Introduction
Transdisciplinary approaches to the discourse of Islamist extremism
Article outline
- By way of background
- The rationale behind this Special Issue
- The aims of this Special Issue in a nutshell
- Notes
-
References
References
Abbasi, Ahmed, and Hsinchun Chen
2005 “
Applying
authorship analysis to extremist-group Web forum messages”.
IEEE Intelligent
Systems 20 (5): 67–75.


Al-Dayel, Nadia, and Aaron Anfinson
2018 “
In
the words of the enemy: The Islamic State’s reflexive projection of
statehood”.
Critical Studies on
Terrorism 11(1): 45–64.


Ali, Mohammed Mahmood, Khaja Moizuddin Mohammed, and Lakshmi Rajamani
2014 “
Framework
for surveillance of instant messages in instant messengers and social networking sites using data mining and
ontology”.
Proceedings of the 2014 IEEE Students’ Technology
Symposium: 297–302.


Al Rafie, Dina
2012 “
Whose
hearts and minds? Narratives and counter-narratives of Salafi Jihadism”.
Journal of Terrorism
Research 3(2): 13–31.


Argamon, Shlomo, Marin Šarić, and Sterlin Stuart Stein
2003 “
Style
mining of electronic messages for multiple authorship discrimination: First
results”. In
Proceedings of the Ninth ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining, ed. by
Lise Getoor,
Ted Senator,
Pedro Domingos, and
Christos Faloutsos, pp. 475–480.


Benigni, Matthew C., Joseph Kenneth, and Kathleen M. Carley
2017 “
Online
extremism and the communities that sustain it: Detecting the ISIS supporting community on
Twitter”.
PLoS
ONE 12(12).


Braddock, Kurt, and John Horgan
2016 “
Towards
a guide for constructing and disseminating counter-narratives to reduce support for
terrorism”.
Studies in Conflict and
Terrorism 39(5): 381–404.


Brookes, Gavin, and Tony McEnery
2020 “
Correlation,
collocation and cohesion: A corpus-based critical analysis of violent jihadist
discourse”.
Discourse &
Society 31(4): 351–373.


Brynielsson, Joel, Andreas Horndahl, Fredrik Johansson, Lisa Kaati, Christian Mårtenson, and Pontus Svenson
2013 “
Harvesting
and analysis of weak signals for detecting lone wolf terrorists”.
Security
Informatics 2(11): 1–15.


Cohen, Katie, Fredrik Johansson, Lisa Kaati, and Jonas Clausen Mork
2014 “
Detecting
linguistic markers for radical violence in social media”.
Terrorism and Political
Violence 26(1): 246–256.


Corney, Malcolm W.
2003 Analysing E-mail Text Authorship for
Forensic Purposes. Queensland: Queensland University of Technology. Accessed 1 August
2018.
[URL]
Eiselt, H. A., and Joyendu Bhadury
2015 “
The
use of structures in communication networks to track membership in terrorist groups”.
Journal
of Terrorism
Research 6(1): 1–18.


Eroukhmanoff, Clara
2015 “
The
remote securitisation of Islam in the US post-9/11: Euphemisation, metaphors and the ‘logic of expected consequences’ in
counter-radicalisation discourse”.
Critical Studies on
Terrorism 8(2): 246–265.


Fairclough, Norman, and Ruth Wodak
1997 “
Critical
discourse analysis”. In
Discourse as social
interaction, ed. by
Teun A. van Dijk, 258–284. London: Sage.

Forsythand, Eric N., and Craig H. Martell
2007 “
Lexical
and discourse analysis of online chat dialog”. In
ICSC 2007
International Conference on Semantic Computing, ed. by
Patrick Kellenberger, 19–26. Irvine, Calif.: IEEE.


Foy, Kelli
2015 “
Framing
hostage negotiations: Analysing the discourse of the US government and the Islamic
State”.
Critical Studies on
Terrorism 8(3): 516–531.


