3,232
Views
1
CrossRef citations to date
0
Altmetric
Articles

Measuring socio-psychological drivers of extreme violence in online terrorist manifestos: an alternative linguistic risk assessment model

ORCID Icon, ORCID Icon & ORCID Icon
Pages 125-143 | Received 18 Jan 2023, Accepted 30 Jul 2023, Published online: 23 Aug 2023

Works Cited

  • Alon, N., & Omer, H. (2005). The psychology of demonization: Promoting acceptance and reducing conflict. London: Routledge.
  • al-Qaradawi, D. Y. (1960). The lawful and prohibited in Islam. Davao City: Wisdom International School for Higher Educational Studies (WISHES).
  • Amanullah, Z., & Harrasy, A. (2017). Between two extremes: Responding to Islamist and Tribalist messaging online in Kenya during the 2017 elections. London: ISD.
  • Anderson, L., & Lepore, E. (2013). Slurring words. Noûs, 47, 25–48. doi:10.1111/j.1468-0068.2010.00820.x
  • Bale, J. (2007). Political paranoia v. political realism: On distinguishing between bogus conspiracy theories and genuine conspiratorial politics. Patterns of Prejudice, 41, 45–60. doi:10.1080/00313220601118751
  • Bansal, S., Vishal, G., Suhane, A., Patro, J., & Mukherjee, A. (2020). Code-switching patterns can be an effective route to improve performance of downstream NLP applications: A case study of humour, sarcasm and hate speech detection. Association for Computational Linguistics, 1028–1023.
  • Becker, D. M., Troschke, H., & Allington, D. D. (2021). Decoding antisemitism: An AI-driven study on hate speech & imagery online. Berlin: TU Berlin.
  • Becker, M. H. (2019). When extremists become violent: Examining the association between social control, social learning, and engagement in violent extremism. Studies in Conflict & Terrorism 44(12), 1104–1124.
  • Berger, J. M. (2018). Extremism. The MIT essential knowledge series. Cambridge, MA: The MIT Press.
  • Blom, A. (2011). Do Jihadist ‘Martyrs’ really want to die? An emic approach to self-sacrificial radicalization in Pakistan. Revue française de science politique, 61, 867–891. doi:10.3917/rfsp.615.0867
  • Buhrmeister, M., Zeitlyn, D., & Whitehouse, H. (2020). Ritual, fusion and conflict. Group Processes & Intergroup Relations, 25(1), 298–311. doi:10.1177/1368430220959705
  • Buhrmester, M., Fraser, W. T., Lanman, J. A., Whitehouse, J., & Swann, W. B. (2015). When terror hits home: Identity fused Americans who saw Boston bombing victims as “family” provided aid. Self and Identity, 14(3), 253–270. doi:10.1080/15298868.2014.992465
  • Calderón, F. H., Balani, N., & Taylor, J. (2021). Linguistic patterns for code word resilient hate speech identification. Sensors, 21(23), 7859. doi:10.3390/s21237859
  • CASM. (2016, May 26). New Demos study reveals scale of social media misogyny. Abgerufen am 3. December 2019 von Demos: https://demos.co.uk/press-release/staggering-scale-of-social-media-misogyny-mapped-in-new-demos-study/
  • Čehajić, S., Brown, R., & González, R. (2009). What do I care? Perceived ingroup responsibility and dehumanization as predictors of empathy felt for the victim group. Group Processes & Intergroup Relations, 12, 715–729. doi:10.1177/1368430209347727
  • Clemmow, C., Gill, P., Bouhana, N., Silver, J., & Horgan, J. (2020). Disaggregating lone-actor grievance-fueled violence: Comparing lone-actor terrorists and mass murderers. Terrorism and Political Violence, 34(3), 558–584. doi:10.1080/09546553.2020.1718661
  • Cohen, K., Johansson, F., Kaati, L., & Mork, J. C. (2014). Detecting linguistic markers for radical violence in social media. Terrorism and Political Violence, 26(1), 246–256. doi:10.1080/09546553.2014.849948
  • Davey, J., Comerford, M., Guhl, J., Baldet, W., & Colliver, C. (2021). A taxonomy for the classification of post-organisational violent extremist & terrorist content. London: Institute for Strategic Dialogue (ISD).
