Countermeasures against Extremism and Terrorism Database: Data Status and Final Findings |
September 2012 |
Liu, Brooke; Kennedy, Jonathan |
START Reports |
Effects and Effectiveness of Law Enforcement Intelligence Measures to counter homegrown terrorism: a case study on the FALN |
July 2012 |
Belli, Roberta |
START Reports |
Public-Private Partnerships to Counter Violent Extremism: Field Principles for Action |
July 2016 |
Beutel, Alejandro; Weinberger, Peter |
START Reports |
Patterns of Intervention in Federal Terrorism Cases |
August 2011 |
Smith, Brent; Damphousse, Kelly |
START Reports |
U.S. Attitudes toward Terrorism and Counterterrorism |
March 2013 |
Adamczyk, Amy; LaFree, Gary; Tourangeau, Roger; Presser, Stanley |
START Reports |
An Analysis of Violent Nonstate Actor Organizational Lethality and Network Co-Evoluation in the Middle East and North Africa |
February 2016 |
Young, Joseph; Rethemeyer, R. Karl; Asal, Victor |
START Reports |
Innovative Algorithm and Database Development Relevant to Counterterrorism and Homeland Security Efforts at START |
August 2014 |
Misra, Prabhakar |
START Reports |
Development and Optimization of Machine Learning Algorithms and Models of Relevance to START Databases |
April 2016 |
Misra, Prabhakar |
START Reports |
START Symposium 2015: Counterterrorism Panel |
October 2015 |
|
Presentation |
Development & Optimization of Machine Learning Algorithms & Models of Relevance to Large Databases & Homeland Security Counterterrorism Efforts at START |
November 2016 |
Misra, Prabhakar |
Presentation |
START Annual Meeting 2016: Quick-Fire Presentation - Counterterrorism, Countering Violent Extremism, Deradicalization |
October 2016 |
Kruglanski, Arie; McCauley, Clark; Ellis, Devin; Dugan, Laura; Boyd, Marcus A.; Wilson, Margaret; Jensen, Michael; Asal, Victor |
Presentation |
What is the State of Islamic Extremism: Key Trends, Challenges and Implications for U.S. Policy |
February 2015 |
Braniff, William |
Congressional Testimony |
Massive Online Open Course: Understanding Terrorism and the Terrorist Threat |
January 2014 |
LaFree, Gary; Braniff, William |
Project Fact Sheet |
Counterterrorism Net Assessment Data Structure |
April 2020 |
Koven, Barnett S.; Lindquist, Katy; Erdemandi, Max |
Project Fact Sheet |
Discussion Point: The Benefits and Drawbacks of Methodological Advancements in Data Collection and Coding: Insights from the Global Terrorism Database (GTD) |
November 2013 |
Jensen, Michael |
Discussion Point |
Recasting and Repositioning CVE as a Grand Strategic Response to Terrorism |
November 2017 |
Braniff, William |
Discussion Point |
Six reasons why stopping terrorism is so challenging |
May 2017 |
LaFree, Gary |
Discussion Point |
How Public Health Can Improve Initiatives to Counter Violent Extremism |
April 2016 |
Weine, Stevan |
Discussion Point |
ISIL in Libya: A Bayesian Approach to Mapping At-Risk Regions |
March 2016 |
|
Discussion Point |
It's not Big Data, but Little Data, that Prevents Terrorist Attacks |
July 2013 |
Dahl, Erik |
Discussion Point |
The Paris Fidayin Attacks: Eight Years in the Making? |
October 2015 |
Tinsley, Herbert |
Discussion Point |
Thinking Beyond Deterrence |
April 2013 |
Dugan, Laura |
Discussion Point |
Counterterrorism Strategies and Democracy: Lessons for the US from the (Unfortunate) Example of Turkey |
May 2013 |
Satana, Nil |
Discussion Point |
100 Days Later: COVID-19: Implications for Managing Terrorism and Asymmetric Threats |
May 2020 |
Braniff, William |
Discussion Point |
Modelling Terrorist Technology Transfer |
April 2019 |
Ackerman, Gary; Earnhardt, Rebecca (Becca) |
White Paper |
Protecting the Homeland from International and Domestic Terrorism Threats: Current Multi-Disciplinary Perspectives on Root Causes, the Role of Ideology, and Programs for Counter-radicalization and Disengagement |
January 2010 |
Lemieux, Anthony; McCauley, Clark; McLeod, Douglas M.; Legault, Richard; Flanigan, Shawn; Moskalenko, Sophia; Asal, Victor |
White Paper |
Probabilistic Pathway Projection to Counter Foreign Fighters |
April 2016 |
Boyd, Marcus A. |
Research Brief |
Demystifying Gray Zone Conflict: A Typology of Conflict Dyads and Instruments of Power in Colombia, 2002-present |
December 2016 |
Koven, Barnett S. |
Research Brief |
Research Highlight: U.S. Attitudes toward Terrorism and Counterterrorism Before and After the April 2013 Boston Marathon Bombings |
October 2013 |
Adamczyk, Amy; LaFree, Gary; Tourangeau, Roger; Presser, Stanley |
Research Brief |
Research Highlight: U.S. Attitudes toward Terrorism and Counterterrorism |
March 2013 |
Adamczyk, Amy; LaFree, Gary; Tourangeau, Roger; Presser, Stanley |
Research Brief |
U.S. Attitudes toward Terrorism and Counterterrorism: Reporting Terrorism-related Activity |
April 2014 |
Adamczyk, Amy; LaFree, Gary; Tourangeau, Roger; Presser, Stanley |
Research Brief |
Insurgency BAAD: Dynamics of Terrorism and Counterterrorism Campaigns |
October 2015 |
Young, Joseph; Rethemeyer, R. Karl; Asal, Victor |
Research Brief |
Understanding Community Responses to Authority/Law Enforcement Minority-Outreach Intergroup Communication Frames |
July 2016 |
Glasford, Demis |
Research Brief |
Support for the Caliphate and Radical Mobilization |
January 2008 |
McLeod, Douglas M. |
Research Brief |
Efficacy of Counterterrorism Approaches: Examining Northern Ireland |
October 2006 |
LaFree, Gary; Dugan, Laura |
Research Brief |
In the Eye of the Storm: An Update: Managing Terrorism and Asymmetric Threats during Covid-19 |
October 2020 |
Braniff, William |
Report |
Report on the National Summit on Empowering Communities to Prevent Violent Extremism |
July 2015 |
Weine, Stevan; Braniff, William |
Report |
A Practical Taxonomy for Online Terrorist Content |
July 2021 |
Braniff, William |
Report |
Taxonomy Expansion and the Global Terrorism Database: Effectively Leveraging Academic Data Collection Initiatives |
July 2021 |
Miller, Erin |
Report |
Dynamic Dimensions of Radicalization and Violent Extremism in Sabah, Malaysia |
December 2021 |
Henkin, Samuel D. |
Report |
Divergent Dimensions of Radicalization Risk: Migration and Violent Extremism in Sabah |
December 2021 |
|
Report |
Repressive Efforts are Consistently Counterproductive in Reducing al-Qaeda-Inspired Violence Against Canadians |
August 2015 |
Chenoweth, Erica; Dugan, Laura |
Report |
Re-Evaluating Special Operations Forces-Led Counterterrorism Efforts |
March 2020 |
Koven, Barnett S. |
Report |
Don't Follow the Money: The Problem with the War on Terrorist Financing |
July 2017 |
Neumann, Peter |
Journal Article |
Hurdles to International Terrorist Alliances: Lessons from Al Qaeda's Experience |
February 2015 |
Bacon, Tricia |
Journal Article |
Definitions Favorable to Terrorism? SSSL and Radicalization: A Case Study Approach |
February 2019 |
James, Patrick |
Journal Article |
Policing Terrorism |
July 2012 |
LaFree, Gary |
Journal Article |
Disparity Between Fusion Center Web Content and Self-Reported Activity |
September 2016 |
Carter, Jeremy |
Journal Article |
