Lawrence Peter Ampofo



Download 1.29 Mb.
Page48/62
Date19.10.2016
Size1.29 Mb.
#4199
1   ...   44   45   46   47   48   49   50   51   ...   62
[Accessed 02 October 2010].
Foucault, M., (1979). Discipline and Punish. Prentice Hall.
Foucault, M. (1980). Power/Knowledge. Harvester and Wheatheaf.
Franda, M., (2002). Internet Development and Politics in Five World Regions. Lynne Reinner.
Franz, B., (2007). Europe’s Muslim Youth: An Inquiry into the Politics of Discrimination, Relative Deprivation, and Identity Formation. Mediterranean Quarterly, Volume 18, Number 1, Winter 2007.
Garcia, R., Rueda Laffond, J., Ruiz, C. (2009). La Historia Inmediata En La Television Espanola: La Representación Del Terrorismo. The Hebrew University of Jerusalem. Vol. 2 No. 1.
García R., (2011). Alex de la Iglesia deja la Academia de Cine por su desacuerdo con la 'ley Sinde'. El País. [online] Available at < http://www.elpais.com/articulo/cultura/Alex/Iglesia/deja/Academia/Cine/desacuerdo/ley/Sinde/elpepucul/20110125elpepucul_8/Tes> [Acessed 30 January 2011].
Garapon, A., (2005). Tiene Francia una ventaja en la lucha antiterrorista? Real Instituto Elcano de Estudios Internaciónales y Estrategicas [Online]. Available at: [Accessed 30 July 2008].
Gerboles, D. (2011). Obama Venga el 11-M, El Terror Continua. Mi Punto de Vista [online]. Available at [Accessed 03 May 2011].
Gerstenfeld, P.B., Grant, D.R. & Chiang, C.P., (2003). Hate Online: A Content Analysis of Extremist Internet Sites. Analyses of Social Issues and Public Policy, Vol. 3, No. 1, 2003, pp. 29-44.
Gibson, S., (2004). Open Source Intelligence. An Intelligence Lifeline. RUSI Journal February 2004.
Giddens, A., (1984). The Constitution of Society: Outline of the Theory of Structuration. University of California Press.
Gilboa, E., (2005). The CNN Effect: The Search for a Communication Theory of International Relations. Political Communication, 22:27-44.
Gilpin, R., (2005). War Is Too Important to Be Left to Ideological Amateurs. International Relations, 2005; 19; 5.
Gíminez C.M., (2010). En Recuerdo a las Víctimas del Atentado del 11 de Marzo. [online] Available at [Accessed 01 February 2011].
Ginesta, X., & Sopena, J. (2009). Spanish Social Movements in the Digital Age: The Demonstration Against the Popular Party and the Call for the “Botellón”. American Communication Journal. Vol. 11, No. 2, Summer 2009.
Global Network Initiative. (2008). Internet Rights Protection Initiative Launches. Global Network Initiative. [online]. Available at [Accessed 01 November 2008].
Goldschmidt, E., (2005), Storming the Fences: Morocco and Europe’s Anti-Migration Policy, Middle East Report. [online]. Available at [Accessed 03 August 2010].
Goodman, A., (2008). Extremists Plotted Attacks Across Europe, Spanish Paper Says. [online] Available at [Accessed on 18 June 2011].
Goonatilake, S., (1998). Toward a Global Science: Mining Civilizational Knowledge. Indiana University Press.
Gordon S., Ford, R., (2003). Cyberterrorism? Symantec Security Response White Paper. Symantec Corporation.
Gottfredson, M., Hirschi, T., (1990). A General Theory of Crime. Stanford University Press.
Graffy, C., (2009). The Rise of Public Diplomacy 2.0. The Journal of International Security Affairs. Fall 2009, No. 17.
Granovetter, M., (1973). The Strength of Weak Ties. The American Journal of Sociology, Vol. 78, No. 6, (May 1973), pp.1360-1380
Grusin, R., (2004). Premediation. Criticism, Winter 2004, Vol. 46, No. 1, pp.17-39.
Gonzales, A.R., (2006). Remarks by Attorney General Alberto R. Gonzales at the International Institute for Strategic Studies. London England.
The Guardian (2007). The Madrid Bombings. [online] Available at [Accessed on 22 July 2011].
Guertner, G., (2007). European Views of Preemption in US National Security Strategy, Parameters, [Online]. Available at: [Accessed 14 August 2008]
Guha, S., Tang, K. & Francis, P. (2008). NOYB: Privacy in Online Social Networks. WOSN ’08, August 18, Seattle, Washington, USA.
Gurutz Jaruegi., (2006). National Identity and Political Violence in the Basque Country, European Journal of Political Research, [Online] Available at: [Accessed 27 November 2008]
Halverson, J.R., (2011). The Tariq ibn Master Narrative. Consortium for Strategic Communication. Report #1101.
Ham, S., Atkinson, R.D., (2002), Using Technology to Detect and Prevent Terrorism. Progressive Policy Initive, January 2002.
Hansen, L., (2007). The Clash of Cartoons? The Clash of Civilisations? Visual Securitization and the Danish 2006 Cartoon Crisis. 48th Annual ISA Conference Paper, Chicago, Illinois.
Hansen, L., & Nissenbaum, H. (2009). Digital Disaster, Cyber Security and the Copenhagen School. International Studies Quarterly (forthcoming).
Harris, J., (2005). The Ordering of Things: Organization in Bruno Latour. The Sociological Review, Volume 53, Issue Supplement s1, pages 163-177, October 2005.
Haythornwaite, C. (1996). Social Network Analysis: An Approach and Technique for the Study of Information Exchange. LISR 18, 323-342.
Helibroner, R., (1994) Technological Determinism Revisited in Roe Smith, M., (1994), Does Technology Drive History? MIT Press.
Hetcher, S., (2007). User-Generated Content and the Future of Copyright: Part One – Investiture of Ownership. Vanderbilt Journal. of Entertainment and Technology. Law Vol. 10:4:863.
Herman, E.S., & Chomsky, N. (1988). Manufacturing Consent, A Propaganda Model. Pantheon Books.
Hernández, L., (2007). Crímines,y Delincuencia en Internet. Laboratorio de Seguridad Informática. Centro Tecnológico Aragón.
Hirsch, M., (2004). Bernard Lewis Revisited. What if Islam Isn’t an Obstacle to Democracy in the Middle East, but the Secret to Achieving It? The Washington Monthly.
Hoffman, B., (1993). “Holy Terror”: The Implications of Terrorism Motivated by a Religious Imperative. Rand, 1993.
Hoffman, B., (2002). Rethinking Terrorism and Counterterrorism Since 9/11. Studies in Conflict and Terrorism, 25: 303-316, 2002.
Hoffman, B. (2006). Inside Terrorism. Columbia University Press.
Hofkirchner, W., (2005). Ludwig von Bertalanffy Forerunner of Evolutionary Systems Theory. ICT&S Center for Advanced Studies and Research in Information and Communication Technologies & Society, University of Salzberg, Austria, 1-6.
Hooper, J., (1986). The New Spaniards. Penguin Books.
Hope, S. (2009). Public Diplomacy and Local Staff: The Cornerstone of Long-Term Relationship Building. Public Diplomacy Magazine. Winter, 2009.
Horgan, J., (2008). Deradicalization or Disengagement? A Process in Need of Clarity and a Counterterrorism Initiative in Need of Evaluation. Perspectives on Terrorism [online]. Available at

Download 1.29 Mb.

Share with your friends:
1   ...   44   45   46   47   48   49   50   51   ...   62




The database is protected by copyright ©ininet.org 2024
send message

    Main page