Publications

Journal Articles

  1. & Visual Jihad: Constructing the “Good Muslim” in Online Jihadist Magazines. Studies in Conflict & Terrorism, 1-23.
  2. & Introduction: online jihadist magazines. Critical Studies on Terrorism 11(3), 501-504.
  3. & Online jihadist magazines and the “religious terrorism” thesis. Critical Studies on Terrorism 11(3), 537-550.
  4. & Introduction to the Special Issue: Islamic State’s Online Activity and Responses, 2014–2017. Studies in Conflict & Terrorism, 1-4.
  5. & Othering the West in the online Jihadist propaganda magazines Inspire and Dabiq. Journal of Language Aggression and Conflict 6(1), 79-106.
  6. & Unpacking cyberterrorism discourse: Specificity, status, and scale in news media constructions of threat. European Journal of International Security 2(1), 64-87.
  7. & Introduction to the Special Issue: Terrorist Online Propaganda and Radicalization. Studies in Conflict & Terrorism 40(1), 1-9.
  8. & Analogy and Authority in Cyberterrorism Discourse: An Analysis of Global News Media Coverage. Global Society 30(4), 605-623.
  9. & Responding to Cyberterrorism: Options and Avenues. Georgetown Journal of International Affairs Summer(Cyber V), 134-143.
  10. & State Cyberterrorism: A Contradiction in Terms?. Journal of Terrorism Research 6(3), 62-75.
  11. & Constructing Cyberterrorism as a Security Threat: a Study of International News Media Coverage. Perspectives on Terrorism 9(1), 60-75.
  12. & What Is Cyberterrorism? Findings From a Survey of Researchers. Terrorism and Political Violence 27(4), 657-678.
  13. & Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon. Perspectives on Terrorism 8(2), 52-65.
  14. & The Cyberterrorism Threat: Findings from a Survey of Researchers. Studies in Conflict & Terrorism 37(1), 68-90.
  15. The Role of the Courts in Imposing Terrorism Prevention and Investigation Measures: Normative Duality and Legal Realism. Criminal Law and Philosophy 9(2), 265-283.
  16. Understanding Anti-Terrorism Policy: Values, Rationales and Principles. Sydney Law Review 34(2), 317-346.
  17. & Tackling youth anti-social behaviour in devolving Wales: a study of the tiered approach in Swansea. Youth Justice 11(2), 150-167.
  18. & Substantively Uncivilized ASBOs : a Response. Criminal Law Review 2010(10), 764-766.
  19. & Should ASBOs be civilized?. Criminal Law Review 2010(6), 457-473.
  20. & Keeping Off-roaders on Track: Addressing the Misuse of Off-road Vehicles in Urban and Rural Settings. Journal of Planning & Environment Law 2010(1), 16-26.
  21. The unbalanced imagery of anti-terrorism policy. Cornell Journal of Law and Public Policy 18(2), 519-540.
  22. Why we should abandon the balance metaphor: a new approach to counterterrorism policy. ILSA Journal of International and Comparative Law 15(1), 95-146.
  23. Constructing a Framework for Criminal Justice Research: Learning from Packer's Mistakes. New Criminal Law Review 11(2), 257-311.
  24. & The use of ASBOs against young people in England and Wales: lessons from Scotland. Legal Studies 27(4), 604-629.
  25. ASBOs and Control Orders: Two Recurring Themes, Two Apparent Contradictions. Parliamentary Affairs 60(4), 601-624.
  26. ASBO Prohibitions and Young People - Hills v Chief Constable of Essex Police. Child and Family Law Quarterly 19(3), 374-389.
  27. The Principle of Composite Sentencing: Its Centrality to, and Implications For, the ASBO. Criminal Law Review 2006(9), 791-808.
  28. A Suicidal Woman, Roaming Pigs and a Noisy Trampolinist: Refining the ASBO's Definition of Anti-Social Behaviour. Modern Law Review 69(2), 183-213.
  29. The Nature of the Anti-Social Behaviour Order - R (McCann & others) v Crown Court at Manchester. Modern Law Review 66(4), 630-639.