The Last Good Chance: A Reassessment of U.S. Operations at Tora Bora |
October 2008 |
Krause, Peter |
Journal Article |
Know Thy Enemy: Education About Terrorism Improves Social Attitudes Toward Terrorists |
March 2017 |
Krause, Peter |
Journal Article |
Disaggregating and Defeating Terrorist Safe Havens |
December 2014 |
Bacon, Tricia |
Journal Article |
A Mixed Method Examination of Law Enforcement Investigatory Strategies Used in Jihadi and Far-right Foiled Terrorist Plots Before and After 9/11 |
February 2019 |
Gruenewald, Jeff; Freilich, Joshua; Chermak, Steven |
Journal Article |
Cross-Milieu Terrorist Collaboration: Using Game Theory to Assess the Risk of a Novel Threat |
April 2016 |
Ackerman, Gary; Zhuang, Jun |
Journal Article |
Surveying American State Police Agencies About Terrorism Threats, Terrorism Sources, and Terrorism Definitions |
July 2009 |
Freilich, Joshua; Chermak, Steven |
Journal Article |
An Evaluation of Displacement and Diffusion Effects on Eco-Terrorist Activities After Police Interventions |
October 2017 |
Yang, Sue-Ming |
Journal Article |
Enemies with Benefits? Violent Rivalry and Terrorist Group Longevity |
January 2015 |
Phillips, Brian |
Journal Article |
Al-Qaeda's Propaganda Decoded: A Psycholinguistic System for Detecting Variations in Terrorism Ideology |
May 2016 |
Kruglanski, Arie; Gelfand, Michele |
Journal Article |
Options and Strategies for Countering Online Radicalization in the United States |
January 2013 |
Neumann, Peter |
Journal Article |
Terrorist Threats and Police Performance: A Study of Israeli Communities |
November 2009 |
Weisburd, David |
Journal Article |
The Role of Risk Preferences in a Multi-Target Defender-Attacker Resource Allocation Game |
August 2017 |
Zhuang, Jun |
Journal Article |
The Psychology of the War on Terror |
October 2008 |
Kruglanski, Arie; Crenshaw, Martha |
Journal Article |
NGO Interventions: Influences on Terrorist Activity |
August 2016 |
Hodwitz, Omi |
Journal Article |
Terrorist Group Cooperation and Longevity |
June 2014 |
Phillips, Brian |
Journal Article |
The Situated Contexts of American Terrorism: A Conjunctive Analysis of Case Configurations |
April 2019 |
Smith, Brent; Gruenewald, Jeff |
Journal Article |
The Canadian Way of Counterterrorism: Introducing the GATE-Canada Data Set |
May 2016 |
Chenoweth, Erica; Dugan, Laura |
Journal Article |
Counter‐terrorism Policies in the Middle East: Why Democracy Has Failed to Reduce Terrorism in the Middle East and Why Protecting Human Rights Might Be More Successful |
November 2020 |
LaFree, Gary |
Journal Article |
The Israeli Model for Policing Terrorism: Goals, Strategies, and Open Questions |
December 2009 |
Weisburd, David |
Journal Article |
Security Screening Queues with Impatient Applicants: A New Model with A Case Study |
August 2017 |
Zhuang, Jun |
Journal Article |
What Should This Fight Be Called? Metaphors of Counterterrorism and Their Implications |
December 2008 |
Kruglanski, Arie; Crenshaw, Martha |
Journal Article |
Western Muslims Volunteering to fight in Syria and Iraq: Why do they go, and what should we do? |
July 2015 |
McCauley, Clark; Moskalenko, Sophia |
Journal Article |
Risk-Mitigating Policies and Adversarial Behavior: Case of Backlash |
June 2016 |
Mohtadi, Hamid |
Journal Article |
Effective Interagency Coordination: Barriers and Opportunities |
June 2021 |
Koven, Barnett S.; Lindquist, Katy |
Journal Article |
Criminal Pasts, Terrorist Futures: European Jihadists and the New Crime-Terror Nexus |
December 2016 |
Neumann, Peter |
Journal Article |
Comparative Analysis of VNSA Complex Engineering Efforts |
March 2016 |
Ackerman, Gary |
Journal Article |
Understanding the ‘War on Terrorism’: Responses to 11 September 2001 |
January 2006 |
Wilson, Margaret |
Journal Article |
Build a Criminal Justice Policy for Terrorism |
November 2007 |
LaFree, Gary |
Journal Article |
Carrots, Sticks, and Insurgent Targeting of Civilians |
August 2018 |
Phillips, Brian; Young, Joseph; Rethemeyer, R. Karl; Asal, Victor |
Journal Article |
'Designing Danger': Complex Engineering by Violent Non-State Actors: Introduction to the Special Issue |
April 2016 |
Ackerman, Gary |
Journal Article |
The Impact of State Laws Protecting Abortion Clinics and Reproductive Rights on Crimes against Abortion Providers: Deterrence, Backlash, or Neither? |
December 2007 |
Freilich, Joshua |
Journal Article |
All Terrorism Is Local: Resources, Nested Institutions, and Governance for Urban Homeland Security in the American Federal System |
September 2010 |
Chenoweth, Erica |
Journal Article |
Toward a Model of Terrorist Behavior in Hostage-Taking Incidents |
August 2000 |
Wilson, Margaret |
Journal Article |
Internally Displaced Populations and Suicide Terrorism |
October 2014 |
Piazza, James A. |
Journal Article |
On the Value of Exposure and Secrecy of Defense System: First-Move Advantage vs. Robustness |
April 2015 |
Zhuang, Jun |
Journal Article |
Terrorism Risk and Optimal Policy Response: Theory and Empirics |
October 2019 |
Mohtadi, Hamid |
Journal Article |
Opportunity, Group Structure, Temporal Patterns, and Successful Outcomes of Far-Right Terrorism Incidents in the United States |
June 2016 |
Smith, Brent; Gruenewald, Jeff |
Journal Article |
Recent U.S. Thinking about Terrorism and Counterterrorism: Babysteps towards a Dynamic View of Asymmetric Conflict |
September 2010 |
McCauley, Clark; Moskalenko, Sophia |
Journal Article |
A genosonic analysis of ISIL and US counter-extremism video messages |
March 2017 |
Bean, Hamilton |
Journal Article |
Characteristics of Terrorism Hotspots |
August 2015 |
Piazza, James A. |
Journal Article |
Finding Bin Laden: Lessons for a New American Way of Intelligence |
June 2014 |
Dahl, Erik |
Journal Article |
Examining the Effect of Repressive and Conciliatory Government Actions on Terrorism Activity in Israel |
May 2015 |
Parkin, William |
Journal Article |
President Trump’s Travel Ban: Inciting or Deterring Terrorism? |
December 2019 |
Hodwitz, Omi |
Journal Article |
Winning the Battle but Losing the War? Narrative and Counter-Narratives Strategy |
August 2009 |
Leuprecht, Christian; McCauley, Clark; Moskalenko, Sophia |
Journal Article |
An Explicit Consideration of Unintended Consequences from Counterterrorism Policy: The Case of Radical Eco-Groups |
August 2017 |
Safer-Lichtenstein, Aaron |
Journal Article |
Physical Integrity Rights and Terrorism |
July 2010 |
Piazza, James A. |
Journal Article |
Terrorism Research: The Record |
July 2014 |
Crenshaw, Martha |
Journal Article |
Diffusing Controversial Technology: Barriers, Incentives, and Lessons Learned |
July 2015 |
Liu, Brooke; Petrun Sayers, Elizabeth; Ackerman, Gary; Roberts, Holly; Iles, Irina A. |
Journal Article |
Investigating the Applicability of Situational Crime Prevention to the Public Mass Violence Context |
December 2019 |
Freilich, Joshua; Chermak, Steven |
Journal Article |
How Companies and Governments React to Disasters |
July 2016 |
Zhuang, Jun |
Journal Article |
Social Psychological Approaches to Understanding and Preventing Terrorism: Toward an Interdisciplinary Perspective |
January 2006 |
Lemieux, Anthony |
Journal Article |
Criminology's Third War: Special Issue on Terrorism and Responses to Terrorism |
August 2009 |
LaFree, Gary |
Journal Article |
Why Inter-Agency Operations Break Down: U.S. Counterterrorism in Comparative Perspective |
July 2016 |
Foley, Frank |
Journal Article |
The Application of Social Bookmarking Technology to the National Intelligence Domain |
June 2006 |
Ackerman, Gary |
Journal Article |
Why Respecting Physical Integrity Rights Reduces Terrorism |
May 2010 |
Piazza, James A. |
Journal Article |
Homegrown Terrorism: South Korea's Next Challenge against Terrorism |
January 2009 |
Sin, Steve |
Journal Article |
Military Counterterrorism Measures, Civil-Military Relations and Democracy: The Cases of Turkey and the US |
September 2018 |
Satana, Nil |
Journal Article |
An Intervention Analysis of Fatal Far-right Extremist Violence within a Vector-autoregressive Framework |
December 2019 |
Gruenewald, Jeff; Freilich, Joshua; Chermak, Steven; Parkin, William |
Journal Article |
Introducing Terrorist Archetypes: Using Terrorist Objectives and Behavior to Predict New, Complex, and Changing Threats |
December 2016 |
Zhuang, Jun |
Journal Article |
Just Between Friends: Bilateral Cooperation and Bounded Sovereignty in the "Global War on Terror" |
October 2009 |
Biswas, Bidisha |
Journal Article |
Transnational Terror and Human Rights |
March 2009 |
Piazza, James A. |
Journal Article |
Local Approaches to Counterterrorism: The New York Police Department Model |
August 2014 |
Dahl, Erik |
Journal Article |
New Opportunities in Common Security and Defence Policy: Joining PESCO |
February 2020 |
Leuprecht, Christian |
Journal Article |
Do Targeted Killings Increase or Decrease Terrorism? Evaluating the Evidence and Other Considerations |
January 2017 |
Gruenewald, Jeff |
Journal Article |
The Impact of British Counterterrorist Strategies on Political Violence in Northern Ireland: Comparing Deterrence and Backlash Models |
February 2009 |
LaFree, Gary; Dugan, Laura |
Journal Article |
WMD Terrorism Research: Whereto From Here? |
March 2005 |
Ackerman, Gary |
Journal Article |
Draining the Swamp: Democracy Promotion, State Failure, and Terrorism in 19 Middle Eastern Countries |
April 2007 |
Piazza, James A. |
Journal Article |
Modeling Costly Learning and Counter-Learning in a Defender-Attacker Game with Private Defender Information |
September 2014 |
Zhuang, Jun |
Journal Article |
Government Policies for Counteracting Violent Extremism |
January 2019 |
LaFree, Gary; Freilich, Joshua |
Journal Article |
A Homeland Security Net Assessment Needed Now! |
October 2015 |
Dahl, Erik |
Journal Article |
Morality, Efficacy, and Targeted Assassination as a Policy Tool |
January 2017 |
Young, Joseph |
Journal Article |
The Expansion of Intelligence Agency Mandates: British Counterterrorism in Comparative Perspective |
October 2009 |
Foley, Frank |
Journal Article |
Situational Crime Prevention and Terrorism: An Assessment of 10 Years of Research |
October 2018 |
Gruenewald, Jeff; Freilich, Joshua |
Journal Article |
Intelligence-Led Policing As a Framework for Responding to Terrorism |
May 2007 |
Freilich, Joshua; Chermak, Steven |
Journal Article |
New Framework That Uses Patterns and Relations to Understand Terrorist Behaviors |
February 2017 |
Zhuang, Jun |
Journal Article |
Law Enforcement Training and the Domestic Far Right |
December 2009 |
Freilich, Joshua; Chermak, Steven |
Journal Article |
Thinking about the Law of Unintended Consequences |
October 2010 |
Singh, Rashmi |
Journal Article |
The Paradox of Source Credibility in Canadian and U.S. Domestic Counterterrorism Communications |
April 2018 |
Szmania, Susan |
Journal Article |
Target-Oriented Utility Theory for Modeling the Deterrent Effects of Counterterrorism |
November 2014 |
Bier, Vicki |
Journal Article |
Suspicious Preoperational Activities and Law Enforcement Interdiction of Terrorist Plots |
November 2018 |
Smith, Brent; Gruenewald, Jeff |
Journal Article |
Paradoxes of Professionalism: Rethinking Civil-Military Relations in the United States |
April 2020 |
Brooks, Risa |
Journal Article |
Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts |
March 2017 |
Zhuang, Jun |
Journal Article |
Modeling a Multi-target Attacker-defender Game with Multiple Attack Types |
May 2019 |
Zhuang, Jun |
Journal Article |
Counterterrorism Killings and Provisional IRA Bombings, 1970-1998 |
April 2016 |
Piazza, James A. |
Journal Article |
Reforming Counterterrorism: Institutions and Organizational Routines in Britain and France |
July 2009 |
Foley, Frank |
Journal Article |
The Effectiveness of Counterterrorism in Spain: A New Approach |
February 2010 |
Chenoweth, Erica |
Conference Paper |
Introducing Government Actions in Terror Environments (GATE) Dataset |
December 2015 |
Chenoweth, Erica; Dugan, Laura |
Conference Paper |
Counterterrorism in Retrospect: Chronicle of a War Foretold |
July 2005 |
Crenshaw, Martha |
Book Review |
Bruce Hoffman and Fernando Reinares (Eds.): The Evolution of the Global Terrorist Threat: From 9/11 to Osama bin Laden's Death |
September 2015 |
Moghadam, Assaf |
Book Review |
Creating a Data Archive to Facilitate Research on Understanding and Responding to Terrorism |
January 2007 |
Chermak, Steven |
Book Chapter |
Counter-Terrorism in the Post-9/11 Era: Successes, Failures and Lessons Learnt |
January 2016 |
Singh, Rashmi |
Book Chapter |
Cops and Spooks: The Role of Police in Counterterrorism |
November 2008 |
Weisburd, David |
Book Chapter |
Terrorism and State Repression: Strategic Choice and the Domestic Normative Context |
June 2018 |
Foley, Frank |
Book Chapter |
Counter-Terrorism in India: An Ad Hoc Response to an Enduring and Variable Threat |
January 2019 |
Singh, Rashmi |
Book Chapter |
Improving Strategic Assessment in the Executive Branch: Lessons from the Scholarly Literature |
June 2018 |
Brooks, Risa |
Book Chapter |
The Talking Cure? Communication and Psychological Impact in Prison De-radicalisation Programmes |
February 2014 |
Braddock, Kurt |
Book Chapter |
Strategic Uses of the Internet by Hizbut Tahrir-Indonesia |
May 2009 |
McLeod, Douglas M. |
Book Chapter |
The Psychology of Terrorist Hostage-Taking |
March 2003 |
Wilson, Margaret |
Book Chapter |
Deterring and Preventing Terrorism |
April 2018 |
Freilich, Joshua; Chermak, Steven |
Book Chapter |
Legal Restrictions and Challenges for Police and Law Enforcement Authorities |
August 2019 |
Hodwitz, Omi |
Book Chapter |
Terrorism |
January 2016 |
Dugan, Laura |
Book Chapter |
Research on Terrorism and Countering Terrorism |
November 2008 |
LaFree, Gary; Dugan, Laura |
Book Chapter |
Territorial Havens and the Risk of Complex Terrorist Attacks in the United States |
June 2018 |
Brooks, Risa |
Book Chapter |
Attacking Nuclear Facilities: Hype or Genuine Threat? |
January 2016 |
Ackerman, Gary |
Book Chapter |
War Versus Criminal Justice in Response to Terrorism: The Losing Logic of Torture |
