Lawrence Peter Ampofo



Download 1.29 Mb.
Page43/62
Date19.10.2016
Size1.29 Mb.
#4199
1   ...   39   40   41   42   43   44   45   46   ...   62
[Accessed October 2008].
Berenskoetter, F. Williams, M.J. (eds), (2007). Power in World Politics, Routeledge
Berkowitz, B., (2002). The New Protracted Conflict: Intelligence and the War on Terrorism. Foreign Policy Research Institute, Elsevier Science Limited, Spring 2002, 289-303
Bermingham, A., Conway, M., McInerney, L., O’Hare, N. & Smeaton, A.F. (Date Unknown). Combining Social Network Analysis and Sentiment Analysis to Explore the Potential for Online Radicalisation. CLARITY Centre for Sensor Web Technologies.
Bernard Lewis, (1990). ‘The Roots of Muslim Rage,’ The Atlantic Monthly, vol. 266, September 1990, p. 60; June 15,1992, pp. 24-28.
Berelson, B., (1952). Content Analysis in Communication Research. Free Press.
Bermudez, G., (2010). La Ley Cerca al Yihadismo. La Razon [online]. Available at [Accessed on 01 March 2010].
Berners-Lee, T., (1999). Weaving the Web: The Original Design and Ultimate Destiny by its Inventor, Harper Collins.
Berners-Lee, T. Hendler, J. Lassila, O., (2001). The Semantic Web, Scientific American, [online]. Available at [Accessed October 2008).
Berners-Lee, T, (2010). Long Live the Web: A Call for Continuing Open Standards and Neutrality. Scientific American. [online] [Accessed 22 November 2010].
Bertola, V., (2010). Power and the Internet. Journal of Information, Communication and Ethics in Society, Vol. 8, Iss: 4, pp.323-327.
Best, S.J., & Krueger, B.S., (2008). Political Conflict and Public Perceptions of Government Surveillance on the Internet: An Experiment of Online Search Terms. Journal of Information Technology and Politics, Vol, 5(2), 2008
Betz, D.J., (2006). The More You Know, the Less You Understand: The Problem with Information Warfare. Journal of Strategic Studies, 29:3, 505-533.
Betz, D., (2011). Communication Breakdown: Strategic Communications and Defeat in Afghanistan. Foreign Policy Research Institute, Fall 2011.
Beutel, A.J., (2007). Radicalization and Homegrown Terrorism in Western Muslim Countries: Lessons Learned for America. Minaret of Freedom Institute, pp. 1-16
Bezunartea, P., Lopéz, J.M., & Tedesco, L., (2009). Muslims in Spain and Islamic Religious Radicalism. MICROCON Policy Working Paper 8, Brighton: MICROCON.
Bimber, B., (1990). Karl Marx and the Three Faces of Technological Determinism. Working Paper No. 11 Program in Science, Technology and Society Massachusetts Institute of Technology.
Birnbaum, M.H., (2004). Human Research and Data Collection via the Internet. Annual Review of Psychology. 2004, 55: 803-32
Bishop, J., (2006). Increasing Participation in Online Communities: A Framework for Human-Computer Interaction. Computers in Human Behaviour, 23 (2007) 1881-1893.
Bishop, J., (2003). Building Social and Economic Relationships through Avatars and Characters. Increasing Capital Revenue in Social Networking Communities. IGI Global
Blackmore, S. (1998). Imitation and the Definition of a Meme. Journal of Memetics – Evolutionary Models of Information Transmission [online]. Available at [Accessed 29 July 2011].
Bobbitt, P., (2008). Terror and Consent, Wars for the 21st Century, Allen Lane
Bobbitt, P. (Date Unknown). Terrorism and the Market State. Macalester International, Vol. 14.
Bolt, N., Betz, D. & Azari, J., (2008). Propaganda of the Deed: Understanding the Phenomenon. Whitehall Report 3-08, The Royal United Services Institute.
Booth, K., (1991), Security and Emancipation. Review of International Studies (1991), 17, 313-326.
Borland, J. (2007). A Smarter Web: New Technologies Will Make Online Search More Intelligent – and May Even Lead to a “Web 3.0.” [online]. [Accessed 23 January 2008]
Borgatti, S. (Date Unknown). Flow Processes and the Structural Importance of Nodes. Presentation to Harvard University, Boston College.
Bowles, S., Gintis, H. & Osborne, M., (2001). The Determinants of Earnings: A Behavioural Approach. Journal of Economic Literature, Vol. 39, No. 4, (Dec., 2001), pp. 1137-1176.
Boyd, D, Ellison, N, 2007. ‘Social Network Sites: Definition, History and Scholarship’, Journal of Computer-Mediated Communication, Vol. 13 No. 1.
Boyle, J., (1997). Foucault in Cyberspace: Surveillance, Sovereignty, and Hard-Wired Censors. Duke University [online]. Available at [Accessed May 2008].
Brachman, J.M., (2006). High-Tech Terror: Al-Qaeda’s Use of New Technology. The Fletcher Forum of World Affairs, Vol. 30:2 Summer 2006.
Brandt, P.T., & Freeman, J.R. (2005). Advances in Bayesian Time Series Modeling and the Study of Politics: Theory Testing, Forecasting, and Policy Analysis. Political Analysis, pp.1-36.
Briscoe, I., (2004), Dreaming of Spain: Migration and Morocco. Open Democracy, [online]. Available at [Accessed 02 August 2010].
British Council, 2005. Lord Carter of Coles Public Diplomacy Review. [online] Available at [Accessed 03 January 2011].
Brin, S., & Page, L., (1998). The Anatomy of a Large Scale Hypertextual Web Search Engine. Computer Networks and ISDN Systems 30(1-7), pp. 107-117.
Bromley, M., (2001). No News is Bad News: Radio, Television and the Public. Pearson Education Limited.
Brotóns, A., (Date Unknown). Terrorismo, Mantenimiento de la Paz y Nuevo Orden. Catedrático de Derecho Internaciónal Público y Relaciones Internacionales, Universidad Autónoma de Madrid.
Brown, R., (2002). The Contagiousness of Conflict. E.E. Schattschneider as a Theorist of the Information Society. Information, Communication and Society. 5:2 2002 258-275.
Browne, A., (2005). Threat of Islamic Extremism that Stretches Across Europe. The Times of London. [online]. Available on

Download 1.29 Mb.

Share with your friends:
1   ...   39   40   41   42   43   44   45   46   ...   62




The database is protected by copyright ©ininet.org 2024
send message

    Main page