Preface |
|
xvii | |
Overview of the Textbook |
|
xvii | |
Preview of All Chapters |
|
xviii | |
|
|
1 | (32) |
|
Terrorism: Origin of the Word |
|
|
1 | (1) |
|
|
2 | (3) |
|
Definitions from Various SchoLars and Institutions |
|
|
3 | (1) |
|
Most Universally Accepted Definition |
|
|
4 | (1) |
|
U.S. Department of State's List of Current Terrorist Organizations |
|
|
5 | (2) |
|
Brief History of Terrorism |
|
|
7 | (2) |
|
Statistics on Present-Day Terrorism |
|
|
9 | (2) |
|
|
10 | (1) |
|
Muslim Support for Terrorism in the U.S. |
|
|
10 | (1) |
|
Old Terrorism vs. New Terrorism |
|
|
11 | (3) |
|
Classical Modern, and Postmodern Terrorism |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
12 | (2) |
|
New Organizational Structures |
|
|
14 | (1) |
|
Why Does Terrorism Exist? Fifteen Causes |
|
|
14 | (5) |
|
Case Study: Anders Behring Breivik's Manifesto |
|
|
19 | (1) |
|
|
20 | (3) |
|
Ascribed Terrorist Identity |
|
|
20 | (1) |
|
Self-Ascribed Terrorist Identity |
|
|
20 | (2) |
|
Terrorists' Educational and Family Backgrounds |
|
|
22 | (1) |
|
The Gender of the Terrorist |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
24 | (9) |
|
2 Terrorism as a Communication Process: Tactics |
|
|
33 | (20) |
|
Communication: Definition |
|
|
33 | (2) |
|
Berlo's ModeL of Communication |
|
|
34 | (1) |
|
Terrorism as a Communication Process |
|
|
35 | (2) |
|
Communicating Terrorism: A Model |
|
|
36 | (1) |
|
|
36 | (1) |
|
Collective Communication Model of Terrorism |
|
|
37 | (1) |
|
Communication of Terrorism: Social Noise |
|
|
37 | (4) |
|
|
38 | (1) |
|
|
39 | (2) |
|
Communication of Terrorism: The Signature Method |
|
|
41 | (4) |
|
Signature Methods in History |
|
|
41 | (1) |
|
The IRA's Signature Methods |
|
|
42 | (1) |
|
|
42 | (1) |
|
Kidnappings and Hijackings |
|
|
43 | (1) |
|
|
44 | (1) |
|
Underpublicized Signature Methods |
|
|
44 | (1) |
|
Communication of Terrorism: The Conduit Metaphor |
|
|
45 | (3) |
|
Popular Front for the Liberation of Palestine |
|
|
46 | (1) |
|
Osama bin Laden Videotapes |
|
|
46 | (2) |
|
|
48 | (1) |
|
|
48 | (5) |
|
3 Terrorism as a Communication Process: The Media |
|
|
53 | (24) |
|
|
53 | (1) |
|
Terrorism and the Media: A Symbiotic Relationship |
|
|
54 | (3) |
|
Media as Amplification Effect |
|
|
57 | (3) |
|
|
59 | (1) |
|
Osama bin Laden: A Household Name |
|
|
59 | (1) |
|
Examples of Terrorists' Exploitation of the Media |
|
|
60 | (3) |
|
ProbLems with Media Coverage of Terrorism |
|
|
63 | (2) |
|
|
65 | (2) |
|
Terrorism and the Media: A Semiotic Perspective |
|
|
67 | (2) |
|
|
67 | (1) |
|
|
68 | (1) |
|
The Signal-Index Paradigm |
|
|
69 | (1) |
|
Media Portrayals of Female Terrorists |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
70 | (7) |
|
