Lawrence Peter Ampofo



Download 1.29 Mb.
Page44/62
Date19.10.2016
Size1.29 Mb.
#4199
1   ...   40   41   42   43   44   45   46   47   ...   62
[Accessed on 17 November 2010].
Bruckman, A, (2002). ‘Ethical Guidelines for Research Online’ Georgia Institute of Technology College of Computing.
Burke, J., (2004). Al-Qaeda: The True Story of Radical Islam. Penguin Books.
Burke, C., (2007). Freeing Knowledge, Telling Secrets: Open Source Intelligence and Development. Bond University.
Burstein, P., (2003). The Impact of Public Opinion on Public Policy: A Review and an Agenda. Political Research Quarterly. March 2003, vol. 53, no. 1 29-40.
Burton, F., (2006). The Web of Jihad: Strategic Utility and Tactical Weakness. [online] Available at /Web_jihad_strategic_utility_and_tactical_weakness?fn=8415164985> [Accessed 16 September 2010].


Buscaglia, E., Ruiz, S., Fumarulo, S., Palma, C. (2002). Delincuencia Organizada y Terrorismo. Su Combate a Través de la Convención de Palermo.
Buzan, B., Wœver, O, de Wilde, J., (1998). Security: A New Framework for Analysis. Lynne Reinner Publishers, Inc.
(2011). Cytoscape Wiki. Basic Network Navigation. [online] Available at [Accessed 19 July 2011].
Calás, M. B. & Smircich, L., (1999), Past Postmodernism? Reflections and Tentative Directions, The Academy of Management Review, Vol 24, No. 4 (Oct., 1999)
Calavita, K., (2006). Notas de población, Volume 33, Issues 82-85, United Nations publications, 2007.
Calishain, T., & Dornfest, R., (2003). Google Hacks. Industrial-Strength Tips & Tools. O’Reilly Associates Inc.
Callon, M., (1991). Techno-Economic Networks and Irreversibility in Law, J. (ed.), A Sociology of Monsters: Essays on Power Technology, and Domination. Routledge.

Campbell, D., (1992), Writing Security. Manchester University Press.


Capurro, R., (Unknown). Angeletics – A Message Theory. Steinbeis-Transfer-Institute Information Ethics (STI-IE), Karlsruhe, Germania
Carley, K., McCulloch, I., Webb. M., (2002). Social Network Monitoring of Al Qaeda.
Carley, K.M., Reminga, J., Kamneva, N., (2003). Destabilizing Terrorist Networks. Dynamic Networks Project Paper, Carnegie Mellon University, pp. 1-6.
Castells, M., (2000), The Power of Identity WileyBlackwell 2nd Edition.
Castells, M., (2000) The Rise of the Network Society, WileyBlackwell 2nd Edition.
Castells, M., (2000). Toward a Sociology of the Network Society. Contemporary Sociology, Vol. 29, No. 5 (Sep., 2000), pp.693-699.
Castells, M., Fernandez-Ardevol, M., Qiu, J. & Sey, A. (2004). The Mobile Communication Society. A Cross-Cultural Analysis of Available Evidence on the Social Uses of Wireless Communications Technology. A research report prepared for the International Workshop on Wireless Communication Policies and Prospects: A Global Perspective, held at the Annenberg School for Communication, University of Southern California, Los Angeles, October 8th and 9th 2004.
Castells, M. & Cardoso, G., (2005). The Network Society: From Knowledge to Policy. Johns Hopkins Center for Transatlantic Relations, 2005.
Castells, M., (2007). Communication, Power and Counter-Power in the Network Society. International Journal of Communication 1 (2007), 238-266.
Cavelty, M.D., (2007). Cyber-Terror – Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate. Journal of Information Technology & Politics. Vol. 4(1) 2007.
Cavicchioli, M.I., (Date Unknown). A Period of Turbulent Change: Spanish – US Relations Since 2002. The Whitehead Journal of Diplomacy and International Relations. Pp.113-131.
Cebrowski, A.K. & Barnett, T.P.M., (Date Unknown). The American Way of War. Transformation Trends – 13 January Issue.
Celaya, F. (2009), The Terrorist Threat is being Materially and Normatively Shaped by National and Global Institutions of Law and Order: Spain and Beyond. Athena Intelligence Journal Vol. 4, No.1 January – March 2009
Cellan-Jones, R., (2009). Mapping the Afghan Elections. BBC News [online]. Available at [Accessed 18 July 2010].
Celso, A.N., (2005). The Tragedy of Al-Andalus: The Madrid Terror Attacks and the Islamization of Spanish Politics. Mediterranean Quarterly, Volume 16, Number 3, Summer 2005, pp.86-101.
Celso, A. N., (2006). Spain’s Dual Security Dilemma: Strategic Challenges of Basque and Islamic Terror during the Aznar and Zapatero Eras. Mediterranean Quarterly, Volume 17, Number 4, Fall 2006, pp.121-141.
Celso, A.N., (2008). Al Qaeda in the Maghreb: The “Newest” Front in the War on Terror. Mediterranean Quarterly 19:1
Celso, A.N., (2009). Spanish post-3/11 Antiterror Policy: Zapatero’s Tyranny of Circumstance and the Dashing of Good Intentions. Mediterranean Quarterly. 20(2): 11-25.
Celso, A.N., (2010). ‘Phase IV’ Operations in the War on Terror: Comparing Iraq and Afghanistan. Foreign Policy Institute, Spring 2010, 184-199.
Centre UNESCO de Catalunya, (2008). Security, Living Together and Cultural Diversity. Generaliat de Catalunya. Departament d’Interior, Relacions Institucionals I Participació.
Cesari, J., (2009). The Securitisation of Islam in Europe. Challenge Liberty and Security. CEPS Challenge Programme.
Chakrabarti, P.D., (1976). Behaviouralism: A Challenge to Marxism? Social Scientist, Vol. 4, No. 9 (Apr., 1976), pp.55-59.
Cha, V.D., (2000). Globalization and the Study of International Security. Journal of Peace Research, Vol. 37, No. 3, (May 2000), pp. 391-403.
Chadwick, A. (2006). Internet Politics: States, Citizens, and New Communication Technologies. Oxford University Press.
Chaintreau, A., Fraignaud, P. & Lebhar, E. (2008). Opportunistic Spatial Gossip over Mobile Social Networks. WOSN’08, August 18, 2008, Seattle, Washington, USA.
Chamorro, E.F. & Villalba, Á.F.S. (2010). Cyber Security in Spain: 
A Proposal for its Management (ARI). Real Instituto Elcano. ARI 102/2010.
Chandler, D. (1995). Technological or Media Determinism [online]. Available at

Download 1.29 Mb.

Share with your friends:
1   ...   40   41   42   43   44   45   46   47   ...   62




The database is protected by copyright ©ininet.org 2024
send message

    Main page