The Terrorist's Dilemma: Managing Violent Covert Organizations
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Princeton
Princeton University Press
2013
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Cover; Title; Copyright; Dedication; Contents; Acknowledgments; 1 Introduction; 1.1 The Challenge of Organizing Terror; 1.2 The Terrorist's Dilemma; 1.3 Why Understanding Hierarchy and Control Matters; 1.4 What About 9/11?; 1.5 Are Terrorist Organizations Really So Familiar?; 1.6 Can We Treat Terrorist Organizations as Rational?; 1.7 Plan of the Book; 2 The Terrorist's Dilemma; 2.1 Introduction; 2.2 Why Preference Divergence?; 2.3 How Groups Respond to Preference Divergence; 2.4 The Difficult Challenge of Balancing Security with Efficiency and Control; 2.5 Conclusion 3 The Insider's View on Terrorist Organizations3.1 Organizing Terror; 3.2 Data; 3.3 Quantitative Analysis; 3.4 Content Analysis: Some Good Stories; 3.5 Conclusion; 4 Organizing Al-Qa'ida in Iraq's Operations and Finances; 4.1 Introduction; 4.2 A Brief History of al-Qa'ida in Iraq; 4.3 Managing AQI; 4.4 Conclusion; 5 The Tradeoffs; 5.1 Introduction; 5.2 Managing Terrorist Funds: The Security-Efficiency Tradeoff; 5.3 Managing Terrorist Violence: The Security-Control Tradeoff; 5.4 Discussion; 6 Uncertainty and Control in Russia; 6.1 Introduction 6.2 A Brief History of Pre-Revolutionary Russian Terrorism6.3 A History of Pre-Revolutionary Terrorism; 6.4 Uncertainty and Patterns of Control; 6.5 Other Aspects of Russian Terrorism; 6.6 Conclusion; 7 Discrimination and Control in Ireland; 7.1 Introduction; 7.2 Discrimination and Patterns of Violence; 7.3 Measuring Control; 7.4 The Provisional IRA; 7.5 The Loyalist Paramilitaries; 7.6 Conclusion; 8 Preference Divergence and Control in Palestine; 8.1 Introduction; 8.2 Fatah: The Challenges of Integration; 8.3 Hamas; 8.4 Control in Fatah and Hamas; 8.5 Conclusion 9 Conclusion and Recommendations9.1 Summary of the Argument; 9.2 Exploiting Organizational Vulnerabilities; 9.3 Conclusion; Appendix A Annotated Bibliography of Terrorist Autobiographies; A.1 Introduction; A.2 Terrorist Autobiographies; Appendix B Methodological Appendix; B.1 Case Selection; B.2 Sources; Bibliography; Index How do terrorist groups control their members? Do the tools groups use to monitor their operatives and enforce discipline create security vulnerabilities that governments can exploit? The Terrorist's Dilemma is the first book to systematically examine the great variation in how terrorist groups are structured. Employing a broad range of agency theory, historical case studies, and terrorists' own internal documents, Jacob Shapiro provocatively discusses the core managerial challenges that terrorists face and illustrates how their political goals interact with the operational environme |
Beschreibung: | 1 Online-Ressource (350 pages) |
ISBN: | 9781400848645 1400848644 1299725597 9781299725591 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042743602 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150806s2013 |||| o||u| ||||||eng d | ||
020 | |a 9781400848645 |c electronic bk. |9 978-1-4008-4864-5 | ||
020 | |a 1400848644 |c electronic bk. |9 1-4008-4864-4 | ||
020 | |a 1299725597 |9 1-299-72559-7 | ||
020 | |a 9781299725591 |9 978-1-299-72559-1 | ||
035 | |a (OCoLC)852756492 | ||
035 | |a (DE-599)BVBBV042743602 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 303.625 |2 23 | |
100 | 1 | |a Shapiro, Jacob N. |e Verfasser |4 aut | |
245 | 1 | 0 | |a The Terrorist's Dilemma |b Managing Violent Covert Organizations |
264 | 1 | |a Princeton |b Princeton University Press |c 2013 | |