4 Terrorism as a Communication Process: The Audience |
|
|
77 | (34) |
|
|
77 | (1) |
|
Terrorism and the Audience: From Intimate to Public Distance |
|
|
78 | (3) |
|
Beyond the Immediate Targets of Terrorism |
|
|
78 | (2) |
|
An Audience ALready Established |
|
|
80 | (1) |
|
|
81 | (1) |
|
Uses and Gratifications Theory |
|
|
82 | (1) |
|
Audience for Jihadist Terrorists |
|
|
83 | (1) |
|
9/11 and Its Eight Types of Audiences |
|
|
84 | (2) |
|
Measures of Audience Effectiveness |
|
|
86 | (2) |
|
Emotional and Attitudinat Impacts of Terrorism on the Audience |
|
|
88 | (2) |
|
|
88 | (1) |
|
|
89 | (1) |
|
Impacts of Media Exposure of Terrorism on the Audience |
|
|
90 | (4) |
|
|
90 | (1) |
|
Remarks on Israelis' Reactions |
|
|
91 | (1) |
|
|
92 | (1) |
|
Perception Is Not Reality |
|
|
92 | (1) |
|
Gradual Lessening of Interest |
|
|
93 | (1) |
|
Terrorism as Spectacle: It's All for the Audience |
|
|
94 | (2) |
|
Commanding the Audience's Gaze |
|
|
94 | (1) |
|
The Medium Is the Message |
|
|
95 | (1) |
|
Dawson's Field Hijackings |
|
|
95 | (1) |
|
|
96 | (1) |
|
Terrorism as Spectacle: Analyzing 9/11 |
|
|
96 | (2) |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
98 | (1) |
|
Terrorism as Spectacle: Dramaturgical Analysis |
|
|
98 | (3) |
|
9/11 as Performance as Political Action |
|
|
98 | (1) |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
102 | (9) |
|
|
111 | (26) |
|
|
111 | (2) |
|
Framing vs. Agenda Setting |
|
|
113 | (1) |
|
|
114 | (1) |
|
Framing through the Power of Television |
|
|
115 | (2) |
|
Emotional Cues in Television Coverage |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
117 | (7) |
|
One-Sided vs. Two-Sided Coverage |
|
|
118 | (1) |
|
"Sound-Biting" the Audience |
|
|
119 | (1) |
|
Keeping the Audience Interested |
|
|
120 | (1) |
|
Media-Military Collaboration |
|
|
120 | (2) |
|
Media-Government Collaboration |
|
|
122 | (1) |
|
A Clash of Civilizations in Media Framing of Terrorism |
|
|
123 | (1) |
|
Framing the Image: Durrah vs. Norzich |
|
|
124 | (1) |
|
|
125 | (3) |
|
Framing Reporters for Censorship |
|
|
126 | (1) |
|
Freedom of Information (FOI) Act |
|
|
126 | (1) |
|
|
126 | (2) |
|
Arguments for and against Censoring Media Coverage of Terrorism |
|
|
128 | (1) |
|
|
128 | (1) |
|
Arguments against Censorship |
|
|
129 | (1) |
|
Framing the Media as Janus-Faced Means |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
131 | (6) |
|
6 Terrorism as Social Construction of Reality |
|
|
137 | (26) |
|
Social Construction of Reality: Definition |
|
|
137 | (1) |
|
Terrorism, Language, and Co-Construction of Reality |
|
|
138 | (2) |
|
|
138 | (1) |
|
|
139 | (1) |
|
Social Construction of Terrorism in the West |
|
|
140 | (2) |
|
|
140 | (1) |
|
American Collective Identity |
|
|
141 | (1) |
