{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T21:59:52Z","timestamp":1761947992950,"version":"3.37.3"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,7,15]],"date-time":"2014-07-15T00:00:00Z","timestamp":1405382400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Scientometrics"],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1007\/s11192-014-1378-4","type":"journal-article","created":{"date-parts":[[2014,8,21]],"date-time":"2014-08-21T17:04:57Z","timestamp":1408640697000},"page":"179-201","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["The extreme case of terrorism: a scientometric analysis"],"prefix":"10.1007","volume":"101","author":[{"given":"Edoardo","family":"Magnone","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,7,15]]},"reference":[{"issue":"1","key":"1378_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.euroecorev.2007.08.005","volume":"52","author":"A Abadie","year":"2008","unstructured":"Abadie, A., & Gardeazabal, J. (2008). Terrorism and the world economy. European Economic Review, 52(1), 1\u201327.","journal-title":"European Economic Review"},{"issue":"2","key":"1378_CR2","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/j.jebo.2010.10.007","volume":"77","author":"KP Arin","year":"2011","unstructured":"Arin, K. P., Lorz, O., Reich, O. F. M., & Spagnolo, N. (2011). Exploring the dynamics between terrorism and anti-terror spending: Theory and UK-evidence. Journal of Economic Behavior & Organization, 77(2), 189\u2013202.","journal-title":"Journal of Economic Behavior & Organization"},{"issue":"1","key":"1378_CR3","doi-asserted-by":"crossref","first-page":"60","DOI":"10.5530\/jscires.2012.1.11","volume":"1","author":"A Bala","year":"2012","unstructured":"Bala, A., & Gupta, B. M. (2012). Measles: A quantitative analysis of world publications during 2001\u20132010. Journal of Scientometric Research, 1(1), 60\u201370.","journal-title":"Journal of Scientometric Research"},{"issue":"2","key":"1378_CR4","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1111\/j.1540-5907.2007.00256.x","volume":"51","author":"E Bueno De Mesquita","year":"2007","unstructured":"Bueno De Mesquita, E., & Dickson, E. S. (2007). The propaganda of the deed: Terrorism, counterterrorism, and mobilization. American Journal of Political Science, 51(2), 364\u2013381.","journal-title":"American Journal of Political Science"},{"key":"1378_CR5","doi-asserted-by":"crossref","first-page":"119","DOI":"10.5860\/crl-314","volume":"crl-314","author":"DR Bullis","year":"2013","unstructured":"Bullis, D. R., & Irving, R. D. (2013). Journals supporting terrorism research: Identification and investigation into their impact on the social sciences. College & Research Libraries, crl-314, 119\u2013129.","journal-title":"College & Research Libraries"},{"issue":"1","key":"1378_CR6","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1080\/09546550500174905","volume":"18","author":"O Buresa","year":"2006","unstructured":"Buresa, O. (2006). EU counterterrorism policy: A paper tiger? Terrorism and Political Violence, 18(1), 57\u201378.","journal-title":"Terrorism and Political Violence"},{"key":"1378_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1742-5581-3-1","volume":"3","author":"JF Burnham","year":"2006","unstructured":"Burnham, J. F. (2006). Scopus database: A review. Biomedical Digital Libraries, 3, 1\u20138.","journal-title":"Biomedical Digital Libraries"},{"issue":"8","key":"1378_CR8","doi-asserted-by":"crossref","first-page":"1347","DOI":"10.1002\/asi.20838","volume":"59","author":"H Chen","year":"2008","unstructured":"Chen, H., Chung, W., Qin, J., Reid, E., Sageman, M., & Weimann, G. (2008). Uncovering the dark Web: A case study of Jihad on the Web. Journal of the American Society for Information Science and Technology, 59(8), 1347\u20131359.","journal-title":"Journal of the American Society for Information Science and Technology"},{"issue":"1","key":"1378_CR9","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1177\/0022002709352452","volume":"54","author":"A Clauset","year":"2010","unstructured":"Clauset, A., & Wiegel, F. W. (2010). A generalized aggregation\u2013disintegration model for the frequency of severe terrorist attacks. Journal of Conflict Resolution, 54(1), 179\u2013197.","journal-title":"Journal of Conflict Resolution"},{"key":"1378_CR10","unstructured":"Clauset, A., & Woodard, R. (2012). Estimating the historical and future probabilities of large terrorist events. arXiv:1209.0089."},{"key":"1378_CR11","unstructured":"Dess, H. M. (2006). Database reviews and reports\u2014Scopus. Issues in Science and Technology Librarianship. doi: 10.5062\/F4X0650T . Retrieved April 10, 2013, from http:\/\/www.istl.org\/06-winter\/databases4.html ."