Books

  1. Text, Cases and Materials on Criminal Law (2nd edition). Pearson.
  2. & (Eds.). Terrorists' Use of the Internet: Assessment and Response. Amsterdam: IOS Press.
  3. & (Eds.). Violent Extremism Online: New Perspectives on Terrorism and the Internet. Routledge.
  4. Criminal Law: Text, Cases and Materials. London: Pearson.
  5. & (Eds.). Terrorism Online: Politics, Law and Technology. Stuart Macdonald, Lee Jarvis, Thomas Chen (Ed.), Abingdon: Routledge.
  6. & (Eds.). Cyberterrorism: Understanding, Assessment & Response. Stuart Macdonald, Lee Jarvis, Thomas Chen (Ed.), New York: Springer.

Book Chapters

  1. & Disrupting terrorist activity: What are the limits to criminal methods of disruption?. In Beyond Human Rights and the War on Terror. (pp. 125-142). Abingdon: Routledge.
  2. & Purposive and Performative Persuasion: The Linguistic Basis for Criminalising the (Direct and Indirect) Encouragement of Terrorism. In Using Law to Fight Terror: Legal Approaches to Combating Violent Non-State and State-Sponsored Actors. Oxford: Oxford University Press.
  3. Radicalisers as Regulators: An Examination of Dabiq Magazine. In Terrorists' Use of the Internet: Assessment and Response. (pp. 146-157). Amsterdam: IOS Press.
  4. & Public and expert voices in the legal regulation of technology. In The Routledge Handbook of Technology, Crime and Justice. (pp. 577-593). Abingdon: Routledge.
  5. Terrorist Narratives & Communicative Devices: Findings from a Study of Online Terrorist Magazines. In Expanding Research on Countering Violent Extremism. (pp. 127-141). Abu Dhabi: Hedayah.
  6. Assessing and Responding to the Cyberterrorism Threat. In Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses. (pp. 200-209). IOS Press.
  7. Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence. In Clive Walker, Genevieve Lennon (Ed.), Routledge Handbook of Law and Terrorism. (pp. 147-162). Abingdon: Routledge.
  8. Cyberterrorism and Enemy Criminal Law. In Jens David Ohlin, Claire Finkelstein, Kevin Govern (Ed.), Cyber War: Law and Ethics for Virtual Conflicts. Oxford: Oxford University Press.
  9. & Terrorism Online: A New Strategic Environment. In Thomas Chen, Lee Jarvis, Stuart Macdonald (Ed.), Terrorism Online: Politics, Law and Technology. Abingdon: Routledge.
  10. & Cyberterrorism: What is it and What Threat Does it Pose?. In Caroline Kennedy-Pipe, Gordon Clubb, Simon Mabon (Ed.), Terrorism and Political Violence. London: Sage.
  11. Prosecuting Suspected Terrorists: Precursor Crimes, Intercept Evidence and the Priority of Security. In Lee Jarvis, Michael Lister (Ed.), Critical Perspectives on Counter-terrorism. Abingdon: Routledge.
  12. & The Criminalisation of Terrorists' Online Preparatory Acts. In Stuart Macdonald, Lee Jarvis, Thomas Chen (Ed.), Cyberterrorism: Understanding, Assessment & Response. New York: Springer.

Conference Contributions

  1. & (2018). Who disseminates Rumiyah? Examining the relative influence of sympathiser and non-sympathiser Twitter users. Europol Headquarters, The Hague: 2nd European Counter Terrorism Centre Advisory Group Conference.
  2. & (2017). The Response of, and on, Twitter to the Release of Dabiq Issue 15. Europol Headquarters, The Hague: 1st European Counter Terrorism Centre Advisory Group Conference.

Other Research Outputs

  1. & (2018). Cyberterrorism: A Survey of Researchers Five Years On.
  2. & (2016). Advanced Research Workshop: Terrorists’ Use of the Internet: Assessment and Response: Final Report.
  3. & (2015). Online Terrorist Magazines: Preliminary Findings.
  4. & (2014). Terrorists’ Use of the Internet: A Symposium.
  5. & (2014). Cyberterrorism and the News Media.
  6. & (2013). A Multidisciplinary Conference on Cyberterrorism.
  7. & (2013). Cyberterrorism: A Survey of Researchers.