630
Views
11
CrossRef citations to date
0
Altmetric
Articles

‘Should each of us take over the role as watcher?’ Attitudes on Twitter towards the 2014 Norwegian terror alert

Pages 197-213 | Received 21 Mar 2015, Accepted 14 Apr 2015, Published online: 15 Jul 2015

References

  • Allan, S. 2014. Witnessing in crisis: Photo-reportage of terror attacks in Boston and London. Media, War & Conflict 7, no.2: 133–151.
  • Altheide, D.L. 2007. The mass media and terrorism. Discourse & Communication 1, no.3: 287–308.
  • Appleby, N. 2010. Labelling the innocent: how government counter-terrorism advice creates labels that contribute to the problem. Critical Studies on Terrorism 3, no.3: 421–436.
  • Baden, C., and N. Springer. 2014. Com(ple)menting the news on the financial crisis: The contribution of news users’ commentary to the diversity of viewpoints in the public debate. European Journal of Communication 29, no.5: 529–548.
  • Baker-Beall, C. 2014. The evolution of the European Union's ‘fight against terrorism’ discourse: Constructing the terrorist ‘other’. Cooperation and Conflict 49, no.2: 212–238.
  • Bartolucci, V. 2012. Terrorism rhetoric under the Bush Administration: Discourses and effects. Journal of Language & Politics 11, no.4: 562–582.
  • Bennett, D. 2013. Exploring the impact of an evolving war and terror blogosphere on traditional media coverage of conflict. Media, War & Conflict 6, no.1: 37–53.
  • Bhatia, A. 2008. Discursive illusions in the American National Strategy for Combating Terrorism. Journal of Language & Politics 7, no. 2: 201–227.
  • Bigo, D. 2002. Security and immigration: Toward a critique of the governmentality of unease. Alternatives: Global, Local, Political 27, no.1: 63–92.
  • Billig, M. 1996/1987. Arguing and thinking: A rhetorical approach to social psychology. Cambridge: Cambridge Univ. Press.
  • Bjørnland, B. 2014. Mulig terrortrussel mot Norge [Possible terror threat against Norway]. http://www.pst.no/media/pressemeldinger/mulig-terrortrussel-mot-norge/.
  • Buzan, B., O. Waever, and J. de Wilde. 1998. Security: A new framework for analysis. Boulder, CO: Lynne Rienner.
  • Cammaerts, B. 2008. Critiques on the participatory potentials of Web 2.0. Communication, Culture & Critique 1, no.4: 358–377.
  • Cohn, C. 2009. International security, language and gender. In Language and power: The implications of language for peace and development, eds. B. Brock-Utne and G. Garbo, 33–47. Dar es Salaam: Mkuki na Nyota Publishers Ltd.
  • Fischoff, B., R.M. Gonzalez, D.A. Small, and J.S. Lerner. 2003. Evaluating the success of terror risk communications. Biosecurity and Bioterrorism: Biodefence Strategy, Practice, and Science 1, no.4: 1–4.
  • Foucault, M. 2009. Security, territory, population: Lectures at the Collège de France 1977-1978. New York: Picador.
  • Gillmor, D. 2006. We the media: Grassroots journalism by the people, for the people. 2nd edition. Sebastopol, CA: O’Reilly Media.
  • Halliday, M.A.K. 2014. Hallidays introduction to functional grammar. 4th edition (revised by C.M.I.M. Matthiessen). London: Routledge.
  • Hind, R. 2014. Politiets håndtering av terrortrusselen i månedsskiftet juliaugust 2014 [The police's handling of the terrorist threat in late July-August 2014]. Oslo: TNS.
  • Hodges, A., and C. Nilep, eds. 2007. Discourse, war and terrorism. Amsterdam: John Benjamins.
  • Hogan, B., and A. Quan-Haase. 2010. Persistence and change in social media. Bulletin of Science, Technology & Society 30, no.5: 309–315.
  • Holland, J. 2013. Selling the war on terror: Foreign policy discourse after 9/11. Abingdon and New York: Routledge.
  • Kelley, P.G., M. Sleeper, and J. Cranshaw. 2013. Conducting research on Twitter: A call for guidelines and metrics. Paper presented at CSCW Measuring Networked Social Privacy Workshop, February 23–27, in San Antonio, TX, USA.
