Resources

Through an evidence based approach, Hedayah publishes a number of key documents that include reports, publications and good practices.

Interactive CVE Platforms

MASAR

MASAR is a smartphone, tablet, and desktop application that assists practitioners and policymakers in creating a ...

Annual International CVE Research Conference

Overview The Annual International Countering Violent Extremism (CVE) Conference convenes CVE researchers, ...

Counter Narrative Library

Hedayah’s Counter-Narrative Library is an existing database tool that provides practitioners and civil societies ...

Foreign Terrorist Fighters Programs Catalogue

The threat posed by “Foreign Terrorist Fighters” (FTF) – individuals who travel abroad to a State other than their ...

The Counter Extremism Hub

The European Union’s Strengthening Resilience to Violent Extremism (STRIVE) Global program at Hedayah, the ...

CVE Training Curriculum – The MENA Edition

Search for Common Ground, in collaboration with Hedayah, with the financial support of the European Union STRIVE ...

Reports and Publications

Psychological Resilience to Extremism and Violent Extremism

This report provides an overview of the expert roundtable on the topic of psychological resilience to violent ...

A Movement between Parliamentary Politics and the Pathway to Violence and Terrorism: Germany’s Radical Right Narratives and Counter-Narratives

This country report, written by Maximilian Kreter, is one of the outputs of the CARR-Hedayah Radical Right Counter ...

Exploring the development of a strategic communication on P/CVE in Albania

This report by the Center for the Study of Democracy and Governance (CSDG), Albania analyzes the latest trends with ...

Why We Went to Fight and Why We Returned: Radicalisation and Deradicalisation – Learning from Foreign Terrorist Fighters

This research paper by the Research Centre of Religious Studies is based on interviews with 38 foreign terrorist ...

Radical Right Narratives And Norwegian Counter-Narratives in the Decade Of Utøya and Bærum Solo-Actor Attacks

This country report, written by Dr. Mette Wiggen, is one of the outputs of the CARR-Hedayah Radical Right Counter ...

Good Practices

[2019] Looking Ahead: Recommendations for P/CVE Policy, Programs and Research

This brief provides an overview of the Sixth International CVE Research Conference 2019 and presents the resulting ...

The CVE Cycle

The CVE cycle explains the individual trajectory to prevent, contrast or disable that process.

Abu Dhabi Memorandum on Good Practices for Education & CVE

The non-binding good practices document focuses on the ways in which education can be used as a resource and a tool ...

Malta Principles for Reintegrating RFTFs

This document lists a set of 22 principles to represent global good practices in reintegration, developed by a ...

GCTF Abu Dhabi Plan of Action for Education and CVE

This non-binding action plan describes programming and policy draws on multilateral developments and existing body ...