Query Result Set
Skip Navigation Links
   ActiveUsers:393Hits:19931332Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
MAR-APR 2005 (47) answer(s).
 
123Next
SrlItem
1
ID:   060402


All the presidents' men / Fullilove, Michael Mar-Apr 2005  Journal Article
Fullilove, Michael Journal Article
0 Rating(s) & 0 Review(s)
Publication Mar-Apr 2005.
Summary/Abstract In its first term, the Bush administration all but ignored a powerful diplomatic tool that had served Washington well in the past: the special envoy. With the State Department now under new management, it should start dispatching emissaries again
        Export Export
2
ID:   060371


An ounce of prevention / Luongo, Kenneth; Hoehn, William Mar-Apr 2005  Journal Article
Luongo, Kenneth Journal Article
0 Rating(s) & 0 Review(s)
Publication Mar-Apr 2005.
        Export Export
3
ID:   062043


Analysis of China's foreign trade growth and discussion of rela / Pei, Changhong Mar-Apr 2005  Journal Article
Pei, Changhong Journal Article
0 Rating(s) & 0 Review(s)
Publication Mar-Apr 2005.
        Export Export
4
ID:   062598


Anthropology and counterinsurgency: the strange story of their curious relationship / Mcfate, Montgomery Mar-Apr 2005  Journal Article
Mcfate, Montgomery Journal Article
0 Rating(s) & 0 Review(s)
Publication Mar-Apr 2005.
Key Words Counter Insurgency  Iraq  United States  Anthropology 
        Export Export
5
ID:   061899


ASEAN counterterrorism cooperation since 9/11 / Chow, Jonathan T Mar-Apr 2005  Journal Article
Chow, Jonathan T Journal Article
0 Rating(s) & 0 Review(s)
Publication Mar-Apr 2005.
        Export Export
6
ID:   060659


Building the Human Bomb:: the case of the 16 May 2003 attacks in Casablanca / Kalpakian, Jack Mar-Apr 2005  Journal Article
Kalpakian, Jack Journal Article
0 Rating(s) & 0 Review(s)
Publication Mar-Apr 2005.
Summary/Abstract The terrorist attacks that took place on 16 May 2003 in Casablanca were a result of internal factors. These factors include the terrorists" view of their faith, poverty, and under-education. The links between the terrorists in Morocco and the Al Qaeda network, despite their ideological similarities, are not of a “command and control” nature. The relationship can be described as a franchise operation. The attacks resulted in the alienation of the population from movements attempting to use Islam in politics. Consequently, the attacks backfired on the Moroccan Islamist movement.
Key Words Terrorism  Human Bomb  islamic Terrorist 
        Export Export
7
ID:   060797


Cambodia: remebering the killing fields / Bellamy, Paul Mar-Apr 2005  Journal Article
Bellamy, Paul Journal Article
0 Rating(s) & 0 Review(s)
Publication Mar-Apr 2005.
Key Words Combodia 
        Export Export
8
ID:   062440


China drive to revitalise the northeast / Lisheng, Dong Mar-Apr 2005  Journal Article
Lisheng, Dong Journal Article
0 Rating(s) & 0 Review(s)
Publication Mar-Apr 2005.
Key Words China  China - Economy 
        Export Export
9
ID:   060795


Conflict prevention and resolution / Evans, Gareth Mar-Apr 2005  Journal Article
Evans, Gareth Journal Article
0 Rating(s) & 0 Review(s)
Publication Mar-Apr 2005.
        Export Export
10
ID:   060374


CTBT: forecasting the future / Hansen, Keith Mar-Apr 2005  Journal Article
Hansen, Keith Journal Article
0 Rating(s) & 0 Review(s)
Publication Mar-Apr 2005.
        Export Export
11
ID:   060660