  • Kettell, S. 2013. Dilemmas of discourse: Legitimising Britain's war on terror. The British Journal of Politics & International Relations 15, no.2: 263–279.
  • Larsson, A.O., and H. Moe. 2014. Triumph of the underdogs? Comparing Twitter use by political actors during two Norwegian election campaigns. Sage Open 4, no.4: 1–13.
  • Lorenzo-Dus, N., and S. Marsh. 2012. Bridging the gap: Interdisciplinary insights into the securitization of poverty. Discourse & Society 23, no.3: 274–296.
  • MacDonald, M.N., D. Hunter, and J.P. O’Regan. 2013. Citizenship, community, and counter-terrorism: UK security discourse, 2001-2011. Journal of Language & Politics 12, no.3: 445–473.
  • Martin, J.R., and P.R. White. 2005. Language of evaluation: Appraisal in English. London: Palgrave Macmillan.
  • McInnes, C., and S. Rushton. 2013. HIV/AIDS and securitization theory. European Journal of International Relations 19, no.1: 115–138.
  • Metronet. 2014. Statistikk sosiale medier 2014 [Statistics social media 2014]. https://metronet.no/statistikk-sosiale-medier-2014/.
  • Mythen, G., and S. Walklate. 2006. Communicating the terrorist risk: Harnessing a culture of fear? Crime, Media, Culture 2, no.2: 123–142.
  • Norwegian Government. 2014. Pressekonferanse om mulig trussel [Press conference about possible threat]. https://www.regjeringen.no/nb/aktuelt/dep/jd/nett-tv/Pressekonferanse-om-mulig-terrortrussel/id765442/?regj_oss=10.
  • Norwegian Police. 2014. Råd fra politiet [Advice from the police]. https://www.politi.no.
  • NOU. 2012. 14. Rapport fra 22. juli-kommisjonen [Report from the 22 July Commission]. Oslo: Departementenes servicesenter, Informasjonsforvaltning.
  • O’Malley, P. 1996. Risk and responsibility. In Foucault and political reason, eds. A. Barry, T. Osborne, and N. Rose, 189–208. Chicago: The Univ. of Chicago Press.
  • Obdradovic, L. 2014. Gender integration in NATO military forces: Cross-national analysis. Farnham: Ashgate.
  • Potter, J. 1998. Discursive social psychology: From attitudes to evaluative practices. European Review of Social Psychology 9, no.1: 233–266.
  • Potter, J., and D. Edwards. 1992. Discursive psychology. London: Sage.
  • Potter, J., and M. Wetherell. 1987. Discourse and social psychology: Beyond attitudes and behaviour. London: Sage.
  • Rose, N. 1999. Powers of freedom: Reframing political thought. Cambridge: Cambridge Univ. Press.
  • Sarastuen, K. 2001. Forsvarer angrepet på USA [Defends the attack on USA]. Dagbladet, September 30, News section.
  • Shi-xu. 2015. Cultural discourse studies. In International encyclopedia of language and social interaction, eds. K., Tracy, C. Ilie, and T. Sandel, 1–9. Boston, MA: Wiley-Blackwell.
  • Stenvall, M. 2003. An actor or an undefined threat? Journal of Language & Politics 2, no.2: 361–404.
  • ‘Terrorism’. n.d. Oxford English Dictionary. http://www.oed.com.db.ub.oru.se/view/Entry/199608.
  • Thompson, J.B. 1996. The media and modernity: A social theory of the media. Cambridge: Polity Press.
  • TV2. 2014. Dette er siste nytt fra politiet om terrortrusselen [This is the latest news from the police regarding the terror threat]. http://www.tv2.no/a/5842123.
  • Waever, O. 1995. Securitization and desecuritization. In On security, ed, R. Lipschultz, 46–86. New York: Columbia Univ. Press.
  • Waever, O. 1997. Concepts of security. Copenhagen: Univ. of Copenhagen.
  • Yin, R.K. 1984. Case study research: Design and methods. Beverly Hills, CA: Sage.
  • Zappavigna, M. 2011. Ambient affiliation: A linguistic perspective on Twitter. New Media & Society 13, no.5: 788–806.
  • Zappavigna, M. 2012. Discourse of Twitter and social media: How we use language to create affiliation on the web. New York: Continuum.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.