Comment
Paul Thomas, Michele Grossman
New international dimensions in community reporting of terrorist involvement
4 min read
Article
Taylor Cilke, Mary Rowe
Bystander Reporting Helps Prevent Mass Violence
Article |
4 min read
Article
Katie Benson
Deterring the ‘Enablers’ of Illicit Finance
Article |
3 min read
Article
Allysa Czerwinsky
Lonely Boys and Misogynist Inceldom: Considerations for Practitioners who Encounter Boys and Men at Risk of Male Supremacist Thinking
Article |
4 min read
Article
Kirk Luther, Joseph Eastwood, Brent Snook
Artful Insights: Enhancing Recall in Investigative Interviews through Sketching
Article |
4 min read
Article
Paul Martin
Ten top tips on insider risk
Article |
6 min read
Article
Jason Nurse
Could ransomware be the key to better cyber deterrence strategies?
Article |
5 min read
Article
Zoe Marchment
The Unintended Consequences of Crime Prevention Measures
Article |
4 min read
Article
Chloe Squires
Prosecuting female terrorists: What do we know?
Article |
4 min read
Article
David McIlhatton
Evaluating Security Interventions for Venues and Public Spaces
Article |
6 min read
Article
Don Grubin
Risk assessment and polygraph testing
Article |
4 min read
Article
Eric Shaw
From research to practice and back again: implications of the Critical Pathway to Insider Risk for current personnel security practices
Article |
5 min read
Article IAPSS update
IAPSS Review
Showcasing and Supporting Early Career Researchers
Article | IAPSS update |
5 min read
Article IAPSS update
Richard Legault, Brett Kubicek
Introduction from the 5RD CVEN co-chairs
Article | IAPSS update |
5 min read
Article IAPSS update
Garth Davies, Mackenzie Hart
Online extremist threats: A view from the trenches
Article | IAPSS update |
4 min read
Article IAPSS update
Anna Leslie, Simon Wells
Translating research into practice
Article | IAPSS update |
6 min read
Article IAPSS update
Paul Gill, Callie Vitro
Science of violent extremism risk assessment and management: An agenda for moving beyond the ‘state of the art’
Article | IAPSS update |
4 min read
Article IAPSS update
Lenita Törning
Mixing security and social care logics: Experiences from the Swedish support model to prevent violent extremism
Article | IAPSS update |
3 min read
Article IAPSS update
Michael Jensen, Julian Junk
The case for establishing a global research meta-database
Article | IAPSS update |
4 min read
Article IAPSS update
Michele Grossman
Threats to Democracies: A view from Australia
Article | IAPSS update |
6 min read
Article IAPSS update
Pete Simi
Threats to Democracy in the US
Article | IAPSS update |
4 min read
Article IAPSS update
Samuel T. Hunter, Austin C. Doctor, Katherine L. Parsons
Emerging tech and terrorism: Adoption patterns and implications
Article | IAPSS update |
4 min read
Article IAPSS update
Sean McCafferty
Moderation of terrorist content since October 7th and a lack of adversarial shift
Article | IAPSS update |
5 min read
Article IAPSS update
Antoine Baudon
The power of Monitoring and Evaluation (M&E) in strengthening prevention programmes
Article | IAPSS update |
5 min read
Article IAPSS update
Lotta Rahlf
P/CVE in Europe: Still dominated by the state
Article | IAPSS update |
4 min read
Article
Lorraine Hope
Navigating Cross-Cultural Challenges in Rapport Building and Information Gathering: Preparing interviewers for effective interactions
Article |
3 min read
Article
Vincent Denault, Aldert Vrij
“The eyes can’t lie”: misconceptions about nonverbal communication and why they matter
Article |
7 min read
Article
Mattias Sjöberg
Interpersonal sensemaking: A powerful tool for facilitating cooperation in suspects
Article |
3 min read
Article
Rachel Monaghan, Bianca Slocombe
The Prosecution Landscape for Extremist Actors in the UK
Article |
5 min read
Article
Joel Busher, Sarah Marsden, Leena Malkki
Radicalisation and Counter-Radicalisation Research: Past, Present and Future
Article |
4 min read
Article
Nadine Salman, Zainab Al-Attar
Neurodivergence and Extremism: Considerations for Practice
Article |
4 min read
Article
Becky Phythian
Law enforcement information sharing for the 21st Century
Article |
4 min read
Article
Laura Stevens, Tia Bennett, Sarah Rockowitz, Heather Flowe
The role of digital technologies (GBVxTech) in communicating gender-based violence
Article |
4 min read
Article
Anastasia Kordoni, Shengnan Liu, Miriam Koschate-Reis, Mark Levine
Investigating the Influence of Hybrid Social Identities in Online Communities
Article |
4 min read
Article
Marc Kydd, Lynsay Shepherd, Graham Johnson, Andrea Szymkowiak
Love Bytes – Improving Romance Fraud Prevention
Article |
5 min read
Article
Austin C. Doctor, Gina Ligon, Samuel T. Hunter
Militant Leadership and the Severity of Terrorism in Conflict Environments
Article |
4 min read
Article
Dana Roemling, Jack Grieve
Forensic Authorship Analysis
Article |
4 min read
Article
Laura G. E. Smith
Digital Traces of Offline Mobilisation
Article |
5 min read
Article
Nick van der Klok, Miriam Oostinga, Luke C. Russell, Michael A. Yansick
Accelerating Influence: Challenging the Linear Paradigm of Suicide Negotiation
Article |
4 min read
Article
Lina Hillner
Unexplored Interactions: Disentangling Trustworthiness, Trust and Rapport
Article |
4 min read
Article
David Neequaye
How People Decide What to Disclose in Investigative Interviews
Article |
4 min read
Article
Ricky Green, Imane Khaouja, Daniel Toribio-Flórez, Karen Douglas
Conspiracy Theories: Their Propagation and Links to Political Violence
Article |
4 min read
Article
Sander van der Linden
A Psychological Vaccine Against Misinformation
Article |
5 min read
Article
Helen Innes, Andrew Dawson, Martin Innes
OSINT vs Disinformation: The Information Threats ‘Arms Race’
Article |
7 min read
Article
Bettina Rottweiler, Paul Gill
Conspiratorial thinking and far-right extremist attitudes
Article |
5 min read
Article
Sarah Marsden, James Lewis
How do case management tools work to counter radicalisation?
Article |
4 min read
Article
Zoey Reeve
Misleading a Group to Ineffectiveness
Article |
3 min read
Article
Nicola Power, Richard Philpot, Mark Levine
The Psychology of Interoperability: Improving Emergency Services’ Teamwork
Article |
4 min read
Article
William Dance
Addressing Algorithms in Disinformation
Article |
4 min read
Article
Using Fuzzy Set Qualitative Comparative Analysis to Examine Heterogeneity in Conspiracy Believers
Article |
4 min read