Annotated Bibliography About Terrorism Thesis

Exclusively available on Available only on IvyPanda® Made by Human No AI

Annotated Bibliography

Crocker, Chester A, Hampson, Fen Osler & Aall, Pamela R. (2007). Leashing the Dogs of War. New York: Institute of Peace Press.

The authors capture the fall of the Berlin Wall to the rise of global Terrorism in this book. This is an optimistic book. The central theme of this book is not that something can be accomplished but that many things can be completed and that the test of a skilled peacemaker is to conclude which mechanism will give the best result on which conflict and in which mixture. This book will undoubtedly help the future generation of peacemakers as they struggle to rein in the dogs of war and stiffen the matches on which they feed.

Devetak Richard, Burke Anthony, George Jim. (2007). An Introduction to International Relations. Cambridge: Cambridge University Press.

This book throws light on the new method of methodological approach, which is the feminist approach in international relations, a diverse and broad field of study. This field is richer with controversy, debate, challenging new methodological approaches, and cutting-edge research. Scholars on this subject are interdisciplinary, integrating international relations with cultural, gender, environmental studies, and post-colonial issues. These scholars have made a significant contribution to international relations

Hoffman Bruce. (2006). Inside Terrorism. Columbia: Columbia University Press.

In this book, the author describes how the character and nature of Terrorism were transforming due to new adversaries with varied motivations and rationales that had surfaced to confront the traditional wisdom on Terrorism and terrorists. The face of Terrorism is undergoing sea changes as Terrorism is now motivated by fundamental religious concepts and the engagement of suicide bombers in Iraq, Israel, and Moscow. This book analyses why suicidal Terrorism is on the increase and how it can be countered. Terrorism is now highly sophisticated as a terrorist currently employs internet technology to disseminate their policies and goals and attract support for their causes. The author also throws light on the possible use of biological, chemical, radiological, and nuclear weapons by terrorists.

The author has been doing research on Terrorism and terrorist activities for the last three decades, and his vast experience on the subject disseminates valuable insight and information on the subject.

Khanna, Parag. “Terrorism as war. (No End to War: Terrorism in the Twenty-First Century)(Book Review).” Policy Review. 2003.

This is a book review article written by Khanna on the book “Terrorism as a war” written by Walter Laqueur and published by Continuum Books.

It is to be observed that before 9/11, there was a separate concept of “war on terrorism.” There has been a “war on drugs, “cold war, and after the Pearl Harbor attack, there was a colossal national mobilization at most. Previously Terrorism has been regarded as the continuation of war by other tactics and has become a war itself.

This book offers insight into how great powers misuse the war on Terrorism. The author points out how the legitimization of the present military aggression and persecution against Uighurs by China and Chechens by Russia as “wars against Terrorism which has confused the political boundary between internal conflict and Terrorism.

The author recalls the quotes of Trotsky “You may not be fond of war. But war is fond of you and ascribes to the USA.

Lee Steven. (2007). Intervention, Terrorism, and Torture. New York: Springer.

The author of this book is Lee Steven. He is a professor of Philosophy at Hobart and William Smith Colleges. Lee is a critical author on issues about political and moral philosophy. His favorite theme is ”Just War Theory”. This book is a collection of essays presented in a 2004 meeting held at Stanford University in Palo Alto, California.

After the 9/11 attack, some accelerated and highlighted changes were happening, especially in the role of military violence. This book examines the moral impact of these transformations. Customarily, issues of the morality of armed forces and violence have been comprehended and evaluated in terms of Just War Theory. This book analyses the magnitude to which recent happenings in the role of military violence pose confronts to Just War Theory. It deeply evaluates how the part of military violence transformed and what are the moral impacts?

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, July 11). Annotated Bibliography About Terrorism. https://ivypanda.com/essays/annotated-bibliography-about-terrorism/

Work Cited

"Annotated Bibliography About Terrorism." IvyPanda, 11 July 2022, ivypanda.com/essays/annotated-bibliography-about-terrorism/.

References

IvyPanda. (2022) 'Annotated Bibliography About Terrorism'. 11 July.

References

IvyPanda. 2022. "Annotated Bibliography About Terrorism." July 11, 2022. https://ivypanda.com/essays/annotated-bibliography-about-terrorism/.

1. IvyPanda. "Annotated Bibliography About Terrorism." July 11, 2022. https://ivypanda.com/essays/annotated-bibliography-about-terrorism/.


Bibliography


IvyPanda. "Annotated Bibliography About Terrorism." July 11, 2022. https://ivypanda.com/essays/annotated-bibliography-about-terrorism/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1