Skip to main content
Erschienen in: Information Systems Frontiers 1/2011

01.03.2011

Analyzing the semantic content and persuasive composition of extremist media: A case study of texts produced during the Gaza conflict

verfasst von: Sheryl Prentice, Paul J. Taylor, Paul Rayson, Andrew Hoskins, Ben O’Loughlin

Erschienen in: Information Systems Frontiers | Ausgabe 1/2011

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

While terrorism informatics research has examined the technical composition of extremist media, there is less work examining the content and intent behind such media. We propose that the arguments and issues presented in extremist media provide insights into authors’ intent, which in turn may provide an evidence-base for detecting and assessing risk. We explore this possibility by applying two quantitative text-analysis methods to 50 online texts that incite violence as a result of the 2008/2009 Israeli military action in Gaza and the West Bank territories. The first method—a content coding system that identifies the occurrence of persuasive devices—revealed a predominance of moral proof arguments within the texts, and evidence for distinguishable ‘profiles’ of persuasion use across different authors and different group affiliations. The second method—a corpus-linguistic technique that identifies the core concepts and narratives that authors use—confirmed the use of moral proof to create an in-group/out-group divide, while also demonstrating a movement from general expressions of discontent to more direct audience-orientated expressions of violence as conflict heightened. We conclude that multi-method analyses are a valuable approach to building both an evidence-based understanding of terrorist media use and a valid set of applications within terrorist informatics.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
We develop this term from media studies’ accounts (Cottle 2006; Fuller 2007; Postman 2000) of the global mediated environment within which geographically dispersed individuals can be connected, for instance producers of extremist media and their potential audiences.
 
2
PT also divided the ten texts into thought units, which we compared to the original coding using standard measures. The two coders were easily able to identify thought units within the texts reliably (Guetzkow score = .02).
 
3
The reliability for the ‘pre-’ data coding was 80% (κ = .77); the reliability of the ‘post-’ data coding was 86% (κ = .84).
 
4
Visit: http://​ucrel.​lancs.​ac.​uk/​wmatrix/​ and http://​ucrel.​lancs.​ac.​uk/​usas/​ for details of this software, including online access. The USAS pages also provide details of the full tag set, and details on how it is possible to make comparisons of composition between texts.
 
