• Home
  • Our Services
  • About Us
  • Textbook
  • Blog & Publications
  • Contact Us

Call us at +1 470 222 3457

ContactUs@TheScienceOfPCVE.org
The Science of P/CVE.orgThe Science of P/CVE.org
The Science of P/CVE.orgThe Science of P/CVE.org
  • Home
  • Our Services
  • About Us
  • Textbook
  • Blog & Publications
  • Contact Us

Peer-Reviewed Publications

Publications

Sampling and the Curse of the Case Study

Sampling and the Curse of the Case Study

Download: Sampling and the Curse of the Case Study. Click the title page image to download the article, “Sampling and...

Incentivizing P/CVE Research, Evaluation, & Program Participants.

Incentivizing P/CVE Research, Evaluation, & Program Participants.

Download: Incentivizing P/CVE Research, Evaluation, & Program Participants. Click the title page image to download the article, “Incentivizing P/CVE Research,...

Anatomy of process evaluations for PCVE

Anatomy of process evaluations for PCVE

Download: Anatomy of process evaluations for PCVE. Click the title page image to download the article, “Anatomy of process evaluations...

Attrition happens (and what to do about it).

Attrition happens (and what to do about it).

Download: Attrition happens (and what to do about it). Click the image to download the article, “Attrition Happens (and What...

A utilization-focused guide for conducting terrorism risk reduction program evaluations

A utilization-focused guide for conducting terrorism risk reduction program evaluations

Utilization-focused-guide-for-conducting-terrorism-risk-reduction-program-evaluationsDownload

Experimental Effects of a Call-Center Disclaimer Regarding Confidentiality on Callers’ Willingness to Make Disclosures Related to Terrorism

Experimental Effects of a Call-Center Disclaimer Regarding Confidentiality on Callers’ Willingness to Make Disclosures Related to Terrorism

Experimental-Effects-of-a-Call-Center-Disclaimer..Download You might also be interested in the the following experimental P/CVE project. Do Counter-Narratives Work? Yes, but not for...

Expansion and replication of the theory of vicarious help seeking

Expansion and replication of the theory of vicarious help seeking

Expansion-and-replication-of-the-theory-of-vicarious-help-seekingDownload You might also be interested in the the following two pieces related to the above work. The piece that...

Evaluation of a Multi-Faceted, U.S. Community-Based, Muslim-Led CVE Program

Evaluation of a Multi-Faceted, U.S. Community-Based, Muslim-Led CVE Program

Evaluation-of-a-Multi-Faceted-U.S.-Community-Based-Muslim-Led-CVE-ProgramDownload You might also be interested in the the following two pieces related to the above work. The piece that...

The critical role of friends in networks for countering violent extremism: Toward a theory of vicarious help-seeking

The critical role of friends in networks for countering violent extremism: Toward a theory of vicarious help-seeking

Download: The Critical Role of Friends in Networks for Countering Violent Extremism   You might also be interested in the...

Contact Info

  • The Science of P/CVE
  • +1 470 222 3457
  • ContactUs@TheScienceOfPCVE.org
  • TheScienceOfPCVE.org

Contact us. Your email will be used only to reply to you.