Course Description
The course explores the causes, dynamics, characteristics and consequences of terrorism and related forms of political violence. The module also touches on new forms of radicalisation, emerging terrorist centres and right-wing terrorism. I paid particular attention to the Sahel zone and the new jihadist movement in Afghanistan, as well as the use of new technologies in terrorism. The course helps students understand and explain these phenomena by giving them the right tools to think about them.
Students will examine, compare and debate the merits of theories and key concepts of terrorism through in-depth discussion to develop a solid understanding of the different theoretical and practical perspectives. In each lecture, we place these theories and concepts in their historical context, show how they contribute to a better understanding of international and national security, and assess their strengths and weaknesses.
Applying the Aristotelian method of teaching, I will focus on developing both the intellectual and moral virtues of students. Intellectual virtues are character traits such as the ability to judge the truth and comprehend the nature of things, whereas moral virtues are habits of living that involve the whole person and include justice, temperance, prudence, and fortitude, which are characterised by desire and emotion.
In addition, I designed the course with the following implications in mind: to understand the diverse backgrounds of undergraduate students, to provide full support to non-native speakers in relation to academic English, and to engage the students in practical discussions and seminars. An inclusive curriculum implements policies and resources to ensure that all students are supported in their learning.
Learning Objectives and Outcomes
- Analyse and apply diverse theoretical approaches to terrorism.
- Examine critically the reasons for cooperation and conflict in international relations.
- Engage in contemporary theoretical discussions.
- Construct and defend theoretically sophisticated arguments regarding terrorism.
- Learn to think and write critically about crucial debates in terrorism studies.
- Effective communication in professional applications of contemporary terrorism studies.
- Develop innovative ways of thinking about the practical implications of counterterrorism (Sahel, open-source intelligence, radicalisation, right-wing terrorism, Islamic state).
Reading Materials
Foundation texts
Muro, D. and Wilson, T. (eds) (2022) Contemporary terrorism studies / edited by Diego Muro, Tim Wilson. Oxford, United Kingdom: Oxford University Press.
Additionally, essential and recommended readings based on scholarly articles are provided for each lecture to introduce students to academic analytical and critical thinking.
The quality of teaching, course content, and literature included reflects the advanced practice of worldwide recognised departments of politics and international relations.
Course Content
Lecture 1: Conceptualizing Terrorism
Core Required Reading
Muro, D. and Wilson, T. (eds) (2022) Contemporary terrorism studies / edited by Diego Muro, Tim Wilson. Oxford, United Kingdom: Oxford University Press.
- Introduction
- What Are Terrorism Studies?
- Critical Terrorism Studies
- Conceptualizations of Terrorism
Essential Required Reading
- Berkebile, R.E. (2017) ‘What Is Domestic Terrorism? A Method for Classifying Events From the Global Terrorism Database’, Terrorism and Political Violence, 29(1), pp. 1–26. Available at: https://doi.org/10.1080/09546553.2014.985378.
- Locatelli, A. (2014) ‘What is Terrorism? Concepts, Definitions and Classifications’, in Contributions to Conflict Management, Peace Economics and Development. Bingley: Emerald Group Publishing, pp. 1–23. Available at: https://doi.org/10.1108/S1572-8323(2014)0000022001.
- Ramsay, G. (2015) ‘Why terrorism can, but should not be defined’, Critical Studies on Terrorism, 8(2), pp. 211–228. Available at: https://doi.org/10.1080/17539153.2014.988452.
Recommended Reading
- Ackerman, G.A. and Burnham, M. (2021) ‘Towards a Definition of Terrorist Ideology’, Terrorism and Political Violence, 33(6), pp. 1160–1190. Available at: https://doi.org/10.1080/09546553.2019.1599862.
- Herschinger, E. (2013) ‘A Battlefield of Meanings: The Struggle for Identity in the UN Debates on a Definition of International Terrorism’, Terrorism and Political Violence, 25(2), pp. 183–201. Available at: https://doi.org/10.1080/09546553.2011.652318.
- Knight, S. and Keatley, D.A. (2020) ‘How can the literature inform counter-terrorism practice? Recent advances and remaining challenges’, Behavioral Sciences of Terrorism and Political Aggression, 12(3), pp. 217–230. Available at: https://doi.org/10.1080/19434472.2019.1666894.
