Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Alternativ können Sie versuchen, selbst über Ihren lokalen Bibliothekskatalog auf das gewünschte Dokument zuzugreifen.
Bei Zugriffsproblemen kontaktieren Sie uns gern.
70 Ergebnisse
Sortierung:
World Affairs Online
World Affairs Online
World Affairs Online
World Affairs Online
In: Rand Report, R-1909-1-ARPA
World Affairs Online
In: Rand research review, Band 26, Heft 2, S. 14-19
ISSN: 1557-2897
World Affairs Online
Cover -- Title Page -- Copyright Page -- CONTENTS -- PREFACE TO THE PAPERBACK -- FOREWORD -- ACKNOWLEDGMENTS -- INTRODUCTION -- CHAPTER 1. THE GROWING THREAT OF LONE WOLF TERRORISM -- CHAPTER 2. WHO ARE THE LONE WOLVES? -- CHAPTER 3. WHY LONE WOLVES ARE SO DANGEROUS -- CHAPTER 4. WHERE ARE THE WOMEN? -- CHAPTER 5. LONE WOLF ASSASSINS -- CHAPTER 6. STRATEGIES FOR DEALING WITH LONE WOLF TERRORISM -- CHAPTER 7. UNCOVERING THE LESSONS LEARNED -- CHAPTER 8. A LOOK TOWARD THE FUTURE -- CONCLUSION -- PHOTO INSERT -- APPENDIX: DEFINING LONE WOLF TERRORISM -- NOTES -- INDEX.
World Affairs Online
In: Conflict management and peace science: the official journal of the Peace Science Society (International), Band 21, Heft 1, S. 3-15
ISSN: 1549-9219
Counterterrorism efforts in the United States focus largely on a combination of offensive actions against terrorists abroad and defense of the U.S. homeland and U.S. and allied interests worldwide. This paper provides a framework for conceiving another necessary component of the struggle, the influence component. Classic deterrence is but one influence among many. This paper recommends approaching the issue as a "system problem" in which the many different components of terrorist organizations are considered and appropriate influences applied accordingly. The influences discussed range from various forms of coercion to the competition of ideas.
In: Conflict management and peace science: CMPS ; journal of the Peace Science Society ; papers contributing to the scientific study of conflict and conflict analysis, Band 21, Heft 1, S. 3-16
ISSN: 0738-8942
In: Armed forces & society: official journal of the Inter-University Seminar on Armed Forces and Society : an interdisciplinary journal, Band 3, Heft 4, S. 575-594
ISSN: 0095-327X
World Affairs Online
In: Contemporary security policy, Band 24, Heft 2, S. 170
ISSN: 1352-3260, 0144-0381
Introduction -- A Brief History of Americans Leaving to Fight Abroad -- Diverse Reasons for Joining Jihad -- Profile of the Travelers -- Comparing Those Who Traveled Before 2012 with Those Who Traveled in 2012 or Later -- Comparing Homegrown Plotters with Travelers -- The Threat Posed by Returning Travelers -- Statistical Profile of the Combined Population of Travelers and Plotters -- Conclusions -- Appendix A: Traveler Data Set -- Appendix B: Additional Plotters Since the 2017 Analysis.
In: Occasional paper OP-390-RC (2012)
While security budgets shrink, passenger loads grow, and hostility towards security procedures increases, terrorist groups such as al Qaeda remain obsessed with attacking airplanes. In the face of these challenges and real, innovative threats, the author proposes a mechanism for conducting an independent re-examination of the strategy behind current aviation security policies and procedures--before disaster strikes