Atjaunināt sīkdatņu piekrišanu

E-grāmata: Terrorism and Communication: A Critical Introduction

4.40/5 (10 ratings by Goodreads)
  • Formāts: PDF+DRM
  • Izdošanas datums: 30-Aug-2012
  • Izdevniecība: SAGE Publications Inc
  • Valoda: eng
  • ISBN-13: 9781483307336
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 96,36 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Izdošanas datums: 30-Aug-2012
  • Izdevniecība: SAGE Publications Inc
  • Valoda: eng
  • ISBN-13: 9781483307336
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Based on the premise that terrorism is essentially a message, Terrorism and Communication: A Critical Introduction examines terrorism from a communication perspective-making it the first text to offer a complete picture of the role of communication in terrorist activity. Through the extensive examination of state-of-the-art research on terrorism as well as recent case studies and speech excerpts, communication and terrorism scholar Jonathan Matusitz explores the ways that terrorists communicate messages through actions and discourse. Using a multifaceted approach, he draws valuable insights from relevant disciplines, including mass communication, political communication, and visual communication, as he illustrates the key role that media outlets play in communicating terrorists’ objectives and examines the role of global communication channels in both spreading and combating terrorism. This is an essential introduction to understanding what terrorism is, how it functions primarily through communication, how we talk about it, and how we prevent it.
Preface xvii
Overview of the Textbook xvii
Preview of All
Chapters
xviii
1 What Is Terrorism?
1(32)
Terrorism: Origin of the Word
1(1)
Terrorism: Definition
2(3)
Definitions from Various SchoLars and Institutions
3(1)
Most Universally Accepted Definition
4(1)
U.S. Department of State's List of Current Terrorist Organizations
5(2)
Brief History of Terrorism
7(2)
Statistics on Present-Day Terrorism
9(2)
RAND Corporation
10(1)
Muslim Support for Terrorism in the U.S.
10(1)
Old Terrorism vs. New Terrorism
11(3)
Classical Modern, and Postmodern Terrorism
11(1)
Four Waves of Terrorism
12(1)
Clash of Civilizations
12(2)
New Organizational Structures
14(1)
Why Does Terrorism Exist? Fifteen Causes
14(5)
Case Study: Anders Behring Breivik's Manifesto
19(1)
The Terrorist Identity
20(3)
Ascribed Terrorist Identity
20(1)
Self-Ascribed Terrorist Identity
20(2)
Terrorists' Educational and Family Backgrounds
22(1)
The Gender of the Terrorist
22(1)
The Age of the Terrorist
23(1)
Summary
23(1)
Key Terms
24(9)
2 Terrorism as a Communication Process: Tactics
33(20)
Communication: Definition
33(2)
Berlo's ModeL of Communication
34(1)
Terrorism as a Communication Process
35(2)
Communicating Terrorism: A Model
36(1)
Act of Terrorism
36(1)
Collective Communication Model of Terrorism
37(1)
Communication of Terrorism: Social Noise
37(4)
Propaganda by the Deed
38(1)
Martyrdom
39(2)
Communication of Terrorism: The Signature Method
41(4)
Signature Methods in History
41(1)
The IRA's Signature Methods
42(1)
Suicide Bombings
42(1)
Kidnappings and Hijackings
43(1)
Beheadings
44(1)
Underpublicized Signature Methods
44(1)
Communication of Terrorism: The Conduit Metaphor
45(3)
Popular Front for the Liberation of Palestine
46(1)
Osama bin Laden Videotapes
46(2)
Summary
48(1)
Key Terms
48(5)
3 Terrorism as a Communication Process: The Media
53(24)
Media: Definition
53(1)