  • Davey, J., & Ebner, J. (2019). ‘The great replacement’: The violent consequences of mainstreamed extremism. London: Institute for Strategic Dialogue.
  • de Beauvoir, S. (1949). Le Deuxième Sexe. Paris: Editions Gallimard.
  • Ebner, J. (2020). Going dark: The secret social lives of extremists. London: Bloomsbury.
  • Ebner, J., Kavanagh, C., & Whitehouse, H. (2022). Is there a language of terrorists: A comparative manifesto analysis. Studies in Conflict and Terrorism, 1–28.
  • el-Husseini, R. (2008). Resistance, jihad, and martyrdom in contemporary Lebanese Shi’a discours. Middle East Journal, 62(3), 399–414. doi:10.3751/62.3.12
  • Federal Bureau of Investigation. (2022, November 15). What we investigate: FBI threat intimidation guide. Von FBI. https://www.fbi.gov/investigate/counterintelligence/threat-intimidation-guide#Eletronic-message%20threat abgerufen
  • Fielitz, M., Ebner, J., Guhl, J., & Quent, M. (2018). Loving hate: Anti-Muslim extremism, radical Islamism and the spiral of polarization. Jena, London, Berliln: IDZ and ISD.
  • Fjordman. (2008). Defeating Eurabia. self-published book.
  • Fraise, T. (2017). Shades of jihad: Variation of military ethics between ISIS and alQaeda. Paris: Sciences Po Kuwait Program Research Paper.
  • Gales, T. (2015). Threatening stances: a corpus analysis of realized vs. non-realized threats. Language and Law, 2(2), 1–25.
  • Gill, P., Horgan, J., & Deckert, P. (2014). Bombing alone: Tracing the motivations and antecedent behaviors of terrorists. Journal of Forensic Sciences, 59(2), 425–435. doi:10.1111/1556-4029.12312
  • Hafez, M. M. (2007). Martyrdom mythology in Iraq: How jihadists frame suicide terrorism in videos and biographies. Terrorism and Political Violence, 19(1), 95–115. doi:10.1080/09546550601054873
  • Hewitt, J., & Benjamin Lee, S. M. (2022). Protective factors in risk assessment: Practitioner perspectives. London: Centre for Research and Evidence on Security Threats (CREST).
  • Hirschberger, G., Ein-Dor, T., Leidner, B., & Saguy, T. (2016). How is existential threat related to intergroup conflict? Introducing the multidimensional existential threat (MET) model. Front Psychology, 7, 1877. doi:10.3389/fpsyg.2016.01877
  • HM Government. (2015). Counter-terrorism and security act 2015. Von Legislation: https://www.legislation.gov.uk/ukpga/2015/6/contents/enacted.abgerufen
  • Hoffman, B., War, J., & Shapiro, E. (2020). Assessing the threat of incel violence. St Andrew’s: St Andrew’s University.
  • Horgan, J. G., Gill, P., Bouhana, N., Silver, J., & Corner, E. (2016). Across the universe? A comparative analysis of violent behavior and radicalization across three offender types with implications for criminal justice training and education. Washington D.C.: Research report submitted to the U.S. Department of Justice.
  • ISD. (2022). Extremism defintiion. Von institute for strategic dialogue. https://www.isdglobal.org/extremism/.abgerufen
  • Jeshion, R. (2013). Slurs and stereotypes. Analytic Philosophy, 54(3), 314–329. doi:10.1111/phib.12021
  • Kaati, L., Shrestha, A., & Cohen, K. (2016). Linguistic analysis of lone offender manifestos. Von 2016 IEEE international conference on cybercrime and computer forensic (ICCCF). https://www.foi.se/download/18.7fd35d7f166c56ebe0b1003b/1542623789571/Linguistic-analysis-of-lone_FOI-S–5650–SE.pdf abgerufen
  • Kavanagh, C., Kapitány, R., Putra, I. E., & Whitehouse, H. (2020). Exploring the pathways between transformative group experiences and identity. Frontiers in Psychology 11, 1–16.
  • King, M. L., Jr. (1963). I have a dream. Speech. Washington, DC.
  • Klein, C., Clutton, P., & Dunn, A. (2019). Pathways to conspiracy: The social and linguistic precursors of involvement in Reddit’s conspiracy theory forum. PLoS ONE, 14(11). doi:10.1371/journal.pone.0225098
  • Knight, S., Woodward, K., & Lancaster, G. (2017). Violent versus non-violent actors: Empirical study of different types of extremism. American Psychological Association 4(4), 230–248.
  • Kriner, M., Conroy, M., & Ashwal, Y. (2021). Understanding accelerationist narratives: ‘There is no political solution’. London: GNET Report, Kings College.
  • Kundnani, A. (2012). The anti-Islamist: Anders Behring Breivik’s manifesto. The Hague: International Center for Counter-Terrorism (ICCT).
  • Lifton, R. (1988). The Nazi doctors: Medical killing and the psychology of genocide. New York City: Basic Books.
  • Louis, W. R., Taylor, D. M., & Douglas, R. L. (2005). Normative influence and rational conflict decisions: Group norms and cost-benefit analyses for intergroup behavior. Group Processes & Intergroup Relations, 8(4), 355–374. doi:10.1177/1368430205056465
  • Meloy, J. R., Roshdi, K., Glaz-Ocik, J., & Hoffmann, J. (2015). Investigating the individual terrorist in Europe. Journal of Threat Assessment and Management, 2(3-4), 140–152. doi:10.1037/tam0000036
  • Miller, C. (2016). From Brussels to Brexit: Islamophobia, xenophobia, racism and reports of hateful incidents on Twitter. London: Demos.
  • Miller-Idriss, C. (2021). White supremacist extremism and the far right in the U.S. Farmington Hills: Gale Primary Sources/Cengage.
  • Monahan, J. (2012). The individual risk assessment of terrorism. Psychology, Public Policy, and Law, 18(2), 167–205. doi:10.1037/a0025792
  • Murrow, G. B., & Murrow, R. (2015). A hypothetical neurological association between dehumanization and human rights abuses. Journal of Law and Biosciences, 2(2), 336–364. doi:10.1093/jlb/lsv015
  • NCTC. (2022). Use of memes by violent extremists. Washington, DC: NCTC, DHS, FBI.
  • Newson, M. (2019). Football, fan violence, and identity fusion. International Review for the Sociology of Sport, 54(4). doi:10.1177/1012690217731293
  • Pennebaker, J., & Chung, C. K. (2008). Computerized text analysis of Al-Qaeda transcripts. In K. Krippendorf & M. A. Bock (Eds.), The content analysis reader (pp. 453–465). Newbury Park, CA: Sage.
  • Radicalisation Awareness Network. (2021). The gamification of violent extremism & lessons for P/CVE. Luxembourg: Publications Office of the European Union.
  • Richter, E. D., Markus, D. K., & Tait, C. (2018). Incitement, genocide, genocidal terror, and the upstream role of indoctrination: Can epidemiologic models predict and prevent? Public Health Review, 39(30), 1–22.
  • Sage Research Methods. (2016). Digital social research: Centre for the analysis of social media (CASM). Abgerufen am 3. December 2019 von https://methods.sagepub.com/video/digital-social-research-centre-for-the-analysis-of-social-media-casm
  • Sarma, K. M. (2017). Risk assessment and the prevention of radicalization from nonviolence into terrorism. American Psychologist, 72(3), 278–288. doi:10.1037/amp0000121
  • Schwarz-Friesel, M. (2015). Using language as a weapon: Verbal manifestations of contemporary anti-semitism. In R. Schulze & H. Pishwa (Eds.), The exercise of power in communication (pp. 161–183). London: Palgrave Macmillan.
  • Scrivens, R. (2022). Examining online indicators of extremism among violent and non-violent right-wing extremists. Terrorism and Political Violence 35(6), 1389–1409.
  • Silke, A. (2019). Routledge handbook of terrorism and counterterrorism. Abingdon: Routledge.
