Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Scahill, Jeremy
, and
Ryan Devereaux
.
Watch Commander: Barack Obama's Secret Terrorist-Tracking System, by the Numbers
. Vol. 2015. The Intercept, 2014.
Euro-Mediterranean Code of Conduct on Countering Terrorism
In
Final Text
., 2015.
"
Euromed Summit Ends with Anti-Terror ‘Code’
."
Deutsche Welle
(2005).
Euro-Med Adopts Anti-Terror Code
., 2005.
Jackson, Richard
,
Marie Been Smyth
, and
Jeroen Gunning
.
Critical Terrorism Studies: A New Research Agenda
. London: Routledge, 2009.
Wilkinson, Paul
.
Political Terrorism (1974)
. London: Macmillan, 1974.
Wilkinson, Paul
.
"
Pathways out of Terrorism for Democratic Societies
." In
Contemporary Research on Terrorism
, 453. Aberdeen: Aberdeen University Press, 1987.
Hoffman, Bruce
.
Inside Terrorism (Revised and expanded edition)
. New York: Colombia University Press, 2006.
English, Richard
.
Terrorism: How to Respond
. Oxford: Oxford University Press, 2009.
Feyyaz, Muhammad
.
"
Conceptualizing Terrorism Trend Patterns in Pakistan – an Empirical Perspective
."
Perspectives on Terrorism
7, no. 1 (2013): 96.
Schmid, Alex P.
.
Political Terrorism. A Research Guide to Concepts, Theories, Data Bases and Literature
. Amsterdam: North-Holland, 1984.
Schmid, Alex P.
, and
Albert J. Jongman
.
Political Terrorism. A New Guide to Actors, Authors, Concepts, Data Bases, Theories and Literature
. Amsterdam: North Holland, 1988.
Raffie, Dina Al
.
"
Social Identity Theory for Investigating Islamic Extremism in the Diaspora
."
Journal of Strategic Security
6, no. 4 (2013): 67-91.
Johnson, Phillip W.
, and
Theodore B. Feldmann
.
"
Personality types and terrorism: Self-psychology perspectives
."
Forensic Reports
5, no. 4 (1992): 293-303.
Post, Jerrold M.
.
"
Terrorist Psycho-logic: Terrorist Behavior as a Product of Psychological Forces
." In
Origins of Terrorism: Psychologies, Ideologies, Theologies, States of Mind
, 25-40. Cambridge, England: Cambridge University Press, 1990.
Hewitt, Christopher
.
Understanding Terrorism in America: From the Klan to Al Qaeda
. New York: Routledge, 2003.
Post, Jerrold
.
"
When Hatred is Bred in the Bone: Psycho-cultural Foundations of Contemporary Terrorism
."
Political Psychology
26, no. 4 (2005): 616.
"
Isis Advertises 10 Jobs in the ‘Caliphate’ Including Press Officers, Bomb Makers and Teachers
."
The Independent
(2015).
Rubenstein-Dunlop, Sean
.
Khaled Sharrouf: The Australian radical fighting for Islamic State in Iraq and Syria
. ABC News, 2014.
Sageman, Marc
.
Leaderless Jihad: Terror Networks in the Twenty-First Century
. Philadelphia: University of Pennsylvania Press, 2008.
Berko, Anat
, and
Edna Erez
.
"
Martyrs or Murderers? Victims or Victimizers? The Voices of Would-Be Palestinian Female Suicide Bombers
." In
Female Terrorism and Militancy: Agency, Utility, and Organization
, 146-66 . Abingdon, Oxon: Routledge, 2008.
Speckhard, Anne
, and
Khapta Akhmedova
.
"
Black Widows and Beyond: Understanding the Motivations and Life Trajectories of Chechen Female Terrorists
." In
Female Terrorism and Militancy: Agency, Utility, and Organization
, 100-21. Abingdon, Oxon: Routledge, 2008.
How the Islamic State Uses Women to Control Women
. Syria: Direct, 2015.
Zenn, Jacob
.
"
Boko Haram: Recruitment, Financing, and Arms Trafficking in the Lake Chad Region
."
CTC Sentinel
7, no. 10 (2014): 6.
Reuter, Christopher
.
My Life is a Weapon: A Modern History of Suicide Bombing
. New Jersey: Princeton University Press, 2006.
Pages
« първа
‹ предишна
…
140
141
142
143
144
145
146
147
148
…
следваща ›
последна »
461112 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance