- Jessica Davis
Terrorist Financing and Technology: Understanding Approaches and Anticipating Risks
Read moreOver the last two decades, there has been considerable focus in the international community on countering the financing of terrorism…
- Linda Schlegel
Persuading with Fantasy: Why Digital P/CVE Narrative Campaigns May Benefit from Fictional Elements
Read moreThe narratives we are exposed to and the stories we tell ourselves and each other have a profound impact on…
- Miron Lakomy
Why Do Online Countering Violent Extremism Strategies Not Work? The Case of Digital Jihad
Read moreIslamic State’s (IS) propaganda campaign in 2014-2015 marked a turning point in the history of digital jihad. The quality and…
- Manuel Ricardo Torres-Soriano
How to Erode Terrorists’ Trust in Cyberspace: The Role of Intelligence Services
Read moreOne of the most crucial missions entrusted to intelligence services in the fight against jihadist terrorism is carried out on…
- Maddie Cannon
A Review of International Multi-Stakeholder Frameworks for Countering Terrorism and Violent Extremism Online
Read moreIn the last ten years, there has been a significant increase in multi-stakeholder forums working to create self-regulatory practices for…
- Linda Schlegel
Creating Digital Narrative Worlds: The Promises of Transmedia Storytelling for P/CVE Narrative Campaigns
Read moreExtremism is – at least partially – a communication challenge. The acceptance of extremist narratives, which provide followers with a…
- Christopher Wall
The Robots Will Not Save Us: The Limits of Machine Learning for Counterterrorism
Read moreAt the dawn of the Global War on Terror (GWOT), Secretary of Defense Donald Rumsfeld argued it would trigger a…
- Kris McGuffie
Applying Systematic Content Moderation for Extremist Deterrence
Read morePlatforms that are committed to making their online communities inhospitable to extremism require pragmatic, layered approaches to policy, detection, moderation,…
- Sammie Wicks
A Call for Orientation and Cultural Competency in Online Extremist Milieus within Prevention Efforts
Read moreThe field of behavioural threat assessment and management (BTAM) has grown significantly in recent years with increasing numbers of law…
- Linda Schlegel
Into the Dungeon? Possibilities for Primary and Secondary Prevention on Gaming (-Adjacent) Platforms
Read moreVideogames, gaming-related content, and gaming (-adjacent) platforms are a new key area of discussion for those seeking to understand how…
Posts tagged with ‘P/CVE’
GNET > P/CVE
GNET’s Research Digest
Sign up for our monthly newsletter to stay updated about our work