Works matching DE "STRATEGIC culture"
1
- Cambridge Review of International Affairs, 2021, v. 34, n. 4, p. 510, doi. 10.1080/09557571.2019.1642301
- Article
2
- Cambridge Review of International Affairs, 2017, v. 30, n. 1, p. 67, doi. 10.1080/09557571.2016.1256947
- Article
3
- Buletin Stiintific, 2018, v. 23, n. 1, p. 26, doi. 10.2478/bsaft-2018-0004
- Article
4
- Review of Management & Economic Engineering, 2009, v. 8, n. 1, p. 111
- Blaga, Bogdan Lucian;
- Cordoş, Roxana Carmen
- Article
5
- Pakistan Horizon, 2014, v. 67, n. 3/4, p. 15
- Article
6
- War in History, 2014, v. 21, n. 1, p. 4, doi. 10.1177/0968344513505523
- Article
7
- Journal of Counterterrorism & Homeland Security International, 2011, v. 17, n. 2, p. 42
- Article
9
- Lithuanian Annual Strategic Review, 2013, v. 12, n. 1, p. 33, doi. 10.2478/lasr-2014-0002
- Article
10
- Lithuanian Annual Strategic Review, 2013, v. 12, n. 1, p. 223, doi. 10.2478/lasr-2014-0010
- Article
11
- Korean Journal of Defense Analysis, 2010, v. 22, n. 3, p. 283, doi. 10.1080/10163271.2010.500002
- Article
12
- Canadian Foreign Policy Journal (CFPJ), 2016, v. 22, n. 2, p. 173, doi. 10.1080/11926422.2016.1144213
- Article
13
- Canadian Foreign Policy Journal (CFPJ), 2016, v. 22, n. 2, p. 184, doi. 10.1080/11926422.2015.1083871
- Article
14
- Georgetown Journal of International Affairs (Georgetown University Press), 2015, v. 16, n. 2, p. 133
- Article
15
- Contemporary Security Policy, 2019, v. 40, n. 3, p. 335, doi. 10.1080/13523260.2019.1594534
- Beeson, Mark;
- Bloomfield, Alan
- Article
16
- Contemporary Security Policy, 2014, v. 35, n. 2, p. 227, doi. 10.1080/13523260.2014.928070
- Article
17
- Contemporary Security Policy, 2014, v. 35, n. 2, p. 290, doi. 10.1080/13523260.2014.928084
- Article
18
- Contemporary Security Policy, 2014, v. 35, n. 2, p. 165, doi. 10.1080/13523260.2014.927678
- Article
19
- Contemporary Security Policy, 2014, v. 35, n. 2, p. 211, doi. 10.1080/13523260.2014.927677
- Article
20
- Contemporary Security Policy, 2014, v. 35, n. 2, p. 166, doi. 10.1080/13523260.2014.927676
- Article
21
- Contemporary Security Policy, 2014, v. 35, n. 2, p. 270, doi. 10.1080/13523260.2014.927675
- Article
22
- Contemporary Security Policy, 2014, v. 35, n. 2, p. 310, doi. 10.1080/13523260.2014.927674
- Article
23
- Contemporary Security Policy, 2014, v. 35, n. 2, p. 249, doi. 10.1080/13523260.2014.927673
- Article
24
- Contemporary Security Policy, 2014, v. 35, n. 2, p. 187, doi. 10.1080/13523260.2014.927672
- Article
25
- Contemporary Security Policy, 2014, v. 35, n. 1, p. 3, doi. 10.1080/13523260.2014.884341
- Article
26
- Contemporary Security Policy, 2013, v. 34, n. 3, p. 419, doi. 10.1080/13523260.2013.842296
- Article
27
- Contemporary Security Policy, 2012, v. 33, n. 3, p. 437, doi. 10.1080/13523260.2012.727679
- Article
28
- Contemporary Security Policy, 2012, v. 33, n. 2, p. 337, doi. 10.1080/13523260.2012.693799
- Article
29
- Contemporary Security Policy, 2012, v. 33, n. 1, p. 59, doi. 10.1080/13523260.2012.659586
- Article
30
- Contemporary Security Policy, 2011, v. 32, n. 3, p. 484, doi. 10.1080/13523260.2011.626329
- Schmidt, Peter;
- Zyla, Benjamin
- Article
31
- Contemporary Security Policy, 2011, v. 32, n. 3, p. 567, doi. 10.1080/13523260.2011.623059
- Article
32
- Contemporary Security Policy, 2011, v. 32, n. 3, p. 644, doi. 10.1080/13523260.2011.623065
- Article
33
- Contemporary Security Policy, 2011, v. 32, n. 3, p. 625, doi. 10.1080/13523260.2011.623064
- Article
34
- Contemporary Security Policy, 2011, v. 32, n. 3, p. 604, doi. 10.1080/13523260.2011.623061
- Article
35
- Contemporary Security Policy, 2011, v. 32, n. 3, p. 517, doi. 10.1080/13523260.2011.623055
- Norheim-Martinsen, Per M.
- Article
36
- Contemporary Security Policy, 2011, v. 32, n. 3, p. 551, doi. 10.1080/13523260.2011.623058
- Article
37
- Contemporary Security Policy, 2011, v. 32, n. 3, p. 535, doi. 10.1080/13523260.2011.623057
- Article
38
- Contemporary Security Policy, 2011, v. 32, n. 3, p. 582, doi. 10.1080/13523260.2011.623060
- Article
39
- Contemporary Security Policy, 2011, v. 32, n. 3, p. 494, doi. 10.1080/13523260.2011.623053
- Article
40
- Contemporary Security Policy, 2008, v. 29, n. 2, p. 338, doi. 10.1080/13523260802284324
- Article
41
- Security & Defence Quarterly, 2021, v. 36, n. 4, p. 1, doi. 10.35467/sdq/140391
- Article
42
- International Studies Quarterly, 2011, v. 55, n. 3, p. 669, doi. 10.1111/j.1468-2478.2011.00648.x
- Article
43
- International Studies Review, 2009, v. 11, n. 3, p. 523, doi. 10.1111/j.1468-2486.2009.00872.x
- Article
44
- Political Studies Review, 2016, v. 14, n. 4, p. 512, doi. 10.1111/1478-9302.12058
- Article
45
- Journal of Indian & Asian Studies, 2020, v. 1, n. 1, p. 1, doi. 10.1142/S2717541320500023
- Article
46
- Journal of Financial, Accounting & Managerial Studies, 2020, v. 7, n. 2, p. 764
- Mounira, SLIMANI;
- Mohamed, HAOULI;
- Messaoud, TAHTOUH
- Article
47
- Journal of Baltic Studies, 2011, v. 42, n. 2, p. 143, doi. 10.1080/01629778.2011.569063
- Article
48
- European Journal of Political Research, 2015, v. 54, n. 4, p. 860, doi. 10.1111/1475-6765.12111
- Mérand, Frédéric;
- Foucault, Martial
- Article
49
- 2015
- Endres, Fabian;
- Mader, Matthias;
- Schoen, Harald
- Opinion
50
- Connections (18121098), 2010, v. 10, n. 1, p. 121, doi. 10.11610/Connections.10.1.06
- Article