Lawrence Peter Ampofo



Download 1.29 Mb.
Page55/62
Date19.10.2016
Size1.29 Mb.
#4199
1   ...   51   52   53   54   55   56   57   58   ...   62
[Accessed 20 August 2008].
Richards, B., (2004). Terrorism and Public Relations. Public Relations Review, 30 (2004) 169-176.
Richardson, L., (2007). What Terrorists Want: Understanding the Enemy, Containing the Threat. Random House Publishing Group.
Rieselbach, L.N., (1969). The Behaviouralism Approach to the Study of Politics: An Overview. Occasional Paper No. 3. Office of Education (DHEW), Washington D.C. Bureau of Research.
Riffe, D., Lacy, S., & Fico, F., (1998). Analysing Media Messages: Using Quantitative Content Analysis in Research. Lawrence Earlbaum Associates.
Robb, J., (2007). The Coming Urban Terror: Systems Disruption, Networked Gangs and Bioweapons. City Journal, Summer 2007.
Roberts, G., 2007. Global Justice and the Future: Web 3.0 Is the Mesh, World, [Online] Available at: [Accessed November 2007].
Rodríguez, I.P. & Piella, G.C. (2008). El Enfoque Integral (Comprehensive Approach) a la gestión de crisis internacionales. Real Instituto Elcano. ARI No 115/2008.
Rodriguez, D., (2009). España Defenderá un Plan de Ciberseguridad a lo Obama en Europa. Soitu, Vida Digital. [online]. Available at [Accessed 27 October 2010].
Rodrik. D., (2007). One Economics. Many Recipes. Princeton University Press.
Rogan, H., (2006). Jihadism Online - A study of how al-Qaida and radical Islamist groups use the Internet for terrorist purposes. FORSVARETS FORSKNINGSINSTITUTT Norwegian Defence Research Establishment.
Rogers, R., (2008). The Politics of Web Space. Govcom.org.
Rogers, R. (2009). The End of the Virtual – Digital Methods. Text prepared for the Inaugural Speech, Chair, New Media & Digital Culture, University of Amsterdam 8 May 2009.
Rollins J., Wilson, C. (2007). Terrorist Capabilities for Cyberattack: Overview and Policy Issues. Congressional Research Service Report for Congress. The Library of Congress.
Rosand, E., (2010). La Lucha contra el Terrorismo y el Fomento de la Cooperación en el Norte de África: La Trascendencia Potencial de la Estrategia de la ONU contra el Terrorismo Global. Real Instituto Elcano. ARI 162/2009.
Rosendorf, N.M. (2006). Be El Caudillo’s Guest: The Franco Regime’s Quest for Rehabilitation and Dollars after World War II via the Promotion of U.S. Tourism to Spain. Diplomatic History, Vol. 30, No. 3, (June 2006).
Ross, J.C., (2004), Securitizing Migration after 11 March, Real Instituto Elcano de Estudios Internacionales y Estratégicos, Demography & Population, 2004.
Rotman, D., & Preece, J., (2010). The ‘WeTube’ in YouTube – Creating an Online Community Through Video Sharing. International Journal of Web Based Communities, Vol. 6, No. 3, 2010.
(2004). Statement of Ethical Practice for the British Sociological Association. British Sociological Association. March 2002 (Updated May 2004).
(2010). Statistical Bulletin. Internet Access 2010. Households and Individuals. Office for National Statistics. 27 August 2010.
Sageman, M., (2004). Understanding Terror Networks. University of Pennsylvania Press.
Sageman, M. (2008). The Next Generation of Terror. Foreign Policy, March/April 2008.
Sageman, M. (2008). Leaderless Jihad: Terror Networks in the Twenty-First Century. Philadelphia: University of Pennsylvania Press, 2008.
Saulatino, (2008). La Oreja de Van Gogh – 11 de Marzo. Palabras Retorcidas. [online] Available at [Accessed 01 February 2011].
Salellas, L., (2005). Delitos Informaticos, Ciberterrorismo. Hadden Security Consulting.
Salem, A., Reid, E. & Chen, H., (2006). Content Analysis of Jihadi Extremist Groups’ Videos. S. Mehrotra et al. (Eds.): ISI 2006, LNCS 3975, pp. 615 – 620, 2006.
Sanchez-Cuenca, L., (2004). La Selección de Víctimas en ETA. Revista Española de Ciencia Política. Núm. 10, Abril 2004, pp.53-79.
Sánchez, G., (2007). Periodistas en la diana. Treinta años de amenaza terrorista a los medios de comunicación españoles. Madrid, Asociación de la Prensa de Madrid, 236 págs.
Santana, J., (2009). España Lidera el Plan Europeo de CiberSeguridad en la Red. Panda Security. [online] Available to [ Accessed 27 October 2010].
Schau, H.J., & Gilly, M.C., (2003). We Are What we Post? Self-Presentation in Personal Web Space. Journal of Consumer Research. Vol. 30, December 2003.
Schlosberg, D., Zavestoski, S. & Shulman, S., (2007). Democracy and E-Rulemaking: Web-Based Technologies, Participation, and the Potential for Deliberation. Journal of Information Technology and Politics. Vol. 4 (1) 2007.
Schneider, M., (2007). You Have to Accept that Spain isn’t an Islamic Country. Café Babel. [online] Available at [Accessed 17 November 2010].
Schneider, F., Bruck, T., Meierrieks, D. (2010). The Economics of Terrorism and Counter-Terrorism: A Survey (Part II). CESifo Working Paper No. 3012. April 2010.
Symantec Corporation, (Date Unknown). What is Cybercrime? [online] Available at [Accessed 01 October 2010].
Schrum, L., (1997). Ethical Research in the Information Age: Beginning the Dialog, Computers in Human Behavior, Vol. 13, No. 2, pp. 117-125.
Schwartz, M. (2004). Acebes Afirma que el 11 de Marzo fue peor que el Golpe de Tejero. La Voz de Asturias. [online] Available at [Retrieved 24 March 2011].
Scollon, R., & Scollon, S.W. (2004). Nexus Analysis: Discourse and the Emerging Internet. London and New York: Routledge, 2004, pp.xvi-198.
Selway, L., (2006). Spanish Foreign Policy from (A)znar to (Z)apatero, Independent Study, [Online]. Available at

Download 1.29 Mb.

Share with your friends:
1   ...   51   52   53   54   55   56   57   58   ...   62




The database is protected by copyright ©ininet.org 2024
send message

    Main page