Skip to main content

Advertisement

Log in

Analyzing the semantic content and persuasive composition of extremist media: A case study of texts produced during the Gaza conflict

  • Published:
Information Systems Frontiers Aims and scope Submit manuscript

Abstract

While terrorism informatics research has examined the technical composition of extremist media, there is less work examining the content and intent behind such media. We propose that the arguments and issues presented in extremist media provide insights into authors’ intent, which in turn may provide an evidence-base for detecting and assessing risk. We explore this possibility by applying two quantitative text-analysis methods to 50 online texts that incite violence as a result of the 2008/2009 Israeli military action in Gaza and the West Bank territories. The first method—a content coding system that identifies the occurrence of persuasive devices—revealed a predominance of moral proof arguments within the texts, and evidence for distinguishable ‘profiles’ of persuasion use across different authors and different group affiliations. The second method—a corpus-linguistic technique that identifies the core concepts and narratives that authors use—confirmed the use of moral proof to create an in-group/out-group divide, while also demonstrating a movement from general expressions of discontent to more direct audience-orientated expressions of violence as conflict heightened. We conclude that multi-method analyses are a valuable approach to building both an evidence-based understanding of terrorist media use and a valid set of applications within terrorist informatics.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Notes

  1. We develop this term from media studies’ accounts (Cottle 2006; Fuller 2007; Postman 2000) of the global mediated environment within which geographically dispersed individuals can be connected, for instance producers of extremist media and their potential audiences.

  2. PT also divided the ten texts into thought units, which we compared to the original coding using standard measures. The two coders were easily able to identify thought units within the texts reliably (Guetzkow score = .02).

  3. The reliability for the ‘pre-’ data coding was 80% (κ = .77); the reliability of the ‘post-’ data coding was 86% (κ = .84).

  4. Visit: http://ucrel.lancs.ac.uk/wmatrix/ and http://ucrel.lancs.ac.uk/usas/ for details of this software, including online access. The USAS pages also provide details of the full tag set, and details on how it is possible to make comparisons of composition between texts.

References

  • Atran, S. (2005). The “virtual hand” of Jihad. Global Terrorism Analysis, 3, 8–11.

    Google Scholar 

  • Awan, A. N. (2007). Virtual jihadist media: function, legitimacy, and radicalizing efficacy. European Journal of Cultural Studies, 10, 389–408.

    Article  Google Scholar 

  • Bakeman, R., Quera, V., McAuthur, D., & Robinson, B. (1997). Detecting sequential patterns and determining the reliability with faliable observers. Psychological Methods, 2, 357–370.

    Article  Google Scholar 

  • BBC News (2009a) ‘Blair warning about Gaza radicals’, 10 January, available at: http://news.bbc.co.uk/1/hi/uk/7821594.stm.

  • BBC News (2009b) Newsnight, 12 January.

  • Blazak, R. (2001). White boys to terrorist men: target recruitment of Nazi skinheads. American Behavioral Scientist, 44, 982–1000.

    Article  Google Scholar 

  • Bruins, J. (1999). Social power and influence tactics: a theoretical introduction. Journal of Social Issues, 55, 7–14.

    Article  Google Scholar 

  • Beune, K., Giebels, E., & Taylor, P. J. (2010). Interaction patterns in police interviews: The role of cultural dependency. Criminal Justice and Behavior, 37, 904–925.

    Google Scholar 

  • Chen, H., Qin, J., Reid, E., Chung, W., Zhou, Y., Xi, W., et al. (2004). The Dark Web portal: Collecting and analyzing the presence of domestic and international terrorist groups on the web. In Proceedings of International IEEE Conference on Intelligent Transportation Systems.

  • Cohen, J. A. (1960). A coefficient of agreement for nominal scales. Educational and Psychological Measurement, 20, 37–46.

    Article  Google Scholar 

  • Cottle, S. (2006). Mediatized conflict: Developments in media and conflict studies. Maidenhead: Open University Press.

    Google Scholar 

  • Economist. (2009). Now get back to making peace. Economist, 390, 51–52.

    Google Scholar 

  • Fuller, M. (2007). Media ecologies: Materialist energies in art and technoculture. Cambridge: MIT.

    Google Scholar 

  • Gass, R. H., & Seiter, J. S. (1999). Persuasion, social influence and compliance gaining. Needham Heights: Allyn & Bacon.

    Google Scholar 

  • Gerstenfeld, P. B., Grant, D. R., & Chiang, C.-P. (2003). Hate online: a content analysis of extremist internet sites. Analysis of Social Issues and Public Policy, 3, 29–44.

    Article  Google Scholar 

  • Giebels, E., & Noelanders, S. (2004). Crisis negotiations: A multiparty perspective. Veenendaal: Universal.

    Google Scholar 

  • Giebels, E., & Taylor, P. J. (2009). Interaction patterns in crisis negotiations: persuasive arguments and cultural differences. Journal of Applied Psychology, 94, 5–19.

    Article  Google Scholar 

  • HM Government. (2006). Countering international terrorism: The United Kingdom’s strategy. London: Crown.

    Google Scholar 

  • Ho, Y. (2007). Investigating the key concept differences between the two editions of John Fowler’s The Magus: A corpus semantic approach. Presentation at the 27th International Conference of the Poetics and Linguistics Association (PALA). Osaka, Japan.

  • Hoskins, A., & O’Loughlin, B. (2009). The Internet as a weapon of war? Radicalisation, publics and legitimacy. In A. Karatzogianni (Ed.), Cyber conflict and global politics (pp. 31–47). Abingdon: Routledge.

    Google Scholar 

  • Howell, D. C. (1997). Statistical methods for psychology (4th ed.). Belmont: Wadsworth.

    Google Scholar 

  • Hunston, S. (2002). Corpora in applied linguistics. Cambridge: Cambridge University Press.

    Google Scholar 

  • Jacques, K., & Taylor, P. J. (2008). Male and female suicide bombers: Different sexes, different reasons? Studies in Conflict and Terrorism, 31, 304–326.

    Article  Google Scholar 

  • Jacques, K., & Taylor, P. J. (2009). Female terrorism: a review. Terrorism and Political Violence, 21, 499–515.

    Article  Google Scholar 

  • Jerit, J. (2008). Issue framing and engagement: rhetorical strategy in public policy debates. Political Behaviour, 30, 1–24.

    Article  Google Scholar 

  • Krippendorff, K. (1980). Content analysis: An introduction to its methodology. Beverly Hills: Sage.

    Google Scholar 

  • Levine, M. (2002). Researching violence: power, social relations and the virtues of the experimental method. In R. Lee & E. Stanko (Eds.), Researching violence: methodology and measurement (pp. 125–135). London: Routledge.

    Google Scholar 

  • Loza, W. (2007). The psychology of extremism and terrorism: a Middle-Eastern perspective. Aggression and Violent Behavior, 12, 141–155.

    Article  Google Scholar 

  • MacEoin, D. (2007). The hijacking of British Islam: How extremist literature is subverting mosques in the UK. London: Policy Exchange.

    Google Scholar 

  • Malhotra, D., & Bazerman, M. H. (2008). Psychological influence in negotiation: an introduction long overview. Journal of Management, 9, 509–531.

    Article  Google Scholar 

  • Palmer, F. R. (1986). Mood and modality. Cambridge: Cambridge University Press.

    Google Scholar 

  • Payne, K. (2009). Winning the battle of ideas: propaganda, ideology, and terror. Studies in Conflict & Terrorism, 32, 109–128.

    Article  Google Scholar 

  • Postman, N. (2000). The humanism of media ecology. Proceedings of the Media Ecology Association, 1, 10–16.

