1887
Volume 13, Issue 3
  • ISSN 1878-9714
  • E-ISSN: 1878-9722
USD
Buy:$35.00 + Taxes
Preview this article:

Loading

Article metrics loading...

/content/journals/10.1075/ps.00058.int
2022-07-21
2022-08-12
Loading full text...

Full text loading...

References

  1. Abbasi, Ahmed, and Hsinchun Chen
    2005 “Applying authorship analysis to extremist-group Web forum messages”. IEEE Intelligent Systems20 (5): 67–75. 10.1109/MIS.2005.81
    https://doi.org/10.1109/MIS.2005.81 [Google Scholar]
  2. Al-Dayel, Nadia, and Aaron Anfinson
    2018 “In the words of the enemy: The Islamic State’s reflexive projection of statehood”. Critical Studies on Terrorism11(1): 45–64. 10.1080/17539153.2017.1338327
    https://doi.org/10.1080/17539153.2017.1338327 [Google Scholar]
  3. Ali, Mohammed Mahmood, Khaja Moizuddin Mohammed, and Lakshmi Rajamani
    2014 “Framework for surveillance of instant messages in instant messengers and social networking sites using data mining and ontology”. Proceedings of the 2014 IEEE Students’ Technology Symposium: 297–302. 10.1109/TechSym.2014.6808064
    https://doi.org/10.1109/TechSym.2014.6808064 [Google Scholar]
  4. Al Rafie, Dina
    2012 “Whose hearts and minds? Narratives and counter-narratives of Salafi Jihadism”. Journal of Terrorism Research3(2): 13–31. 10.15664/jtr.304
    https://doi.org/10.15664/jtr.304 [Google Scholar]
  5. Argamon, Shlomo, Marin Šarić, and Sterlin Stuart Stein
    2003 “Style mining of electronic messages for multiple authorship discrimination: First results”. InProceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ed. byLise Getoor, Ted Senator, Pedro Domingos, and Christos Faloutsos, pp.475–480. 10.1145/956750.956805
    https://doi.org/10.1145/956750.956805 [Google Scholar]
  6. Benigni, Matthew C., Joseph Kenneth, and Kathleen M. Carley
    2017 “Online extremism and the communities that sustain it: Detecting the ISIS supporting community on Twitter”. PLoS ONE12(12). 10.1371/journal.pone.0181405
    https://doi.org/10.1371/journal.pone.0181405 [Google Scholar]
  7. Braddock, Kurt, and John Horgan
    2016 “Towards a guide for constructing and disseminating counter-narratives to reduce support for terrorism”. Studies in Conflict and Terrorism39(5): 381–404. 10.1080/1057610X.2015.1116277
    https://doi.org/10.1080/1057610X.2015.1116277 [Google Scholar]
  8. Brookes, Gavin, and Tony McEnery
    2020 “Correlation, collocation and cohesion: A corpus-based critical analysis of violent jihadist discourse”. Discourse & Society31(4): 351–373. 10.1177/0957926520903528
    https://doi.org/10.1177/0957926520903528 [Google Scholar]
  9. Brynielsson, Joel, Andreas Horndahl, Fredrik Johansson, Lisa Kaati, Christian Mårtenson, and Pontus Svenson
    2013 “Harvesting and analysis of weak signals for detecting lone wolf terrorists”. Security Informatics2(11): 1–15. 10.1186/2190‑8532‑2‑11
    https://doi.org/10.1186/2190-8532-2-11 [Google Scholar]
  10. Cohen, Katie, Fredrik Johansson, Lisa Kaati, and Jonas Clausen Mork
    2014 “Detecting linguistic markers for radical violence in social media”. Terrorism and Political Violence26(1): 246–256. 10.1080/09546553.2014.849948
    https://doi.org/10.1080/09546553.2014.849948 [Google Scholar]
  11. Corney, Malcolm W.
    2003Analysing E-mail Text Authorship for Forensic Purposes. Queensland: Queensland University of Technology. Accessed1 August 2018. https://eprints.qut.edu.au/16069/1/Malcolm_Corney_Thesis.pdf
