Article
Dr Bettina Rottweiler, Professor Paul Gill
Risk Factors for Violent Extremist Beliefs and Parallel Problem Areas
Article
|
3 min read
Article
Caroline Logan
Violent Extremism: The Assessment And Management Of Risk
Article
|
7 min read
Article
Nadine Salman, Professor Paul Gill
Terrorism Risk Assessment: What Makes A ‘Good’ Risk Assessor?
Article
|
4 min read
Article
David McIlhatton, Rachel Monaghan
Protecting Publicly Accessible Locations From Terrorism
Article
|
5 min read
Article
Steven Watson
Risk, benefits, and the affect heuristic in security behaviours
Article
|
6 min read
Article
Matthew Fields
Proof of Life or Death?
Article
|
4 min read
Report
Nigel Copsey, Samuel Merrill
Understanding 21st-Century Militant Anti-Fascism
Report
|
4 min read
Article
Duncan Hodges
Mapping Smart Home Vulnerabilities to Cyber-Enabled Crime
Article
|
3 min read
Report
Simon Copeland, Sarah Marsden
The Relationship Between Mental Health Problems and Terrorism
Report
|
3 min read
Report
Simon Copeland, Sarah Marsden
Extremist Risk Assessment
Report
|
2 min read
Report
Sarah Marsden, Simon Copeland
Right-Wing Terrorism: Pathways and Protective Factors
Report
|
4 min read
Report
Sarah Marsden, Simon Copeland
Managing Terrorism-Related Offenders in Prison
Report
|
3 min read
Report
Math Noortmann, Juliette Koning, Joost Vervoort, Ingrid Hoofd
Imaginative Scenario Planning
Report
|
2 min read
Guide
Math Noortmann, Juliette Koning
Imaginative Scenario Planning Toolkit
Guide
|
2 min read
Report
Monica Lloyd
Extremism Risk Assessment: A Directory
Report
|
2 min read
Article
Professor Paul Gill
8 things you need to know about terrorist decision-making
Article
|
4 min read
Article
Renate Geurts
Why professionals are needed to assess threats of violence
Article
|
3 min read
An Evidence Synthesis of Covert Online Strategies Regarding Intimate Partner Violence

This systematic review synthesizes evidence of how people use the internet to deploy covert strategies around escaping from, or perpetrating, intimate partner violence (IPV). Online tools and services can facilitate individuals leaving abusive relationships, yet they can also act as a barrier to departure. They may also enable abusive behaviors. A comprehensive literature search of published and unpublished studies in electronic databases was conducted. Two researchers independently screened abstracts and full texts for study eligibility and evaluated the quality of included studies. The systematic review includes 22 studies (9 qualitative and 11 cross-sectional studies, a randomized control trial [RCT] and a nonrandomized study [NRS]) published between 2004 and 2017. Four covert behaviors linked to covert online strategies around IPV were identified: presence online, granular control, use of digital support tools and services, and stalking and surveillance. The same technology that provides individuals with easy access to information and supportive services related to IPV, such as digital devices, tools, and services, also enables perpetrators to monitor or harass their partners. This review takes a rigorous interdisciplinary approach to synthesizing knowledge on the covert strategies adopted by people in relation to IPV. It has particular relevance to practitioners who support survivors in increasing awareness of the role of digital technologies in IPV, to law enforcement agencies in identifying new forms of evidence of abuse, and in enabling designers of online/social media applications to take the needs and vulnerabilities of IPV survivors into account.

(From the journal abstract)


Grimani, A., Gavine, A., & Moncur, W. (2020b). An Evidence Synthesis of Covert Online Strategies Regarding Intimate Partner Violence. Trauma, Violence, & Abuse, 152483802095798.

https://doi.org/10.1177/1524838020957985
Violent Extremism: A Comparison of Approaches to Assessing and Managing Risk

The task of assessing and managing risk of violence has evolved considerably in the last 25 years, and the field of violent extremism has the potential to stand on the shoulders of the giants of this time. Therefore, the objective of this study was to identify good practice in the risk field and to apply that to the specific area of risk in relation to violent extremism – in order that developments here accord to highest standards of practice achieved so far elsewhere.

Method and Results

We begin by addressing the essential requirement to define the task of assessing and managing the risk of violent extremism – What is its purpose and parameters, who are its practitioners, in what contexts is this activity delivered, and how might any such context both facilitate and hinder the objectives of the task? Next, we map the terrain – What guidance is already available to assist practitioners in their work of understanding and managing the risk of violent extremism, and by what standards may we judge the quality of this and future guidance in the contexts in which is it applied? Finally, we explore options for the development of the field in terms of the empirical basis upon which the risks presented by individuals and the organizations to which they may affiliate are assessed, understood, and managed.

Conclusions

Recommendations are proposed in relation to each of these three areas of concern with a view to supporting the rapid and credible advancement of this growing and vital area of endeavour.

(From the journal abstract)


Caroline Logan and Monica Lloyd. 2019. ‘Violent Extremism: A Comparison of Approaches to Assessing and Managing Risk’. Legal and Criminological Psychology, 24 (1): 141–61. https://doi.org/10.1111/lcrp.12140.

Informal Countermessaging: The Potential and Perils of Informal Online Countermessaging

Online countermessaging—communication that seeks to disrupt the online content disseminated by extremist groups and individuals—is a core component of contemporary counterterrorism strategies. Countermessaging has been heavily criticized, not least on the grounds of effectiveness. Whereas current debates are focused on the role of government and large organizations in developing and disseminating countermessages, this article argues that such approaches overlook the informal production of countermessages. Recognizing the appetite for “natural world” content among those engaged in countermessaging, this article highlights some of the potential benefits of informal approaches to countermessaging. At the same time, the article also acknowledges the risks that may result from closer working between countermessaging organizations and informal actors.

(From the journal abstract)


Benjamin Lee. 2018. ‘Informal Countermessaging: The Potential and Perils of Informal Online Countermessaging’. Studies in Conflict & Terrorism: 1–17. https://doi.org/10.1080/1057610X.2018.1513697.

Back to top