12,000

We have over 12,000 students, from over 100 countries, within one of the safest campuses in the UK

93%

93% of Lancaster students go into work or further study within six months of graduating

Home > Research > Publications & Outputs > Analyzing the semantic content and persuasive c...
View graph of relations

« Back

Analyzing the semantic content and persuasive composition of extremist media: a case study of texts produced during the Gaza conflict

Research output: Contribution to journalJournal article

Published

Journal publication date03/2011
JournalInformation Systems Frontiers Journal
Journal number1
Volume13
Number of pages13
Pages61-73
Original languageEnglish

Abstract

While terrorism informatics research has examined the technical composition of extremist media, there is less work examining the content and intent behind such media. We propose that the arguments and issues presented in extremist media provide insights into authors' intent, which in turn may provide an evidence-base for detecting and assessing risk. We explore this possibility by applying two quantitative text-analysis methods to 50 online texts that incite violence as a result of the 2008/2009 Israeli military action in Gaza and the West Bank territories. The first method-a content coding system that identifies the occurrence of persuasive devices-revealed a predominance of moral proof arguments within the texts, and evidence for distinguishable 'profiles' of persuasion use across different authors and different group affiliations. The second method-a corpus-linguistic technique that identifies the core concepts and narratives that authors use-confirmed the use of moral proof to create an in-group/out-group divide, while also demonstrating a movement from general expressions of discontent to more direct audience-orientated expressions of violence as conflict heightened. We conclude that multi-method analyses are a valuable approach to building both an evidence-based understanding of terrorist media use and a valid set of applications within terrorist informatics.