Lecture 2: Causes of Terrorism
Core Required Reading
Muro, D. and Wilson, T. (eds) (2022) Contemporary terrorism studies / edited by Diego Muro, Tim Wilson. Oxford, United Kingdom: Oxford University Press.
- Terrorism in Context
- The Social Science of Political Violence
- Terrorism Open Source Databases
- The History of Terrorism
- What Are the Root Causes of Terrorism?
Essential Required Reading
- Crenshaw, M. (1981) ‘The Causes of Terrorism’, Comparative Politics, 13(4), p. 379. Available at: https://doi.org/10.2307/421717.
- Newman, E. (2006) ‘Exploring the “Root Causes” of Terrorism’, Studies in Conflict & Terrorism, 29(8), pp. 749–772. Available at: https://doi.org/10.1080/10576100600704069.
- Freeman, M. (2008) ‘Democracy, Al Qaeda, and the Causes of Terrorism: A Strategic Analysis of U.S. Policy’, Studies in Conflict & Terrorism, 31(1), pp. 40–59. Available at: https://doi.org/10.1080/10576100701759996.
Recommended Reading
- Bellinger, N. and Kattelman, K.T. (2021) ‘Domestic terrorism in the developing world: role of food security’, Journal of International Relations and Development, 24(2), pp. 306–332. Available at: https://doi.org/10.1057/s41268-020-00191-y.
- Sedgwick, M. (2007) ‘Inspiration and the Origins of Global Waves of Terrorism’, Studies in Conflict & Terrorism, 30(2), pp. 97–112. Available at: https://doi.org/10.1080/10576100601101042.
- Sen, A. (2008) ‘Violence, Identity and Poverty’, Journal of Peace Research, 45(1), pp. 5–15. Available at: https://doi.org/10.1177/0022343307084920.
Lecture 3: Radicalisation
Core Required Reading
Muro, D. and Wilson, T. (eds) (2022) Contemporary terrorism studies / edited by Diego Muro, Tim Wilson. Oxford, United Kingdom: Oxford University Press.
- When Do Individuals Radicalize?
- Can Terrorism Be Rational?
- Target Selection
Essential Required Reading
- della Porta, D. (2018) ‘Radicalization: A Relational Perspective’, Annual Review of Political Science, 21(1), pp. 461–474. Available at: https://doi.org/10.1146/annurev-polisci-042716-102314.
- McCauley, C. and Moskalenko, S. (2008) ‘Mechanisms of Political Radicalization: Pathways Toward Terrorism’, Terrorism and Political Violence, 20(3), pp. 415–433. Available at: https://doi.org/10.1080/09546550802073367.
- Simi, P. and Windisch, S. (2020) ‘Why Radicalization Fails: Barriers to Mass Casualty Terrorism’, Terrorism and Political Violence, 32(4), pp. 831–850. Available at: https://doi.org/10.1080/09546553.2017.1409212.
Recommended Reading
- Atsa’am, D.D. and Wario, R. (2021) ‘Knowledge Extraction on the Nexus Between Terrorism Criteria and Attacks on Private Citizens and Property’:, International Journal of Cyber Warfare and Terrorism, 11(1), pp. 20–30. Available at: https://doi.org/10.4018/IJCWT.2021010102.
- Kivimäki, T. (2007) ‘Can development and democratization address the root causes of terrorism in Southeast Asia?’, The Pacific Review, 20(1), pp. 49–73. Available at: https://doi.org/10.1080/09512740601133203.
- Rink, A. and Sharma, K. (2018) ‘The Determinants of Religious Radicalization: Evidence from Kenya’, Journal of Conflict Resolution, 62(6), pp. 1229–1261. Available at: https://doi.org/10.1177/0022002716678986.
Lecture 4: Terrorism – Who and Why
Core Required Reading
Muro, D. and Wilson, T. (eds) (2022) Contemporary terrorism studies / edited by Diego Muro, Tim Wilson. Oxford, United Kingdom: Oxford University Press.
- Longevity of Terrorist Groups
- Can States Be Terrorists?
