Comment

Article
Kyle Dobson
Transparency Statements Restore Trust & Resiliency
Article |
4 min read

Article
Ellie Rogers
Automatically Generating Counter-Speech: Opportunities and Challenges of Using LLMs for CVE
Article |
5 min read

Article
KT Sonnen
Planned Resilience: Are We Setting Ourselves up to Fail?
Article |
6 min read

Article
Claire Hazelden
Community Resilience in Northern Ireland: A Framework for Transformation
Article |
7 min read

Article
Hilary Pilkington
Why Study Non-Radicalisation?
Article |
6 min read

Article
Greta Esposito
Interpreting and Translation in the Police Setting: Human vs AI
Article |
6 min read

Article
James Stevenson
Technology Evolves the Tactics: Preparing for the Rise of Terrorist AI Harms
Article |
4 min read

Article
Sören Henrich
Illuminating the Forensic Black Box: Understanding Radicalisation in Secure Settings
Article |
4 min read

Article
Chloe L Squires
The Next Generation of Resilience
Article |
4 min read

Article
Nick Crossley
Social Networks and Resilience
Article |
4 min read

Article
Emily Quin
The Copper's Nose: Spidey Senses Aren't Just For Spider-Man
Article |
4 min read

Article
Hope McVean
Synthetic Celebs & Fabricated Family: Protecting Against a New Breed of Cybercrime
Article |
3 min read

Article
Anne Peterscheck
Artificial Intelligence and Gendered Security
Article |
3 min read

Article
Sian Watson, Jonathan Kenyon
Measuring Change in Terrorist Engagement: Challenges and Future Directions
Article |
6 min read

Article
Kiren Vadher
Evaluating in complex policy environments - a practitioner’s perspective
Article |
4 min read

Article
Ardi Janjeva
The Growing Importance of AI Evaluation in Addressing Security Risks
Article |
4 min read

Article
James Lewis, Sarah Marsden
Evaluating Terrorism and Targeted Violence Prevention Programmes: From What Works to How Programmes Work
Article |
4 min read

Article
Gordon Clubb
Transparency, Evaluation and Standards: avoiding pitfalls
Article |
5 min read

Article
Matt Allen, Andrea Walker
Evaluating for Sustainability
Article |
4 min read

Article
Nick Dale
A New Era of Trust in Policing?
Article |
4 min read

Article
Bianca Slocombe, Rachel Monaghan
Empirical evidence for terrorist targeting frameworks
Article |
4 min read

Article
Adrian Cherney
Evaluating the impact of programmes to counter violent extremism: what are the options?
Article |
5 min read

Article
Daniel Koehler, Verena Fiebig, Irina Jugl-Kuntzsch
Quality Control and Management in Countering Violent Extremism Programmes: A Guideline
Article |
6 min read

Article
Erika Brady
Key considerations when evaluating counterterrorism strategies
Article |
6 min read

Article
Michael Williams, Tim Hulse
Greater than the sum of its parts: Using shared metrics to compare prevention projects
Article |
10 min read

Article
Jessica White, Isabella Vogel
Operationalising the Women, Peace, and Security Agenda
Article |
5 min read

Article
Leena Malkki, Irina van der Vet
Five steps for building evaluation culture in the P/CVE field. Lessons learnt from the INDEED project and beyond
Article |
4 min read

Article
Kirk Luther, Joseph Eastwood, Brent Snook
Artful Insights: Enhancing Recall in Investigative Interviews through Sketching
Article |
4 min read

Article
Paul Martin
Ten top tips on insider risk
Article |
6 min read

Article
Jason Nurse
Could ransomware be the key to better cyber deterrence strategies?
Article |
5 min read

Article
Zoe Marchment
The Unintended Consequences of Crime Prevention Measures
Article |
4 min read

Article
Chloe Squires
Prosecuting female terrorists: What do we know?
Article |
4 min read

Article
David McIlhatton
Evaluating Security Interventions for Venues and Public Spaces
Article |
6 min read

Article
Don Grubin
Risk assessment and polygraph testing
Article |
4 min read

Article
Paul Thomas, Michele Grossman
New international dimensions in community reporting of terrorist involvement
Article |
4 min read

Article
Taylor Cilke, Mary Rowe
Bystander Reporting Helps Prevent Mass Violence
Article |
4 min read

Article
Katie Benson
Deterring the ‘Enablers’ of Illicit Finance
Article |
3 min read

Article
Allysa Czerwinsky
Lonely Boys and Misogynist Inceldom: Considerations for Practitioners who Encounter Boys and Men at Risk of Male Supremacist Thinking
Article |
4 min read

Article
Eric Shaw
From research to practice and back again: implications of the Critical Pathway to Insider Risk for current personnel security practices
Article |
5 min read

Article IAPSS update
IAPSS Review
Showcasing and Supporting Early Career Researchers
Article | IAPSS update |
5 min read

Article IAPSS update
Garth Davies, Mackenzie Hart
Online extremist threats: A view from the trenches
Article | IAPSS update |
4 min read

Article IAPSS update
Richard Legault, Brett Kubicek
Introduction from the 5RD CVEN co-chairs
Article | IAPSS update |
5 min read

Article IAPSS update
Paul Gill, Callie Vitro
Science of violent extremism risk assessment and management: An agenda for moving beyond the ‘state of the art’
Article | IAPSS update |
4 min read

Article IAPSS update
Anna Leslie, Simon Wells
Translating research into practice
Article | IAPSS update |
6 min read

Article IAPSS update
Michele Grossman
Threats to Democracies: A view from Australia
Article | IAPSS update |
6 min read

Article IAPSS update
Pete Simi
Threats to Democracy in the US
Article | IAPSS update |
4 min read

Article IAPSS update
Samuel T. Hunter, Austin C. Doctor, Katherine L. Parsons
Emerging tech and terrorism: Adoption patterns and implications
Article | IAPSS update |
4 min read

Article IAPSS update
Sean McCafferty
Moderation of terrorist content since October 7th and a lack of adversarial shift
Article | IAPSS update |
5 min read

Article IAPSS update
Lenita Törning
Mixing security and social care logics: Experiences from the Swedish support model to prevent violent extremism
Article | IAPSS update |
3 min read

Article IAPSS update
Michael Jensen, Julian Junk
The case for establishing a global research meta-database
Article | IAPSS update |
4 min read