measurement
  • D64 - Altruism; Philanthropy
  • D69 - Other
  • Browse content in D7 - Analysis of Collective Decision-Making
  • D70 - General
  • D71 - Social Choice; Clubs; Committees; Associations
  • D72 - Political Processes: Rent-seeking, Lobbying, Elections, Legislatures, and Voting Behavior
  • D73 - Bureaucracy; Administrative Processes in Public Organizations; Corruption
  • D74 - Conflict; Conflict Resolution; Alliances; Revolutions
  • D78 - Positive Analysis of Policy Formulation and Implementation
  • Browse content in D8 - Information, Knowledge, and Uncertainty
  • D80 - General
  • D81 - Criteria for Decision-Making under Risk and Uncertainty
  • D82 - Asymmetric and Private Information; Mechanism Design
  • D83 - Search; Learning; Information and Knowledge; Communication; Belief; Unawareness
  • D84 - Expectations; Speculations
  • D85 - Network Formation and Analysis: Theory
  • D86 - Economics of Contract: Theory
  • Browse content in D9 - Micro-Based Behavioral Economics
  • D90 - General
  • D91 - Role and Effects of Psychological, Emotional, Social, and Cognitive Factors on Decision Making
  • D92 - Intertemporal Firm Choice, Investment, Capacity, and Financing
  • Browse content in E - Macroeconomics and Monetary Economics
  • Browse content in E0 - General
  • E00 - General
  • E01 - Measurement and Data on National Income and Product Accounts and Wealth; Environmental Accounts
  • E02 - Institutions and the Macroeconomy
  • Browse content in E1 - General Aggregative Models
  • E10 - General
  • E11 - Marxian; Sraffian; Kaleckian
  • E12 - Keynes; Keynesian; Post-Keynesian
  • E13 - Neoclassical
  • E19 - Other
  • Browse content in E2 - Consumption, Saving, Production, Investment, Labor Markets, and Informal Economy
  • E20 - General
  • E21 - Consumption; Saving; Wealth
  • E22 - Investment; Capital; Intangible Capital; Capacity
  • E23 - Production
  • E24 - Employment; Unemployment; Wages; Intergenerational Income Distribution; Aggregate Human Capital; Aggregate Labor Productivity
  • E25 - Aggregate Factor Income Distribution
  • E26 - Informal Economy; Underground Economy
  • E27 - Forecasting and Simulation: Models and Applications
  • Browse content in E3 - Prices, Business Fluctuations, and Cycles
  • E30 - General
  • E31 - Price Level; Inflation; Deflation
  • E32 - Business Fluctuations; Cycles
  • E37 - Forecasting and Simulation: Models and Applications
  • Browse content in E4 - Money and Interest Rates
  • E40 - General
  • E41 - Demand for Money
  • E42 - Monetary Systems; Standards; Regimes; Government and the Monetary System; Payment Systems
  • E43 - Interest Rates: Determination, Term Structure, and Effects
  • E44 - Financial Markets and the Macroeconomy
  • E47 - Forecasting and Simulation: Models and Applications
  • Browse content in E5 - Monetary Policy, Central Banking, and the Supply of Money and Credit
  • E50 - General
  • E51 - Money Supply; Credit; Money Multipliers
  • E52 - Monetary Policy
  • E58 - Central Banks and Their Policies
  • Browse content in E6 - Macroeconomic Policy, Macroeconomic Aspects of Public Finance, and General Outlook
  • E60 - General
  • E61 - Policy Objectives; Policy Designs and Consistency; Policy Coordination
  • E62 - Fiscal Policy
  • E63 - Comparative or Joint Analysis of Fiscal and Monetary Policy; Stabilization; Treasury Policy
  • E65 - Studies of Particular Policy Episodes
  • E69 - Other
  • Browse content in E7 - Macro-Based Behavioral Economics
  • E70 - General
  • E71 - Role and Effects of Psychological, Emotional, Social, and Cognitive Factors on the Macro Economy
  • Browse content in F - International Economics
  • Browse content in F0 - General
  • F02 - International Economic Order and Integration
  • Browse content in F1 - Trade
  • F10 - General
  • F11 - Neoclassical Models of Trade
  • F12 - Models of Trade with Imperfect Competition and Scale Economies; Fragmentation
  • F13 - Trade Policy; International Trade Organizations
  • F14 - Empirical Studies of Trade
  • F15 - Economic Integration
  • F16 - Trade and Labor Market Interactions
  • F17 - Trade Forecasting and Simulation
  • F18 - Trade and Environment
  • Browse content in F2 - International Factor Movements and International Business
  • F21 - International Investment; Long-Term Capital Movements
  • F22 - International Migration
  • F23 - Multinational Firms; International Business
  • F24 - Remittances
  • Browse content in F3 - International Finance
  • F30 - General
  • F31 - Foreign Exchange
  • F32 - Current Account Adjustment; Short-Term Capital Movements
  • F33 - International Monetary Arrangements and Institutions
  • F34 - International Lending and Debt Problems
  • F35 - Foreign Aid
  • F36 - Financial Aspects of Economic Integration
  • F37 - International Finance Forecasting and Simulation: Models and Applications
  • Browse content in F4 - Macroeconomic Aspects of International Trade and Finance
  • F40 - General
  • F41 - Open Economy Macroeconomics
  • F42 - International Policy Coordination and Transmission
  • F43 - Economic Growth of Open Economies
  • F44 - International Business Cycles
  • F45 - Macroeconomic Issues of Monetary Unions
  • Browse content in F5 - International Relations, National Security, and International Political Economy
  • F50 - General
  • F51 - International Conflicts; Negotiations; Sanctions
  • F52 - National Security; Economic Nationalism
  • F53 - International Agreements and Observance; International Organizations
  • F55 - International Institutional Arrangements
  • F59 - Other
  • Browse content in F6 - Economic Impacts of Globalization
  • F62 - Macroeconomic Impacts
  • F63 - Economic Development
  • F64 - Environment
  • Browse content in G - Financial Economics
  • Browse content in G0 - General
  • G01 - Financial Crises
  • G02 - Behavioral Finance: Underlying Principles
  • Browse content in G1 - General Financial Markets
  • G10 - General
  • G11 - Portfolio Choice; Investment Decisions
  • G12 - Asset Pricing; Trading volume; Bond Interest Rates
  • G14 - Information and Market Efficiency; Event Studies; Insider Trading
  • G15 - International Financial Markets
  • G18 - Government Policy and Regulation
  • Browse content in G2 - Financial Institutions and Services
  • G20 - General
  • G21 - Banks; Depository Institutions; Micro Finance Institutions; Mortgages
  • G22 - Insurance; Insurance Companies; Actuarial Studies
  • G24 - Investment Banking; Venture Capital; Brokerage; Ratings and Ratings Agencies
  • G28 - Government Policy and Regulation
  • Browse content in G3 - Corporate Finance and Governance
  • G32 - Financing Policy; Financial Risk and Risk Management; Capital and Ownership Structure; Value of Firms; Goodwill
  • G33 - Bankruptcy; Liquidation
  • G34 - Mergers; Acquisitions; Restructuring; Corporate Governance
  • G35 - Payout Policy
  • G38 - Government Policy and Regulation
  • Browse content in H - Public Economics
  • Browse content in H0 - General
  • H00 - General
  • Browse content in H1 - Structure and Scope of Government
  • H10 - General
  • H11 - Structure, Scope, and Performance of Government
  • H12 - Crisis Management
  • Browse content in H2 - Taxation, Subsidies, and Revenue
  • H20 - General
  • H21 - Efficiency; Optimal Taxation
  • H22 - Incidence
  • H23 - Externalities; Redistributive Effects; Environmental Taxes and Subsidies
  • H24 - Personal Income and Other Nonbusiness Taxes and Subsidies; includes inheritance and gift taxes
  • H25 - Business Taxes and Subsidies
  • H26 - Tax Evasion and Avoidance
  • Browse content in H3 - Fiscal Policies and Behavior of Economic Agents
  • H30 - General
  • H31 - Household
  • Browse content in H4 - Publicly Provided Goods
  • H40 - General
  • H41 - Public Goods
  • H42 - Publicly Provided Private Goods
  • Browse content in H5 - National Government Expenditures and Related Policies
  • H50 - General
  • H51 - Government Expenditures and Health
  • H52 - Government Expenditures and Education
  • H53 - Government Expenditures and Welfare Programs
  • H54 - Infrastructures; Other Public Investment and Capital Stock
  • H55 - Social Security and Public Pensions
  • H56 - National Security and War
  • Browse content in H6 - National Budget, Deficit, and Debt
  • H60 - General
  • H61 - Budget; Budget Systems
  • H62 - Deficit; Surplus
  • H63 - Debt; Debt Management; Sovereign Debt
  • Browse content in H7 - State and Local Government; Intergovernmental Relations
  • H70 - General
  • H71 - State and Local Taxation, Subsidies, and Revenue
  • H72 - State and Local Budget and Expenditures
  • H75 - State and Local Government: Health; Education; Welfare; Public Pensions
  • H76 - State and Local Government: Other Expenditure Categories
  • H77 - Intergovernmental Relations; Federalism; Secession
  • Browse content in H8 - Miscellaneous Issues
  • H83 - Public Administration; Public Sector Accounting and Audits
  • H84 - Disaster Aid
  • H87 - International Fiscal Issues; International Public Goods
  • Browse content in I - Health, Education, and Welfare
  • Browse content in I0 - General
  • I00 - General
  • Browse content in I1 - Health
  • I10 - General
  • I12 - Health Behavior
  • I14 - Health and Inequality
  • I15 - Health and Economic Development
  • I18 - Government Policy; Regulation; Public Health
  • I19 - Other
  • Browse content in I2 - Education and Research Institutions
  • I20 - General
  • I21 - Analysis of Education
  • I22 - Educational Finance; Financial Aid
  • I23 - Higher Education; Research Institutions
  • I24 - Education and Inequality
  • I25 - Education and Economic Development
  • I26 - Returns to Education
  • I28 - Government Policy
  • I29 - Other
  • Browse content in I3 - Welfare, Well-Being, and Poverty
  • I30 - General
  • I31 - General Welfare
  • I32 - Measurement and Analysis of Poverty
  • I38 - Government Policy; Provision and Effects of Welfare Programs
  • Browse content in J - Labor and Demographic Economics
  • Browse content in J0 - General
  • J00 - General
  • J01 - Labor Economics: General
  • J08 - Labor Economics Policies
  • Browse content in J1 - Demographic Economics
  • J10 - General
  • J11 - Demographic Trends, Macroeconomic Effects, and Forecasts
  • J12 - Marriage; Marital Dissolution; Family Structure; Domestic Abuse
  • J13 - Fertility; Family Planning; Child Care; Children; Youth
  • J14 - Economics of the Elderly; Economics of the Handicapped; Non-Labor Market Discrimination
  • J15 - Economics of Minorities, Races, Indigenous Peoples, and Immigrants; Non-labor Discrimination
  • J16 - Economics of Gender; Non-labor Discrimination
  • J17 - Value of Life; Forgone Income
  • J18 - Public Policy
  • Browse content in J2 - Demand and Supply of Labor
  • J20 - General
  • J21 - Labor Force and Employment, Size, and Structure
  • J22 - Time Allocation and Labor Supply
  • J23 - Labor Demand
  • J24 - Human Capital; Skills; Occupational Choice; Labor Productivity
  • J26 - Retirement; Retirement Policies
  • J28 - Safety; Job Satisfaction; Related Public Policy
  • Browse content in J3 - Wages, Compensation, and Labor Costs
  • J30 - General
  • J31 - Wage Level and Structure; Wage Differentials
  • J32 - Nonwage Labor Costs and Benefits; Retirement Plans; Private Pensions
  • J33 - Compensation Packages; Payment Methods
  • J38 - Public Policy
  • Browse content in J4 - Particular Labor Markets
  • J41 - Labor Contracts
  • J42 - Monopsony; Segmented Labor Markets
  • J45 - Public Sector Labor Markets
  • J46 - Informal Labor Markets
  • J48 - Public Policy
  • Browse content in J5 - Labor-Management Relations, Trade Unions, and Collective Bargaining
  • J50 - General
  • J51 - Trade Unions: Objectives, Structure, and Effects
  • J52 - Dispute Resolution: Strikes, Arbitration, and Mediation; Collective Bargaining
  • J53 - Labor-Management Relations; Industrial Jurisprudence
  • J54 - Producer Cooperatives; Labor Managed Firms; Employee Ownership
  • J58 - Public Policy
  • Browse content in J6 - Mobility, Unemployment, Vacancies, and Immigrant Workers
  • J60 - General
  • J61 - Geographic Labor Mobility; Immigrant Workers
  • J62 - Job, Occupational, and Intergenerational Mobility
  • J63 - Turnover; Vacancies; Layoffs
  • J64 - Unemployment: Models, Duration, Incidence, and Job Search
  • J65 - Unemployment Insurance; Severance Pay; Plant Closings
  • J68 - Public Policy
  • Browse content in J7 - Labor Discrimination
  • J71 - Discrimination
  • Browse content in J8 - Labor Standards: National and International
  • J81 - Working Conditions
  • J88 - Public Policy
  • Browse content in K - Law and Economics
  • Browse content in K0 - General
  • K00 - General
  • Browse content in K1 - Basic Areas of Law
  • K11 - Property Law
  • K12 - Contract Law
  • K13 - Tort Law and Product Liability; Forensic Economics
  • K14 - Criminal Law
  • K16 - Election Law
  • Browse content in K3 - Other Substantive Areas of Law
  • K31 - Labor Law
  • K32 - Environmental, Health, and Safety Law
  • K34 - Tax Law
  • K37 - Immigration Law
  • Browse content in K4 - Legal Procedure, the Legal System, and Illegal Behavior
  • K41 - Litigation Process
  • K42 - Illegal Behavior and the Enforcement of Law
  • K49 - Other
  • Browse content in L - Industrial Organization
  • Browse content in L0 - General
  • L00 - General
  • Browse content in L1 - Market Structure, Firm Strategy, and Market Performance
  • L10 - General
  • L11 - Production, Pricing, and Market Structure; Size Distribution of Firms
  • L12 - Monopoly; Monopolization Strategies
  • L13 - Oligopoly and Other Imperfect Markets
  • L14 - Transactional Relationships; Contracts and Reputation; Networks
  • L16 - Industrial Organization and Macroeconomics: Industrial Structure and Structural Change; Industrial Price Indices
  • Browse content in L2 - Firm Objectives, Organization, and Behavior
  • L20 - General
  • L21 - Business Objectives of the Firm
  • L22 - Firm Organization and Market Structure
  • L23 - Organization of Production
  • L24 - Contracting Out; Joint Ventures; Technology Licensing
  • L25 - Firm Performance: Size, Diversification, and Scope
  • L26 - Entrepreneurship
  • L29 - Other
  • Browse content in L3 - Nonprofit Organizations and Public Enterprise
  • L30 - General
  • L31 - Nonprofit Institutions; NGOs; Social Entrepreneurship
  • L32 - Public Enterprises; Public-Private Enterprises
  • L33 - Comparison of Public and Private Enterprises and Nonprofit Institutions; Privatization; Contracting Out
  • Browse content in L4 - Antitrust Issues and Policies
  • L40 - General
  • L41 - Monopolization; Horizontal Anticompetitive Practices
  • L43 - Legal Monopolies and Regulation or Deregulation
  • Browse content in L5 - Regulation and Industrial Policy
  • L50 - General
  • L51 - Economics of Regulation
  • L52 - Industrial Policy; Sectoral Planning Methods
  • L53 - Enterprise Policy
  • Browse content in L6 - Industry Studies: Manufacturing
  • L60 - General
  • L66 - Food; Beverages; Cosmetics; Tobacco; Wine and Spirits
  • Browse content in L7 - Industry Studies: Primary Products and Construction
  • L71 - Mining, Extraction, and Refining: Hydrocarbon Fuels
  • L78 - Government Policy
  • Browse content in L8 - Industry Studies: Services
  • L81 - Retail and Wholesale Trade; e-Commerce
  • L83 - Sports; Gambling; Recreation; Tourism
  • L86 - Information and Internet Services; Computer Software
  • Browse content in L9 - Industry Studies: Transportation and Utilities
  • L94 - Electric Utilities
  • L98 - Government Policy
  • Browse content in M - Business Administration and Business Economics; Marketing; Accounting; Personnel Economics
  • Browse content in M1 - Business Administration
  • M12 - Personnel Management; Executives; Executive Compensation
  • M14 - Corporate Culture; Social Responsibility
  • M16 - International Business Administration
  • Browse content in M3 - Marketing and Advertising
  • M31 - Marketing
  • Browse content in M5 - Personnel Economics
  • M50 - General
  • M51 - Firm Employment Decisions; Promotions
  • M52 - Compensation and Compensation Methods and Their Effects
  • M53 - Training
  • M54 - Labor Management
  • M55 - Labor Contracting Devices
  • Browse content in N - Economic History
  • Browse content in N1 - Macroeconomics and Monetary Economics; Industrial Structure; Growth; Fluctuations
  • N10 - General, International, or Comparative
  • N11 - U.S.; Canada: Pre-1913
  • N12 - U.S.; Canada: 1913-
  • N13 - Europe: Pre-1913
  • N15 - Asia including Middle East
  • Browse content in N2 - Financial Markets and Institutions
  • N20 - General, International, or Comparative
  • N24 - Europe: 1913-
  • N25 - Asia including Middle East
  • Browse content in N3 - Labor and Consumers, Demography, Education, Health, Welfare, Income, Wealth, Religion, and Philanthropy
  • N31 - U.S.; Canada: Pre-1913
  • N33 - Europe: Pre-1913
  • N34 - Europe: 1913-
  • Browse content in N4 - Government, War, Law, International Relations, and Regulation
  • N40 - General, International, or Comparative
  • N45 - Asia including Middle East
  • N47 - Africa; Oceania
  • Browse content in N5 - Agriculture, Natural Resources, Environment, and Extractive Industries
  • N50 - General, International, or Comparative
  • N53 - Europe: Pre-1913
  • N57 - Africa; Oceania
  • Browse content in N7 - Transport, Trade, Energy, Technology, and Other Services
  • N70 - General, International, or Comparative
  • N72 - U.S.; Canada: 1913-
  • Browse content in N9 - Regional and Urban History
  • N97 - Africa; Oceania
  • Browse content in O - Economic Development, Innovation, Technological Change, and Growth
  • Browse content in O1 - Economic Development
  • O10 - General
  • O11 - Macroeconomic Analyses of Economic Development
  • O12 - Microeconomic Analyses of Economic Development
  • O13 - Agriculture; Natural Resources; Energy; Environment; Other Primary Products
  • O14 - Industrialization; Manufacturing and Service Industries; Choice of Technology
  • O15 - Human Resources; Human Development; Income Distribution; Migration
  • O16 - Financial Markets; Saving and Capital Investment; Corporate Finance and Governance
  • O17 - Formal and Informal Sectors; Shadow Economy; Institutional Arrangements
  • O18 - Urban, Rural, Regional, and Transportation Analysis; Housing; Infrastructure
  • O19 - International Linkages to Development; Role of International Organizations
  • Browse content in O2 - Development Planning and Policy
  • O22 - Project Analysis
  • O23 - Fiscal and Monetary Policy in Development
  • O24 - Trade Policy; Factor Movement Policy; Foreign Exchange Policy
  • O25 - Industrial Policy
  • Browse content in O3 - Innovation; Research and Development; Technological Change; Intellectual Property Rights
  • O30 - General
  • O31 - Innovation and Invention: Processes and Incentives
  • O32 - Management of Technological Innovation and R&D
  • O33 - Technological Change: Choices and Consequences; Diffusion Processes
  • O34 - Intellectual Property and Intellectual Capital
  • O38 - Government Policy
  • O39 - Other
  • Browse content in O4 - Economic Growth and Aggregate Productivity
  • O40 - General
  • O41 - One, Two, and Multisector Growth Models
  • O42 - Monetary Growth Models
  • O43 - Institutions and Growth
  • O47 - Empirical Studies of Economic Growth; Aggregate Productivity; Cross-Country Output Convergence
  • O49 - Other
  • Browse content in O5 - Economywide Country Studies
  • O50 - General
  • O52 - Europe
  • O53 - Asia including Middle East
  • O55 - Africa
  • O57 - Comparative Studies of Countries
  • Browse content in P - Economic Systems
  • Browse content in P1 - Capitalist Systems
  • P10 - General
  • P13 - Cooperative Enterprises
  • P16 - Political Economy
  • P17 - Performance and Prospects
  • Browse content in P2 - Socialist Systems and Transitional Economies
  • P20 - General
  • P26 - Political Economy; Property Rights
  • Browse content in P3 - Socialist Institutions and Their Transitions
  • P31 - Socialist Enterprises and Their Transitions
  • Browse content in P4 - Other Economic Systems
  • P48 - Political Economy; Legal Institutions; Property Rights; Natural Resources; Energy; Environment; Regional Studies
  • Browse content in P5 - Comparative Economic Systems
  • P50 - General
  • Browse content in Q - Agricultural and Natural Resource Economics; Environmental and Ecological Economics
  • Browse content in Q0 - General
  • Q02 - Commodity Markets
  • Browse content in Q1 - Agriculture
  • Q11 - Aggregate Supply and Demand Analysis; Prices
  • Q13 - Agricultural Markets and Marketing; Cooperatives; Agribusiness
  • Q15 - Land Ownership and Tenure; Land Reform; Land Use; Irrigation; Agriculture and Environment
  • Q16 - R&D; Agricultural Technology; Biofuels; Agricultural Extension Services
  • Q17 - Agriculture in International Trade
  • Q18 - Agricultural Policy; Food Policy
  • Browse content in Q2 - Renewable Resources and Conservation
  • Q20 - General
  • Q22 - Fishery; Aquaculture
  • Q23 - Forestry
  • Q25 - Water
  • Q26 - Recreational Aspects of Natural Resources
  • Q29 - Other
  • Browse content in Q3 - Nonrenewable Resources and Conservation
  • Q30 - General
  • Q32 - Exhaustible Resources and Economic Development
  • Q33 - Resource Booms
  • Q34 - Natural Resources and Domestic and International Conflicts
  • Q38 - Government Policy
  • Browse content in Q4 - Energy
  • Q40 - General
  • Q41 - Demand and Supply; Prices
  • Q42 - Alternative Energy Sources
  • Q43 - Energy and the Macroeconomy
  • Q48 - Government Policy
  • Browse content in Q5 - Environmental Economics
  • Q50 - General
  • Q51 - Valuation of Environmental Effects
  • Q52 - Pollution Control Adoption Costs; Distributional Effects; Employment Effects
  • Q53 - Air Pollution; Water Pollution; Noise; Hazardous Waste; Solid Waste; Recycling
  • Q54 - Climate; Natural Disasters; Global Warming
  • Q56 - Environment and Development; Environment and Trade; Sustainability; Environmental Accounts and Accounting; Environmental Equity; Population Growth
  • Q58 - Government Policy
  • Browse content in R - Urban, Rural, Regional, Real Estate, and Transportation Economics
  • Browse content in R1 - General Regional Economics
  • R10 - General
  • R11 - Regional Economic Activity: Growth, Development, Environmental Issues, and Changes
  • R15 - Econometric and Input-Output Models; Other Models
  • Browse content in R2 - Household Analysis
  • R23 - Regional Migration; Regional Labor Markets; Population; Neighborhood Characteristics
  • R29 - Other
  • Browse content in R4 - Transportation Economics
  • R40 - General
  • R41 - Transportation: Demand, Supply, and Congestion; Travel Time; Safety and Accidents; Transportation Noise
  • Browse content in R5 - Regional Government Analysis
  • R58 - Regional Development Planning and Policy
  • Browse content in Z - Other Special Topics
  • Browse content in Z1 - Cultural Economics; Economic Sociology; Economic Anthropology
  • Z10 - General
  • Z11 - Economics of the Arts and Literature
  • Z12 - Religion
  • Z13 - Economic Sociology; Economic Anthropology; Social and Economic Stratification
  • Z19 - Other
  • Browse content in Z2 - Sports Economics
  • Z21 - Industry Studies
  • Z22 - Labor Issues
  • Z29 - Other
  • Browse content in Z3 - Tourism Economics
  • Z30 - General
  • Advance articles
  • Author Guidelines
  • Submission Site
  • Open Access
  • About Oxford Economic Papers
  • Editorial Board
  • Advertising and Corporate Services
  • Journals Career Network
  • Self-Archiving Policy
  • Dispatch Dates
  • Terms and Conditions
  • Journals on Oxford Academic
  • Books on Oxford Academic

Issue Cover

Article Contents

1. introduction, 2. on terrorism, 3. event data sets, 4. domestic and transnational terrorism: some data plots, 5. counterterrorism, 6. findings of the articles of the special issue, 7. concluding remarks, acknowledgements, terrorism and counterterrorism: an overview.

  • Article contents
  • Figures & tables
  • Supplementary Data

Todd Sandler, Terrorism and counterterrorism: an overview, Oxford Economic Papers , Volume 67, Issue 1, January 2015, Pages 1–20, https://doi.org/10.1093/oep/gpu039

  • Permissions Icon Permissions

This introduction sets the stage for the articles collected in this special issue of Oxford Economic Papers . It begins by introducing essential concepts including domestic terrorism, transnational terrorism, defensive actions, proactive countermeasures, and guerrilla warfare. Three terrorist event databases, used by seven of the articles, are briefly introduced. These data sets are then used to display some stylized facts about domestic and transnational terrorism during the past four decades. Next, some essential strategic distinctions are drawn between defensive and proactive measures in the case of transnational terrorism when multiple countries are confronted by a common terrorist group. These strategic concerns vanish for domestic terrorism as a central government is able to internalize potential externalities. Finally, the key findings of the articles in the special issue are highlighted in two tables.

Terrorism is the premeditated use or threat to use violence by individuals or subnational groups to obtain a political or social objective through the intimidation of a large audience beyond that of the immediate noncombatant victims ( Enders and Sandler, 2012 , p.4). The two essential ingredients of terrorism are its violence and its political or social motive. Terrorists tend to employ shockingly violent acts, such as beheadings, downing of commercial airlines, bombings in public markets, and armed attacks in public places, to intimidate an audience. Their unpredictable and horrific attacks are meant to make everyone feel at risk even though the true likelihood of falling victim to a terrorist incident is rather minuscule, roughly equivalent to that of drowning in one's bathtub ( Mueller, 2006 ). Terrorists seek to circumvent normal channels for political change by traumatizing the public with brutal acts so that governments feel compelled to either address terrorist demands or divert public funds into hardening potential targets. Terrorist campaigns are more prevalent in liberal democracies, where the government's legitimacy hinges on its ability to protect the lives and property of its citizens ( Eubank and Weinberg, 1994 ).

The four airplane hijackings on 11 September 2001 (9/11) are terrorist acts since the perpetrators were members of al-Qaida, a subnational terrorist group, bent on pressuring the USA to remove its troops from Saudi Arabia, which was al-Qaida's primary political goal at the time. These skyjackings intimidated a global audience, caused huge temporary losses to the major stock exchanges ( Chen and Siems, 2004 ), and created $80–90 billion in direct and indirect damages ( Kunreuther et al ., 2003 ). Even though stock exchanges recovered lost values in just over a month, the death of almost 3,000 people caused rich industrial countries to allocate more resources to counterterrorism, shook insurance markets, and made an indelible impression on virtually the entire world. Heinous terrorist incidents continue to capture headlines with recent newsworthy incidents involving al-Shabaab's armed attack on the Westgate Mall in Nairobi, Kenya, on 21 September 2013; Chechen separatists’ suicide bombings of a train station and a trolley in Volgograd, Russia, on 29 and 30 December 2013, respectively; and Boko Haram's kidnapping of more than 200 female students in Chibok, Nigeria, on 14–15 April 2014. These and countless other incidents since 9/11 indicate that the government must allocate resources in an effective and measured manner to counterterrorism activities so that terrorists cannot circumvent legitimate political processes or cause significant economic losses. These losses may involve reduced foreign direct investment ( Enders and Sandler, 1996 ; Abadie and Gardeazabal, 2008 ), lower economic growth ( Abadie and Gardeazabal, 2003 ; Eckstein and Tsiddon, 2004 ; Gaibulloev and Sandler, 2008 , 2011 ), less trade ( Nitsch and Schumacher, 2004 ), reduced tourism ( Enders et al ., 1992 ; Drakos and Kutan, 2003 ), or lost values of stock and bond indexes ( Kollias et al ., 2013 ). Economic impacts of terrorism are greatest in small terrorism-plagued countries and developing countries ( Keefer and Loayza, 2008 ; Sandler and Enders, 2008 ). Modern industrial economies can insulate themselves through judicious fiscal and monetary policy, rapid counterterrorism responses, and the transference of economic activities ( Enders and Sandler, 2012 ). The latter involves economic activities moving from terrorism-prone sectors and regions to safer areas, which advanced, diversified economies allow. Thus, economic activity may switch from the tourism sector to other sectors when the former is targeted. In Spain, economic investment switched from the Basque Country to other Spanish provinces because of Euskadi ta Askatasuna attacks ( Abadie and Gardeazabal, 2003 ).

Modern-day econometric methods—time series, panel, and discrete-choice models—lend themselves to the quantification of these economic losses as shown in this special issue by Choi (2015) , Egger and Gassebner (2015) , and Younas (2015) . Additionally, game-theoretic models can display counterterrorism interactions among terrorists and governments as in the contributions in this issue by Carter (2015) and Kaplan (2015) . In fact, game theory is an excellent tool to study interactions among targeted governments, between rival terrorist groups, between a terrorist group and its sponsoring state, and among the media, the terrorist group, and the public. 1

The purpose of this article is to provide the requisite background to the studies in this special issue of Oxford Economic Papers . This task requires a fuller discussion of the notion of terrorism and its two primary subdivisions—domestic and transnational terrorism—in Section 2. The three event data sets employed in empirical studies, including seven of the eight articles in this issue, are briefly presented in Section 3. In Section 4, two of these data sets are used to display some recent trends and aspects of domestic and transnational terrorism during the last four decades. Essential concepts of counterterrorism are then presented in Section 5, where proactive measures are distinguished from defensive actions. Key findings of the four terrorism and four counterterrorism articles contained in this special issue are highlighted in two summarizing tables in Section 6. Concluding remarks follow in Section 7.

I now return to the definition of terrorism, given at the outset of this article. Any definition of terrorism involves much debate ( Hoffman, 2006 ; Enders and Sandler, 2012 ). The research community is converging to a consensus based on an operational definition on which to construct event data sets to test theoretical propositions. The article puts forward a definition that is consistent with that used by the main event data sets and relied on by researchers. Also, this definition possesses the main ingredients that are agreed on by economists, political scientists, and political economists.

The three stakeholders in this definition are the perpetrators, the victims, and the audience. By limiting terrorism to subnational agents including individuals or a ‘lone wolf’, my definition rules out state terror in which a government terrorizes its own people. The definition, however, does not rule out state-sponsored terrorism where a government clandestinely assists a terrorist group through various means, including supplying weapons, safe haven, intelligence, training, funding, or safe passage ( Mickolus, 1989 ; Bapat, 2006 ). There was a lot of state sponsorship of terrorism during the final decade of the Cold War with groups such as the Abu Nidal Organization serving as a terrorist group for hire ( Hoffman, 2006 ). 2 The most controversial element of my definition is the victim, since some definitions exclude combatants, so that attacks against an occupying army, such as US forces in Iraq or Afghanistan, are not viewed as terrorism. Generally, an attack against peacekeepers, such as the 23 October 1983 suicide bombing of the US Marines barracks at Beirut International Airport, is considered an act of terrorism. The barracks’ bombing had the political objective of removing peacekeepers from Lebanon, which happened in February 1984. Attacks against US soldiers and their dependents stationed in Germany constitute terrorist incidents, because these targeted individuals were noncombatants when attacked. ‘Audience’ refers to the collective that terrorists seek to intimidate through their wanton brutality. With sufficient and sustained intimidation, the audience will apply pressures on the besieged government to concede to the terrorist group's political demands or alternatively to take decisive action to annihilate the group. 3 In the latter case, the Italian authorities dismantled the Italian Red Brigades in the 1980s.

There are some crucial distinctions to draw between terrorism and related concepts. For instance, there is the distinction between terrorism and crime. A kidnapping for ransom is a criminal act of extortion when the kidnappers are not pursuing or financing a political agenda. If a political motive is tied to the kidnapping, then it is a terrorist incident even with ransom demands being made. The hijacking of a commercial airliner by a deranged person is a crime but not terrorism. In the absence of a political motive, an armed attack by a student on fellow students or teachers is a criminal action. Next consider an insurrection, which ‘is a politically based uprising intended to overthrow the established system of governance and to bring about a redistribution of income’ ( Sandler and Hartley, 1995 , p. 307). Leaders of insurrections recruit from the peasantry and general population in the hopes of challenging the government's hold on power ( Grossman, 1991 ). Successful rebel operations can generate new recruits and may ideally cause the government to impose draconian measures on its citizens, which subsequently create more support for the insurgency. If a tipping point is attained, then the government may be sufficiently challenged to lose its power to the rebels.

In distinction to insurrections, guerrilla warfare generally involves a band of rebel forces (e.g., the Revolutionary Armed Forces of Colombia [FARC], Abu Sayyaf in the Philippines, or Shining Path in Peru) that controls a sector of the country, from which to dispatch its operatives to confront government forces. Some guerrilla wars take place in urban centers. In contrast to most terrorist groups, guerrilla groups are larger in number and organized like a military force. Some guerrilla groups engage in terrorist acts, such as the three just-mentioned groups, to raise funds to secure their operations and pursue their political aims. For example, FARC kidnaps government officials and others for ransoms. Unlike an insurrection, guerrilla groups are not bent on overthrowing the government or engaging in propaganda to gain popular support ( Hoffman, 2006 ). Shining Path and FARC apply threats and harsh measures to gain the compliance of the people in the territory that they control. Guerrilla groups rely on surprise and cover to harass numerically superior government forces. Terrorism is a tactic employed by both insurrections and guerrilla movements. As a consequence, many guerrilla groups are listed as terrorist groups despite their control of territory. Often, countries with jungle cover or mountainous terrain provide remote areas where guerrillas can conduct training and operations. In this special issue, Carter (2015) is interested in the interaction between a guerrilla group and the government, as the former chooses between terrorism and the control of territory and the latter chooses between defensive counterterrorism actions and proactive military responses to influence the group's decision.

2.1 Domestic versus transnational terrorism

Domestic terrorism is homegrown and home-directed, and represents the most common form of terrorism. For domestic acts of terrorism, the perpetrators, victims, and audience hail from the venue country, where the attack takes place. Domestic terrorist incidents include Timothy McVeigh's bombing of the Alfred P. Murrah Federal Building in Oklahoma City on 19 April 1995 or Eric Rudolph's anti-abortionist bombing of Centennial Olympic Park in Atlanta, Georgia, on 27 July 1996. Civil wars often involve numerous domestic terrorist attacks before and during the conflict by the adversaries ( Findley and Young, 2012 ). 4 These terrorist acts are more apt to be domestic when an intervention by a third party from outside the country is not involved. Boko Haram's kidnapping of more than 200 female students is a domestic terrorist incident, which involves victims and perpetrators from the venue country of Nigeria. Boko Haram is an Islamic jihadist terrorist group that controls territory in the northeast portion of Nigeria. Given the country's limited military capabilities, its government sought some assistance from the USA in terms of military advisors and intelligence in addressing the significant threat that Boko Haram poses. At times, Boko Haram crosses into Chad. If one or more of the schoolgirls are moved into a neighboring country, then the kidnapping becomes a transnational terrorist incident. In general, poor countries may request foreign assistance if they cannot properly confront an indigenous terrorist group that may attack at home or abroad ( Azam and Thelen, 2010 ; Fleck and Kilby, 2010 ; Bandyopadhyay et al ., 2011 , 2014 ; Young and Findley, 2011 ).

Terrorism is transnational when an incident in the venue country concerns perpetrators or victims from another country. If a terrorist attack in the UK is perpetrated by terrorists from Yemen, then the incident is one of transnational terrorism. When a terrorist attack in France harms Dutch citizens, the attack is transnational. If one or more victims or perpetrators are not citizens of the venue country, then the terrorist attack is transnational. The kidnapping in January 2002 and subsequent murder of US reporter Daniel Pearl in Pakistan is classified as a transnational terrorist incident. The same is true of the near-simultaneous bombings of the US embassies in Kenya and Tanzania on 7 August 1998. Terrorist attacks against another country's embassy, even when perpetrated by citizens of the venue country, are transnational terrorist events because an embassy's grounds represent foreign soil. Similarly, terrorist attacks against international organizations’ personnel or property are considered to be transnational terrorist acts. An important transnational terrorist incident is the August 2006 plot to use liquid explosives to blow up 10 or more transatlantic flights departing the UK for the USA and Canada. A skyjacking originating in one country that is diverted to another country for political purposes is a transnational terrorist event. If a politically motivated hijacked plane has citizens from more than one country, the event is transnational terrorism even if the flight is domestic and ends in the country of origin. On 9/11, the four skyjackings are transnational terrorist acts since the victims were citizens from upward of 80 nations and the perpetrators were foreigners. The kidnapping of US journalist James Foley in Syria on 22 November 2012 and his beheading on 19 August 2014 is a transnational terrorist act. The victim was American, whereas the murderer is allegedly a British citizen from the Islamic State in Iraq and Syria (ISIS), also known as Islamic State (IS).

Transnational terrorist incidents frequently imply transnational externalities—for example, perpetrators from one country impose uncompensated costs on the victims of another country. If a country provides safe haven to a transnational terrorist group that attacks other countries’ interests, then transnational externalities ensue. 5 The Taliban in Afghanistan had given safe haven to Osama bin Laden's al-Qaida, which planned and executed the events of 9/11. When the Taliban would not surrender bin Laden to the USA following 9/11, the USA led an invasion of Afghanistan on 7 October 2001 ( Enders and Sandler, 2012 ). In this extreme case, the transnational externality resulted in a military invasion with the intent to defeat the Taliban and al-Qaida. Transnational externalities also arise from counterterrorism policies of targeted countries, which result in inefficient levels of these policies ( Sandler and Lapan, 1988 ; Sandler and Siqueira, 2006 ; Bueno de Mesquita, 2007 ). Actions by one targeted country to secure its borders and ports of entry may merely transfer the attack abroad, where borders are more porous (see Section 5). Since 9/11, few transnational terrorist incidents occur on US soil but 35% to 40% of such incidents involve US people or property in other countries ( Enders and Sandler, 2006 , 2012 ).

2.2 Some historical considerations of transnational terrorism

Hoffman ( 2006 , pp.63–5) traces the modern era of transnational terrorism to the 22 July 1968 hijacking of an Israeli El Al flight en route from Rome to Athens by three armed members of the Popular Front for the Liberation of Palestine (PFLP) terrorist group. This skyjacking was motivated by the intention of the PFLP terrorist to trade its hostages for Palestinian prisoners held by Israel. This event is noteworthy for a number of reasons. First, through its protracted 40-day negotiations, the Israelis were forced to negotiate with the Palestinian terrorists, which the Israelis had hitherto vowed they would never do ( Hoffman, 1998 , p.68). Second, the media coverage demonstrated to terrorists worldwide that such incidents could garner worldwide attention for their cause. Not surprisingly, transnational terrorist attacks increased greatly in numbers during the years following this incident (see the figures in Section 4). Third, there was evidence of state sponsorship after the diverted plane landed in Algiers as Algerian forces secured the hostages and held some Israeli hostages until 1 September 1968 when a deal was concluded ( Mickolus, 1980 , pp.93–4). Fourth, Israel eventually traded 16 Arab prisoners from the 1967 Arab-Israeli War for the remaining Israeli hostages. This trade showed terrorists that hostage taking could yield significant concessions.

Transnational terrorist groups were primarily nationalists/separatists or leftists (socialists) during the late 1960s until the late 1980s ( Rapoport, 2004 ). Even the Palestinian terrorists were secular until the end of the 1980s with the rise of Hamas, Palestinian Islamic Jihad, and other groups. After the mid-1990s, the religious fundamentalists came to dominate and increased the carnage ( Enders and Sandler, 2000 ; Gaibulloev and Sandler, 2014 ). The phenomenon of religious-based transnational terrorism is not novel and can be traced back to the Sicarii or Zealots, a Jewish sect that conducted a terror campaign against the Romans and their Jewish collaborators in Judea from CE 48 to 73 ( Rapoport, 1984 ; Bloom, 2005 ). Sicarii terrorists engaged in daytime assassinations in public places that typically resulted in the death of the assassin. As such, their dagger attacks were an early form of suicide terrorism, since the perpetrator had little chance of escape. 6 From 1090 to 1256, the Islamic Assassins opposed Sunni rule in Persia and Syria, with the intent to set up their own community and state of believers in the region ( Bloom, 2005 ). Although the Assassins’ terrorist campaign was on a much smaller scale, their goal was similar to that of ISIS. Like the Sicarii, the Assassins relied on politically motivated assassinations, performed with a dagger. Perpetrators usually sacrificed their own lives by making no efforts to escape after the deed.

In the beginning of the 1980s, the first terrorist event data set—International Terrorism: Attributes of Terrorist Events (ITERATE)—was made available to researchers. ITERATE only includes transnational terrorist attacks. Coverage starts in 1968, the beginning of the modern era of transnational terrorism, and runs until the end of 2012, with annual updates in August ( Mickolus et al ., 2013 ). ITERATE codes many variables—for example, incident date, country start location, country end location, attack type, target entity, terrorist group, perpetrators’ nationalities, number of deaths, number of injuries, victims’ nationalities, logistical outcome, US victims, state sponsorship, and scene of attack—in its Common File of over 40 variables. In addition, there is a Fate File indicating the fate of the terrorists—for example, the number of terrorists captured, the number of terrorists sentenced, and their length of incarceration. There is also a Hostage File, which has invaluable observations used by researchers to analyze logistical and negotiation success of hostage taking ( Santifort and Sandler, 2013 ). If an attack is completed as planned, then it is a logistical success. For hostage missions, securing one or more hostages is deemed a logistical success. The Hostage File of ITERATE is currently updated through 2010. Finally, there is a Skyjacking file with additional observations, and variables on skyjacking missions such as the duration of the incidents, airline involved, and negotiation strategies used. ITERATE, like the other event data sets, relies on the news media—print, broadcast, and digital—for the observations of its variables.

