1. Study of Judicial Legal Person in Appeal Procedure from District Court to Provincial Court in Thailand. Issue 2 (2nd April 2016) Authors: Marpraneet, Natchai Journal: Journal of applied security research Issue: Volume 11:Issue 2(2016) Page Start: 199 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. The Uighurs Versus the Chinese Government: An Application of Realistic Conflict Theory. Issue 2 (2nd April 2016) Authors: Terhune, Victoria; Matusitz, Jonathan Journal: Journal of applied security research Issue: Volume 11:Issue 2(2016) Page Start: 139 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Erratum. Issue 2 (2nd April 2016) Journal: Journal of applied security research Issue: Volume 11:Issue 2(2016) Page Start: 229 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. An Axiological Aspect of Terrorism: Remarks on Scott Atran's Perspective. Issue 2 (2nd April 2016) Authors: Szocik, Konrad Journal: Journal of applied security research Issue: Volume 11:Issue 2(2016) Page Start: 111 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. John A. Turner, Religious Ideology and the Roots of the Global Jihad: Salafi Jihadism and International Order: London: Palgrave Macmillan (2014). 224 pages, £58.00 (hardcover). Issue 2 (2nd April 2016) Authors: Ibrahim, Mahmoud A. A. Journal: Journal of applied security research Issue: Volume 11:Issue 2(2016) Page Start: 220 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Security Enhancement for Mobile Ad Hoc Network Using Region Splitting Technique. Issue 2 (2nd April 2016) Authors: Kumar, P. Mohan; Gopalakrishnan, S. Journal: Journal of applied security research Issue: Volume 11:Issue 2(2016) Page Start: 185 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Political Bases as the Epicenter of Violence: Cases of Mazowe and Shamva, Zimbabwe. Issue 2 (2nd April 2016) Authors: Dodo, Obediah; Nsenduluka, Everisto; Kasanda, Sichalwe Journal: Journal of applied security research Issue: Volume 11:Issue 2(2016) Page Start: 208 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. New Metrics for Dynamic Analysis of Online Radicalization. Issue 2 (2nd April 2016) Authors: Wadhwa, Pooja; Bhatia, M. P. S. Journal: Journal of applied security research Issue: Volume 11:Issue 2(2016) Page Start: 166 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Omar Ashour, The De-Radicalization of Jihadists: Transforming Armed Islamist Movements: New York: Routledge (2009). 224 pages, £95.00 (hardcover), £25.99 (paperback). Issue 2 (2nd April 2016) Authors: Ibrahim, Mahmoud A. A. Journal: Journal of applied security research Issue: Volume 11:Issue 2(2016) Page Start: 225 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Emotional, Social, and Cognitive Intelligence as Predictors of Job Performance Among Law Enforcement Agency Personnel. Issue 2 (2nd April 2016) Authors: Adetula, Gabriel Agboola Journal: Journal of applied security research Issue: Volume 11:Issue 2(2016) Page Start: 149 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