CVE
21 Followers
Most cited papers in CVE
Preoccupation with the effort to fight extremist propaganda in an increasingly complex information environment has produced an overwhelming amount of literature from professors, practitioners, policymakers, and pundits. The problem of... more
Since the terror attacks of September 11, 2001, media sources have instilled a fear of Muslims in Western countries by portraying them as a homogenous, irrational group that can be triggered into extreme violence. Such narratives on... more
General anesthesia and regional anesthesia have both been shown to be suitable techniques for patients undergoing lower thoracic and lumbar spine surgery; however, GA is the most frequently used method. The purpose of this study was to... more
This article seeks to examine the impact of the global war on terror around two main issues: the (mis)use of the war on terror rhetoric by politicians and the impact this has on Islamically associated activism. Instead of encouraging... more
We present our experience with a usability evaluation of two prototype CVE applications being developed by the COVEN project. The applications are a teleconferenci ng system aimed at future business users of CVEs, and a holiday planning... more
The quality of studies drawing primary data from terrorists and violent extremist respondents varies substantially, with this body of literature exhibiting a variety of repeating methodological issues. For instance, researchers often... more
Despite the military efforts of the Kenyan, Ethiopian, and Somali Federal governments, the collaboration of the African Union Mission in Somalia (AMISOM) forces with US and coalition forces, and despite the enormous tactical and strategic... more
In this paper we will give a short overview of the areas where VRML —the Virtual Reality Modelling Lan- guage— has to be extended in order to support collaborative virtual environments on the Internet. We will present extensions which... more
Since the September 11 terrorist attacks in the United States, there has been greater interest in countering violent extremism. Due to the U.S.-led " War on Terror, " madrassas in Pakistan have received international attention for... more
American national security is a priority that crosses partisan lines. Americans of all races, ethnicities, and religions are equally concerned with ensuring our country is safe from violence – whether politically motivated terrorism,... more
SQL injections attacks have been rated as the most dangerous vulnerability of web-based systems over more than a decade by OWASP top ten. Though different static, runtime and hybrid approaches have been proposed to counter SQL injection... more
Our nation has a unique, long-cherished commitment to religious freedom. Indeed, the first wave of immigrants came seeking refuge from religious persecution in Europe. The free exercise of religion, regardless of one’s religious beliefs,... more
Messaging has been an important aspect of the public outreach of the violent extremist organisation commonly known as Boko Haram. While significant attention has been given to what Boko Haram has done in terms of violent attacks, less has... more
Syftet med min avhandling är att utifrån teoribildningen om sociala representationer söka förståelse för hurudana självrepresentationer unga muslimer som rest till Syrien under konflikten och återvänt har av sig själva samt hur de... more
Scholars have critiqued the incorporation of gender into counterterrorism and countering violent extremism programs, noting they have instrumentalized the Women Peace and Security (WPS) agenda toward state-centric goals and essentialized... more
One of the biggest challenges to conducting research on radicalization to violent extremism is how to further knowledge in the absence of easy access to radical individuals. This lack of access makes it particularly difficult to fulfill... more
In many cases of jihadist radicalisation, the direct environment perceived signs and/or knew about the plans of the individual to join a terrorist group (Gill et al., 2014, p. 429). Yet, it can be assumed that only a small number of these... more
Despite much talk about infiltration of ISIS into Latin America and participation from Latino Muslims, there is no concrete evidence yet. Latin America still represents the safest continent on the earth from ISIS threat. When we look at... more
This research provides a preliminary evidence base to understand the extent to which violent extremist narratives have a wider resonance with men in Victoria, Australia. It identifies key sites and points at which the construction of... more
For over two decades, preventing and countering violent extremism (P/CVE) has proven a daunting challenge for foreign assistance policy makers and implementers. The challenges are rooted in its rapid emergence, continuous and uneven... more
Violent extremism has become the global concern especially after the beginning of 21st Century. Therefore, understanding the various aspects of violent extremism particularly multifaceted communication strategies which will be fit to... more
Nowadays there are an increasing evolution of technological solutions providing the virtual collaboration among people geographically distributed to obtain some common goals. At the same time virtual collaborative environments are often... more
My paper entitled "The Complex Ecology of Islamic Narratives and Movements in Bosnia and Herzegovina"
in this excellent publication.
in this excellent publication.
The terrorist organization, Daesh, also known as the so-called ‘Islamic State/IS/ISIS/ISIL’, has launched an extremely sophisticated information campaign targeting a wide range of audiences around the world to gain support for its... more