Literatur
Zurück zum Zitat Atran, S. (2005). The “virtual hand” of Jihad. Global Terrorism Analysis, 3, 8–11. Atran, S. (2005). The “virtual hand” of Jihad. Global Terrorism Analysis, 3, 8–11.
Zurück zum Zitat Awan, A. N. (2007). Virtual jihadist media: function, legitimacy, and radicalizing efficacy. European Journal of Cultural Studies, 10, 389–408.CrossRef Awan, A. N. (2007). Virtual jihadist media: function, legitimacy, and radicalizing efficacy. European Journal of Cultural Studies, 10, 389–408.CrossRef
Zurück zum Zitat Bakeman, R., Quera, V., McAuthur, D., & Robinson, B. (1997). Detecting sequential patterns and determining the reliability with faliable observers. Psychological Methods, 2, 357–370.CrossRef Bakeman, R., Quera, V., McAuthur, D., & Robinson, B. (1997). Detecting sequential patterns and determining the reliability with faliable observers. Psychological Methods, 2, 357–370.CrossRef
Zurück zum Zitat BBC News (2009b) Newsnight, 12 January. BBC News (2009b) Newsnight, 12 January.
Zurück zum Zitat Blazak, R. (2001). White boys to terrorist men: target recruitment of Nazi skinheads. American Behavioral Scientist, 44, 982–1000.CrossRef Blazak, R. (2001). White boys to terrorist men: target recruitment of Nazi skinheads. American Behavioral Scientist, 44, 982–1000.CrossRef
Zurück zum Zitat Bruins, J. (1999). Social power and influence tactics: a theoretical introduction. Journal of Social Issues, 55, 7–14.CrossRef Bruins, J. (1999). Social power and influence tactics: a theoretical introduction. Journal of Social Issues, 55, 7–14.CrossRef
Zurück zum Zitat Beune, K., Giebels, E., & Taylor, P. J. (2010). Interaction patterns in police interviews: The role of cultural dependency. Criminal Justice and Behavior, 37, 904–925. Beune, K., Giebels, E., & Taylor, P. J. (2010). Interaction patterns in police interviews: The role of cultural dependency. Criminal Justice and Behavior, 37, 904–925.
Zurück zum Zitat Chen, H., Qin, J., Reid, E., Chung, W., Zhou, Y., Xi, W., et al. (2004). The Dark Web portal: Collecting and analyzing the presence of domestic and international terrorist groups on the web. In Proceedings of International IEEE Conference on Intelligent Transportation Systems. Chen, H., Qin, J., Reid, E., Chung, W., Zhou, Y., Xi, W., et al. (2004). The Dark Web portal: Collecting and analyzing the presence of domestic and international terrorist groups on the web. In Proceedings of International IEEE Conference on Intelligent Transportation Systems.
Zurück zum Zitat Cohen, J. A. (1960). A coefficient of agreement for nominal scales. Educational and Psychological Measurement, 20, 37–46.CrossRef Cohen, J. A. (1960). A coefficient of agreement for nominal scales. Educational and Psychological Measurement, 20, 37–46.CrossRef
Zurück zum Zitat Cottle, S. (2006). Mediatized conflict: Developments in media and conflict studies. Maidenhead: Open University Press. Cottle, S. (2006). Mediatized conflict: Developments in media and conflict studies. Maidenhead: Open University Press.
Zurück zum Zitat Economist. (2009). Now get back to making peace. Economist, 390, 51–52. Economist. (2009). Now get back to making peace. Economist, 390, 51–52.
Zurück zum Zitat Fuller, M. (2007). Media ecologies: Materialist energies in art and technoculture. Cambridge: MIT. Fuller, M. (2007). Media ecologies: Materialist energies in art and technoculture. Cambridge: MIT.
Zurück zum Zitat Gass, R. H., & Seiter, J. S. (1999). Persuasion, social influence and compliance gaining. Needham Heights: Allyn & Bacon. Gass, R. H., & Seiter, J. S. (1999). Persuasion, social influence and compliance gaining. Needham Heights: Allyn & Bacon.
Zurück zum Zitat Gerstenfeld, P. B., Grant, D. R., & Chiang, C.-P. (2003). Hate online: a content analysis of extremist internet sites. Analysis of Social Issues and Public Policy, 3, 29–44.CrossRef Gerstenfeld, P. B., Grant, D. R., & Chiang, C.-P. (2003). Hate online: a content analysis of extremist internet sites. Analysis of Social Issues and Public Policy, 3, 29–44.CrossRef
Zurück zum Zitat Giebels, E., & Noelanders, S. (2004). Crisis negotiations: A multiparty perspective. Veenendaal: Universal. Giebels, E., & Noelanders, S. (2004). Crisis negotiations: A multiparty perspective. Veenendaal: Universal.
Zurück zum Zitat Giebels, E., & Taylor, P. J. (2009). Interaction patterns in crisis negotiations: persuasive arguments and cultural differences. Journal of Applied Psychology, 94, 5–19.CrossRef Giebels, E., & Taylor, P. J. (2009). Interaction patterns in crisis negotiations: persuasive arguments and cultural differences. Journal of Applied Psychology, 94, 5–19.CrossRef
Zurück zum Zitat HM Government. (2006). Countering international terrorism: The United Kingdom’s strategy. London: Crown. HM Government. (2006). Countering international terrorism: The United Kingdom’s strategy. London: Crown.
