Research Terms
Psychology Information Management Military Intelligence Military Strategy and Tactics Criminal Behavior
Industries
Borum, R., Felker, J., Kern, S., Dennesen, K. & Feyes, T. (2015). Strategic Cyber Intelligence. Information Management and Computer Security, 23 (3), 317 – 332. DOI 10.1108/ICS-09-2014-0064
Borum, R. (2014). The Fox and the Hedgehog: Contrasting Approaches to Anticipating the Environment, Infinity Journal, 3(4), 430-33.
Borum, R., Felker, J., & Kern, S. (2014). Cyber Intelligence Operations: More than Just 1s & 0s. Proceedings of the Marine Safety and Security Council: The U.S. Coast Guard Journal of Safety and Security at Sea, 71(4), 65-68.
Borum, R. (2014). Getting ‘Left of the Hack’: Honing Your Cyber Intelligence Can Thwart Intruders. InfoSecurity Professional, 3(6), 25-29.
Borum, R. (2014). Psychological Vulnerabilities and Propensities for Involvement in Violent Extremism. Behavioral Sciences & the Law. Article first published online: 20 MAR 2014 | DOI: 10.1002/bsl.2110
Borum, R. (In Press). Assessing risk for terrorism involvement. Journal of Threat Assessment and Management.
Borum, R. (2013). Informing Lone Offender Investigations. Criminology & Public Policy, 12(1), 103-112.
Borum, R., Fein, R. & Vossekuil, B. (2012). Dimensions of Lone Offender Terrorism. Aggression & Violent Behavior: A Review Journal, 17, 389-396.
Borum, R. (2011). Seven pillars of small war power. Military Review, 91(4), 35-45.
Borum, R. (2011). Rethinking Radicalization. Journal of Strategic Security,4(4), 1-6.
Borum, R. (2011). Radicalization and Involvement in Violent Extremism I: A Review of Definitions and Applications of Social Science Theories. Journal of Strategic Security,4(4), 7-36.
Borum, R. (2011). Radicalization and Involvement in Violent Extremism II: A Review of Conceptual Models and Empirical Research. Journal of Strategic Security,4(4), 37-62.
Shumate, S. & Borum, R. (2006). Psychological consultation in Defense counterintelligence operations. Military Psychology, 18, 283-296.
Borum, R., Shumate, S. & Scalora, M. (2006). The psychology of leaking national security secrets: Implications for homeland security. Homeland Security Review, 1, 97-111.
Borum, R. (2004). Psychology of Terrorism. Tampa, FL: University of South Florida. (Monograph).
Borum, R., Bartel, P., Forth, A. (2006). Manual for the Structured Assessment of Violence Risk in Youth (SAVRY). Odessa, FL: Psychological Assessment Resources.
Author/Co-Author of approximately 160 professional publications.
Senior Editor, Military Cyber Affairs; 2014 - 2015
Senior Editor, Journal of Strategic Security; 2010 - 2015
University of South Florida 4202 E. Fowler Avenue CIS 1040 Tampa, FL 33620