Bonfanti, Matteo E., and Francesca Capone. (2015) 2015. “Fostering a Comprehensive Security Approach: An Exploratory Case Study of CBRN Crisis Management Frameworks in Eleven European Countries”. Information & Security: An International Journal 33 (1): 55-80. http://dx.doi.org/10.11610/isij.3303.
Comprehensive Approach
Prezelj, Iztok. (2015) 2015. “Comprehensive Security and Some Implemental Limits”. Information & Security: An International Journal 33 (1): 13-34. http://dx.doi.org/10.11610/isij.3301.
Sweijs, Tim, and Milos Jovanovic. (2015) 2015. “Assessing Comprehensive Security Approaches in Action: An Introduction”. Information & Security: An International Journal 33 (1): 5-9. http://dx.doi.org/10.11610/isij.3300.
Crawshaw, Mike, John Rose, Martin Erdmann, Robert Loftis, James Soligan, Eric Edelman, and Hikmet Ç. etin. (2007) 2007. “A Comprehensive Approach to Modern Conflict: Afghanistan and Beyond”. Connections: The Quarterly Journal 6 (2): 1-66. http://dx.doi.org/10.11610/Connections.06.2.01.