Academic Journals Database
Disseminating quality controlled scientific knowledge

Journal of Strategic Security

ISSN: 1944--0464
Publisher: Henley-Putnam University


ADD TO MY LIST
 
City of Gold, City of Slaves: Slavery and Indentured Servitude in Dubai

Author(s): Nicholas Cooper
Volume: 6
Issue: Extra
Year: 2013
Critical Thinking Instruction in Academia: What can the U.S. Intelligence Community Expect?

Author(s): Michael W. Collier
Volume: 6
Issue: Extra
Year: 2013
The Peacekeeping Information at UN Level

Author(s): Tiziano Diamanti
Volume: 6
Issue: Extra
Year: 2013
Training Intelligence Producers and Consumers for the Future: The Dutch Approach

Author(s): Bob de Graaf
Volume: 6
Issue: Extra
Year: 2013
Teaching the Intelligence Process: The Killing of Bin Laden as a Case Study

Author(s): Keith Cozine
Volume: 6
Issue: Extra
Year: 2013
Lessons Learned from Intelligence Internships from Three Midwest Universities

Author(s): Chris Martin | Chris Quillen | Tim Shaw
Volume: 6
Issue: Extra
Year: 2013
The Threat of Domestic Bioterrorism: Fact or Fiction

Author(s): Stacy Langston
Volume: 6
Issue: Extra
Year: 2013
Planes, Plans, Plots: How They Found the Missiles

Author(s): David M. Keithly
Volume: 6
Issue: Extra
Year: 2013
The Role of Culture in Intelligence Reform

Author(s): Satgin S. Hamrah
Volume: 6
Issue: Extra
Year: 2013
Generating Effective Patrol Strategies to Enhance U.S. Border Security

Author(s): Eric Gutierrez | Jonathan Juett | Christopher Kiekintveld
Volume: 6
Issue: Extra
Year: 2013
Propaganda in Mexico’s Drug War

Author(s): America Y. Guevara
Volume: 6
Issue: Extra
Year: 2013
National Intelligence University: Certificate of Strategic Warning

Author(s): Joseph S. Gordon
Volume: 6
Issue: Extra
Year: 2013
The Future of Intelligence Studies

Author(s): Anthony Glees
Volume: 6
Issue: Extra
Year: 2013
Role of Neuro-Psychological Studies in Intelligence Education

Author(s): Harry I. Nimon
Volume: 6
Issue: Extra
Year: 2013
Multilateral Intelligence Collaboration and International Oversight

Author(s): Janine McGruddy
Volume: 6
Issue: Extra
Year: 2013
The Portable Sensor System: Addressing the Recognition Gap in Modern Surveillance Systems

Author(s): Brandon C. Sanders
Volume: 6
Issue: Extra
Year: 2013
Improving the Quality of Analysis in Fusion Centers: Making the Most of the Nation’s Investment

Author(s): Katherine Hibbs Pherson | Roy A. Sullivan Jr.
Volume: 6
Issue: Extra
Year: 2013
Red Flags and Black Markets: Trends in Financial Crime and the Global Banking Response

Author(s): Barry Peterson
Volume: 6
Issue: Extra
Year: 2013
A Board Game to Teach the Rudiments of Intelligence in an Airport Context

Author(s): Arnaud Palisson
Volume: 6
Issue: Extra
Year: 2013
The Method to our Madness: Learning by Doing in a Criminal Intelligence Course

Author(s): H. Dale Nute | John Andrews
Volume: 6
Issue: Extra
Year: 2013
Risky Business: The Long Term Impacts of the Obama Administration’s Pacific Pivot

Author(s): Jacob Wellman
Volume: 6
Issue: Extra
Year: 2013
Innovation in the Classroom: The JMU Experience...So Far

Author(s): Timothy Walton
Volume: 6
Issue: Extra
Year: 2013
Forecasting the Failed States Index with an Automated Trader in a Combinatorial Market

