An Assessment of Jamāʻat Ahl as-Sunnah lid-daʻwa wal-Jihād (Boko Haram): Strengths, Vulnerabilities and Policy Options |
Amy Pate |
-
|
Anti-Terrorism Assistance Programs |
William Braniff |
-
|
Assessing Success and Failure in Terrorism and Counterterrorism: Development of Metrics on the Global War on Terror and the Global Jihad |
Rashmi Singh |
-
|
Assessing the Effectiveness of Current De-Radicalization Initiatives and Identifying Implications for the Development of U.S.-Based Initiatives in Multiple Settings |
|
-
|
Bargaining on and off the Battlefield: The Bargaining Model of War and Negotiations with the Afghan Taliban |
Barnett S. Koven |
-
|
Border Crossings and Terrorist Attacks in the United States: Lessons for Protecting Against Dangerous Entrants |
Brent Smith, Erin Miller, Gary LaFree, Kathleen Smarick |
-
|
Bridging Religious Communities and Technology Providers to Counter Narratives of Violent Extremism |
Alejandro Beutel, Peter Weinberger |
-
|
Cargo Aviation Insider Threat Assessment Tool (CAITAT) |
Thomas Guarrieri |
-
|
Community-oriented Policing and Community Engagement in Benin |
Barnett S. Koven |
-
|
Countering Terrorism in the United States |
Erica Chenoweth, Laura Dugan |
-
|
Counterterrorism Net Assessment Data Structure (CT NEADS) |
Barnett S. Koven |
-
|
Dealing with the Devil: When Bargaining with Terrorists Works |
Erica Chenoweth, Laura Dugan |
-
|
Developing a Typology of Terrorism Involvement: A Basis for Sentencing, Management, Risk Reduction, Release & Monitoring of Terrorist Offenders |
|
-
|
Developing Academic Partnerships and Collaborative Research on Countering Violent Extremism in Malaysia and Southeast Asia |
Amy Pate, Barnett S. Koven, William Braniff |
-
|
Divergent Dimensions of Radicalization Risk: Migration and Violent Extremism in Sabah |
Barnett S. Koven, Samuel D. Henkin |
-
|
Dynamics of Terror and Counterterrorism |
Gary LaFree, Laura Dugan |
-
|
Effectiveness of Counterterrorism Strategies |
Martha Crenshaw |
-
|
Factors Impacting the U.S. Intelligence Process |
David L. Carter, Jeremy G. Carter, Steven Chermak |
-
|
Global Nuclear Detection Architecture: A Study of South Asia |
Sharad Joshi |
-
|
Influencing Violent Extremist Organizations in South Asia |
Amy Pate, Gary Ackerman |
-
|
Influencing Violent Extremist Organizations: Empirical Assessment Project |
Gary Ackerman, John Sawyer |
-
|
Integration of International Architecture Analysis |
Brandon Behlendorf, Emily Iarocci, Gary Ackerman, John Sawyer |
-
|
Massive Online Open Course: Understanding Terrorism and the Terrorist Threat |
Gary LaFree, William Braniff, Katherine Worboys Izsak |
-
|
Measuring Intervention Success in Terrorist Activities |
Brent Smith |
-
|
Measuring Up: Aligning SOF and Interagency CT Efforts Across the Tactical, Operational and Strategic Levels |
Barnett S. Koven |
-
|
Mental Models of Intelligence Collectors and Analysts for Characterizing Adversarial Threats |
|
-
|
Modeling Risk of Future Terrorist Attacks |
Gary LaFree, Laura Dugan |
-
|
Opportunities for Public-Private Partnership in Countering Online Extremism and Recruitment |
Brandon Behlendorf |
-
|
Police Responses to Terrorism: Lessons from the Israeli Experience |
David Weisburd |
-
|
PRND Capability Development Framework Mapping |
John Sawyer, Marcus A. Boyd |
-
|
Program to Prepare Communities for Complex Coordinated Terrorist Attacks |
Erin Miller |
-
|
Punishing Terrorism: Examining the Multiple Stages of Federal Punishment Across Political Contexts |
Brian Johnson |
-
|
Resources and Resilience: A Computational Model of Strategic Influence |
|
-
|
Social Identity and Perceptions of Counterterrorism |
Demis Glasford |
-
|
State Response and Terrorist Activity |
Clark McCauley |
-
|
The Effects of Terrorism on Police Organization, Police Effectiveness in Crime Fighting and Public Expectations of and Attitudes toward the Police: A Multi-method Study of the Israeli Experience |
David Weisburd |
-
|
The Impact of Israeli Counterterrorism Interventions on Rate and Intensity of Terrorist Activity: Hazard Modeling and Time Series Approaches |
Arie Kruglanski |
-
|
The Terrorism and Extremist Violence in the United States (TEVUS) Database |
Gary LaFree, Brent Smith, Joshua Freilich, Steven Chermak, Erin Miller, William Braniff, Kathleen Smarick |
-
|
Threat and Hazard Identification and Risk Assessment (THIRA) Process |
John Sawyer, Steve S. Sin, Ph.D. |
-
|
Two to Tango: Government and Terrorist Group Actions in Colombia |
Barnett S. Koven |
-
|
U.S. Attitudes toward Terrorism and Counterterrorism |
Gary LaFree |
-
|
Using Experimental Research to Study the Dynamics of Radicalization, Terrorism, and Counterterrorism |
Anthony Lemieux |
-
|
Using Global Terrorism Data to Model Counterterrorism Policies in Sri Lanka |
Gary LaFree, Sue-Ming Yang |
-
|
Violent Non-state Actors and Contested Space Operations |
Amy Pate, Barnett S. Koven |
-
|
Weapons Availability and Civil War Onset |
Barnett S. Koven |
-
|