    Google Scholar 

  • Qin, J., Zhou, Y., Reid, E., Lai, G., & Chen, H. (2007). Analyzing terror campaigns on the internet: technical sophistication, content richness, and web interactivity. International Journal of Human-Computer Studies, 65, 71–84.

    Article  Google Scholar 

  • Rayson, P. (2008). From key words to key semantic domains. International Journal of Corpus Linguistics, 13, 519–549.

    Article  Google Scholar 

  • Rayson, P. & Mariani, J. (2009). Visualising corpus linguistics. In M. Mahlberg, V. Gonzalez-Diaz, & C. Smith (Eds.), Proceedings of the Corpus Linguistics Conference 2009 (Article #426). Available for download at: http://ucrel.lancs.ac.uk/publications/cl2009/.

  • Smith, A. G. (2004). From words to action: exploring the relationship between a group’s value references and its likelihood of engaging in terrorism. Studies in Conflict and Terrorism, 27, 409–437.

    Article  Google Scholar 

  • Smith, A. G., Suedfeld, P., Conway, L. G., & Winter, D. G. (2008). The language of violence: distinguishing terrorist from nonterrorist groups by thematic content analysis. Dynamics of Asymmetric Conflict, 1, 142–163.

    Article  Google Scholar 

  • Stolcke, A., Coccaro, N., Bates, R., Taylor, P., Van Ess-Dykema, C., Ries, K., et al. (2000). Dialogue act modeling for automatic tagging and recognition of conversational speech. Computational Linguistics, 26, 339–373.

    Article  Google Scholar 

  • Taub, G. (2009). Parting shots. New Republic, 240, 12–13.

    Google Scholar 

  • Taylor, P. J. (2002). A cylindrical model of communication behavior in crisis negotiations. Human Communication Research, 28, 7–48.

    Article  Google Scholar 

  • Taylor, P. J., & Donald, I. J. (2004). The structure of communication behavior in simulated and actual crisis negotiations. Human Communication Research, 30, 443–478.

    Article  Google Scholar 

  • Taylor, P. J., & Donald, I. J. (2007). Testing the relationship between local cue-response patterns and global dimensions of communication behavior. British Journal of Social Psychology, 46, 273–298.

    Article  Google Scholar 

  • Taylor, P. J., Jacques, K., Giebels, E., Levine, M., Best, R., Winter, J., et al. (2008). Analysing forensic processes: taking time into account. Issues in Forensic Psychology, 8, 45–57.

    Google Scholar 

  • Tsfati, Y., & Weimann, G. (2002). www.terrorism.com: terror on the internet. Studies in Conflict & Terrorism, 25, 317–332.

    Article  Google Scholar 

  • Ulph, S. (2005). A guide to Jihad on the web. Global Terrorism Analysis, 3, 5–7.

    Google Scholar 

  • West, A. (2008). Keynote speech for Government conference on homeland and border security. Downloaded from http://press.homeoffice.gov.uk/Speeches/Speech-by-Lord-West-Govnet on 26 September 2008.

  • White, R. K. (1951). Value-analysis: Nature and use of the method. Ann Arbor: Society for the Psychological Study of Social Issues.

    Google Scholar 

  • Wilson, A., & Leech, G. N. (1993). Automatic content analysis and the stylistic analysis of prose literature. Revue: Informatique et Statistique dans les Sciences Humaines, 29, 219–234.

    Google Scholar 

  • Zhou, Y., Reid, E., Qin, J., Chen, H., & Lai, G. (2005). US domestic extremist groups on the web: link and content analysis. IEEE Intelligent Systems, 20, 44–51.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Paul J. Taylor.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Prentice, S., Taylor, P.J., Rayson, P. et al. Analyzing the semantic content and persuasive composition of extremist media: A case study of texts produced during the Gaza conflict. Inf Syst Front 13, 61–73 (2011). https://doi.org/10.1007/s10796-010-9272-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10796-010-9272-y

Keywords

Navigation