Contemporary Terrorism Studies – Undergraduate Course Syllabus

Course Description

The course explores the causes, dynamics, characteristics and consequences of terrorism and related forms of political violence. The module also touches on new forms of radicalisation, emerging terrorist centres and right-wing terrorism. I paid particular attention to the Sahel zone and the new jihadist movement in Afghanistan, as well as the use of new technologies in terrorism. The course helps students understand and explain these phenomena by giving them the right tools to think about them.

Students will examine, compare and debate the merits of theories and key concepts of terrorism through in-depth discussion to develop a solid understanding of the different theoretical and practical perspectives. In each lecture, we place these theories and concepts in their historical context, show how they contribute to a better understanding of international and national security, and assess their strengths and weaknesses.

Applying the Aristotelian method of teaching, I will focus on developing both the intellectual and moral virtues of students. Intellectual virtues are character traits such as the ability to judge the truth and comprehend the nature of things, whereas moral virtues are habits of living that involve the whole person and include justice, temperance, prudence, and fortitude, which are characterised by desire and emotion.

In addition, I designed the course with the following implications in mind: to understand the diverse backgrounds of undergraduate students, to provide full support to non-native speakers in relation to academic English, and to engage the students in practical discussions and seminars. An inclusive curriculum implements policies and resources to ensure that all students are supported in their learning.

Learning Objectives and Outcomes

  • Analyse and apply diverse theoretical approaches to terrorism.
  • Examine critically the reasons for cooperation and conflict in international relations.
  • Engage in contemporary theoretical discussions.
  • Construct and defend theoretically sophisticated arguments regarding terrorism.
  • Learn to think and write critically about crucial debates in terrorism studies.
  • Effective communication in professional applications of contemporary terrorism studies.
  • Develop innovative ways of thinking about the practical implications of counterterrorism (Sahel, open-source intelligence, radicalisation, right-wing terrorism, Islamic state). 

Reading Materials

Foundation texts

Muro, D. and Wilson, T. (eds) (2022) Contemporary terrorism studies / edited by Diego Muro, Tim Wilson. Oxford, United Kingdom: Oxford University Press.

Additionally, essential and recommended readings based on scholarly articles are provided for each lecture to introduce students to academic analytical and critical thinking.

The quality of teaching, course content, and literature included reflects the advanced practice of worldwide recognised departments of politics and international relations.

Course Content

Lecture 1: Conceptualizing Terrorism

Core Required Reading

Muro, D. and Wilson, T. (eds) (2022) Contemporary terrorism studies / edited by Diego Muro, Tim Wilson. Oxford, United Kingdom: Oxford University Press.

  • Introduction
  • What Are Terrorism Studies?
  • Critical Terrorism Studies
  • Conceptualizations of Terrorism

Essential Required Reading

  • Berkebile, R.E. (2017) ‘What Is Domestic Terrorism? A Method for Classifying Events From the Global Terrorism Database’, Terrorism and Political Violence, 29(1), pp. 1–26. Available at: https://doi.org/10.1080/09546553.2014.985378.
  • Locatelli, A. (2014) ‘What is Terrorism? Concepts, Definitions and Classifications’, in Contributions to Conflict Management, Peace Economics and Development. Bingley: Emerald Group Publishing, pp. 1–23. Available at: https://doi.org/10.1108/S1572-8323(2014)0000022001.
  • Ramsay, G. (2015) ‘Why terrorism can, but should not be defined’, Critical Studies on Terrorism, 8(2), pp. 211–228. Available at: https://doi.org/10.1080/17539153.2014.988452.

Recommended Reading

  • Ackerman, G.A. and Burnham, M. (2021) ‘Towards a Definition of Terrorist Ideology’, Terrorism and Political Violence, 33(6), pp. 1160–1190. Available at: https://doi.org/10.1080/09546553.2019.1599862.
  • Herschinger, E. (2013) ‘A Battlefield of Meanings: The Struggle for Identity in the UN Debates on a Definition of International Terrorism’, Terrorism and Political Violence, 25(2), pp. 183–201. Available at: https://doi.org/10.1080/09546553.2011.652318.
  • Knight, S. and Keatley, D.A. (2020) ‘How can the literature inform counter-terrorism practice? Recent advances and remaining challenges’, Behavioral Sciences of Terrorism and Political Aggression, 12(3), pp. 217–230. Available at: https://doi.org/10.1080/19434472.2019.1666894.

