Sharing the dragon's teeth : terrorist groups and the exchange of new technologies / Kim Cragin, ... [and others].
نوع المادة :![نص](/opac-tmpl/lib/famfamfam/BK.png)
- text
- unmediated
- volume
- 9780833039156 (pbk)
- 0833039156 (pbk)
- HV6431 S46 2007
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
![]() |
UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | HV6431 S46 2007 (إستعراض الرف(يفتح أدناه)) | C.1 | Library Use Only | داخل المكتبة فقط | 30010000087571 |
Browsing UAE Federation Library | مكتبة اتحاد الإمارات shelves, Shelving location: General Collection | المجموعات العامة إغلاق مستعرض الرف(يخفي مستعرض الرف)
HV6431 S44 2009 The psychology of strategic terrorism : public and government responses to attack / | HV6431 S45 2009 Terrorism around the world : challenges and responses / | HV6431 S45 2009 Terrorism around the world : challenges and responses / | HV6431 S46 2007 Sharing the dragon's teeth : terrorist groups and the exchange of new technologies / | HV6431 .S466 2003 الارهاب الدولي وزيف امريكا واسرائيل في ظل قانون العقوبات والقانون الدولي العام / | HV6431 .S46628 2013 The terrorist's dilemma : managing violent covert organizations / | HV6431 .S46628 2013 The terrorist's dilemma : managing violent covert organizations / |
"MG-485-DHS".
Includes bibliographical references.
Organizational theory and terrorism -- Mindanao : a Mecca for transnational terrorism in Southeast Asia -- West Bank and Gaza : Israel as the common enemy -- Southwest Colombia : a safe haven for mutually beneficial exchanges -- Policy implications.
Terrorist groups -- both inside and outside the al Qaeda network -- sometimes form mutually beneficial partnerships to exchange "best practices." These exchanges provide terrorist groups with the opportunity to innovate (id est, increase their skills and expand their reach). Understanding how terrorist groups exchange technology and knowledge, therefore, is essential to ongoing and future counterterrorism strategies. This study examines how 11 terrorist groups in three areas (Mindanao, the West Bank and Gaza Strip, and southwest Colombia) have attempted to exchange technologies and knowledge in an effort to reveal some of their vulnerabilities. The analysis provides the Department of Homeland Security and other national security policymakers with insight into the innovation process and suggests ways that government policies can create barriers to terrorists' adoption of new technologies.
Title taken from PDF title screen (viewed June 12, 2007).
Mode of access: World Wide Web.
System requirements: Adobe Acrobat Reader.