},{"issue":"1\u20132","key":"1378_CR12","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/s11127-008-9384-9","volume":"139","author":"K Drakos","year":"2009","unstructured":"Drakos, K., & Giannakopoulos, N. (2009). An econometric analysis of counterterrorism effectiveness: The impact on life and property losses. Public Choice, 139(1\u20132), 135\u2013151.","journal-title":"Public Choice"},{"issue":"3","key":"1378_CR13","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1080\/13183222.2010.11009036","volume":"17","author":"M Frago","year":"2010","unstructured":"Frago, M., La Porte, T., & Phalen, P. (2010). The narrative reconstruction of 9\/11 in Hollywood films: Independent voice or official interpretation? Javnost, 17(3), 57\u201370.","journal-title":"Javnost"},{"issue":"2","key":"1378_CR14","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1016\/j.ejpoleco.2004.03.001","volume":"20","author":"BS Frey","year":"2004","unstructured":"Frey, B. S., & Luechinger, S. (2004). Decentralization as a disincentive for terror. European Journal of Political Economy, 20(2), 509\u2013515.","journal-title":"European Journal of Political Economy"},{"issue":"13","key":"1378_CR15","doi-asserted-by":"crossref","first-page":"982","DOI":"10.1056\/NEJMsa013404","volume":"346","author":"S Galea","year":"2002","unstructured":"Galea, S., Ahern, J., Resnick, H., Kilpatrick, D., Bucuvalas, M., Gold, J., et al. (2002). Psychological sequelae of the September 11 terrorist attacks in New York City. New England Journal of Medicine, 346(13), 982\u2013987.","journal-title":"New England Journal of Medicine"},{"issue":"3","key":"1378_CR16","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1007\/s11192-005-0030-8","volume":"62","author":"A Gordon","year":"2005","unstructured":"Gordon, A. (2005a). The peripheral terrorism literature: Bringing it closer to the core. Scientometrics, 62(3), 403\u2013414.","journal-title":"Scientometrics"},{"issue":"1","key":"1378_CR17","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/s11192-005-0259-2","volume":"65","author":"A Gordon","year":"2005","unstructured":"Gordon, A. (2005b). Homeland security literature in relation to terrorism publications: The source and the response. Scientometrics, 65(1), 55\u201365.","journal-title":"Scientometrics"},{"issue":"2","key":"1378_CR18","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/s11192-007-1714-z","volume":"72","author":"A Gordon","year":"2007","unstructured":"Gordon, A. (2007). Transient and continuant authors in a research field: The case of terrorism. Scientometrics, 72(2), 213\u2013224.","journal-title":"Scientometrics"},{"key":"1378_CR19","unstructured":"GTD. (2013). The Global Terrorism Database (GTD). Retrieved April 10, 2013, from http:\/\/www.start.umd.edu\/gtd\/using-gtd\/ ."},{"issue":"3","key":"1378_CR20","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1111\/j.1477-7053.2007.00228.x","volume":"42","author":"J Gunning","year":"2007","unstructured":"Gunning, J. (2007). A case for critical terrorism studies? Government and Opposition, 42(3), 363\u2013393.","journal-title":"Government and Opposition"},{"issue":"5","key":"1378_CR21","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1080\/105761002901223","volume":"25","author":"B Hoffman","year":"2002","unstructured":"Hoffman, B. (2002). Rethinking terrorism and counterterrorism since 9\/11. Studies in Conflict & Terrorism, 25(5), 303\u2013316.","journal-title":"Studies in Conflict & Terrorism"},{"key":"1378_CR22","unstructured":"Jackson, R., Gunning, J., & Smyth M. B. (2007). The case for a critical terrorism studies. Prepared for delivery at the 2007 annual meeting of the American Political Science Association, August 30\u2013September 2, 2007. Retrieved April 10, 2013, from http:\/\/cadair.aber.ac.uk\/dspace\/bitstream\/handle\/2160\/1945\/APSA-2007-Paper-final2.pdf?sequence=1 ."},{"issue":"3","key":"1378_CR23","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1080\/09546550902984042","volume":"21","author":"K Jacques","year":"2009","unstructured":"Jacques, K., & Taylor, P. J. (2009). Female terrorism: A review. Terrorism and Political Violence, 21(3), 499\u2013515.","journal-title":"Terrorism and Political Violence"},{"issue":"4","key":"1378_CR24","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1177\/0263276402019004015","volume":"19","author":"R Johnson","year":"2002","unstructured":"Johnson, R. (2002). Defending ways of life: The (anti-)terrorist rhetorics of Bush and Blair. Theory, Culture and Society, 19(4), 211\u2013231.","journal-title":"Theory, Culture and Society"},{"key":"1378_CR25","unstructured":"Johnson, N. F. (2011). Escalation, timing and severity of insurgent and terrorist events: Toward a unified theory of future threats. arXiv:1109.2076v1."