List of figures
Figure 3.1Screenshot of an opinion with quoted threat
43
Figure 4.1Distribution of conditionality
63
Figure 4.2Distribution of futurity
72
Figure 4.3Classification scheme type of verb
83
Figure 4.4Distribution of violent, ambiguous and non-violent verbs
85
Figure 4.5Distribution of type of verb
89
Figure 4.6Overview frequency of type of verb
89
Figure 4.7Proportion of agent-patient relation
91
Figure 4.8Proportion of agent-patient relation and type of verb
94
Figure 4.9Proportion of agent-patient relation and futurity
95
Figure 4.10Distribution of orientation of threat
98
Figure 4.11Proportion of orientation of threat and type of verb
99
Figure 4.12Proportion of 1PP and 2PP
102
Figure 4.13Distribution of taboo language and type frequency of functions
107
Figure 4.14Distribution of mention of weapons
111
Figure 4.15Distribution of mention of weapons and conditionality, futurity, and type of verb
112
Figure 4.16Distribution of features across personal and non-personal threats
116
Figure 4.17Excerpt dissimilarity matrix
121
Figure 4.18Dendrogram of formal features
123
Figure 5.1Schematic illustration of pre- and post-event threats
134
Figure 5.2Distribution of manipulative and retaliative threats
138
Figure 5.3Distribution of manipulative and retaliative function across personal and non-personal threats
139
Figure 5.4Distribution of conditionality across manipulative and retaliative threats
141
Figure 5.5Distribution of futurity across manipulative and retaliative threats
142
Figure 5.6Distribution of type of verb across manipulative and retaliative threats
145
Figure 5.7Distribution of orientation of threat and agent-patient relation across manipulative and retaliative threats
147
Figure 5.8Distribution of 1PP and 2PP across manipulative and retaliative threats
150
Figure 5.9Distribution of taboo language across manipulative and retaliative threats
151
Figure 5.10Distribution of types of taboo language across manipulative and retaliative threats
152
Figure 5.11Distribution of mention of weapons across manipulative and retaliative threats
154
Figure 5.12Single conditional inference tree model for the function of threats
164
Figure 5.13Conditional permutation variable importance for random forest with all predictors
169
Figure 6.1Bribery payoff matrix
187
Figure 6.2Threatening payoff matrix
191