Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Yu, Seong Hun
, and
Omar Sultan Haque
.
"
Vulnerabilities among Young Westerners Joining ISIS
."
The Brown University Child and Adolescent Behavior Letter
32, no. 2 (2016): 1-6.
McCabe, Thomas R.
.
"
A Strategy for the ISIS Foreign Fighter Threat
."
Orbis
60, no. 1 (2016): 140-153.
Bloom, Mia M.
.
"
In Defense of Honor: Women and Terrorist Recruitment on the Internet
."
Journal of Postcolonial Cultures and Societies
4, no. 1 (2013): 150-195.
Samuel, Thomas Koruth
.
"
The Lure of Youth into Terrorism
."
SEARCCT’s Selection of Articles
2 (2011): 107-119.
Wilner, Alex S.
, and
Claire-Jehanne Dubouloz
.
"
Homegrown Terrorism and Transforma¬tive Learning: An Interdisciplinary Approach to Understanding Radicalization
."
Global Change, Peace & Security
22, no. 1 (2010).
Coolsaet, Rik
.
What Drives Europeans to Syria, and to IS? Insights from the Belgian Case
. Brussels: Royal Institute for International Relations, 2015.
Zhang, Xu
, and
Lea Hellmueller
.
"
Transnational Media Coverage of the ISIS Threat: A Global Perspective?
"
International Journal of Communication
10 (2016): 766-785.
Zineddine, Mhamed
.
"
Search Engines Crawling Process Optimization: A Webserver Approach
."
Internet Research
26, no. 1 (2016): 311-331.
Wedeck, Harry E.
, and
Wade Baskin
.
Dictionary of Pagan Religions
. New York: Philosophical Library, 2015.
Hafeez, Mateen
.
"
Radicalized on Net Chat Room, Given Mosul Contact: ISIS Man
."
The Times of India
(2014): A1.
Cuomo, Scott A.
, and
Brian J. Donlon
.
"
Training a ‘Hybrid’ Warrior
."
Marine Corps Gazette
92, no. 2 (2008).
Killebrew, Robert
.
"
Good Advice: Hybrid Warfare Demands an Indirect Approach
."
Armed Forces Journal
(2008).
Stowell, Joshua
.
"
What is Hybrid Warfare?
"
Global Security Review
(2018).
Scharre, Paul
.
"
Spectrum of What?
"
Military Review
92, no. 6 (2012): 73-79.
Field Manual 3-0 “Operations”
. Washington, D.C.: Department of the Army, 2017.
Matusitz, Jonathan
.
Symbolism in Terrorism: Motivation, Communication, and Behavior
. Lanham, MD: Rowman & Littlefield, 2014.
Pederson, Joshua R.
, and
Rachel M. McLaren
.
"
Managing Information Following Hurtful Experiences: How Personal Network Members Negotiate Private Information
."
Journal of Social and Personal Relationships
33, no. 7 (2015): 961-983.
Mukhopadhay, Kishalaya
.
"
Queering the Narrative: Can the Subaltern Sex Speak?
"
Economic & Political Weekly
51, no. 2 (2016): 20-23.
Singer, Margaret
, and
Janja Lalich
.
Cults in Our Midst: The Hidden Menace in Our Everyday Lives
. San Francisco: Jossey-Bass, 1995.
Franz, Barbara
.
"
Popjihadism: Why Young European Muslims Are Joining the Islamic State
."
Mediterranean Quarterly
26, no. 2 (2015): 5-20.
Secara, Diana
.
"
The Role of Social Networks in the Work of Terrorist Groups. The Case of ISIS and Al-Qaeda
."
Research and Science Today
3 (2015): 77-83.
Nawaz, Maajid
.
"
The Education of “Jihadi John”
."
The New York Times
(2015): A1.
Group, International Crisis
.
The North Caucasus Insurgency & Syria: An Exported Jihad?
In
Europe Report
., 2016.
Culbertson, Alix
.
Thousands of Chechens Slipping Through Unmanned Border in Latest German Migrant Crisis
. Express, 2016.
Delcker, Janosch
.
Germany’s New Problem Border: Poland
. Politico, 2016.
Pages
« първа
‹ предишна
…
295
296
297
298
299
300
301
302
303
…
следваща ›
последна »
372872 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance