Cover not available

Introduction published In: The Discourse of Terrorism
Edited by Encarnación Hidalgo-Tenorio and Juan L. Castro
[Pragmatics and Society 13:3] 2022
► pp. 353360

References (36)
References
Abbasi, Ahmed, and Hsinchun Chen. 2005. “Applying authorship analysis to extremist-group Web forum messages”. IEEE Intelligent Systems 20 (5): 67–75. Google Scholar logo with link to Google Scholar
Al-Dayel, Nadia, and Aaron Anfinson. 2018. “In the words of the enemy: The Islamic State’s reflexive projection of statehood”. Critical Studies on Terrorism 11(1): 45–64. Google Scholar logo with link to Google Scholar
Ali, Mohammed Mahmood, Khaja Moizuddin Mohammed, and Lakshmi Rajamani. 2014. “Framework for surveillance of instant messages in instant messengers and social networking sites using data mining and ontology”. Proceedings of the 2014 IEEE Students’ Technology Symposium: 297–302. Google Scholar logo with link to Google Scholar
Al Rafie, Dina. 2012. “Whose hearts and minds? Narratives and counter-narratives of Salafi Jihadism”. Journal of Terrorism Research 3(2): 13–31. Google Scholar logo with link to Google Scholar
Argamon, Shlomo, Marin Šarić, and Sterlin Stuart Stein. 2003. “Style mining of electronic messages for multiple authorship discrimination: First results”. In Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ed. by Lise Getoor, Ted Senator, Pedro Domingos, and Christos Faloutsos, pp. 475–480. Google Scholar logo with link to Google Scholar
Benigni, Matthew C., Joseph Kenneth, and Kathleen M. Carley. 2017. “Online extremism and the communities that sustain it: Detecting the ISIS supporting community on Twitter”. PLoS ONE 12(12). Google Scholar logo with link to Google Scholar
Braddock, Kurt, and John Horgan. 2016. “Towards a guide for constructing and disseminating counter-narratives to reduce support for terrorism”. Studies in Conflict and Terrorism 39(5): 381–404. Google Scholar logo with link to Google Scholar
Brookes, Gavin, and Tony McEnery. 2020. “Correlation, collocation and cohesion: A corpus-based critical analysis of violent jihadist discourse”. Discourse & Society 31(4): 351–373. Google Scholar logo with link to Google Scholar
Brynielsson, Joel, Andreas Horndahl, Fredrik Johansson, Lisa Kaati, Christian Mårtenson, and Pontus Svenson. 2013. “Harvesting and analysis of weak signals for detecting lone wolf terrorists”. Security Informatics 2(11): 1–15. Google Scholar logo with link to Google Scholar
Cohen, Katie, Fredrik Johansson, Lisa Kaati, and Jonas Clausen Mork. 2014. “Detecting linguistic markers for radical violence in social media”. Terrorism and Political Violence 26(1): 246–256. Google Scholar logo with link to Google Scholar
Corney, Malcolm W. 2003. Analysing E-mail Text Authorship for Forensic Purposes. Queensland: Queensland University of Technology. Accessed 1 August 2018. [URL]
Eiselt, H. A., and Joyendu Bhadury. 2015. “The use of structures in communication networks to track membership in terrorist groups”. Journal of Terrorism Research 6(1): 1–18. Google Scholar logo with link to Google Scholar
Eroukhmanoff, Clara. 2015. “The remote securitisation of Islam in the US post-9/11: Euphemisation, metaphors and the ‘logic of expected consequences’ in counter-radicalisation discourse”. Critical Studies on Terrorism 8(2): 246–265. Google Scholar logo with link to Google Scholar
Fairclough, Norman, and Ruth Wodak. 1997. “Critical discourse analysis”. In Discourse as social interaction, ed. by Teun A. van Dijk, 258–284. London: Sage.Google Scholar logo with link to Google Scholar
Forsythand, Eric N., and Craig H. Martell. 2007. “Lexical and discourse analysis of online chat dialog”. In ICSC 2007 International Conference on Semantic Computing, ed. by Patrick Kellenberger, 19–26. Irvine, Calif.: IEEE. Google Scholar logo with link to Google Scholar
Foy, Kelli. 2015. “Framing hostage negotiations: Analysing the discourse of the US government and the Islamic State”. Critical Studies on Terrorism 8(3): 516–531. Google Scholar logo with link to Google Scholar
Goldberg, Jeffrey. 2000. Inside Jihad; the education of a holy warrior. The New York Times. Accessed 25 January 2018. [URL]
Kumar, A. Sharath, and Sanjay Singh. 2013. “Detection of user cluster with suspicious activity in online Social Networking Sites”. 2nd International Conference on Advanced Computing, Networking and Security, pp. 220–225. Google Scholar logo with link to Google Scholar
Luke, Allan. 2002. “Beyond science and ideology critique: Developments in critical discourse analysis”. Annual Review of Applied Linguistics 221: 96–110. Google Scholar logo with link to Google Scholar
McCauley, Clark, and Sophia Moskalenko. 2014. “Toward a profile of lone wolf terrorists: What moves an individual from radical opinion to radical action”. Terrorism and Political Violence 26(1): 69–85. Google Scholar logo with link to Google Scholar
Miravitllas, Enric. 2015. “Hacia una tipología de contranarrativas frente al extremismo violento”. Accessed 15 February 2018. [URL]
Neumann, Peter R. 2013. “Options and strategies for countering online radicalization in the United States”. Studies in Conflict and Terrorism 36(6): 431–459. Google Scholar logo with link to Google Scholar
Prentice, Sheryl, Paul Rayson, and Paul J. Taylor. 2012. “The language of Islamic extremism: Towards an automated identification of beliefs, motivations and justifications”. International Journal of Corpus Linguistics 17(2): 259–286. Google Scholar logo with link to Google Scholar
Qureshi, Pir Abdul Rasool, Nasrullah Memon, and Uffe Kock Wiil. 2010. “EWaS: Novel approach for generating early warnings to prevent terrorist attacks”. In 2010 Second International Conference on Computer Engineering and Applications, ICCEA 2010, ed. by J. E. Guerrero, 410–414. Los Alamitos, Calif.: IEEE. Google Scholar logo with link to Google Scholar
Ramsay, Gilbert, and Sarah Victoria Marsden. 2013. “Radical distinctions: A comparative study of two jihadist speeches”. Critical Studies on Terrorism 6(3): 392–409. Google Scholar logo with link to Google Scholar
Rediker, Ezekiel. 2015. “The incitement of terrorism on the Internet: Legal standards, enforcement, and the role of the European Union”. Michigan Journal of International Law 36(2): 321–351.Google Scholar logo with link to Google Scholar
Rogers, Marc. 2003. “The psychology of cyber-terrorism”. In Terrorists, Victims and Society: Psychological Perspectives on Terrorism and its Consequences, ed. by Andrew Silke, 77–92. Chichester: Wiley. Google Scholar logo with link to Google Scholar
Sageman, Marc. 2004. Understanding Terror Networks. Philadelphia: University of Pennsylvania Press. Google Scholar logo with link to Google Scholar
Scanlon, Jacob R., and Matthew S. Gerber. 2014. “Automatic detection of cyber-recruitment by violent extremists”. Security Informatics 3(5): 1–10. Google Scholar logo with link to Google Scholar
Spiller, Paola Yael. 2005. Psicología y Terrorismo: El Terrorismo Suicida. Estudio de Variables que Inciden en su Aparición y Desarrollo. Tesina. Universidad de Belgrano.Google Scholar logo with link to Google Scholar
Torres Roselló, J. 2015. “El auge del yihadismo en occidente: Un producto de la modernidad”. Accessed 25 July 2017. [URL]
Torres Soriano, Manuel. 2009. “Terrorismo yihadista y nuevos usos de Internet: La distribución de propaganda”. Análisis del Real Instituto Elcano 1101: 1–9.Google Scholar logo with link to Google Scholar
Vergani, Matteo, and Ana-Maria Bliuc. 2015. “The evolution of the ISIS’ language: A quantitative analysis of the language of the first year of Dabiq magazine”. Sicurezza, Terrorismo e Società 21: 7–20.Google Scholar logo with link to Google Scholar
Wadhwa, Pooja, and M. P. S. Bhatia. 2013. “Tracking on-line radicalization using investigative data mining”. 2013 National Conference on Communications, NCC 2013. New Delhi: IEEE, pp. 674–678. Google Scholar logo with link to Google Scholar
Weimann, Gabriel, & Katharina Von Knop. 2008. “Applying the notion of noise to countering online terrorism”. Studies in Conflict & Terrorism 31(10): 883-902. Google Scholar logo with link to Google Scholar
Zolfaghar, Kiyana, Arash Barfar, and Shahriar Mohammadi. 2009. “A framework for online counter terrorism”. Proceedings – Internet Technology and Secured Transactions: 1–5. Google Scholar logo with link to Google Scholar
Mobile Menu Logo with link to supplementary files background Layer 1 prag Twitter_Logo_Blue