Advertisement

The Systematic Adaptation of Violence Contexts in the ISIS Discourse: A Contrastive Corpus-Based Study

  • Esra’ Moustafa AbdelzaherEmail author
Original Paper
  • 31 Downloads

Abstract

Categorizing an act as ‘violence’, ‘resistance’, ‘defense’ or ‘punishment’ depends on the context within which the act occurs. Concerned with the context of violence, this study adopts a pragmatic approach to focus on the techniques ISIS uses to project participants involved in the context of violence, in corpora representing the Arabic and English ISIS discourses in 2014 and 2015. FrameNet is employed to identify the typical participants in the violence contexts/frames. Results show that the projection of participants in violent events systematically varies according to the addressed society ISIS targets. ISIS depends on priming historical conflicts to urge hostile encounter against socio-linguistically and historically diverse enemies. Addressing the Arab world in which the Shia/Sunni conflict is central, ISIS wages the war mainly against Safawi armies. However, the ISIS English discourse basically activates the Crusader/Muslim war. Overall, four expandable designations are constantly used to label any ISIS enemy: ‘crusader’ for Christian enemies; ‘Murtadd’ for Sunni Muslim opponents; ‘Safawi’ for Shia adversaries and ‘Kuffar/disbelievers’ for religiously undefined groups.

Keywords

Context Contrastive analysis FrameNet ISIS Theological conflict Violence 

Notes

Acknowledgements

I would like to thank the anonymous reviewers for their useful comments on the earlier draft of this article. I would also like to thank Miss Megan E. Wagy and Dr Tyler J. True, Northern Arizona University, for the esthetic work they did by proofreading this article.

Compliance with Ethical Standards

Conflict of interest

The author declares that she has no conflict of interest.

Supplementary material

41701_2019_55_MOESM1_ESM.jpg (197 kb)
Yoshikoder Interface and the Added Violence Dictionary (JPEG 197 kb)
41701_2019_55_MOESM2_ESM.jpg (228 kb)
UAM Annotation Interface and Annotation Scheme (JPEG 227 kb)

