{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T16:57:23Z","timestamp":1771865843223,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,9,24]],"date-time":"2014-09-24T00:00:00Z","timestamp":1411516800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Secur Inform"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1186\/s13388-014-0009-1","type":"journal-article","created":{"date-parts":[[2014,9,23]],"date-time":"2014-09-23T07:05:52Z","timestamp":1411455952000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Language use in the Jihadist magazines inspire and Azan"],"prefix":"10.1186","volume":"3","author":[{"given":"David B","family":"Skillicorn","sequence":"first","affiliation":[]},{"given":"Edna F","family":"Reid","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,24]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"G Weimann, Lone wolves in cyberspace. J. Terrorism Res. 3(2) (2012).","DOI":"10.15664\/jtr.405"},{"key":"9_CR2","unstructured":"R Martin, Propaganda and the Ethics of Persuasion, 2nd edn. (Broadview Press, 2013)."},{"key":"9_CR3","first-page":"295","volume-title":"Grammatical word class variation with the British National Corpus sampler","author":"P Rayson","year":"2000","unstructured":"P Rayson, A Wilson, G Leech, in Twenty First International Conference on English Language Research on Computerized Corpora. Grammatical word class variation with the British National Corpus sampler, (2000), pp. 295\u2013306."},{"key":"9_CR4","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1177\/002200277702100108","volume":"21","author":"P Suedfeld","year":"1977","unstructured":"Suedfeld P, Tetlock P: Integrative complexity of communications in international crises. J. Conflict Resolution 1977, 21: 169\u2013184.","journal-title":"J. Conflict Resolution"},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1177\/0146167203029005010","volume":"29","author":"ML Newman","year":"2003","unstructured":"Newman ML, Pennebaker JW, Berry DS, Richards JM: Lying words: predicting deception from linguistic style. Pers. Soc. Psychol. Bull 2003, 29: 665\u2013675. 10.1177\/0146167203029005010","journal-title":"Pers. Soc. Psychol. Bull"},{"key":"9_CR6","first-page":"176","volume-title":"Automatically classifying documents by ideological and organizational affiliation","author":"M Koppel","year":"2009","unstructured":"M Koppel, N Akiva, E Alshech, K Bar, in Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI 2009). Automatically classifying documents by ideological and organizational affiliation, (2009), pp. 176\u2013178."},{"key":"9_CR7","unstructured":"SA Ford, Inspiring a narrative: a content analysis of Al Qaeda\u2019s English-Language Inspire magazine. Master\u2019s Research Essay, Carleton University (2012)."},{"key":"9_CR8","unstructured":"EF Reid, AQAP Inspire magazine: implications for crowdsourcing and gamification. Technical report, Research Paper, National Intelligence University (NIU), Washington, D.C. (2012)."},{"key":"9_CR9","first-page":"215","volume-title":"Crowdsourcing and gamification techniques in inspire (aqap online magazine)","author":"EF Reid","year":"2013","unstructured":"EF Reid, in IEEE International Conference on Intelligence and Security Informatics (ISI). Crowdsourcing and gamification techniques in inspire (aqap online magazine), (2013), pp. 215\u2013220."},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"G Ramsay, Targeting, rhetoric and the failure of grassroots jihad. J. Terrorism Res. 3(1) (2012).","DOI":"10.15664\/jtr.415"},{"key":"9_CR11","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2011.5984043","volume-title":"An SIR model for violent topic diffusion in social media","author":"J Woo","year":"2011","unstructured":"J Woo, J Son, H Chen, in Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. An SIR model for violent topic diffusion in social media, (2011)."},{"issue":"1","key":"9_CR12","first-page":"1","volume":"1","author":"AF Lemieux","year":"2014","unstructured":"Lemieux AF, Brachman J, Levitt J, Wood J: Inspire magazine: a critical analysis of its significance and potential impact through the lens of the information, motivation, and behavioral skills model. Terrorism Pol. Violence 2014, 1(1):1\u201318.","journal-title":"Terrorism Pol. Violence"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"DB Skillicorn, in Foundations of Open-Source Intelligence FOSINT 2012. Lessons from a jihadi corpus, (2012).","DOI":"10.1109\/ASONAM.2012.239"},{"key":"9_CR14","first-page":"1","volume-title":"Applying interestingness measures to Ansar forum texts","author":"DB Skillicorn","year":"2010","unstructured":"DB Skillicorn, in Proceedings of KDD 2010, Workshop on Intelligence and Security Informatics. Applying interestingness measures to Ansar forum texts, (2010), pp. 1\u20139."},{"key":"9_CR15","unstructured":"GH Golub, CF van Loan, Matrix Computations, 3rd edn. (Johns Hopkins University Press, 1996)."},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"P Suedfeld, PE Tetlock, S Streufert, in Motivation and Personality: Handbook of Thematic Content Analysis. Conceptual\/integrative complexity (Cambridge University Press, 1992), pp. 393\u2013400.","DOI":"10.1017\/CBO9780511527937.028"},{"issue":"5","key":"9_CR17","doi-asserted-by":"publisher","first-page":"1029","DOI":"10.1037\/a0013336","volume":"95","author":"LG Conway III","year":"2008","unstructured":"Conway III LG, Thoemmes F, Allison AM, Towgood KH, Wagner MJ, Davey K, Salcido A, Stovall AN, Dodds DP, Bongard K, Conway KR: Two ways to be complex and why they matter: implications for attitude strength and lying. J. Pers. Soc. Psychol. 2008, 95(5):1029\u20131044. 10.1037\/a0013336","journal-title":"J. Pers. Soc. Psychol"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"L Conway III, KR Conway, LJ Gornick, SC Houck, Automated integrative complexity. Pol. Psychol. (2012). in press.","DOI":"10.1002\/9780470672532.wbepp035"},{"key":"9_CR19","unstructured":"J McGonigal, Reality Is Broken (Penguin Books, 2011)."},{"key":"9_CR20","first-page":"1028","volume-title":"Improving the language of influence","author":"DB Skillicorn","year":"2013","unstructured":"DB Skillicorn, C Leuprecht, in Proceedings of Foundations of Open Source Intelligence, at Advances in Social Network Analysis and Modelling (ASONAM). Improving the language of influence (ACM & IEEE, 2013), pp. 1028\u20131033."}],"container-title":["Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13388-014-0009-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-014-0009-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-014-0009-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-014-0009-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T04:40:28Z","timestamp":1565844028000},"score":1,"resource":{"primary":{"URL":"https:\/\/security-informatics.springeropen.com\/articles\/10.1186\/s13388-014-0009-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,24]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["9"],"URL":"https:\/\/doi.org\/10.1186\/s13388-014-0009-1","relation":{},"ISSN":["2190-8532"],"issn-type":[{"value":"2190-8532","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,9,24]]},"assertion":[{"value":"24 January 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2014","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2014","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"9"}}