Report
Ewout Meijer, Katherine Hoogesteyn, Brianna Verigin, Danielle Finnick
Rapport Building: Online Vs In-Person Interviews
Report
|
3 min read
Report
Emma Slade, Emma Williams, Duncan Hodges, Phillip Morgan, Dylan Jones, Bill Macken, Emily Collins, Tasos Spiliotopoulos
Individual Differences in the Adoption, Secure Use, and Exploitation of Smart Home Technology
Report
|
4 min read
Report
Stephan Lewandowsky, Muhsin Yesilada
Inoculating Against the Spread of Islamophobic and Radical-Islamist Disinformation
Report
|
2 min read
Report
Amarnath Amarasingam, Shiraz Maher, Charlie Winter
How Telegram Disruption Impacts Jihadist Platform Migration
Report
|
2 min read
Report
Florence Keen, Blyth Crawford, Guillermo Suarez-Tangil
Memetic Irony and the Promotion of Violence within Chan Cultures
Report
|
2 min read
Guide
Benjamin Lee, Kim Knott
How and Why Ideologies are Shared and Learned
Guide
|
15 min read
Guide
Peter Lee
Moral Injury in Child Exploitation Investigators
Guide
|
3 min read
Guide
Peter Lee
Exploring Trauma in Child Exploitation Investigators
Guide
|
5 min read
Report
Peter Lee, Vasileios Karagiannopoulos, Kit Tapson, Mark Doyle
Understanding Moral Injury in Police Online Child Sex Crime Investigators
Report
|
6 min read
Report
James Lewis, Sarah Marsden
Public Experiences of the UK Counter-Terrorism System
Report
|
3 min read
Report
James Lewis, Sarah Marsden
Terrorism-Related Simulations
Report
|
3 min read
Report
James Lewis, Simon Copeland, Sarah Marsden
Evaluating Programmes to Prevent and Counter Extremism
Report
|
2 min read
Report
Simon Copeland, Sarah Marsden
The Relationship Between Mental Health Problems and Terrorism
Report
|
3 min read
Report
Simon Copeland, Sarah Marsden
Behavioural-Focused Protective Security Programmes
Report
|
2 min read
Report
Simon Copeland, Sarah Marsden
Extremist Risk Assessment
Report
|
2 min read
Report
Sarah Marsden, Simon Copeland
Economic Influences on Radicalisation
Report
|
3 min read
Report
Sarah Marsden, Simon Copeland
Right-Wing Terrorism: Pathways and Protective Factors
Report
|
4 min read
Report
Sarah Marsden, Simon Copeland
Managing Terrorism-Related Offenders in Prison
Report
|
3 min read
Guide
Neil Ferguson, James McAuley
The Violent Extremist Lifecycle: 12 Lessons from Northern Ireland
Guide
|
5 min read
Guide
Lorraine Hope, Feni Kontogianni, Kristoffer Geyer, Wayne Thomas
Eliciting information from memory about criminal gangs and terrorist cells
Guide
|
5 min read
Report
Ashraf Labib
Taking Decisions about Information Value
Report
|
2 min read
Policy brief
Tom Buchanan
Why Do People Share Disinformation On Social Media?
Policy brief
|
15 min read
Guide
Paul Gill
How Do Criminals Make Decisions?
Guide
|
15 min read
Guide
Paul Gill
How do terrorists make decisions?
Guide
|
6 min read
Report
Nick Neave, Pam Briggs, Liz Sillence, Kerry McKellar
Cybersecurity risks of digital hoarding behaviours
Report
|
1 min read
Guide
Ashraf Labib
A sea change for intelligence analysis?
Guide
|
10 min read
Guide
Laurence Alison
Considerations for Training Development
Guide
|
5 min read
Guide
Laurence Alison
Factors that Affect Command Decision-Making
Guide
|
10 min read
Policy brief
John Blythe
Phishing your staff: A double-edged sword?
Policy brief
|
5 min read
Report
Martin Innes
Soft Facts and Digital Behavioural Influencing After the 2017 Terror Attacks
Report
|
5 min read
Report
Math Noortmann, Juliette Koning, Joost Vervoort, Ingrid Hoofd
Imaginative Scenario Planning
Report
|
2 min read
Guide
Math Noortmann, Juliette Koning
Imaginative Scenario Planning Toolkit
Guide
|
2 min read
Guide
Charis Rice, Rosalind Searle
Animation: Positively Influencing Individuals During Organisational Change
Guide
|
1 min read
Random
CREST Catalogue – September 2019
Random
|
2 mins read
Guide
Feni Kontogianni
Eliciting information from cooperative sources about single and repeated multi-actor events
Guide
|
1 min read
Guide
Feni Kontogianni
Using self-generated cues to elicit information
Guide
|
2 min read
Random
CREST Catalogue – March 2019
Random
|
2 mins read
Report
Karen Douglas, Robbie Sutton, Jim Ang, Farzin Deravi, Joe Uscinski, Türkay Nefes
Conspiracy Theories: How are they adopted, communicated, and what are their risks?
Report
|
1 min read
Report
Cerwyn Moore
Russia and Disinformation: The Case of Ukraine
Report
|
5 min read
Report
Cerwyn Moore
Russia and Disinformation: Maskirovka
Report
|
7 min read
Report
Cerwyn Moore
Russia and Disinformation: Institutions and Actors
Report
|
6 min read
Report
Cerwyn Moore
Russia and Disinformation: The Case of the Caucasus
Report
|
7 min read
Report
Monica Lloyd
Extremism Risk Assessment: A Directory
Report
|
2 min read
Back to top