Comment

Article
Sian Watson, Jonathan Kenyon
Measuring Change in Terrorist Engagement: Challenges and Future Directions
Article |
6 min read

Article
Kiren Vadher
Evaluating in complex policy environments - a practitioner’s perspective
Article |
4 min read

Article
Ardi Janjeva
The Growing Importance of AI Evaluation in Addressing Security Risks
Article |
4 min read

Article
James Lewis, Sarah Marsden
Evaluating Terrorism and Targeted Violence Prevention Programmes: From What Works to How Programmes Work
Article |
4 min read

Article
Gordon Clubb
Transparency, Evaluation and Standards: avoiding pitfalls
Article |
5 min read

Article
Matt Allen, Andrea Walker
Evaluating for Sustainability
Article |
4 min read

Article
Nick Dale
A New Era of Trust in Policing?
Article |
4 min read

Article
Bianca Slocombe, Rachel Monaghan
Empirical evidence for terrorist targeting frameworks
Article |
4 min read

Article
Adrian Cherney
Evaluating the impact of programmes to counter violent extremism: what are the options?
Article |
5 min read

Article
Daniel Koehler, Verena Fiebig, Irina Jugl-Kuntzsch
Quality Control and Management in Countering Violent Extremism Programmes: A Guideline
Article |
6 min read

Article
Erika Brady
Key considerations when evaluating counterterrorism strategies
Article |
6 min read

Article
Michael Williams, Tim Hulse
Greater than the sum of its parts: Using shared metrics to compare prevention projects
Article |
10 min read

Article
Jessica White, Isabella Vogel
Operationalising the Women, Peace, and Security Agenda
Article |
5 min read

Article
Leena Malkki, Irina van der Vet
Five steps for building evaluation culture in the P/CVE field. Lessons learnt from the INDEED project and beyond
Article |
4 min read

Article
Kirk Luther, Joseph Eastwood, Brent Snook
Artful Insights: Enhancing Recall in Investigative Interviews through Sketching
Article |
4 min read

Article
Paul Martin
Ten top tips on insider risk
Article |
6 min read

Article
Jason Nurse
Could ransomware be the key to better cyber deterrence strategies?
Article |
5 min read

Article
Zoe Marchment
The Unintended Consequences of Crime Prevention Measures
Article |
4 min read

Article
Chloe Squires
Prosecuting female terrorists: What do we know?
Article |
4 min read

Article
David McIlhatton
Evaluating Security Interventions for Venues and Public Spaces
Article |
6 min read

Article
Don Grubin
Risk assessment and polygraph testing
Article |
4 min read

Paul Thomas, Michele Grossman
New international dimensions in community reporting of terrorist involvement
4 min read

Article
Taylor Cilke, Mary Rowe
Bystander Reporting Helps Prevent Mass Violence
Article |
4 min read

Article
Katie Benson
Deterring the ‘Enablers’ of Illicit Finance
Article |
3 min read

Article
Allysa Czerwinsky
Lonely Boys and Misogynist Inceldom: Considerations for Practitioners who Encounter Boys and Men at Risk of Male Supremacist Thinking
Article |
4 min read

Article
Eric Shaw
From research to practice and back again: implications of the Critical Pathway to Insider Risk for current personnel security practices
Article |
5 min read

Article IAPSS update
IAPSS Review
Showcasing and Supporting Early Career Researchers
Article | IAPSS update |
5 min read

Article IAPSS update
Richard Legault, Brett Kubicek
Introduction from the 5RD CVEN co-chairs
Article | IAPSS update |
5 min read

Article IAPSS update
Garth Davies, Mackenzie Hart
Online extremist threats: A view from the trenches
Article | IAPSS update |
4 min read

Article IAPSS update
Paul Gill, Callie Vitro
Science of violent extremism risk assessment and management: An agenda for moving beyond the ‘state of the art’
Article | IAPSS update |
4 min read

Article IAPSS update
Anna Leslie, Simon Wells
Translating research into practice
Article | IAPSS update |
6 min read

Article IAPSS update
Michele Grossman
Threats to Democracies: A view from Australia
Article | IAPSS update |
6 min read

Article IAPSS update
Pete Simi
Threats to Democracy in the US
Article | IAPSS update |
4 min read

Article IAPSS update
Samuel T. Hunter, Austin C. Doctor, Katherine L. Parsons
Emerging tech and terrorism: Adoption patterns and implications
Article | IAPSS update |
4 min read

Article IAPSS update
Sean McCafferty
Moderation of terrorist content since October 7th and a lack of adversarial shift
Article | IAPSS update |
5 min read

Article IAPSS update
Lenita Törning
Mixing security and social care logics: Experiences from the Swedish support model to prevent violent extremism
Article | IAPSS update |
3 min read

Article IAPSS update
Michael Jensen, Julian Junk
The case for establishing a global research meta-database
Article | IAPSS update |
4 min read

Article IAPSS update
Lotta Rahlf
P/CVE in Europe: Still dominated by the state
Article | IAPSS update |
4 min read

Article IAPSS update
Antoine Baudon
The power of Monitoring and Evaluation (M&E) in strengthening prevention programmes
Article | IAPSS update |
5 min read

Article
Mattias Sjöberg
Interpersonal sensemaking: A powerful tool for facilitating cooperation in suspects
Article |
3 min read

Article
Lorraine Hope
Navigating Cross-Cultural Challenges in Rapport Building and Information Gathering: Preparing interviewers for effective interactions
Article |
3 min read

Article
Vincent Denault, Aldert Vrij
“The eyes can’t lie”: misconceptions about nonverbal communication and why they matter
Article |
7 min read

Article
Rachel Monaghan, Bianca Slocombe
The Prosecution Landscape for Extremist Actors in the UK
Article |
5 min read

Article
Joel Busher, Sarah Marsden, Leena Malkki
Radicalisation and Counter-Radicalisation Research: Past, Present and Future
Article |
4 min read

Article
Nadine Salman, Zainab Al-Attar
Neurodivergence and Extremism: Considerations for Practice
Article |
4 min read

Article
Laura Stevens, Tia Bennett, Sarah Rockowitz, Heather Flowe
The role of digital technologies (GBVxTech) in communicating gender-based violence
Article |
4 min read

Article
Anastasia Kordoni, Shengnan Liu, Miriam Koschate-Reis, Mark Levine
Investigating the Influence of Hybrid Social Identities in Online Communities
Article |
4 min read

Article
Marc Kydd, Lynsay Shepherd, Graham Johnson, Andrea Szymkowiak
Love Bytes – Improving Romance Fraud Prevention
Article |
5 min read

Article
Austin C. Doctor, Gina Ligon, Samuel T. Hunter
Militant Leadership and the Severity of Terrorism in Conflict Environments
Article |
4 min read

Article
Becky Phythian
Law enforcement information sharing for the 21st Century
Article |
4 min read