References
- Ahmad, I. (2009). Islamism and democracy in India: The transformation of Jamaat-e-Islami. Princeton, NJ: Princeton University Press.
- AQ Chef. (2010a). Make a bomb in the kitchen of your mom. Inspire Magazine, 1, 33–40. Retrieved from https://azelin.files.wordpress.com/2010/06/aqap-inspire-magazine-volume-1-uncorrupted.pdf
- AQ Chef. (2010b). Destroying buildings. Inspire Magazine, 4, 39–41. Retrieved from https://azelin.files.wordpress.com/2011/01/inspire-magazine-4.pdf
- AQ Chef. (2012). It is of your freedom to ignite a firebomb. Inspire Magazine, 9, 30–36. Retrieved from https://azelin.files.wordpress.com/2012/05/inspire-magazine-9.pdf
- AQ Chef. (2013). Causing road accidents. Inspire Magazine, 10, 52–55. Retrieved from https://azelin.files.wordpress.com/2013/03/inspire-magazine-issue-10.pdf
- AQ Chef. (2014a). Car bombs: Field data. Inspire Magazine, 12, 70–71. Retrieved from https://azelin.files.wordpress.com/2014/04/inspire-magazine-issue-12.pdf
- AQ Chef. (2014b). Car bombs inside America. Inspire Magazine, 12, 62–69. Retrieved from https://azelin.files.wordpress.com/2014/04/inspire-magazine-issue-12.pdf
- AQ Chef. (2015). Designing a timed hand grenade. Inspire Magazine, 14, 72–81. Retrieved from https://azelin.files.wordpress.com/2015/09/inspire-magazine-14.pdf
- Ashour, O. (2011). Post-Jihadism: Libya and the global transformations of armed Islamist movements. Terrorism and Political Violence, 23(3), 377–397. doi:10.1080/09546553.2011.560218
- Bellwoar, H. (2012). Everyday matters: Reception and use as productive design of health-related texts. Technical Communication Quarterly, 21(4), 325–345. doi:10.1080/10572252.2012.702533
- Berger, J. M. (2015). The metronome of apocalyptic time: Social media as carrier wave for millenarian contagion. Perspectives on Terrorism, 9(4), 61–71. Retrieved from http://www.terrorismanalysts.com/pt/index.php/pot/article/view/444/html
- Berger, J. M., & Morgan, J. (2015). The ISIS Twitter census: Defining and describing the population of ISIS supporters on Twitter (Analysis Paper no. 20). The Brookings Project on U.S. Relations with the Islamic World. Retrieved from https://www.brookings.edu/wp-content/uploads/2016/06/isis_twitter_census_berger_morgan.pdf
- Bjørgo, T. (2013). Strategies for preventing terrorism. New York, NY: Palgrave Macmillan.
- Brachman, J. (2008). Global Jihadism: Theory and practice. New York, NY: Routledge.
- Burke, K. (1937). Attitudes toward history (3rd ed.). Berkeley, CA: University of California Press.
- Burke, K. (1954). Fact, inference, and proof in the analysis of literary symbolism. In L. Bryson (Ed.), Symbols and values: An initial study (Thirteenth Symposium of the Conference on Science, Philosophy, and Religion) (pp. 283–306). New York, NY: Harper.
- Burke, K. (1957). Philosophy of literary form: Studies in symbolic action. New York, NY: Vintage Books.
- Burke, K. (1959). A rhetoric of motives. Englewood Cliffs, NJ: Prentice Hall.
- Burke, K. (1966). Language as symbolic action. Berkeley, CA: University of California Press.
- Calamur, K. (2016, February 5). Twitter’s new ISIS policy. The Atlantic. Retrieved from http://www.theatlantic.com/international/archive/2016/02/twitter-isis/460269/
- Dauber, C. E. (2014). The branding of violent Jihadism. Visual propaganda and extremism in the online environment. The United States Army War College. Retrieved from https://www.ciaonet.org/attachments/26508/uploads
- de Certeau, M. (1988). The practice of everyday life. Berkeley, CA: University of California Press.
- de Certeau, M. (1998). The practice of everyday life: Living and cooking (Vol. 2). Minneapolis, MN: University of Minnesota Press.
