Contextual
Resources

Once a government or tech company develops a definition of terrorism or violent extremism, it can be difficult to know how to apply these definitions to the variety of ways that terrorism and violent extremism manifests internationally and across online spaces.

This section of the site aims to highlight contextual resources on themes related to applying definitions to the online space.  GIFCT funds the Global Network on Extremism and Technology (GNET) to bring forward actionable insights from experts and practitioners around the world to better inform and give context to tech companies, governments, practitioners and other stakeholders in this field. Insights are curated here under context-based themes.

Filters

  • 09th April 2025
    Mapping ISKP’s Strength: Social Network Analysis of Tech-Driven Jihad
    Fahadh Firoz
  • 03rd April 2025
    Anonymity, Performance, and Identity: An Analysis of the Antioch Shooting
    Manfredi Pozzoli
  • 31st March 2025
    When Grandpa Turns Extremist: Digital Immigrants, Radicalisation and the German Reich Citizens Movement
    Isabel Lang
  • 27th March 2025
    The Great TikTok Migration: Western Extremists Flock to RedNote
    Guy Fiennes
  • 24th March 2025
    Cryptocurrency and Extremism: How Social Network Analysis Is Used to Track Extremist Cryptocurrency Donations
    Clara Jammot
  • 20th March 2025
    Building Tech Capacity: Cross-Cultural, Gender-Responsive Solutions to Prevent Extremism in Gaming
    Rachel Kowert and Galen Englund
  • 18th March 2025
    Digital Pathways to Violence: the Tech Ecosystem Behind the Antioch Shooting
    Ricardo Cabral Penteado
  • 14th March 2025
    Sadaqah Jariyah: The Thriving Cryptocurrency Fundraising Efforts Behind ISKP’s Official Media
    Mona Thakkar and Riccardo Valle
  • 13th March 2025
    Free the Captives: Islamic State Central Asian Fundraising Networks in Support of IS Families in Syria and Iraq
    Mona Thakkar and Riccardo Valle

We use cookies to improve your experience on our website. See our privacy policy.