Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-4hhp2 Total loading time: 0 Render date: 2024-05-02T05:01:14.577Z Has data issue: false hasContentIssue false

References

Published online by Cambridge University Press:  18 December 2014

Michael L. Gross
Affiliation:
University of Haifa, Israel
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
The Ethics of Insurgency
A Critical Guide to Just Guerrilla Warfare
, pp. 283 - 314
Publisher: Cambridge University Press
Print publication year: 2015

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Abdel-Jawad, S. (2001). The classification and recruitment of collaborators. In The phenomenon of collaborators in Palestine, proceedings of a Passia workshop (pp. 17–28). Jerusalem: Palestinian Academic Society for the Study of International Affairs.Google Scholar
Abi-Saab, G. (1979). “The legal status of wars of national liberation.” Wars of national liberation in the Geneva conventions and protocols. Collected Courses of the Hague Academy of International Law, 165, 353–448. Martinus Nijhoff Publishers.Google Scholar
Abrahms, M. (2011). Does terrorism really work? Evolution in the conventional wisdom since 9/11. Defence and Peace Economics, 22(6), 583–594.CrossRefGoogle Scholar
Abresch, W. (2005). A human rights law of internal armed conflict: The European Court of Human Rights in Chechnya. European Journal of International Law, 16(4), 741–767.CrossRefGoogle Scholar
Additional Protocol I (API). (1977). Protocol Additional to the Geneva Conventions of August 12, 1949, and relating to the Protection of Victims of International Armed Conflicts (Protocol I), June 8, 1977.
Additional Protocol I (API) Commentary. (1977). Protocol Additional to the Geneva Conventions of August 12, 1949, and relating to the Protection of Victims of International Armed Conflicts (Protocol I), June 8, 1977. Commentary.
Additional Protocol II (APII). (1977). Protocol Additional to the Geneva Conventions of August 12, 1949, and relating to the Protection of Victims of Non-International Armed Conflicts (Protocol II), June 8, 1977.
Aguswandi, W. Z. (2008). From politics to arms to politics again: The transition of the Gerakan Aceh Merdeka (Free Aceh Movement – GAM). Berlin: Berghof Research Center for Constructive Conflict Management.Google Scholar
Aharonovitz, E. (2010). Hezi Shai, who fell prisoner in the battle of Sultan Yaakov, returns to those dark days. Haaretz, March 19. .
Ahmed, A. and Sahak, S. (2013). Drone and Taliban attacks hit civilians, Afghans say. New York Times, August 8. .
Akande, D. (2010). Clearing the fog of war? The ICRC’s interpretive guidance on direct participation in hostilities. International and Comparative Law Quarterly, 59(01), 180–192.Google Scholar
al-Libi, Abu-Yahya. (2008). Website posts Abu-Yahya al-Libi’s research on human shields in jihad.” World News Connection, National Technical Information Service, April 10. .
Amble, J. C. (2012). Combating terrorism in the new media environment. Studies in Conflict & Terrorism, 35(5), 339–353.CrossRefGoogle Scholar
Amnesty International. (2011a). Israel-Hamas prisoner swap casts harsh light on detention practices of all sides. .
Amnesty International. (2011b). Questions around operation against Osama bin Laden. .
Amnesty International. (2011c). Support campaign to end the suffering of Gilad Shalit and his family. .
Annas, G. J., Crosby, S. S., and Glantz, L. H. (2013). Guantanamo Bay: A medical ethics–free zone?New England Journal of Medicine, 369, 101–103.CrossRefGoogle ScholarPubMed
Arens, O. and Kaufman, E. (2012). The potential Impact of Palestinian Nonviolent Struggle on Israel: Preliminary Lessons and projections for the Future. The Middle East Journal, 66(2), 231–252.CrossRefGoogle Scholar
Ariely, G. (2008). Knowledge management, terrorism, and cyber terrorism. In Janczewski, L. and Colarik, A. (Eds.), Cyber warfare and cyber terrorism (pp. 7–16). Hershey, PA: IGI Global.Google Scholar
Arkin, W. (2007). Divining victory: Airpower in the Israel-Hezbollah war. Maxwell Airforce Base: Air University Press.Google Scholar
Army Recognition. (nd). Fadjr-5 333mm multiple rocket launcher system. .
Arquilla, J. and Karasik, T. (1999). Chechnya: A glimpse of future conflict?Studies in Conflict and Terrorism, 22(3), 207–229.CrossRefGoogle Scholar
Aspinall, E. (2009). Islam and nation: Separatist rebellion in Aceh, Indonesia. Stanford, CA: Stanford University Press.Google Scholar
Aspinall, E. and Crouch, H. A. (2003). The Aceh peace process: Why it failed. Washington, DC: East-West Center.Google Scholar
Asprey, R. B. (1994). War in the shadows: The guerrilla in history. New York: William Morrow and Company.Google Scholar
Asser, M. (2006). Qana makes grim history again. July 31. .
Austin, W. C. and Kolenc, A. B. (2006). Who’s afraid of the big bad wolf? The International Criminal Court as a weapon of asymmetric warfare. Vanderbilt Journal of Transnational Law, 39, 291–346.Google Scholar
Awwad, H. (2012). Six years of BDS: Success. In Lim, A. (Ed.), The case for sanctions against Israel (pp. 77–84). London: Verso.Google Scholar
Bakker, P. (2001). New nationalism: The internet crusade (paper prepared for International Studies Association Annual Convention, Chicago, Illinois, February 20–24). .
Ballentine, K. and Nitzschke, H. (2005). The political economy of civil war and conflict transformation. Berlin: Berghof Research Center for Constructive Conflict Management. . 2005.
Bangerter, O. (2011a). A collection of codes of conduct issued by armed groups. International Review of the Red Cross, 93(882), 483–501.Google Scholar
Bangerter, O. (2011b). Reasons why armed groups choose to respect international humanitarian law or not. International Review of the Red Cross, 93(882), 353–384.CrossRefGoogle Scholar
Banville, A. (2010). Embedded war reporting cannot escape its own bias. The Guardian, April 18. .
Bar Joseph, U. (2007). Israel’s military intelligence performance in the Second Lebanon War. International Journal of Intelligence and Counterintelligence, 20, 583–601.CrossRefGoogle Scholar
Barilan, Y. M. (2012). Human dignity, human rights, and responsibility: The new language of global ethics and biolaw. Cambridge: The MIT Press.Google Scholar
Barilan, Y. M. and Zuckerman, S. (2013). Revisiting medical neutrality as a moral value and as a doctrine of international law. In Gross, M. L. and Carrick, D. (Eds.), Military medical ethics for the 21st century (pp. 97–110). Farnham, UK: Ashgate.Google Scholar
Barnard, A. and Rudoren, J. (2014). Israel says that Hamas uses civilian shields, reviving debate. New York Times, July 23. .
Barzashka, I. (2013). Are cyber-weapons effective?The RUSI Journal, 158(2), 48–56.CrossRefGoogle Scholar
BDS Movement. (2005). Palestinian civil society call for BDS. July 9. .
BDS National Committee. (2009). Palestinian trade unions unanimously support boycott movement. BDS National Committee, Press Release, November 26. .
Be’er, Y. and Abdel-Jawad, S. (1994). Collaborators in the Occupied Territories: Human rights abuses and violations. Jerusalem: B’Tselem.Google Scholar
Beaton, A., Cook, M., Kavanagh, M., and Herrington, C. (2000). The psychological impact of burglary. Psychology, Crime and Law, 6(1), 33–43.CrossRefGoogle Scholar
Becker, J. (2011). Beirut bank seen as a hub of Hezbollah’s financing. New York Times, December 12. .
Bedau, H. (1968). The right to life. The Monist, 52(4), 550–572.CrossRefGoogle Scholar
Bedau, H. (1971). Military service and moral obligation. Inquiry, 14(1–4), 244–266.CrossRefGoogle Scholar
Beggs, C. (2008). Cyber-terrorism in Australia. IGI Global, 108–113.Google Scholar
Beitz, C. R. (1989). Covert intervention as a moral problem. Ethics & International Affairs, 3(1), 45–60.CrossRefGoogle Scholar
Bekaj, A. R. (2010). The KLA and the Kosovo war: From intra-state conflict to independent country. Berlin: Berghof Research Center for Constructive Conflict Management.Google Scholar
Bekkers, R. and Wiepking, P. (2007). Generosity and philanthropy: A literature review. Available at SSRN. .CrossRef
Bellamy, A. J. (2012). Massacres and morality: Mass atrocities in an age of civilian immunity. Oxford: Oxford University Press.CrossRefGoogle Scholar
Benbaji, Y. (2013). Justice in asymmetric wars: A contractarian analysis. The Law & Ethics of Human Rights, 6(2), 172–200.CrossRefGoogle Scholar
Bennet, H. (2010). Detention and interrogation in Northern Ireland, 1969–75. In Scheipers, S. (Ed.), Prisoners in war (pp. 187–204). Oxford: Oxford University Press.Google Scholar
Beres, L. R. (2002–2003). Assassinating Saddam Hussein: The view from international law. Indiana International & Comparative Law Review, 13, 847–870.Google Scholar
Betz, D. J. (2006). The more you know, the less you understand: The problem with information warfare. The Journal of Strategic Studies, 29(3), 505–533.CrossRefGoogle Scholar
Black, J. (2001). Semantics and ethics of propaganda. Journal of Mass Media Ethics, 16(2–3), 121–137.CrossRefGoogle Scholar
Blake, N. and Pole, K. (Eds.). (1984). Objections to nuclear defence: Philosophers on deterrence. London: Routledge and Kegan Paul.Google Scholar
Blau, P. M. (1963). Critical remarks on Weber’s theory of authority. The American Political Science Review, 57(2), 305–316.CrossRefGoogle Scholar
Bleich, A., Gelkopf, M., Melamed, Y., and Solomon, Z. (2006). Mental health and resiliency following 44 months of terrorism: a survey of an Israeli national representative sample. BMC Medicine, 4(1), 21. .CrossRefGoogle ScholarPubMed
Bleich, A., Gelkopf, M., and Solomon, Z. (2003). Exposure to terrorism, stress-related mental health symptoms, and coping behaviors among a nationally representative sample in Israel. The Journal of the American Medical Association, 290, 612–620.CrossRefGoogle ScholarPubMed
Bok, S. (1999). Lying: Moral choice in public and private life. New York: Vintage.Google Scholar
Bozarslan, H. (2001). Human rights and the Kurdish issue in Turkey: 1984–1999. Human Rights Review, 3(1), 45–54.CrossRefGoogle Scholar
Bracken, P. (2007). Financial warfare. Orbis, 51(4), 685–696.CrossRefGoogle Scholar
Branche, R. (2010). The French in Algeria: Can there be prisoners of war in a ‘domestic’ operation? In Scheipers, S. (Ed.), Prisoners in war (pp. 173–186). Oxford: Oxford University Press.Google Scholar
Bray, J., Lunde, L., and Murshed, S. M. (2003). Nepal: Economic drivers of the Maoist insurgency. In Ballentine, K. and Sherman, J. (Eds.), The political economy of armed conflict: Beyond greed and grievance (pp. 107–132). London: Rienner.Google Scholar
Brown, B. B. and Harris, P. B. (1989). Residential burglary victimization: Reactions to the invasion of a primary territory. Journal of Environmental Psychology, 9(2), 119–132.CrossRefGoogle Scholar
Brown, C. (2003). Selective humanitarianism: In defense of inconsistency. In Chatterjee, D. K. and Scheid, D. (Eds.), Ethics and foreign intervention (pp. 31–52). Cambridge: Cambridge University Press.Google Scholar
Brown, J. (2008). Public diplomacy and propaganda: Their difference. American Diplomacy, September 16. .
