AsalV.RethemeyerR. K. (2008). The nature of the beast: Organizational structures and the lethality of terrorist attacks. Journal of Politics, 70, 437-449.
2.
Big Allied and Dangerous Data. Rockefeller College of Public Affairs & Policy, University at Albany, State University of New York. Retrieved from http://www.albany.edu/pvc/current_projects.shtml
LaFreeG.DuganL. (2007). Introducing the Global Terrorism Database. Terrorism and Political Violence, 19, 181-204.
9.
LaFreeG.DuganL.FoggH.ScottJ. (2006). Building a Global Terrorism Database (NCJ 214260). Washington, DC: U.S. Department of Justice.
10.
Memorial Institute for the Prevention of Terrorism (2006). MIPT terrorism knowledge base. January8, 2006. Retrieved from http://www.tkb.org/Home.jsp (January292006).
11.
National Commission on Terrorist Attacks Upon the United States. (2004). Final report of the National Commission on Terrorist Attacks Upon the United States (9/11 Report). Washington, DC: U.S. Government Printing Office.
12.
National Consortium for the Study of Terrorism and Responses to Terrorism. University of Maryland. Global Terrorism Database. Retrieved from http://www.start.umd.edu/gtd/
13.
National Counterterrorism Center. Worldwide Incidents Tracking System(WITS). Retrieved from http://nctc.gov
Public Law 101–275, October23, 1990. Hate Crime Statistics Act of 1990.
16.
Public Law 107–56, October26, 2001. Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT).
17.
Public Law 07–296, November25, 2002. Equation Section (Next) Homeland Security Act of 2002.
18.
Public Law 108–458, December17, 2004. Intelligence Reform and Terrorism Prevention Act of 2004.