- Department of Homeland Security. (n.d.). If you see something, say something. U.S. Department of Homeland Security. Retrieved from https://www.dhs.gov/see-something-say-something
- Ding, D. D. (2010). Introducing China’s first comprehensive technical writing book: On technological subjects by Song Yingxing. Journal of Technical Writing and Communication, 40(2), 161–177. doi:10.2190/TW.40.2.d
- Ding, H. (2009). Rhetorics of alternative media in an emerging epidemic: SARS, censorship, and extra-institutional risk communication. Technical Communication Quarterly, 18(4), 327–350. doi:10.1080/10572250903149548
- Dobrin, D. (1985). Do not grind armadillo armor in this mill. IEEE Transactions on Professional Communication, 28(4), 30–37. doi:10.1109/TPC.1985.6448846
- Durack, K. T. (1997). Gender, technology, and the history of technical communication. Technical Communication Quarterly, 6(3), 249–260. doi:10.1207/s15427625tcq0603_2
- Ellis, R., Karimi, F., & McLauchlin, E. C. (2016, June 13). Orlando shooting: 49 killed, shooter pledged ISIS allegiance. CNN. Retrieved from http://www.cnn.com/2016/06/12/us/orlando-nightclub-shooting/
- Forest, J. J. F. (2006). Teaching terror: Strategic and tactical learning in the terrorist world. Lanham, MD: Rowman & Littlefield.
- Foss, S. K. (2004). Rhetorical criticism: Explorations and practice (4th ed.). Long Grove, IL: Waveland.
- Gaibulloev, K., Sandler, T., & Santifort, C. (2012). Assessing the evolving threat of terrorism. Global Policy, 3(2), 135–144. doi:10.1111/gpol.2012.3.issue-2
- Goodwin, D. (1991). Emplotting the reader: Motivation and technical documentation. Journal of Technical Writing and Communication, 21(2), 99–115. doi:10.2190/1TLD-2JBL-DD7X-PXK3
- Guitiérrez, J. A., Jordan, J., & Trujillo, H. (2008). Prevention of Jihadist radicalization in Spanish prisons. Current situation, challenges and dysfunctions of the penitentiary system. Athena Intelligence Journal, 3(1), 1–9.
- Hallenbeck, S. (2012). User agency, technical communication, and the 19th-century woman bicyclist. Technical Communication Quarterly, 21(4), 290–306. doi:10.1080/10572252.2012.686846
- Harris, E. (1983). A theoretical perspective on “how to” discourse. In P. V. Anderson, R. J. Brockmann, & C. R. Miller (Eds.), New essays on technical and scientific communication: Research, theory, practice (pp. 139–156)). Farmingdale, NY: Baywood Publishing Company.
- Hasan, N. (2002). Faith and politics: The rise of the Laskar Jihad in the era of transition in Indonesia. Indonesia, 73, 145–169. doi:10.2307/3351472
- Hegghammer, T. (2006). Terrorist recruitment and radicalization in Saudi Arabia. Middle East Policy, 13(4), 39–60. doi:10.1111/mepo.2006.13.issue-4
- Helfstein, S. (2012). Edges of radicalization: Ideas, individuals and networks in violent extremism. Combating Terrorism Center at West Point. Retrieved from https://www.ctc.usma.edu/posts/edges-of-radicalization-ideas-individuals-and-networks-in-violent-extremism
- Hoffman, B. (2007a). Countering terrorist use of the web as a weapon. Combatting Terrorism Center at West Point. Retrieved from https://www.ctc.usma.edu/posts/countering-terrorist-use-of-the-web-as-a-weapon
- Hoffman, B. (2007b). The global terrorist threat: Is Al-Qaeda on the run or on the march? Middle East Policy, 14(2), 44–58. doi:10.1111/j.1475-4967.2007.00296.x
- Jarvis, L., & Lister, M. (2014). State terrorism research and critical terrorism studies: An assessment. Critical Studies on Terrorism, 7(1), 43–61. doi:10.1080/17539153.2013.877669
- Jenkins, B. M. (2010). Would-be warriors: Incidents of Jihadist terrorist radicalization in the United States since September 11, 2001. Santa Monica, CA: RAND.
- Johnson, R. R. (1998). User-centered technology. Albany, NY: State University of New York Press.
- Joscelyn, T. (2015, December 17). San Bernardino terrorists allegedly studied AQAP’s Inspire magazine, pledged allegiance to Baghdadi. The Long War Journal. Retrieved from http://www.longwarjournal.org/archives/2015/12/san-bernardino-terrorists-allegedly-studied-aqaps-inspire-magazine-pledged-allegiance-to-baghdadi.php
- Kabbani, S. M. H., & Hendricks, S. S. (n.d.). Jihad: A misunderstood concept from Islam—what Jihad is, and is not. This Islamic Supreme Council of America. Retrieved from http://islamicsupremecouncil.org/understanding-islam/legal-rulings/5-jihad-a-misunderstood-concept-from-islam.html?start=9
- Karreman, J., Ummelen, N., & Steehouder, M. (2005). Procedural and declarative information in user instructions: What we do and don’t know about these information types. 2005 IEEE International Professional Communication Conference Proceedings (Institute of Electrical and Electronics Engineers [IEEE], pp. 328–333). Retrieved from http://ieeexplore.ieee.org.proxy.lib.wayne.edu/stamp/stamp.jsp?arnumber=1494193
- Katz, S. B. (1992). The ethic of expediency: Classical rhetoric, technology, and the Holocaust. College English, 54(3), 255–275. doi:10.2307/378062
- Khosrokhavar, F. (2013). Inside Jihadism: Understanding Jihadi movements worldwide. New York, NY: Routledge.
- Kimball, M. A. (2006). Cars, culture, and tactical technical communication. Technical Communication Quarterly, 15(1), 67–86. doi:10.1207/s15427625tcq1501_6
- Koerber, A. (2006). Rhetorical agency, resistance, and the disciplinary rhetorics of breastfeeding. Technical Communication Quarterly, 15(1), 87–101. doi:10.1207/s15427625tcq1501_7
- Lemieux, A. F., Brachman, J., Levitt, J., & Wood, J. (2014). Inspire magazine: A critical analysis of its significance and potential impact through the lens of the information, motivation, and behavioral skills model. Terrorism and Political Violence, 26(2), 354–371. doi:10.1080/09546553.2013.828604
- Leuprecht, C., Hataley, T., Moskalenko, S., & McCauley, C. (2010). Containing the narrative: Strategy and tactics in countering the storyline of global Jihad. Journal of Policing, Intelligence and Counter Terrorism, 5(1), 42–57. doi:10.1080/18335300.2010.9686940
- Lipus, T. (2006). International consumer protection: Writing adequate instructions for global audiences. Journal of Technical Writing & Communication, 36(1), 75–91. doi:10.2190/88T5-8MFH-8MA6-QVAL
- Loorbach, N., Steehouder, M., & Taal, E. (2006). The effects of motivational elements in user instructions. Journal of Business and Technical Communication, 20(2), 177–199. doi:10.1177/1050651905284404
- Mackiewicz, J. (2010). The co-construction of credibility in online product reviews. Technical Communication Quarterly, 19(4), 403–426. doi:10.1080/10572252.2010.502091
- Magdy, W., Darwish, K., & Weber, I. (2016). #FailedRevolutions: Using Twitter to study the antecedents of ISIS support. First Monday, 21(2). doi:10.5210/fm.v21i2.6372
- Mamdani, M. (2002). Good Muslim, bad Muslim: A political perspective on culture and terrorism. American Anthropologist, 104(3), 766–775. doi:10.1525/aa.2002.104.3.766
- Miles, K. S., & Cottle, J. L. (2010). Beyond plain language: A learner-centered approach to pattern jury instructions. Technical Communication Quarterly, 20(1), 92–112. doi:10.1080/10572252.2011.528345
- Miller, C. R. (1979). A humanistic rationale for technical writing. College English, 40(6), 610–617. doi:10.2307/375964
- Morain, M., & Swarts, J. (2012). YouTutorial: A framework for assessing instructional online video. Technical Communication Quarterly, 21(1), 6–24. doi:10.1080/10572252.2012.626690
- MTAInfo. (2016, March 21). If you see something, say something—2016. YouTube. Retrieved from https://www.youtube.com/watch?v=7sxiateCgrI
- Novenario, C. M. I. (2016). Differentiating Al Qaeda and the Islamic State through strategies publicized in Jihadist magazines. Studies in Conflict & Terrorism, 39(11), 953–967. doi:10.1080/1057610X.2016.1151679
- Paradis, J. (1991). Text and action: The operator’s manual in context and court. In C. Bazerman & J. G. Paradis (Eds.), Textual dynamics of the professions: Historical and contemporary studies of writing in professional communities (pp. 256–278). Madison, WI: University of Wisconsin Press.
- Potts, L. (2013). Social media in disaster response: How experience architects can build for participation. New York, NY: Routledge.
- Reder, L. M., Charney, D. H., & Morgan, K. I. (1986). The role of elaborations in learning a skill from an instructional text. Memory & Cognition, 14(1), 64–78. doi:10.3758/BF03209230
- Riaz, A., & Fair, C. C. (2010). Political Islam and governance in Bangladesh. London, England: Routledge.
