Article
Wolfram Lacher
Regional Guide: Libya
Article
|
3 min read
Article
Kris Christmann
Manchester attack: an 'arms race' against ever adapting terror networks
Article
|
4 min read
Article
Michael Axworthy
Regional Guide: Iran
Article
|
3 min read
Article
Joas Wagemakers
Regional Guide: Jordan
Article
|
3 min read
Article
Elisabeth Kendall
Regional Guide: Yemen
Article
|
4 min read
Article
Paul Taylor
7 Things Worth Knowing About Groups
Article
|
4 min read
Article
Joe Uscinski
Everyone is a conspiracy theorist
Article
|
4 min read
Article
Cerwyn Moore, Timothy Holman
Remainers and leavers: Foreign fighters after the ‘Islamic State’
Article
|
5 min read
Article
Iain Edgar
After Islamic State: the place of night dream inspiration and propaganda
Article
|
2 min read
Article
Emma Williams
What Makes People Susceptible to Malevolent Influence Online?
Article
|
3 min read
Article
Rosie Mutton
The role of gender in violent extremism
Article
|
3 min read
Article
Mark Youngman
After St Petersburg: Russia and the Threat from Central Asian Terror Networks
Article
|
5 min read
Article
Lynn Weiher
How do we measure rapport in interviews?
Article
|
3 min read
Article
James Lewis
How do teachers engage with Prevent?
Article
|
4 min read
Article
Simon Copeland
The Importance of Terrorists’ Families and Friends
Article
|
4 min read
Article
Mark Youngman
Russia's domestic terrorism threat is serious, sophisticated, and complex
Article
|
4 min read
Article
Ben Lee
Grassroots counter messaging in the UK
Article
|
3 min read
Article
Irina Tache
Connecting Culture to Deception Detection
Article
|
4 min read
Article
Kim Knott, Matthew Francis
Are converts to Islam more likely to become extremists?
Article
|
5 min read
Article
Kim Knott, Ben Lee
How does the family pass on religion?
Article
|
3 min read
Article
Simon Copeland
Transmitting Terrorism: A Family Affair?
Article
|
3 min read
Article
Nick Donnelly, Anne Hillstrom, Natalie Mestry
Just another face in the crowd – what makes spotting unfamiliar faces difficult?
Article
|
3 min read
Article
Emma Williams, Debi Ashenden
Phishing Scams Are Becoming Ever More Sophisticated And Firms Are Struggling To Keep Up
Article
|
4 min read
Article
Amanda van Eck Duymaer van Twist
How beliefs may come and go: a brief overview of a ‘cult career’
Article
|
3 min read
Article
Sarah Marsden
From ideological material to targeting choice in leaderless jihadist
Article
|
3 min read
Article
Aristotle Kallis
‘Reverse waves’: how radical ideas spread and take hold
Article
|
4 min read
Article
Ben Lee
A different perspective on CVE
Article
|
4 min read
Article
Ben Lee, Elizabeth Morrow
Transmission in context
Article
|
4 min read
Article
Jonathan Scourfield
Learning to be a Muslim
Article
|
3 min read
Article
John F. Morrison
Transmitting Legitimacy and Victimhood: Violent Dissident Irish Republicanism
Article
|
3 min read
Article
Lynn Davies
Disrupting transmission of extremist messages through education
Article
|
3 min read
Article
Kim Knott
Why transmission?
Article
|
3 min read
Article
Lorraine Hope, Matthew Francis
When does inconsistency matter?
Article
|
2 min read
Article
Matthew Williams, Pete Burnap
Cyber crime and the social web
Article
|
3 min read
Article
Lorraine Hope
How does memory work?
Article
|
3 min read
Article
Joanne Hinds
What is the role of technology in an emergency?
Article
|
4 min read
Article
Linda Woodhead
The continuing growth of religious extremism and how to counter it
Article
|
6 min read
Article
Debi Ashenden
Employees Behaving Badly
Article
|
4 min read
Article
René Rydhof Hansen, Lizzie Coles-Kemp
Everyday Security: A Manifesto for New Approaches to Security Modelling
Article
|
3 min read
Article
Tim Stevens
Cyber security and the politics of time
Article
|
4 min read
Article
Marcus Rogers
Hacker Mindset
Article
|
3 min read
Article
Jeremy Watson, Emil Lupu
PETRAS: Cyber Security of the Internet of Things
Article
|
3 min read
Article
Christian Meissner, Susan Brandon
Expanding the frontiers of interrogation research and practice
Article
|
3 min read
Back to top