References
- Akerman, S. (2015, May 20). US releases more than 100 documents recovered in Osama bin Laden raid. Retrieved from http://www.theguardian.com/world/2015/may/20/us-releases-documents-from-osama-bin-laden-raid
- Aly, A., Weimann-Saks, D., & Weimann, G. (2014). Making noise online: An analysis of the say no to terror online campaign. Perspectives on Terrorism, 8(5), 33–47. Retrieved from http://www.terrorismanalysts.com/pt/index.php/pot/article/view/376/749
- Amarasingham, A. (2015, December 30). What Twitter really means for IS supporters. Retrieved from http://warontherocks.com/2015/12/what-twitter-really-means-for-islamic-state-supporters
- Amble, J. (2012). Combating terrorism in the new media environment. Studies in Conflict and Terrorism, 35(5), 339–353. doi: 10.1080/1057610X.2012.666819
- Baines, P., & Shaughnessy, N. (2014). Al-Qaida messaging evolution and positioning, 1998–2008: Propaganda analysis revisited. Public Relations Inquiry, 3(2), 163–191. doi: 10.1177/2046147X14536723
- Barrett, R. (2014). Foreign fighters in Syria. New York, NY: The Soufan Group. Retrieved from http://soufangroup.com/foreign-fighters-in-syria
- BBC. (2013, February 4). Somalia’s al-Shabaab opens new Twitter account. Retrieved from http://www.bbc.com/news/world-africa-21321687
- Beck, C. (2008). The contribution of social movement theory to understanding terrorism. Sociology Compass, 2(5), 1565–1581. doi: 10.1111/j.1751-9020.2008.00148.x
- Bergen, P. (2016, July 6). ISIS online: Countering Terrorist Radicalization & Recruitment on the Internet and Social Media. US Senate Committee on Homeland Security. Retrieved from www.hsgac.senate.gov/download/bergen-testimony-psi-2016-07-06
- Berger, J. M. (2015). The metronome of apocalyptic time: Social media as carrier wave for a millenarian contagion. Perspective on Terrorism, 9(4). Retrieved from http://www.terrorismanalysts.com/pt/index.php/pot/article/view/444/html
- Berlo, D. (1960). The process of communication. New York, NY: Holt Publishing.
- Berlo, D., LeMart, J., & Mertz, R. (1970). Dimensions for evaluating the acceptability of message sources. Public Opinion Quarterly, 33(4), 563–576. doi: 10.1086/267745
- Boster, F. (2006). Communication as social influence. In G. Shephard, J. St. John, & T. Striphas (Eds.), Communication as … perspectives on theory (pp. 180–187). Thousand Oaks, CA: Sage.
- Brachmann, J. (2012). Going viral: Al-Qaida’s use of social media. In R. Howard & B. Hoffman (Eds.), Terrorism and counterterrorism (4th ed., pp. 361–372). New York, NY: McGraw-Hill.
- Braddock, K. (2015). The utility of narratives for promoting radicalization: The case of the animal liberation front. Dynamics of Asymmetrical Conflict, 8(1), 38–59. doi: 10.1080/17467586.2014.968794
- Braddock, K., & Horgan, J. (2016). Towards a guide for constructing and disseminating counternarratives to reduce support for terrorism. Studies in Conflict and Terrorism, 39(5), 381–404. doi: 10.1080/1057610X.2015.1116277
- Carter, J., Maher, S., & Neumann, P. (2014). #Greenbirds: Measuring importance and influence in Syrian foreign fighter networks. London: The International Centre for the Study of Radicalization and Political Violence.
- CBC NEWS. (2014, December 7). Andre Poulin, dead Canadian jihadist used in ISIS recruitment video. Retrieved from http://www.huffingtonpost.ca/2014/07/12/andre-poulin-dead-canadi_n_5580731.html
- Cialdini, R. (2006). Influence, the psychology of persuasion. New York, NY: HarperCollins.
- Cialdini, R. (2016). “Pre-suasion”: A revolutionary way to influence and persuade. New York, NY: Simon & Schuster.
- Ciovacco, C. (2009). The contours of Al-Qaida’s media strategy. Studies in Conflict and Terrorism, 32(10), 853–875. doi: 10.1080/10576100903182377
- Clarke, D. (2004). Technology and terrorism. New Brunswick, NJ: Transaction Publishing.
