- Narcisse Mbunzama
Challenges and Considerations in Countering Coordinated Inauthentic Behaviours in the Democratic Republic of Congo
Read moreIntroduction In recent years, the proliferation of coordinated inauthentic behaviours on social networks in the Democratic Republic of Congo (DRC)…
- Dr. William Allchorn
Far-Right Extremist Exploitation of AI and Alt-Tech: The Need for P/CVE Responses to an Emerging Technological Trend
Read moreContent warning: This Insight contains examples of anti-Semitic & Islamophobic, far-right propaganda. Introduction Far-right groups have increasingly been able to…
- Daveed Gartenstein Ross
An Evolving Threat Landscape: Composite Violent Extremism and Prevention Efforts
Read moreIntroduction A year before William Atchison carried out the 2017 Aztec High School shooting in New Mexico, killing two people…
- Jakob Guhl
Conspiracy Theories, Extremism and Violence: Why and When do Conspiracy Beliefs Lead to Violence?
Read moreAcross this Insights miniseries, ISD experts explore the complex intersection of conspiracy theories, violence and extremism. In the first article…
- Sam Williams
Social Control, Terrorist Content and the Online Safety Bill
Read more*Please note: The provisions of the Online Safety Bill are correct as of 27 July 2023, and are subject to…
- Anna Meier
‘Salad Bar Extremism’ as White Distraction: The (In)coherence of a Category
Read moreIntroduction In 2018, the United Kingdom renamed its ‘unspecified’ category for extremism referrals to ‘mixed, unclear, or unstable ideologies’ (MUU…
- Dr. Gabriel Weimann
Meta Terror?: The Threats and Challenges of the Metaverse
Read moreIntroduction Since their inception, terrorists have used the Internet and social media platforms to spread propaganda, communicate, incite, recruit, train,…
- Inform (Information Network Focus on Religious Movements)
Cults and Online Violent Extremism: Individual Risk Assessments
Read moreThis series of Insights draws on the GNET report by Inform: ‘Cults and Online Violent Extremism’. Inform are an independent…
- Bàrbara Molas
Falling Through the Cracks: Gender Bias in Online Counter-Terrorism and Prevention
Read moreIntroduction In Orientalism (1978), the book that shaped post-colonial studies, Edward Said tried to understand how and why colonised countries…
- Jon Deedman
The Internet Consortium for Online Safety: How Collaborative Tech, Not Legislation, Could Prevent Harmful Content Proliferation
Read moreIntroduction Countering violent extremism (CVE) in a digital context sees practitioners grappling with the enterprise of removing terrorist and violent…
Posts tagged with ‘P/CVE’
GNET > P/CVE
GNET’s Research Digest
Sign up for our monthly newsletter to stay updated about our work