By type
By Date
Clear Filters
Article
Florence Keen
After 8chan
Article |
6 min read
Article
Blyth Crawford
/K/ and the Visual Culture of Weapons Boards
Article |
10 min read
Article
Michele Grossman, Paul Thomas
Community Reporting on Terrorism: Bystanders Versus Social Intimates
Article |
4 min read
Article
Paul Thomas, Michele Grossman
Community Reporting of Terrorist Involvement During Covid-19
Article |
4 min read
Article
Peter Lee
Psychological trauma – it’s what happens to other people. Right?
Article |
4 min read
Article
Ben Lee
Blind Networks in the Extreme-Right
Article |
4 min read
Article
Ben Lee
A Short Guide to Narratives of the Far-Right
Article |
3 min read
Article
Nick Neave
The Risks of Digital Hoarding
Article |
3 min read
Article
Oli Buckley
CLICKA
Article |
4 min read
Article
Kristoffer Geyer
Understanding digital traces
Article |
4 min read
Article
Emma Boakes
How Do Security Teams Collaborate To Understand Threats to Their Building Management Systems?
Article |
4 min read
Article
Olivia Brown
Teamwork in Extreme Environments: Identifying Challenges and Generating Solutions
Article |
4 min read
Article
Jordan Nunan
Developing an Evidenced-Based Approach to Enhance Recall of Intelligence
Article |
4 min read
Article
Joel Busher, Gareth Harris, Graham Macklin
Credibility contests and the ebb and flow of anti-minority activism
Article |
10 min read
Article
Rosie Mutton
Understanding the Roles Women Play in Violence Extremism and Why it Matters
Article |
4 min read
Article
Jordan Nunan
Increasing Accurate Recall in Human Sources
Article |
3 min read
Article
Alan Ogle
Remote Combat Readiness and Resiliency
Article |
5 min read
Article
Natalia Trujillo, Juan Esteban Ugarriza
The Deep Effects of Armed Conflict: Intervening in the Complexities of Post-Conflict Reconciliation
Article |
5 min read
Article
Susie Ballentyne
Refugee Resilience: Where Should We Be Looking?
Article |
5 min read
Article
Mustafa Sarkar
Developing Resilience for Sustained Success
Article |
7 min read
Article
Jason Nurse
Cyber Resilience: What Is It and How Do We Get It?
Article |
5 min read
Article
Aaron Roberts, Neville Stanton
Go with the (Information) Flow? How to Develop more Resilient Sociotechnical Systems
Article |
4 min read
Article
Nick Crossley
Strengths and Vulnerabilities in (Covert) Network Structure
Article |
4 min read
Article
Emma Grace
Bouncing Back: Stress and Resilience in Al-Qaeda Terrorists
Article |
6 min read
Article
Lorraine Hope
From the Lab to Operational Response: Examining the Impact of Stress On Memory for High Pressure Incidents
Article |
5 min read
Article
Marc Jones
Challenge or Threat: Understanding How People Cope in Demanding Environments
Article |
5 min read
Article
Jesper Corneliussen, Anders Kjaergaard
Conflict Management in Extreme Environments
Article |
4 min read
Article
Kristine Endsjø
Affect and emotion in extremist discourse
Article |
3 min read
Article
Abbie Marono
Is nonverbal mimicry an important tool in eliciting information?
Article |
3 min read
Article
Christina Winters
Increasing Self-Disclosure in Interviews
Article |
4 min read
Article
Noémie Bouhana
Analysing Lone-Actor Terrorism in Context
Article |
5 min read
Article
Duncan Hodges
A to Z of Data
Article |
3 min read
Article
Joel Busher, Donald Holbrook, Graham Macklin
Explaining Non- Or Limited Escalation Of Violence: The role of ‘Internal Brakes'
Article |
3 min read
Article
Sarah Marsden
Countering Violent Extremism: A Guide to Good Practice
Article |
4 min read
Article
Pamela Hanway
Cognitive Load at Interview: The Interviewer's Perspective
Article |
3 min read
Article
Feni Kontogianni
Untangling the past: remembering details of repeated events
Article |
3 min read
Article
Paul Taylor
From data to datum: What should I do in this case?
Article |
4 min read
Article
Debi Ashenden
Algorithmic Decision Making
Article |
5 min read
Article
Joanne Hinds
Behaviour Prediction: The Challenges and Opportunities of Big Data
Article |
4 min read
Article
Pip Thornton
Words as Data: The Vulnerability of Language in an Age of Digital Capitalism
Article |
5 min read
Article
Ryan Boyd, Paul Kapoor
Psychological Profiling and Event Forecasting Using Computational Language Analysis
Article |
5 min read
Article
Debi Ashenden
Data and the Social and Behavioural Sciences
Article |
4 min read
Article
Lorraine Hope, Wayne Thomas
A to Z of Influence Tactics and Topics
Article |
4 min read
Article
Gordon Wright, Nelli Ferenczi
Cross-cultural dimensions impacting persuasion and influence in security contexts
Article |
4 min read
Article
Robert Nash
In the misinformation age, remember that your memories might be fake news
Article |
5 min read
Article
Stephan Lewandowsky, Sander van der Linden, John Cook
Can we inoculate against fake news?
Article |
4 min read
Article
Emily Corner
Mental Disorder in Terrorism, Mass Murder, and Violence: Moving away from Pathologising Grievance
Article |
5 min read
Article
Emily Alison, Laurence Alison
Persuasion and Influence or Genuine Connection and Rapport
Article |
5 min read
Article
Samantha McGarry
The Far Right and Reciprocal Radicalisation
Article |
4 min read
Article
Susan Brandon
Using Stereotypes to Prepare for Interviews
Article |
4 min read

Subscribe to the CREST newsletter.

Get the latest news, events and research into security threats delivered directly to your inbox.
Sign up now
Back to top