Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
You are here
Home
»
Terrorism
Terrorism
Examining ISIS Online Recruitment through Relational Development Theory
Ponder, Sarah
, and
Jonathan Matusit
.
"
Examining ISIS Online Recruitment through Relational Development Theory
."
Connections: The Quarterly Journal
16, no. 4 (2017): 35-50.
ISIS online recruitment
— Downloaded 6077 times
Read more
about Examining ISIS Online Recruitment through Relational Development Theory
18215 reads
Google Scholar
DOI
RTF
EndNote XML
Guerrilla Operations in Western Sahara: The Polisario versus Morocco and Mauritania
Besenyő, János
.
"
Guerrilla Operations in Western Sahara: The Polisario versus Morocco and Mauritania
."
Connections: The Quarterly Journal
16, no. 3 (2017): 23-45.
Guerrilla operations in Western Sahara
— Downloaded 5194 times
Guerrilla operations in Western Sahara -- EPUB
— Downloaded 4849 times
Guerrilla operations in Western Sahara -- for Kindle
— Downloaded 5168 times
Read more
about Guerrilla Operations in Western Sahara: The Polisario versus Morocco and Mauritania
34974 reads
Google Scholar
DOI
RTF
EndNote XML
Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism
Gürer, Cüneyt
.
"
Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism
."
Connections: The Quarterly Journal
16, no. 2 (2017): 41-57.
Spillover of ISIS terrorism
— Downloaded 5144 times
Read more
about Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism
28091 reads
Google Scholar
DOI
RTF
EndNote XML
Parliamentary Attempts to Investigate Berlin’s Vehicular Ramming Attack
von Münchow, Sebastian
, and
Lena Hantschke
.
"
Parliamentary Attempts to Investigate Berlin’s Vehicular Ramming Attack
."
Connections: The Quarterly Journal
16, no. 2 (2017): 25-39.
Parliamentary Attempts to Investigate Berlin’s Vehicular Ramming Attack
— Downloaded 5827 times
Read more
about Parliamentary Attempts to Investigate Berlin’s Vehicular Ramming Attack
26534 reads
Google Scholar
DOI
RTF
EndNote XML
The Death of bin Laden, and the Future of Al-Qaeda
Le Beau, John J.
.
"
The Death of bin Laden, and the Future of Al-Qaeda
." In
The Dangerous Landscape
, 221-222., 2013.
The Death of bin Laden, and the Future of Al-Qaeda
— Downloaded 3293 times
Read more
about The Death of bin Laden, and the Future of Al-Qaeda
14719 reads
Google Scholar
RTF
EndNote XML
International Terrorism and International Tourism
Schmid, Alex P.
.
"
International Terrorism and International Tourism
." In
The Dangerous Landscape
, 211-219., 2013.
International Terrorism and International Tourism
— Downloaded 3250 times
Read more
about International Terrorism and International Tourism
14353 reads
Google Scholar
RTF
EndNote XML
Bosnia and Herzegovina and Terrorism 1996-2011: Defining the Threat, Devising Counterterrorism Strategy
Azinovic, Vlado
.
"
Bosnia and Herzegovina and Terrorism 1996-2011: Defining the Threat, Devising Counterterrorism Strategy
." In
The Dangerous Landscape
, 191-209., 2013.
Bosnia and Herzegovina and Terrorism 1996-2011
— Downloaded 5595 times
Read more
about Bosnia and Herzegovina and Terrorism 1996-2011: Defining the Threat, Devising Counterterrorism Strategy
14250 reads
Google Scholar
RTF
EndNote XML
Aspects of Recruitment by Terrorist Organizations in Europe’s Muslim Communities
Sarkisyan, Sergei
.
"
Aspects of Recruitment by Terrorist Organizations in Europe’s Muslim Communities
." In
The Dangerous Landscape
, 171-189., 2013.
Recruitment by Terrorist Organizations in Europe
— Downloaded 3211 times
Read more
about Aspects of Recruitment by Terrorist Organizations in Europe’s Muslim Communities
12953 reads
Google Scholar
RTF
EndNote XML
Understanding Homegrown Terrorism
Sick, Armin
.
"
Understanding Homegrown Terrorism
." In
The Dangerous Landscape
, 153-170., 2013.
Understanding Homegrown Terrorism
— Downloaded 4700 times
Read more
about Understanding Homegrown Terrorism
12964 reads
Google Scholar
RTF
EndNote XML
International Intelligence Cooperation against Terrorist Targets – Phase II
Busuncian, Tatiana
.
"
International Intelligence Cooperation against Terrorist Targets – Phase II
." In
The Dangerous Landscape
, 133-151., 2013.
International Intelligence Cooperation against Terrorist Targets
— Downloaded 3494 times
Read more
about International Intelligence Cooperation against Terrorist Targets – Phase II
14683 reads
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance