Cross-Milieu Terrorist Collaboration: Using Game Theory to Assess the Risk of a Novel Threat |
|
Gary Ackerman, Jun Zhuang |
Journal Article |
Counterterrorism |
Global |
Cross-National Patterns of Terrorism: Comparing Trajectories for Total, Attributed and Fatal Attacks, 1970-2006 |
|
Gary LaFree, Laura Dugan |
Journal Article |
Terrorism and Society |
Global |
Cry Wolf Effect? Evaluating the Impact of False Alarms on Public Responses to Tornado Alerts in the Southeastern United States |
|
Brooke Liu, Michael Egnoto |
Journal Article |
|
North America |
Cues to Catching Deception in Interviews: A Brief Overview |
|
Gary Ackerman |
START Reports |
Individual Behavior |
Global |
Cultivating Trust and Perceptions of Source Credibility in Online Counternarratives Intended to Reduce Support for Terrorism |
|
Kurt Braddock |
Journal Article |
Countering Violent Extremism, Radical Beliefs and Behavior |
Global |
Cultural Evolutionary Mismatches in Response to Collective Threat |
|
Michele Gelfand |
Journal Article |
Terrorism and Society, Crime and Terrorism |
Global |
Cumulative Disruptions: Interdependency and Commitment Escalation as Mechanisms of Illicit Network Failure |
|
Brandon Behlendorf |
Journal Article |
Violent Groups and Movements |
|
Current Evidence for Selecting Disaster Interventions for Children and Adolescents |
|
Betty Pfefferbaum |
Journal Article |
Resilience |
Global |
Cut from the Same Cloth? A Comparative Study of Domestic Extremists and Gang Members in the United States |
|
David C. Pyrooz, Gary LaFree, Patrick James, Scott H. Decker |
Journal Article |
Crime and Terrorism, Radical Beliefs and Behavior |
North America |
CVE Field Principles for Local Government Agencies |
|
Alejandro Beutel |
Discussion Point |
Countering Violent Extremism |
North America |
CVE: An Idea Whose Time Has Come |
|
William Braniff |
Discussion Point |
Countering Violent Extremism |
|
Cyber Threat posed by North Korea and China to South Korea and US Forces Korea |
|
Steve S. Sin, Ph.D. |
Journal Article |
Crime and Terrorism |
East Asia |
Cyber-Dependent Crimes: An Interdisciplinary Review |
|
David Maimon |
Journal Article |
Crime and Terrorism |
Global |
Cyber-Sophistication Assessment Methodology for Public-Facing Terrorist Web Sites |
|
Gina Scott Ligon |
Journal Article |
Violent Groups and Movements |
Global |
Data-Driven System Identification of the Social Network Dynamics in Online Postings of an Extremist Group |
|
Joshua Freilich, Steven Chermak |
Conference Paper |
Terrorism and Society |
Global |
Days of Rage: Introducing the NAVCO 3.0 Dataset |
|
Erica Chenoweth |
Journal Article |
Violent Groups and Movements |
Global |
De-constituting al-Qa’ida: CCO theory and the decline and dissolution of hidden organizations |
|
Hamilton Bean |
Journal Article |
|
|
Deadlier in the U.S.? On Lone Wolves, Terrorist Groups, and Attack Lethality |
|
Brian Phillips |
Journal Article |
Terrorism and Society, Individual Behavior |
Global |
Deadly Clerics: Blocked Ambition and the Paths to Jihad. By Richard A. Nielsen. |
|
Mohammed Hafez |
Book Review |
Radical Beliefs and Behavior |
Global |
Death in a Small Package: A Short History of Anthrax |
|
Susan Jones |
Book |
Chemical and Biological Threats |
Global |
Debates among Salafi Muslims about use of violence |
|
Alejandro Beutel, William Braniff |
START Reports |
Violent Groups and Movements, Countering Violent Extremism |
Global |
Decisions in disaster recovery operations |
|
Jun Zhuang |
Book Chapter |
Terrorism and Society, Risk Communication |
Global, North America |
Defender–Attacker Games with Asymmetric Player Utilities |
|
Jun Zhuang |
Journal Article |
Terrorism and Society |
|
Defensibility and Risk Management |
|
Vicki Bier |
Journal Article |
Resilience |
North America |
Defining and Understanding the Jihadi-Salafi Movement |
|
Emmanuel Karagiannis |
Journal Article |
Violent Groups and Movements |
|