An initial focus of empirical studies was on transnational terrorism because ITERATE was the most extensive data set available throughout the 1980s and 1990s. Its lengthy series of daily data were ideal for time-series studies, which dominated the research landscape except for a few survival studies, the first being Atkinson et al .'s (1987) study of the duration of hostage-taking incidents. Today, panel studies are prevalent including those in this special issue— Berrebi and Ostwald (2015) , Choi (2015) , Egger and Gassebner (2015) , Gries et al . (2015) , and Younas (2015) .

Another competing event data set, modeled after ITERATE, is the RAND (2012) data set, which currently codes incidents for 1968–2009 and is not being updated. Gaibulloev (2015) uses the RAND event data in conjunction with Jones and Libicki's (2008) classification of terrorist groups’ ideologies in his study of groups’ location decisions. For 1968–97, RAND event data only include transnational terrorist attacks; after 1998, RAND data distinguish between transnational and domestic terrorist attacks in a manner consistent with my early definitions. Compared to ITERATE, RAND data code fewer variables and, for transnational terrorist incidents, have more limited coverage than ITERATE as demonstrated by Enders (2007) .

The third event data set, germane to this special issue, is that of the Global Terrorism Database (GTD), which records both domestic and transnational terrorist incidents ( La Free and Dugan, 2007 ; National Consortium for the Study of Terrorism and Response to Terrorism, 2013 ). Although GTD recorded both kinds of incidents, until 2013 it did not distinguish between the two kinds of incidents. Enders et al . (2011) devised a five-step procedure for distinguishing between domestic and transnational terrorist incidents in GTD for 1970–2007 and made their breakdown available to researchers. This division is now applied to 2008–2012 (see Enders et al ., 2014 ). A breakdown of terrorism into its two components is essential because the two types of terrorism may affect economic variables and counterterrorism differently—for example, economic growth or foreign direct investment is more influenced by transnational terrorism ( Gaibulloev and Sandler, 2008 ). Moreover, the influence of other variables on domestic and transnational terrorism may differ ( Sandler, 2014 ; Choi, 2015 ). The Enders et al . (2011) procedure does a much better job in distinguishing between the two types of events than recent GTD efforts, based on the authors’ method without attribution. GTD has tens of thousands of unclassified incidents compared to Enders et al . (2011) .

There are some things to note about GTD. First, it has changed its coding conventions a few times, most recently for the 2012 data. Coding was also changed after the National Consortium for the Study of Terrorism and Responses to Terrorism (2013) , based at the University of Maryland, took charge of the data around 2005. As shown by Enders et al . (2011) , there are periods of undercounting and overcounting of incidents, which can be addressed by these authors’ calibration methods. Second, GTD data for 1993 are very incomplete because in an office move by Pinkerton, which originated the database, the box containing 1993 fell off of the truck! Third, perpetrators’ nationalities are not identified. Fourth, GTD does not contain any hostage negotiation variables, making the study of hostage-taking incidents impossible with this database. Fifth, GTD coverage of some kinds of domestic incidents, such as kidnappings, is virtually nonexistent prior to the late 1990s ( Enders et al ., 2011 ).

Key aspects of the articles for the special issue

Notes: *denotes that Enders et al . (2011) breakdown of GTD into domestic and transnational terrorist incidents was used. ITERATE = International Terrorism: Attributes of Terrorist Events; GTD = Global Terrorism Database.

A variety of empirical techniques are applied by the six empirical articles. In his cross-sectional study of the location choice of terrorist groups, Gaibulloev (2015) relies on a conditional logit estimator. To account for the count nature of the dependent terrorism variable, Choi (2015) and Gries et al . (2015) apply a negative binomial panel estimator. Endogeneity between the dependent variable and one or more independent variables is addressed in various ways: the Berrebi and Ostwald (2015) article employs instrumental variables (IV), consisting of lagged domestic terrorist attacks in neighboring countries, whereas the Younas (2015) article uses system generalized method of moments (SGMM) to augment his feasible generalized least squares (FGLS) estimates. The Gries et al . (2015) article addresses endogeneity with lagged values of the independent variables and also SGMM estimates. The Choi (2015) article primarily uses lagged independent variables to partly handle the endogeneity concern.

ITERATE transnational terrorist incidents and total casualties per year, 1968–2012

ITERATE transnational terrorist incidents and total casualties per year, 1968–2012

GTD terrorist incidents per year, 1970–2012

GTD terrorist incidents per year, 1970–2012

ITERATE attacks against US interests per year, 1968–2012

ITERATE attacks against US interests per year, 1968–2012

Annual number of casualties per attack

Annual number of casualties per attack

This special issue contains articles on terrorism and counterterrorism. Given my discussion of terrorism and its concepts, it is now instructive to introduce some basic concepts and concerns that are associated with the practice of counterterrorism.

Quite simply, counterterrorism corresponds to actions to ameliorate the threat and consequences of terrorism. These actions can be taken by governments, military alliances, international organizations (e.g., INTERPOL), private corporations, or private citizens. Counterterrorism comes in two basic varieties: defensive and proactive measures.

Defensive countermeasures protect potential targets by making attacks more costly for terrorists or reducing their likelihood of success. When, however, successful terrorist attacks ensue, defensive actions also serve to limit the resulting losses to the target. Defensive measures have generally been reactive, instituted after some successful or innovative terrorist attacks. In the USA, airline passengers are now required to remove their shoes when being screened, following the innovative, but fortunately unsuccessful, attempt by Richard Reid to bring down American Airlines flight 63 en route from Paris to Miami on 22 December 2001 with explosives hidden in his shoes. Before the installation of metal detectors to screen passengers at US airports on 5 January 1973, there were on average over 25 skyjackings each year in the USA ( Enders et al ., 1990 ). After their installation, attempted US skyjackings dropped to fewer than four a year. The success of these metal detectors in US airports led to their installation worldwide over the next six months. Following the downing of Pan Am flight 103 over Lockerbie, Scotland, on 21 December 1988 and the downing of UTA flight 772 over Niger on 19 September 1989, bomb-detecting devices were used to screen checked luggage. Defensive or protective counterterror actions may involve more than technological barriers. Other instances of defensive measures include target hardening, such as defensive perimeters around government buildings or embassies, or guards at key points of a country's infrastructure. Defensive measures can also take the form of issuing terrorism alerts, enacting stiffer penalties for terrorism offenses, enhancing first-responder capabilities, and stockpiling antibiotics and antidotes for biological and chemical terrorist attacks. This list of defensive actions is by no means exhaustive.

By contrast, proactive measures are offensive as a targeted government directly confronts the terrorist group or its supporters. Proactive measures may destroy terrorists’ resources (e.g., training camps), curb their finances, eliminate their safe havens, or kill and capture their members. In recent years, the Obama administration has relied on drone attacks to assassinate terrorist leaders and operatives. Proactive operations may assume myriad other forms, including a retaliatory raid against a state sponsor that provides resources, training, sanctuary, logistical support, or intelligence to a terrorist group. On 15 April 1986, the USA launched a retaliatory bombing raid on targets in Libya for its alleged support in the terrorist bombing of the La Belle discotheque in West Berlin on 4 April 1986, where 3 died and 231 were wounded, including 62 Americans ( Mickolus et al ., 1989 , vol. 2, pp.365–7). Another proactive measure takes the form of a preemptive attack against a terrorist group or a harboring country, such as the US-led invasion of Afghanistan four weeks after 9/11. A preemptive strike differs from a retaliatory raid because the former is more sustained and meant to severely compromise the capabilities of the terrorists to conduct future missions. Such strikes or raids concern transnational terrorism where a targeted country confronts the foreign threat. Other proactive measures include infiltrating terrorist groups, engaging in military action, conducting propaganda campaigns against the terrorists, and gathering intelligence to foil terror plots ( Kaplan, 2015 ). ‘Military action’ generally refers to operations by the host government against a resident terrorist group as in Carter (2015) . Actions that improve the economy, which in turn reduces grievances, can also be proactive ( Choi, 2015 ). Younas (2015) demonstrates empirically that increased globalization of a country's economy may also be proactive by limiting harmful and therefore grievance-causing effects of terrorism on economic growth. In this special issue, the four counterterrorism articles primary address aspects of proactive measures. Only Carter (2015) considers both defensive and proactive counterterrorism responses.

The game-theoretic literature on counterterrorism draws some fascinating strategic contrasts between defensive and proactive countermeasures. Suppose that two or more countries are confronted by the same Islamic jihadist terrorist group—for example, al-Qaida in the Arabian Peninsula (AQAP). In this transnational terrorism scenario, each at-risk country is inclined to work at cross-purposes by engaging in a defensive race in the hopes of transferring the terrorist attacks to other targeted countries ( Sandler and Lapan, 1988 ; Arce and Sandler, 2005 ). In the process, the countries engage in too much defense since the negative transference externality is not internalized. The only check on this adverse ‘defense race’ stems from the countries having large interests abroad, which may be hit when attacks are transferred abroad—recall Fig. 3 and attacks against US interests ( Bandyopadhyay and Sandler, 2011 ; Bandyopadhyay et al ., 2011 ).

Next consider proactive measures in these multicountry scenarios. Any country's actions to confront the common terrorist threat confer purely public (nonrival and nonexcludable) benefits to all potential target countries. As a result, there is too little proactive response as each country tries to free ride on the actions of other countries. Thus, defensive measures are strategic complements as one country's actions encourage those of other countries (i.e., reaction paths are upward-sloping), whereas proactive measures are strategic substitutes as one country's actions inhibit those of other countries (i.e., reaction paths are downward-sloping) ( Eaton, 2004 ; Sandler and Siqueira, 2006 ). Moreover, leadership can be shown to curb the defensive race, whereas leadership exacerbates the free-riding underprovision of offensive measures ( Sandler and Siqueira, 2006 ). Thus, there is no simple fix for these concerns among sovereign targeted nations.

For domestic terrorism, countries possess the proper incentives to choose defensive and proactive measures judiciously, because all associated costs and benefits are internalized ( Enders and Sandler, 2012 ). Thus, Kaplan's (2015) finding that the USA staffs about the right number of intelligence analysts to intercept terror plots is consistent with past game-theoretic findings regarding domestic counterterrorism optimality. Carter's (2015) article is also geared to domestic terrorism, whereas Choi (2015) and Younas (2015) may involve economic-based countermeasures for either type of terrorism.

Key findings of terrorism studies

Key findings of counterterrorism studies

This special issue contains many noteworthy advances in the study of terrorism. Gaibulloev (2015) is the first article to address terrorist groups’ base location choice; currently, the study of terrorist group survival is an active area of research. Berrebi and Ostwald (2015) is the initial study to examine the impact of terrorism on fertility. Younas (2015) and Choi (2015) refine the relationship between terrorism and growth; Egger and Gassebner (2015) show that terrorism has less of an effect on trade than conventionally believed. Kaplan (2015) investigates the social efficiency of intelligence staffing in intercepting terror plots. Carter's (2015) analysis is novel because the terrorist group must decide between terrorist attacks and holding territory in reaction to the government's countermeasures. The interface between terrorism and other forms of political violence is seldom studied. Finally, the Gries et al . (2015) study extends knowledge of the determinants of anti-American terrorist attacks, which comprise 35–40% of all transnational terrorism.

Terrorism remains an active research area in economics, political economy, and political science. Given the microeconomic and macroeconomic consequences of terrorism, its study is a fitting topic for a general economics journal such as Oxford Economic Papers . Following 9/11, industrial countries engaged in a huge reallocation of resources toward counterterrorism, whose efficacy can be best studied and understood with the theoretical and empirical tools drawn from economics.

The rise of ISIS and the considerable threat that its Western fighters pose for their home countries means that terrorism will remain a policy concern. AQAP's war on the USA and its allies is yet another terrorist threat. Just as Africa appears to be achieving sustained economic growth in select countries, significant terrorist challenges arise from Boko Haram and al-Shabaab in Nigeria and Kenya, respectively. Failed states—for example, Afghanistan, Iraq, Somalia, Syria, and Yemen—supply safe havens for terrorist groups that threaten Western interests. It is my hope that this special issue on terrorism and counterterrorism will stimulate further research in these two topics.

The present collection arises from a set of papers presented at the sixth conference on Terrorism and Counterterrorism Policy at the University of Texas, Dallas. Held between 21 May and 24 May 2014, this conference invited many leading contributors to the study of terrorism and counterterrorism. Past conferences resulted in special issues published in Economics &Politics (November 2009), Journal of Conflict Resolution (April 2010), Journal of Peace Research (May 2011), Public Choice (December 2011), and Southern Economic Journal (April 2013). While assuming full responsibility for any remaining shortcomings, this article has profited from comments from Anindya Banerjee, who also advised me on the special issue. Khusrav Gaibulloev read and commented on an earlier version. Finally, I thank all of this special issue's reviewers, most of whom are major contributors to the study of terrorism. These reviewers provided rigorous reviews in a timely fashion. All articles went through a careful and demanding prescreening process, followed by two rounds of reviews by two to three anonymous referees. I appreciate the understanding of those authors whose papers did not make it into the special issue.

On the game-theoretic literature on terrorism, see Bandyopadhyay and Sandler (2011) , Bandyopadhyay et al . ( 2011 , 2014 ), Sandler and Arce (2003) , Bueno de Mesquita (2005) , and Sandler and Siqueira (2009) .

The Abu Nidal Organization was headed by Sabri Khali al-Banna. Its notorious attacks included the simultaneous armed attacks on the Rome and Vienna airports on 27 December 1985, the armed attack on the Neve Shalom Synagogue in Istanbul on 6 September 1986, and the attempted hijacking of Pan Am flight 73 in Karachi, Pakistan, on 5 September 1986 ( Enders and Sandler, 2012 ). This group is credited with the first simultaneous terrorist attacks.

On alternative ways that terrorist groups end, see Carter (2012) , Gailbulloev and Sandler (2014) , and Phillips (2014a) .

On the relationship between civil wars and terrorism, see Sambanis (2008) .

How terrorist groups choose their home base is discussed in this special issue by Gaibulloev (2015) . On the definition of terrorist groups, see Phillips (2014b) .

In this special issue, Choi (2015) investigates suicide terrorism, which may be domestic or transnational in nature. Suicide terrorist attacks grew in numbers after 1988 ( Santifort-Jordan and Sandler, 2014 ).

Abadie A. Gardeazabal J. ( 2003 ) The economic cost of conflict: a case study of the Basque Country , American Economic Review , 93 , 113 – 32 .

Google Scholar

Abadie A. Gardeazabal J. ( 2008 ) Terrorism and the world economy , European Economic Review , 52 , 1 – 27 .

Arce D.G. Sandler T. ( 2005 ) Counterterrorism: a game-theoretic analysis , Journal of Conflict Resolution , 49 , 183 – 200 .

Atkinson S.E. Sandler T. Tschirhart J. ( 1987 ) Terrorism in a bargaining framework , Journal of Law and Economics , 30 , 1 – 21 .

Azam J.-P. Thelen V. ( 2010 ) Foreign aid versus military intervention in the war on terror , Journal of Conflict Resolution , 54 , 237 – 61 .

Bandyopadhyay S. Sandler T. ( 2011 ) The interplay between preemptive and defensive counterterrorism measures: a two-stage game , Economica , 78 , 546 – 64 .

Bandyopadhyay S. Sandler T. Younas J. ( 2011 ) Foreign aid as counterterrorism policy , Oxford Economic Papers , 63 , 423 – 47 .

Bandyopadhyay S. Sandler T. Younas J. ( 2014 ) Foreign direct investment, aid, and terrorism , Oxford Economic Papers , 66 , 25 – 50 .

Bapat N. A. ( 2006 ) State bargaining with transnational terrorist groups , International Studies Quarterly , 50 , 213 – 29 .

Berrebi C. Ostwald J. ( 2015 ) Terrorism and fertility: evidence for a causal inference of terrorism on fertility , Oxford Economic Papers , 67 , 63 – 82 .

Bloom M. ( 2005 ) Dying to Kill: The Allure of Suicide Terror , Columbia University Press , New York .

Google Preview

Bueno de Mesquita E. ( 2005 ) The quality of terror , American Journal of Political Science , 49 , 515 – 30 .

Bueno de Mesquita E. ( 2007 ) Politics and the suboptimal provision of counterterror , International Organization , 61 , 9 – 36 .

Carter D.B. ( 2012 ) A blessing or curse? State support for terrorist groups , International Organization , 66 , 129 – 51 .

Carter D.B. ( 2015 ) When terrorism is evidence of state success: securing the state against territorial groups , Oxford Economic Papers , 67 , 116 – 32 .

Chen A.H. Siems T.F. ( 2004 ) The effects of terrorism on global capital markets , European Journal of Political Economy , 20 , 249 – 66 .

Choi S.-W. ( 2015 ) Economic growth and terrorism: domestic, international, and suicide , Oxford Economic Papers , 67 , 157 – 81 .

Drakos K. Kutan A.M. ( 2003 ) Regional effects of terrorism on tourism in three Mediterranean countries , Journal of Conflict Resolution , 47 , 621 – 41 .

Eaton B.C. ( 2004 ) The elementary economics of social dilemmas , Canadian Journal of Economics , 37 , 805 – 29 .

Eckstein Z. Tsiddon D. ( 2004 ) Macroeconomic consequences of terror: theory and the case of Israel , Journal of Monetary Economics , 51 , 971 – 1002 .

Egger P. Gassebner M. ( 2015 ) International terrorism as a trade impediment? Oxford Economic Papers , 67 , 42 – 62 .

Enders W. ( 2007 ) Terrorism: an empirical analysis , in Sandler T. Hartley K. (eds) Handbook of Defense Economics: Defense in a Globalized World , North-Holland , Amsterdam .

Enders W. Hoover G.A. Sandler T. ( 2014 ) The changing nonlinear relationship between income and terrorism , Journal of Conflict Resolution , doi: 10.1177/0022002714535252 .

Enders W. Sandler T. ( 1996 ) Terrorism and foreign direct investment in Spain and Greece , Kyklos , 49 , 331 – 52 .

Enders W. Sandler T. ( 2000 ) Is transnational terrorism becoming more threatening? A time-series investigation , Journal of Conflict Resolution , 44 , 307 – 32 .

Enders W. Sandler T. ( 2006 ) Distribution of transnational terrorism among countries by income classes and geography after 9/11 , International Studies Quarterly , 50 , 367 – 93 .

Enders W. Sandler T. ( 2012 ) The Political Economy of Terrorism , 2nd edn., Cambridge University Press , New York .

Enders W. Sandler T. Cauley J. ( 1990 ) UN conventions, technology, and retaliation in the fight against terrorism: an econometric evaluation , Terrorism and Political Violence , 2 , 83 – 105 .

Enders W. Sandler T. Gaibulloev K. ( 2011 ) Domestic versus transnational terrorism: data, decomposition, and dynamics , Journal of Peace Research , 48 , 319 – 37 .

Enders W. Sandler T. Parise G.F. ( 1992 ) An econometric analysis of the impact of terrorism on tourism , Kyklos , 45 , 531 – 54 .

Eubank W.L. Weinberg L.B. ( 1994 ) Does democracy encourage terrorism? , Terrorism and Political Violence , 6 , 417 – 35 .

Faria J.R. ( 2003 ) Terror cycles , Studies in Nonlinear Dynamics and Econometrics , 7 , 1 – 11 .

Findley M.G. Young J.K. ( 2012 ) Terrorism and civil war: a spatial and temporal approach to a conceptual problem , Perspectives on Politics , 10 , 285 – 305 .

Fleck R.K. Kilby C. ( 2010 ) Changing aid regimes? US foreign aid from the Cold War to the war on terror , Journal of Development Economics , 91 , 185 – 97 .

Gaibulloev K. ( 2015 ) Terrorist group location decision: an empirical investigation , Oxford Economic Papers , 67 , 21 – 41 .

Gaibulloev K. Sandler T. ( 2008 ) Growth consequences of terrorism in Western Europe , Kyklos , 61 , 411 – 24 .

Gaibulloev K. Sandler T. ( 2011 ) The adverse effect of transnational and domestic terrorism on growth in Africa , Journal of Peace Research , 48 , 355 – 71 .

Gaibulloev K. Sandler T. ( 2014 ) An empirical analysis of alternative ways that terrorist groups end , Public Choice , 160 , 25 – 44 .

Gries T. Meierrieks D. Redlin M. ( 2015 ) Oppressive governments, dependence on the United States and anti-American terrorism , Oxford Economic Papers , 67 , 83 – 103 .

Grossman H.I. ( 1991 ) A general equilibrium model of insurrections , American Economic Review , 81 , 912 – 21 .

Hoffman B. ( 1998 ) Inside Terrorism , Columbia University Press , New York .

