Social media and tech companies face the challenge of identifying and removing terrorist and extremist content from their platforms. This paper presents the findings of a series of interviews with Global Internet Forum to Counter Terrorism (GIFCT) partner companies and law enforcement Internet Referral Units (IRUs). It offers a unique view on current practices and challenges regarding content removal, focusing particularly on human-based and automated approaches and the integration of the two
As social media becomes an integral part of our daily lives, and groups seek to utilize this medium ...
There are growing calls for the imposition of regulatory measures that require social media companie...
This paper discusses how cyberspace has become a venue for terrorists groups for recruiting and prol...
Social media companies make extensive use of artificial intelligence in their efforts to remove and ...
This report stems from a research project on online terrorist magazines. The overarching objective o...
The importance of the rule of law to an effective counterterrorism strategy is widely accepted. Adhe...
U.K. Metropolitan Police Counter-Terrorism Internet Referral Unit (CTIRU) Case Officers (COs) are ta...
Webpages with terrorist and extremist content are key factors in the recruitment and radicalization ...
This chapter outlines a range of terrorists’ online activities. The chapter argues that the Internet...
Overview This paper is a review of how information and insight can be drawn from open social media ...
In the face of content takedown and account suspensions on the biggest social media platforms, terro...
Extremist exploitation of social media platforms is an important regulatory question for civil socie...
This is the introduction to issue 1 of volume 40 of Studies in Conflict & Terrorism, which was a spe...
This report contains findings from the Advanced Research Workshop supported by the NATO Science for ...
In a recent appearance before the U.S. Senate, Federal Bureau of Investigation Director Christopher ...
As social media becomes an integral part of our daily lives, and groups seek to utilize this medium ...
There are growing calls for the imposition of regulatory measures that require social media companie...
This paper discusses how cyberspace has become a venue for terrorists groups for recruiting and prol...
Social media companies make extensive use of artificial intelligence in their efforts to remove and ...
This report stems from a research project on online terrorist magazines. The overarching objective o...
The importance of the rule of law to an effective counterterrorism strategy is widely accepted. Adhe...
U.K. Metropolitan Police Counter-Terrorism Internet Referral Unit (CTIRU) Case Officers (COs) are ta...
Webpages with terrorist and extremist content are key factors in the recruitment and radicalization ...
This chapter outlines a range of terrorists’ online activities. The chapter argues that the Internet...
Overview This paper is a review of how information and insight can be drawn from open social media ...
In the face of content takedown and account suspensions on the biggest social media platforms, terro...
Extremist exploitation of social media platforms is an important regulatory question for civil socie...
This is the introduction to issue 1 of volume 40 of Studies in Conflict & Terrorism, which was a spe...
This report contains findings from the Advanced Research Workshop supported by the NATO Science for ...
In a recent appearance before the U.S. Senate, Federal Bureau of Investigation Director Christopher ...
As social media becomes an integral part of our daily lives, and groups seek to utilize this medium ...
There are growing calls for the imposition of regulatory measures that require social media companie...
This paper discusses how cyberspace has become a venue for terrorists groups for recruiting and prol...