References

  1. Abbasi, A. (2007, May). Affect intensity analysis of dark web forums. In 2007 IEEE Intelligence and Security Informatics (pp. 282–288). IEEE.Google Scholar
  2. Arosoaie, A. (2017). In the name of honour and freedom: The sacred as a justifying tool for ISIS’and secular violence. Culture and Religion, 18(3), 278–295.CrossRefGoogle Scholar
  3. Arts, T., Belinkov, Y., Habash, N., Kilgarriff, A., & Suchomel, V. (2014). arTenTen: Arabic corpus and word sketches. Journal of King Saud University-Computer and Information Sciences, 26(4), 357–371.CrossRefGoogle Scholar
  4. Atkins, S., Fillmore, C., & Johnson, C. (2003a). Lexicographic relevance: Selecting information from corpus evidence. International Journal of Lexicography, 16(3), 251–280.CrossRefGoogle Scholar
  5. Atkins, S., Rundell, M., & Sato, H. (2003b). The contribution of FrameNet to practical lexicography. International Journal of Lexicography, 16(3), 333–357.CrossRefGoogle Scholar
  6. Baker, P., & Vessey, R. (2018). A corpus-driven comparison of English and French Islamist extremist texts. International Journal of Corpus Linguistics, 23(3), 255–278.CrossRefGoogle Scholar
  7. Bakker, E., & Singleton, M. (2016). Foreign fighters in the Syria and Iraq conflict: Statistics and characteristics of a rapidly growing phenomenon. In Foreign Fighters under International Law and Beyond (pp. 9–25). The Hague: TMC Asser Press.Google Scholar
  8. Bertoldi, A., & Chishman, R. (2011, August). Developing a frame-based lexicon for the Brazilian legal language: The case of the criminal_process frame. In International Workshop on AI Approaches to the Complexity of Legal Systems, pp. 256–270.Google Scholar
  9. Colas, B. (2017). What does Dabiq do? ISIS hermeneutics and organizational fractures within Dabiq magazine. Studies in Conflict & Terrorism, 40(3), 173–190.CrossRefGoogle Scholar
  10. Colvin, S. (2009). Ulrike Meinhof and West German terrorism: Language, violence, and identity. Rochester, NY: Camden House.Google Scholar
  11. De Marcken, C. G. (1990, June). Parsing the LOB corpus. In Proceedings of the 28th annual meeting on Association for Computational Linguistics (pp. 243–251). Association for Computational Linguistics.Google Scholar
  12. Doosje, B., Moghaddam, F., Kruglanski, A., De Wolf, A., Mann, L., & Feddes, A. (2016). Terrorism, radicalization and de-radicalization. Current Opinion in Psychology, 11, 79–84.CrossRefGoogle Scholar
  13. Dutton, G. (2007). The psychology of genocide, massacres, and extreme violence: Why “normal” people come to commit atrocities. Westport: Greenwood Publishing Group.Google Scholar
  14. Fillmore, C. (1975). An alternative to checklist theories of meaning. In Proceedings of the first annual meeting of the Berkeley Linguistics Society, pp. 123–131.Google Scholar
  15. Fillmore, C., & Baker, C. (2011). A frames approach to semantic analysis. In The Oxford handbook of linguistic analysis (pp. 313–340). Oxford: Oxford University Press.Google Scholar
  16. Fillmore, C., Petruck, M., Ruppenhofer, J., & Wright, A. (2003). FrameNet in action: The case of attaching. International Journal of Lexicography, 16(3), 297–332.CrossRefGoogle Scholar
  17. Fisman, R., & Miguel, E. (2010). Economic gangsters: Corruption, violence, and the poverty of nations. Princeton: Princeton University Press.CrossRefGoogle Scholar
  18. Galtung, J. (1990). Cultural violence. Journal of Peace Research, 27(3), 291–305.CrossRefGoogle Scholar
  19. Garver, N. (1968). What violence is. The Nation, 209(24), 819–822. Online.Google Scholar
  20. Geen, R. G. (2001). Human aggression. Buckingham: Open University Press.Google Scholar
  21. Ghajar-Khosravi, S., Kwantes, P., Derbentseva, N., & Huey, L. (2016). Quantifying salient concepts discussed in social media content: An analysis of Tweets posted by ISIS Fangirls. Journal of Terrorism Research, 7(2), 79–90.CrossRefGoogle Scholar
  22. Gildea, D., & Jurafsky, D. (2002). Automatic labeling of semantic roles. Computational Linguistics, 28(3), 245–288.CrossRefGoogle Scholar
  23. Gollwitzer, P. M., & Sheeran, P. (2006). Implementation intentions and goal achievement: A meta-analysis of effects and processes. Advances in Experimental Social Psychology, 38, 69–119.Google Scholar
