References (76)
References
Almela, Ángela, Gema Alcaraz-Mármol, Arancha García-Pinar, and Clara Pallejá. 2019. “Developing and Analyzing a Spanish Corpus for Forensic Purposes.” Linguistic Evidence in Security, Law and Intelligence 31: 1–13. Google Scholar logo with link to Google Scholar
Argomaniz, Javier. 2015. “European Union Responses to Terrorist Use of the Internet.” Cooperation and Conflict 50(2): 250–268. [URL]
Baider, Fabienne, and Maria Constantinou. 2014. “How to Make People Feel Good when Wishing Hell: Golden Dawn and National Front Discourse, Emotions and Argumentation.” In Yearbook of Corpus Linguistics and Pragmatics, edited by Jesus Romero-Trillo, 179–210. Cham: Springer.Google Scholar logo with link to Google Scholar
Baker, Paul, and Rachelle Vessey. 2018. “A Corpus-driven Comparison of English and French Islamist Extremist Texts.” International Journal of Corpus Linguistics 23(3): 255–278. Google Scholar logo with link to Google Scholar
Baker-Beall, Christopher, and Gareth Mott. 2022. “Understanding the European Union’s Perception of the Threat of Cyberterrorism: A Discursive Analysis.” JCMS: Journal of Common Market Studies 60(4): 1086–1105. Google Scholar logo with link to Google Scholar
Bandura, Albert. 2016. Moral Disengagement: How People Do Harm and Live with Themselves. New York: Worth Publishers.Google Scholar logo with link to Google Scholar
Borum, Randy. 2003. “Understanding the Terrorist Mindset.” FBI Law Enforcement Bulletin, July: 72, 7. Retrieved June 29, 2022 from [URL]
Boyd, Ryan, and Andrew H. Schwartz. 2021. “Natural Language Analysis and the Psychology of Verbal Behavior: The Past, Present, and Future States of the Field.” Journal of Language and Social Psychology 40(1): 21–41. Google Scholar logo with link to Google Scholar
Breeze, Ruth. 2020. “Angry Tweets: A Corpus-Assisted Study of Anger in Populist Political Discourse.” Journal of Language Aggression and Conflict 8(1): 118–145. Google Scholar logo with link to Google Scholar
Buhrmester, Michael, Martha Newson, Alexandra Vázquez, Wallisen Hattori, and Harvey Whitehouse. 2018. “Winning at any Cost: Identity Fusion, Group Essence, and Maximizing Ingroup Advantage.” Self and Identity 17(5): 500–516. Google Scholar logo with link to Google Scholar
Carley, Kathleen. 2020. “Social Cybersecurity: An Emerging Science.” Computational and Mathematical Organization Theory 26(4): 365–381. Retrieved June 29, 2023 from [URL].
Chaski, Carole. 2001. “Empirical Evaluations of Language-based Authorship Identification Techniques.” International Journal of Speech, Language and the Law 8(1): 1–65. Google Scholar logo with link to Google Scholar
. 2006. “The Computational-Linguistic Approach to Forensic Authorship Attribution.” Retrieved June 29, 2023 from [URL]
Curry, Niall, Paul Baker, and Gavin Brookes. 2024. “Generative AI for Corpus Approaches to Discourse Studies: A Critical Evaluation of ChatGPT.” Applied Corpus Linguistics 4(1): 1–9. Google Scholar logo with link to Google Scholar
Dean, Geoff. 2007. “Criminal Profiling in a Terrorism Context.” In Criminal Profiling: International Theory, Research, and Practice, edited by Richard N. Kocsis, 169–188. Totowa, New Jersey: Humana Press. Google Scholar logo with link to Google Scholar
Dennis, Michael. 2023. “Cybercrime.” Retrieved September 7, 2023 from [URL]
Ebner, Julia. 2018. The Rage: The Vicious Circle of Islamist and Far-Right Extremism. London: I.B. Tauris.Google Scholar logo with link to Google Scholar
Etaywe, Awni. 2022a. “Exploring the Grammar of Othering and Antagonism as Enacted in Terrorist Discourse: Verbal Aggression in Service of Radicalisation.” Humanities Social Science Communication 9(177): 1–12. Google Scholar logo with link to Google Scholar
. 2022b. “Language as Evidence: A Discourse Semantic and Corpus Linguistic Approach to Examining Written Terrorist Threatening Communication.” Doctoral Thesis, UNSW Sydney.