Hoffman B. ( 2006 ) Inside Terrorism , rev. edn., Columbia University Press , New York .

Jones S.G. Libicki M.C. ( 2008 ) How Terrorist Groups End: Lessons for Countering al Qa'ida , Monograph MG-741-1, RAND, Santa Monica, CA .

Kaplan E.H. ( 2015 ) Socially efficient detection of terror plots , Oxford Economic Papers , 67 , 104 – 15 .

Keefer P. Loayza N. (eds) ( 2008 ) Terrorism, Economic Development, and Political Openness , Cambridge University Press , New York .

Kollias C. Papadamou S. Arvanitis V. ( 2013 ) Does terrorism affect the stock-bond covariance? Evidence from European countries , Southern Economic Journal , 79 , 832 – 48 .

Kunreuther H. Michel-Kerjan E. Porter P. ( 2003 ) Assessing, managing and financing extreme events: dealing with terrorism , Working Paper 10179, National Bureau of Economic Research .

La Free G. Dugan L. ( 2007 ) Introducing the global terrorism database , Terrorism and Political Violence , 19 , 181 – 204 .

Mickolus E.F. ( 1980 ) Transnational Terrorism: A Chronology of Events 1968–1979 , Greenwood Press , Westport, CT .

Mickolus E.F. ( 1989 ) What constitutes state support to terrorism? , Terrorism and Political Violence , 1 , 287 – 93 .

Mickolus E.F. Sandler T. Murdock J.M. ( 1989 ) International Terrorism in the 1980s: A Chronology of Events , 2 vols. , Iowa State University Press , Ames .

Mickolus E.F. Sandler T. Murdock J.M. Flemming P. ( 2013 ) International Terrorism: Attributes of Terrorist Events, 1968–2013 (ITERATE) , Vinyard Software , Ponte Vedra, FL .

Mueller J. ( 2006 ) Overblown: How Politicians and the Terrorism Industry Inflate National Security Threats and Why We Believe Them , Free Press , New York .

National Consortium for the Study of Terrorism and Responses to Terrorism . ( 2013 ) Global Terrorism Database , available at http://www.start.umd.edu/gtd/ (accessed 25 August 2013) .

Nitsch V. Schumacher D. ( 2004 ) Terrorism and international trade: an empirical investigation , European Journal of Political Economy , 20 , 423 – 33 .

Phillips B.J. ( 2014a ) Terrorist group cooperation and longetivity , International Studies Quarterly , 58 , 336 – 47 .

Phillips B.J. ( 2014b ) What is a terrorist group? Conceptual issues and empirical implications , Terrorism and Political Violence , doi: 10.1080/09546553.2013.800048 .

RAND . ( 2012 ) RAND database of worldwide terrorism incidents , available at http://www.rand.org/nsrd/projects/terrorism-incidents.html (accessed 3 August 2012) .

Rapoport D.C. ( 1984 ) Fear and trembling: terrorism in three religious traditions , American Political Science Review , 78 , 658 – 77 .

Rapoport D.C. ( 2004 ) Modern terror: the four waves , in Cronin A.K. Ludes J.M. (eds) Attacking Terrorism: Elements of a Grand Strategy , Georgetown University Press , Washington, DC .

Sambanis N. ( 2008 ) Terrorism and civil war , in Keefer P. Loayza N. (eds) Terrorism, Economic Development and Political Openness , Cambridge University Press , New York .

Sandler T. ( 2014 ) The analytical study of terrorism: taking stock , Journal of Peace Research , 51 , 257 – 71 .

Sandler T. Arce D.G. ( 2003 ) Terrorism and game theory , Simulation &Gaming , 34 , 319 – 37 .

Sandler T. Enders W. ( 2008 ) Economic consequences of terrorism in developed and developing countries: an overview , in Keefer P. Loayza N. (eds) Terrorism, Economic Development and Political Openness , Cambridge University Press , New York .

Sandler T. Hartley K. ( 1995 ) The Economics of Defense , Cambridge University Press , Cambridge .

Sandler T. Lapan H.E. ( 1988 ) The calculus of dissent: an analysis of terrorists’ choice of targets , Synthese , 76 , 245 – 61 .

Sandler T. Siqueira K. ( 2006 ) Global terrorism: deterrence versus preemption , Canadian Journal of Economics , 50 , 1370 – 87 .

Sandler T. Siqueira K. ( 2009 ) Games and terrorism: recent developments , Simulation &Gaming , 40 , 164 – 92 .

Santifort C. Sandler T. ( 2013 ) Terrorist success in hostage-taking mission , Public Choice , 156 , 125 – 37 .

Santifort-Jordan C. Sandler T. ( 2014 ) An empirical study of suicide terrorism: a global analysis , Southern Economic Journal , 80 , 981 – 1001 .

Younas J. ( 2015 ) Does globalization mitigate the adverse effects of terrorism on growth? Oxford Economic Papers , 67 , 133 – 56 .

Young J.K. Findley M.G. ( 2011 ) Can peace be purchased? A sectoral-level analysis of aid's influence on transnational terrorism , Public Choice , 149 , 365 – 81 .

Email alerts

Citing articles via.

  • Recommend to your Library

Affiliations

  • Online ISSN 1464-3812
  • Print ISSN 0030-7653
  • Copyright © 2024 Oxford University Press
  • About Oxford Academic
  • Publish journals with us
  • University press partners
  • What we publish
  • New features  
  • Open access
  • Institutional account management
  • Rights and permissions
  • Get help with access
  • Accessibility
  • Advertising
  • Media enquiries
  • Oxford University Press
  • Oxford Languages
  • University of Oxford

Oxford University Press is a department of the University of Oxford. It furthers the University's objective of excellence in research, scholarship, and education by publishing worldwide

  • Copyright © 2024 Oxford University Press
  • Cookie settings
  • Cookie policy
  • Privacy policy
  • Legal notice

This Feature Is Available To Subscribers Only

Sign In or Create an Account

This PDF is available to Subscribers Only

For full access to this pdf, sign in to an existing account, or purchase an annual subscription.

  • International edition
  • Australia edition
  • Europe edition

Israeli soldiers raid a house in search of a member of Hamas

Does Counter-Terrorism Work? by Richard English review – a thoughtful and authoritative analysis

The Belfast academic offers vitally important lessons about government strategies, from Northern Ireland to the Middle East, warning that few campaigns are a complete success

I n January 2002, during his State of the Union address, President George W Bush said that in “four short months” the US had “rallied a great coalition, captured, arrested and rid the world of thousands of terrorists … and terrorist leaders who urged followers to sacrifice their lives are running for their own”.

The term “war on terror” had been coined a few days after al-Qaida’s attacks of 9/11 to describe the most extensive and ambitious counter-terrorism operation the world had seen. As Bush spoke, it all seemed to be going rather well.

Two decades later, with more than 300,000 people killed in Iraq, according to some estimates, and perhaps 240,000 deaths in Afghanistan, the violence of the “war on terror” can be seen to have created further chaos and carnage. Even excluding Iraq and Afghanistan, the numbers killed in terrorist attacks around the world rose from 109 a month in the years before 9/11, according to one study , to 158 a month during the six years that followed. Meanwhile, some of those whom Bush said were running for their lives are now in power in Kabul.

In Northern Ireland , on the other hand, the conflict came largely to an end – after 30 years – once British governments began to use the military and police to contain, rather than attempt to brutally extirpate, anti-state violence. Security forces patiently developed their intelligence-gathering capacities, while government ministers acknowledged the political causes of terrorism and, eventually, formed partnerships with those whom they had been fighting.

Richard English, the author of Does Counter-Terrorism Work? , is a professor of political history at Queen’s University Belfast, and has dedicated decades to the analysis of terrorism and to governments’ efforts to overcome it. Given that the choices made in counter-terrorism policy impact directly upon each of us every day, it is a vitally important area of study.

His previous work includes a 2016 volume, Does Terrorism Work? , and a highly regarded history of the IRA . Here, he offers a thoughtful and authoritative dissection of the counter-terrorism efforts of the “war on terror”, Northern Ireland’s Troubles and the Israel-Palestinian conflict, and the lessons that each can offer.

English believes that post-9/11 counter-terrorism was far too short-termist, that the histories of Afghanistan and Iraq were “substantially ignored in a disgraceful fashion” and that the US became overly impressed with its own early military successes in both countries.

In Iraq, the claim that the removal of Saddam Hussein from power was a necessary part of a global counter-terrorist campaign was, of course, founded on the false claim that Saddam was supporting al-Qaida and the mistaken belief that he possessed weapons of mass destruction. Moreover, English writes, the assumption that the Middle East could be recast “through naive invasion” took no account of the region’s past, its complex allegiances, or the possibility of something simply going wrong.

He cautions that very few counter-terrorism campaigns will ever achieve complete strategic success. Unconvinced by those who claim bullishly that the Provisional IRA was “defeated”, he argues persuasively that the republican movement’s sustainable campaign of violence was suspended only because its pragmatic leaders decided that they might more likely achieve their objective – a united Ireland – by peaceful means. Equally, he is sceptical of those among his fellow academics who argue that counter-terrorism operations will inevitably promote terrorism.

A street battle in County Derry, August 1971

However, he writes, there are times when “those who criticise counter-terrorists for worsening their state’s strategic position regarding terrorism, and those who celebrate tactical-operational successes against terrorist adversaries, might shout past each other while yet both being right”.

English judges that if any counter-terrorism campaign is to achieve even partial strategic victory, it must be conducted in a patient, well-resourced manner, with clear objectives. Given that terrorists often seek to provoke outrage and overreaction, the public should be encouraged to be realistic about the limits to what can be accomplished.

He also concludes that to avoid failure, counter-terrorist efforts must be integrated into broader political initiatives: “We should not mistake the terrorist symptom for the more profound issues that are at stake.”

Although this book was written before the Hamas attacks of 7 October and the war in Gaza, English was already convinced that Israeli counter-terrorism tactics, no matter how carefully conceived or brilliantly executed, will not resolve the conflict unless there is a strategic engagement with Palestinian grievances and desire for statehood.

Finally, he cautions that his three case studies present serious warnings about the self-harm that can be inflicted by state actions judged to lack morality. All three have involved the abuse of prisoners; that an overreliance on aggressive military methods can shatter public support; that technical surveillance should be lawful and proportionate; and, as a senior British police officer warned in a report published this month , that there are serious questions to be asked about the morality and legality of allowing informants within terrorist organisations to commit serious crimes.

“A successful counter-terrorism will be a just counter-terrorism,” English writes: legally bound, accountable and proportionate. To stray from this, he says, risks delegitimising the objectives of the state. Or as a mural in Northern Ireland used to say: “When those who make the law, break the law, in the name of the law, there is no law.”

Ian Cobain is the author of Anatomy of a Killing: Life and Death on a Divided Island (Granta)

Does Counter-Terrorism Work? by Richard English is published by Oxford University Press (£25). To support the Guardian and Observer order your copy at guardianbookshop.com . Delivery charges may apply

  • Politics books
  • The Observer
  • UK security and counter-terrorism
  • Counter-terrorism policy
  • Northern Ireland
  • Israel-Gaza war
  • Afghanistan

Most viewed

Advertisement

Advertisement

An Explorative Study into the Importance of Defining and Classifying Cyber Terrorism in the United Kingdom

  • Original Research
  • Open access
  • Published: 24 November 2021
  • Volume 3 , article number  84 , ( 2022 )

Cite this article

You have full access to this open access article

  • Victoria Jangada Correia   ORCID: orcid.org/0000-0002-0305-3381 1  

Terrorism, crime, and war are all familiar notions; however, the way in which these have been altered through cyberspace is not yet fully, nor unanimously, understood through definitions, theories, and approaches. Although the threat level of terrorism in the UK has lowered to moderate, the threat posed by cyber terrorism has nonetheless heightened throughout the COVID pandemic due to the greater necessity and presence of technology in our lives. This research aimed to highlight the necessity for a unanimous cyber terrorism definition and framework and further aimed to determine what perceptions are held by the general public regarding cyber terrorism through a mixed methods approach. The literature review confirms that there is an absence of a unanimously agreed upon definition of cyber terrorism, and furthermore that the existing academic definitions are not compatible with UK legislation. In addition, the literature review highlights an absence of a cyber terrorism framework that classifies what kind of terrorist activity is cyber enabled or cyber dependent. Quantitative data from the online survey find a couple of significant effects implying the necessity for greater diversity amongst stakeholders which could potentially enhance the detection and prevention of terrorism in the UK. The qualitative data find that although there is some agreement amongst the sample population in views held towards cyber terrorism, some misconceptions are nonetheless present which could have implications on the general public’s ability to identify and report cyber terrorist activity. Overall, the findings from the literature review and the primary data collection aid in developing a cyber terrorism definition that is compatible with UK legislative definitions, and further aids in developing a terrorist activity framework that succinctly highlights the inextricable links between traditional, cyber enabled, and cyber-dependent terrorism.

Similar content being viewed by others

literature review on terrorism

Understanding, Locating and Constructing Cyberterrorism

literature review on terrorism

Learning Lessons from Countering Terrorism: the UK Experience 2017–2020

literature review on terrorism

Cyber Terrorism: A Growing Threat to India’s Cyber Security

Avoid common mistakes on your manuscript.

Introduction

Overview of research.

For almost up to 2 decades, the search for defining cyber terrorism has been described as the ‘Holy Grail’ for scholars and policy makers [ 1 ]. This has been escalated during the recent COVID pandemic where life has made a remarkable shift towards online activity, placing individuals at a much higher risk of being vulnerable to cyber terrorist activities [ 2 ]. Although there has been considerable research focusing on how cyber capabilities facilitate terrorism [ 3 , 4 , 5 ], there is nonetheless significant disagreement surrounding what definitions and approaches should be used unanimously to facilitate in preventing, detecting, investigating, and prosecuting cyber terrorist threats by key stakeholders in the United Kingdom (UK) such as the police, prosecution services and policy makers and international stakeholders too.

This disagreement could be due to the notion that cyber terrorism as a term, houses a wide range of illicit behaviours including hacking and phishing, to sharing online propaganda, radicalising and recruiting individuals. Therefore, attempting to define everything under the term ‘cyber terrorism’ can become challenging due to legal contexts, objectives of the illicit behaviour, and intent [ 6 ]. The lack of a unanimous definition has further delayed a framework for cyber terrorism being developed. McGuire and Dowling [ 7 ] coined the cyber-dependant and cyber-enabled cybercrime classification; however, cyber terrorism was outside the scope at the time, and this has not been further reviewed to date.

As at financial year end on March 2020, 261 arrests of terrorism-related activity were recorded [ 8 ]. However, as at financial year end on March 2021, there was a 37% reduction in terrorism-related arrests [ 9 ]. Not only are these statistics potentially reflective of the three national lockdowns and restrictions put in place for the COVID pandemic but are also potentially indicative of terrorist activity transitioning further into online platforms and not being regulated effectively. It was found that in the middle of the pandemic, terrorist groups had been altering their methods of sharing their beliefs through a plethora of online platforms, from disseminating propaganda to spreading misinformation and conspiracies to attain further support [ 2 ]. These findings highlight a socio-technical perspective in which the inextricable links between terrorist technological use and its impacts on society are evident. This perspective highlights the need for a more collaborative approach from stakeholders to create greater security for society from terrorism.

Interestingly, the aforementioned issues are also prevalent and long-standing in the taxonomy of cybercrime and the crimes which are included under this term [ 10 , 11 , 12 ]. This alludes to widespread conflict in the foundational understanding of cybercrime as a whole which inevitably affects the approach to counter cyber terrorism. Therefore, the rationale for this research highlights the importance of law enforcement, policy makers and prosecuting services having a clear definition and framework for cyber terrorism and its links to traditional terrorism, allowing them to combat the threat collaboratively. However, it is perhaps important to note that recent research found that the use of nonspecific interventions to deter terrorist activity could in fact lead to an increase in terrorist attacks [ 13 ]. In light of this, more specific interventions and a clearer understanding of underlying criminal behaviours are necessary to effectively combat the threat of terrorism, further highlighting the need for a more unanimous and concise definition and approach from relevant stakeholders in countering cyber terrorism.

Research Aims and Objectives

This research primarily aims to establish a concise definition of cyber terrorism and a suitable framework that clearly elaborates on terrorist and cyber terrorist activity to be considered by UK stakeholders. In order to achieve this primary aim, this research’s research will investigate and critically analyse the etymology of the words so to better understand the term ‘cyber terrorism’. Furthermore, current definitions of terrorism and cyber terrorism will be reviewed and analysed to determine the strengths and weakness of viewing cyber terrorism in certain ways. Additionally, Space Transition Theory [ 14 ] and Routine Activity Theory [ 15 ] will be analysed to inform a discussion on cyber terrorist behaviours and processes. Lastly, the Smith et al. terrorist group activity process [ 16 ] will be analysed alongside the McGuire and Dowling [ 7 ] dual binary classification, to support the development of a proposed framework.

This research then aims to determine what the public’s perceptions are towards cyber terrorism as this could be representative of bigger issues regarding misconceptions on the topic. To conduct a reasonable investigation, this research will collect quantitative and qualitative primary data by means of an online survey. The data will first be statistically analysed to determine any significance between participant demographics and opinions. The data will then be thematically analysed to determine any strong themes which relate to participant opinions and identify common views held by the sample population in context of the findings from the literature review.

Article Layout

The structure which this research will follow includes a literature review where relevant literature, definitions, and frameworks will be evaluated to present a clear outline on what the current state of defining cyber terrorism is. This will be followed by a methodology chapter which will discuss and analyse the mixed methods approach adopted for this research’s primary data collection. Subsequently, the quantitative and qualitative results will be interpreted in the context of the findings from the literature review, with analysis of the implications and limitations of the data. Within the results and findings chapter, a new cyber terrorism definition and framework will be proposed and analysed. Finally, the research will offer conclusions and recommendations highlighting how the study could be improved and further researched.

Literature Review

Modern day understanding of terrorism.

Defining terrorism is a subject matter undergoing much discourse [ 17 , 18 , 19 ]. This struggle in defining terrorism could be attributed to the difficulty in reflecting ideological, philosophical, political and religious normative differences under a single term. As a result of this, further confusion can become apparent in justifying the legality or illegality of suspected terrorist activity. Terrorism has been depicted as a social construct as the meaning of it is shaped by the views held by the person categorising what terrorism means to them [ 20 , 21 ].

According to Hewer and Taylor, the term terrorism is merely a marker used by governments to legitimise or delegitimise politically motivated violence occurring in their country [ 22 ]. A good example of this is the paradoxical nature between the Middle East and the West in their characterisation of terrorism. In the Middle East there is an amalgamation between religious identity and politics which influences societal and cultural concepts directly [ 23 , 24 ], whereas in the west there is a strong distinction between religion and politics resulting in a democratic society which enables an array of societal and cultural ideals to cohabit [ 22 , 25 ]. The beliefs and ideologies held by the West and the Middle East see one another as a threat to their respective core norms and values which is potentially where the notion of terrorism emerges [ 26 , 27 ]. Overall, this information emphasises the belief that different countries may have different meanings of what qualifies as a terrorist act or not depending on their political and religious alignment. In light of this, it is important to acknowledge that the prosecution of a terrorist who is not based in the UK may be troublesome due to these differing aspects, especially with cyber terrorism where threats or acts of violence and disruption can be communicated or committed through cyber capabilities off British soil.

The Terrorism Act 2006 [ 28 ] and The Counter-Terrorism Act 2008 [ 29 ] are amongst some of the acts which detail illicit behaviours within terrorist activity. More specifically, The Terrorism Act 2006 defines terrorism as an act, or threat of act of violence against the public and/or property, to intimidate the public and/or property, or to advance political or religious ideologies. This definition has been criticised due to its implications on principles of legality and its lack of clarity in defining what actions are ascribed as ‘terrorist’ which may mislead public and political perceptions regarding terrorism [ 18 , 21 ]. This vagueness could be attributed to confusing wording within legislation, which could further cause individuals engaging in terrorist activity to not be aware of the illegality behind their behaviour. Regardless of these downfalls, it is important to consider the UK’s legislative definition of terrorism in this literature review as it is pertinent that any future cyber terrorism definition be compatible with already existing legislation.

Media coverage has also contributed massively to the way in which terrorism is defined and understood and have blurred the lines between victims and perpetrators of terrorist acts [ 30 ]. The media’s use of terms such as ‘freedom fighting’, ‘insurgency’ and ‘extremism’ has caused the foundational meaning of terrorism to be replaced and misunderstood [ 18 ]. As a result, the original understanding of the term terrorism has been modified to suit the many political and religious terrorist organisations operating in modern society. This could potentially result in news media outlets shaping and promoting misconceptions amongst public opinion.

This can be better understood through Gatekeeping Theory which explores the way in which information is selected and disseminated to a group of people by news media outlets [ 31 , 32 , 33 ]. Shoemaker and Vos [ 32 ] further developed the theory, specifically investigating the way in which information of an event is passed through a series of ‘gatekeepers’ who determine what information will be disseminated, how and to whom. This theory challenges one to consider how the gatekeeping process may potentially wittingly or unwittingly distort the general public’s understanding of terrorism and terrorist activity according to the differing political, religious, or societal alignments held by news media outlets. In light of these findings, it is clear that a unanimous understanding of terrorism should be shared across the various stakeholders to improve the accuracy of the information being shared to the public.

