Academic literature on the topic 'Counter-terrorism'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Counter-terrorism.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Counter-terrorism"

1

Fulton, W. J. "Counter-Terrorism." Police Journal: Theory, Practice and Principles 64, no. 2 (1991): 153–66. http://dx.doi.org/10.1177/0032258x9106400208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Carey, Henry F. "Immigrants, Terrorism and Counter-Terrorism." Peace Review 14, no. 4 (2002): 395–402. http://dx.doi.org/10.1080/1040265022000039178.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Roberts, Adam. "Ethics, terrorism and counter‐terrorism." Terrorism and Political Violence 1, no. 1 (1989): 48–69. http://dx.doi.org/10.1080/09546558908427013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wirtz, J. J. "Counter-terrorism via Counter-proliferation." Terrorism and Political Violence 14, no. 3 (2002): 129–40. http://dx.doi.org/10.1080/714005621.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jamwal, N. S. "Counter terrorism strategy." Strategic Analysis 27, no. 1 (2003): 56–78. http://dx.doi.org/10.1080/09700160308450074.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lynch, Andrew, and Nicola McGarrity. "Counter-Terrorism Laws." Alternative Law Journal 33, no. 4 (2008): 225–28. http://dx.doi.org/10.1177/1037969x0803300407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Stevenson, Jonathan. "Pragmatic Counter-terrorism." Survival 43, no. 4 (2001): 35–48. http://dx.doi.org/10.1080/00396330112331343115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

King, Colin, and Clive Walker. "Counter Terrorism Financing." New Journal of European Criminal Law 6, no. 3 (2015): 372–95. http://dx.doi.org/10.1177/203228441500600308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Torres, Sasha. "Black (Counter)Terrorism." American Quarterly 65, no. 1 (2013): 171–76. http://dx.doi.org/10.1353/aq.2013.0011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Horn, Jeff. "Illusions of Terrorism and Counter-Terrorism." European Legacy 23, no. 4 (2018): 457–58. http://dx.doi.org/10.1080/10848770.2018.1423780.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Counter-terrorism"

1

Tench, Stephen Ashley. "Space-time modelling of terrorism and counter-terrorism." Thesis, University College London (University of London), 2018. http://discovery.ucl.ac.uk/10058705/.

Full text
Abstract:
In this thesis multiple approaches are presented which demonstrate the effectiveness of mathematical modelling to the study of terrorism and counter-terrorism strategies. In particular, theories of crime science are quantified to obtain objective outcomes. The layout of the research findings is in four parts. The first model studied is a Hawkes point process. This model describes events where past occurrence can lead to an increase in future events. In the context of this thesis a point process is used to capture dependence among terrorist attacks committed by the Provisional Irish Republican
APA, Harvard, Vancouver, ISO, and other styles
2

Shan, Jia. "LEGAL REGULATION ON COUNTER-TERRORISM." Doctoral thesis, Università degli studi di Trento, 2021. http://hdl.handle.net/11572/307620.

Full text
Abstract:
Nowadays, terrorist crimes are still threatening global security. Since the 21st century, with the rapid development of modern science and technology, such as "Internet +", "big data" and "artificial intelligence", along with the changing political situation of international society, the global distribution of economic benefits, and the global flow of civilization and culture, it has brought about information sharing and a better life in human society. At the same time, it has spawned the form innovation of terrorist crimes. Terrorism is increasingly threatening non-traditional security areas.
APA, Harvard, Vancouver, ISO, and other styles
3

Shan, Jia. "LEGAL REGULATION ON COUNTER-TERRORISM." Doctoral thesis, Università degli studi di Trento, 2021. http://hdl.handle.net/11572/307620.

Full text
Abstract:
Nowadays, terrorist crimes are still threatening global security. Since the 21st century, with the rapid development of modern science and technology, such as "Internet +", "big data" and "artificial intelligence", along with the changing political situation of international society, the global distribution of economic benefits, and the global flow of civilization and culture, it has brought about information sharing and a better life in human society. At the same time, it has spawned the form innovation of terrorist crimes. Terrorism is increasingly threatening non-traditional security areas.
APA, Harvard, Vancouver, ISO, and other styles
4

Ampofo, Lawrence. "Terrorism 3.0 : understanding perceptions of technology, terrorism and counter-terrorism in Spain." Thesis, Royal Holloway, University of London, 2011. http://repository.royalholloway.ac.uk/items/fd658676-8ed2-9d0c-70e2-72e7fdd8df2f/9/.

