CSR, Issue 8: Influence

This new issue of CREST Security Review (CSR) highlights research on influence, from the powers of persuasion to the ethical challenges of some techniques.

Salespeople, politicians, work colleagues – we’re surrounded by people trying to influence us, and of course we try to influence them too.

This issue of CSR gives an insight into some of the latest research on influence, from the ethical challenges of some techniques, through how people can be primed to be persuaded, to how to inoculate people from being influenced by fake news.

In this bumper edition of CSR there are more articles than ever before. For a whistle-stop tour through the topics and tactics of influence, check out the A-Z, pulled together by the guest editor, Lorraine Hope, and Wayne Thomas.

Outside the issue’s focus on influence, Emily Corner writes about mental disorder in terrorism, mass murder and violence, stating that we should move away from pathologising violence. Meanwhile, Samantha McGarry draws on her research on National Action, to look at whether increased fragmentation in the far right could lead to more extreme responses to Islamist violence.

As always, this latest issue of CREST Security Review is available to download, read and share for free here.

Inside this issue:



You can read and download this issue for free at www.crestresearch.ac.uk./csr/

Talking about CREST Security Review on Twitter? Use hashtags #Issue8 #Influence

As with all our resources, CSR is available under a Creative Commons BY-NC-SA 4.0 licence. For more information on how can you use our content please read our copyright page.

About CREST Security Review

CREST Security Review is a quarterly magazine produced by the Centre for Research and Evidence on Security Threats (CREST). It provides a gateway to the very best knowledge and expertise on understanding, mitigating and countering security threats, providing research-based answers to real-world problems. Each issue includes articles focused on a particular topic; past issues include Information Elicitation, Cyber Security, Transmission, After Islamic State, Networking, Decision Making and Transitions. You can read the previous issues free here