. 2023a. “Language as Evidence: A Discourse Semantic and Corpus Linguistic Approach to Examining Written Terrorist Threatening Communication.” The International Journal of Speech, Language and the Law 29(2): 230–238. Google Scholar logo with link to Google Scholar
. 2023b. “Heteroglossia and Identifying Victims of Violence and its Purpose as Constructed in Terrorist Threatening Discourse Online.” International Journal for the Semiotics of Law 36(2): 907–937. [URL].
. 2023c. “The Role of (De)Bonding in the Legitimation of Violence in Extremists’ Public Threatening Communication.” In Systemic Functional Linguistics Theory and Application in Global Contexts, edited by Vinh To, Thomas Amundrud, and Sally Humphrey, 12–24). University of Tasmania.Google Scholar logo with link to Google Scholar
. 2024a. “Discursive Pragmatics of Justification in Terrorist Threat Texts: Victim-Blaming, Denying, Discrediting, Legitimating, Manipulating, and Retaliation.” Discourse & Society 35(6): 1–31. Google Scholar logo with link to Google Scholar
. 2024b. “Moral Disaffiliation in Cyber Incitement to Hatred and Violence: A Discourse Semantic Approach.” In the Routledge International Handbook of Online Deviance, edited by Roderick Graham, Stephan Humer, Claire Lee, and Veronika Nagy, 419–441. London & New York: Routledge. Google Scholar logo with link to Google Scholar
Etaywe, Awni, and Michele Zappavigna. 2021. “Identity, Ideology, and Threatening Communication: An Investigation of Patterns of Attitude in Terrorist Discourse.” Journal of Language Aggression and Conflict 10(2): 315–350. Google Scholar logo with link to Google Scholar
. 2023. “The Role of Social Affiliation in Incitement: A Social Semiotic Approach to Far-Right Terrorists’ Incitement to Violence.” Language in Society 1–26. Google Scholar logo with link to Google Scholar
Europol. 2023. “ChatGPT: The Impact of Large Language Models on Law Enforcement.” Retrieved October 20, 2023 from [URL]
Fernández-Cabana, Mercedes, Julio Jiménez-Féliz, María Alves-Pérez, Raimundo Mateos, Ignacio Gómez-Reino Rodríguez, and Alejandro García-Caballero. 2015. “Linguistic Analysis of Suicide Notes in Spain.” The European Journal of Psychiatry 29(2): 145–155. Google Scholar logo with link to Google Scholar
Gales, Tammy. 2010. “Ideologies of Violence: A Corpus and Discourse Analytic Approach to Stance in Threatening Communications.” Doctoral Thesis, University of California, Davis.
Garten, Justin, Brendan Kennedy, Joe Hoover, Kenji Sagae, and Morteza Dehghani. 2019. “Incorporating Demographic Embeddings into Language Understanding.” Cognitive Science 43(1): e12701. Google Scholar logo with link to Google Scholar
Gilardi, Fabrizio, Meysam Alizadeh, and Mael Kubli. 2023. “ChatGPT Outperforms Crowd-Workers for Text-Annotation Tasks.” Proceedings of the National Academy of Sciences 120(30): e2305016120. Google Scholar logo with link to Google Scholar
Global Terrorism Index. 2020. Global Terrorism Index: Measuring the Impact of Terrorism. Institute for Economics and Peace. Retrieved June 29, 2023 from [URL]
Grant, Tim. 2008. “Approaching Questions in Forensic Authorship Analysis.” In Dimensions of Forensic Linguistics, edited by John Gibbons, and Teresa Turell, 215–229. Amsterdam: John Benjamins. Google Scholar logo with link to Google Scholar
Holt-Nguyen, Courtlin. 2022. “Sentiment Analysis Showdown: ChatGPT vs. Traditional ML NLP Methods. Artificial Corner.” Retrieved October 7, 2023 from [URL]
Johnson, Kent. 2008. “An Overview of Lexical Semantics.” Philosophy Compass 3(1): 119–134. Google Scholar logo with link to Google Scholar
Jurafsky, Dan, and James Martin. 2008. Speech and Language Processing: An Introduction to Speech Recognition, Computational Linguistics and Natural Language Processing. Upper Saddle River, NJ: Prentice Hall.Google Scholar logo with link to Google Scholar
Koppel, Moshe, Jonathan Schler, and Shlomo Argamon. 2009. “Computational Methods in Authorship Attribution.” Journal of the American Society for Information Science and Technology 60(1): 9–26. Google Scholar logo with link to Google Scholar