Understanding the ‘Cyber’ Prefix

The term ‘cyber’ as we know it today originates back to kebernetes which was an ancient Greek phrase which translates to ‘the art of steering’ [ 34 ]. It was not until mathematician Norbert Wiener used the word cybernetics in the 1940s that the term came to be known as a study of the systems within living beings and artificial machines [ 35 ]. This term was further influenced by pop culture in the 1980s during the cyberpunk movement which was inspired by William Gibson’s novel Neuromancer [ 36 ], which further associated the ‘cyber’ term with dystopian and futuristic concepts. At a similar time to this, there had also been a shifting approach and understanding within the US military with regard to information warfare and the changing nature of the modern battlefield [ 37 ].

Flutter argues that the cyber prefix is nothing but a catchall phrase which has resulted in a term that has been overly ill-defined due to the various range of factors which it tries to explain [ 38 ]. In his article, Flutter suggests that returning the terms ‘Information Warfare’, ‘Information Operations’ and ‘Computer Network Operations’ instead of the cyber prefix would be more beneficial as this would clearly classify crimes which are dependent to technology. Conversely to this view, it has been argued that a definition of cyberspace should not be solely categorised under the technological components as “cyberspace allows the exercise of power” [ 39 ]. Although Computer Network Operations as a term has mostly been used in warfare, there have yet been implications to push this into the broader scope of cybercrimes.

It could be useful to apply the above terms to terrorism rather than the cyber prefix as this could more clearly define terrorist activity which is fully dependent on technological capabilities such as denial of service attacks. This approach to focus on the computer and information operations has been adopted by a few academics in their definitions of cyber terrorism [ 40 , 41 ]. However, such an approach is arguably limited as it excludes other types of terrorist activities which are being enabled by other aspects of technology such as the dissemination of terrorist propaganda and recruitment. Although separate terms could be designed to distinguish between these differing approaches to terrorist activity, the cyber prefix has become a synonymous catch all phrase distinguishing between traditional crimes and more modern crimes being committed through technological capabilities. In light of this, a term such as ‘computer network operations’ or ‘information warfare’ may not be suitable to further explore and define cyber terrorism as these terms overlook other types of terrorist activity. In turn, this would reject the inextricable links between technology, terrorism, and their impacts on communities, not just computer networks. Therefore, this literature review proposes that the use of the cyber prefix is pertinent for a clear and synonymous categorisation between traditional terrorism and cyber terrorism.

Current Definitional Interpretations of Cyber Terrorism

Cyber terrorism definitions are mostly based upon traditional terrorism definitions such as the aforementioned. It has been suggested that attacks can qualify as cyber terrorism if there is intent to impede on the political, social, or economic functioning of a group, organisation or country, or to provoke/perpetrate acts of physical violence [ 42 ]. Holt further supports this definition by suggesting that the term cyber terrorism should encapsulate the behaviour leading to the act, without necessarily resulting in physical disruption or damage [ 43 ]. Both these definitions put emphasis on the intent and motivations behind cyber terrorist activity instead of narrowly focusing on the physical impacts.

Conversely, other academics have taken a different stance on the matter and have argued that to qualify an attack under cyber terrorism, physical damage and/or disruption against a computer or network must occur [ 40 , 41 ]. Despite efforts made by academics to define cyber terrorism, some have further argued that the cyber prefix to terrorism only elaborates on the method employed in committing terrorism and therefore ‘cyber terrorism’ does not require its own category [ 44 ]. As technology continues to evolve and becomes more accessible, viewing cyber terrorism as proposed by Gordon and Ford [ 44 ] and Denning [ 41 ], could pose a greater risk to public safety, as well as impact law enforcement’s understanding and approaches in preventing, detecting, and investigating cyber terrorist activity.

These cyber terrorism definitions offer differing insights into what may and may not qualify as cyber terrorism, but it is important to acknowledge the dates when these definitions were conceived. As technology has significantly evolved since the conception of these definitions, it has become necessary to agree upon an up-to-date cyber terrorism definition that incorporates all aspects of modern technology. A more recent study was conducted identifying the key characteristics present in an array of cyber terrorism definitions to establish a new definition based off of these components and the study concluded that [ 45 ]:

“Cyber terrorism is the premeditated attack or threat thereof by non-state actors with the intent to use cyberspace to cause real world consequences in order to influence fear or coerce civilian, government, or non-government targets in pursuit of social or ideological objectives. Real-world consequences include physical, psychological, political, economic, ecological, or otherwise that occur outside of cyber space.”

This definition emphasises the actor, motivation, intent, means, effects and targets of cyber terrorism. Comparing this definition to those by Foltz [ 42 ] and Holt [ 43 ], there are some similarities; however, this definition puts further emphasis on the effect of the cyber terrorist activity which is pertinent to better understand what kind of acts actually encapsulate cyber terrorism. In comparison to the definitions proposed by Denning [ 41 ] and Conway [ 40 ], the Plotnek and Slay [ 45 ] definition does not only focus on cyber terrorist activity which may have physical impacts, but also focuses on other effects such as psychological and economic. This is an important aspect in defining the cyber terrorism term as it acknowledges all impacts which technological platforms are having on terrorism and subsequently on communities, rather than just a singular aspect. Although important points are covered in this explanation of cyber terrorism, it is nonetheless a long-winded definition with many different clauses which may not be simply understood. Furthermore, Plotnek and Slay are Australian based researchers and therefore the applicability of their definition to UK legislation is perhaps dubious due to its lack of compatibility with the current definition of terrorism outlined in The Terrorism Act 2006 [ 28 ]. A more suitable approach to defining cyber terrorism more succinctly, could be to divide it into clearer themes and shorter sentences.

Realistically, cyber terrorism is a very broad topic, and a definition which may endeavour to cover all the characteristics which fall under this term is seemingly challenging. Therefore, the attempt to encapsulate every aspect of cyber terrorism under one singular definition may be counter-productive and may potentially be the very notion preventing a unanimously agreed upon definition. Furthermore, there seems to be a lack of compatibility of the above definitions with the UK legislative definition of terrorism, therefore, a cyber terrorism definition could be designed in the context of UK law.

Theoretical Underpinnings of Cyber Terrorism

Terrorists use cyber space for an array of activities including hate speech, propaganda, recruitment and communication [ 46 ]. This literature review found that Routine Activity Theory [ 15 ] and Space Transition Theory [ 14 ] can be applied to cyber terrorism to support a clearer understanding behind the motivations of cyber terrorist offenders, in turn aiding stakeholders in the prevention, detection, investigation and prosecution of cyber terrorism.

Routine Activity Theory

Routine Activity Theory was developed by Cohen and Felson in 1979 and proposed that in order for there to be an occurrence of victimisation, three confluent factors were necessary: first, a motivated offender; secondly, a suitable target; and thirdly, the absence of a capable guardian. When this theory is applied to cybercrime, the notion of physical space is modified into cyberspace [ 47 , 48 , 49 ]. A study was conducted into the relationship between university students and their computers, and it was found that students who had a greater tendency to disregard their computer-oriented lifestyles and/or neglected security software on their computers, were more likely to be victims of computer crimes [ 47 ]. This study highlights a moderation to the original routine activity theory by which the absence of a guardian may not only be a physical person but could also be the lack of security software on a victim’s technological device.

Although this study was specifically about hacking, the cyber routine activity theory has nonetheless been applied to other forms of cybercrimes [ 50 ] and these findings can be applied to cyber terrorism to better illuminate the three confluent factors in relation to online terrorist activity. For example, if there is no computer security or blocked websites, this could enable the motivated offender to carry out a threat or act of terrorist violence against a suitable target.

Space Transition Theory

Space Transition Theory, created by Jaishankar [ 14 ], was developed to better explain the transitioning of cyber-criminal behaviour between physical space, to cyber space and vice versa. This theory explores seven main tenets: (1) propensity to commit cybercrime as a result of repressed offline criminal tendencies; (2) flexible identity within cyber environments; (3) freedom to transition between physical and cyber spaces; (4) criminal opportunity with little regulation and chance of being caught; (5) offenders’ social connections; (6) reduced threat to offenders; and (7) the blurred lines between norms and values within cyber environments. The principles within Jaishankar’s [ 14 ] theory provide greater comprehension in the paradoxical characteristics between traditional and cybercrimes, and three of these can specifically contribute to better understanding cyber terrorism.

Firstly, due to the anonymous nature of cyberspace, there is a straightforward opportunity for cyber terrorists to disguise their identity, previously referred to as dissociative anonymity [ 50 , 51 ]. This anonymity enables terrorists to hide their identity as a way to bypass existing regulations within cyber environments. Second, due to the anonymous nature of cyber environments, this not only impacts how actions can be regulated, but also allows offenders to continue their criminal behaviour with little to no consequences. This is further supported by cognitive inhibition effect in which, due to lack of deterrence, dissociation between the action and the end result encourages the continual terrorist behaviour [ 50 ]. Third, the ability to interchange between physical space and cyber space, alludes to the notion that terrorist activity may potentially manifest in cyber space where there are limited constraints to disseminate propaganda and recruit, prior to moving into physical space where offline impacts may be seen [ 52 ]. This available interchangeability is financially advantageous to terrorist groups as they can achieve their aims and objectives to further their terrorist ideology with reduced monetary costs.

Lastly, if terrorist behaviour is repressed in physical environments, this may encourage terrorists to modify their approaches into cyberspace where activities can be hidden from regulatory bodies and stakeholders involved in combatting terrorism [ 53 ]. Although this was an already advantageous aspect for terrorists, this has become even more significant due to the global COVID pandemic and lockdown restrictions [ 2 ]. Due to a greater increase in terrorist use of cyber space and its dynamic spatial -temporal characteristic, there is a lower risk of being caught due to the vastness of cyber environments [ 52 ]. Overall, the tenets highlighted in Space Transition Theory [ 14 ] simplify the advantageous elements which are enabling terrorist activity to continue mostly uninterrupted.

Categorisation of Cyber Terrorist Activity

According to the Crown Prosecution Service [ 54 ], in order for an action to qualify as terrorism, there needs to be evidence of terrorist motivations. Wilkinson identifies four types of terrorist groups: ethno-nationalist groups; ideological groups; religio-political groups; and single-issue groups [ 55 ]. This identification can be used to inform the types of motivations which can influence terrorist offences. The current legislations for countering the threat of terrorism in the UK are The Terrorism Act 2000 [ 56 ]; The Terrorism Act 2006 [ 28 ]; The Counter-Terrorism Act 2008 [ 29 ]; and The Counter-Terrorism and Border Security Act 2019 [ 57 ].

According to the Crown Prosecution Service [ 54 ], some examples of substantive terrorist offences include preparing terrorist attacks; collecting terrorist information; disseminating terrorist publications with intent of encouraging terrorism; aiding in covering up terrorist activity online; supporting a proscribed organisation; attending a place for terrorist training; and financially aiding terrorist activity. In the context of the above offences, one could question the effectiveness of current UK legislation in preventing, detecting, investigating and prosecuting cyber terrorist activity. For example, the offence of ‘attending a place for terrorist training’ under The Terrorism Act 2006 [ 28 ] may be challenging to apply to terrorist virtual training as there is no geographic “place” due to the boundaryless characteristic of a cyber environment. Both pinpointing the virtual location of training and determining the IP addresses of each individual attending the training session, could make it difficult for stakeholders to detect and prosecute [ 58 , 59 ]. However, as explored in Space Transition Theory [ 14 ], this is an advantageous notion for cyber terrorism due to the anonymity factor. In addition, it is important to note that terrorist activities, such as training and recruitment, have become more reliant on online platforms, especially throughout the COVID pandemic due to restrictions.

Recently, The Department for Digital, Cultural, Media and Sport [ 60 ], released a Draft Online Safety Bill which aims to set out principles for service providers in regulating their services and making them safe for users. It directly highlights principles which should be used to combat online terrorist activity. The draft bill has been under scrutiny for the risk it poses to freedom of speech, privacy and the way in which it will regulate risks to the public [ 61 , 62 ], however, it is nonetheless a step in the right direction to continue combatting the threat posed by terrorism in the UK. Although UK laws can be a beneficial tool in understanding what offences can be prosecuted, it is limited in clearly categorising terrorist offences and their processes in a framework approach.

Smith et al. [ 16 ] conducted a study into the spatial and temporal patterns of terrorist group activity, and although classifying terrorist activity was not a main aim, this was nonetheless achieved and can be used to better understand terrorist processes. This study breaks down terrorist activity into four main categories: (1) recruitment; (2) preliminary organisation and planning; (3) preparatory conduct; and (4) terrorist act. This framework can be useful in gaining a clearer understanding of what general types of terrorist activity occur and, furthermore, how one act can lead to another. This could be a beneficial tool for stakeholders involved in the prevention, detection, investigation, and prosecution of traditional and cyber terrorism as there would be a clearer understanding of the entailed processes.

McGuire and Dowling developed a dual-binary framework approach which classifies cybercrimes based off their dependence to cyber capabilities [ 7 ]. Cyber-enabled crimes, such as disseminating terrorist propaganda or theft, are traditional crimes which can increase in scale due to technology. On the other hand, cyber-dependent crimes, such as denial of service attacks or hacking, are acts which can only be committed through technological means. This dual binary approach is beneficial as it encourages a clear classification which can be easily understood by direct stakeholders such as law enforcement and prosecution services. However, this approach is limited as it does not apply this model to cyber terrorism [ 7 ]. Considering this approach has been adopted by the Crown Prosecution Service [ 63 ] to better explain the prosecution of cybercrimes, this could be indicative of a lack of understanding towards cyber terrorism from the criminal justice system in the UK. This raises a critical question of whether the criminal justice system is suitably equipped with knowledge in securing the UK against the threat posed by cyber terrorism. Considering the rise of online based terrorism throughout the pandemic [ 2 ], a dual binary approach may not be sufficient, but rather a ternary approach which incorporates traditional, cyber enabled and cyber dependent terrorism, could instead be considered to enhance the understanding of varying terrorist activities and their correlations.

Methodology

Research design.

In order to determine what perceptions were held by the public towards cyber terrorism, a mixed methods approach was chosen over a single method approach as mixed methods enable the researcher to find comparisons and contradictions within the quantitative and qualitative data which overall strengthens the discussion to better understand something, which as highlighted in the literature review, is not yet well understood [ 64 , 65 ]. By utilising a mixed methods approach, quantitative and qualitative data were collected and analysed simultaneously using positivist (quantitative) and post-positivist (qualitative) paradigms to observe and measure the responses [ 66 , 67 ].

Research Materials

The research material used was a mixed methods questionnaire which consisted of both quantitative and qualitative questions in the form of an online survey which was open to the public. Some benefits of utilising surveys to collect data are that participants are able to answer questions in their own time, and furthermore can answer truthfully without a fear of being judged as they are in a familiar environment [ 68 , 69 ]. Also, online surveys have been found to be beneficial as they are simple to implement and inexpensive compared to traditional questionnaire characteristics such as printing, postage, location and time [ 70 , 71 ].

The online survey was created through Jisc Online Surveys [ 72 ] which was used to create and host the survey for participants to complete the questions using a link. It was important to the research that the survey be made simple for ease of participants to navigate through it themselves and, therefore, where needed, explanations were put in place to aid participants throughout the survey. The survey used a range of demographic questions, dichotomous questions, Likert scale questions, and open questions. Every question gave respondents the opportunity to elaborate on their responses with free text boxes which fed in to the qualitative data.

Participants were specifically asked questions regarding their beliefs towards the way in which cyberspace is enabling terrorism. Participants were asked to share what threat level they believe the UK currently faces from terrorism and were also asked their opinion on the importance of stakeholder’s understanding to improve the UK’s approach to counter cyber terrorism. The questions under this section made up an important part of this research as they directly correlated to the aims and objectives. This enabled the analysis against the demographic groups to be done to ascertain what the sample populations’ perceptions were towards cyber terrorism.

Research Sampling and Procedure

The sampling techniques which were dedicated to this research were convenience sampling and snowball sampling. The convenience sampling method does not rely on probability and takes a sample from a group of people who meet a certain criterion [ 73 , 74 ], where for this research the criteria were easy to reach; availability; and over the age of 18. A limitation of convenience sampling is that it encourages biased results due to the potential proximity of the researcher and the respondents and therefore, opinions in the data may not have the ability to be fairly applied to the general population [ 74 , 75 ]. In light of this limitation, the snowball sampling method was then also utilised by encouraging respondents to share the survey once they had completed it to at least one other person is this would increase the sample size and generalisability of the data [ 76 ]. This would ensure that the sample was more diverse.

The online survey was distributed through a web link which was shared via the researcher’s social media accounts with a short explanation of the research so that participants could make an informed decision of whether they wished to participate or not. The social media sites used included LinkedIn; Facebook; Twitter; and Instagram. The survey was open to the public for 76 days between March and May of 2021, and every Thursday of the week, the survey was reshared on the social media sites to generate a larger sample population. Overall, this achieved a sample size of 83 respondents. As respondents answered questions on topics which they may not have put much thought into prior to completing the survey, this may have hindered their ability to make decent thought-out conclusions in their answers [ 77 , 78 ], potentially making a catalyst of unreliable data.

Data Analysis Techniques

The quantitative data collected from the online survey were analysed using IBM SPSS. This software was chosen for the quantitative analysis as it has been used for research in social sciences due to the straightforward approach it offers for a range of analyses and the researcher does not need any mathematical expertise to use this software [ 79 , 80 ]. Additionally, SPSS allowed for comparative investigation between the data sets to be undertaken to analyse whether there were any strong attitudinal relationships [ 81 ]. More specifically, t tests and ANOVA (Analysis of Variance) tests were carried out using SPSS to determine whether there were any strong relationships between demographics and the topical questions.

The qualitative data collected from the online survey were thematically analysed utilising Microsoft Word. This software was chosen for the qualitative analysis as it enabled the researcher to see all the qualitative data together and go through the process of thematic analysis using the highlight feature to colour codes and themes, and further use the control find feature to search for particular words or phrases [ 82 ]. In order to ensure that important data were not missed, the researcher initially became comfortable with the data taking simple notes on opinions which become apparent prior to beginning the coding and thematic categorising stage [ 82 ]. Analysis and interpretation of the qualitative results were conducted in tandem to ensure that any final conclusions were reached following in-depth analysis [ 83 , 84 ].

Ethical Considerations

The British Society of Criminology’s Ethics Statement ensures that within any primary research, safety should be practiced, and ethics should be considered [ 85 ]. Prior to the survey being shared, a number of ethical considerations had to be considered to ensure that the researcher and participants were not placed at risk, and if so that the mitigation strategies were made available. The main ethical considerations which related directly to this research’s research were consent, confidentiality, anonymity, autonomy and debriefing. Steps were taken to ensure that respondents were aware of their rights as a participant when they agreed to take part in the research.

Online Surveys is fully compliant with the Data Protection Act 2018 [ 86 ] and does not record IP addresses to ensure that complete anonymity is maintained. Furthermore, to ensure the data were kept safe and private, only the researcher had access to the raw data which were stored on a password protected account with Online Surveys on a password protected laptop belonging to the researcher. In accordance with the School of Criminology and Criminal Justice Ethics Committee guidelines, the data were stored in the researchers N drive, and after 10 years it will be destroyed. Before the survey could be disseminated, an ethical review was completed by the SCCJ Ethics Committee of the proposed research, and the ethics were approved.

In order to ensure that participants had informed consent and participation was voluntary, an information sheet was included on the first page of the survey. Participants were informed of their rights throughout the survey process and the data collection process and participants were only able to progress to the questions for the survey once they had confirmed they were over the age of 18 and that they consented to everything in the information sheet. A section on debriefing was placed at the end of the survey upon completion which thanked respondents for their participation in the research. Additionally, as the topic of the research was of sensitive nature and could have affected individuals, three helplines and support websites were provided for participants. Finally, the details of the researcher and supervisor were provided in case any respondents had complaints and/or queries regarding the survey.

Results and Discussion

Overall findings from the literature review highlighted that there is a lack of a widely accepted definition and framework for cyber terrorism in the UK. Findings further discovered that theory can be used to better understand cyber terrorist behaviour, thus aiding in a better understanding of what cyber terrorism is. The literature review, paired with this research’s primary data collection, aimed to establish a current definition of cyber terrorism and framework approach which can be utilised by direct stakeholders involved in the prevention, detection, investigation, and prosecution of cyber terrorism within the UK. The research hypotheses were as follows:

This research hypothesised that misconceptions may be held amongst the general public, especially in the qualitative data, and that this could be a representation of misconceptions held amongst direct stakeholders as they are disseminating this information to the general public

This research also hypothesised that, based on the demographic characteristics of the sample population, significant effects would be found between the gender demographic and the topical questions where females may have been more concerned with the psychological effects of terrorism and males more so with the physical effects. This hypothesis is influenced by research that has found females to hold greater empathic concerns towards individuals’ situations than males [ 87 , 88 ].

