Technical Approaches Output 1 – Gap Analysis and Recommendations
Report laying out different considerations and approaches to developing a strategic framework for GIFCT to develop a portfolio of technical resources in preventing terrorist use of content sharing platforms.
Key themes and recommendations from the full report which are critical to the success of any framework, and important for policymakers, tech companies, academia and civil society to understand as they work together to combat this threat.
Transparency Output 1 – One-Year Review of Discussions
Review presenting the primary questions and larger themes raised by the Transparency Working Group (TWG), reflecting on how greater transparency can build trust among tech companies, the public and other stakeholders.
Recommendations intended to help enhance the transparency of GIFCT and its activities; and key emerging trends and research priorities related to violent extremism, counterterrorism, and the role of the internet in these spaces.
Paper intended to capture the range of discussion topics covered by the Legal frameworks Working Groups (LFWG) in 2021, outline the primary issues identified, and highlight potential areas for further work and discussion.
Academic and Practical Research Output 1 – Research Needs
Paper assessing knowledge gaps and barriers that affect multiple stakeholders within the field of preventing and countering violent extremism (P/CVE) to begin moving towards holistic, coordinated solutions.
Academic and Practical Research Output 2 – Research Horizons
White paper mapping continually shifting dynamics in the field of P/CVE; identifying key emerging trends and research priorities related to violent extremism, counterterrorism, and the role of the internet in these spaces.
At the beginning of 2021, we launched an effort to engage a wide range of experts on how best GIFCT could expand the taxonomy that determines what content qualifies for our hash-sharing database beyond the United Nations Security Council’s consolidated sanctions list and live-stream footage from mass violent attacks that have activated our Content Incident Protocol.
This report is the first series of results of this effort, including the initial three ways we plan to expand our taxonomy, our findings on the feasibility and impact of expanding the hash-sharing database for our member companies, and recommendations on how to develop a common taxonomy for terrorist content from the academics, practitioners, and civil society leaders selected during our Request for Proposals announced in February 2021.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.