94
Views
0
CrossRef citations to date
0
Altmetric
Research Article

(In)Security in social media: exploring Israeli and Palestinian narratives

References

  • Abulof, U. 2014. “Deep Securitization and Israel’s “Demographic Demon”.” International Political Sociology 8 (4): 396–415. https://doi.org/10.1111/ips.12070.
  • Agirre, E., and M. Stevenson. 2022. “Word Sense Disambiguation.” In The Oxford Handbook of COMPUTATIONAL LINGUISTICS, 627–648. Oxford University Press.
  • Angelov, D. 2020. TOP2VEC: DISTRIBUTED REPRESENTATIONS of TOPICS. https://doi.org/10.48550/ARXIV.2008.09470.
  • Baele, S. J., and D. Jalea. 2022. “Twenty-Five Years of Securitization Theory: A Corpus-Based Review.” Political Studies Review 1–14. https://doi.org/10.1177/14789299211069499.
  • Balzacq, T. (Ed.). 2011. “A Theory of Securitization Origins, Core Assumptions, and Variants.” In Securitization Theory: How Security Problems Emerge and Dissolve, 1–30. New York: Routledge.
  • Balzacq, T. 2019. “Securitization Theory: Past, Present, and Future.” Polity 51 (2): 331–348. https://doi.org/10.1086/701884.
  • Balzacq, T., S. Leonard, and J. Ruzicka. 2016. “‘Securitization’ Revisited: Theory and Cases.” International Relations 30 (4): 494–531. https://doi.org/10.1177/0047117815596590.
  • Beetham, D. 1991. The Legitimation of Power. London: Palgrave Macmillan.
  • Berger, P. L., and T. Luckmann. 1991. The Social Construction of Reality. London: Penguin Books.
  • Bourbeau, P. 2011. The Securitization of Migration: A Study of Movement and Order. New York: Routledge.
  • Bourdieu, P. 1990. The Logic of Practice. Cambridge: Polity Press.
  • Braun, V., and V. Clarke. 2008. “Using Thematic Analysis in Psychology.” Qualitative Research in Psychology 3 (2): 77–101. https://doi.org/10.1191/1478088706qp063oa.
  • Braun, V., V. Clarke. 2012. “Thematic Analysis.” In APA Handbook of Research Methods in Psychology, Vol 2: Research Designs: Quantitative, Qualitative, Neuropsychological, and Biological, edited by H. Cooper, P. M. Camic, D. L. Long, A. T. Panter, D. Rindskopf, K. J. Sher, 57–71. Washington: American Psychological Association. https://doi.org/10.1037/13620-004.
  • Buzan, B., and O. Waever. 2003. Regions and Powers: The Structure of International Security. Cambridge: Cambridge University Press.
  • 2022. “CrowdTangle Glossary.” (December 14, 2022). https://help.crowdtangle.com/en/articles/1184978-crowdtangle-glossary#:~:text=on%20a%20post.-,Total%20Interactions,video%20views%20to%20be%20interactions.
  • Facebook. 2022. “What Information Is Public?” May 9, 2022. https://www.facebook.com/help/adsmanagerbuiltin/203805466323736.
  • Georgia, C. 2015. “Public Administration Under Military Occupation: A Presentation of COGAT.” AGORA International Journal of Administration Sciences 3 (1): 27–32.
  • Georgia, C. 2017. “Securitizing ‘The Other’: A Case Study on Israeli and Palestinian Institutional Discourses.” Romanian Journal of Political Science 17 (2): 107–138.
  • Georgia, C. 2020. “Securitizing ‘the Other’: Discursive Practices of the Israeli-Palestinian Conflict.“ PhD thesis, Babes-Bolyai University.
  • Gilley, B. 2009. The Right to Rule: How States Win and Lose Legitimacy. New York: Columbia University Press.
  • Griffiths, T. L., M. Steyvers, and J. B. Tenenbaum. 2007. “Topics in Semantic Representation.” Psychological Review 114 (2): 211–244. https://doi.org/10.1037/0033-295X.114.2.211.
  • Hansen, L. 2011. “Theorizing the Image for Security Studies: Visual Securitization and the Muhammad Cartoon Crisis.” European Journal of International Relations 17 (1): 51–74. https://doi.org/10.1177/1354066110388593.
  • Huysmans, J. 2011. “What’s in an Act? On Security Speech Acts and Little Security Nothings.” Security Dialigue 42 (4–5): 371–383. https://doi.org/10.1177/0967010611418713.
  • Jurafsky, D., and J. H. Martin. 2009. Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics, and Speech Recognition. 2nd ed. Upper Saddle River, N.J: Pearson Prentice Hall.
  • Lauretig, A. M. 2019. “Identification, Interpretability, and Bayesian Word Embeddings.” In Proceedings of the Third Workshop on Natural Language Processing and Computational Social Science, Minneapolis, Minnesota, 7–17.
  • Newman, D. 1996. “Shared Spaces - Separate Spaces: The Israel-Palestine Peace Process.” Geo Journal 39 (4): 363–375. https://doi.org/10.1007/BF02428499.
  • Nivre, J., P. Marongiu, F. Ginter, J. Kanerva, S. Montemagni, S. Schuster, M. Simi. 2018. “Enhancing Universal Dependency Treebanks: A Case Study.” UDW 2018 102–107. https://doi.org/10.18653/v1/W18-6012.
  • Piskorska, A. 2016. “Perlocutionary Efects and Relevance Theory.” In Relevance Heory. Recent Developments, Current Challenges and Future Directions, edited by Manuel Padilla Cruz, 286–305. Amsterdam: John Benjamins Publishing Company.
  • Schiff, R. L. 2009. The Military and Domestic Politics. New York: Routledge.
  • 2023. “spaCy.” (April 2, 2023). https://spacy.io/api/doc.
  • Stritzel, H. 2012. “Securitization, Power, Intertextuality: Discourse Theory and the Translations of Organized Crime.” Security Dialogue 43 (6): 549–567. https://doi.org/10.1177/0967010612463953.
  • Tajfel, H. (Ed.). 1984. The Social Dimension. Vol. 2. Cambridge: Cambridge University Press.
  • Vuori, J. A. 2008. “Illocutionary Logic and Strands of Securitization: Applying the Theory of Securitization to the Study of Non-Democratic Political Orders.” European Journal of International Relations 14 (1): 65–99. https://doi.org/10.1177/1354066107087767.
  • Wodak, R., and M. Meyer, eds. 2001. METHODS of CRITICAL DISCOURSE ANALYSIS. London: SAGE.
  • The World Bank Group. 2020. Individuals Using the Internet (% of Population) - Israel. World Bank. https://data.worldbank.org/indicator/IT.NET.USER.ZS?locations=IL.
  • The World Bank Group. 2021. Palestinian Digital Economy Assessment. World Bank. https://documents1.worldbank.org/curated/en/472671640152521943/pdf/Palestinian-Digital-Economy-Assessment.pdf.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.