Introduction published In:
The Discourse of Terrorism
Edited by Encarnación Hidalgo-Tenorio and Juan L. Castro
[Pragmatics and Society 13:3] 2022
► pp. 353360
References (36)
References
Abbasi, Ahmed, and Hsinchun Chen. 2005. “Applying authorship analysis to extremist-group Web forum messages”. IEEE Intelligent Systems 20 (5): 67–75. DOI logoGoogle Scholar
Al-Dayel, Nadia, and Aaron Anfinson. 2018. “ In the words of the enemy: The Islamic State’s reflexive projection of statehood”. Critical Studies on Terrorism 11(1): 45–64. DOI logoGoogle Scholar
Ali, Mohammed Mahmood, Khaja Moizuddin Mohammed, and Lakshmi Rajamani. 2014. “Framework for surveillance of instant messages in instant messengers and social networking sites using data mining and ontology”. Proceedings of the 2014 IEEE Students’ Technology Symposium: 297–302. DOI logoGoogle Scholar
Al Rafie, Dina. 2012. “Whose hearts and minds? Narratives and counter-narratives of Salafi Jihadism”. Journal of Terrorism Research 3(2): 13–31. DOI logoGoogle Scholar
Argamon, Shlomo, Marin Šarić, and Sterlin Stuart Stein. 2003. “Style mining of electronic messages for multiple authorship discrimination: First results”. In Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ed. by Lise Getoor, Ted Senator, Pedro Domingos, and Christos Faloutsos, pp. 475–480. DOI logoGoogle Scholar
Benigni, Matthew C., Joseph Kenneth, and Kathleen M. Carley. 2017. “Online extremism and the communities that sustain it: Detecting the ISIS supporting community on Twitter”. PLoS ONE 12(12). DOI logoGoogle Scholar
Braddock, Kurt, and John Horgan. 2016. “Towards a guide for constructing and disseminating counter-narratives to reduce support for terrorism”. Studies in Conflict and Terrorism 39(5): 381–404. DOI logoGoogle Scholar
Brookes, Gavin, and Tony McEnery. 2020. “Correlation, collocation and cohesion: A corpus-based critical analysis of violent jihadist discourse”. Discourse & Society 31(4): 351–373. DOI logoGoogle Scholar
Brynielsson, Joel, Andreas Horndahl, Fredrik Johansson, Lisa Kaati, Christian Mårtenson, and Pontus Svenson. 2013. “Harvesting and analysis of weak signals for detecting lone wolf terrorists”. Security Informatics 2(11): 1–15. DOI logoGoogle Scholar
Cohen, Katie, Fredrik Johansson, Lisa Kaati, and Jonas Clausen Mork. 2014. “Detecting linguistic markers for radical violence in social media”. Terrorism and Political Violence 26(1): 246–256. DOI logoGoogle Scholar
Corney, Malcolm W. 2003. Analysing E-mail Text Authorship for Forensic Purposes. Queensland: Queensland University of Technology. Accessed 1 August 2018. [URL]
Eiselt, H. A., and Joyendu Bhadury. 2015. “The use of structures in communication networks to track membership in terrorist groups”. Journal of Terrorism Research 6(1): 1–18. DOI logoGoogle Scholar
Eroukhmanoff, Clara. 2015. “The remote securitisation of Islam in the US post-9/11: Euphemisation, metaphors and the ‘logic of expected consequences’ in counter-radicalisation discourse”. Critical Studies on Terrorism 8(2): 246–265. DOI logoGoogle Scholar
Fairclough, Norman, and Ruth Wodak. 1997. “Critical discourse analysis”. In Discourse as social interaction, ed. by Teun A. van Dijk, 258–284. London: Sage.Google Scholar
Forsythand, Eric N., and Craig H. Martell. 2007. “Lexical and discourse analysis of online chat dialog”. In ICSC 2007 International Conference on Semantic Computing, ed. by Patrick Kellenberger, 19–26. Irvine, Calif.: IEEE. DOI logoGoogle Scholar
Foy, Kelli. 2015. “Framing hostage negotiations: Analysing the discourse of the US government and the Islamic State”. Critical Studies on Terrorism 8(3): 516–531. DOI logoGoogle Scholar
Goldberg, Jeffrey. 2000. Inside Jihad; the education of a holy warrior. The New York Times. Accessed 25 January 2018. [URL]