|
|
142 | (1) |
|
Social Construction of Fear |
|
|
142 | (1) |
|
Social Construction of Emotions |
|
|
143 | (2) |
|
|
144 | (1) |
|
Collective Emotional Orientation |
|
|
144 | (1) |
|
Emotion and Interpersonal News Diffusion |
|
|
145 | (1) |
|
The Role of Culture in Terrorism |
|
|
145 | (4) |
|
Three Levels of Mental Programming |
|
|
146 | (1) |
|
Collective Level of Mental Programming and Terrorism |
|
|
146 | (3) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
151 | (2) |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
154 | (2) |
|
|
156 | (1) |
|
|
156 | (7) |
|
7 Stereotyping Terrorists |
|
|
163 | (22) |
|
|
163 | (1) |
|
|
164 | (2) |
|
Diverse Ways for Stereotyping the Enemy |
|
|
164 | (2) |
|
|
166 | (1) |
|
|
166 | (2) |
|
|
167 | (1) |
|
|
167 | (1) |
|
The Case of Liban Hussein |
|
|
168 | (1) |
|
Stereotyping Arabs, Islam, and Terrorism |
|
|
168 | (3) |
|
American Stereotypes of Arabs and Islam over the Years |
|
|
169 | (1) |
|
Western Stereotypes of Arabs and Islam over the Years |
|
|
170 | (1) |
|
|
171 | (1) |
|
McLuhan's Tetradic Framework |
|
|
171 | (6) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
174 | (2) |
|
|
176 | (1) |
|
Stereotyping Terrorism in Hollywood and Movies |
|
|
177 | (2) |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (1) |
|
|
179 | (6) |
|
8 Interpreting Terrorism through Rhetoric |
|
|
185 | (28) |
|
Rhetoric: General Perspectives |
|
|
185 | (2) |
|
|
186 | (1) |
|
|
187 | (1) |
|
Pro-War Rhetoric in the George W. Bush Administration |
|
|
187 | (5) |
|
President Bush's Address to a Joint Session of Congress |
|
|
189 | (1) |
|
Pro-War Rhetoric in the Media |
|
|
190 | (1) |
|
The Propaganda of "World War" |
|
|
191 | (1) |
|
Propaganda Content Analysis Categories and Descriptors |
|
|
192 | (1) |
|
|
193 | (4) |
|
Dehumanization during the Bush Administration |
|
|
194 | (1) |
|
|
195 | (1) |
|
The "Us vs. Them" Dichotomy |
|
|
195 | (1) |
|
|
196 | (1) |
|
|
196 | (1) |
|
Free Speech about Terrorism |
|
|
197 | (3) |
|
|
198 | (1) |
|
|
198 | (1) |
|
Counterterrorism and Antiterrorism Slogans |
|
|
199 | (1) |
|
Anti-Iraq War and Anti-GWOT Slogans |
|
|
199 | (1) |
|
Rhetoric of Islamist Terrorist Groups |
|
|
200 | (2) |
|
Case Study: Osama bin Laden's Speech (10/29/2004) |
|
|
202 | (3) |
|
Selective Moral Disengagement |
|
|
205 | (2) |
|
|
207 | (1) |
|
|
207 | (6) |
|
9 Euphemisms for Terrorism |
|
|
213 | (20) |
|
|
213 | (1) |
|
It's Not Terrorism; It's the T-Word |
|
|
214 | (5) |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
217 | (2) |
|
Terrorism Euphemisms in the Bush Era |
|
|
219 | (3) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
221 | (1) |
|
Terrorism Euphemisms in the Obama Era |
|
|
222 | (1) |
|
|
223 | (1) |
|
