Lawrence Peter Ampofo



Download 1.29 Mb.
Page50/62
Date19.10.2016
Size1.29 Mb.
#4199
1   ...   46   47   48   49   50   51   52   53   ...   62
[Accessed 15 July 2008].
Jordán J., Torres, M., (2007). Internet y actividades terroristas: el caso del 11-M. El profesional de la información, 2007, marzo-abril, v. 16, n. 2, pp. 123-130
Jordán, J., Torres, M., (2007). Nueva Amenaza Indirecta Contra Espana. Jihad Monitor Special Report.
Jordán, J., (2008). Las Nuevas Insurgencias. Análisis de un Fenómeno Estratégico Emergente. Anuario de Derecho Internacional, Vol. XXIV.
Jordán, J., (2009). Procesos de Radicalización Yihadista en España. Análisis Sociopolítico en Tres Niveles. Revista de Psicología Social, 2009, 24 (2), 197-216
Jordán, J., (2009). Politicas De Prevencion De La Radicalizacion Violenta En Europa: Elementos De Interes Para Espana. Revista Electrónica de Ciencia Penal y Criminología
Jutlia, M. (2009). Critical Approaches to Security: Securitization. University of Helsinki.
Jones, S., (1999). Cyberpower: The Culture and Politics of Cyberspace and the Internet. Routledge.
Kaldor, M., (2006). New & Old Wars. Cambridge, Polity.
Kanayama, H., Nasukawa, T., and Watanabe, H. (2004). Deeper Sentiment Analysis Using Machine Translation. Tokyo Research Laboratory, IBM Japan.
Kaplan, A.M. & Haenlein, M., (2010). Users of the World, Unite! The Challenges and Opportunities of Social Media. Business Horizons (2010), 53, 59-68.
Karatzogianni, A., (2008). Cyber-Conflict and Global Politics. Routledge.
Katona, Z., Zubcseck, P.P., & Sarvary, M. (2010). Network Effects and Personal Influences: The Diffusion of an Online Social Network. Haas School of Business.
Kearns, I., & Gude, K. (2008). The New Front Line: Security in a Changing World. IPPR Commission on National Security, Baseline Paper.
Keen, P., (2010). ‘Increasing Importance of Real-Time Search’, Keenpath. [online] [Accessed 13 July 2010].
Kellogg, D., (2010). ‘iPhone Vs Android.’ Nielsenwire. [online] [Accessed 13 August 2010].
King, G., (2009). The Changing Evidence Base of Social Science Research in Chapter 38, Pp. 91–93, Gary King, Kay Scholzman, and Norman Nie eds., The Future of Political Science: 100 Perspectives. New York: Routledge Press, 2009.
Kim, D.Y. & Chen, Z. (2010). Effects of Narrative vs. Non-Narrative Message on Attitudes and Memory: Comparison of Implicit and Explicit Attitude Measures. International CHRIE Conference-Refereed Track. Paper 9.
Kephart, J., (2006). Immigration and Terrorism: Moving Beyond the 9/11 Staff Report on Terrorist Travel. The Quarterly Journal, Fall 2006.
King, G., Lehman Schlozman, K., & Nie, N.H., (2009). The Future of Political Science: 100 Perspectives. Routeledge, 2009.
Kirkpatrick, M., (2010). Explaining the Real-Time Web in 100 Words or Less, Read Write Web. [online] [Accessed 13 August 2010].
Kjeldskov, J, Graham, C., (2003). ‘A Review of Mobile HCI Research Methods’, Mobile HCI 2003 Conference Paper.
Knight, Alan and Kasun Ubayasiri (2003), eTerror : Journalism, Terrorism and the Internet [online]. Available at [Accessed 12 May 2008].
Knight, C. & Murphy, M. & Mousseau, M., (2003). Correspondence: The Sources of Terrorism, International Security, Vol. 28, No. 2
Kranzberg, M. (1959) Technology and History: “Kranzberg’s Laws”, John Hopkins University Press
Krazit, T., (2010). ‘Making the Real-Time Web Relevant’, CNET. [online] [Accessed 13 August 2010].
Krebs, V.E., (2002). Mapping Networks of Terrorist Cells. Connections. 24 (3): 43-52.
Krishnamurthy, B., Gill, P., & Arlitt, M. (2008). A Few Chirps about Twitter. WOSN’08, August 18, 2008, Seattle, Washington, USA.
Kolari, P., Finin, T., & Joshi, A. (2006). SVMs for the Blogosphere: Blog Identification and Splog Detection. American Association for Artificial Intelligence.
Kozinets, R.V., (2002). The Field Behind the Screen: Using Netnography for Marketing Research in Online Communities. Journal of Marketing Research, Vol. 39, No.1, (Feb., 2002), pp.61-72.
Kozinets, R.V., (2010). Netnography: Doing Ethnographic Research Online. SAGE Publications Ltd.
Kozinets, R.V., (2010). Netnography: The Marketer’s Secret Weapon. How Social Media Understanding Drives Innovation. Netbase Solutions, Inc.
Kranzberg, M. (1986). Technology and History: “Kranzberg’s Laws”. Technology and Culture, Vol. 27, No.3 (Jul., 1986), pp.544-560.
Kratochwil, F., & Ruggie, J.G., (1986). International Organization: A State of the Art on an Art of the State. International Organization. 40, 4, Autumn 1986.
Krebs, V.E., (2002). Mapping Networks of Terrorist Cells. Connections, 25(3): 43-52.
Kurzweil, R., (2006). The Third Generation Web Is Coming, Kurzweil AI Net [Online], Available at: [Accessed 28 March 2009].
de Laat, M., (2002). Network and Content Analysis in an Online Community Discourse. In: G. Stahl (Ed.), Proceedings of Computer Support for Collaborative Learning (CSCL) 2002 Conference, Jan. 7-11, Boulder, CO. Mahwah, NJ: Lawrence Erlbaum, 625-626, [Accessed November 2007].
La Porte, T. (2011). The Power of the European Union in Global Governance: A Proposal for a New Public Diplomacy. CPD Perspectives on Public Diplomacy. Paper 1, 2011.
La Rue, F. (2011). Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression. United Nations General Assembly, Human Rights Council. A/HRC/17/27
Laciner, S., 2006. The West and Terrorism: PKK as a Priveliged Terrorist Organisation, The Journal of Turkish Weekly, [Online] Available at:

Download 1.29 Mb.

Share with your friends:
1   ...   46   47   48   49   50   51   52   53   ...   62




The database is protected by copyright ©ininet.org 2024
send message

    Main page