Comment
Article
Laurence Alison, Michael Humann, Sara Waring
Building good rapport in interviews
Article |
4 min read
Article
Debi Ashenden
Creativity and Cyber Security
Article |
2 min read
Article
Paul Taylor
The A–Z of Information elicitation
Article |
3 min read
Article
Robert A. Fein
Improving practice through research: The US and the Study on Educing Information
Article |
2 min read
Article
David Ellis, Lukasz Piwek
The future of wearable technology
Article |
2 min read
Article
Elizabeth Morrow
Loyal footsoldiers: The attractions of EDL activism
Article |
5 min read
Article
Adam Joinson, Emma Williams
Eliciting Information Online
Article |
3 min read
Article
Paul Taylor
The promise of social science
Article |
3 min read
Article
Simon Oleszkiewicz
Eliciting information the friendly way: Conceptualising the Scharff Technique
Article |
3 min read
Article
Becky Milne
Let them be heard: Enabling communication and recall of forensic interviewees
Article |
1 min read
Article
Lorraine Hope
Memory at the sharp end: the psychology of eliciting information
Article |
1 min read
Article
Emma Barrett
The role of trust in deciding which terrorist faction to join
Article |
2 min read
Article
Sheryl (Prentice) Menadue
How Technology Could Help Predict Terrorist Attacks
Article |
3 min read
Article
Nicholas Ryder
Where does the Islamic State get its money?
Article |
4 min read
Article
Cerwyn Moore, Elizabeth Morrow
What role do women play in violent extremism?
Article |
3 min read
Article
Kim Knott
What are the Five Pillars of Islam?
Article |
3 min read
Article
Emma Barrett, Matthew Francis
The Cognitive Interview: How Research has improved Practice
Article |
2 min read
Article
Nicola Power
Joint Decision Making in Real-World Emergencies: Recommendations for Improving the Joint Decision Model
Article |
4 min read
Kim Knott, Matthew Francis
What’s the difference between Sunni and Shi’a Muslims?
3 min read
Article
Joanne Hinds
How Does Phishing Work?
Article |
3 min read
Article
Emma Barrett, Matthew Francis
Terrorists’ use of messaging applications
Article |
3 min read
Article
Ben Lee
One peaceful march doesn't change Pegida's disturbing ideology
Article |
3 min read
Article
Debi Ashenden
Your Employees: The Front Line in Cyber Security
Article |
10 min read
Article
Matthew Francis
Research drives understanding and disruption of terrorism
Article |
4 min read
Article
Matthew Francis
Paris attacks: there is no simple explanation
Article |
3 min read
Article
Debi Ashenden
TalkTalk Data Breach Is a Wake Up Call for CEOs
Article |
3 min read