Comment
new

Article
Benjamin Lee
Think Global, Act Local: Reconfiguring Siege Culture
Article
| 5 min read
new

Article
Simon Oleszkiewicz
The Adaptable Law Enforcement Officer
Article
| 5 min read

Article
Emily Collins, Phillip Morgan, Dylan Jones
If This Then…What? Security And Privacy In Trigger-Action Systems
Article
| 3 min read

Article
Emma Williams, Emma Slade
What Influences Consumer Adoption and Secure Use of Smart Home Technology?
Article
| 3 min read

Article
Duncan Hodges
Mapping Smart Home Vulnerabilities to Cyber-Enabled Crime
Article
| 3 min read

Article
Florence Keen
After 8chan
Article
| 6 min read

Article
Blyth Crawford
/K/ and the Visual Culture of Weapons Boards
Article
| 10 min read

Article
Michele Grossman, Paul Thomas
Community Reporting on Terrorism: Bystanders Versus Social Intimates
Article
| 4 min read

Article
Paul Thomas, Michele Grossman
Community Reporting of Terrorist Involvement During Covid-19
Article
| 4 min read

Article
Peter Lee
Psychological trauma – it’s what happens to other people. Right?
Article
| 4 min read

Article
Benjamin Lee
Blind Networks in the Extreme-Right
Article
| 4 min read

Article
Nick Neave
The Risks of Digital Hoarding
Article
| 3 min read

Article
Oli Buckley
CLICKA
Article
| 4 min read

Article
Benjamin Lee
A Short Guide to Narratives of the Far-Right
Article
| 3 min read

Article
Kristoffer Geyer
Understanding digital traces
Article
| 4 min read

Article
Emma Boakes
How Do Security Teams Collaborate To Understand Threats to Their Building Management Systems?
Article
| 4 min read

Article
Olivia Brown
Teamwork in Extreme Environments: Identifying Challenges and Generating Solutions
Article
| 4 min read

Article
Jordan Nunan
Developing an Evidenced-Based Approach to Enhance Recall of Intelligence
Article
| 4 min read

Article
Joel Busher, Gareth Harris, Graham Macklin
Credibility contests and the ebb and flow of anti-minority activism
Article
| 10 min read

Article
Rosie Mutton
Understanding the Roles Women Play in Violence Extremism and Why it Matters
Article
| 4 min read

Article
Jordan Nunan
Increasing Accurate Recall in Human Sources
Article
| 3 min read

Article
Alan Ogle
Remote Combat Readiness and Resiliency
Article
| 5 min read

Article
Natalia Trujillo, Juan Esteban Ugarriza
The Deep Effects of Armed Conflict: Intervening in the Complexities of Post-Conflict Reconciliation
Article
| 5 min read

Article
Susie Ballentyne
Refugee Resilience: Where Should We Be Looking?
Article
| 5 min read

Article
Mustafa Sarkar
Developing Resilience for Sustained Success
Article
| 7 min read

Article
Jason Nurse
Cyber Resilience: What Is It and How Do We Get It?
Article
| 5 min read

Article
Aaron Roberts, Neville Stanton
Go with the (Information) Flow? How to Develop more Resilient Sociotechnical Systems
Article
| 4 min read

Article
Nick Crossley
Strengths and Vulnerabilities in (Covert) Network Structure
Article
| 4 min read

Article
Emma Grace
Bouncing Back: Stress and Resilience in Al-Qaeda Terrorists
Article
| 6 min read

Article
Lorraine Hope
From the Lab to Operational Response: Examining the Impact of Stress On Memory for High Pressure Incidents
Article
| 5 min read

Article
Marc Jones
Challenge or Threat: Understanding How People Cope in Demanding Environments
Article
| 5 min read

Article
Jesper Corneliussen, Anders Kjaergaard
Conflict Management in Extreme Environments
Article
| 4 min read

Article
Kristine Endsjø
Affect and emotion in extremist discourse
Article
| 3 min read

Article
Abbie Marono
Is nonverbal mimicry an important tool in eliciting information?
Article
| 3 min read

Article
Christina Winters
Increasing Self-Disclosure in Interviews
Article
| 4 min read

Article
Noémie Bouhana
Analysing Lone-Actor Terrorism in Context
Article
| 5 min read

Article
Duncan Hodges
A–Z Of Data
Article
| 3 min read

Article
Joel Busher, Donald Holbrook, Graham Macklin
Explaining Non- Or Limited Escalation Of Violence: The role of ‘Internal Brakes'
Article
| 3 min read

Article
Sarah Marsden
Countering Violent Extremism: A Guide to Good Practice
Article
| 4 min read

Article
Pamela Hanway
Cognitive Load at Interview: The Interviewer's Perspective
Article
| 3 min read

Article
Feni Kontogianni
Untangling the past: remembering details of repeated events
Article
| 3 min read

Article
Paul Taylor
From data to datum: What should I do in this case?
Article
| 4 min read

Article
Debi Ashenden
Algorithmic Decision Making
Article
| 5 min read

Article
Joanne Hinds
Behaviour Prediction: The Challenges and Opportunities of Big Data
Article
| 4 min read

Article
Pip Thornton
Words as Data: The Vulnerability of Language in an Age of Digital Capitalism
Article
| 5 min read

Article
Ryan Boyd, Paul Kapoor
Psychological Profiling and Event Forecasting Using Computational Language Analysis
Article
| 5 min read

Article
Debi Ashenden
Data and the Social and Behavioural Sciences
Article
| 4 min read

Article
Lorraine Hope, Wayne Thomas
A–Z of influence tactics and topics
Article
| 4 min read

Article
Gordon Wright, Nelli Ferenczi
Cross-cultural dimensions impacting persuasion and influence in security contexts
Article
| 4 min read