Full text
Abstract:
This thesis tests whether the availability of new technologies increases the capacities of terrorist and counter-terrorist agencies to achieve their communication objectives. It focuses on the ways narratives affected the behaviour of Spanish-language audiences through an analysis of policy documents, elite interviews, and internet research methods adapted by the author. The data illuminate shifting understandings of communities of policymakers, journalists, and publics during 2004 to 2011 and is the first such study undertaken in Spain. Five themes are examined: the relation of terrorism in S
APA, Harvard, Vancouver, ISO, and other styles
5

Presnell, J. Ryan. "Local Law Enforcement's Counter Terrorism Capabilities." Digital Commons @ East Tennessee State University, 2008. https://dc.etsu.edu/etd/2014.

Full text
Abstract:
The purpose of this study was to analyze local law enforcement's counter-terrorism capabilities as it relates to the varying size of United States local law enforcement agencies. Data for the study came from a study entitled "Impact of Terrorism on State and Local Law Enforcement Agencies and Criminal Justice Systems in the United States, 2004". Statistical analysis revealed that there are large disparities in the allocation of resources to intelligence gathering, analyzing, and sharing between smaller local law enforcement agencies and their larger counterparts. Furthermore, smaller agencies
APA, Harvard, Vancouver, ISO, and other styles
6

Kihara, Evonne W. "Impact of terrorism and counter-terrorism on the right to education." Diss., University of Pretoria, 2011. http://hdl.handle.net/2263/16771.

Full text
Abstract:
After the 9/11 terrorist attacks in the United States of America, there has been a shift in the policies of many countries to combat terrorism. Terrorism has had a devastating effect on many. These include „the enjoyment of the right to life, liberty and physical integrity of victims. In addition to these individual costs, terrorism can destabilise Governments, undermine civil society, jeopardise peace and security, and threaten social and economic development.‟ All of these also had a real impact on the enjoyment of human rights. Therefore the fight to curb further terrorist attacks is paramo
APA, Harvard, Vancouver, ISO, and other styles
7

Smith, Jerry D. "Israel's counter-terrorism strategy and its effectiveness /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FSmith.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jansen, Pia Therese. "The consequences of Israel's counter terrorism policy." Thesis, St Andrews, 2008. http://hdl.handle.net/10023/439.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mackenzie, Alexander. "The external dimension of EU counter-terrorism." Thesis, University of Salford, 2012. http://usir.salford.ac.uk/26787/.

Full text
Abstract:
The purpose of this project is to assess EU actorness in the external dimension of counter-terrorism. This project is important because it examines a policy area that has been at the heart of security co-operation within the EU for at least the past decade and challenges assumptions that the EU does little in the way of external counter-terrorism action. Since 9/11, the EU has become more involved in counter-terrorism; this has been recognised particularly by the literature discussing the internal dimension of EU counter-terrorism, yet academic work on the external dimension of EU counterterro
APA, Harvard, Vancouver, ISO, and other styles
10

Kowalik, Bartosz Andrzej Warwas. "Islamic terrorism and U.S. counter terrorist policy /." Title page, table of contents and conclusion only, 2002. http://web4.library.adelaide.edu.au/theses/09AR/09ark885.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Counter-terrorism"

1

Spalek, Basia, ed. Counter-Terrorism. Palgrave Macmillan UK, 2012. http://dx.doi.org/10.1057/9781137009524.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kozlow, Christopher. Counter terrorism. Jane's Information Group, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lehr, Peter. Counter-Terrorism Technologies. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-90924-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Beanlands, Bruce. Counter-terrorism: Bibliography. Solicitor General Canada. Ministry Secretariat, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Beanlands, Bruce. Counter-terrorism : bibliography. Solicitor General Canada, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Beanlands, Bruce. Counter-terrorism: Bibliography. Solicitor General Canada, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Solomon, Hussein. Terrorism and Counter-Terrorism in Africa. Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137489890.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chalk, Peter. West European Terrorism and Counter-Terrorism. Palgrave Macmillan UK, 1996. http://dx.doi.org/10.1057/9780230374195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mathieu, Deflem, ed. Terrorism and counter-terrorism: Criminological perspectives. JAI, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Roach, Kent, ed. Comparative Counter-Terrorism Law. Cambridge University Press, 2015. http://dx.doi.org/10.1017/cbo9781107298002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Counter-terrorism"

1

Morris, Eric, Alan Hoe, and John Potter. "Counter Terrorism." In Terrorism. Palgrave Macmillan UK, 1987. http://dx.doi.org/10.1007/978-1-349-18983-0_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mullins, Sam. "Counter-Terrorism." In Jihadist Infiltration of Migrant Flows to Europe. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-13338-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pisoiu, Daniela, and Sandra Hain. "Counter-terrorism." In Theories of Terrorism. Routledge, 2017. http://dx.doi.org/10.4324/9780203536599-13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hardy, Keiran. "Counter-terrorism." In Law in Australian Society, 2nd ed. Routledge, 2024. http://dx.doi.org/10.4324/9781003433408-17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Williams, Peter. "Counter-terrorism." In Introduction to Professional Policing, 2nd ed. Routledge, 2025. https://doi.org/10.4324/9781003492948-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Spalek, Basia. "Introducing Counter-Terrorism Studies." In Counter-Terrorism. Palgrave Macmillan UK, 2012. http://dx.doi.org/10.1057/9781137009524_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Spalek, Basia. "Community-Based Approaches to Counter-Terrorism." In Counter-Terrorism. Palgrave Macmillan UK, 2012. http://dx.doi.org/10.1057/9781137009524_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Spalek, Basia. "Policing within Counter-Terrorism." In Counter-Terrorism. Palgrave Macmillan UK, 2012. http://dx.doi.org/10.1057/9781137009524_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Baker, Abdul Haqq. "Engagement and Partnership in Community-Based Approaches to Counter-Terrorism." In Counter-Terrorism. Palgrave Macmillan UK, 2012. http://dx.doi.org/10.1057/9781137009524_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

McDonald, Laura Zahra. "Gender within a Counter-Terrorism Context." In Counter-Terrorism. Palgrave Macmillan UK, 2012. http://dx.doi.org/10.1057/9781137009524_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Counter-terrorism"

1

Ball, Leslie, and Matthew Craven. "Automated Counter-Terrorism." In 2013 European Intelligence and Security Informatics Conference (EISIC). IEEE, 2013. http://dx.doi.org/10.1109/eisic.2013.48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tajwer, Khaula, and Jawwad Shamsi. "Counter-terrorism simulation framework." In 2010 International Conference on Information and Emerging Technologies (ICIET). IEEE, 2010. http://dx.doi.org/10.1109/iciet.2010.5625671.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lehman, Lynn A., and Lee S. Krause. "Counter-terrorism threat prediction architecture." In Defense and Security, edited by Edward M. Carapezza. SPIE, 2004. http://dx.doi.org/10.1117/12.540989.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

GIACOBINO, ELISABETH. "FRENCH APPROACHES TO COUNTER-TERRORISM." In The Cultural Planetary Emergency: Focus on Terrorism. WORLD SCIENTIFIC, 2004. http://dx.doi.org/10.1142/9789812702388_0005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Popp, R., K. Pattipati, P. Willett, et al. "Collaborative Tools for Counter-Terrorism Analysis." In 2005 IEEE Aerospace Conference. IEEE, 2005. http://dx.doi.org/10.1109/aero.2005.1559623.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zolfaghar, K., A. Barfar, and S. Mohammadi. "A framework for online counter terrorism." In 2009 4th International Conference for Internet Technology and Secured Transactions (ICITST 2009). IEEE, 2009. http://dx.doi.org/10.1109/icitst.2009.5402641.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bonsen, Ilja M., and Rutger Gaasbeek. "Counter terrorism functions to enhance critical infrastructure resilience against CBRNe terrorism." In 2009 IEEE Conference on Technologies for Homeland Security (HST). IEEE, 2009. http://dx.doi.org/10.1109/ths.2009.5168062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ou, Chaomin, and Yang Li. "The Effectiveness of Counter-terrorism Policies Based on the Terrorism Decision." In 2018 37th Chinese Control Conference (CCC). IEEE, 2018. http://dx.doi.org/10.23919/chicc.2018.8482874.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zamin, Norshuhani. "Information Extraction for Counter-Terrorism: A Survey." In 2009 Computation World: Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns (COMPUTATIONWORLD). IEEE, 2009. http://dx.doi.org/10.1109/computationworld.2009.105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Huang, Xianlin, Hongyang Zhang, Hang Yin, and Xiao-Zhi Gao. "Dynamic study of a counter-terrorism model." In 2016 35th Chinese Control Conference (CCC). IEEE, 2016. http://dx.doi.org/10.1109/chicc.2016.7554990.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Counter-terrorism"

1

Golding, Peter. The Transformation of Counter Terrorism. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada400955.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wong, Ming T. Xinjiang and China's National Security: Counter-Terrorism or Counter-Separatism? Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada415744.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Winkelmuller-Real, Laura, Kacper Rekawek, and Thomas Renard. In Their Eyes: How European Security Services Look at Terrorism and Counter-Terrorism. International Centre for Counter Terrorism, 2025. https://doi.org/10.19165/2025.3835.

Full text
Abstract:
Different databases, initiatives and reports aim to capture the state of the terrorist threat to a given country or region. It is less often, however, that these products focus on counter-terrorism nor do they feature the views of frontline practitioners on terrorism. This ICCT report addresses the aforementioned gap. By combining practitioner perspectives gathered through an anonymous survey with detailed, structured narratives from more than 70 national security documents, the report captures both operational realities and strategic priorities of countering terrorism in the EU as of 2025. It
APA, Harvard, Vancouver, ISO, and other styles
4

Currie, Nicholas, and Ken Stiefvater. Counter-Terrorism Technology Assessment and Methodology Study. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada415487.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Benmelech, Efraim, Claude Berrebi, and Esteban Klor. Counter-Suicide-Terrorism: Evidence from House Demolitions. National Bureau of Economic Research, 2010. http://dx.doi.org/10.3386/w16493.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dmochowski, N. P. Counter-Terrorism Efforts in Pan-Saharan Africa. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada510217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bukit, Mathew. ASEAN needs to unify its counter-terrorism strategy. East Asia Forum, 2018. http://dx.doi.org/10.59425/eabc.1537653606.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hunt, Charles T., and Shannon Zimmerman. Counter-Terrorism & Peace Operations: The Impacts of UN Security Council Approaches to Tackling Terror on the Pursuit of Peace. RESOLVE Network, 2022. http://dx.doi.org/10.37805/sfi2022.2.

Full text
Abstract:
United Nations peace operations are generally considered a poor vehicle for counter-terrorism. Yet, UN peace operations are regularly deployed by the Security Council to settings affected by terrorism and violent extremism. The confluence of terrorism and conflict make this co-existence inevitable, but some missions have also engaged more directly in countering these elements. For example, the UNSC continues to support the mission in Somalia, which actively faces terrorist threats, and has also deployed a peacekeeping mission to Mali amid a jihadist insurgency. At the same time, in places like
APA, Harvard, Vancouver, ISO, and other styles
9

Iffat, Idris. Effectiveness of Different Methods to the Counter Financing of Terrorism. Institute of Development Studies, 2022. http://dx.doi.org/10.19088/k4d.2022.091.

Full text
Abstract:
Countering financing of terrorism (CFT) has been a core component of counter terrorism strategies since the 9/11 attacks on the US in 2001. Key CFT measures are criminalisation of terrorism financing; sanctions and assets freezing/seizure; and use of financial intelligence. CFT assessments focus on implementation of these measures, rather than on impact in terms of preventing terrorist activity. This rapid review therefore looks at the effectiveness of different CFT measures. It draws on a mixture of academic and grey literature, including policy papers and reports from agencies involved in CF
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Albert C. Surgical Counter-Terrorism: Targeting Individuals as an Operational Tool. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada415674.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!