Resources
![](/site/assets/files/4362/charis_stars_report_cover_web.640x360.jpg)
Report
Charis Rice, Martin Innes, Jenny Ratcliffe
Situational Threat And Response Signals (STARS): Public-facing Counter-Terrorism Strategic Communication Campaigns [SOCIAL MEDIA ANALYSIS]
Report
| 2 min read
![](/site/assets/files/4349/conceptualising_protective_factors_cover_v1.640x360.jpg)
Report
Sarah Marsden, Ben Lee
Conceptualising Protective Factors: Strengths-Based Approaches
Report
| 4 min read
![](/site/assets/files/4347/protective_factors_cover_v1.640x360.jpg)
Report
James Hewitt, Ben Lee, Sarah Marsden
Protective Factors in Risk Assessment: Practitioner Perspectives
Report
| 2 min read
![](/site/assets/files/4203/mimicry-01.640x360.png)
Thesis Summary
Abbie Marono
The role of closeness in the relationship between nonverbal mimicry and cooperation
Thesis Summary
| 1 min read
![](/site/assets/files/4174/adobestock_173875594.640x360.jpeg)
Guide
Stephane Baele
Artificial Intelligence and Extremism: The Threat of Language Models for Propaganda Purposes
Guide
| 7 min read
![](/site/assets/files/4193/psych-effects-cjs-report-image.640x360.png)
Report
James Hewitt, James Lewis, Sarah Marsden
The Psychological Effects of Criminal Justice Measures: A Review of Evidence Related to Terrorist Offending
Report
| 7 min read
![](/site/assets/files/4166/ai_recruitment_2x.640x360.png)
Guide
Kat Gibbs, Sophie Nightingale
AI In Recruitment: Is It Possible to Use it Responsibly?
Guide
| 5 min read
![](/site/assets/files/4164/biometrics_4_2x.640x360.png)
Guide
Kat Gibbs, Sophie Nightingale
Multimodal biometrics: A better security system?
Guide
| 5 min read
![](/site/assets/files/4155/subcultures_lee-01.640x360.png)
Report
Ben Lee
Lethal Subcultures
Report
| 3 min read
![](/site/assets/files/4149/lee-picture-square.640x360.jpg)
Guide
Ben Lee, Sarah Marsden
Protective Factors
Guide
| 7 min read
![](/site/assets/files/4075/cybsafe-phishing-illustration.640x360.jpg)
Report
John Blythe, Alan Gray, Francesca Willis, Emily Collins
Simulated Phishing And Employee Cybersecurity Behaviour (SPEC)
Report
| 2 min read
![](/site/assets/files/4066/image.640x360.jpeg)
Report
Sarah Marsden, Ben Lee
Protective Factors For Violent Extremism And Terrorism: Rapid Evidence Assessment
Report
| 3 min read
![](/site/assets/files/4062/lee_siege_culture_copy-1.640x360.jpg)
Guide
Ben Lee
Siege Culture and Accelerationism in the UK
Guide
| 7 min read
![](/site/assets/files/4047/cover_illustration_copy.640x360.jpg)
Report
Noémie Bouhana
Are Conceptual Frameworks Of Radicalisation Leading To Involvement In Terrorism 'Observable'?
Report
| 2 min read
![](/site/assets/files/3981/cover_illustration_busher_far_right.640x360.png)
Article
Joel Busher, Gareth Harris, Julia Ebner, Zsófia Hacsek, Graham Macklin
The escalation and inhibition of violence during waves of far-right or anti-minority protests
Article
| 6 min read
![](/site/assets/files/3861/cover_illustration_busher_far_right.640x360.png)
Report
Joel Busher, Gareth Harris, Julia Ebner, Zsófia Hacsek, Graham Macklin
The Dynamics Of Violence Escalation And Inhibition During 'Hot Periods' Of Anti-Minority And Far-Right Activism
Report
| 10 min read
![](/site/assets/files/3829/women_and_preventing_and_countering_violent_extremism_interventions_copy.640x360.jpg)
Report
Erika Brady, Sarah Marsden
Women and Preventing and Countering Violent Extremism Interventions
Report
| 5 min read
![](/site/assets/files/3816/clicka_3.640x360.jpg)
Report
Oli Buckley
Collecting And Leveraging Identity Cues With Keystroke Analysis (CLICKA)
Report
| 2 min read
![](/site/assets/files/3801/involuntary_celibate_sub-culture_blackpill.640x360.jpg)
Article
Lewys Brace
A Short Introduction To The Involuntary Celibate Sub-Culture
Article
| 10 min read
![](/site/assets/files/3799/far_right_gamers_ben_lee.640x360.jpg)
Article
Ben Lee
Only Playing: Extreme-Right Gamification
Article
| 4 min read
![](/site/assets/files/3798/trauma_marsden_copy.640x360.jpg)
Report
Sarah Marsden, James Lewis
Trauma, Adversity & Violent Extremism
Report
| 7 min read
![](/site/assets/files/3797/disengagement_morrison_copy.640x360.jpg)
Report
John F. Morrison, Andrew Silke, Heidi Maiberg, Chloe Slay, Rebecca Stewart
A Systematic Review Of Post-2017 Research On Disengagement And Deradicalisation
Report
| 6 min read
![](/site/assets/files/3767/baber_illustration_ai_system_developers.640x360.jpg)
Guide
Chris Baber, Ian Apperly, Emily McCormick
AI and System Developers
Guide
| 4 min read
![](/site/assets/files/3766/law_enforcement_illustration_v2.640x360.jpg)
Report
Simon Oleszkiewicz, Lynn Weiher, Erik Mac Giolla
Developing A Paradigm To Assess And Measure Adaptability
Report
| 3 min read
![](/site/assets/files/3764/baber_illustration_ai_explanation_guide_v2.640x360.jpg)
Guide
Chris Baber, Ian Apperly, Emily McCormick
AI and Senior Managers
Guide
| 5 min read
![](/site/assets/files/3763/baber_illustration_ai_explanation_2.640x360.jpg)
Report
Chris Baber, Ian Apperly, Emily McCormick
Understanding The Problem Of Explanation When Using AI In Intelligence Analysis
Report
| 2 min read
![](/site/assets/files/3762/snake_oil_illustration_v5.640x360.jpg)
Guide
Susan Brandon
Substance or Snake Oil?
Guide
| 15 min read
![](/site/assets/files/3771/rogers_risk_csr11.640x360.jpg)
Article
Brooke Rogers, Julia Pearce, David Parker, Lasse Lindekilde
Communicating effectively with the public about terrorism in crowded places
Article
| 5 min read
![](/site/assets/files/3768/risk-_benefits-_and_the_affect_heuristic_in_security_behaviours.640x360.jpg)
Article
Steven Watson
Risk, benefits, and the affect heuristic in security behaviours
Article
| 6 min read
![](/site/assets/files/3761/cve_interventions.640x360.png)
Report
James Lewis, Sarah Marsden
Countering Violent Extremism Interventions: Contemporary Research
Report
| 7 min read
![](/site/assets/files/3730/quantifying_the_effectiveness_of_an_evidence-based_rapport-building_training_programme_for_use_in_information-gathering_cont.640x360.jpg)
Report
Fiona Gabbert, Gordon Wright
Quantifying The Effectiveness Of A Rapport-Building Training Programme
Report
| 2 min read
![](/site/assets/files/3723/pol_video.640x360.jpg)
Article
Matthew Fields
Proof of Life or Death?
