Early career research on security threats

When we launched CREST, one of our central aims was to increase the capacity of researchers with the tools, the skills, and the desire to engage in research on security threats. A crucial element of that strategy was developing a new generation of researchers, from across a range of disciplines, who could be the future leaders of security research. We’ve directly funded over 30 PhD students and early career researchers within the CREST network.

To help support these researchers, we have special training and events to help develop their skills and allow them to meet and learn from each other’s experiences. We offer all of our PhD students supervision from experts across our network. This model of cross-site supervision ensures they get a range of experience and exposure to staff at several centres of excellence. We also offer all our early career researchers the opportunity to engage and learn from a range of stakeholders, learning how to design and communicate research that can be applied in real-world settings.

We’re proud of the range and quality of all the research CREST carries out to help understand, mitigate and counter security threats to the UK. But we’re especially excited about the new cohort of researchers that we’re developing. You can read all the blogs from our early career researchers here, and be sure to check back as they update us on their work.

Article
Kristine Endsjø
Affect and emotion in extremist discourse
Article
|
3 min read
Article
Emma Boakes
How Do Security Teams Collaborate To Understand Threats to Their Building Management Systems?
Article
|
4 min read
Article
Olivia Brown
Teamwork in extreme environments
Article
|
3 min read
Article
Olivia Brown
Teamwork in Extreme Environments: Identifying Challenges and Generating Solutions
Article
|
4 min read
Article
Jordan Nunan
Developing an Evidenced-Based Approach to Enhance Recall of Intelligence
Article
|
4 min read
Article
Jordan Nunan
Gathering Full and Faithful Human Intelligence
Article
|
3 min read
Article
Abbie Marono
Is nonverbal mimicry an important tool in eliciting information?
Article
|
3 min read
Article
Feni Kontogianni
Memory recall: The challenge of eliciting reliable information
Article
|
3 min read
Article
Lynn Weiher
How do we measure rapport in interviews?
Article
|
3 min read
Article
Christina Winters
Increasing Self-Disclosure in Interviews
Article
|
4 min read
Article
Emma Williams
What Makes People Susceptible to Malevolent Influence Online?
Article
|
3 min read
Article
James Lewis
How do teachers engage with Prevent?
Article
|
4 min read
Article
Simon Copeland
The Importance of Terrorists’ Families and Friends
Article
|
4 min read
Article
Ben Lee
Grassroots counter messaging in the UK
Article
|
3 min read
Article
Cerwyn Moore, Elizabeth Morrow
What role do women play in violent extremism?
Article
|
3 min read
Article
Rosie Mutton
The role of gender in violent extremism
Article
|
3 min read
Article
Kristoffer Geyer
Understanding digital traces
Article
|
4 min read
Article
Irina Tache
Connecting Culture to Deception Detection
Article
|
4 min read
Back to top