Journal articles on the topic 'Counter-terrorist strategy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Counter-terrorist strategy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Sederberg, Peter C. "Conciliation as Counter-Terrorist Strategy." Journal of Peace Research 32, no. 3 (1995): 295–312. http://dx.doi.org/10.1177/0022343395032003004.
Full textBremer, L. Paul. "The west's counter‐terrorist strategy." Terrorism and Political Violence 4, no. 4 (1992): 255–62. http://dx.doi.org/10.1080/09546559208427185.
Full textO'neil, Andrew. "Degrading and Managing Risk: Assessing Australia's Counter-Terrorist Strategy." Australian Journal of Political Science 42, no. 3 (2007): 471–87. http://dx.doi.org/10.1080/10361140701513596.
Full textHendroy, Faruq Arjuna. "The US National Efforts to Counter Domestic Terrorism: Progress and Controversy." Jurnal Global Strategis 12, no. 2 (2018): 69. http://dx.doi.org/10.20473/jgs.12.2.2018.69-80.
Full textSugiarto, Sugiarto. "COMMUNICATION STRATEGY OF THE NATIONAL COUNTER TERRORISM AGENCY IN THE DERADICALIZATION PROGRAM IN INDONESIA." Jurnal Pertahanan & Bela Negara 10, no. 2 (2020): 195. http://dx.doi.org/10.33172/jpbh.v10i2.898.
Full textAhmed, Naeem. "PAKISTAN’S COUNTERTERRORISM STRATEGY: A CRITICAL OVERVIEW." Journal of Social Sciences and Humanities 55, no. 2 (2016): 1–16. http://dx.doi.org/10.46568/jssh.v55i2.79.
Full textTella, Oluwaseun. "Boko Haram Terrorism and Counter-Terrorism: The Soft Power Context." Journal of Asian and African Studies 53, no. 6 (2017): 815–29. http://dx.doi.org/10.1177/0021909617739326.
Full textFreedman, Lawrence. "Terrorism as a Strategy." Government and Opposition 42, no. 3 (2007): 314–39. http://dx.doi.org/10.1111/j.1477-7053.2007.00226.x.
Full textStarodubtseva, Maria A., Valery A. Mazurov, and Ekaterina A. Shushakova. "EUROPEAN UNION STRATEGY FOR THE FIGHT AGAINST TERRORISM." Society and Security Insights 3, no. 2 (2020): 158–68. http://dx.doi.org/10.14258/ssi(2020)2-10.
Full textSeib, Philip. "US Public Diplomacy and the Terrorism Challenge." Hague Journal of Diplomacy 14, no. 1-2 (2019): 154–68. http://dx.doi.org/10.1163/1871191x-14011012.
Full textFarag, Wael Zakaria. "American security strategy towards terrorism after September 11 attacks." Review of Economics and Political Science 5, no. 4 (2020): 323–33. http://dx.doi.org/10.1108/reps-10-2018-0010.
Full textBibik, Oleg N. "Terrorism as a manifestation of the ideological crime: culturological aspects of counteraction." Law Enforcement Review 2, no. 1 (2018): 114–22. http://dx.doi.org/10.24147/2542-1514.2018.2(1).114-122.
Full textArreguín-Toft, Ivan. "Tunnel at the End of the Light: A Critique of US Counter-terrorist Grand Strategy." Cambridge Review of International Affairs 15, no. 3 (2002): 549–63. http://dx.doi.org/10.1080/0955757022000011051.
Full textChirleşan, Georgeta. "European Security And The Terrorist Threat: Evolutions And Current Ways Of Managing It." International conference KNOWLEDGE-BASED ORGANIZATION 21, no. 1 (2015): 21–27. http://dx.doi.org/10.1515/kbo-2015-0003.
Full textZhao, Ruifang, Xiaolan Xie, Xun Zhang, Min Jin, and Mengmeng Hao. "Spatial Distribution Assessment of Terrorist Attack Types Based on I-MLKNN Model." ISPRS International Journal of Geo-Information 10, no. 8 (2021): 547. http://dx.doi.org/10.3390/ijgi10080547.
Full textVarenya, Natalia, and Sergii Avramenko. "Virtual Reality as a new World Factor for Analysis of the Level of Terrorist Threat." Ukrainian Journal of International Law 2 (March 15, 2020): 46–60. http://dx.doi.org/10.36952/uail.2020.2.46-60.
Full textMamud, Yusuf Abubakar, and Oboshi J. Agyeno. "Using Muslims Mannerism and Habits (UMMAH): An Early Warning Strategy for Countering Violent Extremism." European Scientific Journal, ESJ 13, no. 5 (2017): 416. http://dx.doi.org/10.19044/esj.2017.v13n5p416.
