Lawrence Peter Ampofo



Download 1.29 Mb.
Page45/62
Date19.10.2016
Size1.29 Mb.
#4199
1   ...   41   42   43   44   45   46   47   48   ...   62
[Accessed 13 June 2011].
Charrett, C., (2009). A Critical Application of Securitization Theory: Overcoming the Normative Dilemma of Writing Security. Institut Català Internacional per la Pau.
Chau, D., (2008). U.S. Counter-terrorism in Sub-Saharan Africa: Understanding Costs, Cultures, and Conflicts [Online]. September 2008. Available at [Accessed 01 October 2008]
Chen, H., Thoms, S. & Fu, T.J., (2008). Cyber Extremism in Web 2.0: An Exploratory Study of International Jihadist Group. Forthcoming, IEEE International Conference on Intelligence and Security Informatics, 2008.
Chepsiuk, R., (2001). Get Ready for Cyberwars. [online]. Available at [Accessed 28 March 2009].
Chen, Y, Liu, C, Wong, R, (2007). The Adoption of Synchronous and Asynchronous Media in the Teaching of a Second Language. Issues in Information Systems, Volume III, No. 1.
Chen, H., Thoms, S. & Fu, T.J., (2008). Cyber Extremism in Web 2.0: An Exploratory Study of International Jihadist Groups. IEEE International Conference on Intelligence and Security Informatics, 2008.
Chernaik, W., Deegan, M. & Gibson, A. (1996). Beyond the Book: Theory, Culture and the Politics of Cyberspace. Office for Humanities Communication Publications, No. 7, The Centre for English Studies, University of London.
Chesters, G., (2003). Shape Shifting: Civil Society, Complexity and Social Movements, Anarchist Studies, 11, 1:42-65
Civis, L., (2009). La Lucha Contra el Terrorismo en el Marco de la Seguridad y Defensa en España. Real Instituto Elcano. ARI No. 45/2009.
Clark, R., (1998). Information, Technology and Dataveillance. Communications of the ACM. May 1998, Volume 13, Number 5.
Clifton, B., (2010). Advanced Web Metrics with Google Analytics. Wiley Publishing Inc. Indianapolis, Indiana.
Club de Madrid., (2005). International Summit on Democracy, Terrorism and Security, Madrid: Club de Madrid
Colás, A., (2010). An Exceptional Response? Security, Development and Civil Society in Spanish Policy after 11-M. Development and Change. Volume 41, Issue 2, pages 313-333, March 2010.
Colin, B.C., (Date Unknown). The Future of CyberTerrorism: Where the Physical and Virtual Worlds Converge. 11th Annual International Symposium On Criminal Justice Issues.
Colmenares, M., (2009). Quinto Aniversario del Ataque Terrorista del 11M. Martha Colmenares.” [online] [Accessed 01 February 2011].
Colomer, J., (2005). The General Election in Spain, March 2004 Electoral Studies, 24, (1), p. 123-160
Comscore, (2009). Fast Growing U.K. Online Newspaper Market Attracting Even Larger Audiences from Beyond the Pond. [online] Available at [Accessed on 23 July 2011].
Conway, M., (2002) Cyberterrorism: The Story so Far in Hutchinson, B., (2002). Proceedings of the European Conference on Information Warfare and Security. Brunel University Uxbridge, United Kingdom 8-9 July 2002.
Conway, M., (2002). Reality Bytes: Cyberterrorism and Terrorist ‘Use’ of the Internet. First Monday, 7. [online] Available at [Accessed 01 June 2007].
Conway, M., (2003). Hackers as Terrorists? Why it Doesn’t Compute. Computer Fraud and Security, 2003, (12) (December): 10:13.
Conway, M., (2003). Code Wars: Steganography, Signals Intelligence, and Terrorism. Knowledge, Technology and Policy (Special issue entitled ‘Technology and Terrorism’) Vol. 16, No. 2 (Summer 2003): 45-62 and reprinted in David Clarke (Ed.), Technology and Terrorism. New Jersey: Transaction Publishers (2004): 171-191.
Conway, M., (2005). Terrorist ‘Use’ of the Internet and Fighting Back. Paper prepared for presentation at the conference Cybersafety: Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities, Oxford Internet Institute (OII), Oxford University, UK, 8-10 September, 2005
Conway, M., (2006). Terrorism and the Internet: New Media – New Threat? Parliamentary Affairs, 2006.
Conway, M., (2007). Terrorism and Internet Governance: Core Issues. Disarmament Forum, 2007 (3) pp.23-34 ISSN 1020-7827.
Conway, M., & McInerney, L. (2008). Jihad Video & Auto-Radicalisation: Evidence from an Exploratory YouTube Study. School of Law & Government, Dublin City University, Glasnevin, Dublin, 9, Ireland.
Cornish, P., (2009). Cyber Security and Politically, Socially and Religiously Motivated Cyber Attacks. European Parliament, 2 February 2009.
Corning, P.A. (2002). The Re-Emergence of “Emergence”: A Venerable Concept in Search of a Theory. Complexity (2002) 7(6): 18-30.
Cosidó, I., 2002 Spanish Policy Against Terrorism: The Guardia Civil and ETA, Grupo de Estudios Estratégicos, [Online]. Available at: Accessed 29 July 2008
Cottle, S., (1998). Ulrich Beck, ‘Risk Society’ and the Media. A Catastrophic View? European Journal of Communication. Vol. 13, (1): 5-32.
Couldry, N., (2004). Actor Network Theory and the Media: Do They Connect And On What Terms? London School of Economics And Political Science [Online]. Available at: [Accessed 01 November 2008].
Couper, M., (2010). ‘Visual Design in Online Surveys: Lessons for the Mobile World’ Mobile Research Conference Paper 8-9 March 2010.
Coyle, D., & Meier, P., (2009). The Role of Information and Social Networks. UN Foundation and Vodafone Foundation Partnership.
Crain, M., (1999). New North African Immigration to Spain, Middle East Report, No. 211 (Summer 1999), pp.23-25.
Crenshaw, M., (1981). The Causes of Terrorism. Comparative Politics, Vol. 13, No.4. (Jul., 1981), pp.379-399.
Crisis Mappers Net, (Date Unknown). The Crisis Mappers Network [online]. Available at

Download 1.29 Mb.

Share with your friends:
1   ...   41   42   43   44   45   46   47   48   ...   62




The database is protected by copyright ©ininet.org 2024
send message

    Main page