Skip to main content
Strengthening
Civil Society
Globally
Select your language
English
عربي
Portuguese
Français
Español
Swahili
Hausa
User account menu
About
Contact Us
Acknowledgements
Key Terms
Main navigation
Get Started
Explore the guide
Assess
Introduction
Assessment Process
Case study
Resources
Design
Introduction
Creating a theory of change
Cross-Cutting Factors
Selecting your activities
Case study
Resources
Implement
Introduction
Programming Areas
Implementing a Project
Stakeholder Engagement
Youth Involvement
Risk Management
Sustainability
Case Study
Resources
Monitor & Evaluate
Introduction
Logical Framework
Risks and Assumptions
Indicators
Means of Verification/Data Collection
Monitoring P/CVE Projects
Evaluation
Case Study
Resources
Learn
Introduction
Why are Learning and Adaptation Important?
Components
Lessons
Models
Methods and Tools
Case Study
Resources
Resource Library
Cross-Cutting Sections
Youth Involvement
Conflict Sensitivity
Gender Equality and Social Inclusion (GESI)
Stakeholder Engagement
Menu
Resource Library
Displaying 401 - 420 of 456
The Trouble With Counter-Narratives
Author(s):
Hemmingsen Ann-Sophie; Castro Karin
Tags:
Communications and Messaging, Report, English
Download
Trust-Based, Qualitative Field Methods: A Manual for Researchers of Violent Extremism
Author(s):
Sommers Marc
Tags:
Monitoring and Evaluation, Policy and Research, Guidebook or Toolkit, English
Download
View Online
Turning Away from MS-13 and Al-Shabaab: Analyzing Youth Resilience in Honduras and North East Kenya
Author(s):
Reisman Lainie; Payan Gustavo
Tags:
Monitoring and Evaluation, Youth Involvement, Report, Kenya, , Honduras, , East Africa, , Africa, English
Download
Twelve Principles of Counter-Extremism Programming
Author(s):
MSI
Tags:
P/CVE Strategies, Report, English
Download
Two Sides of the Same Coin? Examination of the Cognitive and Psychosocial Pathways Leading to EMPOWERMENT and RADICALIZATION, and a Model for Reorienting Violent Radicalization
Author(s):
Equal Access
Tags:
Psychosocial Support and Trauma Healing, Radicalization and Deradicalization, Rehabilitation and Reintegration, Report, English
Download
Undermining Violent Extremist Narratives in East Africa: A How to Guide
Author(s):
Zeiger Sara
Tags:
Communications and Messaging, Guidebook or Toolkit, Africa, English
Download
Undermining Violent Extremist Narratives in South East Asia: A How to Guide
Author(s):
Zeiger Sara
Tags:
Communications and Messaging, Guidebook or Toolkit, Southeast Asia, , Asia, English
Download
Undermining Violent Extremist Narratives In The Middle East and North Africa: A How-To Guide
Author(s):
ElSayed Lilah; Faris Talal; Zeiger Sarah
Tags:
Communications and Messaging, Guidebook or Toolkit, Middle East and North Africa, English
Download
Understanding Jihadists: In their Own Words
Author(s):
QUANTUM
Tags:
Report, English
Download
Understanding the Role of Gender in Preventing and Countering Violent Extremism and Radicalization that Lead to Terrorism
Author(s):
OSCE
Tags:
Gender and Social Inclusion, Engaging Women, Report, English
Download
UNDP Africa Toolkit
Author(s):
UNDP
Tags:
Communications and Messaging, Community Engagement, Webpage, , Mobile App, Africa, English
View Online
UNDP’s Risk Management for Preventing Violent Extremism (PVE) Programmes: Guidance Note for Practitioners
Author(s):
UNDP
Download
UNDP’s Risk Management for Preventing Violent Extremism (PVE) Programmes: Guidance Note for Practitioners
Author(s):
UNDP
Download
Une approche NMBL de la mobilisation des jeunes dans la prévention et la lutte contre l’extrémisme violent
Author(s):
Réseau de sensibilisation à la radicalisation (RAN)
Tags:
French
Download
United States Strategy to Prevent and Respond to Gender-based Violence Globally
Author(s):
DOS; USAID
Tags:
Gender and Social Inclusion, Report, English
Download
USAID OTI CVE Toolkit
Author(s):
USAID OTI
Tags:
P/CVE Strategies, Guidebook or Toolkit, English
Download
USAID's Positive Youth Development E-Courses
Author(s):
USAID
Tags:
Youth Involvement, Webpage, English
View Online
USAID How-To Note: Developing a Project Logic Model (and its Associated Theory of Change)
Author(s):
USAID
Tags:
Learn, Webpage, English
View Online
USAID - Policy for Countering Violent Extremism (CVE) through Development Assistance - April 10 2020
Author(s):
USAID
Tags:
Implement, P/CVE Strategies, P/CVE and Development, Policy, English
Download
USAID, Conducting an Extremism or Terrorism Assessment: An Analytic Framework for Strategy and Program Development (2008)
Author(s):
Guilain Denoeux with Lynn Carter
Tags:
Design,
View Online
Pagination
First page
« First
Previous page
‹‹
…
Page
15
Page
16
Page
17
Page
18
Page
19
Page
20
Current page
21
Page
22
Page
23
Next page
››
Last page
Last »
Geography
Africa
(19)
Honduras
(2)
North America
(1)
Panama
(1)
El Salvador
(1)
Asia
(12)
Europe
(13)
Middle East and North Africa
(11)
Languages
Arabic
(1)
Dutch
(1)
English
(381)
French
(65)
German
(1)
Portuguese
(2)
Russian
(2)
Spanish
(1)
Modules
Monitoring and Evaluation
(58)
Assess
(25)
Implement
(24)
Learn
(20)
Design
(13)
Resource or Media Type
Article or Blog
(4)
Guidebook or Toolkit
(76)
Mobile App
(2)
Policy
(11)
Publication
(4)
Report
(218)
Research study
(3)
Training Material
(19)
Webpage
(46)
Topics
Stakeholder Engagement
(58)
Youth Involvement
(58)
Gender and Social Inclusion
(50)
Communications and Messaging
(49)
Conflict Sensitivity
(41)
Policy and Research
(39)
Community Engagement
(38)
Radicalization and Deradicalization
(33)
P/CVE Strategies
(26)
Assessments
(19)
Rehabilitation and Reintegration
(19)
Education
(15)
Engaging Women
(13)
Adaptive Management
(12)
Engaging Family Members and Other Influencers
(12)
Do No Harm
(11)
P/CVE and Development
(11)
Engaging Religion and Religious Actors
(10)
Psychosocial Support and Trauma Healing
(10)
Social Media
(9)
Community Policing
(8)
Risk Management
(8)
Theory of Change
(8)
Governance
(7)
Conflict-Aware Monitoring
(3)
National Action Plans
(3)
Data Collection
(2)
Sustainability
(2)
Get Started
Explore the guide
Assess
Introduction
Assessment Process
Case study
Resources
Design
Introduction
Creating a theory of change
Cross-Cutting Factors
Selecting your activities
Case study
Resources
Implement
Introduction
Programming Areas
Implementing a Project
Stakeholder Engagement
Youth Involvement
Risk Management
Sustainability
Case Study
Resources
Monitor & Evaluate
Introduction
Logical Framework
Risks and Assumptions
Indicators
Means of Verification/Data Collection
Monitoring P/CVE Projects
Evaluation
Case Study
Resources
Learn
Introduction
Why are Learning and Adaptation Important?
Components
Lessons
Models
Methods and Tools
Case Study
Resources
Resource Library
Cross-Cutting Sections
Youth Involvement
Conflict Sensitivity
Gender Equality and Social Inclusion (GESI)
Stakeholder Engagement
About
Contact Us
Acknowledgements
Key Terms