B’Tselem. (The Israeli Information Center for Human Rights in the Occupied Territories). (2009). B’Tselem’s investigation of fatalities in Operation Cast Lead. September 9. .
B’Tselem. (2012a). Statistics on Palestinians in the custody of the Israeli security forces. .
B’Tselem. (2012b). Five years without visits – Will family visits be renewed for prisoners from Gaza? .
B’Tselem. (2013). Fatalities before, during and since Operation Cast Lead and in the First Intifada. .
B’Tselem. (nd.). Fatalities in the first Intifada. Accessed November 20, 2013. .
Buchanan, A. (1997). Theories of secession. Philosophy & Public Affairs, 26(1), 31–61.CrossRefGoogle Scholar
Buchanan, J. M. (1984). The ethical limits of taxation. The Scandinavian Journal of Economics, 86(2), 102–114.CrossRefGoogle Scholar
Buchholz, M. B. (2013). The human shield in Islamic ,jurisprudence. Military Review, May-June, 48–52.
Bush, G. W. (2010). Decision points. New York: Random House.Google Scholar
Byrd, W. and Mansfield, D. (2012) Drugs in Afghanistan – A forgotten issue? Implications and risks for transition. United States Institute of Peace PEACEBRIEF, 126, May 18, p. 4. .
Byrd, W. and Ward, C. (2004). Drugs and development in Afghanistan. World Bank, Social Development Papers, Conflict Prevention and Reconstruction, Paper No. 18, December. .
Caddell, J. W. (2004). Deception 101: Primer on deception. Carlisle, PA: Strategic Studies Institute, US Army War College.CrossRefGoogle Scholar
Canetti, D., Gross, M. L., and Waismel-Manor, I. (in press). Immune from cyber fire? The psychological & physiological effects of cyber war. In Allhoff, F., Henschke, A., and Strawser, B. J. (Eds.). Binary Bullets: The Ethics of Cyberwarfare. Oxford: Oxford University Press.
Canetti-Nisim, D., Halperin, E., Sharvit, K., and Hobfoll, S. E. (2009). A new stress-based model of political extremism personal exposure to terrorism, psychological distress, and exclusionist political attitudes. Journal of Conflict Resolution, 53(3), 363–389.CrossRefGoogle ScholarPubMed
Caney, S. (1998). National self-determination and national secession: Individualist and communitarian approaches. In Lehning, P. B. (Ed.), Theories of secession (pp. 151–181). New York: Routledge.Google Scholar
Carley, S. D. and Mackway-Jones, K. (1997). The casualty profile from the Manchester bombing 1996: a proposal for the construction and dissemination of casualty profiles from major incidents. Journal of Accident & Emergency Medicine, 14(2), 76–80.CrossRefGoogle ScholarPubMed
Carter, A. (1998). Liberalism and the obligation to military service. Political Studies, 46(1), 68–81.CrossRefGoogle Scholar
Casalin, D. (2011). Taking prisoners: Reviewing the international humanitarian law grounds for deprivation of liberty by armed opposition groups. International Review of the Red Cross, 93(883), 743–757.CrossRefGoogle Scholar
Cass, D. Z. (1992). Re-thinking self-determination: A critical analysis of current international law theories. Syracuse Journal of International Law and Commerce, 18, 21–40.Google Scholar
Cassese, A. (1995). Self-determination of peoples: A legal reappraisal. Cambridge: Cambridge University Press.Google Scholar
Cavelty, M. D. (2012). Cyber-threats. In Cavelty, M. D. and Mauer, V. (Eds.), The Routledge handbook of security studies (pp. 180–189). London: Routledge.Google Scholar
Central Intelligence Agency (CIA). (2007, 2012). The world factbook. .
Chadwick, A. (2012). Lebanon: The 2006 Lebanon War: A Short History Part II. Small Wars Journal, September 12. .
Chaumont, C. (1977). Additional Protocol I, Commentary, Article 44, page 519, note 40.
Checchia, M. (2012a). Improvised explosive devices: A Global Review. Civil-military fusion centre counter-Improvised explosive devices. January & February. .
Checchia, M. (2012b). Improvised explosive devices: A Global Review. Civil-military fusion centre counter-Improvised explosive devices.March, April & May. .
Chenoweth, E. and Cunningham, K. G. (2013). Understanding nonviolent resistance: An introduction. Journal of Peace Research, 50(3), 271–276.CrossRefGoogle Scholar
Chenoweth, E. and Stephan, M. J. (2011). Why civil resistance works: The strategic logic of nonviolent conflict. New York: Columbia University Press.Google Scholar
Chesser, S. G. (2012). Afghanistan casualties: Military forces and civilians. Congressional Research Service. Washington, DC: Library of Congress. .
Christians, C. and Nordenstreng, K. (2004). Social responsibility worldwide. Journal of Mass Media Ethics, 19(1), 3–28.CrossRefGoogle Scholar
Christiansen, D. and Powers, G. F. (1995). Economic sanctions and the just-war doctrine. In Cortright, D. and Lopez, G. A. (Eds.), Economic sanctions: Panacea or peacebuilding in a post-Cold War world? (pp. 97–117). Boulder, CO: Westview.Google Scholar
Cirino, J. A., Elizondo, S. L., and Wawro, G. (2004). Latin America’s lawless areas and failed states. In P. D. Taylor (Ed.), Latin American security challenges: A collaborative inquiry from North and South, Newport Papers, 21 (pp. 7–48). Newport, RI: Naval War College. .
Clark, H. (2000). Civil resistance in Kosovo. London: Pluto Press.Google Scholar
Cliffe, L. (1989). Forging a nation: The Eritrean experience.Third World Quarterly, 11(4), 131–147.CrossRefGoogle Scholar
Coady, C. A. J. (1988). Deterrent intentions revisited. Ethics, 99(1), 98–108.CrossRefGoogle Scholar
Coady, C. A. J. (1989). Escaping from the bomb: Immoral deterrence and the problem of extrication. In Shue, H. (Ed.), Nuclear deterrence and moral restraint: Critical choices for American strategy (pp. 163–225). Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Coady, C. A. J. (2004). Terrorism, morality, and supreme emergency. Ethics, 114(4), 772–789.CrossRefGoogle Scholar
Cohen, A. (2009). Economic sanctions in IHL: Suggested principles. Israel Law Review, 42, 117–149.CrossRefGoogle Scholar
Connell, D. (2001). Inside the EPLF: The origins of the ‘people’s party’ & its role in the liberation of Eritrea. Review of African Political Economy, 28(89), 345–364.CrossRefGoogle Scholar
Coogan, T. P. (2002). The IRA. London: HarperCollins UK.Google Scholar
Coovadia, H. M. (1999). Sanctions and the struggle for health in South Africa. American Journal of Public Health, 89(10), 1505–1508.CrossRefGoogle ScholarPubMed
Cordesman, A. H. (2003). The military balance in North Africa. Washington, DC: Center for Strategic and International Studies. .
Cordesman, A. H. (2007). Lessons of the 2006 Israeli-Hezbollah war. Washington, DC: Center for Strategic and International Studies. .Google Scholar
Cordone, C. and Gidron, A. (2000). Was the Serbian TV station really a legitimate target. Le Monde Diplomatique. .
Corlett, J. A. (2003). Terrorism: A philosophical analysis (vol. 101). Dordrecht: Kluwer Academic Publishers.CrossRefGoogle Scholar
Council on Foreign Relations (CFR). (2011). Hamas. .
Cunningham, K. G. (2013). Understanding strategic choice: The determinants of civil war and nonviolent campaign in self-determination disputes. Journal of Peace Research, 50(3), 291–304.CrossRefGoogle Scholar
Cunningham, S. B. (1992). Sorting out the ethics of propaganda. Communication Studies, 43(4), 233–245.CrossRefGoogle Scholar
Daadaoui, M. (2008). The Western Sahara conflict: Towards a constructivist approach to self-determination. The Journal of North African Studies, 13(2), 143–156.CrossRefGoogle Scholar
Daboné, Z. (2012). International law: Armed groups in a state-centric system. International Review of the Red Cross, 93(882), 395.CrossRefGoogle Scholar
Dadpay, A. (2010). A review of Iranian aviation industry: Victim of sanctions or creation of mismanagement? (paper presented at the Third Conference on Iran’s Economy, University of Chicago, Chicago, October). .
Dajani, S. R. (1995). Eyes without country: Searching for a Palestinian strategy of liberation. Philadelphia, PA: Temple University Press.Google Scholar
Dajani, S. R. (1999). Nonviolent resistance in the Occupied Territories: A critical reevaluation. In Zunes, S., Asher, S. B., and Kurtz, L. (Eds.), Nonviolent social movements: A geographical perspective (pp. 52–74). Oxford: Blackwell.Google Scholar
Darwish, R., Farajalla, N., and Masri, R. (2009). The 2006 war and its inter-temporal economic impact on agriculture in Lebanon. Disasters, 33(4), 629–644.CrossRefGoogle ScholarPubMed
Davison, N. (2009). Nonlethal weapons. Hampshire: Palgrave Macmillan.CrossRefGoogle Scholar
Demmers, J. (2002). Diaspora and conflict: Locality, long-distance nationalism, and delocalisation of conflict dynamics. The Public-Javnost, 9(1), 85–96.CrossRefGoogle Scholar
Denselow, J. (2010). The Iran sanctions dilemma. The Guardian, January 2. .
Department of the Army. (2006). Field manual FM 3–24, MCWP 3–33.5, Counterinsurgency. Washington, DC: Department of the Army.Google Scholar
Department of the Navy. (2007). Naval Warfare Publication, The Commander’s Handbook on The Law of Naval Operations, NWP 1-14M 2007. .
Diamant, A. (2009). Day after night: A novel. New York: Simon and Schuster.Google Scholar
Diamond, G. M., Lipsitz, J. D., Fajerman, Z.and Rozenblat, O. (2010). Ongoing traumatic stress response (OTSR) in Sderot, Israel. Professional Psychology: Research and Practice, 41, 19–25.CrossRefGoogle Scholar
Dietz, A. S. (2011). Countering the effects of IED systems in Afghanistan: An integral approach. Small Wars & Insurgencies, 22(02), 385–401.CrossRefGoogle Scholar
Dinniss, H. H. (2012). Cyber warfare and the laws of war. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Dinstein, Y. (2005) War, aggression and self-defense (4th ed). Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Dinstein, Y. (2009). The international law of belligerent occupation. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Dinstein, Y. (2010). The conduct of hostilities under the law of international armed conflict (2nd ed.). Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Dishman, C. (2001). Terrorism, crime, and transformation. Studies in Conflict and Terrorism, 24(1), 43–58.CrossRefGoogle Scholar
Dörmann, K. (2004). Applicability of the Additional Protocols to computer network attacks. War Studies, 76. .
