Explosive Detection Technology Adoption: Findings from a General Population Survey
|
|
Brooke Liu, Irina A. Iles, Michael Egnoto
|
Research Brief
|
Risk Communication
|
North America
|
Motivations, Mechanisms and Determinants of Terrorist Technology Transfer
|
|
Gary Ackerman, Rebecca (Becca) Earnhardt
|
Research Brief
|
Chemical and Biological Threats, Radiological and Nuclear Threats
|
Global
|
Guilty as Perceived: How Opinions About States Influence Opinions About NGOs
|
|
Thomas Guarrieri
|
Journal Article
|
Resilience
|
|
How communication theory can help counter-terrorism stakeholders
|
|
Hamilton Bean
|
Journal Article
|
|
|
Do 90 Percent of Terrorist Groups Last Less Than a Year? Updating the Conventional Wisdom
|
|
Brian Phillips
|
Journal Article
|
Violent Groups and Movements
|
Global
|
What Are the Social, Economic, Psychological and Environmental Risk Factors That Lead to Radicalization and Recruitment to Terrorism?
|
|
David Weisburd
|
Report
|
Radical Beliefs and Behavior
|
Global
|
Advancing Understanding of Tornado Warnings, False Alarms, and Complacency
|
|
Brooke Liu, Holly Roberts, Michael Egnoto
|
Research Brief
|
Risk Communication
|
North America
|
The Role of Communication in Healthcare Systems and Community Resilience
|
|
Brooke Liu, Elizabet Petrun Sayers, Holly Roberts, Michael Egnoto
|
Journal Article
|
Resilience, Risk Communication
|
North America
|
Political Fragmentation and Alliances among Armed Non-state Actors in North and Western Africa (1997–2014)
|
|
Christian Leuprecht
|
Journal Article
|
Violent Groups and Movements
|
Middle East and North Africa
|
Profiling the CB Adversary: Motivation, Psychology and Decision
|
|
Cory Davenport, Gary Ackerman, Herbert Tinsley, Markus Binder, Rebecca (Becca) Earnhardt, Tara Kirk Sell
|
Research Brief
|
Chemical and Biological Threats
|
Global
|
Terrorism Research: Current Issues and Debates
|
|
Margaret Wilson
|
Book Chapter
|
Terrorism and Society
|
|
A Study of Selected Ethnic Affiliations in the Development of Post-traumatic Stress Disorder and Other Psychopathology After a Terrorist Bombing in Nairobi, Kenya
|
|
Betty Pfefferbaum
|
Journal Article
|
Terrorism and Society, Resilience
|
Sub-Saharan Africa
|
Lethal Combinations: Studying the Structure of Terrorist Networks
|
|
R. Karl Rethemeyer, Victor Asal
|
Book Chapter
|
Violent Groups and Movements
|
|
Application of a Profile Similarity Methodology for Identifying Terrorist Groups That Use or Pursue CBRN Weapons
|
|
Gary Ackerman, H. Brinton Milward, R. Karl Rethemeyer, Ronald Breiger, Victor Asal
|
Book Chapter
|
Violent Groups and Movements, Chemical and Biological Threats, Radiological and Nuclear Threats
|
|
Transnational Jihadism & Civil Wars
|
|
Martha Crenshaw
|
Journal Article
|
Terrorism and Society
|
Middle East and North Africa
|
Can taking down websites really stop terrorists and hate groups?
|
|
Joshua Freilich, Steven Chermak
|
Discussion Point
|
Terrorism and Society
|
North America
|
De-constituting al-Qa’ida: CCO theory and the decline and dissolution of hidden organizations
|
|
Hamilton Bean
|
Journal Article
|
|
|
Profiles of Radicalization in the United States
|
|
Gary LaFree, Michael Jensen, Aaron Safer-Lichtenstein, Patrick James
|
Research Brief
|
Radical Beliefs and Behavior
|
|
Partner Selection in Disaster Relief: Partnership Formation in the Presence of Incompatible Agencies
|
|
Jun Zhuang
|
Journal Article
|
Resilience
|
North America
|
N-stage Security Screening Strategies in the Face of Strategic Applicants
|
|
Jun Zhuang
|
Journal Article
|
Terrorism and Society
|
North America
|
Overview: Terrorism in 2016
|
|
Erin Miller
|
Background Report
|
Terrorism and Society
|
Global
|
Examining the Role of Social Media in Effective Crisis Management: The Effects of Crisis Origin, Information Form, and Source on Publics' Crisis Responses
|
|
Brooke Liu, Yan Jin
|
Journal Article
|
|
|
Illegal Roaming and File Manipulation on Target Computers: Assessing the Effect of Sanction Threats on System Trespassers’ Online Behaviors
|
|
David Maimon
|
Journal Article
|
Crime and Terrorism
|
Global
|
Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision-Theoretic Approach
|
|
Jun Zhuang
|
Journal Article
|
Crime and Terrorism
|
North America
|
Willingness to Click: Risk Information Seeking during Imminent Threats
|
|
Jeannette Sutton
|
Journal Article
|
Risk Communication
|
North America
|