Full textIslam, Zahid, Mubeen Adnan, and Musharaf Ali Talpur. "Pakistan’s Counter-Terrorism Strategy with Viable Recommendations." Progressive Research Journal of Arts & Humanities (PRJAH) 2, no. 2 (2020): 155–67. http://dx.doi.org/10.51872/prjah.vol2.iss2.45.
Full textKosmynka, Stanisław. "The problem of radical Salafism in Sweden in the context of terrorist threats." Przegląd Europejski, no. 4-2020 (December 14, 2020): 117–30. http://dx.doi.org/10.31338/1641-2478pe.4.20.9.
Full textSan, Juan E. "From Chinatown to Gunga Din Highway: Notes on Frank Chin's Writing Strategy." Ethnic Studies Review 24, no. 1 (2001): 1–28. http://dx.doi.org/10.1525/esr.2001.24.1.1.
Full textStevanović, Miroslav, and Dragan Đurđević. "The role of computer forensics in the fight against terrorism." Megatrend revija 17, no. 1 (2020): 129–42. http://dx.doi.org/10.5937/megrev2001129s.
Full textCosta, Christopher P. "A Review of: “Joshua Alexander Geltzer.U.S. Counter-Terrorism Strategy and al-Qaeda: Signalling and the Terrorist World-View.”." Terrorism and Political Violence 23, no. 1 (2010): 112–14. http://dx.doi.org/10.1080/09546553.2011.533075.
Full textHelzhynskyi, A. Yu. "Legal Regulation of Interaction of Security Service of Ukraine with Civil Society in Counteracting Terrorism." Law and Safety 74, no. 3 (2019): 10–17. http://dx.doi.org/10.32631/pb.2019.3.01.
Full textUmmah, Athik Hidayatul. "Digital Media and Counter Narrative of Radicalism." Jurnal THEOLOGIA 31, no. 2 (2021): 233–56. http://dx.doi.org/10.21580/teo.2020.31.2.6762.
Full textLorenzo-Dus, Nuria, and Stuart Macdonald. "Othering the West in the online Jihadist propaganda magazines Inspire and Dabiq." Journal of Language Aggression and Conflict 6, no. 1 (2018): 79–106. http://dx.doi.org/10.1075/jlac.00004.lor.
Full textKustana, Tatan. "Islamic terrorism in Indonesia: Addressing Government Strategies and Muslim Population." Jurnal Pertahanan 3, no. 2 (2017): 77. http://dx.doi.org/10.33172/jp.v3i2.145.
Full textHeath-Kelly, Charlotte. "Algorithmic autoimmunity in the NHS: Radicalisation and the clinic." Security Dialogue 48, no. 1 (2016): 29–45. http://dx.doi.org/10.1177/0967010616671642.
Full textFatima, Noor, and Zahid Ali Khan. "Soft Power and Cultural Diplomacy as Counter-terrorism Measure in Contemporary International Politics." Global Social Sciences Review III, no. II (2018): 1–20. http://dx.doi.org/10.31703/gssr.2018(iii-ii).01.
Full textHamilton, Richard, and Roger McCain. "Smallpox, Risks of Terrorist Attacks, and the Nash Equilibrium: An Introduction to Game Theory and an Examination of the Smallpox Vaccination Program." Prehospital and Disaster Medicine 24, no. 3 (2009): 231–38. http://dx.doi.org/10.1017/s1049023x00006865.
Full textAlexander, James. "Prevent." Feminist Dissent, no. 4 (March 11, 2019): 202–15. http://dx.doi.org/10.31273/fd.n4.2019.323.
Full textArifin, Bustanul, and Nur Afni Damanik. "THE IMPLEMENTATION OF INDONESIA’S COUNTER PIRACY STRATEGIES THROUGH MULTILATERAL COOPERATION IN THE MALACCA STRAIT (2004-2009)." Verity: Jurnal Ilmiah Hubungan Internasional (International Relations Journal) 12, no. 23 (2020): 5. http://dx.doi.org/10.19166/verity.v12i23.2482.
Full textLimbada, Zubeda, and Lynn Davies. "Addressing the Foreign Terrorist Fighter Phenomenon from a Human Rights Perspective." International Community Law Review 18, no. 5 (2016): 483–93. http://dx.doi.org/10.1163/18719732-12341343.
Full textScott, Russ. "The Sydney Lindt café siege: The role of the consultant psychiatrist." Australian & New Zealand Journal of Psychiatry 54, no. 3 (2019): 244–58. http://dx.doi.org/10.1177/0004867419853886.
Full textMaza, Kangdim Dingji, Umut Koldas, and Sait Aksit. "Challenges of Countering Terrorist Recruitment in the Lake Chad Region: The Case of Boko Haram." Religions 11, no. 2 (2020): 96. http://dx.doi.org/10.3390/rel11020096.
Full textYousafzai, Iftikhar Ahmad, and A. Z. Hilali. "India’s Role as a Determinant in Pakistan-US Relations (2005-2015)." Review of Applied Management and Social Sciences 4, no. 1 (2021): 285–93. http://dx.doi.org/10.47067/ramss.v4i1.122.
Full textChertoff, Michael, Patrick Bury, and Daniela Richterova. "Bytes not waves: information communication technologies, global jihadism and counterterrorism." International Affairs 96, no. 5 (2020): 1305–25. http://dx.doi.org/10.1093/ia/iiaa048.
Full textBussotti, Luca, and Charles Torres. "THE RISK MANAGEMENT OF ISLAMIC TERRORISM IN A FRAGILE STATE: THE CASE OF MOZAMBIQUE." Problems of Management in the 21st Century 15, no. 1 (2020): 9–22. http://dx.doi.org/10.33225/10.33225/pmc/20.15.09.
Full textShumilin, Aleksandr. "France: Republic against «Political Islam» (Part I)." Scientific and Analytical Herald of IE RAS, no. 1 (February 28, 2021): 54–61. http://dx.doi.org/10.15211/vestnikieran120215461.
Full textHenning, Johan, and Mignon Hauman. "Fortifying a risk-based approach in the South African AML/CFT process." Journal of Financial Crime 24, no. 4 (2017): 520–28. http://dx.doi.org/10.1108/jfc-01-2017-0007.
Full textRose, Kalle Johannes. "Disclosing anti-money launderers through CSR regulation – a new way to combat money laundering." Journal of Money Laundering Control 23, no. 1 (2020): 11–25. http://dx.doi.org/10.1108/jmlc-07-2019-0062.
Full textBlahova, Marta. "Security forecasts of terrorist attack." MATEC Web of Conferences 292 (2019): 01035. http://dx.doi.org/10.1051/matecconf/201929201035.
Full textRose, Kalle Johannes. "De-risking or recontracting – the risk dilemma of EU money laundering regulation." Journal of Risk Finance 21, no. 4 (2020): 445–58. http://dx.doi.org/10.1108/jrf-12-2019-0237.
Full textShpiro, Shlomo. "Conflict Media Strategies and the Politics of Counter-Terrorism." Politics 22, no. 2 (2002): 76–85. http://dx.doi.org/10.1111/1467-9256.00162.
Full textRothenberger, Liane, Yulia An, Natalia Angulo Mejía, Arlinda Arizi, and María Martín Villalobos. "Perpetrators’ strategic communication: Framing and identity building on ethno-nationalist terrorists’ websites." Communications 43, no. 2 (2018): 133–71. http://dx.doi.org/10.1515/commun-2017-0057.
Full textMonar, Jörg. "Common Threat and Common Response? The European Union's Counter-Terrorism Strategy and its Problems." Government and Opposition 42, no. 3 (2007): 292–313. http://dx.doi.org/10.1111/j.1477-7053.2007.00225.x.
Full textKumar, Deepa. "Terrorcraft: empire and the making of the racialised terrorist threat." Race & Class 62, no. 2 (2020): 34–60. http://dx.doi.org/10.1177/0306396820930523.
Full textBaldaccini, Anneliese. "Counter-Terrorism and the EU Strategy for Border Security: Framing Suspects with Biometric Documents and Databases." European Journal of Migration and Law 10, no. 1 (2008): 31–49. http://dx.doi.org/10.1163/138836407x261308.
Full textKhairil, Muhammad. "Wahdah Islamiyah’s Counter-Radicalism Strategy Through The New Media Network in Da’wah Development Of Palu City." Al-Ulum 18, no. 2 (2018): 417–35. http://dx.doi.org/10.30603/au.v18i2.610.
Full textChunlin, Liu, and Rohan Gunaratna. "The terrorist threat forecast in 2021." UNISCI Journal 19, no. 55 (2021): 215–20. http://dx.doi.org/10.31439/unisci-112.
Full textGrigor’eva, Kseniya S. "Problem of Selective Control as a Means of Countering Terrorism (On the example of Poland, Latvia, Bulgaria)." Sociologicheskaja nauka i social naja praktika 7, no. 4 (2019): 166–79. http://dx.doi.org/10.19181/snsp.2019.7.4.6809.
Full text