Contextual
Resources
Once a government or tech company develops a definition of terrorism or violent extremism, it can be difficult to know how to apply these definitions to the variety of ways that terrorism and violent extremism manifests internationally and across online spaces.
This section of the site aims to highlight contextual resources on themes related to applying definitions to the online space. GIFCT funds the Global Network on Extremism and Technology (GNET) to bring forward actionable insights from experts and practitioners around the world to better inform and give context to tech companies, governments, practitioners and other stakeholders in this field. Insights are curated here under context-based themes.
Filters
CT Efforts/Positive Interventions
Counterterrorism
CT Efforts/Positive Interventions
Counterterrorism and counter-extremism campaigns and interventions online have evolved in recent years. These efforts aim to intervene in processes of radicalization, deplatform known extremist networks, redirect users to counterspeech content and positive alternatives, or direct users to resources that can help them disengage from violent extremist networks. International academics have been evolving the intervention space to discuss measurement and evaluation of these campaigns and programs, as well as looking to the future in assessing where interventions can evolve and innovate.
-
26th January 2024Data Collection in Online Terrorism and Extremism Research: Future DirectionsDr. Ryan Scrivens, Dr. Joshua D. Freilich, Dr. Steven Chermak and Dr. Richard Frank
-
03rd July 2023Falling Through the Cracks: Gender Bias in Online Counter-Terrorism and PreventionBàrbara Molas
-
16th January 2023The Internet and Radicalisation Pathways: Technological Advances, Mental Health and the Role of AttackersJonathan Kenyon
-
-
31st August 2022The Time for e-Democracy is Now: How a Digitally Functional Democracy Could Prevent Extremist AccelerationismJon Deedman
-
03rd August 2022Mass Shooterism and the Need for Online Interventions and Bystander ResourcesMoonshot Team
-
11th July 2022Terrorist Financing and Technology: Understanding Approaches and Anticipating RisksJessica Davis
-
17th May 2022Why Do Online Countering Violent Extremism Strategies Not Work? The Case of Digital JihadMiron Lakomy
-
05th May 2022How to Erode Terrorists’ Trust in Cyberspace: The Role of Intelligence ServicesManuel Ricardo Torres-Soriano