    [Google Scholar]
  12. Eiselt, H. A., and Joyendu Bhadury
    2015 “The use of structures in communication networks to track membership in terrorist groups”. Journal of Terrorism Research6(1): 1–18. 10.15664/jtr.1073
    https://doi.org/10.15664/jtr.1073 [Google Scholar]
  13. Eroukhmanoff, Clara
    2015 “The remote securitisation of Islam in the US post-9/11: Euphemisation, metaphors and the ‘logic of expected consequences’ in counter-radicalisation discourse”. Critical Studies on Terrorism8(2): 246–265. 10.1080/17539153.2015.1053747
    https://doi.org/10.1080/17539153.2015.1053747 [Google Scholar]
  14. Fairclough, Norman, and Ruth Wodak
    1997 “Critical discourse analysis”. InDiscourse as social interaction, ed. byTeun A. van Dijk, 258–284. London: Sage.
    [Google Scholar]
  15. Forsythand, Eric N., and Craig H. Martell
    2007 “Lexical and discourse analysis of online chat dialog”. InICSC 2007 International Conference on Semantic Computing, ed. byPatrick Kellenberger, 19–26. Irvine, Calif.: IEEE. 10.1109/ICSC.2007.55
    https://doi.org/10.1109/ICSC.2007.55 [Google Scholar]
  16. Foy, Kelli
    2015 “Framing hostage negotiations: Analysing the discourse of the US government and the Islamic State”. Critical Studies on Terrorism8(3): 516–531. 10.1080/17539153.2015.1091655
    https://doi.org/10.1080/17539153.2015.1091655 [Google Scholar]
  17. Goldberg, Jeffrey
    2000 Inside Jihad; the education of a holy warrior. The New York Times. Accessed25 January 2018. https://www.nytimes.com/2000/06/25/magazine/inside-jihad-u-the-education-of-a-holy-warrior.html
    [Google Scholar]
  18. Kumar, A. Sharath, and Sanjay Singh
    2013 “Detection of user cluster with suspicious activity in online Social Networking Sites”. 2nd International Conference on Advanced Computing, Networking and Security, pp.220–225. 10.1109/ADCONS.2013.17
    https://doi.org/10.1109/ADCONS.2013.17 [Google Scholar]
  19. Luke, Allan
    2002 “Beyond science and ideology critique: Developments in critical discourse analysis”. Annual Review of Applied Linguistics22: 96–110. 10.1017/S0267190502000053
    https://doi.org/10.1017/S0267190502000053 [Google Scholar]
  20. McCauley, Clark, and Sophia Moskalenko
    2014 “Toward a profile of lone wolf terrorists: What moves an individual from radical opinion to radical action”. Terrorism and Political Violence26(1): 69–85. 10.1080/09546553.2014.849916
    https://doi.org/10.1080/09546553.2014.849916 [Google Scholar]
  21. Miravitllas, Enric
    2015 “Hacia una tipología de contranarrativas frente al extremismo violento”. Accessed15 February 2018. https://aecpa.es/es-es/hacia-una-tipologia-de-contranarrativas-frente-al-extremismo-violento/congress-papers/1228/
  22. Neumann, Peter R.
    2013 “Options and strategies for countering online radicalization in the United States”. Studies in Conflict and Terrorism36(6): 431–459. 10.1080/1057610X.2013.784568
    https://doi.org/10.1080/1057610X.2013.784568 [Google Scholar]
  23. Prentice, Sheryl, Paul Rayson, and Paul J. Taylor
    2012 “The language of Islamic extremism: Towards an automated identification of beliefs, motivations and justifications”. International Journal of Corpus Linguistics17(2): 259–286. 10.1075/ijcl.17.2.05pre
    https://doi.org/10.1075/ijcl.17.2.05pre [Google Scholar]
  24. Qureshi, Pir Abdul Rasool, Nasrullah Memon, and Uffe Kock Wiil
