Contextual
Resources
Once a government or tech company develops a definition of terrorism or violent extremism, it can be difficult to know how to apply these definitions to the variety of ways that terrorism and violent extremism manifests internationally and across online spaces.
This section of the site aims to highlight contextual resources on themes related to applying definitions to the online space. GIFCT funds the Global Network on Extremism and Technology (GNET) to bring forward actionable insights from experts and practitioners around the world to better inform and give context to tech companies, governments, practitioners and other stakeholders in this field. Insights are curated here under context-based themes.
Filters
Tactical Exploitation of Online Services
Radicalization
Tactical Exploitation of Online Services
Online terrorism and violent extremism comes in many forms and platforms are equally exploited in a variety of ways. Terrorist and violent extremist groups and individuals, like average users, use a mixture of platforms to further their aims. This cross-platform approach facilitates in storing content, holding private or confidential conversations, e-commerce for buying and selling goods as well as fundraising, recruitment, and the amplification of propaganda and messaging to the public. These signals, trends and adversarial shifts around this exploitation are highlighted by global experts.
Radicalization
When it comes to processes of radicalization, there have been significant concerns about the threat to online spaces and the role they play in this process. Overall, research shows that there may be a systematic bias in reporting of terrorism cases that prompt audiences to believe that the Internet plays a greater role than actually pertains. However, research also points to a mix of factors, ideologies, and platforms that all come together in this complex process.
-
15th February 2024A Deadly Trifecta: Disinformation Networks, AI Memetic Warfare, and DeepfakesAchi Mishra and Vignesh Karumbaya
-
08th February 2024Grooming for Violence: Similarities Between Radicalisation and Grooming Processes in Gaming SpacesRachel Kowert and Elizabeth D. Kilmer
-
04th October 2023The New Online Radicals: The Third Generation of Online RadicalisationJacob Ware
-
16th November 2022Hitting Rock Bottom: The Radicalising Potential of Celebrity CultureJordan Chapman
-
12th September 2022Analysing Terrorgram Publications: A New Digital ZineMatthew Kriner and Bjørn Ihler
-
08th September 2022Right-Wing Extremists’ Use of the Internet: Emerging Trends in the Empirical LiteratureDr. Ryan Scrivens, Tiana Gaudette, Dr. Maura Conway and Dr. Thomas J. Holt
-
25th August 2022Humour in Jihadi Rhetoric: A Comparative Analysis of ISIS, Al-Qaeda, TTP, and the TalibanWeeda Mehran
-
-
03rd August 2022Mass Shooterism and the Need for Online Interventions and Bystander ResourcesMoonshot Team