- Gendered And Racialized Terrorism
- Terrorism By Insurgents and Rebels
Essential Required Reading
- Blakeley, R. (2018) ‘Drones, state terrorism and international law’, Critical Studies on Terrorism, 11(2), pp. 321–341. Available at: https://doi.org/10.1080/17539153.2018.1456722.
- Fortna, V.P. (2015) ‘Do Terrorists Win? Rebels’ Use of Terrorism and Civil War Outcomes’, International Organization, 69(3), pp. 519–556. Available at: https://doi.org/10.1017/S0020818315000089.
- Phillips, B.J. (2015) ‘What Is a Terrorist Group? Conceptual Issues and Empirical Implications’, Terrorism and Political Violence, 27(2), pp. 225–242. Available at: https://doi.org/10.1080/09546553.2013.800048.
Recommended Reading
- Brock Blomberg, S., Hess, G.D. and Weerapana, A. (2004) ‘An Economic Model of Terrorism’, Conflict Management and Peace Science, 21(1), pp. 17–28. Available at: https://doi.org/10.1080/07388940490433882.
- Finn, M. and Momani, B. (2017) ‘Building foundations for the comparative study of state and non-state terrorism’, Critical Studies on Terrorism, 10(3), pp. 379–403. Available at: https://doi.org/10.1080/17539153.2017.1287753.
- Fortna, V.P., Lotito, N.J. and Rubin, M.A. (2018) ‘Don’t Bite the Hand that Feeds: Rebel Funding Sources and the Use of Terrorism in Civil Wars’, International Studies Quarterly, 62(4), pp. 782–794. Available at: https://doi.org/10.1093/isq/sqy038.
Lecture 5: Old and New Terrorism
Core Required Reading
Muro, D. and Wilson, T. (eds) (2022) Contemporary terrorism studies / edited by Diego Muro, Tim Wilson. Oxford, United Kingdom: Oxford University Press.
- Old And New Terrorism
- Social Media and Terrorism
- Is Terrorism Effective?
Essential Required Reading
- Abrahms, M. (2012) ‘The Political Effectiveness of Terrorism Revisited’, Comparative Political Studies, 45(3), pp. 366–393. Available at: https://doi.org/10.1177/0010414011433104.
- Field, A. (2009) ‘The “New Terrorism”: Revolution or Evolution?’, Political Studies Review, 7(2), pp. 195–207. Available at: https://doi.org/10.1111/j.1478-9299.2009.00179.x.
- Tucker, D. (2001) ‘What is New about the New Terrorism and How Dangerous is It?’, Terrorism and Political Violence, 13(3), pp. 1–14. Available at: https://doi.org/10.1080/09546550109609688.
Recommended Reading
- Berrebi, C. and Klor, E.F. (2006) ‘On Terrorism and Electoral Outcomes: Theory and Evidence from the Israeli-Palestinian Conflict’, Journal of Conflict Resolution, 50(6), pp. 899–925. Available at: https://doi.org/10.1177/0022002706293673.
- Huff, C. and Kertzer, J.D. (2018) ‘How the Public Defines Terrorism: HOW THE PUBLIC DEFINES TERRORISM’, American Journal of Political Science, 62(1), pp. 55–71. Available at: https://doi.org/10.1111/ajps.12329.
- Spencer, A. (2012) ‘The social construction of terrorism: media, metaphors and policy implications’, Journal of International Relations and Development, 15(3), pp. 393–419. Available at: https://doi.org/10.1057/jird.2012.4.
Lecture 6: Counterterrorism
Core Required Reading
Muro, D. and Wilson, T. (eds) (2022) Contemporary terrorism studies / edited by Diego Muro, Tim Wilson. Oxford, United Kingdom: Oxford University Press.
- Counterterrorism Agencies and Their Work
- Responding to Terrorism Nonviolently
- Counterterrorism and Human Rights
Essential Required Reading
- Kilcullen, D.J. (2005) ‘Countering global insurgency’, Journal of Strategic Studies, 28(4), pp. 597–617. Available at: https://doi.org/10.1080/01402390500300956.
- Koschade, S. (2006) ‘A Social Network Analysis of Jemaah Islamiyah: The Applications to Counterterrorism and Intelligence’, Studies in Conflict & Terrorism, 29(6), pp. 559–575. Available at: https://doi.org/10.1080/10576100600798418.