- Conway, M. (2012). From al-Zarqawi to al-Awlaki: The emergence of the internet as a new form of violent radical milieu. CTX 2(4). Retrieved from https://globalecco.org/from-al-zarqawi-to-al-awlaki-the-emergence-and-development-of-an-online-radical-milieu
- Conway, M. (2017). Determining the role of the internet in violent extremisms and terrorism: Six suggestions for progressing research. Studies in Conflict & Terrorism, 40(1), 77–98. doi: 10.1080/1057610X.2016.1157408
- Danesi, M. (2008). Why it sells. New York, NY: Littlefield.
- Dean, G., Bell, P., & Newman, J. (2012). The dark side of social media: Review of online terrorism. Pakistan Journal of Criminology, 3(3), 103–122. Retrieved from http://www.pakistansocietyofcriminology.com/publications/2012_08_10_4110.pdf#page=117
- De Chernatony, L., McDonald, M., & Wallace, E. (2010). Creating powerful brands. London: Routledge.
- Ehrenberg, A., Barnard, N., Kennedy, R., & Bloom, H. (2002). Brand advertising and creative publicity. Journal of Advertising Research, 42(4), 7–18. doi: 10.2501/JAR-42-4-7-18
- Feakin, T., & Wilkinson, B. (2014). The future of Jihad: What next for ISIL and al-Qaeda? Strategic Insights 91. Canberra: Australian Strategic Policy Institute.
- Fearing, F. (1953). Toward a psychological theory of human communication. Journal of Personality, 22, 71–88. doi: 10.1111/j.1467-6494.1953.tb01798.x
- Fisher, A. (2015). Swarmcast: How jihadist networks maintain a persistent online presence. Perspectives on Terrorism, 9(3). Retrieved from http://www.terrorismanalysts.com/pt/index.php/pot/article/view/426/html
- Gartenstein-Ross, D. (2015). ISIS is losing its greatest weapon: Momentum. The Atlantic. Retrieved from http://www.theatlantic.com/international/archive/2015/01/the-decline-of-isis
- Gates, S., & Podder, S. (2015). Social media, recruitment, allegiance and the Islamic State. Perspective on Terrorism, 9(4). Retrieved from http://www.terrorismanalysts.com/pt/index.php/pot/article/view/444/html
- Gilsenen, C. (2014, August 24). The many ways to map the Islamic State. Retrieved from http://www.theatlantic.com/international/archive/2014/08/the-many-ways-to-map-the-islamic-state/379196/
- Gordts, E. (2014, August 11). 15 000 foreign fighters have joined groups in Iraq and Syria. Here’s why they went. Retrieved from http://www.huffingtonpost.com/2014/11/08/foreign-fighters-iraq-syria_n_6116440.html
- Greenberg, K. (2016). Counter-radicalization via the internet. The ANNALS of the American Academy of Political and Social Science, 668, 165–179. doi: 10.1177/0002716216672635
- Gunning, J. (2009). Social movement theory and the study of terrorism. In R. Jackson, M. Breen Smyth, & J. Gunning (Eds.), Critical terrorism studies: A New research agenda (pp. 156–177). New York, NY: Routledge.
- Hackley, C., & Hackley, R. (2015). Advertising and promotion. London: Sage.
- Heath, R., & Jennings, B. (2000). Human communication theory and research: Concepts, contexts and challenges. Mahwah, NJ: Erlbaum Publishing.
- Hegghammer, T. (2014). Interpersonal trust on Jihadi internet forums. Retrieved from http://hegghammer.com/_files/Interpersonal_trust.pdf
- Helfstein, S. (2012). Edges of radicalization: Ideas, individuals and networks in violent extremism. New York, NY: The Combating Terrorism Center at West Point.
- Hoffman, B. (2013). Al-Qaeda’s uncertain future. Studies in Conflict & Terrorism, 36(8), 635–653. doi: 10.1080/1057610X.2013.802973
- Hoffman, B. (2015). A first draft of the history of America’s ongoing wars on terror. Studies in Conflict & Terrorism, 38(1), 75–83. doi: 10.1080/1057610X.2014.974405
- Houck, S., Repke, A., & Conway, L., III. (2017). Understanding what makes terrorist groups’ propaganda effective: An integrative complexity analysis of ISIL and Al Qaeda. Journal of Policing, Intelligence and Counter Terrorism, 12(2), 105–118. doi: 10.1080/18335330.2017.1351032
- Huey, L. (2015). This is not your mother’s terrorism: Social media, online radicalization and the practice of political jamming. Journal of Terrorism Research, 6(2). doi: 10.15664/jtr.1159
- Ingram, H. (2017). An analysis of inspire and Dabiq: Lessons from AQAP and Islamic State’s propaganda war. Studies in Conflict & Terrorism, 40(5), 357–375. doi: 10.1080/1057610X.2016.1212551
- Jenkins, B. M. (2015a). There will be battles in the heart of your abode: The threat posed by foreign fighters returning from Syria and Iraq. Washington, DC: RAND.
