[1] P. Norris, K. Montague, and J. Marion, Framing terrorism: The news media, the government and the public,
eds. Routledge, 2013.
[2] R. Borum, Psychology of terrorism, University of South Florida, 2004.
[3] P. Rumney, “Is Coercive Interrogation of Terrorist Suspects Effective‐A Response to Bagaric and Clarke,” USFL Rev. 40
479, 2005.
[4] V. Gerberth, “Psychological Profiling,” Law and Order 29: 46‐49, 1981.
[5] B. Turvey, “Criminal profiling: An introduction to behavioral evidence analysis,” Elsevier, 2011.
[6] N. D. Wilkins, and N. D. Brown, “Historical Overview and Perceptions of Racial and Terrorist Profiling in an Era of
Homeland Security A Research Note,” Criminal Justice Policy Review 20.3: 359‐374, 2009.
[7] B. Edwin, “Jihadi terrorists in Europe, their characteristics and the circumstances in which they joined the jihad: an
exploratory study,” 2006.
[8] G. Cynthia, Anticipating surprise: Analysis for strategic warning, University Press of America, 2004.
[9] K. Gilles, and J. P. Milelli, Al Qaeda in its own words, Harvard University Press, 2008.
[10] C. A. Kurth, “How al‐Qaida ends: The decline and demise of terrorist groups,” International Security 31.1: 7‐48, 2006.
[11] T. Tom, and J. C. Wakslak, “Profiling and Police Legitimacy: Procedural Justice, Attributions of Motive, And Acceptance
Of Police Authority,” Criminology 42.2: 253‐282, 2004.
[12] E. Stephen, “Racial profiling and terrorism,” NYL Sch. L. Rev. 46: 675, 2002.
[13] R. Jonathan, “Will it Ever be Possible to Profile the Terrorist?,” Journal of Terrorism Research 3.2, 2012.
[14] Y. Rachel, “Pathological responses to terrorism,” Neuro psychopharmacology 30.10: 1793‐1805, 2005.
[15] D. G. Pinar, Does terrorism have economic roots?, No. wp2009‐001, Boston University‐Department of Economics, 2009.
[16] L. J. Janczewski, and A. M. Colarik, Cyber warfare and cyber terrorism, eds. IGI Global, 2008.
[17] S. Alex, “Links Between Terrorism and Drug Trafficking: A Case of Narcoterrorism?,” International Summit on
Democracy, Terrorism and Security, January 27, 2005.
[18] J. James, Blood that cries out from the earth: The psychology of religious terrorism, Oxford University Press, 2008.
[19] M. J. Reid, and J. E. McEllistrem, “Bombing and psychopathy: an integrative review,” Journal of forensic sciences 43.3
(1998): 556.
[20] B. J. Arnold, Casebook of a crime psychiatrist, New York: Bernard Geis Associates, 1968.
[21] J. MCdonald, and C. Charles, “Bombers and firesetters,” 1977.
[22] D. P. Elliott, “Patterns in human violence,” American Psychiatric Association Annual Review 6: 465‐490, 1987.
[23] B. L. Smith, and K. D. Morgan, “Terrorists right and left: Empirical issues in profiling American terrorists,” Studies in
Conflict & Terrorism 17.1: 39‐57, 1994.
[24] D. John, “A Criminal Investigative Analysis of Jack The Ripper,” Kindle Edition, 2011.
[25] F. Franco, and F. Bruno, “A Psychiatric Comparative Analysis of Left and Right‐Wing Terrorism In Italy,” Psychiatry,
Springer US, 399‐405, 1985.
[26] S. Lilo, “Biographical Features of Terrorists,” Psychiatry, Springer US, 407‐408, 1985.
[27] O. Tuomas, "Terrorist profiling: human rights concerns,” Critical Studies on Terrorism 3.2: 295‐312, 2010.
[28] R. A. Hudson, and M. Majeska, The Sociology and Psychology of Terrorism: Who Becomes a Terrorist and Why?,
Washington, DC: Library of Congress, 1999.
[29] F. H. Sahito, “Interrogational Neuroimaging: The Missing Element in Counter‐Terrorism,” International Journal of
Innovation and Applied Studies, vol. 3, no. 3, pp. 592–607, 2013.
Farhan Hyder Sahito, Wolfgang Slany, Safdar Zaman, Irfan Hyder Sahito, and Rana Shahzad Qaiser
ISSN : 2028-9324 Vol. 4 No. 2, Oct. 2013 285
[30] F. H. Sahito, W. Slany, “Functional Magnetic Resonance Imaging and the Challenge of Balancing Human Security with
State Security”, Human Security Perspectives 1 (European Training and Research Centre for Human Rights and
Democracy (ETC), Graz, Austria, 1: 38–66, 2012.
[31] F. H. Sahito, W. Slany, “Advanced Personnel Vetting Techniques in Critical Multi‐Tennant Hosted Computing
Environments,” International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 4, No.5, 2013.
[32] F. H. Sahito, A. Latif, and W. Slany, “Weaving twitter stream into linked data a proof of concept framework,” Emerging
Technologies (ICET), 2011 7th International Conference on. IEEE, 2011.
[33] F. H. Sahito, W. Slany, and S. K. Shahzad, “Search engines: The invader to our privacy—A survey,” Computer Sciences
and Convergence Information Technology (ICCIT), 2011 6th International Conference on. IEEE, 2011.
Thank you for copying data from http://www.arastirmax.com