Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Terrorism
Terrorism
Examining ISIS Online Recruitment through Relational Development Theory
Ponder, Sarah
, and
Jonathan Matusit
.
"
Examining ISIS Online Recruitment through Relational Development Theory
."
Connections: The Quarterly Journal
16, no. 4 (2017): 35-50.
ISIS online recruitment
— Downloaded 6742 times
Read more
about Examining ISIS Online Recruitment through Relational Development Theory
19675 reads
Google Scholar
DOI
RTF
EndNote XML
Guerrilla Operations in Western Sahara: The Polisario versus Morocco and Mauritania
Besenyő, János
.
"
Guerrilla Operations in Western Sahara: The Polisario versus Morocco and Mauritania
."
Connections: The Quarterly Journal
16, no. 3 (2017): 23-45.
Guerrilla operations in Western Sahara
— Downloaded 5931 times
Guerrilla operations in Western Sahara -- EPUB
— Downloaded 5230 times
Guerrilla operations in Western Sahara -- for Kindle
— Downloaded 5512 times
Read more
about Guerrilla Operations in Western Sahara: The Polisario versus Morocco and Mauritania
38854 reads
Google Scholar
DOI
RTF
EndNote XML
Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism
Gürer, Cüneyt
.
"
Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism
."
Connections: The Quarterly Journal
16, no. 2 (2017): 41-57.
Spillover of ISIS terrorism
— Downloaded 5566 times
Read more
about Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism
29616 reads
Google Scholar
DOI
RTF
EndNote XML
Parliamentary Attempts to Investigate Berlin’s Vehicular Ramming Attack
von Münchow, Sebastian
, and
Lena Hantschke
.
"
Parliamentary Attempts to Investigate Berlin’s Vehicular Ramming Attack
."
Connections: The Quarterly Journal
16, no. 2 (2017): 25-39.
Parliamentary Attempts to Investigate Berlin’s Vehicular Ramming Attack
— Downloaded 6260 times
Read more
about Parliamentary Attempts to Investigate Berlin’s Vehicular Ramming Attack
28092 reads
Google Scholar
DOI
RTF
EndNote XML
The Death of bin Laden, and the Future of Al-Qaeda
Le Beau, John J.
.
"
The Death of bin Laden, and the Future of Al-Qaeda
." In
The Dangerous Landscape
, 221-222., 2013.
The Death of bin Laden, and the Future of Al-Qaeda
— Downloaded 3600 times
Read more
about The Death of bin Laden, and the Future of Al-Qaeda
16667 reads
Google Scholar
RTF
EndNote XML
International Terrorism and International Tourism
Schmid, Alex P.
.
"
International Terrorism and International Tourism
." In
The Dangerous Landscape
, 211-219., 2013.
International Terrorism and International Tourism
— Downloaded 3517 times
Read more
about International Terrorism and International Tourism
15390 reads
Google Scholar
RTF
EndNote XML
Bosnia and Herzegovina and Terrorism 1996-2011: Defining the Threat, Devising Counterterrorism Strategy
Azinovic, Vlado
.
"
Bosnia and Herzegovina and Terrorism 1996-2011: Defining the Threat, Devising Counterterrorism Strategy
." In
The Dangerous Landscape
, 191-209., 2013.
Bosnia and Herzegovina and Terrorism 1996-2011
— Downloaded 6108 times
Read more
about Bosnia and Herzegovina and Terrorism 1996-2011: Defining the Threat, Devising Counterterrorism Strategy
15309 reads
Google Scholar
RTF
EndNote XML
Aspects of Recruitment by Terrorist Organizations in Europe’s Muslim Communities
Sarkisyan, Sergei
.
"
Aspects of Recruitment by Terrorist Organizations in Europe’s Muslim Communities
." In
The Dangerous Landscape
, 171-189., 2013.
Recruitment by Terrorist Organizations in Europe
— Downloaded 3513 times
Read more
about Aspects of Recruitment by Terrorist Organizations in Europe’s Muslim Communities
13831 reads
Google Scholar
RTF
EndNote XML
Understanding Homegrown Terrorism
Sick, Armin
.
"
Understanding Homegrown Terrorism
." In
The Dangerous Landscape
, 153-170., 2013.
Understanding Homegrown Terrorism
— Downloaded 5120 times
Read more
about Understanding Homegrown Terrorism
13863 reads
Google Scholar
RTF
EndNote XML
International Intelligence Cooperation against Terrorist Targets – Phase II
Busuncian, Tatiana
.
"
International Intelligence Cooperation against Terrorist Targets – Phase II
." In
The Dangerous Landscape
, 133-151., 2013.
International Intelligence Cooperation against Terrorist Targets
— Downloaded 3867 times
Read more
about International Intelligence Cooperation against Terrorist Targets – Phase II
15863 reads
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance