[Accessed on 25 May 2010].
McColgan, M. & Attanasio, A., (1999). France: La porte ouverte á l’arbitraire”, Féderation Internationale des Ligues des Droits de l’Homme, 1-35.
McConnell, M., (Date unknown). Overhauling Intelligence. Foreign Affairs 86 No.4.
McCulloh, I., Carley, K., & Webb, M. (Date Unknown). Social Network Monitoring of Al-Qaeda.
McInerney, L., (2007). Virtual Theatre of Terror: Spotlight on the Audience. Working paper prepared for presentation at the PSAI Postgraduate Conference The University of Dublin, Trinity College, May 2007.
McLaughlin, A. (2006). Google in China, Google Blog, [Online] Available at: [Accessed 01 February 2008].
Meier, P.P., (2009). A Brief History of Crisis Mapping (Updated). iRevolution. [online] Available at [Accessed 20 July 2010].
Meier, P., & Leaning, J., (2009). Applying Technology to Crisis Mapping and Early Warning in Humanitarian Settings. Crisis Mapping Working Paper I of III. Harvard Humanitarian Initiative.
Mejova, Y., (2009). Sentiment Analysis: An Overview. Comprehensive Exam Paper. Computer Science Department, University of Iowa.
Melissen, J., (2005). Wielding Soft Power: The New Public Diplomacy. Netherlands Institute of International Relations Clingendael.
Mell, P., & Grance, T., (2011). The NIST Definition of Cloud Computing. National Institute of Standards and Technology. Special publication 800-145 (Draft).
Mercer, J., (1996). Reputation and International Politics. Cornell University Press.
Metz, S., & Kievit, J., (1995). Strategy and the Revolution in Military Affairs: From Theory to Policy. U.S. Army.
Michavila, N., (2005). Guerra, terrorismo y elecciones: incidencia electoral de los atentados islamistas en Madrid, [Working Paper] Real Instituto Elcano de Estudios Internaciónales y Estrategicas, 1-35.
Mika, P., (2005). Flink: Semantic Web Technology for the Extraction and Analysis of Social Networks. Web Semantics: Science, Services and Agents on the World Wide Web 3 (2005) 211-223.
Millet, E., (2008). Arrests Worry Barcelona’s Pakistanis. BBC News [online]. Available at [Accessed on 17 November 2010].
Milner, H., (1992). International Theories of Cooperation Among Nations. Strengths and Weakneses. World Politics, 44(April 1992), 466-96.
Minchoa, S. (2009). A Study on the Effective Use of Social Software by Further and Higher Education in the UK to Support Student Learning and Engagement. The Open University.
Ministerio de la Defensa,. (2003). Revisión Estratégica de la Defensa, [Online]. Available at: [Accessed 20 August 2008].
Ministerio del Interior (2006). Interior Destina 1,000 Policías a la Lucha Contra el Terrorismo Islamista. Gobierno de España. [online] Available at < http://www.mir.es/DGRIS/notas_prensa/ministerio_interior/2006/np021703.htm> [Accessed 01 February 2009].
Mislove, A., Druschel, P., Marcon, M., Bhattachargee, B., & Gummadi, K.P. (2007). Measurement and Analysis of Online Social Networks. IMC ’07, October 24-26, 2007.
Mitra, S. (2007). Web 3.0 & the Semantic Web. [online]. [Accessed 08 February 2008].
Mislove, A., Gummadi, K.P. & Druschel, P. (2006). Exploiting Social Networks for Internet Search. In Proceedings of the 5th Workshop on Hot Topics in Networks (HotNets-V), Irvine, CA, Nov 2006.
Moffitt, S., & Dover, M., (2011). Wikibrands. Reinventing your Company in a Customer-Driven Marketplace. McGraw Hill Books.
Moghaddam, F.M., (2005). The Staircase to Terrorism: A Psychological Exploration. American Psychologist, February – March 2005, Vol. 60, No. 2, 161-169.
Monmar, (2010). Islamización de Europa “Eurabia”. Más pruebas de la presencia de Al Qaeda en España. [online] Available at [Accessed on 01 March 2011].
Moore, M., (2005). End of Terrorism? ETA and the Efforts for Peace. Harvard International Review [online]. 27 (2), 2005. Available at [Accessed 01 July 2005].
Moreno, L. (2004). The Madrid Bombings in the Domestic and Regional Politics of Spain, Spanish National Research Council, (2004), Working Paper.
Mueller, J. (2004). Why Isn’t There More Violence? Security Studies 13, No. 3 (Spring 2004): 191-203
Munro, R., (2009) Actor-Network Theory in Clegg, S. & Haugaard, M. (eds.), The SAGE Handbook of Power. SAGE Publications Inc.
Muñiz A.M., & Schau, H.J., (2007). Vigilante Marketing and Consumer-Created Communications. Journal of Marketing, vol. 36, No. 3 (Fall 2007).
Murphy, M., (2010). War in the Fifth Domain. Are the Mouse and Keyboard the New Weapons of Conflict? The Economist, 1st July 2010. [online]. Available at > [Accessed 08 July 2010].
Nacos, B., (2003). Terrorism as Breaking News: Attack on America. Political Science Quarterly, Vol. 118, No.1 (Spring, 2003), pp.25-32.
Naím, M., (2005). Post Terror Surprises, Foreign Policy, [online]. Available at: [Accessed June 2006].
Napolenoi, L, (2004). Money and Terrorism. Strategic Insights, Volume III, Issue 4 (April 2004).
Napoleoni, L., (2005). The New Economy of Terror. Open Democracy.
Nash, E., (1997). Spain Gripped by Mass Protest Against the ETA Gunmen. The Independent.
National Cybersecurity Alliance, 2010. Stay Safe Online Homepage. [online] <http://www.staysafeonline.org/> [Accessed 20 August 2010].
Network World, (2008). Software, Portal Target, Predict Terrorist Behavior, Network World, Feb. 2008, [Online] Available at: