Skip to main content

Digital Library

Displaying 1 - 5 of 5 results

  • The Role of Civil Society in Preventing and Countering Violent Extremism and Radicalization that Lead to Terrorism: A Focus on South-Eastern Europe

    The OSCE Guidebook on “The Role of Civil Society in Preventing and Countering Violent Extremism and Radicalization that Lead to Terrorism: A focus on South-Eastern Europe” is the first in a series of resources produced by the Transnational Threat Department/ Action against Terrorism Unit. This volume provides practical guidance and helpful background for both policy makers and practitioners who are working to advance civil-society-led P/CVERLT initiatives in the South-Eastern European region.

  • A Whole-of-Society Approach to Preventing and Countering Violent Extremism and Radicalization That Lead to Terrorism - A Guidebook for Central Asia

    The guidebook on “A Whole-of-Society Approach to Preventing and Countering Violent Extremism and Radicalization That Lead to Terrorism - A Guidebook for Central Asia” is one in a series of technical guidebooks produced by the Transnational Threat Department/ Action against Terrorism Unit and focuses on the challenges in developing and implementing effective programmes to prevent and counter VERLT in Central Asia. This volume aims to support policy makers in the region in the development and implementation of effective and relevant P/CVERLT strategies while strengthening the co-operation among government sectors and civil society actors.

  • Victim-oriented approaches

    Material from a roundtable for police officials to discuss establishing effective mechanisms to enhance a victim-oriented approach to criminal investigations.

  • Lesson #8: Ethics

    Material for a 5-hour lesson, part of the Basic Training Program of Macedonian Police, developed by the Police Development Unit of the OSCE Spillover Monitor Mission to Skopje.

  • Convention on Cybercrime

    The Convention is the first international treaty on crimes committed via the Internet and other computer networks, dealing particularly with infringements of copyright, computer-related fraud, child pornography and violations of network security. It also contains a series of powers and procedures such as the search of computer networks and interception.