Sharing the dragon's teeth: terrorist groups and the exchange of new technologies
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Santa Monica, CA
Rand Corp.
2007
|
Schriftenreihe: | Rand Corporation monograph series
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | "MG 485." Includes bibliographical references (p. [103]-114) Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One -- Introduction; Understanding Terrorist Threats; Methodology and Parameters; Monograph Structure; Chapter Two -- Organizational Theory and Terrorism; Pursuing New Technologies; Absorbing New Technologies Successfully; Conclusions; Chapter Three -- Mindanao: A Mecca for Transnational Terrorism in Southeast Asia; Background: Islamic Militant Groups in Mindanao; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in Mindanao; Contextualizing the Exchanges; Key Judgments Terrorist groups--both inside and outside the al Qaeda network--sometimes form mutually beneficial partnerships to exchange "best practices." These exchanges provide terrorist groups with the opportunity to innovate (i.e., increase their skills and expand their reach). Understanding how terrorist groups exchange technology and knowledge, therefore, is essential to ongoing and future counterterrorism strategies. This study examines how 11 terrorist groups in three areas (Mindanao, the West Bank and Gaza Strip, and southwest Colombia) have attempted to exchange technologies and knowled |
Beschreibung: | 1 Online-Ressource (xxii, 114 p.) |
ISBN: | 0833042491 9780833042491 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043155162 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2006 |||| o||u| ||||||eng d | ||
020 | |a 0833042491 |c electronic bk. |9 0-8330-4249-1 | ||
020 | |a 9780833042491 |c electronic bk. |9 978-0-8330-4249-1 | ||
035 | |a (OCoLC)184843952 | ||
035 | |a (DE-599)BVBBV043155162 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 363.325 |2 22 | |
245 | 1 | 0 | |a Sharing the dragon's teeth |b terrorist groups and the exchange of new technologies |c R. Kim Cragin ... [et al.] |
264 | 1 | |a Santa Monica, CA |b Rand Corp. |c 2007 | |
300 | |a 1 Online-Ressource (xxii, 114 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Rand Corporation monograph series | |
500 | |a "MG 485." | ||
500 | |a Includes bibliographical references (p. [103]-114) | ||
500 | |a Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One -- Introduction; Understanding Terrorist Threats; Methodology and Parameters; Monograph Structure; Chapter Two -- Organizational Theory and Terrorism; Pursuing New Technologies; Absorbing New Technologies Successfully; Conclusions; Chapter Three -- Mindanao: A Mecca for Transnational Terrorism in Southeast Asia; Background: Islamic Militant Groups in Mindanao; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in Mindanao; Contextualizing the Exchanges; Key Judgments | ||
500 | |a Terrorist groups--both inside and outside the al Qaeda network--sometimes form mutually beneficial partnerships to exchange "best practices." These exchanges provide terrorist groups with the opportunity to innovate (i.e., increase their skills and expand their reach). Understanding how terrorist groups exchange technology and knowledge, therefore, is essential to ongoing and future counterterrorism strategies. This study examines how 11 terrorist groups in three areas (Mindanao, the West Bank and Gaza Strip, and southwest Colombia) have attempted to exchange technologies and knowled | ||
650 | 7 | |a POLITICAL SCIENCE / Political Freedom & Security / Terrorism |2 bisacsh | |
650 | 7 | |a Terrorism |2 fast | |
650 | 7 | |a Terrorism / Technological innovations |2 fast | |
650 | 4 | |a Terrorismus | |
650 | 4 | |a Terrorism | |
650 | 4 | |a Terrorism |x Technological innovations | |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Neue Technologie |0 (DE-588)4194462-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 0 | 1 | |a Neue Technologie |0 (DE-588)4194462-8 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Cragin, Kim |e Sonstige |4 oth | |
710 | 2 | |a Rand Corporation |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213933 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028579353 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213933 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213933 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175619480616960 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043155162 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)184843952 (DE-599)BVBBV043155162 |
dewey-full | 363.325 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325 |
dewey-search | 363.325 |
dewey-sort | 3363.325 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03415nmm a2200541zc 4500</leader><controlfield tag="001">BV043155162</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2006 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833042491</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-8330-4249-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833042491</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-8330-4249-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)184843952</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043155162</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.325</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Sharing the dragon's teeth</subfield><subfield code="b">terrorist groups and the exchange of new technologies</subfield><subfield code="c">R. Kim Cragin ... [et al.]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Santa Monica, CA</subfield><subfield code="b">Rand Corp.</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxii, 114 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Rand Corporation monograph series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"MG 485."