Comment
Article
Becky Milne
Let them be heard: Enabling communication and recall of forensic interviewees
Article |
1 min read
Article
Lorraine Hope
Memory at the sharp end: the psychology of eliciting information
Article |
1 min read
Article
Emma Barrett
The role of trust in deciding which terrorist faction to join
Article |
2 min read
Article
Sheryl (Prentice) Menadue
How Technology Could Help Predict Terrorist Attacks
Article |
3 min read
Article
Nicholas Ryder
Where does the Islamic State get its money?
Article |
4 min read
Article
Cerwyn Moore, Elizabeth Morrow
What role do women play in violent extremism?
Article |
3 min read
Article
Kim Knott
What are the Five Pillars of Islam?
Article |
3 min read
Article
Emma Barrett, Matthew Francis
The Cognitive Interview: How Research has improved Practice
Article |
2 min read
Article
Nicola Power
Joint Decision Making in Real-World Emergencies: Recommendations for Improving the Joint Decision Model
Article |
4 min read
Kim Knott, Matthew Francis
What’s the difference between Sunni and Shi’a Muslims?
3 min read
Article
Joanne Hinds
How Does Phishing Work?
Article |
3 min read
Article
Emma Barrett, Matthew Francis
Terrorists’ use of messaging applications
Article |
3 min read
Article
Ben Lee
One peaceful march doesn't change Pegida's disturbing ideology
Article |
3 min read
Article
Debi Ashenden
Your Employees: The Front Line in Cyber Security
Article |
10 min read
Article
Matthew Francis
Research drives understanding and disruption of terrorism
Article |
4 min read
Article
Matthew Francis
Paris attacks: there is no simple explanation
Article |
3 min read
Article
Debi Ashenden
TalkTalk Data Breach Is a Wake Up Call for CEOs
Article |
3 min read