Resources

Report
Simon Oleszkiewicz, Lynn Weiher, Erik Mac Giolla
Developing A Paradigm To Assess And Measure Adaptability
Report
| 3 min read

Guide
Chris Baber, Ian Apperly, Emily McCormick
AI and Senior Managers
Guide
| 5 min read

Report
Chris Baber, Ian Apperly, Emily McCormick
Understanding The Problem Of Explanation When Using AI In Intelligence Analysis
Report
| 2 min read

Guide
Susan Brandon
Substance or Snake Oil?
Guide
| 15 min read

Article
Brooke Rogers, Julia Pearce, David Parker, Lasse Lindekilde
Communicating effectively with the public about terrorism in crowded places
Article
| 5 min read

Article
Steven Watson
Risk, benefits, and the affect heuristic in security behaviours
Article
| 6 min read

Report
James Lewis, Sarah Marsden
Countering Violent Extremism Interventions: Contemporary Research
Report
| 7 min read

Report
Fiona Gabbert, Gordon Wright
Quantifying The Effectiveness Of A Rapport-Building Training Programme
Report
| 2 min read

Article
Matthew Fields
Proof of Life or Death?
Article
| 4 min read

Report
Nigel Copsey, Samuel Merrill
Understanding 21st-Century Militant Anti-Fascism
Report
| 4 min read

Report
Ewout Meijer, Katherine Hoogesteyn, Brianna Verigin, Danielle Finnick
Rapport Building: Online Vs In-Person Interviews
Report
| 3 min read

Report
Emma Slade, Emma Williams, Duncan Hodges, Phillip Morgan, Dylan Jones, Bill Macken, Emily Collins, Tasos Spiliotopoulos
Individual Differences in the Adoption, Secure Use, and Exploitation of Smart Home Technology
Report
| 4 min read

Guide
Stephane Baele, Lewys Brace, Travis Coan
Mining The Chans
Guide
| 6 min read

Report
Stephan Lewandowsky, Muhsin Yesilada
Inoculating Against the Spread of Islamophobic and Radical-Islamist Disinformation
Report
| 2 min read

Report
Amarnath Amarasingam, Shiraz Maher, Charlie Winter
How Telegram Disruption Impacts Jihadist Platform Migration
Report
| 2 min read

Report
Florence Keen, Blyth Crawford, Guillermo Suarez-Tangil
Memetic Irony and the Promotion of Violence within Chan Cultures
Report
| 2 min read

Guide
Ben Lee, Kim Knott
How and Why Ideologies are Shared and Learned
Guide
| 15 min read

Guide
Peter Lee
Moral Injury in Child Exploitation Investigators
Guide
| 3 min read

Guide
Peter Lee
Exploring Trauma in Child Exploitation Investigators
Guide
| 5 min read

Report
Peter Lee, Vasileios Karagiannopoulos, Kit Tapson, Mark Doyle
Understanding Moral Injury in Police Online Child Sex Crime Investigators
Report
| 6 min read

Report
James Lewis, Sarah Marsden
Public Experiences of the UK Counter-Terrorism System
Report
| 3 min read

Report
James Lewis, Sarah Marsden
Terrorism-Related Simulations
Report
| 3 min read

Report
James Lewis, Simon Copeland, Sarah Marsden
Evaluating Programmes to Prevent and Counter Extremism
Report
| 2 min read

Report
Simon Copeland, Sarah Marsden
The Relationship Between Mental Health Problems and Terrorism
Report
| 3 min read

Report
Simon Copeland, Sarah Marsden
Behavioural-Focused Protective Security Programmes
Report
| 2 min read

Report
Simon Copeland, Sarah Marsden
Extremist Risk Assessment
Report
| 2 min read

Report
Sarah Marsden, Simon Copeland
Economic Influences on Radicalisation
Report
| 3 min read

Report
Sarah Marsden, Simon Copeland
Right-Wing Terrorism: Pathways and Protective Factors
Report
| 4 min read

Report
Sarah Marsden, Simon Copeland
Managing Terrorism-Related Offenders in Prison
Report
| 3 min read

Guide
Neil Ferguson, James McAuley
The Violent Extremist Lifecycle: 12 Lessons from Northern Ireland
Guide
| 5 min read

Guide
Lorraine Hope, Feni Kontogianni, Kristoffer Geyer, Wayne Thomas
Eliciting information from memory about criminal gangs and terrorist cells
Guide
| 5 min read

Report
Ashraf Labib
Taking Decisions about Information Value
Report
| 2 min read

Policy brief
Tom Buchanan
Why Do People Share Disinformation On Social Media?
Policy brief
| 15 min read

Guide
Paul Gill
How Do Criminals Make Decisions?
Guide
| 15 min read

Guide
Paul Gill
How do terrorists make decisions?
Guide
| 6 min read

Report
Nick Neave, Pam Briggs, Liz Sillence, Kerry McKellar (Lakey)
Cybersecurity risks of digital hoarding behaviours
Report
| 1 min read

Guide
Ashraf Labib
A sea change for intelligence analysis?
Guide
| 10 min read

Guide
Laurence Alison
Considerations for Training Development
Guide
| 5 min read

Guide
Laurence Alison
Factors that Affect Command Decision-Making
Guide
| 10 min read

Policy brief
John Blythe
Phishing your staff: A double-edged sword?
Policy brief
| 5 min read

Report
Martin Innes
Soft Facts and Digital Behavioural Influencing After the 2017 Terror Attacks
Report
| 5 min read

Report
Math Noortmann, Juliette Koning, Joost Vervoort, Ingrid Hoofd
Imaginative Scenario Planning
Report
| 2 min read

Guide
Math Noortmann, Juliette Koning
Imaginative Scenario Planning Toolkit
Guide
| 2 min read

Guide
Charis Rice, Rosalind Searle
Animation: Positively Influencing Individuals During Organisational Change
Guide
| 1 min read

Special
Impact review
Special
| 2 min read

Thesis Summary
Feni Kontogianni
Eliciting information from cooperative sources about single and repeated multi-actor events
Thesis Summary
| 1 min read

Guide
Feni Kontogianni
Using self-generated cues to elicit information
Guide
| 2 min read

Report
Karen Douglas, Robbie Sutton, Chee Sing (Jim) Ang, Farzin Deravi, Joe Uscinski, Türkay Nefes
Conspiracy Theories: How are they adopted, communicated, and what are their risks?
Report
| 1 min read

Report
Cerwyn Moore
Russia and Disinformation: The Case of the Caucasus
Report
| 7 min read