- Moghadam, A. (2009) ‘Motives for Martyrdom: Al-Qaida, Salafi Jihad, and the Spread of Suicide Attacks’, International Security, 33(3), pp. 46–78. Available at: https://doi.org/10.1162/isec.2009.33.3.46.
Recommended Reading
- Davis, J. (2016) ‘Uncloaking Secrecy: International Human Rights Law in Terrorism Cases’, Human Rights Quarterly, 38(1), pp. 58–84. Available at: https://doi.org/10.1353/hrq.2016.0000.
- Efrat, A. (2015) ‘Do human rights violations hinder counterterrorism cooperation? Evidence from the FBI’s deployment abroad’, The Review of International Organizations, 10(3), pp. 329–349. Available at: https://doi.org/10.1007/s11558-014-9202-8.
- Kurtulus, E.N. (2012) ‘The New Counterterrorism: Contemporary Counterterrorism Trends in the United States and Israel’, Studies in Conflict & Terrorism, 35(1), pp. 37–58. Available at: https://doi.org/10.1080/1057610X.2012.631456.
Lecture 7: Foreign Policy, International Organizations, and Technology
Core Required Reading
Muro, D. and Wilson, T. (eds) (2022) Contemporary terrorism studies / edited by Diego Muro, Tim Wilson. Oxford, United Kingdom: Oxford University Press.
- Foreign Policy and Countering Terrorism
- International Organizations and Counter-Terrorism
- Terrorism, Counter-Terrorism, and Technology
Essential Required Reading
- Cross, M.K.D. (2017) ‘Counter-terrorism in the EU’s external relations’, Journal of European Integration, 39(5), pp. 609–624. Available at: https://doi.org/10.1080/07036337.2017.1327524.
- Gadarian, S.K. (2010) ‘The Politics of Threat: How Terrorism News Shapes Foreign Policy Attitudes’, The Journal of Politics, 72(2), pp. 469–483. Available at: https://doi.org/10.1017/S0022381609990910.
- Shandler, R. et al. (2022) ‘Cyber Terrorism and Public Support for Retaliation – A Multi-Country Survey Experiment’, British Journal of Political Science, 52(2), pp. 850–868. Available at: https://doi.org/10.1017/S0007123420000812.
Recommended Reading
- Baker-Beall, C. (2019) ‘The threat of the “returning foreign fighter”: The securitization of EU migration and border control policy’, Security Dialogue, 50(5), pp. 437–453. Available at: https://doi.org/10.1177/0967010619857048.
- Espinoza, M. (2018) ‘State terrorism: orientalism and the drone programme’, Critical Studies on Terrorism, 11(2), pp. 376–393. Available at: https://doi.org/10.1080/17539153.2018.1456725.
- Torres Soriano, M.R. (2012) ‘The Vulnerabilities of Online Terrorism’, Studies in Conflict & Terrorism, 35(4), pp. 263–277. Available at: https://doi.org/10.1080/1057610X.2012.656345.
Lecture 8: Preventing Violent Extremism and Deradicalization Schemes
Core Required Reading
Muro, D. and Wilson, T. (eds) (2022) Contemporary terrorism studies / edited by Diego Muro, Tim Wilson. Oxford, United Kingdom: Oxford University Press.
- Preventing and Countering Violent Extremism
- Disengagement and Deradicalization Programmes
Essential Required Reading
- Demant, F. and Graaf, B.D. (2010) ‘How to Counter Radical Narratives: Dutch Deradicalization Policy in the Case of Moluccan and Islamic Radicals’, Studies in Conflict & Terrorism, 33(5), pp. 408–428. Available at: https://doi.org/10.1080/10576101003691549.
- Khalil, J., Horgan, J. and Zeuthen, M. (2022) ‘The Attitudes-Behaviors Corrective (ABC) Model of Violent Extremism’, Terrorism and Political Violence, 34(3), pp. 425–450. Available at: https://doi.org/10.1080/09546553.2019.1699793.
- Mirahmadi, H. (2016) ‘Building Resilience against Violent Extremism: A Community-Based Approach’, The ANNALS of the American Academy of Political and Social Science, 668(1), pp. 129–144. Available at: https://doi.org/10.1177/0002716216671303.
