Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Unmasking Malicious Stance Indicators and Attitudinal Priming: An ‘Evaluative Textbite’ Approach to Identity Attacks in Violent Extremist Discourse

View through CrossRef
AbstractThe article explores the patterning and functioning of attitude semantics in the practice of identity attacks within terrorist communications. Positioned in facework and stance-taking research (e.g. Tracy & Tracy, 1998, 2008, 2017), it introduces the concepts of ‘evaluative textbites’ and ‘attitudinal priming’ to linguistic examinations, advocating a functional approach to unravelling identity attacks, drawing on corpus analysis methods (e.g. word frequency, and concordance-line qualitative analysis) and the Appraisal framework (Martin & White, 2005). Findings reveal that, linked with stance-taking activity, attitudinal priming offers insights into how specific ideational targets are primed for particular attitudinal, evaluative functions. Evaluative textbites provide linguistic evidence of an author’s encoded hostile attitude and the nuanced patterning and functioning of ‘ideation-attitude’ co-occurrences in these attacks. Identity attacks are a rhetorical tool, normative and valuation-based, targeting individuals’ or out-groups’ immoral behaviours and devaluing victims by reference to their personal traits, power-distance relationships, interactional roles, and master identities. This article offers implications for future study of identity attacks in hate crimes, genocidal rhetoric, and defamation texts, and strengthens counter-extremism efforts by illuminating the investigative value of identity work.
Springer Science and Business Media LLC
Title: Unmasking Malicious Stance Indicators and Attitudinal Priming: An ‘Evaluative Textbite’ Approach to Identity Attacks in Violent Extremist Discourse
Description:
AbstractThe article explores the patterning and functioning of attitude semantics in the practice of identity attacks within terrorist communications.
Positioned in facework and stance-taking research (e.
g.
Tracy & Tracy, 1998, 2008, 2017), it introduces the concepts of ‘evaluative textbites’ and ‘attitudinal priming’ to linguistic examinations, advocating a functional approach to unravelling identity attacks, drawing on corpus analysis methods (e.
g.
word frequency, and concordance-line qualitative analysis) and the Appraisal framework (Martin & White, 2005).
Findings reveal that, linked with stance-taking activity, attitudinal priming offers insights into how specific ideational targets are primed for particular attitudinal, evaluative functions.
Evaluative textbites provide linguistic evidence of an author’s encoded hostile attitude and the nuanced patterning and functioning of ‘ideation-attitude’ co-occurrences in these attacks.
Identity attacks are a rhetorical tool, normative and valuation-based, targeting individuals’ or out-groups’ immoral behaviours and devaluing victims by reference to their personal traits, power-distance relationships, interactional roles, and master identities.
This article offers implications for future study of identity attacks in hate crimes, genocidal rhetoric, and defamation texts, and strengthens counter-extremism efforts by illuminating the investigative value of identity work.

Related Results

Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
<p>Accessing and retrieving users’ browser and network information is a common practice used by advertisers and many online services to deliver targeted ads and explicit impr...
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Facing the surge in malicious behaviors in the network environment, the existing cybersecurity knowledge graph suffers from fragmented security knowledge and limited application sc...
Design of Malicious Code Detection System Based on Binary Code Slicing
Design of Malicious Code Detection System Based on Binary Code Slicing
<p>Malicious code threatens the safety of computer systems. Researching malicious code design techniques and mastering code behavior patterns are the basic work of network se...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
Status and solutions of malicious complaints
Status and solutions of malicious complaints
In Korea, malicious complaints that go beyond common sense are continuously occurring. Considering that Korea is a leading country in terms of security, the serious level of malici...
A Comparison of the Three-Point Stance and the Four-Point Stance in Football, Relative to Starting Times for Five Yards
A Comparison of the Three-Point Stance and the Four-Point Stance in Football, Relative to Starting Times for Five Yards
This is a study of the comparison of the three-point stance and the four-point stance in football relative to starting times for five yards. This study is being done to determine w...
Effect of seed priming and seed rate on the performance of wheat (Triticum aestivum)
Effect of seed priming and seed rate on the performance of wheat (Triticum aestivum)
A field experiment was carried out to determine the impact of different seed rates and priming strategies on germination percentage, growth attributes and yield of wheat. The exper...
Enhancing okra performance through osmo-priming: Effects on germination, yield and quality
Enhancing okra performance through osmo-priming: Effects on germination, yield and quality
To assess the impact of various seed priming techniques on okra (Punjab Suhawani variety) performance. Seeds were sourced from Punjab Agricultural University; Ludhiana and the stud...

Back to Top