Author(s): Anamaria Berea | Charles R. Twardy | Daniel T. Maxwell
Volume: 6
Issue: Extra
Year: 2013
OSINT, New Technologies, Education: Expanding Opportunities and Threats. A New Paradigm

Author(s): Libor Benes
Volume: 6
Issue: Extra
Year: 2013
Targeting a Female Audience: American Muslim Women’s Perceptions of al-Qaida Propaganda

Author(s): Esther Solis Al-Tabaa
Volume: 6
Issue: Extra
Year: 2013
Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism

Author(s): Gary Adkins
Volume: 6
Issue: Extra
Year: 2013
Radicalization and the Use of Social Media

Author(s): Robin Thompson
Volume: 4
Issue: 4
Year: 2011
Gangs, Terrorism, and Radicalization

Author(s): Scott Decker | David Pyrooz
Volume: 4
Issue: 4
Year: 2011
Four Lessons from the Study of Fundamentalism and Psychology of Religion

Author(s): Sara Savage
Volume: 4
Issue: 4
Year: 2011
Radicalism within the Context of Social Movements: Processes and Types

Author(s): Remy Cross | David A. Snow
Volume: 4
Issue: 4
Year: 2011
Radical Islamism and Migrant Integration in Denmark: An Empirical Inquiry

Author(s): Dr. Marco Goli | Dr. Shahamak Rezaei
Volume: 4
Issue: 4
Year: 2011
Disarming Youth Combatants: Mitigating Youth Radicalization and Violent Extremism

Author(s): Alpaslan Özerdem | Sukanya Podder
Volume: 4
Issue: 4
Year: 2011
Radicalization into Violent Extremism I: A Review of Social Science Theories

Author(s): Randy Borum
Volume: 4
Issue: 4
Year: 2011
International Security Strategy and Global Population Aging

Author(s): Christian Leuprecht
Volume: 3
Issue: 4
Year: 2010
The Security Impact of Oil Nationalization: Alternate Futures Scenarios

Author(s): Peter Johnston
Volume: 3
Issue: 4
Year: 2010
Operation Opera: an Ambiguous Success

Author(s): Joshua Kirschenbaum
Volume: 3
Issue: 4
Year: 2010
Book Reviews

Author(s): Edward J. Hagerty | David B. Gray | Edward M. Roche | Mark Roberts
Volume: 3
Issue: 4
Year: 2010
Devolving Jihadism

Author(s): Aaron Rosler
Volume: 3
Issue: 4
Year: 2010
Rethinking Radicalization

Author(s): Randy Borum
Volume: 4
Issue: 4
Year: 2011
Revisiting Downs' Issue-Attention Cycle: International Terrorism and U.S. Public Opinion

Author(s): Dr. Karen K. Petersen
Volume: 2
Issue: 4
Year: 2009
Islamist Distortions: Hizb ut- Tahrir a Breeding Ground for Al- Qaida Recruitment

Author(s): Krishna Mungur
Volume: 2
Issue: 4
Year: 2009
Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

Author(s): Major Richard Hughbank
Volume: 2
Issue: 4
Year: 2009
The Tangled Web of Taliban and Associated Movements

Author(s): Greg Smith
Volume: 2
Issue: 4
Year: 2009
Reviving the United States' Commitment to Pakistan and Afghanistan

Author(s): Dr. Steve Young | Dr. Imdad Hussain Sahito
Volume: 2
Issue: 4
Year: 2009
Book Reviews

Author(s): Christine E. Williamson | Ed Urie | Michael Savasta | Robin L. Thompson | Edward M. Roche | Steven O'Hern | Richard J. Kilroy, Jr
Volume: 2
Issue: 4
Year: 2009
Extinguishing the Torch of Terror: The Threat of Terrorism and the 2010 Olympics

Author(s): Serge E. Vidalis
Volume: 2
Issue: 4
Year: 2009
Book Reviews - Counterintelligence Theory and Practice. By Hank Prunckun