Dudouet, V. (2008). Nonviolent resistance and conflict transformation in power asymmetries. Berlin: Berghof Research Center for Constructive Conflict ManagementGoogle Scholar
Dudouet, V. (2013). Dynamics and factors of transition from armed struggle to nonviolent resistance. Journal of Peace Research, 50(3), 401–413.CrossRefGoogle Scholar
DunlapJr., C. J. (2009). Lawfare: A decisive element of 21st-century conflicts?Joint Force Quarterly, 54, 34–39.Google Scholar
Dunn, J. (2001). Against Humanity in East Timor, January to October 1999: Their nature and causes. East Timor Action Network. .
Eck, K. (2009). From armed conflict to war: Ethnic mobilization and conflict intensification. International Studies Quarterly, 53(2), 369–388.CrossRefGoogle Scholar
Eck, K. (2010). Recruiting rebels: Indoctrination and political education in Nepal. In Lawoti, M. and Pahari, A. (Eds.), The Maoist insurgency in Nepal: Dynamics and growth in the 21st century (pp. 33–51). London: Routledge.Google Scholar
Ellul, J. (1981). The ethics of propaganda: Propaganda, innocence, and amorality. Communication, 6, 159–175.Google Scholar
Elster, J. (1989). The cement of society: A survey of social order. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
English, R. (2003). Armed struggle: The history of the IRA. Oxford: Oxford University Press.Google Scholar
Erakat, N. (2012). BDS in the USA: 2001–2010. In Lim, A. (Ed.), The case for sanctions against Israel (pp. 85–100). London: Verso.Google Scholar
Erdbrink, T. (2012). For Iran’s sick, sanctions turn lethal as drugs vanish. International Herald Tribune, November 3–4, p. 1.
Erlich, R. (2006). Hezbollah’s use of Lebanese civilians as human shields. Ramat Hasharon: Intelligence and Terrorism Information Center at the Center for Special Studies (C.S.S). .
Estes, A. C. (2013). Anonymous hits Israel with a massive cyber attack, Israel attacks back. Yahoo News. .
Estrin, D. (2012). Gilad Shalit, Freed Israeli soldier, speaks of Hamas captivity. Huffington Post. .
Ethics. (1985). Symposium on ethics and nuclear deterrence. Ethics, 95 (3), 409–739.
Etzioni, A. (2010). The case for drones. Email posting from Communitarian International Relations, 3.31.2010.
Even, S. (2010). Israel’s defense expenditure. Strategic Assessment (Tel Aviv), 12(4), 37–55.Google Scholar
Fabre, C. (2012). Cosmopolitan war. Oxford: Oxford University Press.CrossRefGoogle Scholar
Fattouh, B. and Kolb, J. (2006). The outlook for economic reconstruction in Lebanon after the 2006 war. The MIT Electronic Journal of Middle East Studies, 6, 97–111.Google Scholar
Federation of American Scientists (FAS). (2000). Sudan People’s Liberation Army (SPLA); Sudan People’s Liberation Movement (SPLM). .
Fidler, D. P. (1999). International legal implications of nonlethal weapons. The Michigan Journal of International Law, 21, 51–100.Google Scholar
Fidler, D. P. (2005). The meaning of Moscow: “Nonlethal” weapons and international law in the early 21st century. International Review of the Red Cross, 87. 525–552.CrossRefGoogle Scholar
Finlay, C. J. (2010). Legitimacy and non-state political violence. Journal of Political Philosophy, 18(3), 287–312.Google Scholar
Finlay, C. J. (2012). Fairness and liability in the just war: Combatants, non-combatants and lawful irregulars. Political Studies, 61(1), 142–160.CrossRefGoogle Scholar
Fletcher, G. P. (2003). Ambivalence about treason. North Carolina Law Review, 82, 1611–1628.Google Scholar
Freedman, L. (2006). Strategic communications. The Adelphi Papers, 45(379), 73–93. .CrossRef
Friedman, R. B. (1990). On the concept of authority in political philosophy. In Raz, J. (Ed.), Authority (pp. 56–91). New York: NYU Press.Google Scholar
Friedman, T. (2013). Without water, revolution. New York Times, May 19. .
Fukuda, C. M. (2000). Peace through nonviolent action: The East Timorese resistance movement’s strategy for engagement. Pacifica Review: Peace, Security & Global Change, 12(1), 17–31.CrossRefGoogle Scholar
The Fund for Peace (2010). The Failed State Index: Indicators. .
Galeotti, M. (2002). ‘Brotherhoods’ and ‘associates’: Chechen networks of crime and resistance. Low Intensity Conflict & Law Enforcement, 11(2–3), 340–352.CrossRefGoogle Scholar
Galtung, J. (2007). Peace journalism as ethical challenge. *asteriskos, 3/4, 7–16.
Ganor, B. (2005). Terrorism as a strategy of psychological warfare. Journal of Aggression, Maltreatment & Trauma, 9(1–2), 33–43.CrossRefGoogle Scholar
Garfield, R. (1999). The impact of economic sanctions on health and well-being. Relief and Rehabilitation Network, London. .
Garfield, R., Devin, J., and Fausey, J. (1995). The health impact of economic sanctions. Bulletin of the New York Academy of Medicine, 72(2), 454–469.Google ScholarPubMed
Gebauer, M. (2006). Hezbollah’s Al-Manar: Broadcasting from the bunker. Spiegel Online, August 10. .
Gelkopf, M., Berger, R., Bleich, A., and Silver, R. C. (2012). Protective factors and predictors of vulnerability to chronic stress: A comparative study of 4 communities after 7 years of continuous rocket fire. Social Science & Medicine,74(5), 757–766.CrossRefGoogle ScholarPubMed
Geneva Convention (IV). (1949). Convention relative to the protection of civilian persons in time of war. Geneva, August 12, 1949.
Geneva Convention (IV). (1949). Commentary, convention relative to the protection of civilian persons in time of war. Geneva, August 12, 1949.
Gewirth, A. (1982). Individual rights and political-military objectives. In Gewirth, A. (Ed.), Human rights: Essays on justification and applications (pp. 234–255). Chicago: University of Chicago Press.Google Scholar
Gilbert, P. (1998). Good and bad cases for national secession. In Lehning, P. B. (Ed.), Theories of secession (pp. 208–226). New York: Routledge.Google Scholar
Gilboa, D. (2008). To be an Israeli prisoner of war. Association of Israeli POWs, November 20. (Hebrew). .
Giustozzi, A. (2014). The Taliban’s ‘military courts.’Small Wars & Insurgencies, 25(2), 284–296.CrossRefGoogle Scholar
Global Security. (2003). Improvised explosive devices – Iraq. .
Global Security. (nd.a). Hamas funding. .
Global Security. (nd. b) Iranian artillery rockets, Fadjr-5 333mm multiple rocket launcher system. .
Goodhand, J. (2004). From war economy to peace economy? Reconstruction and state building in Afghanistan. Journal of International Affairs, 58(1), 155–174.Google Scholar
Gordon, J. (1999a). Economic sanctions, just war doctrine, and the fearful spectacle of the civilian dead. Cross Currents, 49(3), 387–400.Google Scholar
Gordon, J. (1999b). A peaceful, silent, deadly remedy: The ethics of economic sanctions. Ethics & International Affairs, 13(1), 123–142.CrossRefGoogle Scholar
Gordon, J. (2011). Smart sanctions revisited. Ethics & International Affairs, 25, 315–335.CrossRefGoogle Scholar
Gottstein, U. (1999). Peace through sanctions? Lessons from Cuba, former Yugoslavia and Iraq. Medicine, Conflict and Survival, 15(3), 271–285.CrossRefGoogle Scholar
Gould, J. A. and Moe, E. (2012). Beyond rational choice: Ideational assault and the use of delegitimation frames in nonviolent revolutionary movements. Research in Social Movements, Conflict, and Change, 34, 123–151.CrossRefGoogle Scholar
Graham, G. (2007). People’s war? Self-interest, coercion and ideology in Nepal’s Maoist insurgency. Small Wars & Insurgencies, 18(2), 231–248.CrossRefGoogle Scholar
Greenberg, H. and Vaked, E. (2004). Six soldiers killed by IED explosion in Gaza. Ynet (Hebrew).
Gross, M. L. (1997). Ethics and activism: The theory and practice of political morality. Cambridge: Cambridge University Press.Google Scholar
Gross, M. L. (2006). Bioethics and armed conflict: Moral dilemmas of medicine and war. Cambridge, MA: MIT Press.Google Scholar
Gross, M. L. (2008). The Second Lebanon War: The question of proportionality and the prospect of nonlethal warfare. Journal of Military Ethics, 7(1), 1–22.CrossRefGoogle Scholar
Gross, M. L. (2010a). Moral dilemmas of modern war: Torture, assassination, and blackmail in an age of asymmetric conflict. Cambridge: Cambridge University Press.Google Scholar
Gross, M. L. (2010b). Medicalized weapons & modern war. Hastings Center Report, 40(1), 34–43.CrossRefGoogle ScholarPubMed
Gross, M. L. (2012). Civilian vulnerability in asymmetric conflict: Lessons from the second Lebanon and Gaza Wars. In Rothbart, D. (Ed.), Civilians and modern war (pp. 146–164). London: Routledge.Google Scholar
Gross, M. L. (2013). Force-feeding, autonomy, and the public interest. New England Journal of Medicine, 369,103–105.CrossRefGoogle ScholarPubMed
Gruf, Y. (2003). I was a prisoner. Association of Israeli POWs, October 3. (Hebrew). .
Grynkewich, A. G. (2008). Welfare as warfare: How violent non-state groups use social services to attack the state. Studies in Conflict & Terrorism, 31(4), 350–370.CrossRefGoogle Scholar
Gunaratna, R. (2003). Sri Lanka: Feeding the Tamil Tigers. In Ballentine, K. and Sherman, J. (Eds.), The political economy of armed conflict: Beyond greed and grievance (pp. 197–224). London: Rienner.Google Scholar
Gunning, J. (2009). Hamas in politics: Democracy, religion, violence. Oxford: Columbia University Press.Google Scholar
Gurr, T. R. (2000). Nonviolence in ethnopolitics: Strategies for the attainment of group rights and autonomy. PS: Political Science and Politics, 33(2), 155–160.Google Scholar
Guth, D. W. (2009). Black, white, and shades of gray: The sixty-year debate over propaganda versus public diplomacy. Journal of Promotion Management, 14(3–4), 309–325.CrossRefGoogle Scholar
Haensel, P. (1941). War taxation. Taxes, 19(2), 67–69; 122–125.Google Scholar
Hardin, R. (1982). Collective action. Baltimore: Hopkins University Press.Google Scholar
Harel, A. and Issacharoff, A. (2004). The seventh war (Hebrew). Tel Aviv: Yedioth Ahronoth.Google Scholar
Harel, A. and Issacharoff, A. (2008). Analysis: A hard look at Hamas’ capabilities. Haaretz, December 26. .
Harff, B. (2003). No lessons learned from the Holocaust? Assessing risks of genocide and political mass murder since 1955. American Political Science Review, 97(1), 57–73.CrossRefGoogle Scholar
Haslam, E. (2000). Information warfare: Technological changes and international law. Journal of Conflict & Security Law, 5, 157–175.CrossRefGoogle Scholar
Heller, J. (1995). Catch 22. New York: Everyman’s Library Random House.Google Scholar
Henriksen, R. and Vinci, A. (2007). Combat motivation in non-state armed groups. Terrorism and Political Violence, 20(1), 87–109.CrossRefGoogle Scholar
Hercheui, M. D. (2011). A literature review of virtual communities: The relevance of understanding the influence of institutions on online collectives. Information, Communication & Society, 14(1), 1–23.CrossRefGoogle Scholar
Hess, D. and Martin, B. (2006). Repression, backfire, and the theory of transformative events. Mobilization: An International Quarterly, 11(2). .
