Why the United States is Targeted by Terrorism |
|
Martha Crenshaw |
Conference Paper |
Terrorism and Society, Violent Groups and Movements |
Global, North America |
Making the Wrong Connection: The Determinants of Terrorist Targeting of Airplanes and Airports |
|
Richard Legault, R. Karl Rethemeyer, Victor Asal |
Conference Paper |
Terrorism and Society |
|
The Effectiveness of Counterterrorism in Spain: A New Approach |
|
Erica Chenoweth |
Conference Paper |
Counterterrorism |
Western Europe |
The Debate over "New" vs. "Old" Terrorism |
|
Martha Crenshaw |
Conference Paper |
Terrorism and Society |
Global |
A First Look at Domestic and International Global Terrorism Events, 1970-1997 |
|
Gary LaFree, Laura Dugan |
Conference Paper |
Terrorism and Society |
Global |
Countering Nuclear and Radiological Materials Illicit Trafficking Through Maritime Security Initiatives: Paper Tiger or Concrete Solution? A Case Study |
|
Steve S. Sin, Ph.D. |
Conference Paper |
Radiological and Nuclear Threats |
Global |
Introducing Government Actions in Terror Environments (GATE) Dataset |
|
Erica Chenoweth, Laura Dugan |
Conference Paper |
Counterterrorism |
Global |
Powers and Problems of Integrating Social Media Data with Public Health and Safety |
|
Gary LaFree |
Conference Paper |
Individual Behavior |
Global |
Comparing Social Media and Traditional Surveys Around the Boston Marathon Bombing |
|
Gary LaFree |
Conference Paper |
Individual Behavior |
North America |
An Aggregation of Geo-coded Violent and Non-violent Conflict Events |
|
David E. Cunningham |
Conference Paper |
Violent Groups and Movements |
Middle East and North Africa |
Determining Extremist Organizations' Likelihood of Conducting Cyber Attacks |
|
Rhyner Washburn, Steve S. Sin, Ph.D. |
Conference Paper |
Terrorism and Society |
Global |
Data-Driven System Identification of the Social Network Dynamics in Online Postings of an Extremist Group |
|
Joshua Freilich, Steven Chermak |
Conference Paper |
Terrorism and Society |
Global |
Terse Message Amplification in the Boston Bombing Response |
|
Jeannette Sutton |
Conference Paper |
Risk Communication |
North America |
Stochastic Opponent Modeling Agents: A Case Study with Hezbollah |
|
Amy Pate, Jonathan Wilkenfeld, Mary Michael |
Conference Paper |
Terrorism and Society |
Middle East and North Africa |
Call to Action: Mobilizing Community Discussion to Improve Information-Sharing About Vulnerabilities in Industrial Control Systems and Critical Infrastructure |
|
Rhyner Washburn |
Conference Paper |
Risk Communication |
|
Facebook Use and Social Captial: To Bond, To Bridge, or to Escape |
|
Douglas M. McLeod |
Journal Article |
|
|
The Motivational Dynamics of Retrieval-Induced Forgetting: A Test of Cognitive Energetics Theory |
|
Arie Kruglanski |
Journal Article |
|
|
Gauging the Threat |
|
Gary Ackerman, Lauren Pinson |
Journal Article |
Chemical and Biological Threats, Radiological and Nuclear Threats |
Global |
The psychological structure of aggression across cultures |
|
Michele Gelfand |
Journal Article |
Terrorism and Society, Individual Behavior |
Global |
Policing Terrorism |
|
Gary LaFree |
Journal Article |
Counterterrorism |
Global |
Shame-Free Guilt Appeals: Testing the Emotional and Cognitive Effects of Shame and Guilt Appeals |
|
Monique Turner |
Journal Article |
|
|
Crisis managers but not conflict resolvers: Mediating ethnic intrastate conflict in Africa |
|
Jonathan Wilkenfeld, Victor Asal |
Journal Article |
Terrorism and Society, Violent Groups and Movements |
Sub-Saharan Africa |
Putting the “ O ” in VEOs: What makes an organization? |
|
Gina Scott Ligon, Peter Simi |
Journal Article |
Violent Groups and Movements, Radical Beliefs and Behavior |
Global |
Stereotypes as Valid Categories of Knowledge and Human Perceptions of Group Differences |
|
Clark McCauley |
Journal Article |
|
|
Distinguishing "Loner" Attacks from Other Domestic Extremist Violence |
|
Jeff Gruenewald, Joshua Freilich, Steven Chermak |
Journal Article |
Individual Behavior, Radical Beliefs and Behavior |
North America |