This is a response to last week’s blog post One Database To Rule Them All: The Invisible Content Cartel that Undermines the Freedom of Expression Online. [Ed.] By Tech Against Terrorism Summary Tech Against Terrorism focusses on providing practical support to the tech sector in tackling terrorist use of the internet whilst respecting human rights.…
Tweets
“As ‘Europe’s data centre capital’, Ireland has a responsibility to ensure these data centres are not abused by the… https://t.co/bifTQvu3vK
- Tuesday Apr 20 - 1:22pm
Some followers may be interested in these paid summer internship opportunities with @GIFCT_official. Note: though r… https://t.co/j7dnPJqIB4
- Saturday Apr 17 - 9:31am
“...Ireland became a signatory to the #ChristchurchCall to ‘eliminate terrorist & violent extremist online content’… https://t.co/3shpOqeTFI
- Thursday Apr 15 - 8:14am
Latest Posts
How Ireland Can Stop the Rise of the Far-right
Want to submit a blog post? Click here. By Ross Frenett We all watched in horror as rioters inspired by fringe far-right conspiracy theories...
Read
Watch the VOX-Pol Webinar on ‘Terrorism Informatics’
In March 2021, VOX-Pol published four Blog posts on the topic of ‘Terrorism Informatics’. The series covers A Framework for Researchers, Identifying Extremist Networks, Analysing Extremist Content,...
Read
(Young) Women’s Usage of Social Media and Lessons for Preventing Violent Extremism
Want to submit a blog post? Click here. This Blog post summarises a conclusion paper from the EU’s Radicalisation Awareness Network. By Jordy Krasenberg...
Read
Meet BreadTube, the YouTube Activists Trying to Beat the Far-right at Their Own Game
Want to submit a blog post? Click here. By Alexander Mitchell Lee YouTube has gained a reputation for facilitating far-right radicalisation and spreading antisocial ideas. However,...
Read
‘Terrorism Informatics’ Part IV: Predicting Extremist Behaviour
This is the fourth and final in a series of four original Blog posts; the first is HERE the second is HERE the third is...
Read
‘Terrorism Informatics’ Part III: Analysing Extremist Content
This is the third in a series of four original Blog posts; the first is HERE and the second is HERE. By Matti...
Read
Library Latest