Kupper, Julia, and Reid Meloy. 2021. “TRAP-18 Indicators Validated through the Forensic Linguistic Analysis of Targeted Violence Manifestos.” Journal of Threat Assessment and Management 8(4): 174–199. Google Scholar logo with link to Google Scholar
Leese, Matthias. 2014. “The New Profiling: Algorithms, Black Boxes, and the Failure of Anti-Discriminatory Safeguards in the European Union.” Security Dialogue 45(5): 494–511. Google Scholar logo with link to Google Scholar
Lutz, James, and Brenda Lutz. 2008. Global Terrorism. London and New York: Routledge.Google Scholar logo with link to Google Scholar
Meloy, Reid, and Paul Gill. 2016. “The Lone-Actor Terrorist and the TRAP-18.” Journal of Threat Assessment and Management 3(1): 37–52. Google Scholar logo with link to Google Scholar
Meloy, Reid J., and Jens Hoffmann. 2014. International Handbook of Threat Assessment. Oxford: Oxford University Press.Google Scholar logo with link to Google Scholar
Manning, Christopher, and Hinrich Schutze. 1999. Foundation of Statistical Natural Language Processing. Cambridge: MIT Press.Google Scholar logo with link to Google Scholar
Muschalik, Julia. 2018. Threatening in English: A Mixed Method Approach. Amsterdam/Philadelphia: John Benjamins. Google Scholar logo with link to Google Scholar
O’Keeffe, Anne, Brian Clancy, and Svenja Adolphs. 2011. Introducing Pragmatics in Use. London: Routledge. Google Scholar logo with link to Google Scholar
Pape, Robert. 2005. Dying to Win: The Strategic Logic of Suicide Terrorism. New York: Random House.Google Scholar logo with link to Google Scholar
Pennebaker, James, and Cindy Chung. 2007. “Computerized Text Analysis of al-Qaeda Transcripts.” In A Content Analysis Reader, edited by Klaus Krippendorff, and Mary Angela Bock, 1–16. Thousand Oaks, CA: Sage. Retrieved June 29, 2023 from [URL]
Pennebaker, James, Roger Booth, and Martha Francis. 2007. “Linguistic Inquiry and Word Count: LIWC [Computer software].” Austin, TX: LIWC.net.Google Scholar logo with link to Google Scholar
Pennebaker, James, Roger Booth, Ryan Boyd, and Martha Francis. 2015. Linguistic Inquiry and Word Count: LIWC2015. Austin: Pennebaker Conglomerates ([URL]).
Rubenstein, Richard. 2003. “The Psycho-Political Sources of Terrorism.” In The New Global Terrorism, edited by Charles Kegley, 139–149. Upper Saddle River, New Jersey: Pearson Education.Google Scholar logo with link to Google Scholar
Rugala, Eugene, and James Fitzgerald. 2003. “Workplace Violence: From Threat to Intervention.” In Clinics in Occupational and Environmental Medicine, edited by Carole Wilkinson, and Corrinne Peek-Assa. Philadelphia, PA: W.B. Saunders. Google Scholar logo with link to Google Scholar
Schultheiss, Oliver. 2013. “Are Implicit Motives Revealed in Mere Words? Testing the Marker-Word Hypothesis with Computer-Based Text Analysis.” Front Psychology 16(4): 748. Google Scholar logo with link to Google Scholar
Shuy, Roger. 2010. “Linguistics and Terrorism Cases.” In the Routledge Handbook of Forensic Linguistics, edited by Malcolm Coulthard, and Alison Johnson, 558–575. London: Routledge. Google Scholar logo with link to Google Scholar
. 2011. “Applied Linguistics in the Legal Arena.” In the Handbook of Communication in Organisations and Professions, edited by Christopher Candlin, and Srikant Sarangi 83–102). Berlin, Boston: De Gruyter Mouton. Google Scholar logo with link to Google Scholar
Shuy, Roger. W. 2014. The Language of Murder Cases: Intentionality, Predisposition, and Voluntariness. Oxford: Oxford University Press. Google Scholar logo with link to Google Scholar
Shuy, Roger. 2021. “Terrorism and Forensic Linguistics: Linguistics in Terrorism Cases.” In The Routledge Handbook of Forensic Linguistics, edited by Malcolm Coulthard, May Alison, and R. Sousa-Silva, 445–462. Chichester: Wiley Blackwell.Google Scholar logo with link to Google Scholar
