-
2
-
-
33751175254
-
-
Bergen, P., 1998. Holy Warrior Is This the Man Behind the Bombings Osama Bin Laden. New Republic.
-
-
-
-
4
-
-
33751170739
-
-
Arthur M. Sackler Colloquium of the National Academy of Sciences, Irvine, NAS
-
Boyack K.W. Mapping Knowledge Domains: Characterizing PNAS (2003), Arthur M. Sackler Colloquium of the National Academy of Sciences, Irvine, NAS
-
(2003)
Mapping Knowledge Domains: Characterizing PNAS
-
-
Boyack, K.W.1
-
5
-
-
1842738424
-
Mapping Knowledge Domains: Characterizing Proceedings of the National Academy of Sciences
-
Boyack K.W. Mapping Knowledge Domains: Characterizing Proceedings of the National Academy of Sciences. PNAS 101 (2004) 5192-5199
-
(2004)
PNAS
, vol.101
, pp. 5192-5199
-
-
Boyack, K.W.1
-
6
-
-
0035280579
-
Visualizing a Knowledge Domain's Intellectual Structure
-
Chen C., and Paul R.J. Visualizing a Knowledge Domain's Intellectual Structure. IEEE Computer Society 34 3 (2001) 65-71
-
(2001)
IEEE Computer Society
, vol.34
, Issue.3
, pp. 65-71
-
-
Chen, C.1
Paul, R.J.2
-
7
-
-
1942500388
-
Crime data mining: a general framework and some examples
-
Chen H., Chung W., Xu J.J., Wang G., Qin Y., and Chau M. Crime data mining: a general framework and some examples. IEEE Computer Society 37 4 (2004) 50-56
-
(2004)
IEEE Computer Society
, vol.37
, Issue.4
, pp. 50-56
-
-
Chen, H.1
Chung, W.2
Xu, J.J.3
Wang, G.4
Qin, Y.5
Chau, M.6
-
9
-
-
0034195015
-
Psychology of terrorism: an agenda for the 21st century
-
Crenshaw M. Psychology of terrorism: an agenda for the 21st century. Political Psychology 21 1 (2000) 405-420
-
(2000)
Political Psychology
, vol.21
, Issue.1
, pp. 405-420
-
-
Crenshaw, M.1
-
10
-
-
0020175565
-
Progress in documentation: invisible colleges and information transfer
-
Cronin B. Progress in documentation: invisible colleges and information transfer. Journal of Documentation 38 (1982) 212-236
-
(1982)
Journal of Documentation
, vol.38
, pp. 212-236
-
-
Cronin, B.1
-
11
-
-
33751176532
-
-
Spaces, Spatiality and Technology Workshop, Edinburgh, Napier University, Edinburgh Scotland 〈http://www.spacespatiality.org/5.pdf〉
-
Cronin B. High-Fidelity Mapping of Intellectual Space: Early and Recent Insights from Information Science (2002), Spaces, Spatiality and Technology Workshop, Edinburgh, Napier University, Edinburgh Scotland. http://www.spacespatiality.org/5.pdf 〈http://www.spacespatiality.org/5.pdf〉
-
(2002)
High-Fidelity Mapping of Intellectual Space: Early and Recent Insights from Information Science
-
-
Cronin, B.1
-
12
-
-
33751178657
-
Introduction: Towards a Criminological Sociology of Terrorism and Counter-terrorism
-
Deflem M. (Ed), Elsevier, Amsterdam
-
Deflem M. Introduction: Towards a Criminological Sociology of Terrorism and Counter-terrorism. In: Deflem M. (Ed). Terrorism and Counter-terrorism: Criminological Perspectives (2004), Elsevier, Amsterdam 1-8
-
(2004)
Terrorism and Counter-terrorism: Criminological Perspectives
, pp. 1-8
-
-
Deflem, M.1
-
13
-
-
24944571897
-
-
Dugan, L., LaFree, G., Piquero, A., 2005. Testing a rational choice model of airline hijackings. in: intelligence and security informatics. In: IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, May 2005, Proceedings. Lecture Notes in Computer Science, vol. 3495. Springer, Berlin, pp. 340-361.
