Methodologies

TSAS WP17-01: A Concurrent Evaluation of Threat Assessment Tools for the Individual Assessment of Terrorism

Publisher: TSAS
Year: 2017
Description:

This research examines what is the content overlap among three tools that may be relevant for assessing an individual’s risk for terrorist violence: Version 3 of the Historical-Clinical-Risk Management—20 (HCR-20 – …

TSAS WP16-14: Talking to Foreign Fighters: Socio-Economic Push versus Existential Pull Factors

Year: 2016
Description:

The research acquired primary data through interviews with foreign fighters in Syria and Iraq, the families and friends of such fighters, and other online supporters of jihadism, to better understand – …

TSAS WP16-13: Trying to Talk to Terrorists: Ethical and Methodological Challenges in Canada

Publisher: TSAS
Geography: Canada
Year: 2016
Description:

Scholars have long shied away from talking to terrorists. This is because there are significant methodological and ethical problems posed by such research. How can we manage those challenges and – …

Sentiment-Based Identification of Radical Authors (SIRA)

Year: 2015
Description:

Abstract: As violent extremists continue to surface in online discussion forums, counter-extremism agencies search for new and innovative ways of uncovering their digital indicators. Using a sample of approximately 1 – …

The relevance and application of empirical research methods to the study of international crimes

Year: 2014
Description:

Introduction The international criminalization of genocide, crimes against humanity and war crimes has been followed by a vast amount of published work on the legal instruments and institutions dealing with – …

“Networking in Child Exploitation – Assessing disruption strategies using registrant information

Year: 2015

Organisational Culture and Cultural Change: A Network Perspective

Author(s): Whelan — Chad
Year: 2015

Managing Dynamic Public Sector Networks: Effectiveness, Performance and a Methodological Framework in the Field of National Security

Author(s): Whelan — Chad
Year: 2015

Informal Social Networks Within and Between Organisations: On the Properties of Informal Ties and Interpersonal Trust

Author(s): Whelan — Chad
Year: 2016

Clustering Heterogeneous Semi-Structured Social Science Datasets

Year: 2015

Deception in Speeches of Candidates for Public Office

Year: 2015

Sentiment Crawling: Extremist Content Collection through a Sentiment Analysis Guided Web-Crawler

Author(s): Frank– R. | Mei– J.
Year: 2015

Sentiment-Based Identification of Radical Authors (SIRA)

Year: 2015

From Seeds to Orchards: Using Evidence-Based Policing to Address Canada’s Policing Research Needs.

Geography: Canada
Year: 2016

A method to detect criminal organizations from police data

Year: 2016

An experimental test of deviant modeling

Year: 2016

The ecology of trust among hackers

Year: 2016
Description:

Abstract: Malicious hackers profit from the division of labour among highly skilled associates. However, duplicity and betrayal form an intrinsic part of their daily operations. This article examines how a – …

Voices of the Caucasus Emirate: Mapping and analyzing North Caucasus insurgency websites.

Geography: Eastern Europe
Year: 2015
Description:

Abstract: This article looks at Internet use by insurgent groups in the North Caucasus in the context of a regional diffusion of violence. Using a mixed methods research design that – …

Lessons from conducting trans-national Internet-mediated participatory research with hidden populations of cannabis cultivators

Year: 2015
Description:

Abstract Background: Internet-mediated research methods are increasingly used to access hidden populations. The International Cannabis Cultivation Questionnaire (ICCQ) is an online survey designed to facilitate international comparisons into the relatively – …

Social Network Analysis and ‘Dark’ Networks: An Analysis of the London Bombers and the Problem of ‘Fuzzy’ Boundaries

Year: 2015
Description:

Abstract: Social network analysis (SNA) is believed to be capable of revealing significant insights into crime and terror groups, including identifying important individuals and unique approaches to disruption. However, SNA – …

Tendances violentes de la droite radicale au Canada: analyses chronologiques et facteurs d’influence

Author(s): Berube-- Maxime
Geography: Canada
Year: 2016
Description:

The lack of right-wing political parties at the national scale is, among other things, a reason why only a few studies have looked at the factors shaping farright violent incidents – …

L’analyse du risque géopolitique: du plausible au probable

Author(s): Bencherif-- Adib
Year: 2015
Description:

Abstract: This paper is going to explore the logical process behind risk analysis, particularly in geopolitics. The main goal is to demonstrate the ambiguities behind risk calculation and to highlight – …

(Dés)organisation et dynamiques identitaires du mouvement skinhead au Québec : une étude exploratoire

Year: 2016
Description:

About the Book: Si l’expression « réseau social » fait son apparition dans le langage populaire en même temps que les Facebook, LinkedIn et autres plateformes d’échange, le concept est – …

The Surveillance Of Social Networking And The Social Value Of Privacy

Year: 2015
Description:

This chapter argues that theories about privacy would benefit from embracing deliberative democratic theory on the grounds that it addresses harms to democracy, and widens our understandings of privacy infringements – …

A Systematic Approach to Develop a Computational Framework for Counter-terrorism and Public Safety

Publisher: Routledge
Year: 2015

Security networks and counter-terrorism: A reflection on the limits of adversarial isomorphism

Author(s): Dupont– Benoit
Year: 2015

Neighbourhood Effects on Fear of Crime in Canada

Geography: Canada
Year: 2016
Description:

Fear of crime is a social problem with potentially serious consequences, including altering or restricting one’s behaviour. Changes to one’s routine for this purpose are known as constrained behaviours. Although – …

Advances in Research on Illicit Networks

Publisher: Routledge
Year: 2015
Description:

Social network analysis finally reached a critical mass of scholars in the field of criminology. The proven track record of network theory and methods in fostering new advances in our – …

Social Networks, Terrorism, and Counter-Terrorism: Radical and Connected

Publisher: Routledge
Year: 2015
Description:

This book examines two key themes in terrorism studies, the radicalization process and counter-terrorism policies, through the lens of social networks. The book aims to show that networks should be – …

TSAS WP16-09: Social impacts of the securitized arrival experiences of in-Canada refugee claimants

Author(s): Osterberg--Erin
Publisher: TSAS
Geography: Canada
Year: 2016
Description:

This multi-sited research included qualitative interviews with 19 in-Canada refugee claimants declared convention refugees under the new (since Dec 1, 2012) immigration legislation. The research sought to answer two questions: – …

TSAS WP16-07: Cheering on the Jihad: An Exploration of Women’s Participation in Online Pro-jihadist Networks

Publisher: TSAS
Description:

This paper poses the following questions: 1. Can identifiable patterns of engagement by female posters be discerned based on content of posts? 2. Does the type of the jihadist group – …

Why bother? Death, Failure, and Fatalistic Withdrawal from life

Year: 2015
Description:

The current research examines the conditions under which death contemplation will reduce, rather than increase, goal directed activity. By employing a goal-regulation perspective on the problem of death, we hypothesized – …

Anxiety and the Approach of Idealistic Meaning

Year: 2014
Description:

This chapter will provide an overview of some of our research on meaning-related motivational processes. We outline our Reactive Approach Motivation theory, which offers a goal-regulation perspective on anxiety and – …

The Ethical Challenges of Field Research in Conflict Zones

Year: 2006

Social Networks, Terrorism, and Counter-Terrorism: Radical and Connected

Publisher: Routledge
Year: 2015

This is Not Your Mother’s Terrorism: Social Media, Online Radicalization and the Practice of Political Jamming

Author(s): Huey– Laura
Geography: North America
Year: 2015

Questions about Dawlah. DM me, plz.’ The Sock Puppet Problem in Online Terrorism Research

Year: 2015

Ethical Research in Refugee Communities and the Use of Community Participatory Methods

Author(s): Ellis– B Heidi
Year: 2007

Conducting Field Research on Terrorism: a Brief Primer

Author(s): Dolnik– Adam
Year: 2011

Social network analysis in the study of terrorism and political violence

Year: 2011

Using video observation and photo elicitation interviews to understand obscured processes in the lives of resilient youth

Year: 2013

The Spatial Distribution and Social Ecology of ‘Public’ and ‘Private’ Homicide Types in Toronto: A Case for Data Disaggregation

Author(s): Thompson– Sara
Year: 2014

Predicting Arrest and Sentencing Outcomes with Centrality Measures

Year: 2013

Crime Facilitation Purposes of Social Networking Sites: A Review and Analysis of the Cyberbanging Phenomenon

Year: 2013

Spectral Embedding for Dynamic Social Networks

Year: 2013

Keeping promises: Logic models, and the design or a new classification of gang control strategies.

Year: 2013

Investing in people: Social networks in the diffusion of a large-scale fraud

Year: 2013

Why Terror Networks are Dissimilar: How Structure Relates to Function

Publisher: Springer
Year: 2014

Assessing the core membership of a youth gang from its co-offending network

Publisher: Routledge
Year: 2013

Efficacité des initiatives de contrôle des gangs de rue: Une revue systématique des recherches évaluatives

Year: 2014