Terrorism and the Media: A Symbiotic Relationship
54(3)
Media as Amplification Effect
57(3)
Media as a Fickle Friend
59(1)
Osama bin Laden: A Household Name
59(1)
Examples of Terrorists' Exploitation of the Media
60(3)
ProbLems with Media Coverage of Terrorism
63(2)
Media Terrorism
65(2)
Terrorism and the Media: A Semiotic Perspective
67(2)
Saussurean Semiotics
67(1)
Peircean Semiotics
68(1)
The Signal-Index Paradigm
69(1)
Media Portrayals of Female Terrorists
69(1)
Summary
70(1)
Key Terms
70(7)
4 Terrorism as a Communication Process: The Audience
77(34)
The Audience: Definition
77(1)
Terrorism and the Audience: From Intimate to Public Distance
78(3)
Beyond the Immediate Targets of Terrorism
78(2)
An Audience ALready Established
80(1)
Yale Model of Persuasion
81(1)
Uses and Gratifications Theory
82(1)
Audience for Jihadist Terrorists
83(1)
9/11 and Its Eight Types of Audiences
84(2)
Measures of Audience Effectiveness
86(2)
Emotional and Attitudinat Impacts of Terrorism on the Audience
88(2)
Fear and Trauma
88(1)
Tertiary Identities
89(1)
Impacts of Media Exposure of Terrorism on the Audience
90(4)
Managing Citizens' Fears
90(1)
Remarks on Israelis' Reactions
91(1)
Affecting Memory
92(1)
Perception Is Not Reality
92(1)
Gradual Lessening of Interest
93(1)
Terrorism as Spectacle: It's All for the Audience
94(2)
Commanding the Audience's Gaze
94(1)
The Medium Is the Message
95(1)
Dawson's Field Hijackings
95(1)
Culture of Terror
96(1)
Terrorism as Spectacle: Analyzing 9/11
96(2)
A Disaster Movie
97(1)
A Horror Movie
97(1)
A Speech Performance
98(1)
Terrorism as Spectacle: Dramaturgical Analysis
98(3)
9/11 as Performance as Political Action
98(1)
9/11 as Script
99(1)
9/11 as Mise en Scene
100(1)
9/11 as Choreography
101(1)
Summary
101(1)
Key Terms
102(9)
5 Framing Terrorism
111(26)
Framing: Definition
111(2)
Framing vs. Agenda Setting
113(1)
Types of Framing
114(1)
Framing through the Power of Television
115(2)
Emotional Cues in Television Coverage
116(1)
Media Dependency Theory
117(1)
Framing Terrorism
117(7)
One-Sided vs. Two-Sided Coverage
118(1)
"Sound-Biting" the Audience
119(1)
Keeping the Audience Interested
120(1)
Media-Military Collaboration
120(2)
Media-Government Collaboration
122(1)
A Clash of Civilizations in Media Framing of Terrorism
123(1)
Framing the Image: Durrah vs. Norzich
124(1)
Framing for Censorship
125(3)
Framing Reporters for Censorship
126(1)
Freedom of Information (FOI) Act
126(1)
Visual Determinism
126(2)
Arguments for and against Censoring Media Coverage of Terrorism
128(1)
Arguments for Censorship
128(1)
Arguments against Censorship
129(1)
Framing the Media as Janus-Faced Means
130(1)
Summary
131(1)
Key Terms
131(6)
6 Terrorism as Social Construction of Reality
137(26)
Social Construction of Reality: Definition
137(1)
Terrorism, Language, and Co-Construction of Reality
138(2)
Discourse
138(1)
Narrative
139(1)
Social Construction of Terrorism in the West
140(2)
Symbolism
140(1)
American Collective Identity
141(1)
United States vs. Europe
142(1)
Social Construction of Fear
142(1)
Social Construction of Emotions
143(2)
Definitions of Emotions
144(1)
Collective Emotional Orientation
144(1)
Emotion and Interpersonal News Diffusion
145(1)
The Role of Culture in Terrorism
145(4)
Three Levels of Mental Programming
146(1)
Collective Level of Mental Programming and Terrorism
146(3)
Cultural Worldview (CWV)
149(1)
Belief in a Just World
150(1)
Symbolic Interactionism
151(2)
Uncertainty Avoidance
153(1)
Collectivism