300 | |a 1 Online-Ressource (350 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Cover; Title; Copyright; Dedication; Contents; Acknowledgments; 1 Introduction; 1.1 The Challenge of Organizing Terror; 1.2 The Terrorist's Dilemma; 1.3 Why Understanding Hierarchy and Control Matters; 1.4 What About 9/11?; 1.5 Are Terrorist Organizations Really So Familiar?; 1.6 Can We Treat Terrorist Organizations as Rational?; 1.7 Plan of the Book; 2 The Terrorist's Dilemma; 2.1 Introduction; 2.2 Why Preference Divergence?; 2.3 How Groups Respond to Preference Divergence; 2.4 The Difficult Challenge of Balancing Security with Efficiency and Control; 2.5 Conclusion | ||
500 | |a 3 The Insider's View on Terrorist Organizations3.1 Organizing Terror; 3.2 Data; 3.3 Quantitative Analysis; 3.4 Content Analysis: Some Good Stories; 3.5 Conclusion; 4 Organizing Al-Qa'ida in Iraq's Operations and Finances; 4.1 Introduction; 4.2 A Brief History of al-Qa'ida in Iraq; 4.3 Managing AQI; 4.4 Conclusion; 5 The Tradeoffs; 5.1 Introduction; 5.2 Managing Terrorist Funds: The Security-Efficiency Tradeoff; 5.3 Managing Terrorist Violence: The Security-Control Tradeoff; 5.4 Discussion; 6 Uncertainty and Control in Russia; 6.1 Introduction | ||
500 | |a 6.2 A Brief History of Pre-Revolutionary Russian Terrorism6.3 A History of Pre-Revolutionary Terrorism; 6.4 Uncertainty and Patterns of Control; 6.5 Other Aspects of Russian Terrorism; 6.6 Conclusion; 7 Discrimination and Control in Ireland; 7.1 Introduction; 7.2 Discrimination and Patterns of Violence; 7.3 Measuring Control; 7.4 The Provisional IRA; 7.5 The Loyalist Paramilitaries; 7.6 Conclusion; 8 Preference Divergence and Control in Palestine; 8.1 Introduction; 8.2 Fatah: The Challenges of Integration; 8.3 Hamas; 8.4 Control in Fatah and Hamas; 8.5 Conclusion | ||
500 | |a 9 Conclusion and Recommendations9.1 Summary of the Argument; 9.2 Exploiting Organizational Vulnerabilities; 9.3 Conclusion; Appendix A Annotated Bibliography of Terrorist Autobiographies; A.1 Introduction; A.2 Terrorist Autobiographies; Appendix B Methodological Appendix; B.1 Case Selection; B.2 Sources; Bibliography; Index | ||
500 | |a How do terrorist groups control their members? Do the tools groups use to monitor their operatives and enforce discipline create security vulnerabilities that governments can exploit? The Terrorist's Dilemma is the first book to systematically examine the great variation in how terrorist groups are structured. Employing a broad range of agency theory, historical case studies, and terrorists' own internal documents, Jacob Shapiro provocatively discusses the core managerial challenges that terrorists face and illustrates how their political goals interact with the operational environme | ||
650 | 7 | |a POLITICAL SCIENCE / Political Freedom & Security / Terrorism |2 bisacsh | |
650 | 7 | |a POLITICAL SCIENCE / Terrorism |2 bisacsh | |
650 | 7 | |a Terrorism in mass media |2 fast | |
650 | 7 | |a Terrorists |2 fast | |
650 | 4 | |a Terrorismus | |
650 | 4 | |a Terrorists | |
650 | 4 | |a Terrorism in mass media | |
650 | 0 | 7 | |a Internationaler Terrorismus |0 (DE-588)4162078-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Organisationsstruktur |0 (DE-588)4115464-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Terroristische Vereinigung |0 (DE-588)4225831-5 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Terroristische Vereinigung |0 (DE-588)4225831-5 |D s |
689 | 0 | 1 | |a Internationaler Terrorismus |0 (DE-588)4162078-1 |D s |
689 | 0 | 2 | |a Organisationsstruktur |0 (DE-588)4115464-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=578596 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA |a ZDB-4-NLEBK | ||
940 | 1 | |q FAW_PDA_EBA | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028174472 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804174956950454272 |
---|---|
any_adam_object | |
author | Shapiro, Jacob N. |
author_facet | Shapiro, Jacob N. |
author_role | aut |
author_sort | Shapiro, Jacob N. |
author_variant | j n s jn jns |
building | Verbundindex |
bvnumber | BV042743602 |