Euphemisms Used by Terrorists Themselves |
|
|
224 | (2) |
|
Effects of Terrorism Euphemisms |
|
|
226 | (2) |
|
|
226 | (1) |
|
|
227 | (1) |
|
|
227 | (1) |
|
|
228 | (1) |
|
|
229 | (4) |
|
10 Terrorism and Group Dynamics |
|
|
233 | (48) |
|
|
233 | (2) |
|
Group Norms and Group Commitment |
|
|
234 | (1) |
|
|
234 | (1) |
|
Group Socialization and Terrorism |
|
|
235 | (2) |
|
|
235 | (1) |
|
Community of Practice (CoP) |
|
|
236 | (1) |
|
|
237 | (1) |
|
Terrorism and Social Identity Theory (SIT) |
|
|
237 | (6) |
|
|
238 | (1) |
|
Social Identity of Terrorists |
|
|
239 | (1) |
|
|
240 | (2) |
|
SIT and Competition between Terrorist Groups |
|
|
242 | (1) |
|
SIT and Group "Mortality Salience" |
|
|
242 | (1) |
|
|
243 | (1) |
|
Small-Group Radicalization |
|
|
243 | (2) |
|
|
244 | (1) |
|
|
245 | (1) |
|
|
245 | (3) |
|
Risky Shift in Terrorist Groups |
|
|
246 | (1) |
|
Consequences of Groupthink |
|
|
247 | (1) |
|
Recruitment of Terrorists |
|
|
248 | (1) |
|
The Importance of Identity |
|
|
248 | (1) |
|
|
248 | (1) |
|
"Staircase to Terrorism" Model |
|
|
249 | (4) |
|
Ground Floor and First FLoor |
|
|
250 | (1) |
|
|
250 | (1) |
|
|
250 | (1) |
|
|
251 | (1) |
|
|
252 | (1) |
|
Five Phases of Social Psychological Conditioning |
|
|
253 | (4) |
|
|
254 | (1) |
|
|
254 | (2) |
|
|
256 | (1) |
|
|
256 | (1) |
|
|
257 | (2) |
|
Levels of Involvement of Female Terrorists |
|
|
258 | (1) |
|
|
258 | (1) |
|
Symbolic Convergence Theory |
|
|
259 | (3) |
|
The Role of Myth in Terrorist Groups |
|
|
260 | (1) |
|
Symbolic Cue, Fantasy Type, and Saga |
|
|
261 | (1) |
|
Symbols in Terrorist Groups |
|
|
262 | (3) |
|
|
262 | (1) |
|
Symbolism in Shi'ite Terrorism |
|
|
263 | (1) |
|
|
264 | (1) |
|
|
265 | (2) |
|
Social Marginalization of Future Jihadists |
|
|
266 | (1) |
|
"Damascus Road" Conversion |
|
|
266 | (1) |
|
|
267 | (1) |
|
|
268 | (13) |
|
11 Organizational Structure and Leadership in Terrorism |
|
|
281 | (26) |
|
Traditional Organizational Structure in Terrorism |
|
|
281 | (2) |
|
Pyramidal (or Hierarchical) Structure |
|
|
281 | (1) |
|
|
282 | (1) |
|
Traditional Leadership in Terrorism |
|
|
283 | (3) |
|
|
283 | (1) |
|
|
284 | (1) |
|
|
285 | (1) |
|
Social Networks of Terrorists |
|
|
286 | (2) |
|
Social Network: Definition |
|
|
287 | (1) |
|
|
287 | (1) |
|
|
288 | (2) |
|
Financial Networks in Terrorism |
|
|
290 | (1) |
|
|
290 | (1) |
|
Difficulties in Dismantling Terrorist Financial Networks |
|
|
290 | (1) |
|
|
291 | (1) |
|
Collaboration Models in Terrorism |
|
|
292 | (3) |
|
|
292 | (1) |
|
|
293 | (1) |
|
|
293 | (1) |
|
|
294 | (1) |
|
Miscellaneous Types of Collaboration |
|
|
294 | (1) |
|
Mexican Drug Cartels and Terrorists: A Collaboration |
|
|
295 | (1) |
|
Terrorist CeLLs: General Outlook |
|
|
295 | (2) |
