Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Terrorism
Terrorism
Examining ISIS Online Recruitment through Relational Development Theory
Ponder, Sarah
, and
Jonathan Matusit
.
"
Examining ISIS Online Recruitment through Relational Development Theory
."
Connections: The Quarterly Journal
16, no. 4 (2017): 35-50.
ISIS online recruitment
— Downloaded 6279 times
Read more
about Examining ISIS Online Recruitment through Relational Development Theory
18630 reads
Google Scholar
DOI
RTF
EndNote XML
Guerrilla Operations in Western Sahara: The Polisario versus Morocco and Mauritania
Besenyő, János
.
"
Guerrilla Operations in Western Sahara: The Polisario versus Morocco and Mauritania
."
Connections: The Quarterly Journal
16, no. 3 (2017): 23-45.
Guerrilla operations in Western Sahara
— Downloaded 5429 times
Guerrilla operations in Western Sahara -- EPUB
— Downloaded 4952 times
Guerrilla operations in Western Sahara -- for Kindle
— Downloaded 5246 times
Read more
about Guerrilla Operations in Western Sahara: The Polisario versus Morocco and Mauritania
35804 reads
Google Scholar
DOI
RTF
EndNote XML
Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism
Gürer, Cüneyt
.
"
Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism
."
Connections: The Quarterly Journal
16, no. 2 (2017): 41-57.
Spillover of ISIS terrorism
— Downloaded 5293 times
Read more
about Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism
28439 reads
Google Scholar
DOI
RTF
EndNote XML
Parliamentary Attempts to Investigate Berlin’s Vehicular Ramming Attack
von Münchow, Sebastian
, and
Lena Hantschke
.
"
Parliamentary Attempts to Investigate Berlin’s Vehicular Ramming Attack
."
Connections: The Quarterly Journal
16, no. 2 (2017): 25-39.
Parliamentary Attempts to Investigate Berlin’s Vehicular Ramming Attack
— Downloaded 5956 times
Read more
about Parliamentary Attempts to Investigate Berlin’s Vehicular Ramming Attack
26945 reads
Google Scholar
DOI
RTF
EndNote XML
The Death of bin Laden, and the Future of Al-Qaeda
Le Beau, John J.
.
"
The Death of bin Laden, and the Future of Al-Qaeda
." In
The Dangerous Landscape
, 221-222., 2013.
The Death of bin Laden, and the Future of Al-Qaeda
— Downloaded 3389 times
Read more
about The Death of bin Laden, and the Future of Al-Qaeda
15057 reads
Google Scholar
RTF
EndNote XML
International Terrorism and International Tourism
Schmid, Alex P.
.
"
International Terrorism and International Tourism
." In
The Dangerous Landscape
, 211-219., 2013.
International Terrorism and International Tourism
— Downloaded 3320 times
Read more
about International Terrorism and International Tourism
14590 reads
Google Scholar
RTF
EndNote XML
Bosnia and Herzegovina and Terrorism 1996-2011: Defining the Threat, Devising Counterterrorism Strategy
Azinovic, Vlado
.
"
Bosnia and Herzegovina and Terrorism 1996-2011: Defining the Threat, Devising Counterterrorism Strategy
." In
The Dangerous Landscape
, 191-209., 2013.
Bosnia and Herzegovina and Terrorism 1996-2011
— Downloaded 5776 times
Read more
about Bosnia and Herzegovina and Terrorism 1996-2011: Defining the Threat, Devising Counterterrorism Strategy
14512 reads
Google Scholar
RTF
EndNote XML
Aspects of Recruitment by Terrorist Organizations in Europe’s Muslim Communities
Sarkisyan, Sergei
.
"
Aspects of Recruitment by Terrorist Organizations in Europe’s Muslim Communities
." In
The Dangerous Landscape
, 171-189., 2013.
Recruitment by Terrorist Organizations in Europe
— Downloaded 3350 times
Read more
about Aspects of Recruitment by Terrorist Organizations in Europe’s Muslim Communities
13172 reads
Google Scholar
RTF
EndNote XML
Understanding Homegrown Terrorism
Sick, Armin
.
"
Understanding Homegrown Terrorism
." In
The Dangerous Landscape
, 153-170., 2013.
Understanding Homegrown Terrorism
— Downloaded 4839 times
Read more
about Understanding Homegrown Terrorism
13234 reads
Google Scholar
RTF
EndNote XML
International Intelligence Cooperation against Terrorist Targets – Phase II
Busuncian, Tatiana
.
"
International Intelligence Cooperation against Terrorist Targets – Phase II
." In
The Dangerous Landscape
, 133-151., 2013.
International Intelligence Cooperation against Terrorist Targets
— Downloaded 3601 times
Read more
about International Intelligence Cooperation against Terrorist Targets – Phase II
14974 reads
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance