Introduction
Transdisciplinary approaches to the discourse of Islamist extremism
Article outline
- By way of background
- The rationale behind this Special Issue
- The aims of this Special Issue in a nutshell
- Notes
-
References
This article is available free of charge.
References (36)
References
Abbasi, Ahmed, and Hsinchun Chen. 2005. “Applying
authorship analysis to extremist-group Web forum messages”. IEEE Intelligent
Systems 20 (5): 67–75.
Al-Dayel, Nadia, and Aaron Anfinson. 2018. “
In
the words of the enemy: The Islamic State’s reflexive projection of
statehood”. Critical Studies on
Terrorism 11(1): 45–64.
Ali, Mohammed Mahmood, Khaja Moizuddin Mohammed, and Lakshmi Rajamani. 2014. “Framework
for surveillance of instant messages in instant messengers and social networking sites using data mining and
ontology”. Proceedings of the 2014 IEEE Students’ Technology
Symposium: 297–302.
Al Rafie, Dina. 2012. “Whose
hearts and minds? Narratives and counter-narratives of Salafi Jihadism”. Journal of Terrorism
Research 3(2): 13–31.
Argamon, Shlomo, Marin Šarić, and Sterlin Stuart Stein. 2003. “Style
mining of electronic messages for multiple authorship discrimination: First
results”. In Proceedings of the Ninth ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining, ed. by Lise Getoor, Ted Senator, Pedro Domingos, and Christos Faloutsos, pp. 475–480.
Benigni, Matthew C., Joseph Kenneth, and Kathleen M. Carley. 2017. “Online
extremism and the communities that sustain it: Detecting the ISIS supporting community on
Twitter”. PLoS
ONE 12(12).
Braddock, Kurt, and John Horgan. 2016. “Towards
a guide for constructing and disseminating counter-narratives to reduce support for
terrorism”. Studies in Conflict and
Terrorism 39(5): 381–404.
Brookes, Gavin, and Tony McEnery. 2020. “Correlation,
collocation and cohesion: A corpus-based critical analysis of violent jihadist
discourse”. Discourse &
Society 31(4): 351–373.
Brynielsson, Joel, Andreas Horndahl, Fredrik Johansson, Lisa Kaati, Christian Mårtenson, and Pontus Svenson. 2013. “Harvesting
and analysis of weak signals for detecting lone wolf terrorists”. Security
Informatics 2(11): 1–15.
Cohen, Katie, Fredrik Johansson, Lisa Kaati, and Jonas Clausen Mork. 2014. “Detecting
linguistic markers for radical violence in social media”. Terrorism and Political
Violence 26(1): 246–256.
Corney, Malcolm W. 2003. Analysing E-mail Text Authorship for
Forensic Purposes. Queensland: Queensland University of Technology. Accessed 1 August
2018. [URL]
Eiselt, H. A., and Joyendu Bhadury. 2015. “The
use of structures in communication networks to track membership in terrorist groups”. Journal
of Terrorism
Research 6(1): 1–18.
Eroukhmanoff, Clara. 2015. “The
remote securitisation of Islam in the US post-9/11: Euphemisation, metaphors and the ‘logic of expected consequences’ in
counter-radicalisation discourse”. Critical Studies on
Terrorism 8(2): 246–265.
Fairclough, Norman, and Ruth Wodak. 1997. “Critical
discourse analysis”. In Discourse as social
interaction, ed. by Teun A. van Dijk, 258–284. London: Sage.
Forsythand, Eric N., and Craig H. Martell. 2007. “Lexical
and discourse analysis of online chat dialog”. In ICSC 2007
International Conference on Semantic Computing, ed. by Patrick Kellenberger, 19–26. Irvine, Calif.: IEEE.
Foy, Kelli. 2015. “Framing
hostage negotiations: Analysing the discourse of the US government and the Islamic
State”. Critical Studies on
Terrorism 8(3): 516–531.
Goldberg, Jeffrey. 2000. Inside
Jihad; the education of a holy warrior. The New York
Times. Accessed 25 January
2018. [URL]
Kumar, A. Sharath, and Sanjay Singh. 2013. “Detection
of user cluster with suspicious activity in online Social Networking Sites”. 2nd International
Conference on Advanced Computing, Networking and
Security, pp. 220–225.
Luke, Allan. 2002. “Beyond
science and ideology critique: Developments in critical discourse analysis”. Annual Review of
Applied Linguistics 221: 96–110.
McCauley, Clark, and Sophia Moskalenko. 2014. “Toward
a profile of lone wolf terrorists: What moves an individual from radical opinion to radical
action”. Terrorism and Political
Violence 26(1): 69–85.
Miravitllas, Enric. 2015. “Hacia
una tipología de contranarrativas frente al extremismo
violento”. Accessed 15 February
2018. [URL]
Neumann, Peter R. 2013. “Options and strategies for
countering online radicalization in the United States”. Studies in Conflict and
Terrorism 36(6): 431–459.
Qureshi, Pir Abdul Rasool, Nasrullah Memon, and Uffe Kock Wiil. 2010. “EWaS:
Novel approach for generating early warnings to prevent terrorist
attacks”. In 2010 Second International Conference on Computer
Engineering and Applications, ICCEA 2010, ed. by J. E. Guerrero, 410–414. Los Alamitos, Calif.: IEEE.
Ramsay, Gilbert, and Sarah Victoria Marsden. 2013. “Radical
distinctions: A comparative study of two jihadist speeches”. Critical Studies on
Terrorism 6(3): 392–409.
Rediker, Ezekiel. 2015. “The
incitement of terrorism on the Internet: Legal standards, enforcement, and the role of the European
Union”. Michigan Journal of International
Law 36(2): 321–351.
Rogers, Marc. 2003. “The
psychology of cyber-terrorism”. In Terrorists, Victims and Society:
Psychological Perspectives on Terrorism and its Consequences, ed. by Andrew Silke, 77–92. Chichester: Wiley.
Sageman, Marc. 2004. Understanding
Terror Networks. Philadelphia: University of Pennsylvania Press.
Scanlon, Jacob R., and Matthew S. Gerber. 2014. “Automatic
detection of cyber-recruitment by violent extremists”. Security
Informatics 3(5): 1–10.
Spiller, Paola Yael. 2005. Psicología y Terrorismo: El
Terrorismo Suicida. Estudio de Variables que Inciden en su Aparición y
Desarrollo. Tesina. Universidad de Belgrano.
Torres Roselló, J. 2015. “El
auge del yihadismo en occidente: Un producto de la
modernidad”. Accessed 25 July
2017. [URL]
Torres Soriano, Manuel. 2009. “Terrorismo
yihadista y nuevos usos de Internet: La distribución de propaganda”. Análisis del Real
Instituto
Elcano 1101: 1–9.
Vergani, Matteo, and Ana-Maria Bliuc. 2015. “The
evolution of the ISIS’ language: A quantitative analysis of the language of the first year of Dabiq
magazine”. Sicurezza, Terrorismo e
Società 21: 7–20.
Wadhwa, Pooja, and M. P. S. Bhatia. 2013. “Tracking
on-line radicalization using investigative data mining”. 2013 National Conference on
Communications, NCC 2013. New Delhi: IEEE, pp. 674–678.
Weimann, Gabriel, & Katharina Von Knop. 2008. “Applying the notion of noise to countering online terrorism”. Studies in Conflict & Terrorism 31(10): 883-902.
Zolfaghar, Kiyana, Arash Barfar, and Shahriar Mohammadi. 2009. “A
framework for online counter terrorism”. Proceedings – Internet Technology and Secured
Transactions: 1–5.