Recommended Reading
- Gaudette, T., Scrivens, R. and Venkatesh, V. (2022) ‘The Role of the Internet in Facilitating Violent Extremism: Insights from Former Right-Wing Extremists’, Terrorism and Political Violence, 34(7), pp. 1339–1356. Available at: https://doi.org/10.1080/09546553.2020.1784147.
- Reinares, F. (2011) ‘Exit From Terrorism: A Qualitative Empirical Study on Disengagement and Deradicalization Among Members of ETA’, Terrorism and Political Violence, 23(5), pp. 780–803. Available at: https://doi.org/10.1080/09546553.2011.613307.
- Webber, D. et al. (2018) ‘Deradicalizing Detained Terrorists’, Political Psychology, 39(3), pp. 539–556. Available at: https://doi.org/10.1111/pops.12428.
Lecture 9: Sahel and the Islamic State in Khorasan
Core Required Reading
- Aslam, W. (2020) ‘Pakistan’s hard misplacement and the politics of regional identity’, Cambridge Review of International Affairs, 33(4), pp. 542–554. Available at: https://doi.org/10.1080/09557571.2020.1723060.
- Baldaro, E. (2021) ‘Rashomon in the Sahel: Conflict dynamics of security regionalism’, Security Dialogue, 52(3), pp. 266–283. Available at: https://doi.org/10.1177/0967010620934061.
- Chelin, R.P. (2020) ‘From the Islamic State of Algeria to the Economic Caliphate of the Sahel: The Transformation of Al Qaeda in the Islamic Maghreb’, Terrorism and Political Violence, 32(6), pp. 1186–1205. Available at: https://doi.org/10.1080/09546553.2018.1454316.
- Cline, L.E. (2021) ‘Jihadist Movements in the Sahel: Rise of the Fulani?’, Terrorism and Political Violence, pp. 1–17. Available at: https://doi.org/10.1080/09546553.2021.1888082.
- Fadel, M. (2019) ‘Ideas, Ideology, and the Roots of the Islamic State’, Critical Review, 31(1), pp. 83–94. Available at: https://doi.org/10.1080/08913811.2019.1565733.
- Ibrahimi, N. and Akbarzadeh, S. (2020) ‘Intra- Jihadist Conflict and Cooperation: Islamic State–Khorasan Province and the Taliban in Afghanistan’, Studies in Conflict & Terrorism, 43(12), pp. 1086–1107. Available at: https://doi.org/10.1080/1057610X.2018.1529367.
- Verma, R. (2021) ‘The Afghan Peace Process: Domestic Fault Lines’, Middle East Policy, 28(3–4), pp. 172–185. Available at: https://doi.org/10.1111/mepo.12576.
Recommended Reading
- Boeke, S. (2016) ‘Al Qaeda in the Islamic Maghreb: Terrorism, insurgency, or organized crime?’, Small Wars & Insurgencies, 27(5), pp. 914–936. Available at: https://doi.org/10.1080/09592318.2016.1208280.
- Bos, M. and Melissen, J. (2019) ‘Rebel diplomacy and digital communication: public diplomacy in the Sahel’, International Affairs, 95(6), pp. 1331–1348. Available at: https://doi.org/10.1093/ia/iiz195.
- Isakhan, B. (2020) ‘The Islamic State Attacks on Shia Holy Sites and the “Shrine Protection Narrative”: Threats to Sacred Space as a Mobilization Frame’, Terrorism and Political Violence, 32(4), pp. 724–748. Available at: https://doi.org/10.1080/09546553.2017.1398741.
Lecture 10: Artificial Intelligence, Critical Infrastructure, and Terrorism
Core Required Reading
- Ganor, B. (2021) ‘Artificial or Human: A New Era of Counterterrorism Intelligence?’, Studies in Conflict & Terrorism, 44(7), pp. 605–624. Available at: https://doi.org/10.1080/1057610X.2019.1568815.
- Holt, T.J. (2012) ‘Exploring the Intersections of Technology, Crime, and Terror’, Terrorism and Political Violence, 24(2), pp. 337–354. Available at: https://doi.org/10.1080/09546553.2011.648350.
