Search results

Jump to navigation Jump to search
Results 1 – 21 of 1,242
Advanced search

Search in namespaces:

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • * [[Tact (psychology)]], a type of verbal operant described by B. F. Skinner * [[Terrorism Act (disambiguation)|Terrorism Act]] ...
    699 bytes (82 words) - 01:08, 16 May 2025
  • ...92.{{sfn|Thomann|2004|p=[https://books.google.com/books?id=ZgKTPWyWsFEC&dq=terrorism+underwriting+1960&pg=PA38 38]}} ...ch ensures that they can provide cover for losses resulting from acts of [[terrorism]], regardless of the scale of the claims. ...
    8 KB (1,200 words) - 01:43, 9 November 2023
  • {{Short description|Annual report by the US Department of State}} ...States Department of State]]. In 2005 it replaced the [[Patterns of Global Terrorism]] report, which had been released since 1985. ...
    8 KB (1,176 words) - 16:50, 11 February 2024
  • | name = Memorial Institute for the Prevention of Terrorism (MIPT) | method = ...
    9 KB (1,169 words) - 14:51, 31 March 2025
  • {{Short description|Direct selling method}} ...sperson uses the home party business model as a source for future business by asking attendees if they would like to host selling parties, too. ...
    5 KB (695 words) - 11:03, 5 November 2024
  • |subject = Threats to international peace and security caused by terrorist acts ...n">{{cite news|title=Security Council unanimously adopts wide-ranging anti-terrorism resolution; calls for suppressing financing, improving international cooper ...
    10 KB (1,360 words) - 21:12, 22 January 2025
  • ...equently referred to as the "[[community method]]", since it was that used by the European Community. ===Pillar I: European Communities (Community integration method) === ...
    8 KB (1,074 words) - 16:12, 1 May 2025
  • ...spiracy (political)|conspiratorial]] and [[Terrorism|terrorist]] [[tactic (method)|tactics]].<ref name=GSE>{{cite web|title=Ишутин Николай Андреевич|url=http ...reditary noble in his hometown of [[Serdobsk]]. He was raised in [[Penza]] by the family of his [[cousin]] [[Dmitry Karakozov]]. In 1863, he became a lec ...
    2 KB (313 words) - 19:48, 6 November 2024
  • * [[Investigative Project on Terrorism]], founded by Steven Emerson * [[IPT color space]], a method of mapping colors in a video system ...
    2 KB (282 words) - 19:03, 7 May 2025
  • ...ember 1898 following the assassination of [[Empress Elisabeth of Austria]] by [[Luigi Lucheni]] on the promenade of [[Lake Geneva]] on 10 September 1898. ...entification. This was developed from the ''bertillonage'' system invented by [[Alphonse Bertillon]] and involved the classification of criminal suspects ...
    5 KB (664 words) - 21:37, 2 June 2025
  • '''''Extremist Groups''': An International Compilation of [[Terrorism|Terrorist Organization]]s, Violent Political Groups, and Issue-Oriented Mil ...th their record); sources of its funding; its [[modus operandi]]/[[tactic (method)|tactics]]; its publications; its business network contacts; a chronology o ...
    2 KB (329 words) - 20:41, 2 May 2025
  • {{Short description|Canadian counter-terrorism expert}} |occupation =Counter-terrorism and deradicalization expert ...
    14 KB (1,922 words) - 05:18, 22 May 2025
  • ...m to this term is '''community-reinforcement''', which is a [[behavioral]] method to stop drug addiction.<ref>{{Google books |id=yhWB-JOQMUgC |page=149 |titl ...ptimal treatment outcome. In addition, treatment outcome can be influenced by factors such as therapist style and initial treatment intensity. Several st ...
    5 KB (659 words) - 18:31, 11 March 2023
  • {{Short description|Dutch terrorism academic}} [[File:Alexschmid.jpg|thumb|right|Alex Schmid at [[Centre for the Study of Terrorism and Political Violence|CSTPV]], [[University of St. Andrews]] in September ...
    19 KB (2,628 words) - 02:44, 28 May 2025
  • {{Short description|2005 book by Robert Pape}} | name = Dying to Win: The Strategic Logic of Suicide Terrorism ...
    18 KB (2,365 words) - 09:45, 4 September 2024
  • ...riminal investigation, including the full range of crimes from burglary to terrorism, not just those extreme crimes of violence that have an obvious [[psychopat ...ume 1'', pp. 1-15.</ref> as well as procedures for enhancing the processes by which interviews are carried out or information is put before the courts. O ...
    5 KB (689 words) - 04:14, 25 April 2025
  • ...clients. International pressure related to efforts to trace and identify [[terrorism|terrorists]] and [[drug trafficking|drug traffickers]] has eliminated the a ...sults in an extra flurry of attention. A number of plot devices detail the method of authentication of the account-holder, adding to the mystery and drama of ...
    3 KB (507 words) - 02:11, 3 January 2025
  • | name = Piracy Funds Terrorism Volume 1 | title = Piracy Funds Terrorism Volume 1 ...
    14 KB (1,976 words) - 09:05, 26 January 2025
  • ...weapon en-labels thin lines.svg|upright=1.5|right|thumb|The "gun" assembly method]] ...o a [[Critical mass (nuclear)|supercritical mass]] by the use of the "gun" method: shooting one piece of sub-critical material into another. Although this is ...
    17 KB (2,628 words) - 17:22, 11 May 2025
  • ...ne by men to enhance their physical appearance, or daily hygiene care done by men * [[Sex trafficking#Grooming|Sex trafficking]], using the 'loverboy method' to recruit victims into prostitution. ...
    3 KB (474 words) - 08:39, 15 June 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)