Once a government or tech company develops a definition of terrorism or violent extremism, it can be difficult to know how to apply these definitions to the variety of ways that terrorism and violent extremism manifests internationally and across online spaces.

This section of the site aims to highlight contextual resources on themes related to applying definitions to the online space.  GIFCT funds the Global Network on Extremism and Technology (GNET) to bring forward actionable insights from experts and practitioners around the world to better inform and give context to tech companies, governments, practitioners and other stakeholders in this field. Insights are curated here under context-based themes.


CT Efforts/Positive Interventions

Counterterrorism and counter-extremism campaigns and interventions online have evolved in recent years. These efforts aim to intervene in processes of radicalization, deplatform known extremist networks, redirect users to counterspeech content and positive alternatives, or direct users to resources that can help them disengage from violent extremist networks. International academics have been evolving the intervention space to discuss measurement and evaluation of these campaigns and programs, as well as looking to the future in assessing where interventions can evolve and innovate.

  • 21st September 2022
    The Role of User Agency in the Algorithmic Amplification of Terrorist and Violent Extremist Content
    Ellie Rogers
  • 14th September 2022
    The Tate Storm: Why Banning Andrew Tate from Social Media Will Not Stop the ‘King of Toxic Masculinity’
    Abhinaya Murthy
  • 05th September 2022
    Can Serious Games Make a Difference in P/CVE?
    Daniela Pisoiu
  • 31st August 2022
    The Time for e-Democracy is Now: How a Digitally Functional Democracy Could Prevent Extremist Accelerationism
    Jon Deedman
  • 17th August 2022
    Recommendation Systems and Extremism: What Do We Know?
    Joe Whittaker
  • 03rd August 2022
    Mass Shooterism and the Need for Online Interventions and Bystander Resources
    Moonshot Team
  • 11th July 2022
    Terrorist Financing and Technology: Understanding Approaches and Anticipating Risks
    Jessica Davis
  • 05th July 2022
    Persuading with Fantasy: Why Digital P/CVE Narrative Campaigns May Benefit from Fictional Elements
    Linda Schlegel
  • 17th May 2022
    Why Do Online Countering Violent Extremism Strategies Not Work? The Case of Digital Jihad
    Miron Lakomy

We use cookies to improve your experience on our website. See our privacy policy.