[Accessed February 2010].
Pernick, R., Figallo, C., Williams, G.A., (1995). A Timeline of the First Ten Years of the WELL. WELL.com. [online]. Available at [Accessed 09 December 2010].
Del Pino, E., & Colino, C., (2010). National and Subnational Democracy in Spain: History, Models and Challenges. Working Paper. Instituto de Políticas y bienes Públicos. [IPP].
Pollitt, M.M., (1998). Cyberterrorism – Fact or Fancy? Computer Fraud & Security, February 1998.
Portero, F. Alianza de Civilizaciones: la democracia como amenaza. Cuadernos de Pensamiento Político, No. 8 (Oct. – Dec., 2005), pp. 113-128.
Portugués, J., (2009). Nuevos Avances y Retos en la Lucha Contra el Terrorismo. Revista Electrónica de Estudios Internacionales.
Portugués, J., (2010). Terrorism, Drug-Trafficking, Money Laundering, Human Trafficking, Smuggling of Migrants, Arms Trafficking: Global Fight Against Transnational Organised Crime. Reflexión Politica. Ano 12, No. 23, Junio de 2010.
Post, J.M., Ruby, K.G. & Shaw, E.D., (2000). From Car Bombs to Logic Bombs: The Growing Threat from Information Terrorism. Terrorism and Political Violence, Vol.12, No.2, (Summer 2000), pp.97-122.
Prabowo, R., Thelwall, M., (2008). Sentiment Analysis: A combined approach. Journal of Informetrics 3 (2009) 143-157.
Prahl, L. (2007), More than a Political Shift: 11-M and its Impact on the Spanish Democracy. Honors Thesis, Political Science.
Prentice, S., Hoskins, A., O’Loughlin, B., Rayson, P., (2009). Analysing the Semantic Content and Persuasive Composition of Extremist Media: A Case Study of Texts Produced During the Gaza Conflict. Royal Holloway, University of London.
Présidence de le République., (2008). The French White Paper on Defence and National Security, [Online]. Available at: [Accessed 30 June 2008].
Présidence de la République, (2008). Discours de M. le Président de la République, [Online]. Available at: [Accessed 30 June 2008].
Provoost, L., & Bornier, E. (Date Unknown). Service-Oriented Architecture and the Semantic Web: A killer combination? Department of Information and Computing Sciences University of Utrecht
Pang, B, & Lee, L. (2008). Opinion Mining and Sentiment Analysis. Foundations and Trends in Information Retrieval. Vol. 2, No. 1-2 (2008) 1-135.
Qin, J., Zhou, Y., Reid, E., Lai, G. & Chen, H., (2007). Analyzing Terror Campaigns on the Internet: Technical Sophistication, Content Richness and Web Interactivity. International Journal of Human-Computer Studies 65 (2007) 71-84.
Que.es (2009). 11M !Lo Conseguiremos, Saldrá la Verdad Algún Día! [online] [Accessed 01 February 2011].
Rafaeli, S., (1986). The Electronic Bulletin Board: A Computer-Driven Mass Medium. Computers and the Social Sciences 2. Paradigm Press.
Raffl, C., Hofkirchner, W., Fuchs, C. & Schafranek, M., (2011). The Web as Techno-Social System: The Emergence of Web 3.0. ICT&S Center, University of Salzberg, Austria, 1-6.
Rapoport, D., (2001). The Fourth Wave: September 11 in the History of Terrorism. Current History, Dec. 2001, v100 i650 p.419(6).
Rapoport, D., (2001). Inside Terrorist Organisations. Frank Cass Publishers.
Raufer, X., (2002). Organized Crime 1995 - 2002: Mafias, Cartels and "Gangsterrorists". Xavier Raufer.com. [online]. Available at [Accessed 31 October 2010].
Raynes-Goldie, K., (2010). ‘Aliases, Creeping and Wall Cleaning: Understanding Privacy in the Age of Facebook’, First Monday, Vol. 15 No.1-4.
Read, J., Hope, D., and Carroll, J. (2007). Annotating Expressions of Appraisal in English. In Linguistic Annotation Workshop. Pages 93-100, Prague, June 2007.
Reid, E.F., & Chen, H., (2006). Mapping the Contemporary Terrorism Research Domain. International Journal of Human-Computer Studies 65 (2007) 42-56.
Reid, E. & Chen, H., (2007). Internet-Savvy U.S. and Middle Eastern Extremist Groups. Mobilization: An International Quarterly Review. 12(2): 177-192.
Reid, E. et al., (2007). Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism. Department of Management Information Systems, The University of Arizona, pp. 1-21
Reinares, F., (2005). The Mediterranean Region and International Terrorism: A New Framework for Cooperation? Real Instituto Elcano de Estudios Internaciónales y Estrategicas, [Online]. Available at: [Accessed 01 July 2008].
Reinares, F., (2006). Do Governments and Citizens Agree on How to Combat International Terrorism?, Real Instituto Elcano de Estudios Internaciónales y Estrategicas, [Online]. Available at [Accessed 02 July 2008].
Reinares, F., (2006). Hacia una caracterización social del terrorismo yihadista en España: implicaciones en seguridad interior y acción exterior”, Real Instituto Elcano de Estudios Internacionales y Estratégicas [Online]. Available at: [Accessed 02 July 2008].
Reinares, F., (2006). ¿Coinciden el gobierno y los ciudadanos en que medidas adoptar contra el terrorismo internacional?” Real Instituto Elcano de Estudios Internacionales y Estratégicas, No. 78.
Reinares, F., (2006). Towards a Social Characterisation of Jihadist Terrorism in Spain: Implications for Domestic Security and Action Abroad. Real Instituto Elcano de Estudios Internacionales y Estrátegicas. ARI No 34/2006.
Reinares, F., (2008). Estamos más seguros frente a al-Qaeda? Reformas en la seguridad interior española y prevención del terrorismo global, 2004-2008, Real Instituto Elcano de Estudios Internaciónales y Estrategicas, Working Paper.
(2000). Regulation of Investigatory Powers Act 2000 (c. 23), London: Ministry of Justice.
Ressler, S. (2006). Social Network Analysis as an Approach to Combat Terrorism: Past Present and Future Research. Homeland Security Affairs, Volume 2, No. 2, (July 2006).
Rheingold, H., (1991) Virtual Reality. Secker and Warburg.
Rheingold, H., (1994). The Virtual Community: Surfing the Internet. Minerva.
Rheingold, H., (2003), Smart Mobs: The Next Social Revolution, Perseus Books.
Rice, Xan, (2008). Last Piece of Fibre-optic Jigsaw Falls Into Place as Cable Links East Africa to Grid. The Guardian Online. [Online]. Available at:
Share with your friends: |