List of figures
Figure 3.1
Screenshot of an opinion with quoted threat
43
Figure 4.1
Distribution of conditionality
63
Figure 4.2
Distribution of futurity
72
Figure 4.3
Classification scheme type of verb
83
Figure 4.4
Distribution of violent, ambiguous and non-violent verbs
85
Figure 4.5
Distribution of type of verb
89
Figure 4.6
Overview frequency of type of verb
89
Figure 4.7
Proportion of agent-patient relation
91
Figure 4.8
Proportion of agent-patient relation and type of verb
94
Figure 4.9
Proportion of agent-patient relation and futurity
95
Figure 4.10
Distribution of orientation of threat
98
Figure 4.11
Proportion of orientation of threat and type of verb
99
Figure 4.12
Proportion of 1PP and 2PP
102
Figure 4.13
Distribution of taboo language and type frequency of functions
107
Figure 4.14
Distribution of mention of weapons
111
Figure 4.15
Distribution of mention of weapons and conditionality, futurity, and type of verb
112
Figure 4.16
Distribution of features across personal and non-personal threats
116
Figure 4.17
Excerpt dissimilarity matrix
121
Figure 4.18
Dendrogram of formal features
123
Figure 5.1
Schematic illustration of pre- and post-event threats
134
Figure 5.2
Distribution of manipulative and retaliative threats
138
Figure 5.3
Distribution of manipulative and retaliative function across personal and non-personal threats
139
Figure 5.4
Distribution of conditionality across manipulative and retaliative threats
141
Figure 5.5
Distribution of futurity across manipulative and retaliative threats
142
Figure 5.6
Distribution of type of verb across manipulative and retaliative threats
145
Figure 5.7
Distribution of orientation of threat and agent-patient relation across manipulative and retaliative threats
147
Figure 5.8
Distribution of 1PP and 2PP across manipulative and retaliative threats
150
Figure 5.9
Distribution of taboo language across manipulative and retaliative threats
151
Figure 5.10
Distribution of types of taboo language across manipulative and retaliative threats
152
Figure 5.11
Distribution of mention of weapons across manipulative and retaliative threats
154
Figure 5.12
Single conditional inference tree model for the function of threats
164
Figure 5.13
Conditional permutation variable importance for random forest with all predictors
169
Figure 6.1
Bribery payoff matrix
187
Figure 6.2
Threatening payoff matrix
191