  • Spears, R. (2010). Group rationale, collective sense: Beyond intergroup bias. British Journal of Social Psychology, 49, 1–20. doi:10.1348/014466609X481308
  • Spini, D., Elcheroth, G., & Fasel, R. (2008). The impact of group norms and generalization of risks across groups on judgments of war behavior. Political Psychology, 29(6), 920–941. doi:10.1111/j.1467-9221.2008.00673.x
  • Sugiura, L. (2021). The incel rebellion: The rise of the manosphere and the virtual war against women. Bingley: Emerald Publishing Limited.
  • Swann, W. B., & Buhrmeister, M. D. (2015). Identity fusion. Current Directions in Psychological Science, 24(1), 52–57. doi:10.1177/0963721414551363
  • Swann, W. B., Buhrmester, M. D., Gómez, A., Jetten, J., Bastian, B., Vázquez, A., … Finchilescu, G. (2014). What makes a group worth dying for? Identity fusion fosters perception of familial ties, promoting self-sacrifice. Journal of Personality and Social Psychology, 106, 912–926. doi:10.1037/a0036089
  • Technau, B. (2018). Going beyond hate speech: The pragmatics of ethnic slur terms. Lodz Papers in Pragmatics, 14(1), 25–43. doi:10.1515/lpp-2018-0002
  • The Council of Europe. (2022, November 12). Types of cyberviolence, cyberviolence at a glance. Von CoE. https://www.coe.int/en/web/cyberviolence/types-of-cyberviolence abgerufen
  • Thomas, E. F., & Louis, W. R. (2014). When will collective action be effective? Violent and non-violent protests differentially influence perceptions of legitimacy and efficacy amongst supporters. Personality and Social Psychology Bulletin, 40, 263–276. doi:10.1177/0146167213510525
  • Thunberg, G. (2019). Our house is on fire. Forum insight. Davos: World Economic Forum.
  • U.S. Government Publishing Office. (2022). The dynamic terrorism landscape and what It means for America. Washington, DC: Hearing Before the Committee on Homeland Security, House of Representatives, 117th Congress.
  • Vaes, J., Leyens, J.-P., Paladino, M. P., & Miranda, M. P. (2012). We are human, they are not: Driving forces behind outgroup dehumanisation and the humanisation of the ingroup. European Review of Social Psychology, 2(1). doi:10.1080/10463283.2012.665250
  • Van der Vegt, I., Kleinberg, B., & Gill, P. (2023). Proceed with caution: On the use of computational linguistics in threat assessment. Journal of Policing, Intelligence and Counter Terrorism, 18(2), 231–239. doi:10.1080/18335330.2023.2165137
  • Veilleux-Lepage, Y. (2021). CTRL, HATE, PRINT: Terrorists and the appeal of 3D-printed weapons. The Hague: ICCT.
  • Viki, G., Winchester, L., Titshall, L., & Chisango, T. (2006). Beyond secondary emotions: The infra-humanisation of groups using human-related and animal-related words. Social Cognition, 24, 753–775. doi:10.1521/soco.2006.24.6.753
  • Ware, J. (2020). Testament to murder: The violent far-right’s increasing use of terrorist manifestos. The Hague: International Center for Counter Terrorism (ICCT).
  • Whitehouse, H. (2018). Dying for the group: Towards a general theory of extreme self-sacrifice. Behavioral and Brain Sciences, 41, 1–62. doi:10.1017/S0140525X17000012
  • Whitehouse, H., & Lanman, J. A. (2014). The ties that bind us: Ritual, fusion, and identification. Current Anthropology, 55(6), 674–695. doi:10.1086/678698
  • Whitehouse, H., McQuinn, B., Buhrmeister, M., & Swann, W. (2014). Brothers in arms: Libyan revolutionaries bond like family. Proceedings of the National Academy of Sciences, 111(50), 17783–17785. doi:10.1073/pnas.1416284111
  • Wolfowicz, M., Litmanovitz, Y., Weisburd, D., & Hasisi, B. (2019). A field-wide systematic review and meta-analysis of putative risk and protective factors for radicalisation outcomes. Journal of Quantitative Criminology 3, 407–447.