International Institute for Counter-Terrorism (ICT)

Research Reports in JSTOR from International Institute for Counter-Terrorism (ICT)
51 Research Reports in JSTOR Date
Al-Qaeda, the regional upheaval and Israel – from someone else's problem to a different kind of problem 2013
Analysis of Cyber Trends 2016 2016
Arab Spring and Arab Armies:: A New Framework for Analysis 2013
Assessing the Cyber Threat to the Train Industry April 2016 2016
Boko Haram:: The Rise, Success, and Continued Efficacy of the Insurgency in Nigeria 2012
Can Self-Regulation Work?: Lessons from the Private Security and Military Industry 2013
The Case for Establishing an International Tribunal for International Terrorist Organizations 2013
CCTA’s Statement Regarding the End of the Raid of al-‘Adnani 2017
The Crisis of Governance in the Middle East:: Implications for Democracy, Development & Security 2013
Cyber-Desk Review:: Report #2 2013
Cyber-Terrorism Activities Report No. 11: October – December 2014 2014
Cyber-Terrorism Activities Report No. 12: January – March 2015 2015
Cyber-Terrorism Activities Report No. 14: July – September 2015 2015
Cyber-Terrorism Activities Report No. 15: October – December 2015 2015
Cyber-Terrorism Activities Report No. 16: January – March 2016 2016
Cyber-Terrorism Activities Report No. 18: July - September 2016 2016
Cyber-Terrorism Activities Report No. 19: October - December 2016 2016
Cyber-Terrorism Activities Report No. 7: December 2013 - January 2014 2013
Cyber-Terrorism Activities Report No. 9: April – June 2014 2014
THE DILEMMAS FACED BY THE KENYAN GOVERNMENT IN THE FIGHT AGAINST THE AL- SHABAAB TERRORIST GROUP 2015
Enhanced Resilience Through Innovative Networked Security 2012
The European Union Blacklisting Hezbollah: Testimony of Dr. Eitan Azani before the Committee on Foreign Affairs of the European Parliament, Brussels, July 9, 2013 2013
The Evolving Law on Cyber Terrorism:: Dilemmas in International Law and Israeli Law 2013
Executive Ordered Dead: A Consideration on the Legality of the Targeted Killing of Political Leaders 2013
Hamas’s Strategic Surprise:: Western misunderstanding of the 2007 Hamas takeover of the Gaza Strip 2013
Hezbollah and the Lebanese System:: Between the Siniora Government (2005) and the Hezbollah Government (2011) 2013
Hezbollah & Iran in Latin America – A Threat Just Beneath the Surface 2013
Hezbollah-Hamas Cooperation:: Motivations, Manifestations and Future Outlook 2013
Hezbollah's Fundraising Activity in Africa Focus on the Democratic Republic of Congo 2013
Hybrid War and the Gulliverization of Israel 2012
ICT Cyber-Desk Review 2013
Identifying the Enemy in Counterterrorism Operations - A Comparison of the Bush and Obama Administrations 2014
In the Eye of the Storm:: An Israeli Perspective on the “Arab Spring” 2013
Incitement to Carry Out a Terrorist Attack in Wimbledon 2017
Internal Management Implications of Security Prisoners in Israeli Prisons 2014
The Islamist Insurgency in Egypt – Mind the Gaps: Challenges to Legitimacy, Security and Capacity 2014
Israel's Counter-Terrorism Bill:: Central Themes & Challenges 2014
Jordan:: In the Balance 2013
Kurdish Separatism in Turkey:: The PKK's Changing Strategy 2013
Legal Challenges of War in Areas of Problematic Sovereignty 2013
No Friends Left to Lose:: Reassessing the United States’ Strategy in Egypt 2013
On Political Order and the “Arab Spring” 2012
The Risk of and Countering the Islamic State use of Chemical Weapons against Israel 2015
Salafist-Takfiri Jihadism:: the Ideology of the Caucasus Emirate 2014
The Security Evolution of Singapore: An Examination of Security and Counter-Terrorism Legislation 2016
Security Implications of the “Arab Spring” 2013
Terrorism in Southeast Asia:: The Case of the Abu Sayyaf Group and Jemaah Islamiyah 2015
Terrorist Attacks against Hospitals Case Studies 2013
Top-Down and Bottom-Up Innovation in Terrorism:: The Case of the 9/11 Attacks 2013
Towards a Dynamic Analysis of Salafi Activism: Conclusions from a Dissection of Salafism in Germany 2013
Why the Nigerian Counter-Terrorism policy toward Boko Haram has failed: A cause and effect relationship 2014