Introduction published In:
The Discourse of Terrorism
Edited by Encarnación Hidalgo-Tenorio and Juan L. Castro
[Pragmatics and Society 13:3] 2022
► pp. 353360
References
Abbasi, Ahmed, and Hsinchun Chen
2005 “Applying authorship analysis to extremist-group Web forum messages”. IEEE Intelligent Systems 20 (5): 67–75. DOI logoGoogle Scholar
Al-Dayel, Nadia, and Aaron Anfinson
2018 “ In the words of the enemy: The Islamic State’s reflexive projection of statehood”. Critical Studies on Terrorism 11(1): 45–64. DOI logoGoogle Scholar
Ali, Mohammed Mahmood, Khaja Moizuddin Mohammed, and Lakshmi Rajamani
2014 “Framework for surveillance of instant messages in instant messengers and social networking sites using data mining and ontology”. Proceedings of the 2014 IEEE Students’ Technology Symposium: 297–302. DOI logoGoogle Scholar
Al Rafie, Dina
2012 “Whose hearts and minds? Narratives and counter-narratives of Salafi Jihadism”. Journal of Terrorism Research 3(2): 13–31. DOI logoGoogle Scholar
Argamon, Shlomo, Marin Šarić, and Sterlin Stuart Stein
2003 “Style mining of electronic messages for multiple authorship discrimination: First results”. In Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ed. by Lise Getoor, Ted Senator, Pedro Domingos, and Christos Faloutsos, pp. 475–480. DOI logoGoogle Scholar
Benigni, Matthew C., Joseph Kenneth, and Kathleen M. Carley
2017 “Online extremism and the communities that sustain it: Detecting the ISIS supporting community on Twitter”. PLoS ONE 12(12). DOI logoGoogle Scholar
Braddock, Kurt, and John Horgan
2016 “Towards a guide for constructing and disseminating counter-narratives to reduce support for terrorism”. Studies in Conflict and Terrorism 39(5): 381–404. DOI logoGoogle Scholar
Brookes, Gavin, and Tony McEnery
2020 “Correlation, collocation and cohesion: A corpus-based critical analysis of violent jihadist discourse”. Discourse & Society 31(4): 351–373. DOI logoGoogle Scholar
Brynielsson, Joel, Andreas Horndahl, Fredrik Johansson, Lisa Kaati, Christian Mårtenson, and Pontus Svenson
2013 “Harvesting and analysis of weak signals for detecting lone wolf terrorists”. Security Informatics 2(11): 1–15. DOI logoGoogle Scholar
Cohen, Katie, Fredrik Johansson, Lisa Kaati, and Jonas Clausen Mork
2014 “Detecting linguistic markers for radical violence in social media”. Terrorism and Political Violence 26(1): 246–256. DOI logoGoogle Scholar
Corney, Malcolm W.
2003Analysing E-mail Text Authorship for Forensic Purposes. Queensland: Queensland University of Technology. Accessed 1 August 2018. [URL]
Eiselt, H. A., and Joyendu Bhadury
2015 “The use of structures in communication networks to track membership in terrorist groups”. Journal of Terrorism Research 6(1): 1–18. DOI logoGoogle Scholar
Eroukhmanoff, Clara
2015 “The remote securitisation of Islam in the US post-9/11: Euphemisation, metaphors and the ‘logic of expected consequences’ in counter-radicalisation discourse”. Critical Studies on Terrorism 8(2): 246–265. DOI logoGoogle Scholar
Fairclough, Norman, and Ruth Wodak
1997 “Critical discourse analysis”. In Discourse as social interaction, ed. by Teun A. van Dijk, 258–284. London: Sage.Google Scholar
Forsythand, Eric N., and Craig H. Martell
2007 “Lexical and discourse analysis of online chat dialog”. In ICSC 2007 International Conference on Semantic Computing, ed. by Patrick Kellenberger, 19–26. Irvine, Calif.: IEEE. DOI logoGoogle Scholar
Foy, Kelli
2015 “Framing hostage negotiations: Analysing the discourse of the US government and the Islamic State”. Critical Studies on Terrorism 8(3): 516–531. DOI logoGoogle Scholar
Goldberg, Jeffrey
2000Inside Jihad; the education of a holy warrior. The New York Times. Accessed 25 January 2018. [URL]
Kumar, A. Sharath, and Sanjay Singh
2013 “Detection of user cluster with suspicious activity in online Social Networking Sites”. 2nd International Conference on Advanced Computing, Networking and Security, pp. 220–225. DOI logoGoogle Scholar
Luke, Allan
2002 “Beyond science and ideology critique: Developments in critical discourse analysis”. Annual Review of Applied Linguistics 221: 96–110. DOI logoGoogle Scholar
McCauley, Clark, and Sophia Moskalenko
2014 “Toward a profile of lone wolf terrorists: What moves an individual from radical opinion to radical action”. Terrorism and Political Violence 26(1): 69–85. DOI logoGoogle Scholar
Miravitllas, Enric
2015 “Hacia una tipología de contranarrativas frente al extremismo violento”. Accessed 15 February 2018. [URL]
Neumann, Peter R.
