Research Note: Using the ITERATE and DOTS Databases
For more than three decades, Vinyard Software's two ITERATE (International Terrorism: Attributes of Terrorist Events) datasets have set the standard in events research for terrorism researchers. It has recently been supplemented by the DOTS (Data on Terrorist Subjects) biographies project, whic...
Main Authors: | Edward Mickolus, Peter A Flemming, Todd Sandler |
---|---|
Format: | Article |
Language: | English |
Published: |
Henley-Putnam University
2008-01-01
|
Series: | Journal of Strategic Security |
Subjects: | |
Online Access: | http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1046&context=jss |
Similar Items
-
Efficacy of Modified Cognitive Interviewing, Compared to Human Judgments in Detecting Deception Related to Bio-threat Activities
by: Dr. Charles A. Morgan, et al.
Published: (2013-08-01) -
Alternative Threat Methodology
by: Charles B. King III
Published: (2011-01-01) -
Decision Support for Countering Terrorist Threats against Transportation Networks
by: Dr. Richard Adler, et al.
Published: (2009-01-01) -
The London 2012 Olympic and Paralympic Games Olympic—Intelligence Centre: Lessons Learned from Working with the Olympic Sponsors and the Private Sector
by: Sue Wilkinson
Published: (2013-06-01) -
Rainy Street Stories: Reflections on Secret Wars, Espionage and Terrorism. By John William Davis, Huntsville, Alabama, Red Bike Publishing, 2013.
by: Millard E. Moon Colonel (ret.)
Published: (2014-12-01)