Defining and exploring the terrorism field: Toward an intertheoretic, agent-based approach
暂无分享,去创建一个
[1] Mark E. Nissen,et al. Computational Modeling and Analysis of Networked Organizational Planning in a Coalition Maritime Strike Environment , 2006 .
[2] Ethan Bueno de Mesquita. The Quality of Terror , 2005 .
[3] J. Gómez. Terrorist Motivations for the Use of Extreme Violence; Strategic Insights, v. 6, issue 5 (May 2005) , 2005 .
[4] Brian A. Jackson,et al. Aptitude for Destruction, Volume 1: Organizational Learning in Terrorist Groups and Its Implications for Combating Terrorism , 2005 .
[5] J. Victoroff. The Mind of the Terrorist , 2005 .
[6] William Rosenau. Al Qaida Recruitment Trends in Kenya and Tanzania , 2005 .
[7] Marc Sageman,et al. Understanding terror networks. , 2004, International journal of emergency mental health.
[8] Mark E. Nissen,et al. Hypothesis Testing of Edge Organizations: Specifying Computational C2 Models for Experimentation , 2005 .
[9] Raymond E. Levitt,et al. Validation of the Virtual Design Team (VDT) Computational Modeling Environment , 2005 .
[10] Raymond E. Levitt,et al. Agent-based modeling of knowledge dynamics , 2004 .
[11] B. Hoffman. The Changing Face of Al Qaeda and the Global War on Terrorism , 2004 .
[12] Jason E. Bartolomei,et al. Modeling Violent Non-State Actors: A Summary of Concepts and Methods , 2004 .
[13] I. Duyvesteyn,et al. How New Is the New Terrorism? , 2004 .
[14] B. McAllister. Al Qaeda and the Innovative Firm: Demythologizing the Network , 2004 .
[15] Bruce Hoffman,et al. Terrorism, Signaling, and Suicide Attack , 2004 .
[16] Raymond E. Levitt,et al. Computational Modeling of Organizations Comes of Age , 2004, Comput. Math. Organ. Theory.
[17] S. Kalyvas. The Paradox of Terrorism in Civil War , 2004 .
[18] Gordon H. McCormick. Terrorist Decision Making , 2003 .
[19] R. Pape,et al. The Strategic Logic of Suicide Terrorism , 2003, American Political Science Review.
[20] A. Moghadam. Palestinian Suicide Terrorism in the Second Intifada: Motivations and Organizational Aspects , 2003 .
[21] Børge Obel,et al. Erratum: Return on Assets Loss from Situational and Contingency Misfits , 2002, Manag. Sci..
[22] Jerrold M. Post,et al. The Radical Group in Context: 2. Identification of Critical Elements in the Analysis of Risk for Terrorism by Radical Group Type , 2002 .
[23] Jerrold M. Post,et al. The Radical Group in Context: 1. An Integrated Framework for the Analysis of Group Risk for Terrorism , 2002 .
[24] Paul K. Davis,et al. Deterrence and Influence in Counterterrorism: A Component in the War on Al Qaeda , 2002 .
[25] Bruce Hoffman,et al. Change and Continuity in Terrorism , 2001 .
[26] David Tucker,et al. What is New about the New Terrorism and How Dangerous is It? , 2001 .
[27] Brian A. Jackson. Technology Acquisition by Terrorist Groups: Threat Assessment Informed by Lessons from Private Sector Technology Adoption , 2001 .
[28] Kathleen M. Carley. STRUCTURAL CHANGE AND LEARNING WITHIN ORGANIZATIONS , 2001 .
[29] T. Sandler,et al. Is Transnational Terrorism Becoming More Threatening? , 2000 .
[30] Martha Crenshaw,et al. The Psychology of Terrorism: An Agenda for the 21st Century , 2000 .
[31] Theodore Schick. Readings in the Philosophy of Science: From Positivism to Postmodernism , 1999 .
[32] J. Zanders. Assessing the Risk of Chemical and Biological Weapons Proliferation to Terrorists , 1999 .
[33] G. Cameron. Multi-track Microproliferation: Lessons from Aum Shinrikyo and Al Qaida , 1999 .
[34] Yan Jin,et al. Simulating Project Work Processes and Organizations: Toward a Micro-Contingency Theory of Organizational Design , 1999 .
[35] W. Laqueur. The New Terrorism: Fanaticism and the Arms of Mass Destruction , 1999 .
[36] C. J. Drake,et al. The role of ideology in terrorists’ target selection , 1998 .
[37] John Arquilla,et al. COUNTERING NEW TERRORISM , 1998 .
[38] Kathleen M. Carley,et al. A Theoretical Study of Organizational Performance Under Information Distortion , 1997 .
[39] YAN JIN,et al. The virtual design team: A computational model of project organizations , 1996, Comput. Math. Organ. Theory.
[40] Jeffrey Ian Ross. A Model of the Psychological Causes of Oppositional Political Terrorism , 1996 .
[41] W. Scott,et al. Institutions and Organizations. , 1995 .
[42] M. Crenshaw. Terrorism in context , 1995 .
[43] Børge Obel,et al. The validity of computational models in organization science: From model realism to purpose of the model , 1995, Comput. Math. Organ. Theory.
[44] Michael J. Prietula,et al. Computational organization theory , 1994 .
[45] Michael J. Prietula,et al. ACTS theory: extending the model of bounded rationality , 1994 .
[46] Ariel Merari,et al. Terrorism as a strategy of insurgency , 1993 .
[47] D. Porta. Introduction: On Individual Motivations in Underground Political Organizations , 1992 .
[48] D. Porta. Social movements and violence : participation in underground organizations , 1992 .
[49] Martha Crenshaw,et al. How terrorism declines , 1991 .
[50] Raymond E. Levitt,et al. The Virtual Design Team: An Object-Oriented Model of Information Sharing in Project Design Teams , 1991 .
[51] Brian Michael Jenkins,et al. Future Trends in International Terrorism , 1988 .
[52] B. Hoffman,et al. Trends in International Terrorism, 1982 and 1983 , 1984 .
[53] Averill M. Law,et al. Simulation Modeling and Analysis , 1982 .
[54] Donald L. Mills,et al. Organizations: Rational, Natural and Open Systems , 1983 .
[55] L. Alexander. Terrorism: Theory And Practice , 1979 .
[56] Henry Mintzberg,et al. The Structuring of Organizations , 1979 .
[57] Jay R. Galbraith. Organization Design , 1977 .
[58] James D. Thompson. Organizations in Action , 1967 .
[59] R. Cyert,et al. Theory of the Firm: Resource Allocation in a Market Economy , 1966 .
[60] W. Powell,et al. The iron cage revisited institutional isomorphism and collective rationality in organizational fields , 1983 .