Skip to main content
Security and Defence Management
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
You are here
Home
»
Terrorism
Terrorism
Examining ISIS Online Recruitment through Relational Development Theory
Ponder, Sarah
, and
Jonathan Matusit
.
"
Examining ISIS Online Recruitment through Relational Development Theory
."
Connections: The Quarterly Journal
16, no. 4 (2017): 35-50.
ISIS online recruitment
— Downloaded 6899 times
Read more
about Examining ISIS Online Recruitment through Relational Development Theory
19847 reads
Google Scholar
DOI
RTF
EndNote XML
Guerrilla Operations in Western Sahara: The Polisario versus Morocco and Mauritania
Besenyő, János
.
"
Guerrilla Operations in Western Sahara: The Polisario versus Morocco and Mauritania
."
Connections: The Quarterly Journal
16, no. 3 (2017): 23-45.
Guerrilla operations in Western Sahara
— Downloaded 6085 times
Guerrilla operations in Western Sahara -- EPUB
— Downloaded 5309 times
Guerrilla operations in Western Sahara -- for Kindle
— Downloaded 5600 times
Read more
about Guerrilla Operations in Western Sahara: The Polisario versus Morocco and Mauritania
39236 reads
Google Scholar
DOI
RTF
EndNote XML
Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism
Gürer, Cüneyt
.
"
Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism
."
Connections: The Quarterly Journal
16, no. 2 (2017): 41-57.
Spillover of ISIS terrorism
— Downloaded 5682 times
Read more
about Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism
29871 reads
Google Scholar
DOI
RTF
EndNote XML
Parliamentary Attempts to Investigate Berlin’s Vehicular Ramming Attack
von Münchow, Sebastian
, and
Lena Hantschke
.
"
Parliamentary Attempts to Investigate Berlin’s Vehicular Ramming Attack
."
Connections: The Quarterly Journal
16, no. 2 (2017): 25-39.
Parliamentary Attempts to Investigate Berlin’s Vehicular Ramming Attack
— Downloaded 6395 times
Read more
about Parliamentary Attempts to Investigate Berlin’s Vehicular Ramming Attack
28349 reads
Google Scholar
DOI
RTF
EndNote XML
The Death of bin Laden, and the Future of Al-Qaeda
Le Beau, John J.
.
"
The Death of bin Laden, and the Future of Al-Qaeda
." In
The Dangerous Landscape
, 221-222., 2013.
The Death of bin Laden, and the Future of Al-Qaeda
— Downloaded 3688 times
Read more
about The Death of bin Laden, and the Future of Al-Qaeda
16847 reads
Google Scholar
RTF
EndNote XML
International Terrorism and International Tourism
Schmid, Alex P.
.
"
International Terrorism and International Tourism
." In
The Dangerous Landscape
, 211-219., 2013.
International Terrorism and International Tourism
— Downloaded 3622 times
Read more
about International Terrorism and International Tourism
15544 reads
Google Scholar
RTF
EndNote XML
Bosnia and Herzegovina and Terrorism 1996-2011: Defining the Threat, Devising Counterterrorism Strategy
Azinovic, Vlado
.
"
Bosnia and Herzegovina and Terrorism 1996-2011: Defining the Threat, Devising Counterterrorism Strategy
." In
The Dangerous Landscape
, 191-209., 2013.
Bosnia and Herzegovina and Terrorism 1996-2011
— Downloaded 6243 times
Read more
about Bosnia and Herzegovina and Terrorism 1996-2011: Defining the Threat, Devising Counterterrorism Strategy
15469 reads
Google Scholar
RTF
EndNote XML
Aspects of Recruitment by Terrorist Organizations in Europe’s Muslim Communities
Sarkisyan, Sergei
.
"
Aspects of Recruitment by Terrorist Organizations in Europe’s Muslim Communities
." In
The Dangerous Landscape
, 171-189., 2013.
Recruitment by Terrorist Organizations in Europe
— Downloaded 3619 times
Read more
about Aspects of Recruitment by Terrorist Organizations in Europe’s Muslim Communities
13965 reads
Google Scholar
RTF
EndNote XML
Understanding Homegrown Terrorism
Sick, Armin
.
"
Understanding Homegrown Terrorism
." In
The Dangerous Landscape
, 153-170., 2013.
Understanding Homegrown Terrorism
— Downloaded 5209 times
Read more
about Understanding Homegrown Terrorism
14007 reads
Google Scholar
RTF
EndNote XML
International Intelligence Cooperation against Terrorist Targets – Phase II
Busuncian, Tatiana
.
"
International Intelligence Cooperation against Terrorist Targets – Phase II
." In
The Dangerous Landscape
, 133-151., 2013.
International Intelligence Cooperation against Terrorist Targets
— Downloaded 3961 times
Read more
about International Intelligence Cooperation against Terrorist Targets – Phase II
16012 reads
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
26/08/2015
Closing the Call on National Case Studies in Organizing Cybersecurity
10/04/2015
CfP on Education & Training for Cybersecurity and Resilience
26/03/2015
CfP on Crisis Management Policies, Organisation and Capabilities
15/08/2014
EvoCS project webiste launched
31/07/2014
Call for Papers on Heart Failure and Stress Response
25/03/2015
Standing Call for Papers for the Biomedical Data Journal
07/04/2015
Call for Papers on Brain Disorders announced
31/03/2015
Call for Papers on High Throughput Drug Screening
07/01/2015
The Winter 2014 issue of Connections now online
03/04/2015
Call for Papers on Evolving Concepts of Security
view all