By type
By Date
Clear Filters
Article
Joe Uscinski
Everyone is a conspiracy theorist
Article |
4 min read
Article
Cerwyn Moore, Timothy Holman
Remainers and leavers: Foreign fighters after the ‘Islamic State’
Article |
5 min read
Article
Iain Edgar
After Islamic State: the place of night dream inspiration and propaganda
Article |
2 min read
Article
Emma Williams
What Makes People Susceptible to Malevolent Influence Online?
Article |
3 min read
Article
Rosie Mutton
The role of gender in violent extremism
Article |
3 min read
Article
Mark Youngman
After St Petersburg: Russia and the Threat from Central Asian Terror Networks
Article |
5 min read
Article
Lynn Weiher
How do we measure rapport in interviews?
Article |
3 min read
Article
James Lewis
How do teachers engage with Prevent?
Article |
4 min read
Article
Simon Copeland
The Importance of Terrorists’ Families and Friends
Article |
4 min read
Article
Mark Youngman
Russia's domestic terrorism threat is serious, sophisticated, and complex
Article |
4 min read
Article
Ben Lee
Grassroots counter messaging in the UK
Article |
3 min read
Article
Irina Tache
Connecting Culture to Deception Detection
Article |
4 min read
Article
Kim Knott, Matthew Francis
Are converts to Islam more likely to become extremists?
Article |
5 min read
Article
Kim Knott, Ben Lee
How does the family pass on religion?
Article |
3 min read
Article
Simon Copeland
Transmitting Terrorism: A Family Affair?
Article |
3 min read
Article
Nick Donnelly, Anne Hillstrom, Natalie Mestry
Just another face in the crowd – what makes spotting unfamiliar faces difficult?
Article |
3 min read
Article
Emma Williams, Debi Ashenden
Phishing Scams Are Becoming Ever More Sophisticated And Firms Are Struggling To Keep Up
Article |
4 min read
Article
Amanda van Eck Duymaer van Twist
How beliefs may come and go: a brief overview of a ‘cult career’
Article |
3 min read
Article
Sarah Marsden
From ideological material to targeting choice in leaderless jihadist
Article |
3 min read
Article
Aristotle Kallis
‘Reverse waves’: how radical ideas spread and take hold
Article |
4 min read
Article
Ben Lee
A different perspective on CVE
Article |
4 min read
Article
Ben Lee, Elizabeth Morrow
Transmission in context
Article |
4 min read
Article
Jonathan Scourfield
Learning to be a Muslim
Article |
3 min read
Article
John F. Morrison
Transmitting Legitimacy and Victimhood: Violent Dissident Irish Republicanism
Article |
3 min read
Article
Lynn Davies
Disrupting transmission of extremist messages through education
Article |
3 min read
Article
Kim Knott
Why transmission?
Article |
3 min read
Article
Lorraine Hope, Matthew Francis
When does inconsistency matter?
Article |
2 min read
Article
Matthew Williams, Pete Burnap
Cyber crime and the social web
Article |
3 min read
Article
Lorraine Hope
How does memory work?
Article |
3 min read
Article
Joanne Hinds
What is the role of technology in an emergency?
Article |
4 min read
Article
Linda Woodhead
The continuing growth of religious extremism and how to counter it
Article |
6 min read
Article
Debi Ashenden
Employees Behaving Badly
Article |
4 min read
Article
René Rydhof Hansen, Lizzie Coles-Kemp
Everyday Security: A Manifesto for New Approaches to Security Modelling
Article |
3 min read
Article
Tim Stevens
Cyber security and the politics of time
Article |
4 min read
Article
Marcus Rogers
Hacker Mindset
Article |
3 min read
Article
Jeremy Watson, Emil Lupu
PETRAS: Cyber Security of the Internet of Things
Article |
3 min read
Article
Christian Meissner, Susan Brandon
Expanding the frontiers of interrogation research and practice
Article |
3 min read
Article
Debi Ashenden
Fact Check: The Cyber Security Attack Surface
Article |
4 min read
Article
Heather Shaw, David Ellis
Apple or Android? What your choice of operating system says about you
Article |
2 min read
Article
Nicholas Ryder
The Criminal Finances Bill
Article |
4 min read
Article
Ben Lee
Understanding the counter-jihad
Article |
2 min read
Article
Laurence Alison, Michael Humann, Sara Waring
Building good rapport in interviews
Article |
4 min read
Article
Debi Ashenden
Creativity and Cyber Security
Article |
2 min read
Article
Paul Taylor
The A–Z of Information elicitation
Article |
3 min read
Article
Robert A. Fein
Improving practice through research: The US and the Study on Educing Information
Article |
2 min read
Article
David Ellis, Lukasz Piwek
The future of wearable technology
Article |
2 min read
Article
Elizabeth Morrow
Loyal footsoldiers: The attractions of EDL activism
Article |
5 min read
Article
Adam Joinson, Emma Williams
Eliciting Information Online
Article |
3 min read
Article
Paul Taylor
The promise of social science
Article |
3 min read
Article
Simon Oleszkiewicz
Eliciting information the friendly way: Conceptualising the Scharff Technique
Article |
3 min read

Subscribe to our newsletter.

Get the latest news, events and research into security threats delivered directly to your inbox.
Sign up now
Back to top