Browse and search a list of publications and products both published by NIJ and resulting from NIJ funding. This list includes reports submitted by grantees, NIJ reports and other publications, NIJ Journal issues and articles, products published by grantees, and articles appearing in peer review and other publications.
Social Learning and Social Control in the Off- and Online Pathways to Hate Crime and Terrorist Violence
Loners, Colleagues, or Peers? Assessing the Social Organization of Radicalization
Legislation Specifically Targeting the Use of the Internet to Recruit Terrorists
Examining the Utility of Social Control and Social Learning in the Radicalization of Violent and Non-violent Extremists
Examining Signals of Trust in Criminal Markets Online
Examining the Geographic Distribution of Victim Nations in Stolen Data Markets
Internet-Based Radicalization as Enculturation to Violent Deviant Subcultures
The Online Stolen Data Market: Disruption and Intervention Approaches
Exploring and Estimating the Revenues and Profits of Participants in Stolen Data Markets
Data-driven system identification of the social network dynamics in online postings of an extremist group
Crime Script Analysis of the Online Stolen Data Market
Examination of the Conditions Affecting Forensic Scientists' Workplace Productivity and Occupational Stress
Examining the Structure, Organization, and Processes of the International Market for Stolen Data
Exploring the Social Organisation and Structure of Stolen Data Markets
Examining the Forces Shaping Cybercrime Markets Online
Research Forensic Library
We invite you to also search the Research Forensic Library, a curated collection of publicly-accessible material relating to every discipline of the forensic sciences.