Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Terrorism
Terrorism
Examining ISIS Online Recruitment through Relational Development Theory
Ponder, Sarah
, and
Jonathan Matusit
.
"
Examining ISIS Online Recruitment through Relational Development Theory
."
Connections: The Quarterly Journal
16, no. 4 (2017): 35-50.
ISIS online recruitment
— Downloaded 6711 times
Read more
about Examining ISIS Online Recruitment through Relational Development Theory
19642 reads
Google Scholar
DOI
RTF
EndNote XML
Guerrilla Operations in Western Sahara: The Polisario versus Morocco and Mauritania
Besenyő, János
.
"
Guerrilla Operations in Western Sahara: The Polisario versus Morocco and Mauritania
."
Connections: The Quarterly Journal
16, no. 3 (2017): 23-45.
Guerrilla operations in Western Sahara
— Downloaded 5916 times
Guerrilla operations in Western Sahara -- EPUB
— Downloaded 5185 times
Guerrilla operations in Western Sahara -- for Kindle
— Downloaded 5469 times
Read more
about Guerrilla Operations in Western Sahara: The Polisario versus Morocco and Mauritania
38751 reads
Google Scholar
DOI
RTF
EndNote XML
Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism
Gürer, Cüneyt
.
"
Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism
."
Connections: The Quarterly Journal
16, no. 2 (2017): 41-57.
Spillover of ISIS terrorism
— Downloaded 5557 times
Read more
about Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism
29596 reads
Google Scholar
DOI
RTF
EndNote XML
Parliamentary Attempts to Investigate Berlin’s Vehicular Ramming Attack
von Münchow, Sebastian
, and
Lena Hantschke
.
"
Parliamentary Attempts to Investigate Berlin’s Vehicular Ramming Attack
."
Connections: The Quarterly Journal
16, no. 2 (2017): 25-39.
Parliamentary Attempts to Investigate Berlin’s Vehicular Ramming Attack
— Downloaded 6246 times
Read more
about Parliamentary Attempts to Investigate Berlin’s Vehicular Ramming Attack
28075 reads
Google Scholar
DOI
RTF
EndNote XML
The Death of bin Laden, and the Future of Al-Qaeda
Le Beau, John J.
.
"
The Death of bin Laden, and the Future of Al-Qaeda
." In
The Dangerous Landscape
, 221-222., 2013.
The Death of bin Laden, and the Future of Al-Qaeda
— Downloaded 3599 times
Read more
about The Death of bin Laden, and the Future of Al-Qaeda
16632 reads
Google Scholar
RTF
EndNote XML
International Terrorism and International Tourism
Schmid, Alex P.
.
"
International Terrorism and International Tourism
." In
The Dangerous Landscape
, 211-219., 2013.
International Terrorism and International Tourism
— Downloaded 3512 times
Read more
about International Terrorism and International Tourism
15343 reads
Google Scholar
RTF
EndNote XML
Bosnia and Herzegovina and Terrorism 1996-2011: Defining the Threat, Devising Counterterrorism Strategy
Azinovic, Vlado
.
"
Bosnia and Herzegovina and Terrorism 1996-2011: Defining the Threat, Devising Counterterrorism Strategy
." In
The Dangerous Landscape
, 191-209., 2013.
Bosnia and Herzegovina and Terrorism 1996-2011
— Downloaded 6102 times
Read more
about Bosnia and Herzegovina and Terrorism 1996-2011: Defining the Threat, Devising Counterterrorism Strategy
15285 reads
Google Scholar
RTF
EndNote XML
Aspects of Recruitment by Terrorist Organizations in Europe’s Muslim Communities
Sarkisyan, Sergei
.
"
Aspects of Recruitment by Terrorist Organizations in Europe’s Muslim Communities
." In
The Dangerous Landscape
, 171-189., 2013.
Recruitment by Terrorist Organizations in Europe
— Downloaded 3510 times
Read more
about Aspects of Recruitment by Terrorist Organizations in Europe’s Muslim Communities
13807 reads
Google Scholar
RTF
EndNote XML
Understanding Homegrown Terrorism
Sick, Armin
.
"
Understanding Homegrown Terrorism
." In
The Dangerous Landscape
, 153-170., 2013.
Understanding Homegrown Terrorism
— Downloaded 5114 times
Read more
about Understanding Homegrown Terrorism
13843 reads
Google Scholar
RTF
EndNote XML
International Intelligence Cooperation against Terrorist Targets – Phase II
Busuncian, Tatiana
.
"
International Intelligence Cooperation against Terrorist Targets – Phase II
." In
The Dangerous Landscape
, 133-151., 2013.
International Intelligence Cooperation against Terrorist Targets
— Downloaded 3861 times
Read more
about International Intelligence Cooperation against Terrorist Targets – Phase II
15827 reads
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance