Biblio

Export 21377 results:
2014
Powell, Jonathan. Talking to Terrorists: How to End Armed Conflicts. London: The Bodley Head, 2014.
Krempel, Erik, and Jürgen Beyerer. "TAM-VS: A Technology Acceptance Model for Video Surveillance." In Privacy Technologies and Policy, Lecture Notes in Computer Science, 86-100. Vol. 8450. Cham: Springer, 2014.
Zimmerman, Carson. Ten Strategies of a World-Class Cybersecurity Operations Center. MITRE, 2014.
Çağlar, Ü. "Terror and Economy." IPAD/İktisat Politikası Araştırmaları Dergisi 1, no. 1 (2014): 67-79.
Nissen, Thomas Elkjer. "Terror.com – IS’s Social Media Warfare in Syria and Iraq." Contemporary Conflicts 2, no. 2 (2014): 1-8.
Bachmann, Sascha-Dominik, and Hakan Gunneriusson. "Terrorism and Cyber Attacks as Hybrid Threats: Defining a Comprehensive Approach for Countering 21st Century Threats to Global Peace and Security." The Journal of Terorism and Security Analysis (2014): 26-36.
Levitt, Matthew. Terrorist Financing and the Islamic State In Testimony submitted to the House Committee on Financial Services. Washington Institute, 2014.
Cilluffo, Frank J., and Joseph R. Clark. "Thinking About Strategic Hybrid Threats – In Theory and in Practice." PRISM 4, no. 1 (2014): 47-63.
Milashina, Elena. "The Threat to Shoot Someone in the Forehead Is Not Illegal?" Novaya Gazeta (2014).
Threats to International Peace and Security Caused by Terrorist Acts In S/RES/2178 (2014). UN Security Council, 2014.
Ingram, Haroro J.. "Three traits of the Islamic State’s information warfare." The RUSI Journal 159, no. 6 (2014): 4-11.
Tibilov: My mission will be accomplished if South Ossetia unites with Russia. Information Agency Regnum, 2014.
Adams, Gordon. Ties that Bind. The Foreign Policy Group, 2014.
Jin, Xi. Title: European Union Representation at the United Nations : Towards More Coherence after the Treaty of Lisbon. Vol. Doctor. Universiteit Leiden, 2014.
Kissinger, Henry A.. "To Settle the Ukraine Crisis, Start at the End." Washington Post (2014).
Bock, Andreas M.. "Too Blind to See the Threat We Pose to Russia." European Union Foreign Affairs Journal 3 (2014): 50.
Winnerstig, Mike. Tools of Destabilization. Russian Soft Power and Non-Military Influence in the Baltic States. Stockholm: FOI, 2014.
Forum, World Economic. "Top 10 Trends of 2014." In Outlook on the Global Agenda 2014., 2014.
Top 15 Most Popular Social Networking Sites., 2014.
Martinage, Robert. Toward a New Offset Strategy: Exploiting U.S. Long-Term Advantages to Restore U.S. Global Power Projection Capability. Center for Strategic and Budgetary Assessments, 2014.
Hadji-Janev, Metodi. "Toward Effective National Cyber Security Strategy: The Path That Macedonia Must Consider." In Cyber Security and Resiliency Policy Framework, 57-64. IOS Press, 2014.
Toward the Great Ocean – 2, or Russia’s Breakthrough to Asia In Analytical report. Valdai Discussion Club, 2014.
Alazmi, Abdulrahman R.. "Towards A New Model for Information Warfare." Journal of Media and Information Warfare 5 (2014): 29-52.
Reid, Reyne, and Johan Van Niekerk. Towards an Education Campaign for Fostering a Societal Cyber Security Culture In Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA)., 2014.
Von Solms, Sune, and Roussouw Von Solms. Towards Cyber Safety Education in Primary Schools in Africa. HAISA, 2014.

Pages