Irine GayatriHow Women-Led CSOs are Leveraging I-KHUB Technology for Gender-Driven Prevention Efforts in Indonesia
Read moreThis Insight is part of GNET’s Gender and Online Violent Extremism series in partnership with Monash Gender, Peace and Security Centre. This series…
Clara Ribeiro AssumpcãoIntegrating Gender Across OSINT Cycles: Good Practices for Practitioners
Read moreThis Insight is part of GNET’s Gender and Online Violent Extremism series in partnership with Monash Gender, Peace and Security Centre. This series…
Narcisse MbunzamaChallenges and Considerations in Countering Coordinated Inauthentic Behaviours in the Democratic Republic of Congo
Read moreIntroduction In recent years, the proliferation of coordinated inauthentic behaviours on social networks in the Democratic Republic of Congo (DRC)…
Dr. William AllchornFar-Right Extremist Exploitation of AI and Alt-Tech: The Need for P/CVE Responses to an Emerging Technological Trend
Read moreContent warning: This Insight contains examples of anti-Semitic & Islamophobic, far-right propaganda. Introduction Far-right groups have increasingly been able to…
Daveed Gartenstein RossAn Evolving Threat Landscape: Composite Violent Extremism and Prevention Efforts
Read moreIntroduction A year before William Atchison carried out the 2017 Aztec High School shooting in New Mexico, killing two people…
Jakob GuhlConspiracy Theories, Extremism and Violence: Why and When do Conspiracy Beliefs Lead to Violence?
Read moreAcross this Insights miniseries, ISD experts explore the complex intersection of conspiracy theories, violence and extremism. In the first article…
Sam WilliamsSocial Control, Terrorist Content and the Online Safety Bill
Read more*Please note: The provisions of the Online Safety Bill are correct as of 27 July 2023, and are subject to…
Anna Meier‘Salad Bar Extremism’ as White Distraction: The (In)coherence of a Category
Read moreIntroduction In 2018, the United Kingdom renamed its ‘unspecified’ category for extremism referrals to ‘mixed, unclear, or unstable ideologies’ (MUU…
Dr. Gabriel WeimannMeta Terror?: The Threats and Challenges of the Metaverse
Read moreIntroduction Since their inception, terrorists have used the Internet and social media platforms to spread propaganda, communicate, incite, recruit, train,…
Posts tagged with ‘P/CVE’
GNET > P/CVE
GNET’s Research Digest
Sign up for our monthly newsletter to stay updated about our work