Lecture 2: Causes of Terrorism

Core Required Reading

Muro, D. and Wilson, T. (eds) (2022) Contemporary terrorism studies / edited by Diego Muro, Tim Wilson. Oxford, United Kingdom: Oxford University Press.

  • Terrorism in Context
  • The Social Science of Political Violence
  • Terrorism Open Source Databases
  • The History of Terrorism
  • What Are the Root Causes of Terrorism?

Essential Required Reading

Recommended Reading

Lecture 3: Radicalisation

Core Required Reading

Muro, D. and Wilson, T. (eds) (2022) Contemporary terrorism studies / edited by Diego Muro, Tim Wilson. Oxford, United Kingdom: Oxford University Press.

  • When Do Individuals Radicalize?
  • Can Terrorism Be Rational?
  • Target Selection

Essential Required Reading

Recommended Reading

  • Atsa’am, D.D. and Wario, R. (2021) ‘Knowledge Extraction on the Nexus Between Terrorism Criteria and Attacks on Private Citizens and Property’:, International Journal of Cyber Warfare and Terrorism, 11(1), pp. 20–30. Available at: https://doi.org/10.4018/IJCWT.2021010102.
  • Kivimäki, T. (2007) ‘Can development and democratization address the root causes of terrorism in Southeast Asia?’, The Pacific Review, 20(1), pp. 49–73. Available at: https://doi.org/10.1080/09512740601133203.
  • Rink, A. and Sharma, K. (2018) ‘The Determinants of Religious Radicalization: Evidence from Kenya’, Journal of Conflict Resolution, 62(6), pp. 1229–1261. Available at: https://doi.org/10.1177/0022002716678986.

Lecture 4: Terrorism – Who and Why

Core Required Reading

Muro, D. and Wilson, T. (eds) (2022) Contemporary terrorism studies / edited by Diego Muro, Tim Wilson. Oxford, United Kingdom: Oxford University Press.

  • Longevity of Terrorist Groups
  • Can States Be Terrorists?
  • Gendered And Racialized Terrorism
  • Terrorism By Insurgents and Rebels

Essential Required Reading

Recommended Reading

  • Brock Blomberg, S., Hess, G.D. and Weerapana, A. (2004) ‘An Economic Model of Terrorism’, Conflict Management and Peace Science, 21(1), pp. 17–28. Available at: https://doi.org/10.1080/07388940490433882.
  • Finn, M. and Momani, B. (2017) ‘Building foundations for the comparative study of state and non-state terrorism’, Critical Studies on Terrorism, 10(3), pp. 379–403. Available at: https://doi.org/10.1080/17539153.2017.1287753.
  • Fortna, V.P., Lotito, N.J. and Rubin, M.A. (2018) ‘Don’t Bite the Hand that Feeds: Rebel Funding Sources and the Use of Terrorism in Civil Wars’, International Studies Quarterly, 62(4), pp. 782–794. Available at: https://doi.org/10.1093/isq/sqy038.

Lecture 5: Old and New Terrorism

Core Required Reading

Muro, D. and Wilson, T. (eds) (2022) Contemporary terrorism studies / edited by Diego Muro, Tim Wilson. Oxford, United Kingdom: Oxford University Press.

  • Old And New Terrorism
  • Social Media and Terrorism
  • Is Terrorism Effective?

Essential Required Reading

Recommended Reading

  • Berrebi, C. and Klor, E.F. (2006) ‘On Terrorism and Electoral Outcomes: Theory and Evidence from the Israeli-Palestinian Conflict’, Journal of Conflict Resolution, 50(6), pp. 899–925. Available at: https://doi.org/10.1177/0022002706293673.
  • Huff, C. and Kertzer, J.D. (2018) ‘How the Public Defines Terrorism: HOW THE PUBLIC DEFINES TERRORISM’, American Journal of Political Science, 62(1), pp. 55–71. Available at: https://doi.org/10.1111/ajps.12329.
  • Spencer, A. (2012) ‘The social construction of terrorism: media, metaphors and policy implications’, Journal of International Relations and Development, 15(3), pp. 393–419. Available at: https://doi.org/10.1057/jird.2012.4.

