Maddie CannonA Review of International Multi-Stakeholder Frameworks for Countering Terrorism and Violent Extremism Online
Read moreIn the last ten years, there has been a significant increase in multi-stakeholder forums working to create self-regulatory practices for…
Linda SchlegelCreating Digital Narrative Worlds: The Promises of Transmedia Storytelling for P/CVE Narrative Campaigns
Read moreExtremism is – at least partially – a communication challenge. The acceptance of extremist narratives, which provide followers with a…
Christopher WallThe Robots Will Not Save Us: The Limits of Machine Learning for Counterterrorism
Read moreAt the dawn of the Global War on Terror (GWOT), Secretary of Defense Donald Rumsfeld argued it would trigger a…
Kris McGuffieApplying Systematic Content Moderation for Extremist Deterrence
Read morePlatforms that are committed to making their online communities inhospitable to extremism require pragmatic, layered approaches to policy, detection, moderation,…
Sammie WicksA Call for Orientation and Cultural Competency in Online Extremist Milieus within Prevention Efforts
Read moreThe field of behavioural threat assessment and management (BTAM) has grown significantly in recent years with increasing numbers of law…
Linda SchlegelInto the Dungeon? Possibilities for Primary and Secondary Prevention on Gaming (-Adjacent) Platforms
Read moreVideogames, gaming-related content, and gaming (-adjacent) platforms are a new key area of discussion for those seeking to understand how…
Cameron SumpterCurrent Priorities in Counterterrorism and Prevention: Results of the CENS Online Expert Survey
Read moreThe Centre of Excellence for National Security (CENS) in Singapore designed a survey to assess the pandemic’s impact on violent…
Maik FielitzWhen Counter-Speech Backfires: The Pitfalls of Strategic Online Interaction
Read moreFor a long time, hatred and incitement on social media have been treated as a relatively apolitical and purely virtual…
Dr. Victoria McCloudSchrems II and the Future of 3rd Party Security Service Access to Data From the UK
Read moreHappy Birthday Schrems II, but hold back the cake. As the EU’s judgment in Data Protection Commissioner v Facebook Ireland…
Jessica DavisTechnology and Terrorist Financing
Read moreTerrorists are increasingly exploiting technology to finance their activities. However, terrorist adoption of technology is an evolution, not a revolution. As the…
Posts tagged with ‘P/CVE’
GNET > P/CVE
GNET’s Research Digest
Sign up for our monthly newsletter to stay updated about our work