Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Hammond, Thomas H.
.
"
Why is the Intelligence Community So Difficult to Redesign? Smart Practices, Conflicting Goals, and the Creation of Purpose-Based Organizations
."
Governance: An International Journal of Policy, Administration, and Institutions
20, no. 3 (2007): 421.
Interim Report on the Evaluation of National Anti-Terrorist Arrangements
. Council of the EU, 2004.
Nohrstedt, Daniel
, and
Dan Hansén
.
"
Converging Under Pressure? Counterterrorism Policy Developments in the European Union Member States
."
Public Administration
88, no. 1 (2010): 190-210.
The European Union Counter-Terrorism Strategy
. Council of the EU, 2005.
Council Conclusions on Counter-terrorism
In
Press Release
. Council of the EU, 2015.
Doig, Alan
.
"
Joining Up a Response to Terrorism
."
Crime, Law & Social Change
44 (2005): 436.
Hoffman, Bruce
.
"
Rethinking Terrorism and Counterterrorism Since 9/11
."
Studies in Conflict & Terrorism
25, no. 5 (2002): 314.
Gunaratna, Rohan
, and
Peter Chalk
.
Counter-Terrorism
. Coulsdon: Jane’s Information Group, 2002.
Pillar, Paul R.
.
"
Intelligence
." In
Attacking Terrorism: Elements of a Grand Strategy
, 115-39. Washington, D.C.: Georgetown University Press, 2004.
Cutterbuck, Lindsay
.
"
Law Enforcement
." In
Attacking Terrorism: Elements of a Grand Strategy
, 140-61. Washington, D.C.: Georgetown University Press, 2004.
Sheehan, Michael
.
"
Diplomacy
." In
Attacking Terrorism: Elements of a Grand Strategy
, 97-114. Washington, D.C.: Georgetown University Press, 2004.
Hoyt, Timothy D.
.
"
Military Force
." In
Attacking Terrorism: Elements of a Grand Strategy
, 162-85. Washington, D.C.: Georgetown University Press, 2004.
"
Terrorism, Homeland Security and the National Emergency Management Network
."
Public Organization Review
3, no. 4 (2003): 373-85.
Bunker, Robert
.
"
Introduction and Overview: Why Response Networks?
" In
Networks, Terrorism and Global Insurgency
, 1-7. London: Routledge, 2005.
Sullivan, John P.
.
Networked All-Source Fusion for Intelligence and Law Enforcement Counter-terrorism Response
In
paper presented at the ISA Annual Convention in Montreal, Canada
., 2004.
Sullivan, John P.
, and
Robert Bunker
.
"
Multilateral Counter-Insurgency Networks
." In
Networks, Terrorism and Global Insurgency
, 184. London: Routledge, 2005.
Cronin, Audrey Kurth
.
"
Conclusion: Toward an Effective Grand Strategy
." In
Attacking Terrorism: Elements of a Grand Strategy
, 293. Washington, D.C.: Georgetown University Press, 2004.
Hoffman, Bruce
.
"
A Counterterrorism Strategy for the Obama Administration
."
Terrorism and Political Violence
21 (2009): 369-70.
Kramer, Roderick M.
.
"
A Failure to Communicate: 9/11 and the Tragedy of the Informational Commons
."
International Public Management Journal
8, no. 3 (2005): 408-9.
Prezelj, Iztok
.
"
Role of the European Union in the Fight against International Terrorism
." In
The Fight Against Terrorism and Crisis Management in the Western Balkans
, 16-34. Amsterdam: IOS Press, 2008.
Prezelj, Iztok
.
"
Improving Interorganisational Cooperation in Counterterrorism Based on a Quantitative SWOT Assessment
."
Public Management Review
17, no. 1-2 (2015): 209-35.
Dunn, Myriam
, and
Isabelle Wiegert
.
International CIIP Handbook 2006: An Inventory of 20 National and 6 International Critical Information Infrastructure Protection Policies
In
Volume 1
. Zurich: ETH – Swiss Federal Institute of Technology, 2006.
Council Directive on the Identification and Designation of European Critical infrastructures and the Assessment of the Need to Improve their Protection
. Council of the EU, 2008.
Le Grand, Gwendal
,
Franck Springinsfeld
, and
Michel Riguidel
.
Policy Based Management for Critical Infrastructure Protection
In
ACIP Project funded by the European Commission
., 2010.
Di Mauro, Carmelo
,
Sara Bouchon
,
Christiaan Logtmeijer
,
Russell Pride
,
Thomas Hartung
, and
Jean-Pierre Nordvik
.
"
A Structured Approach to Identifying European Critical Infrastructures
."
International Journal of Critical Infrastructures
6, no. 3 (2010).
Pages
« първа
‹ предишна
…
131
132
133
134
135
136
137
138
139
…
следваща ›
последна »
461081 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance