Lawrence Peter Ampofo



Download 1.29 Mb.
Page46/62
Date19.10.2016
Size1.29 Mb.
#4199
1   ...   42   43   44   45   46   47   48   49   ...   62
[Accessed 15 November 2010].
Crenshaw, M., (1981). The Causes of Terrorism. Comparative Politics, Vol. 13, No. 4, (Jul 1981), pp. 379-399.
Cronauer, K., (2001). Activism and the Internet. Uses of Electronic Mailing Lists by Social Activists. A Review of Crucial Issues, Research Findings, and Open Questions. University of British Columbia.
Cronin, A.K. (2003). Behind The Curve. Globalization and International Terrorism. International Security, Vol. 27, No. 3 (Winter 2002/03), pp.30-58.
Cronin, A.K., (Date Unknown). Submission and Consent: Law, War, and the Search for New Strategic Paradigms. Syracuse Journal of International Language and Communication. Vol. 37:23.
Crossley N., Prell, C. & Scott, J., (2009). Social Network Analysis: Introduction to Special Edition. Methodological Innovations Online 4 (2009) 1-7.
Croushore, D., (2008). Working Paper No. 08-4 Frontiers of Real-Time Data Analysis, Research Department, Federal Reserve Bank of Philadelphia.
Crossley, N., Prell, C., & Scott, J. (2009). Social Network Analysis: Introduction to the Special Edition. Methodological Innovations Online, 4, 1-7.
Csányi, V., (1998). Evolutionary Systems and Society. A General Theory. Duke University Press.
Cummings, M.P., & Huskamp, J.C., (2005). New Horizons. Grid Computing. Educause Review. November / December 2005.
Curto, G. et al. (2007). Informe Sobre La Situacion De Telemadrid Tratamiento Informativo Y Contenidos En Telemadrid. Fundación Sindical de Estudios
Dahl, R.A., (1961). The Behavioural Approach in Political Science: Epitaph for a Monument to a Successful Protest. The American Political Science Review, Vol. 55, No. 4, (Dec., 1961), pp.763-772.
Dahlgren, P., (2005). The Internet, Public Spheres, and Political Communication: Dispersion and Deliberation. Political Communication, 22:147-162.
Davis, R., (1999). The Web of Politics. Oxford University Press.
Davis, B., (2006). Ending The Cyber Jihad: Combating Terrorist Exploitation Of The Internet With The Rule Of Law And Improved Tools For Cyber Governance. The Catholic University of America, Columbus School of Law.
Davis, Paul, et al. (2009). ‘Representing Social-Science Knowledge Analytically’, in ‘Social Science for Counterterrorism: Putting the Pieces Together.’ RAND Monograph.
De Kerckhove, D. (1997). Connected Intelligence: The Arrival of the Web Society. Kogan Page.
De la Fuente, J.V. (2003). Terrorismo de E.T.A. The Matrix 666. [online] Available at [Accessed 24 March 2011].
De Laat, M., (2000). Network and Content Analysis in an Online Community Discourse, University of Nijmegen, Department of Education, pp. 1-8.
De La Corte Ibáñez, L., (2007). Algunas Claves psicosociales Para el Análisis y la Explicación de los Fenómenos Terroristas. Athena Paper, Vol. 2, No. 3, Artículo 3/4.
De La Corte, L., (2007). Explaining Terrorism: A Psychosocial Approach. Perspectives on Terrorism [online]. Available at [Accessed 25 January 2012].
De La Corte, L., Kruglanski, A., De Miguel, J., Sabucedo, J. & Díaz, D. (2008). Seven Psychosocial Principles for Explaining Terrorism. Psychology in Spain, 2008, Vol. 12, No. 1, 70-80.
Dean, M.M., (1999). Governmentality: Power and Rule in Modern Society, Sage Publications Ltd
Dearlove, R., & Quiggin, T. (2006). Contemporary Terrorism and Intelligence. IDSS Commentaries (78/2006).
Del Pino, E., Colino, C., (2010), National and Subnational Democracy in Spain: History, Models and Challenges. Instituto de Politícas Y Bienes Públicos, CCHS – CSIC
Denning., D. & Baugh, W.E. (2000) in Thomas, D. and Loader, B. (eds). Cybercrime: Law Enforcement and Surveillance in the Information Age. Routledge.
Denning, D., (2001). Is Cyberterrorism Next? Wired.com [online]. Available at [Accessed on 01 November 2007].
Denning, D., (2000). Cyberterroism. Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives.
Denning, D. (2002). Activism, Hacktivism and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy, Nautilus.
Denning, D. (2001). Activism, Hacktivism, And Cyberterrorism: The Internet As A Tool For Influencing Foreign Policy in Networks and Netwars: The Future of Terror, Crime, and Militancy. RAND.
Dery, M., (1993). Flame Wars: The Discourse of Cyberculture. Duke University Press.
Desiertos Lejanos (2007). Las Tramas Superpuestas de 11-M. Desiertos Lejanos [online]. Available at [Accessed 01 February 2011].
Devost, M., Houghton, B.K., & Pollard, N.A. (1997). Information Terrorism: Political Violence in the Information Age. Terrorism and Political Violence, 9, 72-83.
Diaz, A., (2008). La adaptación de los servicios de inteligencia al terrorismo internacional, Real Instituto Elcano de Estudios Internaciónales y Estrategicas [Online]. Available at [Accessed 30 July 2008]
DiGiacomo, S.M., (2004). Terrorism and Spanish Democracy. Anthropology News. Fundació Sant Joan de Déu, Barcelona. University of Massachusetts at Amherst.

Directives for Human Experimentation, (1949). The Nuremburg Code, Office of Human Subjects Research [online]. Available at [Accessed 13 August 2010].


Domínguez, F., (2008). Operación Nova. El 11-M fue la Bofetada que nos Enseñó la Realidad del Terrorismo Internacional. La Vanguardia. [online] Available at [Accessed 08 October 2008].
Douglass, W.A., & Zulaika, J. (1990). On the Interpretation of Terrorist Violence: ETA and the Basque Political Process. Comparative Studies in Society and History, Vol. 32, No. 2 (Apr., 1990), pp. 238-257
Drake, D. (2010). 3 Blogging Principles: Simple Yet Important. ComMetrics [online]. Available at

Download 1.29 Mb.

Share with your friends:
1   ...   42   43   44   45   46   47   48   49   ...   62




The database is protected by copyright ©ininet.org 2024
send message

    Main page