By Martin Innes, Helen Innes, and Diyana Dobreva Terrorist attacks are fundamentally designed to ‘terrorise, polarise and mobilise’ different segments of the public. That this is so was tragically underscored by the recent events in New Zealand, where the perpetrator very obviously and self-consciously prepared a messaging campaign to accompany his acts of violence. Recognising these…
Tweets
A reminder that the Researcher Resources section of our website contains, among others, sub-sections on Ethics, Re… https://t.co/opkbSmcCJF
- Monday Apr 12 - 9:12am
ICYMI, latest issue of @RANEurope’s Spotlight magazine on ‘Digital Challenges’ is out now & takes a look at transna… https://t.co/cSTecuu3wY
- Monday Apr 12 - 9:06am
RT @HandleJulia: Happy to see our #ranconclusions published on @VOX_Pol 's blog! #pcve
- Monday Apr 12 - 9:03am
Latest Posts
Watch the VOX-Pol Webinar on ‘Terrorism Informatics’
In March 2021, VOX-Pol published four Blog posts on the topic of ‘Terrorism Informatics’. The series covers A Framework for Researchers, Identifying Extremist Networks, Analysing Extremist Content,...
Read
(Young) Women’s Usage of Social Media and Lessons for Preventing Violent Extremism
Want to submit a blog post? Click here. This Blog post summarises a conclusion paper from the EU’s Radicalisation Awareness Network. By Jordy Krasenberg...
Read
Meet BreadTube, the YouTube Activists Trying to Beat the Far-right at Their Own Game
Want to submit a blog post? Click here. By Alexander Mitchell Lee YouTube has gained a reputation for facilitating far-right radicalisation and spreading antisocial ideas. However,...
Read
‘Terrorism Informatics’ Part IV: Predicting Extremist Behaviour
This is the fourth and final in a series of four original Blog posts; the first is HERE the second is HERE the third is...
Read
‘Terrorism Informatics’ Part III: Analysing Extremist Content
This is the third in a series of four original Blog posts; the first is HERE and the second is HERE. By Matti...
Read
‘Terrorism Informatics’ Part II: Identifying Extremist Networks
This is the second in a series of four original Blog posts; the first is HERE. By Matti Pohjonen The first blog post...
Read
Library Latest

