Quick overview

The conference will be held at Lancaster University's George Fox conference centre. Map of campus can be found here.

Tuesday 19th July

A coach will be provided from the conference to the Brewery, as well as a return journey from the Brewery back to the University (with a drop-off via the city centre). 


Wednesday 20th July

  • Morning: Parallel session presentations & lightning talk presentations  (George Fox)
  • 11:0012:30: Poster presentations & lunch
  • Afternoon: Parallel session presentations  (George Fox)
  • Evening: Keynote drinks reception and poster prize giving  (George Fox, Main Hall)

(Post keynote and drinks reception, coach provided for drop off in city centre)


Thursday 21st July

  • Morning: Parallel session presentations and panel discussions (George Fox)
  • 1345: Bus for delegates to Lancaster City Train Station
 Download the full timetable here or click on the day tabs below.


Risk and risk managementSocial Bias in Computational Social Science 
Eliciting and assessing informationKeynotes / Lightning talks / posters / panels
Deterrence and disruption 


12:00 – 13:30Registration and lunch (George Fox, Main hall)
13:30 – 15:00Welcome and Keynote (George Fox, LT1)
15:00 – 15:30 Refreshments
ThemeTheme 1 - Risk and risk managementTheme 2 - Eliciting and assessing informationTheme 3 - Deterrence and disruption
RoomLT1LT 5&6LT 2&3
15:30 – 17:30 Panel 1: Incels/ gender-informed violence Chair: Joel BusherPanel 2: Developments in interviewing techniques Chair: Simon WellsPanel 3: Offline, online and digital disruptions Chair: Iain Reid
Involuntary celibates (incels), violence and mental disorder: a narrative review with recommendations for best practice in risk assessment and clinical interventionBehavioural indicators of accurate recall: Harnessing meta-memory processes during police interviews during rape investigations to gauge accuracyFuture Threats from Disinformation: Risks and Challenges
Josephine BroydHeather Flowe & Madeleine InghamNeil Verrall
Domestic abuse and violent extremism: Unpacking the relationshipEnhancing deception detection in insurance claims settings: examining the effectiveness of variant Reality InterviewsHarnessing and Disrupting Group Processes Online
Paul GillAdam Charles HarveyLaura GE Smith
Trauma, Adversity and Violent Extremism: A Life Course ApproachExamining a new interview technique to gather information and elicit cues to deceit: The Ghostwriter MethodDigital Roles and the Performance of Extremists
James LewisJennifer BurkhardtClara Braun
The Con.Cel project: Exploring the online spread of Incel ideology.Assessing the credibility of the Asymmetric Information Management (AIM) techniqueDisrupting offline groups: methods and measures of effectiveness
Lewys BraceCody Normitta PorterPaul Taylor
19:30 onwards 

Conference Dinner 

1830 coach service to Brewery. Meet at George Fox main hall to walk over to coaches.



Risk and risk managementSocial Bias in Computational Social Science 
Eliciting and assessing informationKeynotes / Lightning talks / posters / panels
Deterrence and disruption 


08:30 – 09:00 Refreshments (George Fox, main hall)
 LT1LT 5&6LT 2&3
09:00 – 11:00 Panel 4: Constraints & protections Chair: Paul GrasbyPanel 5: Eliciting information: Online, offline and quickly Chair: Feni KontogianniPanel 6: Online-offline movements & subcultures Chair: Rachel Monaghan
Case managed interventions countering radicalisation to violence: Strengths-based approachesGetting information quickly: Development of the Time-Critical Questioning framework Terror, Politics, or Fun: Siege (Sub)Culture in the UK
James Lewis & Sarah MarsdenLorraine HopeBen Lee
Conceptualising protective factors and constraints on violence: A strengths-based approachStrategic evidence disclosure for interviewing suspects: Training U.S. investigators in research-informed tacticsRight-wing extremism in online spaces - can we use digital data to predict offline action?
Sarah MarsdenMarika MadforsOlivia Brown
Meta-analysis of Risk and Protective Factors for Conspiracy BeliefsEliciting information in online interactions: Development of a rapport-based protocol for security contexts    Digital traces of offline mobilization
Bettina RottweilerLorraine HopeLukasz Piwek
The escalation and inhibition of violence during waves of far right or anti-minority protests: An analysis of key relational mechanismsOnline counter-interrogation tactics by 
reluctant mock sources
How opposing ideological groups use the content and function of online interactions to mobilise collective action
Joel BusherAlejandra De La Fuente VilarOlivia Brown
11:00 – 12:30Poster Presentations
(Lunch served from 1200)
 LT1LT 2&3LT 5&6
12:30 - 14:00Lightning Talks – GF2&3 Chair: Paul TaylorLightning Talks – GF1 Chair: Stacey Conchie

WORKSHOP 1: Addressing bias in computational social science: What can we learn from social science theory? Chair: Sophie Nightingale Speaker: Adam Joinson

A Biosocial Criminology approach to White Collar Crime, biological interactions and consequences in the LawExploring the impact of Autism Spectrum Disorder on deceptive communication and deception detection
Domenico GalimiTiegan Blackhurst
Rebel loyaltiesVisualizing the membership of organized criminal syndicates: A field evaluation of the Reporting Information about Networks and Groups (RING) task
James HewittFeni Kontogianni
An Automated Assessment of Hybrid Identities in Online Extremist CommunitiesWhat we can learn from Father Ted about National Security
Shengnan LiuDavid McIlhatton & Paul Martin
From terrorist groups to organised crime gangs: the (de)securitisation of violent non-state political actors in Northern IrelandSecuring the code: Software developers perceptions' of security in their work.
Rachel MonaghanIain Reid
Discursive practices of perpetrators of misogynistic violenceCounter-terrorism strategic communication and the situational impacts on the ordering of risks and reality
Anne PeterscheckCharis Rice
A Systematic Review of Neurodiversity, Vulnerability, and Risk in the Context of Violent ExtremismCommunication behaviours in military investigative interviews.
Nadine SalmanMattias Sjoberg
What factors influence differential treatment of defendants in criminal justice system? The impact of gender stereotypes on the prosecution of terrorists in EnglandSecurity research through space and time: cultural differences and changes
Chloe SquiresLara Warmelink
 Bringing objective cyber risk assessments to software development teams
 Charles Weir
14:00 - 14:30Refreshments (George fox, main hall)
 LT1LT 5&6LT 2&3
14:30 - 16:30Panel 7: Risk assessment Chair: Bettina RottweilerPanel 8: Assessing information in the digital world Chair: Christina WintersPanel 9: Practitioner perspectives Chair: Olivia Brown
 Individual Differences in Violent Extremism Risk AssessmentPolicing and Social Media ScreeningA new scenario-based measurement to identify insider threat through the lens of the psychological contract
 Nadine SalmanMark RouncefieldNadine Michaelides
 RADAR-rechts: Development of a Risk Assessment Tool for the German State Protection StructureWho Are You? Exploring the Threat of Automated User Mimicry in Deceiving Online Social-Media AnalysisStress, health and performance in undercover policing: A systematic review and mixed research synthesis
 Lutz HeilKeenan JonesNathan Smith
 The Individual Case Analysis for the German State Protection StructureTalk to the Machines: Using Chatbots to Enhance Sensitive DisclosuresExploring adaptability in a covert police context
 Karl Hans MuellenOli  Buckley CANCELLEDSimon Oleszkiewicz
 The Extremism Risk Guidance (ERG22+) factors in terrorism and extremism research: A Rapid Evidence Assessment Does expertise moderate the use of digital trust signals and symbols when assessing online information?How do we Talk about Autism and ADHD when Assessing Extremism Risk
 Andrew SilkeRob Huw PeaceZainab & Cyrus Al-Attar & Abbasian
17:30 - 18:15Drinks reception -  George fox, main hall
18:15 - 18:30Prizegiving – George fox, main hall
18:30 - 19:30Keynote – George fox, LT1


Risk and risk managementSocial Bias in Computational Social Science 
Eliciting and assessing informationKeynotes / Lightning talks / posters / panels
Deterrence and disruption 


08:30 – 09:00 Refreshments (George fox, main hall)
 LT1LT 5&6LT 2&3
09:00 – 11:00 Panel 10: Online dynamics Chair: Ben LeePanel 11: Detecting deception and suspicious behaviour Chair: Heather FlowePanel 12: Deterring actors Chair: David McIlhatton 
Exploring the Role of the Internet in Radicalisation and Offending of Convicted Extremists in England and WalesDo referee-reports increase self-disclosure in vetting interviews?Deterring and disrupting non-rational actors
Jonathan Kenyon & Jens BinderChristina  WintersBianca Slocombe
Investigating the Cross-Platform Behaviours
of Online Hate Groups
Strategies used to detect suspicious behaviours in public placesBystander Reporting and Intervention Critical to Countering Violent Extremists
Fatima ZahrahUrszula MatthewsKristy Campbell
Understanding Online Hacktivist Groups: A Case Study on the Anonymous CollectiveActions speak louder than words: The Devil’s Advocate questioning protocol in opinions about protester actionsThe Phoenix Model of Disengagement and Deradicalisation
Keenan JonesAldert VrijJohn Morrison
Ideological radicalisation and tactical escalation during a wave of far right protest: A relational perspectiveVerbal Cues to Deceit when Lying through Omitting Information: Examining the Effect of a Model Statement Interview Protocol Trauma as a Risk Factor in Violent Extremist Mobilisation: Evidence from Central Asia
Joel BusherAldert VrijNoah Tucker
11:00 – 11:30 Refreshments (George fox, main hall)
 LT1 LT 5&6
11:30 – 12:30 

PANEL DISCUSSION: Research to practice

Chair: Anna Leslie


WORKSHOP 2:  Addressing bias in computational social science: Explanation rather than prediction? Chair: Sophie Nightingale Speaker: Paul Taylor

12:30 – 13:30 

Lunch for delegates (George fox, main hall)

Meet at BASS reception desk at 1330 to walk over to coach to station.

Back to top