Laura WeinsteinMisogynistic Extremism and the Fallacy of Technochauvinism
Read moreThis Insight is part of GNET’s Gender and Online Violent Extremism series in partnership with Monash Gender, Peace and Security Centre. This series…
Jacqui TrueThe Challenges and Potential of Harnessing Technology for the Prevention of Gender-Based Violence and Violent Extremism
Read moreThis Insight is part of GNET’s Gender and Online Violent Extremism series in partnership with Monash Gender, Peace and Security…
Linda SchlegelPlaying Against Radicalisation: Why Extremists are Gaming and How P/CVE Can Leverage the Positive Effects of Video Games to Prevent Radicalisation
Read moreThe potential nexus between gaming and extremism is an increasingly important concern for researchers, tech companies, policymakers, and practitioners working…
Ellie RogersThe Role of User Agency in the Algorithmic Amplification of Terrorist and Violent Extremist Content
Read moreThere is an increasing focus by governments and certain concerned civil society initiatives that algorithms might be amplifying terrorist and…
Daniela PisoiuCan Serious Games Make a Difference in P/CVE?
Read moreVideo games and gamification have become key tools of extremist actors’ recruitment arsenal and have taken a central role in…
Moonshot TeamMass Shooterism and the Need for Online Interventions and Bystander Resources
Read moreThis Insight was originally posted on Moonshot’s blog. For more information on Moonshot’s digital interventions, please visit their website or get…
Jessica DavisTerrorist Financing and Technology: Understanding Approaches and Anticipating Risks
Read moreOver the last two decades, there has been considerable focus in the international community on countering the financing of terrorism…
Linda SchlegelPersuading with Fantasy: Why Digital P/CVE Narrative Campaigns May Benefit from Fictional Elements
Read moreThe narratives we are exposed to and the stories we tell ourselves and each other have a profound impact on…
Miron LakomyWhy Do Online Countering Violent Extremism Strategies Not Work? The Case of Digital Jihad
Read moreIslamic State’s (IS) propaganda campaign in 2014-2015 marked a turning point in the history of digital jihad. The quality and…
Manuel Ricardo Torres-SorianoHow to Erode Terrorists’ Trust in Cyberspace: The Role of Intelligence Services
Read moreOne of the most crucial missions entrusted to intelligence services in the fight against jihadist terrorism is carried out on…
Posts tagged with ‘P/CVE’
GNET > P/CVE
GNET’s Research Digest
Sign up for our monthly newsletter to stay updated about our work