},{"key":"1378_CR26","doi-asserted-by":"crossref","unstructured":"Kellner, D. M. (2010). Cinema wars: Hollywood film and politics in the Bush\u2013Cheney era. Malden, MA: Wiley. Retrieved April 10, 2013, from http:\/\/dx.doi.org\/10.1002\/9781444314809.ch2 .","DOI":"10.1002\/9781444314809.ch2"},{"issue":"1","key":"1378_CR27","first-page":"24","volume":"4","author":"G LaFree","year":"2010","unstructured":"LaFree, G. (2010). The global terrorism database: Accomplishments and challenges. Perspectives on Terrorism, 4(1), 24\u201346.","journal-title":"Perspectives on Terrorism"},{"issue":"2","key":"1378_CR28","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1080\/09546550701246817","volume":"19","author":"G LaFree","year":"2007","unstructured":"LaFree, G., & Dugan, L. (2007). Introducing the global terrorism database. Terrorism and Political Violence, 19(2), 181\u2013204.","journal-title":"Terrorism and Political Violence"},{"issue":"1\u20133","key":"1378_CR29","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.forsciint.2013.02.004","volume":"228","author":"SJ Leistedt","year":"2013","unstructured":"Leistedt, S. J. (2013). Behavioural aspects of terrorism. Forensic Science International, 228(1\u20133), 21\u201327.","journal-title":"Forensic Science International"},{"issue":"2","key":"1378_CR30","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1016\/j.techfore.2006.02.004","volume":"74","author":"C-H Lin","year":"2007","unstructured":"Lin, C.-H., Liou, D.-Y., & Wu, K.-W. (2007). Opportunities and challenges created by terrorism. Technological Forecasting and Social Change, 74(2), 148\u2013164.","journal-title":"Technological Forecasting and Social Change"},{"issue":"2","key":"1378_CR31","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1080\/17539153.2012.692512","volume":"5","author":"O Lynch","year":"2012","unstructured":"Lynch, O., & Ryder, C. (2012). Deadliness, organizational change and suicide attacks: Understanding the assumptions inherent in the use of the term \u2018new terrorism\u2019. Critical Studies on Terrorism, 5(2), 257\u2013275.","journal-title":"Critical Studies on Terrorism"},{"issue":"2","key":"1378_CR32","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1016\/j.joi.2012.01.003","volume":"6","author":"E Magnone","year":"2012","unstructured":"Magnone, E. (2012). An analysis for estimating the short-term effects of Japan\u2019s triple disaster on progress in materials science. Journal of Informetrics, 6(2), 289\u2013297.","journal-title":"Journal of Informetrics"},{"issue":"1","key":"1378_CR33","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1023\/A:1014827819263","volume":"53","author":"VA Markisova","year":"2002","unstructured":"Markisova, V. A., Wilson, C. S., & Davis, M. (2002). From bioweapon to biodefense. The collaborative literature of biodefense in the 1990s. Scientometrics, 53(1), 21\u201338.","journal-title":"Scientometrics"},{"key":"1378_CR34","unstructured":"Mohtadi, H., & Murshid, A. P. (2006). Analyzing catastrophic terrorist events with applications to the food industry. In H. Richardson (Ed.), The economic costs and consequences of terrorism. London: Edward Elgar. ISBN #1845427343."},{"issue":"3","key":"1378_CR35","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1080\/14751798.2010.516542","volume":"26","author":"PJ Phillips","year":"2010","unstructured":"Phillips, P. J. (2010). The randomization of terrorist attacks. Defense & Security Analysis, 26(3), 261\u2013272.","journal-title":"Defense & Security Analysis"},{"issue":"3","key":"1378_CR36","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1016\/S0167-4048(02)00307-3","volume":"21","author":"C Pounder","year":"2002","unstructured":"Pounder, C. (2002). Anti-terrorism legislation: The impact on the processing of data. Computers & Security, 21(3), 240\u2013245.","journal-title":"Computers & Security"},{"issue":"I","key":"1378_CR37","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/S0306-4573(96)00052-0","volume":"33","author":"EF Reid","year":"1997","unstructured":"Reid, E. F. (1997). Evolution of a body of knowledge: An analysis of terrorism research. Information Processing and Management, 33(I), 91\u2013106.","journal-title":"Information Processing and Management"},{"key":"1378_CR38","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.ijhcs.2006.08.006","volume":"65","author":"EF Reid","year":"2007","unstructured":"Reid, E. F., & Chen, H. (2007). Mapping the contemporary terrorism research domain. International Journal of Human\u2013Computer Studies, 65, 42\u201356.","journal-title":"International Journal of Human\u2013Computer Studies"},{"issue":"9","key":"1378_CR39","first-page":"1531","volume":"89","author":"DL Roth","year":"2005","unstructured":"Roth, D. L. (2005). The emergence