-
-
-
-
14
-
-
33751187905
-
Mapping medical informatics research
-
Chen H., Fuller S.S., Friedman C., and Hersh W. (Eds), Springer Science, UK
-
Eggers S., Huang Z., Chen H., Yan L., Larson C., Rashid A., Chau M., and Lin C. Mapping medical informatics research. In: Chen H., Fuller S.S., Friedman C., and Hersh W. (Eds). Medical Informatics: Knowledge Management and Data Mining in Biomedicine (2005), Springer Science, UK
-
(2005)
Medical Informatics: Knowledge Management and Data Mining in Biomedicine
-
-
Eggers, S.1
Huang, Z.2
Chen, H.3
Yan, L.4
Larson, C.5
Rashid, A.6
Chau, M.7
Lin, C.8
-
15
-
-
33745924218
-
-
Ellis, J.O., 2004. MIPT: Sharing terrorism information resources. In: Intelligence and Security Informatics, Second Symposium on Intelligence and Security Informatics, ISI 2004, Proceedings, Springer, Berlin, pp. 520-525.
-
-
-
-
17
-
-
84963032117
-
Citation data: their use as quantitative indicators for science and technology evaluation and policy-making
-
〈http://www.garfield.library.upenn.edu/papers/〉
-
Garfield E., and Welljams-Dorof A. Citation data: their use as quantitative indicators for science and technology evaluation and policy-making. Science and Public Policy 19 5 (1992) 321-327. http://www.garfield.library.upenn.edu/papers/ 〈http://www.garfield.library.upenn.edu/papers/〉
-
(1992)
Science and Public Policy
, vol.19
, Issue.5
, pp. 321-327
-
-
Garfield, E.1
Welljams-Dorof, A.2
-
18
-
-
1842863436
-
-
Garfield, E., Pudovkin, A.I., Istomin, V.S., 2002. Algorithmic citation-linked historiography: mapping the literature of science. The Fifth Annual Meeting of ASIST, November 2002, Contributed Paper.
-
-
-
-
19
-
-
0033268838
-
Terrorism dissertations and the evolution of a specialty: an analysis of meta-information
-
Gordon A. Terrorism dissertations and the evolution of a specialty: an analysis of meta-information. Terrorism and Political Violence 11 2 (1999) 141-150
-
(1999)
Terrorism and Political Violence
, vol.11
, Issue.2
, pp. 141-150
-
-
Gordon, A.1
-
20
-
-
24944439917
-
Effect of database and website inconstancy on the terrorism field's delineation
-
Gordon A. Effect of database and website inconstancy on the terrorism field's delineation. Studies in Conflict and Terrorism 27 (2004) 79-88
-
(2004)
Studies in Conflict and Terrorism
, vol.27
, pp. 79-88
-
-
Gordon, A.1
-
21
-
-
15244348933
-
Peripheral terrorism literature: bringing it closer to the core
-
Gordon A. Peripheral terrorism literature: bringing it closer to the core. Scientometrics 62 3 (2005) 403-414
-
(2005)
Scientometrics
, vol.62
, Issue.3
, pp. 403-414
-
-
Gordon, A.1
-
22
-
-
0004237024
-
-
Princeton University Press
-
Gurr T. Why Men Rebel (1972), Princeton University Press
-
(1972)
Why Men Rebel
-
-
Gurr, T.1
-
23
-
-
33751189414
-
-
RAND Corporation, Santa Monica
-
Hollywood J., Snyder D., McKay K.N., and Boon J.E. Out of the Ordinary Finding Hidden Threats by Analyzing Unusual Behavior (2004), RAND Corporation, Santa Monica
-
(2004)
Out of the Ordinary Finding Hidden Threats by Analyzing Unusual Behavior
-
-
Hollywood, J.1
Snyder, D.2
McKay, K.N.3
Boon, J.E.4
-
24
-
-
8844279070
-
International nanotechnology development in 2003: Country, institution, and technology field analysis based on USPTO patent database
-
Huang Z., Chen H., Chen Z.K., and Roco M.C. International nanotechnology development in 2003: Country, institution, and technology field analysis based on USPTO patent database. Journal of Nanoparticle Research 6 4 (2004) 325-354
-
(2004)
Journal of Nanoparticle Research
, vol.6
, Issue.4
, pp. 325-354
-
-
Huang, Z.1
Chen, H.2
Chen, Z.K.3
Roco, M.C.4
-
25
-
-
33751178037
-
-
The Age Newspaper, Melbourne
-
Hughes G. Analyze This (2003), The Age Newspaper, Melbourne
-
(2003)
Analyze This
-
-
Hughes, G.1
-
26
-
-
33751193280
-
-
IDSS, N.T.U. Institute of Defence and Strategic Studies (IDSS), Singapore
-
IDSS. Conflict and Non-traditional Security (2003), N.T.U. Institute of Defence and Strategic Studies (IDSS), Singapore
-
(2003)
Conflict and Non-traditional Security
-
-
-
27
-
-
33751165285
-
-
ISI, Institute for Scientific Information (ISI), Philadelphia
-
ISI. Citation Thresholds (2003), Institute for Scientific Information (ISI), Philadelphia
-
(2003)
Citation Thresholds
-
-
-
28
-
-
24944507278
-
-
ISI, Institute for Scientific Information (ISI), Philadelphia
-
ISI. How Does ISI identify Highly Cited Researchers? (2003), Institute for Scientific Information (ISI), Philadelphia
-
(2003)
How Does ISI identify Highly Cited Researchers?