In addition, it was hypothesised that significant effects would be found in respondents’ occupations, assuming that occupations from within technology and/or law enforcement categories may hold a more experiential understanding of cyber terrorism within the survey.

Quantitative findings are presented through the use of tables, and qualitative findings are explored through themes supported by quotations from the sample population. Subsequently, the results are discussed, exploring interpretations and implications of the findings in light of the learnt literature. This chapter ultimately develops a definition and framework for cyber terrorism informed by available literature presented in the literature review, and the outcomes of the primary data collection.

Demographics of Sample Population

The primary data were collected from 83 respondents overall. Of the sample population, 45% were male respondents and 55% were female respondents. In context of the age demographic, the highest rate of respondents being amongst the ‘18–24’ group and the lowest number of respondents being from the ‘65 or above’ group. As the survey was distributed amongst the researcher’s social media accounts, this turnout was expected due to the researcher’s connections. The main limitation is the lack of results retrieved from the 65 and above age group, although had this age group been more targeted in the distribution of the survey this would have rejected anonymity and confidentiality of the participants.

The survey offered a total of 25 occupation categories which participants could choose from. Four of these occupations were not selected by any individuals and in addition, some occupations had two or less respondents which implicated the data analysis. Therefore, once all data had been collected, the 21 occupation categories were funnelled down in to nine categories and the data for occupations were recoded in SPSS. The new categories can be seen below in Table 1 . The total sample population for occupation is 81 in contrast to the overall population of 83 as two participants did not disclose their occupation.

Quantitative Results

The quantitative results in this primary data collection aimed to investigate whether demographic characteristics from the sample population had any significant effects on the topical questions from the survey. Further to the hypotheses of this primary data collection, the quantitative results further aimed to establish whether there were any trends or patterns which could be used to better understand what perceptions are held by the public and whether there is a trend leaning towards unanimity or not. A range of t tests and ANOVA tests were used to conduct an overall of 66 basic statistical tests using SPSS to initially investigate significant findings in the data. Overall, 97% of the data were found to have no significant effects, indicating only 2 out of 66 tests had a significant effect.

Gender Findings and Interpretations

Independent t tests were conducted to investigate whether or not gender played a significant role in the way the topical questions were answered. The overall results for the t test can be found in Table 2 where data can be tracked as significant or insignificant in the p value column. As can be seen, the results which found gender to have a significant effect were Q9d and Q13. Although significant results are important to note and interpret, it should be acknowledged that these significant findings merely highlight notions which appear worthy of further investigation and replication [ 89 , 90 ].

The recruitment and mobilisation question asked participants to rank what they felt were ways in which terrorism was being enabled by cyber capabilities from a list of options. Participants were able to choose 3 options with 1 being the most important and 3 being not as important. As there were more than 3 options for participants to choose from in this question, it cannot be assumed what 3 meant to people – it could have meant ‘least important’ to some or ‘not as important’ to others.

Results showed that male participants ( M  = 1.57, SD = 0.746) ranked recruitment and mobilisation higher than females ( M  = 2.04, SD = 0.676) and an independent t-test found this pattern to be significant, t (44) = − 2.23, p  < 0.05. First, these data suggest that males are more likely to include recruitment and mobilisation as an enabled form of cyber terrorism than females. Second, these data also allude to the notion that males are potentially more concerned with the concept of recruiting and mobilising new terrorists. As no effect size was calculated due to an outdated version of SPSS, these data cannot be generalised to a larger population.

Some assumptions can be made based on the implications of these findings regarding gender perception on recruitment and mobilisation within terrorist activity. Due to terrorist groups use of online capabilities, the ability to recruit and mobilise individuals has increased through a greater ease in disseminating information to followers [ 14 , 91 ]. This has especially increased during the pandemic where more individuals have felt anxious, disempowered and alone and have found a sense of community and solace in like-minded groups where inciting violence either in a virtual or physical environment, has been more so attractive than possibly before the pandemic [ 92 ].

As discussed in this research’s literature review, recruitment is one of the first steps in the process of terrorist group activity [ 16 ]. This information, coupled with the male gender effect on ‘recruitment and mobilisation’, could indicate that males are more concerned with terrorist group actions which have a long-term effect such as recruiting individuals, who may play a direct or indirect role in threatening or causing harm to individuals virtually or physically, further down the process of terrorist group activity. This interpretation could be broadened onto a wider scale looking at stakeholders within cyber terrorism where male police officers make up 69% of the police force [ 93 ]. For example, if male police officers are more concerned with the long-term effects of cyber terrorism and are more likely to acknowledge recruitment as a first step in terrorist group activity, there may be a greater interest to detect and combat the terrorist activity being enabled by cyber space before the threat of harm to a community or nation increases. Overall, this could indicate there being a greater ambition to deter terrorism from happening through observing recruitment activity online. In light of these findings, there is a potential for hypothesis 2 to be met on the condition that the study be replicated to calculate the generalisability of these findings.

The final question in the survey, asked participants how strongly they agreed that stakeholders’ understanding of the term cyber terrorism is important in detecting and preventing terrorism in the UK. Zero participants selected the answers ‘disagree’ and ‘strongly disagree’, and only eight participants selected ‘neutral’ which suggests that there is generally overall agreement amongst the sample population that stakeholder understanding is important. However, results showed that female participants ( M  = 1.40, SD = 0.580) were more likely to strongly agree with the stakeholder statement than males ( M  = 1.89, SD = 0.658), and an independent t-test confirmed a pattern of significance, t (72.508) = 3.553, p ≤ 0.05. These data suggest that females are more likely to acknowledge the influence that stakeholders’ understanding of cyber terrorism can have on the detection and prevention of terrorism. It also highlights that male participants are potentially more inclined to take a more ‘neutral’ standpoint towards the statement. These data challenge one to consider the impact which stakeholders lacking in gender diversity may have on the understanding, and subsequently the detection and prevention of cyber terrorism.

In light of this finding, it is important to consider gender diversity within agencies and stakeholders who are associated in tackling cyber terrorism, including policy makers and law enforcement. Research regarding gender diversity has found that more diverse work environments can result in broader perspectives within decision-making and greater effectiveness in work delivery [ 94 , 95 , 96 ]. In addition, one study showed an inclination from female leadership roles in focusing on preventing and resolving matters [ 97 ]. As highlighted, the police work force is 69% males [ 93 ] and potentially making this environment more gender diverse may mean a greater emphasis for broader perspectives in understanding cyber terrorism to prevent, detect, and investigate terrorism effectively. Furthermore, recent statistics indicated that 34% of the MPs in the House of Commons are female [ 98 ]. Although this statistic has been referred to as record high, this nonetheless indicates a disparity in gender diversity within parliament which could be contributing to the difficulties in developing a unanimous definition of cyber terrorism to enable greater prevention strategies against terrorism. Overall, this finding alludes to the necessity for more gender diversity within stakeholders directly involved in detecting and preventing terrorist activity in the UK.

Age and Occupation Findings and Interpretations

ANOVA tests were carried out to establish whether or not age and occupation played a significant role in determining respondent answers. The overall results for age can be found in Table 3 , and the overall results for occupation can be found in Table 4 . Where the M or SD display ‘n/a’, this is indicative of results where respondents from a specific category did not respond to a specific question. This is most probably due to the rank questions only allowing three options to be chosen by each participant to rank in questions 9 and 11. In both these tables, the F value column displays that there were no significant findings with age or occupation. The non-significant results were analysed and the implications of these highlighted.

Discussion on Non-significant Results

The reporting of non-significant results has been much debated amongst academics, with various and differing approaches being encouraged [ 99 , 100 ]. However, it has been strongly posited that non-significant results should not be assumed to represent homogeneity amongst the sample population [ 101 , 102 ]. This is due to the fact that a non-significant result merely highlights what population parameter is unlikely, rather than what it is likely to be [ 103 ].

It can be assumed that the non-significant findings from this primary research were unable to present evidence for all the hypotheses. In order to determine whether a type I or type II error has occurred, replication of the study and re-analysis of the data would need to be carried out to better understand the non-significant results [ 103 ].

In the case of a type II error, it is important to discuss potential influential factors apart from gender, age, and occupation which could have influenced the sample population’s beliefs towards the survey questions, thus resulting in non-significant results. Most pertinent to this primary research is the impact which media outlets have potentially had in shaping perceptions surrounding cyber terrorism. In a contemporary society, the news has become more easily accessible through news media websites and social media platforms, which has increased the way in which public opinion is shaped due to the news’s gatekeeping process [ 32 , 104 , 105 ].

Although news media outlets are beneficial in making the public aware of current events, the implications could potentially be detrimental for stakeholders involved in detecting and preventing cyber terrorism. If public opinion has been shaped to believe that cyber terrorism mainly involves cyber dependent acts such as denial of service attacks, then this may be what the public look out for and subsequently report to the police (recent news examples include [ 106 , 107 , 108 ]). This leaves a gap in which cyber enabled acts of terrorism, such as online terrorist propaganda, may not be as reported by the public due to misconceptions. In turn, this potentially impacts the ability for police to prevent terrorist attacks due to online terrorist activity not being as reported. If a unanimous definition of cyber terrorism could be agreed upon, policy-makers and police could share this through news media outlets to enable the public to have a greater understanding of cyber terrorism, in turn encouraging individuals to identify and report both cyber enabled and cyber-dependent terrorism.

Qualitative Results

Analysis of the qualitative data from the online survey revealed important themes which were evident amongst the majority of the sample population. The qualitative analysis aimed to establish a more in depth understanding of what the public’s perceptions are towards cyber terrorism. Analysis highlighted that the majority of participants were generally in agreement, with only a small number of participants expressing more opposing views.

Among the 83 participants and across all the topical questions there were a total of 198 qualitative responses. Qualitative responses appeared to decline as the survey progressed, with the highest response rate to a single question being 75 responses and the lowest at 3 responses. This has the potential to lessen the validity and generalisability of all the qualitative responses; however, coupled with the quantitative data and the findings from the literature review, it may contribute in the justification for developing a cyber terrorism definition and framework. Figure  1 displays codes and themes from the qualitative analysis. In the discussion of the qualitative data, responses will be displayed as ‘PX’ where ‘P’ indicates ‘Participant’ and ‘X’ an identification number.

figure 1

Thematic analysis codes and themes from qualitative data. This figure displays the themes and codes which came to light throughout the qualitative analysis of the primary data collected. These themes and codes are reflective of the views and opinions held by the sample population, which are supported further with quotations in the analysis below

Victims of Cyber Terrorism

The first theme which emerged from the qualitative analysis of this research’s primary data collection was the distinction between the two victims of cyber terrorism. On the one hand, the ‘people’ victims of cyber terrorism were highlighted with concerns about “vulnerable” and “young” people raised by P1, P2 and P3, and “uninformed users” raised by P4 and P5. These groups were highlighted as victims of being groomed and recruited in to the terrorist group activity process, but also be victims of virtual and physical verbal attacks from cyber terrorists and extremists. On the other hand, there were also concerns highlighted towards the ‘system’ victims of cyber terrorism where participants included examples such as “data and resources” (P6), “power grids” (P7), and “interfaces” (P8 & P9). One individual (P10) referred to these more physical impacts of cyber terrorism as being “more traditionally what the term [terrorism] is associated with”.

The theme of cyber terrorist victims can be one which encourages confusion as there are different types of victims which could be encapsulated under the cyber terrorism umbrella. McGuire and Dowling’s [ 7 ] cyber enabled and cyber-dependent classification can be used to categorise victims of cyber terrorism which can further aid in developing a more concise classification. ‘Human victims’ of cyber terrorism can be victims of both cyber enabled and cyber dependent actions, which has been broken down further into ‘human victims of cyber dependent terrorism’ (for example, data theft) and ‘human victims of cyber-enabled terrorism’ (for example, verbal abuse on a social media platform). Systems who are victims of cyber terrorism can only be victims to cyber-dependent actions and, therefore, have been classed just as ‘system victims’ (for example, Ransomware attacks on national infrastructure for political gain). These classifications contribute to the development of a framework in this research.

However, it became apparent from the qualitative analysis that there is a blurred line between victims and offenders of terrorist activity with P11, P12 and P13 referring to there being an “ease for terrorists to recruit people” and “alter people’s way of thinking”. These qualitative findings are supported by the findings from the literature review highlighting the complexity in sometimes distinguishing between victim and perpetrator as a result of misconceptions from stakeholders affecting news media outlets [ 30 ]. Interestingly, although the individuals being recruited and groomed are in fact victims, in some cases they too become the offenders for the very things they were once victims of. This paradoxical concept can be better understood through the story of Shamima Begum who left the UK at the age of 15 after being recruited to join ISIS. Since the age of 19, she has been trying to return to the UK as she claims she did not expect to go through everything she did, despite her engaging in known terrorist activity [ 109 , 110 ]. The supreme court recently ruled that they could not allow Begum to return to the UK as this would create a significant national security risk [ 111 ].

As highlighted in Jaishankar’s Space Transition Theory [ 14 ], the anonymous nature of cyber environments allows individuals to hide their true identities which could enable individuals to transition from victim to perpetrator with more ease, either intentionally or inadvertently, further accentuated by cognitive inhibition effect and dissociative anonymity [ 50 , 51 ]. Understanding victims of cyber enabled and cyber dependent terrorist activity could also provide a clearer interpretation of motivated terrorist offenders. Overall, this thematic finding highlights disparities amongst respondents regarding cyber terrorist victims which could be due to the absence of an agreed upon definition and framework detailing what qualifies as a cyber terrorist act. Having a unanimous definition would, therefore, make a clearer distinction between victims and offenders of cyber terrorism.

Increase of Terrorist Online Presence

Another theme which emerged from the qualitative analysis was the way in which respondents emphasised how online capabilities have aided in expanding terrorist activity. P14 alluded to the notion that online platforms “help build a sense of community between members, assist in recruitment, and launch attacks”. Additionally, P15 highlighted the ability which terrorists have “to reach a global audience and form groups which reinforce each other”. There were concerns raised specifically regarding the impact which the COVID pandemic has had on terrorist activity. Although some participants highlighted the risk of terrorism as “lower than before due to COVID” (P16), others seemed to emphasise the advantageous aspects of COVID for terrorist activity as there being “more time to plan” (P17), and one participant nodded at cyber terrorism being “underreported” with the “true scale now being unknown but severe” (P18) due to its greater shift online.

It became evident throughout the qualitative data, that much of the sample population appeared to be mostly in agreement that the threat of terrorism posed through online capabilities is apparent. This is supported by the quantitative findings in Q10 and Q12 where ≥ 80% participants were in agreement that the cyber enabled and cyber dependent acts listed were classed as cyber terrorism. These results also support the findings from the literature review which found that terrorist activity is a process by which the smaller and perhaps less impactful activities are seen to have a domino effect on larger terrorist attacks [ 16 ]. For example, recruitment was identified by 12 participants throughout the qualitative responses which is a positive finding as it indicates that individuals are aware of its impact in the process of terrorist activity. In addition, this links back to the significant effect found on gender where males were more likely to rank recruitment and mobilisation higher than females in the quantitative results. Controversially to these findings, P19 stated that “terrorism, the act, is an offensive action, just recruitment and fundraising themselves are not terrorist acts” which was an opinion also raised by P20, P21 and P22. These qualitative findings highlight the presence of common misconceptions held by some individuals regarding cyber terrorism, which is supported by the findings from the literature review. The UK law in fact deems ‘Encouragement of Terrorism’ under The Terrorism Act 2006 [ 28 ] and ‘Finance and Money Laundering in relation to terrorism acts’ under The Terrorism Act 2000 [ 56 ], as common offences. Although it is positive that respondents appeared to mostly agree on cyber enabled and cyber dependent terrorist offences, the minority of people who did not agree could be only a small representation of the wider public.

In light of the aforementioned theme, the misunderstanding around terrorism offences could also be an attributing factor in causing the general public’s confusion around who is a victim or a perpetrator of cyber terrorism [ 18 , 30 ]. The public has a responsibility to report observed criminal activity, and if there is not enough awareness of cyber enabled and cyber dependent terrorism offences, this could have detrimental implications on the investigation and prosecution of cyber terrorist activity in the UK in line with the Action Counters Terrorism (ACT) campaign [ 112 ]. Understanding these detrimental effects of misconceptions amongst the general public, could suggest an urgent need for cyber terrorism to be unanimously defined incorporating both cyber enabled and cyber dependent aspects. Overall, these findings allude to the potential misconceptions held amongst the public regarding cyber terrorist activity; however, these cannot be generalised without replicating the study with the aim of gathering data from a larger sample population.

Regulation and Stakeholder Understanding

The qualitative analysis further highlighted a theme regarding the regulation of the internet and stakeholders’ involvement in this. The theme of regulation was not introduced to participants within the survey questions, unlike the previous themes, which perhaps highlights the importance of regulatory processes to the survey respondents, in the context of cyber terrorism. P23, in the context of online platforms, stated that these are “too free a space with little to no sense of regulation”, which was a popular opinion with other respondents using words such as moderation, monitor, and regulation on 19 occasions in the qualitative responses. The issue with the lack of regulation on online platforms was further identified by P24 stating “online platforms provide unchecked means of sharing material” and P25 further suggesting the notion of “rumoured safety measures in place”. Interestingly, positive connotations were not associated with regulation in the qualitative responses potentially indicating dissatisfaction regarding the current approaches to regulating online terrorist activity. This dissatisfaction could be a result of ambiguous guidelines on social media and online platform such as those referred to in qualitative responses—“Facebook” (P26 & P27) and “YouTube” (P28, P29, & P30).

YouTube guidelines state that terrorist organisations are not permitted to utilise their services to conduct a range of terrorist activity, for example, “praising or justifying violent acts carried out by a terrorist organisation” [ 113 ]. Facebook states that any entities, such as terrorist organisations, who engage in “serious offline harms” will be condemned alongside any content which praises, supports or represents terrorist organisations [ 114 ]. Problematically, these online platforms do not define the term ‘terrorism’. This means that when it comes to regulating and removing certain online content, the service providers can decide what is deemed terrorist or not according to their own perceptions. Looking at the recent conflict between Israel and Palestine, Hamas, a proscribed terrorist organisation [ 115 ], fired rockets into Israel from the Gaza strip due to political and religious differences [ 116 , 117 ]. At the time of these events, there was justification and condoning across online platforms for the violent actions directed at Israel from Hamas despite Hamas’ recognition as a terrorist organisation. Furthermore, media platforms such as YouTube and Facebook condemned Israel’s actions, and justification for their retaliation was taken down as ‘misinformation’. A more recent example is the Plymouth shooting. Jake Davison, who practiced hate speech against women, incited violence and spoke about his ‘incel’ (involuntary celibate) alignment on YouTube, killed five innocent individuals [ 118 , 119 ]. Davison had just short of 100 subscribers on his YouTube channel, and these were 100 missed opportunities to detect this terrorist activity prior to his online terrorist behaviour becoming a physical attack.

These unclear guidelines which are used to regulate online terrorist activity are evidently biased and counterproductive, which may be the reason for the dissatisfaction towards regulating cyber terrorism highlighted from some of the survey respondents. Furthermore, with repressed behaviour in physical environments due to the COVID pandemic [ 2 , 14 , 53 ], this may encourage online terrorist activity alongside the lack of collaborative regulation. The implications of this are that direct stakeholders involved in combatting online terrorist activity, including online platform providers and law enforcement, are perhaps not able to do so effectively due to the absence of a unanimously agreed upon definition. Perhaps a collaborative approach could ensure clearer regulatory guidelines and may further enable the future instalment of the draft Online Safety Bill [ 60 ] to be more effective.

Q13 from the survey found that 90% of respondents overall agreed that a definition could enable stakeholders to better understand cyber terrorism, in turn aiding in the detection and prevention of terrorist activity. Although this question only received 10 qualitative responses, ‘stakeholders’ were referred to in qualitative responses from other questions, with direct mentions being made of the police, policy makers, and online platforms. P31 stated that “If you don’t consider something a crime or a precursor to a crime, you won’t be looking for it” indicating that unless something is defined as a crime, it will not be identified and reported as such. Furthermore, P32 claimed that there is a need for stakeholders to “understand the objectives of the terrorist and the means used to execute their plans”. As discussed in the literature review, pre-curser crimes could include recruitment, training, or disseminating propaganda which are initial phases in the terrorist activity process [ 16 ]. Therefore, P31 and P32 could be implying that these pre-cursor terms are not clearly defined under cyber terrorism which perhaps indicates an absence of these activities not being policed effectively due to a lack of understanding of terrorist motivations. However, much of the regulation of the internet is controlled by the service providers, and therefore, a more collaborative approach from various stakeholders would perhaps be the most effective way to combat online terrorist activity. This collaborative approach would also ensure that public users of online platforms are safer and more aware of what they can report as terrorist activity, in turn countering future threats posed by terrorism.