Lecture 6: Counterterrorism

Core Required Reading

Muro, D. and Wilson, T. (eds) (2022) Contemporary terrorism studies / edited by Diego Muro, Tim Wilson. Oxford, United Kingdom: Oxford University Press.

  • Counterterrorism Agencies and Their Work
  • Responding to Terrorism Nonviolently
  • Counterterrorism and Human Rights

Essential Required Reading

  • Kilcullen, D.J. (2005) ‘Countering global insurgency’, Journal of Strategic Studies, 28(4), pp. 597–617. Available at: https://doi.org/10.1080/01402390500300956.
  • Koschade, S. (2006) ‘A Social Network Analysis of Jemaah Islamiyah: The Applications to Counterterrorism and Intelligence’, Studies in Conflict & Terrorism, 29(6), pp. 559–575. Available at: https://doi.org/10.1080/10576100600798418.
  • Moghadam, A. (2009) ‘Motives for Martyrdom: Al-Qaida, Salafi Jihad, and the Spread of Suicide Attacks’, International Security, 33(3), pp. 46–78. Available at: https://doi.org/10.1162/isec.2009.33.3.46.

Recommended Reading

  • Davis, J. (2016) ‘Uncloaking Secrecy: International Human Rights Law in Terrorism Cases’, Human Rights Quarterly, 38(1), pp. 58–84. Available at: https://doi.org/10.1353/hrq.2016.0000.
  • Efrat, A. (2015) ‘Do human rights violations hinder counterterrorism cooperation? Evidence from the FBI’s deployment abroad’, The Review of International Organizations, 10(3), pp. 329–349. Available at: https://doi.org/10.1007/s11558-014-9202-8.
  • Kurtulus, E.N. (2012) ‘The New Counterterrorism: Contemporary Counterterrorism Trends in the United States and Israel’, Studies in Conflict & Terrorism, 35(1), pp. 37–58. Available at: https://doi.org/10.1080/1057610X.2012.631456.

Lecture 7: Foreign Policy, International Organizations, and Technology

Core Required Reading

Muro, D. and Wilson, T. (eds) (2022) Contemporary terrorism studies / edited by Diego Muro, Tim Wilson. Oxford, United Kingdom: Oxford University Press.

  • Foreign Policy and Countering Terrorism
  • International Organizations and Counter-Terrorism
  • Terrorism, Counter-Terrorism, and Technology

Essential Required Reading

  • Cross, M.K.D. (2017) ‘Counter-terrorism in the EU’s external relations’, Journal of European Integration, 39(5), pp. 609–624. Available at: https://doi.org/10.1080/07036337.2017.1327524.
  • Gadarian, S.K. (2010) ‘The Politics of Threat: How Terrorism News Shapes Foreign Policy Attitudes’, The Journal of Politics, 72(2), pp. 469–483. Available at: https://doi.org/10.1017/S0022381609990910.
  • Shandler, R. et al. (2022) ‘Cyber Terrorism and Public Support for Retaliation – A Multi-Country Survey Experiment’, British Journal of Political Science, 52(2), pp. 850–868. Available at: https://doi.org/10.1017/S0007123420000812.

Recommended Reading

Lecture 8: Preventing Violent Extremism and Deradicalization Schemes

Core Required Reading

Muro, D. and Wilson, T. (eds) (2022) Contemporary terrorism studies / edited by Diego Muro, Tim Wilson. Oxford, United Kingdom: Oxford University Press.