</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. [103]-114)</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One -- Introduction; Understanding Terrorist Threats; Methodology and Parameters; Monograph Structure; Chapter Two -- Organizational Theory and Terrorism; Pursuing New Technologies; Absorbing New Technologies Successfully; Conclusions; Chapter Three -- Mindanao: A Mecca for Transnational Terrorism in Southeast Asia; Background: Islamic Militant Groups in Mindanao; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in Mindanao; Contextualizing the Exchanges; Key Judgments</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Terrorist groups--both inside and outside the al Qaeda network--sometimes form mutually beneficial partnerships to exchange "best practices." These exchanges provide terrorist groups with the opportunity to innovate (i.e., increase their skills and expand their reach). Understanding how terrorist groups exchange technology and knowledge, therefore, is essential to ongoing and future counterterrorism strategies. This study examines how 11 terrorist groups in three areas (Mindanao, the West Bank and Gaza Strip, and southwest Colombia) have attempted to exchange technologies and knowled</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Political Freedom & Security / Terrorism</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism / Technological innovations</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield><subfield code="x">Technological innovations</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Neue Technologie</subfield><subfield code="0">(DE-588)4194462-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Neue Technologie</subfield><subfield code="0">(DE-588)4194462-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cragin, Kim</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Rand Corporation</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213933</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028579353</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213933</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213933</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043155162 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:19:10Z |
institution | BVB |
isbn | 0833042491 9780833042491 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028579353 |
oclc_num | 184843952 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxii, 114 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2007 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Rand Corp. |
record_format | marc |
series2 | Rand Corporation monograph series |
spelling | Sharing the dragon's teeth terrorist groups and the exchange of new technologies R. Kim Cragin ... [et al.] Santa Monica, CA Rand Corp. 2007 1 Online-Ressource (xxii, 114 p.) txt rdacontent c rdamedia cr rdacarrier Rand Corporation monograph series "MG 485." Includes bibliographical references (p. [103]-114) Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One -- Introduction; Understanding Terrorist Threats; Methodology and Parameters; Monograph Structure; Chapter Two -- Organizational Theory and Terrorism; Pursuing New Technologies; Absorbing New Technologies Successfully; Conclusions; Chapter Three -- Mindanao: A Mecca for Transnational Terrorism in Southeast Asia; Background: Islamic Militant Groups in Mindanao; Rationalizing the Exchange of Technology andKnowledge; Identifying Exchanges in Mindanao; Contextualizing the Exchanges; Key Judgments Terrorist groups--both inside and outside the al Qaeda network--sometimes form mutually beneficial partnerships to exchange "best practices." These exchanges provide terrorist groups with the opportunity to innovate (i.e., increase their skills and expand their reach). Understanding how terrorist groups exchange technology and knowledge, therefore, is essential to ongoing and future counterterrorism strategies. This study examines how 11 terrorist groups in three areas (Mindanao, the West Bank and Gaza Strip, and southwest Colombia) have attempted to exchange technologies and knowled POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh Terrorism fast Terrorism / Technological innovations fast Terrorismus Terrorism Terrorism Technological innovations Terrorismus (DE-588)4059534-1 gnd rswk-swf Neue Technologie (DE-588)4194462-8 gnd rswk-swf Terrorismus (DE-588)4059534-1 s Neue Technologie (DE-588)4194462-8 s 1\p DE-604 Cragin, Kim Sonstige oth Rand Corporation Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213933 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Sharing the dragon's teeth terrorist groups and the exchange of new technologies POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh Terrorism fast Terrorism / Technological innovations fast Terrorismus Terrorism Terrorism Technological innovations Terrorismus (DE-588)4059534-1 gnd Neue Technologie (DE-588)4194462-8 gnd |
subject_GND | (DE-588)4059534-1 (DE-588)4194462-8 |
title | Sharing the dragon's teeth terrorist groups and the exchange of new technologies |
title_auth | Sharing the dragon's teeth terrorist groups and the exchange of new technologies |
title_exact_search | Sharing the dragon's teeth terrorist groups and the exchange of new technologies |
title_full | Sharing the dragon's teeth terrorist groups and the exchange of new technologies R. Kim Cragin ... [et al.] |
title_fullStr | Sharing the dragon's teeth terrorist groups and the exchange of new technologies R. Kim Cragin ... [et al.] |
title_full_unstemmed | Sharing the dragon's teeth terrorist groups and the exchange of new technologies R. Kim Cragin ... [et al.] |
title_short | Sharing the dragon's teeth |
title_sort | sharing the dragon s teeth terrorist groups and the exchange of new technologies |
title_sub | terrorist groups and the exchange of new technologies |
topic | POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh Terrorism fast Terrorism / Technological innovations fast Terrorismus Terrorism Terrorism Technological innovations Terrorismus (DE-588)4059534-1 gnd Neue Technologie (DE-588)4194462-8 gnd |
topic_facet | POLITICAL SCIENCE / Political Freedom & Security / Terrorism Terrorism Terrorism / Technological innovations Terrorismus Terrorism Technological innovations Neue Technologie |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213933 |
work_keys_str_mv | AT craginkim sharingthedragonsteethterroristgroupsandtheexchangeofnewtechnologies AT randcorporation sharingthedragonsteethterroristgroupsandtheexchangeofnewtechnologies |