Defining Cyber Terrorism

The survey asked participants to expand on how they would define cyber terrorism, and this question received the highest rate of responses from 75 participants. Some respondents classified cyber terrorism into binary models such as “hard and soft” (P33) and “enabled and dependent” (P34). Interestingly, of the 75 responses received for this question, only 40% incorporated terrorism that is both enabled by and dependent on cyber capabilities in their proposed definitions. The remaining 60% of respondents focussed on either cyber enabled or cyber dependent activity. This highlights the confusion that exists within the general public and could be reflective of the general misconceptions which exist, emphasising the need for a unanimous definition of cyber terrorism.

Respondents mostly used the ‘cyber’ prefix within their definitions, with fewer using terms such as ‘online’, ‘technology’, ‘internet’ and ‘virtual’. For example, P35 defined cyber terrorism as “terrorism that uses the cyber domain as a space to carry out its actions”, and P36 stated “cyber terrorism is when terrorist organisations enter cyber space and instrumentalise the internet to carry out violence”. However, P37 highlighted it as the “use of electronic interventions or resources to disrupt online systems or operations”. Despite Gordon and Ford’s [ 44 ] belief that the cyber prefix is not an effective term, the qualitative results find that this is a term which the respondents appear to be familiar with, which could be reflective of the general public’s views. Therefore, attempting to change the cyber prefix to something else, such as Computer Network Operations or Information Warfare [ 38 ], could potentially cause further confusion. These findings, coupled with the literature review, imply that a cyber terrorism definition could encapsulate a classification between enabled and dependent activity. The implications of a clearer definition, as discussed above in the aforementioned themes, would enable stakeholders including law enforcement, online platform providers, policy makers, and prosecution services to work collaboratively towards a unified goal. This may further enhance the public’s understanding of what they could be identifying and reporting in line with the ACT campaign [ 112 ].

Establishing a New Approach Towards Cyber Terrorism

In the context of the findings from the literature review and the collected primary data, this research posits a new definition and framework of cyber terrorism which could be utilised by stakeholders directly involved in preventing, detecting, investigating and prosecuting cyber terrorism.

Cyber Terrorism Definition

The development of a cyber terrorism definition aimed to gather the strengths of previously discussed definitions and incorporate them in a clear and more concise manner that can be easily understood. The most important factor which was considered for a cyber terrorism definition to be used by UK stakeholders, was the need for it to be compatible with the definition of Terrorism outlined in The Terrorism Act 2000 [ 56 ], The Terrorism Act 2006 [ 28 ], The Counter-Terrorism Act 2008 [ 29 ], and The Counter-Terrorism and Border Security Act 2019 [ 57 ]. In addition, themes from the Foltz [ 42 ], Holt [ 43 ], and Plotnek and Slay [ 45 ] definitions have been considered and prioritised for incorporation in this research’s proposed definition. Referring back to the literature review, terrorism as a concept evolves with the times, and henceforth, a cyber terrorism definition should be versatile to ensure its applicability to unpredictable future developments within terrorist techniques. Having identified the most critical components to develop a definition that is both concise and compatible with the legal definition of terrorism in the UK, (binary ‘means’ classification, motive, intent, and target) the following definition is proposed:

“Cyber terrorism encapsulates cyber enabled activity which intends to advance political, social, or religious ideologies against the public, and cyber dependent activity which further intends to threaten or facilitate damage against the public, properties, and/or systems. Cyber terrorism has the potential to coincide with traditional terrorism”.

As identified throughout this research, a clear definition of cyber terrorism could enable a more collaborative approach amongst stakeholders in preventing, detecting, investigating, and prosecuting cyber terrorism. Although this definition is not as lengthy and detailed as some of the other definitions analysed [ 41 , 43 , 45 ], the findings highlighted that a simpler definition with fewer clauses provides greater clarity, encouraging a more unanimous approach across various stakeholders. Overall, by having a clear definition outlined for those involved in detecting and preventing cyber terrorism, this could improve the way in which stakeholders combat the overall threat of terrorism, subsequently enabling the media to relay more accurate information to the public regarding cyber terrorist activity. This could in turn make the public more confident in identifying and reporting terrorist and cyber terrorist activity in line with ACT [ 112 ].

Cyber Terrorism Framework

The development of a framework for cyber terrorism aimed to clearly highlight what kind of terrorist activity occurs in cyber space, the process, and the links between traditional and cyber terrorism. Using the Smith et al. [ 16 ] categorisation of traditional terrorist activity, this research proposes a similar approach by incorporating McGuire and Dowling’s [ 7 ] cyber enabled and cyber dependent dual binary model. As this model has already been adopted by the Crown Prosecution Service to classify and prosecute cybercrimes, it is perhaps important that the same binary model be used to classify cyber terrorism for collaborative work amongst law enforcement and prosecuting services.

Based on this research’s proposed definition, a ternary approach is suggested as this highlights the inextricable links between traditional, cyber enabled and cyber dependent terrorism. A proposed ternary model can be seen in the Terrorist Activity Framework in Fig.  2 .

figure 2

Terrorist activity framework entailing cyber terrorism—developed from [ 7 , 16 ]. This figure displays a framework which highlights cyber terrorist activity’s life cycle. It highlights cyber enabled terrorist activity, cyber-dependent terrorist activity and traditional terrorist activity with arrows to show the links between these three components. This framework is put forward from this paper’s findings to better aid stakeholders in more collaboratively tackling terrorism

This cyber terrorism framework highlights the similarities across the three identified types of terrorism and further accentuates how each of them link into one another with the use of arrows. The different pathways all lead to examples of ‘terrorist acts’, however, it is important to acknowledge that the first three stages leading up to the fourth stage all have the potential to be occurring simultaneously. In addition, the first three stages in the cyber-enabled pathway have the opportunity to branch out to the fourth stage in the traditional and cyber dependent pathways as much of cyber-enabled activity can be supporting activity for the other pathways. It is further important to highlight that the ‘recruitment’ stage in traditional terrorism and cyber-enabled terrorism has the ability to remain active throughout the whole process as these activities are not specific to a single terrorist attack. Therefore, stakeholders should consider these ongoing background processes when detecting traditional terrorism and cyber terrorism. Although this framework is limited as it does not list every single type of terrorist offence under each pathway, it nonetheless highlights a few examples which can better inform law enforcement of the intricate relations between each pathway to improve investigative practices in countering terrorism.

Recommendations and Conclusion

This paper, and the research within, intended to contribute to current academic and professional discussion regarding cyber terrorism and how it is defined and understood amongst UK stakeholders involved in preventing, detecting, investigating and prosecuting cyber terrorism. Through critically analysing currently established definitions, theories and frameworks related to cyber terrorism, this research highlighted the problematic nature in the lack of a unanimous understanding. In light of this, a new cyber terrorism definition was proposed which incorporates cyber enabled and cyber dependant activity. Furthermore, by developing Smith et al.’s [ 16 ] terrorist activity process, this research proposed a potential ternary framework which could be utilised by UK stakeholders to gain a better understanding of cyber terrorist behaviours and their inextricable links to traditional terrorism. Although the definition and framework concisely define and classify cyber terrorism in light of the findings from the literature review and the primary data collection, further editing from stakeholders would be recommended to ensure complete compatibility with UK legislation, and stakeholder procedures. Subsequently, this research recommends that specific legislation regarding cyber terrorism be developed to support UK stakeholders in preventing, detecting, investigating and prosecuting cyber terrorist activity. Furthermore, although this paper specifically analysed the necessity for a definition and framework in context of the United Kingdom, this proposed definition and framework are nonetheless generic and could, therefore, potentially be adopted for use by other nations. In doing so, a more collaborative international approach could be established to increase the efficacy of countering cyber terrorist activity, overall better securing society from the risk of terrorism.

The secondary aim of this research was to determine what the public’s perception of cyber terrorism was through a mixed methods primary data collection approach. The quantitative data highlighted a gender effect on questions regarding recruitment as a cyber-enabled terrorist act, and stakeholder understanding in the context of combatting cyber terrorism. However, the rest of the quantitative data were non-significant and as a result of this, there was not sufficient evidence to substantiate some of the hypotheses surrounding demographic effect on topical questions. In light of the non-significant data, this research further recommends that the primary research be replicated and shared out to a wider audience to generate a larger sample population and determine whether the non-significant results from the primary data collection are due to type I or type II errors [ 90 , 103 ]. By gathering a clearer and more generalised understanding of the public’s views, UK stakeholders can better identify what the general public’s perception is, which could better inform clearer campaigns to educate the public on identifying and reporting cyber terrorist activity.

The literature review highlighted that news media outlets can have an effect on the way in which the public understand a matter, and analysis of the non-significant findings suggested that in the case of a type II error, this could be due to news media outlets’ gatekeeping role in disseminating information regarding cyber terrorism to the public [ 32 , 104 ]. Therefore, this research recommends that further research be carried out regarding the correlation between news media outlets which individuals read/listen to, and their perceptions of traditional and cyber terrorism.

Overall, this research has offered an insight into how cyber terrorism could be defined and classified for UK stakeholders as part of the search for the ‘holy grail’ [ 1 ]. This research specifically highlighted the importance of correlating a new definition and framework with UK legislation for enhanced compatibility and effectiveness. In current times with the COVID pandemic enabling the evolution of terrorist activity [ 2 ], it is ever more important to clearly understand and adapt stakeholder procedures in countering cyber terrorism in the UK.

Availability of Data and Material

Raw data not available.

Code Availability

Not applicable.

Perry NJ. The numerous federal legal definitions of terrorism: the problem of too many grails. J Legis. 2004;30(2):249–74.

Google Scholar  

Tony Blair Institute for Global Change. Snapshot: how extremist groups are responding to COVID-19. Tony Blair Institute for Global Change. 2020. https://institute.global/sites/default/files/2020-05/Snapshot%203%20COVID19%20V02.pdf

Bieda D, Halawi L. Cyberspace: a venue for terrorism. Issues Inf Syst. 2015;16(3):33–42.

Arora B. Exploring and analysing Internet crimes and their behaviours. Perspect Sci. 2016;8:540–2. https://doi.org/10.1016/j.pisc.2016.06.014 .

Article   Google Scholar  

Marsili M. The war on cyberterrorism. Democr Secur. 2018;15(2):172–99. https://doi.org/10.1080/17419166.2018.1496826 .

Luiifj E. Definitions of cyber terrorism. In: Staniforth A, Bosco F, editors. Cyber crime and cyber terrorism investigator’s handbook. Amsterdam: Elsevier Science; 2014. p. 11–7.

McGuire M, Dowling S. Cybercrime: a review of the evidence: summary of key findings and implications. Home Office Research Report 75. London: Home Office, October. 2013. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/246749/horr75-summary.pdf

Home Office. Operation of police powers under the Terrorism Act 2000 and subsequent legislation: arrests, outcomes and stop and search Great Britain, financial year ending March 2020. Home Office National Statistics. 2020. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/891341/police-powers-terrorism-mar2020-hosb1520.pdf

Home Office. Operation of police powers under the Terrorism Act 2000 and subsequent legislation: arrests, outcomes, and stop and search Great Britain, year ending March 2021. 2021. https://www.gov.uk/government/statistics/operation-of-police-powers-under-the-terrorism-act-2000-financial-year-ending-march-2021/operation-of-police-powers-under-the-terrorism-act-2000-and-subsequent-legislation-arrests-outcomes-and-stop-and-search-great-britain-year-ending#arrests-and-outcomes

Kshetri N. The global cybercrime industry. Berlin: Springer; 2010.

Book   Google Scholar  

Bernat F, Makin D. Cybercrime theory and discerning if there as a crime: the case of digital piracy. Int Rev Mod Sociol. 2014;40(2):99–119.

Yunos Z, Sulaman S. Understanding cyber terrorism from motivational perspectives. J Inf Warf. 2017;16(4):1–13.

Helbing D, Brockmann D, Chadefaux T, Donnay K, Blanke U, Woolley-Meza O, Moussaid M, Johansson A, Krause J, Schutte S, Perc M. Saving human lives: what complexity science and information systems can contribute. J Stat Phys. 2014;158:735–81. https://doi.org/10.1007/s10955-014-1024-9 .

Article   MathSciNet   MATH   Google Scholar  

Jaishankar K. Establishing a theory of cyber crimes. Int J Cyber Criminol. 2007;1(2):7–9. https://doi.org/10.5281/ZENODO.18792 .

Cohen LE, Felson M. Social change and crime rate trends: a routine activity approach. Am Sociol Rev. 1979;44(4):588–608. https://doi.org/10.2307/2094589 .

Smith BL, Cothren J, Roberts P, Damphousse KR. Geospatial analysis of terrorist activities: the identification of spatial and temporal patterns of preparatory behaviour of international and environmental terrorists. Terror Res Center Fulbright Coll. 2008;222909:14.

Enders W, Sandler T. The political economy of terrorism. 2nd ed. Cambridge: Cambridge University Press; 2012.

Hoffman B. Inside terrorism. 3rd ed. New York: Colombia University Press; 2017.

Sandler T. Terrorism and counterterrorism: an overview. Oxf Econ Pap. 2015;67(1):1–20. https://doi.org/10.1093/oep/gpu039 .

Anderson D. Shielding the compass: how to fight terrorism without defeating the law. SSRN Electron J. 2013. https://doi.org/10.2139/ssrn.2292950 .

Greene A. Defining terrorism: one size fits all? Int Comp Law Q. 2017;66(2):411–40. https://doi.org/10.1017/S0020589317000070 .

Hewer CJ, Taylor W. Deconstructing terrorism: Politics, language and social representation. In: Roberts R, editor. Just war: psychology and terrorism. London: PCCS Books; 2007. p. 199–212.

Monroe KR, Kreidie LH. The perspective of Islamic fundamentalists and the limits of rational choice theory. Polit Psychol. 2002;18(1):19–43. https://doi.org/10.1111/0162-895X.00043 .

Lee RD. Religion and politics in the Middle East. 2nd ed. New York: Routledge; 2013.

Fox J. Separation of religion and state and secularisation in theory and in practice. Relig State Soc. 2011;39(4):384–401. https://doi.org/10.1080/09637494.2011.621675 .

Nikfar J. Globalisation and future of power relations in the Arabic Middle-East: a case study of Egypt and Libya. Humanit Soc Sci Commun. 2020;7:134. https://doi.org/10.1057/s41599-020-00631-7 .

Stocchetti M. The politics of fear: A critical inquiry into the role of violence in 21st century politics. In: Hodges A, Nilep C, editors. Discourse, war and terrorism. Amsterdam: John Benjamin’s Publishing Company; 2007. p. 223–48.

Chapter   Google Scholar  

Terrorism Act 2006, c.11. 2006. https://www.legislation.gov.uk/ukpga/2006/11/contents

Counter-Terrorism Act 2008, c.28. 2008. https://www.legislation.gov.uk/ukpga/2008/28/contents

Fine J. Political and philological origins of the term ‘terrorism’ from the ancient near east to our times. Middle East Stud. 2010;46(2):271–88.

Lewin K. Frontiers in group dynamics: II. Channels of group life; social planning and action research. Hum Relat. 1947;1(2):143–53. https://doi.org/10.1177/001872674700100201 .

Shoemaker PJ, Vos T. Gatekeeping theory. 1st ed. Amsterdam: Routledge; 2009.

White DM. The “Gate Keeper”: a case study in the selection of news. Journal Mass Commun Q. 1950;27(4):383–90. https://doi.org/10.1177/107769905002700403 .

Tabansky L. Basic concepts in cyber warfare. Mil Strateg Aff. 2011;3(1):75–92.

Weiner N. Cybernetics or control and communication in the animal and the machine. London: MIT Press; 1948.

Gibson W. Neuromancer. London: Orion Publishing Co.; 1948.

Collin J, Flutter A. Reassessing the revolution in military affairs: transformation evolution and lessons learnt. London: Palgrave; 2015.

Flutter A. ‘Cyber’ semantics: why we should retire the latest buzzword in security studies. J Cyber Policy. 2018;3(2):201–16. https://doi.org/10.1080/23738871.2018.1514417 .

Lehto M, Huhtinen A, Jantunen S. The open definition of cyber: technology or a social construction? Int J Cyber Warf Terror. 2011;1(2):1–9. https://doi.org/10.4018/ijcwt.2011040101 .

Conway M. Reality check: assessing the (un)likelihood of cyberterrorism. In: Chen TM, Jarvis L, Macdonald S, editors. Cyberterrorism: understanding, assessment, and response. Berlin: Springer; 2014. p. 103–21.

Denning DE. A view of cyberterrorism 5 years later. In: Himma KE, editor. Internet security: hacking, counterhacking, and society. Burlington: Jones and Bartlett Publishers; 2006. p. 123–39.

Foltz BC. Cyberterrorism, computer crime, and reality. Inf Manag Comput Secur. 2004;12(2):154–66. https://doi.org/10.1108/09685220410530799 .

Holt TJ. Exploring the intersections of technology, crime, and terror. Terror Polit Violence. 2012;24(2):337–54. https://doi.org/10.1080/09546553.2011.648350 .

Gordon S, Ford R. Cyberterrorism? Comput Secur. 2002;21(7):636–47. https://doi.org/10.1016/S0167-4048(02)01116-1 .

Plotnek JJ, Slay J. Cyber terrorism: a homogenized taxonomy and definition. Comput Secur. 2021;102:1–9. https://doi.org/10.1016/j.cose.2020.102145 .

Choi KS, Lee CS. The present and future of cybercrime, cyberterrorism, and cybersecurity. Int J Cybersecur Intell Cybercrime. 2018;1(1):1–4.

Choi KS. Computer crime victimisation and integrated theory: an empirical assessment. Int J Cyber Criminol. 2008;2(1):308–33.

McQuade SC. Understanding and managing cybercrime. London: Pearson; 2006.

Choi KS, Scott TM, LeClair DP. Ransomware against police: diagnosis of risk factors via application of cyber-routine activities theory. Int J Forensic Sci Pathol. 2016;4(7):253–8. https://doi.org/10.19070/2332-287X-1600061 .

Suler J. The online disinhibition effect. Cyber Psychol Behav. 2004;7(3):321–6. https://doi.org/10.1089/1094931041291295 .

Agustina JR. Understanding cyber victimization: digital architectures and the disinhibition effect. Int J Cyber Criminol. 2015;9(1):35–54. https://doi.org/10.5281/zenodo.22239 .

Lee CS, Choi KS, Shandler R, Kayser C. Mapping global cyberterror networks: an empirical study of Al-Qaeda and ISIS cyberterrorism events. J Contemp Crim Justice. 2021;37(3):333–55. https://doi.org/10.1177/10439862211001606 .

Stalans LJ, Finn MA. Understanding how the internet facilitates crime and deviance. Vict Offenders. 2016;11(4):501–8. https://doi.org/10.1080/15564886.2016.1211404 .

Crown Prosecution Service. Terrorism. 2021. https://www.cps.gov.uk/crime-info/terrorism

Wilkinson P. Terrorism. In: Gill M, editor. The handbook of security. London: Palgrave; 2006.

Terrorism Act 2000, c.11. 2000. https://www.legislation.gov.uk/ukpga/2000/11/contents

Counter-Terrorism and Border Security Act 2019, c.3. 2019. https://www.legislation.gov.uk/ukpga/2019/3/contents/enacted

Bertram L. Terrorism, the internet and the social media advantage: Exploring how terrorist organisations exploit aspects of the internet, social media and how these same platforms could be used to counter-violent extremism. J Deradicalisation. 2016;7:225–52.

Holt TJ. Regulating cybercrime through law enforcement and industry mechanisms. Ann Am Acad Polit Soc Sci. 2018;679(1):140–57. https://doi.org/10.1177/0002716218783679 .

Department for Digital, Culture, Media and Sport. Draft Online Safety Bill (CP405). London. 2021. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/985033/Draft_Online_Safety_Bill_Bookmarked.pdf

Wingfield R. First thoughts on the UK’s Draft Online Safety Bill. Global Partners Digital. 2021. https://www.gp-digital.org/first-thoughts-on-the-uks-draft-online-safety-bill/

Woods L, Perrin W. The Draft Online Safety Bill: Carnegie UK Trust initial analysis. Carnegie UK Trust. 2021. https://www.carnegieuktrust.org.uk/blog/the-draft-online-safety-bill-carnegie-uk-trust-initial-analysis/

Crown Prosecution Service. Cybercrime - Prosecution Guidance. 2019. https://www.cps.gov.uk/legal-guidance/cybercrime-prosecution-guidance

Archibald MM, Radil AI, Zhang X. Current mixed methods practices in qualitative research: a content analysis of leading journals. Int J Qual Methods. 2017;14(2):5–33. https://doi.org/10.1177/160940691501400205 .

Brannen J. Mixing methods the entry of qualitative and quantitative approaches into the research process. Int J Soc Res Methodol. 2007;8(3):173–84. https://doi.org/10.1080/13645570500154642 .

Guthrie G. Basic research methods: an entry to social science research. London: SAGE Publications; 2010.

Hatch MJ. Organisation theory: modern, symbolic and postmodern perspectives. Oxford: Oxford University Press; 2012.

Elmir R, Schmied V, Jackson D, Wilkes L. Interviewing people about potentially sensitive topics. Nurse Res. 2011;19(1):12–6. https://doi.org/10.7748/nr2011.10.19.1.12.c8766 .

Evans JR, Mathur A. The value of online surveys. Internet Res. 2005;15(2):195–219. https://doi.org/10.1108/10662240510590360 .

