Skip to main content

CRJS 4301 Terrorism: Welcome & Course Readings

Welcome to your course guide

Please find your required library readings below. If you have problems with the links below, please contact the Library. If you have APA questions about these materials, please contact the Writing Center.

CRJS 4301 Course Readings

After clicking on a citation below, enter your myWalden user name and password at the prompt.

Please Ask a Librarian if you have any questions about the links.

Chaturvedi, M., Unal, A., Aggarwal, P., Bahl, S., & Malik, S. (2014, June). International cooperation in cyber space to combat cyber crime and terrorism. Paper presented at the 2014 IEEE Conference on Norbert Wiener in the 21st Century, Boston, MA. 

Ellis, R. (2014). Creating a secure network: The 2001 anthrax attacks and the transformation of postal security. The Sociological Review, 62(1), 161–182. 

Kluch, S. P., & Vaux, A. (2016). The non-random nature of terrorism: An exploration of where and how global trends of terrorism have developed over 40 years. Studies in Conflict & Terrorism, 39(12), 1031–1049. 

Mutanda, D. (2017). What makes terrorism tick in Africa? Evidence from Al-Shabaab and Boko Haram. Jadavpur Journal of International Relations, 21(1), 20–40. 

Reitman, J. (2018, November 11). State of denial. New York Times Magazine, 38–68.

Shields, C. A., Smith, B. L., & Damphousse, K. R. (2016). Prosecuting terrorism post-9/11: Impact of policy changes on case outcomes. In G. LaFree & J. D. Freilich (Eds.), The handbook of the criminology of terrorism (pp. 495–507). West Sussex, UK: John Wiley & Sons. 

Other Readings

Optional or supplemental readings may or may not be available in the library. Find further information about optional readings here.

If you have questions about your required course textbooks, please contact Customer Care at