-
-
-
30
-
-
33751164466
-
-
School of Library and Information Science and School of Informatics, University of Indiana, Bloomington
-
Ke W., Börner K., and Liswanti L. Analysis and Visualization of the IV 2004 Contest Dataset (2004), School of Library and Information Science and School of Informatics, University of Indiana, Bloomington
-
(2004)
Analysis and Visualization of the IV 2004 Contest Dataset
-
-
Ke, W.1
Börner, K.2
Liswanti, L.3
-
32
-
-
33751166613
-
-
Congressional Research Service, Library of Congress, Washington, DC p. 61
-
Knezo G.J. Homeland Security and Counterterrorism Research and Development: Funding, Organization, and Oversight (2003), Congressional Research Service, Library of Congress, Washington, DC p. 61
-
(2003)
Homeland Security and Counterterrorism Research and Development: Funding, Organization, and Oversight
-
-
Knezo, G.J.1
-
37
-
-
84933483581
-
Academic research and government policy on terrorism
-
Merari A. Academic research and government policy on terrorism. Terrorism and Political Violence 3 1 (1991) 88-102
-
(1991)
Terrorism and Political Violence
, vol.3
, Issue.1
, pp. 88-102
-
-
Merari, A.1
-
38
-
-
33751192939
-
-
NameBase, Public Information Research, Inc., San Antonio
-
NameBase. Name Base (2004), Public Information Research, Inc., San Antonio
-
(2004)
Name Base
-
-
-
40
-
-
1142296991
-
Hyperlink analyses of the world wide web: a review
-
Park H.W., and Thelwall M. Hyperlink analyses of the world wide web: a review. JCMC 8 4 (2003)
-
(2003)
JCMC
, vol.8
, Issue.4
-
-
Park, H.W.1
Thelwall, M.2
-
42
-
-
0030780643
-
Evolution of a body of knowledge: an analysis of terrorism research
-
Reid E.O.F. Evolution of a body of knowledge: an analysis of terrorism research. Information Processing and Management 33 1 (1997) 91-106
-
(1997)
Information Processing and Management
, vol.33
, Issue.1
, pp. 91-106
-
-
Reid, E.O.F.1
-
43
-
-
24944570663
-
-
Reid, E., Chen, H., 2005. Mapping the contemporary terrorism research domain: researchers, publications, and institutions analysis. In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, May 2005, Proceedings. Lecture Notes in Computer Science, 3495. Springer, Berlin, pp. 322-329.
-
-
-
-
44
-
-
35048854724
-
-
Reid, E., Qin, J., Chung, W., Xu, J., Zhou, Y., Schumaker, R., Sageman, M., Chen, H., 2004. Terrorism knowledge discovery project: a knowledge discovery approach to addressing the threats of terrorism. In: Intelligence and Security Informatics, 2nd Symposium on Intelligence and Security Informatics, ISI 2004, Proceedings, Springer, Berlin, pp.125-145.
