Comment
Article
Anna Leslie
The Eliciting Information Framework: A Vehicle For Research Into Practice
Article |
5 min read
Article
Simon Copeland
Islamic State, Filters, and Photoshop
Article |
4 min read
Article
Andrew Silke, John F. Morrison, Heidi Maiberg, Chloe Slay, Rebecca Stewart
The Phoenix Model: Disengagement And Deradicalisation
Article |
6 min read
Article
Lorraine Bowman Grieve
COVID-19 Conspiracy In Ireland And The Far-Right Nexus
Article |
3 min read
Article
Jason Nurse
Balancing Cybersecurity and Privacy in the Remote Workforce
Article |
4 min read
Article
Laurence Alison, Emily Alison, Sarah Robertson, Michael Humann
The Ground TRUTH After-Action Review Tool
Article |
4 min read
Article
Stephan Lewandowsky, Muhsin Yesilada
The “Infodemic”, Inoculation, And Insurrections
Article |
4 min read
Article
Olivia Brown
Multi-Agency Emergency Response
Article |
4 min read
Article
Jordan Nunan, Ian Stanier
Intelligence gathering during a pandemic
Article |
4 min read
Article
Lorraine Hope, Rachel Zajac, Maryanne Garry
Where was I last Wednesday?
Article |
3 min read
Article
Nathan Smith, Emma Barrett
Lessons From A Rapid Response
Article |
6 min read
Article
Michele Grossman
How Has COVID-19 Changed The Violent Extremist Landscape?
Article |
4 min read
Article
John F. Morrison, Andrew Silke, Heidi Maiberg, Chloe Slay, Rebecca Stewart
The Role Of (Dis)Trust In Disengagement And Deradicalisation
Article |
6 min read
Article
Steven Watson
Risk, benefits, and the affect heuristic in security behaviours
Article |
6 min read
Article
Monica Lloyd
The A–Z Of Extremism Risk Assessment
Article |
5 min read
Guide Article
Ian Stanier, Jordan Nunan
FIREPLACES And Informant Motivation
Guide | Article |
5 min read
Article
Nathan Smith
Resilient Performance Of Defence And Security Personnel
Article |
5 min read
Article
Bettina Rottweiler, Paul Gill
Risk Factors for Violent Extremist Beliefs and Parallel Problem Areas
Article |
3 min read
Article
Caroline Logan
Violent Extremism: The Assessment And Management Of Risk
Article |
7 min read
Article
Emily Collins, Phillip Morgan, Dylan Jones
If This Then…What? Security And Privacy In Trigger-Action Systems
Article |
3 min read
Article
Nadine Salman, Paul Gill
Terrorism Risk Assessment: What Makes A ‘Good’ Risk Assessor?
Article |
4 min read
Article
David McIlhatton, Rachel Monaghan
Protecting Publicly Accessible Locations From Terrorism
Article |
5 min read
Article
Simon Oleszkiewicz
The Adaptable Law Enforcement Officer
Article |
5 min read
Article
The Transnational Extreme-Right: Past, Present, and Future
Article |
1 min read
Article
Ben Lee
Think Global, Act Local: Reconfiguring Siege Culture
Article |
5 min read
Article
Emma Williams, Emma Slade
What Influences Consumer Adoption and Secure Use of Smart Home Technology?
Article |
3 min read
Article
Duncan Hodges
Mapping Smart Home Vulnerabilities to Cyber-Enabled Crime
Article |
3 min read
Article
Florence Keen
After 8chan
Article |
6 min read
Article
Blyth Crawford
/K/ and the Visual Culture of Weapons Boards
Article |
10 min read
Article
Michele Grossman, Paul Thomas
Community Reporting on Terrorism: Bystanders Versus Social Intimates
Article |
4 min read
Article
Paul Thomas, Michele Grossman
Community Reporting of Terrorist Involvement During Covid-19
Article |
4 min read
Article
Peter Lee
Psychological trauma – it’s what happens to other people. Right?
Article |
4 min read
Article
Ben Lee
Blind Networks in the Extreme-Right
Article |
4 min read
Article
Ben Lee
A Short Guide to Narratives of the Far-Right
Article |
3 min read
Article
Nick Neave
The Risks of Digital Hoarding
Article |
3 min read
Article
Oli Buckley
CLICKA
Article |
4 min read
Article
Kristoffer Geyer
Understanding digital traces
Article |
4 min read
Article
Emma Boakes
How Do Security Teams Collaborate To Understand Threats to Their Building Management Systems?
Article |
4 min read
Article
Olivia Brown
Teamwork in Extreme Environments: Identifying Challenges and Generating Solutions
Article |
4 min read
Article
Jordan Nunan
Developing an Evidenced-Based Approach to Enhance Recall of Intelligence
Article |
4 min read
Article
Joel Busher, Gareth Harris, Graham Macklin
Credibility contests and the ebb and flow of anti-minority activism
Article |
10 min read
Article
Rosie Mutton
Understanding the Roles Women Play in Violence Extremism and Why it Matters
Article |
4 min read
Article
Jordan Nunan
Increasing Accurate Recall in Human Sources
Article |
3 min read
Article
Alan Ogle
Remote Combat Readiness and Resiliency
Article |
5 min read
Article
Natalia Trujillo, Juan Esteban Ugarriza
The Deep Effects of Armed Conflict: Intervening in the Complexities of Post-Conflict Reconciliation
Article |
5 min read
Article
Susie Ballentyne
Refugee Resilience: Where Should We Be Looking?
Article |
5 min read
Article
Mustafa Sarkar
Developing Resilience for Sustained Success
Article |
7 min read
Article
Jason Nurse
Cyber Resilience: What Is It and How Do We Get It?
Article |
5 min read
Article
Aaron Roberts, Neville Stanton
Go with the (Information) Flow? How to Develop more Resilient Sociotechnical Systems
Article |
4 min read
Article
Nick Crossley
Strengths and Vulnerabilities in (Covert) Network Structure
Article |
4 min read