Hicks, M. H. R., Lee, U. R., Sundberg, R., and Spagat, M. (2011). Global comparison of warring groups in 2002–2007: Fatalities from targeting civilians vs. fighting battles. PloS one, 6(9).CrossRefGoogle ScholarPubMed
Hiebert, R. E. (2003). Public relations and propaganda in framing the Iraq war: A preliminary review. Public Relations Review, 29(3), 243–255.CrossRefGoogle Scholar
Hill, D. T. (2002). East Timor and the Internet: Global political leverage in/on Indonesia. Indonesia, 73, 25–51.CrossRefGoogle Scholar
Hoff, D. L. and Mitchell, S. N. (2009). Cyberbullying: Causes, effects, and remedies. Journal of Educational Administration, 47(5), 652–665.CrossRefGoogle Scholar
Holder, E. (2012). Attorney General Eric Holder Speaks at Northwestern University School of Law. Chicago, Monday, March 5, 2012. .
Hollis, R. (1997). Europe and the Middle East: Power by stealth?International Affairs (Royal Institute of International Affairs), 73(1), 15–29.CrossRefGoogle Scholar
Horgan, J. and Taylor, M. (1999). Playing the ‘Green Card’–Financing the provisional IRA: Part 1. Terrorism and Political Violence, 11(2), 1–38.CrossRefGoogle Scholar
Horgan, J. and Taylor, M. (2003). Playing the ‘green card’–Financing the provisional IRA: part 2. Terrorism and Political Violence, 15(2), 1–60.CrossRefGoogle Scholar
Howe, E. G., Kosaraju, A., Laraby, P. R., and Casscells, S. W. (2009). Guantanamo: Ethics, interrogation, and forced feeding. Military Medicine, 174(1), iv-xiii.Google ScholarPubMed
Howie, L. (2007). The terrorism threat and managing workplaces. Disaster Prevention and Management, 16, 70–78.CrossRefGoogle Scholar
Hughes, J. (2007). Chechnya: From nationalism to jihad. Philadelphia, PA: University of Pennsylvania Press.CrossRefGoogle Scholar
Hultman, L. (2007). Battle losses and rebel violence: Raising the costs for fighting. Terrorism and Political Violence, 19(2), 205–222.CrossRefGoogle Scholar
Human Rights Watch (HRW). (1991). Evil days: Thirty years of war and famine in Ethiopia. .
Human Rights Watch (HRW). (1995). Russia three months of war in Chechnya. Vol. 7, No. 6. .
Human Rights Watch (HRW). (1997). East Timor – Guerrilla attacks. June 4. .
Human Rights Watch (HRW). (2001). Under orders: War crimes in Kosovo. .
Human Rights Watch (HRW). (2003). International humanitarian law issues in a potential war in Iraq (Human Rights Watch Briefing Paper, February 20).
Human Rights Watch (HRW). (2006). Israel/Lebanon: Israel responsible for Qana attack. July 30. .
Human Rights Watch (HRW). (2007a). Civilians under assault: Hezbollah’s rocket attacks on Israel in the 2006 war. .
Human Rights Watch (HRW). (2007b). Why they died: Civilian casualties in Lebanon during the 2006 War. .
Human Rights Watch (HRW). (2008–2011). World report, Russia 2008–11. ; ; ; .
Human Rights Watch (HRW). (2010). Gaza: Do not resume executions. .
Human Rights Watch (HRW). (2011–2013). World report, Sri Lanka 2011–2013. ; ; ; .
Human Rights Watch (HRW). (2012). Abusive system: Criminal justice in Gaza. .
Human Security Report Project. (2013). Human security report 2013, The decline in global violence: Evidence, explanation, and contestation. Vancouver: Human Security Press.
Humphreys, M. and Weinstein, J. M. (2008). Who fights? The determinants of participation in civil war. American Journal of Political Science, 52(2), 436–455.CrossRefGoogle Scholar
iCasualties.org. (2014). Coalition military fatalities by year. .
Intelligence and Terrorism Information Center (ITIC). (2008). Preventing the harming of uninvolved persons. December 27. . Archived with author.
Intelligence and Terrorism Information Center (ITIC). (2009). Hamas modus operandi – Terrorist shooting from a roof of a house and using children as a human shield. 6 January. . Archived with author.
International Criminal Court (ICC). (2011). Rome Statute of the International Criminal Court.
International Criminal Tribunal for the former Yugoslavia (ICCT). (nd.). Case Information Sheet, IT-03-66, LIMAJ et al., The Prosecutor v. Fatmir Limaj, Isak Musliu & Haradin Bala. .
International Committee of the Red Cross (ICRC). (1994). Geneva Conventions of 12 August 1949 and Additional Protocols of 8 June 1977: Ratifications, accessions and successions as at 31 December 1994. .
International Committee of the Red Cross (ICRC). (2006). A guide to the legal review of new weapons, means and methods of warfare: Measures to implement Article 36 of Additional Protocol I of 1977. International Review of the Red Cross, 88(864), 931–956.CrossRefGoogle Scholar
International Committee of the Red Cross (ICRC). (2010). Gaza closure: Not another year! News Release, 10/103, 06-14-2010. .
International Committee of the Red Cross (ICRC). (2011). Annex: The Islamic Emirate of Afghanistan. The Layha [Code of conduct For Mujahids]. International Review of the Red Cross, 93(881), 103–120.CrossRefGoogle Scholar
International Committee of the Red Cross (ICRC). (2013). Hunger strikes in prisons: The ICRC’s position. .
International Committee of the Red Cross (ICRC). (nd. a). Customary international humanitarian law, Rule 8, definition of military objectives. ).
International Committee of the Red Cross (ICRC). (nd. b). Customary international humanitarian law, Rule 65, perfidy.
International Committee of the Red Cross (ICRC). (nd. c). Customary international humanitarian law, Rule 62, improper use of the flags or military emblems, insignia or uniforms of the adversary.
International Committee of the Red Cross (ICRC). (nd. d). Customary international humanitarian law, Rule 96, hostage taking.
International Committee of the Red Cross (ICRC). (nd. e). Customary international humanitarian law, Rule 97, human shields. .
International Court of Justice (ICJ). (1975). Western Sahara, Advisory Opinion. October 16. .
International Institute of Strategic Studies (IISS). (1999). The Kosovo Liberation Army. Volume 5, Issue 4. 1999.
International Institute of Strategic Studies (IISS). (2006). The military balance 2006. .
International Security Assistance Force (ISAF). (2011). Effective civil partnerships: Community project yields unlikely find. August 25. .
Iraq Body Count. (2012). Iraqi deaths from violence 2003-2011. .
Israel High Court of Justice (HCJ). (2005). The Public Committee against Torture in Israel and the Palestinian Society for the Protection of Human Rights and the Environment v. The Government of Israel and others. Case 769/02.
Israel Ministry of Foreign Affairs (MFA). (2009). The operation in Gaza: Factual and legal aspects. Jerusalem; MFA.Google Scholar
Israel Security Agency. (nd.). Analysis of attacks in the last decade, 2000–2010. .
Issacharoff, A. (2009). Rights group: Most Gazans killed in war were civilians. Haaretz, September 9. .
Iyob, R. (1995). The Eritrean struggle for independence: Domination, resistance, nationalism, 1941–1993. Cambridge: Cambridge University Press.Google Scholar
Janes, . (2007). Sudan People’s Liberation Army (SPLA) (Sudan). Jane’s World Insurgency and Terrorism, January 30.
Jensen, B. (2012). The Taliban’s wedge strategy. New York Times, August 21. .
Johnson, D. H. (1998). The Sudan People’s Liberation Army and the Problem of Factionalism. In Clapham, C. (Ed.), African guerrillas (pp. 53–72). Bloomington, IN: Indiana University Press.Google Scholar
Johnson, T. H. (2007). The Taliban insurgency and an analysis of Shabnamah (Night Letters). Small Wars and Insurgencies, 18(3): 317–344.CrossRefGoogle Scholar
Johnson, N. (2010). Small projects reap large gains in Helmand. ISAF. .
Johnson, M. and Johnson, T. (1981). Eritrea: The national question and the logic of protracted struggle. African Affairs, 80(319), 181–195.Google Scholar
Johnson, T. and Bruno, G. (2012). The lengthening list of Iran sanctions. Council on Foreign Relations, July 31. .
Judah, T. (2000). The Kosovo Liberation Army. Perceptions, Sep-Nov, 61–77.
Jurist, . (2011). Spain court turns over Guantanamo torture investigation to US. The Juris, April 13. .
Kalb, M. and Saivetz, C. (2007). The Israeli – Hezbollah war of 2006: The media as a weapon in asymmetrical conflict. The Harvard International Journal of Press/Politics, 12(3), 43–66.CrossRefGoogle Scholar
Kaldor, M. (1997). Introduction. In Kaldor, M. and Vashee, B., Restructuring the global military sector. Volume 1: New wars (pp. 3–33). New York: Pinter.Google Scholar
Kalyvas, S. N. (2003). The ontology of “political violence”: Action and identity in civil wars. Perspectives on Politics, 1, 475–494.CrossRefGoogle Scholar
Kalyvas, S. N. (2006). The logic of violence in civil war. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Kalyvas, S. N. and Kocher, M. (2007). How “free” is free-riding in civil wars?World Politics, 59(2), 177–216.CrossRefGoogle Scholar
Kasfir, N. (2005). Guerrillas and civilian participation: The National Resistance Army in Uganda, 1981–86. Journal of Modern African Studies,43(2), 271–296.CrossRefGoogle Scholar
Kasymov, S. (2011). The right of communities to self-determination. Peace Review: A Journal of Social Justice, 23(2), 221–227.CrossRefGoogle Scholar
Katz, Y. (2012). Security and defense: Protecting the weakest link. The Jerusalem Post, June 1. .
Kaurin, P. (2010). With fear and trembling: An ethical framework for nonlethal weapons. Journal of Military Ethics, 9(1), 100–114.CrossRefGoogle Scholar
Kearney, M. (2007). The prohibition of propaganda for war in international law. Oxford: Oxford University Press.CrossRefGoogle Scholar
Kelsay, J. (2007). Arguing the just war in Islam. Cambridge: Harvard University Press.Google Scholar
Kelsey, J. T. (2008). Hacking into International Humanitarian Law: The principles of distinction and neutrality in the age of cyber warfare. Michigan Law Review, 106(7), 1427–1451.Google Scholar
Keynes, J. M. (1940). How to pay for the War: A radical plan for the Chancellor of the Exchequer. New York: Harcourt Brace and Company.Google Scholar
Khatchadourian, R. (2010). Street fight on the high seas posted. The New Yorker, January 12. .
Khoury, J. (2013). Analysis: For Palestinian prisoners in Israel, hunger strikes have become a winning strategy. Haaretz, April 24. .
Khoury-Machool, M. (2007). Palestinian youth and political activism: The emerging internet culture and new modes of resistance. Policy Futures in Education, 5(1), 17–36.CrossRefGoogle Scholar
Kilcullen, D. (2009). The accidental guerrilla: Fighting small wars in the midst of a big one. Oxford: Oxford University Press.Google Scholar
King, M. E. (2007). A quiet revolution: The first Palestinian Intifada and nonviolent resistance. New York: Nation Books.Google Scholar
Kingsbury, D. (2000). East Timor to 1999. In Kingsbury, D. (Ed.), Guns and ballot boxes East Timor’s vote for independence (pp. 17–28). Victoria, Australia: Monash Asia Institute.Google Scholar
Kirkpatrick, D. D. (2011). NATO strikes at Libyan state TV. New York Times, July 30. .
Klare, M. T. (1992/1993). The next great arms race. Foreign Affairs, 72, 136–152.CrossRefGoogle Scholar
Knoke, D. (1988). Incentives in collective action organizations. American Sociological Review, 53(3), 311–329.CrossRefGoogle Scholar
Kober, A. (2007). Targeted killing during the second intifada: The quest for effectiveness. Journal of Conflict Studies, 27(1). .Google Scholar
Kocher, M. (2007). The decline of PKK and the viability of a one–state solution in Turkey. Democracy and human rights in multicultural societies. International Journal on Multicultural Societies, 4(1), Societies. .Google Scholar
Koplow, D. A. (2006). Nonlethal weapons. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Kopp, C. (2007). Technology of improvised explosive devices. Defence Today, 6(3), 45–47.Google Scholar
Kraja, G. (2011). Recruitment practices of Europe’s last guerrilla: Ethnic mobilization, violence and networks in the recruitment strategy of the Kosovo Liberation Army. Unpublished senior thesis, Yale University.
Krajeski, J. (2012). After the hunger strike. The New Yorker, November 29. .
Kruglanski, A. W., Chen, X., Dechesne, M., Fishman, S. and Orehek, E. (2009). Fully committed: Suicide bombers’ motivation and the quest for personal significance. Political Psychology, 30(3), 331–357.CrossRefGoogle Scholar
Kymlicka, W. (1998). Is federalism a viable alternative to secession? In Lehning, P. B. (Ed.), Theories of secession (pp. 109–148). New York: Routledge.Google Scholar
Landau-Tassero, E. (2006). Non-combatants in Muslim legal thought. Center on Islam, Democracy, and the Future of the Muslim World, Research Monographs on the Muslim. World Series No 1, Paper No 3, December. Washington, DC: Hudson Institute. .
Lango, J. W. (2010). Nonlethal weapons, noncombatant immunity, and combatant nonimmunity: A study of just war theory. Philosophia 38(3), 475–497.CrossRefGoogle Scholar
Lappin, Y. (2009). IDF releases Cast Lead casualty numbers. Jerusalem Post, March 26. .
Laqueur, W. (1998). Guerrilla warfare: A historical and critical study. New Brunswick/London: Transaction Publishers.Google Scholar
Lasswell, H. D. (1927). The theory of political propaganda. The American Political Science Review, 21(3), 627–631.CrossRefGoogle Scholar
Lee, J. (2014). South Koreans seethe, sue as credit card details swiped. Reuters, January 21. .
Leigh, D. (2010). US forces hit target ‘with no civilian deaths’ – but Afghans tell different tale. The Guardian, July 26. .
Levin, D. (2004). Memorandum for James B. Comey, Deputy Attorney General, Re: legal standards applicable under 18 U.S.C. §§ 2340-2340. December 30. .
Levitt, M. (2006). Hamas: Politics, charity, and terrorism in the service of jihad. New Haven, CT: Yale University Press.Google Scholar
Levy, P. I. (1999). Sanctions on South Africa: What did they do?The American Economic Review, 89(2), 415–420.CrossRefGoogle Scholar
Lewis, J. A. (2002). Assessing the risks of cyber terrorism, cyber war and other cyber threats. Washington, DC: Center for Strategic & International Studies.Google Scholar
Lewis, J. A. (2010). Thresholds for cyberwar. Washington, DC: Center for Strategic and International Studies. .
Lewis, J. A. (2011). Cyberwar thresholds and effects. Security & Privacy, IEEE 9(5), 23–29.CrossRefGoogle Scholar
Lieber, F. (1863). Instructions for the Government of Armies of the United States in the Field (Lieber Code). .
Lieberman, E. (2012). Reconceptualising deterrence. London: Routledge.Google Scholar
Lim, A. (2012). The Case for Sanctions against Israel. London: Verso.Google Scholar
Limor, Y. and Nossek, H. (2006). The Military and the media in the twenty-first century: Towards a new model of relations. Israel Affairs, 12(3), 484–510.CrossRefGoogle Scholar
Looney, R. E. (2005). The business of insurgency: The expansion of Iraq’s shadow economy. The National Interest, 81, 67–72.Google Scholar
Lopez, G. A. (2012). In defense of smart sanctions: A response to Joy Gordon. Ethics & International Affairs, 26 (1), 135–46.CrossRefGoogle Scholar
Lopez, G. A. and Cortright, D. (1997). Economic sanctions and human rights: Part of the problem or part of the solution?The International Journal of Human Rights, 1(2), 1–25.CrossRefGoogle Scholar
Love, J. B. (2010). Hezbollah: Social services as a source of power (No. JSOU-10-05). Hurlburt Field, FL: Joint Special Operations University.
Lowe, V. and Tzanakopoulos, A. (2012). Economic warfare. In Wolfrum, R. (Ed.), Max Planck encyclopedia of public international law. Oxford: Oxford University Press. .Google Scholar
Lutz, J. M. and Lutz, B. J. (2006). Terrorism as economic warfare. Global Economy Journal, 6(2), 1–20.CrossRefGoogle Scholar
Ly, P. E. (2007). The charitable activities of terrorist organizations. Public Choice, 131(1–2), 177–195.CrossRefGoogle Scholar
Lyall, R. (2008). Voluntary human shields, direct participation in hostilities and the international humanitarian law obligations of states. Melbourne Journal of International Law, 9, 313–334.Google Scholar
Macdonald, S. (2007). Propaganda and information warfare in the twenty-first century: Altered images and deception operations. London: Routledge.Google Scholar
Mackey, R. (2012). Attack on pro-Assad television studio raises questions on rules of war. New York Times, June 27. .
Maguire, M. (1980). Impact of burglary upon victims. The British Journal of Criminology, 20, 261–275.CrossRefGoogle Scholar
Maital, S. (1972). Inflation, taxation and equity: How to pay for the war revisited. The Economic Journal, 82(325), 158–169., P. (2010). Ireland revisited week 15. The Examiner, December 21. .CrossRefGoogle Scholar
Manheim, J. B. (1990). Strategic public diplomacy: The evolution of influence. New York: Oxford University Press.Google Scholar
Mantel, B. (2009). Terrorism and the internet. Should websites that promote terrorism be shut down?CQ Global Researcher, 3(11), 129–152.Google Scholar
March, A. and Sil, R. (1999). The “Republic of Kosovo” (1989–1998) and the resolution of ethno-separatist conflict: rethinking “sovereignty” in the post-cold war era. Working Paper Series #99-01, Political Science Department, University of Pennsylvania, Philidelphia, PA. .
Marcus, A. (2007). Blood and belief: The PKK and the Kurdish fight for independence. New York: New York University Press.Google Scholar
Margalit, A. and Raz, J. (1990). National self-determination. The Journal of Philosophy, 87(9), 439–461.CrossRefGoogle Scholar
Margalit, A. and Walzer, M. (2009). Israel: Civilians & combatants. New York Review of Books, 56(8), 21–22.Google Scholar
Marks, T. A. and Palmer, D. S. (2005). Radical Maoist insurgents and terrorist tactics: Comparing Peru and Nepal 1. Low Intensity Conflict & Law Enforcement, 13(2), 91–116.CrossRefGoogle Scholar
Marten, K. (2006/2007) Warlordism in comparative perspective, International Security, 31(3), 41–73.CrossRefGoogle Scholar
Marten, K. (2011). Warlords. In Strachan, H. and Scheipers, S. (Eds.), The changing character of war (pp. 302–314). New York: Oxford University Press.CrossRefGoogle Scholar
Marten, K. (2012). Patronage versus professionalism in new security institutions. Prism, 2(4), 83–98.Google Scholar
Martin, J. K. (2009). Dragon’s claws: The improvised explosive device (IED) as a weapon of strategic influence. Unpublished masters’ thesis, Naval Postgraduate School, Monterey, CA.
Martin, L. J. (1982). Disinformation: An instrumentality in the propaganda arsenal. Political Communication and Persuasion, 2(1), 47–64.CrossRefGoogle Scholar
McCormick, G. H. and Fritz, L. (2009). The logic of warlord politics. Third World Quarterly, 30(1), 81–112.CrossRefGoogle Scholar
McCormick, G. H. and Giordano, F. (2007). Things come together: Symbolic violence and guerrilla mobilisation. Third World Quarterly, 28(2), 295–320.CrossRefGoogle Scholar
McGoldrick, A. (2006). War journalism and ‘objectivity.’ Conflict & Communication online, 5(2), 1–7. .Google Scholar
McKay, S. and Mazurana, D. (2004). Where are the Girls? Girls in fighting forces in Northern Uganda, Sierra Leone and Mozambique: Their lives during and after war. Montreal, Canada: International Centre for Human Rights and Democratic Development.Google Scholar
McMahan, J. (1985). Deterrence and deontology. Ethics, 95(3), 517–536.CrossRefGoogle Scholar
McMahan, J. (2009). Killing in war. Oxford: Oxford University Press.CrossRefGoogle Scholar
Meisels, T. (2008). The trouble with terror. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Melzer, N. (2009). Interpretive guidance on the notion of direct participation in hostilities under international humanitarian law. Geneva: International Committee of the Red Cross.Google Scholar
Metelits, C. (2004). Reformed rebels? Democratization, global norms, and the Sudan People’s Liberation Army. Africa Today, 51(1), 65–82.CrossRefGoogle Scholar
Middle East Media Research Institute (Memri). (2006). Special dispatch No. 1323. Islamist Websites Monitor no. 7. October 13, clashes between Al-Qaeda in Iraq and Iraqi mujahideen who are not members of Al-Qaeda or of Its Shura Council. .
Miller, D. (1998). Secession and the principle of nationality. In Moore, M. (Ed.), National self-determination and secession (pp. 62–78). Oxford: Oxford University Press.CrossRefGoogle Scholar
Moloney, E. (2003). A secret history of the IRA. New York: WW Norton & Company.Google Scholar
Monro, D. H. (1982). Civil rights and conscription. In Anderson, M. and Honegger, B. (Eds.), The military draft: Selected readings on conscription (pp. 133–152). Stanford. CA: The Hoover Institute.Google Scholar
Moorcraft, P.L. and Taylor, P. M. (2007). War watchdogs or lapdogs?British Journalism Review, 18(4), 39–50.CrossRefGoogle Scholar
Moorcraft, P. L. and Taylor, P. M. (2008). Shooting the messenger: The politics of war reporting. Sterling, VA: Potomic Books.Google Scholar
Moore, C. (2006). Our very strange day with Hezbollah. CNN. .
Moore, M. (1998). Introduction: The self-determination principle and the ethics of secession. In Moore, M. (Ed.), National self-determination and secession (pp. 1–14). Oxford: Oxford University Press.CrossRefGoogle Scholar
Moore, S. (2001). The Indonesian military’s last years in East Timor: An analysis of its secret documents. Indonesia, 72, 9–44.CrossRefGoogle Scholar
Moore, S. (2011). Taliban sleeper agent kills 9 at Afghan base. Associated Press, April 17 . .
Mor, B. D. (2007). The rhetoric of public diplomacy and propaganda wars: A view from self-presentation theory. European Journal of Political Research, 46(5), 661–683.CrossRefGoogle Scholar
Mor, B. D. (2012). Credibility talk in public diplomacy. Review of International Studies, 38(2), 393–422.CrossRefGoogle Scholar
Moreno, J. (1975). Che Guevara on guerrilla warfare: Doctrine, practice and evaluation. In Sarkesian, S. C. (Ed.), Revolutionary guerrilla warfare (pp. 395–420). New Brunswick, NJ: Transaction Publishers.Google Scholar
Morris, B. (2011). Righteous victims: A history of the Zionist-Arab conflict, 1881–1998. New York: Random House Digital, Inc.Google Scholar
Mshvidobadze, K. (2011). State-sponsored cyber terrorism: Georgia’s experience. Presentation to the Georgian Foundation for Strategic and International Studies, 1–7.
Mukhopadhyay, D. (2009). Disguised warlordism and combatanthood in Balkh: The persistence of informal power in the formal Afghan state. Conflict, Security & Development, 9(4), 535–564.CrossRefGoogle Scholar
Nakashima, E., Miller, G., and Tate, J. (2012). US, Israel developed Flame computer virus to slow Iranian nuclear efforts, officials say. The Washington Post online, 1–4, June 19. .
Namazi, S. (2013). Sanctions and medical supply shortages in Iran. Woodrow Wilson Center, Viewpoints, 20. .
Napoleoni, L. (2004). The new economy of terror: How terrorism is financed. In Schmid, A. P. (Ed.), Forum on Crime and Society, United Nations Office on Drugs and Crime 4 (1, 2), (pp. 31–48). New York: United Nations Publications. Google Scholar
National Research Council (NRC). (2003). An assessment of nonlethal weapons science and technology. Committee for an Assessment of Nonlethal Weapons Science and Technology Naval Studies Board Division on Engineering and Physical Sciences. Washington, DC: The National Academies Press.
NATO. (2011). NATO strikes Libyan state TV satellite facility. July 30. .
Navias, M. S. (2002). Finance warfare as a response to international terrorism. The Political Quarterly, 73(s1), 57–79.CrossRefGoogle Scholar
Naylor, R. T. (1993). The insurgent economy: Black market operations of guerrilla organizations. Crime, Law and Social Change, 20(1), 13–51.CrossRefGoogle Scholar
Neff, S. C. (1988). Boycott and the law of nations: Economic warfare and modern international law in historical perspective. British Yearbook of International Law, 59(1), 113–149.CrossRefGoogle Scholar
Nepstad, S. E. (2013). Mutiny and nonviolence in the Arab Spring: Exploring military defections and loyalty in Egypt, Bahrain, and Syria. Journal of Peace Research, 50(3), 337–349.CrossRefGoogle Scholar
Nevins, J. (2005). A not-so-distant horror: Mass violence in East Timor. Ithaca, NY: Cornell University Press.Google Scholar
Nielson, K. (1998). Liberal nationalism and secession. In Moore, M. (Ed.), National self-determination and secession (pp. 103–133). Oxford: Oxford University Press.CrossRefGoogle Scholar
Niner, S. (2007). Martyrs, heroes and warriors: The leadership of East Timor. In Kingsbury, D. and Leach, M. (Eds.), East Timor: Beyond independence (pp. 113–128). Victoria, Australia: Monash University Press.Google Scholar
Nissen, T. E. (2007). The Taliban’s information warfare: A comparative analysis of NATO information operations (info ops) and Taliban information activities. Copenhagen: Royal Danish Defence College.Google Scholar
Nordland, R. (2013). Attacks on aid workers rise in Afghanistan, UN says. New York Times, December 4. .
Norton-Taylor, R. (2003). TV station attack could be illegal. The Guardian, March 26.
Nuwayhid, I., Zurayk, H., Yamout, R., and Cortas, C. S. (2011). Summer 2006 war on Lebanon: A lesson in community resilience. Global Public Health, 6(5), 505–519.CrossRefGoogle ScholarPubMed
Nyce, J. M. and Dekker, S. W. (2010). IED casualties mask the real problem: It’s us. Small Wars & Insurgencies, 21(2), 409–413.CrossRefGoogle Scholar
Nye, J. S. (2008). Public diplomacy and soft power. The Annals of the American Academy of Political and Social Science, 616(1), 94–109.CrossRefGoogle Scholar
OAU. (1981). African [Banjul] charter on human and peoples’ rights, adopted June 27, 1981. OAU Doc. CAB/LEG/67/3 rev. 5, 21 I.L.M. 58 (1982). .
Obama, B. (2009). Remarks by the President at the acceptance of the Nobel Peace Prize. The White House, Office of the Press Secretary. .
O’Driscoll, C. (2012). A fighting chance or fighting dirty? Irregular warfare, Michael Gross and the Spartans. European Journal of Political Theory, 11(2): 112–130.CrossRefGoogle Scholar
Olsthoorn, P. and Bollen, M. (2013). Civilian care in war: lessons from Afghanistan. In Gross, M. L. and Carrick, D. (Eds.), Military Medical Ethics in the 21st Century (pp. 59–70). London: Ashgate Publishing.Google Scholar
Özdemir, H. (2012). Where do terror organizations get their money? A case study: Financial resources of the PKK, International Journal of Security and Terrorism, 3(2), 85–102.Google Scholar
Özerdem, A. (2003). From a ‘terrorist’ group to a ‘civil defence’ corps: The ‘transformation’ of the Kosovo Liberation Army. International Peacekeeping, 10(3), 79–101.CrossRefGoogle Scholar
Palestinian Centre for Human Rights (PCHR). (2009). The dead in the course of the Israeli recent military offensive on the Gaza strip between 27 December 2008 and 18, January 2009. March 19, 2009. .
Pape, R. (1997). Why economic sanctions do not work. International Security, 22(2), 90–136.CrossRefGoogle Scholar
Pape, R. (2005). Dying to win: The strategic logic of suicide terrorism. New York: Random House Digital, Inc.Google Scholar
Parker, A. M. S. (2009). Cyberterrorism: The emerging worldwide threat. In Canter, D. (Ed.), The faces of terrorism: Multidisciplinary perspectives (pp. 245–66). Chichester: Wiley-Blackwell.Google Scholar
Pateman, R. (1990). The Eritrean war. Armed Forces & Society, 17(1), 81–98.CrossRefGoogle Scholar
Payne, K. (2005). The media as an instrument of war. Parameters, 35(1), 81–93.Google Scholar
Pedahzur, A., Perliger, A. and Weinberg, L. (2003). Altruism and fatalism: The characteristics of Palestinian suicide terrorists. Deviant Behavior, 24(4), 405–423.CrossRefGoogle Scholar
Peimani, H. (2004). Armed violence and poverty in Chechnya: Mini case study for the armed violence and poverty initiative. Bradford, UK: University of Bradford, Center for International Cooperation and Security.
Peksen, D. (2009). Better or worse? The effect of economic sanctions on human rights. Journal of Peace Research, 46(1), 59–77.CrossRefGoogle Scholar
Perkins, M. (2002). International law and the search for universal principles in journalism ethics. Journal of Mass Media Ethics, 17(3), 193–208.CrossRefGoogle Scholar
Perritt, H. H. (2008). Kosovo Liberation Army: The inside story of an insurgency. Champaign, IL: University of Illinois Press.Google Scholar
Peskowitz, A. (2010). IO on the counterinsurgency battlefield: Three case studies. Global Security Studies, l(2), 100–114.Google Scholar
Peters, J. (2010). The Gaza disengagement: Five years later. Israel Journal of Foreign Affairs 4(3), 33–44.CrossRefGoogle Scholar
Petit, B. S. (2003). Chechen use of the internet in the Russo-Chechen conflict. Fort Leavenworth KS: Army Command and General Staff College.Google Scholar
Pew, . (2007). Journalists in Iraq – A survey of reporters on the front lines embedding. The Pew Research Center’s Project for Excellence in Journalism. November 28. .
Phillips, E. (2009).The business of kidnap for ransom. In Canter, D. (Ed.), The faces of terrorism: Multidisciplinary perspectives (pp. 189–206). Hoboken, NJ: John Wiley & Sons.Google Scholar
Philpott, D. (1998). Self-determination in practice. In Moore, M. (Ed.), National self-determination and secession (pp. 79–102). Oxford: Oxford University Press.CrossRefGoogle Scholar
Physicians for Human Rights, Israel (PHR). (2008). Holding health to ransom: GSS interrogation and extortion of Palestinian patients at Erez Crossing. .
Physicians for Human Rights, Israel (PHR). (2010). Humanitarian minimum: Israel’s role in creating food and water insecurity in the Gaza Strip. .
Pictet, J. 1985. Development and principles of international humanitarian law. Leiden, Netherlands: Martinus Nijhoff.Google Scholar
Pinto, C. and Jardine, M. (1997). East Timor’s unfinished struggle: Inside the Timorese resistance. Cambridge, MA: South End Press.Google Scholar
Plaisance, P. L. (2005). The propaganda war on terrorism: an analysis of the United States’ “shared values” public-diplomacy campaign after September 11, 2001. Journal of Mass Media Ethics, 20(4), 250–268.CrossRef
Plata v. Brown. (2013). United States District Court, Northern District of California, C01-1351 THE, August 19.
Politkovskaya, A. (2003). A small corner of hell: Dispatches from Chechnya. Chicago: University of Chicago Press.CrossRefGoogle Scholar
Poller, N. (2011). The Muhammad al-Dura hoax and other myths revived. Middle East Quarterly. .
Pratkanis, A. (2009). Public diplomacy in international conflicts. In Snow, N. and Taylor, P. (Eds.), Routledge handbook of public diplomacy (pp. 111–154). London: Routledge.Google Scholar
Primoratz, I. (2013). Terrorism: A philosophical investigation. Cambridge: Polity Press.CrossRefGoogle Scholar
Public Affairs Guidance (PAG). (2003). On embedding media during possible future operations/deployments in the U.S. Central Commands (CENTCOM) area of responsibility, February. .
Pugh, M. C., Cooper, N., and Goodhand, J. (2004). War economies in a regional context: The challenges of transformation. Boulder, CO: Lynne Rienner Publishers.Google Scholar
Pula, B. (2004). The emergence of the Kosovo “parallel state,” 1988–1992. Nationalities Papers: The Journal of Nationalism and Ethnicity, 32(4), 797–826.CrossRefGoogle Scholar
Qazi, S. H. (2011). Rebels of the frontier: Origins, organization, and recruitment of the Pakistani Taliban. Small Wars & Insurgencies, 22(4), 574–602.CrossRefGoogle Scholar
Radu, M. (1999). Don’t arm the KLA. FPRI (Foreign Policy Research Institute), April 6. .
Rapin, A. J. (2009). Does terrorism create terror?Critical Studies on Terrorism, 2(2), 165–179.CrossRefGoogle Scholar
Rawls, J. (1971). A theory of justice. Cambridge, MA: Belknap Press.Google Scholar
Rawls, J. (2001). The law of peoples: With “the idea of public reason revisited.” Cambridge, MA: Harvard University Press.Google Scholar
Reitan, R. (2000). Strategic nonviolent conflict in Kosovo. Peace & Change, 25(1), 70–102.CrossRefGoogle Scholar
Renz, B. (2010). The status and treatment of detainees in Russian Chechen campaigns. In Scheipers, S. (Ed.), Prisoners in war (pp. 205–218). Oxford: Oxford University Press.Google Scholar
Reuters. (2007). FACTBOX-War in Lebanon, one year ago. July 9. .
Rid, T. and Hecker, M. (2009). War 2.0: Irregular warfare in the information age. Santa Barbara, CA: Praeger.
Riechmann, D. (2011). Shooter in Afghan army uniform kills NATO troops. Associated Press. July 16. .
Rigby, A. (1997). The legacy of the past: The problem of collaborators and the Palestinian case. Jerusalem: Palestinian Academic Society for the Study of International Affairs.Google Scholar
Rigby, A. (2010). Palestinian resistance and nonviolence. Jerusalem: Palestinian Academic Society for the Study of International Affairs.Google Scholar
Roberts, L. D., Indermaur, D. and Spiranovic, C. (2013). Fear of cyber-identity theft and related fraudulent activity. Psychiatry, Psychology and Law, 20(3), 315–328.CrossRefGoogle Scholar
Rockoff, H. (2012). America’s economic way of war: War and the US economy from the Spanish-American War to the Persian Gulf War. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Rodin, D. (2005). War and self-defense. Oxford: Oxford University Press.Google Scholar
Rogel, C. (2003). Kosovo: Where it all began. International Journal of Politics, Culture, and Society, 17(1), 167–182.CrossRefGoogle Scholar
Rogers, P. (2000). Political violence and economic targeting aspects of provisional IRA strategy, 1992–7. Civil Wars, 3(4), 1–28.CrossRefGoogle Scholar
Roling, K. (nd.). Provincial development council discusses projects in Ghazni. ISAF (International Security Assistance Force). .
Rome Statute of the International Criminal Court. (2010). Annex I, Amendments to the Rome Statute of the International Criminal Court on the crime of aggression, Article 8 bis Crime of aggression, paragraph 2, 11 June.
Rome Statute of the International Criminal Court. (2002). .
Rosenberg, M. and Nordland, R. (2012). Abandoning hopes for Taliban peace deal. New York Times, October 2. .
Ross, M. L. (2005). Resources and rebellion in Aceh, Indonesia. In Collier, P. and Sambanis, N. (Eds.), Understanding civil war: Evidence and analysis – Europe, Central Asia, and other regions (pp. 39–62). Washington, DC: World Bank Publications.Google Scholar
Rubin, A. J. and Bowley, G. (2012). Suicide attack kills 9 in Eastern Afghanistan. New York Times, February 28. .
Rubin, E. (2006). In the land of the Taliban. New York Times, October 22.
Rudner, M. (2010). Hizbullah terrorism finance: Fund-raising and money-laundering. Studies in Conflict & Terrorism, 33(8), 700–715.CrossRefGoogle Scholar
Rule, S. (1987). Ethiopian guerrillas raid food convoy, halting drought aid. New York Times, October 27. .
Royal United Services Institute (RUSI). (2009). Reforming the Afghan National Police. A joint report of the Royal United Services Institute for Defence and Security Studies (London) and the Foreign Policy Research Institute (Philadelphia). .
Russett, B. M. (1969a). The price of war. Society, 6, 28–35.CrossRefGoogle Scholar
Russett, B. M. (1969b). Who pays for defense?The American Political Science Review, 63(2), 412–426.CrossRefGoogle Scholar
Ryan, M. and Brunnstrom, D. (2011). Libyan TV still on air despite NATO bombing. Reuters, July 30. .
Sabo, L. E. and Kibirige, J. S. (1989). Political violence and Eritrean health care. Social Science & Medicine, 28(7), 677–684.CrossRefGoogle ScholarPubMed
Sarkesian, S. C. (Ed.). (1975). Revolutionary guerrilla warfare. New Brunswick, NJ: Transaction Publishers.Google Scholar
Sarma, K. (2007). Defensive propaganda and IRA political control in Republican communities. Studies in Conflict & Terrorism, 30(12), 1073–1094.CrossRefGoogle Scholar
Sassòli, M. (2011). Introducing a sliding-scale of obligations to address the fundamental inequality between armed groups and states?International Review of the Red Cross, 93 (882), 426–431.Google Scholar
Sassòli, M., Bouvier, A. A. and Quintin, A. (2011). How does law protect in war? Cases, documents and teaching materials on contemporary practice (3rd ed., vol. 1). Geneva: International Committee of the Red Cross.
Schaap, A. J. (2009). Cyber warfare operations: Development and use under international law. Air Force Law Review, 64, 121–173.Google Scholar
Scheipers, S. (2010). Introduction: Prisoners in war. In Scheipers, S. (Ed.), Prisoners in war (pp. 1–22). Oxford: Oxford University Press.Google Scholar
Schiff, Z. and Ya’ari, E. (1991). Intifada: The Palestinian uprising-Israel’s third front. New York: Touchstone Books.Google Scholar
Schindler, D. (1979). Wars of national liberation. The different types of armed conflicts according to the Geneva conventions and protocols. In Collected Courses of the Hague Academy of International Law, 117–164. Leiden: Martinus Nijhoff Publishers.Google Scholar
Schmid, A. (2005). Terrorism as psychological warfare. Democracy and Security, 1(2), 137–146.CrossRefGoogle Scholar
Schmitt, M. N. (2004). Direct Participation in hostilities and 21st century armed conflict. In Fischer, H. (Ed.), Krisensicherung und Humanitärer Schutz (Crisis management and humanitarian protection) (pp. 505–509). Berlin: Berliner Wissenschaftsverlag.Google Scholar
Schmitt, M. N. (2005). Precision attack and international humanitarian law. International Review of the Red Cross, 87(859), 445–466.CrossRefGoogle Scholar
Schmitt, M. N. (2008). Human shields in international humanitarian law. Israel Yearbook on Human Rights, 38, 17–59.Google Scholar
Schmitt, M. N. (2010a). Interpretive guidance on the notion of direct participation in hostilities: A critical analysis. The Harvard National Security Journal, 1, 5–44.Google Scholar
Schmitt, M. N. (2010b). Deconstructing direct participation in hostilities: The constitutive elements. New York University Journal of International Law and Politics, 42, 697–739.Google Scholar
Schmitt, M. N. (2011). Cyber operations and the jus in bello. Israel Yearbook on Human Rights, 41, 113–135.Google Scholar
Schmitt, M. N. (Ed.). (2013). Tallinn manual on the international law applicable to cyber warfare. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Schock, K. (1999). People power and political opportunities: Social movement mobilization and outcomes in the Philippines and Burma. Social Problems, 46(3), 355–375.CrossRefGoogle Scholar
Schock, K. (2013). The practice and study of civil resistance. Journal of Peace Research, 50, 277–290.CrossRefGoogle Scholar
Schulze, K. E. (2003). The struggle for an independent Aceh: The ideology, capacity, and strategy of GAM. Studies in Conflict & Terrorism, 26(4), 241–271.CrossRefGoogle Scholar
Schulze, K. E. (2004). The free Aceh movement (GAM): Anatomy of a separatist organization. Washington, DC: Policy Studies, East-West Center.Google Scholar
Sderot Media Center. (2009). What you need to know about qassams. March 3. .
Seely, R. (2001). Russo-Chechen conflict: 1800–2000; A deadly embrace. New York: Psychology Press.Google Scholar
Seib, P. (2009). Public diplomacy and journalism parallels, ethical issues, and practical concerns. American Behavioral Scientist, 52(5), 772–786.CrossRefGoogle Scholar
Sharp, G. (1973). The Politics of nonviolent action. Boston: Porter Sargent.Google Scholar
Sharp, G. (1989). The intifadah and nonviolent struggle. Journal of Palestine Studies, 19(1), 3–13.CrossRefGoogle Scholar
Shore, M. (2013) The Jewish hero history forgot. New York Times, April 18. .
Shulman, M. R. (1998). Discrimination in the laws of information warfare. Columbia Journal of Transnational Law 37, 939–968.Google Scholar
Shultz, R. H. and Dew, A. J. (2006). Insurgents, terrorists, and militias: The warriors of contemporary combat. New York: Columbia University Press.Google Scholar
Silver, R. C., Holman, E. A., McIntosh, D. N., Poulin, M. and Gil-Rivas, V. (2002). Nationwide longitudinal study of psychological responses to September 11. JAMA: The Journal of the American Medical Association, 288(10), 1235–1244.CrossRefGoogle ScholarPubMed
Sinclair, J. S. (2010). Fears of terrorism and future threat: theoretical and empirical considerations. In Antonius, D. (Eds.), Interdisciplinary analyses of terrorism and political aggression (pp. 101–115). Newcastle upon Tyne: Cambridge Scholars PublishingGoogle Scholar
Sinclair, S. J. and Antonius, F. (2012a). The psychology of terrorism fears. Oxford: Oxford University PressCrossRefGoogle Scholar
Sinclair, S. J. and LoCicero, A. (2007). Fearing future terrorism: Development, validation, and psychometric testing of the Terrorism Catastrophizing Scale (TCS). Traumatology, 13, 75–90.CrossRefGoogle Scholar
Sivakumaran, S. (2009). Courts of armed opposition groups fair trials or summary justice?Journal of International Criminal Justice, 7(3), 489–513.CrossRefGoogle Scholar
Sivakumaran, S. (2011). Lessons for the law of armed conflict from commitments of armed groups: Identification of legitimate targets and prisoners of war. International Review of the Red Cross, 93(882), 463–482.CrossRefGoogle Scholar
Skerker, M. (2004). Just war criteria and the new face of war: Human shields, manufactured martyrs, and little boys with stones. Journal of Military Ethics, 3(1), 27–39.CrossRefGoogle Scholar
Slater, J. (2012). Just war moral philosophy and the 2008–09 Israeli campaign in Gaza. International Security, 37(2), 44–80.CrossRefGoogle Scholar
Society of Professional Journalists. (1996). Code of ethics. .
Solà-Martín, A. (2007). The Western Sahara cul-de-sac. Mediterranean Politics, 12(3), 399–405.CrossRefGoogle Scholar
Solis, G. D. (2010). The law of armed conflict: International humanitarian law in war. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Spencer, M. E. (1970). Weber on legitimate norms and authority. The British Journal of Sociology, 21(2), 123–134.CrossRefGoogle ScholarPubMed
Steinberg, G. M. (2006). Soft powers play hardball: NGOs wage war against Israel. Israel Affairs, 12(4), 748–768.CrossRefGoogle Scholar
Steinberg, G. M. (2011). The politics of NGOs, human rights and the Arab-Israel conflict. Israel Studies, 16(2), 24–54.CrossRefGoogle Scholar
Steinhoff, U. (2004). How can terrorism be justified? In Primoratz, I. (Ed.), Terrorism: The philosophical issues (pp. 97–112). Hampshire: Palgrave MacMillan.CrossRefGoogle Scholar
Stephan, M. J. (2006). Fighting for statehood: The role of civilian-based resistance in the East Timorese, Palestinian, and Kosovo Albanian self-determination movements. Fletcher Forum for World Affairs, 30(2), 57–80.Google Scholar
Stephan, M. J. and Chenoweth, E. (2008). Why civil resistance works: The strategic logic of nonviolent conflict. International Security, 33(1), 7–44.CrossRefGoogle Scholar
Stephan, M. J. and Mundy, J. (2006). A battlefield transformed: from guerrilla resistance to mass nonviolent struggle in the Western Sahara. Journal of Military and Strategic Studies, 8(3).Google Scholar
Streckfuss, R. (1990). Objectivity in journalism: A search and a reassessment. Journalism & Mass Communication Quarterly, 67(4), 973–983.Google Scholar
Studenski, P. and Krooss, H. E. (1963). Financial history of the United States. New York: McGraw Hill.Google Scholar
Suter, K. (1984). An international law of guerrilla warfare: The global politics of law-making. New York: St. Martin’s Press.Google Scholar
Svensson, I. and Lindgren, M. (2011). Community and consent: Unarmed insurrections in non-democracies. European Journal of International Relations, 17(1), 97–120.CrossRefGoogle Scholar
Tafoya, W. L. (2011). Cyber terror. .
Tesón, F. R. (2003). The liberal case for humanitarian intervention. In Holzgrefe, J. and Keohane, R. O. (Eds.), Humanitarian intervention: Ethical, legal and political dilemmas (pp. 93–129). Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Theoharis, A. G. (2006). A new agency: The origins and expansion of CIA covert operations. In Theoharis, A. G. (Ed.), The Central Intelligence Agency: Security under scrutiny (pp. 155–188). Westport, CT: Greenwood Publishing Group.Google Scholar
Thom, W. G. (1974) Trends in Soviet support for African liberation. Air University Review, July-August. .
Thomas, T. (2000). Manipulating the mass consciousness: Russian & Chechen “information war” tactics in the Second Chechen-Russian conflict. In Aldis, A. (Ed.), The Second Chechen War (pp. 112–129). Shrivenham, Wilts: Strategic and Combat Studies Institute (Great Britain).Google Scholar
Thruelsen, P. D. (2010). The Taliban in southern Afghanistan: A localised insurgency with a local objective. Small Wars & Insurgencies, 21(2), 259–276.CrossRefGoogle Scholar
Tishkov, V. A. (2004). Chechnya: Life in a war-torn society. Berkeley, CA: University of California Press.CrossRefGoogle Scholar
Tuck, D. (2011). Detention by armed groups: Overcoming challenges to humanitarian action. International Review of the Red Cross, 93(883), 759–782.CrossRefGoogle Scholar
Tugwell, M. (1981). Politics and propaganda of the Provisional IRA. Studies in Conflict & Terrorism, 5(1–2), 13–40.Google Scholar
Turkel, . (2010). Turkel Commission report, summary, report of the public commission to examine the maritime incident of 31 May 2010 – Part One. Jerusalem: The Public Commission To Examine the Maritime Incident of 31 May 2010. .
UNICEF. (1999). Update. September 23. .
United Nations (UN). (2004). A more secure world: our shared responsibility, report of the high-level panel on threats, challenges and change. New York: The United Nations.Google Scholar
United Nations (UN). (2012). Office for the Coordination of Humanitarian Affairs occupied Palestinian territory. Five years of blockade: The humanitarian situation in the Gaza Strip. June.
United Nations Assistance Mission in Afghanistan (UNAMA). (2012). Afghanistan: Annual report 2011, Protection of civilians in armed conflict, February 2012. Accessed .
United Nations General Assembly. (1947). Resolution 181, November 29. (Partition of Palestine into Jewish and Arab states).
United Nations General Assembly. (1966). Resolution 2229 [XXI], December 20. (Western Sahara).
United Nations General Assembly. (1972). Resolution 2983, December 14. (Western Sahara).
United Nations General Assembly. (1975). Resolution 3485 (XXX), December 12. (Question of Timor).
United Nations General Assembly. (1976). Resolution 389, Adopted by the Security Council at its 1914th meeting, on April 22, 1976, S/RES/389.
United Nations General Assembly. (2005). World summit outcome, A/60/L.1 Paragraph 139. .
United Nations Human Rights Council (UNHRC). (2009). Human rights in Palestine and other occupied Arab territories. Report of the UN fact-finding mission on the Gaza conflict (The “Goldstone Report”). A/HRC/12/48, September 25. .
United Nations News Centre. (2011). UN official deplores NATO attack on Libyan television station, 8. August.
United Nations Office for the Coordination of Humanitarian Affairs, occupied Palestinian territory (UNOCHA). (2011). Occupied Palestinian territory, special focus. .
United Nations Office for the Coordination of Humanitarian Affairs, occupied Palestinian territory (UNOCHA). (2012). Five years of blockade. .
United Nations Office on Drugs and Crime (UNODC). (2012). World drug report. New York: United Nations.Google Scholar
United Nations Secretary General. (2011). Report of the Secretary-General’s Panel of Inquiry on the 31 May 2010 Flotilla Incident. New York: United Nations. .
United Nations Secretary General. (2012). Report of the Secretary-General on the situation concerning Western Sahara. United Nations S/2012/197, April 5.
United Nations Security Council (UNSC). (1990). Resolution 661: The Situation between Iraq and Kuwait. U.N. Doc. S/RES/661.
United States Code. (2006). Title 18, Part I, Chapter 115, § 2381 – Treason. .
United States Code. (2009). Title 10§ 948a(7), (Supp. III 2009). Definitions: Unprivileged enemy belligerent.
USA Today. (2010). Taliban fights back with bombs, using civilians as human shields. USA TODAY, February 18. .
Utzinger, J. and Weiss, M. G. (2007). Editorial: Armed conflict, war and public health. Tropical Medicine & International Health, 12(8), 903–906.CrossRefGoogle ScholarPubMed
Vall, A. (2000). Can terrorism be justified? In Vall, A. (Ed.), Ethics in international affairs (pp. 65–80). Lanham, MD: Rowman and Littlefield.Google Scholar
Veuthey, M. (1976). Guerrilla warfare and humanitarian law. International Review of the Red Cross, 16(183), 277–294.CrossRefGoogle Scholar
Vidanage, H. R. (2004). Cyber cafes in Sri Lanka: Tamil virtual communities. Economic and Political Weekly, 39(36), 3988–3991.Google Scholar
Wall Street Journal (WSJ). (2012). ‘Lawfare’ loses big. The Wall Street Journal, January 28.
Walzer, M. (1977). Just and unjust wars: A moral argument with historical illustrations. New York: Basic Books.Google Scholar
Walzer, M. (2004). After 9/11: Five questions about terrorism. In Walzer, M., Arguing about war (pp. 130–142). New Haven, CT: Yale University Press.Google Scholar
Weinstein, J. M. (2007). Inside rebellion. New York: Cambridge University Press.Google Scholar
Weiss, T. G. (1999). Sanctions as a foreign policy tool: Weighing humanitarian impulses. Journal of Peace Research, 36(5), 499–509.CrossRefGoogle Scholar
Weldemichael, A. T. (2013). Third world colonialism and strategies of liberation: Eritrea and East Timor compared. Cambridge: Cambridge University Press.Google Scholar
Wellman, C. H. (1995). A defense of secession and political self-determination. Philosophy & Public Affairs, 24(2), 142–171.CrossRefGoogle Scholar
Wennmann, A. (2009). Grasping the financing and mobilization cost of armed groups: A new perspective on conflict dynamics. Contemporary Security Policy, 30(2), 265–280.CrossRefGoogle Scholar
World Health Organization(WHO). (2010). Health conditions in the occupied Palestinian territory, including east Jerusalem, and in the occupied Syrian Golan A63/INF.DOC./J 13.
Wijedasa, N. (2011). Sri Lanka’s ghosts of war. New York Times, December 30. .
Williams, P. (2007). Terrorist financing and organized crime: Nexus, appropriation of transformation. In Biersteker, T. J. and El Eckert, S. (Eds.), Countering the financing of terrorism (pp. 126–149). London: Routledge.Google Scholar
Wilson, C. (2006). Improvised explosive devices (IEDs) in Iraq and Afghanistan: Effects and countermeasures. CRS Report for Congress, The Library of Congress. .
Wilson, H. A. (1988). International law and the use of force by national liberation movements. Oxford: Clarendon Press.Google Scholar
Woldemikael, T. M. (1991). Political mobilization and nationalist movements: The case of the Eritrean People’s Liberation Front. Africa Today, 38(2), 31–42.Google Scholar
Wood, R. M. (2010). Rebel capability and strategic violence against civilians. Journal of Peace Research, 47(5), 601–614.CrossRefGoogle Scholar
Wood, T. (2007). Chechnya: The case for independence. Brooklyn: Verso Books.Google Scholar
World Medical Association. (2006) Declaration of Malta on Hunger Strikers. .
Wright, J. and Bryett, K. (1991). Propaganda and justice administration in Northern Ireland. Terrorism and Political Violence, 3(2), 25–42.CrossRefGoogle Scholar
Yehuda, R. (2002). Post-traumatic stress disorder. New England Journal of Medicine, 346(2), 108–114.CrossRefGoogle ScholarPubMed
Yehuda, R., Bryant, R., Marmar, C., and Zohar, J. (2005). Pathological responses to terrorism. Neuropsychopharmacology, 30(10), 1793–1805.CrossRefGoogle ScholarPubMed
Yildiz, K. and Breau, S. (2010). Historical background. In Yildiz, K. and Breau, S. (Eds.), The Kurdish conflict: International humanitarian law and post-conflict mechanisms (pp. 4–28). London: Routledge.Google Scholar
Young, R. (2004). Political terrorism as a weapon of the politically powerless. In Primoratz, I. (Ed.), Terrorism: The philosophical issues (pp. 55–64). Hampshire: Palgrave MacMillan.CrossRefGoogle Scholar
Zehr, N. A. (2013). Legitimate authority and the war against Al-Qaida. In Lang, A. F. Jr., O’Driscoll, C., and Williams, J. (Eds.), Just war: Authority, tradition and practice (pp. 97–114). Georgetown: Georgetown University Press.Google Scholar
Zemishlany, Z. (2012). Resilience and vulnerability in coping with stress and terrorism. Israel Medical Association Journal, 14, 307–309.Google ScholarPubMed
Zunes, S. (1999). Unarmed resistance in the Middle East and North Africa. In Zunes, S., Asher, S. B., and Kurtz, L. (Eds.), Nonviolent social movements: A geographical perspective (pp. 41–51). Oxford: Blackwell.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • References
  • Michael L. Gross, University of Haifa, Israel
  • Book: The Ethics of Insurgency
  • Online publication: 18 December 2014
  • Chapter DOI: https://doi.org/10.1017/CBO9781139094047.017
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • References
  • Michael L. Gross, University of Haifa, Israel
  • Book: The Ethics of Insurgency
  • Online publication: 18 December 2014
  • Chapter DOI: https://doi.org/10.1017/CBO9781139094047.017
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • References
  • Michael L. Gross, University of Haifa, Israel
  • Book: The Ethics of Insurgency
  • Online publication: 18 December 2014
  • Chapter DOI: https://doi.org/10.1017/CBO9781139094047.017
Available formats
×