Kumar, A. Sharath, and Sanjay Singh. 2013. “Detection of user cluster with suspicious activity in online Social Networking Sites”. 2nd International Conference on Advanced Computing, Networking and Security, pp. 220–225. DOI logoGoogle Scholar
Luke, Allan. 2002. “Beyond science and ideology critique: Developments in critical discourse analysis”. Annual Review of Applied Linguistics 221: 96–110. DOI logoGoogle Scholar
McCauley, Clark, and Sophia Moskalenko. 2014. “Toward a profile of lone wolf terrorists: What moves an individual from radical opinion to radical action”. Terrorism and Political Violence 26(1): 69–85. DOI logoGoogle Scholar
Miravitllas, Enric. 2015. “Hacia una tipología de contranarrativas frente al extremismo violento”. Accessed 15 February 2018. [URL]
Neumann, Peter R. 2013. “Options and strategies for countering online radicalization in the United States”. Studies in Conflict and Terrorism 36(6): 431–459. DOI logoGoogle Scholar
Prentice, Sheryl, Paul Rayson, and Paul J. Taylor. 2012. “The language of Islamic extremism: Towards an automated identification of beliefs, motivations and justifications”. International Journal of Corpus Linguistics 17(2): 259–286. DOI logoGoogle Scholar
Qureshi, Pir Abdul Rasool, Nasrullah Memon, and Uffe Kock Wiil. 2010. “EWaS: Novel approach for generating early warnings to prevent terrorist attacks”. In 2010 Second International Conference on Computer Engineering and Applications, ICCEA 2010, ed. by J. E. Guerrero, 410–414. Los Alamitos, Calif.: IEEE. DOI logoGoogle Scholar
Ramsay, Gilbert, and Sarah Victoria Marsden. 2013. “Radical distinctions: A comparative study of two jihadist speeches”. Critical Studies on Terrorism 6(3): 392–409. DOI logoGoogle Scholar
Rediker, Ezekiel. 2015. “The incitement of terrorism on the Internet: Legal standards, enforcement, and the role of the European Union”. Michigan Journal of International Law 36(2): 321–351.Google Scholar
Rogers, Marc. 2003. “The psychology of cyber-terrorism”. In Terrorists, Victims and Society: Psychological Perspectives on Terrorism and its Consequences, ed. by Andrew Silke, 77–92. Chichester: Wiley. DOI logoGoogle Scholar
Sageman, Marc. 2004. Understanding Terror Networks. Philadelphia: University of Pennsylvania Press. DOI logoGoogle Scholar
Scanlon, Jacob R., and Matthew S. Gerber. 2014. “Automatic detection of cyber-recruitment by violent extremists”. Security Informatics 3(5): 1–10. DOI logoGoogle Scholar
Spiller, Paola Yael. 2005. Psicología y Terrorismo: El Terrorismo Suicida. Estudio de Variables que Inciden en su Aparición y Desarrollo. Tesina. Universidad de Belgrano.Google Scholar
Torres Roselló, J. 2015. “El auge del yihadismo en occidente: Un producto de la modernidad”. Accessed 25 July 2017. [URL]
Torres Soriano, Manuel. 2009. “Terrorismo yihadista y nuevos usos de Internet: La distribución de propaganda”. Análisis del Real Instituto Elcano 1101: 1–9.Google Scholar
Vergani, Matteo, and Ana-Maria Bliuc. 2015. “The evolution of the ISIS’ language: A quantitative analysis of the language of the first year of Dabiq magazine”. Sicurezza, Terrorismo e Società 21: 7–20.Google Scholar
Wadhwa, Pooja, and M. P. S. Bhatia. 2013. “Tracking on-line radicalization using investigative data mining”. 2013 National Conference on Communications, NCC 2013. New Delhi: IEEE, pp. 674–678. DOI logoGoogle Scholar
Weimann, Gabriel, & Katharina Von Knop. 2008. “Applying the notion of noise to countering online terrorism”. Studies in Conflict & Terrorism 31(10): 883-902. DOI logoGoogle Scholar
Zolfaghar, Kiyana, Arash Barfar, and Shahriar Mohammadi. 2009. “A framework for online counter terrorism”. Proceedings – Internet Technology and Secured Transactions: 1–5. DOI logoGoogle Scholar