Lewis-Beck MS, Bryman A, Liao TF. The SAGE encyclopedia of social science research methods. London: SAGE Publications; 2004.

Sue VM, Ritter LA. Conducting online surveys. London: SAGE Publications; 2012.

Jisc Online Surveys. Jisc Online Survey Tool. 2021. https://www.onlinesurveys.ac.uk/

Etikan I, Musa SA, Alkassim RS. Comparison of convenience sampling and purposive sampling. Am J Theor Appl Stat. 2015;5(1):1–4. https://doi.org/10.11648/j.ajtas.20160501.11 .

Jager J, Putnick DL, Bornstein MH. More than just convenient: the scientific merits of homogeneous convenience samples. Monogr Soc Res Child Dev. 2017;82(2):13–30. https://doi.org/10.1111/mono.12296 .

Andrade C. The inconvenient truth about convenience and purposive samples. Indian J Psychol Med. 2020;43(1):86–8. https://doi.org/10.1177/0253717620977000 .

Balter F, Brunet I. Social research 2.0: virtual snowball sampling method using Facebook. Internet Res. 2012;22(1):57–74. https://doi.org/10.1108/10662241211199960 .

Andrade C. The limitations of online surveys. Indian J Psychol Med. 2020;42(6):575–6. https://doi.org/10.1177/0253717620957496 .

Brace I. Questionnaire design: how to plan, structure and write survey material for effective market research. 4th ed. London: Kogan Page; 2018.

Miller RL, Acton C, Fullerton DA, Maltby J. SPSS for social scientists. London: Palgrave Macmillan; 2002.

Ozgur C, Kleckner M, Li Y. Selection of statistical software for solving big data problems: a guide for businesses, students and universities. SAGE Open. 2015;5(2):1–12. https://doi.org/10.1177/2158244015584379 .

Stehlik-Barry K, Babinec AJ. Data analysis with IBM SPSS statistics. Birmingham: Packt Publishing; 2017.

Lester JN, Cho Y, Lochmiller CR. Learning to do qualitative data analysis: a starting point. Hum Resour Dev Rev. 2020;19(1):94–106. https://doi.org/10.1177/1534484320903890 .

Busetto L, Wick W, Gumbinger C. How to use and assess qualitative research methods. Neurol Res Pract. 2020;2(14):1–10. https://doi.org/10.1186/s42466-020-00059-z .

Fossey E, Harvey C, McDermott F, Davidson L. Understanding and evaluating qualitative research. Austral N Z J Psychiatry. 2002;36(6):717–32. https://doi.org/10.1046/j.1440-1614.2002.01100.x .

British Society of Criminology. Statement of ethics. British Society of Criminology. 2015. https://www.britsoccrim.org/documents/BSCEthics2015.pdf

Data Protection Act 2018, c.12. 2018. https://www.legislation.gov.uk/ukpga/2018/12/contents/enacted

Hoffman ML. Sex differences in empathy and related behaviours. Psychol Bull. 1977;84(4):712–22. https://doi.org/10.1037/0033-2909.84.4.712 .

Mestre MV, Samper P, Frías MD, Tur AM. Are women more empathetic than men? A longitudinal study in adolescence. Span J Psychol. 2013;12(1):76–83. https://doi.org/10.1017/S1138741600001499 .

Szucs D, Ioannidis JPA. Empirical assessment of published effect sizes and power in the recent cognitive neuroscience and psychology literature. PLoS Biol. 2021;15(3):1–18. https://doi.org/10.1371/journal.pbio.2000797 .

Goodman S. A dirty dozen: twelve p-value misconceptions. Semin Hematol. 2008;45(3):135–40. https://doi.org/10.1053/j.seminhematol.2008.04.003 .

Speckhard A, Ellenberg MD. ISIS in their own words: recruitment history, motivations for joining, travel, experiences in ISIS, and disillusionment over time – analysis of 220 in-depth interviews of ISIS returnees, defectors and prisoners. J Strateg Secur. 2020;13(1):82–127.

Kruglanski AW, Gunaratna R, Ellenberg M, Speckhard A. Terrorism in time of the pandemic: exploiting mayhem. Glob Secur. 2020;5(1):121–32. https://doi.org/10.1080/23779497.2020.1832903 .

Home Office. Police workforce, England and Wales, as at 31 March 2020 second edition. Home Office National Statistics. 2020. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/955182/police-workforce-mar20-hosb2020.pdf

Profeta P. Gender equality in decision-making positions: the efficiency gains. Intereconomics. 2017;52:34–7. https://doi.org/10.1007/s10272-017-0640-4 .

Rose C. Does female board representation influence firm performance? The Danish Evidence. Corp Gov Int Rev. 2007;15(2):404–13. https://doi.org/10.1111/j.1467-8683.2007.00570.x .

Sarhan AA, Ntim CG, Al-Najjar B. Board diversity, corporate governance, corporate performance and executive pay. Int J Financ Econ. 2018;24(2):761–86. https://doi.org/10.1002/ijfe.1690 .

Van Der Walt N, Ingley C. Board dynamics and the influence of professional background, gender and ethnic diversity of directors. Corp Gov Int Rev. 2003;11(3):218–34. https://doi.org/10.1111/1467-8683.00320 .

Uberoi E, Watson C, Mutebi N, Danechi S, Bolton P. Women in politics and public life (Breifing Paper Number 01250). House of Commons Library. 2021. https://researchbriefings.files.parliament.uk/documents/SN01250/SN01250.pdf

Hartgerink CHJ, Wicherts JM, Van Assen MALM. Too good to be false: nonsignificant results revisited. Collabra. 2017;3(1):1–18. https://doi.org/10.1525/collabra.71 .

Visentin DC, Cleary M, Hunt GE. The earnestness of being important: reporting non-significant statistical results. J Adv Nurs. 2019;76(4):917–9. https://doi.org/10.1111/jan.14283 .

Greenland S, Senn SJ, Rothman KJ, Carlin JB, Poole C, Goodman SN, Altman DG. Statistical tests, P values, confidence intervals and power: a guide to misinterpretations. Eur J Epidemiol. 2016;31:337–50. https://doi.org/10.1007/s10654-016-0149-3 .

Higgins JPT, Thompson SG, Deeks JJ, Altman DG. Measuring inconsistency in meta-analysis. BMJ. 2003;327(557):557–60. https://doi.org/10.1136/bmj.327.7414.557 .

Aberson C. Interpreting null results: improving presentation and conclusions with confidence intervals. J Artic Supp Null Hypothesis. 2002;1(3):36–42.

Vermeer S, Trilling D, Kruikemeier S, Vreese C. Online news user journeys: the role of social media, news websites, and topics. Digit J. 2020;8(9):1114–41. https://doi.org/10.1080/21670811.2020.1767509 .

Welbers K, Opgenhaffen M. Social media gatekeeping: an analysis of the gatekeeping influence of newspapers’ public Facebook pages. New Media Soc. 2018;20(12):4728–47. https://doi.org/10.1177/1461444818784302 .

Boris T. Russian hackers target president Vladimir Putin’s Phone-In, Major Telco Confirms cyberattack. Tech Times. 2021. https://www.techtimes.com/articles/262260/20210701/hackers-cyber-attack-russian-president-putin-s-phone-in.htm

Robinson C. Northern’s ticket machines hit by ransomware cyber attack. BBC News. 2021. https://www.bbc.co.uk/news/uk-england-57892711

Russon M. US fuel pipeline hackers ‘didn’t mean to create problems’. BBC News. 2021. https://www.bbc.co.uk/news/business-57050690

BBC News.. Shamima Begum: ‘I didn’t want to be IS poster girl’. BBC News. 2021. https://www.bbc.co.uk/news/uk-47276572

Casciani D. Shamima Begum: What can the UK do about the IS teenager?. BBC News. 2019. https://www.bbc.co.uk/news/uk-47240100

BBC News. Shamima Begum cannot return to UK, Supreme Court rules. BBC News. 2021. https://www.bbc.co.uk/news/uk-56209007

Home Office. CONTEST the United Kingdom’s strategy for countering terrorism. 2018. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/716907/140618_CCS207_CCS0218929798-1_CONTEST_3.0_WEB.pdf

YouTube. YouTube Policies Violent Criminal Organisations Policy. YouTube Help. 2021. https://support.google.com/youtube/answer/9229472?hl=en&ref_topic=9282436

Facebook. Community standards violence and criminal behaviour. Facebook Community Standards. 2021. https://www.facebook.com/communitystandards/violence_criminal_behavior

Home Office. Proscribed terrorist groups or organisations. Gov UK. 2021. https://www.gov.uk/government/publications/proscribed-terror-groups-or-organisations--2/proscribed-terrorist-groups-or-organisations-accessible-version

Holmes O, Beaumont P. Israel launches airstrike on Gaza Strip after Hamas rocket attacks. The Guardian. 2021. https://www.theguardian.com/world/2021/may/10/hamas-fires-rockets-into-israel-in-dispute-over-jerusalem-mosque

Srivastava M. Hamas rocket attacks provoke Israeli retaliation in Gaza. Financial Times. 2021. https://www.ft.com/content/887f0b34-1e08-428c-92c0-603e7830ba5b

Bancroft H, Mathers M, Tidman Z. Jake Davison named as Plymouth shooter: what we know so far. The Independent. 2021. https://www.independent.co.uk/news/uk/home-news/jake-davison-plymouth-shooting-b1901948.html

Hardy J, Gardner B, Lyons I. ‘I am a terminator’ boasted Plymouth gunman Jake Davison in final YouTube video before rampage. The Telegraph. 2021. https://www.telegraph.co.uk/news/2021/08/14/plymouth-shooting-gunman-said-terminator-final-youtube-video/?li_source=LI&li_medium=liftigniter-onward-journey

Download references

Author information

Authors and affiliations.

School of Criminology and Criminal Justice, University of Portsmouth, University House, Winston Churchill Avenue, Portsmouth, PO1 2UP, UK

Victoria Jangada Correia

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Victoria Jangada Correia .

Ethics declarations

Conflict of interest.

The corresponding author states that there are no conflicts of interest.

Ethical Approval

Favourable ethical opinion granted by the School of Criminology and Criminal Justice Ethics Committee from the University of Portsmouth on 05/03/2021.

Consent to Participate

Consent for publication, additional information, publisher's note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the topical collection “Cyber Security and Privacy in Communication Networks” guest-edited by Rajiv Misra, R K Shyamsunder, Alexiei Dingli, Natalie Denk, Omer Rana, Alexander Pfeiffer, Ashok Patel and Nishtha Kesswani.

figure a

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ .

Reprints and permissions

About this article

Jangada Correia, V. An Explorative Study into the Importance of Defining and Classifying Cyber Terrorism in the United Kingdom. SN COMPUT. SCI. 3 , 84 (2022). https://doi.org/10.1007/s42979-021-00962-5

Download citation

Received : 28 September 2021

Accepted : 04 November 2021

Published : 24 November 2021

DOI : https://doi.org/10.1007/s42979-021-00962-5

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Cyber terrorism
  • Counter terrorism
  • Cyber crime
  • Find a journal
  • Publish with us
  • Track your research

U.S. flag

An official website of the United States government

Here’s how you know

Official websites use .gov A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS A lock ( Lock A locked padlock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

  • Content Archive

Archived Content

How to access the terrorism prevention literature library.

The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) developed a comprehensive and publicly available literature review and ontology dashboard to organize Targeted Violence and Terrorism Prevention (TVTP) literature. This new capability streamlines the ability for end users and practitioners to access peer-reviewed and methodologically sound research products to develop an evidence base in the field of terrorism prevention for what works, what doesn’t, and why.

To develop this capability, S&T reviewed TVTP articles published in peer-reviewed journals on topics such as current TVTP research, existing TVTP research, and evaluations of TVTP programs. Queries focused on major TVTP concepts such as diversion, mitigation, resilience, program evaluations, transferrable programs, and international programs.

Articles in the ontology dashboard are searchable by Title, Author, Abstract, Author Keywords, and Themes (also known as nodes). Articles are hierarchically organized in the dashboard, which can show relatedness through parent and child nodes. For instance, an article about a diversion program in the UK would be coded under diversion programs and international programs. Content was coded through two qualitative approaches: content analysis and ground theory coding. The coding process was iterative, allowing for changes and additions as new themes and understandings emerged.

CVE Ontology Dashboard Platform

Mendeley – a free and publicly accessible desktop application and website that allows users to manage, share, and discover content and authors for research – was selected to host the literature library. Mendeley offers both a downloadable desktop application and web-based mode.

Desktop Features

  • Automatic extraction of bibliographic information
  • Full-text search (including grep) as well as filters (authors, keywords, etc.)
  • Sharing of library with colleagues

Website Features

  • Online backup of library
  • Ability to “follow” topics and authors as new research becomes available and recommendations for similar papers and topics based on user history
  • Ability to export files as .xml

Ontology Dashboard Access Instructions

Create account and sign in.

  • Go to www.mendeley.com .
  • Click “Create account” in banner at top of page.
  • Enter your email address and choose a password.
  • Return to www.mendeley.com
  • Click “Sign In” in the banner on the top of the page.
  • Enter username and password.
  • Click “Sign In.”

Importing the Master Library

  • Go to the " Terrorism Prevention Literature Dashboard BIB File " page.
  • Download the BibTex file for the Master CVE Library; save this file to your local drive.
  • Navigate to the Library tab and locate icon in the top left corner (+ Add).
  • Navigate to the .bib file on your local drive, select and open the file to import.
  • To synchronize the web version with the desktop version (if users choose to download the app), open the desktop version, and it should sync automatically. If not, click the “Sync” button in the top menu.

Users, Groups, and Functionality Explained

Each user has access to their own unique library. Each user can customize their own unique library with folders, tags, and articles.

To share an article with the group, go to the “Groups” tab and click “Attach Documents” to select the article you wish to share. All members of the group will now see the article, and can then add it to their own library.

This allows each member to customize their own library to their specifications, and changes they make will not affect other users’ libraries.

  • Preventing Terrorism and Targeted Violence
  • Science and Technology
  • Counter-Terrorism Response
  • Counterterrorism
  • Office for Public Safety Research (OPS-R)
  • Publication
  • Resource Catalog
  • Targeted Violence and Terrorism Prevention (TVTP)

IMAGES

  1. (PDF) A Literature Review on “The Effects of Terrorism on Economy”

    literature review on terrorism

  2. (PDF) Normative article review: How can Terrorism be justified?

    literature review on terrorism

  3. Essay on Global Terrorism

    literature review on terrorism

  4. (DOC) Terrorism in Pakistan ASSIGNMENT

    literature review on terrorism

  5. Full article: Making sense of terrorism: a narrative approach to the

    literature review on terrorism

  6. Terrorism Literature Review.docx

    literature review on terrorism

COMMENTS

  1. Full article: Research on Terrorism, 2007-2016: A Review of Data

    ABSTRACT. Research on terrorism has long been criticized for its inability to overcome enduring methodological issues. These include an overreliance on secondary sources and the associated literature review methodology, a scarcity of statistical analyses, a tendency for authors to work alone rather than collaborate with colleagues, and the large number of one-time contributors to the field.

  2. PDF Combating Terrorism: A Literature Review

    examination of available research literature on the definition, causes, and solutions of terrorism is presented. The literature utilized in the review and analysis are peer-reviewed journal papers accessed and retrieved through the ProQuest Central databases, as well as research findings published in edited volumes and scholarly books.

  3. Fifty years of scholarly research on terrorism: Intellectual

    The scholarly literature on terrorism research is estimated to have exceeded 18,651 items as of September 2020. Articles of this literature have been disseminated across of range of different sources and disciplines including social and psychological sciences, but their concentration is most noticeable in two particular disciplines: "Political Science" (N = 4177) and "International ...

  4. 2. Literature Review

    After this short literature review on the definition of a possible terrorist profile at micro-level, it is even more interesting in the case of this research paper to have a look at authors that have analysed plausible variables that could explain terrorism at national or macro-level, i.e. why some countries suffer more from terrorism than others.

  5. The Effectiveness of Counter-Terrorism Strategies

    As the preliminary review of terrorism literature indicated, the objects of study, the research methods used, and perspectives related to terrorism are wide-ranging. The definition of terrorism, and therefore the interventions and measurable outcomes of interventions related to this definition, can be subjective and value-driven. ...

  6. Fifty years of scholarly research on terrorism: Intellectual

    Scholarly literature on terrorism is analysed in its full scope with three main goals: (i) to objectively determine the structural makeup of the field, (ii) to document its current and past temporal trends; and (iii) to identify underrepresented areas. ... To synthesise such large-scale literature, this review adopts a bibliometric method and ...

  7. Effectiveness in Counter-Terrorism and Countering Violent ...

    Joshua Sinai, Jeffrey Fuller, Tiffany Seal, Effectiveness in Counter-Terrorism and Countering Violent Extremism, Perspectives on Terrorism, Vol. 13, No. 6 (December 2019), pp. 90-108

  8. A Systematic Literature Review of Knowledge and Awareness on Terrorism

    Additionally, this systematic review provides a reference for future studies related to the level of knowledge and awareness on terrorism issues. Other than that, this review is also crucial as there is a lack of studies on terrorism within the level of knowledge and awareness context. This systematic review study allows information providers ...

  9. Addressing the Myths of Terrorism in America

    Terrorism research greatly increased after the 9/11 attacks. Lum, Kennedy, and Sherley's (2006) systematic review of terrorism and political violence literature found that over 50% of peer-reviewed articles between 1971 and 2002 were published in just 2 years—2001/2002. Despite this increased interest, post-9/11 research initially ...

  10. (PDF) Literature Review of Terrorist and Violent ...

    Literature Review of Terrorist and Violent Extremist Use of the Internet. May 2021. Authors: Winnifred R Louis. The University of Queensland. Susilo Wibisono. The University of Queensland. Kevin ...

  11. (PDF) The Study of Terrorism and Counterterrorism

    Routledge. 1. of the existing literature on terrorism, with a result that a lot of dead-end research was. unnecessarily repeated and some of the rest was incredibly poorly linked with the rest of ...

  12. Terrorism and counterterrorism: an overview

    1. Introduction. Terrorism is the premeditated use or threat to use violence by individuals or subnational groups to obtain a political or social objective through the intimidation of a large audience beyond that of the immediate noncombatant victims (Enders and Sandler, 2012, p.4).The two essential ingredients of terrorism are its violence and its political or social motive.

  13. Perceived risk of terrorism, indirect victimization, and individual

    In the literature review section, terrorism and crime will be discussed in terms of their political conceptualization first. Following this, the effect of 9/11 on security politics will be considered. Next, the concept of risk and its significance to understanding today's security conditions will be debated. Following this, the link between ...

  14. Does Counter-Terrorism Work? by Richard English review

    The term "war on terror" had been coined a few days after al-Qaida's attacks of 9/11 to describe the most extensive and ambitious counter-terrorism operation the world had seen. As Bush ...

  15. An Explorative Study into the Importance of Defining and Classifying

    The literature review confirms that there is an absence of a unanimously agreed upon definition of cyber terrorism, and furthermore that the existing academic definitions are not compatible with UK legislation. In addition, the literature review highlights an absence of a cyber terrorism framework that classifies what kind of terrorist activity ...

  16. Lone-Actor Terrorism: Literature Review

    Lone-actor terrorism is not a new phenomenon; however, research suggests the threat is increasing as pressure from security services forces a tactical adaptation and groups call on those who share their ideology to act alone without direction or support. Countering Lone-Actor Terrorism Series: No. 1. This paper is the first publication in the ...

  17. How can the literature inform counter-terrorism practice? Recent

    fi. researchers, from the publications included in Section 1 (Section Two). We then focus on governments, their role in terrorism research and collaborations with academia, outlin-ing where advances have been made and where challenges remain (Section Three). Finally, we look at evidence-based Counter Terrorism in practice, and explore ongoing ...

  18. A critical review of terrorism effects and their impacts on tourist

    The literature review provides a wide variety of material that is available dealing with the nature of terrorism, its global effects, and response strategies. The nations growth rate will decline, the GDP will go down, and the stock market will be declining.

  19. Domestic Terrorism: A Review of the Literature

    Domestic Terrorism: A Review of the Literature 5 . media covers domestic terrorism, it will not stop because media coverage is a form of supporting these acts (Schwartz, 2008, p.181). Due to the fact that the attacks are meant to hurt society, in addition to just the victims, any person is fair game for victimization by domestic terrorist groups.

  20. How to Access the Terrorism Prevention Literature Library

    DHS S&T developed a comprehensive and publicly available literature review and ontology dashboard to organize Targeted Violence and Terrorism Prevention (TVTP) literature. This new capability streamlines the ability for end users and practitioners to access peer-reviewed and methodologically sound research products to develop an evidence base in the field of terrorism prevention for what works ...

  21. How can the literature inform counter-terrorism practice? Recent

    The volume and range of academic studies cited above demonstrates an increase in empirical research to advance our understanding of terrorism. Indeed a systematic review of the literature published 2007-2016 showed that the use of primary data 'has increased considerably and continues to do so' (Schuurman, Citation 2018, p. 1). Thus ...