Abrahms, M (2008) What terrorists really want: terrorist motives and counterterrorism strategy. International Security 32 (4):78–105.
Abrahms, M (2012) The political effectiveness of terrorism revisited. Comparative Political Studies 45 (3):366–393.
Acosta, B (2009) Palestinian Precedents: The Origins of Al-Qaeda’s Use of Suicide Terrorism and Istishhad. Santa Barbara, CA: Praeger Security International, pp. 193–206.
Acosta, B (2014a) From bombs to ballots: when militant organizations transition to political parties. Journal of Politics 76 (3):666–683.
Acosta, B (2014b) Live to win another day: why many militant organizations survive yet few succeed. Studies in Conflict and Terrorism 37 (2):135–161.
Acosta, B (2016) Dying for survival: why militant organizations continue to conduct suicide attacks. Journal of Peace Research 53, 180–196.
Acosta, B and Childs, SJ (2013) Illuminating the global suicide-attack network. Studies in Conflict and Terrorism 36 (1):49–76.
Alonso, R (2011) Why do terrorists stop? Analyzing why ETA members abandon or continue with terrorism. Studies in Conflict and Terrorism 34 (9):696–716.
Aspen (2015) FBI director reveals hidden threat of ISIS at Aspen security forum. The Aspen Times, 14 July, accessed 14 July 2015.
Barberá, P (2015) Birds of the same feather tweet together: Bayesian ideal point estimation using Twitter data. Political Analysis 23 (1):76–91.
Barberá, P, Jost, JT, Nagler, J, Tucker, JA and Bonneau, R (2015) Tweeting from left to right: is online political communication more than an echo chamber? Psychological Science 26 (10):1531–1542.
Barceló, J and Labzina, E (2018) Replication Data for ‘Do Islamic State’s Deadly Attacks Disengage, Deter, or Mobilize Supporters?’, https://doi.org/10.7910/DVN/H6RZA7, Harvard Dataverse, V1, UNF:6:6y+r1ROvOWIQgsxevAAjqw== [fileUNF]
Berger, J (2015) The metronome of apocalyptic time: social media as carrier wave for millenarian contagion. Perspectives on Terrorism 9 (4):61–71.
Bjørgo, T (2011) Dreams and disillusionment: engagement in and disengagement from militant extremist groups. Crime, Law and Social Change 55 (4):277–285.
Blankenship, B (2018) When do states take the bait? State capacity and the provocation logic of terrorism. Journal of Conflict Resolution 62 (2):381–409.
Bueno de Mesquita, E (2005) The quality of terror. American Journal of Political Science 49 (3):515–530.
Bueno de Mesquita, E and Dickson, ES (2007) The propaganda of the deed: terrorism, counterterrorism, and mobilization. American Journal of Political Science 51 (2):364–381.
Byman, D (2016) Understanding the Islamic State: a review essay. International Security 40 (4):127–165.
Cheng, Z, Caverlee, J and Lee, K (2010) You are where you tweet: a content-based approach to geo-locating Twitter users. In Proceedings of the 19th ACM International Conference on Information and Knowledge Management. ACM, Toronto, Ontario, Canada, October 26–30, pp. 759–768.
Clark, A (2016) Islamic State security concerns feed divisions in liberal ranks. Australian Financial Review, 1 April, accessed 22 October 2016.
Compton, R, Jurgens, D and Allen, D (2014) Geotagging one hundred million Twitter accounts with total variation minimization. In 2014 IEEE International Conference on Big Data (Big Data). IEEE, Washington DC, USA, October 27–30, pp. 393–401.
Denardo, J (1985) Power in Numbers: The Political Strategy of Protest and Rebellion. Princeton, NJ: Princeton University Press.
Doosje, B, Moghaddam, FM, Kruglanski, AW, de Wolf, A, Mann, L and Feddes, AR (2016) Terrorism, radicalization and de-radicalization. Current Opinion in Psychology 11, 79–84.
Fortna, VP (2015) Do terrorists win? Rebels’ use of terrorism and civil war outcomes. International Organization 69 (3):519–556.
France 24 (2016) L’EI a revendiqué l’attentat de Nice via son agence amaq. France 24, 17 July, accessed 22 October 2016.
Gonzalez, R, Cuevas, R, Cuevas, A and Guerrero, C (2011) Where are my followers? Understanding the locality effect in Twitter. CoRR abs/1105. 3682, 1–7.
Grygiel, J (2013) The primacy of premodern history. Security Studies 22 (1):1–32.
Hendrix, CS and Young, JK (2014). State capacity and terrorism: a two-dimensional approach. Security Studies 23 (2):329–363.
Hoffman, B and McCormick, GH (2004) Terrorism, signaling, and suicide attack. Studies in Conflict and Terrorism 27 (4):243–281.
Horgan, J (2005) The social and psychological characteristics of terrorism and terrorists. In Bjorgo T (ed.), Root Causes of Terrorism: Myths, Reality and Ways Forward. New York: Routledge, pp. 44–53.
Imbens, G and Kalyanaraman, K (2012) Optimal bandwidth choice for the regression discontinuity estimator. Review of Economic Studies 79 (3):933–959.