Zurück zum Zitat Ho, Y. (2007). Investigating the key concept differences between the two editions of John Fowler’s The Magus: A corpus semantic approach. Presentation at the 27th International Conference of the Poetics and Linguistics Association (PALA). Osaka, Japan. Ho, Y. (2007). Investigating the key concept differences between the two editions of John Fowler’s The Magus: A corpus semantic approach. Presentation at the 27th International Conference of the Poetics and Linguistics Association (PALA). Osaka, Japan.
Zurück zum Zitat Hoskins, A., & O’Loughlin, B. (2009). The Internet as a weapon of war? Radicalisation, publics and legitimacy. In A. Karatzogianni (Ed.), Cyber conflict and global politics (pp. 31–47). Abingdon: Routledge. Hoskins, A., & O’Loughlin, B. (2009). The Internet as a weapon of war? Radicalisation, publics and legitimacy. In A. Karatzogianni (Ed.), Cyber conflict and global politics (pp. 31–47). Abingdon: Routledge.
Zurück zum Zitat Howell, D. C. (1997). Statistical methods for psychology (4th ed.). Belmont: Wadsworth. Howell, D. C. (1997). Statistical methods for psychology (4th ed.). Belmont: Wadsworth.
Zurück zum Zitat Hunston, S. (2002). Corpora in applied linguistics. Cambridge: Cambridge University Press. Hunston, S. (2002). Corpora in applied linguistics. Cambridge: Cambridge University Press.
Zurück zum Zitat Jacques, K., & Taylor, P. J. (2008). Male and female suicide bombers: Different sexes, different reasons? Studies in Conflict and Terrorism, 31, 304–326.CrossRef Jacques, K., & Taylor, P. J. (2008). Male and female suicide bombers: Different sexes, different reasons? Studies in Conflict and Terrorism, 31, 304–326.CrossRef
Zurück zum Zitat Jacques, K., & Taylor, P. J. (2009). Female terrorism: a review. Terrorism and Political Violence, 21, 499–515.CrossRef Jacques, K., & Taylor, P. J. (2009). Female terrorism: a review. Terrorism and Political Violence, 21, 499–515.CrossRef
Zurück zum Zitat Jerit, J. (2008). Issue framing and engagement: rhetorical strategy in public policy debates. Political Behaviour, 30, 1–24.CrossRef Jerit, J. (2008). Issue framing and engagement: rhetorical strategy in public policy debates. Political Behaviour, 30, 1–24.CrossRef
Zurück zum Zitat Krippendorff, K. (1980). Content analysis: An introduction to its methodology. Beverly Hills: Sage. Krippendorff, K. (1980). Content analysis: An introduction to its methodology. Beverly Hills: Sage.
Zurück zum Zitat Levine, M. (2002). Researching violence: power, social relations and the virtues of the experimental method. In R. Lee & E. Stanko (Eds.), Researching violence: methodology and measurement (pp. 125–135). London: Routledge. Levine, M. (2002). Researching violence: power, social relations and the virtues of the experimental method. In R. Lee & E. Stanko (Eds.), Researching violence: methodology and measurement (pp. 125–135). London: Routledge.
Zurück zum Zitat Loza, W. (2007). The psychology of extremism and terrorism: a Middle-Eastern perspective. Aggression and Violent Behavior, 12, 141–155.CrossRef Loza, W. (2007). The psychology of extremism and terrorism: a Middle-Eastern perspective. Aggression and Violent Behavior, 12, 141–155.CrossRef
Zurück zum Zitat MacEoin, D. (2007). The hijacking of British Islam: How extremist literature is subverting mosques in the UK. London: Policy Exchange. MacEoin, D. (2007). The hijacking of British Islam: How extremist literature is subverting mosques in the UK. London: Policy Exchange.
Zurück zum Zitat Malhotra, D., & Bazerman, M. H. (2008). Psychological influence in negotiation: an introduction long overview. Journal of Management, 9, 509–531.CrossRef Malhotra, D., & Bazerman, M. H. (2008). Psychological influence in negotiation: an introduction long overview. Journal of Management, 9, 509–531.CrossRef
Zurück zum Zitat Palmer, F. R. (1986). Mood and modality. Cambridge: Cambridge University Press. Palmer, F. R. (1986). Mood and modality. Cambridge: Cambridge University Press.
Zurück zum Zitat Payne, K. (2009). Winning the battle of ideas: propaganda, ideology, and terror. Studies in Conflict & Terrorism, 32, 109–128.CrossRef Payne, K. (2009). Winning the battle of ideas: propaganda, ideology, and terror. Studies in Conflict & Terrorism, 32, 109–128.CrossRef
Zurück zum Zitat Postman, N. (2000). The humanism of media ecology. Proceedings of the Media Ecology Association, 1, 10–16. Postman, N. (2000). The humanism of media ecology. Proceedings of the Media Ecology Association, 1, 10–16.
Zurück zum Zitat Qin, J., Zhou, Y., Reid, E., Lai, G., & Chen, H. (2007). Analyzing terror campaigns on the internet: technical sophistication, content richness, and web interactivity. International Journal of Human-Computer Studies, 65, 71–84.CrossRef Qin, J., Zhou, Y., Reid, E., Lai, G., & Chen, H. (2007). Analyzing terror campaigns on the internet: technical sophistication, content richness, and web interactivity. International Journal of Human-Computer Studies, 65, 71–84.CrossRef
