IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Mapping Successful Countering Violent Extremism Strategies for Implementation in Bangladesh

Mapping Successful Countering Violent Extremism Strategies for Implementation in Bangladesh
View Sample PDF
Author(s): Sajid Amit (University of Liberal Arts, Bangladesh), Abdulla-Al Kafy (University of Liberal Arts, Bangladesh)and Lumbini Barua (University of Liberal Arts, Bangladesh)
Copyright: 2022
Pages: 32
Source title: Fighting for Empowerment in an Age of Violence
Source Author(s)/Editor(s): Milica Boskovic (Faculty of Diplomacy and Security, University Union Nikola Tesla, Serbia), Gordana Misev (Ministry of Mining and Energy Republic of Serbia, Serbia)and Nenad Putnik (Faculty of Security Studies, University of Belgrade, Serbia)
DOI: 10.4018/978-1-6684-4964-6.ch004

Purchase

View Mapping Successful Countering Violent Extremism Strategies for Implementation in Bangladesh on the publisher's website for pricing and purchasing information.

Abstract

Bangladesh, already troubled by the malady of violent extremism (VE), has become particularly vulnerable to radicalization via the internet, with one of the world's largest adolescent populations adopting the internet and social media. Countering VE (CVE) practitioners frequently assert that extremists are increasingly relying on technological innovations to recruit naive youths to their cause, which they believe is a trend that is accelerating. This research examines existing programs throughout the world in the area of disruptive technologies that have had some impact in the areas of preventing and combating VE (P/CVE). Secondary research and expert interviews were used in conjunction with each other to develop the technique. The report outlines successful efforts in technology-based initiatives that have been implemented in Bangladesh as a result of the knowledge gathered in the process. After that, proposals for CVE deployment techniques have been suggested, which might possibly be adopted or coordinated by USAID and other funders and practitioners in the field of P/CVE.

Related Content

Alexander Velez, Rebeca Kerstin Alonso, María Carmen Martínez-Monteagudo. © 2024. 14 pages.
Salvador Baena Morales, Carlos Martínez-Mirambell, Mayra Urrea-Solano. © 2024. 13 pages.
Aida Sanahuja Ribés, Odet Moliner García, Auxiliadora Sales Ciges. © 2024. 16 pages.
Magle Sanchez Castellanos. © 2024. 15 pages.
Francisco Pradas-Esteban. © 2024. 15 pages.
Paula Berzal-Gracia, Agustín Reyes-Torres, Alexandre Bataller-Català. © 2024. 17 pages.
Paula González García. © 2024. 12 pages.
Body Bottom