  • Preventing and Countering Violent Extremism
  • Disengagement and Deradicalization Programmes

Essential Required Reading

  • Demant, F. and Graaf, B.D. (2010) ‘How to Counter Radical Narratives: Dutch Deradicalization Policy in the Case of Moluccan and Islamic Radicals’, Studies in Conflict & Terrorism, 33(5), pp. 408–428. Available at: https://doi.org/10.1080/10576101003691549.
  • Khalil, J., Horgan, J. and Zeuthen, M. (2022) ‘The Attitudes-Behaviors Corrective (ABC) Model of Violent Extremism’, Terrorism and Political Violence, 34(3), pp. 425–450. Available at: https://doi.org/10.1080/09546553.2019.1699793.
  • Mirahmadi, H. (2016) ‘Building Resilience against Violent Extremism: A Community-Based Approach’, The ANNALS of the American Academy of Political and Social Science, 668(1), pp. 129–144. Available at: https://doi.org/10.1177/0002716216671303.

Recommended Reading

  • Gaudette, T., Scrivens, R. and Venkatesh, V. (2022) ‘The Role of the Internet in Facilitating Violent Extremism: Insights from Former Right-Wing Extremists’, Terrorism and Political Violence, 34(7), pp. 1339–1356. Available at: https://doi.org/10.1080/09546553.2020.1784147.
  • Reinares, F. (2011) ‘Exit From Terrorism: A Qualitative Empirical Study on Disengagement and Deradicalization Among Members of ETA’, Terrorism and Political Violence, 23(5), pp. 780–803. Available at: https://doi.org/10.1080/09546553.2011.613307.
  • Webber, D. et al. (2018) ‘Deradicalizing Detained Terrorists’, Political Psychology, 39(3), pp. 539–556. Available at: https://doi.org/10.1111/pops.12428.

Lecture 9: Sahel and the Islamic State in Khorasan

Core Required Reading

  1. Aslam, W. (2020) ‘Pakistan’s hard misplacement and the politics of regional identity’, Cambridge Review of International Affairs, 33(4), pp. 542–554. Available at: https://doi.org/10.1080/09557571.2020.1723060.
  2. Baldaro, E. (2021) ‘Rashomon in the Sahel: Conflict dynamics of security regionalism’, Security Dialogue, 52(3), pp. 266–283. Available at: https://doi.org/10.1177/0967010620934061.
  3. Chelin, R.P. (2020) ‘From the Islamic State of Algeria to the Economic Caliphate of the Sahel: The Transformation of Al Qaeda in the Islamic Maghreb’, Terrorism and Political Violence, 32(6), pp. 1186–1205. Available at: https://doi.org/10.1080/09546553.2018.1454316.
  4. Cline, L.E. (2021) ‘Jihadist Movements in the Sahel: Rise of the Fulani?’, Terrorism and Political Violence, pp. 1–17. Available at: https://doi.org/10.1080/09546553.2021.1888082.
  5. Fadel, M. (2019) ‘Ideas, Ideology, and the Roots of the Islamic State’, Critical Review, 31(1), pp. 83–94. Available at: https://doi.org/10.1080/08913811.2019.1565733.
  6. Ibrahimi, N. and Akbarzadeh, S. (2020) ‘Intra- Jihadist Conflict and Cooperation: Islamic State–Khorasan Province and the Taliban in Afghanistan’, Studies in Conflict & Terrorism, 43(12), pp. 1086–1107. Available at: https://doi.org/10.1080/1057610X.2018.1529367.
  7. Verma, R. (2021) ‘The Afghan Peace Process: Domestic Fault Lines’, Middle East Policy, 28(3–4), pp. 172–185. Available at: https://doi.org/10.1111/mepo.12576.

Recommended Reading

  • Boeke, S. (2016) ‘Al Qaeda in the Islamic Maghreb: Terrorism, insurgency, or organized crime?’, Small Wars & Insurgencies, 27(5), pp. 914–936. Available at: https://doi.org/10.1080/09592318.2016.1208280.
  • Bos, M. and Melissen, J. (2019) ‘Rebel diplomacy and digital communication: public diplomacy in the Sahel’, International Affairs, 95(6), pp. 1331–1348. Available at: https://doi.org/10.1093/ia/iiz195.
  • Isakhan, B. (2020) ‘The Islamic State Attacks on Shia Holy Sites and the “Shrine Protection Narrative”: Threats to Sacred Space as a Mobilization Frame’, Terrorism and Political Violence, 32(4), pp. 724–748. Available at: https://doi.org/10.1080/09546553.2017.1398741.

