Post Type Description
Teenage Terrorists and the Digital Ecosystem of the Islamic State
March 25, 2025The author seeks to highlight just how central this unofficial Islamic State ecosystem is to audiences inspired by the group and how the interplay between this ecosystem and youth requires reframing the challenge rather than doubling down on the same playbooks. This article will first present the connection between these young peoples’ use of social ...
Perceptions of Individuals Radicalised Online: Examining the Victim-Perpetrator Nexus
March 25, 2025This study explored the victim-perpetrator nexus in the context of cognitive online radicalisation. Specifically, we examined if a person’s age and whether they were exposed to extremist content/users incidentally or following active search shape perceptions of victimhood. We further assessed whether and how perceptions of victimhood shape support for distinct criminal justice responses. ...
Threat Surfaces in Games: Challenges and Best Practices
March 25, 2025Gaming Community of Practice: The Gaming Community of Practice (GCoP) was formed to foster collaboration, knowledge sharing, and innovation among practitioners in the gaming industry alongside global experts. The group aimed to inform the development of best practices and guidance to prevent terrorists and violent extremists (TVE) from exploiting games, gaming-adjacent services, and the gaming community. ...
2024 Resource List: Violent Extremism, Radicalization, and Gaming
March 25, 2025Gaming Community of Practice: The Gaming Community of Practice (GCoP) was formed to foster collaboration, knowledge sharing, and innovation among practitioners in the gaming industry alongside global experts. The group aimed to inform the development of best practices and guidance to prevent terrorists and violent extremists (TVE) from exploiting games, gaming-adjacent services, and the gaming community. ...
Prevent, Detect, and React: A Framework for Countering Violent Extremism on Gaming Surfaces
March 25, 2025Gaming Community of Practice: The Gaming Community of Practice (GCoP) was formed to foster collaboration, knowledge sharing, and innovation among practitioners in the gaming industry alongside global experts. The group aimed to inform the development of best practices and guidance to prevent terrorists and violent extremists (TVE) from exploiting games, gaming-adjacent services, and the gaming community. ...
GIFCT Incident Response Working Group Report: A Review of the Content Incident Protocol and Incident Response Framework
March 25, 2025Incident Response Working Group: GIFCT conducted a robust multistakeholder review of its Incident Response Framework (IRF) to better reflect the needs and feedback of key stakeholders and draw on lessons learned from prior activations. Widespread concerns about the potential rise in AI generated content around terrorist attacks, and the increasing prevalence of violence associated with accelerationist movements ...
Hash-Sharing Database Review: Challenges and Opportunities
March 25, 2025Hash Sharing Working Group: As technologies, content, and types of violent extremist and terrorist groups change, GIFCT continuously reviews its definitions and parameters to evolve in line with trends and member needs. This group reviewed GIFCT’s Hash-Sharing Database inclusion criteria and proposed enhancements to improve its transparency and accuracy. The National Consortium for the Study of Terrorism and ...
Understanding Online Platform Usage of Extremist Groups via Graph Analytics
March 4, 2025Graph analytics has become instrumental in uncovering insights across various domains, specifically in social networks. It serves as a crucial tool for analyzing the relationship between users in different online platforms. In this research, we apply methods of social network analysis to examine the communication patterns among participants in an online forum recognized for far-right ...
How social media users perceive different forms of online hate speech: A qualitative multi-method study
March 4, 2025Although many social media users have reported encountering hate speech, differences in the perception between different users remain unclear. Using a qualitative multi-method approach, we investigated how personal characteristics, the presentation form, and content-related characteristics influence social media users’ perceptions of hate speech, which we differentiated as first-level (i.e. recognizing hate speech) and second-level perceptions ...
Too civil to care? How online hate speech against different social groups affects bystander intervention
March 4, 2025A large share of online users has already witnessed online hate speech. Because targets tend to interpret such bystanders’ lack of reaction as agreement with the hate speech, bystander intervention in online hate speech is crucial as it can help alleviate negative consequences. Despite evidence regarding online bystander intervention, however, whether bystanders evaluate online hate ...