Motivations, Mechanisms and Determinants of Terrorist Technology Transfer |
|
Gary Ackerman, Rebecca (Becca) Earnhardt |
Research Brief |
Chemical and Biological Threats, Radiological and Nuclear Threats |
Global |
Guilty as Perceived: How Opinions About States Influence Opinions About NGOs |
|
Thomas Guarrieri |
Journal Article |
Resilience |
|
Partner Selection in Disaster Relief: Partnership Formation in the Presence of Incompatible Agencies |
|
Jun Zhuang |
Journal Article |
Resilience |
North America |
Advancing Understanding of Tornado Warnings, False Alarms, and Complacency |
|
Brooke Liu, Holly Roberts, Michael Egnoto |
Research Brief |
Risk Communication |
North America |
A Study of Selected Ethnic Affiliations in the Development of Post-traumatic Stress Disorder and Other Psychopathology After a Terrorist Bombing in Nairobi, Kenya |
|
Betty Pfefferbaum |
Journal Article |
Terrorism and Society, Resilience |
Sub-Saharan Africa |
The Role of Communication in Healthcare Systems and Community Resilience |
|
Brooke Liu, Elizabet Petrun Sayers, Holly Roberts, Michael Egnoto |
Journal Article |
Resilience, Risk Communication |
North America |
Terrorism Research: Current Issues and Debates |
|
Margaret Wilson |
Book Chapter |
Terrorism and Society |
|
Can taking down websites really stop terrorists and hate groups? |
|
Joshua Freilich, Steven Chermak |
Discussion Point |
Terrorism and Society |
North America |
What Are the Social, Economic, Psychological and Environmental Risk Factors That Lead to Radicalization and Recruitment to Terrorism? |
|
David Weisburd |
Report |
Radical Beliefs and Behavior |
Global |
Political Fragmentation and Alliances among Armed Non-state Actors in North and Western Africa (1997–2014) |
|
Christian Leuprecht |
Journal Article |
Violent Groups and Movements |
Middle East and North Africa |
Profiles of Radicalization in the United States |
|
Gary LaFree, Michael Jensen, Aaron Safer-Lichtenstein, Patrick James |
Research Brief |
Radical Beliefs and Behavior |
|
De-constituting al-Qa’ida: CCO theory and the decline and dissolution of hidden organizations |
|
Hamilton Bean |
Journal Article |
|
|
Profiling the CB Adversary: Motivation, Psychology and Decision |
|
Cory Davenport, Gary Ackerman, Herbert Tinsley, Markus Binder, Rebecca (Becca) Earnhardt, Tara Kirk Sell |
Research Brief |
Chemical and Biological Threats |
Global |
Lethal Combinations: Studying the Structure of Terrorist Networks |
|
R. Karl Rethemeyer, Victor Asal |
Book Chapter |
Violent Groups and Movements |
|
Do 90 Percent of Terrorist Groups Last Less Than a Year? Updating the Conventional Wisdom |
|
Brian Phillips |
Journal Article |
Violent Groups and Movements |
Global |
Application of a Profile Similarity Methodology for Identifying Terrorist Groups That Use or Pursue CBRN Weapons |
|
Gary Ackerman, H. Brinton Milward, R. Karl Rethemeyer, Ronald Breiger, Victor Asal |
Book Chapter |
Violent Groups and Movements, Chemical and Biological Threats, Radiological and Nuclear Threats |
|
Transnational Jihadism & Civil Wars |
|
Martha Crenshaw |
Journal Article |
Terrorism and Society |
Middle East and North Africa |
N-stage Security Screening Strategies in the Face of Strategic Applicants |
|
Jun Zhuang |
Journal Article |
Terrorism and Society |
North America |
How communication theory can help counter-terrorism stakeholders |
|
Hamilton Bean |
Journal Article |
|
|
An Explicit Consideration of Unintended Consequences from Counterterrorism Policy: The Case of Radical Eco-Groups |
|
Aaron Safer-Lichtenstein |
Journal Article |
Counterterrorism |
North America |
Examining the Role of Social Media in Effective Crisis Management: The Effects of Crisis Origin, Information Form, and Source on Publics' Crisis Responses |
|
Brooke Liu, Yan Jin |
Journal Article |
|
|
Security Screening Queues with Impatient Applicants: A New Model with A Case Study |
|
Jun Zhuang |
Journal Article |
Counterterrorism |
|
U.S. Muslims with Radical Opinions Feel More Alienated and Depressed |
|
Clark McCauley, Sophia Moskalenko |
START Reports |
Terrorism and Society, Radical Beliefs and Behavior |
North America |
Illegal Roaming and File Manipulation on Target Computers: Assessing the Effect of Sanction Threats on System Trespassers’ Online Behaviors |
|
David Maimon |
Journal Article |
Crime and Terrorism |
Global |
Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision-Theoretic Approach |
|
Jun Zhuang |
Journal Article |
Crime and Terrorism |
North America |