Abstract
While terrorism informatics research has examined the technical composition of extremist media, there is less work examining the content and intent behind such media. We propose that the arguments and issues presented in extremist media provide insights into authors’ intent, which in turn may provide an evidence-base for detecting and assessing risk. We explore this possibility by applying two quantitative text-analysis methods to 50 online texts that incite violence as a result of the 2008/2009 Israeli military action in Gaza and the West Bank territories. The first method—a content coding system that identifies the occurrence of persuasive devices—revealed a predominance of moral proof arguments within the texts, and evidence for distinguishable ‘profiles’ of persuasion use across different authors and different group affiliations. The second method—a corpus-linguistic technique that identifies the core concepts and narratives that authors use—confirmed the use of moral proof to create an in-group/out-group divide, while also demonstrating a movement from general expressions of discontent to more direct audience-orientated expressions of violence as conflict heightened. We conclude that multi-method analyses are a valuable approach to building both an evidence-based understanding of terrorist media use and a valid set of applications within terrorist informatics.
Similar content being viewed by others
Notes
PT also divided the ten texts into thought units, which we compared to the original coding using standard measures. The two coders were easily able to identify thought units within the texts reliably (Guetzkow score = .02).
The reliability for the ‘pre-’ data coding was 80% (κ = .77); the reliability of the ‘post-’ data coding was 86% (κ = .84).
Visit: http://ucrel.lancs.ac.uk/wmatrix/ and http://ucrel.lancs.ac.uk/usas/ for details of this software, including online access. The USAS pages also provide details of the full tag set, and details on how it is possible to make comparisons of composition between texts.
References
Atran, S. (2005). The “virtual hand” of Jihad. Global Terrorism Analysis, 3, 8–11.
Awan, A. N. (2007). Virtual jihadist media: function, legitimacy, and radicalizing efficacy. European Journal of Cultural Studies, 10, 389–408.
Bakeman, R., Quera, V., McAuthur, D., & Robinson, B. (1997). Detecting sequential patterns and determining the reliability with faliable observers. Psychological Methods, 2, 357–370.
BBC News (2009a) ‘Blair warning about Gaza radicals’, 10 January, available at: http://news.bbc.co.uk/1/hi/uk/7821594.stm.
BBC News (2009b) Newsnight, 12 January.
Blazak, R. (2001). White boys to terrorist men: target recruitment of Nazi skinheads. American Behavioral Scientist, 44, 982–1000.
Bruins, J. (1999). Social power and influence tactics: a theoretical introduction. Journal of Social Issues, 55, 7–14.
Beune, K., Giebels, E., & Taylor, P. J. (2010). Interaction patterns in police interviews: The role of cultural dependency. Criminal Justice and Behavior, 37, 904–925.
Chen, H., Qin, J., Reid, E., Chung, W., Zhou, Y., Xi, W., et al. (2004). The Dark Web portal: Collecting and analyzing the presence of domestic and international terrorist groups on the web. In Proceedings of International IEEE Conference on Intelligent Transportation Systems.
Cohen, J. A. (1960). A coefficient of agreement for nominal scales. Educational and Psychological Measurement, 20, 37–46.
Cottle, S. (2006). Mediatized conflict: Developments in media and conflict studies. Maidenhead: Open University Press.
Economist. (2009). Now get back to making peace. Economist, 390, 51–52.
Fuller, M. (2007). Media ecologies: Materialist energies in art and technoculture. Cambridge: MIT.
Gass, R. H., & Seiter, J. S. (1999). Persuasion, social influence and compliance gaining. Needham Heights: Allyn & Bacon.
Gerstenfeld, P. B., Grant, D. R., & Chiang, C.-P. (2003). Hate online: a content analysis of extremist internet sites. Analysis of Social Issues and Public Policy, 3, 29–44.
Giebels, E., & Noelanders, S. (2004). Crisis negotiations: A multiparty perspective. Veenendaal: Universal.
Giebels, E., & Taylor, P. J. (2009). Interaction patterns in crisis negotiations: persuasive arguments and cultural differences. Journal of Applied Psychology, 94, 5–19.
HM Government. (2006). Countering international terrorism: The United Kingdom’s strategy. London: Crown.
Ho, Y. (2007). Investigating the key concept differences between the two editions of John Fowler’s The Magus: A corpus semantic approach. Presentation at the 27th International Conference of the Poetics and Linguistics Association (PALA). Osaka, Japan.
Hoskins, A., & O’Loughlin, B. (2009). The Internet as a weapon of war? Radicalisation, publics and legitimacy. In A. Karatzogianni (Ed.), Cyber conflict and global politics (pp. 31–47). Abingdon: Routledge.
Howell, D. C. (1997). Statistical methods for psychology (4th ed.). Belmont: Wadsworth.
Hunston, S. (2002). Corpora in applied linguistics. Cambridge: Cambridge University Press.