|
Clandestine Cell Structure |
|
|
295 | (2) |
|
|
297 | (1) |
|
|
297 | (1) |
|
The "Lone Wolf" Cell Structure |
|
|
298 | (2) |
|
|
299 | (1) |
|
Lone Wolf Terrorism in the U.S. |
|
|
299 | (1) |
|
|
300 | (1) |
|
|
301 | (6) |
|
12 Diffusion of Innovations (DoI) and Terrorism |
|
|
307 | (28) |
|
Diffusion of Innovations (DoI): Definition |
|
|
307 | (1) |
|
Introduction to DoI and Terrorism |
|
|
308 | (2) |
|
DoI, Terrorism, and Social Movement Theory |
|
|
310 | (2) |
|
|
310 | (1) |
|
|
311 | (1) |
|
Jihad Diffusing through Muslim Countries |
|
|
312 | (1) |
|
Diffusion of Hamas and Its Ideas |
|
|
313 | (1) |
|
Diffusion of the Muslim Brotherhood in Indonesia |
|
|
314 | (1) |
|
Diffusing Suicide Terrorism |
|
|
315 | (1) |
|
DoI and Mimetism: Definition |
|
|
316 | (2) |
|
Vertical vs. Horizontal Transmission |
|
|
316 | (1) |
|
|
317 | (1) |
|
DoI and Mimetism: Terrorism |
|
|
318 | (2) |
|
|
318 | (1) |
|
Suicide Terrorism and Social Proof |
|
|
319 | (1) |
|
|
320 | (1) |
|
|
320 | (1) |
|
|
321 | (3) |
|
|
321 | (1) |
|
|
322 | (2) |
|
|
324 | (1) |
|
Indoctrinating Palestinian Children |
|
|
324 | (3) |
|
DoI and Response to Terrorism |
|
|
327 | (1) |
|
|
328 | (1) |
|
|
329 | (6) |
|
13 The Globalization of Terrorism |
|
|
335 | (26) |
|
Globalization: Definition |
|
|
335 | (1) |
|
Global Transnational Terrorism (GTT) |
|
|
336 | (3) |
|
Violent Non-State Actors (VSNAs) |
|
|
336 | (1) |
|
|
337 | (1) |
|
New Weapons and Better Technologies |
|
|
338 | (1) |
|
Parallel Globalization of Terror and Ontological Insecurity |
|
|
339 | (1) |
|
Parallel Globalization of Terror |
|
|
339 | (1) |
|
|
339 | (1) |
|
|
340 | (4) |
|
|
340 | (1) |
|
Terrorists Exploiting Cyberspace |
|
|
341 | (1) |
|
Communicating Jihadist Terrorism through Cyberspace |
|
|
342 | (1) |
|
Online Do-It-Yourself Jihad |
|
|
343 | (1) |
|
Terrorists and Online Social Media |
|
|
344 | (2) |
|
|
344 | (1) |
|
Terrorists as Online Social Communicators |
|
|
345 | (1) |
|
Motives for Online Terrorist Recruitment |
|
|
346 | (1) |
|
The Terrorists' Online Audience |
|
|
347 | (2) |
|
Four Types of Online Audience |
|
|
347 | (1) |
|
|
348 | (1) |
|
|
349 | (1) |
|
The Public Sphere (Habermas) |
|
|
349 | (1) |
|
Stages of Online Radicalization |
|
|
350 | (1) |
|
Steganography: Covert Communication |
|
|
350 | (2) |
|
Steganography: Definition |
|
|
350 | (1) |
|
|
351 | (1) |
|
Examples of Steganography in Terrorism |
|
|
351 | (1) |
|
|
352 | (2) |
|
Cyberterrorism Different from Hacking and Cyberwar |
|
|
352 | (1) |
|
|
353 | (1) |
|
|
354 | (1) |
|
|
355 | (6) |
|
14 One-on-One with the Terrorist: Interpersonal Perspectives |
|
|
361 | (22) |
|
Interpersonal Communication: Definition |
|
|
361 | (2) |
|
|
361 | (1) |
|
|
362 | (1) |
|
|
363 | (2) |
|
|
