Documente Academic
Documente Profesional
Documente Cultură
Theme:
Theme: Theme:
Better intelligence and
Understanding who & why? Protecting ourselves
decisions
12:00 – 13:00 Lunch
Approaches to engagement Operational and Linguistic
13:00 – 15:00 Protecting Organisations
and desistence Information Processing
15:00 – 15:30 Refreshments
Institutions, Organisations Rapport and Information User behaviour,
15:30 – 17:30
and radicalisation gathering vulnerabilities and risk
19:30 onwards Conference Dinner
Wednesday 11th
08:30 – 09:00 Refreshments
Cybersecurity and actors Strategies and techniques for Cybersecurity and actors
09:00 – 11:00
(joint session) information gathering (joint session)
11:00 – 11:30 Refreshments
Lightning Talks: Lightning Talks:
11:30 – 12:30
Understanding who and why Better Intelligence Gathering and Decisions
12:30 – 13:30 Lunch
Panel: Inter and Intra- Panel: Eliciting Intelligence
Panel: Translating Research
13:30 – 14:30 Organisational Dynamics and Information: Challenges and
into Practice & Policy
Violence Opportunities
14:30 – 15:00 Refreshments
Encouraging and improving
15:00 – 17:00 Analysing Communication Detecting deception
reporting behaviour
17:30 – 18:00 Refreshments
Keynote: Ambiguous questions, sensitive topics, and messy data: How (nevertheless)
18:00 – 19:00
government learns from research
19:00 – 19:30 Drinks reception
Thursday 12th
09:00 – 09:15 Refreshments
Keynote: Remapping the ‘human terrain’ of security risks and protections: Preventing violent
09:15– 10:15
extremism at the crossroads
10:15 – 10:30 Poster Prize Giving
Lynsey Gozna University of Nottingham The roots and routes of revenge: Fuelling hate and exploiting Dr Shihning Chou, Dr Simon Duff,
vulnerability in complex, dynamic environments University of Nottingham.
Workplace Village: Using autonomous workgroups to improve Professor Debi Ashenden, University of
Emma Boakes University of Portsmouth
security Portsmouth
Professor Gary University of Maryland Prison and Violent Political Extremism in the United States
LaFree
Politicization of Mosques in Afghanistan: Mullahs, Spiritual
Dr Weeda Mehran Georgia State University
Leaders or Antagonistic Preachers?
Professor Neil Learning and Unlearning terrorism: The Paramilitary Life Cycle in Professor James McAuley, University of
Liverpool Hope University
Ferguson Northern Ireland Huddersfield
Keeping Secrets Online: An evidence synthesis of strategies, Dr Anna Gavine, Professor Wendy
Aikaterini Grimani University of Dundee
enablers and barriers Moncur, University of Dundee
Professor Pam Briggs, Dr Elizabeth
Dr Nick Neave Northumbria University The potential cybersecurity risks of digital hoarding behaviours Sillence, Dr Kerry McKellar, Northumbria
University
Dr Lynne Coventry, Professor Pam Briggs,
Dr James Nicholson Northumbria University Cybersecurity Information Seeking by Older Users
Northumbria University.
Young adults' dispositions and preferences around sharing Professor Michele Grossman, Deakin
Professor Paul
University of Huddersfield concerns with authorities regarding violent extremism University; Dr Shamim Miah, Kris
Thomas
involvement: evidence from a UK study Christmann, University of Huddersfield
Talking to hackers: A social psychological approach to improving Dr John McAlaney, Dr Jacqui Taylor,
Helen Thackray Bournemouth University
Cybersecurity Bournemouth University.
Liam McVay, University of Glasgow; Dr
Daniel Jones, University of Texas at El
Dr Damien Van Keeping Secrets: A Systematic Survey on the Causes of
University of Glasgow Paso; Melissa de Roos, University of
Puyvelde Professional Discretion
Texas at El Paso; Steven Mueller,
University of Texas at El Paso.
Matthew J. Edwards, University of Bristol;
The psychology of 419 scams – a qualitative study of sustained
Raluca A. Briazu University of Warwick Professor Monica T. Whitty, University of
conversations between one victim and multiple scammers
Warwick and University of Melbourne.
Digital Influencing After Terrorism: Spoofing, ‘Truthing’ and Social Dr Helen Innes, Professor Martin Innes,
Diyana Dobreva Cardiff University
Proofing Cardiff University.
Birmingham City The Effectiveness of Social Influence Techniques in Eliciting Professor Fiona Gabbert, Dr Gordon
Rebecca Wheeler
University Information from Reluctant Witnesses Wright, Goldsmiths, University of London.
Nadine Hawkins de Namor, University of
Portsmouth; Professor Fiona Gabbert, Dr
Professor Lorraine Eliciting information in cross-cultural contexts: What are the Nelli Ferenczi, Goldsmiths, University of
University of Portsmouth
Hope challenges for building trust and rapport? London; Dr Gavin Oxburgh, Newcastle
University; Dr Olivia Rutazibwa,
University of Portsmouth.
Dr Karena
University of Birmingham Maskirovka: Russian state deception and disinformation
Avedissian
Dr Weeda Mehran “You will be more beautiful, have more jewelries, and a wardrobe
Georgia State University
full of fine dresses”: A heavenly reward for female militancy
Dr Renate Geurts University of Twente Justified snitching: In search for exceptions to the code of silence
Phishtray: A modifiable, open-source email-sorting task for Professor Adam Joinson, University of Bath;
Ana Levordashka University of Bath
research and training applications related to social engineering Dr Emma Williams, University of Bristol
Safe Space: Examining the Effect of Interview Location on Self- Professor Paul J. Taylor, Dr Kirk Luther,
Christina Winters Lancaster University
Disclosure Lancaster University.
Professor Aldert Vrij, Dr Sharon Leal,
The reversed question protocol (RQP); self-generated reflexive
Louise Jupe University of Portsmouth University of Portsmouth; Professor Galit
questions as an aid to the detection of identity deception
Nahari, Bar-Ilan University.
Professor Aldert Vrij, Dr Lucy Akehurst,
The SAI and Subsequent Recall: Examining Written & Verbal Cues
Charlotte Hudson University of Portsmouth Professor Lorraine Hope, University of
to Deception
Portsmouth.
Dr Sharon Leal, Professor Aldert Vrij, Gary
Dalton, Louise Jupe, Adam
Dr Zarah Vernham University of Portsmouth Cross-cultural verbal deception
Harvey,University of Portsmouth;
Professor Galit Nahari, Bar Ilan University.
Keynote: Remapping the ‘human terrain’ of security risks and protections: Preventing violent extremism at the crossroads
Lucy Hunt Lancaster University Modelling and Measuring the Cost of Exploitation for Attackers
Intergroup Intentional and Behavioural Responses to Perceived Professor Paul J. Taylor, Dr Kathleen C.
Anastasia Kordoni Lancaster University
Terrorist Threat and Authority Surveillance McCulloch, Lancaster University
Mission Abort? An investigation into methods to dissuade Professor Aldert Vrij, Professor Lorraine
Dr Samantha Mann University of Portsmouth
motivated individuals from mission achievement Hope, University of Portsmouth
Rosamund Mutton Lancaster University The Multiple Roles of Women in Violent Extremist Groups
"Memetic Warefare": The spread of minority-themed visual Professor Adam Joinson, Dr Lukasz Piwek,
Dr Samantha North University of Bath
misinformation on social media Univeristy of Bath
Dr Duncan Hodges, Cranfield University;
Connected events and malicious insiders: Investigating patterns
Katie Paxton-Fear Cranfield University Dr Oliver Buckley, University of East
of insider threat using natural language processing
Anglia
Using decision trees to create transparent data visualisations of Dr David A. Ellis, Lancaster University;
Heather Shaw University of Lincoln
how factors predict smartphone ownership Fenja V. Ziegler, University of Lincoln.
Dr Duncan Hodges, Cranfield University;
Thinking like a Hacker: Agent-Based Modelling of Offensive
Tatjana Sidorenko Cranfield University Dr Oliver Buckley, University of East
Actors in Cyberspace
Anglia
Dr Joshua Rottman, Franklin & Marshall
College; Dr Nicola Power, Lancaster
University; Dr Mengyao Li, Max Planck
Institute for Research on Collective
Stylianos University of Cross-Cultural Investigation on the Effects of Immigration Goods, Germany; Remco Spithoven,
Syropoulos Massachusetts Amherst Movements on Perceived Safety University of Applied Sciences, Sophie
Cross, Sorbonne University; Dr Aphrodite
Baka, Aristotle University of Thessaloniki;
Dr Juan Carlos Trivino, Institut Barcelona
d'Estudis Internacionals
Jop Van der The reliability and validity of the predictive profiling method at Professor dr. Dirk Van Daele, Professor
KU Leuven
Auwera Belgian airports: future research and preliminary results dr. Geert Vervaeke, KU Leuven,
Christina Winters, Professor Paul J.
The influence of social reciprocity on information provision in the
Lynn Weiher Lancaster University Taylor, Dr Kirk Luther, Lancaster
investigative interview
University
North Carolina State Improving the Evidence Base Supporting Counterterrorism Dr. Sarah Desmarais, Dr. Joseph Simons-
Christine Brugh
University Strategy: Heterogeneity across Contexts and Actors Rudolph, North Carolina State University.
Dr Oliver Buckley University of East Anglia Inferring Identity Cues using Keystroke Dynamics Dr Duncan Hodges, Cranfield University