153(1)
Ethnography of Terrorism
154(2)
Summary
156(1)
Key Terms
156(7)
7 Stereotyping Terrorists
163(22)
Stereotype: Definition
163(1)
Stereotyping the Enemy
164(2)
Diverse Ways for Stereotyping the Enemy
164(2)
Collective Unconscious
166(1)
Stigmatization
166(2)
Three Forms of Stigma
167(1)
Racial Profiling
167(1)
The Case of Liban Hussein
168(1)
Stereotyping Arabs, Islam, and Terrorism
168(3)
American Stereotypes of Arabs and Islam over the Years
169(1)
Western Stereotypes of Arabs and Islam over the Years
170(1)
Perspectives on Racism
171(1)
McLuhan's Tetradic Framework
171(6)
First Step
172(1)
Second Step
173(1)
Third Step
174(2)
Fourth Step
176(1)
Stereotyping Terrorism in Hollywood and Movies
177(2)
Jack Shaheen's Studies
177(1)
Narrative Transportation
178(1)
Cultivation Theory
178(1)
Summary
179(1)
Key Terms
179(6)
8 Interpreting Terrorism through Rhetoric
185(28)
Rhetoric: General Perspectives
185(2)
Three Modes of Rhetoric
186(1)
Propaganda
187(1)
Pro-War Rhetoric in the George W. Bush Administration
187(5)
President Bush's Address to a Joint Session of Congress
189(1)
Pro-War Rhetoric in the Media
190(1)
The Propaganda of "World War"
191(1)
Propaganda Content Analysis Categories and Descriptors
192(1)
Dehumanizing the Enemy
193(4)
Dehumanization during the Bush Administration
194(1)
Boomerang Effect
195(1)
The "Us vs. Them" Dichotomy
195(1)
Cultural Hegemony
196(1)
Occidentalism
196(1)
Free Speech about Terrorism
197(3)
Anti-Semetic Rhetoric
198(1)
Terrorism Slogans
198(1)
Counterterrorism and Antiterrorism Slogans
199(1)
Anti-Iraq War and Anti-GWOT Slogans
199(1)
Rhetoric of Islamist Terrorist Groups
200(2)
Case Study: Osama bin Laden's Speech (10/29/2004)
202(3)
Selective Moral Disengagement
205(2)
Summary
207(1)
Key Terms
207(6)
9 Euphemisms for Terrorism
213(20)
Euphemisms: Definition
213(1)
It's Not Terrorism; It's the T-Word
214(5)
Distancing Language
215(1)
No More Bombing?
216(1)
No More Killing?
217(2)
Terrorism Euphemisms in the Bush Era
219(3)
The Patriot Act
220(1)
Unknown Unknown
221(1)
Euphemisms for Torture
221(1)
Terrorism Euphemisms in the Obama Era
222(1)
Bluespeak
223(1)
Euphemisms Used by Terrorists Themselves
224(2)
Effects of Terrorism Euphemisms
226(2)
Obscurantism
226(1)
Glossocracy
227(1)
Solutions
227(1)
Summary
228(1)
Key Terms
229(4)
10 Terrorism and Group Dynamics
233(48)
Groups: Definition
233(2)
Group Norms and Group Commitment
234(1)
Primary Groups
234(1)
Group Socialization and Terrorism
235(2)
Trust and Support
235(1)
Community of Practice (CoP)
236(1)
Group Roles
237(1)
Terrorism and Social Identity Theory (SIT)
237(6)
Description of SIT
238(1)
Social Identity of Terrorists
239(1)
SIT and Hezbollah
240(2)
SIT and Competition between Terrorist Groups
242(1)
SIT and Group "Mortality Salience"
242(1)
SIT and Forgiveness
243(1)
Small-Group Radicalization
243(2)
Jihadization
244(1)
Halaqa and Usroh
245(1)
Groupthink
245(3)
Risky Shift in Terrorist Groups
246(1)
Consequences of Groupthink
247(1)
Recruitment of Terrorists
248(1)
The Importance of Identity
248(1)
Models of Recruitment
248(1)
"Staircase to Terrorism" Model
249(4)
Ground Floor and First FLoor
250(1)
Second Floor
250(1)
Third Floor
250(1)
Fourth Floor
251(1)
Fifth (and Last) Floor
252(1)
Five Phases of Social Psychological Conditioning
253(4)
Phases 1 and 2
254(1)
Phase 3
254(2)
Phase 4
256(1)
Phase 5
256(1)
The Pyramid ModeL
257(2)
Levels of Involvement of Female Terrorists
258(1)
Group Failure
258(1)
