Introduction published In: The Discourse of Terrorism
Edited by Encarnación Hidalgo-Tenorio and Juan L. Castro
[Pragmatics and Society 13:3] 2022
► pp. 353–360
Introduction
Transdisciplinary approaches to the discourse of Islamist extremism
This article is available free of charge.
Published online: 21 July 2022
https://doi.org/10.1075/ps.00058.int
https://doi.org/10.1075/ps.00058.int
Article outline
- By way of background
- The rationale behind this Special Issue
- The aims of this Special Issue in a nutshell
- Notes
References
References (36)
Abbasi, Ahmed, and Hsinchun Chen. 2005. “Applying
authorship analysis to extremist-group Web forum messages”. IEEE Intelligent
Systems 20 (5): 67–75.
Al-Dayel, Nadia, and Aaron Anfinson. 2018. “In
the words of the enemy: The Islamic State’s reflexive projection of
statehood”. Critical Studies on
Terrorism 11(1): 45–64.
Ali, Mohammed Mahmood, Khaja Moizuddin Mohammed, and Lakshmi Rajamani. 2014. “Framework
for surveillance of instant messages in instant messengers and social networking sites using data mining and
ontology”. Proceedings of the 2014 IEEE Students’ Technology
Symposium: 297–302.
Al Rafie, Dina. 2012. “Whose
hearts and minds? Narratives and counter-narratives of Salafi Jihadism”. Journal of Terrorism
Research 3(2): 13–31.
Argamon, Shlomo, Marin Šarić, and Sterlin Stuart Stein. 2003. “Style
mining of electronic messages for multiple authorship discrimination: First
results”. In Proceedings of the Ninth ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining, ed. by Lise Getoor, Ted Senator, Pedro Domingos, and Christos Faloutsos, pp. 475–480.
Benigni, Matthew C., Joseph Kenneth, and Kathleen M. Carley. 2017. “Online
extremism and the communities that sustain it: Detecting the ISIS supporting community on
Twitter”. PLoS
ONE 12(12).
Braddock, Kurt, and John Horgan. 2016. “Towards
a guide for constructing and disseminating counter-narratives to reduce support for
terrorism”. Studies in Conflict and
Terrorism 39(5): 381–404.
Brookes, Gavin, and Tony McEnery. 2020. “Correlation,
collocation and cohesion: A corpus-based critical analysis of violent jihadist
discourse”. Discourse &
Society 31(4): 351–373.
Brynielsson, Joel, Andreas Horndahl, Fredrik Johansson, Lisa Kaati, Christian Mårtenson, and Pontus Svenson. 2013. “Harvesting
and analysis of weak signals for detecting lone wolf terrorists”. Security
Informatics 2(11): 1–15.
Cohen, Katie, Fredrik Johansson, Lisa Kaati, and Jonas Clausen Mork. 2014. “Detecting
linguistic markers for radical violence in social media”. Terrorism and Political
Violence 26(1): 246–256.
Corney, Malcolm W. 2003. Analysing E-mail Text Authorship for
Forensic Purposes. Queensland: Queensland University of Technology. Accessed 1 August
2018. [URL]
Eiselt, H. A., and Joyendu Bhadury. 2015. “The
use of structures in communication networks to track membership in terrorist groups”. Journal
of Terrorism
Research 6(1): 1–18.
Eroukhmanoff, Clara. 2015. “The
remote securitisation of Islam in the US post-9/11: Euphemisation, metaphors and the ‘logic of expected consequences’ in
counter-radicalisation discourse”. Critical Studies on
Terrorism 8(2): 246–265.
Fairclough, Norman, and Ruth Wodak. 1997. “Critical
discourse analysis”. In Discourse as social
interaction, ed. by Teun A. van Dijk, 258–284. London: Sage.
Forsythand, Eric N., and Craig H. Martell. 2007. “Lexical
and discourse analysis of online chat dialog”. In ICSC 2007
International Conference on Semantic Computing, ed. by Patrick Kellenberger, 19–26. Irvine, Calif.: IEEE.
Foy, Kelli. 2015. “Framing
hostage negotiations: Analysing the discourse of the US government and the Islamic
State”. Critical Studies on
Terrorism 8(3): 516–531.
Goldberg, Jeffrey. 2000. Inside
Jihad; the education of a holy warrior. The New York
Times. Accessed 25 January
2018. [URL]
Kumar, A. Sharath, and Sanjay Singh. 2013. “Detection
of user cluster with suspicious activity in online Social Networking Sites”. 2nd International
Conference on Advanced Computing, Networking and
Security, pp. 220–225.
Luke, Allan. 2002. “Beyond
science and ideology critique: Developments in critical discourse analysis”. Annual Review of
Applied Linguistics 221: 96–110.
McCauley, Clark, and Sophia Moskalenko. 2014. “Toward
a profile of lone wolf terrorists: What moves an individual from radical opinion to radical
action”. Terrorism and Political
Violence 26(1): 69–85.
Miravitllas, Enric. 2015. “Hacia
una tipología de contranarrativas frente al extremismo
violento”. Accessed 15 February
2018. [URL]
Neumann, Peter R. 2013. “Options and strategies for
countering online radicalization in the United States”. Studies in Conflict and
Terrorism 36(6): 431–459.
Prentice, Sheryl, Paul Rayson, and Paul J. Taylor. 2012. “The
language of Islamic extremism: Towards an automated identification of beliefs, motivations and
justifications”. International Journal of Corpus
Linguistics 17(2): 259–286.
Qureshi, Pir Abdul Rasool, Nasrullah Memon, and Uffe Kock Wiil. 2010. “EWaS:
Novel approach for generating early warnings to prevent terrorist
attacks”. In 2010 Second International Conference on Computer
Engineering and Applications, ICCEA 2010, ed. by J. E. Guerrero, 410–414. Los Alamitos, Calif.: IEEE.
Ramsay, Gilbert, and Sarah Victoria Marsden. 2013. “Radical
distinctions: A comparative study of two jihadist speeches”. Critical Studies on
Terrorism 6(3): 392–409.
Rediker, Ezekiel. 2015. “The
incitement of terrorism on the Internet: Legal standards, enforcement, and the role of the European
Union”. Michigan Journal of International
Law 36(2): 321–351.
Rogers, Marc. 2003. “The
psychology of cyber-terrorism”. In Terrorists, Victims and Society:
Psychological Perspectives on Terrorism and its Consequences, ed. by Andrew Silke, 77–92. Chichester: Wiley.
Scanlon, Jacob R., and Matthew S. Gerber. 2014. “Automatic
detection of cyber-recruitment by violent extremists”. Security
Informatics 3(5): 1–10.
Spiller, Paola Yael. 2005. Psicología y Terrorismo: El
Terrorismo Suicida. Estudio de Variables que Inciden en su Aparición y
Desarrollo. Tesina. Universidad de Belgrano.
Torres Roselló, J. 2015. “El
auge del yihadismo en occidente: Un producto de la
modernidad”. Accessed 25 July
2017. [URL]
Torres Soriano, Manuel. 2009. “Terrorismo
yihadista y nuevos usos de Internet: La distribución de propaganda”. Análisis del Real
Instituto
Elcano 1101: 1–9.
Vergani, Matteo, and Ana-Maria Bliuc. 2015. “The
evolution of the ISIS’ language: A quantitative analysis of the language of the first year of Dabiq
magazine”. Sicurezza, Terrorismo e
Società 21: 7–20.
Wadhwa, Pooja, and M. P. S. Bhatia. 2013. “Tracking
on-line radicalization using investigative data mining”. 2013 National Conference on
Communications, NCC 2013. New Delhi: IEEE, pp. 674–678.