Lecture 10: Artificial Intelligence, Critical Infrastructure, and Terrorism

Core Required Reading

  1. Ganor, B. (2021) ‘Artificial or Human: A New Era of Counterterrorism Intelligence?’, Studies in Conflict & Terrorism, 44(7), pp. 605–624. Available at: https://doi.org/10.1080/1057610X.2019.1568815.
  2. Holt, T.J. (2012) ‘Exploring the Intersections of Technology, Crime, and Terror’, Terrorism and Political Violence, 24(2), pp. 337–354. Available at: https://doi.org/10.1080/09546553.2011.648350.
  3. Ionescu, B. et al. (2020) ‘Artificial Intelligence Fights Crime and Terrorism at a New Level’, IEEE MultiMedia, 27(2), pp. 55–61. Available at: https://doi.org/10.1109/MMUL.2020.2994403.
  4. Klingberg, S. (2022) ‘Countering Terrorism: Digital Policing of Open Source Intelligence and Social Media Using Artificial Intelligence’, in R. Montasari (ed.) Artificial Intelligence and National Security. Cham: Springer International Publishing, pp. 101–111. Available at: https://doi.org/10.1007/978-3-031-06709-9_6.
  5. Post, J.M., Ruby, K.G. and Shaw, E.D. (2000) ‘From car bombs to logic bombs: The growing threat from information terrorism’, Terrorism and Political Violence, 12(2), pp. 97–122. Available at: https://doi.org/10.1080/09546550008427563.

Recommended Reading

Lecture 11: Victims of Terrorism

Core Required Reading

Muro, D. and Wilson, T. (eds) (2022) Contemporary terrorism studies / edited by Diego Muro, Tim Wilson. Oxford, United Kingdom: Oxford University Press.

  • Victims of Terrorism and Political Violence
  • The End of Terrorist Campaigns

Essential Required Reading

  • Eubank, W. and Weinberg, L. (2001) ‘Terrorism and Democracy: Perpetrators and Victims’, Terrorism and Political Violence, 13(1), pp. 155–164. Available at: https://doi.org/10.1080/09546550109609674.
  • Maclure, R. and Denov, M. (2006) ‘“I Didn’t Want to Die So I Joined Them”: Structuration and the Process of Becoming Boy Soldiers in Sierra Leone’, Terrorism and Political Violence, 18(1), pp. 119–135. Available at: https://doi.org/10.1080/09546550500384801.
  • Sánchez-Cuenca, I. and Aguilar, P. (2009) ‘Terrorist Violence and Popular Mobilization: The Case of the Spanish Transition to Democracy’, Politics & Society, 37(3), pp. 428–453. Available at: https://doi.org/10.1177/0032329209338927.

Recommended Reading

  • Canetti-Nisim, D., Mesch, G. and Pedahzur, A. (2006) ‘Victimization from Terrorist Attacks: Randomness or Routine Activities?’, Terrorism and Political Violence, 18(4), pp. 485–501. Available at: https://doi.org/10.1080/09546550600880237.
  • Lentini, P. and Bakashmar, M. (2007) ‘Jihadist Beheading: A Convergence of Technology, Theology, and Teleology?’, Studies in Conflict & Terrorism, 30(4), pp. 303–325. Available at: https://doi.org/10.1080/10576100701200140.
  • Weinberg, L., Pedahzur, A. and Canetti-Nisim, D. (2003) ‘The social and religious characteristics of suicide bombers and their victims’, Terrorism and Political Violence, 15(3), pp. 139–153. Available at: https://doi.org/10.1080/09546550312331293167.

Required Students’ Skills

Read the course materials carefully and focus on the core and essential required readings that will greatly increase your level of knowledge.

Learn how to use search engines for academic articles, primarily Web of Science, JSTOR, SAGE Journals, and Google Scholar.

To pass an essay assignment with flying colours, you must master the Harvard citation style. Also, it is highly recommended to read the following publication about research methods and design to improve your essay score:

  • Lamont, C. and Boduszynski, M. (2020) Research methods in politics and international relations. Thousand Oaks: SAGE.

Throughout the course, students are also expected to familiarise themselves with leading academic journals to locate the latest articles, thereby connecting with the international relations academic community.

Scroll to Top