Author(s): James Hess Ph.D.
Volume: 6
Issue: 3
Year: 2013
Efficacy of Modified Cognitive Interviewing, Compared to Human Judgments in Detecting Deception Related to Bio-threat Activities

Author(s): Dr. Charles A. Morgan | Dr. Yaron G. Rabinowitz | Deborah Hilts | Craig E. Weller | Dr. Vladimir Coric
Volume: 6
Issue: 3
Year: 2013
The Lockwood Analytical Method for Prediction within a Probabilistic Framework

Author(s): Jai Singh
Volume: 6
Issue: 3
Year: 2013
Thinking in 140 Characters: The Internet, Neuroplasticity, and Intelligence Analysis

Author(s): Michael Landon-Murray | Ian Anderson
Volume: 6
Issue: 3
Year: 2013
Matching Intelligence Teaching Methods with Different Learners' Needs

Author(s): David L. Blenkhorn | Craig S. Fleisher
Volume: 6
Issue: 3
Year: 2013
The Five Habits of the Master Thinker

Author(s): Randolph H. Pherson
Volume: 6
Issue: 3
Year: 2013
Occam’s Follies: Real and Imagined Biases Facing Intelligence Studies

Author(s): Matthew Crosston
Volume: 6
Issue: 3
Year: 2013
Amateur Hour? Experience and Faculty Qualifications in U.S. Intelligence Courses

Author(s): Jonathan Smith
Volume: 6
Issue: 3
Year: 2013
Evaluating and Improving Online Intelligence Courses

Author(s): Dr. Alexandra Luce
Volume: 6
Issue: 3
Year: 2013
Buy Off and Buy In: Flipping the FARC

Author(s): Joel Day
Volume: 4
Issue: 3
Year: 2011
Mitigating the Exploitation of U.S. Borders by Jihadists and Criminal Organizations

Author(s): Todd Steinmetz
Volume: 4
Issue: 3
Year: 2011
Extraordinary Rendition and U.S. Counterterrorism Policy

Author(s): Mark J. Murray
Volume: 4
Issue: 3
Year: 2011
Hizbollah–Syrian Intelligence Affairs: A Marriage of Convenience

Author(s): Carl Anthony Wege
Volume: 4
Issue: 3
Year: 2011
Eriksonian Identity Theory in Counterterrorism

Author(s): Cally O'Brien
Volume: 3
Issue: 3
Year: 2010
Conceptualizing Terrorist Violence and Suicide Bombing

Author(s): Murad Ismayilov
Volume: 3
Issue: 3
Year: 2010
Understanding the Appeal of the Taliban in Pakistan

Author(s): Syed Manzar Abbas Zaidi
Volume: 3
Issue: 3
Year: 2010
Book Reviews

Author(s): Edward M. Roche | John Coale | Keely M. Fahoum | Leland Erickson | Mark J. Roberts | Millard E. Moon
Volume: 3
Issue: 3
Year: 2010
Political Terrorism: An Historical Case Study of the Italian Red Brigade

Author(s): Major Victor H. Sundquist
Volume: 3
Issue: 3
Year: 2010
Arctic Energy Resources: Security and Environmental Implications

Author(s): Peter Johnston
Volume: 5
Issue: 3
Year: 2012
The Strategic Implications of China's Rare Earths Policy

Author(s): Shane Bilsborough
Volume: 5
Issue: 3
Year: 2012
Book Reviews - SAS Warlord: Shoot to Kill. By Tom Siegriste

Author(s): Edward J. Hagerty, Ph.D.
Volume: 5
Issue: 3
Year: 2012
European Strategies for Energy Security in the Natural Gas Market

Author(s): Boyka Stefanova
Volume: 5
Issue: 3
Year: 2012
The 2011 MENA Revolutions: A Study in U.S. Energy (In)Security

Author(s): Jessie Rumsey
Volume: 5
Issue: 3
Year: 2012
Decision Support for Countering Terrorist Threats against Transportation Networks

Author(s): Dr. Richard Adler | Jeff Fuller
Volume: 2
Issue: 3
Year: 2009
What Price Security?