collection | ZDB-4-EBA ZDB-4-NLEBK |
ctrlnum | (OCoLC)852756492 (DE-599)BVBBV042743602 |
dewey-full | 303.625 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 303 - Social processes |
dewey-raw | 303.625 |
dewey-search | 303.625 |
dewey-sort | 3303.625 |
dewey-tens | 300 - Social sciences |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04695nmm a2200577zc 4500</leader><controlfield tag="001">BV042743602</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150806s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781400848645</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4008-4864-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1400848644</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4008-4864-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1299725597</subfield><subfield code="9">1-299-72559-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781299725591</subfield><subfield code="9">978-1-299-72559-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)852756492</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042743602</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">303.625</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shapiro, Jacob N.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The Terrorist's Dilemma</subfield><subfield code="b">Managing Violent Covert Organizations</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Princeton</subfield><subfield code="b">Princeton University Press</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (350 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cover; Title; Copyright; Dedication; Contents; Acknowledgments; 1 Introduction; 1.1 The Challenge of Organizing Terror; 1.2 The Terrorist's Dilemma; 1.3 Why Understanding Hierarchy and Control Matters; 1.4 What About 9/11?; 1.5 Are Terrorist Organizations Really So Familiar?; 1.6 Can We Treat Terrorist Organizations as Rational?; 1.7 Plan of the Book; 2 The Terrorist's Dilemma; 2.1 Introduction; 2.2 Why Preference Divergence?; 2.3 How Groups Respond to Preference Divergence; 2.4 The Difficult Challenge of Balancing Security with Efficiency and Control; 2.5 Conclusion</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">3 The Insider's View on Terrorist Organizations3.1 Organizing Terror; 3.2 Data; 3.3 Quantitative Analysis; 3.4 Content Analysis: Some Good Stories; 3.5 Conclusion; 4 Organizing Al-Qa'ida in Iraq's Operations and Finances; 4.1 Introduction; 4.2 A Brief History of al-Qa'ida in Iraq; 4.3 Managing AQI; 4.4 Conclusion; 5 The Tradeoffs; 5.1 Introduction; 5.2 Managing Terrorist Funds: The Security-Efficiency Tradeoff; 5.3 Managing Terrorist Violence: The Security-Control Tradeoff; 5.4 Discussion; 6 Uncertainty and Control in Russia; 6.1 Introduction</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">6.2 A Brief History of Pre-Revolutionary Russian Terrorism6.3 A History of Pre-Revolutionary Terrorism; 6.4 Uncertainty and Patterns of Control; 6.5 Other Aspects of Russian Terrorism; 6.6 Conclusion; 7 Discrimination and Control in Ireland; 7.1 Introduction; 7.2 Discrimination and Patterns of Violence; 7.3 Measuring Control; 7.4 The Provisional IRA; 7.5 The Loyalist Paramilitaries; 7.6 Conclusion; 8 Preference Divergence and Control in Palestine; 8.1 Introduction; 8.2 Fatah: The Challenges of Integration; 8.3 Hamas; 8.4 Control in Fatah and Hamas; 8.5 Conclusion</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">9 Conclusion and Recommendations9.1 Summary of the Argument; 9.2 Exploiting Organizational Vulnerabilities; 9.3 Conclusion; Appendix A Annotated Bibliography of Terrorist Autobiographies; A.1 Introduction; A.2 Terrorist Autobiographies; Appendix B Methodological Appendix; B.1 Case Selection; B.2 Sources; Bibliography; Index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">How do terrorist groups control