- Jenkins, B. M. (2015b). The continuing lure of violent Jihad. Washington, DC: RAND.
- Johnson, W. (1953). The fateful process of mister a talking to mister B in how successful executives handle people. Harvard Business Review.
- Joose, P., Bucerius, S., & Thompson, S. (2015). Narratives and counternarratives: Somali-Canadians on recruitment as foreign fighters to al-Shabaab. British Journal of Criminology, 55, 811–832. doi: 10.1093/bjc/azu103
- Keating, J. (2014, August 20). The strangely modern production value of ISIS’s propaganda videos. Retrieved from http://www.slate.com/blogs/the_world_/2014/08/20/james_foley_killing_the_strangely_modern_production_values_of_isis_propaganda.html
- Klausen, J. (2014). Tweeting the jihad: Social media networks of western foreign fighters in Syria and Iraq. Studies in Conflict and Terrorism, 38(1), 1–22. doi: 10.1080/1057610X.2014.974948
- Kohlmann, E., & Alkhouri, L. (2014). Profiles of foreign fighters in Syria and Iraq. CTC Sentinel, 7(9), 1–4. Retrieved from http://www.dtic.mil/get-tr-doc/pdf?AD=ADA609840
- Kotler, P., & Roberto, E. (1989). Social marketing: Strategies for changing public behavior. New York, NY: Free Press.
- Lasswell, H. (1948). The structure and function of communication in society. In L. Bryson (Ed.), The communication of ideas (pp. 37–51). New York, NY: Harper.
- Lawrence, B. (2005). Messages to the world: The statements of Osama bin Laden. London: Verso.
- Leigh, K. (2014, August 2). ISIS makes up to $ 3 million per day selling oil analysts say. Retrieved from http://abcnews.go.com/International/isis-makes-million-day-selling-oil-analysts/story?id=24814359
- Leuprecht, C., Hataley, T., Moskalneko, S., & McCauley, C. (2009a). Winning the battle but losing the war? Narrative and counter-narratives strategy. Perspectives on Terrorism, 3(2). Retrieved from http://www.terrorismanalysts.com/pt/index.php/pot/article/view/68
- Leuprecht, C., Hataley, T., Moskalneko, S., & McCauley, C. (2009b). Containing the narrative: Strategy and tactics in countering the storyline of global Jihad. Journal of Policing, Intelligence and Counterterrorism, 5, 42–57. doi: 10.1080/18335300.2010.9686940
- Levs, J., & Yan, H. (2014, September 22). Western allies reject ISIS’s leaders threats against their civilians. Retrieved from http://www.cnn.com/2014/09/22/world/meast/isis-threatens-west/index.html
- Lia, B. (2008). Doctrines for Jihadi terrorist training. Terrorism and Political Violence, 20(4), 518–542. doi: 10.1080/09546550802257226
- Lister, C. (2014). Assessing Syria’s Jihad. Adelphi Series, 54, 71–98. doi: 10.1080/19445571.2014.995939
- Marsden, S. (2014). A social movement typology of militant organizations: Contextualizing terrorism. Terrorism and Political Violence, 28(4), 750–773. doi: 10.1080/09546553.2014.954039
- Matusitz, J. (2014). Symbolism in terrorism: Motivation, communication and behavior. New York, NY: Rowman & Littlefield.
- Mauney, M. (2015, February 27). Report: ISIS using Disney movie to recruit women. Retrieved from http://www.orlandosentinel.com/features/gone-viral/os-isis-disney-recruit-women-post.html
- McCrosky, J., Richmond, V., & Daly, J. (1975). The development of a measure of perceived homophily in interpersonal communication. Human Communication Research, 1(4), 323–332. doi: 10.1111/j.1468-2958.1975.tb00281.x
- Miller, C. (2008). The complexity of terrorism: Groups, semiotics and the Media. In D. O’Hair, R. Heath, K. Ayotte, & G. Ledlow (Eds.), Terrorism: Communication and rhetorical perspective (pp. 43–66). Cresskill, NJ: Hampton Press.
- Miller, G. (1980). On being persuaded: Some basic distinctions. In M. Roloff & G. Miller (Eds.), Persuasion: New directions in theory and research (pp. 11–38). Los Angeles, CA: Sage.