Article
| 4 min read
![](/site/assets/files/3722/copsey_anti-facist_action.640x360.jpg)
Report
Nigel Copsey, Samuel Merrill
Understanding 21st-Century Militant Anti-Fascism
Report
| 4 min read
![](/site/assets/files/3705/rapport_building.640x360.jpg)
Report
Ewout Meijer, Katherine Hoogesteyn, Brianna Verigin, Danielle Finnick
Rapport Building: Online Vs In-Person Interviews
Report
| 3 min read
![](/site/assets/files/3660/smart_home_technology_williams.640x360.jpg)
Report
Emma Slade, Emma Williams, Duncan Hodges, Phillip Morgan, Dylan Jones, Bill Macken, Emily Collins, Tasos Spiliotopoulos
Individual Differences in the Adoption, Secure Use, and Exploitation of Smart Home Technology
Report
| 4 min read
![](/site/assets/files/3584/mining_the_chans-1.640x360.jpg)
Guide
Stephane Baele, Lewys Brace, Travis Coan
Mining The Chans
Guide
| 6 min read
![](/site/assets/files/3521/islamaphobia-misinformation.640x360.jpg)
Report
Stephan Lewandowsky, Muhsin Yesilada
Inoculating Against the Spread of Islamophobic and Radical-Islamist Disinformation
Report
| 2 min read
![](/site/assets/files/3520/maher-telegram-migration.640x360.jpg)
Report
Amarnath Amarasingam, Shiraz Maher, Charlie Winter
How Telegram Disruption Impacts Jihadist Platform Migration
Report
| 2 min read
![](/site/assets/files/3519/memetic-irony-and-the-promotion-of-violence-within-chan-cultures.640x360.jpg)
Report
Florence Keen, Blyth Crawford, Guillermo Suarez-Tangil
Memetic Irony and the Promotion of Violence within Chan Cultures
Report
| 2 min read
![](/site/assets/files/3518/ideology-growth-e1608036488104.640x360.jpg)
Guide
Ben Lee, Kim Knott
How and Why Ideologies are Shared and Learned
Guide
| 15 min read
![](/site/assets/files/3517/illustration-2.640x360.jpg)
Guide
Peter Lee
Moral Injury in Child Exploitation Investigators
Guide
| 3 min read
![](/site/assets/files/3516/illustration-5.640x360.jpg)
Guide
Peter Lee
Exploring Trauma in Child Exploitation Investigators
Guide
| 5 min read
![](/site/assets/files/3515/moral_injury.640x360.jpg)
Report
Peter Lee, Vasileios Karagiannopoulos, Kit Tapson, Mark Doyle
Understanding Moral Injury in Police Online Child Sex Crime Investigators
Report
| 6 min read
![](/site/assets/files/3424/public-experiences-of-the-uk-counter-terrorism-system-1170x821.640x360.jpg)
Report
James Lewis, Sarah Marsden
Public Experiences of the UK Counter-Terrorism System
Report
| 3 min read
![](/site/assets/files/3423/terrorism-related-simulations-1170x821.640x360.jpg)
Report
James Lewis, Sarah Marsden
Terrorism-Related Simulations
Report
| 3 min read
![](/site/assets/files/3425/evaluating-programmes-to-prevent-and-counter-extremism-1170x821.640x360.jpg)
Report
James Lewis, Simon Copeland, Sarah Marsden
Evaluating Programmes to Prevent and Counter Extremism
Report
| 2 min read
![](/site/assets/files/3422/the-relationship-between-mental-health-problems-and-terrorism-1170x821.640x360.jpg)
Report
Simon Copeland, Sarah Marsden
The Relationship Between Mental Health Problems and Terrorism
Report
| 3 min read
![](/site/assets/files/3421/cover-illustration-marsden-beh-protective-security-1170x821.640x360.jpg)
Report
Simon Copeland, Sarah Marsden
Behavioural-Focused Protective Security Programmes
Report
| 2 min read
![](/site/assets/files/3420/cover-illustration-marsden-risk-assessment.640x360.jpg)
Report
Simon Copeland, Sarah Marsden
Extremist Risk Assessment
Report
| 2 min read