Biblio
Export 21402 results:
Talking to Terrorists: How to End Armed Conflicts. London: The Bodley Head, 2014.
TAM-VS: A Technology Acceptance Model for Video Surveillance." In Privacy Technologies and Policy, Lecture Notes in Computer Science, 86-100. Vol. 8450. Cham: Springer, 2014.
" Terror and Economy." IPAD/İktisat Politikası Araştırmaları Dergisi 1, no. 1 (2014): 67-79.
"Terror.com – IS’s Social Media Warfare in Syria and Iraq." Contemporary Conflicts 2, no. 2 (2014): 1-8.
"Terrorism and Cyber Attacks as Hybrid Threats: Defining a Comprehensive Approach for Countering 21st Century Threats to Global Peace and Security." The Journal of Terorism and Security Analysis (2014): 26-36.
"Terrorist Financing and the Islamic State In Testimony submitted to the House Committee on Financial Services. Washington Institute, 2014.
Thinking About Strategic Hybrid Threats – In Theory and in Practice." PRISM 4, no. 1 (2014): 47-63.
"The Threat to Shoot Someone in the Forehead Is Not Illegal?" Novaya Gazeta (2014).
"Threats to International Peace and Security Caused by Terrorist Acts In S/RES/2178 (2014). UN Security Council, 2014.
Three traits of the Islamic State’s information warfare." The RUSI Journal 159, no. 6 (2014): 4-11.
"Tibilov: My mission will be accomplished if South Ossetia unites with Russia. Information Agency Regnum, 2014.
Ties that Bind. The Foreign Policy Group, 2014.
Title: European Union Representation at the United Nations : Towards More Coherence after the Treaty of Lisbon. Vol. Doctor. Universiteit Leiden, 2014.
To Settle the Ukraine Crisis, Start at the End." Washington Post (2014).
"Too Blind to See the Threat We Pose to Russia." European Union Foreign Affairs Journal 3 (2014): 50.
"Tools of Destabilization. Russian Soft Power and Non-Military Influence in the Baltic States. Stockholm: FOI, 2014.
Top 10 Trends of 2014." In Outlook on the Global Agenda 2014., 2014.
"Toward a New Offset Strategy: Exploiting U.S. Long-Term Advantages to Restore U.S. Global Power Projection Capability. Center for Strategic and Budgetary Assessments, 2014.
Toward Effective National Cyber Security Strategy: The Path That Macedonia Must Consider." In Cyber Security and Resiliency Policy Framework, 57-64. IOS Press, 2014.
"Toward the Great Ocean – 2, or Russia’s Breakthrough to Asia In Analytical report. Valdai Discussion Club, 2014.
Towards A New Model for Information Warfare." Journal of Media and Information Warfare 5 (2014): 29-52.
"Towards an Education Campaign for Fostering a Societal Cyber Security Culture In Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA)., 2014.