Group 03: Ryan McElhenney Terence Ryan Melonas Daniel Muldoon . HOW CAN WE ASSESS THE RISK OF TERRORISM ?. Introduction. Definition of Risk Current Risk Assessment Techniques and Practices Information Sources Risk Assessment Examples Issues in Risk Assessment Differing Opinions
Bajema, Natasha E. “Rethinking threat Assessments for Terrorist Targets: Applying the Lessons of Complex Terrorism” Terrorism and Counter Terrorism: Understanding the New Security Environment. Eds. Howard, Russell D., Reid L. Sawyer, and Natasha E. Bajema. New York: McGraw-Hill, 2009. 88 - 109.
Bennett, Clay. “Security Fence.” 2002 Pulitzer Prize Cartoons. 2002. Clay Bennett Cartoons. 25 February 2009.
Bush, George W. “Homeland Security Presidential directive 5.” The White House. 28 February 2003. United States. 25 February 2009.
“Current threat level for the Netherlands.” National Coordinator for Counterterrorism. 2008. Netherlands. 25 February 2009.
“Current threat level.” Home Office. 2008. United Kingdom. 25 February 2009.
Ganor, Boaz. The Counter-Terrorism Puzzle: A Guide for Decision Makers. Piscataway, New Jersey: Transaction Publishers, 2008.
Harris, John F., Mike Allen, and Jim Vandehei. “Cheney Warns of New Attacks.” Politico. 05 February 2009. Capitol News Company, LLC. 25 February 2009.
“Homeland Security Advisory System: Guidance for Federal Departments and Agencies.” DHS. 28 March 2008. U.S. Department of Homeland Security. 25 February 2009.
Jordan, Lara Jakes. “U.S. raises airline threat level to highest level, first time ever, in response to British threat.” Sign On San Diego by the Union Tribune. 10 August 2006. Union-Tribune Publishing Co. 25 February 2009.
Kaplan, Stanley, and B. John Garrick. “On The Quantitative Definition of Risk.” Risk Analysis. 30 May 2006. Society for Risk Analysis. 25 February 2009.
Khalsa, Sundri K. “Forecasting Terrorism: Indicators and Proven Analytic Techniques.” Lecture Notes in Computer Science, Intelligence and Security Informatics. 25 April 2005. Risk Analysis. 25 February 2009.
“Know-alls: Electronic snooping by the state may safeguard liberty—and also threaten it.” The Economist. 25 September 2008. The Economist Newspaper Limited. 25 February 2009.
“Part 3: The Shadows in the Cave.” The Power of Nightmares. Dir. Adam Curtis. BBC. BBC Two. 03 November 2004.
Patrick, Stuart. “Weak States and Global Threats: Fact of Fiction?” Terrorism and Counter Terrorism: Understanding the New Security Environment. Eds. Howard, Russell D., Reid L. Sawyer, and Natasha E. Bajema. New York: McGraw-Hill, 2009. 88 - 109.
Schum, David A. and Jon R. Morris. “Assessing the competence and credibility of human sources of intelligence evidence: contributions from law and probability.” Law, Probability and Risk. 28 August 2007. Oxford University Press. 25 February 2009.
Taleb, Nassim Nicholas. The Black Swan: The Impact of the Highly Improbable. New York: Random House, Inc, 2007.
Willis, Henry H., Andrew R. Morral, Terrence K. Kelly, and Jamison Jo Medby. “Estimating Terrorism Risk.” Center for Terrorism Risk Management Policy. 2005. RAND Corporation. 25 February 2009.