Lawrence Peter Ampofo



Download 1.29 Mb.
Page42/62
Date19.10.2016
Size1.29 Mb.
#4199
1   ...   38   39   40   41   42   43   44   45   ...   62
[Accessed 21 January 2010].
Arrington, M, 2010. State of the Blogosphere 2009, Technorati Inc. [online] [Accessed 20 August 2010].
Arquilla, J., & Ronfeldt, D., (1997). In Athena’s Camp: Preparing for Conflict in the Information Age. RAND.
Arquilla, J., & Ronfeldt, D., (2000). Swarming and the Future of Conflict. RAND.
Arquilla, J., & Ronfeldt, D., (2001). Networks and Netwars: The Future of Terror, Crime and Militancy. California: RAND.
Ars Technica. (2008). Big Sister is Watching, Ars Technica [Online]. Available at: [Accessed 10 September 2008].
Atran, S. (2006). The Moral Logic and Growth of Suicide Terrorism. The Washington Quarterly, 29:2 pp.127-147.
Atkinson, S.E., Sandler, T. & Tschirhart, J. (1987). Terrorism in a Bargaining Framework. Journal of Law and Economics, Vol. 30, No. 1, (Apr., 1987), pp.1-21.
Author Unknown, (2010). International Intellectual Property Alliance (IIPA) 2010 Special 301 Report on Copyright Protection and Enforcement. International Intellectual Property Alliance. 18 February 2010.
Avilés, J., (2003). Balance del terrorismo en España en el año 2003 Grupo de Estudios Estratégicos, [Online] Análisís No. 64. Available at: [Accessed 28 July 2005].
Ba, S, Whinston, A.B., Zhang, H, (2003). Building Trust in Online Markets Through an Economic Incentive Mechanism, Design Support Systems, No. 35, pp. 273-286.
Bains, P., O’Shaughnessy, N.J., Moloney, K., Richards, B., Butler, S. & Gill, M., (2006). Muslim Voices: The British Muslim Response to Islamic Video Polemic – An Exploratory Study. Research Paper Series. Cranfield University School of Management.
Baldwin, M., (2009). How to Measure Online Influence. Mashable [online]. Available at [Accessed on 10 December 2010].
Ballesteros, M.Á, (2005). El papel de la OTAN en la lucha contra el terrorismo internacional Real Instituto Elcano de Estudios Internaciónales y Estrategicas. No. 138 [online]. Available at: [Accessed 28 July 2008].
Baquero, A., (2004). La Cantera de Al-Qaeda. Diario Córdoba. [online] Available at [Accessed 01 February 2011].
Barak, S., (2004). Between Violence and E-Jihad: Middle Eastern Terror Organizations in the Information Age. In L Nicander & M. Ranstorp (Eds.). Terrorism in the Information Age-New Frontiers? (pp. 83-96).
Barber, S. (1992). Jihad Vs McWorld, The Atlantic. [Online]. Available at: <http://www.theatlantic.com/doc/199203/barber> [Accessed August 2006]
Barkus, L, Dey, A, (2003). Location-Based Services for Mobile Telephony: A Study of Users Privacy Concerns, Proceedings of the INTERACT 2003 9TH IFIP TC13 International Conference on Human-Computer Interaction, Intel Berkeley Research.
Barnett, T.P.M. & Gaffney, Jr., H.H., (Date Unknown). The Global Transaction Strategy. Transformation Trends – 16 December Issue.
Barnett, T., (2005). The Pentagon’s New Map: War and Peace in the Twenty-First Century. Reprint Edition. Berkeley Publishing Group.
Bassett, E.H., O’ Riordan, K, (2002). Ethics of Internet Research: Contesting the Human Subjects Research Model, Internet Research Ethics, New York University. [Accessed 12 July 2010].
Baudrillard, J., (2003). The Spirit of Terrorism and Other Essays. London and New York, Verso.
Baudrillard, J., (1983). Simulations, Semiotext.
Baudrillard, J., (1995). The Gulf War did not Take Place. Bloomington: Indiana University Press.
Baudrillard, J, Maclean, M, (1985). The Masses: The Implosion of the Social in the Media. New Literary History, Vol. 16, No. 3, pp. 577-589.
BBC Mundo, (2005). ¿Cómo es España después del 11-M? [online] Available at [Accessed 01 February 2011].
BBC News. (1986). 1986: French Car Chief Shot Dead, BBC News [online] [Accessed October 2008].
BBC News. (2003), Europe-Africa Rail Tunnel Agreed, BBC News [Online]. Available at: [Accessed July 2005].
BBC News, (2004). Madrid Attacks Timeline. [online] Available at [Accessed on 22 July 2011].
BBC News, (2010). Saudi Arabia begins Blackberry Ban, Users Say. [online] Available at [Accessed 13 July 2011].
Beck, L., (2008), The Mezquita-Garaje, Mezquita-Sótano, and Islam in Spain Since 11-M, HAOL, No. 17, 147-158
Beck, U., (1999). World Risk Society. Blackwell Publishers Ltd.
Beckmann, S, Langer, R, (2005). Netnography: Rich Insights from Online Research. Insights, No. 14.
Bell, G., & Dourish, P. (2006). Yesterday’s Tomorrows: Notes on Ubiquitous Computing’s Dominant Vision. Springer-Verlag London Limited.
Bell, D., & Kennedy, B. (eds.) (2000). The Cybercultures Reader. London and New York, Routledge.
Beck, L., (2008). The Mezquita-Garaje, Mezquita-Sótano, and Islam in Spain Since 11-M. HAOL, Núm. 17, (Otoño, 2008), 147-158.
Bendrath, Ralf. (2001). The Cyberwar Debate: Perception and Politics in US Critical Infrastructure Protection. Information and Security. Volume 7, 2001 (80-103).
Bennett, L.W., in de Donk, W., Loader, B.D., Nixon, P.G. & Rucht (eds) (2002). Communicating Global Activism: Some Strengths and Vulnerabilities of Networked Politics in Cyberprotest: New Media, Citizens and Social Media. London: Routledge.
Bennett, L., (2003). Communicating Global Activism. Information, Communication & Society [online] Available at

Download 1.29 Mb.

Share with your friends:
1   ...   38   39   40   41   42   43   44   45   ...   62




The database is protected by copyright ©ininet.org 2024
send message

    Main page