Female Sympathisers of ISIS as Muhajirahs in ISIS-Affiliated Media

نویسندگان

چکیده

International media have reported on the Islamic State of Iraq and Al-Sham (ISIS), an international terrorist organisation based in Syria since 2014. Women, often young unmarried, were leaving their homes families to sneak into join ISIS, according reports (Neumann, 2015). Sjoberg &Gentry (2011) assert that media's portrayal female terrorists factors encourage women support organisations not been sufficiently investigated. This study examines discursive strategies employed by ISIS-affiliated outlets represent sympathisers as muhajirahs. Using Critical Discourse Analysis – Historical Approach (Resigl, 2017), this paper will analyse diverse contested ways which Self versus Other (Wodak, 2009) schemata is prominent representations ISIS sympathisers. The data taken from media, including Manifesto Al Khannssa Brigade six Dabiq magazines. focus referential, predicational argumentation (topoi) selected media. intends pave way for examination gender terrorism explores complexities examining through multiple lenses.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Measuring the Impact of ISIS Social Media Strategy

Terrorist groups like the Islamic State of Iraq and Syria (ISIS) have exploited social media such as Twitter to spread their propaganda and to recruit new members. In this work we study the extent to which ISIS is able to spread their message beyond their immediate supporters. Are they operating in their own sphere with limited interaction with the overall community? Or are they well rooted amo...

متن کامل

Tracking at ISIS

This technical report describes the past, current and future research in tracking at the ISIS group.

متن کامل

ISIS: Multiprocessor Simulator Library

In this paper, architecture independent software simulation kit for multiprocessors called ISIS is proposed and designed. It includes various small simulators of a hardware device. All functions are implemented in C++ language, and the extension of them is also easy. Execution speed of a sample simulator was measured. Execution time of the simulator with four R3000 processors is 22,000 times of...

متن کامل

Mining Pro-ISIS Radicalisation Signals from Social Media Users

The emergence and actions of the so-called Islamic State of Iraq and the Levant (ISIL/ISIS) has received widespread news coverage across the World, largely due to their capture of large swathes of land across Syria and Iraq, and the publishing of execution and propaganda videos. Enticed by such material published on social media and attracted to the cause of ISIS, there have been numerous repor...

متن کامل

RFC 5120 M - ISIS February

This document describes an optional mechanism within Intermediate System to Intermediate Systems (IS-ISs) used today by many ISPs for IGP routing within their clouds. This document describes how to run, within a single IS-IS domain, a set of independent IP topologies that we call Multi-Topologies (MTs). This MT extension can be used for a variety of purposes, such as an in-band management netwo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Modern Languages

سال: 2022

ISSN: ['2462-1986', '1675-526X']

DOI: https://doi.org/10.22452/jml.vol32no2.3