2013 “Options and strategies for countering online radicalization in the United States”. Studies in Conflict and Terrorism 36(6): 431–459. DOI logoGoogle Scholar
Prentice, Sheryl, Paul Rayson, and Paul J. Taylor
2012 “The language of Islamic extremism: Towards an automated identification of beliefs, motivations and justifications”. International Journal of Corpus Linguistics 17(2): 259–286. DOI logoGoogle Scholar
Qureshi, Pir Abdul Rasool, Nasrullah Memon, and Uffe Kock Wiil
2010 “EWaS: Novel approach for generating early warnings to prevent terrorist attacks”. In 2010 Second International Conference on Computer Engineering and Applications, ICCEA 2010, ed. by J. E. Guerrero, 410–414. Los Alamitos, Calif.: IEEE. DOI logoGoogle Scholar
Ramsay, Gilbert, and Sarah Victoria Marsden
2013 “Radical distinctions: A comparative study of two jihadist speeches”. Critical Studies on Terrorism 6(3): 392–409. DOI logoGoogle Scholar
Rediker, Ezekiel
2015 “The incitement of terrorism on the Internet: Legal standards, enforcement, and the role of the European Union”. Michigan Journal of International Law 36(2): 321–351.Google Scholar
Rogers, Marc
2003 “The psychology of cyber-terrorism”. In Terrorists, Victims and Society: Psychological Perspectives on Terrorism and its Consequences, ed. by Andrew Silke, 77–92. Chichester: Wiley. DOI logoGoogle Scholar
Sageman, Marc
2004Understanding Terror Networks. Philadelphia: University of Pennsylvania Press. DOI logoGoogle Scholar
Scanlon, Jacob R., and Matthew S. Gerber
2014 “Automatic detection of cyber-recruitment by violent extremists”. Security Informatics 3(5): 1–10. DOI logoGoogle Scholar
Spiller, Paola Yael
2005Psicología y Terrorismo: El Terrorismo Suicida. Estudio de Variables que Inciden en su Aparición y Desarrollo. Tesina. Universidad de Belgrano.Google Scholar
Torres Roselló, J.
2015 “El auge del yihadismo en occidente: Un producto de la modernidad”. Accessed 25 July 2017. [URL]
Torres Soriano, Manuel
2009 “Terrorismo yihadista y nuevos usos de Internet: La distribución de propaganda”. Análisis del Real Instituto Elcano 1101: 1–9.Google Scholar
Vergani, Matteo, and Ana-Maria Bliuc
2015 “The evolution of the ISIS’ language: A quantitative analysis of the language of the first year of Dabiq magazine”. Sicurezza, Terrorismo e Società 21: 7–20.Google Scholar
Wadhwa, Pooja, and M. P. S. Bhatia
2013 “Tracking on-line radicalization using investigative data mining”. 2013 National Conference on Communications, NCC 2013. New Delhi: IEEE, pp. 674–678. DOI logoGoogle Scholar
Weimann, Gabriel, & Katharina Von Knop
2008 “Applying the notion of noise to countering online terrorism”. Studies in Conflict & Terrorism 31(10): 883-902. DOI logoGoogle Scholar
Zolfaghar, Kiyana, Arash Barfar, and Shahriar Mohammadi
2009 “A framework for online counter terrorism”. Proceedings – Internet Technology and Secured Transactions: 1–5. DOI logoGoogle Scholar