of competitors to the Science. Citation Index and the Web of Science. Current Science, 89(9), 1531\u20131536.","journal-title":"Current Science"},{"issue":"9686","key":"1378_CR40","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1016\/S0140-6736(09)60873-4","volume":"374","author":"LS Rubenstein","year":"2009","unstructured":"Rubenstein, L. S., & Annas, G. J. (2009). Medical ethics at Guantanamo Bay detention centre and in the US military: A time for reform. The Lancet, 374(9686), 353\u2013355.","journal-title":"The Lancet"},{"issue":"1","key":"1378_CR41","first-page":"67","volume":"1","author":"RMS Sabido","year":"2009","unstructured":"Sabido, R. M. S. (2009). When the \u2018other\u2019 becomes \u2018us\u2019: Mediated representations, \u2018terrorism\u2019 and the \u2018war on terror\u2019. Platform, 1(1), 67\u201382.","journal-title":"Platform"},{"issue":"2","key":"1378_CR42","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1080\/09546550490483134","volume":"16","author":"AP Schmid","year":"2004","unstructured":"Schmid, A. P. (2004). Frameworks for conceptualising terrorism. Terrorism and Political Violence, 16(2), 197\u2013221.","journal-title":"Terrorism and Political Violence"},{"key":"1378_CR43","unstructured":"Silke, A. (2008). Research on terrorism\u2014A review of the impact of 9\/11 and the global war on terrorism. In H. Chen, E. Reid, J. Sinai, A. Silke, & B. Ganor (Eds.), Terrorism informatics: Knowledge management and data mining for homeland security series: Integrated series in information systems (Vol. 18(XLII), pp. 27\u201350)."},{"key":"1378_CR44","unstructured":"START. (2012). National Consortium for the Study of Terrorism and Responses to Terrorism. Global Terrorism Database [Data file]. Retrieved April 10, 2013, from http:\/\/www.start.umd.edu\/gtd ."},{"issue":"1","key":"1378_CR45","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1080\/13600820701740795","volume":"22","author":"J Steans","year":"2008","unstructured":"Steans, J. (2008). Telling stories about women and gender in the war on terror. Global Society, 22(1), 159\u2013176.","journal-title":"Global Society"},{"issue":"2","key":"1378_CR46","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.avb.2009.09.001","volume":"15","author":"M Taylor","year":"2010","unstructured":"Taylor, M. (2010). Is terrorism a group phenomenon? Aggression and Violent Behavior, 15(2), 121\u2013129.","journal-title":"Aggression and Violent Behavior"},{"issue":"8","key":"1378_CR47","doi-asserted-by":"crossref","first-page":"4411","DOI":"10.1016\/j.enpol.2010.03.070","volume":"38","author":"P Toft","year":"2010","unstructured":"Toft, P., Duero, A., & Bieliauskas, A. (2010). Terrorist targeting and energy security. Energy Policy, 38(8), 4411\u20134421.","journal-title":"Energy Policy"},{"issue":"3","key":"1378_CR48","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1080\/09546553.2011.636464","volume":"24","author":"H Watson","year":"2012","unstructured":"Watson, H. (2012). Dependent citizen journalism and the publicity of terror. Terrorism and Political Violence, 24(3), 465\u2013482.","journal-title":"Terrorism and Political Violence"},{"issue":"6","key":"1378_CR49","doi-asserted-by":"crossref","first-page":"856","DOI":"10.1002\/asi.20563","volume":"58","author":"KW Weessies","year":"2007","unstructured":"Weessies, K. W. (2007). The publishing dynamics of catastrophic events. Journal of the American Society for Information Science and Technology, 58(6), 856\u2013861.","journal-title":"Journal of the American Society for Information Science and Technology"},{"issue":"1","key":"1378_CR50","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/j.pubrev.2006.11.006","volume":"33","author":"J Zhang","year":"2007","unstructured":"Zhang, J. (2007). Beyond anti-terrorism: Metaphors as message strategy of post-September-11 U.S. public diplomacy. Public Relations Review, 33(1), 31\u201339.","journal-title":"Public Relations Review"}],"container-title":["Scientometrics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11192-014-1378-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11192-014-1378-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11192-014-1378-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T01:27:25Z","timestamp":1565746045000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11192-014-1378-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,15]]},"references-count":50,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,10]]}},"alternative-id":["1378"],"URL":"https:\/\/doi.org\/10.1007\/s11192-014-1378-4","relation":{},"ISSN":["0138-9130","1588-2861"],"issn-type":[{"type":"print","value":"0138-9130"},{"type":"electronic","value":"1588-2861"}],"subject":[],"published":{"date-parts":[[2014,7,15]]}}}