Symbolic Convergence Theory
259(3)
The Role of Myth in Terrorist Groups
260(1)
Symbolic Cue, Fantasy Type, and Saga
261(1)
Symbols in Terrorist Groups
262(3)
Symbols and Terrorism
262(1)
Symbolism in Shi'ite Terrorism
263(1)
Symbolism in Hezbollah
264(1)
Social Marginalization
265(2)
Social Marginalization of Future Jihadists
266(1)
"Damascus Road" Conversion
266(1)
Summary
267(1)
Key Terms
268(13)
11 Organizational Structure and Leadership in Terrorism
281(26)
Traditional Organizational Structure in Terrorism
281(2)
Pyramidal (or Hierarchical) Structure
281(1)
Horizontal Structure
282(1)
Traditional Leadership in Terrorism
283(3)
Leadership Influence
283(1)
Authoritarian Leadership
284(1)
Charismatic Leadership
285(1)
Social Networks of Terrorists
286(2)
Social Network: Definition
287(1)
The Al Qaeda Network
287(1)
Types of Social Networks
288(2)
Financial Networks in Terrorism
290(1)
Hawala System
290(1)
Difficulties in Dismantling Terrorist Financial Networks
290(1)
Safe Havens
291(1)
Collaboration Models in Terrorism
292(3)
Physical Exchange
292(1)
Information Exchange
293(1)
Knowledge Exchange
293(1)
Action Exchange
294(1)
Miscellaneous Types of Collaboration
294(1)
Mexican Drug Cartels and Terrorists: A Collaboration
295(1)
Terrorist CeLLs: General Outlook
295(2)
Clandestine Cell Structure
295(2)
Al Qaeda Cells
297(1)
Self-Starter Cells
297(1)
The "Lone Wolf" Cell Structure
298(2)
Leaderless Resistance
299(1)
Lone Wolf Terrorism in the U.S.
299(1)
Summary
300(1)
Key Terms
301(6)
12 Diffusion of Innovations (DoI) and Terrorism
307(28)
Diffusion of Innovations (DoI): Definition
307(1)
Introduction to DoI and Terrorism
308(2)
DoI, Terrorism, and Social Movement Theory
310(2)
Spillover Effect
310(1)
Opinion Leadership
311(1)
Jihad Diffusing through Muslim Countries
312(1)
Diffusion of Hamas and Its Ideas
313(1)
Diffusion of the Muslim Brotherhood in Indonesia
314(1)
Diffusing Suicide Terrorism
315(1)
DoI and Mimetism: Definition
316(2)
Vertical vs. Horizontal Transmission
316(1)
Meme Replication
317(1)
DoI and Mimetism: Terrorism
318(2)
The Al Qaeda Memes
318(1)
Suicide Terrorism and Social Proof
319(1)
Mirror Neurons
320(1)
Social Learning Theory
320(1)
Meme Antibody
321(3)
Radical Islam
321(1)
British Islamic Schools
322(2)
U.S. Islamic Schools
324(1)
Indoctrinating Palestinian Children
324(3)
DoI and Response to Terrorism
327(1)
Summary
328(1)
Key Terms
329(6)
13 The Globalization of Terrorism
335(26)
Globalization: Definition
335(1)
Global Transnational Terrorism (GTT)
336(3)
Violent Non-State Actors (VSNAs)
336(1)
Hezbollah and GTT
337(1)
New Weapons and Better Technologies
338(1)
Parallel Globalization of Terror and Ontological Insecurity
339(1)
Parallel Globalization of Terror
339(1)
Ontological Insecurity
339(1)
Terrorism in Cyberspace
340(4)
Cyberspace: Definition
340(1)
Terrorists Exploiting Cyberspace
341(1)
Communicating Jihadist Terrorism through Cyberspace
342(1)
Online Do-It-Yourself Jihad
343(1)
Terrorists and Online Social Media
344(2)
Virtual Community
344(1)
Terrorists as Online Social Communicators
345(1)
Motives for Online Terrorist Recruitment
346(1)
The Terrorists' Online Audience
347(2)
Four Types of Online Audience
347(1)
Hamas Audiences
348(1)
Online Radicalization
349(1)
The Public Sphere (Habermas)
349(1)
Stages of Online Radicalization
350(1)
Steganography: Covert Communication
350(2)
Steganography: Definition
350(1)
Cryptography
351(1)
Examples of Steganography in Terrorism
351(1)
Cyberterrorism
352(2)