Author(s): Donald C. Masters
Volume: 2
Issue: 3
Year: 2009
Keeping our Campuses and Communities Safe

Author(s): Ronald Goodman
Volume: 2
Issue: 3
Year: 2009
The Tipping Point: Biological Terrorism

Author(s): Scott Cary
Volume: 2
Issue: 3
Year: 2009
Countering the Somali Pirates: Harmonizing the International Response

Author(s): Richard Weitz
Volume: 2
Issue: 3
Year: 2009
Book Reviews

Author(s): J Kelly Stewart | Mark J Roberts | Jeff Ahn | Lloyd H. Hoffman | Donald J. Goldstein
Volume: 2
Issue: 3
Year: 2009
START: Overcoming Remaining Challenges

Author(s): Elizabeth Zolotukhina
Volume: 2
Issue: 3
Year: 2009
Lessons from Japan: Resilience after Tokyo and Fukushima

Author(s): Michelle L. Spencer
Volume: 6
Issue: 2
Year: 2013
Disaster, Resilience and Security in Global Cities

Author(s): Tim Prior | Florian Roth
Volume: 6
Issue: 2
Year: 2013
DigiNotar: Dissecting the First Dutch Digital Disaster

Author(s): Nicole S. van der Meulen
Volume: 6
Issue: 2
Year: 2013
Emerging Media Crisis Value Model: A Comparison of Relevant, Timely Message Strategies for Emergency Events

Author(s): Sabrina Page | Karen Freberg | Kristin Saling
Volume: 6
Issue: 2
Year: 2013
Achieving Resilience in Disaster Management: The Role of Public-Private Partnerships

Author(s): Nathan E. Busch | Austen D. Givens
Volume: 6
Issue: 2
Year: 2013
Book Reviews - Cartel: The Coming Invasion of Mexico's Drug Wars. By Sylvia Longmire

Author(s): Clifford A. Kiracofe Jr.,
Volume: 5
Issue: 2
Year: 2012
Libya and Resolution 1973: The Law of Politics

Author(s): Monica Naime
Volume: 5
Issue: 2
Year: 2012
Learning from Libya, Acting in Syria

Author(s): Caitlin A. Buckley
Volume: 5
Issue: 2
Year: 2012
War without Violence: Leveraging the Arab Spring to Win the War on Terrorism

Author(s): Pat Proctor
Volume: 5
Issue: 2
Year: 2012
The Impact of the Arab Spring on Islamist Strategies

Author(s): Ioana E. Matesan
Volume: 5
Issue: 2
Year: 2012
The Iron Fist vs. the Microchip

Author(s): Elizabeth I. Bryant
Volume: 5
Issue: 2
Year: 2012
Ballistic Missile Defense: New Plans, Old Challenges

Author(s): Elizabeth Zolotukhina
Volume: 3
Issue: 2
Year: 2010
U.S. Response to Terrorism: A Strategic Analysis of the Afghanistan Campaign

Author(s): Valentina Tadde
Volume: 3
Issue: 2
Year: 2010
Indian Involvement in Afghanistan in the Context of the South Asian Security System

Author(s): Melanie Hanif
Volume: 3
Issue: 2
Year: 2010
The Multiple Faces of Effective Grand Strategy

Author(s): Bryan N. Groves
Volume: 3
Issue: 2
Year: 2010
The Weakest Link: The Risks Associated with Social Networking Website

Author(s): Yosef Lehrman
Volume: 3
Issue: 2
Year: 2010
Small to Mid-Size Sporting Events: Are We Prepared to Recover from an Attack?