Jurgens, D (2013) That’s what friends are for: inferring location in online social media platforms based on social relationships. ICWSM 13, 273–282.
Jurgens, D, Finethy, T, McCorriston, J, Xu, YT and Ruths, D (2015) Geolocation prediction in twitter using social networks: a critical analysis and review of current practice. In Proceedings of the International Conference on Web and Social Media, Oxford, England, May 26–29, pp. 188–197.
King, G, Pan, J and Roberts, ME (2014) Reverse engineering Chinese censorship through randomized experimentation and participant observation. American Political Science Review 107 (2):326–343.
Klausen, J (2015) Tweeting the jihad: social media networks of western foreign fighters in Syria and Iraq. Studies in Conflict and Terrorism 38 (1):1–22.
Kydd, AH and Walter, BF (2006) The strategies of terrorism. International Security 31 (1):49–80.
Lee, DS and Lemieuxa, T (2010) Regression discontinuity designs in economics. Journal of Economic Literature 48 (2):281–355.
Lyall, J, Blair, G and Imai, K (2013) Explaining support for combatants during wartime: a survey experiment in Afghanistan. American Political Science Review 107 (4):679–705.
Mestre, A, Revault d’Allonnes, D and Bissuel, B (2016) Attentat de Nice: les responsables politiques, entre emotion et colère. Le Monde, 15 July, accessed 22 October 2016.
Mitra, S et al. (2008) Poverty and terrorism. Economics of Peace and Security Journal 3 (2):57–61.
Mitts, T (2018) From isolation to radicalization: anti-Muslim hostility and support for ISIS in the West. American Political Science Review.
Moghadam, A (2012) Failure and disengagement in the Red Army Faction. Studies in Conflict and Terrorism 35 (2):156–181.
Moghaddam, FM (2005). The staircase to terrorism: a psychological exploration. American Psychologist 60 (2):161.
Monroe, BL, Pan, J, Roberts, ME, Sen, M and Sinclair, B (2015) No! Formal theory, causal inference, and big data are not contradictory trends in political science. PS: Political Science and Politics 48 (1):71–74.
Pape, R (2003) The strategic logic of suicide terrorism. American Political Science Review 97 (3):343–361.
Pape, R (2005) Dying to Win: The Strategic Logic of Suicide Terrorism. New York: Random House.
Pargament, KI, Magyar-Russell, GM and Murray-Swank, NA (2005) The sacred and the search for significance: religion as a unique process. Journal of Social Issues 61 (4):665–687.
Peffley, M, Hutchison, ML and Shamir, M (2015) The impact of persistent terrorism on political tolerance: Israel, 1980 to 2011. American Political Science Review 109 (4):817–832.
Percoco, M (2014) Regression Discontinuity Design: When Series Interrupt. Cham: Springer International Publishing, pp. 9–20.
Piazza, JA (2011) Poverty, minority economic discrimination, and domestic terrorism. Journal of Peace Research 48 (3):339–353.
Reinares, F (2011) Exit from terrorism: a qualitative empirical study on disengagement and deradicalization among members of ETA. Terrorism and Political Violence 23 (5):780–803.
Rout, D, Bontcheva, K, Preoţiuc-Pietro, D and Cohn, T (2013) Where’s Wally? A classification approach to geolocating users based on their social ties. In Proceedings of the 24th ACM Conference on Hypertext and Social Media. ACM, 1–3 May, Paris, France, pp. 11–20.
Rudner, M (2017) ‘Electronic jihad’: the internet as Al Qaeda’s catalyst for global terror. Studies in Conflict and Terrorism 40 (1):10–23.
Salganik, MJ (2018) Bit by Bit: Social Research in the Digital Age. Princeton, NJ: Princeton University Press.
Schmid, AP (2013) Radicalisation, de-radicalisation, counter-radicalisation: a conceptual discussion and literature review. ICCT Research Paper 97, 22.
Siegel, DA and Young, JK (2009) Simulating terrorism: credible commitment, costly signaling, and strategic behavior. PS: Political Science and Politics 42 (4):765–771.
Singer, JD, Bremer, S and Stuckey, J (1972) Capability distribution, uncertainty, and major power war, 1820–1965. Peace, War, and Numbers 19, 48.
Sullivan, P (2012) Who Wins? Predicting Strategic Success and Failure in Armed Conflict. New York: Oxford University Press.
Thomas, J (2014) Rewarding bad behavior: how governments respond to terrorism in civil war. American Journal of Political Science 58 (4):804–818.
Turk, AT (2004) Sociology of terrorism. Annual Review of Sociology 36, 271–286.
Victoroff, JE and Kruglanski, AW (2009) Psychology of Terrorism: Classic and Contemporary Insights. New York: Psychology Press.
Wenger, A and Wilner, A (2012). Deterring Terrorism: Theory and Practice. Redwood City, CA: Stanford University Press.
Williams, RA (2016) Nice terror attack: ISIS claims responsibility for lorry massacre in French coastal city. Independent, 17 July, accessed 12 October 2016.