- Home/
- Glossary
As the name says, this is an alphabetical list of terms and abbreviations used on this website, and in general by the RCC, with concise and precise explanations. Among the CT and P-CVE experts, professionals and activists, meaning of terms used is usually quite well understood. However, the experience has shown that the actual use of even the most basic terms (such as “terrorism” or “violent extremism”, for example) may vary considerably among users, causing sometimes unnecessary and sterile debates, and even misunderstandings. In order to avoid such scenarios, we added the Glossary. On the other hand, the RCC does not aspire to give scientifically/scholarly or politically exact and final definitions of terms – it is here only to help make communication easier and more efficient.
- ACAB
- Acquis
- Acquis
- Acquisition of citizenship
- Action plan
- Active data
- Active data
- Active database
- Active database
- Activity
- Acts of terrorism
- Affected community
- Agroterrorism
- Al-Dawlah al-Islamiyah
- Aqida / manhaj
- Article 33
- Asylum
- Asylum
- Asylum applicant
- Asylum applicant
- Asylum application
- Asylum application
- Authorization
- Automated analysis file
- Automated border control
- Automated exchange of data
- Automated fingerprint identification system
- Automated identification system
- Automated processing of data
- Basic act
- Bid’a / tabdi
- Bilateral relations
- Biological weapons
- Biometric
- Biosafety
- Biosecurity
- Bioterrorism
- Bioterrorism-relevant agent
- Biotoxins
- Bomb
- Border
- Border checks
- Border control
- Border crossing
- Border crossing point
- Border surveillance
- Botnet
- Brain drain
- Brain waste
- Budapest Convention on Cybercrime
- Budapest process
- Caliphate
- Caliphate according to ISIS
- Catastrophic terrorism
- Certification
- Close Action [Cyber] Operation
- Cold zone
- Commander
- Community
- Community cohesion
- Community policing
- Community resilience
- Community security
- Computer data
- Computer Network
- Computer Network Attack
- Computer Network Attack
- Computer Network Defense
- Computer Security
- Computer System
- Computer System
- Conditions conducive to terrorism
- Contamination
- Counter terrorism
- Counter-narrative
- Counter-radicalisation 3
- Counter-radicalization
- Counter-radicalization 2
- Counter-terrorism
- Counter-Terrorism (CT)
- Countermeasures
- Crime
- Crisis
- Crisis management
- Critical Cyber Services
- Critical Cyberspace
- Critical Information Infrastructure
- Critical infrastructure
- Cryptography
- Cyber
- Cyber Attack 1
- Cyber Attack 2
- Cyber Attack 3
- Cyber Attack 4
- Cyber Awareness
- Cyber Conflict
- Cyber Counter-Attack
- Cyber Countermeasures
- Cyber Crime 1
- Cyber Crime 2
- Cyber Crime 3
- Cyber Defense
- Cyber Defensive Capability
- Cyber Defensive Countermeasure
- Cyber Ecosystem
- Cyber Emergency
- Cyber Entity
- Cyber Environment
- Cyber Espionage
- Cyber Event
- Cyber Exercise
- Cyber Forces
- Cyber Incident
- Cyber Intelligence
- Cyber Operation
- Cyber Operations
- Cyber Penetration
- Cyber Resilience
- Cyber Safety
- Cyber Security
- Cyber Terrorism 2
- Cyber Threat
- Cyber Vulnerability
- Cyber Weapon
- Cybercrime
- Cyberespionage
- Cybersecurity
- Cyberterrorism
- Cyberwarfare
- Ecoterrorists
- Effectiveness
- Effectiveness
- Efficiency
- Electronic Attack
- Electronic Communication Network
- Electronic evidence
- Electronic Information Infrastructure
- Encryption
- Entry
- Environmental terrorism
- Ethnic terrorism
- EU agency
- European Agency for the Management of Operational Cooperation at the External Borders of the Member States of the European Union (FRONTEX)
- European Agenda on Security
- European Border Surveillance System (EUROSUR)
- European Police Office (EUROPOL)
- European Programme for Critical Infrastructure Protection (EPCIP)
- European Union Agency for Law Enforcement Training (CEPOL)
- European Union Bomb Data System
- European Union Civil Protection Mechanism
- Eurostat
- Evaluation
- Explosion
- Explosive
- Explosive
- Explosive precursor
- Explosive trace detector
- Explosives detection systems
- External EU border
- Extremism
- Extremism 2
- ICT
- Identification
- Ideology
- IISG Support Group (IISG SG)
- IISG Board
- IISG Chair
- IISG Partners
- Imam
- Immigrant
- Immigration
- Immigration Liaison Officer (ILO)
- Impact
- Impact Evaluation
- Incident
- Information
- Information Security
- Information System
- Information War
- Insurgent
- Integrated Plan of Action (iPA)
- Integration
- Integrative Internal Security Governance (IISG)
- Internal EU border
- Internal Security Fund
- Internal Security Strategy
- International Convention for the Suppression of acts of Nuclear Terrorism
- International Information Terrorism
- International protection
- Internet Security
- Interventions
- Irregular immigration
- Irregular migrant
- Irregular migration
- ISIS/Da'esh (IS, ISIL); Caliphate
- Perimeter
- Person borne improvised explosive device
- Police (police service or police force)
- Police-public partnerships
- Preventing Violent Extremism (PVE)/Countering Violent Extremism (CVE)
- Prevention 2
- Program
- Project
- Public-private partnerships
- Pull Factors
- Pull Factors (list)
- Push Factors
- Push Factors (list)
- Racism
- Radicalisation
- Radicalisation 2
- Radicalisation 3
- Radicalisation Awareness Network (RAN)
- Radicalisation Awareness Network (RAN) Centre of Excellence
- Radicaliser
- Radicalising locations
- Radicalising materials
- Radicalism
- Radicalization 5
- Radicalization that leads to terrorism
- Radicalization to violence
- Rafidah
- RAN Working Groups
- Readmission agreement
- Recipients
- Refugee
- Religious Radicalization
- Researcher
- Resilience
- Resilience 2
- Resilient Communities
- Resolution 1540
- Response
- Return
- Return Programme
- Risk
- Risk and harm reduction
- Rumiyah; Dabiq
- Rumiyah; Dabiq
- Taghut
- Takfir
- Takfir 2
- Target Population
- Terrorism 1
- Terrorism 2
- Terrorism 3
- Terrorism 4
- Terrorism or violent extremism
- Terrorist Finance Tracking Programme (TFTP)
- Terrorist financing
- Terrorist offences
- Terrorist propaganda
- Terrorist radicalisation
- Terrorist Use of the Internet
- The “Prevent-Refer-Address” (P-R-A)
- The European Police Office (EUROPOL)
- The Swedish Initiative
- Theory Of Change
- Threat of Force [Cyber]
- Traffic data
- Transnational
- Travel document
- Tripoli conclusions