Why do people adopt conspiracy theories, how are they communicated, and what are their risks? A new CREST report examines these questions, drawing on research in psychology, information engineering, political science, and sociology.
This report, by Karen Douglas, Robbie Sutton, Aleksandra Cichocka, Jim Ang, Farzin Deravi, Joseph Uscinski and Turkay Nefes, provides a comprehensive and interdisciplinary review of the existing conspiracy theory research.
It focuses on three specific areas:
- First, it explores the extant literature addressing belief in conspiracy theories, focusing on the psychological, political and social factors that correlate with heightened belief. That is, what factors predict conspiracy belief?
- Second, it examines the ways in which conspiracy theories travel across interpersonal relations, through traditional and new media, and on social media. That is, when are conspiracy theories communicated, through what means and in what forms, and what are the motives for these communications?
- Third, it considers the risks and rewards associated with conspiracy theories. In other words, what is the relationship between conspiracy theories and prejudice, the rejection of science and medicine, and radicalisation and extremism? How do conspiracy theories contribute to these and other social ills? To buttress this discussion, the report assesses the opposite side of the ledger and denote the benefits gained from conspiracy theories and for the people who believe them.
Download the full report for here: Conspiracy Theories: How are they adopted, communicated, and what are their risks?
You can find all the outputs on conspiracy theories here.
These reports are products from the ‘Why Do People Adopt Conspiracy Theories, How Are They Communicated, And What Are Their Risks?’ programme, led by Professor Karen Douglas at the University of Kent. This project is a multi-disciplinary literature review on the emergence, transmission, spread, and countering of conspiracy theories. The project was funded by the Centre for Research and Evidence on Security Threats. You can read more about the project here.
This report is produced under a Creative Commons 4.0 BY-NC-SA licence. For more information on how you can use our content read our copyright page.