    2010 “EWaS: Novel approach for generating early warnings to prevent terrorist attacks”. In2010 Second International Conference on Computer Engineering and Applications, ICCEA 2010, ed. byJ. E. Guerrero, 410–414. Los Alamitos, Calif.: IEEE. 10.1109/ICCEA.2010.230
    https://doi.org/10.1109/ICCEA.2010.230 [Google Scholar]
  25. Ramsay, Gilbert, and Sarah Victoria Marsden
    2013 “Radical distinctions: A comparative study of two jihadist speeches”. Critical Studies on Terrorism6(3): 392–409. 10.1080/17539153.2013.847263
    https://doi.org/10.1080/17539153.2013.847263 [Google Scholar]
  26. Rediker, Ezekiel
    2015 “The incitement of terrorism on the Internet: Legal standards, enforcement, and the role of the European Union”. Michigan Journal of International Law36(2): 321–351.
    [Google Scholar]
  27. Rogers, Marc
    2003 “The psychology of cyber-terrorism”. InTerrorists, Victims and Society: Psychological Perspectives on Terrorism and its Consequences, ed. byAndrew Silke, 77–92. Chichester: Wiley. 10.1002/9780470713600.ch4
    https://doi.org/10.1002/9780470713600.ch4 [Google Scholar]
  28. Sageman, Marc
    2004Understanding Terror Networks. Philadelphia: University of Pennsylvania Press. 10.9783/9780812206791
    https://doi.org/10.9783/9780812206791 [Google Scholar]
  29. Scanlon, Jacob R., and Matthew S. Gerber
    2014 “Automatic detection of cyber-recruitment by violent extremists”. Security Informatics3(5): 1–10. 10.1186/s13388‑014‑0005‑5
    https://doi.org/10.1186/s13388-014-0005-5 [Google Scholar]
  30. Spiller, Paola Yael
    2005Psicología y Terrorismo: El Terrorismo Suicida. Estudio de Variables que Inciden en su Aparición y Desarrollo. Tesina. Universidad de Belgrano.
    [Google Scholar]
  31. Torres Roselló, J.
    2015 “El auge del yihadismo en occidente: Un producto de la modernidad”. Accessed25 July 2017. www.ieee.es/Galerias/fichero/docs_opinion/2015/DIEEEO103-2015_Auge_Yihadismo_Occidente_JordiTorres.pdf
  32. Torres Soriano, Manuel
    2009 “Terrorismo yihadista y nuevos usos de Internet: La distribución de propaganda”. Análisis del Real Instituto Elcano110: 1–9.
    [Google Scholar]
  33. Vergani, Matteo, and Ana-Maria Bliuc
    2015 “The evolution of the ISIS’ language: A quantitative analysis of the language of the first year of Dabiq magazine”. Sicurezza, Terrorismo e Società2: 7–20.
    [Google Scholar]
  34. Wadhwa, Pooja, and M. P. S. Bhatia
    2013 “Tracking on-line radicalization using investigative data mining”. 2013 National Conference on Communications, NCC 2013. New Delhi: IEEE, pp.674–678. 10.1109/NCC.2013.6488046
    https://doi.org/10.1109/NCC.2013.6488046 [Google Scholar]
  35. Weimann, Gabriel, & Katharina Von Knop
    2008 “Applying the notion of noise to countering online terrorism”. Studies in Conflict & Terrorism31(10): 883-902. 10.1080/10576100802342601
    https://doi.org/10.1080/10576100802342601 [Google Scholar]
  36. Zolfaghar, Kiyana, Arash Barfar, and Shahriar Mohammadi
    2009 “A framework for online counter terrorism”. Proceedings – Internet Technology and Secured Transactions: 1–5. 10.1109/ICITST.2009.5402641
    https://doi.org/10.1109/ICITST.2009.5402641 [Google Scholar]
http://instance.metastore.ingenta.com/content/journals/10.1075/ps.00058.int
Loading
  • Article Type: Introduction
This is a required field
Please enter a valid email address
Approval was successful
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error