  24. Haykel, B. (2016). ISIS and al-Qaeda—What are they thinking? Understanding the adversary. The ANNALS of the American Academy of Political and Social Science, 668(1), 71–81.CrossRefGoogle Scholar
  25. Herbst, P., & Herbst, R. (2003). Talking terrorism: A dictionary of the loaded language of political violence. Westport: Greenwood Publishing Group.Google Scholar
  26. Ingram, H. J. (2017). Learning from ISIS’s virtual propaganda war for Western Muslims: A comparison of Inspire and Dabiq. In M. Conway, L. Jarvis, & O. Lehane (Eds.), Terrorists’ use of the Internet: Assessment and response (pp. 136–170). Amsterdam: IOS Press.Google Scholar
  27. Khan, A., & Estrada, M. A. R. (2016). The effects of terrorism on economic performance: The case of Islamic State in Iraq and Syria (ISIS). Quality & Quantity, 50(4), 1645–1661.CrossRefGoogle Scholar
  28. Laqueur, W., & Wall, C. (2018). The future of terrorism: ISIS, Al-Qaeda, and the Alt-Right. New York: Thomas Dunne Books.Google Scholar
  29. Macnair, L., & Frank, R. (2018). The mediums and the messages: Exploring the language of Islamic State media through sentiment analysis. Critical Studies on Terrorism, 11, 438–457.CrossRefGoogle Scholar
  30. Mahood, S., & Rane, H. (2017). Islamist narratives in ISIS recruitment propaganda. The Journal of International Communication, 23(1), 15–35.CrossRefGoogle Scholar
  31. McCauley, C., & Moskalenko, S. (2017). Understanding political radicalization: The two-pyramids model. American Psychologist, 72(3), 205.CrossRefGoogle Scholar
  32. Motz, A. (2016). The psychology of female violence: Crimes against the body. London: Routledge.Google Scholar
  33. Nimmer, L. (2011). De-contextualization in the terrorism discourse: A social constructionist view. KVÜÕA Toimetised, 14, 223–240.Google Scholar
  34. Novenario, C. M. I. (2016). Differentiating Al Qaeda and the Islamic State through strategies publicized in Jihadist magazines. Studies in Conflict & Terrorism, 39(11), 953–967.CrossRefGoogle Scholar
  35. O’Donnell, M. (2008, April). The UAM CorpusTool: Software for corpus annotation and exploration. In Proceedings of the XXVI Congreso de AESLA (pp. 3–5). Almeria Spain.Google Scholar
  36. Pennebaker, J. (2011). Using computer analyses to identify language style and aggressive intent: The secret life of function words. Dynamics of Asymmetric Conflict, 4(2), 92–102.CrossRefGoogle Scholar
  37. Perelberg, R. (2005). Psychoanalytic understanding of violence and suicide. London: Psychology Press.CrossRefGoogle Scholar
  38. Ruppenhofer, J., Ellsworth, M., Petruck, M. R., Johnson, C. R., & Scheffczyk, J. (2016). FrameNet II: Extended theory and practice. Berkeley: Online Library.Google Scholar
  39. Schmidt, B., & Schröder, I. (2001). Anthropology of violence and conflict. London: Psychology Press.Google Scholar
  40. Sheets-Johnstone, M. (2016). Strangers, trust, and religion: On the vulnerability of being alive. Human Studies, 39(2), 167–187.CrossRefGoogle Scholar
  41. Steindal, M. (2016). ISIS totalitarian ideology and discourse: An analysis of the Dabiq Magazine discourse. Master’s thesis, Norwegian University of Life Sciences, Ås.Google Scholar
  42. Stephan, M. (2015). Civil resistance vs ISIS. Journal of Resistance Studies, 1(2), 127–150.Google Scholar
  43. Turner, C. (2013). Islam without Allah?: The rise of religious externalism in Safavid Iran. Routledge.Google Scholar
  44. Volavka, J. (2008). Neurobiology of violence. New York: American Psychiatric Pub.Google Scholar
  45. Welch, T. (2018). Theology, heroism, justice, and fear: An analysis of ISIS propaganda magazines Dabiq and Rumiyah. Dynamics of Asymmetric Conflict, 11(3), 186–198.CrossRefGoogle Scholar
  46. Welss, M., & Hassan, H. (2016). ISIS inside the Army of Terror. New York: Regan Arts.Google Scholar
  47. Wignell, P., O’Halloran, K. L., Tan, S., Lange, R., & Chai, K. (2018). Image and text relations in ISIS materials and the new relations established through recontextualisation in online media. Discourse & Communication, 12, 535–559.CrossRefGoogle Scholar
  48. Wignell, P., Tan, S., O’Halloran, K. L., & Lange, R. (2017). A mixed methods empirical examination of changes in emphasis and style in the extremist magazines Dabiq and Rumiyah. Perspectives on Terrorism, 11(2), 2–20.Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of English LanguageAin Shams UniversityCairoEgypt

Personalised recommendations