January 2009 |
McCauley, Clark |
Book Chapter |
War Versus Justice in Response to Terrorist Attacks |
September 2006 |
McCauley, Clark |
Book Chapter |
A State, an Insurgency, and a Revolution: Understanding and Defeating the Three Faces of ISIS |
June 2018 |
Krause, Peter |
Book Chapter |
Strategic Communication and U.S. National Security Affairs: Critical-Cultural and Rhetorical Perspectives |
July 2017 |
Bean, Hamilton |
Book Chapter |
Financial Terror: Financial Crime Schemes Involving Extremists Linked to the American Far Right and al-Qaida and Affiliated Movements |
January 2017 |
Freilich, Joshua; Chermak, Steven |
Book Chapter |
Jujitsu Politics: Terrorism and Responses to Terrorism |
August 2006 |
McCauley, Clark |
Book Chapter |
Treatment Approaches for Terrorists and Extremists |
August 2018 |
Braddock, Kurt |
Book Chapter |
Prosecuting Terrorism Post-9/11: Impact of Policy Changes on Case Outcomes |
January 2017 |
Smith, Brent; Damphousse, Kelly |
Book Chapter |
Psychological Issues in Understanding Terrorism and the Response to Terrorism |
September 2006 |
McCauley, Clark |
Book Chapter |
The Politics of Collective Action: Security Collaboration for Combating Terrorism |
February 2009 |
Chenoweth, Erica |
Book Chapter |
Radical Right Cross-National Links and International Cooperation |
January 2018 |
Caiani, Manuela |
Book Chapter |
Computing in Compromised Environments: Beyond the Castle Model of Cyber-Security |
February 2016 |
Leuprecht, Christian |
Book Chapter |
Cigarette smuggling and terrorism financing |
November 2013 |
Freilich, Joshua; Chermak, Steven |
Book Chapter |
The Psychology of Terrorism |
January 2017 |
Kruglanski, Arie |
Book Chapter |
Tortured Logic: Why Some Americans Support the Use of Torture in Counterterrorism |
July 2020 |
Young, Joseph |
Book |
Countering Terrorism: No Simple Solutions |
January 2017 |
LaFree, Gary; Crenshaw, Martha |
Book |
The Consequences of Counterterrorism |
November 2009 |
Crenshaw, Martha |
Book |
Seriously Not All Right: Five Wars in Ten Years |
May 2014 |
Capps, Ron |
Book |
The Handbook of the Criminology of Terrorism |
November 2016 |
LaFree, Gary; Freilich, Joshua |
Book |
Intelligence and Surprise Attack: Failure and Success from Pearl Harbor to 9/11 and Beyond |
July 2013 |
Dahl, Erik |
Book |
The Oxford Handbook of Terrorism |
May 2019 |
Chenoweth, Erica |
Book |
Terrorism Studies: A Reader |
November 2010 |
Braddock, Kurt |
Book |
The Psychology of Extremism: A Motivational Perspective |
September 2021 |
Kruglanski, Arie |
Book |
Barriers to Special Operations Forces-Led Counterterrorism Effectiveness |
November 2021 |
Koven, Barnett S.; Lindquist, Katy |
Book |
Community-Focused Counter-Radicalization and Counter-Terrorism Projects |
November 2018 |
Szmania, Susan |
Book |
To Protect and to Serve: Policing in the Years of Terrorism |
November 2006 |
Weisburd, David |
Book |
Understanding Terrorism and Counter-Terrorism |
November 2017 |
Singh, Rashmi |
Book |
Policing Terrorism, Crime Control, and Police-Community Relations: Learning from the Israeli Experience |
July 2014 |
Weisburd, David |
Book |
Reducing Terrorism Through Situational Crime Prevention |
November 2009 |
Freilich, Joshua |
Book |
Hamas and Suicide Terrorism: Multi-causal and Multi-level Approaches |
January 2011 |
Singh, Rashmi |
Book |
Why Terrorist Groups Form International Alliances |
May 2018 |
Bacon, Tricia |
Book |
Countering Terrorism in Britain and France |
November 2012 |
Foley, Frank |
Book |