Smith, Allison. 2004. “From Words to Action: Exploring the Relationship between a Group’s Value References and its Likelihood of Engaging in Terrorism.” Studies in Conflict and Terrorism 271: 409–437. Google Scholar logo with link to Google Scholar
. 2008. “The Implicit Motives of Terrorist Groups: How the Needs for Affiliation and Power Translate into Death and Destruction.” Political Psychology 29(1): 55–75. [URL]
Smith, Sharon, and Roger Shuy. 2002. “Forensic Psycholinguistics: Using Language Analysis for Identifying and Assessing Offenders.” FBI Law Enforcement Bulletin 16–21. Retrieved June 29, 2023 from [URL]
Stryker, Sheldon, and Peter Burke. 2000. “The Past, Present, and Future of an Identity Theory.” Social Psychology Quarterly 63(4): 284–297. Google Scholar logo with link to Google Scholar
Sykes, Mark. 1988. “From ‘Right’ to ‘Needs’: Official Discourse and the ‘Welfarization’ of Race.” In Discourse and Discrimination, edited by Geneva Smitherman-Donaldson, and Teun van Dijk, 176–205. Michigan: Wayne State University Press.Google Scholar logo with link to Google Scholar
Tarrant, Brenton. 2019. “The Great Replacement Manifesto.” Retrieved June 29, 2023 from [URL]
Tausczik, Yla, and James Pennebaker. 2010. “The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods.” Journal of Language and Social Psychology 29(1): 24–54. Google Scholar logo with link to Google Scholar
Townshend, Charles. 2002. Terrorism: A Very Short Introduction. Oxford: Oxford University Press.Google Scholar logo with link to Google Scholar
Tsesis, Alexander. 2013. “Inflammatory Speech: Offense versus Incitement.” Minnesota Law Review 971: 1145–1196. Retrieved June 29, 2023 from [URL]
Turner, James, and Michael Gelles. 2003. Threat Assessment: A Risk Management Approach. New York: Haworth Press.Google Scholar logo with link to Google Scholar
U.N. Office on Drugs and Crime. 2012. “The Use of the Internet for Terrorist Purposes.” Retrieved September 7, 2023 from [URL]
U.S. National Institute of Justice. 2022. “The Changing Threat Landscape of Terrorism and Violent Extremism: Implications for Research and Policy.” Retrieved June 22, 2022 from [URL]
. 2023. “The Changing Threat Landscape of Terrorism and Violent Extremism: Implications for Research and Policy.” U.S. Department of Justice. Retrieved June 10, 2024 from [URL]
UNESCO 2023. “ChatGPT and Artificial Intelligence in Higher Education: Quick Start Guide.” Retrieved October 20, 2023 from [URL]
Vaisman-Tzachor, Reuben. 2006. “Psychological Profiles of Terrorists.” Forensic Examiner 15(2): 6–17. Retrieved September 7, 2023 from [URL]
van Dijk, Teun. 1995. “Discourse Semantics and Ideology.” Discourse and Society 6(2): 243–298. London: Sage. Google Scholar logo with link to Google Scholar
Vološinov, Valentin. 1973. Marxism and the Philosophy of Language. Translated by Ladislav Matejka, and I. R. Titunik. Massachusetts and London: Cambridge University Press.Google Scholar logo with link to Google Scholar
Weinmann, Gabriel. 2004. “Cyberterrorism: How Real Is the Threat?” Retrieved October 20, 2023 from [URL]
Wright-Neville, David, and Debra Smith. 2009. “Political Rage: Terrorism and the Politics of Emotion.” Global Change, Peace & Security 21(1): 85–98. Retrieved June 29, 2023 from [URL].
Zappavigna, Michele. 2023. “Hack your Corpus Analysis: How AI can Assist Corpus Linguists Deal with Messy Social Media Data.” Applied Corpus Linguistics 3(3): 100067. Google Scholar logo with link to Google Scholar
Cited by (1)

Cited by one other publication

Etaywe, Awni
2025. Conceptual Burstiness in Sociolinguistic Profiling of Radical-Criminal Communications: Corpus Method-Assisted Meaning Extraction for Investigative Leads. International Journal for the Semiotics of Law - Revue internationale de Sémiotique juridique 38:3  pp. 953 ff. DOI logo

This list is based on CrossRef data as of 13 november 2025. Please note that it may not be complete. Sources presented here have been supplied by the respective publishers. Any errors therein should be reported to them.

Mobile Menu Logo with link to supplementary files background Layer 1 prag Twitter_Logo_Blue