Goldberg, Jeffrey
2000 Inside
Jihad; the education of a holy warrior.
The New York
Times. Accessed 25 January
2018.
[URL]
Kumar, A. Sharath, and Sanjay Singh
2013 “
Detection
of user cluster with suspicious activity in online Social Networking Sites”.
2nd International
Conference on Advanced Computing, Networking and
Security, pp. 220–225.


Luke, Allan
2002 “
Beyond
science and ideology critique: Developments in critical discourse analysis”.
Annual Review of
Applied Linguistics 221: 96–110.


McCauley, Clark, and Sophia Moskalenko
2014 “
Toward
a profile of lone wolf terrorists: What moves an individual from radical opinion to radical
action”.
Terrorism and Political
Violence 26(1): 69–85.


Miravitllas, Enric
2015 “
Hacia
una tipología de contranarrativas frente al extremismo
violento”. Accessed 15 February
2018.
[URL]
Neumann, Peter R.
2013 “
Options and strategies for
countering online radicalization in the United States”.
Studies in Conflict and
Terrorism 36(6): 431–459.


Prentice, Sheryl, Paul Rayson, and Paul J. Taylor
Qureshi, Pir Abdul Rasool, Nasrullah Memon, and Uffe Kock Wiil
2010 “
EWaS:
Novel approach for generating early warnings to prevent terrorist
attacks”. In
2010 Second International Conference on Computer
Engineering and Applications, ICCEA 2010, ed. by
J. E. Guerrero, 410–414. Los Alamitos, Calif.: IEEE.


Ramsay, Gilbert, and Sarah Victoria Marsden
2013 “
Radical
distinctions: A comparative study of two jihadist speeches”.
Critical Studies on
Terrorism 6(3): 392–409.


Rediker, Ezekiel
2015 “
The
incitement of terrorism on the Internet: Legal standards, enforcement, and the role of the European
Union”.
Michigan Journal of International
Law 36(2): 321–351.

Rogers, Marc
2003 “
The
psychology of cyber-terrorism”. In
Terrorists, Victims and Society:
Psychological Perspectives on Terrorism and its Consequences, ed. by
Andrew Silke, 77–92. Chichester: Wiley.


Sageman, Marc
2004 Understanding
Terror Networks. Philadelphia: University of Pennsylvania Press.


Scanlon, Jacob R., and Matthew S. Gerber
2014 “
Automatic
detection of cyber-recruitment by violent extremists”.
Security
Informatics 3(5): 1–10.


Spiller, Paola Yael
2005 Psicología y Terrorismo: El
Terrorismo Suicida. Estudio de Variables que Inciden en su Aparición y
Desarrollo. Tesina. Universidad de Belgrano.

Torres Roselló, J.
2015 “
El
auge del yihadismo en occidente: Un producto de la
modernidad”. Accessed 25 July
2017.
[URL]
Torres Soriano, Manuel
2009 “
Terrorismo
yihadista y nuevos usos de Internet: La distribución de propaganda”.
Análisis del Real
Instituto
Elcano 1101: 1–9.

Vergani, Matteo, and Ana-Maria Bliuc
2015 “
The
evolution of the ISIS’ language: A quantitative analysis of the language of the first year of Dabiq
magazine”.
Sicurezza, Terrorismo e
Società 21: 7–20.

Wadhwa, Pooja, and M. P. S. Bhatia
2013 “
Tracking
on-line radicalization using investigative data mining”.
2013 National Conference on
Communications, NCC 2013. New Delhi: IEEE, pp. 674–678.


Weimann, Gabriel, & Katharina Von Knop
2008 “
Applying the notion of noise to countering online terrorism”.
Studies in Conflict & Terrorism 31(10): 883-902.


Zolfaghar, Kiyana, Arash Barfar, and Shahriar Mohammadi
2009 “
A
framework for online counter terrorism”.
Proceedings – Internet Technology and Secured
Transactions: 1–5.