- Ionescu, B. et al. (2020) ‘Artificial Intelligence Fights Crime and Terrorism at a New Level’, IEEE MultiMedia, 27(2), pp. 55–61. Available at: https://doi.org/10.1109/MMUL.2020.2994403.
- Klingberg, S. (2022) ‘Countering Terrorism: Digital Policing of Open Source Intelligence and Social Media Using Artificial Intelligence’, in R. Montasari (ed.) Artificial Intelligence and National Security. Cham: Springer International Publishing, pp. 101–111. Available at: https://doi.org/10.1007/978-3-031-06709-9_6.
- Post, J.M., Ruby, K.G. and Shaw, E.D. (2000) ‘From car bombs to logic bombs: The growing threat from information terrorism’, Terrorism and Political Violence, 12(2), pp. 97–122. Available at: https://doi.org/10.1080/09546550008427563.
Recommended Reading
- Kohlmann, E.F. (2006) ‘The Real Online Terrorist Threat’, Foreign Affairs, 85(5), p. 115. Available at: https://doi.org/10.2307/20032074.
- Krasmann, S. and Hentschel, C. (2019) ‘“Situational awareness”: Rethinking security in times of urban terrorism’, Security Dialogue, 50(2), pp. 181–197. Available at: https://doi.org/10.1177/0967010618819598.
- Schouten, P. (2014) ‘Security as controversy: Reassembling security at Amsterdam Airport’, Security Dialogue, 45(1), pp. 23–42. Available at: https://doi.org/10.1177/0967010613515014.
Lecture 11: Victims of Terrorism
Core Required Reading
Muro, D. and Wilson, T. (eds) (2022) Contemporary terrorism studies / edited by Diego Muro, Tim Wilson. Oxford, United Kingdom: Oxford University Press.
- Victims of Terrorism and Political Violence
- The End of Terrorist Campaigns
Essential Required Reading
- Eubank, W. and Weinberg, L. (2001) ‘Terrorism and Democracy: Perpetrators and Victims’, Terrorism and Political Violence, 13(1), pp. 155–164. Available at: https://doi.org/10.1080/09546550109609674.
- Maclure, R. and Denov, M. (2006) ‘“I Didn’t Want to Die So I Joined Them”: Structuration and the Process of Becoming Boy Soldiers in Sierra Leone’, Terrorism and Political Violence, 18(1), pp. 119–135. Available at: https://doi.org/10.1080/09546550500384801.
- Sánchez-Cuenca, I. and Aguilar, P. (2009) ‘Terrorist Violence and Popular Mobilization: The Case of the Spanish Transition to Democracy’, Politics & Society, 37(3), pp. 428–453. Available at: https://doi.org/10.1177/0032329209338927.
Recommended Reading
- Canetti-Nisim, D., Mesch, G. and Pedahzur, A. (2006) ‘Victimization from Terrorist Attacks: Randomness or Routine Activities?’, Terrorism and Political Violence, 18(4), pp. 485–501. Available at: https://doi.org/10.1080/09546550600880237.
- Lentini, P. and Bakashmar, M. (2007) ‘Jihadist Beheading: A Convergence of Technology, Theology, and Teleology?’, Studies in Conflict & Terrorism, 30(4), pp. 303–325. Available at: https://doi.org/10.1080/10576100701200140.
- Weinberg, L., Pedahzur, A. and Canetti-Nisim, D. (2003) ‘The social and religious characteristics of suicide bombers and their victims’, Terrorism and Political Violence, 15(3), pp. 139–153. Available at: https://doi.org/10.1080/09546550312331293167.
Required Students’ Skills
Read the course materials carefully and focus on the core and essential required readings that will greatly increase your level of knowledge.
Learn how to use search engines for academic articles, primarily Web of Science, JSTOR, SAGE Journals, and Google Scholar.
To pass an essay assignment with flying colours, you must master the Harvard citation style. Also, it is highly recommended to read the following publication about research methods and design to improve your essay score:
- Lamont, C. and Boduszynski, M. (2020) Research methods in politics and international relations. Thousand Oaks: SAGE.
Throughout the course, students are also expected to familiarise themselves with leading academic journals to locate the latest articles, thereby connecting with the international relations academic community.