Resources

Through an evidence based approach, Hedayah publishes a number of key documents that include reports, publications and good practices.

Interactive CVE Applications

MASAR

A monitoring, measurement, and evaluation mobile and desktop app.

Counter Narrative Library

Hedayah’s Counter-Narrative Library is an existing tool that provides practitioners and civil societies working in ...

Foreign Terrorist Fighters Programs Catalogue

The threat posed by “Foreign Terrorist Fighters” (FTF) – individuals who travel abroad to a State other than their ...

The Counter Extremism Hub

The European Union’s Strengthening Resilience to Violent Extremism (STRIVE) Global program at Hedayah, the ...

CVE Training Curriculum – The MENA Edition

Search for Common Ground, in collaboration with Hedayah, with the financial support of the European Union STRIVE ...

CVE Training Curriculum – The Central Asian Edition

Search for Common Ground, in collaboration with Hedayah, with the financial support of the European Union STRIVE ...

Reports and Publications

Creating Positive Policing Narratives for CVE

This publication aims to provide international police services insight into how to draft and disseminate narratives ...

Classroom Activities: Preventing Violent Extremism through Education in East Africa

This toolkit is part of the global intervention on PVE-E being conducted by Hedayah and UNESCO. The aim of this ...

Providing Support to Children and Youth Vulnerable to or Affected by RLVE

This program and evaluation report summarizes the results of Hedayah’s capacity building program on “Providing ...

Community-Oriented Policing for CVE Capacity: Adopting the Ethos through Enhanced Training

This publication expands upon the links between a heavy-handed police force as a key driver of radicalization to ...

Projecting the Impact of a Program on PVE Through Education in Uganda

This updated report is an evaluation of the results, practices, challenges, and lessons learned of a Preventing ...

The CVE Cycle: An Individual Trajectory

This document introduces a basic Framework and provides practitioners and policy makers with suggestions on ...

Good Practices

The CVE Cycle

The CVE cycle explains the individual trajectory to prevent, contrast or disable that process.

Abu Dhabi Memorandum on Good Practices for Education & CVE

The non-binding good practices document focuses on the ways in which education can be used as a resource and a tool ...

Malta Principles for Reintegrating RFTFs

This document lists a set of 22 principles to represent global good practices in reintegration, developed by a ...

CVE Curriculum: An Introductory Guide to Concepts, Programming & Best Practices (Central Asia) [RU]

This document, adapted to Central Asia, introduces the complete CVE Training Curriculum, developed by Search Common ...

[Arabic] Malta Principles for Reintegrating RFTFs

This document lists a set of 22 principles to represent global good practices in reintegration, developed by a ...

GCTF Abu Dhabi Plan of Action for Education and CVE

This non-binding action plan describes programming and policy draws on multilateral developments and existing body ...