Cyberterrorism Different from Hacking and Cyberwar
352(1)
The Postmodern Condition
353(1)
Summary
354(1)
Key Terms
355(6)
14 One-on-One with the Terrorist: Interpersonal Perspectives
361(22)
Interpersonal Communication: Definition
361(2)
Six Assumptions
361(1)
Negotiation
362(1)
Hostage Negotiation
363(2)
Terrorist-Negotiators
363(1)
Dyadic and Triadic Hostage Negotiation
364(1)
Levels of Negotiation Behavior
365(1)
Relational Development
365(4)
Relational Development in Hostage Negotiations
365(1)
The Role of Language
366(1)
Moluccans' Hijacking in the Netherlands
367(1)
Hostage Negotiation Fiascos
368(1)
Hostages Interacting with Terrorists
369(2)
Uncertainty Reduction Theory (URT)
369(1)
Stockholm Syndrome
370(1)
Interrogation as an Interpersonal Form
371(2)
Interrogation: Definition
371(1)
Interrogation of Suspected Terrorists
372(1)
Deceivers among Suspected Terrorists
373(1)
The Most Likely to Deceive among Suspected Terrorists
373(1)
Intercultural Complications
374(1)
Analyzing Deception in Interrogations
374(2)
Microexpressions and Leakage
375(1)
Facial Action Coding System
376(1)
Summary
376(1)
Key Terms
377(6)
15 One-on-One with the Terrorist: International Perspectives
383(22)
International Communication and International Dialogue
383(2)
Definitions
383(1)
At the Negotiation Table with Terrorists?
384(1)
Negotiation Theory
385(1)
Tactics and Strategies in Negotiation
386(2)
Third-Party Intervention
388(2)
Strategic Ambiguity as a Communication Strategy
390(1)
The Role of Diplomacy
391(2)
Definition
391(1)
Intercultural Competence
392(1)
Multi-Track Diplomacy
393(3)
Track I Diplomacy
394(1)
Track II Diplomacy
394(1)
Track III Diplomacy
395(1)
Track IV Diplomacy
395(1)
Track V Diplomacy
395(1)
Voice of America (VOA)
396(1)
Dialogue among Civilizations
397(2)
Global Opinion Theory
397(1)
Kissing the Enemy?
398(1)
Schmoozing with Terrorists
399(1)
Summary
399(1)
Key Terms
400(5)
16 Crisis Communication and Intelligence
405(24)
Crisis Communication: General Perspectives
405(2)
Crisis Management
405(1)
Crisis Communication: Definition
406(1)
Crisis Communication: Indicators
406(1)
Differences with Risk Communication
407(1)
Ten Practices in Crisis Communication
408(2)
Improving Terrorism Preparedness: Interorganizational Communication
410(2)
Five Reasons Why Hospitals Are Not Prepared
410(1)
Interorganizational Communication as the Main Remedy
411(1)
Crisis Response through the Web
412(1)
Crisis Response as Restorative Rhetoric
413(1)
Counterterrorism vs. Antiterrorism
414(1)
Intelligence: Know Thy Enemy
415(2)
Definition
415(1)
Signal Intelligence
416(1)
Information Environment: Misinformation, Disinformation, and Rumors
417(3)
Disinformation
417(2)
Rumors
419(1)
Fusion Centers
420(1)
Color-Coded Terrorism
421(1)
Summary
422(1)
Key Terms
423(6)
Glossary 429(44)
Index 473(26)
About the Author 499
Dr. Jonathan Matusitz (Ph.D., University of Oklahoma, 2006) is currently an Associate Professor in the Nicholson School of Communication at the University of Central Florida (UCF). He studies globalization, culture, and terrorism. One of his particular emphases is the Islamist threat to America and the world. On top of having 85 academic publications and over 100 conference presentations, he taught at a N.A.T.O.-affiliated military base in Belgium in 2010. Originally from Belgium himself, he migrated to the United States in 2000. In 2012, he was honored with a prestigious teaching award by the College of Sciences at UCF.