Jacques, K., & Taylor, P. J. (2008). Male and female suicide bombers: Different sexes, different reasons? Studies in Conflict and Terrorism, 31, 304–326.
Jacques, K., & Taylor, P. J. (2009). Female terrorism: a review. Terrorism and Political Violence, 21, 499–515.
Jerit, J. (2008). Issue framing and engagement: rhetorical strategy in public policy debates. Political Behaviour, 30, 1–24.
Krippendorff, K. (1980). Content analysis: An introduction to its methodology. Beverly Hills: Sage.
Levine, M. (2002). Researching violence: power, social relations and the virtues of the experimental method. In R. Lee & E. Stanko (Eds.), Researching violence: methodology and measurement (pp. 125–135). London: Routledge.
Loza, W. (2007). The psychology of extremism and terrorism: a Middle-Eastern perspective. Aggression and Violent Behavior, 12, 141–155.
MacEoin, D. (2007). The hijacking of British Islam: How extremist literature is subverting mosques in the UK. London: Policy Exchange.
Malhotra, D., & Bazerman, M. H. (2008). Psychological influence in negotiation: an introduction long overview. Journal of Management, 9, 509–531.
Palmer, F. R. (1986). Mood and modality. Cambridge: Cambridge University Press.
Payne, K. (2009). Winning the battle of ideas: propaganda, ideology, and terror. Studies in Conflict & Terrorism, 32, 109–128.
Postman, N. (2000). The humanism of media ecology. Proceedings of the Media Ecology Association, 1, 10–16.
Qin, J., Zhou, Y., Reid, E., Lai, G., & Chen, H. (2007). Analyzing terror campaigns on the internet: technical sophistication, content richness, and web interactivity. International Journal of Human-Computer Studies, 65, 71–84.
Rayson, P. (2008). From key words to key semantic domains. International Journal of Corpus Linguistics, 13, 519–549.
Rayson, P. & Mariani, J. (2009). Visualising corpus linguistics. In M. Mahlberg, V. Gonzalez-Diaz, & C. Smith (Eds.), Proceedings of the Corpus Linguistics Conference 2009 (Article #426). Available for download at: http://ucrel.lancs.ac.uk/publications/cl2009/.
Smith, A. G. (2004). From words to action: exploring the relationship between a group’s value references and its likelihood of engaging in terrorism. Studies in Conflict and Terrorism, 27, 409–437.
Smith, A. G., Suedfeld, P., Conway, L. G., & Winter, D. G. (2008). The language of violence: distinguishing terrorist from nonterrorist groups by thematic content analysis. Dynamics of Asymmetric Conflict, 1, 142–163.
Stolcke, A., Coccaro, N., Bates, R., Taylor, P., Van Ess-Dykema, C., Ries, K., et al. (2000). Dialogue act modeling for automatic tagging and recognition of conversational speech. Computational Linguistics, 26, 339–373.
Taub, G. (2009). Parting shots. New Republic, 240, 12–13.
Taylor, P. J. (2002). A cylindrical model of communication behavior in crisis negotiations. Human Communication Research, 28, 7–48.
Taylor, P. J., & Donald, I. J. (2004). The structure of communication behavior in simulated and actual crisis negotiations. Human Communication Research, 30, 443–478.
Taylor, P. J., & Donald, I. J. (2007). Testing the relationship between local cue-response patterns and global dimensions of communication behavior. British Journal of Social Psychology, 46, 273–298.
Taylor, P. J., Jacques, K., Giebels, E., Levine, M., Best, R., Winter, J., et al. (2008). Analysing forensic processes: taking time into account. Issues in Forensic Psychology, 8, 45–57.
Tsfati, Y., & Weimann, G. (2002). www.terrorism.com: terror on the internet. Studies in Conflict & Terrorism, 25, 317–332.
Ulph, S. (2005). A guide to Jihad on the web. Global Terrorism Analysis, 3, 5–7.
West, A. (2008). Keynote speech for Government conference on homeland and border security. Downloaded from http://press.homeoffice.gov.uk/Speeches/Speech-by-Lord-West-Govnet on 26 September 2008.
White, R. K. (1951). Value-analysis: Nature and use of the method. Ann Arbor: Society for the Psychological Study of Social Issues.
Wilson, A., & Leech, G. N. (1993). Automatic content analysis and the stylistic analysis of prose literature. Revue: Informatique et Statistique dans les Sciences Humaines, 29, 219–234.
Zhou, Y., Reid, E., Qin, J., Chen, H., & Lai, G. (2005). US domestic extremist groups on the web: link and content analysis. IEEE Intelligent Systems, 20, 44–51.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Prentice, S., Taylor, P.J., Rayson, P. et al. Analyzing the semantic content and persuasive composition of extremist media: A case study of texts produced during the Gaza conflict. Inf Syst Front 13, 61–73 (2011). https://doi.org/10.1007/s10796-010-9272-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10796-010-9272-y