- Rosemont, H. (2014). Private sector engagement in the UK’s counter-terrorism strategy: A new agenda. Behavioral Sciences of Terrorism and Political Aggression, 6(2), 147–161. doi:10.1080/19434472.2013.860184
- Rudner, M. (2016). “Electronic Jihad”: The Internet as Al Qaeda’s catalyst for global terror. Studies in Conflict & Terrorism, 1–14. doi:10.1080/1057610X.2016.1157403
- Sageman, M. (2008). Leaderless Jihad: Terror networks in the twenty-first century. Philadelphia, PA: University of Pennsylvania Press.
- Sageman, M. (2014). The stagnation in terrorism research. Terrorism and Political Violence, 26(4), 565–580. doi:10.1080/09546553.2014.895649
- Sedgwick, M. (2015). Jihadism, narrow and wide: The dangers of loose use of an important term. Perspectives on Terrorism, 9(2), 34–41. Retrieved from http://www.terrorismanalysts.com/pt/index.php/pot/article/view/417
- Selber, S. A. (2010). A rhetoric of electronic instruction sets. Technical Communication Quarterly, 19(2), 95–117. doi:10.1080/10572250903559340
- Sivek, S. C. (2013). Packaging inspiration: Al Qaeda’s digital magazine Inspire in the self-radicalization process. International Journal of Communication, 7, 584–606.
- Sparago, M. (2007). Terrorist recruitment: The crucial case of Al Queda’s global Jihad terror network. New York, NY: New York University, Center for Global Affairs. Retrieved from http://www.scps.nyu.edu/export/sites/scps/pdf/global-affairs/marta-sparago.pdf
- Speckhard, A. (2013). The Boston Marathon bombers: The lethal cocktail that turned troubled youth to terrorism. Perspectives on Terrorism, 7(3), 64–78. Retrieved from http://www.terrorismanalysts.com/pt/index.php/pot/article/view/268
- Stern, J. (2014). Response to Marc Sageman’s “The Stagnation in Terrorism Research.” Terrorism and Political Violence, 26(4), 607–613. doi:10.1080/09546553.2014.895654
- Tebeaux, E. (1999). The emergence of women technical writers in the 17th century: Changing voices within a changing milieu. In T. Kynell & M. G. Moran (Eds.), Three keys to the past: The history of technical communication (Vol. 7, pp. 105–122). Stamford, CT: Ablex.
- Tebeaux, E. (2010). English agriculture and estate management instructions, 1200–1700: From orality to textuality to modern instructions. Technical Communication Quarterly, 19(4), 352–378. doi:10.1080/10572252.2010.502512
- Todd, J. (2014). Avoiding litigation for product instructions and warnings. Journal of Technical Writing & Communication, 44(4), 401–421. doi:10.2190/TW.44.4.d
- van der Meij, H., & van der Meij, J. (2013). Eight guidelines for the design of instructional videos for software training. Technical Communication, 60(3), 205–228.
- Van Ittersum, D. (2014). Craft and narrative in DIY instructions. Technical Communication Quarterly, 23(3), 227–246. doi:10.1080/10572252.2013.798466
- Veilleux-Lepage, Y. (2014, December 4–7). Retweeting the caliphate: The role of soft-sympathizers in the Islamic State’s social media strategy. Paper presented at the 6th International Symposium on Terrorism and Transnational Crime, Antalya, Turkey. Retrieved from https://www.researchgate.net/publication/273896091_Retweeting_the_Caliphate_The_Role_of_Soft-Sympathizers_in_the_Islamic_State%27s_Social_Media_Strategy
- Venkatraman, A. (2007). Religious basis for Islamic terrorism: The Quran and its interpretations. Studies in Conflict & Terrorism, 30(3), 229–248. doi:10.1080/10576100600781612
- Watts, C. (2015, January 12). Inspired, networked & directed—The muddled Jihad of ISIS & Al Qaeda post Hebdo. War on the Rocks. Retrieved from http://warontherocks.com/2015/01/inspired-networked-directed-the-muddled-jihad-of-isis-al-qaeda-post-hebdo/
- Weimann, G. (2012). Lone wolves in cyberspace. Journal of Terrorism Research, 3(2), 76–90. doi:10.15664/jtr.405
- Wright, P. (1981). “The instructions clearly state” can’t people read? Applied Ergonomics, 12(3), 131–141. doi:10.1016/0003-6870(81)90002-8
- Zelin, A. Y. (2014). The war between ISIS and Al-Qaeda for supremacy of the global Jihadist movement. Research Notes—The Washington Institute for Near East Policy, 20, 2–11.
- Zhang, J. (2007). Beyond anti-terrorism: Metaphors as message strategy of post-September-11 U.S. public diplomacy. Public Relations Review, 33(1), 31–39. doi:10.1016/j.pubrev.2006.11.006