No results found...

2024 Resource List: Violent Extremism, Radicalization, and Gaming

GIFCT Incident Response Working Group Report: A Review of the Content Incident Protocol and Incident Response Framework

Hash-Sharing Database Review: Challenges and Opportunities

Prevent, Detect, and React: A Framework for Countering Violent Extremism on Gaming Surfaces

Threat Surfaces in Games: Challenges and Best Practices

2023 Annual & Transparency Report

Borderline Content Report

Considerations of the Impacts of Generative AI on Online Terrorism and Extremism

GIFCT Red Team Working Group: Executive Summary

Global Legislative Map

Handbook on Measuring and Evaluating Incident Response Online

Pathways to Meaningful Transparency

Playbook on Positive Intervention Strategies Online

Risks and Challenges in Online Communities for 3D-Printed Firearms Among Extremists and Terrorists

Social Media and its Impact on Terrorism and Violent Extremism in the Next 2-5 Years

The Impact of Legal Definitions of Terrorism - Definitional Framework Principles Project

What is Terrorism? From Strict Designations to Dynamic Behavioural Factors For Tech Platforms - Definitional Framework Principles Project

2022 Annual Report

2022 Transparency Report

2022 Working Group Aggregate Output

Active Strategic Communications: Measuring Impact and Audience Engagement

Crisis Response & Incident Protocols 2022 Tabletop Exercise Public Report

Crisis Response Protocols: Mapping & Gap Analysis

Good Practices, Tools, and Safety Measures for Researchers

Human Rights Lifecycle of a Terrorist Incident Online

Methodologies to Evaluate Content Sharing Algorithms & Processes

Privacy and Data Protection / Access

Recommendation Algorithms and Extremist Content: A Review of Empirical Evidence

The Contextuality of Lone Wolf Algorithms: An Examination of (Non)Violent Extremism in the Cyber-Physical Space

The Interoperability of Terrorism Definitions

Transparency Reporting: Good Practices and Lessons from Global Assessment Frameworks

2021 Annual Report

2021 Transparency Report

Broadening the GIFCT Hash-Sharing Database Taxonomy: An Assessment and Recommended Next Steps

Content-Sharing Algorithms, Processes, and Positive Interventions Working Group Part 1: Content-Sharing Algorithms & Processes

GIFCT Academic and Practical Research Working Group White Paper: Extremism Research Horizons

GIFCT Academic and Practical Research Working Group White Paper: Research Needs

GIFCT Content-Sharing Algorithms, Processes, and Positive Interventions Working Group Part 2: Positive Interventions

GIFCT Crisis Response Working Group Annual Output

GIFCT Legal Frameworks Working Group Annual Output

GIFCT Technical Approaches Working Group: Executive Summary

GIFCT Technical Approaches Working Group: Gap Analysis and Recommendations for Deploying Technical Solutions to Tackle the Terrorist Use of the Internet

GIFCT Transparency Working Group: One-Year Review of Discussions

Transparency Recommendations for GIFCT: Prepared by the GIFCT Transparency Working Group

2020 Transparency Report