-
-
-
-
45
-
-
33751197075
-
-
RIIA, 2005. Security, Terrorism and the UK. I.S P. Chatham House, Royal Institute of International Affairs, p. 8.
-
-
-
-
46
-
-
0003392415
-
-
Oxford, North Holland
-
Schmid A., and Jongman A. Political Terrorism: A New Guide to Actors, Authors, Concepts, Data Bases, Theories and Literature (1988), Oxford, North Holland
-
(1988)
Political Terrorism: A New Guide to Actors, Authors, Concepts, Data Bases, Theories and Literature
-
-
Schmid, A.1
Jongman, A.2
-
47
-
-
85045162951
-
-
Transaction, New Brunswick
-
Schmid A., and Jongman A. Political Terrorism: A New Guide to Actors, Authors, Concepts, Data Bases, Theories and Literature (2005), Transaction, New Brunswick
-
(2005)
Political Terrorism: A New Guide to Actors, Authors, Concepts, Data Bases, Theories and Literature
-
-
Schmid, A.1
Jongman, A.2
-
48
-
-
33751192312
-
-
Shiffrin, R.M., Börner, K., 2004. Mapping Knowledge Domains. Arthur M. Sackler Colloquium of the National Academy of Sciences. Held May 9-11, 2003, at the Arnold and Mabel Beckman Center of the National Academies of Sciences and Engineering, Irvine, CA.
-
-
-
-
49
-
-
84906620346
-
Road Less Traveled: Recent Trends in Terrorism Research
-
Silke A. (Ed), Frank Cass, London
-
Silke A. Road Less Traveled: Recent Trends in Terrorism Research. In: Silke A. (Ed). Research on Terrorism: Trends, Achievements and Failures (2004), Frank Cass, London 186-213
-
(2004)
Research on Terrorism: Trends, Achievements and Failures
, pp. 186-213
-
-
Silke, A.1
-
50
-
-
0035738867
-
Devil You Know: Continuing Problems with Terrorism Research
-
Silke A. Devil You Know: Continuing Problems with Terrorism Research. Terrorism and Political Violence 13 4 (2001) 1-14
-
(2001)
Terrorism and Political Violence
, vol.13
, Issue.4
, pp. 1-14
-
-
Silke, A.1
-
51
-
-
24944564348
-
-
Sun, Z., Lim, E.P., Chang, K., Ong, T.K., Gunaratna, R.K., 2005. Event-driven document selection for terrorism-information extraction. in: intelligence and security informatics. In: IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, May 2005, Proceedings. Lecture Notes in Computer Science, vol. 3495. Springer, Berlin, pp. 37-48.
-
-
-
-
52
-
-
0032047559
-
Visualizing a discipline: an author co-citation analysis of information science 1972-1995
-
White H.D., and McCain K.W. Visualizing a discipline: an author co-citation analysis of information science 1972-1995. Journal of the American Society of Information Science 49 4 (1998) 327-355
-
(1998)
Journal of the American Society of Information Science
, vol.49
, Issue.4
, pp. 327-355
-
-
White, H.D.1
McCain, K.W.2
-
53
-
-
33751172569
-
-
White, H.D., Lin, X., Buzydlowski, J., 2001. Co-cited Author Maps as Real-time Interfaces for Web-based Document Retrieval in the Humanities. In: Joint International Conference o the Association for Computers and the Humanities and the Association for Literary and Linguistics Computing (ALLC), ACH/ALLC, New York City.
-
-
-
-
55
-
-
0042285110
-
Trends in international terrorism and the american response
-
Freedman L., and Hill C. (Eds), Routledge and Kegan Paul, London
-
Wilkinson P. Trends in international terrorism and the american response. In: Freedman L., and Hill C. (Eds). Terrorism and International Order (1986), Routledge and Kegan Paul, London 37-55
-
(1986)
Terrorism and International Order
, pp. 37-55
-
-
Wilkinson, P.1
-
56
-
-
33751197746
-
-
Westermorland General Meeting Preparing for Peace Initiative, United Kingdom
-
Wilkinson P. Terrorism: Implications for World Peace (2003), Westermorland General Meeting Preparing for Peace Initiative, United Kingdom
-
(2003)
Terrorism: Implications for World Peace
-
-
Wilkinson, P.1
|