Home > Research > Publications & Outputs > Analyzing the semantic content and persuasive c...
View graph of relations

Analyzing the semantic content and persuasive composition of extremist media: a case study of texts produced during the Gaza conflict

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Analyzing the semantic content and persuasive composition of extremist media: a case study of texts produced during the Gaza conflict. / Prentice, Sheryl; Taylor, Paul J.; Rayson, Paul et al.
In: Information Systems Frontiers , Vol. 13, No. 1, 03.2011, p. 61-73.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

APA

Vancouver

Prentice S, Taylor PJ, Rayson P, Hoskins A, O'Loughlin B. Analyzing the semantic content and persuasive composition of extremist media: a case study of texts produced during the Gaza conflict. Information Systems Frontiers . 2011 Mar;13(1):61-73. doi: 10.1007/s10796-010-9272-y

Author

Bibtex

@article{1a54b44cb74f48da980dcc9369bc99c5,
title = "Analyzing the semantic content and persuasive composition of extremist media: a case study of texts produced during the Gaza conflict",
abstract = "While terrorism informatics research has examined the technical composition of extremist media, there is less work examining the content and intent behind such media. We propose that the arguments and issues presented in extremist media provide insights into authors' intent, which in turn may provide an evidence-base for detecting and assessing risk. We explore this possibility by applying two quantitative text-analysis methods to 50 online texts that incite violence as a result of the 2008/2009 Israeli military action in Gaza and the West Bank territories. The first method-a content coding system that identifies the occurrence of persuasive devices-revealed a predominance of moral proof arguments within the texts, and evidence for distinguishable 'profiles' of persuasion use across different authors and different group affiliations. The second method-a corpus-linguistic technique that identifies the core concepts and narratives that authors use-confirmed the use of moral proof to create an in-group/out-group divide, while also demonstrating a movement from general expressions of discontent to more direct audience-orientated expressions of violence as conflict heightened. We conclude that multi-method analyses are a valuable approach to building both an evidence-based understanding of terrorist media use and a valid set of applications within terrorist informatics.",
keywords = "Extremist language, Content analysis, Influence tactics, Semantic tagging, Key concept analysis, COMMUNICATION BEHAVIOR, CRISIS NEGOTIATIONS, PATTERNS, TERRORISM, INTERNET, WEB",
author = "Sheryl Prentice and Taylor, {Paul J.} and Paul Rayson and Andrew Hoskins and Ben O'Loughlin",
year = "2011",
month = mar,
doi = "10.1007/s10796-010-9272-y",
language = "English",
volume = "13",
pages = "61--73",
journal = "Information Systems Frontiers ",
issn = "1387-3326",
publisher = "Springer Netherlands",
number = "1",

}

RIS

TY - JOUR

T1 - Analyzing the semantic content and persuasive composition of extremist media

T2 - a case study of texts produced during the Gaza conflict

AU - Prentice, Sheryl

AU - Taylor, Paul J.

AU - Rayson, Paul

AU - Hoskins, Andrew

AU - O'Loughlin, Ben

PY - 2011/3

Y1 - 2011/3

N2 - While terrorism informatics research has examined the technical composition of extremist media, there is less work examining the content and intent behind such media. We propose that the arguments and issues presented in extremist media provide insights into authors' intent, which in turn may provide an evidence-base for detecting and assessing risk. We explore this possibility by applying two quantitative text-analysis methods to 50 online texts that incite violence as a result of the 2008/2009 Israeli military action in Gaza and the West Bank territories. The first method-a content coding system that identifies the occurrence of persuasive devices-revealed a predominance of moral proof arguments within the texts, and evidence for distinguishable 'profiles' of persuasion use across different authors and different group affiliations. The second method-a corpus-linguistic technique that identifies the core concepts and narratives that authors use-confirmed the use of moral proof to create an in-group/out-group divide, while also demonstrating a movement from general expressions of discontent to more direct audience-orientated expressions of violence as conflict heightened. We conclude that multi-method analyses are a valuable approach to building both an evidence-based understanding of terrorist media use and a valid set of applications within terrorist informatics.

AB - While terrorism informatics research has examined the technical composition of extremist media, there is less work examining the content and intent behind such media. We propose that the arguments and issues presented in extremist media provide insights into authors' intent, which in turn may provide an evidence-base for detecting and assessing risk. We explore this possibility by applying two quantitative text-analysis methods to 50 online texts that incite violence as a result of the 2008/2009 Israeli military action in Gaza and the West Bank territories. The first method-a content coding system that identifies the occurrence of persuasive devices-revealed a predominance of moral proof arguments within the texts, and evidence for distinguishable 'profiles' of persuasion use across different authors and different group affiliations. The second method-a corpus-linguistic technique that identifies the core concepts and narratives that authors use-confirmed the use of moral proof to create an in-group/out-group divide, while also demonstrating a movement from general expressions of discontent to more direct audience-orientated expressions of violence as conflict heightened. We conclude that multi-method analyses are a valuable approach to building both an evidence-based understanding of terrorist media use and a valid set of applications within terrorist informatics.

KW - Extremist language

KW - Content analysis

KW - Influence tactics

KW - Semantic tagging

KW - Key concept analysis

KW - COMMUNICATION BEHAVIOR

KW - CRISIS NEGOTIATIONS

KW - PATTERNS

KW - TERRORISM

KW - INTERNET

KW - WEB

U2 - 10.1007/s10796-010-9272-y

DO - 10.1007/s10796-010-9272-y

M3 - Journal article

VL - 13

SP - 61

EP - 73

JO - Information Systems Frontiers

JF - Information Systems Frontiers

SN - 1387-3326

IS - 1

ER -