Contextual
Resources
Once a government or tech company develops a definition of terrorism or violent extremism, it can be difficult to know how to apply these definitions to the variety of ways that terrorism and violent extremism manifests internationally and across online spaces.
This section of the site aims to highlight contextual resources on themes related to applying definitions to the online space. GIFCT funds the Global Network on Extremism and Technology (GNET) to bring forward actionable insights from experts and practitioners around the world to better inform and give context to tech companies, governments, practitioners and other stakeholders in this field. Insights are curated here under context-based themes.
Filters
CT Efforts/Positive Interventions
Please select
CT Efforts/Positive Interventions
Counterterrorism and counter-extremism campaigns and interventions online have evolved in recent years. These efforts aim to intervene in processes of radicalization, deplatform known extremist networks, redirect users to counterspeech content and positive alternatives, or direct users to resources that can help them disengage from violent extremist networks. International academics have been evolving the intervention space to discuss measurement and evaluation of these campaigns and programs, as well as looking to the future in assessing where interventions can evolve and innovate.
-
14th September 2022The Tate Storm: Why Banning Andrew Tate from Social Media Will Not Stop the ‘King of Toxic Masculinity’Abhinaya Murthy
-
-
31st August 2022The Time for e-Democracy is Now: How a Digitally Functional Democracy Could Prevent Extremist AccelerationismJon Deedman
-
-
03rd August 2022Mass Shooterism and the Need for Online Interventions and Bystander ResourcesMoonshot Team
-
11th July 2022Terrorist Financing and Technology: Understanding Approaches and Anticipating RisksJessica Davis
-
05th July 2022Persuading with Fantasy: Why Digital P/CVE Narrative Campaigns May Benefit from Fictional ElementsLinda Schlegel
-
17th May 2022Why Do Online Countering Violent Extremism Strategies Not Work? The Case of Digital JihadMiron Lakomy
-
05th May 2022How to Erode Terrorists’ Trust in Cyberspace: The Role of Intelligence ServicesManuel Ricardo Torres-Soriano