Cyberterrorism: the sum of all fears? / Weimann, Gabriel Mar-Apr 2005  Journal Article
Weimann, Gabriel Journal Article
0 Rating(s) & 0 Review(s)
Publication Mar-Apr 2005.
Summary/Abstract Cyberterrorism conjures up images of vicious terrorists unleashing catastrophic attacks against computer networks, wreaking havoc, and paralyzing nations. This is a frightening scenario, but how likely is it to occur? Could terrorists cripple critical military, financial, and service computer systems? This article charts the rise of cyberangst and examines the evidence cited by those who predict imminent catastrophe. Psychological, political, and economic forces have combined to promote the fear of cyberterrorism. From a psychological perspective, two of the greatest fears of modern time are combined in the term “cyberterrorism.” The fear of random, violent victimization segues well with the distrust and outright fear of computer technology. Many of these fears, the report contends, are exaggerated: not a single case of cyberterrorism has yet been recorded, hackers are regularly mistaken for terrorists, and cyberdefenses are more robust than is commonly supposed. Even so, the potential threat is undeniable and seems likely to increase, making it all the more important to address the danger without inflating or manipulating it.
Key Words Terrorism  Cyberterrorism 
        Export Export
12
ID:   060373


Dangerous doctrine / Speed, Roger; May, Michael Mar-Apr 2005  Journal Article
Speed, Roger Journal Article
0 Rating(s) & 0 Review(s)
Publication Mar-Apr 2005.
        Export Export
13
ID:   060460


Debating a world without Israel / Klug, Brian Mar-Apr 2005  Journal Article
Klug, Brian Journal Article
0 Rating(s) & 0 Review(s)
Publication Mar-Apr 2005.
Key Words Israel  United States  Middle East  Arab World 
        Export Export
14
ID:   060457


Deficit debacle / Baker, Gerard Mar-Apr 2005  Journal Article
Baker, Gerard Journal Article
0 Rating(s) & 0 Review(s)
Publication Mar-Apr 2005.
        Export Export
15
ID:   060407


Development Challenge / Sachs, Jeffrey D Mar-Apr 2005  Journal Article
Sachs, Jeffrey D Journal Article
0 Rating(s) & 0 Review(s)
Publication Mar-Apr 2005.
Summary/Abstract As a matter of policy, Washington is committed to supporting development in impoverished countries, and most Americans believe that it is following through. In fact, U.S. assistance for the world's poorest countries is utterly inadequate. Only a new international development strategy can rectify the situation. Continued failure will be too expensive, for the United States and the world.
        Export Export
16
ID:   062597


Evolution of information operations at brigade and below / Tulak, Arthur N Mar-Apr 2005  Journal Article
Tulak, Arthur N Journal Article
0 Rating(s) & 0 Review(s)
Publication Mar-Apr 2005.
        Export Export
17
ID:   062594


Fench Algeria and British Northern Ireland: legitimacy and the rule of law in low-intensity conflict / Campnell, James D Mar-Apr 2005  Journal Article
Campnell, James D Journal Article
0 Rating(s) & 0 Review(s)
Publication Mar-Apr 2005.
Key Words LIC  Low-intensity conflict  France  Northern Ireland  Algeria 
        Export Export
18
ID:   060458


Gang world / Papachristos, Andrew V Mar-Apr 2005  Journal Article
Papachristos, Andrew V Journal Article
0 Rating(s) & 0 Review(s)
Publication Mar-Apr 2005.
Key Words Globalization 
        Export Export
19
ID:   060657


Genealogy of Radical Islam / Wiktorowicz, Quintan Mar-Apr 2005  Journal Article
Wiktorowicz, Quintan Journal Article
0 Rating(s) & 0 Review(s)
Publication Mar-Apr 2005.
Summary/Abstract A genealogy of the radical ideas that underline al-Qaeda"s justification for violence shows that the development of jihadi thought over the past several decades is characterized by the erosion of critical constraints used to limit warfare and violence in classical Islam. This erosion is illustrated by the evolution of jihadi arguments related to apostasy and waging jihad at home, global jihad, civilian targeting, and suicide bombings.
Key Words Terrorism  Jihad  Islamic Terrorism  Global Jihad  Islam 
        Export Export
20
ID:   060455


Inside the committee that runs the world / Rothkopf, David Mar-Apr 2005  Journal Article
Rothkopf, David Journal Article
0 Rating(s) & 0 Review(s)
Publication Mar-Apr 2005.
        Export Export
123Next