363 | (1) |
|
Dyadic and Triadic Hostage Negotiation |
|
|
364 | (1) |
|
Levels of Negotiation Behavior |
|
|
365 | (1) |
|
|
365 | (4) |
|
Relational Development in Hostage Negotiations |
|
|
365 | (1) |
|
|
366 | (1) |
|
Moluccans' Hijacking in the Netherlands |
|
|
367 | (1) |
|
Hostage Negotiation Fiascos |
|
|
368 | (1) |
|
Hostages Interacting with Terrorists |
|
|
369 | (2) |
|
Uncertainty Reduction Theory (URT) |
|
|
369 | (1) |
|
|
370 | (1) |
|
Interrogation as an Interpersonal Form |
|
|
371 | (2) |
|
Interrogation: Definition |
|
|
371 | (1) |
|
Interrogation of Suspected Terrorists |
|
|
372 | (1) |
|
Deceivers among Suspected Terrorists |
|
|
373 | (1) |
|
The Most Likely to Deceive among Suspected Terrorists |
|
|
373 | (1) |
|
Intercultural Complications |
|
|
374 | (1) |
|
Analyzing Deception in Interrogations |
|
|
374 | (2) |
|
Microexpressions and Leakage |
|
|
375 | (1) |
|
Facial Action Coding System |
|
|
376 | (1) |
|
|
376 | (1) |
|
|
377 | (6) |
|
15 One-on-One with the Terrorist: International Perspectives |
|
|
383 | (22) |
|
International Communication and International Dialogue |
|
|
383 | (2) |
|
|
383 | (1) |
|
At the Negotiation Table with Terrorists? |
|
|
384 | (1) |
|
|
385 | (1) |
|
Tactics and Strategies in Negotiation |
|
|
386 | (2) |
|
|
388 | (2) |
|
Strategic Ambiguity as a Communication Strategy |
|
|
390 | (1) |
|
|
391 | (2) |
|
|
391 | (1) |
|
|
392 | (1) |
|
|
393 | (3) |
|
|
394 | (1) |
|
|
394 | (1) |
|
|
395 | (1) |
|
|
395 | (1) |
|
|
395 | (1) |
|
|
396 | (1) |
|
Dialogue among Civilizations |
|
|
397 | (2) |
|
|
397 | (1) |
|
|
398 | (1) |
|
Schmoozing with Terrorists |
|
|
399 | (1) |
|
|
399 | (1) |
|
|
400 | (5) |
|
16 Crisis Communication and Intelligence |
|
|
405 | (24) |
|
Crisis Communication: General Perspectives |
|
|
405 | (2) |
|
|
405 | (1) |
|
Crisis Communication: Definition |
|
|
406 | (1) |
|
Crisis Communication: Indicators |
|
|
406 | (1) |
|
Differences with Risk Communication |
|
|
407 | (1) |
|
Ten Practices in Crisis Communication |
|
|
408 | (2) |
|
Improving Terrorism Preparedness: Interorganizational Communication |
|
|
410 | (2) |
|
Five Reasons Why Hospitals Are Not Prepared |
|
|
410 | (1) |
|
Interorganizational Communication as the Main Remedy |
|
|
411 | (1) |
|
Crisis Response through the Web |
|
|
412 | (1) |
|
Crisis Response as Restorative Rhetoric |
|
|
413 | (1) |
|
Counterterrorism vs. Antiterrorism |
|
|
414 | (1) |
|
Intelligence: Know Thy Enemy |
|
|
415 | (2) |
|
|
415 | (1) |
|
|
416 | (1) |
|
Information Environment: Misinformation, Disinformation, and Rumors |
|
|
417 | (3) |
|
|
417 | (2) |
|
|
419 | (1) |
|
|
420 | (1) |
|
|
421 | (1) |
|
|
422 | (1) |
|
|
423 | (6) |
Glossary |
|
429 | (44) |
Index |
|
473 | (26) |
About the Author |
|
499 | |