Comment

Article
Camilla De Camargo
When the uniform doesn't fit
Article
|7 min read

Article
Alexandra Phelan, Jessica White, James Paterson, Claudia Wallner
Misogyny and Masculinity: Toward a Typology of Gendered Narratives amongst the Far-Right
Article
|5 min read

Article
Susan Steen
A Communication Perspective on Resilience
Article
|5 min read

Article
Lucy Mason
Is ‘Government’ and ‘Innovation’ an oxymoron? Public Sector Innovation: A Practitioner’s Perspective
Article
|5 min read

Article
Charis Rice, Martin Innes
What’s new, what works? Countering terrorism with public-facing strategic communication campaigns
Article
|4 min read

Article
Lorraine Hope, Feni Kontogianni, Alejandra De La Fuente Vilar
How did you escape? A rapport-based framework for time-critical questioning involving cooperative interviewees
Article
|5 min read

Article
Heather Shaw, Charlotte Sibbons, Stacey Conchie, Paul Taylor
Are emerging digital behavioural biometrics able to identify us?
Article
|4 min read

Article
ChatGPT
AI Innovation Risks & Implications
Article
|3 min read

Article
Niklas Henderson
The Disinformation Game: Finding New Ways to Fight ‘Fake News’
Article
|4 min read

Article
Austin C. Doctor, Joel S. Elson, Samuel T. Hunter
Violent Extremism, Innovation, and Recruitment in the Metaverse
Article
|4 min read

Article
Oli Buckley
Rolling the dice on algorithms: Increasing understanding through boardgames
Article
|6 min read

Article
James Lewis
Trauma and Violent Extremism: Implications for Interventions
Article
|7 min read

Article
Heidi Ellis, Emma Cardeli, Stevan Weine
Moving away from ‘Trauma’ towards ‘Trauma and...’
Article
|7 min read

Article
Kacper Rekawek
Extremist Foreign Fighters in Ukraine
Article
|4 min read

Article
Stevan Weine, Mary Bunn, Emma Cardeli, Heidi Ellis
Trauma informed Care and Violent Extremism Prevention
Article
|7 min read

Article
Marika Madfors, Simon Oleszkiewicz, Matthew Jones
Proximity-Based Evidence Disclosure: Enhancing Evidence Reliability
Article
|4 min read

Article
Alexandria Bradley
Prison safety and security: Exploring the impact of Trauma-Informed Practice and Trauma-Responsive Interventions
Article
|6 min read

Article
Carmel Joyce, Orla Lynch
Collective Victimhood and the Trauma of Political Violence
Article
|4 min read

Article
Noah Tucker
What can we learn from exploring the traumatised past of returnees?
Article
|4 min read

Article
Daniel Koehler
The Radicalisation Pendulum: Introducing a Trauma-Based Model of Violent Extremist Radicalisation
Article
|4 min read

Article
Pete Simi, Steven Windisch
Trauma, Extremism and Criminology
Article
|4 min read

Article
Karen Goodall
Trauma Informed Policing
Article
|4 min read

Article
Vivian Khedari
“I have never hurt anybody”
Article
|7 min read

Article
Anna Naterstad Harpviken
Finding the Story: Expanding the Tale
Article
|10 min read

Article
Ian Barron, Patrick Ashcroft, Gerald Fonville
Police Violence & Child Trauma in the Brazilian Favelas
Article
|4 min read

Article
Lotta Carlsson
Working with victims of torture
Article
|6 min read

Article
Michael Niconchuk
What to do about mental health in PVE: insights from Central Asia
Article
|7 min read

Article
Olivia Brown
Right-wing extremism online: can we use digital data to measure risk?
Article
|5 min read

Article
Ella Glikson
Emotional over-trust in AI technology
Article
|3 min read

Article
Lina Hillner
Rapport and trust: What’s the difference?
Article
|4 min read

Article
Steven Lockey
Recovering from failure: What can security services do to repair trust?
Article
|4 min read

Article
Rosalind Searle
Trust = confidence + vulnerability The role of the leader
Article
|3 min read

Emma Barrett
The Science of Betrayal: Lessons for security practitioners
10 min read

Article
Paul Taylor
Trusting a Centre model
Article
|2 min read

Article
Stacey Conchie, Paul Taylor
Trust Signals
Article
|4 min read

Article
Andreea-Antonia Raducu
Trust Thy Enemy: Trust and Relationship-Building between Source Handlers and Informants
Article
|4 min read

Article
Calvin Burns
A-Z of Trust
Article
|5 min read

Article
Ben Lee
What is Siege Culture?
Article
|3 min read

Article
Anna Leslie, Simon Wells
Evaluating Trust & Rapport: A practitioner’s guide
Article
|4 min read

Article
Stacey Conchie
Trust in Security Contexts
Article
|4 min read

Article
David Buil-Gil, Jose Pina-Sánchez, Ian Brunton-Smith, Alexandru Cernat
Bad Data, Worse Predictions
Article
|4 min read

Article
Sophie Nightingale
Identity fraud in the digital age
Article
|4 min read

Article
Marion Oswald
‘Give Me a Ping, Vasili. One Ping Only’ Why the Success of Machine Learning Depends on Empowered People
Article
|6 min read

Article
Isabelle van der Vegt, Bennett Kleinberg, Professor Paul Gill
Linguistic Threat Assessment: Challenges and Opportunities
Article
|5 min read

Article
Emma Boakes
Converging security
Article
|4 min read

Article
Oli Buckley, Heather Shaw, Leon Reicherts, Richard Philpot, Mark Levine
Technology Lightning Articles
Article
|7 min read

Article
Dr Zoe Marchment, Professor Paul Gill
Evaluating the Channel Programme’s Vulnerability Assessment Framework
Article
|4 min read

Article
Erin Grace, Gina Ligon
NCITE: The designated counter terrorism and targeted violence research centre for the US Department of Homeland Security
Article
|3 min read

Article
Shanon Shah
How (Not) To Make A Violent Copycat: Lessons From ‘Dark Fandoms’
Article
|4 min read