their members? Do the tools groups use to monitor their operatives and enforce discipline create security vulnerabilities that governments can exploit? The Terrorist's Dilemma is the first book to systematically examine the great variation in how terrorist groups are structured. Employing a broad range of agency theory, historical case studies, and terrorists' own internal documents, Jacob Shapiro provocatively discusses the core managerial challenges that terrorists face and illustrates how their political goals interact with the operational environme</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Political Freedom & Security / Terrorism</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Terrorism</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism in mass media</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorists</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorists</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism in mass media</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internationaler Terrorismus</subfield><subfield code="0">(DE-588)4162078-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Organisationsstruktur</subfield><subfield code="0">(DE-588)4115464-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terroristische Vereinigung</subfield><subfield code="0">(DE-588)4225831-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Terroristische Vereinigung</subfield><subfield code="0">(DE-588)4225831-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Internationaler Terrorismus</subfield><subfield code="0">(DE-588)4162078-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Organisationsstruktur</subfield><subfield code="0">(DE-588)4115464-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=578596</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield><subfield code="a">ZDB-4-NLEBK</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028174472</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV042743602 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:08:38Z |
institution | BVB |
isbn | 9781400848645 1400848644 1299725597 9781299725591 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028174472 |
oclc_num | 852756492 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (350 pages) |
psigel | ZDB-4-EBA ZDB-4-NLEBK FAW_PDA_EBA |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Princeton University Press |
record_format | marc |
spelling | Shapiro, Jacob N. Verfasser aut The Terrorist's Dilemma Managing Violent Covert Organizations Princeton Princeton University Press 2013 1 Online-Ressource (350 pages) txt rdacontent c rdamedia cr rdacarrier Cover; Title; Copyright; Dedication; Contents; Acknowledgments; 1 Introduction; 1.1 The Challenge of Organizing Terror; 1.2 The Terrorist's Dilemma; 1.3 Why Understanding Hierarchy and Control Matters; 1.4 What About 9/11?; 1.5 Are Terrorist Organizations Really So Familiar?; 1.6 Can We Treat Terrorist Organizations as Rational?; 1.7 Plan of the Book; 2 The Terrorist's Dilemma; 2.1 Introduction; 2.2 Why Preference Divergence?; 2.3 How Groups Respond to Preference Divergence; 2.4 The Difficult Challenge of Balancing Security with Efficiency and Control; 2.5 Conclusion 3 The Insider's View on Terrorist Organizations3.1 Organizing Terror; 3.2 Data; 3.3 Quantitative Analysis; 3.4 Content Analysis: Some Good Stories; 3.5 Conclusion; 4 Organizing Al-Qa'ida in Iraq's Operations and Finances; 4.1 Introduction; 4.2 A Brief History of al-Qa'ida in Iraq; 4.3 Managing AQI; 4.4 Conclusion; 5 The Tradeoffs; 5.1 Introduction; 5.2 Managing Terrorist Funds: The Security-Efficiency Tradeoff; 5.3 Managing Terrorist Violence: The Security-Control Tradeoff; 5.4 Discussion; 6 Uncertainty and Control in Russia; 6.1 Introduction 6.2 A Brief History of Pre-Revolutionary Russian Terrorism6.3 A History of Pre-Revolutionary