Moonshot TeamMass Shooterism and the Need for Online Interventions and Bystander Resources
Read moreThis Insight was originally posted on Moonshot’s blog. For more information on Moonshot’s digital interventions, please visit their website or get…
Jessica DavisTerrorist Financing and Technology: Understanding Approaches and Anticipating Risks
Read moreOver the last two decades, there has been considerable focus in the international community on countering the financing of terrorism…
Linda SchlegelPersuading with Fantasy: Why Digital P/CVE Narrative Campaigns May Benefit from Fictional Elements
Read moreThe narratives we are exposed to and the stories we tell ourselves and each other have a profound impact on…
Miron LakomyWhy Do Online Countering Violent Extremism Strategies Not Work? The Case of Digital Jihad
Read moreIslamic State’s (IS) propaganda campaign in 2014-2015 marked a turning point in the history of digital jihad. The quality and…
Manuel Ricardo Torres-SorianoHow to Erode Terrorists’ Trust in Cyberspace: The Role of Intelligence Services
Read moreOne of the most crucial missions entrusted to intelligence services in the fight against jihadist terrorism is carried out on…
Maddie CannonA Review of International Multi-Stakeholder Frameworks for Countering Terrorism and Violent Extremism Online
Read moreIn the last ten years, there has been a significant increase in multi-stakeholder forums working to create self-regulatory practices for…
Linda SchlegelCreating Digital Narrative Worlds: The Promises of Transmedia Storytelling for P/CVE Narrative Campaigns
Read moreExtremism is – at least partially – a communication challenge. The acceptance of extremist narratives, which provide followers with a…
Christopher WallThe Robots Will Not Save Us: The Limits of Machine Learning for Counterterrorism
Read moreAt the dawn of the Global War on Terror (GWOT), Secretary of Defense Donald Rumsfeld argued it would trigger a…
Kris McGuffieApplying Systematic Content Moderation for Extremist Deterrence
Read morePlatforms that are committed to making their online communities inhospitable to extremism require pragmatic, layered approaches to policy, detection, moderation,…
Sammie WicksA Call for Orientation and Cultural Competency in Online Extremist Milieus within Prevention Efforts
Read moreThe field of behavioural threat assessment and management (BTAM) has grown significantly in recent years with increasing numbers of law…
Posts tagged with ‘P/CVE’
GNET > P/CVE
GNET’s Research Digest
Sign up for our monthly newsletter to stay updated about our work