Author(s): Brian M. Harrell | Konrad Crockford | Pierre Boisrond | Sarah Tharp-Hernandez | Suzanne Parker
Volume: 3
Issue: 2
Year: 2010
North Korea and Support to Terrorism: An Evolving History

Author(s): Bruce E. Bechtol, Jr.
Volume: 3
Issue: 2
Year: 2010
Book Reviews

Author(s): Edward J. Hagerty | Daniel Masters | Mark J. Roberts | Leland Ericson
Volume: 3
Issue: 2
Year: 2010
Book Reviews - The New Muslim Brotherhood in the West. By Lorenzo Vidino.

Author(s): Sheldon Greaves
Volume: 4
Issue: 2
Year: 2011
Book Reviews - Obama's Wars. By Bob Woodward.

Author(s): Richard J. Kilroy, Jr.
Volume: 4
Issue: 2
Year: 2011
Book Reviews - Information Operations Matters: Best Practices. By Leigh Armistead.

Author(s): Robin L. Thompson
Volume: 4
Issue: 2
Year: 2011
A Relationship on the Rocks: Industry-Government Partnership for Cyber Defense

Author(s): Larry Clinton
Volume: 4
Issue: 2
Year: 2011
Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy

Author(s): Audrey Guinchard
Volume: 4
Issue: 2
Year: 2011
The Science of Mission Assurance

Author(s): Kamal Jabbour | Sarah Muccio
Volume: 4
Issue: 2
Year: 2011
Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses

Author(s): Stephen Herzog
Volume: 4
Issue: 2
Year: 2011
Modeling Human Behavior to Anticipate Insider Attacks

Author(s): Frank L Greitzer | Ryan E Hohimer
Volume: 4
Issue: 2
Year: 2011
China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

Author(s): Magnus Hjortdal
Volume: 4
Issue: 2
Year: 2011
The Importance of Intelligence in Combating a Modern Insurgency

Author(s): Kevin Reamer
Volume: 2
Issue: 2
Year: 2009
Al-Qaeda in the Lands of the Islamic Maghreb

Author(s): Gregory A. Smith
Volume: 2
Issue: 2
Year: 2009
Targeted Killing: Self-Defense, Preemption, and the War on Terrorism

Author(s): Thomas Byron Hunter
Volume: 2
Issue: 2
Year: 2009
Fragility: The Next Wave in Critical Infrastructure Protection

Author(s): Allan McDougall
Volume: 2
Issue: 2
Year: 2009
Film Reviews

Author(s): Bart Bechtel
Volume: 2
Issue: 2
Year: 2009
Book Reviews

Author(s): Edward J. Hagerty | Ed Urie
Volume: 2
Issue: 2
Year: 2009
A Systems-Based Approach to Intelligence Reform

Author(s): Austen Givens
Volume: 5
Issue: 1
Year: 2012
Policy Intervention in FATA: Why Discourse Matters

Author(s): Nazya Fiaz
Volume: 5
Issue: 1
Year: 2012
Establishing Cyber Warfare Doctrine

Author(s): Andrew M. Colarik | Lech Janczewski
Volume: 5
Issue: 1
Year: 2012
Deterring and Dissuading Nuclear Terrorism

Author(s): John J. Klein
Volume: 5
Issue: 1
Year: 2012
Ten Years of GWOT, the Failure of Democratization, and the Fallacy of

Author(s): David Oakley | Pat Proctor
Volume: 5
Issue: 1
Year: 2012
Strategic Asymmetric Deception and Its Role in the Current Threat Environment

Author(s): Seth A. Gulsby
Volume: 3
Issue: 1
Year: 2010
Toward a New Trilateral Strategic Security Relationship: United States, Canada, and Mexico

Author(s): Richard J. Kilroy, Jr. | Abelardo Rodríguez Sumano | Todd S. Hataley
Volume: 3
Issue: 1
Year: 2010
Variance, Violence, and Democracy: A Basic Microeconomic Model of Terrorism

Author(s): John A. Sautter
Volume: 3
Issue: 1
Year: 2010
Intelligence and Its Role in Protecting Against Terrorism