Terrorism; 6.4 Uncertainty and Patterns of Control; 6.5 Other Aspects of Russian Terrorism; 6.6 Conclusion; 7 Discrimination and Control in Ireland; 7.1 Introduction; 7.2 Discrimination and Patterns of Violence; 7.3 Measuring Control; 7.4 The Provisional IRA; 7.5 The Loyalist Paramilitaries; 7.6 Conclusion; 8 Preference Divergence and Control in Palestine; 8.1 Introduction; 8.2 Fatah: The Challenges of Integration; 8.3 Hamas; 8.4 Control in Fatah and Hamas; 8.5 Conclusion 9 Conclusion and Recommendations9.1 Summary of the Argument; 9.2 Exploiting Organizational Vulnerabilities; 9.3 Conclusion; Appendix A Annotated Bibliography of Terrorist Autobiographies; A.1 Introduction; A.2 Terrorist Autobiographies; Appendix B Methodological Appendix; B.1 Case Selection; B.2 Sources; Bibliography; Index How do terrorist groups control their members? Do the tools groups use to monitor their operatives and enforce discipline create security vulnerabilities that governments can exploit? The Terrorist's Dilemma is the first book to systematically examine the great variation in how terrorist groups are structured. Employing a broad range of agency theory, historical case studies, and terrorists' own internal documents, Jacob Shapiro provocatively discusses the core managerial challenges that terrorists face and illustrates how their political goals interact with the operational environme POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh POLITICAL SCIENCE / Terrorism bisacsh Terrorism in mass media fast Terrorists fast Terrorismus Terrorists Terrorism in mass media Internationaler Terrorismus (DE-588)4162078-1 gnd rswk-swf Organisationsstruktur (DE-588)4115464-2 gnd rswk-swf Terroristische Vereinigung (DE-588)4225831-5 gnd rswk-swf Terroristische Vereinigung (DE-588)4225831-5 s Internationaler Terrorismus (DE-588)4162078-1 s Organisationsstruktur (DE-588)4115464-2 s 1\p DE-604 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=578596 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Shapiro, Jacob N. The Terrorist's Dilemma Managing Violent Covert Organizations POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh POLITICAL SCIENCE / Terrorism bisacsh Terrorism in mass media fast Terrorists fast Terrorismus Terrorists Terrorism in mass media Internationaler Terrorismus (DE-588)4162078-1 gnd Organisationsstruktur (DE-588)4115464-2 gnd Terroristische Vereinigung (DE-588)4225831-5 gnd |
subject_GND | (DE-588)4162078-1 (DE-588)4115464-2 (DE-588)4225831-5 |
title | The Terrorist's Dilemma Managing Violent Covert Organizations |
title_auth | The Terrorist's Dilemma Managing Violent Covert Organizations |
title_exact_search | The Terrorist's Dilemma Managing Violent Covert Organizations |
title_full | The Terrorist's Dilemma Managing Violent Covert Organizations |
title_fullStr | The Terrorist's Dilemma Managing Violent Covert Organizations |
title_full_unstemmed | The Terrorist's Dilemma Managing Violent Covert Organizations |
title_short | The Terrorist's Dilemma |
title_sort | the terrorist s dilemma managing violent covert organizations |
title_sub | Managing Violent Covert Organizations |
topic | POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh POLITICAL SCIENCE / Terrorism bisacsh Terrorism in mass media fast Terrorists fast Terrorismus Terrorists Terrorism in mass media Internationaler Terrorismus (DE-588)4162078-1 gnd Organisationsstruktur (DE-588)4115464-2 gnd Terroristische Vereinigung (DE-588)4225831-5 gnd |
topic_facet | POLITICAL SCIENCE / Political Freedom & Security / Terrorism POLITICAL SCIENCE / Terrorism Terrorism in mass media Terrorists Terrorismus Internationaler Terrorismus Organisationsstruktur Terroristische Vereinigung |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=578596 |
work_keys_str_mv | AT shapirojacobn theterroristsdilemmamanagingviolentcovertorganizations |