Stylistic Verbal Markers of Threat in Public Statements of Social Network Twitter
Abstract
The article examines a number of social, communicative and linguistic factors related to the threat as a speech strategy, reveals the ways of functioning of these markers within the Internet discourse. The aim of the study is to reveal the features of lexical and grammatical verbal markers of threat in the texts of public messages of the English–speaking segment of the social network Twitter. The scientific novelty of the study lies in the study of language tools that function as verbal threat markers in the English-language social network Twitter. As a result of the study, it was determined that the English-language media text has a high degree of implicitness, evaluativity and expressiveness. Verbal markers are endowed with a number of communicative functions and are the most important element in the text system of Internet messages.
Downloads
References
Brynielsson, J., Horndahl, A. (2012). Analysis of weak signals for detecting lone wolf terrorists. Proceedings of EISIC, 197–204. https://doi.org/10.1109/eisic.2012.20
Cohen, K., Johansson, F., Kaati, L., & Mork, J. C. (2014). Detecting linguistic markers for radical violence in social media. Terrorism and Political Violence, 26(1), 246–256. https://doi.org/10.1080/09546553.2014.849948
Dahlin, J., Johansson, F., & Svenson, P. (2016). Combining entity matching techniques for detecting extremist behavior on discussion boards. Proceedings of international symposium on foundation of open source intelligence and security informatics, 54(3), 28–42. https://doi.org/10.1109/asonam.2012.154
Davison, K. P., Pennebaker, J. W., & Dickerson, S. S. (2015). Who talks? The social psychology of illness support groups. The American Psychologist, 55(2), 205–217. https://doi.org/10.1037/0003-066X.55.2.205
Fraser B. (2008). Threatening revisited. Forensics, 5(2), 159–173. https://doi.org/10.1558/sll.1998.5.2.159
Gingiss P. (2018). Indirect threats. Word, 37(3), 153–158. https://doi.org/10.14264/uql.2018.992
Harris S. (2014). The form and function of threats in court. Language & Communication, 4(4), 247–271. https://doi.org/10.1016/0271-5309(84)90010-7
Limberg H. (2019). Impoliteness and threat responses. Journal of Pragmatics, 41(7), 1376–1394. https://doi.org/10.1016/j.pragma.2009.02.003
Matheson, D. (2018). The performance of publicness in social media: tracing patterns in tweets after a disaster. Media, Culture, & Society, 40(4), 584–599. https://doi.org/10.1177/0163443717741356
Milburn, T. W. (2011). On the nature of threat: A psychological analysis. Praeger Publishers. https://doi.org/10.1111/j.1540-4560.1977.tb01872.x
McCroskey, J.C. (2017). It's in Our Nature: Verbal Aggressiveness As Temperamental Expression. Communication: Quarterly, 45(4), 446–460. https://doi.org/10.1080/01463379709370076
Meloy, R., Hoffmann, J., & James, D. (2015). The role of warning behaviors in threat assessment: an exploration and suggested typology. Behavioral sciences and the law, 256–279. https://doi.org/10.1002/bsl.999
Muresan, S., Gonzalez-Ibanez, R., Ghosh, D., & Wacholder, N. (2015). Identification of nonliteral language in social media: A case study on sarcasm. Journal of the Associationfor Information Science and Technology, 67(11), 2725–2737. https://doi.org/10.1002/asi.23624
Normand, M. (2011). Verbal Behavior: History and Future. The Behavior Analyst Today, 3 (1), 41–55. https://doi.org/10.1037/h0099959
Rancer, A.S. (2016). Argumentative and Aggressive Communication: Theory, Research, and Application. SAGE Publications. https://doi.org/10.4135/9781412958479.n21
Rezaeinia, S. M., Rahmani, R., Ghodsi, A., & Veisi, H. (2018). Sentiment analysis based on improved pre-trained word embeddings. Expert Systems with Applications, 117, 139–147. https://doi.org/10.1016/j.eswa.2018.08.044
Searle J. R. (2014). What is a Speech Act? Methods in language and social interaction. Thousand Oaks: Sage Publications Ltd. https://doi.org/10.4324/9781315830636-18
Small G.S., Medsker, L. (2013). Review of information extraction technologies and applications. Neural Computing and Applications, 25(3-4), 533–548. https://doi.org/10.1007/s00521-013-1516-6
Tausczik, Y. R., & Pennebaker, J. W. (2016). The psychological meaning of words: LIWC and computerized text analysis methods. Journal of Language and Social Psychology, 29(1), 24–54. https://doi.org/10.1177/0261927X09351676
Van Hee, C., Jacobs, G., Emmery, C., Desmet, B., & Hoste, V. (2018). Automatic detection of cyberbullying in social media text.PLoS ONE, 13(10), 1–22. https://doi.org/10.1371/journal.pone.0203794