Zurück zum Zitat Rayson, P. (2008). From key words to key semantic domains. International Journal of Corpus Linguistics, 13, 519–549.CrossRef Rayson, P. (2008). From key words to key semantic domains. International Journal of Corpus Linguistics, 13, 519–549.CrossRef
Zurück zum Zitat Smith, A. G. (2004). From words to action: exploring the relationship between a group’s value references and its likelihood of engaging in terrorism. Studies in Conflict and Terrorism, 27, 409–437.CrossRef Smith, A. G. (2004). From words to action: exploring the relationship between a group’s value references and its likelihood of engaging in terrorism. Studies in Conflict and Terrorism, 27, 409–437.CrossRef
Zurück zum Zitat Smith, A. G., Suedfeld, P., Conway, L. G., & Winter, D. G. (2008). The language of violence: distinguishing terrorist from nonterrorist groups by thematic content analysis. Dynamics of Asymmetric Conflict, 1, 142–163.CrossRef Smith, A. G., Suedfeld, P., Conway, L. G., & Winter, D. G. (2008). The language of violence: distinguishing terrorist from nonterrorist groups by thematic content analysis. Dynamics of Asymmetric Conflict, 1, 142–163.CrossRef
Zurück zum Zitat Stolcke, A., Coccaro, N., Bates, R., Taylor, P., Van Ess-Dykema, C., Ries, K., et al. (2000). Dialogue act modeling for automatic tagging and recognition of conversational speech. Computational Linguistics, 26, 339–373.CrossRef Stolcke, A., Coccaro, N., Bates, R., Taylor, P., Van Ess-Dykema, C., Ries, K., et al. (2000). Dialogue act modeling for automatic tagging and recognition of conversational speech. Computational Linguistics, 26, 339–373.CrossRef
Zurück zum Zitat Taub, G. (2009). Parting shots. New Republic, 240, 12–13. Taub, G. (2009). Parting shots. New Republic, 240, 12–13.
Zurück zum Zitat Taylor, P. J. (2002). A cylindrical model of communication behavior in crisis negotiations. Human Communication Research, 28, 7–48.CrossRef Taylor, P. J. (2002). A cylindrical model of communication behavior in crisis negotiations. Human Communication Research, 28, 7–48.CrossRef
Zurück zum Zitat Taylor, P. J., & Donald, I. J. (2004). The structure of communication behavior in simulated and actual crisis negotiations. Human Communication Research, 30, 443–478.CrossRef Taylor, P. J., & Donald, I. J. (2004). The structure of communication behavior in simulated and actual crisis negotiations. Human Communication Research, 30, 443–478.CrossRef
Zurück zum Zitat Taylor, P. J., & Donald, I. J. (2007). Testing the relationship between local cue-response patterns and global dimensions of communication behavior. British Journal of Social Psychology, 46, 273–298.CrossRef Taylor, P. J., & Donald, I. J. (2007). Testing the relationship between local cue-response patterns and global dimensions of communication behavior. British Journal of Social Psychology, 46, 273–298.CrossRef
Zurück zum Zitat Taylor, P. J., Jacques, K., Giebels, E., Levine, M., Best, R., Winter, J., et al. (2008). Analysing forensic processes: taking time into account. Issues in Forensic Psychology, 8, 45–57. Taylor, P. J., Jacques, K., Giebels, E., Levine, M., Best, R., Winter, J., et al. (2008). Analysing forensic processes: taking time into account. Issues in Forensic Psychology, 8, 45–57.
Zurück zum Zitat Ulph, S. (2005). A guide to Jihad on the web. Global Terrorism Analysis, 3, 5–7. Ulph, S. (2005). A guide to Jihad on the web. Global Terrorism Analysis, 3, 5–7.
Zurück zum Zitat White, R. K. (1951). Value-analysis: Nature and use of the method. Ann Arbor: Society for the Psychological Study of Social Issues. White, R. K. (1951). Value-analysis: Nature and use of the method. Ann Arbor: Society for the Psychological Study of Social Issues.
Zurück zum Zitat Wilson, A., & Leech, G. N. (1993). Automatic content analysis and the stylistic analysis of prose literature. Revue: Informatique et Statistique dans les Sciences Humaines, 29, 219–234. Wilson, A., & Leech, G. N. (1993). Automatic content analysis and the stylistic analysis of prose literature. Revue: Informatique et Statistique dans les Sciences Humaines, 29, 219–234.
Zurück zum Zitat Zhou, Y., Reid, E., Qin, J., Chen, H., & Lai, G. (2005). US domestic extremist groups on the web: link and content analysis. IEEE Intelligent Systems, 20, 44–51. Zhou, Y., Reid, E., Qin, J., Chen, H., & Lai, G. (2005). US domestic extremist groups on the web: link and content analysis. IEEE Intelligent Systems, 20, 44–51.
Metadaten
Titel
Analyzing the semantic content and persuasive composition of extremist media: A case study of texts produced during the Gaza conflict
verfasst von
Sheryl Prentice
Paul J. Taylor
Paul Rayson
Andrew Hoskins
Ben O’Loughlin
Publikationsdatum
01.03.2011
Verlag
Springer US
Erschienen in
Information Systems Frontiers / Ausgabe 1/2011
Print ISSN: 1387-3326
Elektronische ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-010-9272-y

Weitere Artikel der Ausgabe 1/2011

Information Systems Frontiers 1/2011 Zur Ausgabe