- Moffett, L. (2014, June 21). Welsh Muslim in terror recruiting video radicalized online. Retrieved from http://www.walesonline.co.uk/news/wales-news/welsh-muslim-nasser-muthana-terror-recruiting-7305
- Mozaffari, M. (2007). What is Islamism? History and definition of a concept. Totalitarian Movements and Political Religions, 8(1), 17–33. doi: 10.1080/14690760601121622
- Netherlands’ National Coordinator for Counterterrorism. (2007). Jihadis and the internet. Amsterdam: Netherlands’ Ministerie van Binnenlandse Zaken en Koninkrijksrelaties (Ministry of International Affairs and Kingdom Relations).
- Newcomb, T. (1953). An approach to the study of communicative acts. Psychological Review, 60, 393–404. doi: 10.1037/h0063098
- Novenario, C. (2016). Differentiating Al Qaeda and the Islamic State through strategies publicized in jihadist magazines. Studies in Conflict & Terrorism, 39(11), 953–967. doi: 10.1080/1057610X.2016.1151679
- Oates, W. (1948). Classic theories of communication. In L. Bryson (Ed.), The communication of ideas (pp. 27–36). New York, NY: Cooper Publishers.
- Pauwels, L., & Schils, N. (2016). Differential online exposure to extremist content and political violence: Testing the relative strength of social learning and competing perspectives. Terrorism and Political Violence, 28(1), 1–29. doi: 10.1080/09546553.2013.876414
- Pavitt, C., & Cappella, J. (1979). Coordination, accuracy in interpersonal and small group discussions: A literature review, model and simulation. In D. Nimmo (Ed.), Communication yearbook 3 (pp. 123–156). New Brunswick, NJ: Transaction Books.
- Pelletier, I., Lundmark, L., Gardner, R., Ligon, G. S., & Kilinc, R. (2016). Why ISIS’s message resonates: Leveraging Islam, sociopolitical catalysts and adaptive messaging. Studies in Conflict & Terrorism, 39(10), 871–899. doi: 10.1080/1057610X.2016.1139373
- Prucha, N., & Fisher, A. (2013). Tweeting for the caliphate: Twitter as the new frontier for jihadist propaganda. CTC Sentinel, 6(6). Retrieved from https://www.ctc.usma.edu/posts/tweeting-for-the-caliphate-twitter-as-the-new-frontier-for-jihadist-propaganda
- Raghavan, S. (2009, November 16). Cleric said he was confidant to Hassan. Retrieved from http://www.washingtonpost.com/wp-dyn/content/article/2009/11/15/AR2009111503160.html
- Ritchie, W. (2010, July 22). Zachary Chesser and Paul Rockwood: Latest US citizens linked to al-Awlaki. Retrieved from http://www.csmonitor.com/USA/Justice/2010/0722/Zachary-Chesser-and-Paul-Rockwood-latest-US-citizens-linked-to-al-Awlaki
- Rothenbuhler, E. (1998). Ritual communication: From everyday conversation to mediated ceremony. Thousand Oaks, CA: Sage.
- Rudner, M. (2017). Electronic Jihad: The internet as Al Qaeda’s catalyst for global terrorism. Studies in Conflict & Terrorism, 40(1), 10–23. doi: 10.1080/1057610X.2016.1157403
- Salem, P. (2009). The complexity of human communication. Cresskill, NJ: Hampton Press.
- Schmid, A., & de Graaf, J. (1982). Violence as communication: Insurgent terrorism and the western New Media. Thousand Oaks, CA: Sage.
- Schramm, W. (1954). How communication works. In The process and effects of mass communication. Urbana: University of Illinois Press.
- Seib, P. (2008). The Al-Qaida media machine. Military Review. Retrieved from http://usacac.army.mil/CAC2/MilitaryReview/Archives/English/MilitaryReview_20080630_art012.pdf
- Shane, S. (2009, November 18). Born in US, radical cleric inspires terrorism. Retrieved from http://www.nytimes.com/2009/11/19/us/19awlaki.html?_r=0
- Shane, S., & Hubbard, B. (2014, August 30). ISIS displaying a deft command of varied media. Retrieved from http://www.nytimes.com/2014/08/31/world/middleeast/isis-displaying-a-deft-command-of-varied-media.html?_r=0
- Shannon, C., & Weaver, W. (1949). The mathematical theory of communication. Chicago: University of Illinois Press.
- Sherwell, P., & Gardham, G. (2009, November 23). Fort hood shooting: Radical Islamic preacher also inspired 7/7 bombers. Retrieved from http://www.telegraph.co.uk/news/worldnews/northamerica/usa/6630555/Fort-Hood-shooting-radical-Islamic-preacher-also-inspired-July-7-bombers.html
- Simons, H. (1976). Persuasion: Understanding, practice and analysis. Reading: Addison-Wesley.
