Article published In:
Journal of Language and Politics
Vol. 18:6 (2019) ► pp.893914
Abdelzaher, Esra
2019a “Lexicon-based Detection of Violence on Social Media.” Cognitive Semantics 5(1): 32–69. DOI logoGoogle Scholar
2019b “The Systematic Adaptation of Violence Contexts in the ISIS Discourse: A Contrastive Corpus Based Study.” 3(2): 173–203. DOI logoGoogle Scholar
Al-Rikaby, Ali Badeen Mohammed, and Tengku Sepora Tengku Mahadi
Arosoaie, Aida
2017 “In the name of honour and freedom: the sacred as a justifying tool for ISIS’and secular violence.” Culture and Religion 18(3): 278–295. DOI logoGoogle Scholar
Atkins, Sue, Michael Rundell, and Hiroaki Sato
2003 “The contribution of FrameNet to practical lexicography.” International Journal of Lexicography 16(3): 333–357. DOI logoGoogle Scholar
Baker, Paul, and Rachelle Vessey
2018 “A corpus-driven comparison of English and French Islamist extremist texts.” International Journal of Corpus Linguistics 23(3): 255–278. DOI logoGoogle Scholar
Clifton, Jonathan
2017 “Justifying the jihad.” Journal of Language and Politics 16(3): 453–470. DOI logoGoogle Scholar
Essam, Bacem A., Mostafa M. Aref, and Fayrouz Fouad
2019 “When folkloric geopolitical concerns prompt a conspiratorial ideation: the case of Egyptian tweeters.” Geo Journal 84(1): 121–133. DOI logoGoogle Scholar
Fillmore, Charles J.
1975 “An alternative to checklist theories of meaning.” In Annual Meeting of the Berkeley Linguistics Society, 11, pp. 123–131. DOI logoGoogle Scholar
2006 “Frame semantics.” Cognitive linguistics: Basic readings 341: 373–400. DOI logoGoogle Scholar
Fillmore, Charles J., and Collin Baker
2011 “A frames approach to semantic analysis.” In The Oxford handbook of linguistic analysis. pp. 313–340. Oxford: Oxford University Press. DOI logoGoogle Scholar
Fillmore, Charles J., Miriam RL Petruck, Josef Ruppenhofer, and Abby Wright
2003 “FrameNet in action: The case of attaching.” International journal of lexicography 16(3): 297–332. DOI logoGoogle Scholar
Gerges, Fawaz A.
2009The far enemy: why Jihad went global. Cambridge University Press. DOI logoGoogle Scholar
Heickerö, Roland
2014 “Cyber terrorism: Electronic jihad.” Strategic Analysis 38(4): 554–565. DOI logoGoogle Scholar
Lakhfif, Abdelaziz, and Mohamed Tayeb Laskri
2016 “A frame-based approach for capturing semantics from Arabic text for text-to-sign language MT.” International Journal of Speech Technology 19(2): 203–228. DOI logoGoogle Scholar
Maggio, James
2007 “The presidential rhetoric of terror: The recreation of reality immediately after 9/11.” Politics & Policy 35(4): 810–835. DOI logoGoogle Scholar
Novenario, Celine Marie I.
Differentiating Al Qaeda and the Islamic State through strategies publicized in Jihadist magazines.” Studies in Conflict & Terrorism 39(11) 2016: 953–967. DOI logoGoogle Scholar
Pennebaker, James W.
2011 “Using computer analyses to identify language style and aggressive intent: The secret life of function words.” Dynamics of Asymmetric Conflict 4(2): 92–102. DOI logoGoogle Scholar
Petruck, Miriam RL.
1996 “Frame semantics. Handbook of Pragmatics .” Amsterdam: Benjamins.Google Scholar
Pratt, Mary Louise
. “Harm’s way: Language and the contemporary arts of war.” PMLA 124(5) 2009: 1515–1531. DOI logoGoogle Scholar
Ruppenhofer, Josef, Michael Ellsworth, Myriam Schwarzer-Petruck, Christopher R. Johnson, and Jan Scheffczyk
2006 “ FrameNet II: Extended theory and practice .” Berkeley Online Library.Google Scholar
Schröter, Melani
Schubert, Christoph
Siegel, Alexandra A., and Joshua A. Tucker
. “The Islamic State’s information warfare.” Journal of Language and Politics 17(2) 2018: 258–280. DOI logoGoogle Scholar
Sikos, Jennifer, and Sebastian Padó
2018 “FrameNet’s using relation as a source of concept-based paraphrases.” Constructions and Frames 10(1): 38–60. DOI logoGoogle Scholar
Cited by

Cited by 1 other publications

Essam, Bacem A. & Muhammad S. Abdo
2021. How Do Arab Tweeters Perceive the COVID-19 Pandemic?. Journal of Psycholinguistic Research 50:3  pp. 507 ff. DOI logo

This list is based on CrossRef data as of 19 april 2022. Please note that it may not be complete. Sources presented here have been supplied by the respective publishers. Any errors therein should be reported to them.