Author(s): Richard Hughbank | Don Githens
Volume: 3
Issue: 1
Year: 2010
Global Risk of Nuclear Terrorism

Author(s): Emily Diez | Caroline Zaw-Mon | Terrance Clark
Volume: 3
Issue: 1
Year: 2010
Geographic Trajectories of Al-Qaida and Taliban Terrorist Groups in Pakistan

Author(s): Syed Manzar Abbas Zaidi
Volume: 3
Issue: 1
Year: 2010
Book Reviews

Author(s): Timothy Hsia | Sheldon Greaves | Donald J. Goldstein
Volume: 3
Issue: 1
Year: 2010
New START: The Contentious Road to Ratification

Author(s): Elizabeth Zolotukhina
Volume: 4
Issue: 1
Year: 2011
Alternative Threat Methodology

Author(s): Charles B. King III
Volume: 4
Issue: 1
Year: 2011
The Nuclear (and the) Holocaust: Israel, Iran, and the Shadows of Auschwitz

Author(s): Shmuel Nili
Volume: 4
Issue: 1
Year: 2011
The Financial Arm Of The FARC: A Threat Finance Perspective

Author(s): Thomas Cook
Volume: 4
Issue: 1
Year: 2011
Resetting U.S.-Turkish Relations: Charting a New Way Forward

Author(s): Aaron Stein
Volume: 4
Issue: 1
Year: 2011
Book Reviews

Author(s): Matthew D. Simmons | Mark Roberts | Millard E. Moon | Edward M. Roche
Volume: 4
Issue: 1
Year: 2011
Teaching Bayesian Statistics To Intelligence Analysts: Lessons Learned

Author(s): Kristan J. Wheaton | Jennifer Lee | Hemangni Deshmukh
Volume: 2
Issue: 1
Year: 2009
Containment Revived: An Alternative Way to Cope With Terrorism

Author(s): Dr. Andreas M. Bock, Ph.D.
Volume: 2
Issue: 1
Year: 2009
Fighting Piracy: Experiences in Southeast Asia and off the Horn of Africa

Author(s): Dr. Robert M. Farley, Ph.D. | Yoav Gortzak
Volume: 2
Issue: 1
Year: 2009
The Impact of Psychological-Cultural Factors on Concepts of Fighting Terrorism

Author(s): Sybille Reinke de Buitrago
Volume: 2
Issue: 1
Year: 2009
Research Note: Using the ITERATE and DOTS Databases

Author(s): Peter A Flemming | Edward Mickolus | Todd Sandler
Volume: 1
Issue: 1
Year: 2008
Short Takes: Intelligence-Service Psychology: A German Perspective

Author(s): Dr. Sven Max Litzcke | Dr. Helmut Müller-Enbergs
Volume: 1
Issue: 1
Year: 2008
Redefining Terrorism: Why Mexican Drug Trafficking is More than Just Organized Crime

Author(s): Sylvia M. Longmire | Lt. John P. Longmire
Volume: 1
Issue: 1
Year: 2008
ICWorld: An MMOG-Based Approach to Analysis

Author(s): Kimberly Gill | David Rolston | Wyatt Wong | Robert Pietrusko
Volume: 1
Issue: 1
Year: 2008
Strategic Security as a New Academic Discipline

Author(s): Dr. Sheldon Greaves
Volume: 1
Issue: 1
Year: 2008
Book Reviews

Author(s): Colonel Michael D. Kohn | Edward M. Roche | Keely M. Fahoum | David G. Popp | Donald J. Goldstein | Stephen Iannucci | Mark J. Roberts
Volume: 2
Issue: 1
Year: 2009
Book Reviews

Author(s): Bart Bechtel | Jeffrey Ahn
Volume: 1
Issue: 1
Year: 2008
Dividing Up Intelligence Education

Author(s): Dr. Robert Clark
Volume: 1
Issue: 1
Year: 2008
Why do you need a reservation system?      Affiliate Program