- Stern, J., & Berger, J. M. (2015). ISIS: The state of terror. New York, NY: Harper Collins.
- Stevens, T., & Neumann, P. (2009). Countering online radicalisation: A strategy for action. London: International Centre for the Study of Radicalization.
- Stone, G., Singletary, M., & Richmond, V. (1999). Clarifying communication theories: A hands on approach. Ames: Iowa State University Press.
- The Economist. (2014, August 30). European Jihadists. Retrieved from http://www.economist.com/news/middle-east-and-africa/21614226-why-and-how-westerners-go-fight-syria-and-iraq-it-aint-half-hot-here-mum
- The Soufan Group. (2015). Foreign fighters: An updated assessment of the flow of foreign fighters into Syria and Iraq. Retrieved from http://soufangroup.com/wp-content/uploads/2015/12/TSG_ForeignFightersUpdate3.pdf
- Torok, R. (2015a). ISIS and the institution of online recruitment. Middle East Institute. Retrieved from http://www.mei.edu/content/map/isis-and-institution-online-terrorist-recruitment
- Torok, R. (2015b). Institutionalized moral reframing: A research based model on Islamic radicalization on social media. Paper presented at proceedings of the 8th Annual Australian security and intelligence conference November 30–December 2, Edith Cowan University. Retrieved from http://ro.ecu.edu.au/asi/46
- Torres-Soriano, M. (2016). The caliphate is not a tweet away: The social media experience of Al Qaeda in the Islamic Maghreb. Studies in Conflict & Terrorism, 39(11), 968–981. doi: 10.1080/1057610X.2016.1159430
- Tuman, J. (2010). Communicating terror: The rhetorical dimensions of terrorism. Thousand Oaks, CA: Sage.
- Twitchell, J. (2004). Branded nation: The marketing of megachurch, college inc., and Museum world. New York, NY: Simon and Schuster.
- U.S. Senate Committee on Homeland Security and Governmental Affairs. (2008, May 8). Violent Islamist extremism, the internet, and the homegrown terrorist threat. Retrieved from https://fas.org/irp/congress/2008_rpt/violent.pdf
- Vidino, L., & Hughes, S. (2015). ISIS in America: From retweets to Raqqa. Washington, DC: George Washington University Program on Extremism.
- Von Behr, I., Reding, A., Edwards, C., & Gribbon, L. (2013). Radicalisation in the digital era: The use of the internet in 15 cases of terrorism and extremism. Brussels: RAND.
- Weimann, G. (2006). Terror and the internet. Washington, DC: United States Institute of Peace.
- Weimann, G., & von Knop, K. (2008). Applying the notion of noise to countering online-terrorism. Studies in Conflict and Terrorism, 31, 883–902. doi: 10.1080/10576100802342601
- Welch, D. (2014, October 21). Australian teenager appears in ISIS video threatening Australian PM Tony Abbott. Retrieved from http://www.abc.net.au/news/2014-10-21/australian-is-fighter-threatens-tony-abbott-in-video/5830040
- Westley, B., & MacLean, M. (1957). A conceptual model for communication research. Journalism Quarterly, 34, 31–38. doi: 10.1177/107769905703400103
- Wilkinson, B., & Barclay, J. (2011). The language of Jihad: Narratives and strategies of Al-Qaida in the Arabian Peninsula and UK responses. London: Royal United Service Institute for Defense and Security Studies.
- Wilkinson, P. (2007). The media and terrorism: A reassessment. Terrorism and Political Violence, 9(2), 51–64. doi: 10.1080/09546559708427402
- Winter, C. (2015). The virtual caliphate: Understanding Islamic state’s propaganda strategy. London: The Quilliam Foundation.
- Wood, G. (2015). What ISIS really wants. The Atlantic. Retrieved from http://www.theatlantic.com/features/archive/2015/02/what-isis-really-wants/384980
- Zekulin, M. (2014, June 11). Made in Canada terror is real – and its being ignored. Retrieved from http://www.theglobeandmail.com/globe-debate/homeward-bound-made-in-canada-terror/article19113802
- Zelin, A. (2010). How we have changed al-Qaida. The Atlantic. Retrieved from http://www.theatlantic.com/international/archive/2010/10/how-weve-changed-al-qaeda/64216/2014
- Zelin, A. (2014). The war between ISIS and al-Qaida for supremacy of the global jihadist movement. Research notes. The Washington Institute for Near East Policy.
- Zelinsky, A., & Shubik, M. (2009). Research note: Terrorist groups as business firms: A new typological framework. Terrorism and Political Violence, 21(2), 327–336. doi: 10.1080/09546550902771993