Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 16 results:
RTF
EndNote XML
Filters:
Keyword
is
Terrorism
[Clear All Filters]
2021
Vilím, Lukáš
.
"
Social Media – Hate Speech – Hate Crime
."
Connections: The Quarterly Journal
20, no. 2 (2021): 57-73.
DOI
Google Scholar
RTF
EndNote XML
2018
Babin, Ivan A.
,
Anton Chablin
,
Aleksei Kazantsev
,
Mohammed A. Khesham
,
Yuri V. Vasiliyev
, and
Frederic Labarre
.
"
Countering Radicalism in the North Caucasus
."
Connections: The Quarterly Journal
17, no. 2 (2018): 61-76.
DOI
Google Scholar
RTF
EndNote XML
Howcroft, James
.
"
The Future of Terrorism: The Practitioners’ View
."
Connections: The Quarterly Journal
17, no. 2 (2018): 77-81.
DOI
Google Scholar
RTF
EndNote XML
Deliso, Chris
.
"
Security Risks Relating to the Migrant Crisis and Interagency Cooperation: The Case of Macedonia and Bulgaria
."
Information & Security: An International Journal
39, no. 1 (2018): 21-27.
DOI
Google Scholar
RTF
EndNote XML
2017
Crone, Manni
.
"
Islamic State’s Incursion into North Africa and Sahel: A Threat to al-Qaeda?
"
Connections: The Quarterly Journal
16, no. 1 (2017): 63-76.
DOI
Google Scholar
RTF
EndNote XML
von Münchow, Sebastian
, and
Lena Hantschke
.
"
Parliamentary Attempts to Investigate Berlin’s Vehicular Ramming Attack
."
Connections: The Quarterly Journal
16, no. 2 (2017): 25-39.
DOI
Google Scholar
RTF
EndNote XML
Gürer, Cüneyt
.
"
Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism
."
Connections: The Quarterly Journal
16, no. 2 (2017): 41-57.
DOI
Google Scholar
RTF
EndNote XML
2016
Hussain, Nazia
, and
Louise Shelley
.
"
Karachi: Organized Crime in a Key Megacity
."
Connections: The Quarterly Journal
15, no. 3 (2016): 5-15.
DOI
Google Scholar
RTF
EndNote XML
Mullins, Sam
, and
James K. Wither
.
"
Terrorism and Organized Crime
."
Connections: The Quarterly Journal
15, no. 3 (2016): 65-82.
DOI
Google Scholar
RTF
EndNote XML
Rusumanov, Vase
.
"
The Use of the Internet by Terrorist Organizations
."
Information & Security: An International Journal
34, no. 2 (2016): 137-150.
DOI
Google Scholar
RTF
EndNote XML
2015
Bonfanti, Matteo E.
, and
Francesca Capone
.
"
Fostering a Comprehensive Security Approach: An Exploratory Case Study of CBRN Crisis Management Frameworks in Eleven European Countries
."
Information & Security: An International Journal
33, no. 1 (2015): 55-80.
DOI
Google Scholar
RTF
EndNote XML
Todorova, Antonia
.
"
Turkish Security Discourses and Policies: The Kurdish Question
."
Information & Security: An International Journal
33, no. 2 (2015): 108-121.
DOI
Google Scholar
RTF
EndNote XML
2008
Gruszczak, Artur
.
"
Networked Security Governance: Reflections on the E.U.’s Counterterrorism Approach
."
Journal of Global Change and Governance
I, no. 3 (2008).
Google Scholar
RTF
EndNote XML
Le Beau, John J.
.
"
The Renaissance of Insurgency and Counter-Insurgency:Examining Twenty-First Century Insurgencies and Government Responses
."
Connections: The Quarterly Journal
7, no. 1 (2008): 154-166.
DOI
Google Scholar
RTF
EndNote XML
2006
Conway, Maura
.
"
Terrorist ‘Use’ of the Internet and Fighting Back
."
Information & Security: An International Journal
19 (2006): 9-30.
DOI
Google Scholar
RTF
EndNote XML
2005
Ratchev, Valeri
.
"
The Growing Threat: Homeland Security Issues of Bulgaria
."
Information & Security: An International Journal
17 (2005): 61-74.
DOI
Google Scholar
RTF
EndNote XML
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance